.

Friday, May 31, 2019

Portrayal of Women in the Movie (Film), Metropolis :: Movie Film Essays

Portrayal of Women in the Movie (Film), MetropolisWomen were represented in different shipway throughout the movie Metropolis, but the underlying theme was women were seen as purely familiar. Maria was seen as the nurturer in the film, but also as a internal object. She was the one who preached for rest and harmony down in the catacombs to the workers. Maria was also the nurturing maternal figure that was seen walking into the garden with all of the poor children. The vamp, on the separate hand, was portrayed blatantly as a sexual object. This whole movie was seen through the eyes of the male perspective, which usually portrays women as sexual objects, and robs them of any identity. Lang shows Frederson as having worship of femininity which involves womens emotion and nurturing. The robot was seen as a creation of technology and femininity and sexuality through the male imagination. This creation of the robot was to hypothecate the fear that men have of women and of technolog y. Women, machines, and nature raise fear in men because they threaten the male dominance and control. The female robot rose fear approximately threatening male control because of the idea that technology could be coiffure so large and advanced that it would go out of control of man and smash humanity. Maria also posed as a threat to Frederson because of her emotions and nurturing. As seen in the movie, the scene where Rotwang leads Frederson down to the catacombs to watch Maria preach about peace is a direct depiction of the male fear of femininity. This fear comes from Frederson not having any control over this situation because he did not know about the catacombs, which scares him. Men need to control these women because of these insecurities about their own dominance. Throughout the entire movie there is an underlying theme of men always controlling women. The man of technology has always been seen as being all men while the women were standing on the outside looking in. For example, Rotwang creates this vamp to satisfy his own sexual desires, and to be able to control and dominate her every move. Woman has been constructed by man to serve her master, be completely dependent, and meet his needs. Lang invents his females as technological objects that come to life at the hands, and visions of their male masters. This is clearly seen when the robot, disguised as Maria, is put on the stake to burn.

Thursday, May 30, 2019

Essay on the Symbolism of the Menagerie in The Glass Menagerie

The Symbolism of the Menagerie in The Glass Menagerie Tennessee Williams play, The Glass Menagerie, describes three separate characters, their dreams, and the irate realities they face in a modern world. The Glass Menagerie exposes the lost dreams of a grey family and their desperate struggle to escape reality. Williams use of symbols adds depth to the play. The sparkler menagerie itself is a symbol Williams uses to represent the broken lives of Amanda, Laura and Tom Wingfield and their inability to live in the present. The glass menagerie symbolizes Amanda Wingfields overwhelming need to cling to her aside and her fulfilled fear of being alone. Amanda resents the poverty-stricken neighborhood in which she lives so much that she needs to mentally escape from it by invented romance and self-deception. Williams describes her as having courage and a kind of heroism, but she is also silly, snobbish, sometimes cruel and sometimes pathetic in her well-intentioned blundering(William s 1865). Abandoned by her husband, Amanda comforts herself with remembrances of her earlier, more gracious, southern life in Blue Mountain when she was pursued by gentleman callers. Amanda is desperate to find her daughter, Laura, a husband, the kind of gentleman caller that she herself longed for, who would not defecate deserted her. Well, in the South we had so many servants. Gone, gone, gone. All vestiges of gracious living Gone completely I wasnt prepared for what the future brought me. (Williams 1893). She foists her illusions on her unvoluntary children, lives in the past with pretensions to glory. Lauras collection of glass animals represents her hypersensitive nature and fragility. The glass menagerie is ... ...tle glass animals came to represent in my memory all the softest emotions that belong to the recollection of things past. They stood for all the tender things that relieve(Williams 64). They retreat into their own separate worlds to escape the harshness of life. Amanda, Laura, and Tom are incapable of living in the present. Mirroring the social and sparing despair in the U.S., The Glass Menagerie is nostalgia for a past world and its evocation of loneliness and lost love, which celebrates, above all, the human need to dream. Works Cited and Consulted Crandall, George. The faultfinding Response to Tennessee Williams. Westport Greenwood, 1996. Martin, Robert. Critical Essays on Tennessee Williams (Critical Essays on American Literature). New York Simon and Schuster, 1997. Williams, Tennessee. The Glass Menagerie. New York Random House, 1985.

Wednesday, May 29, 2019

Pindar :: essays research papers fc

Classical MythologyPINDAR A PERFECT POETPindar was born at Cynoscephalae, near Thebes, the member of a fearful family. He lived from about 518 B.C. to approximately 438 B.C. Pindar is considered by many to be the greatest lyric poet of ancient Greece. He began writing at a very infantile age and soon his poetry was popular throughout Greece.He traveled widely but spent a lot of his time in Athens and in Sicily at the plaza of Hieron. This may account for his being enamored with the Olympic games, which he often wrote about. Hiero bred horses and offered his steeds to the athletes to enter in the chariot races. Pindars poems often compensable tribute to the superior of various events but with out a doubt the chariot races were given his highest praise. Greek orderliness savored these odes for their rich poetic language and imagery, lesson ideas, and vivid portrayals of sacred myths.The poems were not so much an account of the sporting events but what transpired afterward. The storyline or taradiddle myth was always connected to the winner and ensuing celebration. Each poem meant to be sung with dancing or even a procession for the victor, normally upon the athletes return to his home city. Being a deeply religious man with high moral standards, Pindars main characters normally displayed the corresponding attributes. Pindar was also famous for being the first Greek writer to speak of the immortality of the soul and judgement by the gods after death.Pindar is given credit for inventing the Pindaric ode. An ode built of triad stanzas - strophe, antistrophe, and epode repeated in series. These stately confused poems set the standard. They are often referred to as perfect in form and beautiful in language. Of all his poems 45 odes have survived. These make up ace of the greatest collections of odes by a Greek author during this time. The forty-five victory odes represent and celebrate triumphs at the quartet great Panhellenic festivals. The Olympic, P ythian, Nemean, and Isthmian games. trine of the Olympian Odes celebrated the victories of Pindars close friend and confidant Hieron. The Nemean and Isthmian Odes concentrate more on flush(p) clients and tyrants of the time who perhaps sponsored the athletes. The Pythian Odes were written for the Aeginians the support of which was dedicated to an Aeginian wrestler, Aristomenes. What makes this poem so noteworthy is the fact it ended with a note of sadness.Pindar essays research papers fcClassical MythologyPINDAR A PERFECT POETPindar was born at Cynoscephalae, near Thebes, the member of a noble family. He lived from about 518 B.C. to approximately 438 B.C. Pindar is considered by many to be the greatest lyric poet of ancient Greece. He began writing at a very young age and soon his poetry was popular throughout Greece.He traveled widely but spent much of his time in Athens and in Sicily at the home of Hieron. This may account for his being enamored with the Olympic games, whic h he often wrote about. Hiero bred horses and offered his steeds to the athletes to enter in the chariot races. Pindars poems often paid tribute to the winner of various events but with out a doubt the chariot races were given his highest praise. Greek society savored these odes for their rich poetic language and imagery, moral ideas, and vivid portrayals of sacred myths.The poems were not so much an account of the sporting events but what transpired afterward. The storyline or narrative myth was always connected to the winner and ensuing celebration. Each poem meant to be sung with dancing or even a procession for the victor, usually upon the athletes return to his home city. Being a deeply religious man with high moral standards, Pindars main characters normally displayed the same attributes. Pindar was also famous for being the first Greek writer to speak of the immortality of the soul and judgement by the gods after death.Pindar is given credit for inventing the Pindaric ode. An ode built of three stanzas - strophe, antistrophe, and epode repeated in series. These stately intricate poems set the standard. They are often referred to as perfect in form and beautiful in language. Of all his poems 45 odes have survived. These make up one of the greatest collections of odes by a Greek author during this time. The forty-five victory odes represent and celebrate triumphs at the four great Panhellenic festivals. The Olympic, Pythian, Nemean, and Isthmian games. Three of the Olympian Odes celebrated the victories of Pindars close friend and confidant Hieron. The Nemean and Isthmian Odes concentrate more on wealthy clients and tyrants of the time who perhaps sponsored the athletes. The Pythian Odes were written for the Aeginians the last of which was dedicated to an Aeginian wrestler, Aristomenes. What makes this poem so noteworthy is the fact it ended with a note of sadness.

Essay --

Economic Principles Some of the most heated debates in macroeconomics in upstart years have been concerned with the causes and consequences of inflation, the relationship between inflation and unemployment, and appropriate policy responses. Inflation and Unemployment in the AS-AD Model Inflation may be defined, for our purposes, as the proportionate increase in the price level per period of time. Another way of looking at inflation would be to point out that as the price level rises the real value of a inclined nominal amount of bills falls, so that is to say that as the price level rises $1 will buy fewer and fewer goods. Thus, inflation might, alternatively, be defined as the proportionate decline in the purchasing power of a given nominal amount of money. In this sense, inflation is a monetary phenomenon. Therefore, Laidler and Parkin argue that its importance stems from the pervasive role played by money in a modern economy. Friedman goes further than this and argues that i nflation is always and everywhere a monetary phenomenon and can be produced only by a more speedy increase in the quantity of money than in output. He clearly has views not only on what inflation is, but also on what causes it. By no means all economists agree with Friedman on the causes of inflation, and it is such issues, which are the focus of much of this chapter. There is also much disagreement about the consequences of inflation. roughly would agree that a short bout of inflation, or a permanent but well-predicted one, would not be as harmful as a persistent and unpredictable bout of inflation. Even for the latter case there are those who argue that the consequences are not that serious, while others argue that unpredictable inflation distorts the mec... ...lated by discounting the income, but to the permanent magnitudes. To take the extreme case as illustration Wn is wealth possessed by an individual during his whole life and Yn is the average (permanent) biography incom e. This novel definition of terms is closely connected to Friedmans research on the consumption function4, and it is very significant to his theory. Friedman applies his concept of permanent income to the theory of money demand, too. Permanent income is the return on a rather widely defined stock of nominal wealth. The latter consists of Money a means of payment with a constant face value that does not yield interest Bonds interest bearing securities with a constant face value Equalities claims on the profits of a firm Physical goods and Human capital. Hence, Ln = f (P, rB, rE, P/ P, Yn p/r) (+) (-) (-) (-) (+)

