Thursday, January 30, 2020

Life and Margaret Atwood Essay Example for Free

Life and Margaret Atwood Essay This quotation was taken from Margaret Atwoods story, Homelanding. This story recounts many aspects of human existence from an outside view, as if it was being told to an alien race. This story tells about human appearance, sex (both difference and the act of), sunbathing, sleeping, death, and many other human functions in a scientific way. This story takes a step away from the normal way of describing these objects. For example, Margaret Atwood talks about eating and describes it by saying I destroy and assimilate certain parts of my surroundings and change them into myself. Most people who have had human contact their whole life consider eating putting food in their mouths, chewing, and swallowing. This quotation at the beginning of the story shows that the author knows that she is writing this for a human audience. She starts this off with the line, Where should I begin? This is more of a conversational style that draws the reader into this as if she was talking directly to the reader. The human reader is supposed to take the role of the alien race. The reader has to take a duality of being both a human and from an alien race who has no knowledge of anything human. The next line restates this with, After all you have never been there; or if you have you may not have understood the significance of what you say or thought you saw. An alien race would never have been to earth, yet the human reader has spent his whole life on earth if never stopping to think of the significance of what he is seeing. The next line is: A window is a window, but there is looking out and looking in. This can be seen in all the number of times that someone sees something in someone else that the person does not see in himself. For example, often a teacher is responsible for helping a student develop a talent that was there but the student did not know that he had it. This story is attempting to do the same and show the reader characteristics that mankind has but do not know it has. In the next line, this is reiterated with the statement, The native you glimpsed, disappearing behind the curtain, or into the bushes, or down the manhole in the mainstreetmy people are shymay have only been your own reflection in the glass. This shows the reader is the reflection in the glass and is seeing a portrait of himself in the story. Storytelling is often used to teach a lesson to the reader or listener. One of the most read examples of this is the Bible. Jesus often spoke in parables to help teach lessons to his listeners. This story attempts to make us take a step away from  ourselves and see ourselves in a different light so we could possibly understand ourselves better.

Tuesday, January 21, 2020

Gun Control Controls Nothing Essay examples -- ban on assault rifles

More and more frequently, we are saddened by the news of mass shootings. Whether it takes place in a school or public area, these shootings are both disastrous and mortifying. Families begin to feel anger and sadness, and demand immediate justice. Although these terrible events continue to happen, there have been no significant steps taken towards the reduction in the number of weapons; specifically assault rifles. This leads one to question do we need to ban the right to possess such weapons? If the possession of these weapons is not made illegal, we run the risk of another attack. While there is no questioning the severity of these mass shootings, a ban on assault rifles is not the answer because they are not the cause of such events, and it is a constitutional right to own them. In 1994, Congress passed the Federal Assault Weapons Ban which eliminated the manufacturing of certain assault rifles for private use (Plumer). This bill expired in 2004, though, and was never redrafted. Many mass shootings in the last few years, especially ones at Virginia Tech, a movie theater in Colorado, and Sandy Hook elementary school in Connecticut have stirred up pressure to pass a new bill. Following the shooting at Sandy Hook Elementary School in Newtown, Connecticut last December, California Senator, Dianne Feinstein, drafted a bill to potentially ban the sale, transfer, manufacturing, and importation of assault rifles. This bill includes a ban on semiautomatic rifles, pistols, shotguns, and handguns. Additionally, it bans 157 other specifically-named firearms and certain ammunition feeding devices (Feinstein). Excluded from this ban are registered weapons at the date of the bill’s enactment and assault weapons used by military, law enforc... ...n-one-post/>. Pratt, Erich. "Background Checks Would Not Have Stopped Sandy Hook Shooter." US News. U.S.News & World Report, 18 Jan. 2013. Web. 02 Dec. 2013. . Rosenberg, Jennifer. "Prohibition." 20th Century History. About.com, 2013. Web. 03 Dec. 2013. . "Sandy Hook Elementary Shooting: What Happened?" CNN. Cable News Network, 2013. Web. 02 Dec. 2013. . "The Numbers Count: Mental Disorders in America." National Institute of Mental Health, 2013. Web. 02 Dec. 2013. .

