Tuesday, June 30, 2020

Effect of Technology on Empathy Research Paper - 1925 Words

Effect of Technology on Empathy (Research Paper Sample) Content: IMPACT OF TECHNOLOGY ON EMPATHYStudentà ¢Ã¢â€š ¬s nameInstitutional affiliationImpact of Technology on EmpathyEmpathy creates an understanding of the people we live with, develop relationships, and demonstrate compassion in times of tragedy and calamity. It is fundamental to the establishment of a society and efforts to collectively foster survival. The information age has greatly led to the weakening of our ability to empathize. Empathy is the human response to the foreseen or perceived feelings and emotions of others. In the present day culture where focus has been so much more on the self over the society, empathy has come out as a weakness. Research has however found that empathy is essential to the maintenance and improvement of the human society. It is important to examine the extent to which communication technology has affected our ability to empathize with others and the possible reasons for this trend.Through empathy, people can develop and sustain helpful relationships. In institutions of learning, empathy allows socialization among students, development of friendships, creates an understanding of the social paradigm, and relate cohesively in peer groups. Through empathy in working environment, it becomes possible to engage in teamwork, negotiations, collaboration and expertise necessary for the job. The advent and growth of communication technology has made it necessary to rethink its effect on empathy for the working environment. The growth of empathy reduces the chances of people degenerating to behavior that is undesirable and hence makes the society safer and makes it possible to demonstrate compassion (Elliott et al 2011)Empathy can be used as the medium through which people express compassion, understand the pain and joy of others or even as a tool to deceive and manipulate others. Empathy comes in different forms, all of which are important human traits. It is however possible to be better in one kind of empathy but lack in o thers. Smith, a theorist placed a distinction between cognitive empathy and emotional empathy in the year 1759. Since then subsequent researches has placed similar distinction examining the two types of empathy as two different functions. The categories differentiated the unplanned, unemotional reactions like the pain of seeing a stranger wound themselves, from the emotional reaction like crying at the loss of a loved one.The research hypothesis by Konrath, Hsingà ¢Ã¢â€š ¬s and Oà ¢Ã¢â€š ¬Brian suggests that increase in self-centeredness has contributed to the diminished willingness and incapacity to empathize. Study indicates that narcissism and empathy are adversaries. Increased personality disorder has led to the decline in the empathetic abilities in both adults and children over the past 30 years. Of the people tested, less than 25% thought of themselves as empathetic today as they were thirty years ago. Over the past decade there has been a steady decline as indicated in Kon rathà ¢Ã¢â€š ¬s graph below. Most of the people born between 1977 and 1994 indicated that they place great importance in service to the community but they would rather play games, watch television or engage in fun activities. Parents have a great role in molding children to be empathetic in their future lives.Konrathà ¢Ã¢â€š ¬s graphKonrath, in his study, also proposes that with more Americans Living a lonely life than the previous decades there has been more focus on self. This has been propagated by the technological shift to social media, self-focus and isolation. This has diminished the current generationsà ¢Ã¢â€š ¬ potential to empathize. The video by Cohen which is based on the book à ¢Ã¢â€š ¬Ã‹Å"Alone Togetherà ¢Ã¢â€š ¬ by Sherry Turkle (Turkle 2012) and the article à ¢Ã¢â€š ¬Ã‹Å"The Invention of Being Lonelyà ¢Ã¢â€š ¬ by Dr. Yair Amichai agrees with the hypothesis of Konrath. Cohen asserts that social media has contributed to self-admiration but even more led to the c omplex problem of self-obsession and isolation. Social media has the effect of compiled pressure on the user to revise and rectify self-image to perfection. This robs people the ability to foster real, unrehearsed relationships.Communication through social media involves faceless conversations like pictures, posts and text messages. These medium has made the youth of today diminished in terms of their ability to engage in real time dialogue and ability to understand facial expression, body language and the way of thinking of other people. The inability to champion physical relationship makes the youths even more isolated. Social media has increasingly become a tool that encourages the behavior of isolation with many forms of attention seeking attributes that are temporary in nature, and shallow in content. Technology has therefore perpetuated isolation and obsession to self hence an increase trend towards a cycle of self-perpetuation.The inability by the subjects of communication te chnology to take in other peoples perspective coupled by the limited scope of technology and social media, restrains the communication scope. The problem is wide spread. The anonymity of the youth on social media like twitter and Facebook has promoted impunity and reckless words leaves the social media users unsure of the impact of their words on others. Many, when asked, think that their perversive behavior is funny or just a joke or never gave enough thought to the impact their words may have on the subjects. This form of communication has incredibly affected userà ¢Ã¢â€š ¬s ability to empathize therefore blinding them from realizing that their words have a far reaching effect on other people.The concern scale below examines the respondentsà ¢Ã¢â€š ¬ level of empathy. Empathetic concern studies the level of concern or compassion expressed for the physical person perceived. The test explores the participants ability to identify with specified statements like à ¢Ã¢â€š ¬Ã‹Å"when a good friend is treated badly, I at times donà ¢Ã¢â€š ¬t really pity themà ¢Ã¢â€š ¬ and "when a friend informs me of their successes, I am genuinely impressed." Konrathà ¢Ã¢â€š ¬s study indicates that self-absorption and isolation has indeed taken charge over empathy (Konrathà ¢Ã¢â€š ¬s graph 2 below). Technology has however had its fair share of role in the diminishing of empathic concern (Konrath, Oà ¢Ã¢â€š ¬Brien Hsing 2011)The internet has far reaching effects on the empathic concern. The fact is that the youth of today can broadcast their words to a large audience without considering the facial expression, body language or reaction of the target. This can be likened to the combat pilots who kill hundreds of people. Research indicates that the distance of the pilot from the culprit facilitates diminished empathic concern to a level where they cannot see, understand or even care about the extent of the damage caused by their action. The media has similar effects when viol ence and aggression is celebrated without particular attention to the pain inflicted on others. A good example is the game "Grand Theft Franchise." In the game the players are rewarded for committing violent acts. The impersonation in such games makes humiliation, pain, anguish and murder a source of entertainment and satisfaction.Technology is definitely not the sole perpetrator of empathy but in many ways, it seems to be at the heart of the entire situation decentralizing to narcissism, isolation and the deterioration of empathy. Konrath, in his research, submitted that technology has made Americans experience an overload of information, increased burden for speed and efficiency, and a persistent self-absorption problem driven by social media. The research also found out that among the students involved in the survey they would opt to play games, indulge in social media, and watch television, among other activities as opposed to engaging in compassionate, charitable or selfless in itiatives.Heirman cyberbullying research shows that peopleà ¢Ã¢â€š ¬s ability to communicate without revealing identity, without interpersonal connection, and maintaining distance from victim has condoned destruction of empathy. From Cohenà ¢Ã¢â€š ¬s video, there is a clear illusion in the minds of social media users indicating the presence of many friends, widespread attention, and freedom from a lonely life. The effect created by this illusion robs the youth a chance to seek alternative solutions to problems facing them owing to the obsession they have with technology (Cohan 2013)The social media and the internet has provided an obsession to entertainment, an alternative but falsified replacement for companionship and a twisted feeling of socialization. Is the solution desisting from technology? definitely not. Anonymity on social media has some pertinent advantages. A good example is the ability of a person suffering from anxiety issues to freely make friends on social media, e xpress themselves, and socialize without having to go through rejection or any form of humiliation. Distant from violence and bullying, social media and the internet helps in reaching large audiences, organize and broadcast information. Prohibiting technology would otherwise mean that students