Wednesday, December 25, 2019

Morally Commendable Behavior Personal Statement - 1057 Words

The incident that I will be describing here makes me feel proud in that I performed in at least two morally commendable ways. Firstly, I persisted in working to exonerate an innocent man. Secondly, I saved the face of my superior and refrained from humiliating him even though he was in the wrong and I in the right. In both instance, I did something uncomfortable to myself because I thought it was the correct and upright thing to do. This is my story: I, Robert B. Brown, am a *corporal in Division *. Approximately, a * week ago, I was summoned by * a colleague, J., who wanted information on a new recruit, SPC Pegg. J. had signed up P. for the Transportation BN HHC Company Battle Training Assembly (BTA) on March 7th and 8th, but I failed to find orders for him in the system. Strangely enough, P. had received an U (unexcused) for BTA weekend, and Jensen wanted to know why this was the case, particularly since absence of orders showed that the recruit had not received the necessary orders commanding him to appear. J., therefore. spoke to C., his *superior, and we managed to dig up the orders which showed that they had only been produced on 8th March. P., was, actually, then, innocent since his orders had come out on the day that he was supposed to be on duty; he had received his orders too late. The unfortunate man, in the meantime, was on probation for felony and under house arrest, but J. informed me that Clevenger would obliterate the U pending his talk with theShow MoreRelatedPersonal, Professional, and Ethical Belief System Essay2920 Words   |  12 PagesPersonal and Professional Ethical Belief System Farah Nail University of Phoenix In the human services field, personal ethical belief systems combined with professional ethics work in partnership to guide human service professionals in unraveling ethical dilemmas. An increasing number of professionals and clients seek out to define the fundamental policies of the human services field. Humans develop an integration of values, standards, and beliefs from birth throughout life. The values, standardsRead MoreThe Failures Of The Enron Scandal Essay2042 Words   |  9 Pageswilling to overlook unethical behavior in lieu of profits. For example, Ken Lay, Enron’s Chairman, espoused the ideals that Enron had higher level of morals than the average company (Gibney, 2005). However, on several instances, he failed to enforce or show that level of commitment. In the Vahalla case, he allowed traders that were involved in manipulating and gambling the company’s earnings to continue their operations, despite being warned of their fraudulent behavior (Gibney, 20 05). His justificationRead MoreContemporary Ethical Theory Philosophers5014 Words   |  21 Pagesright? This, at any rate, is what Moore maintained, because he believed that the morally right act is the one that produces the greatest amount of good In an influential book, The Right and the Good (1930), W. D. Ross (1877–1970) defined his purpose as â€Å"to examine the nature, relations, and implications of three conceptions which appear to be fundamental in ethics—those of ‘right,’ ‘good’ in general, and ‘morally good.’† Moore, as we noted, believed that that which alone makes right actionsRead MoreMr. Snowden, Are You Justified? Essay1854 Words   |  8 PagesFor example, the first ethical issue raised is seen through Mr. Snowden sharing his exposure of classified information, privileged only to the National Security Agency, and its employees. Indeed, Mr. Snowden took it upon himself to divulge these personal known truths for all to acknowledge, which in short; enlightened all American citizens to what the National Security Agency was doing, â€Å"behind closed doors.† Thus, Mr. Snowden displayed genuine, upright conduct in relation to his concerns aboutRead MoreScrapbook Assignment3564 Words   |  15 Pages] and assembled, individually reviewed, compared, and discussed as a team. Furthermore, this team assignment is designated [Passive voice ] to debate and generate discussion among its members who individually and as a team evaluate and express personal opinions on a case- by- case ba sis. Finally, the assignment concludes by summarizing individual’s and team’s responses to each one [Wordiness: simplify by removing one] of the five steps involved. First, our [Use we, us, or our to meanRead More Comparing Themes in Charlotte and Ruth Hall Essay4461 Words   |  18 PagesRuth must fin for herself in order to survive; Charlotte does not survive! Does she not know how? With Charlotte, this question is relevant. She was young and accustomed to the care of others. Being alone in a new world was overwhelming to Charlotte morally. Yet, she ultimately chooses passion over principle, which is her ultimate flaw as a woman. This leads to a series of events ending in her death. Womanhood, especially in Susanna Rowson’s historical era, was something virtuous. However, Charlotte’sRead MoreTraining Need Analysis and Evaluation of Training Effectiveness13780 Words   |  56 Pagesprocess towards maturity and actualization of this potential capacities so that they become not only good employees but also both good men and women. S. P. Robbins: Defines â€Å"Training is a learning process which seeks a relatively permanent change in behavior that occurs as a result of experience. Dale Yoder: Defines â€Å"It is that deals with the effective control and use of manpower as a distinguished from other source of man power† Training is part of Human Resource Development. It is concerned withRead MoreProject Managment Case Studies214937 Words   |  860 Pagesidentified the need for three different stage-gate models: one for information systems, one for new products1 services provided, and one for bringing on board new corporate clients. There were several similarities among the three models. However, personal interests dictated the need for three methodologies, all based upon rigid policies and procedures. After a year of using three models, the company recognized it had a problem deciding how to assign the right project manager to the right project.

Tuesday, December 17, 2019

Preparing Professionally For A Visit - 1236 Words

Preparing Professionally for a Trip to Japan Visiting another country can be an eye-opening experience, but taking the time to research the culture before visiting can be somewhat eye-opening as well. Many of us do not understand that it is vital for a successful business trip to learn the ideals, traits, principles, and customs of another country’s culture, as they are often at times very different from our own. If a job required me to move to Japan for two years, it would be crucial for me to understand the five key dimensions of culture, which include context, individualism/collectivism, time orientation, power distance, and communication style, and research these dimensions in Japan’s culture in order to increase the odds of the business trip being a successful one. A culture’s context can basically be described as the background or environment, along with surrounding circumstances, in which professional communication takes place, and can be broken down in to two more specific categories known as low-context and high-context. â€Å"Low-context cultures tend to be logical, analytical, and action oriented† (Guffey, 2014, p.89). These types of cultures tend to prefer clear and concise information and do not consider looking at non-verbal cues, relationships, or the setting when communicating. High-context cultures are the complete opposite of low-context and focus more on â€Å"interpersonal relationships, nonverbal expression, physical setting, and social setting† (Guffey, 2014,Show MoreRelatedEducation Plan Essay1016 Words   |  5 Pagesof the CEO Program academies provide career exploration opportunities through a variety of strategies. These include discussions of students’ interests and the careers that align with those interests, visits from professionals in the community to discuss their careers and how they got there, and visits to different workplaces and community agencies. The Pre-ETS Academy for 9th and 1 0th graders is intentionally designed to provide students with the opportunity to explore a variety of careers in itsRead MoreDigital Curriculum Vs. 3d Printers977 Words   |  4 Pagesprovide opportunities for growth, both professionally and socially. Good leaders are concerned with staff satisfaction, as it is important to keep good staff members. Because staff members have to work together and coordinated, a good leader develops both a good leadership team and a team at the building level. People that work in schools work hard, and it is the school leadership that is responsible to get the staff members to work together. I have been preparing for a school leadership positionRead MoreQualiity Assurance Essay862 Words   |  4 Pagesthat we follow is the EYFS welfare requirements. The requirements are broken down into sections: * The learning and development requirements This details how we must work in partnership with parents and carers, promote the areas of learning preparing them for school. It ensures we support families that has English as an additional language and highlights the need for key workers. * Assessment This section describes how we, as practitioners, monitor how the children are progressing and inRead MoreWhat Are The Needs And Preferences For Further Professional Development Process1189 Words   |  5 Pagesassessment program, opening professional training courses, equipping classes with technology, develop and update administrative performances and levels. Ten of the administrators mentioned: There are many areas need to be improved, I believe that preparing workshops delivered from the high qualified professors and researchers. (Admin.6) Everybody can manage and administrate but accordingly. Therefore, the process of evaluation and assessment should be continually applied not from time to time or justRead MoreThe Mission Requires Training and Education but Most of All, Leadership915 Words   |  4 Pagesdelivers, and the convictions by which it abides. A number of positive attributes are found in the preparation of the Rakkasans. Steele personally led physical training with his men and started a unique psychological program for his soldiers. Through visits to mortuaries and ride along events in emergency response vehicles for medics, he ensured first encounters with battlefield trauma and death did not occur in combat. He even set up counseling opportunities for the unit to talk about killing in combatRead MoreHIV is an epidemic that still currently has no cure, however knowledge of the disease is much more1100 Words   |  5 Pagesdental setting, HIV can easily be detected and/or screened for using the highly sensitive and specific oral fluids test yet it is rarely done. Additionally, there are many oral manifestations of the disease, and the dentist is the health care professionally who is the first to see these lesions. It is the responsibility of the dentist to play an active role in detecting HIV in patients and to do so in a timely manner. It is important that dentists recognize the important role they play in managingRead MoreTraumatic Brain Injury1030 Words   |  5 Pagesgrowing segment of the mental health industry. The CDC claims that approximately 1.4 million Americans suffer TBIs annually (Centers for Disease Control Injury Center May 30, 2007 Traumatic Brain Injury in the United States: Emergency Department Visits, Hospitalizations, and Deaths) and it has been called the â€Å"signature injury† of the current wars in Iraq Afghanistan by the National Alliance on Mental Illness. As such, it is my belief that we need to focus time and energy on developing new programsRead MoreSchool Profile : Crown College Essay1023 Words   |  5 PagesSchool Profile: Crown College Crown College started in 1916 as a humble educational institution that was focused on preparing spiritual students to serve and influence the country and world. Crown College is Christian-based, so the campus is alive with religious prayers, services, ministries and supportive program. Crown College maintains membership through the Council of Christian Colleges and Universities (CCCU), which includes more than 100 accredited educational institutions offer ChristianRead MoreWhat Does The Social Worker Do? 989 Words   |  4 Pageswith services, resources and opportunities, which provide them with the help they need. There are various steps Social Workers must do before performing any cases or looking for any solutions for a client. A Social Worker would look at the first visit to the clinic that the client has visited, which client have given them and information of their history which includes family background, social history, developmental history, and history of the peculiar difficulty. This way, they can suggest whatRead MoreMy Reflection On My Life At Bangladesh Fueled Passion Of Public Health1533 Words   |  7 PagesMy 2012 trip to Bangladesh fueled my passion in public health. It was extremely eye opening to all the health inequalities that humans suffer throughout the world. During my visit, I reconnected with my uncle, who was born blind. His acceptance of adversity with remarkable stoicism amazes me and as my first time seeing him as an adult, I realized how unprepared I was to help him. By admitting to my lack of knowledge to a life so different than mine, I asked him a series of q uestions to obtain a better

