Saturday, August 31, 2019

Amelioration and Emancipation Oct. 20, 2009

Amelioration The anti-slavery movement developed in the early 1800s was a formidable force in the quest to end slavery. The West India Committee, in a bid to head off attacks, agreed to proposals to improve the condition of the slaves. These proposals were called amelioration proposals and came into effect in 1823. The proposals said that the British government should write to each of the colonial governors, suggesting that the assemblies pass local laws to improve the condition of slaves. The proposals were as follows: 1. Female slaves should not be whipped, and the overseers and drivers should not carry a whip in the fields. . Records should be kept of all lashes given to male slaves and all punishments should be put off for at least 24 hours. 3. Religious instruction and marriages were to be encouraged. 4. Slaves could testify in court against a free man, provided that a minister supplied him with a character reference. 5. Slaves should have time off on Saturdays to go to market, so they would be free to attend church on Sunday mornings. 6. Slaves should not be sold as payment for debts. 7. There should be the establishment of slave savings banks which would help slaves to save money to buy their freedom.The failure of amelioration These measures were met with fierce resistance from colonies such as Jamaica, Barbados, St Vincent and Dominica. Instead of improved conditions for the slaves, they faced increased brutality from the planters. In the end, most of the assemblies passed only a few of the less-important amelioration proposals. Amelioration failed, but it provided one of the major impetuses for the abolition of slavery. It became evident that the planters were unwilling to improve the lives of the slaves and, as such, the only other option was to put an end to slavery.Emancipation 1. All slaves in the British Empire were to be set free on August 1, 1834. 2. Slave children under six years old were to be freed immediately. 3. All other slaves were to se rve a period of apprenticeship. They were to work for their masters for 401/2 hours per week. They would be paid only for overtime. Praedial (field) slaves were to serve six years apprenticeship and non-praedial (domestic) slaves to serve four years. 4. Planters were to continue providing food, shelter, clothing, medical care and other allowances which they were accustomed to during slavery.Apprentices could not be sold and they could buy their freedom before apprenticeship came to an end. 5. A sum of ? 20 million was granted by the British Parliament to compensate slave owners for the loss of their slaves. 6. Stipendiary magistrates (SMs) were to be sent from England to ensure the proper working of the apprenticeship system and to settle all disputes between masters and apprentices. THE APPRENTICESHIP SYSTEM Aims of Apprenticeship a) To provide a peaceful transition from slavery to freedom. b) To guarantee planters an adequate supply of labour during the period and prepare for full freedom. ) To train apprentices for freedom, especially working for wages. d) To enable the colonial governments to revise the system of justice and establish institutions suitable for a free society. The stipendiary magistrates were retired naval and army officers on half pay, appointed from Britain and were accustomed to rough conditions and enforcing discipline. They were chosen because they were not connected to the planter class and it was felt that they would not be biased. Duties of stipendiary magistrates a) To supervise the apprenticeship system. b) To settle disputes between masters and apprentices. ) To visit estates at regular intervals and hold court. d) To inspect jail and workhouses. e) To assist in fixing the value of slaves who wanted to buy their freedom. These duties were strenuous and led to the death of many SMs who were not accustomed to tropical conditions and could not afford the high cost of medical treatment. Conditions of employment Salary – ? 300 for the first year then increased to ? 450 for travel expenses and housing. There was no pension for dependants if the SM died in service. There was also no sick leave and he had to pay his own fare back home if he were dismissed or out of service.These bad working conditions prevented SMs from performing their duties satisfactorily and many were easily bribed by planters. They were also overburdened by work because they were so few in numbers. Those who tried to do their duties were sometimes persecuted. They were abused physically, verbally and in the press and they were often obstructed in the performance of their duties as planters sometimes refused to allow them on the estates. Success of stipendiary magistrates a) They listened to complaints from both sides and acted as a buffer between masters and apprentices. ) They informed apprentices of their rights; they did not have to listen to gossip or obtain information from newspapers. c) They helped apprentices to organise their l ives better by giving advice. However, they had very little to formulate schemes to improve the social conditions of the apprentices. They were unable to prevent apprentices from being punished harshly. Punishments Apprentices were usually sent to the workhouse. However, SMs had no control over what happened there. The most common form of punishment in the workhouse was the treadmill.There was also the whipping post and apprentices could be put in penal gangs. Females often had their heads shaved. Time lost in the workhouse had to be repaid by the apprentice by working for his master during his free time. Methods to control apprentices on the estates †¢ It was illegal for apprentices to leave the estate without written permission. †¢ Valuations on able-bodied slaves were often inflated. †¢ High fees were charged for the use of the markets and for licences to work off the estates as carpenters, blacksmiths and so on. These licences and tickets to sell in the markets co uld be withdrawn. Refusal of planters to give customary allowances. †¢ Finding fault with apprentices', work which had to be done over in the apprentices' free time. †¢ Locking up apprentices on false charges and dropping the charges before the arrival of the SM. †¢ Cutting down apprentices' fruit trees and forbidding them to own livestock. †¢ Spreading the 40 1/2 hours per week over five days instead of four. †¢ Paying low wages, making unfair deductions from wages, paying wages late. The End of Apprenticeship Apprenticeship ended for ALL apprentices in 1838 because: a) The system was not achieving its aims. ) The anti-slavery society exposed the abuses in the system and began to campaign for full freedom. c) The planters feared violence if domestic apprentices were freed before field apprentices. d) Some planters felt that it was cheaper not to have to provide for apprentices and only to employ the number of labourers they needed. Note: Antigua granted ful l freedom to their slaves. The planters decided against apprenticeship. The apprenticeship system came to an end in 1838 when the colonial governments in each colony voted against its continuation. Nineteenth century immigration (Part 1)Reason for immigration 1. A decrease in the labour force. With the end of the apprenticeship system in 1838, the planters no longer had a labour force they could easily control. Apprentices had now gained their freedom and many were reluctant to work any at all on the plantation. In the smaller territories, where the ability to access land was limited and alternative occupations were limited, ex-slaves had no choice but to continue plantation work. For example, planters in Barbados and St Kitts had very little difficulty in accessing labour in the post-Emancipation period.It was in the large territories, such as Jamaica, British Guiana and Trinidad, that planters faced such difficulty and had to turn to immigration schemes as an alternative labour so urce. The hope was that immigration would provide a permanent source of labour for the plantations. 2. An attempt to suppress wages. There was the hope that immigration would generate competition for the ex-slaves and so help to keep wages down. Ex-slaves demanded adequate remuneration, but the planters found that they could suppress wages if they could introduce cheap foreign labour.This, in essence, would reduce the demand power of the ex-slaves because if they refused what was being offered, an immigrant was quite able to fill the position. Besides, if sugar production was to continue, a cheap, efficient and reliable source of labour had to be found. Immigration schemes THE EUROPEANS Due to a decline in the white population, planters sought European immigrants to increase the size of the white population. It was hoped that Europeans would set an example of industry to ex-slaves and as well eventually develop into a middle class.They would settle on available land in the interior, thus forcing ex-slaves off the land and back to the plantations. Jamaica imported the largest number. Europeans also went to Trinidad, British Guiana and St Kitts. These immigrants were mainly Scots, Irish, French and Germans. They were recruited under a bounty system. Problems with European Immigration Europeans were unsatisfactory as most died shortly after they arrived. They died from tropical diseases, heat stroke and many drank themselves to death. They also refused to work on the plantations with blacks.Many asked to be sent home or migrated to the United States. Planters also failed to supply proper food, shelter and medical facilities. THE PORTUGUESE In Madeira, workers were paid only one third of what they could earn in the islands per day, so they were attracted by the higher wages being offered in the Caribbean, especially British Guiana. Many went to Trinidad and a few to the Windward Islands. They were brought in by government bounty. Most came during periods of famine in Madeira (1846-1847). Their numbers decreased after 1847 until the scheme ended in 1882.Problems with Madeiran immigration The Madeirans died in large numbers. They suffered severely from yellow fever, malaria, overwork and inadequate food. The scheme was very irregular and most of them went into trading as soon as their contracts ended. In addition, the Madeiran Government objected to the scheme, since so many of its citizens were leaving, and implemented measures making it difficult for their recruitment. THE AFRICANS There were two distinct groups of Africans that were used as labourers in the post-emancipation period. These were the free Africans and the liberated Africans.The free Africans were persons who willingly opted to come and work on the plantations in the Caribbean. The liberated Africans were persons freed by British naval personnel from vessels illegally transporting them to the Caribbean as slaves. Free Africans Attempts were made to obtain Africans from the Kru Coast and Sierra Leone. The British Government was reluctant to grant approval of this scheme as it seemed to be a revival of the slave trade. However, in 1840, approval was granted. At first, they were recruited privately, but the British government assumed direct control two years later.Problems 1. Very few Africans were willing to come to the Caribbean. There were no catastrophes in Africa, which would make them leave. 2. Many who came to the Caribbean did not remain on the plantation; rather they followed the ex-slaves and settled on lands and became peasant farmers. Liberated Africans The largest number of Africans who came to the British Caribbean were ‘rescued' by the British Navy from slave ships bound for Cuba and Brazil. These Africans were forcibly indentured for up to five years in the Caribbean primarily in British Guiana, Trinidad and Jamaica. Problems 1.The number of liberated Africans was too small to make a difference to the labour situation. This scheme ended when Cuba and Brazil abolished slavery in 1866 and 1888, respectively. Like the ex-slaves, they abandoned the estates and settled on land. THE CHINESE The first Chinese immigrants arrived in Trinidad in 1806 from Malaya. They were to be indentured for five years, with a promise of small plots of land afterwards. They were extremely unsuitable for estate labourer and most were shipped back. Most Chinese immigrants came during the period 1859-1886 and went to British Guiana, Jamaica and Trinidad.They came mostly from the Portuguese colony of Macao and from Canton. Others came as well because of the Teiping Rebellion (1851-1864). Problems with Chinese Immigration Planters complained that the Chinese did not make good estate workers and few re-indentured themselves. They preferred to return to China or open retail shops. In addition, they were more expensive than the Indians. The Chinese Government also insisted that a full return passage be granted after a five-year indenture contract . The planters were willing to pay this only after two five-year contract.The Chinese Government also opposed immigration because they were ill-treated in Cuba. Most Chinese avoided the West Indies preferring to go to the United States or to find work nearer home in Java or the Philippines. Lastly, race relations between blacks and Chinese were quite poor. THE INDIANS The first Indians arrived in 1838 on Gladstone's Estate in British Guiana. However, the British Government stopped the scheme because of evidence of ill-treatment and the high death rate among the immigrant in Mauritius. However, due to pressure from the planters the British re-opened Indians immigration scheme in 1844.It was not difficult to find willing immigrants. Many craftsmen had lost their jobs due to competition from mechanised factories and mills of England. India was becoming overpopulated and there was not enough land to divide among the younger generation. Wages in India had fallen to 1/2d per day and there was a series of famine during the period 1857-1877 that led to an increase in food prices. Those escaping the police and the caste system were also willing to migrate. The Caribbean seemed attractive with high wages, shelter, medical care and a chance to find new occupations beside agriculture.Indians were easily recruited as India was a British colony. British ships and trading costs were already there and the British Government could easily provide British officials to supervise the scheme. Planters were satisfied with the Indians because they were hardworking, accustomed to tropical agriculture and re-indentured themselves. Economic effect on the sugar industry British West Indian planters had turned to immigration as a means of reviving the sugar industry. The hope was that with the steady supply of labour, planters could focus on increasing their output.Immigration, however, did not have its desired impact, especially in a colony like Jamaica. In territories such as Trinidad a nd British Guiana, we cannot assume that it was immigration that saved their sugar industry. For instance, they introduced mechanisation and placed more lands under sugar cane cultivation. These could be seen as measures that helped to save their sugar industries. Barbados could be used as another example. Up to 1848, there had seen an increase in their output by 250 per cent. However, by the end of the 19th century this had declined.We cannot assume that this was because Barbados was not using immigrant labour that its output declined. During the period, the territory was plagued by problems, including soil exhaustion and inadequate mechanisation. The overall conclusion must be that immigration did not cause increased sugar production in the British West Indies, as many other factors could have been responsible. Other economic effects 1. As a result of Indian immigration, the rice industry was developed in British Guiana and the cocoa industry in Trinidad. 2.They also helped to mak e central factories profitable by cultivating cane on small farms then selling it to the central factory. Social effects 1. Indians were considered inferior and they could only acquire poorly paid jobs. They could not settle in the towns, but had to live in the countryside where they formed an active peasant class. The employment of Indians mainly as field workers led to the employment of blacks in better jobs, for example, the police force. 2. The ex-slaves despised the Indians and refused to work alongside them in the fields. They were described as ‘heathens' because of their speech and clothing.Indians also despised the blacks because of their alleged low moral standards. 3. Immigration led to the expansion of social services, for example, medical facilities and a large police force. Cultural effects 1. Family – Indians brought their firm family structure, in which all relations supported each other. The idea of extended family, which included several generations, wa s very strong. All males over age 16 were members of the family council and made all decisions of the family, for example, marriage, religious ceremonies and expenditure. 2. Religion – Hinduism –Hindus worshipped several gods, of which Brahma was the most important. He was the supreme god or creator. They believed that when people die, their souls are reborn in a new body. The Hindus had very strict divisions in the society; this was known as the caste system. Each person belonged to a special group or caste. The Brahmins or the religious leaders were at the top of the society and the Hindus in the Caribbean continued to follow them as their leaders. Islam – A number of Indians who came were also Muslims. They believed in one God, Allah. They followed the teachings of the Quran. . Festivals – Divali or festival of lights was celebrated by the Hindus. They told stories, shared gifts, decorated their windows and doors with lights and candles. Hosein  œ A Muslim festival for small temples made from paper and bamboo were decorated and carried in a procession through the streets, accompanied by dancing to the beats of drums. 4. Food – roti, rice, curry 5. Dress – turban sari 6. Buildings – Hindu temples Muslim mosques houses built in Indian styles Other cultural effects The Indians normally segregated themselves deliberately in the educational institution.Oftentimes, they were unwilling to send their children to school since they feared they could be converted to Christianity. It was not until the late 1870s when separate schools for Indian children were established, mainly by the Canadian Presbyterian Mission to the Indians, that Indian children went to school and language barriers began to crumble. Indian integration in the Caribbean was not very easy since many of them spoke the Hindi language which served as a language barrier. | |

