Wednesday, August 26, 2020

Humanities Essay Example | Topics and Well Written Essays - 1250 words - 4

Humanities - Essay Example St Augustine characterizes the first sin as the best indication of Man’s pride and unfaithfulness to God and communicates the requirement for get-together with God through Christ. He accepts that Grace is the appearance of God’s work through benevolent acts that individuals do. In this way, he calls for Christians to submit totally to God for salvation. An examination of the St Augustines admissions delineates God as a heavenly being, to whom every person ought to submit genuinely. Regardless, St Augustine concentrated on the idea of the first sin that is pivotal in the Christian. The first sin alludes to the insubordination of Adam and Eve in the nursery of Aden. On this, Augustine express that Adam’s sin is transmitted by the â€Å"hurtful desire† of people (Hollingworth 13-25). In abstract works, he noticed that the first sin is a sign of human noncompliance of God due to human pride. He clarifies that the first sin came about to the change of people, as the confronted the results of their transgressions. Since Adam and Eve made nature through generation, it follows that every single individual convey the transgression that their folks submitted. This infers all the relatives of Adam and Eve are brought into the world with the first sin. He utilizes a practical way to deal with calls attention to since the primary guardians are the base of mankind, at that point every one of those humankind acquired this transgression from their folks. The conv iction that all humankind bears the first sin is generally acknowledged in the contemporary Christian people group. Accordingly, St Augustine’s origination of unique sin in the medieval period has formed current Christianity. Next, St Augustine gives a nitty gritty investigation of heavenly beauty and the manner in which it influences the lives of Christians. He expresses that individuals come up short on the capacity to do great or even react to the desire of God without his awesome mediation. To Augustine, Grace is the capacity of people to do great acts that are as per the desire of

Saturday, August 22, 2020

Exploring My Mental Illnesses Essay -- Borderline Personality Disorde

In today’s society it’s extremely hard for individuals to effectively recognize what their identity is, the place they have a place in this world, just as set up and keep up sound associations with everyone around them. These issues can impressively be considerably more dangerous for somebody with a dysfunctional behavior. Besides, these difficulties can be much more terrible for a person who has a dysfunctional behavior however hasn’t been authoritatively determined to have a general condition; thusly, making it even more hard for that individual to get the best possible assistance and help expected to carry on with a glad and fruitful life. I just so happen to be one of those people who has never been officially determined to have a psychological incapacity. Other than being noted for experiencing over the top nervousness and gloom as an adolescent, I have no genuine thought what state of mind I may have. In this way, in an exertion of increasing a more notewor thy comprehension of myself, I’d like to investigate a few psychological sicknesses that portray a portion of my side effects so as to see which parts of these disarranges coordinate my background. The main issue to which I accept intently relates to me is Borderline character issue. As indicated by Pamela Bjorklund, this genuine issue is most precisely portrayed as a reliable example of precariousness and indiscreet conduct inside the settings of connections and mental self portrait, among numerous others (5). It is accepted to be brought about by youth injuries, for example, parental disregard or sexual, physical, or psychological mistreatment (Bjorkland 5). Marginal character issue could likewise be brought about by presentation to hurtful situations, for example, war and sickness (Bjorklund 5 and Holm el at. 560). In any case, as Bjorklund states as per the Diagnostic and Statistical Manual of Mental Diso... ...earch Complete. Web. 24 Apr. 2014. Duty, Kenneth N. Subtypes, Dimensions, Levels, and Mental States in Narcissism and Narcissistic Personality Disorder. Journal of Clinical Psychology 68.8 (2012): 886-897. Scholastic Search Complete. Web. 29 Apr. 2014. Pincus, Aaron L., Nicole M. Cain, and Aidan G. C. Wright. Narcissistic Grandiosity and Narcissistic Vulnerability in Psychotherapy. Personality Disorders: Theory, Research, and Treatment (2014): PsycARTICLES. Web. 29 Apr. 2014. Zbozinek, Tomislav D.Rose, Raphael D.Wolitzky-Taylor, Kate B.Sherbourne, CathySullivan, GreerStein, Murray B.Roy-Byrne, Peter P.Craske, Michelle G. Analytic Overlap of Generalized Anxiety Disorder and Major Depressive Disorder in a Primary Care Sample. Depression and Anxiety (1091-4269) 29.12 (2012): 1065-1071. Brain research and Behavioral Sciences Collection. Web. 29 Apr. 2014.

Sunday, August 16, 2020

Maintaining a Happy Marriage With Some Stress

Maintaining a Happy Marriage With Some Stress Relationships Spouses & Partners Print How to Maintain a Happy Marriage With Some Stress By Elizabeth Scott, MS twitter Elizabeth Scott, MS, is a wellness coach specializing in stress management and quality of life, and the author of 8 Keys to Stress Management. Learn about our editorial policy Elizabeth Scott, MS Medically reviewed by Medically reviewed by Steven Gans, MD on April 10, 2015 Steven Gans, MD is board-certified in psychiatry and is an active supervisor, teacher, and mentor at Massachusetts General Hospital. Learn about our Medical Review Board Steven Gans, MD Updated on August 01, 2019 Mark Edward Atkinson/Tracey Lee/Getty Images More in Relationships Spouses & Partners Marital Problems LGBTQ Violence and Abuse Do you sometimes feel like your relationship is in a rut? Most of us strive to keep drama levels low in our relationships, but we dont want to eliminate all  drama â€" boredom, and lack of connection can be problems in themselves.  Research on marital satisfaction underscores the importance of having fun in a relationship. Stony Brook University social psychology researchers Irene Tsapelas and Arthur Aron, along with University of Michigan researcher Terri Orbuch, interviewed a representative U.S. sample of 123 married couples seven years into their marriage, and then again, nine years later, 16 years into their marriage, and found that those who felt bored in their marriage at 7 years were significantly more likely to feel bored and less satisfied after 16 years of marriage. Being in a Rut in Your Marriage The researchers asked couples questions like, “During the past month, how often did you feel that your marriage was in a rut (or getting into a rut), that you do the same thing all the time and rarely get to do exciting things together as a couple?” It was found that boredom at 7 years was correlated to increased boredom even 9 years later. One important finding here is that being in a rut, or being bored in the relationship, led to less closeness, which led to reduced satisfaction in the marriage. These findings suggest that a happy marriage involves more than merely a lack of conflict (though knowing how to work through problems in a respectful way is also key). People often think that couples who ‘never fight’ are the happiest but research shows that a little conflict can be a good thing. It also reminds us that going through challenges as a couple (from daily life stress that we help each other manage, to major crises that we support one another work through) isn’t entirely bad, and can actually bring couples closer. Although major crises can also take a toll on a marriage, this is a reminder that enduring sameness and routine isn’t the ideal, either, and that the challenges we face can have a positive impact, too. Aron has done previous research on couples that have shown that when couples go through new experiences and challenges together, marital satisfaction increases. “It is not enough for couples to be free of problems and conflicts,” notes Aron in a press release. “The take-home message of this research is that to maintain high levels of marital quality over time, couples also need to make their lives together exciting.” Trying New Things Together in a Marriage So how can you keep things exciting in a marriage â€" especially when life takes over and you have real responsibilities? The key is to not only communicate and work through conflict in healthy ways  but do things together that are new and exciting. Here are some ways to do that, and maintain a happy marriage: Have a date night once a week. My husband and I started doing this years ago, and it was transformative for our marriage. We had fallen into a rut of being parents and workers who just exchanged stories about our days each night, and this helped us have frequent new experiences together where we were able to just be “us” again  and have fun! (Note: if hiring a sitter is out of the question financially, see if you can swap babysitting with another family; then the kids get to play and the adults get regular breaks for free.)Try new thingsâ€"regularly! When you’re on your dates, don’t just do the same things all the time. Go see stand-up comedy, go on hikes, go horseback riding, see live music, try new and exotic food, take dance classes together. Do things that you haven’t done before! This helps relieve stress and boredom in life  and allows you to grow together at the same time.Participate actively in each other’s lives. Get involved in what your spouse is doing, and in vite their participation in your life. Your challenges then become shared experiences, you both benefit from the support, and stressors feel less stressful. If you’re parents, this includes both of you being actively involved in your kids’ lives  and facing challenges as a team. (This sounds like a given, but sometimes reminders help.)Have more fun. Sometimes its just that simple â€" seek out fun, and make it part of your relationship. This can be as simple as maintaining a sense of humor or can involve taking certain steps toward having fun on a regular basis. Dont let responsibility and stress rob you of marital satisfaction and fun in life â€" you both deserve better! Following these steps can help you to enjoy life more, feel less stressed, and experience greater levels of marital satisfaction. Sounds win-win, doesnt it?

