Thursday, December 26, 2019

The Movement Of Pop Art - 991 Words

The term ‘Pop Arts ‘was innovated in the mid-1950s and early 1960 s. Undoubtedly, the god father of this movement is Andy Warhol – the biggest influence on humanity s fixation on visual art. His performance traverses the connection among aesthetic utterance, culture and commercial. By applying various ways of techniques which included silk screen process (for mass production) and colour settlement, Warhol showed to the world of art his perspectives on media, economics and politics. Thus, this paper will analyse the movement of Pop art as well as Andy Warhol‘s artwork: Tomato Campbell’s Soup. Andy Warhol – a well-known ad illustrator in Pop Art movement was born in August 6, 1928 in Pennsylvania. As a young boy, Andy liked to draw, colour, and cut and paste picture with the supporting from his mother. In 1945 he entered the Carnegie Institute of where his major in pictorial design. After graduation, Warhol moved to New York where he started work as a commercial artist. Throughout the 1950s, Warhol enjoyed a successful career as a commercial artist, winning several commendations. In 1953, he had his first show at Hugo Gallery. The 1960s was an extremely prolific decade for Warhol. He came to public notice through work that drew on advertising, brand names and newspaper stories. He is an important person who collapse a boundaries between high and low art(Pagliari, 2013). Many of his well-known paintings, images was produced with the concept of Pop art. PopShow MoreRelatedThe Pop Of Pop Art Movement Essay1579 Words   |  7 Pages Pop Art movement, centralised in the United States during the 1950s-60s, was a stage in the post modernism era in which the line between low art and high art was blurred and art was more accessible to the general public (Gambino, 2011). Andy Warhol was an iconic artist during the pop art movement alongside artists like Rauschenberg and Lichtenstein. The artworks, â€Å"Campbell’s Soup Cansà ¢â‚¬  (1962) and â€Å"Marilyn Diptych† (1962), depict icons from two different contexts and illustrate the theme of overRead MorePop Art : An Art Movement905 Words   |  4 PagesPop Art is an art movement that emerged in the 1950’s characterized by imagery from pop culture mostly on advertisements and news often using the sense of irony. This movement was more of a cultural revolution using vibrant colors and bold graphics to represent a statement and provide an instant meaning. It has a relation with the abstract expressionism, however it is clearer and has a comic book vibe. Pop art is not trying to confuse you and make you analyze its meaning, on the contrary, it wantsRead MorePop Art Movement Essay1127 Words   |  5 PagesThe Pop Art Movement was one of the biggest visual art movements of the 20th century. Therefore it is extremely significant. Pop Art is simply an abbreviation for popular art work. Numerous artists such as such as Andy Warhol, Roy Lichtenste in, James Rosenquist and Claes Oldenburg started this phenomenal movement form the 1950’s and onwards. It came at a time after a two decade period where abstract art was extremely popular. Pop Art is the movement in art when artists began to create art with theRead MoreThe Pop Art Movement Essay1303 Words   |  6 PagesThe Pop Art Movement Pop art got its name from Lawrence Alloway, who was a British art critic in 1950’s. The name â€Å"Pop Art† reflected on the â€Å"familiar imagery of the contemporary urban environment† (kleiner, 981). This art form was popular for its bold and simple looks plus its bright and vibrant colors. An example of this type of art is the oil painting done by Andy Warhol, â€Å"Marilyn Diptych† (Warhol, Marilyn Diptych) in 1962. The Pop art movement became known in the mid-1950 and continued asRead MoreWarhol And The Pop Art Movement2609 Words   |  11 PagesAndy Warhol being not simply a Pop artist, but an American artist who was known as the master of Pop Art, and about two of Warhol’s most famous paintings; Coca-Cola and Campbell’s Soup Cans. Andy Warhol was an artist and filmmaker, an initiator for the Pop Art movement in the 1960s. Warhol used mass production techniques to elevate art into the supposed unoriginality of the commercial cultur e of the United States. Warhol’s early drawings frequently recalls the Anglo-Saxon tradition of nonsense humorRead MoreThe Pop Art Movement Of The 1960 S1051 Words   |  5 PagesComing to the United States in the early 1950’ and reaching its peak of activity in the 1960’s would be Pop art. This type of art was everywhere, billboards, commercial products, and celebrity images. You see this type of art mostly in comic strips. This type of art celebrates the everydays items that people used. Pop art was the start of a new art movement, In the very beginning, PopArt began in Britain in the way early 1950s. Arthistory.com says â€Å" The first application of the term PopArt occurredRead MoreThe Pop Art Movement : An International Phenomenon1438 Words   |  6 PagesThe Pop Art movement was an international phenomenon that began in the 1950’s in which artists like Roy Lichtenstein and Andy Warhol sought to initiate fresh thinking in art. The term Pop Art is credited to the British art critic Lawrence Alloway and is short for â€Å"popular art† which referred to the popular mass culture and familiar imagery of the contemporary urban environment. This movement was a comment and expansion on the then popular ideas of the Abstract Impressionism movement. Fred S. KleinerRead MoreAndy Warhol s Influence On The Pop Art Movement1608 Words   |  7 PagesAndy Warhol, born Andrew Warhola on August 6, 1928, was one of the most successful artists within the pop art movement. At the age of 8, Warhol was diagnos ed with a rare, sometimes fatal, disease named Chorea. Also known as St. Vitus’s dance, a neurological disorder that is characterized by jerky involuntary movements affecting especially the shoulders, hips and face. Warhol, was left bedridden of several months, however during these months was when he found out about his talent for drawing. LaterRead MoreWarhol : A Artist And A Prominent Figure Into The Pop Art Movement1300 Words   |  6 Pagesthe Pop Art Movement. Andrew Warhola was born in Pittsburgh, Pennsylvania. From 1945 to 1949, Warhola studied at the Carnegie Institute of Technology. In 1949, he moved and settled in New York and changed his surname to Warhol. He then worked as a Commercial artist. In the earlier years of the 1960’s, Warhol enjoyed experimenting with large mass advertisements, magazines, and other images. In 1962, he started working on the Marilyn Monroe series, which was the beginning of his success as a Pop artistRead MoreAndy Warhol: Influence on the Twentieth Century Pop Art Movement1065 Words   |  5 PagesAs a profound influence on the twentieth century pop art movement, Andy Warhol ascended to become a cornerstone in the modern art world. After taking cues from society in the mid-twentieth century, as well as conversing with Muriel Latow, Warhol did what many artists strived to do but failed. Andy also extracted many of his ideas from other artists and built on them. He put a culture on canvas and revolutionized pop art for a life time. The nineteen sixties, seventies, and eighties were periods

Wednesday, December 18, 2019

The Great Warming By Brian Fagan - 1073 Words

The Great Warming is a book written by Brian Fagan that encompasses the environment and history pertaining to most of the human race between A.D. 800 and 1300. Not only does the book give a new dimension to world history by looking at climate history, but it also provides the reader with an ominous warning of the impact that climate change may have on the human race in the future. Fagan references many civilizations in the book that were affected by the rise in surface temperatures. He goes in depth with them individually to show just how worldwide this climate change was, how each civilization adapted or failed to adapt, and who the winners and losers were during this medieval warming period. Fagan’s argument and analysis in The Great Warming can be simplified by saying climate changes have had an enormous effect on the human race throughout history. Furthermore, he shows that an increase in surface temperatures can affect different parts of the world in a variety of ways. So me areas experience torrential and devastating rainfall where other regions are simultaneously victim to severe droughts. Fagan makes this argument by providing historical data of the earth through coral samples, deep sea cores, satellite technology, and tree rings. He then takes this data and attributes the findings to why particular civilizations flourished or vanished throughout history. An example of this is the Pueblo Bonito, â€Å"Visitors from miles around flocked to this, perhaps the greatest ofShow MoreRelatedThe Great Warming By Brian Fagan1842 Words   |  8 PagesThe Great Warming by Brian Fagan claims that environmental changes (most commonly prolonged droughts, El Nià ±os, and La Nià ±as during the Medieval Warm Period) affect human civilization, including human’s trading abilities, overall movement, and quality of life. He examines the world’s ancient climate warming, known as the Medieval Warming, between the 10th and the 15th centuries, also me ntioning the preceding and succeeding centuries. Fagan gathers his research using studies conducted by archaeologistsRead MoreAnalysis Of Maya s The Maya 942 Words   |  4 Pagessurmised. Contacts: Dr. Sebastian Breintenbach http://www.esc.cam.ac.uk/directory/sebastian-franz-martin-breitenbach Dr. Douglas Kennett http://php.scripts.psu.edu/dept/liberalarts/sites/kennett/djkennett/home.php Resources: The Great Warming By Brian Fagan Collapse By Jared Diamond Read MoreHow Did The Construction Of The Angkor State Lead A Collapse?1040 Words   |  5 Pagesreligious monument in history, Angkor Wat, was created under the rule of Suryavarman II. It was built as a shrine to Lord Vishnu, preserver of the universe. There were also large shrines to house the divine phallus of each god-king (Ancient Lives, Brian M. Fagan). Religion was a key component of making the Khmer Empire a prosperous kingdom politically. The god-kings’ divine power was reliant upon the faith of Angkor’s inhabitants, and a strong hold on the Khmer empire’s center – the megacity of Angkor

