Thursday, December 26, 2019

The Changing Definition of African-American History

Since the origins of the field in the late 19th century, scholars have devised more than one definition of what constitutes African-American history. Some intellectuals have viewed the field as an extension or corollary to American history. Some have stressed the influence of Africa on African-American history, and others have viewed African-American history as vital to black liberation and power. Late 19th Century Definition An Ohio lawyer and minister, George Washington Williams, published the first serious work of African-American history in 1882. His work, History of the Negro Race in America from 1619 to 1880, began with the arrival of the first slaves in the North American colonies and concentrated on the major events in American history that involved or affected African-Americans. Washington, in his Note to volume two of his opus, said that he intended to lift the Negro race to its pedestal in American history as well as to instruct the present, inform the future. During this period of history, most African Americans, like Frederick Douglass, stressed their identities as Americans and did not look to Africa as a source of history and culture, according to historian Nell Irvin Painter. This was true of historians like Washington as well, but during the early decades of the 20th century and especially during the Harlem Renaissance, African-Americans, including historians, began to celebrate Africas history as their own. The Harlem Renaissance, or The New Negro Movement W.E.B. Du Bois was the foremost African-American historian during this period. In works like The Souls of Black Folk, he stressed African-American history as the confluence of three different cultures: African, American and African-American. Du Bois historical works, such as The Negro (1915), framed the history of black Americans as starting in Africa. One of Du Boiss contemporaries, historian Carter G. Woodson, created the forerunner of todays Black History Month--Negro History Week--in 1926. While Woodson felt that Negro History Week should emphasize the influence black Americans had on U.S. history, he too in his historical works looked back to Africa. William Leo Hansberry, a  professor at Howard University from 1922 to 1959, developed this trend even further by describing African-American history as the experience of the African diaspora. During the Harlem Renaissance, artists, poets, novelists, and musicians also looked toward Africa as a source of history and culture. Artist Aaron Douglas, for instance,  regularly used African themes in his paintings and murals. Black Liberation and African-American History In the 1960s and 1970s, activists and intellectuals, like Malcolm X, saw African-American history as an essential component of black liberation and power. In a 1962 speech, Malcolm explained: The thing that has made the so-called Negro in America fail, more than any other thing, is your, my, lack of knowledge concerning history. We know less about history than anything else. As Pero Dagbovie argues in African American History Reconsidered, many black intellectuals and scholars, such as Harold Cruse, Sterling Stuckey, and Vincent Harding, agreed with Malcolm that African-Americans needed to understand their past in order to seize the future. Contemporary Era White academia finally accepted African-American history as a legitimate field in the 1960s. During that decade, many universities and colleges began to offer classes and programs in African-American studies and history. The field exploded, and American history textbooks began to incorporate African-American history (as well as womens and Native American history) into their standard narratives. As a sign of the increasing visibility and importance of the field of African-American history, President Gerald Ford declared February to be Black History Month in 1974. Since then, both black and white historians have built on the work of earlier African-American historians, exploring the influence of Africa on the lives of African-Americans, creating the field of black womens history and revealing the myriad ways in which the story of the United States is the story of race relations. History has expanded to include the working class, women, Native Americans and Hispanic Americans in addition to the experiences of African-Americans. Black  history, as practiced today, is interconnected with all of these other sub-fields in U.S. history. Many of todays historians would probably agree with Du Bois inclusive definition of African-American history as the interaction among African, American and African-American peoples and cultures. Sources Dagbovie, Pero. African American History Reconsidered. Urbana-Champaign: University of Illinois Press, 2010.Painter, Nell Irvin. Creating Black Americans: African-American History and its Meanings, 1619 to the Present. New York: Oxford University Press, 2006.Williams, George Washington. History of the Negro Race in America from 1619 to 1880. New York: G.P. Putnams Sons, 1883.  X, Malcolm. Black Mans History. 1962 speech.