Sunday, May 24, 2020

Essay on Internal and External Conflict in Hamlet - 933 Words

In the play Hamlet by William Shakespeare conflict plays a very significant role. The play’s main protagonist, Hamlet, possesses both internal and external conflict due to the fact that he is fighting his inner conscience and suppressing his inner emotions, and he is seeking revenge on and conflicting with many other characters in the play. These internal and external conflicts this character is experiencing affect those around him. They also shape the events that occur in the drama and contribute to the overall outcome. Hamlet experiences a tremendous amount of internal conflict throughout the play. He is constantly debating whether or not he should face his troubles. This sense of uncertainty comes from a lack of self confidence,†¦show more content†¦He fights his gut feelings and suppresses his emotions until he misses his chances which he then hates himself for doing. These feelings of uncertainty stem from another inner conflict he is experiencing which has to do with how angry he really feels about his father’s death, and how his mother marries the man who Hamlet believes to have killed him. As a result of all of these inner conflicts, Hamlet shuts out the people who love him, and shuts out all feelings of love. An example of this is how Hamlet treats Ophelia. Hamlet really adores Ophelia, but the internal conflict he is experiencing has left him feeling lost and frustrated causing him to take out his anger on her. The external conflicts Hamlet experiences are a direct result of the conflict he feels within himself. Many external conflicts occur in this play. However, the main conflict is between Hamlet and Claudius. Hamlets anger towards Claudius is being driven by his intense emotions and anxiety in the event of losing his father. Hamlet believes Claudius has taken everything from him, and he is on a mission to get revenge. Claudius is being driven by two things, his naturally cynical and greedy nature, and his thirst for power. T hese are what drive him to great lengths to ensure Hamlet never gets his way. Hamlet on the other hand, is the exact opposite of Claudius in every other aspect except one. Hamlet, like Claudius possesses the ability to be cold and calculative. Both characters canShow MoreRelatedInternal And External Conflicts In Hamlet959 Words   |  4 Pages Conflict is indispensable to drama. Show that the inward conflicts are equally important as the outward conflict in the play. Hamlet faces both internal and external conflicts from the beginning of the play. In the play, the inner and outer conflicts of Hamlet seem to arise from the death of his father, King Hamlet, by his uncle, now King Claudius. Since Hamlets’ life pervades with conflicts as the confusion he faces essentially becomes the main focus of the play. However, Hamlet contains a diverseRead MoreInternal Conflict And External Conflict In Shakespeares Hamlet711 Words   |  3 PagesConflict is indispensable to drama and is necessary to interest the reader on the receiving end of the dramatic work. In William Shakespeare’s Hamlet, the protagonist, Hamlet, exhibits certain responses to external conflicts, which provoke internal conflicts and assert his character. The central inward conflict and the principal motive that this character experience is the delay in his revenge against Claudius which is caused by his conscience. The mental and emotional complications experienced byRead Mor eExternal and Internal Conflict in Hamlet Essay779 Words   |  4 Pagesreactions to situations of external or internal conflict are reflected in much of literature. In the play Hamlet by William Shakespeare, the character of Hamlet must deal with both external and internal conflict. He faces the death of his father, the knowledge that his uncle Claudius is his fathers murderer and the knowledge that he must take revenge. Hamlets responses to these external conflicts and his own internal views proclaim his nature and character. Hamlet is very distraught and griefRead MoreInternal and External Conflict in Hamlet Essay516 Words   |  3 Pagesscript ‘Hamlet’, written by William Shakespeare, conflict, both internal and external, was important to the text in a variety of ways. Internal conflict enabled the character development of Hamlet to take place, showing his nature rich in procrastination as he developed from a cowardly griever to a confident man no longer fearful of the unknown. This character development illustrates the main themes of revenge, good vs. evil, and more. Conflict in this text provides the main protagonist (Hamlet) withRead MoreShakespeare s Hamlet - External And Internal Conflict1738 Words   |  7 Pages In the play Hamlet by William Shakespeare, the character Hamlet must deal with both external and internal conflict. Hamlet encounters many struggles and does not know how to cope with all of them. By having so many corrupt people in his life, he feels isolated from everyone because he does not know who to trust anymore. A result from this isolation leads Hamlet into depression and forces more issues to occur. Both inward and outward conflicts are displayed in the play when, Hamlet struggles withRead MoreMental Conflict In Hamlet741 Words   |  3 Pagesfighting. However, in his play, Hamlet, he focuses more on mental conflict and thought, which he gives excitement by mimicking and creating parallels between(and switching between†¦?) different aspects of external actions. As the play begins, Shakespeare creates multiple conflicts wrapped together, which are internally contemplated, but externally connected. Hamlet’s most painful conflict is presented as he discovers that his Uncle Claudius has committed regicide, killing Hamlet Senior. Suddenly, Hamlet’sRead MoreHamlet And Laertes By William Shakespeare1469 Words   |  6 PagesShakespeare’s characters Hamlet and Laertes, in the play Hamlet, attempt to attain revenge for their fathers, but contrast in their approaches to achieving revenge, and their view of life as a whole, their failures revealing the inevitability of fate. Just as Hamlet’s inaction hinders him from achieving his goal of killing Claudius, Laertes’s impetuosity similarly leads him astray from his goal their inability to achieve these goals. The power of fate is thereby revealed through the futility of humanRead MoreHamlet by William Shakespeare788 Words   |  3 Pagesthe tragedy, Hamlet by William Shakespeare, the audience is presented with a character who suffers inner and external conflicts. Hamlet, the young prince, continues to mourn his father’s death from the beginning of the play until the end. Hamlet’s inner conflict is that he discovers Claudius, his uncle, has committed the murder of his father. Hamlet does not analyze how he will seek revenge and murder his Uncle Claudius without his conscience interfering. The external conflict that Hamlet endures isRead MoreEssay On Internal Conflicts In Hamlet1083 Words   |  5 PagesThe internal conflicts prevalent in William Shakespeare’s Hamlet are the reason why the play is viewed as a classic. Conflicts are imperative in tragic plays as conflicts are the stimulus for catastrophe in the end. The characters in Hamlet face inward conflicts that are equally important as their outward conflicts. Three characters who especially exhibit this are Hamlet, Claudius, and Ophelia. The conflicts that these charac ters face play a major role in their downfalls and, ultimately, their deathsRead MoreHamlets Inner and Outer Conflict in Shakespeares Hamlet Essay542 Words   |  3 PagesConflict, in literary context, can be defined as â€Å"the opposition of persons or forces that gives rise to the dramatic action in a drama or fiction.† Conflicts can be external, between two or more persons, or internal, within one’s self. In most literature the conflict adds to the execution of the plot itself. Shakespeare’s â€Å"Hamlet† makes use of both forms of conflict as an essential element of the play. I will show how â€Å"Hamlet† presents inner and outer conflicts with examples of each and how

Wednesday, May 13, 2020

Religion Is Poison - 8248 Words

Jim Meyer Personal Research 4.12.2014 Religion has Proven Itself Poisonous and a Danger to Mankind Everybody knows what religion is before you ask them. But if you ask them what religion is, they will find it very hard to define! By definition we might also say religion is for people who feel that lack a core guidance system and need to have higher rules and guidelines to live their life to the fullest. Appropriately, this is identical to the definition of control. That is because religion is a complex subject and religion is only a word. Like all words, it can mean anything we want it to mean, but in a discussion, it is important that we understand how the word is used. I believe it is impossible to give a satisfactory universal†¦show more content†¦However, such aversion would not necessarily mean we should discard everything he has to say. Concerning faith Bertrand Russell said: â€Å"I am as firmly convinced that religions do harm as I am that they are untrue.† †¦. We may define faith, as a firm belief in something for which there is no evidence. When there is evidence, no one speaks of faith†¦We speak only of faith when we wish to substitute emotion for evidence. 3 Bruno Bauer (1809–1882), philosopher, historian, and theologian described religion as a form of alienation, which, because of the deficiencies of earthly life, projected irrational, transcendent powers over the self. He also explicitly equated Christianity and feudalism, and defended the freedom and equality of self-consciousness. Religion and the absolutist state were mutually sustaining, sharing the essential features of alienation and repression. Leo Strauss (1899-1973) was a German–American political philosopher was a Jew. He scandalized Christian Europe with his portrayal of â€Å"†¦the historical Jesus, whose divine nature he denied. His theory was that the Christ of the Gospels†¦was the unintentional creation of the early Christian Messianic expectation. In fact, Strauss strongly criticizes what he regards as a particularly Christian view of revelation not in order to banish revelation from intellectual conversation once and for all but to suggest that modernity s intellectual ills stem in large part from the legacyShow MoreRelatedGod Is Not Great: How Religion Poisons Everything2031 Words   |  8 PagesNot Great: How Religion Poisons Everything uses his own personal experiences with religions and gives us an insight as to why he feels that religion is flawed. Throughout his book he uses arguments that is justified by modern science and social issues that uses religion as an excuse to execute unreasona ble actions. His arguments are from the consumption of certain meats to the war against nations just for defending the righteousness of each religion. Hitchens thoughts of human religion is back up byRead MoreThe Garden Of Love By William Blake1420 Words   |  6 Pagesthat life is in a constant state of inconsistency and that nothing can remain uniform. Blake uses religion in a negative light to convey that restriction on life, particularly love, corrupts life and prevents you from experiencing happiness. The main conflict presented in this poem is between the individual and religion. Blake uses religious symbols such as chapels, graves, and priests to show how religion can destroy the natural lover and creator in a person. The inconsistency of life emphasized inRead MoreEssay about God Is Not Great1024 Words   |  5 PagesIn his book God Is Not Great: How Religion Poisons Everything, Christopher Hitchens dissects and criticizes the various claims of religions and the tragic ev ents that have been caused by various religions. The title of the book sums up the arguments of Hitchens in this book in the fact that he makes many arguments of why â€Å"religion poisons everything.† The majority of the chapters in this book discuss why he believes religion to be a manmade notion that has led to more trouble than anything else inRead MoreSummary Of Man Is A Social Animal 1275 Words   |  6 Pagesthem. Talking about the religions and the beliefs of the early man Evan stated that believers and non believers had different approach on studying religion. . He claimed that believers and non-believers approach the study of religion in vastly different ways. Non-believers, he noted, are quick to come up with biological, sociological, or psychological theories to explain religious experience as illusion, whereas believers are more likely to develop theories explaining religion as a method of conceptualizingRead More James Baldwin’s Critique of the Social Condition Essay1214 Words   |  5 Pagesmany of those legends, including Christianity, to which the world clings began their conquest of the world with just some such concerted surrender to distortion†. Religion may have good intentions in its teachings, but as to how it was spread and taught to people is something that Baldwin questions. The few lines that talk about religion may seem irrelevant to the essay, but because he introduces it through something relevant to the main idea, it suddenly does sound relevant. Again, it shows Baldwin’sRead MoreHinduism and Budhism: Two of the World ´s Largest Religions1201 Words   |  5 PagesReligion is everywhere. It influences us all on a daily basis, whether we are religious or not. While the subject of religion is extremely controversial, roughly 84% of the world is religious in some way. (84) Out of all the worldly belief systems there are twenty-two main religions that are recognized as having the largest population of followers.(Major) Of these, there are some that are not recognized as or do not fall under the definition of religion in their countries of origin. Two of theseRead MoreHamlet as a Revenge Tragedy Essay examples1285 Words   |  6 Pagesresponsibility to revenge the crime. The revenger is usually an outsider who lacks access to the criminal, who is at the centre of a completely corrupt court. Poison plays a large part and methods of killing are intricate, insidious and imaginative. The revenger dies at the end of the play, as he has gone against religion by taking the power of revenge from God. There will be many other deaths as the corrupt court is cleansed. Revenge tragedies contain visual references to deathRead MoreRhetorical Analysis Of Red Jacket757 Words   |  4 Pagespeople. In the speech, Red Jacket Defends Native American Religion, 1805, Red Jacket builds an argument to persuade his audience that Native Americans should have the right to practice the religion that is best suited to them by making the British feel like brothers, reminding them of the past relationship their people shared before the war, and invalidating the British’s reasoning for believing that their religion is the correct religion. Initially, Red Jacket repeatedly uses the word â€Å"Brother†Read MoreGod is Not Great by Christopher Hitchens1301 Words   |  6 Pagesseen in the many debates between Atheistic and religious individuals about the implications of religious belief on morality. One of the most famous Atheists, Christopher Hitchens, asserts that religion is not only unnecessary for morality, but actually impedes it. In his work God is Not Great: Why Religion Poisons Everything, Christopher Hitchens challenges religious believers to â€Å"name an ethical statement or action, made or performed by a person of faith that could not have been made or performed byRead MoreThe Adaptive Value Of Religious Ritual1528 Words   |  7 PagesReligion is the belief and rituals that are used to understand human existence and the flaws of our world, with the belief in a supernatural relationship and its forces. It has been found that for over 100,000 years people have been practicing some form of religion, wh ich means it has really stood the test of time regardless of any pain or discomfort that may be inflicted during rituals, or even without a true proof of religion (p. 112). According to the article, â€Å"The Adaptive Value of Religious