Monday, January 13, 2020

Large-scale energy and metallurgy Essay

Industrialisation (or industrialization) is the period of social and economic change that transforms a human group from an agrarian society into an industrial one. It is a part of a wider modernisation process, where social change and economic development are closely related with technological innovation, particularly with the development of large-scale energy and metallurgy production. It is the extensive organisation of an economy for the purpose of manufacturing.[2] Industrialisation also introduces a form of philosophical change where people obtain a different attitude towards their perception of nature, and a sociological process of ubiquitous rationalisation. There is considerable literature on the factors facilitating industrial modernisation and enterprise development.[3] Key positive factors identified by researchers have ranged from favourable political-legal environments for industry and commerce, through abundant natural resources of various kinds, to plentiful supplies of relatively low-cost, skilled and adaptable labour. As industrial workers’ incomes rise, markets for consumer goods and services of all kinds tend to expand and provide a further stimulus to industrial investment and economic growth. The first country to industrialise was the United Kingdom during the Industrial Revolution, commencing in the 18th century.[4] By the end of the 20th century, East Asia had become one of the most recently industrialised regions of the world.[5] Contents [hide] 1 Description 2 History of industrialisation 2.1 Industrial revolution in Europe 2.2 Early industrialisation in other countries 2.3 The Third World 2.4 Petrol-producing countries 2.5 Industrialisation in Asia 2.6 Newly industrialised countries 3 Social consequences 3.1 Urbanisation 3.2 Exploitation 3.3 Change to family structure 4 Current situation 5 See also 6 References 7 Further reading Description[edit] According to the original sector-classification developed by Jean Fourastià © (1907-1990), an economy consists of: a â€Å"primary sector† of commodity production (farming, livestock breeding, exploitation of mineral resources) a â€Å"secondary sector† of manufacturing and processing (as paid work) a â€Å"tertiary sector† of service industries Historically, the industrialisation process involves the expansion of the secondary sector in an economy originally dominated by primary-sector activities. The first transformation to an industrial economy from an agricultural one, known as the Industrial Revolution, took place from the mid-18th to early 19th century in certain areas in Europe and North America; starting in Great Britain, followed by Belgium, Germany, and France. Later commentators have called this the first industrial revolution.[4][6] The â€Å"Second Industrial Revolution† labels the later changes that came about in the mid-19th century after the refinement of the steam engine, the invention of the internal combustion engine, the harnessing of electricity and the construction of canals, railways and electric-power lines. The invention of the assembly line gave this phase a boost.[7][8][9] The lack of an industrial sector in a country can slow growth in the country’s economy and power, so governments often encourage or enforce industrialisation. On the other hand, the presence of industry in a country does not mean in general that it will bring wealth and prosperity to the people of that country. And third, the presence of an industry in one country can make it more difficult for other countries to develop the same type of industry. This can be seen in the computer software and internet industries. Started from the US around the 1990s these industries seemed to spread over the world. But after a period of monopolisation less than a decade long, the globally-leading companies remain concentrated in the US.[citation needed] Their economic power and capacity to dominate the media work against the developing of the same types of industry in other states. History of industrialisation[edit]

