Monday, May 25, 2020
Term Paper on What is Postmodernism
Abstract Postmodernism is not really easy to define, taking into account this fact that such would violate the postmodernists argument that no distinct, boundaries, terms or absolute truths exist. In this case, the term ââ¬Å"postmodernismâ⬠remains totally vague, given that those claiming to be postmodernists have unreliable opinions and beliefs on various issuesà (Johannes). Several issues are critical to this, for example are politics, religion, nationalism, and war the outcome of a primordial human mentality? Does truth exist or itââ¬â¢s an illusion? Can Christianity allege primacy or dictate human morals? This list is endless particularly for those affected by a postmodern lifestyle and philosophyà (Christopher). This write up focuses on Postmodernism school of thought. Introduction Postmodern philosophy unilaterally is a philosophical path critical of the foundational structures and assumptions of philosophy. Commencing as a mere critique of the Continental philosophy, it was to a larger extent heavily influenced by existentialism, structuralism and phenomenology. Postmodern philosophy is cynical or merely nihilistic towards most of the assumptions and values of philosophy that originate from modernity, like humanity having some essence that differentiates humans from other animals, or just the postulation that a form of government is perceptibly better than another. Some of the proponents of this school of thought include Rousseau, Kant, Hume, Wittgenstein Hegel, Kierkegaard, Marx, Nietzsche Schopenhauer, Dewey, Freud, Fichte, Quine among othersà (Vincent) Main Text Post modernism In the recent years, many philosophers of education have paid a lot of attention to trends in philosophy. This may loosely be defined as ââ¬Å"postmodernist.â⬠The fact that post modernism is not definable is a truismà (Christopher). However, Postmodernism isà a set of strategic, critical and rhetorical practices which employs concepts like the difference, the trace, repetitionà and the simulacrum so as to destabilize other concepts like presence, historical progress,à identity and epistemicà certainty. It is also defined as a practice in the contemporary culture that is characterized by the rejection of the world cultural narrative and the objective truth. It lays much of its emphasis on power relations, the role of language, and even motivations: particularly it criticizes the use of the sharp classifications like the male and the female, the white and the black among others. The postmodernism is an intentional departure from the modernism approaches to the phil osophy that was in use before. In this paper, I will examine some of the trends within the modern philosophy and see the implications that it may have on both the pedagogy in the schools and for research and teaching in the philosophy of educationà (Mary). Despite a lot of critiques from philosophers, the postmodernism is still used in the world today. It has enabled us to see the reality in a more complex way than we did before. Reality doesnââ¬â¢t exist objectively rather its part of our creation the postmodernists claim.à The postmodernist movement has led to a salutary revival of the metaphysics. The post modernism has also rightly questioned the idea of unchanging, universal, and the unified self which has total knowledge and control of what it says thinks and does. For this reason, the postmodernism is still studied. The post modernists requires main shift in our conception of inquiry. Thus, we should perceive ourselves as seeking to reveal the pre-existing reality rather than involving ourselves in the knowledge creationà (Christopher). Implications for pedagogy The foregoing has many implications on educational practice; however, due to space I will outline a few main ones. Firstly, the students in schools need to be helped to perceive hoe ideas and even institutions are tailored to fit peopleââ¬â¢s interests and values: for instance how a novel or a book expresses the distinctive needs and the background of the author. This will call for the need to involve the use of the technical language. Rorty, maintains that primary and secondary education is ââ¬Å"a matter of socialization of trying to inculcate the sense of citizenship.