Wednesday, May 6, 2020

Wrist Watch Structure Free Essays

THE TOP PLATE The Movement as Seen from the Back of the Watch {draw:rect} {draw:frame} THE BOTTOM PLATE *The* Dial Side of the Movement {draw:rect} {draw:frame} THE KEYLESS WORKS Winding and Hand-Setting {draw:frame} THE MOTION WORKS The Hour, Minute and Second Hands {draw:frame} The Cannon Pinion, Hour Wheel, Minute Wheel and Wheel Pinions {draw:rect} {draw:frame} The illustration above shows the motion works of a center-seconds watch. (1) The fourth wheel pinion, which carries the seconds hand. (2) The center wheel pinion, which carries the cannon pinion. We will write a custom essay sample on Wrist Watch Structure or any similar topic only for you Order Now 3) The cannon pinion, which carries the minutes hand. (4) the hour wheel, which carries the hour hand. {draw:frame} The second illustration diagrams the power flow from movement to hands. (A) The movement plate. (B) The center wheel. (C) The fourth wheel. (D) The cannon pinion. (E) The hour wheel. (F) The minute wheel. You can follow the power flow with the red numbers, 1 through 8. {draw:frame} The Balance Wheel: Amplitude {draw:rect} Amplitude may be measured with an electronic timer, or may be visually estimated. In the illustration the balance is in its centered (rest) position. The clockwise travel of one spoke (bottom) is indicated. Normally, the spoke will travel to between 275 and 315 degrees before reversing its direction, returning to center, and traveling 275 to 315 degrees counterclockwise. The Balance Wheel in Detail {draw:rect} {draw:frame} *THE ESCAPEMENT: Escape Wheel,* Pallets and Balance Staff {draw:rect} {draw:frame} The Mainspring, Mainspring Barrel, Barrel Arbor, Ratchet and Crown Wheel {draw:rect} {draw:frame} The Wheel Train {draw:rect} {draw:frame} Screws *The* Various Screws Used in the Watch {draw:rect} {draw:frame} How to cite Wrist Watch Structure, Essay examples