Sunday, January 5, 2020

The Perception Of Violence Within The Public Safety Field

Introduction This learner thinks that once the organization or system can understand the causes and the behavior of violence crime within their neighborhood, then they will be able to add measures, step, or both to prevent this type of behavior within their communities/neighborhood and apply them skillfully. Therefore, this learner will explain the main tenets of the perceptions of violence within a community as it relates to public safety leadership, and explain the reasons behind this learner’s perception, and evaluate the credibility. We will also take a look at what types of challenges the public safety field has when dealing with violence’s. Once that is addressed we will evaluate whether the personal perceptions of violence has changed, or is it reinforced, and try to gain an understanding how one might address ethical implications of perceptions of violence for professional practice in the public safety field which will help us when ethical or unethical matter come up within our organization. That when it does we will have some form of guide to follow to address these issues. Summarize the main principles of the perceptions of violence within communities This first question is rather hard for this learner to answer being that this learner is unemployed, and does not know where here degree will take her, but this learner can answer this section from a person perspective point of view. This learner believes that this course just confirm what she alwaysShow MoreRelatedA Brief Note On Shootings Shooting And The 2012 Aurora Shooting973 Words   |  4 Pagesrepresented through the lens as a public health frame where the issue is seen as focusing on health and safety risks to society. Figure 2 (shown above) illustrates a comprehensive numerical analysis of how articles in three selective years relate to the two frames created by frame alignment with the framing changing in frequency over the span of the twenty-year period. As indicated by the bar graph, as the constitutional frame has been increasing, so has a public health oriented idea of gun controlRead MoreSchool Uniforms Persuasive Essay1127 Words   |  5 Pagesevery day due to a fear of violence and harassment from their peers. Students at many schools, including my own, have become more divided. This division has resulted in bullying especially towards students that stand out from the crowd with the way they look and dress. Along with continuing the anti-bullying programs already in place, public schools should implement a school uniform in order to reduce divisions among students, which should, in turn, reduce bullying and violence among students. A firstRead MoreThe Ludlow Massacre Of 1914 Essay1522 Words   |  7 Pagesof Colorado. Within the book, the operation of Colorado coal companies in capitalizing the coal industry lead to the formation of the mine workscape in which united coal miners underground the mines and above the surface to fight for industrial and political rights. This paper would define the concept of workscape in the definition given by Andrews, and provide evidence of the responsibility of the exploitation of capitalism in forming the mine workscape in the Colorado coal fields between the lateRead MoreCase Study Term 2 Unit 4 Assignment750 Words   |  3 Pagesenforcement, correctional system and legal system are a few of the criminal justice professions that are entrusted by the government with the powers to protect and serve the citizens of the country. Law enforcement officer’s role is public safety, which can officially be broken down in different functions, enforcing the law, keeping the peace and protection of life and property. In carrying out the function law enforcement officer have to exercise discretion. Without law enforcementRead MoreMidterm Essay Exam1637 Words   |  7 Pagesexperiment do that was different from what basic patrol officers do? What was the relationship between the officers in this experiment and other patrol officers? The Kansas City Gun Experiment was a police patrol project that aimed at reducing gun violence, drive-by shootings, and homicides. The purpose of the experiment was to focus on gun crime â€Å"hot spots† through problem-solving policing and directed patrol in high-crime areas. The overall goal was to prove that this style of policing would reduceRead MoreCrime and Forensic Psychology1117 Words   |  5 Pagespopular culture, the public receives a skewed version of crime. The public’s knowledge may be particularly lacking with regard to the entire field of criminology, the differences between blue-collar and white-collar crime, and the general perception of the incidence of crime in the United States. You are asked, as the public relations representative of your police department, to provide an information session on the field of criminology.  The expectation is to make sure the public understands the factsRead MoreDomestic Violence And Its Effects3294 Words   |  14 PagesExecutive Summary As many people know, domestic violence is a criminal act involving victims and offenders who are related to one another. Domestic Violence includes intimidation and simple, aggravated, and sexual assault. What most people may not be aware of is that domestic violence has become a national dilemma, with a crime of this type occurring every 9 seconds. Family members try to ignore what’s happening and neighbors do not want to get involved. The victim is usually helpless to understandRead MoreEssay on Codes of Practice1513 Words   |  7 PagesThis is shown well within the Australian Standards board of advertising which contains seven clauses relating to standards. As shown in Jones (2007, p. 150) Which includes discrimination or vilifying people must not appear in adverts, no presentation using violence, and sensitivity in the treatment of sex, avoid sexuality and nudity, avoidance of alarm or distress to children, avoid strong or obscene language and apply consistency with p revailing community standards on health safety. Consumers oftenRead MoreBenefits Of Homeschooling : Children s Unique Learning Style And Provides A Healthier And Safer Learning Environment978 Words   |  4 Pageshealthier learning environment than a public-school system. The home environment lacks drugs, peer-influence, bullying, and school shootings. Parents spend more time interacting with their children one-on-one which, is nowhere close to the large teacher/student ratio within the public schools. 1. Claim: Homeschooling provide a healthier and safer learning environment. 2. Evidence: Gallup polls from the early 1970s found that the public thought school safety, called â€Å"discipline†, was the numberRead MorePrison Reform : The United States2438 Words   |  10 Pagesreform, and where they come from. To this end, we must explore the American political system, public perception, prisoner rights, disenfranchisement among parolees, the social justice movement, and efforts to lower recidivism among convicted felons. As seen throughout the history of the United States, there has always been a degree of exploitation by politicians in regards to crime that is meant to direct public attention and unease. Over the last four and a half decades the U.S. prison population has