Tuesday, December 10, 2019

Anomie free essay sample

The Development of Anomie In 1893 Emile Durkheim presented the concept of anomie which means that if society lacks social norms or was left unregulated it would tend towards deviant behaviour. For Durkheim crime and deviant behaviour was integral to society in that it set social and moral boundaries and brought about a sense of community. Whilst we wish to expand further on the mentioned ideas we will also focus on how these ideas have influenced other theories of deviance and crime. We shall focus our discussion on Robert K. Mertons development of anomie and more specifically we will look at his ork on Strain Theory. Durkheims work on The Division of Labour (1893) suggested that there are two concepts of society: mechanical and organic, it is also noted that society evolves from one state to another. It begins in a simple state which he termed mechanical, where people act and think alike. They all perform similar tasks and there are no individualistic goals simply group goals, for example a country ruled by dictator regime. This simple society evolves into something far more complex called organic where there are less social bonds and individuals begin to think as ndividuals and are no longer tied to the mob mentality. Therefore Anomie occurs when there is a breakdown of social norms. This results in individuals being lost or unable to fit into in society without having a clear set of rules to adhere to. The sudden change in society can lead to conflict and deviance. For instance during economic depression crime and deviance increases as people no longer have a dole within society, this may be due to redundancy or pay cuts. In 1938 American sociologist Robert K. Merton used Durkheims concept of anomie to form his own theory of deviance, Strain Theory. It differs greatly from Durkheims original concept in two specific ways, Merton thought that the problem was not brought about by a sudden change in society, as Durkheim suggested, but it was actually due to a structure within society. It was suggested that this structure presented each member society with the same goals however did not offer them equal means by which to achieve the goals. Merton observes that it is possible to overemphasise either the goals or the means to achieve them and it is which leads to social strains or anomie. (Burke 2010:43). Durkheim suggested that an individuals goals were oundless however Merton countered this suggestion with the notion that anomie is derived from the strains within the social structure therefore forces the individual to have unachievable goals. Among the elements of social and cultural structure, two are important for our purposes The first consists of culturally defined goals, purposes, and interests. It comprises a frame of aspirational reference The second phase of the social structure defines, regulates, and controls the acceptable modes of achieving these goals. (Merton, 1938:672-673) Mertons theory is based on the American society and in particular the American ream as such the goals and culture described above are best understood with the American dream in mind. It is the American Dream that everyone, regardless of class origin, religion, or ethnic characteristics can succeed in acquiring material that during the founding of the New World that an open society would be created a nd in turn it was expected that everyone would be equal. However it was seen that money was the same where ever they were, whether it was Old Money or New Money. Therefore each individual, even though they aspired to riches, they would ultimately have to work hard to achieve that goal. However, although it is seen that the American Dream is assimilated with cultural goals, the means to achieve such goals, or institutionalized means, are not necessarily spread evenly through society. For example not everybody can access higher or university education within the I-JK because of the significant cost it entails. This therefore becomes a hindrance in achieving success as the individual is lacking the institutional means required to move forward. Success in society is rewarded by materialistic things therefore a sense of worthlessness and despair will emanate amongst those individuals who feel hey are, or are deemed to be, unsuccessful. It is with this that we can really grasp Mertons idea of strain between the cultural goals and institutionalised means of society. For Durkheim, deregulation led to infinite aspirations; for Merton, infinite aspirations led to deregulation. The result, for both, was the same: high rates of deviation. (Downes Rock, 2007:99) Merton forms a schema of the four different types of deviance and how they accept or reject the goal and how they view the means to achieve that goal: The Conformant: Individuals whom maintain allegiance o both goals and means, despite the trials and tribulations they may face. The Innovator: embraces the cultural goals with rejecting the prescribed means to realise the goal. They resort to what they feel are more efficient means of achieving that goal by embezzlement for e xample. The Ritualist: ignores the cultural goals however sticks by the means to achieve the goal. They feel resigned to their routine and like to play it safe, being stuck in a dead end Job for example. The Retreatist: will naturally reject both cultures goals and means. For instance those who have chosen to engage in ocially unacceptable behaviour such as drug addicts, alcoholics or even freegans (people who do not conform to the notion of consumerism and source their nutrition from societies waste). The Rebel: these individuals actively reject both cultural goals and means and try to substitute them. Individuals such as political revolutionaries or religious fanatics can be seen to be rebellious. Although Merton eventually adapted this depiction of the individual and their tendency towards deviance, his goals versus means schema provides us with an alternative view on ow to comprehend and analyse deviant behaviour other than the regulation of society as suggested by Durkheim. In so far as it illustrates how individuals adapt themselves to fit the situation they are faced with. More importantly Merton presents a concept of anomie that places the emphasis on the strain between the individual and society in which they live, providing us with a more sociological explanation for deviant behaviour as opposed to Durkheims biological theory. Mertons version of anomie was highly regarded for a number of years but met with substantial critique. Durkheim and Merton both stem from the positivist tradition meaning that much of their work was based on empiricism. Furthermore, Mertons statistics and data were taken from police records and often pointed the finger of blame at the lower classes for being the primary source of deviant behaviour. However the data provided was statistics provided are not always going to be neutral, especially if there are police and government targets to reach, suggesting that data may have been manipulated to suit the police. In conjunction with this it is seen as more of a priority to police and aintain the busy, urban inner-city areas whereas the more suburban areas were left to their own devices in a sense, with less police presence and less urgency to respond to incidents of criminality. The statistics in turn reflected this suggesting that deviant individuals were more likely to reside and offend in inner city areas and simply operate within their boundaries as opposed to travelling out with their area to to engage in criminal or deviant behaviour. It is due to these two examples that Mertons statistics were flawed which would then have an impact on the strength of is theory. This paved the way for theorists such as Albert Cohen to expand upon and adapt Mertons original theory.

Monday, December 2, 2019

Sign Language an Example by

Sign Language by Expert Prof. Kifaru | 23 Dec 2016 Introduction Need essay sample on "Sign Language" topic? We will write a custom essay sample specifically for you Proceed According to the website of the Nebraska Department of Education, Sign Language is a another system of communication by using gestures as an alternative for the spoken or written means of interaction. It makes use of hand gestures, facial expressions, body positions, as well as other physical evidences. There are a lot of different sign languages depending on its origin. However, there is a widely accepted form, and this is the American Sign Language. For more specific words and signs, they may be referred to the more specific styles. Students Very Often Tell EssayLab professionals: How much do I have to pay someone to write my assignment in time? Essay writer professionals recommend: Cheapest Essay Writing Company Review Essays For Money Best Essay Writing Service Essay Writer Service According to the National Science Foundation website, sign language is most important because it has become a means of understanding the true nature of human language. Furthermore, the same source mentioned that Sign Language also demonstrates two important parts of the human language. The first of which is that languages have different features, but they definitely share certain characteristics. The second is that all human beings are capable of communicating with other people through a specific language. These two aspects pointed out by the National Science Foundation are the basic information one should know about Sign Language as it stands as its backbones. In this light, his research paper is aimed to justify the claim that Sign Languages are important to society. The reasons behind this claim are that Sign Language is the primary communication system of deaf people. Second, it is also a tool used in early child development. Last, it is also a means of expressing one self. Discussion The initial purpose of polishing Sign Language is for the deaf to experience communication without having to say something. When one person is deaf, he or she is also rendered incapable of speaking. Besides their facial expressions and nonsensical sounds, the deaf are literally left with nothing. With this, a universalized system was created for them to be able to speak with other people who are also capable of using sign language as a mode of communication. This also enables a deaf person to share with other people his or her feelings and thoughts so that he or she is no longer enclosed in her own world. The hopes of the deaf people are lifted. The world that revolves around them is no longer silent and no longer do they see a never ending array of images that does not make sense. Although feelings can still be associated by the sense of vision and touch, their world is still too quiet for them to understand completely the reality he or she revolves in. According to Medicine.Net, for a normal person, the meaning of the words varies on the intonation used to speak those words. However, since there are people who were not as gifted to ever have a perception of sound, they rely on the images they see. It is important to continue Sign Language as an alternative to the common means of communication because not everyone is born with the sense of hearing. Having an abnormality or accident that eventually leads to ones deafness is not his or her fault. But it remains to be a problem. Although there are advances in science wherein the deaf are given the opportunity to hear again, it does not mean that the discovered procedure is applicable to all. That would leave Sign Language as the only means of communication left for these inpiduals. The second importance of having Sign Language is for early child development. According to an article from the website National Institute of Deafness and Other Communication Disorders, sign languages is vital to early child development because the inpidual is still at the stage wherein their practices and thinking can easily influenced. When a child is born deaf, parents are called to make use of Sign Language. This way, these children are given the opportunity to grow and relate with his or her environment in what other people would assume as normal. According to the source, the only difference between deaf children and normal children is their hearing capabilities. But since they have a means of communicating with other people, he or she is able to maximize all the features they have. Nothing will be lacking if they are taught well. The source also mentioned that the children are not the only ones who would need to learn how to do Sign Language. It is just as vital for parents to know how to do the same thing. The logic is simple. The parents are the models these children would look up to, and it would be important that the parents would know what their children are saying. Likewise, they should be able to learn that language first so that they can share this with their children. It will not be just a learning experience, but it would also be another opportunity for both parties to bond together. Sign Language is important because if provides benefits to early child development. Since children are still at the age where their minds are still flexible to the changing times, when they are discovered deaf, Sign Language is the only other option that will provide them a normal childhood. Years of being given pity and taunts can cause trauma that can permanently damage their perspectives in life. But from the beginning of their childhood, when they are honed to become understanding about the realities of life, then the potential harm that can be reflected in their personality during their adulthood can be prevented. The third importance of sign language is its means to allow a person to express one's self without using words and sounds. Unlike other languages, sign language is not comprised of alphabets or concrete words. It makes use of visual representations. This means that sign language uses facial and hand gestures to describe something, in comparison to defining with words. As mentioned earlier, sign language is commonly used by deaf people as well as in early child development. But they are not the only ones who would use it. The other people they would be able to encounter would also use this kind of language so that they would also be able to understand each other. There are also times when people would insist on learning sign language just for fun. The interest is there, and inpiduals would just have to answer to that call of their interest. Although they did not need it, the fact that it is another avenue of expressions takes the matter of learning to a different level of consideration. According to website Essortment, with the use of sign language, an inpidual is not just a means of communication, but also of expression. Instead of telling someone how they feel, they make use of visual imagery, which includes facial expressions, hand spellings, gestures and hand spelling. The same source mentioned that the emotions that were bound by words were instead showed. With this, barriers are broken down. The process would have been expressive. It has become not just a communication system, but also a form of art, therapy, drama, and other non-traditional scenarios. It is no longer just for the hearing impaired, but also for hearing. Conclusion Sign languages are a means of getting ideas and messages across through facial expressions and hand gestures. The use of such language remains important today. The reasons behind this claim are that it allows deaf inpiduals to communicate with people who are not impaired of hearing. This kind of language removes the barrier between those who can and cannot hear. The second reason is that it is also used in early childhood development. When children are born impaired of hearing, they can still grow like a normal child who can hear would. The language will allow him to still be able to maximize their youth, and develop into a healthy person. The third reason is that it is a means of expressing oneself. Because the language is based on visual representations than words, it is able to show ones feeling than bound by words that can sometimes only tell so much. With sign language, emotions are better expressed. Sign language remains important in society because it offers benefits that many have neglected. While there are people who can hear normally, there are also those who cannot. The spoken word is not broad enough to help these inpiduals as well. Sign languages, with the abovementioned reasons, should remain as an optional avenue. Work Cited American Sign Language. National Institute on Deafness and Other Communication Disorder. 22 May 2008. 23 May 2008 . Glossary General. Nebraska Department of Education. 23 May 2008 Important facts about sign language. Sign Genius. 23 May 2008 http://www.signgenius.com/info-important-SL-facts.shtml>. Sign Language. Medicine.Net. 2008. 23 May 2008 . Sign Language Expression: the importance of gestures and facial expressions. Essortment. 23 May 2008 . Malone, Elizabeth. Sign Languages. National Science Foundation. 18 July 2005. 23 May 2008 .