are not... Effect of Technology on Empathy Research Paper - 1925 Words Effect of Technology on Empathy (Research Paper Sample) Content: IMPACT OF TECHNOLOGY ON EMPATHYStudentà ¢Ã¢â€š ¬s nameInstitutional affiliationImpact of Technology on EmpathyEmpathy creates an understanding of the people we live with, develop relationships, and demonstrate compassion in times of tragedy and calamity. It is fundamental to the establishment of a society and efforts to collectively foster survival. The information age has greatly led to the weakening of our ability to empathize. Empathy is the human response to the foreseen or perceived feelings and emotions of others. In the present day culture where focus has been so much more on the self over the society, empathy has come out as a weakness. Research has however found that empathy is essential to the maintenance and improvement of the human society. It is important to examine the extent to which communication technology has affected our ability to empathize with others and the possible reasons for this trend.Through empathy, people can develop and sustain helpful relationships. In institutions of learning, empathy allows socialization among students, development of friendships, creates an understanding of the social paradigm, and relate cohesively in peer groups. Through empathy in working environment, it becomes possible to engage in teamwork, negotiations, collaboration and expertise necessary for the job. The advent and growth of communication technology has made it necessary to rethink its effect on empathy for the working environment. The growth of empathy reduces the chances of people degenerating to behavior that is undesirable and hence makes the society safer and makes it possible to demonstrate compassion (Elliott et al 2011)Empathy can be used as the medium through which people express compassion, understand the pain and joy of others or even as a tool to deceive and manipulate others. Empathy comes in different forms, all of which are important human traits. It is however possible to be better in one kind of empathy but lack in o thers. Smith, a theorist placed a distinction between cognitive empathy and emotional empathy in the year 1759. Since then subsequent researches has placed similar distinction examining the two types of empathy as two different functions. The categories differentiated the unplanned, unemotional reactions like the pain of seeing a stranger wound themselves, from the emotional reaction like crying at the loss of a loved one.The research hypothesis by Konrath, Hsingà ¢Ã¢â€š ¬s and Oà ¢Ã¢â€š ¬Brian suggests that increase in self-centeredness has contributed to the diminished willingness and incapacity to empathize. Study indicates that narcissism and empathy are adversaries. Increased personality disorder has led to the decline in the empathetic abilities in both adults and children over the past 30 years. Of the people tested, less than 25% thought of themselves as empathetic today as they were thirty years ago. Over the past decade there has been a steady decline as indicated in Kon rathà ¢Ã¢â€š ¬s graph below. Most of the people born between 1977 and 1994 indicated that they place great importance in service to the community but they would rather play games, watch television or engage in fun activities. Parents have a great role in molding children to be empathetic in their future lives.Konrathà ¢Ã¢â€š ¬s graphKonrath, in his study, also proposes that with more Americans Living a lonely life than the previous decades there has been more focus on self. This has been propagated by the technological shift to social media, self-focus and isolation. This has diminished the current generationsà ¢Ã¢â€š ¬ potential to empathize. The video by Cohen which is based on the book à ¢Ã¢â€š ¬Ã‹Å"Alone Togetherà ¢Ã¢â€š ¬ by Sherry Turkle (Turkle 2012) and the article à ¢Ã¢â€š ¬Ã‹Å"The Invention of Being Lonelyà ¢Ã¢â€š ¬ by Dr. Yair Amichai agrees with the hypothesis of Konrath. Cohen asserts that social media has contributed to self-admiration but even more led to the c omplex problem of self-obsession and isolation. Social media has the effect of compiled pressure on the user to revise and rectify self-image to perfection. This robs people the ability to foster real, unrehearsed relationships.Communication through social media involves faceless conversations like pictures, posts and text messages. These medium has made the youth of today diminished in terms of their ability to engage in real time dialogue and ability to understand facial expression, body language and the way of thinking of other people. The inability to champion physical relationship makes the youths even more isolated. Social media has increasingly become a tool that encourages the behavior of isolation with many forms of attention seeking attributes that are temporary in nature, and shallow in content. Technology has therefore perpetuated isolation and obsession to self hence an increase trend towards a cycle of self-perpetuation.The inability by the subjects of communication te chnology to take in other peoples perspective coupled by the limited scope of technology and social media, restrains the communication scope. The problem is wide spread. The anonymity of the youth on social media like twitter and Facebook has promoted impunity and reckless words leaves the social media users unsure of the impact of their words on others. Many, when asked, think that their perversive behavior is funny or just a joke or never gave enough thought to the impact their words may have on the subjects. This form of communication has incredibly affected userà ¢Ã¢â€š ¬s ability to empathize therefore blinding them from realizing that their words have a far reaching effect on other people.The concern scale below examines the respondentsà ¢Ã¢â€š ¬ level of empathy. Empathetic concern studies the level of concern or compassion expressed for the physical person perceived. The test explores the participants ability to identify with specified statements like à ¢Ã¢â€š ¬Ã‹Å"when a good friend is treated badly, I at times donà ¢Ã¢â€š ¬t really pity themà ¢Ã¢â€š ¬ and "when a friend informs me of their successes, I am genuinely impressed." Konrathà ¢Ã¢â€š ¬s study indicates that self-absorption and isolation has indeed taken charge over empathy (Konrathà ¢Ã¢â€š ¬s graph 2 below). Technology has however had its fair share of role in the diminishing of empathic concern (Konrath, Oà ¢Ã¢â€š ¬Brien Hsing 2011)The internet has far reaching effects on the empathic concern. The fact is that the youth of today can broadcast their words to a large audience without considering the facial expression, body language or reaction of the target. This can be likened to the combat pilots who kill hundreds of people. Research indicates that the distance of the pilot from the culprit facilitates diminished empathic concern to a level where they cannot see, understand or even care about the extent of the damage caused by their action. The media has similar effects when viol ence and aggression is celebrated without particular attention to the pain inflicted on others. A good example is the game "Grand Theft Franchise." In the game the players are rewarded for committing violent acts. The impersonation in such games makes humiliation, pain, anguish and murder a source of entertainment and satisfaction.Technology is definitely not the sole perpetrator of empathy but in many ways, it seems to be at the heart of the entire situation decentralizing to narcissism, isolation and the deterioration of empathy. Konrath, in his research, submitted that technology has made Americans experience an overload of information, increased burden for speed and efficiency, and a persistent self-absorption problem driven by social media. The research also found out that among the students involved in the survey they would opt to play games, indulge in social media, and watch television, among other activities as opposed to engaging in compassionate, charitable or selfless in itiatives.Heirman cyberbullying research shows that peopleà ¢Ã¢â€š ¬s ability to communicate without revealing identity, without interpersonal connection, and maintaining distance from victim has condoned destruction of empathy. From Cohenà ¢Ã¢â€š ¬s video, there is a clear illusion in the minds of social media users indicating the presence of many friends, widespread attention, and freedom from a lonely life. The effect created by this illusion robs the youth a chance to seek alternative solutions to problems facing them owing to the obsession they have with technology (Cohan 2013)The social media and the internet has provided an obsession to entertainment, an alternative but falsified replacement for companionship and a twisted feeling of socialization. Is the solution desisting from technology? definitely not. Anonymity on social media has some pertinent advantages. A good example is the ability of a person suffering from anxiety issues to freely make friends on social media, e xpress themselves, and socialize without having to go through rejection or any form of humiliation. Distant from violence and bullying, social media and the internet helps in reaching large audiences, organize and broadcast information. Prohibiting technology would otherwise mean that students are not...

