Monday, December 30, 2019

Asian American And Eating Disorders Essay - 912 Words

Asian American s and Eating Disorders Introduction When one thinks of the ideal physique and what it takes to achieve this, most simply go to diet modification and exercise. However when it comes to adolescents, the need to fit in is immediate and often time fast measures are taken to achieve what they consider as the perfect body. Adolescent culture is ever changing but when combined with home cultural views the stress that it can place on a teenager to conform can lead to development of disordered eating. There are few studies on Asian American’s (AA) and their cultural views on weight, however much is being learned. AA’s have always been pen-pointed as being the group that have maintained cultural values through the generations. AA with disordered eating have shown the need to please parents and achieve not only academically but also in appearance (i.e., presenting oneself in a certain way), and this is linking family pride is linked to their children’s achievement and appearance (Tsong Smart, 2015). Even wit h all we know, pathways to disordered eating are complex and have various outliers, and still are not very well understood (Streiegel-Moore Bulik, 2007) Just about all patterns of disordered eating begin with dieting, unrealistic outcomes, and problematic views of the world around (Zastrow Kirst-Ashman, 2016). Eating Disorders (ED’s) Anorexia Nervosa Anorexia nervosa, is a condition that causes those who struggle with weight to go through â€Å"voluntaryShow MoreRelated Eating Disorders, Body Image and Cultural Contexts Essay1306 Words   |  6 PagesEating Disorders, Body Image and Cultural Contexts Although a great deal of early research on body image and eating disorders focused on upper/middle class Caucasians living in America or under the influence of Western ideals, many researchers are realizing that eating disorders are not isolated to this particular group. They are also realizing the differences in body image between occur in different races and genders (Pate, Pumariega, Hester 1992). Recently, several studies have shown that eatingRead MoreThe Relationship Between Ethnicity And Risk Factor For Eating Disorders1721 Words   |  7 Pagesfor Eating Disorders The relationship between ethnicity and eating disorder risk factors is a complex issue. There are many other variables that affect these two ideas, such as socioeconomic status, level of educational attainment, and acculturation. Flaws in studies such as unrepresentative and insubstantial sample size, and participation bias still have yet to be corrected for in order to obtain a more accurate understanding of the role ethnicity and its factors plays in eating disorders. PreviousRead MoreBinge Eating in Non-Western Cultures1038 Words   |  5 PagesLiterature regarding eating disorders in non-Western cultures in general is scarce. Very few studies address disordered eating in cultures outside of the Western and Westernized world. This could be because of the perceived lack of eating disorders in non-industrialized countries or even because there is an overwhelming amount of concern over eating disorders in Western society. However, there have been several studies done on binge eati ng and dietary restraint in non-western citizens and in non-CaucasianRead MoreA New Kind Of Epidemic1476 Words   |  6 Pagesof norms, generally attributed to Western civilizations, seeking to construct this idealized image of what beauty should be. Popular media, intentionally or not, has managed to successfully disseminate all over the globe. The Globalization of Eating Disorders written in 2003 by English professor and feminist philosopher Susan Bordo, makes some strong points that seriously need to be taken into account if we want to identify and subsequently fight to eradicate a variety of psychological problems,Read MoreThe Prevalence, Etiology, And Treatment Of Eating Disorders2893 Words   |  12 PagesEating disorders seem to have become more common during the latter half of the 20th century, during a period of American beauty icons becoming thinner and women’s magazines publishing more articles on methods for weight loss (Garner, Garfinkel, Schwartz, Thompson, 1 980). Dissatisfaction with one’s own body a result of the increasingly thin depictions of female body shapes in the mass media has been mainly attributed to the Caucasian young female population (Striegel-Moore, Silberstein, RodinRead MoreEating Disorders : Anorexia Nervosa974 Words   |  4 PagesI have always been intrigued with eating disorders, particularly Anorexia Nervosa. When I was 18 years of age, my mother questioned whether or not I was Anorexic and she took me to the family practitioner, who then informed me that I was three pounds shy from being considered underweight. I knew I was thin, but I was really thin, but also really proud of my size. In an African American urban environment being thin was related to illness and drug abuse. I was often teased about how thin and fragileRead MoreDID Essay1460 Words   |  6 Pagesthan men. In addition to experiencing separate identities, individuals living with DID may also experience many other symptoms (Dissociative i dentity disorder - children, causes, DSM, functioning, effects, therapy, adults, drug, n.d.). Retrieving and dealing with memories of trauma is important for a person living with DID, because this disorder is believed to be triggered by physical or sexual abuse in childhood. Young children have a pronounced ability to dissociate and it is believed that thoseRead MoreMedia Consumption Of Non Western Countries1414 Words   |  6 PagesNon-Western countries will be analyzed because it has a substantial impact on their eating disorder demographics. The beauty standards in Non-Western countries differ from that of Western countries when observing certain cultures. For instance, rather than slenderness being the predominate factor for the ideal body type, some Non-Western cultures perceive more fuller body types as optimal. According to the article, â€Å"Eating disorders: Across the cultural dimensions,† plumpness is the most desirable and attractiveRead MoreA Study On Eating Pat hology Among Latinas Essay1134 Words   |  5 PagesTHEORETICAL PROPOSITIONS There is a lack of studies that investigate the eating pathology among Latinas even though there is evidence that a binge eating component (i.e. binge eating disorder, bulimia nervosa) is more prevalent among Latinas compared with other races. For those who are engaged in binge eating tend to have unrealistic high expectations for themselves, which often are difficult to achieve. When the individual, in this case a Latina, has fallen short of these high expectations,Read MoreEating Disorders Among Different Cultures: Annotated Bibliography1769 Words   |  8 Pagesthe relationship between acculturation to the mainstream U.S. Society and eating and body-related concerns among Mexican American women. Journal Of Counseling Psychology, 56(3), 430-440. doi:10.1037/a0016382 Discusses how ethic identity, familism, and enculturation serve as protection from issues of acculturation to mainstream U.S. society, specifically eating and body related concerns faced by Mexican American women. Results reveal that adherence to family values may serve as protection