Wednesday, December 18, 2019

A Short Note On Oklahoma Race Riots And The Black Wall Street

Tu Tulsa Race Riots On May 31-June 1, 1921, a series of actions occurred in Greenwood, a small district in the northern parts of Tulsa, Oklahoma, which are now called the Tulsa race Riots. Being a segregated city like the rest of Oklahoma, many of Tulsa’s African American citizens resided in Greenwood- an area composed of predominately African American communities and business locations. The discovery of oil is the number one reason why Tulsa’s economy flourished. There was an abundance of wealthy African Americans due to of this discovery. Because of the affluence and success within the African American community going on in this one particular area, it became known as the Black Wall Street. The whole chain of events began on May 30, 1921 when Dick Rowland, a young black man, allegedly assaulted a white elevator operator. Rowland was arrested the next day. However, outside the courthouse a group of raging whites gathered to attempt to lynch Rowland while a group of African Americans were protecting him to prevent the hanging. With the signal of one unintentional gunshot, many others rang out leaving some from both groups dead. With word getting around town of the riot, many angered whites stormed into the Greenwood District. Residencies were set on fire and many businesses were looted and burned to the ground. Planes also flew by dropping bombs in the area. With law enforcement on the whites’ side, the officers were also a part of the riot. The National Guard wasShow MoreRelatedLangston Hughes Research Paper25309 Words   |  102 PagesMexico to avoid segregation and racial injustice in the United States. As the manager of an electric company and owner of a ranch and mines, Jim expressed contempt for black Americans who continued to submit to segregation and live in poverty. Langston Hughes, 1933 (Library of Congress) Langston was not ashamed of being a black American. He had already written poems celebrating his heritage. He felt connected to the oppressed brown people of the world and hated his father for mistreating hisRead MoreModern History.Hsc.2012 Essay25799 Words   |  104 Pagestwo – conflict in the pacific Topic three – Douglas MacArthur Topic Four – World War I TOPIC ONE – USA 1919-1941 USA 1920’S * the radio age * felt like istory had turned a corner and never going back * stock market * black Thursday November 24 1929 * the jazz age * a speakeasyyyyyyy How significant were the Republican policies in causing the great depression? The significance of the republic policies were great, they brought a lot of growth in the 20’s allowingRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 Pagestransmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. To obtain permission(s) to use material from this work, please submit a written request to Pearson Education, Inc., Permissions Department, One Lake Street, Upper Saddle River, New Jersey 07458, or you may fax your request to 201-236-3290. Many of the designations by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the

Monday, December 9, 2019

Unified Communications Workplace Redesign -Myassignmenthelp.Com

Question: Discuss About The Unified Communications Workplace Redesign? Answer: Introduction With the advancement of science, internet has made its presence in the workplace. Since its advent in the workplace, internet has created wonders by systematizing the business activities. One of the most common usage of internet in workplace is the creation of website, for enhancing the brand image for the customers. Along with this, the companies and organizations have launched mobile services for the convenience of the customers (Chung, Lee and Choi 2015). This is in terms of increasing the trafficking of the audience towards the brand image. Scope of the research Merely introducing apps for the customers does not generate high revenue. The personnel also need to assess the extent to which the customers can access the mobile services for carrying out online shopping. This research provides an insight into the impact of mobile technology on the business dynamics of Al Meera Hypermarket and Supermarket in Qatar. Here, emphasis would be given on achieving large-scale customer satisfaction. The data collection from various and wide-ranging sources enlivens the importance of the mobile technology in the workplace and customer satisfaction. Background of the Company Al Meera Hypermarket and supermarket has achieved accolades and glory through commitment and strategic approach towards marketing. These approaches have resulted in the enhancement of the brand image. Adoption of the social media has increased the number of customers. Moreover, it has expanded the scope and arena of the business. This is through the online investment offers made to the stakeholders and shareholders (Almeera.com.qa 2018). As a matter of specification, the supermarket has 41 branches in and around Qatar. The personnel felt the urge of achieving wider customer satisfaction, therefore, they introduced many other branches in Muraikh, Azizia, Muaither, Thakira, Jeryan Njeima, Al Wakra 2, Al Wajba, Al Thumama, Rawdat Ekdeem. Along with this, the supermarket also opened an outlet in a property in Gulf M Mall. One of the other factors, which has enhanced the widespread presence of the supermarket is the construction of 14 malls. The innovative design of the malls would attrac t the customers (Almeera.com.qa 2018). 