Wednesday, November 27, 2019

Civil War Battles essays

Civil War Battles essays Civil War Battles- Bull Run, Shiloh and Vicksburg The American Civil War- 1861 to 1895. A terrible four years. Four years of victory, defeat and death. Though, without it where would the United States of America be? Pulled apart or reconstructed and as one? When asked what is the Civil War people are most likely to say a war fought between the north and the south. Then when asked why they say because the north and the south had opposite views on subjects. Their answers are right. However when asked what happened in Vicksburg or Shiloh or even Bull Run few know. First Manassas or Bull Run was and important battle for the Yanks. If they beat the confederates Lees defense strategy would be ruined. Each side had there own strategy. McDowell strategy was to overwhelm Beauregard (confederate leader) at Manassas and have Patterson pin Johnstons force. McDowell was happy because he had a 3to 2 lead. McDowell lead his troop to Centreville, where the army would think about their attack on Beauregards troop. where strong but the Confederates stronger. With 24,000 men, the Confederates had less than the Union with 35,000 men. However, only 18,572 of the Union where in battle and 18,053 of the Confederates. They used 49 cannons each and the rest fought with their rifles. Each of them lost many people during the fighting. In one day the Union army had 460 killed, 1,124 wounded and 1,312 captured or missing, thats a total of 2, 896. On the other hand the Confederate army had 387 killed, 1,582 wounded and 13 captured or missing, thats a total of 1,982. The battle was fought with great honor. However most of the honor went to the Confederates. They won the battle and it was just one of their many victories Shiloh Tennessee, April 6, 1962- a town becomes a battlefield where hundreds will be wounded or captured or even die. ...

Saturday, November 23, 2019

Free Essays on Summary

The International Astronomical Union Circular #6837 released by Brian Marsden on March 11 was published to report the findings Marsden’s group had come across. Marsden stated in the publication that â€Å"the chance of an actual collision is small†¦but one is clearly not out of the question† (Marsden). Marsden’s group has supposedly come across evidence that supported that the asteroid 119XF11 could possibly collide with the earth. Just one day later, evidence dismissing the report was found and published. I think the scientists should not have published their original data, which showed the small possibility of the asteroid 1197XF11 colliding with the earth. Their theories should not have been published without months, maybe years of lose observation of the asteroid and its orbit. A closer investigation of the asteroid showed that there was no chance at all that the asteroid would collide with the earth. If the astronomers had waited to further investigate their â€Å"discovery,† they would have known that there were pictures of the asteroid taken in 1990, pictures which provided hard evidence that the asteroid would in fact not collide with the earth. The sad thing is, the day after the report’s publication, this news broke out. The astronomers had caused a media frenzy over nothing. The media had a field day with the astronomer’s report of the possibility of an asteroid colliding with the earth’s atmosphere. The media always blows its reports of pain and suffering out of proportion, so the bare thought of our human race sharing the same fate the dinosaurs were believed to have had is bound to be over exaggerated. I think a lot pf people overreacted, and I think they should have. Most of us have heard the theories of the dinosaurs’ extinction being caused by a meteor collision with earth. The thought of the same fate for mankind in 2028 would scare almost anyone. The media also has a great effect o... Free Essays on Summary Free Essays on Summary The International Astronomical Union Circular #6837 released by Brian Marsden on March 11 was published to report the findings Marsden’s group had come across. Marsden stated in the publication that â€Å"the chance of an actual collision is small†¦but one is clearly not out of the question† (Marsden). Marsden’s group has supposedly come across evidence that supported that the asteroid 119XF11 could possibly collide with the earth. Just one day later, evidence dismissing the report was found and published. I think the scientists should not have published their original data, which showed the small possibility of the asteroid 1197XF11 colliding with the earth. Their theories should not have been published without months, maybe years of lose observation of the asteroid and its orbit. A closer investigation of the asteroid showed that there was no chance at all that the asteroid would collide with the earth. If the astronomers had waited to further investigate their â€Å"discovery,† they would have known that there were pictures of the asteroid taken in 1990, pictures which provided hard evidence that the asteroid would in fact not collide with the earth. The sad thing is, the day after the report’s publication, this news broke out. The astronomers had caused a media frenzy over nothing. The media had a field day with the astronomer’s report of the possibility of an asteroid colliding with the earth’s atmosphere. The media always blows its reports of pain and suffering out of proportion, so the bare thought of our human race sharing the same fate the dinosaurs were believed to have had is bound to be over exaggerated. I think a lot pf people overreacted, and I think they should have. Most of us have heard the theories of the dinosaurs’ extinction being caused by a meteor collision with earth. The thought of the same fate for mankind in 2028 would scare almost anyone. The media also has a great effect o...

Thursday, November 21, 2019

Case 1.2 Study Example | Topics and Well Written Essays - 250 words

1.2 - Case Study Example Norvasc treats high blood pressure while nebulizer QID administration treats illnesses related to the respiratory system. Coumadin administration treats heart attacks, strokes and blood clots in the veins. These medical conditions occur in old age. Dr. Jenkins’ evaluation is, however, subjective, in this case. He concluded Ms. Gerry’s prescription based on age and not on medical tests. Dr. Jenkins conducted a physical exam on Ms. Gerry and noticed her short left leg. He, however, states that she has equal bilateral pedal pulses. The scenario is objective since pedal pulse evaluation does not involve counting the pulses but just the equality in both the lower extremities. Dr. Jenkins ultimately defines Ms. Gerry’s problem as present with osteopenia and a post placement of a dynamic hip screw within her proximal left femur. The x-ray scan conducted after surgery reveals a near anatomical alignment of the intertrochanteric femoral neck failure as analyzed by Dr. Jenkins. Dr. Jenkins prescribes a plan of a dosage containing vitamin k to decrease pro-time, bucks’ traction and open reduction. He also recommends internal fixation of the patients left hip if cleared for

Wednesday, November 20, 2019

Aristotles Views Essay Example | Topics and Well Written Essays - 750 words

Aristotles Views - Essay Example However, since man is not capable of being a god, they are capable of becoming beasts, and for Aristotle, this is the worst kind of beast (Clayton). Webster dictionary defines self-sufficient as sufficient for one's self without external aid or cooperation and having an overweening confidence in one's own ability or worth; hence, haughty; overbearing (http://www.webster-dictionary.net). Independence of a person from his society makes him arrogant, in Aristotle's words; a beast. In applying the thought created by Aristotle in the life of Achilles, it is proper to have short profile on Achilles. "Achilles was the son of the mortal Peleus and the Nereid Thetis and he was the mightiest of the Greeks who fought in the Trojan War" (Hunter, Achilles). He was the hero in Homer's Iliad, which was a famous narration of the War of Troy. Achilles was prophesied to be the only person who can help to defeat Troy. Without his help, Troy will continue to be dominated by the current kind Priasm and his dynasty, his son Hector and Paris (Hunter, Achilles). He had an amazing background as he was told to have been made immortal by his mother, leaving only his heel as the vulnerable part of his body. It was indeed through this part of his body which he was hit by Paris (the brother of Hector, an enemy which he has killed), was wounded and killed. Achilles was described as having "the greatest fighting ability" so that once got "disenfranchised from the rest of his fellow warriors and refused to fight for the Achaeans" (http://www.123helpme.com). With all this strength, both physically and in terms of power, Achilles had the air not to need anyone. His strength was sufficient for his own safety, and because he was feared he was did not feel threatened by anyone. To anyone who goes against him, his might is enough for revenge. The rage of Achilles was simply unquenchable until it makes the enemy pays. He also had problems with his fellow soldiers as he was characterized by arrogance, anger and rage. When he was wronged by Agamemnon, by taking Briseis, the war-prize in exchange for Chrysies, Achilles refused to fight for the Greeks anymore, despite several offers of handsome reparation (Hunter). This act has made him look selfless and proud, divesting him of the nobility of a true hero (Mega Essays LLC). In that way Achilles displayed the character described by Aristotle in "having no need for others and is self-sufficient". Achilles was seen to be driven more by pride and anger rather than love for people, and with this some consider him inferior to Hector, the latter died in fighting for his people and his family, was seen to be a loving husband and was more of a patriot (Mega Essays LLC). Achilles then was more of the beast as described by Aristotle. We will also take a look at another character in Homer's work: Odysseus of the epic poem Odyssey. Odysseus was a "legendary Greek king of Ithaca" (Wikimedia Foundation, Inc.). He also had a role in the epic poem, Iliad. Unlike Achilles, Odysseus was described to be wiser, had better relationship with his fellow soldiers thus being more influential and had the character of a real