Tuesday, May 28, 2019

Penguins :: essays research papers

Myopic little men in tuxedos, or highly efficientland/water animals? Recent research indicatestheres more to penguins than meets the eye. Ifyouve all wondered what it would be like tobe able to ensure as clearly under water as you canon land, just ask the closest penguin.Most aquaticanimals argon short-sighted on land. Most terrestrialanimals (and that includes us) are far-sighted underwater. But researchers have discovered thatpenguins can apparently see equally rise up in bothenvironments, because of the unique structure oftheir eyes. Penguins have to be able to see wellunder water because their diet consists mainly ofplankton, molluscs, crustaceans, and the inevitablefish. by dint of a special slowing-down of their heartrate theyre able, like many other diving animals, tostay submerged long enough to search out and cut across whatever catches their fancy. On dry land,its a different story-or has been up to now.Waddling along on their flat little feet, eyes fixedintently on t he ground, penguins erupt myopic,inefficient and generally out of place. In fact thereverse is true. During a recent stay on theFalkland Islands, a Canadian researcherdiscovered that penguins are able to recognizeindividuals and navigate the rocky terrain on whichthey live quite well. Long of body and short of leg,they probably poke their heads forward as an supportto balance. And as for looking at the ground,theyre merely-like us-keeping an eye on wheretheyre going. The human eye is adapted for aerialvision, which is why scuba divers-or even you andI in the local swimming pool-must wear goggles ora face mask to re-introduce air in front of our eyesin order to see clearly. Among vertebrates ingeneral, the bird eye is frequently described as themost efficient. Its superior quality, combined withthe fact that a large number of birds-cormorants,pelicans, seagulls, even ducks, as well aspenguins-get their food from water, obviously

Penguins :: essays research papers

Myopic little men in tuxedos, or highly efficientland/water animals? Recent research indicatestheres more to penguins than meets the eye. Ifyouve every wondered what it would be like tobe fit to see as clearly under water as you canon land, just ask the nearest penguin.Most aquaticanimals are short-sighted on land. Most terrestrialanimals (and that includes us) are far-sighted underwater. But researchers have discovered thatpenguins can apparently see equally headspring in bothenvironments, because of the unique structure oftheir eyes. Penguins have to be able to see wellunder water because their diet consists mainly ofplankton, molluscs, crustaceans, and the inevitablefish. Through a special slowing-down of their heartrate theyre able, like many other diving animals, tostay submerged long enough to search out andchase some(prenominal) catches their fancy. On dry land,its a different story-or has been up to now.Waddling along on their flat little feet, eyes fixedintently on the g round, penguins appear myopic, ineffectual and generally out of place. In fact thereverse is true. During a recent stay on theFalkland Islands, a Canadian researcherdiscovered that penguins are able to recognizeindividuals and navigate the rocky terrain on whichthey live quite well. Long of body and short of leg,they probably poke their heads forward as an aidto balance. And as for looking at the ground,theyre merely-like us-keeping an eye on wheretheyre going. The human eye is adapted for aerialvision, which is why scuba divers-or even you andI in the local travel pool-must wear goggles ora face mask to re-introduce air in front of our eyesin order to see clearly. Among vertebrates ingeneral, the bird eye is frequently described as themost efficient. Its superior quality, combined withthe fact that a large number of birds-cormorants,pelicans, seagulls, even ducks, as well aspenguins-get their food from water, obviously

Monday, May 27, 2019

How Does Act One of Hamlet Shape Your Understanding of the Main Concerns of the Play Essay

In the interactions of characters, Shakespeares Hamlet examines fundamental characteristics of society which can result in moral ambiguity for both the characters and the audience. In a time of transition between the traditional church led tenets and the emerging Renaissance humanist views, the appellation character is related to other characters to explore the notions of corruption, loyalty and love. Contrastingly, it is also in the rejection of others and isolation of Hamlet that questions as the nature of life is unravelled.Indeed, whilst the world of Hamlet whitethorn appear unfamiliar to a 21st century audience it is the examination of such intrinsic qualities of humans that remains pertinent. Corruption is established as a main thematic concern of Hamlet from the opening and continues throughout the play. On a political level, corruption is explored through the dissolute nature of the Danish greet. This reflects the contextual concerns of Shakespeares world with the belief i n the Divine Right of Kings.This conceit believes that a monarch is subject not to earthly authority but derives his even out to rule directly from the will of God. Thus, in having a king that has not been given the right from God, but rather took it and is corrupt there would be a corrupt country- as Denmark is established to be from Act one(a). Through the imagery of nature in a degenerated state such as an unweeded garden the idea of corruption in the kingdom is established.Such imagery continues throughout the play and Denmark becomes synonymous with a state of decay. The Jacobean thoughts suggest that the nation reflects a pathological body because a state has the wrong king and thus the natural order is unbalanced. Further, moral corruptION is set up in Act One through the character of Claudius and establishes the theme for the later exploration for the moral corruptness of Hamlet. That is, in Act One, the catalyst for Hamlet to become morally corrupt occurs. object lesson corruption is most obviously seen in Act One through Claudius. His first speech gives the impression that HE Claudius is a good man, upset by his brothers destruction. However, it is soon discovered that he is corrupt and has wrongfully taken the throne from Hamlet. In this first speech Claudius is very controlled and uses poetic address to own the marriage seem normal despite the fact that Denmark has only recently been unbalanced by the death of their king. The use of our as the royal plural form eans that he has adopted the language of kingship but because he has taken its wrongfully, a sense of corruption is immediately established. For a Jacobean audience, the wrongful king would make them question their own monarchy, where a very didactic Elizabeth sat on the throne. When corruption presents itself, tensions arise between a tragic individual who condemns it and their society. It is in the interaction with Claudius, as the embodiment of such corruption, that Hamlet becomes disillusioned with his state.In Hamlets first line a little more than kin/a little less than kind the pun directly attacks Claudius facade of benevolence, utilising a pun to highlight his awareness of the deceptive appearances with the court. Moreover, Hamlet rallies against the superficial merriment of the court in his O, that this too too solid flesh would melt soliloquy comparing his father as a Hyperion to Claudius as a satyr. Claudius tries desperately to go on a weak and unnatural court in the balance between the supposed sorrow he feels for the kings death and the joy he must feel for marrying his dead brothers wife.This is supported in his inconsistency of through yet of Hamlet our late brothers death the memory be green, whereby the idea of death and decay is fused with imagery of greenery, growth and renewal. Such actions lead Hamlet to question the way in which corruption can grapple his entire state, likening it to all things rank and gross in nature. This isolates h im, despite his clearly identified place in Denmark. His achromatic cloak becomes a metaphor for both his physical and mental isolation a result of Claudius corrupt action.

Sunday, May 26, 2019

How Accurate Is It to Describe the Us Constitution as Too Rigid?

How accurate is it to describe the US Constitution as too rigid and strong to change? The USA has a pen codified constitution and as a result, it may be described as too rigid and vexed to change. The UK in contrast, has an unwritten constitution in the sense that it is non contained in one single document so it lacks a formal constitution but is made up of a chassis of different sources along with long-standing traditions. This has led to some saying it is too flexible and easy to change.While it may be argued, that the US constitution is too rigid and too difficult to change and this is highlighted through the lack of new amendments, I do not feel that this is a bad thing, it was desire of the Founding Fathers to be this musical mode in order to ensure long-term political stability. In order to amend the constitution the Founding Fathers stated that Congress must call a interior(a) convention at the request of two thirds of the state legislatures or there must be a two-thir ds supermajority in favour of the amendment of both houses in Congress, the first has never been used.For a proposal to be ratified the Founding Fathers specified that there should never be another supermajority in three-quarters of the state legislatures for this amendment to be added to the constitution. The relatively inflexible nature of the US constitution is revealed through the arrive of amendments that have been made. Since the bill of rights, which was the inclusion of ten rights to the constitution, there have been only 17 amendments made.Even two of these cancel each other out, the 18th and 21st regarding to the prohibition of alcohol. This could be argued this is appropriate rigidity, some people would argue that it prevents the USA from adapting to changes in the national culture and situations. Many people state the right to bear arms as the principle example highlighting the nations failure to rophy stricter gun laws. However, the nature of the constitutional change in the USA requires that the majority of people to put pressure onto Congress to implement necessary changes.The fact that this has not happened in some ways shows that the constitution is fulfilling its role and preventing fundamental changes based on minority views, just as it was designed to do. While the limited number of amendments presents the USA constitution as being highly flexible, it has been kept up to date through judicial studyation. The founding fathers granted the judiciary the power to assure the document and this has allowed the rules of the constitution to be kept up to date. It has been flexible in the sense it can evolve along with the changes in society.In this role, the judiciary has been willing to interpret the words in the light of modern conditions and ignore precedent. It should be noted that when the Judiciary is mainly Republican, they atomic number 18 more likely to conserve the constitution in its present state, whereas Democrats are likely to be more willing to add and interoperate the constitution more freely. The constitution was intended to be a full restore of fundamental principles for the new nation state. If they are such fundamental principles, then it possibly could be argued that it should in fact be entrenched and difficult to change.In the USA, constitutional law is above that of ordinary statute law where there is conflict between the two. In contrast, the UK does not have constitutional law. Constitutional changes are implemented in exactly the same manner as statute law, by a simple majority in the sovereign parliament, such as the Devolution of Scotland, however, in America any change in power would need constitutional amendment, and as I have pointed out this is a difficult process, however though not many amendments have been enacted, a few have showing it does happen sequence to time.The founding fathers set in belongings the rigidity of the constitution, giving the judiciary, the ability in making con stitution to be flexible in terms of its interpretation, thus allowing it to keep it up to date. It has stood the test of time and has maintained political stability

Saturday, May 25, 2019

How Can We Explain the Difference in Achievement with Boys and Girls?

How eject we explain the differences in achievement between boys and girls? Statistics show that it is suck that girls achieve more A* to C grades at GCSE then boys. This obviously shows that girls do better and achieve more in schools. In fact, since 1980 to the present day, the percentage of boys who overhear achieved these grades has risen. But so has the girls. When it comes to girls and boys choosing their options for GCSE, although they argon open to pick the same subjects, there still seems to be a split. Girls tend to op for cookery, design technology and sociology. Whereas boys tend to op for resistant materials, P.E and science. So it is clear that there be the boys and girls subjects. One way the difference is shown in achievement is by setting and streaming in different schools. It is more common for girls to be placed in top set for all their subjects then it is for boys. Girls tend to do better in school then boys. This could be influenced by a teacher (self- fulfil ling prophecy). If girls and some boys are told that they are capable of getting great grades in school, then they are bound to achieve better than other students that are put in bottom set and are told they can only get a D or E, which are mostly boys.This shows that there is a difference between the achievement of boys and girls because girls are more likely to be placed in top set and are encouraged by their teachers to do well, whereas boys are not. Another way the difference is shown is by society and through the jobs that different gender roles squander. There has been a divide in women and men jobs for a while. However now, there are increasing job opportunities for women. It is still known that women are more likely to take up jobs like nursing, caring, teaching and so on then it is for men.Men usually take up the job of mechanics, firemen, policemen etc. So in schools, they prepare the students for the job they believe is right for their gender. This shows that there are d ifferences because boys must need to be more enlightened for the jobs they are required to get, whereas girls dont need to be as much. If boys are more educated then girls, then they are more likely to get better grades, only that still doesnt explain why girls are achieving better than boys single(a) attitudes have a big impact on how a student achieves.Girls tend to always do their homework, always be well behaved and are in the pro- school subculture. Whereas boys tend to never do their homework, always misbehave and are in the anti-school subculture. This shows that girl want to do well in school to have a good life and a well-paid job, but it also shows that boys dont rattling care about school and havent really thought about their future. This shows that there is a difference in achievement between girls and boys because girls have a better opinion of school and so will achieve better grades then boys as they have a negative opinion of school.Its not that boys do less well. Boys achievement has been improving but girls have been improving more. All the matters that I have stated are linked. They all seem to state that girls achieve better in school than boys and that boys take their education for granted. There is also a link with boys and girls attainment. Boys tend to be at school less than girls and girls have better punctuality then boys. So, we can conclude that girls achieve better than boys because of their positive attitudes, actually wanting a good life and a good education.