2016 was the era when Al Meera supermarket encountered unprecedented growth. The gross profit increased from 427.2 million QAR to 441.7 million QAR. Along with this, the rental income from the shops also witnessed remarkable growth of 37.6%, mounting the value up to 69.3 million QAR. Apart from this, the sales revenue achieved an escalation of 6.3% taking the amount to 2604.4 million QAR by 31st December 2016. Moreover, the operational income encountered a 6.6% growth from the sales of the last year. In numerical projection, the income last year was QAR 498.6 million, which mounted up to 531.6 million QAR currently (Almeera.com.qa 2018). Problem statement Recently, the supermarket has launched mobile services for the customers, so that they can shop at ease while relaxing at home. As a matter of specification, the retail hypermarket and supermarket has introduced the reward system on shopping a stipulated amount. However, it has not benefitted the personnel to conduct the business efficiently and effectively. This issue has deprived the customers from availing the benefits of points (Almeera.com.qa 2018). The major drive behind this is the internal failures in the mobile app, which helps the customers to redeem information regarding the points that they have gained in the account. The retail hypermarket and supermarket personnel have received complaints from the 50 customers regarding the inappropriate setting of rewards with the shopping amounts, which have deprived the customers from exercising their purchasing power. This deprivation has adversely affected the customer service, adding a negative connotation to the aspect of custome r satisfaction. As a matter of specification, the complaints from 50 customers have stalled the productivity of all the functional departments of the supermarket. This proposal would shed light on how mobile technology can be utilized judiciously for upgrading the standards and quality of the retail services. Aims and objectives The aim of this proposal would be to assess the impact of mobile technology on the workplace operations of Al Meera Hypermarket and Supermarket. Based on this aim, the following objectives can be developed: To identify the technologies used by Al Meera hypermarket for achieving customer satisfaction To excavate the accessibility options provided to the customers in case of the online shopping To discover the level to which the customers are comfortable in accessing option of online shopping in Al Meera Hypermarket and Supermarket To suggest recommendations for improving the mobile technology in Al Meera Hypermarket and Supermarket for reaching to a large number of customers Significance of the project Today, mobile technology has found its enlarged presence within the workplace. Mobile technology is used for many purposes, of which communication has gained popularity. Using latest and modern technology for communicating with the clients has benefitted the personnel in enhancing their brand image as smart (Pimmer and Pachler 2014). However, lack of efficient and effective technology broadens the gap between the personnel and the customers. This detachment compels the customers to lag behind from the latest trends adopted by the supermarket, which results in loss in sales revenue. This project, through the example of Al Meera Hypermarket, would attempt to enliven the process through which mobile technology has upgraded the standard and quality of workplace communication. The collected data from the samples enhances the validity and reliability of the propositions and assumptions. Literature review The aspect of scientific knowledge gets advancement through technology. According to academics, technology enriches the knowledge of the individuals regarding application of science in diverse fields. The etymological origin of technology dates back to the mechanical age (between 1450 and 1840). This was the era, when the first analog computer was discovered. Its function was multiplication and division (Pimme and Pachler 2014). During this age, the people also encountered the invention of mechanical computer through the hands of Blaise Pascal. However, Charles Babbage made the most mesmerizing invention of a unique kind of engine possessing flexibility to calculate polynomial equations through the methods of finite differences. Electromechanical age (1940) was the era when digital computer made its presence in the threshold of United States through the mastermind of Mark 1 in the Harvard University. The size of the computer was huge (8 ft high; 50 ft long; 2ft wide and 5 tons in weight). The operation of these computers depended on punch cards. In the process of operation, the people became aware of the separate parts of the computer (Colbert, Yee and George 2016). This enrichment of knowledge generated within the people the idea of using the computers in their homes as well as in the workplace. The electronic age was the time when ENIAC was developed. This was the period between 1940 till the present, when the people were made acquainted with the computers possessing flexibility to solve wide ranging computer problems with high speed. The length of these computers was 680 feet long and weighed 30 tons. The calculations were done through the vacuum tubes. This stage also saw the creation of high programming languages such as FORTRAN and COBOL (Bertschek and Niebel 2016). The age following this encountered the additions of integrated circuits, magnetic tapes throughout the parts of the computers. The development of programming language, BASIC, completed an operating system. In the following age, CPU was added, which was a chip consisting of memory, logic and circuits. Here, the basic functions were storing the files, transferring the files from one location to the other. The addition of internet transformed computers as a whole. It connected the humans with every part of the world. Within the different aspects of technology, Bring Your Own Device (BYOD) is a concept, which allows the employees in the workplace to bring the device of their choice. These include smartphones, laptops, and tablets among