Friday, August 30, 2019

Homeschool vs Public School Essay

The recent growth, popularity, and success of homeschool have left many parents wondering if public school is the right choice for their children. While public school is still the most trusted and convenient way for parents to have their children educated, many parents are starting to research and learn more about the option of homeschooling. For many parents, it is hard to think outside the box, when it comes to their children’s education, yet, more parents are convinced every day that this may be the right choice for their children. Parents considering homeschool are worried that they might not be able to provide the proper education, and learning tools, as well as the structure of public school. Others are simply worried that their publicly educated children will not be as well rounded or socialized if they are homeschooled. For many advocates, whether home school or public school, the environment offered by withers situation is definitely a determining factor as to whether their child should be home or publicly schooled. Proponents of homeschool think that children will thrive better in a safe, comfortable, familiar environment. Ironically, so do public school advocates. Homeschool parents believe that home is the safest, most secure environment for their children to learn. A decade ago a homeschooled teen had to miss out on school dances, band, sports, driver’s education and more. This is no longer the case. The options are endless depending on your local school district. Most junior and high schools support dual enrollment. This means that a child can be homeschooled and still go to the school for subject that the student along with the parents decides. This can be math, wood working, computer technology, and many more things. If the child is enrolled they are entitled to most if not all of the extracurricular activities that the school offers. In a home school setting, a child does not have to deal with fitting in, peer pressure, or cliques. Homeschool parents will argue that by homeschooling they prevent most of the negative social problems of school. Many argue that school is not like real life. In the real world you do get to choose who you associate with for the most part. You are not shoved into a room of your same age peers for 12 years or more. In public schools children are forced to deal with persecution because of the clothes they wear may not be the coolest, or their shoes may not be a brand name. Children are forced to deal with peer pressures to have sex, experiment with drugs, or truancy. Homeschool children are able to focus solely on their education. They are usually able to work at their own pace in their own style. While publicly schooled children are forced into a strict schedule, and everything is on a timed basis. Public school advocates argue that public school teaches the child to separate themselves from their parents, and begin to rely on themselves more. That it teaches responsibility. They also believe that the natural interaction between children in school is healthy, and it teaches them character, and individuality. As a matter of fact, many public school supporters believe that actual book learning is not as important as learning how to deal with others. Only you can decide which is more important for your child. Along with everything else, parents and their children have to consider the curriculum, and is this right for the individual circumstance. How your child learns is a major factor in determining if your child should be in public school or homeschooled. Most children learn the same basic skills whether they are public, or homeschooled. They learn to read, write, and basic math. Both sides agree that this is a good foundation. However, it is beyond the basics that the two types of schooling differ, and the argument begins. Homeschooled children tend to learn through individual experience. Regular public school children learn through relationships, and according to studies, that’s what builds character in a child. [www. publicschools. org]. this is clearly a huge argument in the war of Homeschool versus public school. Homeschool parents are able to choose the focus of their child’s education. Whether it is based on their religion and beliefs, or the child’s natural curiosity. This does not mean that a child is homeschooled based solely on religion or because they are religious. It simply gives parents an option to have religion incorporated in their children’s schooling. More parents said that they chose to homeschool a child in order to offer religious or moral instruction. This reason was given more than any other reason as the most important for homeschooling. This accounts for 36 percent of homeschooled students [The National Center for Education Statistics (NCES) of the U. S.  Department of Education (USDOE) Institute of Education Sciences (IES)]. Public schools have eliminated religion because the government feels that it may offend someone if we pray a certain prayer that a student with a different religion may not. So, they decided to separate church and state. This means that there are no more prayers in public schools or their events. There are â€Å"moments of silence†. Thus, many homeschool parents incorporate it into their lessons. Public school bases their curriculum on state based lesson, which aim to make the students reach and hopefully surpass their goals. This curriculum is constantly changing with the times. A drawback of public education curriculum is that there is not a lot of time to spend in depth on one particular subject, but students are exposed to a broad spectrum of subjects. Every parent is a teacher [www. phdinparenting. com]. Whether they realize it or not. From day one we teach our children, and never stop. It is the argument of homeschool advocates that if we can teach them life skills and basically everything they learn from day one, then why can’t we educate our children? Public school advocates argue that the difference is the time a teacher has spent learning methods and perfecting the art of educating a child. Homeschooled parents are concerned that their children are not having enough one on one time with teachers. They are concerned that the teacher to student ratio is out of control. The norm in public school is 31 students to 1 teacher. Most classes are 30 to 45 minutes in length. After roll call, going over the daily lesson, passing up homework, etc. , there is less than 1 minute available for each student to communicate with the teacher. Homeschool advocates are concerned that sometimes this means that the quality of education a child gets in public school is not as good as that of homeschool. Many students believe that the education they are getting is quite adequate. They are sure that half the things they learn in class they will not need in â€Å"real life† anyway. They assume the free ride through college from their high school football career will get them everything they need in life. Children who have this belief are sorely mistaken. If they are not equipped with the communication skills, and life skills, as well taught esponsibility then why have the great football career? They will have no idea how to negotiate terms, negotiate contracts, or how to properly spend and invest their income. These are all vital things that a child needs to be taught. Homeschool parents believe that they can instill in their children all of those things. No extracurricular activities for homeschoolers, you say? Wrong!! There are programs that allow homeschool children to take some of their classes in a private school type setting to allow them to play on the local high school football team. As long as their grades and transcripts are all in order, they can be just as successful and get scholarships just as a public school student. We, as parents have to make our own decisions about how our children are educated. Whether they are public or home schooled, we have to ensure that our children are getting the best possible education, in the best environment, by the best teachers. It is not our job to be sure that they are the most popular, or the class favorite. It is our job to make sure that they are educated, moral, responsible, well rounded individuals no matter the method by which they are educated.