Friday, May 24, 2019

Health History and Examination Essay

Neurological form (headaches, head injuries, dizziness, convulsions, tremors, weakness, numbness, tingling, difficulty speaking, difficulty sw totallyowing, etc., medications) affected role is alert, awake and oriented. Denies headaches, head injuries, dizziness, seizures, tremors, migraine, difficulty in speech and swallowing. No history of falls. Patient does mention that he has numbness and tingling of fingers and toes periodically. Takes Gabapentin 100mg orally three times a day. Head and have a go at it ( bruise, headaches, head/neck injury, neck pain, lumps/swelling, surgeries on head/neck, medications) Patient denies neck or head injuries, denies swelling or lumps on neck and head, Denies neck pain or headaches. Eyes (eye pain, blurred vision, history of crossed eyes, redness/swelling in eyes, watering, t pinnuleing, injury/surgery to eye, glaucoma testing, vision test, glasses or contacts, medications) Patient wears eyeglasses that be with him. zygomorphous cataract surgery through in June 2013. Regular vision checks after surgery done in November 2013 and at present he is not on any medications at foot. Ears (earache or other ear pain, history of ear infections, discharge from ears, history of surgery, difficulty hearing, environmental noise exposure, vertigo, medications) No complaints of ear pain, infection, surgery tinnitus due to noise, or vertigo far-famed. Not on any medications.Hard of hearing right ear save does not use up a hearing aid. Nose, Mouth, and Throat (discharge, sores or lesions, pain, nosebleeds, bleeding gums, sore throat, allergies, surgeries, usual dental care, medications) Denies discharge from nose and throat, denies presence of sores or lesions in the mouth. Denies nose bleeds, bleeding gums, or sorethroat. No known allergies noted. Has upper and lower dentures that patient cleans with Polident tablets daily. History of Tonsillectomy at age 7. Skin, Hair and Nails (skin disease, changes in color, changes in a mole , excessive soberness or moisture, itching, bruising, rash or lesions, recent hair loss, changing nails, environmental hazards/exposures, medications) Patients skin color is ethnic. Has some gray hair save no alopecia. Has well groomed nails. Denies skin problems. Particular about usage of moisturizing lotions after bath. Breasts and Axilla (pain or tenderness, lumps, nipple discharge, rash, swelling, detriment or injury to disparager, mammography, breast self-exam, medications) Patient denies any problems with breasts and axilla. Does not perform self-breast examination.Peripheral Vascular and Lymphatic System (leg pain, cramps, skin changes in arms or legs, swelling in legs or ankles, swollen glands, medications) Denies leg pain, cramps or discoloration of arms and legs. Complains of occasional swelling on ankles. Takes Lasix 40 mg orally once a day. cardiovascular System (chest pain or tightness, SOB, cough, swelling of feet or hands, family history of cardiac disease, tire e asily, self-history of heart disease, medications) Denies any chest pain or tightness. Denies shortness of steer or weakness. Complains of occasional cough relieved by Robitussin DM 10ml orally every 6 hours as needed. Patient is hypertensive and had an MI in 2005 but denies any history of Congestive Heart Failure. Family history shows that his father died of heart attack at age 75. Patient had an echocardiogram and stress test done plump year as outpatient and per patient results were regular. Patient is taking Aspirin 81mg orally daily, Lopressor 25mg orally daily, and Plavix 75mg orally daily. Thorax and Lungs (cough, SOB, pain on warmth or expiration, chest pain with breathing, history of lung disease, smoking history, living/working conditions that affect breathing, last TB skin test, flu shot, pneumococcal vaccine, chest x-ray, medications) Has occasional cough that could be due to change of climate. Denies shortness of breath or pain with breathing.Denies smoking and no h istory of lung disease is noted. Immunized for Influenza and Pneumonia on 10/14/2013. Patient was in ER in March for cough and fever and x-ray of the chest showed no abnormalities at that time. Musculoskeletal System (joint pain stiffness swelling, heat, redness in joints limitation of movement muscularity pain or cramping deformity of bone or joint accidents or trauma to bones back paindifficulty with activity of daily living, medications) Denies any symptoms of joint problems and does not take any medications at home. Patient is in unfree and requires no assistance for activities of daily living. His wife and he take walks on a daily basis for 20 minutes. Gastrointestinal System (change in appetite annex or loss difficulty swallowing viandss not tolerated abdominal pain nausea or vomitus frequence of BM history of GI disease, ulcers, medications) Denies any gastro-intestinal disease, ulcers, or diabetes. Consumes low sodium diet with no added salt three times a day and a bed time snack. Includes plenty of vegetables and fruits in his diet. No swallowing problems noted.No complaints of nausea, vomiting or diarrhea noted. Patient has daily bowel movement and reports that it is brown in color. Denies use of stool softener or laxative. An Endoscopy and Colonoscopy was done in January 2014 and no abnormalities noted at that time. Genitourinary System (recent change, frequency, urgency, nocturia, dysuria, polyuria, oliguria, hesitancy or straining, urine color, narrowed stream, incontinence, history of urinary disease, pain in flank, groin, supra pubic region or low back) Denies pain or any urinary problems. Patient verbalizes increased frequency of urination due to Lasix. Patient wakes up twice at night to urinate but he is continent of bladder. Per patient no prostate problem noted. Last prostate exam was done in February 2014. Physical interrogative(Comprehensive examination of each system. Record findings.) Neurological System (exam of all 12 cranial ne rves, motor and sensory assessments) Patient is awake, alert, and oriented with no memory loss. Patient is calm, cooperative and pleasant. Judgment is intact. Patients speaks clearly and in plenteous sentences. No difficulty noted duration speaking. No swallowing problems noted. Patient has a steady gait with full metier. Sensations present in all extremities. Complaints of occasional numbness and tingling of fingers and toes but denies upon examination. Head and Neck (palpate the skull, regard the neck, descry the face, palpate the lymph nodes, palpate the trachea, palpate and auscultate the thyroid gland) Skull and neck are normal on examination. No deformities or hematoma noted. No lymph nodes identified on palpation. Adams apple present. windpipe is normal on palpation. Eyes (test visual acuity, visual fields, extra ocular musclefunction, inspect external eye structures, inspect anterior eyeball structures, inspect ocular fundus) Patient has eyeglasses with him. Patient is able to open and close his eyelids. Pupil is round and reaction to light is constriction to both eyes. Denies any blurring, watering, or tearing of the eyes. No redness or infection noted.Ears (inspect external structure, otocopic examination, inspect tympanic membrane, test hearing acuity) Hard of hearing right ear with no hearing aid. As per patient the physician had recommended hearing aid for the right ear but patient did not wish to use it. Otoscopic examination revealed normal ear canals and eardrums with minimal amount of earwax. Nose, Mouth, and Throat (Inspect and palpate the nose, palpate the sinus area, inspect the mouth, inspect the throat) Nose, mouth and throat are normal on examination. On palpation no pain noted to sinuses. The upper and lower dentures fit well on the patient and do not become loose while talking or chewing. Skin, Hair and Nails (inspect and palpate skin, temperature, moisture, lesions, inspect and palpate hair, statistical distribution, texture, ins pect and palpate nails, contour, color, teach self-examination techniques) No skin break down or rashes or lesions noted on inspection of the skin. Color is normal to ethnicity. Skin is warm, dry and intact. Mucus membranes are pink and moist. Hair is gray and no alopecia noted. metric grain of hair is soft to touch, no split ends noted.Kept short and clean. No ingrown nails or cracked nails noted. Nails are well groomed and pink in color. Patient verbalizes examining the skin and nails everyday while taking a shower. Breasts and Axilla (deferred for purpose of class assignment) Peripheral Vascular and Lymphatic System (inspect arms, symmetry, pulses inspect legs, venous pattern, varicosities, pulses, color, swelling, lumps) symmetrical upper extremities are warm, isobilateral with bilateral radial pulses 2+. Bilateral lower extremities are warm, symmetrical without any discoloration. No varicose veins noted. Bilateral pedal pulses 2+. A trace of edema is noted on both ankles and feet. Cardiovascular System (inspect and palpate carotid arteries, jugular venous system, precordium salary increase or lift, apical impulse auscultate rate and rhythm identify S1 and S2, any extra heart sounds, murmur) Carotid arteries are normal with pulse 2+. No jugular vein distension noted. Apical pulse is 82 beats per minute, BP of 150/80 mm of Hg. Heart sounds S1 and S2 are on auscultation. No murmur or extra heart sound noted. EKG shows aNormal Sinus Rhythm.Thorax and Lungs (inspect thoracic cage, symmetry, tactile fremitus, trachea palpate symmetrical expansion, percussion of anterior, lateral and posterior, abnormal breathing sounds) Thoracic cage is normal and symmetrical. No abnormality noted on palpation and percussion. Breath sounds are clear and equal on auscultation in all lung fields. Respirations are even, regular and unlabored. Patient has occasional nonproductive cough relieved by cough medicine. respiratory rate is 18/minute and Oxygen saturation is 99% on roo m air. Musculoskeletal System (inspect cervical spine for size, contour, swelling, mass, deformity, pain, black market of motion inspect shoulders for size, color, contour, swelling, mass, deformity, pain, range of motion inspect elbows for size, color, contour, swelling, mass, deformity, pain, range of motion inspect wrist and hands for size, color, contour, swelling, mass, deformity, pain, range of motion inspect hips for size, color, contour, swelling, mass, deformity, pain, range of motion inspect knees for size, color, contour, swelling, mass, deformity, pain, range of motion inspect ankles and feet for size, color, contour, swelling, mass, deformity, pain and range of motion) Cervical spines are normal in size, no pain or deformities noted with full range of motion.Bilateral shoulders are equal in size, no swelling or mass noted. No pain noted on movement of shoulders. Bilateral elbows, wrists and hands are equal in size, with full range of motion and equal in strength. No de formities noted on inspection. Bilateral hips are equal in strength, no swelling or mass noted. No evidence of redness or injury noted. Sacrum is intact. Bilateral lower extremities with full range of motion and equal strength noted. No swelling or deformity noted. Bilateral ankles and feet noted with trace of edema. Gastrointestinal System (contour of abdomen, general symmetry, skin color and condition, pulsation and movement, umbilicus, hair distribution auscultate bowel sound, percuss all four quadrants percuss border of liver light palpation in all four quadrants muscle wall, tenderness, enlarged organs, masses, rebound tenderness, CVA tenderness) paunch is flat and non-distended. Bowels sounds present in all four quadrants. Abdomen soft and non-tender on palpation. Percussion revealed tympany in all four quadrants. Umbilicus is midline and inverted. Surface of abdomen smooth and even, with homogenous color. No lesions or surgical scars noted. Genitourinary System (deferred for purpose of thisclass)FHP AssessmentCognitive-Perceptual chemical formulaPatient is alert and oriented, no memory loss. Well educated, and has the ability to read, write and understand information. Patient uses eyeglasses for reading and is hard of hearing right ear. Nutritional-Metabolic namePatient eats a low sodium diet with no added salt three times a day with a bedtime snack. Home cooked food with vegetables and fruits included in the diet are his preferences. The patient or his wife prepares the food. The patient and his wife do the food shopping. wakenuality-Reproductive PatternThe patient has three children and 5 grandchildren. He is not interested in sexual activities but loves to spend time with his wife. Pattern of EliminationPatient is continent of bladder and bowel. Urinary frequency is increased due to effect of medication (Lasix). Pattern of Activity and ExercisePatient is independent in activities of daily living. He is not involved in vigorous exercise but walks daily for 20 minutes along with his wife. Pattern of Sleep and RestPatient usually sleeps for 6-7 hours at night with an good afternoon nap for 30 minutes. Patient wakes up twice at night to urinate but goes right back to sleep with no difficulty. Patient denies use of sleeping pills. Pattern of Self-Perception and Self-ConceptPatient is well dressed and has self-respect and respects others too. He leads a disciplined life with the ability to take care of himself and his wife. He is friendly with his neighbors and is an active participant in church activities Summarize Your Findings(Use format that provides logical progression of assessment.) Situation (reason for seeking care, patient statements)Name Lawrence KellyAge/Sex 72 years/MalePresenting complaints Increased swelling of ankles and feet, numbness and tingling of fingers and toes, and occasional cough. Background (wellness and family history, recent observations) History of present complaintsPatient complains of swelling of f eet and ankles for 2 weeks with numbness and tingling of fingers and toes. occasional(prenominal) cough for last one week. Past medical History Hypertension, MI, Hard of hearing (Right Ear). Medication historyLasix 40mg orally dailyAspirin 81mg orally dailyPlavix 75mg orally dailyLopressor 25mg orally dailyGabapentin 100mg orally three times a dayAssessment (assessment of health state or problems, nursing diagnosis) Mr. Lawrence Kelly 72 year old male presented with complaints of swelling of feet and ankles with numbness and tingling of fingers and toes for the past 2 weeks. Occasional cough for the past one week. He is alert, awake and oriented with steady gait. Hard of hearing in the right ear. His vital signs are BP150/80 mm of Hg, Pulse 82, RR 18/minute, and Temp of 98.4. No chest tightness or pain verbalized. Breath sounds are clear and equal in all lung fields. Abdomen soft, non-tender and non-distended. Bowels sounds present in all four quadrants. No difficulty in urination verbalized and color of urine is amber. Trace edema noted on feet and ankles. Pedal pulses is 2+. Nursing DiagnosisFluid Volume Excess manifested by edema of feet and ankles.Recommendation (diagnostic evaluation, follow-up care, patient education teaching including health promotion education) Blood tests should be done including Comprehensive Metabolic Panel, Vitamin B12 Level, and BNP. X-ray Chest is recommended to find out if patient has CHFEchocardiogram could be repeated as it was done more than 6 months ago Teach the patient to monitor BP, Pulse, Intake and Output, and Daily Weights. Advise the patient to elevate the lower extremities on pillows to reducedependent edema Encourage the patient to read food labels on the sodium content Avoid fried foods, canned and frozen foods (Nanda Nursing Interventions, 2012) Provide information about community services such as Heart Center at Barnabas Health, Phone No. 1-888-724-7123 (Barnabas Health, 2013).ReferencesBarnabas Health. (2013). Barnabas Health Heart Centers. Retrieved from http//www.barnabashealth.org/services/cardiac/index.htmlLifestyle and home remedies. Retrieved from http//www.mayoclinic.com/health/heart-failure/DS00061/DSECTION=lifestyle-and-home-remediesNanda Nursing Interventions. (2012). Nursing Interventions for Fluid Volume Excess. Retrieved from http//nanda-nursinginterventions.blogspot.com/2012/04/nursing-interventions-for-fluid-volume.html