others. However, the security of these devices is solely the responsibility of the employees (Pimmer and Pachler 2014). In the recent past, this concept has been implemented as a policy in the workplace. According to the policy, the support is sought by the personnel for the employees device through the proper application of corporate governance. The allowance for support varies from organization to organization. In some of the organizations, allowance is refused for Pc and Laptops. This refusal is compensated by provision of monetary assistance in terms of buying the technological equipments of their choice. Yet in some other organizations, support is given only for mobile devices (Hung et al. 2015). The rules and regulations of the BYOD policy varies according to the duties and responsibilities allocated to the employee. The employees can make use of this policy for mitigating the risks related to the security of their personal technological devices. Technology in workplace Technology plays an important part in the workplace. As a matter of specification, technology helps the personnel to perform the tasks automatically, which saves a lot of time. Along with this, technology assists the personnel to produce innovative goods and products. Based on these functions, it can be said that technology enhances the productivity of the companies and organizations (Colbert, Yee and George 2016). With the advancement in technology, the aspects of video conferencing, whatsapp have been installed in the mobile devices. Through these, the employees can establish contact with the boss even from their homes or anywhere else. These functions have enhanced the portability of the technological devices used in the workplace. Provision of access to the mobile apps helps the users to surf the various services provided by the organization. This access has enabled the personnel to increase the trafficking of the audience towards the brand image (Pauleen et al. 2015). Typical example in this direction is the official website and social networking sites. Proper accessibility in this regards is the introduction of online shopping, which increases the revenue of the organization. Technology also helps the managers to review the performance of the employees. This is to ensure the smooth functioning of the business activities in all the departmental units. The example in this case is CCTV cameras. Apart from this, latest and modern software help the finance admins to develop the budget automatically. Technology also proves beneficial for the line managers in terms of checking the quality of the produced goods before sending them for packaging (Williams and LaBrie 2015). Rewards One of the recent concepts in the retail sector is the rewards. This is provided to the customers if they reach the stipulated shopping amount. This is done by transferring the reward points to the customers account. For this, efficient technologies are needed, which is missing in the workplace of the retail sector. This is in terms of keeping track of the ways and means through which the customers can redeem the points. Recently, the retail supermarket has introduced mobile services, where the customers can redeem points by shipping through the apps (Palvalin 2017). These rewards add happiness into the lives of the customers, as they get extra monetary benefits along with the branded products. Customer satisfaction Customers are the assets for the companies and organizations. They are the important stakeholders, who escalate the sales revenue. On the other hand, it is the responsibility of the brand personnel to provide quality products and services for satisfying the specific needs, demands and requirements of the customers. Like the other sectors, retail sector personnel indulge in partnership with the agency partners for introducing lucrative deals, trades and transactions for the customers. Typical example in this direction is rewards on shopping for a stipulated amount. Mere setting of the rewards does not enable the personnel to achieve customer satisfaction (Williams and LaBrie 2015). The personnel need to assess whether the customers are able to access the reward points. Social cognitive theory Social cognitive theory has four dimensions- self regulated behavior; learning through observation; outcome expectancies and self-efficacy. In the case of self-regulation of the behavior, the theories of planned action and reasoned behavior can be brought in. Controlling the computer by using it according to the needs, is a reasoned and planned behavior in case of the employees. The aspect of outcome expectancy is related with the managers in terms of estimating the capability of the employees to make practical application of the learnt skills on executing the workplace operations (Palvalin 2017). Emerging successful in performing the allocated duties diligently enhances the social status of the employees. As a matter of specification, technological learning expands the knowledge horizon of the employees. This expansion enhances the self-esteem of the employees as individuals. Viewing it from the perspective of the workplace issues, technology plays an important role in bestowing efficient and effective solutions on the employees. Regular practice in this direction increases the competence of the employees in terms of solving the issues within the duties and responsibilities. Observing other employees excelling in the technological operations generates an urge within the employees to perform better. Herein lays the true essence of the word cognitive (Chung, Lee and Choi 2015). Indulging in partnership with the internet service providers is the planned behavior of the personnel in terms of enhancing the standards and quality of the services. Taking the feedback of the customers, regarding