Saturday, December 28, 2019

Chinas Three Sovereigns and Five Emperors

Back in the earliest mists of recorded history, over four thousand years ago, China was ruled by its very first dynasties: the mythical Three Sovereigns and Five Emperors. They ruled between about 2852 and 2070 BCE, before the time of the Xia Dynasty.   Legendary Reigns These names and reigns are legendary more than they are strictly historical. For example, the claim that both the Yellow Emperor and Emperor Yao ruled for exactly 100 years immediately raises questions.   Today, these very earliest of rulers are considered demigods, folk heroes, and sages all rolled into one. The Three August Ones The Three Sovereigns, also sometimes called the Three August Ones, are named in Sima Qians Records of the Grand Historian or Shiji from about 109 BC.   According to Sima, they are the Heavenly Sovereign or Fu Xi, the Earthly Sovereign or Nuwa, and the Tai or Human Sovereign, Shennong.   The Heavenly Sovereign had twelve heads and ruled for 18,000 years.  He also had 12 sons who helped him rule the world; they divided humanity into different tribes, to keep them organized. The Earthly Sovereign, who lived for 18,000 years, had eleven heads and caused the sun and moon to move in their proper orbits. He was the king of fire, and also created several famous Chinese mountains. The Human Sovereign had only seven heads, but he had the longest lifespan of all the Three Sovereigns - 45,000 years.   (In some versions of the story, his whole dynasty lasted that long, rather than just his own life.)  He drove a chariot made of clouds and coughed the first rice out from his mouth. The Five Emperors Again according to Sima Qian, the Five Emperors were the Yellow Emperor, Zhuanxu, Emperor Ku, Emperor Yao, and Shun.   The Yellow Emperor, also known as Huangdi, supposedly ruled for an even 100 years, from 2697 to 2597 BCE.   He is considered the originator of Chinese civilization.   Many scholars believe that Huangdi was actually a deity, but was later transformed into a human ruler in Chinese mythology. The second of the Five Emperors was the Yellow Emperors grandson, Zhuanxu, who ruled for a modest 78 years.   During that time, he changed Chinas matriarchal culture to a patriarchy, created a calendar, and composed the first piece of music, which was called The Answer to the Clouds. Emperor Ku, or the White Emperor, was the great-grandson of the Yellow Emperor.   He ruled from 2436 to 2366, just 70 years.   He liked to travel by dragon-back and invented the first musical instruments. The fourth of the Five Emperors, Emperor Yao, is viewed as the wisest sage-king and a paragon of moral perfection.   He and Shun the Great, the fifth emperor, may have been actual historical figures.   Many modern Chinese historians believe that these two mythological emperors represent folk memories of early, powerful warlords from the era just before the Xia Period. More Mythological Than Historical All of these names, dates, and fabulous facts are obviously more mythological than historical.   Nonetheless, it is fascinating to think that China has some sort of historical memory, if not precise records, from about 2850 BCE - almost five thousand years ago. The Three Sovereigns The Heavenly Sovereign (Fuxi)The Earthly Sovereign (Nuwa)The Human Sovereign (Shennong) The Five Emperors Huang-di (The Yellow Emperor), c. 2697 – c. 2597 BCEZhuanxu, c. 2514 – c. 2436 BCEEmperor Ku, c. 2436 – c. 2366 BCEEmperor Yao, c. 2358 – c. 2258 BCEEmperor Shun, c. 2255 – c. 2195 BCE