Sunday, December 22, 2019

Persuasive Essay Same Sex Marriage - 1810 Words

The United States of America; the very first thought to come to mind should be a nation of peace and equality. But in the big picture, it’s not. We are living in a nation filled with racism, sexism, hate, and homophobia. There are 39 U.S. states that have banned same-sex marriage, 5 that allow civil unions between same sex couples, and 6 that allow same-sex marriage, along with DC. However, due to DOMA (Defense of Marriage Act), the federal government does not recognize same-sex marriage in these states. According to the 2010 Census, there were 646,000 same-sex couple households, and 115,064 of those couples have children. Same-sex marriage (also called gay marriage) is a legally or socially recognized marriage between two persons of the†¦show more content†¦According to a report issued by the Census Bureau, 18.2% of married women aged 15 to 44 are childless (Bachu, 4). Are we to tell these people that their marriages are not truly valid because they have no children, whether by choice or physical limitations? Should these marriages be legally nullified? Should we start questioning all who want to marry of their intent to bear children? Most would respond to these questions in the negative, because that would be an unacceptable intrusion by the state into their privacy as individuals. If no one has ever thought to ask heterosexual couples whether or not they plan to have children and carry out this specific purpose of marriage, it should not be a consideration that inhibits the ability of same-sex couples from entering into the institution of marriage. Many proponents of same-sex marriage, especially those within the gay community, argue that they should be allowed access to the institution of marriage in order to have the rights and benefits of a married couple. Without these rights, same-sex couples face many hardships that straight married couples do not have, or benefits they take for granted. For example, a same-sex couple would have diffic ulties with visitation rights if one of them were to become hospitalized. Or, if one person owned the house the couple lived in and that person died, the other would have no right to the house and would most likely haveShow MoreRelatedPersuasive Essay On Same Sex Marriage1368 Words   |  6 Pages Marriage is the legal and formal recognition of the union of a man and a woman. This simple definition has been modified several times.In the past, marriage was allowed only through the union of the same race, such as a white male and white female, black male and black female, however, now, it is a battle of allowing the marriage of the same-sex. The fight is not only to help protect rights for same-sex couples, but, also, to interracial couples, who have been experiencing racism and discriminationRead MorePersuasive Essay On Same Sex Marriage1232 Words   |  5 PagesOpposite Sex Marriage The concept of marriage has been around for thousands of years. Marriage is the conjoining of two people who love each other. People get married because they love the other person and can see themselves living together for the rest of their lives. Marriage has always been between man and woman. However, now days people in the same sex want to get married. People do not know what to think about gay marriage, which is why it is a controversial subject in todays cultureRead MorePersuasive Essay On Same Sex Marriage776 Words   |  4 Pages The issue of same sex marriage is an arguement that everyone has heard before. Some states, like California, argue incessantly about it; they pass and repeal the same few bills and laws dozens of times before anything gets done. In other countries, Canada for example, it is legal universally. Not allowing same sex marriage is a violation of constitutional law (Gannon). The constitution says that we all have equal rights, yet part of the population isn’t allowed to marry the people they loveRead MorePersuasive Speech: Why You Should Oppose Same-Sex Marriage Essay examples1267 Words   |  6 PagesPersuasive Speech: Same sex marriages General Purpose: To persuade Specific Purpose Statement: To persuade the audience to agree that same-sex marriages should not be legal Central Idea: The audience will realize the vices and social disorders created by legalization of same sex marriages in order to preserve marital norms INTRODUCTION I. Same sex marriage is a trending topic if not a trendy one. Countries throughout the globe are pressured with the question of homosexuality beingRead MoreMarriage Equality2061 Words   |  9 PagesSame sex marriage is one of the most controversial trends that appear in the world today. In today’s society most of us are taught that a marriage should be a union between a man and a woman, as well as, same sex relationships being a sin because it is looked down upon by God. Despite the criticism of gay marriage many states such as Massachusetts, California, New York, and Oregon have made same sex marriage legal. In the fight for gay marriage political essay such as â€Å"Gay â€Å"Marriage†: Societal Suicide†Read More Let Gays Marry and Leave Marriage Alone Essay1278 Words   |  6 PagesI will summarize some of the key points from the essay, Let Gays Marry, by Andrew Sullivan, and the essay, Leave Marriage Alone, by William Bennett. Some of these main points are taken from mutual beliefs of both authors and others are derived from the opposing opinions of the two. The first summary of Andrew Sullivan’s essay is a reflection of Andrew Sullivan’s stance of the issue. The original essay was in favor of allowing same sex marriage in America. My summary will dictate some of theRead More Equal Rights for All Essays918 Words   |  4 PagesEqual Rights for All Gay marriage has always been a subject of great controversy. Andrew Sullivan addresses this issue in his persuasive essay entitled â€Å"Let Gays Marry.† Sullivan’s essay appeared in Newsweek in June of 1996. Through his problem/solution structure of this essay, Sullivan uses rhetorical appeals to try and persuade the audience to accept gay marriage as a natural part of life. Sullivan, an editor of The New Republic, also wrote Virtually Normal: An ArgumentRead MoreI have been a student in English Composition II for one semester in which I have learned many700 Words   |  3 Pageswhat my claim is. After the culmination of five essays, three of them have caught my attention the most and in my opinion they show my improvement as a writer. The three essays, which will be forming my portfolio for this semester, dealt with articles from Times magazine and coverage from ABC and FOX news. The topics of my three essays are different , but they all show the relation between the type of claim and how the claim is made. The first essay dealt with the disappearance of the MalaysianRead MoreSame-sex Marriage and Jordan1107 Words   |  5 Pagesequal protection clause that states â€Å"No state shall †¦deny any person within its jurisdiction the equal protection of the laws (CITE). Our country was founded on the principle that all people should be treated equally. Everyone should be guaranteed the same freedoms and rights no matter what gender, ethnicity or sexual orientation. One group that has historically and continuously been discriminated against is homosexuals. Author Jeff J ordan in his article â€Å"Is it Wrong to Discriminate on the Basis of HomosexualityRead MoreWhen an author writes a piece of work, they go through several drafts before they feel that their1300 Words   |  6 Pageswriter is grammar. I tend to misuse commas a lot, which on my essays were labeled â€Å"comma splices.† In the first few essays that I wrote, I had a few of these comma splices. For example in my summary essay I wrote, â€Å"Julie spent two years in Indonesia studying and performing, she had become one of the family in the village where she stayed.† That comma should not have been put there. I had the same comma splice problem in my critique essay. I wrote, â€Å"She partook in an experimental problem that only

Saturday, December 14, 2019

Cola Wars Continue Coke and Pepsi in 2010 Free Essays

Cola Wars Continue: Coke and Pepsi in 2010 A case discussion note January 17, 2012 1. Historically, why has the soft drink industry been so profitable? Historically, the soft carbonated soft drink (CSD) industry has been valued at $74 billion in the United States. In order to understand the reasons why the industry has been hugely profitable despite the ‘Cola Wars’, an examination of the CSD industry with Porter’s five forces analysis will be conducted. We will write a custom essay sample on Cola Wars Continue: Coke and Pepsi in 2010 or any similar topic only for you Order Now As market leaders, the analysis will be centred on both Coke and Pepsi (hereafter â€Å"CP†). Threat of new competition: Barriers to entry in the CSD industry are extremely high and there are various factors to support this. Firstly, both CP spend gargantuan amounts of funding of advertisement. According to Exhibit 8, in 2009 alone, both CP spent $234 million and $145 million respectively in advertising expenditure. Therefore, while the actual initial capital investment needed to start up a CSD company is relatively economic, the amount required by new entrants to continually push their brand and gain visibility is extremely high. Due to these extreme levels of expenditure on marketing and brand awareness, the two cola companies have accrued exceedingly high levels of brand equity and consumer loyalty worldwide. As such, even with sufficient funds for start-up and subsequent advertising, new entrants are unlikely to sway persisting consumer tastes. Because of the sheer scale of both CSD companies, both CP have pre-existing contracts with their bottlers, thus limiting their bottlers’ ability to produce similar products with rival brands. Additionally, through the use of extensive consolidation through the use of acquisitions and re-franchising of their bottlers, both CP have made it essentially impossible for new entrants to find bottlers for the distribution of their drinks. In the event that the new entrants decide to build their own bottling plants (which is quoted to potentially cost hundreds of millions in the case), they would only find themselves facing insurmountable fixed start-up costs in addition to the ridiculous amount they have to spend on marketing. Even if new entrants somehow found a way to produce and market their drinks, the incumbents’ (CP) far-reaching networks would make it impossible for them to secure any form of distribution channels. Shelf spaces in supermarkets were dominated by CP because supermarkets were given a cut of the profit generated from the sales of their products. These cuts accumulate to a significant amount of profit-generation for the retailers. Additionally, combined, CP owned 89% of national pouring rights. The fact that the incumbents had exclusivity in both supermarkets, fountain outlets, and other forms of retail channels would make it almost impossible for new entrants to distribute their products. Bargaining power of consumers: Historically, the two main customers of soft drink producers were supermarkets (29. 1% of distribution) and fountain outlets (23. 1%). In general, retail outlets have been unsuccessful in asserting much bargaining power over the industry. In part due to the level of fragmentation as well as their reliance on CP as drivers of customer traffic. Longstanding contracts and acquisition of fountain outlets also serve to weaken consumer’s bargaining power. Bargaining power of suppliers: Major suppliers for CP provided commodities in the form of cans, sugar, bottles, etc. These products were highly homogenous and could be substituted easily. The aluminium can industry, in particular, depended on firms like CP because they were majority buyers. Due to such dependence, suppliers asserted little or no bargaining power over the industry. Intensity of competitive rivalry: Even though CP are essentially a duopoly in the CSD industry, competition between the two have traditionally centred on marketing efforts like advertising, new products, and promotions rather than pricing. Their rivalry, historically, was also in a market with consistent growth. As such, profits were not adversely affected even though their rivalry was highly documented and publicised. Threat of substitutes: There are a number of alternative substitutes for soft drinks and these include beer, bottled water, tap water, juices, tea, coffee, wine, powdered drinks, milk, and distilled spirits. Yet, according to Exhibit 1, Americans, historically, consistently drank more CSDs than any other beverage. As such, the threat of substitutes affecting CP’s profitability was limited. To further nullify the effects of substitutes, they also produced and promoted their own range of substitutes to reduce potential losses. 2. Compare the conomics of the concentrate business with that of the bottling business. Why is the profitability so different? Using data from Exhibit 4, we are able to see that the operating income of a concentrate producer is 32% of its net sales while that of a bottler is only 8%. The reason the bottling business earns significantly lesser than its concentrate counterpart can be attributed to two main factors – significantly higher cost of goods sold (COGS) and the existence of selling and delivery expense. We see that the COGS of a bottler are at 58%, much higher than the concentrate producer’s 22%. The reason for this difference is predominantly due to Master Bottler Contracts established to allow for a certain level of â€Å"price fixing† on the concentrate producers’ part. Additionally, as mentioned previously, raw materials for concentrate producers are abundant and homogenous; hence COGS for them will be significantly lower. Also, the bottler is in charge of selling and delivery, and hence incurs an 18% selling and delivery expense while there is no such expense on the concentrate producer’s part. These reasons explain why the concentrate business has a more profitable business model than the bottling business. . How has the growing popularity of non-carbonated soft drinks influenced the industry? Non-carbonated soft drinks have been gaining popularity in the past decade, increasing from 13% in 2000 to 17% in 2009. This growing popularity has resulted in the generation of both local and global strategies by CSD firms unwilling to lose out on the budding market. In order to capitalize on the opportunity, both CP greatly expanded their lines of beverages to include sports drinks like Gatorade and tea-based drinks like Lipton. Majority of drinks introduced during this time were non-CSDs. Besides creating new products, Coke also aggressively gained market share through acquisitions and extending their fountain services to include coffee and tea. The non-CSD opportunities globally were also aggressively pursued by companies like CP. To gain localized expertise, however, the soft drink companies did not merely think to introduce new products into foreign markets. Instead, they resorted to acquiring the respective market leading, non-CSD companies in the countries they chose to invest in. The companies of choice were usually major fruit juice producers. Beyond takeovers, CP also tried their hands at innovation and localization of beverages. These mainly came in the form of integration of local drinks (e. g. blended green tea with Sprite) or utilization of local ingredients in the production of new drinks (e. g. beverages with Chinese herbs). The emergence and rapidly growing popularity of the non-CSD has garnered much retaliation from major players in the CSD industry. In order to get their share of the pie, they have formulated expansion strategies both locally and globally which seem to center around acquisition. How to cite Cola Wars Continue: Coke and Pepsi in 2010, Essays