the effectiveness, appropriateness and feasibility of the provided services, is the reasoned action of the personnel in terms of valuing their purchasing behavior and power. Delving deep into the aspect, deals, trades and contracts with the associate partners is an attempt of the personnel to alter the business scenario. Catering to the passion of the customers regarding the possession of latest technologies is the vision of the retail sector personnel towards enhancing the parameter of corporate social responsibility Introduction to research and research methodology Methodology enhances the clarity of the readers regarding the data collection process. Along with this, the readers are acquainted with the philosophy, which prompted the researcher to adopt a certain approach to the research. Along with this, samples occupy an important position in the data collection process. Their responses acts as an agent for the researcher regarding validating and enhancing the propositions and assumptions. Collection of data from the employees of Al Meera supermarket would enhance the clarity of the researcher regarding the contribution of mobile technology in the workplace and customer satisfaction. Research Philosophy There are mainly three kinds of philosophies, which are applied to research- positivism, post-positivism and interpretivism. Positivism philosophy helps the researcher to develop scientific facts and knowledge about the subject matter of the research. Post positivism philosophy helps the researcher to research the consequences of developing scientific facts and knowledge. Interpretivism needs the researcher to interpret new facts from the established facts (Mackey and Gass 2015). In this research, the researcher would select positivism philosophy for emphasizing on the scientific and real facts related to the impact of mobile technology on workplace. This selection would prove fruitful in terms of relating the assumptions with the scientific, real and objective facts of technological influence in workplace and on the achievement of customer satisfaction. Methodological choice Exploratory, explanatory and descriptive are the main approaches, which are applied in the research. Exploratory research approach assists the researcher to explore new facts based on the gathered and the available facts. Explanatory approach needs the researcher to explain the proposed points in details (Silverman 2016). In terms of the functionality, descriptive approach can be placed in the same alignment with the explanatory approach. This is in terms of delving deep into the proposed facts for describing them. In this research, the researcher would choose exploratory approach for excavating the factors, which establishes relationship between technology and workplace operations. This exploratory approach would enable the researcher to deduce relevant conclusions and suggest recommendations regarding the improvement of mobile technology for improving the workplace productivity the achievement of large-scale customer satisfaction. Moreover, exploratory approach would make the resea rcher aware of the transformations, which have taken place in the workplace of Al Meera hypermarket. Along with this, exploratory approach would enhance the knowledge of the researcher regarding the steps undertaken by the brand personnel for achieving loyalty, trust and dependence from the customers. Research strategy Research strategy is the step by step expression of the actions of the researcher for efficient execution of the research. In terms of its functionality, research strategy can be aligned with the action plan, which depicts the researchers every course of action. In this research, the researcher, at the initial stage, would attempt to enrich his preconceived knowledge regarding the subject matter (Mackey and Gass 2015). As a sequential step, the researcher would develop aims, objectives and questions followed by literature review. After this, the researcher would collect relevant data from the samples and analyze them for deducing conclusion and suggesting recommendations regarding the adopting of latest and modern software for adding the points into the account of the customers. Studying the previous data regarding the customer satisfaction, prior to the initiation of data collection, would be fruitful in terms of posing appropriate questions to the samples and analyzing them in prop er manner. Data collection and analysis For the research purpose, data is collected mainly through primary and secondary methods. Within this, there are subdivisions- quantitative and qualitative methods. In the primary quantitative, surveys are conducted to collect data from the samples (Taylor, Bogdan and DeVault 2015). On the other hand, in the qualitative data, case studies, journal articles and books are referred for completion of the data collection process. In this research, the researcher would select quantitative data collection method. As a matter of specification, survey would be conducted on the selected samples. The questions of the survey would be related to the extent to which the employees are comfortable with the technologies used in the workplace of Al Meera hypermarket and supermarket. These questions would be directed towards the business rather than the personal sentiments of the employees. The survey questions for the customers would consist of their satisfaction regarding the services provided. Attem pts would be made to protect their individual sentiments. The collected data is analyzed through primary and secondary methods. In the primary quantitative methods, questionnaires are prepared for analyzing the responses provided by the samples. On the other hand, in the secondary method, themes relevant to the subject matter of the research are developed for analyzing