Monday, December 9, 2019

Neonatal Nursing free essay sample

Without neonatal care millions of pre-term infants would not have a fighting chance. Although the schooling and training to become a neonatal nurse can be extensive, it doesn’t have to be. Due to the need for neonatal clinicians many people would choose it for the chance to save an infant’s life, the income or because they just simply want to help. First, the job of a neonatal nurse is extremely important to a pre-term baby’s life. There are many problems that can be wrong with a pre-term baby. According to CFNC. com â€Å"A neonatal nurse may take care of a baby with multiple problems including drug-addicted babies and premature babies†. There are other factors putting a baby in the NICU for neonatal nurses to care for, such as HIV-positive babies and babies born with respiratory distress. They may also care for babies who are weak and fragile or need 24-hour nursing. We will write a custom essay sample on Neonatal Nursing or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Neonatal nurses have to monitor the babies closely and give special care immediately after birth. Neonatal nurses may also attend deliveries. Found on Payscale. com â€Å"Some nurses attend all deliveries and assist as well by hooking up laboring patients to monitors, starting IV’s, assisting with getting patients ready for C-sections, and assisting with general patient care. They may need to manage ventilators, evaluate vital signs, draw blood, and maintain IV lines. All of these tasks are important for a healthy delivery. All in all a neonatal nurses care is essential to the life of a pre-term baby. Second, there are multiple reasons why a baby would need to be put into the Neonatal Intensive Care Unit. The NICU is a special care unit for pre-term and sick babies. There are maternal factors, delivery factors, and baby factors that would put a baby in the NICU. Some of the maternal factors are ages younger than sixteen years old, older than 40 years, multiple pregnancies, or too little or too much amniotic fluid. The delivery factors are â€Å"fetal distress, nuchal cord† (lpch. org). A nuchal cord is when the umbilical cord is wrapped around the baby’s neck when they are born. This could be fatal to a baby’s life if a doctor cannot cut the cord without hurting the baby. The baby factors that may put them in a NICU are â€Å"less than 37 weeks or over 42 weeks† ( lpch. org). Other factors that may put babies in the NICU are less than five pounds eight ounces or over eight pounds eleven ounces, infection, hypoglycemia, and the need for extra oxygen. The mother could prevent some of these factors from occurring with making sure she takes care of herself while she is pregnant. In conclusion, there are many different factors that could put a baby into the Neonatal Intensive Care Unit, thankfully there are many neonatal nurses to help care for the pre-term babies in need. Third, there are three different levels of nurseries for different needs of pre-term babies. In addition, the fourth level is preparing them for discharge. Level one takes care of babies with the problems of â€Å"continuous monitoring for heart rate or breathing, additional oxygen, tube feeding, recovery† (bliss. org). Level one is not for babies who need continuous care for an extensive amount of time. Level one is only for babies who need care for a short amount of time such as a month or less. Level two of the nurseries takes care of babies with more needs or more difficulties â€Å"short term care, apnoeic attacks, continuous airway pressure, and receiving parental nutrition† (bliss. org). The babies in level two of the neonatal intensive care unit need more care than level one but less than level three. This unit specializes in keeping babies that need less help for an elongated amount of time. Now finally, level three takes care of babies that need a lot of attention and care such as â€Å"ventilation, weight is less than 1,000 grams, age is less than 28 weeks in the mother’s stomach, and surgery (bliss. org). This level is the most important, it can be the stage of life and death for a pre-term baby. This level keeps babies for a very extensive amount of time such as one month to as long as a year depending on the condition of the baby. The fourth level or the transitional level means the baby still needs care but is almost ready to go home. But most importantly the mother can now become the main care with support from a nursery nurse or other nursing staff in the fourth unit. All in all the three levels of nurseries give neonatal nurses the option in which level to work in and the fourth is helpful for mothers to learn about the care and needs of their pre-term babies. Fourth, neonatal nurses do not need much schooling. However, they can make it longer, achieve a higher degree, and ultimately increase their income. The first step to becoming a neonatal nurse after high school is becoming a RN or Registered Nurse that could take from two years to three years depending on the school a nurse would choose to attend. If they want to increase their degree, they would become a RN with a BSN, Bachelors in Nursing, which might take four to five years of schooling which again depends on the school they plan to attend and knowledge of the career. If they still are interested in an even higher degree, they would want to become an Advanced Practice Nurse that may take six or more years to complete which as always will depend on the years of schooling and the school they choose to attend. Most employers require a Bachelor of Science in nursing to work for them, but others only ask for two to three years of schooling. According to the Education Portal â€Å"students must also complete courses in math, science, statistics, microbiology, anatomy, and physiology. † The more schooling someone participates in the more income and better job they will acquire. Taking advanced classes will also increase the chances of a superior job. Also according to the Education Portal, â€Å"the U. S. Bureau of Labor, all of the states require graduation from a NLNAC-accredited program to become a licensed nurse. † In addition to the classes required a student would as well have to graduate from a NLNAC-accredited program. Since it is required it would be tough to also seize advanced classes. In conclusion, neonatal nurses have multiple options with how many years of schooling they take, but going to school longer will make neonatal nursing an improved career. Fifth, neonatal nurses have a high income. The income for neonatal nurses differs throughout the United States. According to Work. Chron. com â€Å"location is a key factor influencing salary for neonatal nurses. † For example, in California the median salary someone may make is around $105,000. That is the highest amount in the United States for averages. In Delaware, however, a neonatal nurse could make as high as $123,000 or as little as $88,451. Found on Indeed. com, â€Å"The average for the United States comes out to be $95,000-$106,000. † However, neonatal nurses can make more income depending on their time spent in school. The longer a nurse attends college and the higher degrees they achieve and obtain the more income they will make. In conclusion, neonatal nurses have the option of getting more income or less depending on their schooling, knowledge in the career of nursing, and location in which they are working out of. All in all the job of a neonatal nurse is very demanding and difficult in the Neonatal Intensive Care Unit for the nurse and also the patients admitted into it. Although the job is difficult with all the schooling it can also be a high income job and a great job for nurses who love to works with babies in need.