Friday, December 6, 2019

Graphs Representing Security Relationship -Myassignmenthelp.Com

Questions: What Do You Mean By Cyber Security? What Are The Major Effects Of Cyber Crimes? What Are The Challenges Faced During Security Breaches? What Security Measures Are To Be Undertaken For Securing Systems? Answers: Introduction In the modern world, there is always a problem regarding viruses and malwares which is the leading cause for all types of computational problems. For a long period of time, these types of problems were not noticed and unethical users continued their works. Until the recent discovery of the internet and the virtual world, various awareness methods have been undertaken to help secure the processes. Along with storing data from the internet, devices now-a-days could perform specific options with ease. This resulted in an increasing population of hackers who wanted to access this information along with get resources from these devices. This is the very definition of cyber crime. Research aims and objectives The main aim for this research is to explore the impacts of cyber security on the lives of common people. In addition, the aim of this research paper also includes the identification of the processes by which cyber crimes exist and the necessary steps that can be undertaken for mitigating them. The main objectives of the research paper are: To determine the impact of cyber security To determine the types of attacks which make up for cyber crime To influence awareness for addressing cyber security Research scope Awareness against cyber crimes are increasing in a rapid rate across the world. However, there are various devices being made generally which have security flaws and is the leading contributor for cyber crimes. This is the main scope of this research paper which utilizes the information available and then mitigates the problem associated with cyber security. It can be said that the scope of cyber security is a large portion and the mitigation strategies are a few which is mainly dependent on the hardware and the software of the systems. The attacks are usually targeted towards the underlying structures that provide facilities for communications, electricity and transport so that it can be possible to bring down the entire network and bring the place to a halt. Literature review Fraudulent tools and techniques are becoming easily accessible in the internet which is leading to an increase in the cyber crimes. Ransom wares are one such program which affects the integrity and the security of a system. These types of malicious software encrypt any files in a system. When the user of the system tries to open the file, a message is shown asking for payments. This is the most common type of attack considered in case of any ransom wares. These payments are doubled for each 6hours delay in payment (Gordon et al., 2015). As a result, the files and the system become un-recoverable. These programs mainly destroy the faith of a user for recovering the files so that a payment will be made. In addition the payment address is always in bitcoin such that it cannot be tracked. Cyber threats also arise due to multi-vectored attacks. This type of attack provides the attacker access to the various levels of an organization in order to provide information access. The scam of Leoni AG was a big example of multi-vector attacks which led to a loss of 40 million (Liu et al., 2015). Similarly, identity theft is another type of cyber crimes which involves cyber crime. This type of attack is usually followed by stealing identities from users. This not only helps them to get access to their financial accounts but also lets the attacker get access to various channels and does unethical treatments in place of the victim. According to a research that was conducted by Javelin Strategy and Research, it was seen that during the year 2014, 12.7 million customers lost around $16 billion due to the theft of identity. Cyber crime is constantly being committed by using internet and the computers by addressing the advancements in technology. These crimes are mainly due to denial of service attacks (Buczak Guven, 2016). In addition, botnets are also other types of malicious tools which help in hacking procedures. These tools and other malicious programs are mainly sourced from the underground black market which is the root cause for such actions. Threats and vulnerabilities The major threats in using these types of activities can range from large-scale impacts to small-case ones. Hackers get unethical access to systems which in turn lead to information theft. These hackers also try to act as spies where they sell all these information available in return for money or other resources (Cunningham Zissman, 2016). In addition, governments try to get information from these hackers regarding other countries. This results in an endless cycle of hacking related activities. Moreover, the attackers also do these activities for helping increase the level of warfare among nations. The attack that occurs mainly utilizes the vulnerabilities present in the operating system of the devices. As a result, the security breaches are mainly due to this reason. The main use of information systems result in the formation of a constant need for protecting the systems from attackers (Noel et al., 2015). In addition, inside jobs like employees having access to the systems can disclose the information related which will lead to potential threats. Impacts Attacks due to unethical access are mainly used to compromise the confidentiality and integrity of the system. These attacks are used to steal the personal information from various aspects including financial and physical resources resulting in gaining of various parameters which the victim is usually unaware of (Gil, Kott Barabsi, 2014). In a similar manner, the denial-of-service attacks are also will also be used by attackers to prevent access to the systems unless their demands are met. The impacts of cyber attacks can range from small-range attacks to large-scale attacks. The small-scale attacks can include disruptions in the general activities like hacking of phone or social media accounts (Holm et al., 2015). In a similar manner, large-scale attacks may range from disrupting the services in a large organization or causing massive data breach from a government agency. Figure 1: Cyber security awareness (Source: Ben-Asher Gonzalez, 2015, pp 55) Research design and methodology This section of the research paper includes an analysis of the research design methodologies that will be used in this paper. The method of collecting data in a sequential manner is known as research methodologies (Mackey Gass, 2015). The research methods are used to integrate various hypothetical issues and trial techniques which help in the selection of the accurate records to be used in the research. For conducting this research, the researcher has utilized various researching methods. In this research paper, the researcher has undertaken the positivism ideologies such that the research can be successfully carried out. In addition, the research approach is selected to be deductive in nature. Research philosophy The concept of gathering data and analyzing it is termed as research philosophy. The research philosophy consists of two different types of beliefs, the concepts of doxology and the concepts of epistemology (Taylor, Bogdan DeVault, 2015). Out of the three different types of research philosophy, interpretivism, realism and positivism, the researcher has applied the positivism philosophy for this research paper. This is mainly because in the positivism aspects, the research is conducted by using present information in the internet. As a result, a successful research is carried out by considering all the analyzed data. Figure 2: Research philosophy (Source: Silverman, 2016, pp 39) Research approach The research approach is defined by a set of methods which is utilized in case of detailed analysis of the information available from various sources. In addition, the detailed methods of analysis and collection are utilized in this section. As mentioned by Smith, (2015), the adopted research approach is the utilized for considering the nature of the problem. This approach is divided into two different categories. These are the data collection and the data analysis methods. The research approach is divided into two different types. These are the deductive and the inductive approach. However, in case of this research paper, the deductive approach is considered for analysis. Figure 3: Research approach (Source: Knobe Nichols, 2013, pp 42) Data collection methods The process of data collection involves collecting the information which will help in data analysis for the research paper. There are mainly two types of data collection processes. These are the primary and the secondary methods of collecting data (Mackey Gass, 2015). The primary method of data collection is utilized by conducting researches, surveys or other respondent related programs. Similarly, the secondary source of data collection is utilized in collecting information from journals, e-books or other web related sources. For the analysis conducted in this research paper, the secondary sources will be considered. Data collection methods For collecting the information from various sources, the researcher included various online informative sources. These are online journals which can be accessible from the internet. In addition, websites are also other sources of information which clearly depicts the need for addressing cyber security. Sampling and sample size In this paper, the researched have selected the simple random probability sampling processes. This process is defined by setting up equal probability such that all the files are chosen in a random manner. This helps in assigning the process of randomness to the sample sizes (Clemence et al,. 2014). The sample size includes the number of online sources that will be used for the analysis made in this research. Data analysis techniques This paper has included the qualitative data analysis methods. This type of research method is more focused on the quality of the information rather than the quantity of it. The interviews and observatory cases are considered to be a part of the qualitative data analysis. This information is considered to be descriptive and is usually comprised of images and objects. According to Clemence et al,. (2014), the qualitative data analysis is usually comprised of interpretive philosophies of the researchers. The qualitative data analysis helps in examining the complex questions that helps in answering the research based analytical perceptions. Variable specification For the conduction of research related to cyber security, there can be two different types of variables to be considered. One is the dependent variable and the other is the independent variable. The independent variable does not depend on any parameter while the dependent variable depends on the independent variable. In case of the impacts of cyber security, impacts are the dependent variable which depends on the issues in cyber security. Research limitations There are various research limitations which imposed problems while analysis. As the collection of the data is involved from other sources, there will be no ethical demands of these sources claiming for objections. This is the first limitation which is followed in case of the research. Another research limitation is the conduction of the data analysis process. The collection of information needed much time as data regarding cyber security is not easily to be found. Moreover, the various effects of the selective hacking programs can only be theoretically determined as the practical use cannot be done. Research plan Figure 4: Research plan (Source: Created by the author) Conclusion Thus, it can be concluded from the analysis conducted in this research paper is that cyber security is an important aspect. It is an important aspect which helps to utilize the various threats and vulnerabilities so that they can be fixed. This paper lists all the various types of risks associated to cyber security. In addition, the various types of attacks that can be possible are also covered in this paper. Moreover, this paper lists the research methodologies that are to be used for making a successful data analysis of the topic mentioned. Lastly, this paper also includes a discussion of the secondary data collection methods and the qualitative method of analysis. References Ben-Asher, N., Gonzalez, C. (2015). Effects of cyber security knowledge on attack detection.Computers in Human Behavior,48, 51-61. Buczak, A. L., Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection.IEEE Communications Surveys Tutorials,18(2), 1153-1176. Carr, M. (2016). Publicprivate partnerships in national cyber?security strategies.International Affairs,92(1), 43-62. Cavelty, M. D. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities.Science and Engineering Ethics,20(3), 701-715. Clemence, A., Doise, W. Lorenzi-Cioldi, F., (2014).The quantitative analysis of social representations. Routledge: Routledge. Cunningham, R. K., Zissman, M. A. (2016).Cyber Security Research at Lincoln Laboratory. MIT Lincoln Laboratory Lexington United States. Gil, S., Kott, A., Barabsi, A. L. (2014). A genetic epidemiology approach to cyber-security.Scientific reports,4. Gordon, L. A., Loeb, M. P., Lucyshyn, W., Zhou, L. (2015). Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb model.Journal of Information Security,6(1), 24. Gupta, B., Agrawal, D. P., Yamaguchi, S. (Eds.). (2016).Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global. Holm, H., Shahzad, K., Buschle, M., Ekstedt, M. (2015). P $^{2} $ CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language.IEEE Transactions on Dependable and Secure Computing,12(6), 626-639. Hong, J., Liu, C. C., Govindarasu, M. (2014). Integrated anomaly detection for cyber security of the substations.IEEE Transactions on Smart Grid,5(4), 1643-1653. Kent, A. D. (2016). Cyber security data sources for dynamic network research. InDynamic Networks and Cyber-Security(pp. 37-65). Knobe, J. Nichols, S. eds., (2013).Experimental philosophy (Vol. 2). Oxford University Press. Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., Jones, K. (2015). A survey of cyber security management in industrial control systems.International journal of critical infrastructure protection,9, 52-80. Liu, Y., Sarabi, A., Zhang, J., Naghizadeh, P., Karir, M., Bailey, M., Liu, M. (2015, August). Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents. InUSENIX Security Symposium(pp. 1009-1024). Mackey, A. Gass, S.M., (2015).Second language research: Methodology and design. Abingdon: Routledge. Noel, S., Harley, E., Tam, K. H., Gyor, G. (2015). Big-Data Architecture for Cyber Attack Graphs Representing Security Relationships in NoSQL Graph Databases. Silverman, D. ed., (2016).Qualitative research. London: Sage. Smith, J.A. ed., (2015).Qualitative psychology: A practical guide to research methods. London: Sage. Taylor, S.J., Bogdan, R. DeVault, M., (2015).Introduction to qualitative research methods: A guidebook and resource. New Jersey: John Wiley Sons