Sunday, November 17, 2019

An analysis of Information Security Governance in the Universities in Zimbabwe Essay Example for Free

An analysis of Information Security Governance in the Universities in Zimbabwe Essay Abstract The complexity and criticality of information security and its governance demand that it be elevated to the highest organizational levels. Within a university setup, information assets include student and personnel records, health and financial information, research data, teaching and learning materials and all restricted and unrestricted electronic library materials. Security of these information assets is among the highest priorities in terms of risk and liabilities, business continuity, and protection of university reputations. As a critical resource, information must be treated like any other asset essential to the survival and success of the organization. In this paper the writer is going to discuss the need for implementing Information Security Governance within institutions of higher education. Further than that, a discussion on how to best practice Information Security governance within the universities in Zimbabwe followed by an assessment on how far the Zimbabwean universities have implemented Information Security Governance. A combination of questionnaires and interviews is going to be used as a tool to gather data and some recommendations are stated towards the end of the paper. Introduction Governance, as defined by the IT Governance Institute (2003), is the â€Å"set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately and verifying that the enterprise’s resources are used responsibly.† Information security governance is the system by which an organization directs and controls information security (adapted from ISO 38500). It specifies the accountability framework and provides oversight to ensure that risks are adequately mitigated as well as ensuring that security strategies are aligned with business and consistent with regulations. To exercise effective enterprise and information security governance, boards and senior executives must have a clear understanding of what to expect from their enterprise’s information security programme. They need to know how to direct  the implementation of an information security programme, how to evaluate their own status with regard to an existing security programme and how to decide the strategy and objectives of an effective security programme (IT Governance Institute, 2006). Stakeholders are becoming more and more concerned about the information security as news of hacking, data theft and other attacks happen more frequently than ever dreamt of. Executive management has been showered with the responsibility of ensuring an organization provides users with secure information systems environment. Information security is not only a technical issue, but a business and governance challenge that involves adequate risk management, reporting and accountability. Effective security requires the active involvement of executives to assess emerging threats and the organization’s response to them (Corporate Governance Task Force, 2004). Furthermore the organizations need to protect themselves against the risks inherent in the use of information systems while simultaneously recognizing the benefits that can accrue from having secure information systems. Peter Drucker (1993) stated: â€Å"The diffusion of technology and the commodification of information transforms the role of information into a resource equal in importance to the traditionally important resources of land, labor and capital.† Thus as dependence on information system increases, the criticality of information security brings with it the need for effective information security governance. Need for Information Security Governance within universities. A key goal of information security is to reduce adverse impacts on the organization to an acceptable level of risk. Information security protects information assets against the risk of loss, operational discontinuity, misuse, unauthorized disclosure, inaccessibility and damage. It also protects against the ever-increasing potential for civil or legal liability that organizations face as a result of information inaccuracy and loss, or the absence of due care in its protection. Information security covers all information processes, physical and electronic, regardless whether they involve people and technology or relationships with trading partners, customers and third parties. Information security addresses information protection, confidentiality, availability and integrity throughout the life cycle of the information and its use within the organization. John P. Pironti (2006) suggested that among many reasons for information security  governance, the most important one is the one concerned with the legal liability, protection of the organization’s reputation and regulatory compliance. With the university setup, all members of the university community are obligated to respect and, in many cases, to protect confidential data. Medical records, student records, certain employment-related records, library use records, attorney-client communications, and certain research and other intellectual property-related records are, subject to limited exceptions, confidential as a matter of law. Many other categories of records, including faculty and other personnel records, and records relating to the universitys business and finances are, as a matter of university policy, treated as confidential. Systems (hardware and software) designed primarily to store confidential records (such as the Financial Information System and Student Information System and all medical records systems) require enhanced security protections and are controlled (strategic) systems to which access is closely monitored. Networks provide connection to records, information, and other networks and also require security protections. The use of university information technology assets in other than a manner and for the purpose of which they were intended represents a misallocation of resources and, possibly, a violation of law. To achieve all this in today’s complex, interconnected world, information security must be addressed at the highest levels of the organization, not regarded as a technical specialty relegated to the IT department. Information security is a top-down process requiring a comprehensive security strategy that is explicitly linked to the organization’s business processes and strategy. Security must address entire organization’s processes, both physical and technical, from end to end. Hence, Information security governance requires senior management commitment, a security-aware culture, promotion of good security practices and compliance with policy. It is easier to buy a solution than to change a culture, but even the most secure system will not achieve a significant degree of security if used by ill-informed, untrained, careless or indifferent personnel (IT Governance Institute, 2006). In an interview the executive director and information security expert on IT Governance and cyber security with the IT Governance and Cyber Security Institute of sub-Saharan Africa, Dr Richard Gwashy Young has this to say â€Å"†¦remember in  Zimbabwe security is regarded as an expense not an investment† (Rutsito, 2012). Benefits of Information Security Governance Good information security governance generates significant benefits, including: The Board of directors taking full responsibility for Information security initiatives Increased predictability and reduced uncertainty of business operations by lowering information security-related risks to definable and acceptable levels Protection from the increasing potential for civil or legal liability as a result of information inaccuracy or the absence of due care. The structure and framework to optimize allocation of limited security resources Assurance of effective information security policy and policy compliance A firm foundation for efficient and effective risk management, process improvement, and rapid incident response related to securing information A level of assurance that critical decisions are not based on faulty information Accountability for safeguarding information during critical business activities. Compliances with local and international regulations will be easier Improved resource management, optimizing knowledge, information security and information technology infrastructure The benefits add significant value to the organization by: Improving trust in customer/client relationships Protecting the organization’s reputation Decreasing likelihood of violations of privacy Providing greater confidence when interacting with trading partners Enabling new and better ways to process electronic transactions like publishing results online and online registration. Reducing operational costs by providing predictable outcomes—mitigating risk factors that may interrupt the process The benefits of good information security are not just a reduction in risk or a reduction in the impact should something go wrong. Good security can improve reputation, confidence and trust from others with whom business is conducted, and can even improve efficiency by avoiding wasted time and effort recovering from a security incident (IT Governance Institute, 2004). Information Security Governance Outcomes Five basic outcomes can be expected to result from developing an effective governance approach to information security: Strategic alignment of information security with institutional objectives Reduction of risk and potential business impacts to an acceptable level Value delivery through the optimization of security investments with institutional objectives Efficient utilization of security investments supporting organization objectives Performance measurement and monitoring to ensure that objectives are met Best practices The National Association of Corporate Directors (2001), recognizes the importance of information security and recommends four essential practices for boards of directors. The four practices, which are based on the practicalities of how boards operate, are: Place information security on the board’s agenda. Identify information security leaders, hold them accountable and ensure support for them. Ensure the effectiveness of the corporation’s information security policy through review and approval. Assign information security to a key committee and ensure adequate support for that committee. It is critical that management ensure that adequate resources are allocated to support the overall enterprise information security strategy (IT Governance Institute, 2006). To achieve effective information security governance, management must establish and maintain a framework to guide the development and maintenance of a comprehensive information security programme. According to Horton, et al (2000), an information security governance framework generally consists of: An information security risk management methodology; A comprehensive security strategy explicitly linked with business and IT objectives; An effective security organizational structure; A security strategy that talks about the value of information both protected and delivered; Security policies that address each aspect of strategy, control and regulation; A complete set of security standards for each policy to ensure that procedures and guidelines comply with policy; Institutionalized monitoring processes to ensure compliance and provide feedback on effectiveness and mitigation of risk; A process to ensure  continued evaluation and update of security policies, standards, procedures and risks. This kind of framework, in turn, provides the basis for the development of a cost-effective information security program me that supports an organization’s goals and provides an acceptable level of predictability for operations by limiting the impacts of adverse events. In his article Kaitano (2010), pointed some characteristics of good corporate governance coupled with good security governance. These include and not limited to: Information security being treated as and organization wide issue and leaders are accountable. Leads to viable Governance, Risk and Compliance(GRC) Milestones It is risk-based and focuses on all aspects of security Proper frameworks and programs have been implemented It is not treated as a cost but a way of doing business Roles, responsibilities and segregation of duties are defined It is addressed and enforced by policy Adequate resources are committed and Staff are aware and trained It is planned, managed, measurable and measured It is reviewed and audited The overall objective of the programme is to provide assurance that information assets are protected in accordance with their value or the risk their compromise poses to an organization. The framework generates a set of activities that supports fulfillment of this objective. Principles for information security within the University In their article titled Information Security Policy: Best Practice Document, Hostland et al (2010) pointed out some guiding principles for information security within a university setup. The following are some of the principles they mentioned: 1. Risk assessment and management The universitys approach to security should be based on risk assessments and should be continuously done and the need for protective measures evaluated. Measures must be evaluated based on the universitys role as an establishment for education and research and with regards to efficiency, cost and practical feasibility. An overall risk assessment of the  information systems should be performed annually. Risk assessments must identify, quantify and prioritize the risks according to relevant criteria for acceptable risks. Risk assessments should be carried out when implementing changes impacting information security. Some recognized methods of assessing risks like ISO/IEC 27005 should be employed. Risk management is to be carried out according to criteria approved by the management at University. Risk assessments must be approved by the management and if a risk assessment reveals unacceptable risks, measures must be implemented to reduce the risk to an acceptable level. 2. Information security policy The Vice Chancellor should ensure that the information security policy, as well as guidelines and standards, are utilized and acted upon. He must also ensure the availability of sufficient training and information material for all users, in order to enable the users to protect the universitys data and information systems. The security policy should be reviewed and updated annually or when necessary, in accordance with principles described in ISO/IEC 27001. However, all important changes to universitys activities, and other external changes related to the threat level, should result in a revision of the policy and the guidelines relevant to the information security. 3. Security organization The Vice Chancellor is responsible for all government contact. The university should appoint CSO (Chief Security Officer). Each department and section should also be responsible for implementing the units information security. The managers of each unit must appoint separate security administrators. The Registrar Academics has the primary responsibility for the information security in connection with the student registry and other student related information. The IT Director has executive responsibility for information security in connection with IT systems and infrastructure. The Operations manager has executive responsibility for information security in connection with structural infrastructure. He also has overall responsibility for quality work, while the operational responsibility is delegated according to the management structure. The Registrar Human Resources also has executive responsibility for information security according to the Personal Data Act and is the controller on a daily basis of the personal information of the  employees. The Registrar Academics and Research Administration have also executive responsibility for research related personal information. Universitys information security should be revised on a regular basis, through internal control and at need, with assistance from an external IT auditor. 