Friday, December 20, 2019

Love Is Blind Essay - 1006 Words

Do you remember your first kiss? Did you keep your eyes open or closed? I bet you closed your eyes. Isn’t this the essence of â€Å"love is blind?† You kiss them without fear, and without any sense of danger. You do not have to see the one you love to know you love them. You accept love on blind faith. Love is blind and for a moment we use this phrase to justify the obvious flaws we do not recognize in the people. Lovers are oblivious to the truth and therefore unable to be clear-sighted. My perspective is that we are blinded by love and we act carelessly without assessing any of our actions, thus we have regret for any mistakes later on. My latest experience where love is blind has to do with a friend that I know for a little over six†¦show more content†¦After their personal meeting and a very memorable week, I have hoped that somehow their relationship will be better. Much to my surprise, it have gotten worse than I could ever imagined. Sharon is still in te ars and one day she told me that they had a very huge fight. I remember, she once told me that before leaving China, just by the airport when she were about to take off. He told her â€Å"I have to tell you something really important that you deserve to know.† Sharon was confused by his statement. After a year of having a rollercoaster and bittersweet relationship, it has turns out that he is married. He got married at an age of 22 to a girl whom was matched to him by his parents. He decided to go to China for a job but the truth is he went there to fulfill his duty as a husband. He respects his marriage and does not tolerate to divorce. Indeed it is a heartbreaking new to Sharon. Days and nights she cried until her eyes dry out and her heart mourns for him. Each day, he calls Sharon and wants her forgiveness. He says he missed her and wants to spend the rest of his life with her. Sharon says she needs time to assess things. I spoke to her a month ago and she still does not k now what to do. She is not angry at him or does not even feel betrayed of what he has done, rather, she is worried that her parents might come to know about it and they will force her to marry someone else. Sharon claims that he is the love of her life and does not mind that he is married.Show MoreRelatedBlind Love Essay examples474 Words   |  2 PagesBlind love can be a hurtful experience, or one that is misleading. One example of blind love is being in love with someone who will provoke you into doing things you would not normally do. While most people have certain standards which they live by, being in love with someone to the point that they influence you to go against what you believe in is a result of blind love. Being in love can often persuade a person to do anything in order to make the other happy, or to keep from loosing them. ItRead MoreLove Is Blind By William Shakespeare957 Words   |  4 PagesWhenever you are going out with someone you really love, you give your partner the affection and ready to forgive them at any time they are at fault. However, it is because you give too much love, people usually tell you that you are a fool for trusting them. Which correspond to the saying, â€Å"love is blind,† which means, you love someone too much and cannot see their fault even if they are hurting you. In the third person’s perspective, two people are being intimated with each other is seen as lovers;Read MoreEssay on Women in Violent Relationships1012 Words   |  5 PagesWhat is Love? Webster’s dictionary defines love as a strong, deep affection. Many of those who are or have been in love can definitely agree with that. My definition for love is all of earth’ s surroundings that make one feel good or happy; to me, love is not just love towards another, but it is also love towards something beyond. Everyone knows that love is a beautiful thing to experience: it feels like all the happiness in the world is in your hands and you could never be happier. But what happensRead MoreAnalysis Of The Story Cathedral By Raymond Carver1305 Words   |  6 Pagesdeterminers, a and the, that refer to the blind man in the story and its effects to establish the atmosphere of the story. He states that the change in determiner seems subtle, but these subtle changes are significant because the changes show how narrator feel about Robert throughout the story. Nesset studies the sexual polices and the love lives in several Carver’s stories. He discusses how Carver wrote his stories based on less of love and more of love withdrawal. Also Facknitz addresses rediscoveryRead MoreKing Lear by William Shakespeare803 Words   |  3 Pagesforces us to see t hat being blind is a mental flaw just as much as it is a physical flaw. Lear is not only metaphorically blind but is also blind toward nastiness and loyalty . We see Gloucester’s blindness in more literal terms as he is literally blind but he can still see, and Albany has a more common form of blindness, as he is blind to his wife. These characters are only able to see after a tragic loss. However the person in the play that is more significantly blind is King Lear. His role wasRead MoreDifferent Types of Love in Midsummer Night’s Dream1508 Words   |  7 PagesDifferent Types of Love in Midsummer Night’s Dream Love and lovers, both can be described as many different things. William Shakespeare shows us this in his play, A Midsummer Night’s Dream. In this play we see all types of love, from passionate love to foolish love. Along with this we also see different types of lovers and pairs. Examples of these lovers come from pairs like, Hermia and Lysander, Demetrius and Helena, Titana and Bottom, and Oberon and Titana. It seems that in A Midsummer Night’sRead MoreWilliam Shakespeare s A Midsummer Night s Dream1277 Words   |  6 PagesLove and reason will never fit together. Nor will love ever be a controllable compulsion. Maybe we are fools for going into the perilous, eccentric universe of love; yet what fun would life be without it? William Shakespeare s play A Midsummer Night s Dream investigates the unconventional, unreasonable and unpredictable nature of love during his time. Shakespeare conveys this through the main plot of the play, which is composed of the relationships between three couples. The three couples showRead More Shakespeares Presentation of Love in a Midsummer Nights Dream1097 Words   |  5 PagesShakespeares Presentation of Love in a Midsummer Nights Dream A midsummer nights dream was originally supposed to have been performed at a wedding. Therefore the theme of love would have been a suitable theme for the play. In this play, as in many of Shakespeares plays the main theme is love. Shakespeare presents many different aspects of love in the play. He shows how love can affect your vision of reality and make you behave in irrational ways. He presents many waysRead MoreThe, Where Am Calling From `` And What We Talk About Love1256 Words   |  6 Pagesother characters and also the apprehension of death experienced by some characters. In the following stories which will be discussed are as follow: â€Å"Cathedral†, â€Å"Where Am Calling From† And â€Å"What We Talk about When We Talk about Love†. The concept of impermanence of life and love are discussed in these stories. However, in some of the stories alcohol allows these characters to truly express themselves and to speak and perform activities they would have never been able to do. The contrasts and perspectivesRead MoreMiddle Childhood Phase Of My Life875 Words   |  4 PagesRadcliffe College and received a Bachelor of Arts edge and the first deaf-blind person to do so. While she was a student at Radcliffe she was interested in writing and wrote her own biography there which was The Story of My Life which was the first story she ever wrote. Even thoug h Helen graduated with a Bachelor of Arts degree she saw herself as a writer first. Helen wrote a series of books for a person who was deaf and blind. Keller went to become an amazing and world famous author and speaker. One