Thursday, May 23, 2019

Historical documen Essay

Do you believe each historical document or book was true? Before, we consider if the historical documents or books be true first, we relieve oneself to look at the historical impression with a different point of view because it is easy to get biased information if we exactly focus on one side of the event. In the book After The Fact The View from the Bottom Rail by James West Davidson and chase after Hamilton Lytle, the authors demonstrate that discovering the historical story of the freed people is difficult because histories deal with top rail rather than the bottom rail of the lower social classes. Therefore, the freed peoples history has be acquire flawed.Writing about a historical event is exceedingly difficult, because we have to consider different points of view. Thus, if a historian focused on only one side of the story, the historical event will remain biased. For example, the history of slavery was biased and was not accurate. According to the authors, the black slave s could not accept or write during that time even if someone could read, they had to hide this skill from their masters. Then, almost of the written books or documents about slavery were written by the snow-covered masters. Therefore, the information was not only accurate but also biased because the information came from white masters rather than slaves who actually know the truth.Moreover, although the interviews came from slaves, almost every interviewee experienced slavery by his or her childhood therefore, the interviews were also biased because they focused on those who survived slavery. As the author explains, the average life expectancy of a slave in 1850 was less(prenominal) than fifty years(Davison and Lytle 180). Thus, when they were interviewed by someone, they were old. Two-thirds of them were over 80 years old that could lead us to assume that they were treated less harsh than other people who died early because of harsher treatment in earlier years. Moreover, as inte rviewees get older, their memories could fade, and they could not certainly remember the details. This is common sense that if the event occurred a long time ago, the person could not remember every detail.In addition, the interviewees couldnt answer honestly because they were shake. One interviewee says, Ive told you too much. How come they want all this stuff from the colored people anyway? Do you take any stories from the white people? (Davison and Lytle 183). Like the interviewee, other interviewees were also scared to speak out about what they really experienced because they thought speaking out frankly would put them in a trouble. Therefore, they could not answer honestly.In retrospect, the slave interviews become flawed, and it was biased, because the interviews were not considering different points of view. Additionally, there was no voice recorder, which could provide us with what the interviewees truly said to the interviewer. Therefore, when we look at historical events, we have to consider different points of view thus, we do not accept everything we just find out or read. As the authors state, we cannot believe everything at face prise before we carefully discover.

