Monday, May 18, 2020

Essay on Social Construction of Race - 748 Words

In society, race clearly affects ones life chances. These are the chances of getting opportunities and gaining experience for progression. The social construction of race is based on privileges and availability of resources. Looking at society and the formation of race in a historical context, whites have always held some sort of delusional belief of a white-skin privilege. This advantage grants whites an advantage in society whether one desires it or not. This notion is often commonly referred to as reality. In order for one to understand how racism has come to be what we know it as today, we must first examine the Constitution of the United States. This document clearly states, We the People of the United States. The†¦show more content†¦As you can see, inequalities have plagued America for hundreds of years and continue to do so. I believe racism to be as apparent today if not more profound then in the past. A large portion of society believes that no man is stil l to this day denied any unalienable rights. I do not believe this statement to be true. We have adopted affirmative action programs and enforced strict equal opportunity employment laws to hinder discrimination. Although I believe it is still a very prevalent issue in todays society. Despite laws, investigations and results show that twenty percent of African Americans interviewing for jobs were turned down due to the color of their skin (Omi and Winant 67-68). Indeed racism may be very subtle in most cases; it is not a thing of the past but rather a very serious problem in society that evolves sociohistorically. There is a direct relationship with slavery in the past and discrimination today. In both cases there is an attempt to oppress a minority group. The oppressing group makes it difficult in many ways for the minority to rise above the harsh treatment towards equality. Just as slaves in the past were uneducated because of the threat to unite and revolt, employers toda y limit minorities for fear of their power within the company. The shift of the meaning of race and how it is socially constructed did notShow MoreRelatedRace And Race : The Social Construction Of Race858 Words   |  4 PagesThe race is an indefinite term, which has not been created from science or research, but more so the idea of what it is. Essentially, race is all about perception. One person may separate races based on a certain category of traits while another person uses totally different guidelines to define what races there are. Race has ultimately been created socially, therefor has no biological components until people connect the two terms. This paper examines the connection between society and race whileRead MoreRace As A Social Construction1679 Words   |  7 PagesAlisha Sparks Dr. Stanley POLS 24 November 2015 Race as a Social Construction When we talk about race, what are we really talking about? The issue of race is a complex issue, with socially ambiguous undertones that have plagued our society for decades. Race has been a marker and maker of stereotypes. Race has been used as a justification for injustice. Whether slavery, Japanese internment, or social and economic exclusion, race has given an avenue for those in power to exclude ones deemed ‘other’Read MoreThe Social Construction Of Race1242 Words   |  5 Pagesfoundation for what appears to be the social construction of race. Somewhere along the lines, eugenics became more about isolating certain human characteristics, like skin color, and relegating them to a hierarchy of societal importance (Norrgard, 2008). Race is simply defined as a pattern-based concept that allows for the general public to draw conclusions based on an individual’s geographical location and thereby predetermining their inclusion into a particular social group (Yudel l, et al., 2016) TheRead MoreRace As A Social Construction822 Words   |  4 Pageswhat is race? The term race is difficult to define as a result of the belief that it is â€Å"racist† to talk about race. Although how do we know what race is if we do not discuss it within society. After much thought I defined race as an individual’s background that may be used to describe their ancestor’s demographics as well as their religion. However, today people tend to put more emphasis on race being the color of an individual’s skin. As discussed in class society does not understand what race is,Read MoreThe Social Construction Of Race1743 Words   |  7 PagesIn The Social Construction of Race, Ian F. Haney Lopez defines race as a social construct that is constantly changing its meaning due to the fickle nature of society. Lopez believes that this fickleness stems from a social climate formed by a variety of factors such as human economic interest, current events , and ideology. There are certain racial definitions however, that have remained mostly the same despite efforts to bring attention to the offensiveness and immorality of such discriminatory thinkingRead MoreThe Social Construction Of Race1638 Words   |  7 Pagesstupid immoral, diseased, lazy, incompetent, and dangerous to the white man’s virtue and social order â€Å"(p.181). Blackness have become objectified in public spaces, they are view as a threat on the street of Toronto, surrounding areas and even in the criminal justice system. In fact this negative stereotype of criminalization have put Black males under scrutiny and constant surveillance. The social construction of race by the dominant belief system are still embedded in society that capitalized on minoritiesRead MoreThe Social Construction Of Race2146 Words   |  9 PagesAbadjivor AFAS 304B Professor Machibya 30 March 2015 The Social Construction of Race The underlying characteristic of race concepts is found in its use of phenotypes and physical differences in order to gain an understanding of why there are different people that exist in the world. These differences have been used in understanding the behaviors, intellect, and the value of humans through connecting different characteristics to different classified races. Using phenotypical differences to understand certainRead MoreRace As A Social Construction966 Words   |  4 PagesRace is a concept only existing in societies with systems of oppression based on social racism. In chapter eleven: Inequality, they discuss how, â€Å"There is nothing intrinsic about, for example, any racial or ethnic group that makes it distinct from any other; race and ethnicity are dynamic, fluid categories that are socially defined†(Ritzer). The oppression of â€Å"superior† groups demonstrates on â€Å"inferior† groups is one consequence of race as a social construction, whic h is to have one’s identity reducedRead MoreRace Is A Social Construction1074 Words   |  5 Pagesthe term â€Å"race† should not be used. Scholars and others argue that the term â€Å"race† should not be used because there is no biological basis for the concept of race. Geneticists have determined that code for physical traits (the key distinguishing characteristic for â€Å"race†) are inherited independently of one another. Any attempts there have been to define race based on genes are futile, because there is no set of genes that everyone within the â€Å"race† has. Scholars argue that race is a social constructionRead MoreSocial Construction of Race1867 Words   |  8 PagesThere is perhaps no bigger and more expansive social construction known to man than the construction of race. In earlier times race meant a tie to national origin, Greek race, Roman race, etc. race underwent a big change in meaning to it’s more contemporary form to distinguish biological differences of physical features and skin color (Wiegman 157). Film and television in this century and the twentieth century have aided and perpetuated stereotypes of race. These stereotypes have been most associated