Friday, November 29, 2019

Reading the American Past, Volume II From 1865 Selected Historical Document

The introduction: the fundamentals of the postwar period While analyzing the Lessons of World War II by Marshall, there is a need to highlight the fundamentals of the period. So, one is to keep in mind that the postwar period was characterized by successful reconstruction of the economies. It seems that representative institutions appearance was the greatest as well as the most successful event of the postwar period.Advertising We will write a custom essay sample on Reading the American Past, Volume II: From 1865: Selected Historical Document specifically for you for only $16.05 $11/page Learn More The Marshall Plan is considered to be the key aspect of the success Western Europe experienced. Thus, this idea is confirmed by DeLong Bradford and Barry Eichengreen. In other words, one can state that Marshall’s Plan was of great significance for the prosperity of Western Europe. Of course, the fact that Marshall’s program had a great success is recognized to be indisputable; however, taking into account the points Marshall’s Plan included, one can state that the importance of the Plan is evident when analyzing alleviating resource shortages. Generally, the main purpose of Marshall’s Plan was to eliminate hunger, and poverty. There is also a need to add that working economy revival was the key aim of the program. The importance of Marshall’s Plan It is necessary to point out that fear of financial chaos was regarded as the principal problem in Europe. For this reason, one can make a conclusion that this fear had to be solved with Marshall’s program. On the other hand, nobody can neglect the impact of the psychological affect on people all over the world. Generally, they say that the reconstruction of Western European countries was much more important than performance of the duties of the East Europeans. Moreover, Cox and Kennedy-Pipe are of the same opinion. While speaking about Dwight  D. Eis enhower’s farewell address, one is to keep in mind that this speech became really legendary. It seems that Eisenhower’s speech had a great impact on the interdependence between the military and defense industry. On the other hand, the role of the universities can’t be neglected. The most important point, which is to be discussed, is the way the power had to be used to protect the interests of the whole world. So, Eisenhower was sure that crises can’t be avoided; so, for this reason, he recognized the importance of the solutions to resolve various contradictions. The principal aim of the so-called military complex was to establish public policy in relation to American democracy. In other words, the main aim of Eisenhower’s speech was to let know beforehand about dangers of the product of military establishment.Advertising Looking for essay on history? Let's see if we can help you! Get your first paper with 15% OFF Learn More The conclu sion: the U.S. economy While analyzing Johnson’s book and taking into account the above-mentioned points concerning the postwar period, one can make a conclusion that economic state of the USA became more stable. It can sound strange; however, the structural break in the economy of the USA became a necessary step to stabilize its financial state. When speaking about Marshall’s Plan, one is to keep in mind that Marshall was not the first Western leader who proposed to use American dollars for economic stabilization of Europe. However, he was the only person who led the way. In other words, the peculiar feature of Marshall’s Plan was economic recovery of the whole world. It was obvious, that without his plan, there could be no political stability in the world. On the other hand, without Marshall’s program, peace could be also under the threat. Works Cited Johnson, Michael. Reading the American Past, Volume II: From 1865: Selected  Historical Documents, 20 08. Web. https://www.amazon.com/Reading-American-Past-Historical-Documents/dp/0312459688. This essay on Reading the American Past, Volume II: From 1865: Selected Historical Document was written and submitted by user Karlee Pittman to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Monday, November 25, 2019

Importance of Communism essays

Importance of Communism essays In the eyes of many individuals communism is seen as the route of all evil and the worst choice for a system of government. Many countries including the United States have spent a lot of time, money and effort in order to prevent the spread and influence of communism throughout the world. Even though freedom is associated with democracy and control with communism, there are many instances where certain people need to be governed under a communist regime. In the eyes of such figures as Karl Marx and Friedrich Engels, communism is nothing more than abolition of private property. Which means that the government controls the state. These two as well as many others see communism as the only fit way to govern and in some cases this is true. In one of the readings Karl Marx makes a very good argument in showing how over history there have been social rankings and control, but it was not labeled as communism. He says in the earlier epochs of history we find almost everywhere a complicated arrangement of society into various orders, a manifold gradation of social rank. This proves that people are accustomed to living in a world where certain individuals rule and the citizens or people obey their rules or laws. A great example of where communism works and is followed is in both Russia and China. Without the rule under communism both countries would probably be in total chaos. The people are accustomed to following orders and being taken care of by the government. The country survives through the government and if the people had to provide for themselves an endless amount of problems would occur, such as starvation, poverty, and chaos. From the reading anyone can see the positives of communism and its impact on cert ain societies. Both Karl Marx and Friedrich Engels prove that communism is necessary and is helpful in containing governments that are not good for the people. ...