â⬠Whether this true or false, itââ¬â¢s none of the educators business in his professional capacity. But this is not only an inexplicable but also an extraordinary betrayal of post modernism. So the postmodernism emphasizes that schools should incorporate in their teaching social conventions and institutions than they do currentlyà (Fredric). We should help students to find the foundations of their lives. The contemporary culture is characterized by the lack of the sense of direction and stability. This is also a factor in trends in politics and religion. Students need to find the enduring values and ideals which contradicts not their experience of reality but provide a basis of each day living. This point can be put by encouraging students to engage in the general theorizing on reality and even life. The postmodernist emphasis on the concrete, local concerns is vital and hence should be applied in education: the studies in schools are too abstract and of little relevance. However, learning should be a combination of both the concrete and generalà (Mary). Postmodernism emphasizes on democracy and dialogue. It also questions the motives of authorities and downplaying the role of the experts. Thus, we must think in terms of teachers and the students learning together. This is necessary so that the values and even the interests of students are taken into account. This will also change the role of the professionalsà (Christopher). The extent to which the teacher is regarded as an expert differs from subject to subject. In subjects such as mathematics, the teacher may know more than the students unlike in values and family life. Lyotard points out the extent to which student in the colleges cal learns from the computerized data banks. Beside, teachers should help students learn how to learn to use those technologies. The great merit of the self directed inquiry is that, students are involved in determining what to learn and why, hence they will be in apposition to express their needs and valuesà (Johannes). Conclusion Are postmodernists Right and Wrong? Postmodernists do not endeavor to filter their judgment about what is true or false, good or evil, right or wrong. According to them such a thing as absolute truth doesnââ¬â¢t exist. Therefore, nobody has the right to classify truth or force upon others his proposal of moral right and wrong. à In politics they protest the suppression of equal rights by Western societies. The Postmodernists believe that the capitalistic economic system lack equal distribution of salary and goods. The few rich prosper at the expense of the mass populaceà (Vincent). I like what all this beliefs defend but most of all their either confused or rather confusing beliefs, for example, The ONLY ABSOLUTE TRUTH is that there are NO ABSOLUTE TRUTHS . References Christopher, B. Postmodernism a very short introduction. London: Oxford University Press, 2002. Fredric, J. Postmodernism or the cultural logic of late capitalism. London: Duke University Press, 1991. Johannes, W., Joseph, P. Postmodernism: the key figures. New Jersey: Wiley-Blackwell, 2002. Mary, K. Literary Theory: A Guide for the Perplexed. 20th January 2007. 5th October 2010 http://www.colorado.edu/English/courses/ENGL2012Klages/pomo.html. Vincent, B. Postmodernism: local efects, global flows. New York: Sunny Press, 1996.
Thursday, May 14, 2020
Gender Roles Are A Set Of Societal Norms Essay - 1648 Words
ââ¬Å"Gender roles are a set of societal norms dictating the types of behaviors which are generally considered acceptable, appropriate, or desirable for people based on their actual or perceived sex or sexualityâ⬠(Oxford). Is it a boy or girl? What sport will he play? When will she take dance lessons? Women shouldnââ¬â¢t have jobs! Men should work while women take care of the house! Women belong in the kitchen! Men donââ¬â¢t do household chores! These are just some examples of stereotypes adopted by society that many believe men and women should learn from starting at an early age to help them develop into ideal individuals. When men and women lash out and go against these norms, they often receive a plethora of negative attributes that come with making their own decisions. Many times these individuals are viewed as outcasts, receive negative attention from their peers and in many cases, deal with anxiety and depression at a very young age. This issue is a continuing o ccurrence year after year and is something that not only occurs here in the United States but all over the world. A question we should constantly be asking ourselves is, what can we do as citizens to help eliminate this idea that gender roles must be followed in order for us to be an accepted member of the society we live in? Rather, we should ask how can one use gender roles as a tool to help guide them in the right direction rather instead of viewing these roles as commandments to follow which inevitably abolishes ourShow MoreRelatedGender Roles Are Set Of Societal Norms1530 Words à |à 7 Pages Introduction Gender roles are set of societal norms dictating the types of behavior which are genrally considered acceptable , appropriate based on their actual or perceived sex or sexuality of the person. Gender roles are also determined by the prevailing cultural norms. Gender stereotypes also alters the the attitudes, traits, and behavior patterns of males and females. Gender stereotypes on the basis of sexism, or the prejudiced beliefs that value males over females. Common forms of sexism inRead MoreSocial Construction Theory : The Product Of Society And History851 Words à |à 4 Pagesevery person; they are the values, norms, values, and images in society that are combined, constructed, or