Saturday, May 16, 2020

The Effects of Child Care on Development - 1883 Words

THE EFFECTS OF CHILD CARE 1 A variety of changes in the world have demanded an increase in the need for child care. Some of theses changes include migration, poverty, and urbanization. These economic and societal changes are forcing more and more woman into the workforce. Among these are young women and mothers. From the 1970’s to the 1990’s there was a major increase in the need for child care. In March of 1970, 26% of mothers with children under the age of 2 were working outside the home. By the same month in 1984 that number had reached 46.8 %( U.S. Dept of Labor 1984.) Now a days that number is even higher and according to the 2006 census, the number of preschoolers under the age of 5 living with employed mothers reached 11,207. The†¦show more content†¦Between these two studies researchers found that children with secure attachments had negative impacts where as insecurely attached infants seemed to benefit from it. This proved that day care may provide a consistent stable environme nt where the children are able to experience missing their parents and look forward to them returning. Generally speaking there have been no true facts or data proving that day care attendance has a negative impact on the emotional development of children or the bond with their mother. While there are studies with findings that contradicts this statement, Belsky and Steinburg(1978) state, â€Å"many of the results cannot be generalized and have several limitations.† While this research has found links between child care and security issues, it also found that the links decrease over time and are usually completely gone by kindergarten or first grade. (Egeland and Heister1995.) Parents are not solely concerned about the emotional impacts, but the cognitive and social impacts as well. Social development can be described as, â€Å"the ways in which THE EFFECTS OF CHILD CARE 5 Individuals’ social interactions and expectations change across the lifespan† while cognitive development â€Å"involves the processes of learning problem solving, reasoning, imagining, and perceiving.† (Gerrig and Zimbardo 2002.)Show MoreRelatedThe Effects Of Day Care On The Development Of A Child1592 Words   |  7 PagesIn this assignment I will be discussing the different effects day care can have towards the development of a child. I will be discussing Bowlby’s maternal depravation hypothesis and Ainsworth’s theory of attachment and also the effects of attachment type and maternal deprivation or deprivation on later behaviour and relationships. A day care is daytime care for people who cannot be fully independent, such as children or elderly people. Day care takes place outside the home by someone other than closeRead MoreThe Negative Effects of Child Care on Child Development Essay2033 Words   |  9 PagesThe Negative Effects of Child Care on Child Development Dxx Wxxxxxxxx Anthropology 101 Mr. Bxx Lxxxxx September 5, 2010 Is child care having a negative effect on the development of children in the United States? Studies show that there are indeed negative psychological and developmental effects on children. Scientists in the United States, Canada, and the United Kingdom are coming to the same conclusion. It is best for a child to be cared for at home. Over the past five to six decadesRead MoreLev Vygotsky s Theory Of Cultural Development Essay1399 Words   |  6 Pagesteaching and publishing literary works, and finally turning his attention to fundamental questions of human development and learning, where he made his biggest impact in the psychological field. Vygotsky proposed a general genetic law of cultural development in which cognitive function occurs on two planes: first on the social (between individuals), followed by the individual (internalized by the child) (Bjorklund, 2005). For a number of years, his theory mainly gained attention in Russia and Eastern EuropeRead MoreNon-Parental Child Care963 Words   |  4 Pagesï » ¿Non-parental Child Care Non-Parental Child Care: In the initial years of the introduction of non-parental child care, the major question or concern regarding this practice was whether it was helpful or harmful to children. As the practice has developed since its inception, non-parental child care has become a fact of life in the modern society. This has resulted in the change to the initial question as the main concern of the practice in todays society is on the suitable ecological model of child careRead MoreNon Parental Child Care966 Words   |  4 PagesNon Parental Child Care Non parental Child Care, and the Influences It has on Development Amara Washington SOC312 Nancy Russell July 9, 2012 Non Parental Child Care and the Influence it has on Development In today’s society more and more women are working outside of the homes and are not able to take care of the children on a full time bases. When the parents are unable to tend to their children, they have to seek help from an outside source. Years ago, it was natural for the motherRead MoreThe Effects Of Home Environment On Children1468 Words   |  6 Pagesuse of child daycare has been debated endlessly. It has become hard to determine how it may aid in the development of a child’s cognition or if it hurts it instead. This is partly because of the wide variety of types of child care and the opportunities that are given to young children. Fortunately, measures have been created to help standardize what a daycare does and how it is run. In this paper, several studies are assessed and the criteria that daycares are held to are evaluated. The effect of homeRead MoreEffects Of Poverty On Children1553 Words   |  7 PagesHow Poverty Effects Children Makayla Ray University of Alabama in Birmingham Abstract This literature review of twelve previously published research articles has focused on summarizing some of the effects of poverty on children. The selected articles all focused on the major effect of poverty on children, and were sorted into four sub-categories or themes based upon a specific focus areas of this complex and not yet fully understood issue. These themes included developmental, educationalRead MoreChild Care and Education Cache Level 2766 Words   |  3 PagesD1: The expected stage of social development at the age of 4 years old is that children would be with other children, playing with and they start to understand the differences in people and their needs and so are able to get jealous and express anger whilst talking as well as physically and knows how to be creative. D2: The expected stage of social development for age 5 years old is that children will start to understand that having friends is good and they like to play more than being alone. TheyRead MoreThe Positive Effect of High Quality Childcare on Childrens Cognitive Development1452 Words   |  6 PagesCognitive development is defined as the growth and change in a person’s ability to perform mental tasks including thinking, understanding and reasoning (California Department of Education, 2014). Cognitive development is a process involving a complex interaction between biological and environmental factors (Feinstein, 2003, as cited in Wong, Edwards, 2013). There are multiple factors that occur in early childhood including breastfeeding, parental intelligence and obstetric complications that haveRead MoreEffects of Daycare on Children1301 Words   |  6 Pagesof a child’s life it’s crucial that the child gets the care and attention they need. For children to receive the best care and attention it’s best they stay home with their parents because it’s more influential on their development. However, in order to make a living parents need to re-enter the work force which then leaves them with the decision of which care would be best. This being said, most parents are left with the only option of sending their child to daycare. Being that the parents are left