the collected data. In this research, the researcher would prepare questionnaires for analyzing the responses of the samples (Panneerselvam 2014). This would be done through the means of charts, tables and graphs. These tables, charts and graphs would depict the transformations, which the Al Meera hypermarket has undergone since the previous years. Along with this, the charts, tables and graphs would reveal the comparisons in the number of customers in the previous times and the present. One of the other aspects here would be the alterations in the service provided. Sampling technique The whole population is the sample of the research. This is in terms of the subject matter, which revolves around the society and the inhabitants. However, owing to the availability of less time and financial resources, the researcher needs to select a sample size for the collection of data in an efficient and effective manner. The researcher selects the samples mainly through three techniques- probability, random and simple. Probability sampling techniques reflects the selection of the samples, who have expertise on the subject matter of the researcher. Random selection indicates the selection of samples without any calculations or thoughts (Bryman and Bell 2014). Simple sample selection is the method, in which the researcher simply picks out the samples. In this research, the researcher would select 5 employees from Al Meera Hypermarket and Supermarket, who are tech savvy. The survey questions would focus on their accessibility towards the mobile technologies in the workplace. Along with this, 3 customers would be randomly selected for gaining insight into their satisfaction levels regarding the use of mobile apps for the shopping and redeeming points. Ethical considerations For executing a research, a researcher needs to abide by the research ethics. This adherence constitutes the personality of the researcher in terms of interplaying with the already established facts. One of examples of ethical considerations is Data Protection Act (1998). Complying with the standards and protocols of this act would help the researcher to enhance the safety, security and privacy of the personal data exposed by the samples (Panneerselvam 2014). Apart from this, following the Data Protection Act would help the researcher to preserve the privacy, security and safety of the personal details exposed by the samples. This adherence is also assistance in terms of adopting a liberal approach towards the samples. Typical example of this is the provision of liberty to withdraw the survey process upon feeling uncomfortable. Consciousness towards these aspects directly aligns with the true essence of customer satisfaction. Along with this, the researcher is expected to access only those sites, which do not need subscription (Flick, 2015). This adherence would help the researcher to avert the instances of plagiarism and collusion. Action plan The following is a sample of action plan, which enhances the clarity of the readers regarding the time when the research related activities would be undertaken: Activities Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Selection of the topic Development of aims and objectives Literature review Data collection Data analysis Deducing conclusion Suggesting recommendations Evaluation Making the necessary changes Table 1: Gantt chart for the proposal References Almeera.com.qa (2018). About us. Available at: https://www.almeera.com.qa/our-stores/al-meera-supermarkets-and-hypermarkets [Accessed on 8th February 2018] Bertschek, I. and Niebel, T., 2016. Mobile and more productive? Firm-level evidence on the productivity effects of mobile internet use.Telecommunications Policy,40(9), pp.888-898. Bryman, A., and Bell, E. (2014).Research methodology: Business and management contexts. Oxford University Press Southern Africa. Chung, S., Lee, K.Y. and Choi, J., 2015. Exploring digital creativity in the workspace: The role of enterprise mobile applications on perceived job performance and creativity.Computers in Human Behavior,42, pp.93-109. Colbert, A., Yee, N. and George, G., 2016. The digital workforce and the workplace of the future.Academy of Management Journal,59(3), pp.731-739. Flick, U. (2015).Introducing research methodology: A beginner's guide to doing a research project. Sage. Hung, W.H., Chen, K. and Lin, C.P., 2015. Does the proactive personality mitigate the adverse effect of technostress on productivity in the mobile environment?.Telematics and Informatics,32(1), pp.143-157. Mackey, A and Gass, S. M. (2015).Second language research: Methodology and design. Routledge. Matthews, B., Ross, L. (2014).Research methods. Pearson Higher Ed. McCusker, K., Gunaydin, S. (2015). Research using qualitative, quantitative or mixed methods and choice based on the research.Perfusion,30(7), 537-542. Palvalin, M., 2017. How to measure impacts of work environment changes on knowledge work productivityvalidation and improvement of the SmartWoW tool.Measuring Business Excellence,21(2), pp.175-190. Panneerselvam, R. (2014).Research methodology. PHI Learning Pvt. Ltd.. Pauleen, D., Campbell, J., Harmer, B. and Intezari, A., 2015. Making sense of mobile technology: The integration of work and private life.Sage Open,5(2), p.2158244015583859. Pimmer, C. and Pachler, N., 2014. Mobile learning in the workplace: Unlocking the value of mobile technology for work-based education.Increasing access through mobile learning, pp.193-203. Silverman, D. (Ed.). (2016).Qualitative research. Sage. Taylor, S. J., Bogdan, R., and DeVault, M. (2015).Introduction to qualitative research methods: A guidebook and resource. John Wiley Sons. Williams, J. and LaBrie, R.C., 2015. Unified communications as an enabler of workplace redesign.Measuring Business Excellence,19(1), pp.81-91.