Thursday, August 29, 2019

Answering questions

This theory states that attention can be divided into two separate states, wherein one can attend to two things or stimuli at the same time, without sacrificing the quality of attention given to either of the two stimuli (Reisberg, 2001). Thus to the comedian, one can continue listening to the radio and at the same time look for the house number, and it perfectly makes sense to him that a person can do both of it since it does not really require an intense concentration. However, a case in point is that looking for a house number in a long row of houses may be quite a challenging task, one that requires concentration and selective attention. Yes, it can be said that keeping the radio on would not make any difference but to those who prefer to look closely and to be able to do so safely would naturally turn their radios off. Just imagine yourself driving slowly in a street you are unfamiliar with and keeping the radio on would mask the noise of incoming traffic or even pedestrians. Besides, when a person is involved in one task, like looking for a house, then one instinctively attends to it and disregards the other sounds, sights and disturbances in the immediate environment. Divided attention is very real, we engage it once in a while especially if we multi-task but we could do so in a limited period, for example think of how you can possibly manage to entertain questions from an officemate at your table and at the same time talk to someone on the phone, you could do both for a maximum of 2 minutes, but eventually one stimuli takes greater attention and we must give our full attention to it. On the other hand, with training, anybody can make use of divided attention, but its contributions and benefits in engaging in it remains to be seen since much research has to be done in this area. 2-B. Based on what you have learned about perception and attention, do you think it’s safe for people to talk on cellular phones while they are driving? Learning about how we perceive the world around us gives us a better way of understanding how intricate the human mind is and how even a faculty that we often take for granted can have a profound impact in our daily lives. Perception refers to a complex process of how we receive a stimuli, how our brain process the stimuli, and how our mind tells us what to do and how to react to the stimuli (Reisberg, 2001). It can be said that a disruption of any of the lines of our perception may have adverse consequences; sometimes it can be bizarre, like when a person cannot recognize the face of love one but instead are able to say that they look like a family member. Taking our study of perception into our daily activities, a debated issue like â€Å"is it safe to talk on the cell phone while driving† is better explained. I still believe that it is not safe to talk on the cellular phones while driving. Driving already entails a number of processes and is quite demanding of our attention, like when you are in the freeway, one has to be conscious of incoming traffic, cars at you back, the speed limit of the highway, and even looking out for possible mishaps in the road, on top of which, the driver must be conscious of the cars fuel level, brake fluid and tire conditions. So how could anybody be able to talk on the phone while driving? Talking on the phone also demands attention; we have to perceive and process what the other person is saying, and to even think of the appropriate response to what they are saying. Theories on perception have stated that our mind works overtime just to process and be able to respond to external stimuli, and that each part of the brain is involve in different ways just to come up with the correct processing of information (Reisberg, 2001), like being able to recognize faces of family members. Perceptual illusions demonstrate that what we see may not be true or real, hence while driving we may not be able to accurately tell how far we are from the car ahead of us or how near we are to the railings without our full concentration. Reports have shown that many people die on the road or in car accidents than any disease. Perceptual overload occurs when we drive and talk on the phone, based on previous researches (Reisberg, 2001), perceptual overload makes us incorrectly perceive our surroundings and hence we may see what is not there, or we may not see what is really there. When we overload our senses it would mean that one part of the brain or our faculties might be sacrificed to compensate for the attention we give to another stimulus. And in an activity like driving which in itself is a high-risk behavior, we need complete control of our faculties, thus talking on the cell phone is not advisable. 2-C. Write a 200 word summary and critical analysis on Rayner’s article. Discuss what the article is basically about, its strong and weak points, how convincing (or unconvincing) you find its arguments, and how it might be followed up (e.g., if you think the article suggests any promising, new ideas for future research, describe what they are and how they might best be pursued.) The article â€Å"Eye Movements in Reading: Recent Developments† by Keith Rayner (1993) presents the latest development in the study of eye movement in the reading process. The strength of the article is that it gives a background of what has been discovered so far in the field of study, the article argues that studying eye movement is important for it help build theory and also used to infer perceptual and cognitive processes during reading thus the objective of the article. It also presents a number of theories that have used new methods in studying eye movement. What was weak about the article was that it was not able to connect how the new methods of studying would contrite to a better understanding of the cognitive processes that occur during reading. The article basically was not convincing when the author says that much remains to be seen when researchers realize how interesting a research data eye movement can be. The article does not arouse this interest and simply goes on to say that eye movement is a natural consequence of reading, which contradicts his claims earlier in the introduction part. The article was also too technical for the average reader even if the reader is interested in eye movement. References Rayner, K. (1993). Eye movements in reading: Recent developments. Current Directions in Psychological Science, 2 (3): 81-85 Reisberg, D. (2001). Cognition: Exploring the science of the Mind, 2nd ed. New York: W.W. Norton Company, Inc.

Wednesday, August 28, 2019

HMNT Ripple Effect Essay Example | Topics and Well Written Essays - 250 words

HMNT Ripple Effect - Essay Example Other positive effects of popular culture include ability to create positive role models, draw the line between good and bad and deliver this understandable message to wide masses without a doubt that the majority will get everything rights. Popular culture is controlled by authorities who serve as censors; they label content, ban it or ask to modify it if needed. There are legal definitions for obscenity, indecency and profanity that create certain legal frame for content creators (Obscenity, Indecency and Profanity: Its Against the Law). In some sense, popular culture controls society telling what to like and what to do. Also, it unifies people who come from different backgrounds and makes it easier for them to live together. Even though there are still many ongoing discussions about gender portrayals in art (Onstad, 2008) and racist messages (Vedantam, 2008), they depict a great progression in liberal though compared to what was popular 20 or even 10 years ago. Since popular culture is created by people, it is obvious that society has a great influence on it. Culture is the reflection of society of its creators; attitudes, moods, events, trends, roles and even political situations serve as factors of influence. Culture influences people in response popularizing certain ideas, spreading information, depicting changes and introducing new ideas to all. In this way, society and culture influence each other; they co-exist in complex relationships and change together. Vedantam, S. (2008, March 24).Unequal perspectives hyperlink "http://proquest.umi.com.ezp.waldenulibrary.org/pqdweb?did=1450200881&sid=4&fmt=3&clientid=70192&rqt=309&vname=pqd"onhyperlink "http://proquest.umi.com.ezp.waldenulibrary.org/pqdweb?did=1450200881&sid=4&fmt=3&clientid=70192&rqt=309&vname=pqd" racial equalityhyperlink "http://proquest.umi.com.ezp.waldenulibrary.org/pqdweb?did=1450200881&sid=4&fmt=3&clientid=70192&rqt=309&vname=pqd".The Washington Post,HYPERLINK

Tuesday, August 27, 2019

History of Russia Essay Example | Topics and Well Written Essays - 3000 words

History of Russia - Essay Example ever, later internal conflicts, political tension as well as socio-economic difficulties of the country forced it to go for a bloody revolution which brought into power Lenin and so called Bolsheviks. Joseph Stalin was part of the Communist Party of Russia, which was instrumental behind the revolution of 1917. Joseph Stalin was one of the most important characters in the history of Russia after revolution. The revolution that was materialized by Lenin and has comrades finally resulted into establishing the dictatorship of Joseph Stalin. He was the General Secretary of the Communist Party of Russia until his death and rose to the prominence only after the death of Lenin. His rise to the power is a really interesting story because he carried forward the beliefs and values which he adapted as a child and as an adolescent. His era was one of the most important eras for Russia in terms of economic progress as there was a massive shift from rural based economy to more industrial economy within Russia. In order to assess whether the era of Stalin represented a significant break from the course begun by Lenin and his party, it is very important that we must first understand the circumstances behind the rise of Stalin to the power. Stalin’s early life wasn’t well as he was born in a family which was not financially well off however, as he grew, he developed himself as a person who has great liking for bank robberies, kidnapping, extortion etc. since his joining of the Communist party, he took active part into such activities and was jailed too. However, he continued to impress the leaders within the communist party for his superiority in executing such activities. The Russian revolution was largely a result of internal socio-economic conditions, which were mostly considered as oppressive and were against the interest of the common Russian. The Tsars of Russia was mainly behind creating political tension within the country which was also widening the class gap within

Monday, August 26, 2019

International Ethics Assignment Example | Topics and Well Written Essays - 500 words

International Ethics - Assignment Example Lastly, illegal immigrants pose serious problems to the states, imposing enormous economic costs and are a major concern in the times of today. In the recent years the outbreak of the global war on terror has raised serious issues of human rights and distributive justice in the international system. According to scholars "the term  distributive justice  refers to fair, equitable, and appropriate distribution determined by justified norms that structure the terms of social cooperation" (Beauchamp and Childress, 226). Moral and ethical troubles take place with distributive justice when there is tug war for resources. Also with the ongoing war on terrorism serious human right violations are observed, bloodshed of innocents, torture and targeted killings of many etc. Human rights are relevant to terrorism as concerns both its victims and its perpetrators ( Zalman). It is believed by many that for a state to emphasize on its national security, it has to steal away the rights of others resulting in concerns of human security and distributive justice. These beliefs however vary in different schools of thoughts. Where war is inevitable for realists, the idealists view it unnecessary, unethical and immoral.  Idealism holds that a state should make its internal political  philosophy  the goal of its foreign policy which is never war. A â€Å"realist† foreign policy of a state places national interests and security above ideology, ethics and morality (Ziring et al, 9). The idealist school believes that foreign policy must reflect the ethical, moral and philosophical values of the country. Realists approach would defend and promote violation of human rights and distributive justice for the defense of national security however an idealists approach would condemn that. As a Secretary of Foreign Policy and International Ethics I would design an assessment which would

Sunday, August 25, 2019

Marketing Plan for Crystal Pepsi Term Paper Example | Topics and Well Written Essays - 2000 words

Marketing Plan for Crystal Pepsi - Term Paper Example PepsiCo was founded in 1965 following a merger between Pepsi-Cola and Frito-Lay. Its motto is ‘Something for everyone’. The company operates in over 200 countries across the globe and generates sizeable net sales annually. Crystal Pepsi was first introduced in 1992 but was withdrawn by the end of 1993 due to very low sales. However, it is possible to re-launch the product through intensive marketing activities and flavor changes.The company’s first priority is to build and manage its brand through the yet to be established Brand Charter. Above all, the company needs to increase its marketing endeavors to be able to compete effectively with the giants in the industry. The company intends to generate over $1.78 billion in net sales before the end of 2015 from Crystal Pepsi by investing about $850 million in marketing endeavors within the next three years, ending 2015.The mother of PepsiCo was Pepsi Cola Company, which was founded in 1898 in North Carolina. In 1965, PepsiCo was formed following a merger between Pepsi-Cola and Frito-Lay. PepsiCo motto is ‘Something for everyone’, a statement that perpetuates consumer inclusion. The company produces assorted beverages and snacks, which are sold in over 200 countries across the globe. PepsiCo generated net sales of $66.5 billion and $57.8 billion in 2011 and 2010 respectively. 1.2 Past Crystal Pepsi.The introduction of Crystal Pepsi in 1992 was informed by health concerns, especially increasing levels of obesity. As a result, PepsiCo promised its customers and consumers that it will use healthy ingredients to produce products and provide health benefits in its products. Since its inception on 12th April 1992, Crystal Pepsi had been perceived as a fad because it failed to deliver its value propositions to its consumers (Susan 53). In addition, its name was controversial, especially when connected with the brand Pepsi known to many for its coke products, which are considered to contain caffeine and caramel. In fact, it tasted like coke though colorless thus confusing the consumers. As a result, its sales momentum faded in 1993 and it was thus discontinued. 1.3 Strategic Opportunity Most people are becoming health conscious, therefore, there is need to provide products that meet their needs. According to PepsiCo Chief Executive Officer (CEO) Ms. Nooyi, PepsiC o need to be refocused to accommodate emerging needs of health conscious consumers. In response to this need, the company continues to invest to grow its nutritional business from $10 billion to $30 billion in annualized sales by end of 2030. Again, PepsiCo needs to advertise more. Unlike, Coca- Cola Company whose products are featured regularly in most advertising, PepsiCo brands appear less in commercials. As a result, Coca cola and diet coke are brands that rank first and second before any Pepsi product because it spends more on advertising. If PepsiCo positions itself properly, it will gain from 14.5% growth expected to be experienced in the industry by the end of 2016 to reach annualized sales of $222.7 billion (Market-Line 22-26). 1.4 Objectives 1. To sell over 407.6 million litres of Crystal Pepsi and generate about $400 million from North America, Canada, China and Middle East regions by 31st December 2013 2. To sell over 611.4 million litres of