Wednesday, May 6, 2020

The School Shooting The Doors, Hide And Wait, By...

Classroom intercoms blare on without warning, â€Å"Shelter in place!† is yelled clearly throughout the school building. Doors ae locked and lights are turned off, your teacher rushes you and your classmates to a corner in complete silence. You as a student truly don’t know if you and your friends are safe in this moment. This is a school shooting. A school is a place for young minds, meant to teach them about their world and prepare them for adult hood. Unfortunately with incidents such as Sandy Hook, Virginia Tech, and Columbine, some, who are seen as pure sadists wish to open fire on these places of learning. Some places, such as schools in Clarksville, Arkansas decided to combat this training their staff to carry 9 mm. handguns to school†¦show more content†¦have been trying to combat this. For schools in Clarksville, Arkansas, weaponry of their own is the answer. Guns in a schooling situation, clearly this can have some worrying implications. It was stated â€Å"With 53 hours of training under their belts, more than twenty administrators, teachers, and school employees in Clarksville, Ark., will head back to school this August with packing a 9mm handgun.† Training is clearly important, if a teacher or staff member does not know how to shoot a gun, it could clearly backfire on them and the school, but some thing that is not mentioned is physiological training that goes into firing a gun. I spoke to Deb Lopez, Assistant Principal of Winslow Junior High School and asked her how she would feel about equipping her colleges with hand guns, these were her statements. â€Å"I worked at the prison for eight and a half years. We as guards were asked to go through gun training, and all of us passed.† â€Å"In a situation of being handed a gun and told to shoot if needed to, it’s a difficult situation.† Clearly she has had extinctive experience with emergency situations. â€Å"If our school was to do that, we would have to take into consideration how our staff would be able to handle it mentally.† Along with the ability to for teachers to handle having guns on them, students are also faced to handle their learning providers having weaponry. Clearly it could be a large distraction to students who aren’t comfortable, and if students aren’t

