How to write narrative essays
Grade 11 English Exam Essay Topics
Tuesday, August 25, 2020
College Admissions Essay: A Life Changing Experience :: College Admissions Essays
A Life Changing Experience à The experience of the APEC Youth Science celebration was amazing. It has enormously affected me from numerous points of view, changing the manner in which I take a gander at the world and interfacing me with individuals and occasions a long ways past my once in the past constrained understanding. I am amazingly happy to have had this chance. It was a superb encounter on various levels. It tested me and extended me mentally and socially. I feel that this experience has immensy affected me. à Through this program I had direct access to the absolute most brilliant youthful personalities in both the United States and the world. The sharing among understudies of thoughts and encounters in science, and in different regions too, was illuminating. I sensed that I got the opportunity to assimilate information from everyone around me. This condition spread past the understudies and furthermore incorporated the staff and speakers. We approached mind blowing staff who had the option to offer a lot to the experience and offer their own science bits of knowledge. The program additionally got speakers and other science experts from around the globe who were at the highest point of their separate fields. This celebration gave me genuine access to the movers and shakers of the science world, an encounter past any accessible to me anyplace else. à The most intriguing part of this experience, for me, was the presentation to new societies. This incorporates the wind culture puts on science. I discovered immense contrast in the perspectives of numerous societies towards science related issues astonishing. For example numerous societies had inconceivably various perspectives on imminent issues encompassing the ramifications of hereditary designing. The Asian and American societies were altogether different in many work propensity regions also. There was an intriguing gathering dynamic as socially blended gatherings endeavored to all things considered total gathering ventures. The social partaking in science went past how questions were offered an explanation to how they were asked to which inquiries were generally significant and even which questions were tended to. while watching the social turn on science and work propensities was an intriguing side interest, the genuine miracle was social sharing on a more noteworthy scale. à This program presented me to Asian societies in a manner I had never thought conceivable. Living in an Asian nation, in any event, for just seven days, and being blended in with understudies from around the globe carried me eye to eye with societies I had at no other time really experienced.
Saturday, August 22, 2020
wireless Essays
remote Essays remote Essay remote Essay Executing remote advancements includes specialized and the executives issues or contemplations that have vital business suggestions inside associations. Along these lines, it is important that associations embracing remote advancements build up the fitting security approaches overseeing remote innovations and activities inside their association. Compose a four to six (4-6) page remote security arrangement for a medium-sized financial association utilizing the accompanying structure: 1 . Remote Security Policy 1. Remote Security Policy Overview Purpose and Scope 2. Materialness 3. Remote Network Security Requirements 4. Remote Network Access Requirements 5. Remote Device Requirements 6. Remote Standards Supported by the Organization 7. Moral Guidelines Associated with Wireless Networks in the Organization 9. 8. Strategy Enforcement 10. Terms and Definitions 2. Use in any event two (2) quality assets in this task. Note: Wikipedia and comparable Websites don't qualify as quality assets. Your task must follow hese designing necessities: Be composed, twofold divided, utilizing Times New Roman text dimension (12), with one-inch edges on all sides; references and references must follow APA or school-explicit configuration. Check with your educator for any extra guidelines. Incorporate a spread page containing the title of the task, the understudies name, the teachers name, the course title, and the date. The spread page and the reference page are excluded from the necessary task page length. The particular course learning utcomes related with this task are: Discuss the job of guidelines in remote systems. Dissect the system conventions and security instruments in remote systems. Assess the use of Wireless LANs, MANs, and PANS. Depict the moral issues innate in remote systems administration. Use innovation and data assets to examine issues in remote systems. Compose obviously and briefly about remote figuring points utilizing appropriate composing mechanics and specialized style shows. remote By nourcare
Wednesday, August 5, 2020
Customer Development Case Studies
Customer Development Case Studies © Shutterstock.com | Max GriboedovReading about the Customer Development model is all well and good. Blankâs book is full of valuable case studies that illustrate his points well. However, it is just as helpful to learn about how some of todayâs most successful startups have employed the Customer Development model successfully. In this article, you will learn how two of todayâs most successful startups used customer development Dropbox and Groove.CUSTOMER DEVELOPMENT MODEL AT DROPBOXWhat is Dropbox?Dropbox is a file hosting service based in Silicon Valley. It offers both commercial and personal cloud storage of all sizes. Founded in 2007, Dropbox entered a very crowded market around the time that the cloud was beginning to explode. Unlike its competitors, Dropbox managed to capture huge swaths of the market and the service grew from 100,000 users to several million users in just 18 months. While this sounds like the typical tech explosion story, the difference between