Monday, December 2, 2019

Network Security and Its Importance in Computer Networks

Introduction Network security is an intricate topic traditionally handled only by professionally trained and experienced persons. Yet, as more and more individuals become connected through computer networks, a rising number of people need to comprehend the fundamentals of security in a networked environment.Advertising We will write a custom report sample on Network Security and Its Importance in Computer Networks specifically for you for only $16.05 $11/page Learn More In the domain of networking, network security comprises of provisions and guidelines established by the network administrator to curb and monitor illegal or unauthorized access, misuse, alteration, or denial of the computer network and other network-based resources (Stallings 2010). Network security comprises of a range of computer networks, both private and public, that are employed in day-to-day tasks such as carrying out business transactions and communication among firms, public and p rivate institutions, enterprises, and persons. Network security does just as its name goes, protects the network and manages all processes being done on the network. Objective The objective of the paper is to expound on network security and its importance in computer networks. Background information on computer networks will also be provided as well as risk management, network threats, firewalls, and hardware and software devices that can be used to improve the security of a computer network. Introduction to Computer Networks An elementary comprehension of computer networks is essential in order to understand the codes of network security. A network is any set of interconnected lines, basing this definition on the current topic, a computer network is basically a set of linked computers. Networks enable users to share resources and information, and are classified base on a variety of protocols (Network Security Threats 2011). For instance, a classification based on the connection man ner focuses on the hardware and software systems used to link the individual computer units, such as optical fiber, wireless connection, or coaxial cable communication. Networks can also be categorized on scale, this gives Local Area Network (LAN), wide area Network, virtual Private Network (VPN), among others (Stallings 2010). Networks are made up of ‘nodes’, which are the individual computers in the network, and at least one server and/or ‘host’ computers. The nodes are linked together by communication systems, which may be private, such as that within an institution, or can be accessed by the public, such as the internet. Several private networks also use the internet.Advertising Looking for report on computer science? Let's see if we can help you! Get your first paper with 15% OFF Learn More The moment a computer network is instituted, it immediately becomes vulnerable to network security threats such as viruses and bugs that may affect th e normal functioning of a computer. Besides, the personal information such as usernames, passwords, credit card numbers and other critical information may be at risk if the computer does not have adequate security measures. There are very many threats in a network, some of which are so severe and can bring down a large network consisting of thousands of computers. Virus In the domain of computer networks, a virus refers to a computer program that can replicate itself, similar to the biological virus. A computer virus spreads from one computer to another through an executable program that attaches itself on programs, files and folders. It can spread through various means, for example, if one computer in a network becomes ‘infected’ with a virus, the rest of the computers in the network may become infected too if the security features are inadequate. It can also be spread through USB devices, CD, DVD, or portable had drives. A computer virus may also spread by mailing a w eb address link to all addresses so that when a person clicks on the message to go the website, the virus enters this new computer. Certain viruses are less harmful, however, some are very harmful and can infect a computer in the network through various ways (Simmonds 2004). A virus can corrupt the files or software in a computer. Others may attack the computer hardware and bring the whole computer down. Yet, some viruses may allow a person to have partial control of a computer, this allows for unauthorized access to files and critical information stored in the computer’s hard drive. Although the Windows platform is by far the most vulnerable, other operating systems can also be attacked by viruses. Network threats arising from viruses can be managed through various ways, however, the most common technique is to install an antivirus software. UNIX-based systems such as Mac OS and Linux are far more secure than Windows. Some anti-virus programs can scan file contents and even zipped folders while some can also scan sent and received mails, a practice known as ‘on-access scanning’ (Simmonds 2004).Advertising We will write a custom report sample on Network Security and Its Importance in Computer Networks specifically for you for only $16.05 $11/page Learn More Vulnerability to viruses can also be reduced by carrying out data backups regularly on storage media that are not connected to the network or computer. Security patches availed by software manufacturers can also assist in reducing attacks by viruses. Secondary storage media must be scanned before opening in the host computer. Malware Malware, short form of malicious software, is a program created to interrupt normal computer operations or deny a user network or computer resources, gain partial control of the computer, access files stored in the computer, gather network-based information such as passwords, and other cruel or dishonest behavior (Curtin 1997). Malware consists of a large number of malicious programs that includes viruses, Trojans horses, worms, spyware, false adware, rootkits and other malicious programs. In 2009, malware was listed as the second most dangerous threat to computer networks. Today, millions of malware are created daily to exploit networks with weak security features. Threats arising from malware can be removed using antivirus