Heart of Darkness Study Guide Essay - 2239 Words

Heart of Darkness Study Questions Chapter 1 1. The setting of the story begins on the Nellie, a ship. The turn of the tide is significant because it gives the men on board extra time to talk, and Marlow begins telling his story. In addition, symbolically, the turning of the tide conveys a change, and perhaps, foreshadowing of the story. The author spends a lot of time dealing with light because it is the main symbol in the novella. Light and darkness are universal symbols that represent good and evil. Although not explicitly stated, those who have the light are those who are â€Å"civilized†, and those who have the darkness are those who remain â€Å"uncivilized†, particularly the people living in Africa. 2. Marlow appears different from†¦show more content†¦9. The man-of-war is a lifeless forested stretch of coast. Once they reach the Congo River, Marlow boards another ship to journey further upriver. The man-of-war portends the lifelessness of many coasts in Africa; most parts of the place appear corrupt and dreary. 10. Marlow describes the Company’s station as a â€Å"Grove of Death†, in which among the trees there are dying natives and recurring dynamite blasts. I think the natives allowed themselves to be bullied by the white men because they felt inferior. During this time, imperialism was popular and the belief that a white man was better than a black man was common. I also do not think natives had the proper technology, means, or knowledge to necessarily stand up to a group of white men either. 11. The accountant is described as an elegant white man with a clean and well-mannered appearance. The accountant is described as a â€Å"miracle† because he represents the Company, or how the Company wishes to be seen. The accountant is devoted to the Company. The station manager is described as an average man. The manager’s supreme gift is his ability to never get sick. Marlow does not like the station manager because he is jealous of Kurtz, and also because Marlow describes him as â€Å"originating nothing.† This suggests how the manager lacks innovation and is devoted to keeping up with appearances, although he has nothing to offer. The manager comments about howShow MoreRelated Prejudice and Racism in The Jewel in the Crown and Heart of Darkness1361 Words   |  6 PagesRacism in The Jewel in the Crown and Heart of Darkness      Ã‚   The effects of British colonialism are reflected in literature from both early modernism and post colonialism. Racial discrimination tainted both eras portrayed in the British morale of white supremacy over non-European counties unfolded. Heart of Darkness exemplifies early modernism in the British explorers viewed African natives of the Congo as incapable of human equality due to perceived uncivilized savagery. Personal interactionRead MoreAnalysis Of Mary Shelley s Frankenstein 1062 Words   |  5 Pagesbut when he takes it too far he drives himself into the cold darkness of isolation. â€Å"For this I had deprived myself of rest and health. I had desired it with an ardour that far exceeded moderation; but now that I had finished, the beauty of the dream vanished, and breathless horror and disgust filled my heart (Shelly 43). At this point in his study s Victor realizes that this has consumed him and when he sees what is truly in his heart he is scared of himself. This would not have happened if heRead MoreArthur Dimmesdales Guilt and Hypocrisy Essay829 Words   |  4 Pagespeople. The scaffold, a public symbol of disgrace, contrasts with the pastor’s silent sin of adultery. When Hester became a symbol of sin among the people and wore the scarlet letter as punishment, Dimmesdale bears a sinner’s masked mark in his heart. As a result of his concealed sin, Dimmesdale suffers from guilt and hypocrisy. Over the course of the three scaffold scenes, Dimmesdale changes from cowardly guilt and hypocrisy, to desperate guilt and hypocrisy, and finally to repentant hope. Read MoreCharacteristics Of A Good Friend879 Words   |  4 Pageshow close bond a person share with the family, there is always a limit beyond which a person cannot express their thoughts or confess about their problems to family members. A good friend remain unaffected by these limits and a person can pour their heart out in front of them. A friend plays a very poignant role in a person’s life. There are many characteristics of a good friend. One of those characteristics is loyalty. A person can never be considered a good friendRead MoreHeart of Darkness Essay4410 Words   |  18 PagesThe Visions of Light Vs Darkness When Joseph Conrad composed Heart of Darkness he created a literary masterpiece which embodied the essence of light contrasting with darkness. Throughout the novel Conrad constantly utilizes the images of light and dark and uses them to mold a vision, which the reader is then able to use to decipher the literal and metaphorical meanings of the novel. As Conrad said, my task which I am trying to achieve is, by the power of the written word to make you hear, toRead More Analysis of Heart of Darkness by Joseph Conrad Essay4372 Words   |  18 PagesAnalysis of Heart of Darkness by Joseph Conrad When Joseph Conrad composed Heart of Darkness he created a literary masterpiece which embodied the essence of light contrasting with darkness. Throughout the novel Conrad constantly utilizes the images of light and dark and uses them to mold a vision, which the reader is then able to use to decipher the literal and metaphorical meanings of the novel. As Conrad said, â€Å" my task which I am trying to achieve is, by the power of the written word to makeRead MoreMisrepresentation Of Depression Throughout Society1720 Words   |  7 Pagescondition could prevent people from being able to fully watch their pain. Chà ¶drà ¶n, while taking a different approach to pain, still offers an impractical one. She says, â€Å"Practicing loving-kindness toward ourselves [...will] start [to] illuminat[e] the darkness of difficult times† (Chà ¶drà ¶n). This message is typical in our culture: love oneself. Although the idea is everywhere, there is never a blueprint on how to love oneself. The symptoms of depression include feeling â€Å"Helpless, worthless, or guilty† (â€Å"WhatRead MoreJudaism Shabbat Summary Essay893 Words   |  4 Pageslaw that God has revealed. Accordingly, the understanding of a moral law is that such a law is embedded in the revelation of God. It is the responsibility of human beings, therefore to study the, principally the Torah, in order to understand the appropriate response to moral questions. The Torah serves as a guide and expresses the literal word of God in which the Jewish will follow. In the Torah, Shabbat is signified as a day of rest for the Jews and features as the fourth commandment, â€Å"RememberRead MoreHeart of Darkness1958 Words   |  8 PagesSTUDY GUIDE Joseph Conrad, Heart of Darkness Each detail to which your attention is drawn by the Study Guide is part of the puzzle of Heart of Darkness. It is important to notice the details, to ponder them, to see how patterns repeat themselves, and to see how the pieces fit together. Marlows journey and your reading about the journey require constant alertness, discipline, patience, and a willingness to look for what is not immediately apparent. Section 1 A. The Thames Setting 1. NoticeRead MoreEssay on Jungian Psychology and Joseph Conrad’s Heart of Darkness6193 Words   |  25 PagesAs the Heart of Darkness snakes its way into the savage shadows of the African continent, Joseph Conrad exposes a psycho-geography of the collective unconscious in the entangling metaphoric realities of the serpentine Congo. Conrad’s novella descends into the unknowable darkness at the heart of Africa, taking its narrator, Marlow, on an underworld journey of individuation, a modern odyssey toward the center of the Self and the center of the Earth. Ego dissolves into soul as, in the interior, Marlow

I only need to look at me. free essay sample

In my eagerness to pursue for the greatest achievements that I can possibly accomplish, I have been blinded by false interpretations for the meaning of fulfillment. I was petitioned in this country from the Philippines a month after I turned 13. 7 years prior to that, my parents sacrificed leaving their 3 children in the Philippines to seek better opportunities. I was forced to adapt to a culture I barely knew, to a language I partially understood, to an environment different from my own. My initial reaction was to prove my worth. It has been 5 years since. Sitting in my High School Counselor’s office, while discussing about the career I prefer to proceed, she blatantly opened my eyes to my biggest flaw. I constantly compare myself to my peers. She gave me an advice, that I â€Å"cannot compare an apple to an orange,† that I can only compare myself to none other than myself from the past. We will write a custom essay sample on I only need to look at me. or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page I received a 26 on my ACT; I took the most rigorous course of High School classes available in my school; taught myself English in about 6 months, and yet I found myself unsatisfied. I realized while sitting in her office, throughout our conversation I kept mentioning the achievements of my classmates and peers, which I wish I had. She told me to stop; her following words still ring to me; â€Å"You have accomplished more than enough, realize how far you’ve reached since 5 years ago, and look at where you’re at now and not who’s walking next to you. Do you see the changes?† I have proven my worth multiple times; I have a story unique to everyone else. I have accomplishments I have fulfilled and goals I can’t wait to achieve. I now know how to move forward, by looking at the tracks I’ve created. The tracks I wish to continue in your University.