Dropbox and other companies is that Dropbox did this without doing any advertising.Dropbox uses the freemium model to draw in customers. It offers basic customers 2 GB of free online storage space and allows them to scale up to the paid service as needed. As of June 2015, Dropbox had captured 400 million registered users.The Problem at DropboxAt first, the Dropbox story sounds like a typical Silicon Valley fairytale. Founded by a couple of engineering students from MIT, it was accepted into the prestigious Y Combinator seed accelerator and saw rapid growth.It is true that Dropbox was growing. However, there were serious problems. The team at Dropbox had engineering experience but almost no marketing experience to speak of. The team was taking the advice of investors and mentors and using traditional marketing methods. Yet, these traditional marketing methods were not what was causing the company to grow. Essentially, Dropbox was throwing money away on marketing channels that were not drivi ng customers while still seeing a growth that was unexplained. Growth of any kind was good but it is hard to perpetuate that growth when it is unclear where the growth was coming from.The founders at Dropbox discovered Steve Blankâs Four Steps to the Epiphany as they were dealing with this problem. They then tried to use Blankâs method to learn more about their problem and attempt to come up with a solution.Four steps of the Customer Development model at Dropbox1. Customer Discovery at DropboxAs previously noted, Dropboxâs biggest problem upon launch was that they were trying to apply traditional marketing techniques to their business. However, they were not having any success with these techniques. Investors and friends were telling them that these were the tried and true methods for any business. They were under the impression that they should be launching early and launching often. These launches were supposed to provide a perfect product with all the right features. If the y could do this, then traditional advertising would work.What Dropbox learned was that it was more important to launch when they were ready rather than as early as possible. When they entered Y Combinator, the founders of Dropbox promised to have a fully functional product available for launch in only eight weeks. In reality, launch did not come for 18 months. While traditional wisdom would suggest that this would be the end of the business, Dropbox figured out that all of the learning and discovery that they did during those 18 months would be more important than getting a product out to the public. They needed to have a better idea of who their market was.What Dropbox realized it had to do was go back to finding their customers. To do this, they began to work closely with the customers that Steve Blank would call âearly adopters.â They worked to put code together to send out to keen engineers â" people just like them. The code they sent out was far from the finished product. However, this basic presentation of the product allowed Dropbox to confirm that the problem that it was attempting to solve was very real for its customers. Through the feedback it got from early adopters, Dropbox realized it was on its way to a real solution.One of the biggest lessons that Dropbox learned during this stage was that they could not just head to the forums where its audience spent its time. They also had to communicate with these customers in an authentic way if they wanted to get real feedback.2. Customer validation at DropboxDropbox had already come to the conclusion that they needed to learn early. They also quickly understood that learning was not a one-time event. They understood that if they really wanted to understand their customers, they needed to learn early and learn often.They created a private beta launch video for their early adopters. Because they knew where their customers were and how to speak to them, the video resulted in a waiting list that grew to 75,000 people in only a single day.Part of the reason that Dropbox was so successful during customer validation is because they used the product themselves. They knew that they had a problem and needed a solution. This does not always translate into a successful product. However, because the team at Dropbox were early adopters themselves, they knew where the other early adopters could be found. As a result, Dropbox decided to get out of the office and when they did, they knew where they could go to validate their assumptions.To get out of the office, Dropbox created a snapshot of their product. This was their minimum viable product. It showed the inherent value of the full product but did not include all of the bells and whistles yet. They sent this minimum viable product out to Hacker News, where their early adopters lived. The feedback they got was of very high quality. More importantly, the feedback they got validated their learning.Lessons LearnedDuring this time, the company b egan to see real pressure from investors to use more traditional methods. Reading Blankâs book, the company knew ostensibly that these methods would not work for everyone. However, the pressure that the young company faced was real and so they tried these methods anyway. Using these methods taught them an important lesson: they needed to keep their focus on what worked for their company and their market if they wanted to be successful.They also learned that the right market fit would cure them of several ills. In this sense, Dropbox were fortunate because since they were engineers, they knew how to create a great product that other engineers, early adopters, would use. Because they discovered the right market and had a great product, users grew. This was despite the fact that Dropbox had a poor website and was virtually invisible in the PR world. At this point, Dropbox also did not have any partnerships, extensive features or even good market positioning.All of these things make u p conventional marketing techniques. For