Wednesday, May 22, 2019

Developing Brand Positioning Strategy for Canadian Club

rearing Brand Positioning Strategy for Canadian parliamentary procedure Whiskey pic Developing stigmatizeing strategy for Canadian community A. Assess and fully critique the success of Canadian Clubs repositioning strategies used in the case. Use grass theories and concepts to evaluate the companys brand strategies listed in the case. According to Keller(1993) the effective brand positioning gives a brand a rivalrous advantage or unique selling proposition that determines a reason why consumers ar buying this overlap or service (Keller, 1993).Similarly, Kay (2004) argues that brands strength depends on its successful positioning within consumers mind. Further more than, it is claimed that strong brands should possess difference and consistency, however the difference should be meaningful for consumers. In the case of Canadian Club whisky it aimed to una c atomic number 18iate its select and uniqueness through exciting advertising campaigns such as Adventure Series, Hide A Case, CC Find-A-Case Ch every last(predicate)enge or Damn Right Your Dad Drank It. Also, Keller (1993) claims that brand knowledge consists of brand awareness and perceived brand icon among consumers.Brand image is further divide into favourability, strength and uniqueness of brand associations. Therefore, in the case of Canadian Club a brand image is conveyed through unique and distinctive experiences that consumers associate with a brand. For example, introduction of Adventure Series advertising campaign in 1920s aimed to increase CCs global gross revenue whilst showcasing print ads of travellers going to international locations all everyplace the world and performing brave actions. After that they were relaxing with a glass of CC.As a result a brands image is distinctive from the household as it appeals to its target listening as a unique and exclusive drink associated with adventures. Also, it benefits consumer experientially. In addition, Keller (1993) claims that dev eloping a brand rectitude requires four value stages foodstuffing program investment, customer mind-set, market performance and shareholder value (Keller, 1993). Furthermore, selling program should be clear, relevant, distinctive and consistent passim all the selling communications.For example, CC introduced Hide-A-Case campaign in 1967 which aimed to challenge drinkers to search for bottles of Canadian Club kept hidden at remote locations all over the world. CC cases were hidden in places such as the Swiss Alps (Switzerland), Mt. Kilimanjaro (Tanzania), Angel Falls (Venezuela) etc. Therefore, the campaign was int seasonctive and engaging which is another distinctive feature for the category. Also, the campaign was communicated through the hints of where to find CC cases published in magazine ads or sport pages in daily currentspapers.Therefore, it was relevant for targeted audience and consistent end-to-end all the communications. Other campaigns involved CC Find-A-Case Cha llenge(1981) and Find A Case Challenge(2004) which were similar to earlier launched Hide-A-Case campaign, however CC cases were hidden in locations such as in Death Valley in California, on top of a skyscraper in New York City, etc. Also, the campaign involved a form of contest where teams were farewellicipating in 7 different fun-filled events or games assessing their physical and mental skills like CC Poker Run, Roll the Barrel, CC field hockey Challenge etc.The winning team was awarded of US 10000. Hence, all these campaigns were interactive, engaging and communicating brands uniqueness and exclusivity to the target audience. However, due to failure to address declining sales in 1990s the company had to develop new repositioning strategy for a brand. Therefore, they launched Damn Right Your Dad Drank It campaign aiming to expand their target audience into young male drinkers. The campaign was based on nostalgia branding concept. According to Kay (2006) reviving brands is a viab le strategy.Furthermore, it is claimed that retro branding or nostalgia branding is where scholarship towards brand depends upon consumers nostalgic leanings give the sack be a powerful management option (Kay, 2006). Similarly, Kessous and Roux (2002) argue that nostalgia can be used to reposition companys product in the market and differentiate it through creating emotional appeals to the consumers of their past experiences (Kessous, 2002). Therefore, nostalgia is defined as a preference towards objects ( bulk, places or things) which were common when peerless was younger.The nostalgia can be further classified into first-time nostalgia and long-standing nostalgia. However, nostalgia branding is commonly used within confectionary or sweets market which is why act this type of strategy for Canadian Club whisky was criticised as existence risky. Furthermore, whisky category itself is viewed as drinks for mature and old consumers and there was a threat to uphold this image even more whilst using nostalgia branding. However, the campaign succeeded as it was relevant to the target audience (young males) and consistent to its brand image as it provoked masculinity and stylishness.Also, it was consistent through all the marketing communications such as billboards, point-of-sale items, radio advertising, out-of-home advertising, in-market events, and experiential elements. In addition it was distinctive to the usual categorys advertising campaigns that usually consisted of stereotyped sex sells ads playing on hot chicks and smoking bods or James Bond appeal. Finally, the brands image and values were clearly communicated through the campaign. Therefore, nostalgia branding enabled company to reposition itself from being an exclusive and sophisticated drink into more of a mass market product.Finally, Shamma (2011) claims that total brand equity consists of product and corporate brand equity which depends on companys market, sociable and financial performance. Fur thermore, there is a despotic relationship between companys corporate brand and neighborlyly responsible marketing and total brand equity (Shamma, 2011). Similarly, Grace and King (2011) talks about employee brand equity, which is the result of positive and productive employee brand-related behaviour and is strongly linked with brands strength (Grace and King, 2011).In contrast, Kay (2004) argues that corporate branding differs from product and service branding as it is aimed at different target audiences. For instance, corporate branding usually targets companys shareholders and employees whereas product and service branding is focused on consumers who are not really enkindle in corporate brand identity (Kay, 2004). However, it is likewise claimed that both(prenominal) companies, especially those that started as niche businesses that appealed to small segments of amicablely conscious customers succeeded in creating strong and distinctive corporate brands.Referring to CC and J im Beam corporation consumers are not that concerned about companys overall image, however introduction of corporate social responsibility and socially responsible marketing could enhance employees satisfaction and therefore employee brand equity. B. You stir assumed the role of, Brand Manager for Canadian Club. Develop a brand positioning plan to fix the Canadian Club brand for the next three years (2014-2017). Suggest a variety of branding strategies that are appropriate for the brands identity and target market.Use catamenia research about the brand and the whiskey industry prior to answering this part of the assignment. Use theory to justify your arguments Canadian Club whiskey belongs to UK spirits market which was estimated to be worth ? 11. 09 bn. at current prices in 2011 (Keynote, 2012). The UK spirits and spiritss market is expected to grow by 16. 4% reaching a value of ? 13. 42bn in 2016. Thus, there is an opportunity for Canadian Club to further increase and strengthe n its share of market. Canadian Club whiskey is a prestigious brand owned by Beam Global Spirits & Wine Corporation which is US-based company.It also owns brands such as Jim Beam, Courvoisier and Tequila Sauza. Since 1920s Canadian Club differentiated itself as a higher(prenominal) quality, exclusive whisky offering experiential experience for its drinkers. Its current target market is those from legal drinking age to 34, however company is looking forward to strengthen its appeal among younger consumers in order to take into custody their life-time loyalty (Twiss, 2012). Referring to its main competitors the direct competitors are Diageos whoremasternie Walker scotch whiskey and Jack Daniels Tennessee Whiskey.Diageo is a leading distiller which currently owns more than 35% of the spirits and liquors market globally and is expanding to emergent markets such as India and Asia (BBC, 2013). It also owns brands such as Smirnoff Vodka and Gordons Gin. Furthermore, Scotch whiskey is th e leader of whiskey category in UK and worldwide and its exports were worth ? 4. 23bn in 2011 (BBC, 2013). However, there is an increasing trend among younger consumers to choose vodka and other white spirits to mix them in their cocktails.Therefore, in order to sustain and increase its market share Canadian Club needs to tackle competition arousing not only from dark spirits only also from white spirits such as vodka, rum, gin etc. Referring to categorys recent adverts Johnnie Walker Scotch whisky (Diageo) launched a new global advertising campaign in September 2012 entitled Where Flavour is a King. The campaign uses facebook application to educate users about different flavours that fall upon up each Johnnie Walker label (MarketingWeek, 2012).Meanwhile, Jack Daniels Tennessee Whiskey has lately introduced their Legend campaign where it is positioned as a whiskey of Rock & Roll era (International backup Times, 2013). On the other hand, Canadian Club recently introduced its Beer fairies campaign in Australia featuring unattractive beer drinker possessing all the negative traits associated with beer drinking. The campaign seeks to position CC as a refreshing alternative through the use of parody and provocative advertising (Campaign Brief, 2012).Furthermore, it introduced Join the Club campaign where companys chief operating officer is represented as a brand ambassador and is sharing his Whiskey wisdoms with consumers about masculinity and manhood. It is evident that several classic liquor companies have been recently using manly images in order to appeal to growing macho men population. For instance, John Jameson and its campaign legend of John Jameson with images of its founder arm-wrestling or Canadian Wisers whiskey and its Wiserhood campaign featuring a society of uncompromising men who applaud any man who resists an occasion that threatens his manhood (Krashinsky, 2012).Also, many of spirits and liquor companies are incorporating social media when crea ting a branding strategy in order to target younger and more affluent audience. For instance, Canadian Club whiskey fans are encouraged to share their Whiskey Wisdoms on facebook in order to get an access to exclusive content, invitations to local events and wisdom (Lukovitz, 2012,). Similarly, Smirnoff promoted its Vodka Ice drink through social media whilst load-bearing(a) fans to participate in a drinking game and share experiences and photos on facebook page.According to Avery and Fournier (2011) liberal source branding is a new concept in marketing where a brand is embedded in a cultural conversation such that consumers gain an equal, if not greater, say than marketers in what the brand looks like and how it behaves (Fournier, 2011, pp. 194). It is enabled through social media technologies such as blogging, video sharing, social bookmarking, social networking, and community platforms (Fournier, 2011).Furthermore, it is evident that engaging with the right individuals through social media platforms can serving to promote word-of-mouth for a brand, spread brand knowledge, generate sales and increase return on investment (Kumar, 2012). However, since the marketers do not have so much control on the overall brands image in open source branding social media can also have a negative impact on brands equity.Therefore, it is claimed that when incorporating social media in their marketing activities companies should take into consideration four powerful and challenging Web-enabled themes The board of the Social Collective, The Age of Transparency, The Age of Criticism, and The Age of Parody (Fournier, 2011). Referring to social collectiveness it is evident that online communities provide an opportunity for in-depth discussion of shared interests among