programs. Most antivirus have an added feature of removing various malwares from the network of individual PCs. Besides, anti-spyware software can be used to prevent spyware threats. Denial-of-Service Attacks A Denial-of-Service (DoS) attack is a practice aimed at making network resources unavailable to some users. This vice entails the resolute efforts of a person or group of persons to prevent an internet site or service functioning normally or bringing it down altogether. This network threat is commonly committed against websites or services hosted on high profile internet servers s uch as financial institutions and credit card payment services (Stallings 2010). One mode of attack involves flooding a web server with requests in such a way that it cannot respond to legitimate communication requests, or responds in a sluggish manner that virtually renders it unusable. In general, DoS attacks are executed by either compelling the targeted systems to reset, or using up its resources so that it is unable to offer the intended services. DoS attacks are perhaps the most malicious and hardest to prevent or manage. They are the most malicious due to the ease with which they can be launched and the difficulty of tracing their origins, and it is difficult to deny the requests of the attacker without also blocking out genuine requests for service.Advertising Looking for report on computer science? Let's see if we can help you! Get your first paper with 15% OFF Learn More DoS attacks can be prevented through various ways. The first technique is to use firewalls. Firewalls have simple instructions of blocking or allowing certain IP addresses, or ports, however, firewall are not very effective in some DoS attacks as they cannot distinguish legitimate traffic from DoS traffic. Switches and routers can also be used to prevent these attacks (Kizza 2006). Intrusion-prevention systems (IPS) have been successfully used to halt DoS attacks that have signatures attached to them. Unauthorized Access This is a very wide terminology as it can refer to various types of attacks, however, the objective of these attacks is to access some information that the computer or server is not supposed to reveal. Unauthorized access to a computer or server can be achieved by using viruses, malware and other malicious programs. This form of threat can be waded off by using antivirus programs and security patches. Another strategy used by intruders to access a computer on a netw ork is a technique known as packet sniffers. Packet sniffers can be used on a vulnerable network and they just ‘listen’ on the server for words such as password or login in the packet stream, then sends the information thereafter to the perpetrator. This way, an intruder is able to obtain usernames, passwords, credit card information and other critical information from unsuspecting users (Bragg et al 2010). This type of threat can be prevented by using clear-text passwords, besides, data encryption can help divert such attacks. When using a wireless network, it is advisable that one should use a long or complicated password, also, it is advisable that the strongest security supported by the wireless connection hardware should be used, such as encryption tools. Passwords can also be changed regularly. General Methods for Preventing Network Attacks and Reducing Vulnerability on Networks The most commonly used technique for reducing network threats is the installation of a ntivirus programs. These programs must be regularly updated and security patches and updates installed. Improving the security of the network infrastructure can also involve switching on features that enhance network security on switches, routers, and other hardware (Fadia 2006). These security features ensure a secure connection, enhance perimeter security, prevents intrusion, protects identity services, and general security management. Fixing intrusion detection systems and firewalls offers protection for most areas of the network and allows for a safe connection. Working on a virtual private network (VPN) can also enhance security. VPNs provide network access control and encryption services. Network security can also be improved by undertaking regular network security audits. A network security audit simply means that an expert comes and examines the security of the network, he also checks for loopholes that may be used attack the system and fixes them. The audit can go beyond an inspection of the computers in the network and may comprise a site assessment of the physical security of the organization. A network security audit fixes an organization security flaws in the network and makes it difficult for perpetrators to attack the network (Network Security Threats 2011). Since network threats come in a variety of forms and cannot be totally eliminated, it is advisable that secure updated data backups should be kept on systems that are detached from the network. None of these strategies will singly eliminate the threats arising from a network connection, but when they are used together, they can be exceedingly effectual at keeping a network safe. Besides, well –thought-out organizational policies can be effective at preventing unauthorized access to critical and parts of the network. References Bragg, R., Rhodes-Ousley, M., Strassberg, K. (2004). Network security: the complete reference. New Jersey: John Wiley Sons, Inc. Curtin, M. (1997). Introductio n to Network Security. Available from  http://www.interhack.net/pubs/network-security/ Fadia, A. (2006). Network security: a hacker’s perspective. TX: Thompson Course Technology. Kizza, J. M. (2006). Computer network security and cyber ethics. Kizza, J. M. (2006). New York: McGraw-Hill. Network Security Threats. (2011). What Is A Network Security Audit? Web. Simmonds, A., Sandilands, P., van Ekert, L. (2004). An Ontology for Network Security Attacks. Lecture Notes in Computer Science, 3285: 317–323. Stallings, W. (2010). Cryptography and network security: principles and practice. NY: Prentice Hall. Stallings, W. (2010). Network security essentials: applications and standards. NY: Prentice Hall. This report on Network Security and Its Importance in Computer Networks was written and submitted by user Lamar Hanson to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.