Dropbox, they either did not have these techniques or these tactics had failed. Yet, the product was still getting to customers. The typical Dropbox customer journey looked like this:Customers would hear about Dropbox from a friend, not knowing that they needed this product.The customer would try it and realize that Dropbox solved a real problem that they werenât acutely aware that they had.Thrilled about this discovery, these customers would spread the word to their friends about this happy surprise.Dropbox would come to learn that the techniques it was using were trying to harvest demand rather than drive demand. This was the difference between the steady growth it was seeing and the explosive growth that it would be capable of later. When it came time for customer creation, Dropbox would take the current customer journey and really begin to employ it effectively.3. Customer Creation at DropboxDropbox had its early adopters excited about its product. To stick to the Customer Development model, the company would have to begin to create its mainstream customer base. To get started, Dropbox created a landing page that was designed to capture interest before the official release of the product.This landing page was important because it gave a place for its current customers to refer their friends. Rather than driving demand through the mainstream media, Dropbox pivoted and found a way to facilitate these referrals by creating a solid landing page.Lessons learnedDropbox tried the cookie cutter approach. It failed miserably. It tried using paid searches. Its affiliate programs and display ads also failed. Dropbox also tried hiding the freemium option but realized that this did not always work successfully but more importantly, that it just was not cool. It did not build up trust with customers.All of this paid advertising failed but not because Dropbox was not acquiring customers. It failed because the cost per acquisitio n was needlessly driven up to $233- $388 for a product that only cost $99. The paid advertising was not drawing in customers but it was still costing them a lot of money. This balance was both unfavorable and unsustainable over the long term.What was working, however, was the word of mouth experiments. Not only was the referral system a lot cheaper than traditional marketing but it was also underdeveloped at the time. When Dropbox realized that the traditional methods were not working, it worked on giving its current users the tools they needed to help grow the business.4. Company Building at DropboxThis word of mouth referral program became Dropboxâs main marketing strategy. The program that Dropbox created offered a double sided incentive to give the current user incentive to share and encourage sign ups while also rewarded new users. The program started by offering both users an extra 250 MB of space for free.To make sure that this was the best way forward, Dropbox started to f ocus on data analysis and marketing. They hired someone with a data background to perform split tests to determine the best landing page optimizations, encourage sharing and analyze surveys. This investment in the analytics was a part of the âlearn early, learn oftenâ strategy that Dropbox had previously adopted.With all of these tools, Dropbox grew their user base from 100,000 users to four million users almost entirely through viral sharing and their word of mouth programs.The TakeawayDropbox learned two big lessons that contradicted the traditional wisdom that they were receiving from other sources. The first big lesson was to get something into the customerâs hands as soon as possible. Donât worry about having a lot of features or making the product perfect. Putting a minimum viable product in the customersâ hands will ideally provide the feedback you need to propel the product forward in a viable way that is useful to customers.The second lesson was one of the biggest focuses of Blankâs book. Dropbox learned that it is important to create a strategy that reflects your market. Even if more âexperiencedâ people question that strategy, stick to what you know about your customers and your market and give them what they want.CUSTOMER DISCOVERY VALIDATION AT GROOVEWho is Groove?Groove creates online help desk software for enterprises and small businesses. For customers, Grooveâs software looks like an ordinary email service but offers features that allow it to be integrated with social media platforms like Facebook and Twitter. Groove decided to move away from the freemium model and now offers all of its features for $15 per user per month.The Problem at GrooveIn its early days, Groove was earning customers but it was unable to hold on to them. The CEO realized that the churn rate was hanging out around 3% and that was not something he could live with because it did not fit the companyâs goals. The problem for Groove was not the churn rate itself but the fact that no one was sure why the churn rate was as high as it was.Four steps of the Customer Development model at Groove1. Customer Discovery at GrooveTo get to the bottom of its growing churn rate, Groove started by talking to customers. Grooveâs CEO makes it clear that one of his biggest priorities has been to learn more about his customers. He goes through major efforts to collect client feedback in order to really learn about his product.To begin to approach the problem of the churn rate, Groove relied on exhaustive feedback to make sure the product was viable for the market. This feedback initially came from feedback surveys and onboarding emails sent out to new clients. However, this feedback was not enough to fix the problem.Unsure of what to do about this churn rate, Groove decided to dig into its metrics to see what was going wrong.2. Customer Validation at GrooveGrooveâs CEO decided to get in touch with his customers. He started an email campaign that a sked individual for in-depth one-on-one conversations that would provide real feedback. At the time, Groove had around 2,000 