Thursday, December 12, 2019

A Report on Information Technology Risk Management

Questions: Task1. For this question you are required to make at least two (2) forum postings, arguing either for or against the quantitative method of risk assessment. You will be assessed on what you contribute to the debate in terms of quality not quantity (though your posting should at a minimum be a few sentences long). You may either create new thread or reply to a previous posting. All new threads should contain the subject line Quantitative Debate (I will do the posting, just need 2 arguments with refs to base the posts on please) 2. Study Exhibits 61.1 and 61.2 from Reading 3, and answer the following questions:(a) Explain in your own words what is meant by the terms Sweet Spot and Discretionary Area (see Exhibit 61.1) (b) Explain the significance of a security decision that is located to the right of the Sweet Spot but outside the Discretionary Area (see Exhibit 61.1). (c) Explain the significance of a security decision that is located to the left of the Sweet Spot but still inside the Discretionary Area (see Exhibit 61.1). (d) Explain why you think the Defined Highest Acceptable Risk is located on the Sweet Spot, but the Defined Lowest Acceptable Risk is located to the right of the Sweet Spot (see Exhibit 61.2).3. In Reading 7 for this subject, Ozier states that The [ALE] algorithm cannot distinguish effectively between low frequency/high-impact threats (such as fire) and high-frequency/low impact threats (such as misuse of resources). Explain why this is the case. Give an appropriate example to illustrate your explanation. 4. (Note: Make sure you show ALL your working for this question) The following threat statistics have been gathered by a risk manager. Based on these, calculate the ALE for each threat. 5. (Note: Make sure you show ALL your working for this question) Using the figures you calculated above, determine the relative ROSI (return on security investment) for each of the same threats with the following controls in place. Remember that a single control may affect more than one threat, and you need to take this into account when calculating the ROSI. Based on your calculations, which controls should be purchased? 6. Consider the data in the two tables that appear in questions 4 and 5 above. Sometimes a control may affect the cost per incident and sometimes the occurrence frequency, and sometimes both. Why is this the case? Illustrate your answer with an example drawn from the data provided.7. The year is 1999 and you are the risk manager for a large financial institution. You apply the Jacobsons Window model (Reading 11) to determine your companys preferred response to the impending Y2K bug. According to the model, should you accept, mitigate, or transfer the Y2K risk? Why? Do you agree with the models recommendations? Why or why not? 8. (Note: Make sure you show ALL your working for this question) You want to persuade management to invest in an automated patching system. You estimate the costs and benefits over the next five years as follows: Benefits: Year 1 Year 2 Year 3 Year 4 Year 5 $2,000 $2,500 $4,000 $4,000 $4,000 Costs: Year 1 Year 2 Year 3 Year 4 Year 5 $3000 $2000 $750 $250 $250 C alculate the Net Present Value (NPV) for this investment. Assuming that management has set the Required Rate of Return at 10%, should the investment be made? Why or why not?9. There are a number of qualitative risk assessment models that are available for use, such as FRAAP, OCTAVE, OWASP and CRAMM. Choose one of these models and briefly describe how risk assessment is conducted under this model. Describe an example situation where you could use this selected model. Give your assessment of the validity, or otherwise, of this risk assessment model. Answers: 1. Quantitative Debate Post 1 (Supporting quantitative method of risk assessment) As per a fact, quantitative method under risk assessment refers to a particular technique that quantifies the amount of risk based on the previously-identified level of risk. Utilization of those tools of risk assessment have expanded the extent of intelligibility including that of soundness, and so risk may be easily recognizable. It embraces an expressive matter that is associated to each stage of the specific risk assessment (. ., 2007). To this regard, on reviewing the details of this method it may be identified that by using these sequential steps one may easily point out the different hazards, outcomes of those hazards it they exist at all, probability of the hazards, and attributes of those hazards. Thus, it may be said that quantitative method of assessing risk includes effectual engineering, financial factors, and that of ecological analysis. Post 2 (Supporting quantitative method of risk assessment) On contrary to the quantitative technique of risk evaluation, this approach of quantitative analysis gives a more detailed scenario. The ultimate cause of providing increased focus upon quantitative approach of assessing risk is that to assess the presence of all risks by means of this approach. This is said to incorporate both probability of key hazards as well as their impacts. Hence, this approach makes it easier to specify which risk requires to be taken care of as per its priority. 