Tuesday, May 5, 2020

Global Journal Flexible Systems Management -Myassignmenthelp.Com

Question: Discuss About The Global Journal Flexible Systems Management? Answer: Introduction Aztek is going to adopt the IT services to embellish their companys objectives and also to outsource their services to a third party company and they can be highly benefitted from the cloud technology (Wu Olson, 2015). The report will highlight the threats and the vulnerabilities involved with the system. The report will also showcase the security measures by which they can carry on their business activities in a well-secured manner. Review in regards to the financial services The systematic risks are the risks in which individual has no control over. The risks occur due to the external factors are influenced by external factors like war, political factors whose effect cannot be controlled by any enterprise or any organisation or any industry.The systematic risks also get affected by the interest rates and the recession (McNeil, Frey Embrechts, 2015). They can be divided into the following categories- Interest rate, risk, market risk and the purchasing power risk. Here in this risk none have clue. The Unsystematic risks The risks can be well controlled. The individuals or any organisations can control and manage the risks. The risks are within one's range and can be mitigated by simple means. The types of risks that fall under unsystematic risk are a financial risk factor, liquidity risk and operational risks (Lam, 2014). The effect is malignant compared to the systematic risk. The systematic risk falls under the relevant risk. The relevant risks are those risks which can be detected, the risks which can be analysed, the risks which can be controlled. The relevant risks are systematic risks and not he unsystematic risks where individuals or nay enterprises have no control over (Chance Brooks, 2015). The key risks which fall under the category are the operational risk, legal risk, regulatory risk and solvency risk. The strategic risks get erupted in the organisation due to improper decision-making and wrong strategy due to which a project fails. The risks also state that the management team has failed to come up with the changes. This risk can affect the growth of the organisation. The market risks are the risks which get erupted due to the abnormal price rise of any commodity or any resources. The price rise affects the company, affects the finance section of the company (Chance Brooks, 2015). The market risk is correlated with the financial market risk, interest rate risk and the equity risk. The credit risks occur when the borrower fails to pay the loan they have taken. The lender should have taken the responsibility to judge whether the borrower is capable to repay the loan with interest or not, if not judged properly the risk gets erupted. The credit risks occur when the money lender lose the whole money or the whole principle. The legal compliance of all the countries are more or less same and Australia is no exception. Aztek must abide by the legal compliance as this can benefit them in the long run, this can assist them to take the best decision so that they can run the business activities smoothly and fast. The external risk can be fatal for any organisation or to an industry that is why the unsystematic risk must be deal with patience (Chance Brooks, 2015). The external risks can cause a devastating effect to Aztek and the can increase the risks. In this case, Aztek must develop certain strategies to meet their business goals, have to adopt certain strategies so that Aztek can execute the projects comfortably without any risks. Aztek must take the initiative to educate their employees and if the employees have the sound knowledge on the threats and the vulnerabilities and the security measures then they can serve the customers well and with much ease (Bromiley et al., 2015. They can well adept with the cloud technology and the IT services quite well. This can enhance their business activities and market share as a whole. Government regulations The federal body of each and every country apply certain rules, certain policies and by following those rules and the policies the organisations the enterprises can work fast with more productivity. Similarly, Aztek following the rules and the policies made by Australia can embellish their business activities as a whole. This can help to conduct the business effectively as well as ethically (Sadgrove, 2016). Thus Aztek management team should act proactively and must follow the rules accordingly as that can provide them with the business benefits. The factors on which the authorities must focus on- The policies made by the federal authority must be carefully examined, it must be checked whether the policies are related to financial sections or not. If those policies are applied must be applied in an effective manner so that the productivity can be gained. The risks residing within the company must be checked and analysed, the market of the employees and the financial market must be analysed as well. Otherwise, the company will face huge losses. iii. The process which is absolute necessity must be followed accordingly and that to be followed in the best way. Following the procedure, the risks incurred within the organisation huge losses can be minimised (Bolton, Chen Wang, 2013). Best practices Aztek by following the aforesaid procedures can solve the problems that incurred as a result of outsourcing. The challenges that Aztek faced while conducting the business activities must be addressed and if possible in some cases must be discussed with the investors and the stakeholders to get an any better outcome. The following report has showcased the advantages as well as the problems incurred while performing the mentioned practices. Review of project along with the current security measures The report has showcased various aspects of the Aztek company as a whole. The benefits and the ill effects of the related IT services have been detailed in the report. The IT services that Aztek has planned to perform are network configuration, installation of application software and conducting proper management system for the desktop (Ali, Warren, Mathiassen, 2017). Aztek needs to identify the various aspects of the IT services that can assist them to carry out the business operations in an effective manner. Aztek has planned to undertake the strategies that can prove helpful in mere future. The stakeholders involves the- The government agencies work together in accordance with the policies relevant to outsourcing. Investors of Aztek iii. The management team and staffs of Aztek Regular clients and irregular clients Analysing threats, vulnerabilities and the final outcome Effective decision making is important and must be chosen wisely to outsource all