customers and a lot of them had something to say about Grooveâs model, business, product or customer service. The response to the initial campaign was overwhelming.Groove then set up an online calendar that allowed people to sign up for a phone call with the CEO. These calls were scheduled to be 10 minutes long and took place over phone or Skype. In addition to reaching out to customers, Groove was able to salvage relationships, forge new bonds and really validate the issues that laid behind Grooveâs churn rate.Lessons learnedWhat Groove learned in the customer validation phase is that a business does not need to invest in exhaustive testing or expensive tools to get to know its customers. All you need to do is get out of the office and go to where your customers are with your hat in hand.They also learned that they would not get useful feedback by sending out surveys or asking leading questions. Instead, they structured the conversation based on the individual issues that each customer had. Rather than going into a call with a set of expectations, they went in to learn about the customerâs problems and validate what they thought they knew about that customer.As a result of 100 hours of phone calls with customers, Groove learned:It needed better second-tier onboarding.How to convert unhappy customers back into happy customersMore about the personalities that make up its customer baseHow to improve marketing copyTo make customer learning a habit by learning early and learning often3. Customer Creation at GrooveDuring this time, Groove was embarking on a mission to grow its customer base from 2,000 customers to 5,000 paying customers. The timeframe for this goal was 12 months. Until this point, the company was more focused on retaining current customers and putting out fires than on really growing its customer base.Over the first two years of its life, Groove found a great market fit and gathered a group of early adopters who loved the product. The foundation was already there â" it was learned and validated several times over.To grow, Groove decided to focus on three big issues:1. Groove wanted to become the product leader in the SMB Market.The global SMB market contained 76 million players worldwide. Research validated that customers who were using other customer support software products hated the service they were getting. With a great product designed specifically for these customers, there was no reason that Groove could not grow to grab 5,000 of these customers.2. Groove needed to work on building a respectable and lasting brand.Groove knew it had a great product but a product is not enough. It needed to use its brand to drive interest from the right customer group. To reach this customer group, Groove created the 100K blog where it documented its journey as a startup.3. Groove needed to be more focuse d on using data.Groove wanted to put a real focus on actionable data that would help them know what to expect when they made business decisions. Rather than hoping for luck, data analysis and collection could fuel growth systematically and help them achieve their 12-month goal.In order to focus on these issues, Groove had to scale its company. It could not make these transitions with its existing teams and processes. Thus, Groove moved into the company building phase to create an infrastructure that could support this attainable growth.4. Company Building at GrooveGroove needed to create a company that was capable of both driving new customers and handling these customers to make sure that their churn rate stayed low. They knew that they had to start by building the right time. The company decided that hiring and keeping the right employees was important because it was important that everyone was working towards the same vision. Groove wanted all of its employees to be working and t hinking as if they were a startup CEO.Groove also knew that it need to begin to work at a faster pace. Previously, the company had been stuck putting out fires and focusing on past and present problems rather than thinking ahead towards the future. To make sure that this pace occurred, they decided to set both quarterly and monthly goals designed specifically to reach the ultimate 12-month goal of growing to 5,000 customers.They also realized that there was a lot of infrastructure debt and bugs that were holding the company back. To move past this, the company decided to reexamine its resources and realistically consider how those resources could be better used.All of this resulted in a serious game plan for customer development and business growth the plan was bound take the following avenues:Blogging was the most viable channel that Groove was using. It decided to continue to pursue this channel aggressively.Groove decided to use the blog to drive a real online community.The blog would also become a valuable tool for driving organic SEO.Groove needed to figure out how to build a better solution for driving and processing referrals.Groove needed to figure out how to better integrate with future partners.Groove needed to drive product development within realistic timelines.Groove had to find a better way to convert more leads and nurture them through the sales funnel.The TakeawayGroove took away a lot of lessons from Blankâs customer development model. Groove takes the âget out of the officeâ advice seriously and really commits to it personally rather than trying to automate the process through expensive means. Ultimately, Groove knows that it needs to ask its customers if it has any doubts. This also is one of the biggest takeaways for Blankâs work.Groove also learned that this learning and validation was essential for growing the company. It employed a lot of what it learned in customer discovery and customer validation when it decided to grow its cu stomer base and scale its business. When Groove decided to grow, it put together plan that was appropriate for its market. As Blank says in his book, market fit cures almost all ills.