Thursday, November 21, 2019

Summary Essay Example | Topics and Well Written Essays - 750 words - 27

Summary - Essay Example That is how Huxley views the society functioning based on the ideals of a â€Å"Technocracy† – society with lost spiritual belonging and personal transcendence (Miller 2011). Further, the author explains that a technopoly is a more radical concept than technocracy and explains it from the Postman’s perspective, whereas Huxley’s society in the novel is good example of a technopoly. Also, there is analyzed the concept of black-and-white standardization and compared to the Huxley’s case system. Based on this approach the postmodern society becomes more and more limited because of standardization. Miller (2011) provides several examples to illustrate the existing problem, including the problem of standardization of education. Putting of children into groups based on the criteria of their age, and teaching them to learn for good grades as a key factor to career success is one of the problems that the author has identified to be similar to the Robinson’s video and cast idea (Miller, 2011). The author is challenging the established and widely accepted formal working hours and its effectiveness to the overall organization, including the employee, the boss (entrepreneur) and the client. The problem raised in the article lies in the fact that people tend to spend their time at work even when they have done all the tasks. Many office workers spend the last hours at work by surfing the Internet or re-reading emails (the so called â€Å"face time†) as they don’t want to be perceived as idlers. Pozen (2012) explains this behavior can be transcribed as ignoring or even discouraging efficiency in the workplace. Another concern raised here was the common perception of senior managers that people who are working till late hours and during the weekends are â€Å"reliable†, â€Å"dependable†, dedicated† and â€Å"committed† employees (Pozen, 2012).

Wednesday, November 20, 2019

Religion Essay Example | Topics and Well Written Essays - 750 words - 9

Religion - Essay Example According the Durkheim, the Orthodox Church is more likely to stress on the importance of conserving old traditions, while the teachings of the Protestant used to emphasize freedom and autonomy as the greater priority. The Protestant Church separated from the Roman Catholics on Reformation, and tends to view change and an occasional deviation from traditions as a positive change (Huismans, & Schwartz, 1995). There are a few distinctive differences in the teachings of Roman Catholics, Orthodox and the Protestant Church, but they revolve mostly around the different values and belief that each of these sects prioritize (Huismans, & Schwartz, 1995). For example, as the Protestants view development and success over stagnancy. While Roman Catholics and Orthodox Church both give more importance to not letting go of the old traditions, through which humankind initially learned about and sustained Christianity. These facts may point out the blatant differences, which can be found for each, bu t meanwhile also show that each has its own value-based teachings, none of which can be objectively proved more correct than any other. The understanding that Orthodox Church, as the name suggests, promotes the adherence to traditional ceremonies and worship, while the Protestant Church encourages change, is correct. While these two sects operate on polar beliefs as far as the importance of conservatism is concerned, it is important to note that religious leaders preach the importance of some values while perhaps shunning the value of other beliefs. This shunning is not, perhaps done voluntarily, but does result in the matter of the teachings of Christianity turning from objective to subjective, as each sect is taught to emphasize a difference belief by their leaders. As Weber pointed out, â€Å"Calvinist Protestantism promoted and supported industrialization in western Europe by influencing believers to emphasize wealth, success, ambition, and

Monday, November 18, 2019

Individual Case Assigment Essay Example | Topics and Well Written Essays - 1500 words

Individual Case Assigment - Essay Example Since Liemandt has built the company on the principle that a businessperson must be willing to take risks and be innovative, their new employees technical skills learning usually begin in a model of brainstorming and discussion. By putting their heads together, the TU help new Trilogy employees share ideas and learn all sorts of complexities in programming. They acquire technical expertise and skills in this manner, and in many cases, come up with something new for Trilogy. While learning through sharing of ideas, TUers also undergo technical training dubbed â€Å"tech track.† Here. TUers learn core skill, which include software testing methods and java programming. Liemandt provides a challenge and demonstrates how they can come together as a team and achieve a common objective. He makes sure that they are able to work as a team by organizing social activities and teams building activities such as taking them to Las Vegas. Because the culture of the business has been willingn ess to take risks, he always plays a game with them to drive home his point. He plays L2K with them to encourage them to be risks takers as he considers the organization was born out of risk taking. Another change that new Trilogy members learn in the TU teams is the organization values. There are section â€Å"leads† instil in the TU teams how the company operates and how it relates with its customers. In terms of how well a new TU team of employees learn technical skills, values and culture, one can observe that Liemandt has barred manager from involving any new team during their training periods until they are assigned to them. This way, the new team has all the time to learn about Trilogy as much as possible. The TU policy, consequently, ensure that a new team is able to concentrate on learning new technical skills. Such freedom and Liemandt’s protection policy makes sure that the team learns well about the culture and values of the company and change to adapt to i ts needs. The fact that the team is separated from the other departments also helps in making sure that there is clear communication in the team. It also ensures consistency in all instructions given by the selected As Kurt Lewin observes, the more one feels the necessity for change, the more there is the motivation to do it. Liemandt may be observed to have developed an unfreezing stage where he went on an aggressive search for new skills for to start his idea of the TU team. His Force Field Analysis presented him with factors for change although he knew that doing so was a risk. Therefore, one can say that although TU helps new Trilogy members learn skills, values and culture of their new organization, the current state is that the program may he headed towards a lag phase. The future state of the organization should be one in which emerging issues about the TU team is addressed as a matter of concern (Burnes 983). As assessment of the effectiveness of TU in its first five years f or the organization can be examined on the following manner. First, Liemandt formed TU programs on realizing that he had a vision, but which he saw that the old employees might not embrace. This is why he got involved with the first TU team as the first teacher although he had neither plan nor curriculum. From the start of the program to the end, one can say that TU was ultimately effective for the organizat