created. Societal pressures and the media offer racial, gender, and sexual biases which society uses to form a complete portrayal of each group. From a gender inequality approach, social construction theorists argue that societal and historical beliefs determine the characteristics for each gender. Societal pressure forces men and women into their inherent roles which they may not fall into naturallyRead MoreQuestions On Door Holding Exchanges1056 Words à |à 5 Pagesaccepted as a societal norm. Some researchers have looked at door holding from an altruistic standpoint and looked at courteous behavior, under the assumption that this behavior may be selfishly motivated, that one may get something in return. Other studies looked at situational context and proximity and what may have motivated the participant to hold open a door in one scenario, but refrain from the behavior in another. Many studies on door holding behavior are also interested in gender differencesRead MoreExamining Sub-Cultures: The Goth Culture1665 Words à |à 7 Pagesinherently subject to collaborative norms and values that have been instilled in humanit y, with the consideration that this varies across cultures. The paradigm between collective action and individual desire results in the formation of what is deemed socially acceptable, such as gender roles, sexual orientation, gender performance etc. ââ¬Å"It is social norms that provide the constraints by which the interaction between the basic dyad of self and other is governedâ⬠¦social norms also provide the source of identityRead Morehe Impact of Heteronormativity on the Transgender Community In society, children are taught1200 Words à |à 5 Pagesexpectations onto the people around them. More often than not these societal expectations conform with that of a heteronormative mindset1. In a modern western context, heteronormativity is the notion that people fall into distinct genders, male and female, and lead natural roles in life all while conforming to the ideology of traditional binary gender roles. Such heteronormative bias asserts that traditional binary gender roles--masculine men and feminine females--and heterosexuality are the mostRead MoreThe, The Tale Of Genji, And Sunjata1455 Words à |à 6 Pagesinfluence the listener through relatable or believable stories, whether they be fact or fiction, to solidify the gender hierarchy as shown in literary stories such as Lysistrata, the Tale of Genji, and Sunjata. The solidification of the gender hierarchy through stories cemented women into a position below men of which women were and still are unable to escape or to improve on. The gender hierarchy is commonly demonstrated through the objectification of women. This has been exemplified through theseRead MoreSexuality and the development of a sexual selfhood is a development that can occur during900 Words à |à 4 Pagesbehavior as human behavior was thought to be directly related to reproductive processes. Furthermore, this perspective prompted Erikson to conclude that sexual behavior and gender were unlearned (nature) and instinctual. Now, these perspectives have been critiqued from the standpoint that there is more freedom to self-select gender roles than was previously envisioned. In addition, there has been a recent shift to realizing that ââ¬Å"part of adolescence is the very broad task of navigating how to become aRead MoreGender And Gender Roles1456 Words à |à 6 Pagesthey must be and how they must act determined by their gender. Gender roles are a set of societal norms that dictate a personââ¬â¢s behavior based on the appropriate and acceptable rules for their gender. This notion derives from the assumption that girls favor dolls and dress-up, while boys prefer toy guns and trucks. These instances contribute to the concept that those of male and female gender must fulfill a specific ideology. These societal standards are ingrained within us as children and we areRead MoreSymbolism In Praying By Artist Kesha1083 Words à |à 5 Pagestelevisions presenting forth slogans that represent societal expectations, and the change in color and position from the beginning of the video to the end. The imagery of Kesha being trapped and tangled up in a net symbolizes the struggles many women face in society today. In the video, Kesha is pictured confined in nets all over her body. This imagery represents the feeling of entrapment and the feeling of being unable to break free of the gender roles that are so highly expected and enforced in theRead MoreSocial Construction Of Gender And Masculinity1689 Words à |à 7 Pagesattitudes regarding the social construction of gender, specifically masculinity and femininity. Childrenââ¬â¢s attitudes are influenced by a variety of external sources, but are most strongly influenced by their home life and parents. Parents are responsible for nurturing and teaching children about multiple aspects in life, including gender norms; this occurs both consciously and unconsciously. One-way parents pass on their beliefs about gender and gender norms are through the giving of heteronormative toys