Sunday, December 1, 2019

The Catcher in the Rye A Bridge from Essay Example For Students

The Catcher in the Rye: A Bridge from Essay Innocence to AdulthoodAdolescence is a time of existence in two worlds. One world having the desire to be in the adult world,which is filled with all the unknown wonders of the world. The other world is the world of childhood which iscomfortable and protected from all the impurities in theworld. This sort of tug of war between the two worlds isnot only mentally imposed on a being, but physically,socially, and morally as well. With all the mentionedabove, often times an adult will discourage an action ofan adolescent by saying they are too old to a act acertain way, and then will turn around and say they aretoo young to do something, like go out late or go ondates. These contradictions can lead an adolescent tocomplete uncertainty of their actions. J.B. Salingersbook, The Catcher in the Rye, aptly describes the immenseconfusion of the in between stages of being a boy and aman. We will write a custom essay on The Catcher in the Rye: A Bridge from specifically for you for only $16.38 $13.9/page Order now Throughout the whole story, the narrator, Holdentries to act both the boy and thw man but cannot. Hetries in vain to get a grip on the adult world, but neveris quite successful. Holdens first attempt at adulthoodis exemplified when he leaves his school withoutpermission from his parents or the school. This act initself sets the stage for his trial and error attitudeabout adulthood in the sense he failed out of school,which was a childish act. He tries to rectify his failingout of school by leaving, which he views as an adult act. Holdens leaving school represents his need forindependence and he achieves this by leaving. Another of Holdens failed attempts at adulthood iswhen he goes down to he hotels club where he orders analcoholic drink, but he is refused because the waiter willnot serve him because he is underage. Holden tries togive the illusion that he is older because when he ordersthe drink, he Orders it fast as possible, because if youhem and haw they think you are under 21 an d wont sell youintoxicating liquor. This is the classic example ofadolescence when one attempts to act older than his or herage when attempting to obtain alcohol. Up until the ageof 21, all young adults want to give the illusion they areolder than they are in hopes of obtaining special adultprivileges, such as drinking alcohol, smoking, etc. However Holdens failed attempts forces him to realizethat his act is fooling no one other than himself. Suchan example can be seen when one goes to college bars andcan see all the adults that are hanging out there. Thepeople who are there are not fooling anyone as well. Sex is often the most complicated adult subjects,even for adults to understand themselves. The act of sexitself can be talked about immensely, as done in lockerrooms or with friends, almost to the point where one couldbelieve in the tales. However the act itself cannot befaked and innocence of such things are quite apparent whenthe situations do arise. The saying one can talk thetalk, but cannot walk the walk describes this sort ofsituation perfectly. Holdens first experience with awoman who he has heard about from a friend, emphasizes hisinexperience. He called this woman because he heard fromhis friend that she Was not a whore, but she did not minddoing it once in a while. He tries to cover up hisinnocence by faking a deep voice and pretending that hewas from Princeton. However she sees through his facade,and lets him down. Another attempt into the adult world,or what Holden considers to be the adult world, has beenthwarted. His failure is due in part to the fact thatHolden does no t really know the rules, which he isguessing at, and also in part because his loneliness isnot a substitute for experience. Although this act is notchildlike alone, but rather it is a stepping stone intothe adult world of sex, where an individual will try newtechniques, such as pickup lines and such, to obtain andreach his or her goal. Thus Holden has learned hisfirst valuable lesson of what not to do in the future. .u017f8f884b94b732215b60d746e40743 , .u017f8f884b94b732215b60d746e40743 .postImageUrl , .u017f8f884b94b732215b60d746e40743 .centered-text-area { min-height: 80px; position: relative; } .u017f8f884b94b732215b60d746e40743 , .u017f8f884b94b732215b60d746e40743:hover , .u017f8f884b94b732215b60d746e40743:visited , .u017f8f884b94b732215b60d746e40743:active { border:0!important; } .u017f8f884b94b732215b60d746e40743 .clearfix:after { content: ""; display: table; clear: both; } .u017f8f884b94b732215b60d746e40743 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u017f8f884b94b732215b60d746e40743:active , .u017f8f884b94b732215b60d746e40743:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u017f8f884b94b732215b60d746e40743 .centered-text-area { width: 100%; position: relative ; } .u017f8f884b94b732215b60d746e40743 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u017f8f884b94b732215b60d746e40743 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u017f8f884b94b732215b60d746e40743 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u017f8f884b94b732215b60d746e40743:hover .ctaButton { background-color: #34495E!important; } .u017f8f884b94b732215b60d746e40743 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u017f8f884b94b732215b60d746e40743 .u017f8f884b94b732215b60d746e40743-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u017f8f884b94b732215b60d746e40743:after { content: ""; display: block; clear: both; } READ: Challenges in Highway Road Construction in Nigeria EssayHowever Holden is over his head when he agrees tohave a prostitute, who is propositioned to him by thebellhop. He is apparently nervous and he confesses thathe is a virgin. His reasoning for having the prostituteis that it is Good to get some practice just in case Iget married. He also tells of how in the past he hadalmost gone all the way, but at the last moment herecoiled. This indicates how immature he is and how he isnot ready for a sexual relationship, primarily because heis doing it for the sake of doing it and not for love, andalso the fact he shys away from sex is a definiteindication he is not ready for it. O nce the prostitutecome over, he again shys away and tells her to leave. Once again, with these examples in mind, Holden emphasizeshow he is not ready for the grown up world of sex, despitewhat his body is telling him. The girls that Holden refers to quite a bit are Sallyand Jane, who together represent what he desires in arelationship . Jane, although she was a girlfriend fromwhen he was younger, represents the caring andunderstanding part in a relationship, the mature part, inthe sense that Holden in genuinely concerned for hernature. Sally, a girl friend who is considered an adultrelationship, represents what he wants in an adultrelationship, such as sex and marriage. Holden tries toseduce Sally and they make out in the cab. Again he putsthe cart before the horse, and asks her to marry him, eventhough he Did not like her that much. He wants theadult relationship of being married, but has the childlikeidea of not doing it for the sake of love, because he didnot love her, although he told her he did. FortunatelySally said she would rather wait, not getting swept up bythe excitement of Holdens immaturity. After Holden asksher to marry him, he realizes how stupid his actions were,and that he did not love her, which indicates that Holdenis learning something from his mistakes, and in turnbecoming mature. As seen through Holdens failing at becoming aninstant adult, it is quite apparent that he is not donebeing a child. It is exemplified when he tries to actlike an adult, but acting is all he is doing. Behindevery one of his adult actions, there is a childish oneto follow suit, and it is clear that his mature act isfooling no one, i.e., the bartender, the girl he called,the prostitute. Yet like a glutton for punishment, hestarts over again only to end up disappointed. However the only time it seems that Holden iscomfortable and secure is when he refers to a childlikestate or when he talks about children, in particular hissister Phoebe. Phoebe, who is ten, is the only person whohe thinks that truly understands him. Yet when he tellsher that he failed out of school, she does not does notshow any compassion, but rather show him anger and sheputs the pillow over her head and refuses to listen tohim. This is important because it emphasizes how Holdensadolescent age can no longer rely on the advice andunderstanding of a child, yet he cannot rely on adultsadvice, although he pretends to be one. The importance of childhood in Holdens life is seenagain when he starts talking to a little girl at the park,who he also helps put on her ice skates. He shows no fearor false nature when he is with her, and he shows his easewith her when he states that he Loves it when kids arenice and polite when you tighten their skates for them orsomething. Most kids are. They really are. Unlike whenhe is with women or in bars, Holden is uninhibited withchildren and does not put on false faces with them. Thefact he finds them genuinely polite shows how he feels howhe can put his full trust with them, and explains why hereturns to children or a childlike state, because they arereal, whereas adults are about putting on aires. The idea that children are real beings is seenagain when Phoebe asks Holden what he wants to do with hislife, and he replies he would want to be a catcher in therye, where he would catch all children who got too closeto the cliffs edge. He wants to be a catcher of childrenbecause they love more easily than adults do, and they donot play games when giving love, as adults do. .u9d885bc3697fa49884684dd53f356103 , .u9d885bc3697fa49884684dd53f356103 .postImageUrl , .u9d885bc3697fa49884684dd53f356103 .centered-text-area { min-height: 80px; position: relative; } .u9d885bc3697fa49884684dd53f356103 , .u9d885bc3697fa49884684dd53f356103:hover , .u9d885bc3697fa49884684dd53f356103:visited , .u9d885bc3697fa49884684dd53f356103:active { border:0!important; } .u9d885bc3697fa49884684dd53f356103 .clearfix:after { content: ""; display: table; clear: both; } .u9d885bc3697fa49884684dd53f356103 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u9d885bc3697fa49884684dd53f356103:active , .u9d885bc3697fa49884684dd53f356103:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u9d885bc3697fa49884684dd53f356103 .centered-text-area { width: 100%; position: relative ; } .u9d885bc3697fa49884684dd53f356103 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u9d885bc3697fa49884684dd53f356103 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u9d885bc3697fa49884684dd53f356103 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u9d885bc3697fa49884684dd53f356103:hover .ctaButton { background-color: #34495E!important; } .u9d885bc3697fa49884684dd53f356103 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u9d885bc3697fa49884684dd53f356103 .u9d885bc3697fa49884684dd53f356103-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u9d885bc3697fa49884684dd53f356103:after { content: ""; display: block; clear: both; } READ: Why we dropped the Atomic Bomb EssayHoldens most obvious example his regression tochildhood is seen when he returns back to his home. Whenhe left school and decided to stay at hotels, opposed toreturning to home, and he did so with the intent ofshowing himself, as well as his parents, how he couldrebel against the forces that tie him to childhood. Staying away from home was his big test of not onlyhimself, but to the world. Yet despite his brave bravefacade, the real reason he does not return home is becausehe is overcome by guilt and shame over his expulsion fromschool. Proving he cannot handle the adult world, hereturns home. Unbeknownst to Holden, his parents are not ho me whenhe arrives, but they arrive shortly later. As he leaves,he takes no precautions about running into his parents,and by doing this it seems that he almost wants to becaught. This is symbolic because he then comes to termswith his immaturity and the only thing that would pull himback into his comfortable and safe child world is hisparents. When he blatantly smokes in the house and is notcareful when he leaves, he is almost crying out for helpand attention. Before Holden returned to his home, he is at the pondnear Central Park, and he is thinking about dying and israther nonchalant about the fact he might die. WhenHolden visits Mr. Antonlelli, he is again reminded of hisimmaturity and is faced with it when Mr. Antonelli repeatsa poem that seems to describes Holdens whole nature, thatThe immature man is one who wants to die nobly for acause, and the mature man is one who wants to live forone. With this in mind, Holdens immaturity is brought tohis face, and despite his act, he realizes he is still achild. In the end, Holden returns home, and in a sense heis beaten by the system and beaten at his own game. Throughout the story Holden refers to himself asStupid or Crazy after many failed attempts into theadult world. What he fails to realize is that he isniether stupid or crazy, but rather he is naive andinnocent to the workings of the world, and through hisfailures he begins to realize this fact. The only thinghe is guilty of is trying too hard an getting disappointedto easily because of his failures due to his inexperiencein life. What he also does not realize is that there isno imaginary line that says child on one side and adult onthe other. Rather there is a stairway towards adulthood,and unlike the imaginary line which is crossedeffortlessly, the stairway requires some effort and workto achieve towards the top, which in this case isadulthood. Holden attempts to cross the line versus goingup the stairs, and as a result he realized that there isno easy path into adulthood, that it is a trial and errorperiod, where you have to learn from your mistakes and notget hung up on them. Hold ens failures are actually partof the steps toward adulthood, steps that are critical andhelp him understand the adult world and how it reallyworks. Salinger accurately represents the difficult bridgebetween a child and an adult, and emphasizes that anindividual at this age cannot pretend to be an adult norcan they regress back into the security of childhood. Salinger also emphasizes that one must take this ride,despite the twists and turns that come with it because itis critical for survival as an adult. It is emphasizedthat there is no given amount of steps toward adulthoodand it is different for each individual, but that theexperiences encountered, both good and bad, mold theindividual and shape them for the differences to come. Inclosing it is apparent that there is no easy way intoadulthood, but it is accurate to say that the experiencesof the child are the mold for the adult.

Tuesday, November 26, 2019

Litmus Paper and the Litmus Test

Litmus Paper and the Litmus Test You can make paper test strips to determine the pH of an aqueous solution by treating filter paper with any of the common pH indicators. One of the first indicators used for this purpose was litmus. Litmus paper is paper that has been treated with a specific indicator- a mixture of 10-15 natural dyes obtained from lichens (mainly Roccella tinctoria) that turns red in response to acidic conditions (pH 7). When the pH is neutral (pH 7) then the dye is purple. History The first known use of litmus was around 1300 CE by Spanish alchemist Arnaldus de Villa Nova. The blue dye has been extracted from lichens since the 16th century. The word litmus comes from the old Norse word for to dye or color. While all litmus paper acts as pH paper, the opposite is not true. Its incorrect to refer to all pH paper as litmus paper. Fast Facts: Litmus Paper Litmus paper is a type of pH paper made by treating paper with natural dyes from lichens.The litmus test is performed by placing a small drop of sample onto the colored paper.Usually, litmus paper is either red or blue. Red paper turns blue when the pH is alkaline, while blue paper turns red when the pH turns acidic.While litmus paper is most often used to test the pH of liquids, it can be used to test gases if the paper is dampened with distilled water before exposure to the gas. Litmus Test To perform the test, place a drop of liquid sample on a small strip of paper or dip a piece of litmus paper in a small specimen of the sample. Ideally, you dont dip litmus paper in an entire container of a chemical; the dye could contaminate a potentially valuable sample. The litmus test is a quick method of determining whether a liquid or gaseous solution is acidic or basic (alkaline.) The test can be performed using litmus paper or an aqueous solution containing litmus dye. Initially, litmus paper is either red or blue. The blue paper changes to red, indicating acidity somewhere between the pH range of 4.5 to 8.3. (Note, however, that 8.3 is alkaline.)  Red litmus paper can indicate alkalinity with a change to blue. In general, litmus paper is red below a pH of 4.5 and blue above a pH of 8.3. If the paper turns purple, this indicates the pH is near neutral. Red paper that does not change color indicates the sample is an acid. Blue paper that does not change color indicates the sample is a base. Remember, acids and bases refer only to aqueous (water-based) solutions, so pH paper wont change color in non-aqueous liquids, such as vegetable oil. Litmus paper may be dampened with distilled water to give a color change for a gaseous sample. Gases change the color of the entire litmus strip since the whole surface is exposed. Neutral gases, such as oxygen and nitrogen, do not change the color of the pH paper. Litmus paper that has changed from red to blue can be reused as blue litmus paper. Paper that has changed from blue to red can be reused as red litmus paper. Limitations The litmus test is quick and simple, but it suffers a few limitations. First, its not an accurate indicator of pH. It does not yield a numerical pH value. Instead, it roughly indicates whether a sample is an acid or a base. Second, the paper can change colors for other reasons besides an acid-base reaction. For example, blue litmus paper turns white in chlorine gas. This color change is due to bleaching of the dye from hypochlorite ions, not acidity/basicity. Alternatives to Litmus Paper Litmus paper is handy as a general acid-base indicator, but you can get much more specific results if you use an indicator that has a more narrow test range or that offers a wider color range. Red cabbage juice, for example, changes color in response to pH all the way from red (pH 2) through blue at neutral pH to greenish-yellow at pH 12, plus you are more likely to find cabbage at the local grocery store than lichen. The dyes orcein  and azolitmin yield results comparable to those of litmus paper.