4. Information security in connection with users of Universitys services Prior to employment security responsibility and roles for employees and contractors should be described. A background check is should also be carried out of all appointees to positions at the university according to relevant laws and regulations. A confidentiality agreement should be signed by employees, contractors or others who may gain access to sensitive and/or internal information. IT regulations should be accepted for all employment contracts and for system access for third parties. During employment, the IT regulations for the universitys information security requirements should be in place and the users responsibility for complying with these regulations is to be emphasized. The IT regulations should be reviewed regularly with all users and with all new hires. All employees and third party users should receive adequate training and updating regarding the Information security policy and procedures. Breaches of the Information security policy and accompanying guidelines will normally result in sanctions. Universitys information, information systems and other assets should only be utilized for their intended purpose. Necessary private usage is permitted. Private IT equipment in the universitys infrastructure may only be connected where explicitly permitted. All other use must be approved in advance by the IT department. On termination or change of employment, the responsibility for termination or change of employment should be clearly defined in a separate routine with relevant circulation forms. The universitys assets should be handed in at the conclusion of the need for the use of these assets. University should change or terminate access rights at termination or change of employment. A routine should be present for handling alumni relationships. Notification on employment termination or change should be carried out through the procedures defined in the personnel system. 5. Information security regarding physical conditions IT equipment and information that require protection should be placed in secure physical areas. Secure areas should have suitable access control to  ensure that only authorized personnel have access. All of the Universitys buildings should be secured according to their classification by using adequate security systems, including suitable tracking/logging. Security managers for the various areas of responsibility should ensure that work performed by third parties in secure zones is suitably monitored and documented. All external doors and windows must be closed and locked at the end of the work day. On securing equipment, IT equipment which is very essential for daily activities must be protected against environmental threats (fires, flooding, temperature variations). Information classified as sensitive must not be stored on portable computer equipment (e.g. laptops, cell phones, memory sticks). If it is necessary to store this information on portable equipment, the information must be password protected and encrypted in compliance with guidelines from the IT department. During travel, portable computer equipment should be treated as carry-on luggage. Fire drills should also be carried out on a regular basis. 6. IT communications and operations management Purchase and installation of IT equipment and software for IT equipment must be approved by the IT department. The IT department should ensure documentation of the IT systems according to universitys standards. Changes in IT systems should only be implemented if well-founded from a business and security standpoint. The IT department should have emergency procedures in order to minimize the effect of unsuccessful changes to the IT systems. Operational procedures should be documented and the documentation must be updated following all substantial changes. Before a new IT system is put in production, plans and risk assessments should be in place to avoid errors. Additionally, routines for monitoring and managing unforeseen problems should be in place. Duties and responsibilities should be separated in a manner reducing the possibility of unauthorized or unforeseen abuse of the universitys assets. Development, testing and maintenance should be separated from operations in order to reduce the risk of unauthorized access or changes, and in order to reduce the risk of error conditions. On system planning and acceptance, the requirements for information security must be taken into consideration when designing, testing, implementing and upgrading IT systems, as well as during system changes. Routines must be developed for  change management and system development/maintenance. IT systems must be dimensioned according to capacity requirements and the load should be monitored in order to apply upgrades and adjustments in a timely manner as it is especially important for business-critical systems. Written guidelines for access control and passwords based on business and security requirements should be in place. Guidelines should be re-evaluated on a regular basis and should contain password requirements (frequency of change, minimum length, character types which may/must be utilized) and regulate password storage. All users accessing systems must be authenticated according to guidelines and should have unique combinations of usernames and passwords. Users are responsible for any usage of their usernames and passwords. Data Gathering A structured questionnaire adapted and modified from previous questionnaires used by Corporate Governance Task Force, (2004) was used as the main instrument to gather data. Of the total 13 universities in Zimbabwe, 9 managed to participate in this research. The questionnaires were completed by the Executive Dean, IT Director, Operations Manager or Chairperson for the department. Section I: Organizational Reliance on IT The first section was designed to help in determining the institution’s reliance on information technology for business continuity. Table 1: Characteristics of Organization Questions Scores/Frequency 0 1 2 3 4 Dependence on information technology systems and the Internet to conduct academic, research, and outreach programs and offer support services 9 Value of organization’s intellectual property stored or transmitted in electronic form 2 7 The sensitivity of stakeholders (including but not limited to students, faculty, staff, alumni, governing boards, legislators, donors, and funding agencies) to privacy 2 3 4 Level of regulation regarding security (international, federal, state, or local regulations) 1 4 3 1 Does your organization have academic or research programs in a sensitive area that may make you a target of violent physical or cyber attack from any groups? 5 1 2 1 Total score 1 9 6 7 22 Scoring: Very Low = 0; Low = 1; Medium = 2; High = 3; Very High = 4 Section II: Risk Management: This section assesses the risk management process as it relates to creating an information security strategy and program. Table 2: Information Security Risk Assessment Questions Scores/Frequency 0 1 2 3 4 Does your organization have a documented information security program? 2 5 2 Has your organization conducted a risk assessment to identify the key objectives that need to be supported by your information security program? 2 4 3 Has your organization identified critical assets and the functions that rely on them? 2 2 5 Have the information security threats and vulnerabilities associated with each of the critical assets and functions been identified? 2 4 2 1 Has a cost been assigned to the loss of each critical asset or function? 1 3 3 2 Do you have a written information security strategy? 2 4 2 1 Does your written information security strategy include plans that seek to cost-effectively reduce the risks to an acceptable level, with minimal disruptions to operations? 4 2 2 1 Is the strategy reviewed and updated at least annually or more frequently when significant changes require it? 2 3 3 1 Do you have a process in place to monitor federal, state, or international legislation or regulations and determine their applicability to your organization? 2 2 3 2 1 Total 10 16 26 14 16 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Section III: People This section assesses the organizational aspects of the information security program. Table 3: Information Security Function/Organization Questions Scores/Frequency 0 1 2 3 4 Do you have a person that has information security as his primary duty, with responsibility for maintaining the security program and ensuring compliance? 4 3 1 1 Do the leaders and staff of your information security organization have the necessary experience and qualifications? 5 2 2 Is responsibility clearly assigned for all areas of the information security architecture, compliance, processes and audits? 3 4 1 1 Do you have an ongoing training program in place to build skills and competencies for information security for members of the information security function? 2 2 3 2 Does the information security function report regularly to institutional leaders and the governing board on the compliance of the institution to and the effectiveness of the information security program and policies? 2 3 3 1 Are the senior officers of the institution ultimately responsible and accountable for the information security program, including approval of information security policies? 3 4 2 Total 16 17 14 7 0 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Section IV: Processes This section assesses the processes that should be part of an information security program. Table IV: Security Technology Strategy Questions Scores/Frequency 0 1 2 3 4 Have you instituted processes and procedures for involving the security personnel in evaluating and addressing any security impacts before the purchase or introduction of new systems? 2 3 3 1 Do you have a process to appropriately evaluate and classify the information and information assets that support the operations and assets under your control, to indicate the appropriate levels of information security? 1 2 3 2 1 Are written information security policies consistent, easy to understand, and readily available to administrators, faculty, employees, students, contractors, and partners? 2 3 3 1 Are consequences for noncompliance with corporate policies clearly communicated and enforced? 1 3 2 3 1 Do your security policies effectively address the risks identified in your risk analysis/risk assessments? 2 3 4 Are information security issues considered in all important decisions within the organization? 3 2 3 1 Do you constantly monitor in real time your networks, systems and applications for unauthorized access and anomalous behavior such as viruses, malicious code insertion, or break-in attempts? 1 3 3 1 1 Is sensitive data encrypted and associated encryption keys properly protected? 2 3 2 1 1 Do you have an authorization system that enforces time limits and defaults to minimum privileges? 2 2 2 3 Do your systems and applications enforce session/user management practices including automatic timeouts, lock out on login failure, and revocation? 2 3 2 2 Based on your information security risk management strategy, do you have official written information security policies or procedures that address each of the following areas? Individual employee responsibilities for information security practices 4 3 1 1 Acceptable use of computers, e-mail, Internet, and intranet 2 3 2 2 Protection of organizational assets, including intellectual property 2 2 3 2 Access control, authentication, and authorization practices and requirements 1 2 3 1 2 Information sharing, including storing and transmitting institutional data on outside resources (ISPs, external networks, contractors’ systems) 2 1 3 2 1 Disaster recovery contingency planning (business continuity planning) 1 1 3 4 Change management processes 2 3 2 2 Physical security and personnel clearances or background checks 1 3 3 2 Data backups and secure off-site storage 1 1 3 4 Secure disposal of data, old media, or printed materials that contains sensitive information 2 3 4 For your critical data centers, programming rooms, network operations centers, and other sensitive facilities or locations: 2 3 4 Are multiple physical security measures in place to restrict forced or unauthorized entry? 1 2 3 3 Is there a process for issuing keys, codes, and/or cards that require proper authorization and background checks for access to these sensitive facilities? 2 1 3 3 Is your critical hardware and wiring protected from power loss, tampering, failure, and environmental threats? 1 4 4 Total 17 45 58 50 47 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Discussion As shown by the total scores on Table 1, a majority of the university has a very high reliance on the IT in their services. This is depicted by the structure and characteristics of the university. Information risk assessment and management leaves a lot to be desired by the universities. Most the universities have partially implemented such programs. A large number of employees in the IT departments of most universities do no have sufficient skills to implement good information security governance. Most universities lack the leaders who have the rightful know how on the subject. In addition  to that, there is no a representative in the council who will be an IT expert, hence most leaders lack interest and initiatives on information security. Due to lack of full responsibility of information security by the leaders, to implement processes for information security might also be a challenge especially to the IT department as normally is the department given the responsibility. Conclusion There is a need for institutions to start focusing on proper information security governance. For a start organization such as the Government, the Computer Society of Zimbabwe, Zim Law Society, POTRAZ, ICAZ, IIAZ, Zimbabwe Institute of Management and other industry governing bodies should put their heads together and define the appropriate legislations that mandates information security governance either by referring to existing international frameworks (PCI-DSS, SOX, COSO, ITIL, SABSA, Cobit FIPS, NIST, ISO 27002/5, CMM, ITG Governance Framework) or by consulting local information security and business professionals to come up with an information security governance framework. As the Zimbabwean economy is slowly sprouting, the art of information security governance in the universities should also take a leap. The adoption information security governance will ensure that security will become a part of any university and thus customers confidence will be boosted. References Drucker, P. ‘Management Challenges for the 21st Century’, Harpers Business , 1993. Corporate Governance Task Force, Information Security Governance: Call to Action, USA, 2004. IT Governance Institute, Board Briefing on IT Governance, 2nd Edition, USA, 2003, www.itgi.org. IT Governance Institute, Information Security Governance: Guidance for Boards of Directors and Executive Management, 2nd Edition, USA, 2006. ISO/IEC 38500: Corporate Governance of Information Technology, 2008. IT Governance Institute, COBIT 4.0, USA, 2005, www.itgi.org IT Governance Institute, COBIT ® Security Baseline, USA, 2004, www.itgi.org National Association of Corporate Directors, ‘Information Security Oversight: Essential Board Practices’, USA, 2001 John P. Pironti,  Ã¢â‚¬Å"Information Security Governance: Motivations, Benefits and Outcomes,† Information Systems Control Journal, vol. 4 (2006): 45–8. 21. Rutsito, T. (2005) ‘IT governance, security define new era’ The Herald, 07 November. Kaitano, F. (2010) ‘Information Security Governance: Missing Link In Corporate Governance’ TechZim. http://www.techzim.co.zw/2010/05/information-security-governance-missing-link-in-corporate-governance [accessed 02 May 2013]. Horton, T.R., Le Grand, C.H., Murray, W.H., Ozier, W.J. Parker, D.B. (2000). Information Security Management and Assurance: A Call to Action for Corporate Governance. United States of America: The Institute of Internal Auditors. Hostland, K, Enstad, A. P, Eilertsen, O, Boe, G. (2010). Information Security Policy: Best Practice Document. Corporate Governance Task Force, (2004). Information Security Governance: Call to Action, USA