Monday, June 8, 2020

The Huckleberry Finn Ban in Schools and Libraries - Free Essay Example

Huckleberry Finn was written in a time where slavery has already been abolished. The Adventures of Huckleberry Finn was published in 1885, after the abolition of slavery, but the novel took place in the 30s and 40s. Therefore Mark Twain didnt write how books are written today he wrote the book on how it was in his time era and he had every detail in the book. Librarians and historians havent agreed on what has happened in the book and how certain things played out. The book is a story about a boy named Huckleberry Finn. He lives with The Widow and Miss. Watson and they are trying to civilize him. He has an awful father who wants to make him quit school and kidnaps him and beats him so he decides to run away. When Huck decided to run away, he got in his canoe that he had found, and set off. He eventually came to a place called Jackson Island, where he found Jim. Jim was Miss. Watsons slave who had ran away to be free and to escape his good chances of being sold, but while he was gone his friend a runaway slave named Jim. He has to hide from people looking for him to take him back to Miss Watson so she can sell him. The friendship of Jim and Huck grew tremendously throughout the book. The Adventures of Huckleberry Finn has been banned in schools and libraries because the use of racial slurs, the way Jim was treated, and how the children wil l start acting once they read it. The Adventures of Huckleberry Finn has been banned in schools and libraries. Some people also burned the books and have rioted about the book being in schools. The novel has had so many different thoughts towards it but these schools and libraries had a whole different thought. The book has some racist and violent language that some teachers and parents dont want their children and students reading. Jonathan Arac has also made the comment that if Huck was a different race, then the book would be allowed in more schools. According to Justin Kaplan, he states, to my understanding is that nigger is a taboo word when used by a white person, but it is an OK word used in a black framework If you can claim that this is a black voice speaking, I believe the objection to the word nigger is somewhat diffused. What Kaplan is saying is that if Huck were African American, and using the language that he uses in the book towards Jim, then the word wouldnt have made people mad or upset but the fact that huck is white and is saying it. People and parents thought that it was very racist. Kaplan was talking about the book in the article how Huck was white and the people saying the word were also white. According to Shelley Fishkins she states, If Huck has any African American linguistic authority, his use of the word Nigger is a rallying point for movement to ban The Adventures of Huckleberry Finn from our high schools. She is meaning that if Huck was African American or related to one, the big problem about the book would be resolved and the book would be allowed in schools because the use on the N word wouldnt be hurting anyone in the book. White people have been taking advantage over African Americans cultures for centuries. The United States have had so many equality problems and that is when name calling arises. From a book called Satire and Evasion, they said that most of the people who have had a problem with this book are either African American teachers or parents. These parents and teachers are supported by white teachers and parents. According to James Leonard, parents have trekked in school saying this book is not go for our children. Parents that have read the book in highschool know what the book is about and if the school is having them reading the book, the parents would be mad about what kind of language is in the book. Leonard also mentioned, some black authors have used the word Nigger but not in literature consumed by children The word Nigger being in these books are not good for children to read because then they think that it is okay to say those things in class and the worst part is that they could racist to one another no matter the race. Another problem would be if the teacher was reading the book aloud and the African American children would sit there and be upset even though he/she still has a right to say it, the black student would neglect the teacher because of what they said. According to Jonathan Yardleys research,The black c hild is offended by the use or the word Nigger anywhere no matter what rationale the teacher may use to justify it. This makes communication between the teacher and the student more complicated. The Adventures of Huckleberry Finn book has been banned from schools for the racism in the book and the language that children should not be reading. The Adventures Huckleberry Finn has caused a huge debate of whether or not it should be read or allowed in schools. One of the big problems was he way Jim was treated by everyone in the book. Jim was Miss Watsons slave in the book. She treated him bad and was going to sell him so he ran away and Huck found him and decided to protect him. Jim was also very superstitious in the book. According to Bernard Bell he states, many modern day black readers are less offended by vulgarity and delinquency of Huck, thank by the minstrel image of Miss Watsons runaway slave, Jim, his companion through crime. Why would black readers be offended by what Huck is doing? When really they all care about how Jim was treated. The article states, that the word Nigger was used more than 150 times throughout the whole book. The book has been banned all around the country from San Jose, California to New Haven, Connecticut because of how Jim is portrayed in the book. Wallacestates, The NAACP in New York in 195 7 sought to have to book banned in New York public schools because of the excessive use of the word Nigger. During most of the book Jim was referred to as the nigger while Huck and Jim got closer over the course of the book Huck called him Jim for the rest of the book. Throughout the novel, Jim was treated well by Huck, and their friendship grew as the book progressed. The king and the Duke treated Jim well at the beginning, but as the book went on, Jim was treated more poorly by these two cons. At the end of the book he was betrayed and sold to aunt Sally and taken into custody and was treated badly. They stopped when Tom told his aunt Sally was a free slave because Miss Watson died and in her will she declared him free. There is still a great controversy about what people should know about the book before reading it. People also talk about when Jim yelled at his daughter and hit her, but she was really deaf. He had never forgiven himself for doing that and not understanding or rea lizing that his daughter was deaf and couldnt hear him. There is also a warning that says the kind of language in the book. People dont usually think about that part though. Jim was the nicest person to Huck out of the whole book besides the widow. Jim wasnt treated awful in the book but he was treated badly by everyone except Huck. Therefore the book has been banned in schools in New York because of the racial controversy over the slave, Jim. Even though Jim was the nicest to everyone they were always mean to him. The book has been banned in schools and libraries because of the way Jim was treated throughout the book. Mark Twains book, The Adventures of Huckleberry Finn, has caused problems throughout the United States. The main reason parents and teachers are upset is because of the way it can affect the way their kids act. In the book Satire and Evasion, it talks about the book being in school and the kids reading the racial comments. When they read the comments the they start to treat one another badly. It also talks about having black students in class. The teacher reads the book and says all of the comments in the book and the kids will look at that teacher in a different way then they did before. Saying this, these kids will start disrespecting their teachers a lot more but all the teacher did was just do her job. That is why the NAACP has been working so hard to ban all of the books out of schools and libraries in New York City. According to Satire and Evasion, it states that, The book isnt good for our children.. And racist and unwittingly teachers would call this book a classic Parents are talking about the teachers who think that its okay to read this book to children. Parents have also made the comment that if their children read this book will they think of each other differently and think about being raised wrong because of the heritage in the book. Parents dont want their children coming home to asking them questions about why those people did what they did. James Leonard states, When teachers read this outloud to black students, they feel insulted or embarrassed and have low self esteems. This can also lead to harassment between kids to act like Tom Sawyer did. The Adventure of Huckleberry Finn can lead to tension between students and fights between students. James Leonard also states The last word uttered before every fight is Nigger. That is why this book causes tension between students because one of the reasons is using this word. By reading this book, there could be so much emotion in classrooms. Each African American student wants to talk, read, write, and look like a white person so they dont have to go through all of the trouble to fit in. Teachers must discourage the ridicule of different children states Leonard. According to Russell Baker, some kids are exposed to to these kinds of book too early. Baker also says that, few kids in highschool are ready to read this book. That is why the NAACP is wanting to ban these books becau se highschool students arent even ready to read the book. Schools have different kids with different personalities and reading the book Huckleberry Finn will change how these kids act to their classmates, teachers,and parents. If there are black student in the classroom it does not protect them with the equal and civil rights they are supposed to have. states Dorothy Gillam. Teachers have a big roll in reading this book too. They have to make sure each and every student understands what is going on in this book historically. Schools that dont ban the book, the teachers will have to step up their teaching to these students so they can understand the book and know why things are being said. Gillam said, why some books are in schools still because of the teachers good attitudes when reading the book and explaining to the children. The Adventures of Huckleberry Finn is still known as one of Americas great novels While it is disliked by many, the novel has also been encouraged by others. In the conclusion of all of this, the book has been banned in schools and libraries because the use of racial slurs, the way Jim was treated, and how the children will start acting once they read it. The people who are banning these books are just trying to protect children in the end. The book has been banned for about 100 years in some schools because of the language in the book. The book is too racist and foul for young kids to be reading even high schooler says Concord Public Schools. That is why the NAACP has still been working hard to fight against this case still of banning all of the books in all of the schools in the United States. Jim was also treated in the worst way and the way he was treated students could start treating one another like that, they could even want to start treating their siblings like the people in the book treated Jim. The Adventures of Huckleberry Finn has made a huge impact over the whole nation, schools, and libraries.