the IT services and for this reason, Aztek should test all the vulnerabilities of the company. This kind of initiative will help them to get the desired result which can help them to enhance the services. The threats can be disastrous so they must be handled with care and effective decision-making can help to mitigate the threats and vulnerabilities incurred. Generally, Aztek serves financial services to the clients all over Australia s (Rittinghouse Ransome, 2016). Therefore they deal with the personal information of the clients and that is why they must safeguard these vital data of the customers safely and securely and must not disclose. However, due to the malware attack, those data can get hacked and breached. The IT services risks if not diminished in time can create havoc. The whole database and the system can get breached as a result of this and Azteks reputation can be under threat. The company can lose the clients base, can even lose huge lots of money (Choo, 2014). Thus a security model must be developed to add the security measures to the Aztek database and system. Aztek requires cooperation from the clients as they are going to shift to the cloud, shift to a cloud platform. They should not forget the demands and wishes of the third party organisation. In this case, Aztek's management team has developed a model and the model is based on the following factors- Strategies to recognise the objectives- The risks involved with the database storage is the main area of concern. The secured framework can protect them from potential threats and cater them the best solutions. The assassination of applications- The application programs must be chosen wisely by Aztek. The assessment of risks must be conducted after that. The aforesaid approach can help them to get the desired outcome they want (Islam et al., 2016). The secured framework can help them to use the IT services in a more efficient manner; it also assists them to take the best plan to assure the security of their database and the system. The highlight of the features of the security objectives- Aztek via the security framework model can assess the vulnerabilities and the threats associated with Aztek's system. The Aztek management should act in a proactive manner and should be aware of the fact their database contains the sensitive information of the clients and also the financial data of their company (Choo, 2014). These data must not get compromised at any cost and Aztec should make sure of this. Identification of threats Phishing attacks- The phishing attack is carried out by the hackers. The hackers gain access to ones system and stole all the vital data. They copy the HTML code of Aztek and develop a site which is Aztek look-alike. The users who are innocent tries to gain access to the system entering all the credentials and thus the hackers acquire all the credentials for entering their system (Albakri et al., 2014). The hackers also attack the clients by means of spam emails the innocent clients click on the suspicious email and get trapped. Data Packet Sniffing- The insecure network can be vulnerable to attack, the insecure network along with the data flow through this network can get hijacked by the hackers and in this way they can rob all the sensitive data of the clients. IP spoofing-IP spoofing is another means by which Aztek's clients can get trapped. The hackers generally carried out their attack remaining in the background hibernating from others. They hide their source and attack (Albakri et al., 2014). Thus Aztek can only find out that the hackers have attacked but cannot be able to find out from which source they are carrying out their vulnerable attack. Port Scanning- The hackers via port scanning can know the service Aztek is utilising in their office premises. Then the hackers try to figure out the loopholes in their services and find out the loopholes they carry out their attack. Azteks system can be exploited by the same. Backdoors- The backdoors are created by the web developers to facilitate the development of the site. The web developers keep a constant look on the website code and decide Identification of vulnerabilities Predictable session identifiers- Using the Base 64 the hackers identify the session identifiers. The algorithm is reverse engineered by the hackers to carry on their misdeeds. Dependent on client-side validation- The settings of browser and the browser history can get hacked and along with that the Javascript stored in the database gets disabled by the hackers. In this way, the security of the system and the database can get threatened. iii. SQL injection- SQL injection threats is another notable one. The hackers by exploiting the Aztek database can acquire the credentials of the clients from the database. Unauthorised execution of operations- The authorization and authentication of Aztek can get threatened by the hackers and Aztek can face severe loss. Cross-site scripting- The cookies can get stolen from the browsers by the hackers and make it exploitable to attack (Peltier, 2016). The hackers who have the knowledge of web scripting language, CSS and HTML can exploit and make any Azteks client website vulnerable to attack. The hackers can install virus too. Issues related to uploading- The Aztek system applications and the database can be under serious threat due to the malware attack. The hackers via XSS and the Trojans can exploit the system and the database. vii. Issues related to logging out- The clients sometimes feel too lazy to log out of the system, the attackers can gain into the Aztek account via an insecure network and can rob the important data of the database, thus the clients' data can get breached (Sennewald Baillie, 2015). viii. Passwords- The clients sometimes set very easy predictable passwords for their system which can be guessable and thus the system becomes vulnerable to attack. The lazy approach from the clients can prove dangerous (Rittinghouse Ransome, 2016). The hackers via brute force method can gain access to the system and expose the vulnerabilities residing within the database and the system of Aztek. The unencrypted passwords- The clients unknowingly store passwords in their system as they tend to forget the password. The attackers attack the system via virus and malware and Trojan virus and acquire those files where the password is written. Also, the hackers search for the hidden files in the system where the password is saved in unencrypted form. Phishing attack- The phishing attack is another noteworthy mention which is a disastrous one, the hackers send spam emails to the clients of Aztek claiming that they are sending emails from Aztek (Almorsy et al., 2016). The clients can unknowingly enter those malicious sites and thus can lose confidentiality and lose all the credentials and can even lose all the sensitive