Wednesday, May 6, 2020
Two Short Stories of Awareness - 1606 Words
Two Short Stories Of Awareness Beyond Oneself:Araby And A Sunrise On The VeldAraby by James Joyce and A Sunrise On The Veld by Doris Lessing are both short stories in which theprotagonists gained a consciousness that was beyond themselves. The main characters are both initiatedinto new realities and truths of which they were not previously aware. Both short stories will beexamined with reflections according to the type of initiation that was experienced, the nature of thenarrators, the similar and dissimilar aspects of both characters and various components of the short stories. In the two stories, both characters were experiencing an initiation or awareness of newactualities that were outside of themselves. The main charactersâ⬠¦show more contentâ⬠¦They felt a oneness with the object of their love. They tried to breakdown the boundaries of their isolation. Both passions brought them out of their aloneness and loneliness. A difference in characters was that the boy in Araby w as passive, inactive and reflectiveabout his passion. The focus was on himself and how he felt about his friend#8217;s sister. He was anintrovert while the character in the second story was an extrovert being active and involved in his lovefor nature; he was more aware of what he was doing. In addition, the boy#8217;s pride in Araby took over hisfeelings for the girl which were destructive and almost destroyed him. The girl had a ruinous influenceon him as she occupied his mind taking him away from his sleep and school work. She haunted his mindwhen he was not around her. In A Sunrise On The Veld, the character had a purposeful obsession. Onethat taught him valuable lessons about life, for example, that nature can be hostile and not to take itfor granted. There was a difference in what the boys learned from their experiences. The boy in Arabylearned something about himself. He learned that his love for the girl was one-sided, unreal and itsonly basis was in his feelings. It was not a mutual feeling and therefore may have destroyed what he felt for her. However the boy#8217;s joy for nature in A Sunrise On The Veld probably did not go away evenafter witnessing the buck being devoured by ants. He learned aboutShow MoreRelatedShort Story: American Born Chinese682 Words à |à 3 Pagesthis interesting short story, the author presents a theme that is very relevant in modern dayââ¬â¢s world that is one of self-awareness and identity. Identity from its definition may seem inter-related to self-awareness, but in reality, they are not. Identity by definition is a representation of what a person is, his or her: value, beliefs, customs, ideas and culture. Self-awareness however is the realization of a person by understanding his or her limits (Amy 157). Therefore, these two concepts of identityRead MoreErnest Hemingway Is Well-Known For Uniquely Integrating1146 Words à |à 5 PagesWith each plot, he subtly weaves the elements into multiple layers of significance. His skillful use of allegory adds meaning to each story, as it allows the reader to take a step back in time and get a glimpse some of the controversies of the past. If the story were to lose its believability, the connection to the reader would be severed. Many of Hemingwayââ¬â¢s stories allow the reader to easily grasp the superficial concepts that Hemingway is trying to convey, while also leaving the reader to expandRead MoreLayer Four : Strategies For Multiple Components Of Instruction962 Words à |à 4 PagesFive Components As mentioned before, The National Reading Panel in 2000 and the No Child Left Behind Act signed in 2001 defined there five components as the most important to teach in reading instruction: phonemic awareness, phonics, vocabulary, comprehension and fluency. Phonemic awareness is defined as the knowledge that spoken words can be broken apart into smaller segments of sound known as phonemes. Phonics is defined as the knowledge that letters of the alphabet represent phonemes, and that theseRead MoreA Good Man Is Hard And Find By Flannery O Connor1190 Words à |à 5 PagesIn Flannery Oââ¬â¢Connorââ¬â¢s short story ââ¬Å"A Good Man Is Hard to Findâ⬠, Oââ¬â¢Connor tells the story mainly on the emphasis of the grandmothers prospective. The grandmother was never named in the short story, only leaving the reader to guess if this story was how Oââ¬â¢Connor portrayed a feeling toward society and religion. In order for the reader to understand the point of view of the story , the reader must look at the back ground of the author. Born in Georgia, where the story takes place, Oââ¬â¢Connor was raisedRead MoreThe Lottery, By Shirley Jackson And A Rose For Emily By William Faulkner960 Words à |à 4 Pagesenhance writing and add meaning to a story, this is evident in the two short stories ââ¬Å"The Lotteryâ⬠written by Shirley Jackson and