Saturday, May 23, 2020
Online Sources for Nursery Tree Purchase and Delivery
High-quality seedlings can be found at reasonable prices on the Internet. You just have to know where to look. Try these sites the next time you need to purchase trees. They have been picked because of theà convenience of online ordering, ease of site navigation and reputation. Note that these businesses are well established and have been growing trees for decades. They know how to do it right. Nurserymen.com Based in Grand Haven, Michigan,à Nurserymen.comà is a third generation business with an extraordinary selection of seedling conifers and sold as bare root and in plug containers. Not as extensive but just as attractive are their hardwood seedlings. They sell out early so request your order at least six months in advance. I ordered 50 bare root Eastern redcedars in December to be planted in Alabama. There was a March delivery from Michigan and I planted the seedlings in early April with a nearly 100 % survival rate. Virginia Department of Forestry The only government supplier of trees on this list, VDOF has been in the seedling business for over 90 years. They offer hundreds of conifers, hardwoods, and specialty packs. Theirà website is customer friendly very easy to use. VDOF provides an online catalog. Seedling costs are very reasonable and are mostly sold as bare-root planting stock. The best values are in quantities of 1000 and only sold during the dormant season. Arbor Day Tree Nursery The Arbor Day Foundation is a pioneer in tree promotion and care. I have been a member for years and get my annual bundle of seedlings that comeà with the membership. Their nurseryà includes a wide variety of fruit, nut, and flowering trees and you can get a significant member discount on bulk wildland trees for planting tracts with large acreage. Musser Forests Based in Indiana County, PA., Musser Forests has been growing quality plants for over 70 years. They offer hundreds of conifers and hardwoods plus their online store is well constructed, easy to use and has the largest selection of tree varieties found anywhere. Musser provides a free catalog and valuable information on tree care and planting. Seedling cost ranges widely according to species and size. Gurneys Seed and Nursery Company Based in Greendale, IN., Gurneys has been in the tree and plant business since 1866 and sells all types of nursery stock, including landscape trees, shrubs and fruit trees. Gurneys is one of the leading seed and nursery companies in the United States and very much present online. I particularly like their Official Blog and YouTube videos. They offer the top-rated flowering trees, shade trees,à and trees for windbreaks. The Nursery at TyTy The TyTy, Georgia-based TyTy Nursery has been in the tree nursery and flower bulb business since 1978. This family business promises to provide each and every customer with the best product, fastest delivery, lowest price, and overall best service for your money. They are also one of the largest tree seedling sources online with an outstanding YouTube collection of how to plant videos.
Monday, May 11, 2020
Data Protection and Theft - Free Essay Example
Sample details Pages: 4 Words: 1122 Downloads: 8 Date added: 2017/06/26 Category Information Systems Essay Type Narrative essay Did you like this example? DATA PROTECTION AND THEFT Forms of Data in Law Firms The (Indian) Information Technology Act, 2000 (hereinafter referred to as the Act) deals with the issues relating to payment of compensation (Civil) and punishment (Criminal) in case of wrongful disclosure and misuse of personal data and violation of contractual terms in respect of personal data. Data is defined under Section 2(o) of the information Technology Act, 2000 as: à ¢Ã¢â ¬Ã
âdata means a representation of information, knowledge, facts, concepts or instructions which are being prepared or have been prepared in a formalised manner, and is intended to be processed, is being processed or has been processed in a computer system or computer network, and may be in any form (including computer printouts magnetic or optical storage media, punched cards, punched tapes) or stored internally in the memory of the computer; à ¢Ã¢â ¬Ã
â Law firms have an immense pool of critical and private data and its usage in any other manner, other than the instruction of the clie nt raises an ethical and legal question. In order to obtain legal advice a client often confide with the law firm with embarrassing details, classified information, future plans. Therefore it is of utmost importance that such data be protected. Additionally, it is to be noted that the obligations of law firms to protect confidential data begins only after the creation of a relationship of an attorney and client.[1] Furthermore, The Indian Evidence Act, 1872 under sections 126 to 129 deals with the privileged communication that is attached to professional communication between a legal adviser and the client. It prohibits attorneys from disclosing any communications exchanged with the client and stating the contents or conditions of documents in possession of the legal advisor in course of and for the latters employment with the client. The responsibility which is carried by the attorney while discussing with the client, is also to be maintained within a law firm which engages t he services of various attorneys. Donââ¬â¢t waste time! Our writers will create an original "Data Protection and Theft" essay for you Create order Effect and obstacles to data theft The electronic nature of data leaves a gaping hole for exploitation and therefore theft largely goes unnoticed until the revelation by the perpetrators of such theft. Further the effect of data theft in a law firm shall result in concealing such a fact from the client and the public in general to avoid any embarrassment, reputational damage and reduced client confidence for inability to take any action to curtail such theft. Section 72A of the Act provides that disclosure of information, knowingly and intentionally, without the consent of the person concerned and in breach of the lawful contract has been also made punishable with imprisonment for a term extending to three years and fine extending to INR 5,00,000 (Approx. US$ 10750). Further Section 72 of the Act provides for penalty for breach of