data. The absence of account lockout- The account lockout absenteeism can lead to cybercrime attack. xii. Not showing the previous sessions- The innocent clients unknowingly can enter their personal information again and again and thus risks their own privacy. In this way by catering the username, password the clients can get into trouble and their confidential data can get breached (Ahmad Maynard, 2014). xiii. No appropriate settings for cookie security: The hackers can develop a channel for Aztek clients and the server and via this channel, the browser cookies get transmitted (Siponen Mahmood Pahnila, 2014). The hackers first exploit the system and gain access to those browser cookies and this way threats can spread all over Aztek. xiv. Weak cyphers- The attackers can expose the system and the database and can record what is being transacted and in this way, the SSL key is cracked the intruders get into the system. It can be concluded that Aztek management needs to implement a correct strategy via which the security management risks can be checked. Via this method correct methodologies must be adapted to control, to implement, and to work on the information security system. The standards and the policies must be followed to embellish the business operations as well as the deliverance method. Aztek can adopt the code of practice developed upon ISO strategy and they can get benefits via this approach. Aztek can even diminish the risks associated with the company's premises for the IT services via this method (Sawik, 2013). Thus in case of the control mechanism, proper guidance can be initiated to make the necessary changes to improve the quality of services Aztek offers. Aztek must adopt the cloud technology for good, this can largely benefit the clients, the employees and the stakeholders of Aztek. The cloud technology can help them to conduct business in agile and efficient manner. Also with the advent of cloud computing, they can stay connected with their customers all throughout day and night. However, they must be careful about all the issues associated with cloud computing, they have to have secured network connectivity and relatively fast bandwidth to get their job done (Chen et al., 2013). They must consider the below factors while conducting business operations over cloud- Usage of the features of the services. Confidentiality Availability of the options (Pascoal, 2012). Problems related to integrity Transparency followed between both the companies Multi-party or company trust By showcasing the above factors Aztek can develop an effective strategy to conduct their business activities and on the other side can check the threats and the vulnerabilities associated with the company. The stakeholders and the investors can be greatly benefitted by this approach (Dotcenko, Vladyko Letenko, 2014). The outsourced tasks can be greatly carried out significantly in a secure manner. Thus to acquire the best possible benefits, the company needs to acquire the secure model to develop effective service level agreement. This initiative can assist them to overcome the challenges and assist to implement the best method by which the company can be highly benefitted. Control measures to mitigate the threats associated with Aztek Managing an accurate inventory of control system devices: Aztek should not allow their computer nodes to stay connected with any kind of wired or wireless network partly if gets connected to any sort of network partly then the hackers will get the opportunity to grasp over the insecure network (Kimwele, 2014). Therefore, Aztek must keep an eye on the system nodes whether they are connected as a whole and should check whether they are partly connected or not, otherwise via those loopholes the hackers can enter the system. Developing network boundaries: The network boundaries are there to assure security to the system and the database and to detect any defects within the security framework model (Fenz et al., 2014). These are the controls that are used to filter out the inbound and outbound traffic. The firewall is network boundary equipment and is used to check the malicious data flow and in this way, the network must be governed. iii. Using Secure Remote Access methods: Aztek should use the Virtual Private Network as they are known to cater the secure channel via which they can carry on their business operations. The Aztek clients can conduct all the financial activities in a safe and secure manner, they can also protect and safeguard their system due to this secure channel (Crossler et al., 2013). Aztek can safely use the printers and websites connecting to the Internet due to this secured channel. Establishment of role-based access controls: The clients should be given certain permission to use the database and system and that should not exceed. The employees should also be given the permission to access the database according to their job role. In this way, the hackers' entry can be checked to an extent. Thus Aztek can carry out their business activities in a secure manner (AlHogail et al., 2015). This initiative also let us know that the malicious activities of the hackers. Aztek can also utilize the logging capabilities and via this method, Aztek can enhance their security in their office premises. Use of strong passwords: The clients must act in a proactive manner while using the Aztek system. They must utilize a password which is not predictable, cannot be guessed easily and cannot be predicted so easily that is why the password which the clients set must contain at least one big case letter, one small-case letter and one symbol, and the password must be overall eight digits long. The password set by the clients cannot be anyones one place or anyones name (Bell, Ndje Lele, 2013). Thus setting a strong password they can assure safety and security of them and also Aztek, otherwise, the weak password can lead to vulnerabilities like hacking of one's personal data. Thus they all must be careful while choosing the password for their system. Installation of antivirus software: Aztek must not deny the positive effect of antivirus software. Aztek must choose antivirus software wisely otherwise there is a chance their vital data can get breached. They must know that the antivirus software is capable to defend that malicious software those try to enter the system. The system can get overall security due to the approach. They also should use the latest hardware, latest software and the latest operating system as this can help them to achieve the goals. They also must update their system and the database regularly along with that they must apply patches (Singh et al., 2013). Thus it will help them to carry out their business activities in agile and effective manner. The outdated software and hardware are threats to any system and Aztek is no exception so