Saturday, November 23, 2019

Canadian T3 Tax Slips for Trust and Mutual Funds Income

Canadian T3 Tax Slips for Trust and Mutual Funds Income A Canadian T3 tax slip, or Statement of Trust Income Allocations and Designations, is prepared and issued by financial administrators and trustees to tell you and the Canada Revenue Agency (CRA) how much income you received from investment in mutual funds in non-registered accounts, from business income trusts or income from an estate for a given tax year. Quebec residents receive the equivalent Relevà © 16 or R16 tax slip. Deadline for T3 Tax Slips Unlike most other tax slips, T3 tax slips do not have to be mailed until the last day of March the year after the calendar year to which the T3 tax slips apply. Sample T3 Tax Slip Canadian Tax Form T3 2018.   Canadian Revenue Agency The Canadian government creates a new T3 each year, so be sure your advisor downloads the most recent form. That site includes a standard pdf version of the form that the financial administrator of your trustee can print and fill out; and an electronic version that allows him or her to fill it out online. The sample T3 tax slip  from the CRA above is from the 2018 tax year and shows you what to expect. The information required for this form includes your recipient identification number (social insurance number or business number), the cash amount of income from dividends you will need to report, capital gains, capital gains which are eligible for a deduction, and any other income. Most of that will come from your relevant financial administrator per trust or mutual fund. See the second page of the downloaded PDF form for more information on what is included in each box. Filing T3 Tax Slips With Your Income Tax Return When you file a paper income tax return, include copies of each of the T3 tax slips you receive. If you file your income tax return using NETFILE or EFILE, keep copies of your T3 tax slips with your records for six years in case the CRA asks to see them. If you decide to file your T3 slips online, you can use either Internet file transfer (XML) or web forms. Details on that process are available on the Canadian Revenue Agency website, Filing Information Returns Electronically. Missing T3 Tax Slips If you have trust or mutual funds income and havent received a T3 tax slip as you reach the CRA filing date, get in touch with the relevant financial administrator or trustee. If necessary, file your income tax return by the deadline anyway to avoid penalties for filing your income taxes late. Calculate the income and any related deductions and credits as closely as you can using any information you have. Include a note with the name and address of the financial administrator or trustee, the type and amount of trust or mutual funds income and related deductions, and what you have done to get a copy of the missing T3 tax slip. Include copies of any statements you used in calculating the income and deductions for the missing T3 tax slip. Other Tax Information Slips Other tax information slips include: T4 - Statement of Remuneration PaidT4A - Statement of Pension, Retirement, Annuity, and Other IncomeT4A(OAS) - Statement of Old Age SecurityT4A(P) - Statement of Canada Pension Plan BenefitsT4E - Statement of Employment Insurance and Other BenefitsT4RSP - Statement of RRSP IncomeT5 - Statement of Investment Income

Thursday, November 21, 2019

Addiction Essay Example | Topics and Well Written Essays - 1250 words

Addiction - Essay Example It is not easy to understand what causes addictions or how an addiction develops in a person. Although one can be addicted to almost anything (including pleasant and harmless things), being addicted to harmful substances, particularly alcohol and illegal drugs, is more than a social problem. As the National Institute on Drug Abuse explains, â€Å"One very common belief is that drug abusers should be able to just stop taking drugs if they are only willing to change their behavior. What people often underestimate is the complexity of drug addiction—that it is a disease that impacts the brain and because of that, stopping drug abuse is not simply a matter of willpower†. The causes and components of addiction are very complex and although many studies have been done throughout the years, there is still not a clear answer to the causes of addiction. It has always been thought that any of the following could contribute to addiction– lack of will power, poverty, moral weakness, mental illness, genetics, family socialization, anti-social personalities and societal problems. It was also believed that addiction is a disease; but again there has not been enough evidence to confirm that. Causes of addiction can be classified as either mental or physical. The physical causes may be genetic and the mental causes include such things as personality and thinking characteristics, emotional defenses and social influences. According to Wojtowicz et al (2007), some of the causes of addiction to be studied have included social and environmental factors; interactions between biological, psychological and social factors, misuse of prescription medication; and it may be a brain disease. Some of the social factors that may be responsible for addictions are antisocial behavior, crime patterns and criminal choices, intolerance of boredom, family history of drug use, social interactions and peer influence and

Tuesday, November 19, 2019

Aviation History in Qatar Research Paper Example | Topics and Well Written Essays - 2000 words

Aviation History in Qatar - Research Paper Example Currently, Qatar Airways has shown flying colors in the aviation industry and it is competing equally with the other well established airline companies. Skytrax has given Qatar Airways a five–star rating, which is also possessed by airline companies like Kingfisher Airlines, Singapore Airlines, Hainan Airlines, Asiana Airlines, Cathay Pacific and Malaysia Airlines. The headquarters of Qatar Airways is in Doha. Qatar Airways link almost hundred international destinations from its base place at Doha, using a fleet of ninety six aircrafts. During 2010, Qatar Airways has launched nine new destinations like Tokyo, Sau Paulo, Phuket, Nice, Hanoi, Copenhagen, Ankara, Barcelona, Buenos Aires, Bangalore. In the pipeline, were other destinations like Aleppo, Bucharest, Budapest, Brussels, Oslo, Montreal and Stuttgart. (Projects Middle East. (Oct. 2008). 2. Qatar Airways Qatar Airways has provided a very suitable environment for the Middle East business aviation market to flourish. Ali A l Naqbi, who is the founding chairman of the Middle East Business Aviation Association, has given extra importance to Qatar’s strategic importance to the charter jet market. Ali Al Naqbi majorly focused on the growth potential of Qatar so as to capitalize on it in order to bring about a huge development in the international aviation market. He predicted that by the year 2012, there will be a massive growth in the Middle East aviation sector where its worth will be near to one dollar billion and the yearly growth rate will be by fifteen to twenty percent. Ali Al Naqbi was very optimistic about his view and prediction as the growth in the aviation market was new in the region. He believed that a new era will begin with the growth and progress of the aviation business entity. The aviation business has covered almost forty percent of the Middle East aerospace market within about four years. Ali Al Naqbi believed that the significant gains from the aviation market will attract Qat ar to join his founding organization, that is, Middle East Business Aviation Association, and serve them for further betterment in the future. But being excited on one side, he was also quite aware of the global financial crisis. He knew it very well that one day or the other, in some way, the growth in the aviation sector will be hampered due to a fall in the global financial sector. (Qatar Airways, 2010) Qatar has its own well flourished natural gas industry which acts as a catalyst to spur interest in the aviation market in order to bring in more demand. Moreover, Ali Al Naqbi reiterated that Qatar has a lot to contribute in the expansion of the aviation sector and this has encouraged the local companies to a huge extent to join the Middle East Business Aviation Association. (Qatar Airways, 2010) The services of Qatar Airways have expanded its service to Africa, Europe, Central Asia, Middle East, North America and South America. It is one of the fastest growing industries of airl ines in the world. The industry consisted of fifteen thousand employees among which ten thousand employees work for the industry directly and the other five thousand employees work in the industry subsidiaries. (Qatar Airways, 2010) Qatar Airways have tried to serve all sort of satisfaction to its passengers, thereby making every ride for the passengers very comfortable. Those who want to travel in the A330 and