2. Discussing sub-questions Sweet Spot and Discretionary Area: For reducing the hazards and their occurrence, organization incorporates an effective information security system. For implementing such an effective security system, it is important for the organizations to take up certain amount of expense. Another fact in this regard is that the extent of efficiency of a security system is in fact directly proportional to expense (Adler, Leonard Nordgren, 1999). On the other side, enhanced security system refers to the occurring of risk would reduce, which means risk is inversely proportional to the extent of incurred expense. Now, if a two-dimensional area is considered whereby security is to be measured by means of horizontal axis and that of expense by means of vertical axis, then the point of intersection of cost and that of risk curve, whereby both risks and costs are at equilibrium, the point is known as sweet spot. Also, it is important for every organization requires taking up at least some amount of expense to manage risk, and there are some level of risks that may not be reduced. Thus, if the predefined lowest cost, minimum extent of risk which cannot be reduced and all current practices associated to risk prevention are simultaneously considered, then the space in that dimensional area is called discretionary area. Security decision located towards the right of Sweet Spot and outside of Discretionary Area: As per the given figure, we can say that in such particular context, increasing aspects of security refers to some level of costs that has equivalent impacts upon reduction of risk as the level of risk reduced almost equally as that of the enhancement of security concerns. Discussion: The reason behind this context is the subsequent to that of Sweet Spot, and the proportional risk reduction rate has become lower than the incremental rate of incurred expense. 3. Arguments are raised that algorithm did not succeed to distinguish amidst the high impact/low frequency threats as well as high frequency/low impact threat. For instance, fire is considered to be low frequency high impact threat as well as misuse of resources is low impact high frequency threat(Yokouchi, 2007). The algorithm ALE could not make proper differentiation amidst the two threats. The cause may be explained along with an example. When an organization emphasizes upon the risk loss estimates, Annualized Loss Expectancy may be estimated. For calculation of this, the formula use is: Annualized Loss Expectancy = Asset Value * Exposure factor As per the given formula, it may be identified that on measuring the annualized loss expectancy, generally two factors are considered: asset value as well as exposure factor. On multiplying these two factors, the outcome is single loss exposure. Thus, it just measures the one dimension named risk (Adler, Leonard Nordgren, 1999). Thus, it does not succeed in identifying the frequency as well as impact or emphasis on the outcome. In matter of low frequency/high impact threat, the outcome magnitude may coincide with the outcome of high frequency/low impact threat. Thus, as a matter of fact it may be stated that oversimplification approach of ALE algorithm may be considered key factor associated with failing of drawing distinct difference amidst low frequency/high impact threat and that of high frequency/low impact threat. 4. Threat Cost per incident Occurrence frequency SLE ARO ALE Software piracy $600.00 1 per month 600 52 $31,200.00 Computer virus/ worm $2,000.00 1 per month 2000 12 $24,000.00 Information theft (hacker) $3,500.00 1 per 3 months 3500 4 $14,000.00 Information theft (employee) $6,000.00 1 per 4 months 6000 3 $18,000.00 Denial-of-service attack $11,000.00 1 per 2 years 11000 0.5 $5,500.00 Laptop theft $4,000.00 1 per 5 years 4000 0.2 $800.00 Web defacement $1,500.00 1 per 2 years 1500 0.5 $750.00 Fire $500,000.00 1 per 10 years 500000 0.1 $50,000.00 Flood $300,000.00 1 per 15 years 300000 0.066667 $20,000.00 5. Threat Cost per incident Occurrence frequency SLE ARO ALE Software piracy $500.00 1 per 4 months 500 3 $1,500.00 Computer virus/ worm $1,300.00 1 per 5 months 1300 2.4 $3,120.00 Information theft (hacker) $2,000.00 1 per 6 months 2000 2 $4,000.00 Information theft (employee) $7,000.00 1 per 13 months 7000 0.923076923 $6,461.54 Denial-of-service attack $4,000.00 1 per 10 years 4000 0.1 $400.00 Laptop theft $5,000.00 1 per 10 years 5000 0.1 $500.00 Web defacement $1,500.00 1 per 5 years 1500 0.2 $300.00 Fire $75,000.00 1 per 10 years 75000 0.1 $7,500.00 Flood $50,000.00 1 per 15 years 50000 0.066666667 $3,333.33 Return on Security investment needs to be calculated for every threat in association with the specific control. As per the given table it has been identified that return upon security investment is greater for IDS as well as Insurance. These controls may be bought to combat issues like information hacking or flood(Yokouchi, 2007). 6. On considering the two tables of answer 4 and 5, one may identify that expense per incident as well as frequency of change occurrence based on control. It has been observed that it is control that considerably impacts upon the expense per incident. An instance may be referred to in this scenario to explain the influence of control within the frequency of incident occurrence (Alhawari, Karadsheh, Nehari Talet Mansour, 2012). For combating with system virus, the total expense of the aspect was $2000 and that of occurrence frequency of 1 every month. On introducing control antivirus the expense was $1300 as well as occurrence frequency was 1 every fifth month. The cause is that there are various types of anti-viruses to fight the computer viruses. Their policy of license as well as cost may change with the alterations in the cost of incident as well as occurrence frequency. 7. During the year 1999, being a risk manager of a financial institution, I had applied the Window Model of Jacobson to respond to the T2K bug. This bug means the problem within both digital and non-digital data documentation and storage that is the result of the practice of abbreviation of four digit year to two digits. Thus, the year 2000 as well as 1900 cannot be differentiated. Various approaches were introduced to solve the Y2K bug (Vinaja, 2013). Observation suggests that data re-partitioning, data expansion, windowing, etc can be used to solve the issue. Here in this regard, the Window Model of Jacobson may be used. As per this model, risk may be attributed as per its occurrence frequency and that of the outcome of influence of every occurrence. This model of Jacobson had an assumption that suggests that each of the risks has either high or low occurrence frequency(Prado, 2011). Besides, each risk has high or low influence or outcome. It shows that generally two types of class es are responsible to causing such loss of equal magnitude while indicated in terms of annual rate or annualized loss expectancy. I totally agree with the recommendations of this model that reflects high or low risk requires to be addressed by selecting a proper security measure possessing a positive return upon investment based on the link between implementation cost as well as reduction in ALE. The Jacobsons Window Model suggests that other things remaining constant the security measure must be implemented based on the investment return. 