Monday, May 4, 2020

Life of Organization and educational change - Myassignmenthelp.Com

Question: 1. Identify the two, different, theoretical perspectives used in this subject, which underpin how we understand organisational change, and explain and critically discuss their key ideas and features, drawing from the topic providedandfrom your wider reading. Go on to writetwo different definitionsof organisational change, one based upon the first theoretical perspective discussed above, and the second based on the other theoretical perspective discussed above.Brieflyexplain the link between each definition and its underlying theoretical perspective. 2. Using an organisation that you are familiar with Briefly introduce the organisation.Identify and describe a change that is happening, or has previously happened, within it Go on to explain how your definitions) related to the change occurring in this organisation. 3. Draw up a SWOT analysis,as a table,to assess what has caused the need for the organisational change which you identified in question 2 above,thenexplain, discuss and integrate your analysis, including a conclusion that summarise the current state of the business and connects this to why the change was (or is being) implemented.Then, in your own words, (but using references to support you)identify and critically evaluate the benefitsanddrawbacks (from both the objectivist and social constructionist perspectives)of using business SWOT analyses in general to determine the need for organisations to change. 4. Using the subject materials (overview, textbook, required readings, online meeting material), as well as your wider reading,identify, explain andcritically assessthe key conceptualisations and ideas about of role of the change agent (that are relevant to your case),and thenapply this analysis specifcally to the change in organisation described above. 5. Using the subject materials as well as your wider reading,define and critically discussboth problem-centric and dialogic approaches to change. Briefly identify which theoretical ontology of organisational change underpins each. Critically assess the benefitsanddrawbacks of each of these approaches to change management. Go on to identify which of these approaches you would prefer to use to manage the change you identified in .and explain why. Answer: Answer 1 Change management theories Organizational change management is the framework that is utilized to manage or to understand the effect of new organizational processes. The change that has been implemented in the organization can be of different types for example cultural change, organizational structure related change, business processes, or working environment as these factors could enhance the organizational productivity and increase the involvement of the employees in the organizational restructuring (Rufo, 2012, pp. 325). There are several theories of organizational change management that has been applied by different organizations to successfully implement change in their service or in the structure of their organization. Two from those organizational change management models are going to be explained and critically discussed (Park et al., 2012, pp. 123). The first organizational change model is Lewins change management model. Kurt Lewin developed this model and it is comprised of three steps, unfreezing, changing and refreezing. The theory of Lewin of change management was similar to changing the shape of Ice. To change the shape of Ice, it first need to be melted and converted to another shape and finally refreezing to let it retain the shape. Similarly, organizational change needs the amalgamation of efforts from all the stakeholders, its employees to melt the rigidness and shape the organization in a desired frame and refreezing again to maintain the newer structural framework of the organization (Hayes, 2014, pp. 213). On the other hand, the second theory that has been chosen for the discussion is ADKAR model of change. The prime components of this change model are awareness, desire, knowledge, ability and reinforcement. According to this change theory, the process of organizational change is sequential and to achieve the ultimate success or change in the organization every step need to be successful. The steps of this change theory are interlinked and focuses on every aspect f a successful change implementation. This change management model is flexible and focuses on the importance of communication within the organization to involve the employees of the organization (Worley Mohrman, 2014, pp. 220). Therefore, these two change theories provide two different perspective of organizational change management. The Lewin model described the organizational change as refreezing a unfreeze water after changing the shape or structure of the framework. The process seems easier and requires melting or dissolving all the processes of that organization. Further, the change is just limited to the structure or shape of the new frame, no new process is introduced in this change model (Worley Mohrman, 2014, pp. 223). On the other hand, the ADKAR change management model involves employees, their communication, the process, the environment and then related it to the proposed change and the implementation process. The change presented in this model is derived from discussion with the employees and their feedback and it is implemented with the involvement of those employees. The change process in this scenario is not simple and discussion with the entire organization and taking care of their thought s and beliefs make the process complicated (Dusseux et al., 2015, pp. 1091). However, the links between these two framework is evident form their structural framework. Any organization needs to unfreeze its processes to implement any change; therefore, ADKAR model also involves processes of Lewin model for successful change implementation. On the other hand, changing the structural framework of any organization cannot be successful without the consent from the employees. Hence, the steps of ADKAR model need to be implemented in Lewin change management model (Bartunek, 2014, pp. 191). Answer 2 Organizational information The organization that has been chosen for the assignment is The Mobil Australia. The organization is a global brand and was established in the year 1911, in New York, the United States of America. The company changed its name from the standard oil company to Mobil in 1963. However, the ancestor company of this company that is known as the Vacuum oil was first operated I Melbourne Australia in 1895. However, the name Mobil oil Australia was coined in 1990s. The first refinery of the company was established in 1946 in Melbourne. Further, the organization was able to build refineries in continuous intervals and in regions like Port Stanvac, near Altona refinery and in Bass Strait. However, due to the internal and external unavoidable factors the organization has to undergo complete organizational restructuring and process re-engineering as to stay alive in the market competition and continue serving the society (Mobil.com, 2018). The increasing competitive market and emergence of newer organizations with better engineering and organizational framework, led the organization the Mobil, re-engineer its process and change the organizational framework. The organization performed all this to stay in the market competition. As the organization has, a large and complex corporate structure that involves the international division that was responsible for conducting marketing and implementing necessary steps for the organizations outside USA was established in Australia to independently continue serving (Killian et al., 2012, pp. 23). The re-engineering of the organizational process was divided into different phases such as initiation, diagnosis, process re-engineering, organizational design, implementation and post implementation process. The change was to identify a process related activity, changing which can lead to increase the production of the company. The further objective for the change management was set in t hree categories financial, behavioral and cultural. The company aimed to gain 3 percent in the return on capital employed compared to its previous year. The behavioral proposed change was about the customers and focused on profits internally as well as externally. The last proposed change was cultural and the organization wanted to become more team oriented, motivated and a stronger and better workforce (Schlichting, 2013, pp. 510). The change agents in this scenario were the employees as well as the newly appointed Australian Mobil executive, who was appointed to share the ideas and experiences that he acquired in the headquarter change management happened in USA few years ago. The entire employee, belonging different sections and departments of different locations of the organization was divided into teams and their duty was to use their knowledge and understanding to identify the issue and judge the outcome. The venture team was also implemented to understand the process related issue and to redefine, redesign and simplify the business activities, and workflow. Further, the recommendation from the senior employees was to be proof read by the venture team, which was responsible to take that suggestion to the Mobil executive (Talbot Boiral, 2015, pp. 336). The change that occurred in the Mobil Australia organization was interlinked with Lewin as well as ADKAR change management model. The prime aim of the stakeholders of the organization was to induce change in three sections, financial, behavioral and cultural. To implement change in these sections, the first thing that was supposed to perform was involving employees and other vulnerable stakeholders in the process. Unfreezing the employees from their negative thinking to implement positive change needed three steps of Lewin change model. On the other hand, unfreezing employees limited knowledge needed awareness of the proposed change, desire, ability of the employee to withstand the change And reinforcement of proposed change. Arranging workshops about the newer process, meeting for the newer employees with the experienced ones, arranging feedback sessions to understand the knowledge of the employees were utilized to understand the readiness of the organization for change. Involving f ew loyal customers to understand their perspective of organizations customer involvement policies was helpful to evaluate the change process. Therefore, involving both the theories of change management mentioned in previous answer was implemented in the organization. Answer 3 SWOT analysis The SWOT analysis is a marketing tool that is used to determine the market position of the company compared to its competitors and helps to understand the future perspective of the organization with potential threat to its development. The SWOT is made up of strengths, weaknesses, opportunities and threats of the organization in the market. The following table is going to describe the SWOT analysis of the organization, when the change was imposed. SWOT analysis Strength The strength of the Mobil company was Its brand power. The organization was famous in the global market because of its brand name and was 4th at that time in global market. The research and development section was strongest portion of the organization, which led them create or found three oil reservoirs in Australia within 10 years of time frame. The third strength was its market position and revenue generation. It was one of the largest refiners of oil at that time and was able to collect its revenue from countries like Canada, Australia, Germany and Singapore. The strong financial backing from the headquarters let the organization to carry out projects including heavy oil, light gas, deep water and arctic and sour gas projects and so on (Wu et al., 2015, pp. 875). Weaknesses The weaknesses included: Negative publicity was the biggest weakness of the organization as it created a bad image in the eyes of the customers. Contaminant refineries, increasing damages, fines and penalties made the organization famous for negative reasons. The organization was increasing its debt and the financial system was also lagging behind, as the organization lost its revenue due to negative comments (Van Der weiden, Nayak Swinburn, 2012, pp. 1051). Opportunities The opportunities included: Increasing demand in the Australian market let, the higher authorities think about re-structuring the organization to maintain the need in market and achieve their revenue related target. The organization wanted to stay alive in the market competition and wanted to utilize other source of energy to expand their business. Increasing the amount of research development in the section of liquid gases and other heavy oils. This will increase the chance of the organization to stay active in the competitive market (Lanigan, 2014, pp. 14). Threats The threat of the organization included: Competitions was one of the major threats of the Mobil Australia at that time as few other lubricant companies such as Shell and petro china were leading the market race with their products and reasonable price range. The second threat was challenging economic changes. The company faced several economic changes in Australian financial system that increased the chance of lagging behind of the leading petrochemical companies. Change management model is the structural framework related change that helps to reboot the entire process of any organization, which was unable to help the organization anymore. Furthermore, the change management is the final risk that any organization takes to revive their business. In the case of Mobil Australia, the organization implemented organizational change management in spite of being leader in oil refinery and earning revenues from the global market. This is because the negative impact of situations that lead the organization to pay penalties and fines created a negative image of the organization in the eyes of their customers. Further, the internal environment of the organization was not suitable for any further development as people were saturated with the research or development they have done so far. However, to increase their business in near future, the organization needed revolutionary changes in the process to achieve those future targets. Therefore, the change man agement model was implemented in the Mobil organization to re-design the workflow, restructure the organization and to re-engineer the process of oil refinery so that minimal time is spent to obtain larger amount of revenue. The cross functional and multi-disciplinary nature of the SWOT analysis points out the reason behind the change management implemented. Answer 4 The role of change agents Change agents are individuals who introduces change in the organization, to increase the effectiveness of the organization through planned and deliberate events. Change is a continuous process and needs assistance of higher authorities in every step of implementation however, sometimes the change is introduced in people or the environment of the organization and therefore only change agents can further accelerate the process of change (Battilana Casciaro, 2012, pp. 391). There are mainly two type of change agents such as internal and external. In which, the external change agents are behavioral scientists who are specialists of human behaviors. They are the constants of the company and helps the company by motivating the employees and enabling the change strategy. Further, the internal change agents are present within the organization and are selected from different levels of the organization to utilize whenever a change need to be implemented (Bartunek, 2014, pp. 324). There are several behavioral and personality related aspects that need to be present in the change agent such as behavioral skills to influence and convince others, diagnostic skills to identify the issue within an organization, attitude of acceptance to accept any fault or mistakes and to provide emotional support and reassurance to others (Rycroft-Malone et al., 2013, pp. 28). Moreover, there are difference in the perspective of external and internal change agents. The external change agents take the entire view of the organization as a system on the other hand; the internal agents take the entire system as it is given to them. The role of external agents are comprehensive whereas, the role of internal agents are competitive and secondary to that of the external agents. In spite of the changes in the perspective of the change agents, the focus of them are similar and to lead the organization to the ultimate success and popularity (Ver?i? Ver?i? Sriramesh, 2012, pp. 227). The exter nal change agents are experienced in their work and the internal ones perform their job under the guidance of them to implement the change smoothly and with minimal resistance form the employees. It is important for any organization to employee its internal and external change agents to carry out revolutionary changes in the society as their teamwork can lead to behavioral as well as cultural changes in the organization. The combine effect of these agents can lead to convince the employees for any structural or policy related changes in the organization as the external agent would be able to withdraw the situation identified