Research report Essay Example | Topics and Well Written Essays - 2000 words - 1

Research report - Essay Example versal view of their connection list that are constructed in the system.† Information and technology bequeath the present society with numerous interactive segments with the help of internet and gadgets of communication. Numerous interactive segments are provided by the social network sites depending on the motives of their founders. There are for example business, academics, sports, political, social, religion, and romantic platforms. It can be said that these sites are in position to entertain, inform, educate, and to create very strong feelings on their followers. Ever since they started, social sites such as twitter, Skype, MySpace, and Facebooks, among others have reportedly become ‘attention-grabbers’ for majority of those who use them as they have taken them as part and parcel of their day to day routine (Pedrycz, W., & Chen, S.-M. 2014). Presently there are numerous sites with varying features geared to suit their followers’ interests, and can be accessed through gadgets that have internet access. Basically social network sites are online services or platforms that aim at reflecting and building people’s relationship socially those for instance that have or share common activities and interests. The fame of social network sites increases as each second unfolds. They have become important tool of communication to their users and because of this trend learning institutions are now increasing using them to interact with learners as well as member of the teaching staff. Because of their continued use of social network sites drastic steps are being outlined by institutions to enlighten their students on social network sites usage and most so psychological dangers, legal issues, socio-economic and privacy issues. It also encourages students to live together and in harmony, bringing workload and additional responsibility, and collaborating and sharing which may appear to be forced and inflexible to some students (Naidu, 2005). In his studies, Gross

Saturday, August 24, 2019

Arbitrage Research Paper Example | Topics and Well Written Essays - 250 words

Arbitrage - Research Paper Example In this case, the call price is $1.15 while the put price is $0.55. The stock price of the company does not pay any dividends. This shows that an arbitrage position does not exist for the firm. This is because the difference between the two prices is fairly small and the company already has the stocks at the exercise price (Chen, 2005). The time of expiry is only 60 days and the stocks can perform better than if they were sold for immediate profits by the company. It would therefore get a loss in the long term if arbitrage is exercised. The annual interest rate receivable by the company is a factor in calculating the value of the stock and given that it is 12% then the possibility of receiving prices above this when arbitrage is used is quite minimal. There are other costs that are involved when making a call such as the brokerage fees and taxes on capital gains, it is simpler to hold onto the shares and

Friday, August 23, 2019

Bio answeres Essay Example | Topics and Well Written Essays - 750 words

Bio answeres - Essay Example In the same way, the latitude and longitude of northern Minnesota; the source of Mississippi River is 43 ° 34N to 49 ° 23N and 89 ° 34W to 97 ° 12W.  The elevation of northern Minnesota is between 900 and 1100 feet while that of the Gulf of Mexico south of New Orleans is at sea level (0). The change in gradient is zero. Some of the significant tributaries of Mississippi River include Ohio River, Red River, Arkansas River, and Snake River., St. Croix River, Minnesota River, White River, Kaskaskia River, and Missouri River, as well as Des Moines River (Scott, 2010).   The Holocene commenced at the end of the Pleistocene (11,700 calendar years BP), and continues to date. The Holocene consists of the growth and impacts of the human species globally, for instance, all its written history and development of major civilizations, as well as the overall transition towards urban living currently (Walker et al., 2009). The effect of humans of the modern era on Erath together with its ecosystems can be regarded of universal significance for future living species’ evolution. The major events of the Holocene were: the recessation of the Quaternary Ice Age that led to the commencement of the current interglacial, which is the rise of human civilization; formation of the Sahara from the savannah; commencement of agriculture; the Stone Age cultures gave way to the Bronze Age (3300BC) as well as the Iron Age (1200BC). This gave rise to numerous prehistoric across the globe; even though climate has been fairly stable over the Holocene, from 1400 to 1850, t he Little Ice Age caused a momentary cooling in the Northern Hemisphere; due to industrial revolution, the atmospheric carbon dioxide levels increased from about 270 parts per million volume to the current volume of 410 parts per million volume (Roberts, 1998).   The recorded weather data for Houston, Texas for January 24, 2015 predicted

Thursday, August 22, 2019

Money Is Not Everything Case Essay Example for Free

Money Is Not Everything Case Essay 1. According to C.S. Lewis there are three things morality is concerned about , what are those things? Explain each one. Morality, then, seems to be concerned with three things. First, with fair play and harmony between individuals. Second, with what might be called tidying up or harmonizing the things inside each individual. Third, with the general purpose of human life as a whole: what man was made for: what course the whole fleet ought to be one: what tune the conductor of the band wants it to play a. Personal – What’s the use of thinking and just drawing up rules if we don’t think that the courage and unselfishness of individuals is ever going to make any system work b. Communal – Kindness and fair play between nation, classes and individuals c. Purpose – the thinking that every individual lives on forever. This means that we are more valuable than anything in the world which will come to an end. 2. What are the 4 Cardinal Virtues? (Give a definition of cardinal and each of the virtues)? Cardinal virtues are virtues which are common to all people, Christian or not. It is derived from a Latin word meaning ‘the hinge of a door’ because they are pivotal d. Prudence – practical common sense; harmless as doves but also as wise as serpents e. Temperance – putting a limit to one’s â€Å"addictions† f. Justice – â€Å"fairness† g. Fortitude – 2 kinds of courage, faces danger and sticks it under pain; guts 3. What does it mean for commitment to be â€Å"elusive?† Breaking a commitment for a â€Å"higher† commitment; Breaking a commitment is considered bad by society; the less you think about your commitment, the deeper it is 4. What is the meaning of the statement â€Å"Commitment is a choice and a promise?† And how does it relate to freedom? Though we have a choice, people allow themselves to be afflicted with the voluntary slavery of indetermination. The promise is a particular kind of choice. Unlike every other choice we make, what is unique about a promise is that it describes something we intend to do in the future, whereas any other choice is a formal determination about the present. By giving my word, I am assuming an obligation, but I do more than that. I yield to another, or others, a claim over myself by creating an expectation in them concerning what I say I will do for them. Since we are given choices, it means that we have freedom. As more choices are given to us, we feel that there is more freedom. Also, choosing a commitment means that you are doing what you want. You would never deliberately choose something that you don’t want. In the end, you will feel more free with your commitment because you are doing something that you like doing. 5. Explain the meaning of conscience having both a subjective and objective aspect. Subjective: It is ours, we are responsible for how we decide Objective: it transcends our individualistic, private notions and â€Å"bind† us, calling us ur of ourselves into relation with others and before God 6. What is the difference of â€Å"fear conscience and philosophical-ethical conscience?† Fear conscience: â€Å"Baka mahuli ako† Philosophical: â€Å"Hindi magandang magnakaw† 7. What are the two axial commitments according to Haughey? Explain at least one of them? (note: you can decide just to give one or two examples for each axial commitment) h. The first is the commitment of God to His Son i. Self-donation as a general description 1. I am not growing this relationship. Should I end it? 2. Is self-donation opposed to freedom? ii. Complete commitment to the other in love is at the heart and core of the internal life of God Himself iii. Commitment is an essential part of existence iv. Commitment generates communion v. Commitment is compatible to freedom (self-donation) i. The other is Jesus’ commitment vi. Commitment is a process (Not a single act) vii. Commitment is motivated by love 3. Love one another as I have loved you viii. Commitment is about communion 4. As the Father has loved me, so have I loved you. Abide in my love ix. Commitment has a clear direction 5. No one comes to the Father except through me x. Commitment involves freedom 6. No one takes it from me, but I lay it down of my own accord 8. What does it mean for Jesus’ commitment to be totally free? j. For this reason, the Father loves me, because I lay down my life that I may take it up again. No one takes it from me, but I lay it down of my own accord. I have authority to lay it down, and I have authority to take it up again. This charge I have received from my Father. 9. What is the meaning of this statement, â€Å"The purity of the commitment means you dont just make it, you yield to it—(freely, gladly made)†? 10. What is the meaning of this statement, â€Å"The commitment that is rooted in mutual presence of oneself and God more likely will be preserved?†