Sunday, November 17, 2019

The Role Of Security Management Essay Example for Free

The Role Of Security Management Essay ABSTRACT Personal information security is usually considered a technical discipline with much attention being focused on topics such as encryption, hacking, break-ins, and credit card theft. Security products such as anti-virus programs and personal firewall software, are now available for end-users to install on their computers to protect against threats endemic to networked computers. The behavioral aspects related to maintaining enterprise security have received little attention from researchers and practitioners. Using Q-sort analysis, this thesis used students as end-users in a graduate business management security course to investigate issues affecting selection of personal firewall software in organizations. Based on the Q-sort analysis of end-users in relation to seven variables identified from review of the information security literature, three distinct group characteristics emerged. Similarities and differences between groups are investigated and implications of these results to IT managers, vendors of security software and researchers in information security area are discussed. ACKNOWLEDGEMENTS I would like to thank my supervisor Professor ____________ for his great supervision and guidance throughout the duration of my thesis project. I would also like to thank all colleagues for their help and support. Finally, I wish to thank my family for their continued support throughout the thesis. TABLE OF CONTENTS Page ABSTRACT†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦2 ACKNOWLEDGEMENTS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.3 TABLE OF CONTENTS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..4 LIST OF ACRONYMS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.5 CHAPTER 1 – INTRODUCTION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦6 †¢ Statement of the Problem†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦7 †¢ Research Question†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦8 †¢ Significance of the Research†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦9 †¢ Design and Methodology†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.10 Q-Sort Analysis†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.12 †¢ Organization of the Study†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦14 CHAPTER 2- LITERATURE REVIEW†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦14 CHAPTER 3 – RESEARCH QUESTION FINDINGS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.18 Data Analysis†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..18 -Analysis of Results†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦26 -Limitations of the Study†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..29 Chapter 4- SUMMARY AND CONCLUSIONS Summary†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦30 Conclusion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.31 Recommendation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..33 REFERENCES†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..34 LIST OF ACRONYMS Operational definition of these variables as it relates to the study are provided: Performance [PERF] : Refers to how well the software operates under various conditions (such as high traffic, types of data, port scans, etc.) Ease-of-use [EOU]: Refers to usability of the product (such as screen design and layout, access to features using tabs, buttons, etc.) Updates [UPDTS]: Refers to product updates at regular intervals after product has been installed and used Features [FEATR] : Refers to the number of program options and features available in software Reports [RPORT]: Refers to Intrusion Reports and log files generated by the firewall software Cost [COST]: Refers to price paid for the product (either as shrink wrapped package or as a download) Configuration [CONFIG]: Refers to setup and configuration after product has been installed Support [SUPPRT]: Refers to availability of online help and technical support either by phone or e-mail Installation [INSTLL]: Refers to initial installation of the product. Chapter 1 – INTRODUCTION Security describes a process of protection from any harm. It also describes the countermeasures put in place by that process. Harm may indicate a loss of confidentiality, integrity, and availability. Security management focuses on preventing harm resulting from both random acts of nature and intentional strategic actions (Schechter, 2004). Security is considered to be a very important issue while developing complex personal information systems (Mouratidis et al., 2002). Security is a major concern in todays digital era. The Internet offers a low cost, but insecure means of reaching people. Owing to the ubiquity of the Internet, it is difficult to control and trace intrusions or attacks by unauthorized people, hackers, etc. Electronic commerce applications need secure mechanisms for accurate user identification, accessing sensitive database, storing and transmitting sensitive information, etc. Personal identification numbers (PINs), passwords, smart cards and digital certificates are some of the means normally used for this purpose. However, these means do not really identify a person, but only knowledge of some data or belonging of some determined object (Sanchez-Reillo et al., 1999), e.g. public key infrastructure (PKI) cannot assure identity of the maker of a transaction, it can only identify the makers computer. An imposter can easily masquerade as a legitimate user and defraud the system. Information must be readily available in organizations for making decisions to support the organizational mission. Murphy, Boren, and Schlarman (2000) state that due to increased connectivity and the urgency to exchange information and data among partners, suppliers, and customers on a real time basis, the need to protect and secure computer resources is greater than ever. As a result, this has created the possibility of exposing sensitive corporate information to competitors as well as hackers who can now access organizational computer resources from remote sites. Statement of the Problem The potential loss of such information to an organization goes beyond financial losses and includes the possibility of corrupted data, denial of services to suppliers, business partners and customers, loss of customer confidence, and lost sales. Security in business processes (i.e., maintaining proper authentication, authorization, non-repudiation, and privacy) is critical to successful e-business operations. Enabling business functions over the Internet has been recognized as a major component for the success of businesses and, by mitigating risks in a cost-effective manner, security is now being viewed as a component of business operations (Deise, Nowikow, King, Wright, 2000). Decisions about information systems made by managers are vital to the success, and even survival, of a firm (Enns, Huff, Golden, 2003). Despite increased security threats, organizations have traditionally allocated very little of the total IT budget to information security. Forrester Research estimates that in Fortune 500 companies, the average amount of money as a percent of revenue that is spent on IT security is 0.0025 percent or slightly less than what they spend on coffee (Clarke, 2002). Organizations must evaluate and prioritize the optimum mix of products and services to be deployed for protecting confidentiality (maintaining privacy of information), integrity (maintaining information is not altered in transit), and availability (maintaining access to information and resources) of corporate assets. The decision to deploy certain technology is based on variables such as the organizational business model, level of risk, vulnerability, cost, and return on investment (Highland, 1993). There are several ways in which information can be protected. One method to safeguard information is by using controls. The concept of controls can be applied to financial auditing as well as technical computer security. General controls include personnel, physical and organizational controls as well as technical security services and mechanisms (Summers, 1997). Computer security controls can be hardware or software-based and may include biometric devices, anti-virus software, smart cards, firewalls, and intrusion detection systems that can be used to build the enterprise security infrastructure. Additionally, these controls may be preventive, detective, or corrective. Research Question This paper will focus on one such computer security control Personal Firewalls. Firewalls intercept traffic and make routing and redirection decisions based on policies. Some firewalls can also inspect packets and make transformation and security decisions; therefore, they are critical components in maintaining security in organizations. There are different types of firewalls, such as hardware, software, enterprise, and personal firewalls. Personal firewalls are client-based solutions that are installed on desktop/laptop computers and may be administered individually from a central location. Successful selection and adoption of firewalls (enterprise as well as personal) is based on various factors, some of which are technical while others may be behavioral. This exploratory study looks at the new genre of personal firewalls and, based on the review of the literature, attempts to answer the following research questions: 1) What are the factors that could result in successful selection of personal firewalls in organizations? 2) What are the empirical evidence to support deployment of firewall software? Significance of the Research The study hopes to shed light on behavioral aspects of information security, which may be tied to perceptions of end-users who may influence technology selection in their organization. This will provide empirical evidence to an area that has been identified as lacking in research (Dhillon Blackhouse, 2001 Troutt, 2002) and provide directions and guidance for future studies. Another significance of this study is to look at end-user perception is that it may affect how well the user does his or her part in staying vigilant to combat threats posted by hackers to organizational assets. The end-user may be a conduit to organizational data being compromised. Proper software selection as well as positive user attitude and motivation for using the software are therefore important to ensure ongoing use of personal firewall software. Kettinger and Lee (2002) address the fact that the proliferation of personal computing and individualized software, and popularity of the Internet in organizations have resulted in users playing an important role in driving IT implementation. Their study found that for users selecting their own IT applications (such as desktop software programs), there is greater user satisfaction after implementation. Grantham and Vaske (1985) also state that positive user attitudes are important predictors in continued system use. This is especially important for personal firewall use because computers are at risk at all times when connected to the Internet. In reference to software selection, Chiasson and Lovato (2001) emphasize: Understanding of how users form perceptions of software innovation would help software designers, implementers and users in their evaluation, selection, implementation and ongoing use of software. However, with the exception of some recent work, there is little research examining how a user forms his or her perceptions of innovation overtime (p. 16). The area of information security as it relates to maintaining confidentiality and integrity of data stored on personal computers can benefit from identification of factors that would make it possible to safeguard corporate assets that are at risk as a result of remote data access by employees. Software selection for deployment on company computers cuts across different user levels in terms of knowledge and level of expertise of the user. Selection of software therefore must be done to accommodate all types of users ranging from novices to experts. The latter category of users may have higher tacit knowledge of tasks to be able to compensate for the interface without realizing it (Gery, 1997). Organization of Study The purpose of this paper is to investigate self-referent perceptions of end-users, and use Q-Sort analysis to investigate factors affecting deployment of security firewall software in organizations. The paper is organized as follows: review of research on information security is presented to the reader along with extraction of variables from the literature that may determine firewall deployment in organizations; The Q-Sort Factor Analysis method used for the study is explained and the research design is provided; Along with data analysis, results of the study are then explained, which is followed by discussion and applications to practice. Due to the nature of research design used in this study, limitations are also explained. Research Design and Methodology Subjects in this exploratory research study were 31MBA students enrolled in a security and Control of Information Systems course. The students came from different backgrounds, such as finance, liberal arts, nursing, and computer science. From a business perspective, the course examined implications of information security risks faced by organizations. Although technical issues of security, such as authentication, authorization, and encryption that make electronic commerce sites successful in processing business transactions securely were also explored in the course, the primary focus in the course was from a business perspective. There was no structured lab work during class, but to gain a better understanding of security issues, students were expected to complete hands-on exercises outside class. During initial weeks, topics covered included the PWC model, TCP/IP vs. OSI models, network, e-mail, database