by the internal agent (Kirtman et al., 2013, pp. 25). However, on the other hand, negative aspects of change agents that can create entropy in the system. As the internal agents are a part of the organization that has been given some excess powers to identify or control situations that can help the organization to achieve a target. Although, employees did not understand the purpose of this post and refuse to understand or implement the proposals of the internal change agent. Hence, the need of external change agent is necessary to reduce the chance of resistance (Field, 2012, pp. 46). The external change agent therefore has different roles for the organizational change such as facilitator of the change by spreading awareness about the positive effects of change, consultant of different diagnostic skills to understand the need of change and finally counsellor to understand the individual perception, attitude and beliefs of the individual employees. They uses their behavioral skills to combat with the emotional and social problems that ca n occur due to the implemented change and increases the acceptance of the change within the employees (Hayes, 2014, pp. 342). In case of Mobil Australia, external as well as internal change agents were implemented to prepare the organization for the forthcoming change. The external change agent was a senior Australian Mobil executive, who used to work in the USA headquarters. Further, a Natural work team or NWT was implemented for identification of the issues that need to be amended to implement the required change in the organization. On the Other hand, as the internal change agents, a team of experienced and unexperienced workers were selected form each department of the organization. The role of these internal agents was to identify the internal issues of the organization that were hindering them to achieve the target production and revenue. The internal agents were to perform their task with the help of the NWT team and after the NWT team confirm the amendment or suggestion, the external change agent would take the further action. This helpd the organization to understand the internal state of employees , their mental, emotional reaction and readiness to proposed change. Hence, utilizing these strategies helped the organization to implement the revolutionary process related change. Answer 5 Problem centric approach to organizational change There are two different approaches to bringing about organizational change such as problem centric approach and dialogic approach. The problem centric approach is guided by the Cartesian ontology, which perceives change as an objective phenomenon. As commented by Hammer (2015), the problem centric approach emphasizes upon the collection of objective data for identification of the change. The change process identified helps in the development of future responses. It follows a linear and rational approach for the diagnosis of change. In the present scenario, Australia based Mobil Oil had been taken into consideration which has undergone business process reengineering (Savery, 2015, pp. 12). The implementation of the change brought about radical changes within the organization such as increasing the profitability as well as improving the organizational work culture. The problem centric approach is a rationally controlled, orderly process (Reiser Dempsey, 2012, pp. 32). The particular a pproach works through the implementation of three main principles such as conducting an environmental analysis, synchronization of the change within the organizational context, optimization of system capability. The analysis of the surrounding environment helps in understanding the need for change. Amidst the rising competition in 90s in the global market scenario, the Mobil Oil underwent a business process re-engineering and res-structuring to improve profitability and return on capital. Therefore, the undertaking of a problem centric approach could help them in restructuring the changes for providing a more customer focused service. The problem centric approaches can help in focusing upon the strengths and weaknesses of the different business processes and approaches of Mobil Oil, Australia. The reviews are optimized through the PCA for focusing upon the different alternatives to the changes, which could be implemented for improving standards such as Return on Capital Employment (ROCA) (Hammer, 2015, pp. 14). Dialogic approaches to change within organization The dialogic approach is governed by a social/relational ontology. As commented by Matos Marques Simoes Esposito (2014), change is seen as part of the organizational culture under this approach. The dialogic process considers human element as a critical part of the organizational change. The model helps in building bond between the employees and management. The approach also signifies that the consultants are seen as part of the process and not different from the business process (Raelin, 2012, pp. 21). It emphasizes upon the aspect of implementation of effective communication, which work as a driving force for the organizational change. The implementation of the model would help in improving the work culture within the organization. Theoretical ontology of organizational change supporting each In the current assignment, two different ontological perspectives have been taken into consideration such as Levins change model and ADKAR model. Both the theories investigate the suitable approaches to bring about plausible changes within the organization. Here, the ontological theories supporting each have been further evaluated for arriving at the most acceptable standards. The Lewin theory of change management described the need of melting the rigidness and vulnerability of the organization for change and refreezing the changes in new and modified shape. On the other hand, the ADKAR model of change management described the need of changing and modifying employees and other stakeholders mentality and knowledge. Combination of these two theories were visible in the change management of Mobil oil Australia, where the organization utilized their external and internal change agents to spread the awareness and prepare their employees for the change. Therefore, in the case of this organ ization, theoretical ontology supports the organizational change (Hayes, 2014, pp. 311). Benefits and drawbacks of each of the approaches in change management The two approach used for the change management model are dialogical approach and problem centric approach. The benefit and drawbacks of the problem centric approach has been mentioned below. Benefits: This approach helps to develop a long-term knowledge approach. The employees, who takes part in the problem centric approach for the change management, are able to maintain the level of knowledge and recall them when needed. This helps to reinforce the knowledge of the subject to the employees (Inzucchi et al., 2012, pp. 1593). The approach uses different diverse approaches to provide instruction to the employees. The process and its effective nature helps to connect the entire employee group in the discussion (Egan, 2013, pp. 112). Drawbacks: However, the first and major disadvantage of the approach is that, during evaluation is the unpreparedness of employees. The approach focuses too much on the mental state of the employees that it forgets to take routinely evaluations of them. Therefore, when the organization plans to take the evolutionary step, the employees are not prepared for it and become unresponsive. The employees are further immature, lacks prerequisite knowledge of the change that is going to occur and are unfamiliar to the post effects of the change in the organization. Continuous monitoring of the employee meetings can done by primary mitigation and discussions however, questionnaire and filling up question answers will be helpful in evaluating the knowledge of the employees (Garcia Gluesing, 2013, pp. 441). The benefit and drawbacks of the dialogical approach Benefits The dialogical approach does not need any fancy infrastructure as it is based on the dialogue between employees about the change that is going to occur; hence, simplicity is the biggest benefit. Mental involvement and involvement in the discussion that lead the company understand the readiness of its employees before implementation of the proposed change. Drawbacks The first disadvantage that can affect the benefits of the dialogical process is the dialogue conflict that occurs while having debates or discussion with any employee. Therefore, personal conflict is major drawback for this approach. It is difficult to keep track of the learning outcomes of every dialogue or dialogical debate therefore using problem centric approach is recommended by the critics. Evidence supporting the selection of specific approaches in managing the change According to Raelin (2012), there are three main type of approach that can be used by a national leader or an organizational head to influence its employee or citizen for change and growth. These are democratic leadership, dialogical approach and thirdly the deliberation. To examine the effect of these, a critical concept examination was taken and contribution of these three were noted. After the completion of the examination, it was found that dialogue is helpful in the exchange if meaningful knowledge, and people and their decision-making ability increases. The dialogue approach is inclusive of the democratic approaches and hence, using it will be helpful for the employee to provide their point of view in the larger process. Another approach was problem-based approach, which is also known as landscape approach, which is inclusive of all the aspects of any change management (French et al., 2012, pp. 38). This entire approach helps the employees and other stakeholders to become famil iar with the different principles of like continual learning and adoptive management, multiple scales, and multiple stakeholders and so on. Applied to the experimental organization, the approach helps the organization to make its employee understand the need of change and the employees also accepted the change with minimal resistant. Therefore according to these both research article, the organization as able to put plausible changes without any string oppose or resistance. References Bartunek, J. M. (2014). Organizational and educational change: The life and role of a change agent group. Psychology Press. https://books.google.co.in/books?hl=enlr=id=v_h5AgAAQBAJoi=fndpg=PP1dq=the+role+of+change+agentsots=wHnQ7Qxx3Isig=Fg9Yh84bLhE2UpeKCHwyNrRDcZE#v=onepageq=the%20role%20of%20change%20agentsf=false Battilana, J., Casciaro, T. (2012). Change agents, networks, and institutions: A contingency theory of organizational change. Academy of Management Journal, 55(2), 381-398. doi: 10.5465/amj.2009.0891 Dusseux, P., Zhao, Y., Cordier, M. O., Corpetti, T., Delaby, L., Gascuel-Odoux, C., Hubert-Moy, L. (2015). PaturMata, a model to manage grassland under climate change. Agronomy for sustainable development, 35(3), 1087-1093. https://doi.org/10.1007/s13593-015-0295-0 Egan, G. (2013). The skilled helper: A problem-management and opportunity-development approach to helping. Cengage Learning. https://books.google.co.in/books?hl=enlr=id=lvDi0_3WZTkCoi=fndpg=PP1dq=benefits+of+problem+centric+approach+for+change+management+ots=8Qe8-SoGexsig=yZ1SkJ2neoFua1D5ysTHixqMlBc#v=onepageqf=false Field, C. B. (Ed.). (2012). Managing the risks of extreme events and disasters to advance climate change adaptation: special report of the intergovernmental panel on climate change. Cambridge University Press. https://books.google.co.in/books?hl=enlr=id=nQg3SJtkOGwCoi=fndpg=PR4dq=negative+aspects+of+change+agents+for+change+managementots=13DgpujDQTsig=wkJ-pkuiKp86ftrf8-FGLdoE_rY#v=onepageq=negative%20aspects%20of%20change%20agents%20for%20change%20managementf=false French, S. D., Green, S. E., OConnor, D. A., McKenzie, J. E., Francis, J. J., Michie, S., ... Grimshaw, J. M. (2012). Developing theory-informed behaviour change interventions to implement evidence into practice: a systematic approach using the Theoretical Domains Framework. Implementation Science, 7(1), 38. https://doi.org/10.1186/1748-5908-7-38 Garcia, D., Gluesing, J. C. (2013). Qualitative research methods in international organizational change research. Journal of Organizational Change Management, 26(2), 423-444. https://doi.org/10.1108/09534811311328416 Hammer, M. (2015). What is business process management?. In Handbook on Business Process Management 1 (pp. 3-16). Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-45100-3_1 Hayes, J. (2014). The theory and practice of change management. Palgrave Macmillan. https://books.google.co.in/books?hl=enlr=id=-jMdBQAAQBAJoi=fndpg=PP1dq=negative+aspects+of+change+agents+for+change+managementots=51Sj5whKNysig=mvlAnA1B78iOknJmsrApgvItRaU#v=onepageq=negative%20aspects%20of%20change%20agents%20for%20change%20managementf=false Inzucchi, S. E., Bergenstal, R. M., Buse, J. B., Diamant, M., Ferrannini, E., Nauck, M., ... Matthews, D. R. (2012). Management of hyperglycaemia in type 2 diabetes: a patient-centered approach. Position statement of the American Diabetes Association (ADA) and the European Association for the Study of Diabetes (EASD). Diabetologia, 55(6), 1577-1596. https://doi.org/10.1007/s00125-012-2534-0 Killian, K. E., Jones, C. G., Nye, J. B., Wiemers, S. (2012, January). Leveraging Technology and Support Infrastructure and Experience in Upstream Digital Technology Application. In SPE Intelligent Energy International. Society of Petroleum Engineers. https://doi.org/10.2118/150220-MS Kirtman, B., Power, S. B., Adedoyin, A. J., Boer, G. J., Bojariu, R., Camilloni, I., ... Prather, M. (2013). Near-term climate change: projections and predictability.URL: https://pure.iiasa.ac.at/10550 Lanigan, K. A. (2014). Australias gas future: how Victoria can stay ahead of the pack. Proceedings of the Royal Society of Victoria, 126(2), 14-15. https://doi.org/10.1071/RS14014 Matos Marques Simoes, P., Esposito, M. (2014). Improving change management: How communication nature influences resistance to change. Journal of Management Development, 33(4), 324-341. https://doi.org/10.1108/JMD-05-2012-0058 Mobil.com. (2018).Homepage | Mobil Australia.Mobil.com.au. Retrieved 4 January 2018, from https://www.mobil.com.au/en/obil.com (2018).Homepage | Mobil Australia. [online] Mobil.com.au. Available at: https://www.mobil.com.au/en/ Park, S. E., Marshall, N. A., Jakku, E., Dowd, A. M., Howden, S. M., Mendham, E., Fleming, A. (2012). Informing adaptation responses to climate change through theories of transformation. Global Environmental Change, 22(1), 115-126. https://doi.org/10.1016/j.gloenvcha.2011.10.003 Raelin, J. A. (2012). Dialogue and deliberation as expressions of democratic leadership in participatory organizational change. Journal of Organizational Change Management, 25(1), 7-23. https://doi.org/10.1108/09534811211199574 Reiser, R. A., Dempsey, J. V. (Eds.). (2012). Trends and issues in instructional design and technology. Boston, MA: Pearson. https://pdfs.semanticscholar.org/deaf/4680501c2b01d71a1efbf2f7dffa35e5d3d2.pdf Rufo, R. Z. (2012). Use of change management theories in gaining acceptance of telemedicine technology. Critical care nursing quarterly, 35(4), 322-327. doi: 10.1097/CNQ.0b013e3182684f67 Rycroft-Malone, J., Seers, K., Chandler, J., Hawkes, C. A., Crichton, N., Allen, C., ... Strunin, L. (2013). The role of evidence, context, and facilitation in an implementation trial: implications for the development of the PARIHS framework. Implementation Science, 8(1), 28. https://doi.org/10.1186/1748-5908-8-28 Savery, J. R. (2015). Overview of problem-based learning: Definitions and distinctions. Essential readings in problem-based learning: Exploring and extending the legacy of Howard S. Barrows, 9, 5-15. https://books.google.co.in/books?hl=enlr=id=KhF-BgAAQBAJoi=fndpg=PA5dq=Savery,+J.+R.+(2015).+Overview+of+problem-based+learning:+Definitions+and+distinctions.+Essential+readings+in+problem-based+learning:+Exploring+and+extending+the+legacy+of+Howard+S.+Barrows,+9,+5-15.ots=awi8nWkC0usig=GvjxC1tuxtqn7FbGAn5yoTWIe3I#v=onepageqf=false Schlichting, I. (2013). Strategic framing of climate change by industry actors: A meta-analysis. Environmental Communication: A Journal of Nature and Culture, 7(4), 493-511. https://doi.org/10.1080/17524032.2013.812974 Talbot, D., Boiral, O. (2015). Strategies for climate change and impression management: A case study among Canadas large industrial emitters. Journal of Business Ethics, 132(2), 329-346. https:// DOI 10.1007/s10551-014-2322-5 Van der Weiden, R., Nayak, P., Swinburn, P. (2012). Seismic technology supporting reserves determinations: Gorgon Field, Australia. The Leading Edge, 31(9), 1050-1058. https://doi.org/10.1190/tle31091050.1 Ver?i?, A. T., Ver?i?, D., Sriramesh, K. (2012). Internal communication: Definition, parameters, and the future. Public relations review, 38(2), 223-230. https://doi.org/10.1016/j.pubrev.2011.12.019 Worley, C. G., Mohrman, S. A. (2014). Is change management obsolete?. Organizational Dynamics, 43(3), 214-224.https://doi.org/10.1016/j.orgdyn.2014.08.008 Wu, Y., Yang, Y., Chen, K., Xiao, X. (2015). The Technology Status of Shale Gas Exploration and Development in China Based on Swot Analysis. International Journal of Green Energy, 12(8), 873-880.