Tuesday, May 19, 2020

The Energy Management Problem For A Mg Incorporating A Dr...

5. Conclusion In this paper, the energy management problem for a MG incorporating a DR program was studied. The DR program is a game theory based DR program (GTDR) and the grid-connected operational mode for a MG is studied. The objective is to minimize the fuel cost of conventional generators and the transaction cost for trading transferable power and simultaneously maximize the grid operator DR s profit in a stochastic manner. The optimization model has a daily scheduling interval and concludes optimal power generation schedule for the conventional generators, the optimal customer power curtailed, optimal customer incentive and optimal power to be transferred between the main grid and MG. GAMS is used to solve the developed model, and†¦show more content†¦Appl Energy (2014)130:384–95. [5] Morais H, Kadar P, Faria P, Vale ZA, Khodr H. Optimal scheduling of arenewable micro-grid in an isolated load area using mixed-integer linearprogramming. Renew Energy (2010)35(1):151–6. [6] Marzband M, Sumper A, Ruiz-à lvarez A, Domà ­nguez-Garcà ­a JL, Tomoiaga˘ B. Experimental evaluation of a real time energy management system for standalone microgrids in day-ahead markets. Appl Energy (2013)106:365–76. [7] R. Lasseter, A. Abbas, C. Marnay, J. Stevens, J. Dagle, R. Guttromson, S. Meliopoulos, R. Yinger, and J. Eto, The CERTS Microgrid Concept, CEC Consultant Report P500-03-089F. Sacramento, CA: California Energy Commission, Oct. 2003. [8] Cheng M, Ying Z. The state of the art of wind energy conversion systems and technologies: a review. Energy Convers Manage (2014)88:332–47. [9] Aissou S, Rekioua D, Mezzai N, Rekioua T, Bacha S. Modeling and control of hybrid photovoltaic wind power system with battery storage. Energy Convers Manage (2015)89:615–25. [10] H. Mahmood, D. Michaelson, and J. Jiang, A power management strategy for PV/battery hybrid systems in islanded microgrids, IEEE J. Emerg. Select. Topics Power Electron, vol. 2, no. 4, pp. 870–882, Dec. 2014 [11] C. Marnay, H. Asano, S. Papathanassiou, and G. Strbac, Policymaking for microgrids, IEEE Power Energy Mag., vol. 6, no. 3, pp. 66–77, (2008). [12] Brenna, M., Foiadelli, F.,Show MoreRelatedMgs Case Study748 Words   |  3 Pagesso-called MGs, which integrate distributed generation (DG) for local demand – has been proposed to increase manageability and reduce transportation losses [1]. MG can be either connected to other MGs or the main grid for energy exchange or run in island mode as circumstances or economics dictate [2, 3]. The generating units in MGs can either be conventional generators or renewable energy sources (RESs) such as wind turbine (WT) [4] and photovoltaic (PV) systems [5]. 1.1. Literature review The MGs are capableRead More Personal Diet and Weight Loss Management Analysis Essay2642 Words   |  11 PagesPersonal Diet and Weight Loss Management Analysis   Ã‚  Ã‚  Ã‚  Ã‚  Each morning I get on the scales and hope that I can celebrate losing a pound or two. The numbers I see on the scale represent a gauge that keeps me moving forward in a weight loss program. When I look at the numbers on the scale I realize I am making progress in losing weight, however, am I putting my body at more risk just by limiting certain foods? Comparing and contrasting my typical diet to the amounts of daily nutrients recommended inRead MoreHigh Fidelity Patient Simulation For Nursing Education6315 Words   |  26 PagesLab for Nursing Education Dr. Sue Ann Mandville-Anstey MHST/NURS 607 Antonia Cole Athabasca University July 28, 2015 High Fidelity Patient Simulation for Nursing Education Submitted July 22, 2015 To: Ontario Ministry of Health and Long-Term Care Dr. XXXXXX Provincial Chief Nursing Officer For the Amount of: $171,895.21 For the Purpose of: Creating and implementing a high fidelity patient simulation lab for about 4,000 nurses working at XXXXXX. This program will provide nurses workingRead MoreA Comparison Between Current And Newly Emerging Essay4236 Words   |  17 Pages..3 Introduction.3 Literature Review.4 CURRENT TECHNIQUES FOR STORMWATER MANAGEMENT5 Dry Ponds..5 Wet Ponds.5 Infiltration Basin6 Read MoreAgricultural Science and Resource Management in the Tropics and Subtropics17383 Words   |  70 PagesTropical Crops Agricultural Science and Resource Management in the Tropics and Subtropics ARTS FIELD AND VEGETABLE CROPS PTS 130 Participants Prof. Dr Marc Janssens Prof. Dr. Jà ¼rgen Pohlan Abrefa Danquah Jones Alfonso Cabrera Keshav Prasad Dahal Dilys Sekafor Kpongor Alex Pacheco Bastas Eduardo Molina Gayosso Alexander R. Mendonza Marina Piatto Said Wali Dadshani Nazli Burcu Ãâ€"kten Wintersemester 2002/03 Bonn . Germany 2 Summary Author/Subject Page Table Read MoreGround Water Depletion6229 Words   |  25 PagesFEW METHODS FOR GROUND WATER MANAGEMENT --------------------------12 6.1 RECHARGE WITH IMPORTED SURFACE WATER--------------------------12 6.2 RECHARGE WITH RAINWATER-------------------------------------------------12 6.3 ARTIFICIAL RECHARGE MOVEMENT IN INDIA----------------------------13 6.4. DOMESTIC RAIN WATER HARVESTING--------------------------------------13 6.5 VEGETATIVE TREATMENT OF THE CATCHMENT-----------------------14 6.6 SOME WORLDWIDE GROUND WATER MANAGEMENT TECHNIQUES USING ECONOMIC THEORIES----------------------------14Read MoreGround Water Depletion6229 Words   |  25 PagesFEW METHODS FOR GROUND WATER MANAGEMENT --------------------------12 6.1 RECHARGE WITH IMPORTED SURFACE WATER--------------------------12 6.2 RECHARGE WITH RAINWATER-------------------------------------------------12 6.3 ARTIFICIAL RECHARGE MOVEMENT IN INDIA----------------------------13 6.4. DOMESTIC RAIN WATER HARVESTING---------------- ----------------------13 6.5 VEGETATIVE TREATMENT OF THE CATCHMENT-----------------------14 6.6 SOME WORLDWIDE GROUND WATER MANAGEMENT TECHNIQUES USING ECONOMIC THEORIES----------------------------14Read MoreHemp Cultivation in China42289 Words   |  170 Pagesfor the VIR project has been made, but we are still interested to hear of any other such funding sources. Several of our members have made substantial donations, including: Don Wirtschafter of Ohio Hempery (US$ 500), John Roulac of Hemptech (US$ 250), Dr. J. P. Mathieu of FNPC (US$ 100) and Matthijs T. Huijgen (US$ 100). Generosity such as this, keeps the VIR project alive. Help us by renewing your membership for 1996 now and encourage your colleagues and libraries to join. We are planning to have ourRead MoreHistory of Indian Pharma Industry11902 Words   |  48 PagesThe  government  started to encourage the growth of drug manufacturing by Indian companies in the early 1960s, and with the Patents Act in 1970. However , economic liberalization in 90s by the former Prime Minister  P.V. Narasimha Rao  and the then  Finance  Minister,  Dr. Man Mohan Singh  enabled the industry to become what it is today. This patent act removed composition  patents  from food and drugs, and though it kept process patents, these were shortened to a period of five to seven years. The lack of patent protectionRead MoreFruit Tree Diversity And Fruit Consumption9387 Words   |  38 Pagesproducts are scarce and households are susceptible to food shortages (Cruz Garcia, 2012; Paumgarten and Shackleton, 2011). Promoting the consumption of fruits in poor communities and amongst vulnerable groups could potentially help in addressing problems of nutrient deficiency and malnutrition (Paumgarten and Shackleton, 2011). Fruit trees are particularly advantageous because they are perennial and contribute to fruit supply at the local level over several decades. At the same time, they can contribute