security, digital certificates and signatures, risk assessment, and privacy issues. Also, during Week 5, students had been previously tested on the topics using short-answer type questions to determine learning competency of factual information and applications related to information security in organizations. The test score counted towards 15% of overall course grade. With coverage of the aforementioned topics, it was safe to assume that students had knowledge of current security issues facing organizations in todays economy. Because there is no consensus on the common body of knowledge acceptable for all security professionals, and since this was an exploratory study, the study was conducted in a controlled environment with ahomogenous population of students to minimize confounding by extraneous variables. Using MBA students as surrogates for professionals or executives in reference to use and evaluation of technology has also been found to be acceptable (Briggs, Balthazard, Dennis, 1996). The hands-on firewall assignment in this course covered installation, configuration, and use of one standard personal firewall software (ZoneAlarm). After students had a chance to use the software, they were asked to participate in the study. No class discussion was conducted on results of the firewall tests in case it affected students perceptions about the software, which could have influenced their response. Therefore, the data reflected individual student perception without class discussions. Students were given instructions to visit a Web site that explained the nature of the study and provided information on how the Q-sort statements should be sorted. This was important since students are more used to completing questionnaires in a survey format that use Likert scale, open-ended, or closeended questions (such as those used during end of term class evaluation of instruction), but may not be familiar with the peculiarities of the Q-sort procedure. To reduce data errors and extract usable data, instructions were presented in detail before the respondents were shown the statements for the study. Q-Sort Analysis Q-sort analysis uses a technique for studying human subjectivity (Stephenson, 1953; Brown, 1980; McKeown Thomas, 1988). It is useful in exploratory research and a well-developed theoretical literature guides and supports its users (Thomas Watson, 2002). Q-sort methodology is suited for small samples and relies on theories in the domain area being researched to develop items for analysis. A disadvantage of the Q-sort methodology is that it is not suitable for large samples, and it forces subjects to conform to certain expectations (such as fitting responses within a normal distribution). Brown (1986) suggests that 30 to 50 subjects are sufficient for studies investigating public opinion. Q-sort uses an ipsative (self-referenced) technique of sorting participants statements about subjective conditions. It is a variation of factor analysis technique that uses Q-methodology theory to analyze correlation measure (Brown, 1980). Respondents to Q-sort studies are required to sort statements into predefined normal distribution type scale in which a fixed number of items fall under each category. The rankings provide clusters of perceptions of individuals consensus and conflict, which can be used to place individuals with similar characteristics into groups for further study, hi the past, the Q-sort technique used index cards for sorting, but now Web-based data collection programs (such as WebQ) are common. Initially the statements are presented to respondents in random order, and each respondent organizes statements into predefined categories. To view entered data, the respondent also can update statement rankings to see where the statements fall under each category. One advantage of using the WebQ method is that data submission errors are reduced since the program verifies that the statements are sorted according to predefined requirements. Figure 1. WebQ questionnaire Adapted from: Brown, 1980. In this personal firewall study, the statements were to be classified by respondents as Most Important (+2), Important (+1), Neutral (O), Less Important (-1), and Least Important (-2). To provide a forced distribution that is expected in the Q-Sort methodology, respondents were given instructions to identify one statement as Most Important, two statements each as Important and Less Important, and three statements as Neutral. The instrument used is shown in Figure 1 Chapter 2-LITERATURE REVIEW In the area of information security, research has often lagged practice. Dhillon Blackhouse (2001) have stressed the need for more empirical research to develop key principles for the prevention of negative events and therefore to help in the management of security. Despite known vulnerabilities in applications and operating systems, companies continue to deploy software to stay competitive, and steps taken to secure products and services are knee-jerk reactions to media stories that are more reactive than proactive in nature. Most IT managers lack a coherent framework and concrete methodology for achieving enterprise security. A security plan that includes technology, personnel, and policies would be a much better approach to developing an enterprise security strategy. One such model is the Enterprise security Framework Price Waterhouse Coopers (PWC) model. The PWC model is comprehensive because it addresses the entire enterprise of security architecture. The model emphasizes information security strategies within the organization using a holistic rather than apiecemeal approach. The framework is based on four pillars: security vision and strategy, senior management commitment, information security management structure, and training and awareness. Within the pillars are decision drivers, development, and implementation phases. Firewalls are placed in the development phase since they are used to provide interpretation of corporate standards at the technical level. For a detailed discussion of the PWC model, the reader is referred to Murphy, Boren, and Schlarman (2000). Firewalls can be considered a last line of defense in protecting and securing information systems. Wood (1988) provided a context for information security systems planning and proposed that reactive and incremental improvement approaches to address security are harbingers of a more serious problem. Other factors identified in Woods model are the lack of top management support, information overload, insufficient staffing, and limited resources. Straub and Welke (1998) advocate using deterrence, prevention, detection, and recovery security action cycle to mitigate systems risk and use prioritized security controls. Data on computer crimes is often under-reported because companies are not willing to risk public embarrassment and bad publicity. Most companies choose to handle these incidents internally without keeping documentation or reporting to local, state or federal authorities (Saita, 2001). There is a need for unbiased empirical studies in the information security area that will provide insight into problems affecting todays technology dependent corporations and industries. With a strong need to collect and analyze computer security data, the CSI/FBI Computer Crime and security Survey is published yearly (see http:// www.gocsi.com). This study provides descriptive statistics but does not attempt to identify relationship between variables, as is expected in analytical surveys. Also, results reported in this annual survey have been identified by the publishers themselves to be potentially misleading due to the limited number of respondents and their accuracy as a result of anonymous nature of the surveys. These results have also been called into question because of lack of statistical or scholarly rigor and self-serving interest (Heiser, 2002). Despite these limitations, the CSI/FBI survey provides a useful role in comparison of yearly data for similar parameters. The area of human computer interface provides a link between the user and software applications. User satisfaction is a function of features, user interface, response time, reliability, installability, information, maintainability, and other factors.†If a products user interface catches a users attention and is simple to learn and use, and has the right price and features, then the product may gain competitive advantage (Torres, 2002, p. 15). The theory of user interface design and user involvement in completing task-based actions related to Internet and security software has been substantiated by two studies in which user interaction with peer-to-peer software (Good Kerkelberg, 2002), and PGP software (Whitten Tygar, 1999) were examined. Good and Krekelberg (peer-to-peer study) found that applications connecting to the Internet need better usability and software design to maintain integrity of information stored on a users computer. In this study, individuals assumed responsibility of keeping firewalls operational at all times. This contributed in large part to maintaining effective enterprise security. Whitten and Tygar (PGP study) found that user errors are a significant portion of computer security failures, and further concluded that user interfaces for security programs require a usability standard much different from other consumer software. (Although this study is not directly concerned with user satisfaction, but is more focused on factors that affect deployment rather than development of end-user software in a specific area, some factors may be directly tied to user satisfaction as will be shown by correlational analysis). Due to increasing mobile and off-site access by employees using cable modems, DSL connections, and wireless devices to access corporate resources, personal firewalls are a necessary component to maintain overall enterprise security in an organization. Because of the nature and availability of personal firewall software, most companies choose to acquire it rather than develop it in-house. Software acquisition that results in productivity gains and strategic advantage is of critical concern to organizations, and factors that relate to these benefits must be correctly identified and understood for software acquisition decisions (Nelson, Richmond, Seidmann, 1996). Purchase of commercial software includes identifying requirements, evaluating packages from different vendors, configuring, installing, and evaluating it either as server or client-based solution. This may further involve requirements acquisition that leads to product selection (Maiden, Ncube, Moore, 1997). As a method of selection, professionals in charge of evaluating personal firewall software could draft a feature requirements document, and evaluate vendor products by comparing available features as well as using demonstration versions of software. This would be followed by user experience with the software. As mentioned earlier, the need for user involvement in information systems has been considered an important mechanism for improving system quality and ensuring successful system implementation. It is further believed that the users satisfaction with a system leads to greater system usage (Baroudi, Olson, Ives, 1986). The requirements for software though must be as measurable as possible to enable product selection and may also use repertory grids in which stakeholders are asked for attributes applicable to a set of entities and values for cells in an entity-attribute matrix. This would produce representation of requirements in a standardized, quantifiable format amenable even to statistical analyses (Maiden, Ncube, Moore, 1997). In relation to the security area, Goodhue and Straub (1991) found company actions and individual awareness to be statistically significant in a study of perceptions of managers regarding controls installed in organizations. Chapter 3 – RESEARCH QUESTION FINDINGS Data Analysis Q-Sort analysis is a type of inverse factor analysis in which the cases (subjects) rather than statement variables (features) are clustered. As recommended by Brown (1980), a procedure that arranged statements based on responses of a single individual was used for data analysis. The responses involved statements of opinion (also called Q-sample) that individuals rank-ordered based on the feature requirements in personal firewall software. The arrayed items (Q-sort) from the respondents were correlated and factor-analyzed. The factors indicated clusters of subjects who had ranked the statement in the same fashion. Explanation of factors was then advanced in terms of commonly shared attitudes or perspectives. A review of security literature (Hazari, 2000; Northcutt, McLachlan, Novak, 2000; Scambray, McClure, Kurtz, 2001; Strassberg, Rollie, Gondek, 2002; Zwicky, Cooper, Chapman, Russell, 2000) was used to extract the following statement variables relating to requirements in persona l firewall software: performance, ease-of-use, updates, features, reports, cost, configuration, and support. Table 1. Participant ranked scores Variable Mean SD PERF 4.45 0.77 EOU 3.39 1.08 UPDTS 3.23 0.88 FEATR 3.03 0.93 RPORT 3.00 1.03 COST 2.97 1.20 CONFIG 2.55 0.85 SUPPRT 2.35 0.98 INSTLL 2.00 0.89 Prior to conducting the Q-sort analysis, ranked scores of all participants (before identifying factor groups) on each statement variable were calculated for preliminary descriptive statistics. These are shown in Table 1, where a mean score of 5 = Most Important and 0 = Least Important). Correlation between the nine feature variables shows a low level of correlation between statements. This indicates there is a high degree of independence between the statement categories as used in the analysis. This finding is important since it supports the assertion that the statements represent relatively independent factors obtained from the review of the literature. In the correlation matrix shown, Table 2 shows significant correlation (p 0.05) between cost and updates, cost and reports, ease-of-use and performance, ease-of-use and updates, and installation and support. Table 2. Correlation matrix between variables COST FEATR EOU PERF INSTLL UPDTS RPORT CONFIG SUPPRT COST 1.00 -0.21 0.27 0.18 -0.13 -0.43 -0.49 -0.08 -0.10 FEATR 1.00 -.29 0.35 -0.16 0.06 -0.17 -0.13 -0.25 EOU 1.00 0.44 0.00 -0.37 -0.27 -0.20 -0.04 PERF 1.00 -0.10 -0.11 -0.13 0.13 -0.14 INSTLL 1.00 -0.13 -0.04 0.18 -0.53 UPDTS 1.00 0.26 -0.15 0.17 RPORT 1.00 1.00 0.03 CONFIG -0.24 SUPPRT 1.00 As mentioned earlier, in Q-factor analysis, the correlation between subjects rather than variables are factored. The factors represent grouping of people with similar patterns of response during sorting (Brown, 1980; Thomas Watson, 2002). Following guidelines for Q-factor analysis, eight factors were initially identified with eigenvalues 1 (an eigenvalue is the amount of variance in the original variable associated with the factor). These factors and their percentage of variance are shown in Table 3. Table 3. Eigenvalues of unrelated factors Eigenvalues % Cumul.