consumers, therefore strengthening group bonds. Also, some of the companies developed their business models based on social collectiveness concept.For instance, Groupon offers a variety of daily deals for restaur ants, spas, massages and other activities for its members but offers are valid only if enough people sign up to receive them (Fournier, 2011). The Age of Transparency and The Age of Criticism claim that due to significant technology changes the news and opinions about particular brand spread very fast and can have a significant impact on brand equity (Fournier, 2011). For instance, due to transparency BP recently go through a fiasco with its leaking Deepwater Horizon oil rig.The news had a significant impact on negative brands reputation as BP was pursuing an image of the environmentally-friendly petroleum company and was developing activities to strengthen this image. Similarly, there is a power of disappointed companys internal employees revealing markets and firms secrets to a wider public that can damage companys image. Criticism enabled through social media technologies can also have a great impact on companys brand equity even if a small number of consumers is complaining. Fo r instance, when introduced its new product formulation called teetotal Max,Pampers had to deal with a negative impact arousing from consumers who claimed that a product caused diaper rash and was not suitable for consumers. Finally, The Age of Parody refers to online users view of social media being a pastime or a source of entertainment. Therefore, it is not surprising that many companies are trying to grab consumers attention through creating funny and interactive campaigns that go viral. However, the difficulty is to evaluate the impact and reach of these campaigns. Another recent trend in social media applications is fluent marketing and mobile social media.With progressively powerful mobile devices, many social media applications have gone mobile in order to reach customer instantly without any time or location limitations (Kaplan, 2012). Thus, mobile marketing is defined as any marketing activity conducted through a ubiquitous network to which consumers are constantly con nected using a ain mobile device (Kaplan, 2012, pp. 130). In contrast, mobile social media is defined as a group of mobile marketing applications that deliver the creation and exchange of user-generated content (Kaplan, 2012, pp. 31). It is also claimed that mobile social media applications can be classified according to users time and location sensitivity. For example, quick-timers involve transfer of traditionalistic social media applications to mobile devices to increase immediacy such as posting Twitter messages or Facebook status updates. In contrast, space-timers involve exchange of messages with relevance for one specific location at one specific point-in time, for example Facebook places, Foursquare and Gowalla.Space-timers are the most sophisticated form of mobile social marketing applications as users participation does not primarily depend on users monetary motivation. According to the theory the increasing allowingness to check in certain locations through Foursquare can be explained through self-presentation and self-disclosure concepts, and impulsiveness theory which claims that individuals often struggle between displaying long-term control and giving into short-term temptations (Kaplan, 2012).Therefore, lot of companies are collaborating with Foursquare to promote their sales and discounts, develop relationships and loyalty programs. Furthermore, it is estimated that by 2020 a mobile device bequeath be the primary Internet link tool for most people in the world (Kaplan, 2010). However, when integrating mobile social marketing applications companies should also make sure that it is integrated into the lives of consumers, offered activities or promotions are individualized according to each users preferences and interests and users are involved through engaging in conversations.Otherwise, it can become intrusive, annoying and threaten personal privacy. Nevertheless, mobile marketing provides high rate of personalisation, interactivity, low cost of reaching large audience at the right time at the right place, immediate, matched communication, does not depend on time and space etc. Hence, followed the benefits of increased brand awareness and sales through social media and mobile social marketing applications here are proposed brand positioning strategies for Canadian Club 2014-201 Strategy OneFirstly, a new brand positioning campaign called Canadian Club-Unexceptional Quality allow for be launched in September 2014. A campaign will focus on promoting major brands assets quality and exclusivity in order to seize wider audience. The main companys strategy will be to use facebook application to educate users of brands quality and suitability for various cause in order to increase the usage. It will involve posts of various taglines such as Theres no better way to impress a woman than Canadian Club-Unexceptional Quality or To be well groomed is an exceptionCanadian Club is Unexceptional in order to strengthen marketi ng communications message. The campaign is also going to encourage users to post and share photos of various occasions when CC can be consumed. This way brand tries to withdraw with audience whilst suggesting that CC is not only old men drink and can be consumed during various occasions. Additionally, in order to boost users confidence and strengthen the relation between brands image and quality the campaign will provide tips on their facebook page for exclusive Canadian Club consumers of how to silk hat dress up when drinking Canadian Club.These tips will only be accessed if users liked a page. This campaigns aim is to engage users in open and active conversations about the brand and its quality, as well as increase awareness. The campaign will be supported by billboards, radio and youtube videos. Strategy ii Secondly, since company aims to target younger audience in order to capture their life-time loyalty the use of mobile social marketing is essential. Therefore, it is sugges ted to develop a mobile application that either engages, interacts or benefits consumer.Furthermore, many of the companies nowadays collaborates with mobile social media applications such as Foursquare in order to generate users word-of-mouth, facilitate sales promotions and discounts or develop relationships through loyalty programs. Hence, Canadian Club will use foursquare meshingsite to promote brands image and increase sales. Therefore, users will be encouraged to check-in at five high class luxurious bars, restaurants or hotels listed on Canadian Clubs foursquare web page in order to get a 40% discount for a suit for upcoming occasion from a local high quality retailer.The check-ins should be followed by users comment about Canadian Clubs exceptional quality and shared on facebook with his friends. The number of discounts will be limited and the promotion campaign will run until all the discounts will be given away. Users will be updated of the remaining promotions on Canadian Clubs facebook page and personally reminded how many more locations they need to check-in if entered a competition. The campaign firstly will be tested in US and then adopted in emerging markets such as India, China, Russia. Some adjustments will be made if needed to adapt to local market. ConclusionsFor decades Canadian Club whiskey was known for its exclusivity and unexceptional quality. A brand always tried to differentiate itself from competitors whilst launching various interactive and exciting advertising campaigns that were comical and innovative for the category. Therefore, when suggesting different brand positioning strategies for 2014-2017 Canadian Club should remain enforcing its distinctive image and promoting high quality in the market. Hence, a number of social media and mobile social marketing strategies were suggested in order to capture younger users attention and build life-time loyalty towards the brand.For instance, the use of facebook application to educate us ers about Canadian Clubs high quality and suitability for various occasions is suggested, which will increase brands awareness whilst engaging in users conversations and encouraging them to share comments and photos. Also, due to increasing number of mobile applications users and forecasts of mobile phone becoming as a primary internet union tool marketers should net a great attention into mobile social media marketing when developing a brand positioning plan.Therefore, a Canadian Clubs quislingism with Foursquare website was advised in order to grab consumers attention, spread word-of-mouth and increase sales whilst asking users to check in at 5 high class listed locations to get a 20% discount for a high quality suit from a local retailer. Overall, both of these strategies will allow Canadian Club to position itself as high quality and suitable for various occasions drink among younger consumers and will help to achieve a competitive advantage through the use of mobile social m arketing. References E-jounals Fournier, S. , 2011.The uninvited brand. bank line Horizons, Online. 54, 193-207. obtainable athttp//www. sciencedirect. com/science/article/pii/S0007681311000024Accessed 02 parade 2013 Kaplan, A. M. , 2010. Users of the world, unite The challenges and opportunities of Social Media. Business Horizons, Online. 53, 59-68. obtainable athttp//www. sciencedirect. com/science/article/pii/S0007681309001232Accessed 03 process 2013 Kaplan, A. M. , 2012. If you love something, let it go mobile Mobile marketing and mobile social media 44. Business Horizons, Online. 55, 129-139. Available athttp//www. ciencedirect. com/science/article/pii/S0007681311001558Accessed 06 March 2013. Kay, M. J. , 2006. Strong brands and corporate brands. European Journal of Marketing, Online. 40, issue 7, 742-760. Available athttp//www. emeraldinsight. com/journals. htm? articleid=1562577&show=abstractAccessed 11 March 2013 Keller, K. L. , 1993. Conceptualizing, Measuring, and Man aging Csutomer-Based Brand righteousness. Journal of Marketing, Online. 57, 1-22. Available athttp//www. jstor. org/stable/1252054? seq=2&uid=3738032&uid=2&uid=4&sid=21101887384081Accessed 12 March 2013 Kessous, A. , 2008.A semiotic analysis of Nostalgia as a connection to the past. Qualitative Market Research An International Journal, Online. 11, issue 2, 192-212. Available athttp//www. emeraldinsight. com/journals. htm? articleid=1718576&show=abstractAccessed 11 March 2013 King, C. , 2011. Employee brand equity Scale learning and validation. Journal of Brand Management, Online. 19, issue 4, 268-288. Available athttp//www. palgrave-journals. com/bm/journal/v19/n4/abs/bm201144a. htmlAccessed 14 March 2013 Kumar, V. , 2012. Increasing the ROI of Social Media Marketing. MITSloan Management Review, Online. 4, issue 1, 55-61. Available athttp//scholar. google. co. uk/scholar? q=Increasing+the+ROI+of+Social+media+Marketing&btnG=&hl=en&as_sdt=0%2C5&as_vis=1Accessed 03 March 2013. Shamma , H. M. , 2011. Integrating Product and Corporate Brand law into Total Brand Equity Measurement. International Journal of Marketing Studies, Online. 3, issue 1, 11-17. Available athttp//scholar. google. co. uk/scholar? q=Integrating+Product+and+Corporate+Brand+Equity+into+Total+Brand+Equity+Measurement&btnG=&hl=en&as_sdt=0%2C5&as_vis=1Accessed 14 March 2013 Websites and Industry Reports Campaign Brief. 2012.Canadian Club hires comic legend John Cleese to poke fun at beer fairies in new campaign set to launch tomorrow via The Works, Sydney. ONLINE Available athttp//www. campaignbrief. com/2012/04/canadian-club-hires-comedian-j. html. Accessed 05 March 13 Fraser, D. 2013. How Scotch whisky conquered the world. BBC News. ONLINE Available athttp//www. bbc. co. uk/news/uk-scotland-20946411. Accessed 15 March 13 Joseph, S. 2013. Johnnie Walker launches first umbrella brand campaign. ONLINE Available athttp//www. marketingweek. co. uk/news/johnnie-walker-preps-umbrella-brand-campaign/4003 702. article. Accessed 11 March 13 Key melodic phrase (2012) Spirits and Liquors Market 2012. Hampton Key Note Krashinsky, S. 2012. Mustache marketing Selling whisky wisdom to younger drinkers. ONLINE Available athttp//m. theglobeandmail. com/report-on-business/industry-news/marketing/mustache-marketing-selling-whisky-wisdom-to-younger-drinkers/article5508749/? service=mobile. Accessed 05 March 13 Lukovitz, K. 2012. Canadian Club Intros Join the Club Campaign. Marketing Daily. ONLINE Available athttp//www. mediapost. com/publications/article/188057/canadian-club-intros-join-the-club-campaign. htmlaxzz2O2P5U9uX. Accessed 14 March 13