Saturday, November 16, 2019

Importance Of National And Organisational Culture Management Essay

Importance Of National And Organisational Culture Management Essay With the recent acquisition of Nexen Inc. by CNOOC Limited, the problem of managing cross cultural challenges arises. This is because of the cultural differences between China and Canada which both companies represent. This management report addresses the envisaged challenges of national and organisational culture arising from CNOOC acquisition of Nexen, by applying Hofstede cultural models. The report commences with introduction, followed by background of CNOOC acquisition of Nexen. It also discusses meaning and importance NC and OC culture; it then discusses the challenges and management strategies. It would conclude and make recommendations on how to mitigate the challenges. WORD COUNT: 2,498 PRESENTED TO: MS. Gillian Pallis CONTRACT CONCERNING PLAGIARISM I have read the code of practice regarding plagiarism contained in the students introductory Handbook. I realize that this code governs the way in which the Centre for Energy, and Mineral Law and Policy regards and treats the issue of plagiarism. I have understood the code and in particular I am aware of the consequences, which may follow if, I breach the code. I also authorize the centre to scan the e-copy of my research paper through the plagiarism detection software to detect plagiarism. SIGNED: ___________________________________ Date: TERMS OF REFERENCE This is a report by 110024120 an MSC student in International Oil and Gas Management, University of Dundee, Centre for Energy, Petroleum Law and Policy (CEPMLP). The report has been prepared exclusively for and at the request of the Senior Strategy Team of CNOOC Limited to address potential management challenges to the continued effective control of business arising from the acquisition of Nexen Inc. This report is focused on the perspective of delivering suitable management practices in meeting the envisaged challenges. The aim of the report is to present a critical and informed analysis of appropriate managerial strategies and practices for the challenges of national and organisational culture differences in post-acquisition performance. It concludes with some recommendations for consideration by the Senior Strategy Team of CNOOC and Nexen. TABLE OF CONTENTS TERMS OF REFERENCE 2 TABLE OF CONTENTS 2 LIST OF ABBREVIATIONS 4 KIFs Knowledge Intensive Firms 4 KIWs Knowledge Intensive Workers 4 CHAPTER ONE 5 1. INTRODUCTION 5 CHAPTER TWO 6 2. BACKGROUND OF CNOOC ACQUISITION OF NEXEN 6 CHAPTER THREE 7 3. MEANING AND IMPORTANCE OF NATIONAL AND ORGANISATIONAL CULTURE 7 CHAPTER FOUR 8 4. THE CHALLENGES OF NATIONAL AND ORGANISATIONAL CULTURE 8 4.1. HOFSTEDE FOUR DIMENSIONS MODELS FOR NATIONAL CULTURE 8 4.2. HOFSTEDE SIX DIMENSION MODEL FOR ORGANISATIONAL CULTURE 9 4.3. ANALYSIS OF THE MODELS AND CHALLENGES OF NC AND OC DIFFERENCES 10 4.4. STRATEGIES FOR MANAGING CULTURAL CHALLENGES 11 13 13 13 13 13 CHAPTER FIVE 13 5. CONCLUSION 13 CHAPTER SIX 14 6. RECOMMENDATION 14 BIBLOGRAPHY 15 APPENDIX 18 HOFSTEDS CULTURAL INDEX, SCORES FOR SELECTED COUNTRIES 18 LIST OF ABBREVIATIONS NC National Culture OC Organisational Culture NXY New York Stock Exchange KIFs Knowledge Intensive Firms KIWs Knowledge Intensive Workers CHAPTER ONE 1. INTRODUCTION CNOOC Limited made global headlines on July 23, 2012 when it announced the acquisition of NEXEN, a Canadian based oil and Gas Company at the cost of $15.1 Billion. The acquisition is seen as Chinas largest Oil and Gas Company overseas acquisition Lauren (2012). NEXEN was founded in 1971 and is headquartered in Calgary, Canada. Nexen is a global energy company and is listed on the Toronto and New Yorks stock exchange under the symbol of NXY (www.nexeninc.com). Nexen is strategically located in different regions of the world; it has over 3,067 employees that add value for shareholders through successful oil and gas exploration and development. Consequent to the acquisition of Nexen, CNOOC Limited is now among one of the largest independent oil and gas exploration and production companies in the world (www.cnooc.com). According to Barney (1988) many international acquisitions creates value for the acquirer through cooperation and integration to enhance sustainable growth. The objective of acquisition is to bring companies together and increase their competitive advantage through knowledge transfer, innovations and management skills. This is also a justification for an acquisition Fitzgibbon Seeger (2002). However, most international acquisitions come with complex management challenges Hitt, Harrison and Ireland (2001). Many factors are responsible for these challenges. Thus, this management report is aimed to address the envisaged challenges of national and organisational culture to the effective business performance in CNOOC acquisition of Nexen. This report will apply Hofstede (1980) four dimensions models and Hofstede (1990) six dimensions models as literature to argue that the challenges of NC and OC will affect post acquisition performance. The application of the two models is in line with a separate model developed by Hofstede for comparing OC differences. This is also consistent with Schein (1985) argument that organisational culture differences are not the same with national culture. The report will discuss the background of CNOOC acquisition of Nexen. It also discusses the meaning and importance of NC and OC culture; it then discusses the challenges and management strategies. It would conclude and make recommendations on how to mitigate the challenges. CHAPTER TWO 2. BACKGROUND OF CNOOC ACQUISITION OF NEXEN CNOOC Limited was established in 1999 and listed on the Hong Kong Stock Exchange and New York Stock Exchange in 2001 and is 70 percent owned by China National Offshore Oil Corporation (www.cnoocltd.com). CNOOC is one of Chinas largest producers of oil and natural gas and is also among the largest independent oil and gas exploration and production Companies in the world (www.cnoocltd.com). According to the chairman Mr Wang Yilin, based on the strategic business objective to expand CNOOC overseas business and deliver sustainable growth, thus complementing the large offshore production footprint in China. Extending its global presence to oil rich region like Western Canada, and other parts of the world are mandates for management to achieve. Consequently, the opportunity for the acquisition of NEXEN is an important part in CNOOC international business growth platform as mentioned by Chief Executive Officer of CNOOC Mr Li Fanrong, CNOOC Press release (2012). The acquisition of NEXEN by CNOOC Limited was announced on July 23, 2012 and approved by NEXEN shareholders on September 20, 2012 at the cost of $15.1 Billion (www.nexeninc.com). The acquisition will bring in benefits for both firms. CNOOC brings in a reassurance of stable company and strong financial base for investment, while Nexen Inc. will play an important part in international business growth platform. However, securing approval and making purchase does not end acquisition challenges. The challenges of acquisition may be ahead of what happens afterwards, the issues after takeover Lauren (2012). For NEXEN a Canadian company with western values and culture, the management and staff are accustomed to working independently. But with the acquisition, they will align with CNOOC as their new Chinese owner with a different culture and orientation Lauren (2012). As both companies are knowledge intensive firms (KIFs) with knowledge intensive workers (KIW) there will be challenging issues on NC and OC differences Alvesson (2004). Thus, this report addresses the challenges of NC and OC in CNOOC acquisition of NEXEN. We will proceed by looking at the meaning and importance of NC and OC. CHAPTER THREE 3. MEANING AND IMPORTANCE OF NATIONAL AND ORGANISATIONAL CULTURE NATIONAL CULTURE This was defined as the collective programming of the mind acquired by growing up in a particular country Hofstede (1991). National culture is reflected in basic values, such as feelings of right and wrong, good and evil, beautiful and ugly, rational and irrational Olie (1990). NC impacts many forms of organisational behaviour, ranging from decision-making styles and human resources management to behaviour in groups Kirkman, Love Gibson (2006). NC is treated as a relatively stable feature that changes very slowly Erez Earley, 1993; Hofstede (2001). ORGANSATIONAL CULTURE Hofstede (1980) defined organisational culture as the collective programming of the mind that differentiates the members of one organisation from others. Trice and Beyer (1984) views it is a system of publicly accepted meanings which operate for a group at a particular time; it is a pattern of shared basic assumptions developed by a group or organisation on how to cope with its environment, that are stable and difficult to change, and difficult to observe because many important parts of culture are invisible Schein (1985); and more so it can simply imply the way we do things around here Deal and Kennedy (1982). IMPORTANCE The importance of national and organisational culture in international acquisition cannot be disregarded Hatch, 1993; Schein, 1985 and Hofstede (1980). Managing international business or acquisition means handling and understanding both cultural differences at the same time. Knowledge of cultural practices across borders is significant for multinationals in order to hold the company together. National cultures are embedded in values, whereas organisational cultures are embedded in practices, when both cultures are ignored there could create challenges that affects post-acquisition performance. CHAPTER FOUR 4. THE CHALLENGES OF NATIONAL AND ORGANISATIONAL CULTURE For the purpose of analysing the challenges of national and organisational culture, this report applies Hofstede cultural models to illustrate the major cultural differences which CNOOC of China and Nexen of Canada represent. Canada reflects the western cultural values wheras China reflects the Oriental Confucian group. The models are identified as follows: 4.1. HOFSTEDE FOUR DIMENSIONS MODELS FOR NATIONAL CULTURE INDIVIDUALISM/COLLECTIVISM This implies disharmony of interests on personal and collective goals Parsons and Shils (1951). Hofstede (1980) culture index (from the appendix) scored Canada 80 while China scored 20. This shows that the Canadians are highly independent of their organizations, preferring personal time, freedom, and challenge, whereas the Chinese employees have a stronger sense of belonging to their organization. POWER DISTANCE This refers to how different societies find different solutions on social inequality Mauk (1977). China scored 80 while Canada scored 39, indicating that Chinese employees are more comfortable with structured hierarchical levels and supervisors who make decisions. Canadians, on the other hand, prefer a more participatory style. UNCERTAINTY AVOIDANCE This implies the degree to which cultural members are willing to accept and deal with risky situations or unknown future Hofstede (1980). China scored 30 while Canada scored 48, meaning that the Chinese try to avoid risk and anxiety, while the Canadians neither seek nor avoid ambiguous situations. MASCULINITY/FEMININITY This refers to stereotyping gender expectations in organisations Hofstede (1984). China scored 66 while Canada scored 52, meaning that China has medium/high masculinity culture; whereas Canada has a medium/low masculinity culture. 4.2. HOFSTEDE SIX DIMENSION MODEL FOR ORGANISATIONAL CULTURE PROCESS ORIENTED VERSUS RESULT ORIENTED Process oriented cultures are dominated by technical and bureaucratic routines, while results oriented by a common concern for outcomes. In results-oriented units, everybody perceived their practices in about the same way; in process-oriented units, vast differences exist in perception among different levels and parts of the unit Hofstede (2011). JOB ORIENTED VERSUS EMPLOYEE ORIENTED Job oriented assumes responsibility for the employees job performance, while employee-oriented cultures assume a broad responsibility for their members wellbeing. At the level of individual managers, the distinction between job orientation and employee orientation has been popularized Blake and Moutons Managerial Grid (1964). PROFESSIONAL VERSUS PAROCHIAL Professionals usually imply the highly educated members identified primarily with their profession; while in Parochial, the members derive their identity from the organization for which they work. This is widely known as local versus cosmopolitan. OPEN SYSTEM VERSUS CLOSED SYSTEMS This dimension refers to the common style of internal and external communication, and to the ease with which outsiders and newcomers are admitted. It shows that organizational openness is a societal characteristic which means organization cultures also contain elements from national culture differences. TIGHT VERSUS LOOSE CONTROL This dimension deals with the degree of formality and punctuality within the organization; it is partly a function of the units technology: as most companies tend to show tight control, while others like advertising agencies show loose control. PRAGMATIC VERSUS NORMATIVE This last dimension describes the prevailing way of being flexible or rigid in dealing with the environment, particularly with customers. This dimension measures the degree of customer orientation, which is a highly popular topic in the marketing literature Hofstede et al. (1990). 