Wednesday, May 6, 2020

The Electoral College Of The United States - 1681 Words

The Electoral College The Electoral College in the United States is not a place but a process. It was a process our founding fathers established in the Constitution. It is a complicated voting system that most citizens today do not understand. The Electoral College has been in place for well over two hundred years and is unfortunately showing its age. Most people believe that when they vote in a general election for the President, they truly believe they are voting for the president. This has shown to be the case many times in the past elections, but it has happened that the candidate who won the popular vote was not elected President by the Electoral College. The Process spelled out in the Constitution as written by our founding fathers known as the Electoral College needs to be replaced with a better method that truly represents the will and vote of the American people. The Constitutional Convention of 1787 considered several methods of electing the President, Including allowing the members of co ngress, state Governors, state legislatures, and by direct election by the people (Staff, 2010). Because there was so many plans and thoughts on the process, a committee was formed which devised the Electoral College system. This plan received widespread approval by the delegates and was put in the final document. Article II, section 1, Clause 2 of the United States Constitution spells out the process of selecting electors for the selection of President and ViceShow MoreRelatedThe United States Electoral College715 Words   |  3 Pages The electoral College was developed at the first constitutional convention in 1787 by James Wilson. The idea of the electoral college was influenced by how Rome would elect the Pope around the same time. During the Constitutional Convention they bounced around several ideas on which way would be most effective to elect a president. The number of electors was dependent upon the number of people in that states senate, (will always be 2) and the number of the people that state had in the House, (whichRead MoreThe Electoral College Of The United States1621 Words   |  7 PagesThe Electoral College in the United States is not a place but a process. It was a process our founding fathers established in the Constitution. It is a complicated voting system that most citizens today do not understand. The Electoral College has been in place for well over two hundred years and is unfortunately showing its age. Most people believe that when they vote in a general election for the President, they truly believe they are voting for the president. This has shown to be the caseRead MoreUnited States Electoral College2080 Words   |  9 Pages Marlon Straker Professor Trokkos PLS 201 04 December 2016 Electoral College With every Presidential election, the United States’ electoral college takes place. The electoral college has been around for about 200 years and it is still going strong with its intended purpose. According to Merriam-Webster Dictionary, Democracy is defined as a government in which the supreme power is vested in the people and exercised by them directly or indirectly through a system of representationRead MoreThe United States Electoral College1757 Words   |  8 Pages The United States Electoral College is ultimately the way the President is elected. The electors are first picked from their state party, and then on election day they are voted on, based on their party. Then those electors take the popular vote from their state to either pursued their vote, or not. The electors are under no obligation to vote in the way that their state did. This is one reason why sometime the popular vote and the electoral votes don’t agree. Each state has a different amountRead MoreThe United States Electoral College1869 Words   |  8 PagesThe Electoral College was established with the best of intentions of representing the American people; however, over time, this antiquated system has failed the American people. The people of the United States deserve better as the Electoral College is no longer a representation of the nation’s voices and concerns. Instead, the political machine has corrupted this deep-rooted system with each modification. The way the people of the United States elect the President and Vice President, requires anRead MoreThe Electoral College in The United States1669 Words   |  7 Pagesaspect of American democracy at the forefront of the world stage. The election to the office of the leader of the free world, the Presidency of the United States of America was in question. How could a candidate receive more votes and still lose in the richest most powerful democracy in the world? I need n ot to go into a debate about the Electoral College as my stance will be clarified rather clearly. The night of the election it seemed as if the Vice President and candidate for the Democratic PartyRead MoreThe United States Electoral College1009 Words   |  5 Pages TravelChinaGuide.com (n.d.) states that Chinese years are represented by twelve zodiacal animal signs. The demographic religious breakdown is as follows: Folk religion, 21.9%, Buddhist, 18.2%, Christian, 5.1%, Muslim, 1.8%, Jewish and Hindu are both less than 0.1% (CIA World Factbook, 2015). Demographically, there are more males than females. Recently, the Chinese government lifted their ban of one child maximum per family (Burkitt, 2015). China’s government In 2013, XI Jinping was elected as PresidentRead MoreThe Electoral College And The United States Of America1065 Words   |  5 PagesThe 45th President if the United States of America will be sworn in on January 2017. So let’s examine the election process leading up to this momentous occasion. The president and vice president are not chosen by a nationwide popular vote of the American people. Rather, they are chosen by the slate of 538 Electors who have pledged their support for that candidate. The Electoral College is a process, not a place. This process is spelled out in the United States Constitution. Why Did the FoundingRead MoreThe Electoral College System Of The United States Essay1670 Words   |  7 PagesAfter a year of voting and much debate the final decision of electing the 45th president of the United States was once again down to the Electoral College. (history) The Electoral College system was established by the founding fathers around 130 years ago and basically a process used to select the President and vice President of the United States of America (Procon). So when you went to the polls on November 8th and casted your vote for the next president, something else happened behind the scenesRead MoreAbolish The Electoral College For The United States Essay2111 Words   |  9 Pagesback the Electoral College to the 18th century when the United States was first founded by our Founding Fathers, when after our independence, we created a democracy that will give equal opportunities for the people and not give too much power to one person; therefore the Electoral College ho lds a great importance in our country’s political history. Located in Article II, Section 1, Clause 3 of the U.S. Constitution, this document states, â€Å"The Electors shall meet in their respective States, and vote