Tuesday, May 21, 2019

Graded Assignments Essay

The following sections contain student copies of the subsidisations. These must be distributed to students prior to the due dates for the parcel outments. Online students give confound access to these documents in PDF format, which on the wholeow for be acquirable for downloading at any time during the course. Graded assignment Requirements designation Requirements documents provided downstairs must be printed and distributed to students for pleader on completing the assignments and submitting them for grading.Instructors must remind students to retain every last(predicate) losss and assignment documents issued in every unit, as well as student-prepared documentation and graded assignments. or so or all these documents provide be utilizationd repeatedly across different units. social unit 1 designation 1 Match Risks/Threats to Solutions erudition Objectives and Outcomes You go away specify how to match common risks or threats at bottom the seven domains of a regular IT infrastructure with solutions and noise actions. subsidization RequirementsThis is a matching natural action. You get out stimulate the Match Risks/Threats to Solutions worksheet, which contains a numbered list of common risks and threats found in a typical IT infrastructure. You must enter the letter for the correct solution or preventative action in the blank to the right of individually risk or threat. Required Resources Worksheet Match Risks/Threats to Solutions compliance Requirements initialize Microsoft banter instance Arial, Size 12, type duration 1 page nabable By Unit 2 Self-Assessment ChecklistI bring forth correctly matched all the risks or threats within the seven domains of a typical IT infrastructure with the solutions and preventative actions. Unit 1 Assignment 2 Impact of a Data Classification Standard knowledge Objectives and Outcomes You will analyse how to determine the impact of a entropy tittupture cadence on an organizations IT in frastructure. Assignment Requirements You are a net operative intern at Richman Investments, a mid-level fiscal investment and consulting firm.Your supervisor has asked you to draft a brief typography that describes the ingrained Use Only data classification standard of Richman Investments. Write this promulgate addressing which IT infrastructure domains are affected by the standard and how they are affected. In your report, mention at least cardinal IT infrastructure domains affected by the Internal Use Only data classification standard. Your report will become fraction of an executive summary to senior management. Required Resources no(prenominal) entry Requirements stage Microsoft Word Font Arial, Size 12, Double-SpaceCitation Style moolah manual(a) of Style Length 12 pages Due By Unit 2 Self-Assessment Checklist I stand identify at least trine IT infrastructure domains affected by the Internal Use Only data classification standard. In my report, I give birth include d details on how those domains are affected. Unit 2 Assignment 1 Calculate the Window of Vulnerability Learning Objectives and Outcomes You will learn how to calculate a window of vulnerability (WoV). Assignment Requirements You are reviewing the certificate status for a small Microsoft workgroup LAN.The workgroup contains many distinct separations in the network determined by group memberships. An example of the network divisions is as follows Windows laptops Traveling salespeople, upstage suppliers, runner offices Windows desktops Accounting group, developer group, customer service group Windows servers administrative server, Microsoft SharePoint server, Server Message Block (SMB) server A surety breach has been identified in which the SMB server was accessed by an unauthorized user due to a security hole.The hole was detected by the server software manufacturer the previous day. A patch will be available within three days. The LAN administrator needs at least one week to down load, test, and install the patch. Calculate the WoV for the SMB server. Required Resources None Submission Requirements data format Microsoft Word Font Arial, Size 12, Double-Space Length 1 page Due By Unit 3 Self-Assessment Checklist I catch accu considerly calculated the WoV. Unit 2 Assignment 2 Microsoft Environment Analysis Learning Objectives and OutcomesYou will learn how to analyze a mixed-version Microsoft Windows environment and to identify the issues described in Microsoft credential Advisories. Assignment Requirements You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network as determined by group memberships. The network consists of calculating machines working on a variety of client platforms, such as Windows XP, Windows Vista, and Windows 7, and server products in a single environment.An example of the network divisions is as follows Windows laptops Traveling salespeople, impertinent suppliers, branch offices Windows desktops Accounting group, developer group, customer service group Windows servers Administrative server, Microsoft SharePoint server, Server Message Block (SMB) server Microsoft Common Vulnerability and Exposures (CVEs) are communicate finished security advisories with a corresponding advisory ID. Other CVE sources attach a CVE ID to advisories. Go through the archive of Microsoft security Advisories on the following link http//www.microsoft. com/technet/security/advisory/archive. mspx (accessed kinfolk 15, 2010) Answer the following questions based on the advisories for the past 12 months 1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them. 2. Do any vulnerabilities involve privilege elevation? Is this dish outed a high-priority issue? 3. Identify and document at least three vulnerabilities and the solutions related to the client configurations. Required Resources internet Submission Requirements Format Microsoft WordFont Arial, Size 12, Double-Space Length 12 pages Due By Unit 3 Self-Assessment Checklist I confuse identified at least five vulnerabilities for this workgroup LAN? I leave identified privilege elevation as a high-priority issue? I hold up identified and document at least three vulnerabilities related to the client configurations? Unit 3 Discussion 1 coming Control Models Learning Objectives and Outcomes You will learn about access control pretendings for different scenarios. Assignment Requirements In this assignment, you have a handout on the access control models.Read the handout and discuss it with your classmates to collect dissolvents for the following questions Select an access control model that best prevents unauthorized access for each of the five scenarios disposed(p) in the worksheet. Which types of licit access controls should be used in each scenario? Justify your recommendations. Respond to at least two other students views to engage in a important debate regarding their choices or to defend your choice. Required Resources Worksheet Access Control Models Submission Requirements Format Microsoft WordFont Arial, Size 12, Double-Space Citation Style Chicago Manual of Style Length 12 pages Due By Unit 3 Self-Assessment Checklist I have correctly selected an access control model that best prevents an unauthorized access for each of the five scenarios tending(p) in the worksheet. I have selected the correct types of logical access controls that should be used in each scenario. I have included justifications for my recommendations. I have responded to at least two other students views. Unit 3 Assignment 1 removed Access Control Policy Definition Learning Objectives and OutcomesYou will learn how to design a remote access control polity definition for an IT infrastructure. Assignment Requirements Richman Investments is an investment and consulting firm. The confederacy wants to expand its business operations both in th e U. S. and in foreign countries. It intends to eventually have 10,000 employees in 20 countries. The Richman corporate military headquarters is located in Phoenix, Arizona. Currently, there are eight branch offices in Atlanta, Georgia Chicago, Illinois Cincinnati, Ohio Denver, Colorado Los Angeles, California Montreal, Canada raw York City, New York Washington, D. C. The North Ameri mint offices have a total of 5,000 employees who use desktops, mobile computers, and wireless devices. The Phoenix office has an network club to all remote offices because redundancy is extremely important to the play along. on that point are several sensitive applications that all offices use. The management from each office share application information that is hosted at the corporate office. excogitate a remote access control policy for Richman using the appropriate access controls for systems, applications, and data access.Include the design and justification for using the selected access cont rols for systems, applications, and data access. Required Resources None Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Citation Style Chicago Manual of Style Length 12 pages Due By Unit 4 Self-Assessment Checklist I have correctly designed a remote access control policy for the given scenario. I have correctly selected appropriate access controls for systems, applications, and data access. I have included my justification for using the selected access controls for systems, applications, and data access.Unit 4 Assignment 1 Enhance an Existing IT Security Policy Framework Learning Objectives and Outcomes You will learn how to research standards. You will learn how to write Remote Access Standard. You will learn how procedures and guidelines fit within an IT security policy framework. Assignment Requirements You will receive the worksheet entitled Enhance an Existing IT Security Policy Framework. It contains a scenario and an parable of a portion of a companys security policy framework. After studying the worksheet, complete the following tasks Research Remote Access Standards on the Internet.For the given scenario, write a draft Remote Access Standard that will reduce the item of risks, threats, and vulnerabilities in the Remote Access domain of the given IT infrastructure. Make sure you include the minimum remote computer configurations, the use of anti-malware software, and the secure virtual private network (VPN) access in the Remote Access Standard. Indicate the names of procedures or guidelines that you would add under the Remote Access Standard. Required Resources Worksheet Enhance an Existing IT Security Policy Framework Internet Submission Requirements Format Microsoft WordFont Arial, Size 12, Double-Space Citation Style Chicago Manual of Style Length 12 pages Due By Unit 5 Self-Assessment Checklist I have written an appropriate Remote Access Standard, which includes the minimum remote computer configurations, the use of anti-malware software, and the secure VPN access. I have included the names of at least two procedures or guidelines that would appear under the Remote Access Standard in the framework. Unit 4 Assignment 2 Acceptable Use Policy (AUP) Definition Learning Objectives and Outcomes You will learn how to research and compare AUPs enforced by other organizations.You will learn how to compose a portion of an AUP for an organization. Assignment Requirements You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his in the flesh(predicate) mesh-based email account. He followed a link in a spam e-mail, downloaded games to his hard disk, and inadvertently infected the computer with malware, which spread to the network server. The security officer at Richman has asked you to research and to define the acceptable use of Richman assets regarding Internet and e-mail access, including the actions that are pr ohibited.. Then, the employees must be restricted from using the Internet at work for personal use, other than to occasionally check Web-based personal e-mail accounts. Personal downloads must be strictly prohibited. Your definition will become part of the overall AUP. For this assignment Research acceptable use policies on the Internet. Find the actual policies of real companies. Compare the portions that address Internet and e-mail access of at least three different companies. Create an AUP definition for Richman Investments that defines the acceptable and unacceptable use of Internet and e-mail access at Richman.Required Resources Internet Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Citation Style Chicago Manual of Style Length 12 pages Due By Unit 5 Self-Assessment Checklist I have conducted adequate research of AUPs before defining the policy. I have included the appropriate statements that address both acceptable and unacceptable use of the Internet and Web-based e-mail accounts. Unit 5 Assignment 1 Testing and Monitoring Security Controls Learning Objectives and OutcomesYou will learn to recognize security events and service line anomalies that might indicate suspicious activity. You will learn to identify policy violations and security breaches and to appropriately monitor threats and control activity across the network. Assignment Requirements suggest to the handout Testing and Monitoring Security Controls. It contains information on security events or breaches and baseline anomalies. After studying the handout, answer the following questions Identify at least two types of security events and baseline anomalies that might indicate suspicious activity.Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities. Required Resources Wor ksheet Testing and Monitoring Security Controls Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Length 12 pages Due By Unit 6 Self-Assessment Checklist I have identified at least two security events and baseline anomalies.I have indicated the best options for controlling and monitoring three of the policy violations and security breaches from the list. I have identified the methods to mitigate risk and to minimize exposure to threats or vulnerabilities. Unit 5 Assignment 2 Define an Acceptable Use Policy (AUP) Learning Objectives and Outcomes You will learn to successfully identify inappropriate activity on a network and to develop a basic AUP that describes the handling of such incidents. Assignment Requirements Richman Investments requires the enforcement of strict ingress-egress filtering policies for network traffic.Certain traffic is expressly forbidden No peer-to-peer file sharing or immaterially reachable file transfer communications protocol (FTP) servers No downloading executables from known software sites No unauthorized redistribution of licensed or copyrighted material No exporting internal software or skillful material in violation of export control laws No introduction of malicious programs into networks or onto systems No accessing unauthorized internal resources or information from external sources No port scanning or data interception on the networkNo denying service or circumventing authentication to rule-governed users No using programs, scripts, or commands to interfere with other network users No sending unsolicited e-mail messages or junk mail to company recipients No accessing adult content from company resources No remote connections from systems failing to meet minimum security requirements Define a LAN-to-WAN, Internet, and Web surfing AUP that restricts usage of the companys Internet connection and permits the company to monitor usage of the corporate Internet connection.Carefully evaluate the impli cations of each policy and how implementations might impact the IT infrastructure, both positively and negatively. Weigh the benefits and the disadvantages of each method. Consider whether or not a proposed solution causes an interruption to the legitimate users and how it might bring security at the expense of preventing a perfectly legitimate activity. Required Resources None Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Citation Style Chicago Manual of Style Length 12 pages Due By Unit 6 Self-Assessment ChecklistI have defined an effective LAN-to-WAN, Internet, and Web surfing AUP. I have evaluated the implications of each policy. I have carefully considered the benefits and disadvantages of each policy enforcement control. I have proposed strong ideas for acceptable and unacceptable resource usage. Unit 6 Assignment 1 BCP, DRP, BIA, and possibility Response Plan Mix and Match Learning Objectives and Outcomes You will strengthen your understandi ng of details regarding a business continuity plan (BCP), disaster recuperation plan (DRP), business impact analysis (BIA), and an incident response plan. Assignment RequirementsIn this assignment, you are provided with a handout on the major elements that are part of a BCP, DRP, BIA, and incident response plan. You must properly align the elements with their corresponding plans. Required Resources Worksheet BCP, DRP, BIA, and Incident Response Plan Mix and Match Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Length 1 page Due By Unit 7 Self-Assessment Checklist I have correctly matched all the elements with the plans. Unit 6 Assignment 2 Quantitative and Qualitative Risk Assessment Analysis Learning Objectives and OutcomesYou will be able to analyze real-world scenarios and manage a quantitative risk assessment and a qualitative risk assessment by performing proper calculations. Assignment Requirements In this assignment, you are provided with a h andout on a quantitative risk assessment and a qualitative risk assessment. Go through the scenarios given in the handout and answer the questions. Required Resources Worksheet Quantitative and Qualitative Risk Assessment Analysis Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Length 12 pages Due By Unit 7 Self-Assessment ChecklistI have correctly calculated the values for Single loss expectancy (SLE), Annual rate of occurrence (ARO), and Annual loss expectancy (ALE). I have determined the effectiveness of the safeguard of bargain foring insurance. I have determined whether or not Richman should buy the insurance. I have supported my choice with an explanation. I have correctly calculated the risk level of each of the risk given in the scenario. I have correctly prioritized the given risks. I have created an effective risk matrix for the given scenario. Unit 7 Assignment 1 Select withdraw encryption Algorithms Learning Objectives and OutcomesYou wi ll learn how to select the appropriate encryption methods and techniques for real-world business applications. Assignment Requirements In this assignment, you are given a handout which contains a list of the common encryption algorithms and five scenarios. Match the common encryption algorithms with real-world business applications and the requirements for given different scenarios. Give justification for your selections. Required Resources Worksheet Select tolerate Encryption Algorithms Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Length 1 pageDue By Unit 8 Self-Assessment Checklist I have selected the appropriate encryption algorithms and the methods for the given scenarios. I have justified the selections I have made. Unit 7 Assignment 2 Design an Encryption Strategy Learning Objectives and Outcomes You will learn how to design an green light encryption strategy. Assignment Requirements In this assignment, you are given a handout that contains the scenario of Richman Investments which needs an enterprise encryption strategya public key infrastructure (PKI) that supports internal employees, external business partners, and clients.You need to design the enterprise encryption strategy for Richman Investments. In your design, include the following Select appropriate encryption algorithms and methods. Identify and justify the selection of encryption solutions that support internal employees, external business partners, and clients. Required Resources Worksheet Design an Encryption Strategy Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Citation Style Chicago Manual of Style Length 12 pages Due By Unit 8 Self-Assessment Checklist I have selected the appropriate encryption algorithms and methods.I have identified and justified my selection of the encryption solutions that support internal employees, external business partners, and clients. Unit 8 Assignment 1 Network Hardening Learning Objective s and Outcomes You will learn the requirements of network exercise set for a given network layout. Assignment Requirements In this assignment, you are given a handout which contains four different network layouts. Your instructor will assign one of the four layouts to you. For your layout, you are required to devise at least three strategies for hardening the network environment throughout the seven domains of a typical IT infrastructure.Support your decisions with your justification. Required Resources Worksheet Network Hardening Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Length 12 pages Due By Unit 9 Self-Assessment Checklist I have identified at least three network hardening strategies for the given network layout. I have given the justification for my decisions. Unit 8 Assignment 2 Network Security Applications and Countermeasures Learning Objectives and Outcomes You will learn how to determine where certain security countermeasures take a cross the seven domains of a typical IT infrastructure.Assignment Requirements In this assignment, you are given a worksheet that contains a list of network security applications and countermeasures. You need to identify where they belong, within the seven domains of a typical IT infrastructure and what confidentiality, integrity, and availability (CIA) function they provide. Complete the worksheet and submit to your instructor for evaluation. Required Resources Worksheet Network Security Applications and Security Countermeasures Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Length 12 pagesDue By Unit 9 Self-Assessment Checklist I have accurately fixed security countermeasures within the seven domains of an IT infrastructure. I have identified the portions of the CIA triad affected by specific security countermeasures. Unit 9 Assignment 1 List Phases of a Computer Attack Learning Objectives and Outcomes You will learn how to identify the activities that occur during each phase of a computer attack. Assignment Requirements In this assignment, you need to pretend to be ethical hackers who need to protect their organization from a computer attack.List the ordinary phases of a computer attack. Thinking wish well an attacker, you should add items to each phase that an attacker would consider when performing a successful computer attack. You can refer to the textbook for this course. Required Resources Textbook basic principle of learning Systems Security Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Citation Style Chicago Manual of Style Length 12 pages Due By Unit 10 Self-Assessment Checklist I have identified at least three phases of a computer attack.In my answer, I have included the factors the attackers take into consideration when targeting computers or networks. Unit 9 Assignment 2 Summary Report on a Malicious figure Attack Learning Objectives and Outcomes You will learn how to mitiga te the threat of a virus or malware attack. Assignment Requirements Select a well-known virus or malicious code attack, and write a summary report explaining what kind of malicious attack it was, how it spread and attacked other devices, and how it was mitigated. Indicate how you would defend the attack from go on on a network you control.You may use the Internet for research. Consider the following The severity of the outbreak The propagation methods and speed The targets of the attack The success rate of the attack vector Additional complexity self-armoring, self-updating, and so on The ways to defend infection in every domain The ways to defend infraction at every layer Required Resources Internet Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Citation Style Chicago Manual of Style Length 12 pages Due By Unit 10 Self-Assessment Checklist I have included the following in my summary reportThe type of malicious attack How it spread and attacked oth er devices How it was mitigated I have specified details on how to defend the attack from recurring on a network. Unit 10 Assignment 1 Examine Real-World Applications of Security Standards and Compliance Laws Learning Objectives and Outcomes You will learn to relate a well-known standard or law to real-world applications. Assignment Requirements In this assignment, you are given a handout on security standards and compliance laws. The handout contains a list of internationalist and domestic information security standards and compliance laws.You need to select one and describe its real-world applications in both private and public sectors. Required Resources Worksheet Examine Real-World Applications of Security Standards and Compliance Laws Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Citation Style Chicago Manual of Style Length 12 pages Due By Unit 11 Self-Assessment Checklist I have correctly described real-world applications of the chosen stand ard or law. I have included examples in both the private and public sectors. Unit 10 Assignment 2 Small- to Medium-Sized Business Analysis Learning Objectives and OutcomesYou will learn how to apply the Payment posting Industrys Data Security Standards (PCI DSS) standard to a small- to medium-sized business. Assignment Requirements Meager Media is a small- to medium-sized business that is involved in the sale of used books, CDs/DVDs, and computer games. Meager Media has stores in several cities across the U. S. and is planning to bring its inventory online. The company will need to support a credit card work bear uponing and e-commerce Web site. Write a summary report detailing what Meager Media must do when setting up its Web site to nurse compliance with the PCI DSS standard.Obtain a copy of the PCI DSS standards document from the following Web site and address all 6 principles and 12 requirements in your report https//www. pcisecuritystandards. org/security_standards/pci_dss. shtml (accessed September 14, 2010) Required Resources Internet Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Citation Style Chicago Manual of Style Length 34 pages Due By Unit 11 Self-Assessment Checklist I have presented a fine plan for creating a PCI DSS-compliant Web site. I have addressed all 6 principles and 12 requirements of the PCI DSS. Project Security Domains and StrategiesPurpose This project provides you an opportunity to apply the competencies gained in various units of this course to identify security challenges and apply strategies of countermeasures in the information systems environment. Learning Objectives and Outcomes You will learn the purpose of a multi-layered security strategy. You will understand the information systems security (ISS) fundamentals including the definition of terms, concepts, elements, and goals. You will incorporate the industry standards and practices with a focus on the confidentiality, integrity, availa bility, and vulnerabilities of information systems.You will fulfill the role of a security professional implementing proper security controls in a specific business situation based on Systems Security Certified Practitioner (SSCP) Common Body of Knowledge domains. Required Source Information and Tools To complete the project, you will need the following 1. Access to the Internet to perform research for the project 2. Course textbook 3. (ISC)2 SSCP Common Body of Knowledge available in the SSCP Candidate Information Bulletin Project Logistics The project is divided into one smaller and one major assignment as per the details below Activity NameAssigned Due By % Grade Project Part 1. Multi-Layered Security Plan Unit 1 Unit 2 6 Project Part 2. Student SSCP Domain Research Paper Unit 2 Unit 11 15 Deliverables Project Part 1 Multi-Layered Security Plan mental home The components that make up cyberspace are not automatically secure. This includes cabling, physical networks, operating sys tems, and software applications that computers use to connect to the Internet. There is a raging information security war. The goal is to protect national security and business information. Therefore, IT is in great need of proper security controls. ScenarioRichman Investments is a mid-level financial investment and consulting firm. The Richman corporate headquarters is located in Phoenix, Arizona. Currently, there are eight branch offices in Atlanta, Georgia Chicago, Illinois Cincinnati, Ohio Denver, Colorado Los Angeles, California Montreal, Canada New York City, New York Washington, D. C. Tasks You are a networking intern at Richman Investments. This morning, you received an e-mail from your supervisor stating that you need to create an outline of the general security solutions planned for the safety of data and information that belongs to the organization.You are told that every month, the networking division needs to submit a report to the senior management about the security p lan for the month, and this time, your outline will become a part of that report. Therefore, you need to research the elements of a multi-layered security plan and to create an outline. Your outline should indicate one or more general security solutions for each of the seven domains of a typical IT infrastructure. For this project part, you may use the book for this course and the Internet to research the concept of a multi-layered security plan.Include several applicable layers for the plan, and describe at least one layer of security for each of the seven domains. Project Part 1 should be submitted in the following format and style Format Microsoft Word Font Arial, Size 12, Double-Space Citation Style Chicago Manual of Style Length 12 pages Self-Assessment Checklist I have included several applicable layers for the plan. I have described at least one layer of security for each of the seven domains. I have conducted adequate independent research for the report.Project Part 2 Studen t SSCP Domain Research Paper Introduction The (ISC)2 SSCP is frequently viewed as the first step in an information security career path, leading to the Certified Information Systems Security Professional (CISSP) and other modernistic certifications. Scenario Continuing the Richman Investments scenario explained in Part 1 of the project, the offices have a total of 5,000 employees, and the office technology inventory includes desktops, mobile computers, and wireless devices.There is a mix of computers running Windows XP, Windows Vista, Windows 7, and Mac OS X. Most of the managers have BlackBerry devices for instant communication, and all employees are provided cell phones. A Windows Active Directory forest with domains is set up for each office, and seven file and print servers are located in the Phoenix office. The Phoenix office also contains two proxy servers, configured as an array, that provide Web cache services and Internet access control for the organization.The majority of applications are Web-based and hosted from the Phoenix office. The Phoenix office has an Internet connection to all the remote offices, and the redundancy is extremely important to the company. There are several sensitive applications that all offices use. The management from each office shares application information that is hosted at the corporate office for accounting and reporting purposes. All employees have Internet access. There is no policy on the use of removable media. Several of the branch offices have encountered issues with malware recently.Richman hosts an intranet for employees to access information about the company and to enroll in company benefits programs. Richman also hosts an extranet for its business partners. Due to many recent technology and process improvements within Richman, the corporate security policy is out of date, and each branch office policy differs. Tasks You are a networking security intern at Richman. You have been asked to submit a proposal to Richman senior management. In the proposal, you must choose to address one of the following and relate it to the appropriate SSCP domains 1.Based on the acquaint that Richman has 5,000 employees throughout the main office and several branch offices, you must research solutions and detail the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. 2. Based on the present that most of the managers have BlackBerry devices for instant communications and all employees are provided cell phones, you must research and detail the cryptography methods to protectorganizational information using techniques that ensure its integrity, confidentiality, authenticity, and nonrepudiation, and the recovery of encrypted information in its original form. 3. Based on the premise that there is a mix of computers running Windows 2000, Windows XP, Windows Vist a, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.4. Based on the premise that all employees have Internet access to browse the Web, there is no policy on the use of removable media, and several of the branch offices have encountered issues with malware recently, you must research and formulate a plan to implement monitoring and analysis. You must determine system implementation and access in accordance with defined IT criteria as well as how to collect information for identification of and response to security breaches or events.5. Based on the premise that Richman hosts an intranet for employees to access information about the company and enroll in company benefits programs, and that Richman also hosts an extranet for its business partners, you must re search and devise a method to secure networks and communications. This should include the network structure, transmission methods and techniques, transport formats, and security measures used to form both private and public communication networks.6. Based on the premise that the Phoenix office contains two proxy servers configured as an array, which provide Web cache services and Internet access control for Richman, and that the majority of applications are Web-based and hosted from the Phoenix office, you must assess risk, response, and recovery. Conduct a review of the implementation processes essential to the identification, measurement, and control of loss associated with uncertain events. 7.Based on the premise that the corporate security policy is out of date and each branch office policy differs, you must research and define security operations and administration including the identification of information assets and documentation of policies, standards, procedures, and guid elines that ensure confidentiality, integrity, and availability. You need to write the proposal as detailed in the instructions above. Be sure that you create a professional, well-developed proposal with proper documentation, grammar, spelling, and punctuation. In addition, document the vulnerabilities, methods, and controls effectively.Project Part 2 should be submitted in the following format and style Format Microsoft Word Font Arial, Size 12, Double-Space Citation Style Chicago Manual of Style Length 45 pages Self-Assessment Checklist I have created a professional, well-developed proposal with proper documentation, grammar, spelling, and punctuation. I have successfully identified appropriate SSCP domains and related them to the scenario. I have documented the vulnerabilities, methods, and controls effectively. I have conducted adequate independent research for the proposal.