Wednesday, August 21, 2019

How To Secure Routers And Switches Information Technology Essay

How To Secure Routers And Switches Information Technology Essay You have been approached by your manager give a talk on the Network security standard ISO 17799. Write a short precise detailing the purpose of this document and the main components within parts 1 and 2 of the document. (http://www.17799central.com/iso17799.htm) Write a brief analysis detailing the possible threats and consequences for a company that does not have an adequate Security Policy. Write a summary of how an Edge router can be configured into a firewall; include detail of how it can be used to filter traffic. Describe the operation of CBAC Detail the encryption techniques that are used in VPN systems and explain how/when they are used. Describe how you can secure/harden routers and switches Router hardening, password requirements, ssh, parser views, etc Port security, vlan hopping, anti-snooping, private vlans Multi-choice Review Questions 1. In which type of attack does the potential intruder attempt to discover and map out systems, services, and vulnerabilities? stake out reconnaissance tapping sniffing 2. Which type of attack prevents a user from accessing the targeted file server? Reconnaissance attack Denial of service attack Prevention of entry attack Disruption of structure attack 3. Which type of action does the ping sweep pose to an organization? eavesdropping reconnaissance denial of service unauthorized access 4. An employee of ABC Company receives an e-mail from a co-worker with an attachment. The employee opens the attachment and receives a call from the network administrator a few minutes later, stating that the employees machine has been attacked and is sending SMTP messages. Which category of attack is this? B) denial of service trojan horse port scanning password attack social engineering 5. What is a major characteristic of a Worm? D) malicious software that copies itself into other executable programs tricks users into running the infected software a set of computer instructions that lies dormant until triggered by a specific event exploits vulnerabilities with the intent of propagating itself across a network 6. A large investment firm has been attacked by a worm. In which order should the network support team perform the steps to mitigate the attack? A) A. inoculation B. treatment C. containment D. quarantine C,A,D,B A,B,C,D A,C,B,D D,A,C,B C,B,A,D 7. At XYZ Company, the policy for network use requires that employees log in to a Windows domain controller when they power on their work computers. Although XYZ does not implement all possible security measures, outgoing traffic is filtered using a firewall. Which security model is the company using? D) open access closed access hybrid access Restrictive access 8. Which three of these are common causes of persistent vulnerabilities in networks? (Choose three.) new exploits in existing software misconfigured hardware or software poor network design changes in the TCP/IP protocol changes in the core routers on the Internet end-user carelessness 9. A new network administrator is assigned the task of conducting a risk assessment of the companys network. The administrator immediately conducts a vulnerability assessment. Which important task should the administrator have completed first? threat identification security level application patch and update deployment asset identification perimeter security upgrade 10. A company deployed a web server on the company DMZ to provide external web services. While reviewing firewall log files, the administrator discovered that a connection was made to the internal e-mail server from the web server in DMZ. After reviewing the e-mail server logs, the administrator discovered that an unauthorized account was created. What type of attack was successfully carried out? phishing port redirection trust exploitation man-in-the-middle 11. Users are unable to access a company server. The system logs show that the server is operating slowly because it is receiving a high level of fake requests for service. Which type of attack is occurring? reconnaissance access DoS worms, viruses, and Trojan horses 12. Which two are examples of Distributed Denial of Service attacks? (Choose two.) B) D) SYN Flood Stacheldraht Ping of Death Smurf WinNuke Targa.c 13. Which two of these are examples of DDoS network attacks? (Choose two.) A) B) smurf attack Tribal Flood Network (TFN) teardrop.c man-in-the-middle attack port redirection social engineering 14. Which two are technological weaknesses that can lead to a breach in an organizations security? (Choose two.) C) D) software compatibility weakness DHCP security weakness TCP/IP protocol weakness operating system weakness LDAP weakness 15. What is the effect of applying this command to a Cisco router? E) router(config)# no service finger UNIX commands are disabled on the router. All TCP/IP services are disabled. PING usage is disabled. Users logged into the router remotely will not be able to see if other users are logged into the router 16. A partial router configuration is shown in the graphic. The network administrator adds the following command at the router prompt. router(config)# security passwords min-length 10 Which of the following is correct? A) The current password will continue to be used as a valid password until changed. No password is required. The current password is invalid and will not allow a login. A password that is at least ten characters long must immediately be implemented for a successful login. 17. The Security Wheel promotes a continuous process to retest and reapply updated security measures. What is the core or à ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€¦Ã¢â‚¬Å"hubà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ã‚  component of the Security Wheel? D) testing policy monitor improve security policy 18. After providing for all operational requirements of the network, the network support team has determined that the servers should be hardened against security threats so that the network can operate at full potential. At which stage of the network life cycle does server hardening occur? E) planning design implementation operation optimization 19. A network administrator installs a new stateful firewall. Which type of security solution is this? secure connectivity threat defense policy enforcement trust and identity authentication 20. XYZ Company recently adopted software for installation on critical servers that will detect malicious attacks as they occur. In addition, the software will stop the execution of the attacks and send an alarm to the network administrator. Which technology does this software utilize? host-based intrusion detection host-based intrusion protection host-based intrusion prevention host-based intrusion notification 21. A security team is charged with hardening network devices. What must be accomplished first before deciding how to configure security on any device? Audit all relevant network devices. Document all router configurations. Create or update security policies. Complete a vulnerability assessment. 22. Which two objectives must a security policy accomplish? (Choose two.) provide a checklist for the installation of secure servers describe how the firewall must be configured document the resources to be protected identify the security objectives of the organization identify the specific tasks involved in hardening a router 23. Which router command will result in the router only accepting passwords of 16 characters or more? service password-encryption enable secret min-length 16 security passwords min-length 16 security passwords max-length 16 24. Which command will encrypt all passwords in the router configuration file? D) enable secret password encrypt all enable password-encryption service password-encryption no clear-text password 25. MD5 can be used for authenticating routing protocol updates for which three protocols? (Choose three.) B), D) E) RIPv1 RIPv2 IGRP EIGRP BGP 26. Which configuration will allow an administrator to access the console port using a password of password? B) router(config)# line aux 0 router(config-line)# login router(config-line)# password password router(config)# line console 0 router(config-line)# login router(config-line)# password password router(config)# line console 0 router(config-line)# password password router(config)# line console 0 router(config-line)# access router(config-line)# password password router(config)# line vty 0 router(config-line)# password password router(config)# line vty 0 router(config-line)# access router(config-line)# password password 27. Which command sets the inactivity timer, for a particular line or group of lines, to four minutes and fifteen seconds? E router(config)# line-timeout 4 15 router(config-line)# line-timeout 4 15 router(config-line)# exec-timeout 255 router(config-line)# timeout 255 router(config-line)# exec-timeout 4 15 router(config-line)# line-timeout 255 28. Which encryption type uses the MD5 hash algorithm? Type 0 Type 1 Type 5 Type 7 29. Which privilege level has the most access to the Cisco IOS? level 0 level 1 level 7 level 15 level 16 level 20 30. Which algorithm implements stateful connection control through the PIX Security Appliance? Network Address Translation Algorithm Access Control Security Algorithm Adaptive Security Algorithm Spanning Tree Protocol Algorithm 31. The Cisco Security Device Manager (SDM) allows administrators to securely configure supported routers by using which security protocol in Microsoft Internet Explorer? B) IPSec SSL SSH L2TP PPTP 32. A network administrator has received a Cisco PIX Security Appliance from another division within the company. The existing configuration has IP addresses that will cause problems on the network. What command sequence will successfully clear all the existing IP addresses and configure a new IP address on ethernet0? B) pix1(config)# clear ip all pix1(config)# interface ethernet0 pix1(config-if)# ip address 192.168.1.2 pix1(config)# clear ip pix1(config)# interface ethernet0 pix1(config-if)# ip address 192.168.1.2 255.255.255.0 pix1(config)# no ip address pix1(config)# interface ethernet0 pix1(config-if)# ip address 192.168.1.2 255.255.255.0 pix1(config)# clear ip pix1(config)# interface ethernet0 pix1(config-if)# ip address 192.168.1.2 0.0.0.255 33. A network team is configuring a Cisco PIX Security Appliance for NAT so that local addresses are translated. The team is creating a global address pool using a subnet of network 192.168.5.0 with a 27-bit mask. What is the proper syntax to set up this global address pool? B) pix1(config)# global (inside) 1 192.168.5.33-192.168.5.62 pix1(config)# global (outside) 1 192.168.5.33-192.168.5.62 pix1(config)# global (inside) 1 192.168.5.65-192.168.5.95 pix1(config)# global (outside) 1 192.168.5.65-192.168.5.95 pix1(config)# global (inside) 1 192.168.5.64-192.168.5.127 pix1(config)# global (outside) 1 192.168.5.65-192.168.5.127 34. A network administrator has configured an access control list on the Cisco PIX Security Appliance that allows inside hosts to ping outside hosts for troubleshooting. Which debug command can be used to troubleshoot if pings between hosts are not successful? debug icmp inside outside debug ping debug icmp trace debug trace icmp 35. Which protocol provides time synchronization? STP TSP NTP SMTP L2TP 36. Which command would configure a PIX Security Appliance to send syslog messages from its inside interface to a syslog server with the IP address of 10.0.0.3? D pixfirewall(config)# syslog inside 10.0.0.3 pixfirewall(config)# logging inside 10.0.0.3 pixfirewall(config)# syslog host inside 10.0.0.3 pixfirewall(config)# logging host inside 10.0.0.3 37. The configuration in the graphic has been entered into a PIX Security Appliance with three interfaces. The interfaces are inside, outside, and DMZ. What source address range will the traffic from inside devices use when they access devices in the DMZ? 10.0.0.1 to 10.0.0.254 172.16.0.20 to 172.16.0.254 172.16.0.1 to 172.16.0.254 192.168.0.20 to 192.168.0.254 10.0.0.1 to 10.255.255.254 38. What source IP address will the traffic from devices in the 10.0.2.0 network have when they leave the trusted network? C) 192.168.0.8 always 192.168.0.9 always 192.168.0.8 if ports are available, or 192.168.0.9 if 192.168.0.8s ports are exhausted 192.168.0.9 if ports are available, or 192.168.0.8 if 192.168.0.9s ports are exhausted 39. The commands in the graphic have been entered into a PIX Security Appliance. Which two statements are accurate descriptions of what will happen to outgoing traffic when it leaves the trusted network? (Choose two.) B) C) The source IP address will be from a pool of addresses in the 192.168.0.3 to 192.168.0.254 range. The source port will be a random port above port 1023. The source IP address will be 192.168.0.2 for all outgoing traffic. The source port will be port 1024. The source IP address will be in the range 10.0.0.1 to 10.0.255.254. 