Political Corruption Essay - 1203 Words

Political Corruption - Political corruption is one of the biggest problems in the United States government, but not just here in America, in other parts of the world as well. This global issue is making big headlines and it is all over the internet, yet people still don’t fully believe that U.S. politicians are corrupt. The people that are making all of the â€Å"under the table† deals have got the American people blinded with false promises. The national debt is growing and we, the people, are blaming the President, illegal immigration, and big companies importing goods but the people that are to blame are representing us right now. Corruption is defined as moral perversion or the perversion of integrity. (Dictionary.com) This†¦show more content†¦It turns out the man had serious medical conditions and no health insurance. He robbed a bank to get free health care in prison. (â€Å"Corruption In America†) Lies are becoming an everyday part of the busine ss world. JP Morgan marketed a CDO as a good investment when they knew it was total garbage. The SEC announced that JP Morgan has agreed to pay out 153 million dollars in settle charges related to the sale of a controversial collateralized debt obligation back in 2007. The people that helped pick out the underlying assets for the CDO also bet heavily that it would fail. (†Corruption In America†) A poll in Time magazine stated that 29% of people do not believe in the American Dream anymore. Maybe that is because we no longer have faith in the govt. This could be a cause of the lies they feed to us. $38.5 billion in budget cuts are largely illusory. The Washington Post reported, â€Å"The Congressional Budget Office is saying that about $800 million in cuts are being made to domestic programs and foreign aid.† (â€Å"Corrupted!†) The U.S. government is spending over $2 million a minute. With the National Debt rising, the unemployment line growing, and cuts to things like health care and public housing, where is all this money going? Law enforcement agencies are considered key agents in peace-building and post-conflict reconstruction efforts. For that reason, massive resources from the international community haveShow MoreRelatedThe Lack Of The Political Corruption1807 Words   |  8 Pagesone of the largest negative consequences of the political corruption was t he laziness that was displayed officials. To the understanding of the officials, once they were in power, there was no real need to do anything or make any changes. This could potentially stem from the idea that they did not really have any true ideas on how to fix any of the problems that the local populations were concerned about. Many of these men seemed to lack real political experience but decided to run for office becauseRead MoreEssay on Political Corruption2339 Words   |  10 PagesPolitical corruption is a serious problem limiting development in emerging economies. Many scholars have identified corruption as the new enemy of democratization, blaming it for limiting political and socio-economic development of most developing nations (Bardhan P.,1997; Seligson M., 2002, Canache D. and Allison M., 2005). Although no one can really measure â€Å"corruption† due to its discrete nature and the different discourses defining it, citizen’s perception of corruption can give us an idea ofRead MoreThe Issue Of Political Corruption1791 Words   |  8 PagesThe issue of political corruption is as persistent as it is prevalent; that is to say, it exists ambiguously, politically, and in undefined terms. Generally, political corruption is understood to mean a breach of the public trust in the course of a politician’s duties (Huigens 2010). In any democracy that is truly ‘for the people by the people,’ it should be easy to weed out the corrupt politicians. That said, the corruption of any one politician does not always translate to a different electionRead MorePolitical Corruption and Empowerment1889 Words   |  8 Pageslives but should be given the opportunity where possible. Empowerment Empowerment is an initiated process that enables the masses to gain power and extend it in such a way that they can use this power to share in changing social, economic and political structures. Empowerment is successful if the participants regard the result of their action as beneficial. Therefore participation is a cornerstone of empowerment. It is a prerequisite for achieving empowerment. Empowerment is one of the consequencesRead MorePolitical Corruption And Its Effect On Society Essay1667 Words   |  7 Pages Corruption is one disease that seems to be everywhere. Different nations of the world experience corruption in different ways, areas and levels. Although there are different ways corruption affect nations, one fact that most people can agree on is that most often corruption tends to destroy a country rather than build it. I stand corrected but every country is corrupted in one way or the other because there’s no one clear way of defining corruption. Using the Merriam Webster definitionRead MoreCorporate Influence And Political Corruption1383 Words   |  6 PagesIn today’s society many Americans believe that there is corruption within politics. According to Jeffrey Milyo author of Corporate Influence and Political Corrupti on, a nationally representative opinion survey done in 2008 states that, â€Å"a little more than 50 percent of respondents agreed that corruption in the federal government is widespread and an extremely serious concern, while fewer than five percent considered corruption in the federal government to be rare or not a concern† (Konisky, MilyoRead More Political Corruption in Bangladesh Essay3158 Words   |  13 PagesPolitical Corruption in Bangladesh In this paper I will explain how corruption in Bangladesh works, shedding light on a practice that has long kept most people wondering about who is on whose payroll and who owes whom for what. In order to do this without confusing anyone first I will explain a little about the country of Bangladesh. Next I will define corruption and explain the forms it takes, as well as why certain individuals choose to practice corruption. Finally the paper will obviously talkRead MorePolitical Corruption1391 Words   |  6 Pagescollectively decided to crack down on corruption? Is this crack-down a permanent change or just a temporary phase? a. Over a decade, Corruption has become a serious threat for every nation as it directly impacts the country’s economy thereby its overall growth at all levels. b. Corruption is considered to be a global disease which has already spread across the universe in a drastic manner and no country can be proud to say that they are corruption free. But in the recent era, many countriesRead MoreThe Ultimate Political Corruption Of William Tweed1166 Words   |  5 PagesThe Ultimate Political Corruption of William Tweed In the history of the United States there were a vast amount of political leaders and big businesses that contributed to the success of cities in our country.Greed and the need for power can consume someone and make them feel like they are unstoppable,but little do people know the judgement day is right around the corner.William Boss Tweed is a prime example of what the need for power and greed will do to a person.William Tweed played a huge roleRead MoreEssay Political Corruption in the United States2518 Words   |  11 Pagesâ€Å"Corruption, improper and usually unlawful conduct intended to secure a benefit for oneself or another its forms include bribery, extortion, and the misuse of inside information. It exists where there is community indifference or a lack of enforcement policies.†(Encyclopedia Britannica). Today political Corruption in all forms exists in every country in the world. In some countries it is more prominent then in others, but no matter where you go it still occurs. Recently in mid 2013 some political