confidentiality and privacy. The Section provides that any person who, in pursuance of any of the powers conferred under the Act, Rules or Regulations made thereunder, has secured access t o any electronic record, book, register, correspondence, information, document or other material without the consent of the person concerned, discloses such material to any other person, shall be punishable with imprisonment for a term which may extend to two years, or with fine which may extend to INR 100,000, or with both. Method of data protection Many of the vulnerabilities that exist in protection of data from theft exists due to the inadequacies present in the computer system administrators. Further, even if such loopholes are adequately covered by the programmers and administrators, the trust, freedom to work, enjoyed by the employees and advocates working with a law firm enable them to exploit such a position to their own advantage. Further by virtue of Section 43A of the Act, any body corporate including a firm may be held responsible for leak of sensitive information or data in case it is negligent in implementing and maintaining a reasonable security standards and procedure. Further in case any wrongful loss is caused in consequence of such leak, the firm shall be responsible to pay compensation as well as damages to such a person affected. In order to curb such misuse of data usage various firms employ various tactics. Titus Co., a law firm based out of New Delhi, does not allow temporary employees, or interns to c arry any mobile devices into their office premises. Reasonable security practices and procedures is defined under Explanation (ii) of Section 43A of the Act as security practices and procedures designed to protect such information from unauthorised access, damage, use, modification, disclosure or impairment as may be specified in an agreement between the parties or as may be specified in any law for the time. Moreover the Government of India in conference of the powers granted under Section 87 read with Section 43A of the Act, framed the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 (hereinafter referred to as the Rules). Rule 3 of the Rules defines sensitive personal data or information as any information involving the financial information, passwords, physical, psychological condition, sexual orientation, biometric information or any clause of a contract. Further, Rule 4 and 5 of the Rules prescri bes that sensitive data and information held by a body corporate or any person on its behalf, then a privacy policy for handling of or dealing in personal information including sensitive personal data or information shall be prepared by the body corporate and it shall ensure that the same is available for view by such providers of information who has provided such information under lawful contract. Additionally, Rule 4 of the Rules states that disclosure of any personal data or information requires the prior permission of the provider of the information. It is pertinent to note that the Ministry of Communication and Information Technology, vide Press note dated 24.11.2011 has clarified that the Rules were applicable on law firms.[2] Moreover, the Bar Council of India, the statutory authority which regulates and represents the Indian bar mandates that an advocate shall not breach the obligations imposed upon him/her under Section 126 of the Indian Evidence Act. [3] Conclusion Undoubtedly, the concept of data theft and protection is at a nascent stage in India. Whoever there are reasons for jubilation with the Data Privacy Protection Bill, 2013 pending in the parliament. Further the framers of the Rules have attempted to adopt ideas from jurisdictions which have long standing and mature data protection regulations. These Rules are only therefore a first step. Moreover, stringent implementation of the law and healthy development of the data privacy and protection jurisprudence in the long run is what one needs to watch out for. [1] Kalikumar Pal v. RajkumarPal 1931 (58) Cal 1379, Para 5 [2] Ministry of Communication and Information technology, Press Note No. 11-7/2010-S-I(Pt. 1) [3] Bar Council of India Rules, Part VI, Chapter II, Section II, Rule 17.
Wednesday, May 6, 2020
Summary and Reflection Free Essays
The article contains a piece of history because in a way, it talks about how the Cold War started based on the point of view of an editor named Charles L. Mee. As can be readily ascertained from the title, the author is merely presenting his educated opinion pertaining to the contribution of different countries like the United States, Russia, Germany and other countries , their hidden conflict, how they acted and reacted, and how they each played their role in the beginning and ending of the Cold War. We will write a custom essay sample on Summary and Reflection or any similar topic only for you Order Now The author also discussed some of the so-called behind -the-scenes strategies that came into play which involved famous political figures, and he is leaning to the possibility that what these authorities did may have mitigated or aggravated the circumstances that further ignited the beginning of the Cold War (Mee, 2009). The author opens the article by painting a picture of two scenarios: The first one focuses on how President Truman expressed his uncensored sentiments about the Russians to Foreign Minister Molotov who only arrived to pay his respects to the remains of President Roosevelt, and the second one talks about how Winston Churchill kept thousand of captured German troops and prepare them against Russia (Mee, 2009). In both of these pictures, the author is trying to illustrate sarcastically that the behavior of these people was a sure fire way to start a conflict. It is not unknown to many that the Cold War began after the World War II. Sensitivity should be exercised at all cost during these trying times when talking about matter relevant to national security and diplomatic relations and the author is trying to say that these political figures showed the exact opposite of being sensitive. The author goes on to discuss how the different countries picked the strategy that would work best for their country economic- and military- wise, and they also picked on the countries which they would deem as allies. The Cold War resulted in a battle between the strongest of countries, the east against the west. This view of the author is strengthen when he mentions that the Big Three does not care about what happens to other countries as long as they did their part right and make sure that they can have everything going in their direction. He further extends his argument when he said that these contenders were just using the weak ones as pawns because during these times, the power is up for grabs and they need all the help they can get. The Big Three that the author is referring to are Joseph Stalin, Franklin Roosevelt, and Winston Churchill (Mee, 2009). How to cite Summary and Reflection, Papers