Friday, November 15, 2019

Reticence :: essays research papers

Reticence THIS MORNING there was a dead cat in the harbor, a black cat that was floating on the surface of the water. It was straight and stiff and was drifting slowly along the side of a boat. From its mouth dangled a decomposed fish head with a piece of broken line about two inches long coming out of it. At the time I had simply imagined that this fish head was what remained of the bait from a discarded fishing line. The cat must have leaned into the water to catch the fish and, as he grabbed it, the hook caught in his mouth and he lost his balance and fell. The water of the harbor was very dark where I was standing, but from time to time I suspected there was a procession of fish, mullets and wrasse, passing silently below my eyes, while on the bottom, among the pebbles and algae, thousands of wriggling fry worked over the gutted remains of a decomposing eel. Before setting off again, I lingered a moment longer on the pier staring at the dead cat still drifting in the harbor in a very slow back and forth movement, first to the left, then to the right, following the imperceptible ebb and flow of the current at the surface of the water. I had arrived in Sasuelo at the end of October. It was already autumn and the tourist season was coming to an end. A taxi dropped me off one morning, bag and baggage, on the village square. The driver helped me undo my son's stroller from the roof-rack of the car, an old 504 diesel that he left running and that continued to hum slowly in place. Then he pointed in the direction of the only hotel in the area, that I was familiar with since I had already stayed there. I left my bags near a bench and set off in the direction of the hotel with my son who was installed in his stroller in front of me and paying no attention to anything around him, absorbed as he was in the contemplation of a toy seal that he turned over and over in his hands examining all its seams and releasing for the occasion an imperturbable burp as naturally as a prince. At the entrance of the hotel flowers lined a little flight of steps at the top of which opened double French doors, and I took the stroller in my arms to climb the steps. Reticence :: essays research papers Reticence THIS MORNING there was a dead cat in the harbor, a black cat that was floating on the surface of the water. It was straight and stiff and was drifting slowly along the side of a boat. From its mouth dangled a decomposed fish head with a piece of broken line about two inches long coming out of it. At the time I had simply imagined that this fish head was what remained of the bait from a discarded fishing line. The cat must have leaned into the water to catch the fish and, as he grabbed it, the hook caught in his mouth and he lost his balance and fell. The water of the harbor was very dark where I was standing, but from time to time I suspected there was a procession of fish, mullets and wrasse, passing silently below my eyes, while on the bottom, among the pebbles and algae, thousands of wriggling fry worked over the gutted remains of a decomposing eel. Before setting off again, I lingered a moment longer on the pier staring at the dead cat still drifting in the harbor in a very slow back and forth movement, first to the left, then to the right, following the imperceptible ebb and flow of the current at the surface of the water. I had arrived in Sasuelo at the end of October. It was already autumn and the tourist season was coming to an end. A taxi dropped me off one morning, bag and baggage, on the village square. The driver helped me undo my son's stroller from the roof-rack of the car, an old 504 diesel that he left running and that continued to hum slowly in place. Then he pointed in the direction of the only hotel in the area, that I was familiar with since I had already stayed there. I left my bags near a bench and set off in the direction of the hotel with my son who was installed in his stroller in front of me and paying no attention to anything around him, absorbed as he was in the contemplation of a toy seal that he turned over and over in his hands examining all its seams and releasing for the occasion an imperturbable burp as naturally as a prince. At the entrance of the hotel flowers lined a little flight of steps at the top of which opened double French doors, and I took the stroller in my arms to climb the steps.

Tuesday, November 12, 2019

J&J Automotive Sales

1. Explain how you think the stereotype of used-car dealers developed. Stereotyping is like Building what is not thought to be said about the product, assuming that the used cars certainly will break down and others see it like purchasing used cars is not sensible because of maintaining it will be more expensive instead others will buy a brand new car. 2. What, if anything, can Joe do to counter this stereotype? Joe, say’s that building a good relationship with all his customers is compulsory, and He should be concerned about their Sensitivity and to be aware of their needs and wants for purchasing a suitable car, knowing what is the need of the customer is knowing what is the best car fit to their need. It is also showing concern for them. Joe will spend extra time in his work to achieve great customer satisfaction and high quality. He will also find a way to interact with his customers for future needs. 3. In what ways might this stereotype be beneficial to Joe? To potential customers? Stereotyping could be helpful if it can give Joe a positive effect to increase his sales and customers. To have more potential customers positive stereotyping is helpful; because the sooner customers are satisfied with their own needs the more the effect will encourage their friends to see them that the used car they bought to Joe is good as new but absolutely not as expensive as buying a brand new car. 4. AutoNation is #93 on the 2003 Fortune 500. It has created a huge business by exploiting the public’s perception of used-car dealers. What do you think they have done to change the stereotype? One of the largest retailers in America is Auto Nation, I think what they need to do is to change the awareness of their product to the public. They are more clear to their product and they are setting series of tests and doing over – all set-up to their used cars so that buyers will certainly be satisfied. AutoNation builds its integrity for the public to be aware of how safe and secure their vehicles are that they purchased. Testing others to try their products to know what is slowing their system down, I think they are testing their critics in front of the public to try their product and tell to the public the problem and the perception of the public to that experience will have make it a positive effect Also if the used car will encounter some problems. On this Case Base on the class debate the idea of awareness is people only see what is on the outside and in that scene they are assuming or inferring what is the behavior of an individual only to find out they are wrong.