Saturday, March 28, 2020

Macbeth - Character Changes Essays - Characters In Macbeth

Macbeth - Character Changes "This dead butcher and his fiend like queen", is the way in which Malcolm describes Macbeth and Lady Macbeth. Describe the way in which these two characters changed during the course of the play. At the beginning of the play Macbeth is seen as a courageous soldier who is loyal to the King but is corrupted from the witches prophecies and by his and Lady Macbeth's ambition. This is because of the weakness of Macbeth's character and the strong power of Lady Macbeth and how she is easily able to influence him. Her strength motivates him at the start but after he realises what he has done it is himself that continues in his murderous, bloody path. At the beginning of the play Lady Macbeth appears as a kind wife of Macbeth's but underneath lies a scheming and treacherous woman. In the beginning of the play Macbeth is a strong soldier who fights for the King without mercy but his strive for ambition and his curious nature leads him to the witches who give him a prophecy. Banquo realises that there must be a trick hidden in the witches prophecies somewhere but Macbeth refuses to accept that, and when Lady Macbeth finds out about the witches her strong desire for ambition and her cold nature leads Macbeth astray. Macbeth is a little ambitious at first, but Lady Macbeth's far exceeds his and so she is able to get Macbeth to agree with her to kill King Duncan. Macbeth still has a conscience at this stage because he is very hesitant about killing the King but his weak nature over comes him. He has a conscience throughout the entire play as this is seen by the hallucinations of the dagger and the ghost of Banquo and his vivid imagination and his constant worry also provokes him. This is also evident in his terrible dreams which gives the solid theme that he has in deed "murdered sleep". Throughout the play we see the character of Macbeth change not from just the way he thinks and what we hear from the play, but from the actions he takes in the play, from killing Banquo, then having Lady Macduff and her children murdered, shows the insecurity that was present in Macbeth. After the murder of Duncan Macbeth becomes paranoid and his first step of killing the guards is one of many that Macbeth takes to secure himself. Macbeth is also very superstitious and this is shown when he believes the prophecy the witches told him that Banquo's offspring would become Kings. Towards the end of the play when Macbeth's wife has died and the battle is drawing closer Macbeth shows some good which may have been. He wishes for a normal life for which he would have lived to an honourable age but he recognises that he has denied himself of this. Even when Macbeth hears that the prophecy has become true of Birnam Wood coming to Dunsinane, he rejects this idea and fights on until he realises that Macduff wasn't born in a natural birth but instead was "Untimely ripped" from his mother's womb. When Macbeth hears of this he realises what he has done and how he has been tricked by the witches but instead he realises that it is useless and so he fights on only to be slain. Macbeth can be summarised into a character although strong physically he is very weak mentally and it is this weakness which causes the downfall and change of Macbeth. Other factors do however also contribute to this change such as his wife whose ambition is very strong at first and is much more stronger mentally than Macbeth but it is also Macbeth's ambition and his trust in the witches which ultimately change him. Lady Macbeth seems to be almost opposite compared to that of Macbeth in physical and mental power. Lady Macbeth is the person who is able to persuade Macbeth into killing Duncan, assuring Macbeth that it will succeed, as Lady Macbeth's ambition is far greater than that of Macbeth. This change in the character of Lady Macbeth is apparent after she reads the letter from Macbeth as she goes and talks to the evil spirits to