they must be careful. vii. Enforcing policies for mobile devices: The mobile devices must have an antivirus installed and along with that the clients must use a strong password for the system. This can save the sensitive information stored in the system by the installation of the aforesaid approach. viii. Cybersecurity team: The cybersecurity plays an important role to fight with the hackers. The Aztek employees must know all the security measures as that will help them to carry out their business operations in safe and secure manner. Any hackers if want to gain entry to the system they can get to know the vulnerable attack and also about the vulnerable network (Singh et al., 2013). The cybersecurity team thus can educate the Aztek employees to conduct the business activities. Involving executives: The executives can prove to be beneficial while identifying any cybersecurity risks erupt within the system; they can also help to connect to the stakeholders (Bell, Ndje Lele, 2013). The executives are aware of the cybersecurity threats thus can provide best solutions to the check the IT risks and also this effective decision can help them in the long run. mplement a disaster plan beforehand: A disaster management plan must be made as this can help to effectively run the business and to make best decisions, also the companys huge losses can be controlled (Bell, Ndje Lele, 2013). Like any other organisations, a disaster plan is absolute necessity for Aztek too. Conclusion It can be concluded from the above discourse that Aztek must adopt the cloud technology for good. They also must be aware of the threats and vulnerabilities associated with the system. They must be knowledgeable about the security measures that must be applied to secure their database and the system. The security measures can also help them to conduct business activities over the cloud platform. The cloud platform can cater them the competitive edge to succeed in the business. Apart from this, they must abide by the SLA factors and regulations to ethically and efficiently conduct IT services. References Ahmad, A., Maynard, S. (2014). Teaching information security management: reflections and experiences.Information Management Computer Security,22(5), 513-536. Albakri, S. H., Shanmugam, B., Samy, G. N., Idris, N. B., Ahmed, A. (2014). Security risk assessment framework for cloud computing environments.Security and Communication Networks,7(11), 2114-2124. AlHogail, A. (2015). Design and validation of information security culture framework.Computers in human behavior,49, 567-575. Ali, A., Warren, D., Mathiassen, L. (2017). Cloud-based business services innovation: A risk management model.International Journal of Information Management,37(6), 639-649. Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Bell, B. G., Ndje, Y. J., Lele, C. (2013). Information systems security management: optimized model for strategy, organization, operations.American Journal of Control Systems an Information Technology, (1), 22. Bolton, P., Chen, H., Wang, N. (2013). Market timing, investment, and risk management.Journal of Financial Economics,109(1), 40-62. Brender, N., Markov, I. (2013). Risk perception and risk management in cloud computing: Results from a case study of Swiss companies.International journal of information management,33(5), 726-733. Bromiley, P., McShane, M., Nair, A., Rustambekov, E. (2015). Enterprise risk management: Review, critique, and research directions.Long range planning,48(4), 265-276. Chance, D. M., Brooks, R. (2015).Introduction to derivatives and risk management. Cengage Learning. Chen, Z., Han, F., Cao, J., Jiang, X., Chen, S. (2013). Cloud computing-based forensic analysis for collaborative network security management system.Tsinghua science and technology,18(1), 40-50. Choo, K. K. R. (2014). A cloud security risk-management strategy.IEEE Cloud Computing,1(2), 52-56. Cremonini, M. (2016). Cloud Security Risk Management.Cloud Computing Security: Foundations and Challenges, 87. Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., Baskerville, R. (2013). Future directions for behavioral information security research.computers security,32, 90-101. Dotcenko, S., Vladyko, A., Letenko, I. (2014, February). A fuzzy logic-based information security management for software-defined networks. InAdvanced Communication Technology (ICACT), 2014 16th International Conference on(pp. 167-171). IEEE. Fenz, S., Heurix, J., Neubauer, T., Pechstein, F. (2014). Current challenges in information security risk management.Information Management Computer Security,22(5), 410-430. Goldstein, A., Frank, U. (2016). Components of a multi-perspective modeling method for designing and managing IT security systems.Information Systems and e-Business Management,14(1), 101-140. Islam, S., Fenz, S., Weippl, E., Kalloniatis, C. (2016). Migration Goals and Risk Management in Cloud Computing: A Review of State of the Art and Survey Results on Practitioners.International Journal of Secure Software Engineering (IJSSE),7(3), 44-73. Kimwele, M. W. (2014). Information technology (IT) security in small and medium enterprises (SMEs). InInformation Systems for Small and Medium-sized Enterprises(pp. 47-64). Springer Berlin Heidelberg. Lam, J. (2014).Enterprise risk management: from incentives to controls. John Wiley Sons. Latif, R., Abbas, H., Assar, S., Ali, Q. (2014). Cloud computing risk assessment: a systematic literature review. InFuture Information Technology(pp. 285-295). Springer, Berlin, Heidelberg. McNeil, A. J., Frey, R., Embrechts, P. (2015).Quantitative risk management: Concepts, techniques and tools. Princeton university press. Peltier, T. R. (2016).Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Pritchard, C. L., PMP, P. R. (2014).Risk management: concepts and guidance. CRC Press. Rittinghouse, J. W., Ransome, J. F. (2016).Cloud computing: implementation, management, and security. CRC press. Rittinghouse, J. W., Ransome, J. F. (2016).Cloud computing: implementation, management, and security. CRC press. Sadgrove, K. (2016).The complete guide to business risk management. Routledge. Sawik, T. (2013). Selection of optimal countermeasure portfolio in IT security planning.Decision Support Systems,55(1), 156-164. Sennewald, C. A., Baillie, C. (2015).Effective security management. Butterworth-Heinemann. Singh, A. N., Picot, A., Kranz, J., Gupta, M. P., Ojha, A. (2013). Information security management (ism) practices: Lessons from select cases from India and Germany.Global Journal of Flexible Systems Management,14(4), 225-239. Siponen, M., Mahmood, M. A., Pahnila, S. (2014). Employees adherence to information security policies: An exploratory field study.Information management,51(2), 217-224. Wu, D. D., Olson, D. L. (2015). Financial Risk Management. InEnterprise Risk Management in Finance(pp. 15-22). Palgrave Macmillan UK.