% 1 11.56 37.28 37.28 2 6.03 19.45 56.73 3 3.91 12.61 69.34 4 2.98 9.61 78.95 5 2.14 6.92 85.87 6 1.93 6.23 92.10 7 1.43 4.61 96.71 8 1.02 3.29 100.00 Factors selected were rotated to maximize the loading of each variable on one of the extracted factors while minimizing loading on all other factors. Factors selected for rotation are usually identified by taking those with eigenvalue greater than one (Kline, 1994). However, in this study, the more rigorous Kaiser rule of selecting factors whose eigenvalue is at or above the mean eigenvalue (in this case 3.85) was used. Factors 1,2, and 3, which represented almost 70% of total variance in data, were then subjected to principal component analysis with varimax rotation. Following rotation, a Factor Matrix indicating defining sort (i.e., respondents in agreement) identified three factor groups with similar pattern of responses. The correlation of individual respondents with factors is shown in Table 4 below. Table 4. Factor matrix of respondents (* indicates defining sort) Q-Sort 1 2 3 1 02386 -0.0398 0.8988 2 0.0227 0.1971 0.8158* 3 0.4975 -0.3790 0.5458 4 0.8575* -0.2912 0.0811 5 -0.2639 0.0196 0.7993* 6 -0.0614 0.7524* -0.2289 7 0.4014 -0.1587 0.4678* 8 0.1367 0.0728 0.9054* 9 0.5351 0.1183 0.6886* 10 0.5065 0.3263 01754 11 0.5351 0.3357 0.6886 12 0.8192* 0.7321* 0.1035 13 -0.6495* 0.3450 -0.0844 14 -0.0464 0.8598* 0.5845 15 0.6535 0.0127 0.3053 16 0.2052 0.2324 0.2452 17 -0.1340 0.4049 0.9512 18 0.7553* 0.5865 0.2987 19 0.2431 0.4049 0.6946 20 0.5983* 0.5865 -0.0334 21 0.4660 0.6533* 0.4573 22 0.5672* 0.1057 -0.3342 23 0.3501 -0.1001 0.8195 24 0.1008 0.9240* 0.0038 25 0.3329 0.0999 0.7194 26 0.2254 0.6545* 0.1329 27 0.7660* 0.1246 0.5677 28 -0.1210 -0.3611* 0.2308 29 0.3850 0.7032* 0.0144 30 0.4656 0.5605 -0.3196 31 -0.1987 0.8988* 0.2470 % explained variance 21 22 26 From Table 4 it can be observed that for Factor 1, respondents 4, 12, 13, 15, 18,20,22, and 27 were in agreement and are highly loaded on this factor. Similarly, respondents 6, 10, 14, 16, 21, 24, 26, 29, and 30 were in agreement in Factor 2, and respondents 5,7,8,9,11,17,19, and 23 were in agreement in Factor 3. The statements in which these three factor groups were ranked are shown in Table 5. Table 5. Ranked statement totals with each factor No. Statement Factor 1 Factor 2 Factor 3 1 COST 0.31 5 0.91 2 -1.45 9 2 FEATR -0.45 7 0.10 5 0.70 2 3 EOU 0.91 2 0.63 3 -0.55 6 4 PERF 1.26 1 1.72 1 1.80 1 5 INSTLL -1.92 9 -0.31 6 -0.63 7 6 UPDTS 0.52 3 -0.54 7 0.61 3 7 RPORTS 0.03 6 -1.28 8 0.55 4 8 CONFIG -1.07 8 0.12 4 -0.17 5 9 SUPPRT 0.41 4 -1.34 9 -0.87 8 Table 6 shows correlation between the factors. Similar to the findings earlier about variable independence, the factor groups also show a high degree of independence. Table 6. Correlation between factors Factor 1 2 3 1 1.0000 0.3218 0.2970 2 0.3218 1.0000 0.2298 3 0.2970 0.2298 1.0000 The normalized factor scores for each factor were examined next. This provided ameasure of relative strength of importance attached by a factor to each statement on the scale used during sorting. Tables 7(a), 7(b), and 7(c) show these scores. Table 7(a). Normalized Factor 1 score No. Statement z-score 4 PERF 1.258 3 EOU 0.910 6 UPDTS 0.542 9 SUPPRT 0.409 1 COST 0.314 7 RPORT 0.032 2 FEATR -0.454 8 CONFIG -1.071 5I INSTLL -1.922 Table 7(b). Normalized Factor 2 score No. Statement z-score 4 PERF 1.717 1 COST 0.905 3 EOU 0.626 8 CONFIG 0.116 2 FEATR 0.102 5 INSTLL -0.313 6 UPDTS -0.535 7 RPORT -1.276 9I SUPPRT -1.343 Table 7(c). Normalized Factor 3 score No. Statement z-score 4 PERF 1.805 2 FEATR 0.702 6 UPDTS 0.606 7 RPORT 0.553 8 CONFIG -0.170 3 EOU -0.547 5 INSTLL -0.632 9 SUPPRT -0.872 1I COST -1.446 From the Table 7(a) it can be seen that adherents of Factor 1 feel strongly in favor of statement 4 (Performance) and oppose statements 8 and 5. This indicates for Factor 1 group, performance is preferred over initial installation, setup and configuration of the product. The results of Factor 2 group are consistent with Factor 1; that is, performance of the product is the highest rated criterion. Ease-of-use also rated highly in Factors 1 and 2. Perceived ease-of-use in an information systems product has been shown to play a critical role in predicting and determining a users decision to use the product (Hackbarth, Grover, Yi, 2003). The largest dissension between Factor 1 and 2 groups involved statements 9 (Availability of Online Help), 7 (Intrusion Reports generated), and 6 (Regular Product Updates). The results of Factor 3 are consistent with Factors 1 and 2 with Performance criteria once again being highly rated. The most dissension between Factors 2 and 3 involved statements 1 (Cost) and 3 (Ease-of-use). The most dissension between Factors 1 and 3 involved statements 1 (Cost), 3 (Ease-of-use), and 9 (Availability of Online Help). Analysis of Results The Q-sort analysis classified subjects into three groups. Eight subjects were classified under Factor 1, and 10 subjects each were included in Factors 2 and 3. There were three subjects in the study that were not distinguished in any group. These subjects were excluded from further analysis. The classification into factors gave a better idea of group characteristics. Since Factors 1 and 2 were similar and shown to include subjects who considered Performance, ease-of-use, and Availability of Online Help as the most important characteristics, this group can be considered to be comprised of non-technical users who place more emphasis on the product performing as expected in achieving goals for security. Factor 3 subjects emphasized technical characteristics and were more interested in number of features in the product, updates to the product on a regular basis, intrusion reports generated by personal firewalls, and setup/configuration of the product after installation. This group had c haracteristics of technical users. The normalized factor scores provided a measure of relative strength of importance attached by factors to each statement on the scale used during sorting. As mentioned earlier, adherents in Factor 1 felt strongly in favor of statement 4 (Performance) and opposed statements 8 (Setup/configuration) and 5 (Installation). The results of Factor 2 are consistent with Factor 1, that is, Performance of the product is the highest rated criterion. ease-of-use also rated highly in Factors 1 and 2. The largest dissension between Factor 1 and 2 groups involved statements 9 (Availability of Online Help), 7 (Intrusion Reports generated), and 6 (Regular Product Updates). The most dissension between Factors 2 and 3 involved Statements 1 (Cost) and 3 (Ease-of-use). Results of Factor 3 were consistent with Factors 1 and 2, with Performance criteria once again being highly rated. The largest dissension between Factors 1 and 3 involved statements 1 (Cost), 3 (Ease-of-use), and 9 (Availability of Online Help). Extreme differences between all factors appeared in Cost, Intrusion Reports generated, and Availability of Online Help. There was only one statement, Performance of the product, that showed consensus among all factors; that is, it did not distinguish between any pair of factors, which indicates Performance of the desktop firewall software is an agreed upon criterion irrespective of group characteristics. The managerial implications of this study can be assessed at the level of selecting appropriate software for use on computers in organizations to maintain security. There is evidence of user satisfaction being a useful measure of system success (Mahmood et al., 2000). While the end-user may not purchase individually preferred software for installation on company owned computers, the user can influence decisions for selection by making known to IS managers the features that would contribute to regular use of security software such as personal firewalls. Given access of these machines to corporate resources, appropriate and regular use of software would contribute to maintaining enterprise security. For technical professionals (e.g., programmers) who install firewalls on their desktop, programs could emphasize the statements that are defining characteristics shown in Factor 3. For an industry that has non-technical professionals (such as Factor 1 and 2), other non-technical characteristics of the product could be emphasized thus achieving maximum effectiveness in program deployment. Increased awareness should minimize user related faults, nullify these in theory, and maximize the efficiency of security techniques and procedures from the users point of view (Siponen, 2000). The results of this study could also benefit vendors who develop software for end-users. In this study it was found that performance of the software is the most important factor that affects selection of software, irrespective of group characteristics. Due to project deadlines and market competition, software is often shipped without being fully tested as secure, and standard industry practice is to release incremental service packs that address security issues in the product. In a case of security software, this may adversely affect the reputation of a vendor once its products have been shown to have high vulnerability to being compromised. The findings of this study could provide a better understanding of importance of personal firewall security software on organizational client computers. The decision to install an information system necessitates a choice of mechanisms to determine whether it is needed, and once implemented, whether it is functioning properly (Ives, Olson, Baroud i, 1983). More research needs to be done in the area of selection of software for implementation on users computers that are owned by corporations and given to employees for off-site work. This can include regular employees vs. contractors who may connect to employer and client networks from the same computer. If the findings are to have wider applicability, qualified industry professionals and security officers responsible for maintaining secure infrastructure in corporations should be included in the analysis. The study provides management and security professionals a basis for making decisions related to enterprise security. It provides personal firewall vendors an insight into feature requirements of the personal firewall market, and provides academic researchers interested in security, a more focused approach on various dimensions of security software from the behavioral perspective. Future studies could be industry and product specific in order to assess differences in selecting general- purpose software versus security specific products. In many cases, management has looked at the need for implementing information security programs and products as a necessary encumbrance, something akin to paying taxes or insurance premiums (Highland, 1993). But organizations are increasingly becoming aware of the potential for legal exposure via lawsuits, and are deploying countermeasures (such as personal firewalls) to reduce vulnerability and mitigate risk. The chief information security officer in todays organizations should have the responsibility of managing organizational risks by using empirical models and analysis to determine strategies for protecting corporate assets. Firewalls are the last line of defense in the corporate network and therefore play a critical role in information security. With personal firewalls being a new product genre, this study was conducted since there is no research available that specifically looks at determinants for selection of security software in a corporate environment to protect organizational assets. As the information security field evolves further, decisions for security software acquisitions need to be researched further. Selection and deployment of appropriate firewalls can make a significant difference in an organizations enterprise security strategy. It is therefore also important to understand the variables (as shown in this study) that may affect decisions to select and deploy personal firewall software in a corporate environment. Limitations of the Study Due to the exploratory nature of this study, there are several limitations. The sample used in the study comprised of all students enrolled in a security course at the same university, and was further limited to the firewall topic among a wide range of technical and behavioral information security topics. Students worked with only one type of firewall software and characteristics of this particular program may have heightened their awareness of certain strengths and weaknesses in the software. Since the purpose of information security implementation in an organization is to support business objectives of the organization, information security departments are sometimes placed under the chief financial officer recognizing the direct relationship between information assets and monetary assets. Software acquisition decisions may therefore be made