Sunday, November 10, 2019

A Rationale for teaching the Foundation Subjects within Early Years and Primary Education

The underlying basis for the inclusion of foundation subjects within early years and primary education might not be immediately apparent, particularly for first year students studying towards qualified teacher status. This essay will, therefore, unfold the reasons for this inclusion whilst including specific reference to the enclosure of history teaching.The National Curriculum (NC), introduced in 1988 and currently undergoing revision, consists of the core subjects: English, mathematics and science; compulsory at all key stages, and the foundation subjects: art, design technology (DT), geography, history, information and communication technology (ICT), modern foreign languages (MFL), music, personal, social and health education (PSHE) and physical education (PE); most of which are compulsory at one or more of the key stages (DfE, 2013).It is also important to remember that Religious Education is included within the basic curriculum and is legally bound to be taught, however children can forego the subject at their parents request. Since 2008 the Early Years Foundation Stage (EYFS) has become integrated within all childcare providers, except mother and toddler groups, nannies and short-term crà ¨ches, and covers the welfare and development of children (BBC). This essay will not only demonstrate a rationale for the inclusion of foundation subjects in both the EYFS and NC, but also examine how history is developed into children’s learning through both stages.Boys and Spink (2008) believe the foundation subjects and RE ‘have the potential to be the most powerful, most meaningful and most relevant areas of learning for all learners’ (p. xii). Hoodless (2008) develops this further with history, stating â€Å"the most significant reason for teaching history in primary schools is that it motivates children and captures their imaginations† (p. 2). Both statements reflect on the importance of teaching history and other foundation subjects, ye t focuses on extra-curricular benefits.History can lead to many cross-curricular links and it has been suggested by Davies and Redmond (1998) that teaching history in isolation ‘would be a horrible waste of universal discipline’ (p. 39). Looking at time-lines in history can help to develop mathematical skills, whereas art can be pulled in by the associations with drawing or painting ancient artefacts. Fines (2013) also believes in the importance of history due to its cross-curricular abilities, he says â€Å"history can contribute to learning across the whole spectrum of the curriculum and does so effectively† (p.6).As a core subject, mathematics is something that, when applicable, should always be integrated into a child’s learning. However, as a foundation subject itself, art is a skill which helps to develop children’s creativity and imagination, thus making art a valuable attribute that should be included when possible. Furthermore, childrenâ₠¬â„¢s art work is often used as displays within schools; this way of celebrating work is a great way of boasting children’s confidence as well as giving them a sense of reward.This is vital for motivation, enthusiasm and inspiration which will encourage children to get involved in further learning and therefore learn more effectively (NASP, 2003). The NC is currently undergoing revision, due for implementation into schools in September 2014. Government says the review comes from the need to catch up with the world’s best education systems. Prime Minister, David Cameron says this â€Å"revolution in education† is vital for the country's economic affluence and that it should be written by experts and not restricted to ministers' â€Å"personal prejudices† (BBC, 2013).According to The Guardian (2013) changes will be welcome across the Key Stages (KS). However, it claims that for KS1, history will not differ too much from the previous NC and that ‘the m ore noticeable changes are in KS2’. Both Key Stages will see a new stress in the importance of chronological understanding. This is a result of the 2011 Ofsted report in which it states â€Å"although pupils in primary schools generally had good knowledge†¦their chronological understanding and their ability to make links across the knowledge they had gained were weaker† (p. 5).Ofsted (2011) claimed that this was due to ‘many primary teachers not having adequate subject knowledge’ (p. 4). This developed the need for the curriculum to ensure that pupils study an overview as well as in-depth topics. The old curriculum (2000) states that pupils should be taught the knowledge, skills and understanding through: a local history study; three British history studies; a European history study; a world history study (p. 106). Whereas the Programmes of Study for the revised curriculum (2013) shifts towards how history fits together and how events from one time pe riod can affect another, maintaining that  teaching should combine overview with in-depth studies to aid pupils understanding on chronology (p. 3).In Ofsted-registered settings, children from birth to 5 years old work towards the EYFS as opposed to the NC. With regards to history, much of what this age range will learn comes from the ‘Knowledge and Understanding of the World’ aspect of the Early Learning Goals. It is expected that by the end of the foundation stage, children will ‘talk about past and present events in their own lives and in the lives of family members’ (DfE, 2012, p.9) The EYFS understands that it would be unrealistic for such young children to fully comprehend the defined body of factual information that is history, however a development of finding out about changes and passage of time is not (O’Hara and O’Hara, 2001, p. 18). There are many story books that can reveal to young children a language that identifies a concept o f ‘long ago’. Stories such as ‘When Grandma Was Young’ (Humphrey, 2000), ‘Elmer and Grandpa Eldo’ (Mckee, 2001) and ‘My Granny is a Pirate’ (Mcdermid and Robins, 2012) can invoke interest with early years children and inspire them to become inquisitive about the past.It has been suggested that time means nothing to young children. However learning to ask and answer questions through story reading will enhance their concept history. Therefore continuing to do so through the Early Learning Goals will prepare children, entering at primary level, to appreciate the importance of history (Lunn and Bishop, 2004). It is important to remember to children do not stop learning history when they finish their time at primary school. Maintained secondary schools follow the NC which maintains that all children will continue to learn history by means of the KS3 History Programmes of Study (2013).Therefore it is important to prepare children for mo re challenging and precise history learning. New topics shall be introduced so it is important children have the skills to ‘identify significant events, make connections, draw contrasts, and analyse trends’ (p. 72). It is, furthermore, defined that pupils will ‘pursue historically valid enquiries including some they have framed themselves’ (p. 72). This indicates towards children becoming independent critical thinkers, a valuable quality to have in adult life, this alone is a fundamental reason for the inclusion of history in the NC (DfE, 2013).Hoodless (2008) believes that history offers a range opportunities to overcome barriers in learning, with specific reference to gender, class and ethnic and cultural backgrounds. She believes that there are many ways to teach history to make it inclusive to everyone and says that â€Å"inclusive practise involves treating each individual with respect, included them equally in whatever is taking place and responding appropriately to their different needs† (p. 140). She argues that history education can reach individuals in different ways because of the many approaches and strategies used to teach it.For example, a child who struggles to read can be given visual sources to aid their learning rather than long pieces of text, thus benefitting the child more (p. 135). Another underlying reason for teaching history is because of the opportunities it can give to children from minority ethnic and cultural backgrounds. Although sensitivity must be empathised, using cases of past civilisations to stimulate an identification of how prejudgments, such as racism, sexism or any other type of discrimination, arose can then contribute to eliminating them (p.139).Boys and Spink (2008) expands on this by proposing that the history curriculum should be ‘culturally relevant to all pupils’ (p. 71). The United Kingdom has become a diverse multicultural society over the years. Consequently, Boys a nd Spink (2008) suggest that the NC study unit ‘Britain since 1948’ provides an opportunity to explore the Commonwealth immigration (p. 71). Exploring such a topic will provide children with an understanding of different culture’s arrivals into the United Kingdom which they might otherwise not ever be educated on.As part of the Professional Standards for qualified teacher status (QTS), teachers are expected to demonstrate that they are able to plan opportunities for children to learn in out-of-school environments (DfE, 2013, p. 8). Such settings as, museums, theatres, school visits, fieldwork and employment-based locations can all be used as a means for enriching children’s learning. From birth children are trying to make sense of their multi-sensory environment, making them active learners. To limit children’s learning to the classroom would be a shameful waste of the valuable resources that are on offer to enhance their education.Out-of-school lea rning helps to develop skills including decision-making, group work and critical thinking, all of which are key attributes to have. Hoodless et al. (2003) takes this further by saying that ‘the sensory experiences help all kinds of learner to remember and learn from the locality and its inhabitants’ (p. 136). Outside learning can be restricted to the school’s boundaries or the close localities and still offer the same benefits. The school itself can be studied for design elements that can be analysed to identify the age of the building.Taking a short walk out the school grounds can provide a wealth of people, building and landscapes that children can learn from. It is important to remember, however, the risk assessments that need to be carried out in order for these events to take place. In many cases consent from the parent will need to be given in order to take children out of school. It is also essential to prepare clearly structured learning objectives in ord er to achieve greatly from out-of-school learning and make the most of the time dedicated to such pedagogy (Hoodless, 2003, p.137-140).Furthermore, with the threatened return of rickets in children recently, giving them more chances to study outside could prevent this. The Telegraph (2013) reported that the increase has come from children spending ‘too much time indoors on computers and gaming consoles’ which is why incorporating outdoor study into children’s learning will benefit them entirely. Finally, multiple reviews of the foundation subjects within the curriculum only reflect on the commitment for enriching children’s learning that government have (Boys and Spink, 2008, p.xii). Foundation subjects influence cross-curricular and out-of-school learning, making them more appealing and beneficial for children. Additionally, Johnston (2002) talks of how young children [in the EYFS] develop knowledge of how the world works by exploring the world around the m. She says â€Å"the wider their informal experiences, the broader and deeper will be their understandings† (p. 24). This suggests that the integration of foundation learning within the EYFS is the source of children’s initial understanding of the world they live in.The need to develop a sense of history learning in the EYFS has been addressed by looking at the importance of invoking interest about the past. Furthermore, Ofsted (2011) found that history was a ‘popular and successful subject, which many pupils enjoyed’ (p. 5). This statement alone could be the rationale for teaching history in primary schools. A subject that can captivate students and encourage them to learn more is an underlying reason for that subject