Friday, May 1, 2020
Security and Privacy Issues Associated with Social Media â⬠Samples
Question: Discuss about the Security and Privacy Issues Associated with Social Media. Answer: Introduction The computer based technologies, which help for creating and sharing any type of data or information or ideas through several communication networks that are present virtually is known as social media. This social media has several features and aspects. The main feature is the interactive Web 2.0 applications (Bertot, Jaeger Hansen, 2012). The users have to create account in the application and thus can communicate with the entire world. There are several types of social media platforms in the modern world. The most popular are the Facebook, Twitter, Instagram, WhatsApp and many more. Facebook has the largest number of users, which crosses over almost thirty billion in number (Gundecha Liu, 2012). WhatsApp is the second most popular after Facebook. It came in the year 2009 and soon it gained popularity all over the world. In the year 2014, Facebook acquired WhatsApp for more profit. Currently, almost one billion users are using WhatsApp and it is the most significant popular messag ing and texting application. These social media applications are extremely popular for all the users and individuals especially for the youth generation (Chen Bryer, 2012). However, there are several security and privacy issues related to these social media platforms, which often turn out to be vulnerable for the society. The report covers a brief description about the security and privacy issues associated with social media. The report provides a detailed discussion on the challenges and problems occurred due to the security and privacy issues. The report also discusses about the relevant technologies of the social media and the impact of social media in modern society. The report further helps to understand what lessons are learnt from this discussion. Discussion Security and Privacy Issues in Social Media The social media is the most utilized applications in the modern world. Several types of social media are present in todays world. The most popular amongst them is the Facebook. A famous entrepreneur, namely Mark Zuckerberg created this very popular and user friendly application for its users (Smith et al., 2012). The users have to create accounts in the social media platform and then access their accounts. They can share information, photos, videos and many more. Above thirty billion people are there in Facebook. WhatsApp is the second most popular social media platform after Facebook. Around one billion users are using WhatsApp today. However, there is a negative side in every positive aspect. Security and privacy issues are extremely common in social media sites (Kavanaugh et al., 2012). The security and privacy issues often turn out to be absolutely vulnerable and dangerous for the society. These security issues mainly have a tremendous negative impact on the entire society and e specially for the youth generation, as they are mostly involved in the social media platforms. Problems The problems and the challenges that are common for the security and privacy issues associated with social media are as follows: Password: The most vulnerable and sensitive issue in any type of social media application is the password. The hacker or intruders often hack into the account by getting the passwords of the users (Taylor, Fritsch Liederbach, 2014). These types of attacks are known as the Brute Force Attacks. These are extremely common in any social media. The hacker or the intruder applies a specific software that helps to retrieve the password of the user and thus the hacker can use the account. Unauthorized Access: This is another major privacy issue in any social media application (Joe Ramakrishnan, 2014). The authorized access to the account of a particular user is not only dangerous but also illegal according to law and regulations. Either this authorized access can occur by hacking that is by entering into someones account without his/her permission or this access can be of unauthorized physical access (Berns, 2017). It is absolutely illegal to access someone elses computer, laptop, tablet or mobile phones without his/her permission. Leakage of Personal Information: This is another significant threat in case of security and privacy for any social media application (Trainor et al., 2014). Nowadays, every personal photo, video, audio is posted and shared with the social media friends by all users. The social and the personal life are opened in front of everyone. However, not everyone present in the social media is safe (Criado, Sandoval-Almazan Gil-Garcia, 2013). The hacker or the intruder gets all the personal information or data as soon as the victim enables all his/her photos or videos online. Relevant Technologies The technologies play the most significant roles in social media application. Any application needs technology for running (Berthon et al., 2012). The most relevant technologies utilized for the social media are as follows: i) Internet: Internet is the most important resource that is needed for any activity related to social media. Any type of application can only work if the device is enabled with Internet connectivity (Oliveira Welch, 2013). Without the Internet connection, even the hacker cannot hack any profile or account. Therefore, the most relevant technology is the Internet for social media. ii) Any Type of Systems: Any type of application requires a system or device to run on it. The second most relevant technology is any system. The mobile phones, the computers, the laptops, the tablets all of them are