4.3. ANALYSIS OF THE MODELS AND CHALLENGES OF NC AND OC DIFFERENCES By analysing the above cultural models as postulated by Hofstede, in the four dimension models we can identify differences in power distance, uncertainty avoidance, individualism/collectivism and femininity/masculinity between Canada and China which both companies represent. For the six dimensions models, CNOOC has process oriented culture with beurocratic routines while Nexen is more result oriented having concern for outcomes (www.nexeninc.com). Also Nexen culture are more job oriented while CNOOC have employee oriented culture with broad responsibility for their members wellbeing (www.cnoocltd.com). These cultural differences as illustrated creates challenges of conflicts, costs, and difficulties Hosted (1980; 2001). The cultural differences are also responsible for challenges and obstacles to achieving integration benefits Bjorkman, Stahl, Vaara (2007). It leads to decrease in shareholders value Datta and Puia (1995). It can complicate post acquisition integration and resource sharing Brock (2005). It causes human resource challenges like feeling of uncertainty and insecurity, causing culture clash and negative emotional reactions of employees towards acquisition Elsass and Veiga (1994) and culture collision Cartwright and Cooper (1993). They also lead to communication problems, ego clashes, inter-group conflicts, low employee morale, poor performance and ultimately retention Adkins and Caldwell (2004). However, these challenges can be mitigated by applying management practices and strategies. 4.4. STRATEGIES FOR MANAGING CULTURAL CHALLENGES Managing the challenges of national and organisational culture involves applying management practices or strategies by managers to reduce the challenges. The strategies are as follows: CULTURE INTEGRATION It involves the varying extent to which we can integrate more than one cultural perspective, mind-set, and behaviour into ones identity and worldview. It implies being able to move easily among cultures. It highlights the central importance of developing leaders and managers to the point where they have an ethno-relative experience of cultural difference Randy and Jacob (2009). SYNERGY APPROACH The approach involves adopting the strategy of managing the differences in culture. This implies recognising the challenges and using them to their advantage, rather than ignoring or allowing the challenges to cause problems Adler (1997). Managers therefore should be taught how to respect culture differences at work and how to work with them to maximise the contribution of each employee Cascio (1998). RESPECT FOR HOST COUNTRY CULTURE This means accepting the cultural difference without any judgment. No particular culture should claim perfection over the other culture. Cultures are different and for people they represent the ability to manage life situations and conditions the way they are familiar with for a long time Anisha (2011). IGNORING THE CULTURAL DIFFERENCES The strategy implies a stage where the managers ignore the differences. It later becomes irrelevant as the managers and employees would be having good understanding about each others cultures and practices and they would have to respect the cultures. The employees and managers in this strategy feel that our way is the only way Adler (1997). CULTURAL ADAPTATION This strategy involves mutual understanding and simplification of complicated demanding processes of behaving in a different cultural condition. This step does not mean that the participating partner should give up their cultural background, but rather they should use their knowledge of their own culture to gain knowledge about the partners culture Anisha (2011). CHAPTER FIVE 5. CONCLUSION The challenges of national and organisational culture remain crucial in post-acquisition performance. Although CNOOC may experience many complex problems during the integration process, however the challenges of national and organisational culture differences can be very devastating. This is because most successes and failures of international acquisitions have been attributed to the challenges of cultural differences ( From the analysis of Hofstede cultural models we identify cultural differences between China and Canada which CNOOC and Nexen represent. For individualism/collectivism, it implies that Canadian employees are more independent of their organization, preferring freedom, whereas Chineese employees have a stronger sense of belonging to their organization. In power distance, China employees are more comfortable with structured hierarchical levels while Canada, on the other hand, prefer a more participatory style. With respect to uncertainty avoidance, Chineese tries to avoid risk and anxiety, while Canadians neither seek nor avoid ambiguous situations. In masculinity/femininity, China has medium/high masculinity culture whereas Canada has a medium/low masculinity culture. In terms of the organisational culture six dimensions models; there are cultural disparities between CNOOC and Nexen in the OC. Consequently, we can surmise that national and organisational culture differences are the biggest challenges that could affect international acquisition performance Hofstede (2001) such as that of CNOOC and Nexen. Thus, in order to mitigate these challenges, the recommendations below are made for the senior strategic team to adopt. CHAPTER SIX 6. RECOMMENDATION For CNOOC to enjoy sustained business performance in the acquisition of Nexen, the following recommendations are made to mitigate the challenges of NC and OC: Firstly, CNOOC should adopt culture management approach. This implies the process of developing or reinforcing an appropriate culture in the organisation Pretorius (2004). Culture management is also concerned with culture change, culture reinforcement, implementation and change management. The approach will achieve effective control of cultural difference challenges between CNOOC and Nexen. Secondly, culture training for employees is vital. It will sensitize them to the discriminations, biases and negative feelings of the diverse employees in the organisation Farren and Nelson (1999). Through training, employees can understand cultural diversity that exists between CNOOC and Nexen. Cultural training will also promote cooperation and coordination among employees to enable them live harmoniously and work comfortably. Thirdly, CNOOC should create awareness on cross cultural communication. This is because all levels of communication are affected by cultural dimensions like words, language, body language, gestures, etiquette dos and donts, clothing, gift giving, dining, customs and protocols William (2005). The knowledge of cross cultural communication is necessary because what may be considered perfectly acceptable and natural in China, can be uncultured or offensive in Canada. BIBLOGRAPHY BOOKS SOURCE Alvessson, M. (2004). Knowledge Work and Knowledge Intensive Firms. Oxford University Press, May 20th , 2004. pg102. Deal, T. E. and Kennedy, A. A. (1982). Corporate cultures: The rites and rituals of corporate life. Reading MA: Addison-Wesley. Cited in; Management An Introduction, by David Boddy with Steve Paton. Pearson Education Limited, 2011, Fifth Ed. Pg. 79. Hitt, M., Harrison, J. and Ireland, R. (2001). Mergers and acquisitions: A guide to creating value for stakeholders. Newyork: Oxford University Press. Copyright 2001, Pg5-6. Hofstede, G. (1984). International Differences in Work Related Values (2nd ed.) Beverly Hills CA: SAGE Publications. ISBN 0-8039-1444-X Hofstede, G. (1980). Cultures Consequences: International differences in work related values, 1980, p.25, Beverly Hills, CA: Sage Publications. JOURNALS AND ARTICLE SOURCE Adler, N. J. (1997). International Dimensions of Organisational Behaviour, Cincinnati, Ohio: South-Western College Publishing. Adkins, B. and Caldwell, D. (2004). Firm or subgroup culture: Where does fitting in matter most? Journal of Organisational Behaviour, 25 (8) pp. 969-978. Barney, J. (1988). Returns to biding firms in merger and acquisitions: Reconsidering the relatedness hypothesis. Strategic Management Journal, 9(S1), 71-78. Bjorkman, I., Stahl, G., and Vaara, E. (2007). Impact of cultural differences on capability transfer in acquisitions: The mediating roles of capability complementarity, absorptive capacity, and social integration. Journal of International Business Studies, 38: 658-672. Brock, D. M. (2005). Multinational acquisition integration: the role of national culture in creating synergies. International Business Review, 14(3): 269-288. Cascio, W. F. (1998). Managing Human Resources Productivity, Quality of work Life, Profits, Boston: McGraw Hill. Cartwright, S. and Cooper, C. L. (1993). The role of culture compatibility in successful organisational marriage. Academy of Management Executive, 7(2): 57-70. Datta, D. K. and Puia, G. (1995). Cross border acquisitions: An examination of the influence of the relatedness and cultural fit on shareholder value creation in U.S. acquiring firms. Management International Review, 35: 337-359. Elsass, P. M. and Veiga, J. F. (1994) Acculturation in acquired organisations: A force-field perspective. Human Relations, 47(4): 431-454. Erez, M. and Earley, P.C. (1993). Culture, Self Identity, and Work. Oxford: Oxford University Press. Fitzgibbon, J. E. and Seeger, M. W. (2002). Audience and metaphor of globalization in the Daimler Chrysler AG merger. Communication Studies, 53(1), 40-55. Hatch, M. (1993). The dynamics of organisational culture. Academy of Management Review 18: 657-694. Hofstede, G. and Bond, M. H. (1988). The Confucius connection: From cultural roots to economic growth. Organisational Dynamics, 14, 483-503. Hofstede et al., (1990). Attitude, Values and Organisational Culture: Disentangling the concepts. Geert Hofstede. Institute research on Intercultural Cooperation, Maastricht and Tilburg, the Netherlands. Hofstede, G. (1991). Cultures and Organisations: Software of mind. Intellectual Cooperation and its Importance for survival, Harper Collins, 1991, pp. 79. Kirkman, B. L., Lowe, K. B. and Gibson, C. B. (2006). A Quarter Century of Cultures Consequences: A Review of Emperical Research Incorporating Hofstedes Cultural Values Framework. Journal of International Business Studies; Washington, 37(3), 285-320. Lodorfos, G. and Boateng, A. (2006). The Role of Culture in the Merger and Acquisition Process. Management Decision, 44(10), 1405-1421. Marks, M. L. and Marvis, P. M. (1986). The Merger Syndrome. Psychology today, 20 (10), 36-42. Mauk, G. (1977). The daily power game, Martinus Nijhoff Social Sciences Division. Olie, R. (1990) Culture and Integration Problems in International Mergers and Acquisitions. European Management Journal, 8 (2), 206-215 Parsons,T and Shils, E. (1951). Toward a General Theory of Action, reprinted as Talcott, Shils, Tolman, Stouffer and Kluckhohohn et al., Towards a General Theory of Action: Theoretical foundations of social Sciencies, Transaction Publishers, 2001. Schein, E, H. (1985). Organisational Culture and leadership. San Francisco: Jossey Bass. Schein, E. (1990). Organisational Culture. American Psychologist, 45 (2), 109-119. Trice, H. M. and Beyer, J. M. (1984). Studying organisational culture through rites and rituals. Academy of Management Review, 9, 653-669. Trompenaars, F. and Hampden-Turner, C. (1980). Riding the waves of culture: understanding cultural diversity in global business. New York: McGraw Hill. INTERNET SOURCE Anisha, C. (2011). Managing Cross Cultural Differences: Strategies to overcome differences. Dept. of management Studies and Research, Gulbarga University, Gulbarga, Karnataka. June 30, 2011. http://www.indianmba.com/Occasional_Papers/OP252/op252.html last visited January 06th, 2013. CNOOC, Press release, (2012). CNOOC Limited enters into definitive agreement to acquire Nexen Inc. http://www.cnoocltd.com/encnoocltd/newszx/news/2012/2062.shtml last visited January 16th, 2013. Farren, C. and Nelson, B. (1999). Retaining Diversity, Executive Excellence, New Delhi: Sage, July, pg.7. http://www.delhibusinessreview.org/v_2n2/dbrv2n2e.pdf last visited January 12th, 2013. Lauren, K. (2012). Nexen to be acquired by Chinas CNOOC for $ 15.1B cash. July 23, 2012 http://www.therecord.com/news/business/article/766128nexen-to-be-acquired-by-china-s-cnooc-for-15-1b-cash last visited January 14th, 2013. Hofstede, G. (2001). Cultures Consequences: Comparing Values, Behaviours, Institutions and Organizations across Nations. Sage Publications. http://geert-hofstede.com/dimensions.html last visited January 18th, 2013. Hofstede, G. (2011). Dimensionalizing Cultures: The Hofstede Model in Context. Online Readings in Psychology and Culture, Unit 2. http://scholarworks.gvsu.edu/orpc/vol2/iss1/8 last visited January 13th, 2013. Nexen Inc, About us; CNOOC Acquisition of Nexen. http://www.nexeninc.com/en/AboutUs/CNOOCAcquisition.aspx last visited January 18th, 2013. Pretorious, W. (2004). The impact of organisational culture on effectiveness. May 08, 2005. http://www.upetd.up.ac.za/thesis/available/etd_3162004_131828 last visited January 15th, 2013. Randy, M. and Jacob, M. (2009). Leadership Practice for a Global Society, NASPA Pre-Conference Workshop, March 8th, 2009. http://www.docstoc.com/docs/77255010/Managing-Cultural-Differences-Global-Leadership-Strategies-for-the-21St-Century last visited January 17th, 2013. William Wardrobe, (2005). Beyond Hofstede: Cultural applications for communication with Latin American, Association for Business Communication Annual Convention. http://www.businesscommunication.org/convensionsnew/proceedingsnew/2005new/pdfs/13abc05.pdf last visited January 14th, 2013.