ââ¬Å"A Rose for Emilyâ⬠written by William Faulkner. With the authors use of symbolism Jackson and Faulkner are able to add depth to their writing in a way that connects with the readers. By adding symbolism to the short stories the authors manage to add meaning to inanimate objects that in the end become a crucial part to understanding the story and the lessons it contains. WithoutRead MoreEvery Little Hurricane By Sherman Alexie1087 Words à |à 5 PagesLittle Hurricaneâ⬠: A Historical Analysis The short story ââ¬Å"Every Little Hurricane,â⬠by Sherman Alexie, addresses how the poor quality of life on an Indian Reservation takes its toll on the people living there and how the mistreatment of these people over the decades has led to lots internal conflicts among the Indian people. After reading the story it is clear that the issues which have caused the violent outbursts among the Indian people within the story can be traced back from the white first settlersRead MoreThe Rest Cure In The Yellow Wallpaper1570 Words à |à 7 Pages The short story The Yellow Wallpaper, was used by the author Charlotte Perkins Gilman to bring awareness of the experiences of depression and the rest cure both mentally, physically, and socially in the 1800s and early 1900s. Suffering from post-partum depression herself, Gilman also went under treatment of the rest cure. As a result, her experiences and struggles are very similar to the ones of her main character in the story. While narrati ng The Yellow Paper, the main character and Gilman herselfRead MoreEssay On 2D Animation1193 Words à |à 5 Pagesdesign is based on targeting audience who are digital natives, use multiple devices to connect to the media. Exactly want my video campaign to achieve is results through online video aims and increase brand awareness. Thus increases repeat audience. ââ¬Ëââ¬â¢Grow my audience with video marketingââ¬â¢Ã¢â¬â¢. Story I will use the storyline from an internet the authorï ¼Å¡Ã¦ ´Å¾Ã¥ º Ã¥ ºÅ"Ã¥ ⺠(Dongtingfujun) from China In a veryà mechanized planet, all the foodà people eatà wasà synthesized.à Aà young man wants to find a real apple for theRead MoreThe Tell Tale Heart By Edgar Allan Poe918 Words à |à 4 Pagesââ¬Å"The Tell-Tale Heartâ⬠by Edgar Allan Poe is a short story told by an unnamed narrator, who attempts to convince the reader that he is sane, while describing the events leading up to murdering an old man. Through the use of symbolism, imagery and irony, Poe reveals the thoughts of the narrator while he is recalling the events of the old man. The story starts off with the remarks of ââ¬Å"TRUE! --nervous --very, very dreadfully nervous I had been and amâ⬠by the narrator. This remark can be inferred asRead MoreTrue North Is Leaders Essence Of Who You Are Our Deepest Beliefs, Values, And The Principles1170 Words à |à 5 Pagesa leader being genuinely human at a profound level. It is an internal compass that drives a leader through life. True North is leaderââ¬â¢s adjusting point that helps him/her stay on track. It is unique for each individual based on individualââ¬â¢s life stories and crucibles. True North is based on what is most important for a leader, for instance, leaderââ¬â¢s most treasured values, passions and motivations, and other sources of satisfaction in life. True North is about leaderââ¬â¢s journey towards integrity and
Tuesday, May 5, 2020
The Fundamentals Of Information Securities - Myassignmenthelp.Com
Question: Discuss about The Fundamentals Of Information Securities. Answer: Introduction A security plan of a system is the planning of any system for their security. It is a proposed plan that helps in the protection and management of the information system. This security plan even helps in creation of the security policy for any particular organization (Rhodes-Ousley 2013). The information technology environment or the organization gets utmost advantages or security for their organization. This security plan of the system is a specific formal plan, which eventually defines the activity plan for securing the information system or computer. It gives a proper and systematic approach for the protection of systems from being utilized by any kind of hackers or unauthorized users (Peltier 2016). Moreover, this plan even helps in securing from virus attacks, spoofing attack and sniffing attacks. The following report outlines a brief description on the entire concept of security plan. An international retailer of supermarket has made a four level supermarket in Singapore. The head of Asia has hired a security expert for the super market (Vacca 2012). This report describes about a security plan that is practical, logical, rational as well as cost effective in nature. Probable causes for the threats in security of an organization and recommended measures are also given here. Discussion Case Study A popular or famous international retailer of supermarkets has made a supermarket. It is of four levels and it is assumed that it will remain open for twenty four