40. Interface Ethernet3 on a PIX Security Appliance has been configured with three subinterfaces to pass tagged traffic from three different VLANs. What protocol will be used to tag the VLAN traffic? ISL 802.1x VTP 802.1q 41. Which two commands will configure a static default route on the PIX Security Appliance in the network shown in the graphic? (Choose two.) route inside outside 0.0.0.0 0.0.0.0 172.16.0.2 1 route outside 0.0.0.0 0.0.0.0 172.16.0.2 1 ip route inside outside 0 0 192.168.0.2 1 route outside 0 0 172.16.0.2 1 ip route inside outside 0 0 172.16.0.2 1 route outside 0 0 192.168.0.2 1 42. How are transactions between a RADIUS client and a RADIUS server authenticated? by using a shared secret which is never sent over the network by hashing the secret using MD5 and then sending it over the network by hashing the secret using MD4 and then sending it over the network by using a clear-text password and then sending it over the network 43. RADIUS uses which transport layer protocol? C) IP TCP UDP ICMP DLC 44. Which authentication method is susceptible to playback attacks? C) passwords using S/KEY passwords using token card passwords requiring periodic change passwords using one-time password technology 45. Which authentication method sends passwords over the network in clear text yet protects against eavesdropping and password cracking attacks? C) authentication with FTP authentication with Telnet authentication with S/KEY authentication in POP3 e-mail 46. After a security audit, network managers realized that the authentication method used by their telecommuting employees needed to be improved. They set up a server and installed client software on the employee laptops of their remote users. They also provided a device for each remote user that generated a password every time they needed to make a remote network connection. Which authentication technology does this process describe? B) authentication with S/KEY authentication with token card authentication with encrypted password authentication with compressed password 47. What function does a digital certificate offer to information security? C) authorization accounting nonrepudiation intrusion prevention 48. Bookline Inc., an online bookstore, recently installed a web server running Microsoft Windows 2003 Server. Where should the company obtain a digital signature for the web server in order to assure customers that they are connecting to Booklines server and not an impersonating web server? a digital signature generated by the CA in Microsofts corporate headquarters a digital signature generated by the CA from a trusted third party a digital signature generated by the CA from a government agency a digital signature generated by any CA that establishes a secure connection 49. A large law firm wishes to secure dialup access to its corporate network for employees working at home. Since much of the data to be transmitted is highly confidential, the firm requires a high level of encryption and also prefers that each component of AAA be provided separately. Which security protocol best meets these requirements? TACACS XTACACS TACACS+ RADIUS 50. What are three reasons TACACS+ is preferred over RADIUS for authentication services? (Choose three.) RADIUS has limited name space for attributes. RADIUS is not an industry supported standard. TACACS+ encrypts the entire TACACS+ packet. TACACS+ authentication is included with more recent Windows Server versions. TACACS+ separates authentication and authorization. RADIUS uses TCP as a transport protocol creating additional overhead 51. A static username/password authentication method is susceptible to which three types of attacks? (Choose three.) playback theft teardrop syn flood eavesdropping 52. Company security policy requires the use of a centralized AAA server for network access authentication. Which two protocols are supported by the AAA server? (Choose two.) C) D) IPSec SSL RADIUS TACACS+ SSH 53. Which three are functions of AAA? (Choose three.) A), C) E) accounting availability authentication architecture authorization accessibility 54. A network administrator wishes to use port-level authentication technology to determine network access and assign IP addresses from different DHCP pools to authenticated and unauthenticated users. What standardized framework supports this objective? A) IEEE 802.1x IEEE 802.11af IEEE 802.1q IEEE 802.1p 55. What will be the result of executing the command in the graphic? C) The default login method will use TACACS+ only. TACACS+ accounting will be enabled at login. The enable password will be used if a TACACS+ server is not available. The default TACACS+ user shell will be enabled. 56. Which AAA service reduces IT operating costs by providing detailed reporting and monitoring of network user behavior, and also by keeping a record of every access connection and device configuration change across the network? authentication accreditation accounting authorization 57. What tool should you use to add a single user account to the Cisco Secure ACS for Windows user database? database replication Unknown User Policy RDBMS Synchronization Cisco Secure ACS HTML interface 58. Refer to the exhibit. Which two services can the network access server use to direct requests from the remote user to the Cisco Secure ACS authentication service? (Choose two.) CSAuth CSUtil RADIUS RDBMS TACACS+ 59. RTA(config)# tacacs-server key [emailprotected]? RTA(config)# tacacs-server host 10.1.2.4 RTA(config)# tacacs-server host 10.1.2.5 What will be the effect of these commands on router RTA? C) The TACACS+ server is now authenticating for the hosts 10.1.2.4 and 10.1.2.5. The TACACS+ server key has been exported to the hosts 10.1.2.4 and 10.1.2.5. The TACACS+ servers 10.1.2.4 and 10.1.2.5 and the router have been set to share the same authentication key. The TACACS+ servers are 10.1.2.4 and 10.1.2.5 and the configuration adds router RTA as a third TACACS+ server. 60. RTA(config)# aaa new-model RTA(config)# aaa authentication login default group tacacs+ enable After entering the configuration shown, the administrator loses the connection to the router before having the chance to create a new TACACS+ account. What is the easiest way for the administrator to regain administrative access to router RTA? C) Connect to the router, and use the default TACACS+ username and password. Erase NVRAM, and redo the configuration from scratch. Connect to the router, and supply the enable password. Perform a password recovery procedure on the router 61. Which command associates the group MYGROUP with the AAA server using the TACACS+ protocol? D) Pixfirewall(config)# aaa-server MYGROUP tacacs+ protocol Pixfirewall(config)# aaa-server protocol tacacs+ MYGROUP Pixfirewall(config)# aaa-server tacacs+ protocol MYGROUP Pixfirewall(config)# aaa-server MYGROUP protocol tacacs+ 62. Which configuration command defines the association of initiating HTTP protocol traffic with an authentication proxy name MYPROXY? C) Router(config)# ip auth-proxy MYPROXY http Router(config)# auth-proxy MYPROXY ip http Router(config)# ip auth-proxy name MYPROXY http Router(config)# auth-proxy name MYPROXY ip http 63. With the following configuration command, how long does the PIX Security Appliance try to access the AAA server 10.0.1.10 before choosing the next AAA server if there is no response from 10.0.1.10? aaa-server MYTACACS (inside) host 10.0.1.10 secretkey 12 seconds 15 seconds 20 seconds 30 seconds 64. Which command will enable AAA services on a router? B Router(config)# aaa enable Router(config)# aaa new-model Router(config)# aaa set enable Router(config)# aaa new-model enable 65. What is the default timeout in minutes for the inactivity-timer parameter of the ip auth-proxy command? 15 30 45 60 90 66. The network administrator configured the aaa authorization command below on the PIX Security Appliance. What is the effect of this command? pix(config)# aaa authorization include tcp/22 outside 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 auth1 FTP traffic from outside is subject to authorization by the AAA server. SSH traffic from outside is subject to authorization by the AAA server. HTTP traffic from outside is subject to authorization by the AAA server. SMTP traffic from outside is subject to authorization by the AAA server. 67. Which type of authentication is being used when authentication is required via the PIX Security Appliance before direct traffic flow is allowed between users and the company web server? C) access authentication console access authentication cut-through proxy authentication tunnel access authentication 68. What will be the effect in the router after these configuration commands are entered? B) Router(config)# ip auth-proxy name aprule http Router(config)# interface ethernet0 Router(config-if)# ip auth-proxy aprule An authentication proxy rule called aprule is created making all authentication proxy services available only through the ethernet0 interface. An authentication proxy rule called aprule has been created for the HTTP protocol and is associated with the ethernet0 interface. An authentication proxy rule called aprule has been created for all protocols except the HTTP protocol and is associated with the ethernet0 interface. An authentication proxy rule called aprule has been created for the HTTP server running internally to the router and is associated with anyone attempting to access the web server from the ethernet0 interface. 69. When Cisco IOS Firewall authentication proxy is enabled, a user sends HTTP traffic which will trigger the authentication proxy. What is the first action taken by the proxy? C) The user will be asked to supply a valid username and password. The TACACS+ server will be contacted to see if the user is a valid user. The authentication proxy will check to see if the user has already been authenticated. If the authentication proxy has no user account for the user, it will check to see if a default guest user has been defined. 70. A TACACS+ server is configured to provide authentication, authorization, and accounting. The IP address of the server is 192.168.50.1, and the AAA authentication encryption key is S3crtK3y. Which command sequence will configure a Cisco router to communicate with the TACACS+ server? D) Router(config)# aaa new-model Router(config)# aaa authentication default group tacacs+ Router(config)# aaa authorization auth-proxy default group tacacs+ Router(config)# aaa tacacs-server host 192.168.50.1 Router(config)# aaa tacacs-server key S3crtK3y Router(config)# aaa enable Router(config)# aaa authentication default group tacacs+ Router(config)# aaa authorization auth-proxy default group tacacs+ Router(config)# tacacs-server host 192.168.50.1 Router(config)# tacacs-server key S3crtK3y Router(config)# aaa enable Router(config)# aaa authentication login default group tacacs+ Router(config)# aaa authorization auth-proxy default group tacacs+ Router(config)# aaa tacacs-server host 192.168.50.1 Router(config)# aaa tacacs-server key S3crtK3y Router(config)# aaa new-model Router(config)# aaa authentication login default group tacacs+ Router(config)# aaa authorization auth-proxy default group tacacs+ Router(config)# tacacs-server host 192.168.50.1 Router(config)# tacacs-server key S3crtK3y 71. The lead network administrator notices that unknown users have made router configuration changes. These changes are adversely affecting the network. Which command can be entered on the router to help identify future configuration changes and who made these changes? aaa accounting show uauth aaa accounting console aaa accounting match 72. Refer to the exhibit. Since ABC, Inc. is strengthening security, a PIX Security Appliance firewall must be configured with AAA services. Accounting should be provided for all FTP and HTTP traffic from any host to the WWW server at 192.168.2.10. Which command sequence would successfully process the desired traffic to the NY_ACS accounting server? A pixfirewall(config)# access-list 110 permit tcp any host 192.168.2.10 eq ftp pixfirewall(config)# access-list 110 permit tcp any host 192.168.2.10 eq http pixfirewall(config)# aaa accounting match 110 outside NY_ACS pixfirewall(config)# access-list 110 permit tcp any host 192.168.2.10 eq ftp pixfirewall(config)# access-list 110 permit tcp any host 192.168.2.10 eq http pixfirewall(config)# aaa accounting access-list 110 outside 10.0.0.2 pixfirewall(config)# access-list 110 permit tcp any host 10.0.0.2 eq ftp pixfirewall(config)# access-list 110 permit tcp any host 10.0.0.2 eq http pixfirewall(config)# aaa accounting match 110 outside NY_ACS pixfirewall(config)# access-list 110 permit tcp any host 192.168.2.10 eq ftp pixfirewall(config)# access-list 110 permit tcp any host 192.168.2.10 eq http pixfirewall(config)# aaa accounting match 110 outside 10.0.0.2 73. Which command displays the current authenticated users, the host IP to which they are bound, and any cached IP and port authorization information on a Cisco PIX Security Appliance configured for AAA? B) pixfirewall(config)# show aaa all pixfirewall(config)# show uauth pixfirewall(config)# show aaa statistics pixfirewall(config)# show aaa-server 74. A user has initiated an HTTP session through a firewall and has been authenticated by an authentication proxy. They have not generated any traffic in a while and the idle timer has expired for that user. What will the user have to do to allow them to go through the firewall again? D) The user can manually restart the idle timer. The user can simply TFTP their user profile to t