considered as systems (Gil de Ziga, Jung Valenzuela, 2012). Social media applications can only run if any type of systems is present or involved with it. Without the presence of systems, it is impossible to access any social media site. Impact of the Security and Privacy Issues The security and the privacy issues that are associated with the social media have an extremely strong impact on the society, especially for the youth generation, as they are the main users of these applications (Criado, Sandoval-Almazan Gil-Garcia, 2013). This impact is absolutely negative in nature and causes massive problem for the society. The main impact that is caused is the isolation or lack of communication outside the virtual world. People are not communicating in their social life and thus there social life is affected as they are more involved in the virtual world. The second impact is the health issues. This is mostly for the youth generation (Fuchs, 2017). They are not having any outdoor activity and thus several health issues are striking them like obesity, eye sight problem and many more. These impacts are extremely vulnerable for any individual. Most Important Lesson I have learnt an important lesson from the above discussion. Social media is needed for all human beings as this helps in making new friends. I have learnt that making new friends is not a problem, however depending on them and the social media application is not feasible. Moreover, the security and the privacy issues can be extremely dangerous for any user; therefore one should be careful about them. I have got the lesson that one should not share their personal information, photos, videos and other personal stuffs with any online friend. This can help them to be safe and secure. The next lesson that I have got from this discussion is that passwords should be changed and modified periodically for avoiding any type of hacking and one should not allow strangers to access their computers, laptops, tablets and mobile phones at any cost. Conclusion Therefore, from the above report the conclusion can be made that, social media are computer based technologies, which help for creating and sharing any type of data or information or ideas through several communication networks that are present virtually. This social media has several features and aspects. The main feature is the interactive Web 2.0 applications. The users have to create account in the application and thus can communicate with the entire world. There are several types of social media platforms in the modern world. The most popular are the Facebook, Twitter, Instagram, WhatsApp and many more. Facebook has the largest number of users, which crosses over almost thirty billion in number. WhatsApp is the second most popular after Facebook. It came in the year 2009 and soon it gained popularity all over the world. In the year 2014, Facebook acquired WhatsApp for more profit. Currently, almost one billion users are using WhatsApp and it is the most significant popular messa ging and texting application. These social media applications are extremely popular for all the users and individuals especially for the youth generation. However, there are several security and privacy issues related to these social media platforms, which often turn out to be vulnerable for the society. The above report describes about the security and privacy issues that are related to the social media. These security issues should be resolved as they are affecting to the modern society massively. The report has given a detailed discussion on the challenges and problems on the security issues of social media. The report also provided a brief description on the relevant technologies that are needed for social media and the impact of these issues on the society. The final part of the report has described about the lessons learnt from the above discussion. References Berns, N. S. (2017).Framing the victim: Domestic violence, media, and social problems. Routledge. Berthon, P. R., Pitt, L. F., Plangger, K., Shapiro, D. (2012). Marketing meets Web 2.0, social media, and creative consumers: Implications for international marketing strategy.Business horizons,55(3), 261-271. Bertot, J. C., Jaeger, P. T., Hansen, D. (2012). The impact of polices on government social media usage: Issues, challenges, and recommendations.Government information quarterly,29(1), 30-40. Chen, B., Bryer, T. (2012). Investigating instructional strategies for using social media in formal and informal learning.The International Review of Research in Open and Distributed Learning,13(1), 87-104. Criado, J. I., Sandoval-Almazan, R., Gil-Garcia, J. R. (2013). Government innovation through social media.Government Information Quarterly,30(4), 319-326. Fuchs, C. (2017).Social media: A critical introduction. Sage. Gil de Ziga, H., Jung, N., Valenzuela, S. (2012). Social media use for news and individuals' social capital, civic engagement and political participation.Journal of Computer?Mediated Communication,17(3), 319-336. Gundecha, P., Liu, H. (2012). Mining social media: a brief introduction. InNew Directions in Informatics, Optimization, Logistics, and Production(pp. 1-17). Informs. Joe, M. M., Ramakrishnan, D. B. (2014). A survey of various security issues in online social networks.International Journal of Computer Networks and Applications,1(1), 11-14. Kavanaugh, A. L., Fox, E. A., Sheetz, S. D., Yang, S., Li, L. T., Shoemaker, D. J., ... Xie, L. (2012). Social media use by government: From the routine to the critical.Government Information Quarterly,29(4), 480-491. Oliveira, G. H. M., Welch, E. W. (2013). Social media use in local government: Linkage of technology, task, and organizational context.Government Information Quarterly,30(4), 397-405. Smith, M., Szongott, C., Henne, B., Von Voigt, G. (2012, June). Big data privacy issues in public social media. InDigital Ecosystems Technologies (DEST), 2012 6th IEEE International Conference on(pp. 1-6). IEEE. Taylor, R. W., Fritsch, E. J., Liederbach, J. (2014).Digital crime and digital terrorism. Prentice Hall Press. Trainor, K. J., Andzulis, J. M., Rapp, A., Agnihotri, R. (2014). Social media technology usage and customer relationship performance: A capabilities-based examination of social CRM.Journal of Business Research,67(6), 1201-1208.
Subscribe to:
Posts (Atom)