8. Year Benefit Cost Net Cash flow Present Value Factor (@10%) Present Value 1 2000 3000 -1000 0.909090909 -909.091 2 2500 2000 500 0.826446281 413.2231 3 4000 750 3250 0.751314801 2441.773 4 4000 250 3750 0.683013455 2561.3 5 4000 250 3750 0.620921323 2328.455 Net Present Value 6835.661 The given table shows the calculation the net present value (NPV). This value refers to an effective mechanism to assess the investment options. It is identified that NPV of this very investment is quite positive. Within this method, all future cash flows are transformed into present value for estimating the potential of investment. 9. The Operating Critical Threat, Asset and Vulnerability Evaluation (OCTAVE) method was normally introduced to assess the risks of bigger organizations with increased number of employees around more than 300. It needs to be noted that size was considered to be the only factor in this regard. It bigger organizations, several layers as hierarchy can be identified. This technique is usually responsible to maintain the computing infrastructure along with the internal capacity to run the assessment of risk measure. Besides, this is beneficial to interpret the outcomes in regard to critical assets (Benaroch, Jeffery, Kauffman Shah, 2007). This method involves an approach comprising of three phases for scrutinizing the organizational and certain technological aspects by gathering a comprehensive presentation of requirements associated to the organizational information security. This method is comprised of some workshops that may be arranged by the internal analysis team formed by several organizational employees. The approach emphasizes upon the capitalizing information from various organizational levels. Therefore, this focuses on certain critical aspects like identification of key assets, risks, threats, opportunities of the company. Also, this approach focuses on creation of a strategy to provide protection to company. The strategy of protection relies upon the practice, including the plan to mitigate all potential risks for supporting the objectives of the company. This approach may be applied to assess the potential risks related to the information security. This OCTAVE technique may prove increasingly effective to determine the optimum security in various organizations. This may be backed up by an effective example for explaining the utilization of this approach. In context to health care organizations, these need to maintain large database as well as records of patients(Caron Salvatori, 2014). It is utterly important to protect the confidentiality of the records or information. Here, application of OCTAVE may be highly beneficial for maintain security of the database within the health care organizations. The approach emphasizes upon the capitalizing information from various organizational levels (Pappas Panagiotopoulos, 2009). Therefore, this focuses on certain critical aspects like identification of key assets, risks, threats, opportunities of the company. Also, this approach focuses on creation of a strategy to provide protection to comp any. Enhanced security system refers to the occurring of risk would reduce, which means risk is inversely proportional to the extent of incurred expense. Also, it is important for every organization requires taking up at least some amount of expense to manage risk, and there are some level of risks that may not be reduced(Dey Kinch, 2008). Thus, if the predefined lowest cost, minimum extent of risk which cannot be reduced and all current practices associated to risk prevention are simultaneously considered, then the space in that dimensional area is called discretionary area. References ., P., ., R. (2007). Simulating the Potential Effect of Risk Management on Project Scheduling.Information Technology J.,6(1), 8-13. doi:10.3923/itj.2007.8.13 Adler, T., Leonard, J., Nordgren, R. (1999). Improving risk management: moving from risk elimination to risk avoidance.Information And Software Technology,41(1), 29-34. doi:10.1016/s0950-5849(98)00095-0 Alhawari, S., Karadsheh, L., Nehari Talet, A., Mansour, E. (2012). Knowledge-Based Risk Management framework for Information Technology project.International Journal Of Information Management,32(1), 50-65. doi:10.1016/j.ijinfomgt.2011.07.002 Benaroch, M., Jeffery, M., Kauffman, R., Shah, S. (2007). Option-Based Risk Management: A Field Study of Sequential Information Technology Investment Decisions.Journal Of Management Information Systems,24(2), 103-140. doi:10.2753/mis0742-1222240205 Caron, F., Salvatori, F. (2014). Managing Information for a Risk Based Approach to Stakeholder Management.International Journal Of Information Technology Project Management,5(2), 30-43. doi:10.4018/ijitpm.2014040103 Dey, P., Kinch, J. (2008). Risk management in information technology projects.International Journal Of Risk Assessment And Management,9(3), 311. doi:10.1504/ijram.2008.019747 Pappas, A., Panagiotopoulos, P. (2009). Information Technology risk management in e-commerce: classical and catastrophic risk approaches.IJASS,2(3), 250. doi:10.1504/ijass.2009.027663 Prado, E. (2011). Risk analysis in outsourcing of information technology and communication.JISTEM,8(3), 605-618. doi:10.4301/s1807-17752011000300005 Vinaja, R. (2013). IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing.Journal Of Global Information Technology Management,16(3), 82-84. doi:10.1080/1097198x.2013.10845644 Yokouchi, A. (2007). Introduction of Weather Risk Management Technology in Farm Management.Agricultural Information Research,16(4), 226-234. doi:10.3173/air.16.226