Saturday, March 7, 2020

Free Essays on LBJ And American Liberalism

For many decades liberalism was the biggest factor in politics, and the largest force in changing America. Liberals believed in a government that was active in the nation to provide â€Å"economic prosperity, international security and social justice†(Schulman 1). Lyndon Baines Johnson â€Å"embodied the contradictions of political liberalism† in post war America, and he â€Å"orchestrated its triumphs, and endured its agonies†(Schulman 2). He was also the maker of its most important legislative achievements and a factor in its ultimate demise. (1) There were three major influences in Lyndon Johnson’s life. The first was his father, Sam Johnson, and young LBJ absorbed his passion for politics. LBJ also adopted Sam Johnson’s belief in a â€Å"kind of government that could do things personally for people†(Schulman 7), and his dedication to his constituents. The second factor was the year LBJ spent teaching at Cotulla, Texas. At Cotulla, he saw poverty and hatred; later he said, â€Å"Somehow you never forget what poverty and hatred can do when you see its scares on the face of a young child†(Schulman 9) He never did, and during his Presidency he waged a nation changing â€Å"war on poverty.† Here he also reaffirmed his belief that education is the only way out of poverty. The third influence on LBJ’s life was President Franklin D. Roosevelt. As a young politician LBJ looked up to and savored FDR for his leadership and ideology, and in turn FDR helped LBJ during rough times. But, it wa s FDR’s New Deal Liberalism that LBJ savored the most. FDR â€Å"envisioned a larger role for government as a referee or police officer, ensuring that the economy and society operated freely and fairly†(Schulman 12). (2) Classical liberalism took on a â€Å"negative view of freedom.† They believed that a big and active government is the biggest threat to freedom. Modern liberals were exactly the opposite, they believed in an active government. They viewed t... Free Essays on LBJ And American Liberalism Free Essays on LBJ And American Liberalism For many decades liberalism was the biggest factor in politics, and the largest force in changing America. Liberals believed in a government that was active in the nation to provide â€Å"economic prosperity, international security and social justice†(Schulman 1). Lyndon Baines Johnson â€Å"embodied the contradictions of political liberalism† in post war America, and he â€Å"orchestrated its triumphs, and endured its agonies†(Schulman 2). He was also the maker of its most important legislative achievements and a factor in its ultimate demise. (1) There were three major influences in Lyndon Johnson’s life. The first was his father, Sam Johnson, and young LBJ absorbed his passion for politics. LBJ also adopted Sam Johnson’s belief in a â€Å"kind of government that could do things personally for people†(Schulman 7), and his dedication to his constituents. The second factor was the year LBJ spent teaching at Cotulla, Texas. At Cotulla, he saw poverty and hatred; later he said, â€Å"Somehow you never forget what poverty and hatred can do when you see its scares on the face of a young child†(Schulman 9) He never did, and during his Presidency he waged a nation changing â€Å"war on poverty.† Here he also reaffirmed his belief that education is the only way out of poverty. The third influence on LBJ’s life was President Franklin D. Roosevelt. As a young politician LBJ looked up to and savored FDR for his leadership and ideology, and in turn FDR helped LBJ during rough times. But, it wa s FDR’s New Deal Liberalism that LBJ savored the most. FDR â€Å"envisioned a larger role for government as a referee or police officer, ensuring that the economy and society operated freely and fairly†(Schulman 12). (2) Classical liberalism took on a â€Å"negative view of freedom.† They believed that a big and active government is the biggest threat to freedom. Modern liberals were exactly the opposite, they believed in an active government. They viewed t...

Wednesday, February 19, 2020

Assess the impact of ideology on the (United Kingdom) Coalition Essay

Assess the impact of ideology on the (United Kingdom) Coalition government elected in May 2010 - Essay Example To understand how the ideologies of political parties in the UK affect the present coalition governance it will be necessary to define political ideology based on the UK situation, their development over the years and therefore how they affect people, societies and governance in the land. Political ideology like any other form of ideology will have as part of its components a definition of the cognitive values (expression of knowledge and doctrines), intended effects on the subjects’ feelings, the definition of norms and system of judgment through its valuation criteria, plans and action points and lastly its social base. These are what the main political parties in the UK strive to monitor in order to achieve the support of groups and collectivities. For a government to run smoothly there has to be agreement among the members in the government to a common ideology. However in cases where parties are forced to come together in form of coalitions to form government then comprom ises are sought in the ideologies (Ball, 1987 p 1-3). This is quite a challenge in a case where the ideological differences are sharp and incompatible. In assessment of the state of the UK coalition government formed following the may 2010 general election, political ideologies of the constituent parties are found to have a major contribution on governance of the country. In this paper we seek to give an assessment of the effects of ideology of the constituents of the coalition on governance by first assessing the ideologies of individual major in the UK namely the Conservatives, the Labor Party and the Liberal Democrats. The paper will further consider how the ideologies affect governance in the coalition through analysis of opinions. The role of political parties in the UK Political parties in the UK are charged by the electorate and members with the important role of governance through direct formation of government as the ruling party or as a check to the government as backbench ers or the opposition party. In cases where no particular winner is obtained as the case in the 2010 general elections, the parties agree to form a coalition government. Other functions of political parties in the UK can be summarized as: 1. Development of particular party ideological positions. 2. Facilitation of political education while encouraging participation by party members and the electorate in political processes. 3. Formulation of individual policies that are combined to form a coherent political program implemented in case the party forms government. 4. Oversee political elections at all levels (local, national and regional) 5. Represent political, social, economic and cultural interests of supporters though ensuring they are elected to the Legislature as the ruling party 6. Institutionalization of conflict by providing mechanisms of peaceful conflict resolution in the political system From this checklist it can be understood why party ideals are an important element in the UK political systems because of their deterministic role in the success of governance. An overview of political ideology of political parties in the UK For the purpose of this assessment we shall consider the three major parties namely: the Conservative, the Labor party, and the Liberal D

Tuesday, February 4, 2020

Good Morning, Vietnam; Good Night, Reality Essay

Good Morning, Vietnam; Good Night, Reality - Essay Example The film is fairly accurate in what it does portray: Croanuer is a hot-shot Deejay brought in to entertain (and thereby distract) the troops and is welcomed by his peers while several of his superiors are nervous about his lack of respect for authority. Cronauer blends well enough in his new environment, even taking on a class teaching Vietnamese - although this is to meet a love interest. He befriends the girl's brother, Tuan, fighting to get him into the locally owned G.I. Bar Jimmy Wah's. Cronauer is supended from the air when he ignores the censor by announcing the subsequent bombing of Jimmy Wah's. After his return to radio, Cronauer goes into the field to do remote interviews, unknowingly walking into enemy occupied territory. Tuan finds and rescues Cronauer, who returns to find that he is be reassigned to a different location, due to his involvement with Tuan, who proves to be a Vietnamese guerilla. After bidding farewell to all of his acquaintances, Cronauer departs, while a taped broadcast of his farewell show is played to the troops. Sadly, the focus of the film proves very limited. Despite the film's entertainment value, the narrow locality of it's story (primarily in the radio station) does not allow for a more comprehensive view of American soldiers in the field, the shifting political situation or the political history, and makes almost no effort to recognize Vietnamese history and concerns. Part of this is explained by Sergeant Joe P. Dunn, of the 199th Infantry Brigade, 1969-1970; who completed his tour with the 1st Air Cavalry. He observes that there are three primary methods today of studying the Vietnam conflict: 1) Asianists, who are specialist in the history, culture, and so forth of the Asia, who treat American involvement "as merely one stage, in the long history and series of conflicts", 2) Americanists, who are primarily historians and focus on various aspects of American issues that led to U.S. involvement (although the Asianists denounce the absence of Vietnam history and culture in this approac h), and 3) Literature/Pop-culture, which Dunn contends too rarely have "the analytical tools of the historian and the political scientist." Good Morning, Vietnam proves to have a slight leaning to this second category, but an overwhelming influence by the third. How then does the film attempt to justify it's blatant entertainment orientation It does this through a small inserts of liberal efforts of social equality. Cronauer seeks to equalize the military hierarchy by constantly lampooning the upper echelon. Likewise, Jimmy Wah's, a place where there has been a small measure of cultural acculturation in so far as the Vietnamese are benefiting from American presence (and exploitation), is the only real battleground in which Cronauer struggles for Vietnamese equality, i.e. the right to patron the bar. Unfortunately, the Vietnamese is only lightly touched upon by Tuan and his sister, and then only in lamenting the impact of America on an already war-torn culture.