Project Report Is On Challenges in Cyber Security for Business

Question: Discuss about the Challenges in Cyber Security for Business. Answer: Introduction The project report is on the topic Challenges in Cyber Security for Business. Cyber security is the common problem worldwide with the growing use of technology. The problem is not just limited to an organisation but it is the global issue. There are many challenges which are to be faced by the organisations in coping up with the problems of Cyber security. Privacy and data protection are severe concerns for the organisations because the leakage of data and misuse can lead to severe consequences for the business. That is why, organisations nowadays are spending heavy amount on the security of their data and operations from the intruders. Nowadays most of the organisations operate online and maintain their data on online platforms. They need to take steps so that they can save their own data and information and of the customers. There are many examples in which the innocent customers became the part of the fraudulent charges without having any knowledge about it (Chertoff, 2008). The research focuses on such incidents and challenges which the companies and customers have to face for maintaining cyber security in business. The research follows a procedure and the report prepared will clear that what all techniques will be used to conduct the research. Project Objective The key objective of the research is to identify the cyber security challenges for business and how to address them. These challenges are faced by the organisations at a global level. The project is not limited to the discussion of challenges of cyber security but it will also discuss that what all alternatives are available to meet these challenges. The project aims at finding out the solutions to the problems which the organisations are facing in the present business environment. Project Scope The scope of the project is wide. It is because to address the cyber securities for business, it will be required to focus on the organisational level and on the industry level, globally. Also, the concepts will be discussed which will be used to address these challenges. The project has wider scope as it widens the horizon of knowledge as to how the businesses can be made safer and more secure. Technology is nowadays an integral part of the operations of the business which can also pose threats for the business information and operations. The companies have to tackle such threats in order to compete in the business environment. Literature Review This section of the research will provide the data information on the topic Challenges in Cyber Security for Business. Cyber security is one of the key challenges of the business organisations in the current competitive business environment. This is because, today, technology is rapidly developing and is used by almost every organisation for managing their operations and functions well. The increase in the use of technological devices like internet, mobiles, computers, laptops and others has led to more attacks and challenges to the business. Various cyber-attacks have been experienced in past few years which are been cured by using a security mechanism by the organisations (Donaldson, et al., 2015). Cyber security is when the digital information and property of the companies are protected against the misuse and theft by the intruders. This can be done by following the protection and information systems. This has become a serious management issue nowadays. Cyber security is facing certain challenges in the industry which is the increased growth in data from the business systems (Gharibi Shaabi, 2012). In accordance with Kaplan, Sharma Weinberg (2011), technology has now become an essence of the business. It brings growth and development to the business but like everything has two aspects, technology also has some side effects. It affects the security of the business data. Cybercrime has grown to a great extent and it is affecting the privacy and security of data. To face cybercrime, cyber security is important but has to face certain challenges like lack of funding from the government, shortage of personnel, less access to knowledge about the same and the ignorance by the business about cybercrime (Lord, 2017). One has to be updated about the cybercrime as it can damage the whole data of the business. The employees need to be trained so that they can manage the cyber security issues in the organisation well. Some ethical issues arise with the employees. Once the employees resign from the organisation, they are bound to follow the code of conduct of the organisation. In that case, the employees are not bound to follow any code of conduct and requirements of the organisation because of which they might cheat on the organisation and may hack data. The employees who used to be ethical hackers become unethical hackers after they leave the organisation which pose threat to the organisations (Hall, 2016). 21st century needs cyber security in every sphere as the technology is developing at a rapid pace. There are too many challenges to cyber security because of which the productivity of the businesses are degrading. The huge amount of money has to be invested in maintaining the security of the business data and information which could have been used for developing products and services and for any other purpose. There are some factors which led to the increasing threats and challenges to cyber security. These factors include the lack of leadership and collaboration, lack of information and knowledge about cybercrime, lack of regulations and laws against cybercrime, increased use of technology and internet, lack of funding and support from the government and many more. These factors need to be focussed in order to set up effective control on the cyber security challenges in business (Wright, Dawson and Omar, 2012). As per Smith Cockburn (2014), the compliance can be used to sort out the challenges of cyber security. The organisations create code of conduct in form of compliance programs to set up and understanding of dos and donts. The compliance programs are designed differently for different programs (Minick, 2016). The management of organisation design the compliance programs in order to face the challenges of cyber security. The compliance procedures are designed as per the roles and responsibilities of the organisation. The compliance procedures should be made with an aim to provide success to the organisation. These are the values which should be transferred to the employees. These define the success of the organisation (Subramanian, 2008). As per ICGS3, et al. (2015), there is some compliances use in the cases of cyber security. These include IT Audit and compliance, Policies of IT, assessment and management of Information Technology. There are some companies which are working to protect global systems from cybercrime. The companies like Cisco have adopted a holistic approach to secure the organisational data. The organisations and employees are made aware about the policies and procedures so that they can follow them to get the benefit of the same. The organisations are also advised to use secured infrastructure so that they can perform their functions better. Compliances are significant in meeting the challenges of cyber security (Nojeim, 2010) Privacy and data protection are of utmost importance for any organisation. For any organisation, data is an asset which is to be kept confidential so that no competitor can misuse it against the organisation. Data is important because it is used by the companies to take further business decisions. The companies need to protect data and maintain privacy so that no one can plot against the company by using the data of the organisation. According to Cyberics (2015), theft of data of the company may prove disastrous for the company because the data can be used to defame the image of the company. The organisations can limit the challenges and issues of cyber security by providing the access of data to limited number of people. Strong passwords and authentication measures can be used for limiting the unauthorised access. The employees who are employed for maintain the cyber security in the organisations should be skilled and competent enough in comparison with the hackers. It is also important to maintain third party data in an organisation. The market today is very competent in terms of technology. The companies are opting for third party services like cloud competing so that the expertise can be gained in the services and the data cost can be reduced. Outsourcing the services to the third party can lead to serious harms and impacts on the security of data. In this case, security teams should be employed which may take security measures and checks from time to time so that it can meet the vision and mission of the organisation (Khajuria, 2017). There is a lack of operational processes and procedures in the organisations because of which the cyber-attacks are affecting the organisations frequently. The organisations lack in setting up right rules in governing the cyber-attacks (Mehan, 2014). The IT professionals in the company have to come up with the procedures which save the organisation from getting attacked by the cyber criminals. The companies and the country as a whole should focus on designing the security systems and more IT professionals who can limit the challenges and threats posed to the cyber security of business (Tiwari, Bhalla Rawat, 2016). It can be concluded that it is the global technological war which harms business and industry as a whole. The companies should come up with the compliance programs and should adopt all