hours in a day. The entire construction of the building is completed and now the project team is thinking of completing the cables, fittings and the infrastructure (Crossler et al. 2013). The Head of Asia operations in the main management of the supermarket in Singapore. However, he is not sure of the security plan of the supermarket. He have hired a security lead for the security operations in the supermarket and the security expert will have to make a plan for the security system. The supermarket is supposed to start in next three months. Security Plan for Head of Asia Purpose The purpose of the security plan of the supermarket is to produce proper security to the information system and infrastructure of the supermarket (Andress 2014). The main aim is to provide significant and good security to all the persons working and the customers present. Security Systems The security systems are the most important part of the entire security plan of the supermarket. These security systems are responsible for the perfect security of the infrastructure as well as the information systems present in the supermarket (Kroenke and Boyle 2015). The security systems of the supermarket are as follows: i) CCTV: The Closed Circuit Television or simply CCTV is the most basic, essential and the simplest form of security of any building, office, supermarket and house. Popularly known as the video surveillance, it is utilized for the security of any building (Aloul et al. 2012). This Closed Circuit Television or CCTV captures the video of all situations with clear sound. It helps in the prevention of any intruder to the building, where CCTV cameras are installed. It transmits a proper signal to any particular place, within a set of restricted number of monitors. A person who will be sitting in the security or the surveillance room, will be checking the complete video from the cameras (Chou 2013). This will be the best security system for the supermarket in Singapore. Moreover these are extremely cheap and easy to implement and thus the cost of the plan will not be exceeded. ii) Intrusion Alarms: This is the second best security system for any supermarket. Intrusion alarms help in the detection of any intrusion in any building (Fragkiadakis, Tragos and Askoxylakis 2013). If anything is burning inside the building, an automatic alarm rings up and all the persons present in the building are alarmed. Moreover, this intrusion alarm also helps in detecting any type of policy violation. There is an inbuilt software that is present within the intrusion alarm and if anything is detected in the security policy, an intrusion alarm automatically blows up and all the persons are alarmed from this (Rhodes-Ousley 2013). Moreover, the security officers present in the surveillance room, check through the CCTV cameras and if they find out any type of threat they ring the intrusion alarms and notifies the other persons. iii) Armed Security Guards: This is the third best way of securing any supermarket. The security guards with arms in the hand will be extremely secure for the supermarket in Singapore. The supermarket should have proper-trained security guards with arms (Kayworth and Whitten 2012). They will have the responsibility of the entire security of the supermarket. Maintenance and testing Maintenance and testing is the final part of any security plan. The entire plan is the responsibility of the security lead and security expert. The security systems should be eventually supported by all possible means of security (Aloul et al. 2012). All the information systems and security systems should be maintained with utmost security. The equipments of the security system should be updated monthly and should be checked regularly. This maintenance and testing are done with utmost care and a special security expert should be hired for this testing. His responsibility will be checking the versions of the systems and update them systematically and also test the new systems that are proposed by the security lead of the supermarket (Chou 2013). Moreover, regular maintenance and testing helps in reducing the regular problems in the security systems and thus changing of the security system is not required. This in turn, makes the entire plan extremely cost effective in nature. This entire above mentioned security plan will be extremely helpful for the security system of the supermarket in Singapore as it will be practical, logical, rational and cost effective. Probable Causes The supermarket in Singapore can have various security threat or problems within it. The security systems should be protected in such a way that no intrusion can occur in their security system and information system (Rhodes-Ousley 2013). The probable causes of the security threats in any organization are as follows: i) Intrusion: This is the most basic and significant cause for security threats in supermarket (Papp, Ma and Buttyan 2015). Intrusion here means the unauthorized access or unauthorized entry