Tuesday, August 20, 2019

Kotters Eight Step Change Management Model Management Essay

Kotters Eight Step Change Management Model Management Essay Change is the word that best described of the modern societies and culture. Change occurred in almost every aspects of life. Change presses us out from our comfort zone. People changed in their life to avoid stagnation and to improve their quality of life and become a better person. This is also true in business where the rapid change in technologies, the way of doing things, advances in information technologies, internal and external pressures, e-business and globalization creates a competitive environment in most organization in order to survive and to be relevant. How business react, operate and adapt to any changes determine the survivability of the company. In organization, change is necessary but often proves to be challenging. To guide a change (managing a change process) may be the greatest test for the leader of the organization especially when there is resistance. Therefore to lead a change is essential but difficult (Kotter 2007). The successfulness on implementing change in an organization requires a series of phase, a correct tools and proper planning. Palmer, Dunford and Akin (2009) quoted that Changing organizations is as messy as it is exhilarating, as frustrating as it is satisfying, as muddling-through and creative a process as it is a rational one (p. 1). On the other hand, Lean Six Sigma or Lean thinking has been widely accepted and adoptable tool for improving organizational performance. The thinking provides a method to do more with less without jeopardizing the quality, cost and delivery and at the same time meeting customers requirements. Less means less effort, less equipment, less time, less cost, less space and eliminating all sources of wastes in the process. Developed as a production systems eliminating wastes in the Toyotas manufacturing plant in 1960s, now lean thinking evolving across countries and industries as a management approach that improves all processes at each level of the organization. However, in realities, many organizations are not able to transform themselves to lean organization and unable to get the benefit out of it. Transformation initiatives towards the lean organization are full with challenges and resistances. Many companies that promote lean thinking, even those undertaken with the best intention are often destined to a failure due to its unsuccessful execution (Jeyaraman 2010). There are a lot of resistance factors and mostly can be divided into human and non-human factor. From Langstrand et al. (2012) In a member survey, the Lean Enterprise Institute (LEI) found that more than 36% of the respondents attributed change failure to middle management resistance. Along with employee resistance and supervisor resistance, these were considered three of the four most significant obstacles to implementing lean (LEI, 2007). According to (Norani 2011) lean transition requires emergent strategy and he suggested that among all the emergent change approaches, Kotters Eight-Step Change Management Model is one of the best-known change management model. Kotter (1996) suggested Eight-Step Change Management Model as shown on Table 1.1. Table 1.1: Kotters Eight-Step Change Management Model Step 1 Establishing a Sense of Urgency Step 2 Creating the Guiding Coalition Step 3 Developing A Vision And Strategy Step 4 Communication the Change Vision Step 5 Empowering Employees for Broad-Based Action Step 6 Generating Short-Term Wins Step 7 Consolidating Gains And Producing More Change Step 8 Anchoring New Approaches In The Culture This study will analyze the effectiveness of change steps efforts that have been taken during the implementation of Lean Six Sigma Program in government owned service oriented organization from a perspective of change management using the Kotters eight-step change management model as benchmarks. Background of The Study In todays fast-moving era, if there is an organization that is looking for the pace of change to slow or slow in their reaction to any response, is likely to be sorely disappointed and left behind. In fact, some says that, in businesses change is permanent. Change is important in every organization because without change, business would likely lose their market shares, competitive edge and fail to meet the various needs of the customers. SIRIM Berhad is also not neglected from the challenges of reacting more intelligently to customers needs to become more effective. SIRIM Berhad, formerly known as the Standards and Industrial Research Institute of Malaysia (SIRIM), is a corporate organization owned wholly by the Malaysian Government, under the Minister of Finance Incorporated. It has been entrusted by the Malaysian Government to be the national organization for standards and quality, and as a promoter of technological excellence in the Malaysian industry. The organization came into operation on September 1, 1996 via corporatization scheme of standards and industrial research institute, initiated by the government with the vision to be a corporation of choice for technology and quality. SIRIM Berhad as the national organization of standardization and quality, and as the prime mover in industrial research and development acts as a catalyst in bringing about national economic dynamism through excellence in technology and international acceptance of Malaysian products and services. Their mission is to enhance their customers competitiveness through technology and quality, and fulfill the needs of the shareholders. As such its role is to act as: A champion of quality. The national technology development corporation. Vehicle for technology transfer. A provider of institutional and technical infrastructure for the Government. SIRIM Berhad has initiated a program called Lean Six-Sigma Program (LSSP). LSSP is developed based on the infamous improvement methodology known as Lean Six Sigma Strategy. It was initiated based on the emerging needs to develop SIRIM to be a market driven organization with sustainable business growth and global market penetration. The proposal has been developed by Group Quality Occupational Safety Health and Environment Department (GQOSHE) in 2008. The main objective of the LSSP is to establish an Integrated Business Process Improvement (IBPI) system that builds on four initiatives namely Lean Six Sigma (LSS), Innovative and Creative Circle (ICC), Just Do It (JDI) and Personal Quality Program (PQP). The first three initiatives are continuous improvement methodology used to enhance business performance while the latter is a motivational and cultural conditioning program for SIRIM staffs. The continuous improvement initiatives were used to promote, nurture and inculcate innovative, creative thinking and learning culture into SIRIM to strengthen its business processes and systems in order to be a market driven organization. Problem Statement Upon acceptance of the proposal from President and Chief Executive, LSSP was officially started on January 28, 2008 followed by the directive to begin the Lean Six Sigma project implementation on few small scale pilot projects on February 29, 2008. Seven (7) departments / divisions of SIRIM Berhad have been selected for the pilot project. These departments have been participating in the Lean Six Sigma workshops and training program which comprise of Green Belt and Black Belt programs. The program focusing on areas as follows; To assist the existing project team to implement prioritized ICC projects, Lean Six Sigma Value Stream projects, To initiate Lean Six Sigma initiative at other SIRIM departments and, To certify the Green Belt who has fulfilled the certification process. During the training period, 19 projects initiated on cost saving activities and 9 of the projects have been completed. Based on value stream mapping (process analysis) conducted at participating departments, upon completion of all the prioritized projects, the program has estimated cost savings of RM300k per year (including project savings from Genba Kaizen 5S implementation). Other tangible benefits from the program are: Safer and more organize work place. Creation of work space and elimination of obsolete and out-dated items. Low and controllable stock keeping level of certain items such as stationeries, chemicals resulting to better cash flow and stock management. Improved process visibility and productivity. Lean Six Sigma Program (LSSP) is expected to be a new change program in SIRIM Berhad and the successful implementation of the program is important for sustainability and growth of the organization. Despite the 3 years of training program consists of briefings, training session and pilot projects, the program unable to reach its goal of transferring SIRIM Berhad to become lean organization and to embed lean thinking into the culture of the organization. From an early interview with some of the staff involved, it is confirmed that currently Lean Six Sigma has not been practiced in their section or department. The program seems to be abandoned and not getting enough coalition to sustain the initiatives. Research Objectives The objectives of this study are: To analyze the effectiveness of change steps efforts that have been taken during the implementation of LSSP with reference to Kotters Eight-Step Change Management Model. To determine the benefit of LSSP to the department during the implementation stages. To determine the weakness of LSSP to the department during the implementation stages. To make recommendation on the finding to the management of SIRIM Berhad on managing lean program and any change management initiatives. Scope of The Study This study will be focusing on the implementation stages of Lean Six Sigma program in SIRIM Berhad. The respondents will comprise of managerial and non-managerial employees that participated in the program before. This study is focusing the change management steps as per Kotters eight change steps of change management as a benchmark. Significance of The Study After the training period, Lean Six Sigma program seems to be abandoned and not getting enough coalition to sustain the initiatives but no formal and structured study has been done to understand why the program not achieving the expected outcome especially on the implementation process. Therefore this study is significant to fill the gap by assessing the implementation steps that have been taken during the implementation of the Lean Six Sigma program. The research will analyze the employees perception toward the effort of change steps that have been taken during the implementation. By understanding this, it will help the management to prepare the suitable and effective steps to improve the implementation of LSS program in SIRIM Berhad and also to be used as a guideline for any changes initiatives in the organization. This study will also provide value by identifying if Kotters popular change management model is also useful in government owned service organization. As a result, the outcome can also be used by other government owned organizations that will or are undergoing Lean Six Sigma initiatives by providing information concerning the applicability of Kotters eight-step change management model as a useful model on managing a change in their organization. Academician and lean consultant could also get the benefit from the findings on the effective way of managing lean in government owned service oriented organization. Limitation of The Study It is important to understand that this is a case-study. This study is limited only to the staff of SIRIM Berhad that involved during the implementation of LSSP. The survey is based on perception and subject to bias that could impact the end results. Therefore the sincerity of the correspondents during answering the survey is very important. Definition of Terms Black Belt Full time position responsible for leading project teams. They are responsible for delivering the value and benefits that were determined for each of their projects during the projects selection process. Green Belts A person who works on a Lean Six Sigma project only part-time, on a specific process about which he or she generally possesses knowledge important to the success of the project (Michele 2002). Kaizen Continuous improvement in Japanese. The kaizen process is modeled after quality circle, the team-based continuous improvement vehicle utilized in the Toyota production System. The secret to Kaizen is that it emphasize creativity before capital (Michele 2002). Lean Six Sigma The activities that cause the customers critical-to-quality issues and create the longest time delays in any process offer the greatest opportunity for improvement in cost, quality, capital, and lead time (Michele 2002). Value Stream The set of activities that convert customer needs into delivered products and services. Improving an entire value stream requires multiple projects (Michele 2002). CHAPTER 2 LITERATURE REVIEW Introduction Chapter 2 presents the literature review of the research study. This chapter is discussing about the change management, lean six sigma, change model, Kotters eight-step change management model and the research questions. Change Management Change is a reality of life. In the past five decades change/improvements initiatives have been driven by a lot of approaches. For example, in 1950s Management by Objectives (MBO), Employee Assistance Programs (EAPs) have been introduced. In 1960s to 1970s Sensivity Training, T-groups, Quality Circles, Corporate Culture have been used. The famous improvement initiatives such as ISO9000, Total Quality Management and Corporate Culture were introduced in 1980s and in 1990s Reengineering Agile Strategies, Horizontal Corporations, Employee Empowerment, Core Competencies and Vision have taken the scene (Palmer, I. et.al 2009). Motivations for change have been customers satisfaction, cost reduction, improved efficiency, improved quality, or, in extreme cases, survival (Longbothom et.al 2006). Self D.R and Schraeder M. (2009) explained that the first challenge organization faced during implementing change in the organization is recognizing the need for change and second, and possibly more significant is effectively deploying strategies to implement change. Contemporary literature outlines a multitude of various strategies for implementing change in an organization. Wikipedia (2012) defines Change Management as an approach to shifting / transitioning individuals, teams, and organizations from a current state to desired future state. Smith (2005) explained that change is a process of letting go of things as they are in order to take up a new ways of doing things. Organizational change normally challenges the status quo of the employee and it may challenge the values and perceived rights of workers and work group. For some people, change is welcome and relates to something new, fresh and exciting but for some people may be more cautious by seeking to test and examine before proceeding. Palmer et. al (2009) explained that there are six images of managing change. First is change manager as a director which gave an image of management as control and change outcomes as being achievable. Second is change manager as a navigator where the manager is in control of a given situation and the outcomes are partly emergent rather than completely planned and result from a variety of influences, competing interests and processes. Third is change manager as care taker is an ideal image of management is still one of control, although the ability to exercise control is severely constrained by a variety of forces, both internally and externally driven, that propel change relatively independent of managers intentions. Forth is change manager as a coach where the manager is in a position to shape the organizations capabilities in particular ways. Fifth is change manager as an interpreter where managing change places the change manager in the position of creating meaning for the other o rganisational members, helping them to make sense of various organisational events and actions. And lastly change manager as nurturer where the nurturing image to managing assumes that even small changes may have a large impact on organizations and managers are not able to control the outcomes of their changes. For other journal, Michael Stanleigh (2008) found that most change initiatives fail because management may not be engaging employees in the process towards change and do not allow sufficient time for change to set. It is important to implement change in a series of phases that will engage employee and to allow sufficient length of time for each phase to become institutionalized within the organization. He listed out several drivers of change such as mergers and acquisitions, innovation, technology, restructuring / re-organizing, declining sales and/or market share, globalization, expansion and growth, sense of urgency and lastly when 75% of the leadership is honestly convinced that business as usual is no longer as acceptable plan. However he claimed that, too often, management fails to recognize that adjustment to change takes time. They expected the employee to react quickly to the changes and fail to recognize that each individual will go through all of the phases at different pac es. As a result, sometimes the employee may burn out, scared or frustrated and unable to cooperate. Therefore he recommended all managers to apply multi-step process to guide, include, empower, enlist and motivate employees toward change. 