Wednesday, November 13, 2019

Existentialism In The Early 19th Century :: essays research papers

Existentialism in the Early 19th Century Major Themes Because of the diversity of positions associated with existentialism, the term is impossible to define precisely. Certain themes common to virtually all existentialist writers can, however, be identified. The term itself suggests one major theme: the stress on concrete individual existence and, consequently, on subjectivity, individual freedom, and choice. Moral Individualism Most philosophers since Plato have held that the highest ethical good is the same for everyone; insofar as one approaches moral perfection, one resembles other morally perfect individuals. The 19th-century Danish philosopher Sà ¸ren Kierkegaard, who was the first writer to call himself existential, reacted against this tradition by insisting that the highest good for the individual is to find his or her own unique vocation. As he wrote in his journal, â€Å"I must find a truth that is true for me . . . the idea for which I can live or die.† Other existentialist writers have echoed Kierkegaard's belief that one must choose one's own way without the aid of universal, objective standards. Against the traditional view that moral choice involves an objective judgment of right and wrong, existentialists have argued that no objective, rational basis can be found for moral decisions. The 19th-century German philosopher Friedrich Nietzsche further contended that the individual must decide which situations are to count asmoral situations. Subjectivity All existentialists have followed Kierkegaard in stressing the importance of passionate individual action in deciding questions of both morality and truth. They have insisted, accordingly, that personal experience and acting on one's own convictions are essential in arriving at the truth. Thus, the understanding of a situation by someone involved in that situation is superior to that of a detached, objective observer. This emphasis on the perspective of the individual agent has also made existentialists suspicious of systematic reasoning. Kierkegaard, Nietzsche, and other existentialist writers have been deliberately unsystematic in the exposition of their philosophies, preferring to express themselves in aphorisms, dialogues, parables, and other literary forms. Despite their antirationalist position, however, most existentialists cannot be said to be irrationalists in the sense of denying all validity to rational thought. They have held that rational clarity is desirable wherever possible, but that the most important questions in life are not accessible to reason or science. Furthermore, they have argued that even science is not as rational as is commonly supposed. Nietzsche, for instance, asserted that the scientific assumption of an orderly universe is for the most part a useful fiction. Choice and Commitment Perhaps the most prominent theme in existentialist writing is that of choice. Humanity's primary distinction, in the view of most existentialists, is the freedom to choose.