to the security system of the supermarket. ii) Virus Attacks: This is the most vulnerable attack for any type of information system or security system for the supermarket (Chou 2013). These virus attacks are responsible for the vulnerabilities of the information system. iii) Spoofing: This is the third probable cause for the security threat in the systems. Spoofing attacks occur when a malicious party takes the name of an authorized user and acts as him (Fragkiadakis, Tragos and Askoxylakis 2013). All the confidential data or information is lost due to this and thus security system is under stake. Measures for Preventing Losses There are various ways for securing or preventing the losses of the security system. The measures for preventing the losses of the security system are as follows: i) Establishment of Passwords: Strong passwords can usually secure the entire security plan or the information systems of the supermarket in Singapore (Kayworth and Whitten 2012). The passwords should be changed in smaller span of time and thus this cannot be easily hacked by the hackers or intruders. ii) Firewalls: Strong firewalls are another important measure for securing the security systems or information systems of the supermarket (Aljawarneh 2012). The firewalls can easily detect and prevent any type of vulnerability or threat and thus the security system will be protected. iii) Antivirus: Installation of antivirus programs is the third probable measure for any type of vulnerability or virus attacks (Papp, Ma and Buttyan 2015). Antivirus programs are extremely essential for any security systems. iv) Regular Updates: The programs should be updated regularly and this regular updates will secure the systems with latest technologies. The above mentioned measures are extremely useful and necessary for the supermarket in Singapore and can be easily undertaken without any complexities. Conclusion Therefore, from the above discussion it can be concluded that, security plan is the most important security approach for any particular organization or information technology environment. The security plan is a proper and eventually a basic systematic approach that helps in securing the entire information system of a particular organization. It is initially implemented in the information technology environment of any organization. The security plan is always made by utilizing the security policy of the information technology environment as a specific benchmark. The above report has clearly defined the entire concept of a security plan for any particular organization. In this case, the organization is a supermarket in Singapore. The report has helped to understand the case study of the of a four level supermarket. They have hired a security plan for the successful implementation of the security plan in the organization. The report is the security plan, which is practical, logical, rat ional and as well as cost effective in nature. As the supermarket is brand new, the security plan is such made that it does not incur huge costs. There are various and several causes or reasons for the security threats in any security plan. These probable causes are also given in the report. Moreover, the report also comprises of all the possible measures that will help in the security of the organization. References Aljawarneh, S., 2012. Cloud security engineering: Avoiding security threats the right way.Cloud Comput. Adv. Des. Implementation, Technol., p.147. Aloul, F., Al-Ali, A.R., Al-Dalky, R., Al-Mardini, M. and El-Hajj, W., 2012. Smart grid security: Threats, vulnerabilities and solutions.International Journal of Smart Grid and Clean Energy,1(1), pp.1-6. Andress, J., 2014.The basics of information security: understanding the fundamentals of InfoSec in theory and practice. Syngress. Chou, T.S., 2013. Security threats on cloud computing vulnerabilities.International Journal of Computer Science Information Technology,5(3), p.79. Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M. and Baskerville, R., 2013. Future directions for behavioral information security research.computers security,32, pp.90-101. Fragkiadakis, A.G., Tragos, E.Z. and Askoxylakis, I.G., 2013. A survey on security threats Management and detection techniques in cognitive radio networks.IEEE Communications Surveys Tutorials,15(1), pp.428-445. Kayworth, T. and Whitten, D., 2012. Effective information security requires a balance of social and technology factors. Kroenke, D.M. and Boyle, R.J., 2015.Using Mis. Prentice Hall Press. Papp, D., Ma, Z. and Buttyan, L., 2015, July. Embedded systems security: Threats, vulnerabilities, and attack taxonomy. InPrivacy, Security and Trust (PST), 2015 13th Annual Conference on(pp. 145-152). IEEE. Peltier, T.R., 2016.Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Rhodes-Ousley, M., 2013.Information security: the complete reference. McGraw Hill Education. Vacca, J.R., 2012.Computer and information security handbook. Newnes.
Subscribe to:
Comments (Atom)