2.2 Lean Six Sigma Lean Six Sigma is a technique to improve process and can be used either individually, in a group of people or in combination with a target to improve the quality and delivery of any business process. Originally developed by Toyota called as Toyota Production System is based on series of principles focusing on eliminating 7 categories of Muda, Japanese word means waste, specifically any activity of consuming resources but creates no values. Waste such as over produced of goods that no one wants, transportation of goods from one place to another without any reasons, waste due to correction of defects which require rectifications, waste in waiting time due to delay in process, over-processing, inventory pile up and motion waste of unnecessary processing steps will end up not meeting the needs of the customers. Liker (2004) claimed that the lean thinking was used by Taiichi Ohno, a Toyotas Plant manager who was assigned to improve Toyotas manufacturing process back in 1950. TPS underpins many innovation including the elimination waste muda, quality at the source jidoka and continuous improvement kaizen. Through years of trial and error, Toyota caught the worlds attention in 1980s where the cars produced were lasting longer than American cars and required much less repair. Based on his study, in 1990s Toyota capable to produced new design of auto faster, with more reliability, at a competitive cost and became third-largest auto manufacturer in the world behind General Motors and Ford. Much of the success comes from its astounding quality reputation. Kaizen (continuous improvement) will lead to learning organization. This culture when embedded to the organization will give a great benefit by providing opportunities for improvement and sustainability in a long run. Any organization will obtain an effectiveness and efficiency in their process by implementing Lean. Lean requires a specific way of thinking, philosophy and management system. Liker (2004) describes fourteen principles of lean at Toyota Production Systems (TPS) and the principles can be divided into four categories that are; Long-Term Philosophy. The Right Process Will Produce The Right Results. Add Value by Developing Your People and Partners, and Continuously Solving Root Problems Drives Learning. Womack J.P and Jones D.T (1996) explained that the lean thinking provides a method to make any tasks more satisfying by converting waste into value with less human effort, less equipment, less time and less space while coming closer and closer to providing customers with exactly what they want. He proposed 5 lean principles consist of: Specify Value. Identify the Value Stream. Determine the Flow. Pull. Perfection. They proposed that all 5 steps should be applied holistically and it is important that all the steps are performing together due to the interrelationship between the principles is enough to enhance the outcomes of the others. They also argue than lean not just can be successful in manufacturing organization but also in any other organization. They come out with a term called From Lean Production to Lean Enterprise. Although lean will always associated with reduction of costs, eliminating waste and JIT but the adoption of lean is beneficial for knowledge-based activities such as services, design, engineering and product development. 2.3 Change Model There are a lot of change models been studied and introduced to organize change activities in a systematic approach. Researchers have been studying change, specifically organizational change, for decades. Detail studies on implementing change has been conducted by Ian Palmer, Richard Dunford and Gib Akin (2009) and presented in their book Managing Organizational Change. They said that in various change management approaches provide multistep models of how to achieve larga-scale, transformation change. They studied 9 examples of change management model that have been introduced from 1992 to 2006. These models differ not just in terms of the number of steps but also the way to implement the steps. Katner, Stein and Jick proposed an approach called Ten Commandments in 1992, Pendlebury, Grouard and Meston proposed Ten Keys in 1998, Nadler proposed 12 Action Steps in 1998, Taffinder proposed Transformation Trajectory in 1998, Anderson and Anderson proposed Nine-Phase Change Process Model in 2001, Kirkpatrick proposed Step-by-Step Change Model in 2001, Mento, Jones and Dirndorfer proposed 12-Step Framework in 2002, Light proposed RANDs Six Steps in 2005 and Leppit proposed Integrated Model in 2006. The summary of all 9 change models made by Palmer et. al. (2009) is as Appendix 1. Ian Palmer, Richard Dunford and Gib Akin (2009) said that possibly one of the best-known change management model is John Kotters eight-step model. Norani (2011) also says that among all the emergent change approaches, Kotters model is said to have a long standing high reputation that has flexibility to deal with vast number of problems and issues that may be experienced during change. Kotters simplifies the steps during change process to overcome the challenge and constraints that might occurred during the implementation. 2.4 Kotters Eight-Step Change Management Model John P. Kotter graduated from MIT and Harvard. He joined the Harvard Business School faculty in 1972 and after 8 years, at the age of thirty-three, he was voted tenure and a full professorship. He wrote a lot of books, journals and articled related to leadership, change and managements. In 1994 he wrote an article for the Harvard Business Review entitled Leading Change: Why Transformation Efforts Fail. It was based on his analysis from a lot of initiatives to produce significant useful change in organization via restructuring, reengineering, restrategizing, acquisitions, downsizing, quality programs and cultural renewal in companies that trying to remake themselves into significantly better companies. These companies included large organizations such as Ford, General Motors, British Airways, Landmark Corporation etc. The basic goal of all change efforts was to make fundamental changes in how business is conducted in order to cope with a changing market environment. He has made his st udy on both success and fail of change initiatives. As a result from his analysis Kotter developed his 8 steps for change. The eight steps were created to be followed one by one and in sequence where for him each step building on the previous. Kotter states that it is essential to thoroughly complete all 8 steps, not cutting only one or short. Kotter (1996) quoted Whenever you leave one of the steps in the eight-stage change process without finishing the work, you usually pay a big price later on. Step 1 is Establishing a Sense of Urgency. Change efforts begin successfully when some individuals of a group of people start realize and look hard at a companys competitive situations, market positions, technological trends and financial performance. Kotter notes that over half of the companies he analyzes have never been able to create enough urgency to prompt action. Compared with other steps in the change process, step one can sound easy but it is not. Well over 50% of the companies I have watched fail in this first phase (Kotter, 2007, pg. 3). Kotter proposed that the change initiatives can be successful is when 75% of companys managements is honestly convinced and agreed to change. Step 2 is Creating the Guiding Coalition. Kotter (1995) described it as a step that requires the organization to assembling a group with enough power to lead the change effort and encourage the group to work together as a team. The team may consist one or two people in the early stage but it must grow over time. It is important that the team get full support by the top managements. A high sense of urgency for change within the top management is such organization helps enormously in putting a guiding coalition together. Leadership play an important role to spread out the sense of urgency to change. Efforts that dont have a powerful enough guiding coalition cant only sustain for a while and in the end the progress will stop. Step 3 is Developing a Vision and Strategy. A vision helps clarify the direction in which the change results should be. Kotter (1995) describe this step as developing a picture of the future that is relatively easy to communicate and appeals to customers, stock-holders and employees. Without a sensible vision, any change effort can easily dissolve into a list of confusing and incompatible projects that can take the organization in the wrong direction or nowhere at all. Step 4 is Communicating the Change Vision. In this step, every possible communication channel must be used to spread out the change initiatives. Everybody needs to know, aware and get familiar about what is happening. Some key elements of effectively communicating shall be used such as repetition, explanation, forums and leading by example of the guiding coalition. Step 5 is Empowering Employees for Broad-Based Action. In this step, action should be taken to remove all obstacles to change. This might as be up to the extent of changing systems or structures that seriously undermine the vision. It also may involve allocating some budget, money, time, support etc. These are to get more people to involve. The more people involved, the better the outcome (Kotter 1995). Step 6 is Generating Short-Term Wins. Transformation will take time and effort and will risk losing momentum if there are no short-term goals or achievement. Some people will only get participate when they start to see the positive results. Without short term wins, people will get exhausted and may turn back to their original behavior or condition. Step 7 is Consolidating Gains and Producing More Change. In this step, Kotter gave warns that people tend to declare victory too soon before they are really won. They easily get satisfied with the changes without knowing that it is not fully embedded into the systems of the organization. The change might take years to complete. Step 8 is Anchoring New Approaches in The Culture. This step is the ultimate goal of any change initiatives. It embeds in the culture of the organization, when it seeps into the bloodstream of the organization. 2.5 Research Questions Based on the discussion above, the following research questions have been formulated to guide the study. Is the program established enough Sense of Urgency to the staff during the implementation period? Is the program creating a group of people with enough power to lead the change effort and encourage the group to work together as a team during the implementation period? Is the staff been thought about the Vision and Strategy and understand the end results of Lean Six Sigma program? Is the staff well versed and understand about the benefit of Lean Six Sigma? Is the program gets enough support from the management and well accepted by the staff? Is staff clear about the short term target and long term target of the program and feel that Lean Six Sigma will give a lot of benefit to them? Is the program continuously developing and more people start to talk about Lean Six Sigma? Is Lean Six Sigma embedded into the culture of every staff? CHAPTER 3 RESEARCH METHODOLOGY Introduction The previous chapters provide with a contextual framework for understanding the purpose and objectives of the research. Chapter three focuses on the research methodology and its application to the research objectives and questions outlined in chapter one and two. The research design, population and sample, sampling procedure, assessment instruments and pilot study are described according to its use in this chapter. In addition the statistical tools used for data analysis are defined in relation to the objectives and research questions. Research Design Research can be describe as a systematic and organized effort to investigate a specific problem that needs solution. Management research could encompass the study of employee attitude and behavior, human resources management, the impact of changing demographic on management practices, production operation management, strategy formulation, information systems, and the like (Sekaran, 1984, p. 5). The type of this research is applied research. When research is done with the intention of applying the results of its findings to solving specific problems currently being experienced in the organization, it is called applied research (Sekaran, 1984, p. 6). Data can be collected in a variety of ways, settings and sources. This study will base on quantitative research using questionnaires (survey) method and qualitative research by interviewing some of the selected staff purposive sampling. Sekaran (1984) explained that a questionnaire is a preformulated written set of questions to which respondents record their answer, usually within rather closely defined alternatives and interviewing is a process to obtain information on the issues of interest to the researched. It can be either unstructured or structured and could be conducted either face to face or any means. The main purpose of the interview is to have an early understanding on Lean Six Sigma Program that has been implemented. Population and Sample A total of 120 participants from 7 departments / divisions of SIRIM Berhad participated in Lean Six Sigma Program will involve in this study. The participants are full time staff work