by the finance department with limited input from the IT department. The purpose of this study was to explore an important topic for research on information security and determine operant subjectivity in a field where empirical research is severely lacking. The Q-sort technique itself is suitable for small sample populations (Thomas Watson, 2002), but the correlations obtained in smaller samples tend to have considerable standard errors (Kline, 1994). The exploratory nature of this study was not intended to prove some general proposition but to seek a better understanding of group characteristics that directly relate to maintaining a secure network environment (in this case by deploying personal firewalls to plug possible vulnerabilities that might exist in a network through use of computers by employees either on-site or at remote locations). The perceptions of end-users will therefore guide the selection and deployment of security technologies in an organization to provide a secure corporate environment. Chapter 4- SUMMARY and CONCLUSIONS Summary In the area of information security, research has often lagged practice. Dhillon Blackhouse (2001) have stressed the need for more empirical research to develop key principles for the prevention of negative events and therefore to help in the management of security. Despite known vulnerabilities in applications and operating systems, companies continue to deploy software to stay competitive, and steps taken to secure products and services are knee-jerk reactions to media stories that are more reactive than proactive in nature. Most IT managers lack a coherent framework and concrete methodology for achieving enterprise security. A security plan that includes technology, personnel, and policies would be a much better approach to developing an enterprise security strategy. One such model is the Enterprise security Framework Price Waterhouse Coopers (PWC) model. The PWC model is comprehensive because it addresses the entire enterprise of security architecture. The model emphasizes information security strategies within the organization using a holistic rather than apiecemeal approach. The framework is based on four pillars: security vision and strategy, senior management commitment, information security management structure, and training and awareness. Within the pillars are decision drivers, development, and implementation phases. Firewalls are placed in the development phase since they are used to provide interpretation of corporate standards at the technical level. For a detailed discussion of the PWC model, the reader is referred to Murphy, Boren, and Schlarman (2000). So it is important reason to look at end-user perception as it may affect how well the user does his or her part in staying vigilant to combat threats posted by hackers to organizational assets. The end-user may be a conduit to organizational data being compromised. Proper software selection as well as positive user attitude and motivation for using the software are therefore important to ensure ongoing use of personal firewall software. Kettinger and Lee (2002) address the fact that the proliferation of personal computing and individualized software, and popularity of the Internet in organizations have resulted in users playing an important role in driving IT implementation. Their study found that for users selecting their own IT applications (such as desktop software programs), there is greater user satisfaction after implementation. Grantham and Vaske (1985) also state that positive user attitudes are important predictors in continued system use. This is especially important for personal firewall use because computers are at risk at all times when connected to the Internet. In reference to software selection, Chiasson and Lovato (2001) emphasize: Understanding of how users form perceptions of software innovation would help software designers, implementers and users in their evaluation, selection, implementation and ongoing use of software. However, with the exception of some recent work, there is little research examining how a user forms his or her perceptions of innovation overtime (p. 16). The area of information security as it relates to maintaining confidentiality and integrity of data stored on personal computers can benefit from identification of factors that would make it possible to safeguard corporate assets that are at risk as a result of remote data access by employees. Software selection for deployment on company computers cuts across different user levels in terms of knowledge and level of expertise of the user. Selection of software therefore must be done to accommodate all types of users ranging from novices to experts. The latter category of users may have higher tacit knowledge of tasks to be able to compensate for the interface without realizing it (Gery, 1997). Conclusions In this study, Q-methodology was used to define participant viewpoints and perceptions, empirically place participants in groups, provide sharper insight into participant preferred directions, identify criteria that are important to participants, explicitly outline areas of consensus and conflicts, and investigate a contemporary problem relating to desktop firewalls by quantifying subjectivity. Similar to other IT areas, security software selection and deployment in todays environment faces many challenges, such as staying current with new threats, project deadlines, implementation issues, and support costs. Quality drives customer satisfaction and adoption of software. Human factors are important in contributing to successful software deployment in organizations, especially when it relates to desktop software applications. Organizations are now viewing security and controls as business enablers and desktop firewall technology plays a critical role in safeguarding corporate assets. In a fast-paced area where the new generation of applications and services are growing more complex each day, it is critical to understand characteristics that affect selection of end-user security products in enterprises. This study addresses a small but important area of safeguarding enterprise information security by using personal firewalls. As has been previously noted, limited research exists beyond the current study that explores behavioral aspects of information security. This study holds importance for professionals tasked with evaluating and selecting security products for company wide deployment. As the area of information security gains increased importance due to the strategic role of technology in organizations, and current events impact areas such as disaster recovery and enterprise continuity planning, a study of end-users to determine their perceptions about selection of technology controls in organizations is critical for protecting organizational assets. More research needs to be done in the area of perception of users towards other security software (such as anti-virus, intrusion detection, virtual private network software, and encryption products), and, due to varying security needs in different industries, studies could also be industry and product specific. While the findings should be considered preliminary, the results raise interesting observations about issues uncovered regarding security perceptions of feature requirements in personal firewalls. Information security is a dynamic area and, in this environment, this exploratory study contributes to evolving research by identifying variables from theoretical literature and using an empirical technique to study issues that affect safeguarding vital assets of an organization from internal and external threats. Recommendation It is recommended that in order to provide better evidence of factors that affect deployment of technology tools that create awareness of security issues and produce better informed employees, research into behavioral factors also needs to be conducted to gain insight into programs and processes that will lead to the development of a robust enterprise security strategy. Information security awareness research has been mostly descriptive and has not explored the possibilities offered by motivation/behavioral theories, or the related theory of planned behavior and the technology acceptance model, specifically in the information security domain (Mathieson, 1991 ; Siponen, 2000; Legris, Ingham, Collerette, 2003). Since security has been deployed at the perimeter of electronic network and on servers by system administrators, the area of information security has ignored users of information systems since software developers are far removed from how the user will interact with security software. Human compliance with information security rules require an understanding of how people work and think (Highland, 1993). Lane (1985) considers the human factor to be the first and most important component of security and a critical part of the risk analysis process. This is especially true in personal firewall software since the burden of maintaining a secure environment is being shared by the user and the system administrator. REFERENCES Baroudi, J., Oison, M., Ives, B. (1986). An empirical study of the impact of user involvement on system usage and information satisfaction. Communications of the ACM, 29(3), 785-793. Briggs, R.O., Balthazard, P.A., Dennis, A.R. (1996). Graduate business students as surrogates for executives in the evaluation of technology. Journal of End-user Computing, 8(4), 11-17. Brown, S.R. (1980). Political subjectivity: Applications of Q methodology in political science. New Haven, Connecticut: Yale University Press. Brown, S.R. (1986). Q-technique and method: Principles and procedures. In W.D. Berry M.S. Lewis-Beck (eds.), New Tools for Social Scientists: Advances and Applications in Research Methods. Beverly Hills, CA: Sage Publications. Chiasson, M., Lovato, C. (2001). Factors influencing the formation of a users perceptions and use of a DSS software innovation. ACM SIGMS Database, 32(3), 16-35. Clarke, R. (2002, February). Forum on technology and innovation: Sponsored by Sen. BillFrist (R-TN), Sen. Jay Rockefeller (D-WV), and the Council on Competitiveness. Retrieved October 28,2003, from hap:/ /www. techlawjournal, com/security/ 20020214.asp Deise, M., Nowikow, C., King, P., Wright, A. (2000). Executive s guide to e-business: From tactics to strategy. New York: John Wiley Sons. Dhillon, G., Blackhouse, J. (2001). Current directions in IS security research: Toward socio-organizational perspectives. Information Systems Journal, 11(2), 127-153. Enns, H., Huff, S., Golden, B. (2003). CIO influence behaviors: The impact of technical background. Information and Management, 40(5), 467-485. Gery, G. (1997). Granting three wishes through performance-centered design. Communications of the ACM, 40(7), 54-59. Good, N., Krekelberg, A. (2002). Usability and privacy: A study of Kazaa P2P file-sharing. Retrieved November 12, 2003, from http:// www. hpl. hp. com/shl/papers/kazaa/ Goodhue, D.L., Straub, D.W. (1991). security concerns of system users: A study of perceptions of the adequacy of security measures. Information Management, 20(1), 13-27. Grantham, C., Vaske, J. (1985). Predicting the usage of an advanced communication technology. Behavior and Information Technology, 4(4), 327-335 Hackbarth, G., Grover, V, Yi, M. (2003). Computer playfulness and anxiety: Positive and negative mediators of the system experience effect on perceived ease-of-use. Information and Management, 40(3), 221-232. Hazari, S. (2000). Firewalls for beginners. Retrieved December 17,2003, from http://online.securityfocus.com/ infoc Heiser, J. (2002, April). Go figure: Can you trust infosecurity surveys? Information security, 27-28.us/1182. Highland, HJ. (1993). A view of information security tomorrow. In E.G. Dougall (ed.), Computer security. Holland: Elsevier. Ives, B., Olson, M., Baroudi, J. (1983). The measurement of user information satisfaction. Communications of the ACM, 25(10), 785-793. Kettinger, W., Lee, C. (2002). Understanding the IS-User divide in IT innovation. Communications of the ACM, 45(2), 79-84. Kline, P. (1994). An easy guide to factor analysis. London: Rutledge Lane, YP. (1985). security of computer based information systems. London: Macmillan. Legris, P., Ingham, J., Collerette, P. (2003). Why do people use information technology? A critical review of the technology acceptance model. Information and Management, 40(3), 191-204. Mahmood, M.A., Burn, J.M., Gemoets, L.A., Jacquez, C. (2000). Variables affecting information technology enduser satisfaction: Ameta-analysis of the empirical literature. IntemationalJournal of Human-Computer Studies, 52, 751-771. Maiden, N., Ncube, C., Moore, A. (1997). Lessons learned during requirements acquisition for COTS systerns. Communications of the ACM, 40(12), 21-25. Mathieson, K. (1991). Predicting user intentions: Comparing the technology acceptance model with the theory of planned behavior. Information Systems Research, 3(2), 173-191. Murphy, B., Boren, R., Schlarman, S. (2000). Enterprise security architecture. CRC Press. Retrieved November 2, 2003, from http://www.pwcglobal.com Nelson P., Richmond W. , Seidmann A., (1996). Two dimensions of software acquisition. Communications of the ACM, 39(1), 29-35. Northcutt, S., McLachlan, D., Novak, J. (2000). Network intrusion detection: An analysts handbook (2nd ed.). IN: New Riders Publishing. Saita, A. (2001, June). Understanding peopleware. Information security, 72-80. Siponen, M.T. (2000). A conceptual foundation for organizational information security awareness. Information Management security, 5(1), 31-41. Strassberg, K., Rollie, G., Gondek, R. (2002). Firewalls: The complete reference. NY: Osborne McGraw-Hill. Straub, D.W., Welke, RJ. (1988). Coping with systems risk: security planning models for management decision making. MS Quarterly, 22(4), 441-469. Zwicky, E., Cooper, S., Chapman, D., Russell, D. (2000). Building Internet firewalls (2nd ed.). CA: OReilly.