to be taught. A Rationale for teaching the Foundation Subjects within Early Years and Primary Education The underlying basis for the inclusion of foundation subjects within early years and primary education might not be immediately apparent, particularly for first year students studying towards qualified teacher status. This essay will, therefore, unfold the reasons for this inclusion whilst including specific reference to the enclosure of history teaching.The National Curriculum (NC), introduced in 1988 and currently undergoing revision, consists of the core subjects: English, mathematics and science; compulsory at all key stages, and the foundation subjects: art, design technology (DT), geography, history, information and communication technology (ICT), modern foreign languages (MFL), music, personal, social and health education (PSHE) and physical education (PE); most of which are compulsory at one or more of the key stages (DfE, 2013).It is also important to remember that Religious Education is included within the basic curriculum and is legally bound to be taught, however children can forego the subject at their parents request. Since 2008 the Early Years Foundation Stage (EYFS) has become integrated within all childcare providers, except mother and toddler groups, nannies and short-term creches, and covers the welfare and development of children (BBC). This essay will not only demonstrate a rationale for the inclusion of foundation subjects in both the EYFS and NC, but also examine how history is developed into children’s learning through both stages.Boys and Spink (2008) believe the foundation subjects and RE ‘have the potential to be the most powerful, most meaningful and most relevant areas of learning for all learners’ (p. xii). Hoodless (2008) develops this further with history, stating â€Å"the most significant reason for teaching history in primary schools is that it motivates children and captures their imaginations† (p. 2). Both statements reflect on the importance of teaching history and other foundation subjects, yet f ocuses on extra-curricular benefits.History can lead to many cross-curricular links and it has been suggested by Davies and Redmond (1998) that teaching history in isolation ‘would be a horrible waste of universal discipline’ (p. 39). Looking at time-lines in history can help to develop mathematical skills, whereas art can be pulled in by the associations with drawing or painting ancient artefacts. Fines (2013) also believes in the importance of history due to its cross-curricular abilities, he says â€Å"history can contribute to learning across the whole spectrum of the curriculum and does so effectively† (p.6).As a core subject, mathematics is something that, when applicable, should always be integrated into a child’s learning. However, as a foundation subject itself, art is a skill which helps to develop children’s creativity and imagination, thus making art a valuable attribute that should be included when possible. Furthermore, childrenâ€℠¢s art work is often used as displays within schools; this way of celebrating work is a great way of boasting children’s confidence as well as giving them a sense of reward.This is vital for motivation, enthusiasm and inspiration which will encourage children to get involved in further learning and therefore learn more effectively (NASP, 2003). The NC is currently undergoing revision, due for implementation into schools in September 2014. Government says the review comes from the need to catch up with the world’s best education systems. Prime Minister, David Cameron says this â€Å"revolution in education† is vital for the country's economic affluence and that it should be written by experts and not restricted to ministers' â€Å"personal prejudices† (BBC, 2013).According to The Guardian (2013) changes will be welcome across the Key Stages (KS). However, it claims that for KS1, history will not differ too much from the previous NC and that ‘the more noticeable changes are in KS2’. Both Key Stages will see a new stress in the importance of chronological understanding. This is a result of the 2011 Ofsted report in which it states â€Å"although pupils in primary schools generally had good knowledge†¦their chronological understanding and their ability to make links across the knowledge they had gained were weaker† (p. 5).Ofsted (2011) claimed that this was due to ‘many primary teachers not having adequate subject knowledge’ (p. 4). This developed the need for the curriculum to ensure that pupils study an overview as well as in-depth topics. The old curriculum (2000) states that pupils should be taught the knowledge, skills and understanding through: a local history study; three British history studies; a European history study; a world history study (p. 106).Whereas the Programmes of Study for the revised curriculum (2013) shifts towards how history fits together and how events from one time period can affect another, maintaining that  teaching should combine overview with in-depth studies to aid pupils understanding on chronology (p. 3). In Ofsted-registered settings, children from birth to 5 years old work towards the EYFS as opposed to the NC. With regards to history, much of what this age range will learn comes from the ‘Knowledge and Understanding of the World’ aspect of the Early Learning Goals. It is expected that by the end of the foundation stage, children will ‘talk about past and present events in their own lives and in the lives of family members’ (DfE, 2012, p.  9)The EYFS understands that it would be unrealistic for such young children to fully comprehend the defined body of factual information that is history, however a development of finding out about changes and passage of time is not (O’Hara and O’Hara, 2001, p. 18). There are many story books that can reveal to young children a language that identifies a concept o f ‘long ago’. Stories such as ‘When Grandma Was Young’ (Humphrey, 2000), ‘Elmer and Grandpa Eldo’ (Mckee, 2001) and ‘My Granny is a Pirate’ (Mcdermid and Robins, 2012) can invoke interest with early years children and inspire them to become inquisitive about the past.It has been suggested that time means nothing to young children. However learning to ask and answer questions through story reading will enhance their concept history. Therefore continuing to do so through the Early Learning Goals will prepare children, entering at primary level, to appreciate the importance of history (Lunn and Bishop, 2004). It is important to remember to children do not stop learning history when they finish their time at primary school. Maintained secondary schools follow the NC which maintains that all children will continue to learn history by means of the KS3 History Programmes of Study (2013).Therefore it is important to prepare children for mo re challenging and precise history learning. New topics shall be introduced so it is important children have the skills to ‘identify significant events, make connections, draw contrasts, and analyse trends’ (p. 72). It is, furthermore, defined that pupils will ‘pursue historically valid enquiries including some they have framed themselves’ (p. 72). This indicates towards children becoming independent critical thinkers, a valuable quality to have in adult life, this alone is a fundamental reason for the inclusion of history in the NC (DfE, 2013).Hoodless (2008) believes that history offers a range opportunities to overcome barriers in learning, with specific reference to gender, class and ethnic and cultural backgrounds. She believes that there are many ways to teach history to make it inclusive to everyone and says that â€Å"inclusive practise involves treating each individual with respect, included them equally in whatever is taking place and responding appropriately to their different needs† (p. 140). She argues that history education can reach individuals in different ways because of the many approaches and strategies used to teach it.For example, a child who struggles to read can be given visual sources to aid their learning rather than long pieces of text, thus benefitting the child more (p. 135). Another underlying reason for teaching history is because of the opportunities it can give to children from minority ethnic and cultural backgrounds. Although sensitivity must be empathised, using cases of past civilisations to stimulate an identification of how prejudgments, such as racism, sexism or any other type of discrimination, arose can then contribute to eliminating them (p.  139).Boys and Spink (2008) expands on this by proposing that the history curriculum should be ‘culturally relevant to all pupils’ (p. 71). The United Kingdom has become a diverse multicultural society over the years. Consequently, Bo ys and Spink (2008) suggest that the NC study unit ‘Britain since 1948’ provides an opportunity to explore the Commonwealth immigration (p. 71). Exploring such a topic will provide children with an understanding of different culture’s arrivals into the United Kingdom which they might otherwise not ever be educated on.As part of the Professional Standards for qualified teacher status (QTS), teachers are expected to demonstrate that they are able to plan opportunities for children to learn in out-of-school environments (DfE, 2013, p. 8). Such settings as, museums, theatres, school visits, fieldwork and employment-based locations can all be used as a means for enriching children’s learning. From birth children are trying to make sense of their multi-sensory environment, making them active learners. To limit children’s learning to the classroom would be a shameful waste of the valuable resources that are on offer to enhance their education.Out-of-school learning helps to develop skills including decision-making, group work and critical thinking, all of which are key attributes to have. Hoodless et al. (2003) takes this further by saying that ‘the sensory experiences help all kinds of learner to remember and learn from the locality and its inhabitants’ (p. 136). Outside learning can be restricted to the school’s boundaries or the close localities and still offer the same benefits. The school itself can be studied for design elements that can be analysed to identify the age of the building.Taking a short walk out the school grounds can provide a wealth of people, building and landscapes that children can learn from. It is important to remember, however, the risk assessments that need to be carried out in order for these events to take place. In many cases consent from the parent will need to be given in order to take children out of school. It is also essential to prepare clearly structured learning objectives in order to achieve greatly from out-of-school learning and make the most of the time dedicated to such pedagogy (Hoodless, 2003, p.  137-140).Furthermore, with the threatened return of rickets in children recently, giving them more chances to study outside could prevent this. The Telegraph (2013) reported that the increase has come from children spending ‘too much time indoors on computers and gaming consoles’ which is why incorporating outdoor study into children’s learning will benefit them entirely. Finally, multiple reviews of the foundation subjects within the curriculum only reflect on the commitment for enriching children’s learning that government have (Boys and Spink, 2008, p.  xii).Foundation subjects influence cross-curricular and out-of-school learning, making them more appealing and beneficial for children. Additionally, Johnston (2002) talks of how young children [in the EYFS] develop knowledge of how the world works by exploring the world around them. She says â€Å"the wider their informal experiences, the broader and deeper will be their understandings† (p. 24). This suggests that the integration of foundation learning within the EYFS is the source of children’s initial understanding of the world they live in.The need to develop a sense of history learning in the EYFS has been addressed by looking at the importance of invoking interest about the past. Furthermore, Ofsted (2011) found that history was a ‘popular and successful subject, which many pupils enjoyed’ (p. 5). This statement alone could be the rationale for teaching history in primary schools. A subject that can captivate students and encourage them to learn more is an underlying reason for that subject to be taught.