Monday, January 27, 2020

Benefits of Network Management Tools

Benefits of Network Management Tools 1. Introduction These are the various network management tools used by network manager to verify network connection, monitor network packets, analyse captured packets, troubleshoot network connectively failure, diagnosing network slow performance and identify source of incident in order to make the network available 24 hours seven days a week. 1.1 Benefits of Network Management Tools Network manager benefits from network monitoring tools in so many ways as described below Easy migration from old legacy application to new technologies For example when network administrator is migrating form a legacy IOS based application to LWAPP using Airwave Management Platform software tool for wireless network management, net work administrator is provided with centralized control for Wi-Fi networks where roaming data and information as well as historical data are kept as airwave gives a common platform to manage the devices. This is beneficial to the network manager because it makes it easy for migration from old legacy applications to new technologies and makes it easy to monitor the network usage all the time Quick identification of network or server failure when the server of a portion of the network is down, before users get to notice the failure network administrator receives a warm and rectified the fault and providing the network manager with means of monitoring and providing network availability round-the-clock. Using network-monitoring tool like ipMonitoring with attributes such as such as reporting, user tracking, access point configuration management and rogue AP discovery, network administrator is able to monitor any networked device on the corporate intranet and TCP/IP LAN and receive alerts immediately depending the administrators configuration of receiving alerts; this can be received through alarm, e-mail, or third-party software when a connection fails. Diagnosis and troubleshooting, Network monitor can be used to diagnose why the server computer is not communicating with the clients computers on the network on a local area network, for example network administrator can configure network monitor to capture all the frames on the network, this includes source and destination address of the computer sending and receiving frames, protocols used as well as part of message sent. Net work administrator analyses this information to locate the source of problem on the network and troubleshoots it. Checking for connectivity of a computer online for example using ping command to check if a computer is online helps network manager for example when user calls and said they can logon to networked computer to troubleshoot and diagnose the network manager uses ping to find out if the computer in on the network or not. This is beneficial to the administrator because it helps him to identify where the problem is originating. 1.2 Structure of management information Structure of management information is a network component used in network management which is used in simple network management; its main role is to define set of module identity, object type and notification type. Structure of management information shows how related managed objects such as object names, types of data that can be stored in an object and how its transmission over the network for example action done to retrieve vale of an object with codes 2. Use Datagram Protocol User datagram protocol is a transport layer protocol that is used to send packets to computers in networked environments. User Data Protocol has the following advantages over Transport Control Protocol Connectionless When communicating with two computers on the network, user data protocol doesnt negotiate connection between the two client computers but just transfers data as its received No Connection State User data protocol doesnt maintain and doesnt keep track of any parameters such as buffers sent, congestion control and rate which data is transfer for example when used in server environment, user data protocol is able to support more active clients if a particular application is run over it because it doesnt acknowledge packets being sent or received. Small packet header over head User data protocol has got a smaller header of 8bytes of overhead making it faster in transferring data Unregulated send rate, user data protocol doesnt have congested control mechanism and data is sent at rate, which it has been generated by the application in use for example taking into account the CPU, clock rate at the source of data. 2.1 Applications layer protocol used by User data protocols as Transport layer protocol Domain Name Service Is a database like that converts the computers fully qualified domain name that are easy to be remembers such as www.yahoo.com into IP address such as 201.171.25.0. 6 that are then used by computers to connect/ communicate with each other Steaming multimedia This is the continuous transfer of video, voice and digital data that is received and showed/displayed in real time for example podcast and webcast Routing protocol Routing protocol is used to determine which path to be used to sent/ transmit data packets across a network. 2.2 Reasons why UDP is preferred over TCP Domain Name Service User data protocol is preferred over transport control protocol because its used by DNS for name queries and because the information exchange between UDP and DNS is small in size for example the packet size sent through UDP is not greater than 512 bytes. Streaming multimedia Streaming multimedia its used by UDP because it compresses audio files in to small packets of data that makes it easy to transmit and continuously streaming and transmitting audio files whenever their audio data drops. This doesnt break or cause delay on audio broadcast. The streamed data is sent by the server application to the client application stores the stream data the then displays the data received in real time or playing the voice streamed files as soon as its buffered. Routing protocol On routing protocol, User data protocol is preferred because routing table updates are sent periodically and some of the data is lost a long the way and updates need to be resent so its up to date on network layer which is impossible with transport control protocol 2.3 Controversial use of UPD in multimedia applications The use of user data protocol for streaming multiple media application is controversial because user data protocol doesnt have congestion control which is much needed to prevent the network from going into a state in which less or no work can be done, for example if a users sends high bit rate video are sent without using congestion control, user will be unable to see the video messages because of the packet overflow at the router. 2.4 Adaptive congestion control scheme One scheme that would force the use of adaptive congestion control is real time communication scheme which has building reliability into applications that will force the use of congestion control, for example in mobile application where congestion control is built though the application run over user data protocol, it acknowledges and retransmit packets that get loss during transmission Applications that perform congestion control user the network more efficiently for example with bits rates being controlled, the network will not go into a state where it can not be used 2.5 Advantage of Adaptive congestion scheme Better performance of the network for example in the case of video when small bit are sent and controlled, the performance improves as the bandwidth will be enough to support bit rates It ensures that all packets sent reach destination 3. Exchange between Dhcp Server and Client Computers DHCP Server and Client Computers See Appendix (i) For clients to receive IP addresses from dhcp servers TCP/IP need to be con figured to get IP addressed automatically on the TCP/IP properties dialogue box. Dhcp client computers that are configured to obtain IP address automatically request and receive IP configuration upon booting the client computer. Dhcp clients get IP addresses and other configuration each time the client computers are started and join the network. Dhcp server assigns IP address to a client from a predefines scope for a given duration of time and if that duration expires the IP address is released to the scope and can be assigned to another client but if the duration is longer than the lease time, the client requests for and extension before the lease expires. 3.1 Router and Components A router is a device that connects one or more computer to create a network environment for example a modem. A router has the following major components Input port Is the point is direct connection for physical link and it is the point at which incoming packets enters the port. Input port provides functions such as performing the data link layer encapsulation and encapsulation, a route lookup and sending packets to output port via switching fabric as well as proving quality of service guarantees input port classify the in a predefined service level Output port Output ports stores packets that are forward via the switching fabric and transmits or schedule packets for service on an output link performing both the reverse data link and physical link functionality as done in input port Switching Fabric This connects input ports and output ports Routing processor Executes routing protocols, creates and forward routing tables which is used in packet forwarding and performs management functions within the router. 3.2 Internet Protocol version 4 Internet protocol version 4 is the protocol that is widely in use in most corporate networks and it uses network layer protocol and its used as internetwork layer protocol on the internet 3.3 Internet protocol version 6 Internet protocol version 6 is the update version of internet protocol version 4 with much more address space. Its mostly used on the internet bone in Asian countries. Protocol Structure of an IPV4 header See Appendix (i) Protocol Structure of an IPV6 header See Appendix (iii) Due to the depletion of internet protocol version four and lager routing tables, internet version 4 has been updated to version 6 that provides better security, more address space. This has made internet version 6 more advantageous in some ways as discussed below. Internet protocol version 6 address space 3.4 Advantages of internet version 6 Internet protocol version 6 has got more address space as compared to internet version 6 for example version 6 has got 128-bit address space which allows for flexible creation of multilevel, hierarchical and routing infrastructure which is not that possible with internet protocol version 4 Internet protocol version 6 has got in built security which is standard and mandate, its offered in all implementation and has no changes the application, for example security features such as authentication on packet signing , data encryption and end-to end DHCP, DNS and IPv6 mobility is provided for in security model. 4. Wired Equivalent Privacy WEP is the short term for Wired Equivalent Privacy for a security protocol used in wireless local area network that operates at a data link layer and has a security that can be turned of and on again as defined in 802.11b standards. This standard has been set by the Institute of Electrical and Electronics Engineering The main aim of Wireless Equivalent Privacy was to provide security via 802.1wireless network where data is sent from one end point to another. For example Key security features of WEP was meant to offer the following Confidentiality Wireless Equivalent Privacy is used to prevent data transmitted on the network from being eavesdropped by some whom the information is not meant to be communicated. Unauthorised access to wireless network Wireless Equivalent Privacy used to prevent unauthorised access to the network Data integrity, to prevent the alteration of data being transmitted 4.1 Advantages of Wired Equivalent Privacy WEP uses a 2.4 gigahertz radio frequency which provides clear signal for its lower than other frequencies and can travel through wall without affecting frequency. WEP is relatively cost effective for example the cost of a router and Wi-Fi card is normally below  £55 which makes it cost effective for both big corporations, and home users 4.2 Disadvantages of Wireless Equivalent Privacy Static encryption key which is used by all the devices on the network make it very easy for packets to be intercepted and crack what the key is making it very vulnerable to hackers. For example when a router is set up on the network, the encryption used by the router is then used by almost all the device on the network Weak keys made it easier for it to guessed and cracked when used at the access point Initialisation vector in WEP is also ways reused, for example if a user who connects with WEP to access wireless network uses the same key over and over changes, this key can easily be cracked WEP has its algorithms sent in plaintext which makes it a lot easier for key streams to be determined 4.3 Difference between WEP and WPA Wireless Equivalent Privacy standard 802.11 and Wireless Fidelity Protected Access are different in so many ways for example WEP uses 128bit with 24 integrity value, while WPA used 128 bite with a 48 bit integrity value. WPA has features such as Temporarily Key Integrity Protocol which dynamically changes the keys used for encryption while Key in WEP are static and is shared by all device on the network. The combined used of 48bit integrity values and TKIP, AES makes WPA more security strong as compared to WEP. Weak keys made it easier for it to guessed and cracked when used at the access point. Initialisation vector in WEP is also ways reused for example if a user who connects with WEP to access wireless network uses the same key over and over changes, this key can easily be cracked. WEP has its algorithms sent in plaintext which makes it a lot easier for key streams to be determined These weaknesses among others called for a better standard to be adopted which will provide wireless network with better security and this led to the improvement of 802.1 to WPA. 4.4 Wireless Fidelity Protected Access WPA stands for Wireless Fidelity Protected Access for local area network base on the specification of 802.11. This standard was designed to improve on the security weakness of Wired Equivalent Privacy. 4.5 Advantages of WPA WPA provides added authentication features to basic WEP which provides for stronger encryption mechanisms. The added features includes Advanced Encryption standards protocol as used in WPA2, Temporary key Integrity Protocol as used in WPA. When use in windows 2003 environment, WPA provides the strongest wireless security. WPA has back ward compatibility for older applications that use WEP this doesnt call for upgrade. The use of 802.1x Radius servers provides administrators with means of auditing and logging incidents. 4.6 Disadvantages of WPA The set up of the pre-shared key is difficult and it not beneficially to home users with less technical knowledge. It has more over head as compared to WPE. Its incompatible with pre 1998 windows operating systems and doesnt support older firmware. Its major fall is the denial of service attacks which can leave the whole network shutdown due to constant different keys that are generated and interpreted by the network as some kind of attack. 4.7 Comparing WPA and WEP features WPA has enhanced featured that is based on WEP standard. The features in WAP include temporarily key integrity protocol and 802.1 x. This features provides dynamic key integrity and mutual authentication to most wireless local area networks 48-bit initialisation vectors Like Wireless Equivalent Protocol, Temporal Key Integrity Protocol uses the RC4 stream cipher provided by RSA security for frame body decryption and CRC for each frame before transmission but the difference here is that WPA has added feature Temporal Key Integrity Protocol that uses a 48bit initialisation vectors that has reduced the re-use of initialisation vectors. This has brought about data confidentiality. While WEP encryption is based on 128bit with 24 integrity value, which means the keys are of smaller size and integrity value making it easy for hackers to crack the keys as the initialisation vector seeds to WEP algorithm coded, this feature has been enhanced by the 48 bit integrity vector in WPA. Data Encryption When data packets are sent, it encrypted separately with RC4 cipher stream, generated by b4 bit RC4 key, the key consist 24 bit initialisation vector Pre-Packet key Construction and Distribution WPA generates a new encryption key automatically for each client, for example WPA uses unique and different key for each 802.11 frames and avoid the use of same key as in WEP. This automatic key generation makes it impossible for WPA keys to be cracked by hackers While in WEP the same key is shares by all the devices on the network is static which means due it its unchanging nature, its a lot easy for the shared key to be modified Message Integrity codes The use of Michael prevents against attacks and forgeries, WPA uses a secrete 648bite authentication key that will be shared only between the source and destination where during the process of authentication tagging function takes place and message integrity code. For forgeries to be identified, the destination receiver inputs source into verification predicate and creates another tag code and it this both matches then the message is considerers authentic is created to detect bit flipping and changes to the source and destination. Unlike WEP that uses 4 byte integrity check value to the standard payload. The receiving client calculates the integrity check value and if the values do match then there is a chance that frames were not tempered with and in case data Counter mode/ CBC-MAC This is a data confidentiality protocol used for packet authentication and data encryption. For confidentiality for example CCMP uses the advanced encryption standards in counter mode and for encryption and data integrity CCMP deals with Cipher Blocking Chaining Message Authentication Code making this standard more secure as compared to WEP which has got no encryption mode EAP encapsulation over LAN, this is the key standard use n key exchange that is not used in WEP for example this protocol allows for a four way key handshake as well as a group key handshake while in WEP there is only a two way key handshake. The IEEE802.1x as used in WPA2 provided a sure means of authenticating and controlling user traffic to secure networks 5. A Disaster Recovery Plan Is the process of restoring access to the main business applications, data, hardware and software that is required to start the system operational, Disaster Recovery Plan provides information on how to handle information that may be lost or corrupted during the disaster as well as proving team leaders with procedures of restoring information and data. 5.1 Major steps in disaster recovery process Notification procedure This is the action taken by disaster team members as soon as emergency occurs. In the notification stage, systems can be restored functions on a limited basis. For example in a data centre when database team leader receives alert on his/her computer that a file within the database is corrupt, this alert can be sent to the team assessment team either automatically by the system or mailed to the assessment team to analyse the damage Analyse the extent of the damage The analysis of the damaged cause should be done as soon as possible to determine the level of damage to the applications for example if it a power outrage has occurred in the data centre, the analysis should be able to detailed the applications affected, origin of the incident, work areas that have been affected and if there is another source of power to run the database the this can be powered on for example in case there is UPS backup while further investigation in the outrage is carried Activation of the plan Depending on the damage cause by disaster and the out come of analysis, the disaster recovery team can make a decision to activate the plan. For example in the case of data centre if the entire database server is down, the team looks at the possible way that the system can be restored with a minimal time, planning for team communication procedures, then the respective team leaders will notify staff members about and start working on their respective tasks to restore the system as agreed by the team members. Execution stage Recovery process at this stage can be looked at under Sequence of Recover activities and Recovery procedures and depending on what has been defined in the data recovery plan for example in case of ordering database, this can be done manually while recovery process is done Sequence of Recovery activities Recover process should be carried out according the priority of each disaster and level of disaster damage from the results got from the analysis. For example if the database sever is recovered and this is the main critical business system, then this should be restored first before other servers and all the disaster recovery team should carried out the restoration process as in the disaster recovery plan,. If the business has to be transferred to another site then the critical files associated with the service has to be transferred depending on the plan. For example a plan to transport IT equipment and important data files. Recovery process This includes having access to the damaged IT equipment in case of the data centre this could database servers, corrupt files, informing users of the applications, getting backup if its not in house, restoring critical systems such operating systems, SQL database, testing the system before if goes operational and connecting the system on the network and informing uses of the application of the success of the restoration. Rebuilding process Ones the recovery process has been usefully, the disaster team recovery embarks on the process of transferring all the data recovered back to the original system, or may be totally system that can best support the functionality of data service being offered. The disaster recovery team will continue to monitor for any reoccurrence of incidents, make the necessary network and infrastructure connections, bring down the contingency system upon which the application was running and when the all system is stable the data centre staff can be able to use the original system after full restoration of data Update the disaster recovery plan If new procedures are find out during the process of recovery, it‘s updated on the recovery plan documentation which will be used again in case the same disaster occurs again 5.2Business Continuity and Disaster Recovery Plan The IT business continuity and disaster recovery plan for the IT department that I currently work in seeks to deal with the how best to handle emergency in the event of disasters and how best to minimise risk of damage, provide emergency services and recover to normalcy of service operations The Business Continuity Institute defines business continuity planning as â€Å"A holistic management process that identifies potential impacts that threaten an organisation and provides a framework for building resilience with the capability for an effective response that safeguards the interests of its key stakeholders, reputation, brand and value creating activities† 5.3 Aims of Business Continuity Planning Preventing a disaster At the initial planning stage, the critical areas of service operation of Information Technology is identified, for example within the Information Technology department where I work, servers for crucial systems, hot sites and training of the disasters team leaders are laid down. This initial planning stage is carried out with the aim of minimising the impact of disasters on Information technology resources and services; this also ensures that the department is able to recover as fast as possible from a disaster. Continuity The procedure of running a Information services using minimum resources during a disaster, this prevents the organisation from being put out of services both internally and externally. For example running applications for only crucial systems to continue operation while recovery is on the process Recovery The procedures that are required to restore all systems and resources are identified. This helps in bring all the resources and system to full operation, for example backing up data from off site centre. 5.4 Contingency Plan activation The activation of the organisations IT service continuity plan can be started at any time. The decision of activating the plan will be the sole responsibility of Estates and Security department with the assistant of officer in charge and contingency plan can not be started without the instruction being issued by Estates and security department with assistance from the Officer in charge. In case emergency occurs during business working hours, members of disaster recovery team will be gathered and depending on the level and mature or damage the Information technology team will be contacted If the emergency occurs out of business working hours, security is required to call the head of security or his/her deputy who will get in touch with the disaster recovery team with the help of the officer in charge and then the decision to initiate the Information communication technology business continuity plan If the team leaders are not available in the event of the emergency the deputy will take the responsibility and in the event where both the team leader and deputy are not available, next person on the list takes responsibility. 5.5 Emergency Management Team Team leader: Head of information Technology department who is responsible for over seeing all the information system services Deputy team leader: Systems Manager Responsible for all the systems applications such as the servers, back up and liaison between the off sites third party centres Team member: Database Administrator Responsible for; Internal databases and well as internal sites Ensure that a domain account has been set up for the SQL services. The admin backup and standard jobs from SourceSafe InstallationSQL Server 2000 Customise the jobs to ensure that server names and paths are correct Team member: Information Technology Security officer Responsible for the security of the internal sites and well as blocking unsafe sites Team member: Network Engineer Responsible for network connectivity and test our network devices from within our network Run test network script using DOS command Test access to the web services -Use government secure intranet network PC or dial-up PC belonging to web team in OCPD to check connection to all websites -Use nslookup to connect to wb-dns1 internal to the organisation and check that website names can be resolved Test email -An email should be sent to [emailprotected] and echo. These should respond by sending an email back 5.6 Disaster Recovery Plan Is the process of restoring access to the important system data, hardware and software that is required to start the system operational, Disaster Recovery Plan provides information on how to handle information that may be lost or corrupted during the disaster as well as proving team leaders with procedures of restoring information and data. 5.7 The main Objectives of the Information Technology Recovery Team The Recovery Teams main duties/ task are to: Prevent damages to Information Communication Installations Decide the requirements of senior management for other Departmental Recovery Teams and work accordingly to meet the requirements. Carry out tasks that lead to the provision of restoring all Information Communication service to normality as started by the Recovery Team within the disaster constraints or limits. 5.8 Disaster Recovery Team Team leader: Head of Estates and Security Responsible for the safe of the building as well as staff and members of the public Deputy team leader: Site Contractor Responsible for building and central service Team member: Head of security Responsible for staff and public safety 5.9Recovery Site The recovery site will be informed by the Information Technology Departmental recovery team leader and the assistant by Disaster recovery Team in case the team leader is absent. The site is located about 3 miles a way from the organisation, In case of serious incidents, the site can be contacted by information recovery mobile phone. 6. Assumptions With regard to the following case scenarios below, the disaster recovery team can take actions base on case scenario that is relative to the real disaster. Its the organisations policy that when incidents occur, staffs are evacuated from the building and entry to the site is not permitted unless staff members are informed by head of Estates and Security. 6.1 Case Scenarios Building Non-disruptive These case scenarios may include: Disaster in the staff car park not affecting the building Gas licking the building basement Suspicious package found in the public lockers Building is partly destroyed Scenarios in this case may include: Flood affecting the whole building Apart of the sever room that supports site B of the building is partly destroyed A part of fame room in site A where frame cabinets E8a and E8b are located is partly destroyed. IT store room is also partly affected. Building is completely destroyed Scenario in this case is: Server Room on site A of the building including cabinets room E1 and E2 are completely destroyed. 6.2 Building Non-disruptive 6.3 Actions In these case scenarios, all the information technology equipment are not destroyed. The disruption did call for evacuation of staff for healthy and safe issues and as soon as the build is cleared safe, staff members will be allowed in and operations will resume. 6.4 Building is partly destroyed In these case scenarios, some IT equipment are affected partly, it may escalate to a major for example the part destruction of server room in site A and the cabinet room where E8a and E8a may cause staff on this site to loss access to network resources. Here nothing can be done till staff members are not allowed to enter the building. Ones members are allowed in the building, all the equipment in the area affected can the