the technical measures which allow business to meet the challenges of cyber security. The privacy of data should be maintained in order to be safe and secure for business future and for customers as well (Fischer, 2016). The work done by the third party should also be safeguarded through code of conduct and regular checks. The employees should be hired and trained for meeting the challenges of cyber security. There should be strong compliances for ethical and non-ethical hacking so that the wrong activities and intentions of the workers can be stopped before it disturbs the whole image of the company (Deore Waghmare, 2016). Countries like Australia, USA, UK, China, and many other big countries need to collaborate and fight against cybercrime as it is affecting the business at a global level as a whole. The government needs to set up good policies and compliances which limits the activities of cybercrime. Research Questions The following questions are required to be answered with the completion of this research: Primary Question What are the major cyber security challenges in business? Secondary Questions How the cyber security challenges can be mitigated? Research Design and Methodology The section of research methodology contains the details about the methods and approaches adopted to complete the research on the given topic. Research methods Research methods which is used for this research is mixed method in which both the quantitative and qualitative data is collected and used. This data is further analysed and is used to answer the questions of the research (Greener, 2008). Approach for research For this research the data collected is in qualitative and in quantitative form which helps in deriving the better results for the research project. Qualitative data is collected in form of opinion of people and details from the secondary sources while the quantitative data is used collected in form of numbers. This helps the researcher in gaining proper understanding about the topic and hence, the research fulfils its objectives. Data gathering The data for the research is gathered from various sources. These sources include Primary sources and secondary sources. Primary data is the one which is fresh and unused information while secondary data is the one which is used previously by others and is used as a reference to the topic and to support the primary data collected by the researcher. The primary data is collected through survey questionnaire where randomly 10 people are selected as a sample who works in an IT organisation and they asked about the cybersecurity and how safe it is for their organisations. The survey data is analysed to get the final results. Secondary data is collected from the published journals, articles, web sources and books. This data will finally represent that what are the challenges in cyber secutity of business and how it can be mitigated (Collis and Hussey, 2013). Sampling Sampling is when a subset of individuals is selected from the whole population to represent the whole population. Simple random sampling technique is adopted for selecting the sample respondents for the survey and the sample size is 10. Validity and reliability of research The research is valid as the responses are collected after taking proper approvals from the respondents. The data collected is saved from strong passwords so that no one can modify the data collected and misuse it. The identity of the respondents is also kept confidential. The data used is referenced clearly so that it can be shown that the data is genuine (Cavana, Delahaye and Sekaran, 2001). Research Limitations The research limitations are those weak points which affected the research results and its process as a whole. The limitations of this research include the shortage of time because of which the sample respondents were selected in a small number i.e. 10. It might affect the actual results of the results with such a small sample. The time was limited because of which limited data was collected and analysed. The respondents might not provide the actual results and the results provided by them can be biased which affect the overall results of the research. Time Schedule Time schedule is made for the research to complete it within the time. This is also called action plan. S. No. Actions undertaken Beginning date End date Duration in weeks Details about the actions A Blueprint of research (Planning) 11 September 2017 17 September 2017 1 This is the first step of the research where the plan is made to start the research and how to continue it step by step to finish it off well. B Implementation of plans 18 September 2017 24 September 2017 1 The plans are made in the initial step. After that, these plans are implemented in order to carry on the tasks in actual and to complete the research successfully within time. C Data gathering 18 September 2017 08 October 2017 3 Data collection is an important part of the research. It is because data is needed to complete the requirements of the research and to fulfil the objectives of the research. Data for this research is collected in qualitative and quantitative form from primary and secondary sources of data. D Analysis of data collected 9 October 2017 29 October 2017 2 Once the data is collected, it is now analysed to form the final conclusions of the research. E Findings and discussion 23 October 2017 5 November 2017 2 Discussion is done on the findings of the research so that the research objectives can be met. F Conclusion 6 November 2017 12 November 2017 1 Conclusion is made after the analysis of data and by going through the discussion of findings. It is now proved that the research objectives are met and the questions are answered. Gantt chart It is the graphical representation of the research action plan which is used to complete the research on time. Conclusion It can be concluded that cyber security is essential for the business of today to maintain the privacy and secrecy of data. It is also important to maintain competitiveness in the industry. The organisations and the government together should take certain steps which set up the codes of conduct and compliances which safeguard the businesses from cyber security challenges. These challenges can be mitigated by training more employees and for using them to protect the systems and data of the business. The operations which are outsourced from the third party should be kept on check in order to keep it safe from cybercrime. Young talent should be encouraged to get trained and contribute in the nations fight against cybercrime. There are different types of cyber security challenges which need to be addressed so that the companys revenue does not get hit and the systems can be used without any risk of getting hacked and theft of data. It is the technological war which needs to be fought and certain standards need to be established at a local and national level so that the cybercrime can be dealt. The companies should focus on integrating the data and to adopt certain measures to address cyber security challenges sop that the countrys future can be saved. References Cavana, R.Y., Delahaye, B.L. and Sekaran, U., 2001.Applied business research: Qualitative and quantitative methods. John Wiley Sons Australia. Chertoff, M. 2008, "The cybersecurity challenge",Regulation Governance,vol. 2, no. 4, pp. 480-484. Collis, J. and Hussey, R., 2013.Business research: A practical guide for undergraduate and postgraduate students. Palgrave macmillan. Cyberics (Workshop), Be?cue, A., Cuppens-Boulahia, N., Cuppens, F., Katsikas, S. K., Lambrinoudakis, C. (2016). Security of industrial control systems and cyber physical systems: first Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna. Deore, U D Waghmare, V 2016, A Literature Review on Cyber Security Automation for Controlling Distributed Data, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 2. Donaldson, S.E., Siegel, S.G., Williams, C.K., Aslam, A., SpringerLink (Online service) Books24x7, I. 2015,Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats,1st edn, Apress, Berkeley, CA. Fischer, E A 2016, Cybersecurity Issues and Challenges: In Brief, Congressional Research Service. Gharibi, W Shaabi, M 2012, Cyber Threats In Social Networking Websites, International Journal of Distributed and Parallel Systems (IJDPS), Vol.3, No.1. Greener, S., 2008.Business research methods. BookBoon. Hall, P. 2016, "Smaller banks face cybersecurity challenges",Westchester County Business Journal,vol. 52, no. 46, pp. 15. ICGS3 (Conference), Jahankhani, H., Carlile of Berriew, Akhgar, B., Taal, A., Hessami, A. G., Hosseinian-Far, A. (2015) Global security, safety and sustainability: tomorrow's challenges of cyber security: 10th International Conference, ICGS3 2015, London, UK. Kaplan, J, Sharma, S Weinberg, A 2011, Meeting the cybersecurity challenge, McKinsey Company. Khajuria, S. (2017) Cybersecurity and privacy - bridging the gap. River Publishers. Lord, N 2017, What is Cyber Security?, Digital Guardian. Minick, B. (2016) Facing cyber threats head on: protecting yourself and your business. Nojeim, G T 2010, Cybersecurity and Freedom on the Internet,J. Nat'l Sec. L. Pol'y,4, p.119. Smith, P. A. C., Cockburn, T. (2014) Impact of emerging digital technologies on leadership in global business. Subramanian, R. (2008) Computer security, privacy, and politics: current issues, challenges, and solutions. Hershey, IRM Press. Tiwari, S, Bhalla, A Rawat, R 2016, Cyber Crime and Security, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 4. Wright, J, Dawson, M E and Omar, M 2012, Cyber security and mobile threats: The need for antivirus applications for smart phones,Journal of Information Systems Technology and Planning,5(14), pp.40-60.