Tuesday, May 19, 2020

Ethical Issues in Hrm Strategy - 1200 Words

Ethical Issues in HRM Strategy Richard H. Hill Dr. Grace M. Endres July 18, 2012 Strayer University Abstract This paper concerns itself with the role of Human Resource Management and the role it plays in the development of corporate strategy. Additional, the paper addresses the issue of ethics concerning Human Resource Managers sharing information learned from a previous client with the new client. Identify the areas of overlap in the new client organization with others that you have had as clients. If you have limited experience with these types of problems, be sure to research common issues to complete the question. An area of overlap for a Human Resources consulting include the area of employment laws based in Title VII†¦show more content†¦These articles also documented the unethical behavior of an HR consultant who used privileged financial information to enrich himself and his best friend at the clients expense (Former Mercer HR, n.d.). Discuss your approach to customizing HRM strategy to business strategy Prior to any discussions regarding HRM alignment with business strategy, it is necessary to distinguish the role of traditional HR from the role of strategic HRM. The Journal of Management published an excellent article written jointly by Brian E. Becker and Mark A. Huselid. The article was entitled Strategic Resource Management: Where Do We Go From Here? Becker and Huselid made a distinction between Human Resources and Strategic Human Resource Management. According to Becker and Huselid, the distinction between HR and HRM centers on two important facts. First, traditional HR focused on individual performance and in contrast, HRM focused on organizational performance. Second, HRM uses human resources systems to solve business problems conversely, traditional HR kept human resource functions separate from the business functions (Becker amp; Huselid, 2006). Human Resource managers must gain the confidence of the business leaders for whom they work. HRM gains the confidence of the business team by approaching human resource strategy and business goals as inextricably linked. In othersShow MoreRelatedHrm 560843 Words   |  4 PagesEthical Issues In HRM Strategy Brandi Hancock HRM 530 Strategic Human Resource Management October 30, 2012 Dr. Lila Jordan Ethical Issues in HRM Strategy Identify areas of overlap in the new client organization with other that you have had as clients When hired as a newly HRM (Human Resource Management) consultant, you must first have understand of the role before beganing assisting with any issues or other areas of overlap. The primary role of a HRM consultant â€Å"is to assist the clientRead MoreEthical Issues in Human Resource Management Strategies936 Words   |  4 PagesEthical issues in HRM strategy Introduction The plans for managing an organizations structure, culture, people, training and development are referred to as HRM strategies. These strategies are also used to determine how employees fit in the organizations growth in the future. In business practices, the level of honesty and transparency is referred to as ethics. HRM strategies should guide employees on their workplace behavior. These strategies show the organizations expectations of its employeesRead MoreThe Framework of Human Resource Management920 Words   |  4 PagesIntroduction The essay will introduce the reader to the framework of Human Resource Management (HRM) practices that can help companies deal with sustainability, globalization and technology challenges. The essay is divided into 4 broad sections which are the four dimensions that form the framework of HRM practices. In each of the sections, there will be examples of HRM practices within each area. Managing the Human Resource Environment Noe et al (2010) mention that managing internal and externalRead MoreHr Functions and Organizational Ethics1261 Words   |  6 PagesHR Functions and Organizational Ethics HRM/427 Dr. Donovan Lawrence September 5, 2010 Human Resources professionals are responsible for several roles in the workplace, including implementing and managing policies, recruiting and retention, and training and development. The HR department is responsible for making sure that organizations conduct business ethically and that shareholders are treated ethically. The HR department must be able to monitor compliance with federal and stateRead MoreHuman Resources, Strategy And Business Ethic1545 Words   |  7 PagesHuman Resources, Strategy and Business Ethic Page Break Introduction The 21st century workplace environment is established on numerous reforms and transformations in different aspects that constitute the management of human resources. Therefore, the human resource departments in different departments have adopted different approaches to managing their employees. In this regard, most businesses and organizations across the globe have adopted different concepts of strategic human resource managementRead MoreThe Framework of Human Resource Management912 Words   |  4 PagesIntroduction The essay will introduce the reader to the framework of Human Resource Management (HRM) practices that can help companies deal with sustainability, globalization and technology challenges. The essay is divided into 4 broad sections which are the four dimensions that form the framework of HRM practices. In each of the sections, there will be examples of HRM practices within each area. Managing the Human Resource Environment Noe et al (2010) mention that managing internal and externalRead MoreBusiness Ethics For Human Resource Management1309 Words   |  6 PagesExplain the potential roles of human resource managers in the ethical conduct of business. By Shehan Perera (100684161) Ethics in HRM suggests the treatment of employees with common decency and justice. Ethical business practices contributes to the long and short term business objectives as the employees will feel motivated thus they will work efficiently and effectively . The conduct of ethics in HRM fundamentally deals with the affirmative moral obligations ofRead MoreEffect Of Human Resource Management1274 Words   |  6 PagesInformation Systems Project Management (MSIS 5033) Dr. Art LaNata â€Æ' Abstract Human resource management, commonly abbreviated as HRM is a function of an organization which is created to positively optimize employee performance of an employer s business strategic goals. HRM aims on systems policies and is mainly associated with the people’s management within the organizations. HRM can be useful for any organization although it pose different challenges for different organizations and varies for organizationsRead MoreRole of Human Resource Management673 Words   |  3 PagesRecruitment and training have been part of HRM for decades, and overall considerably between clients. HRM usually does the advertising, screening, and initial testing; then once hired, basic training and orientation to the company. These issues are tactical, but strategic in that HRM is now tasked with planning and projecting employees, helping to retain talent, and recruiting more aggressively and robustly rather than simply advertising for a job. Strategic HRM takes on an even more common role becomingRead MoreThe Role Of Human Resource Management And The Strategy Process1462 Words   |  6 Pagespaper will review the role of human resource management (HRM) in the strategy process. This will include the function of recruitment and training programs in HRM, the concept of strategic fi t and how human resource management can lead to a competitive advantage. Also I will look at compensation and benefits, relevance to my workplace, and my personal reflection. The manner in which an organization’s personnel are managed has a tangible influence on the productivity of the employees, which

Plato s Allegory Of The Cave Essay - 1842 Words

Many, even perhaps all of the great religious texts we have read in this class have talked and discussed about the individual human ego. Although there is no absolutely solid evidence to prove that the Bhagavad-Gita and the Tao Te Ching have a relation that influenced each other, the core ideas of these two great works from two great ancient culture have surprising similarities. This discovery can be explained by the similarity of Chinese and Indian cultural background. However, in Plato’s works (the Five Dialogues and the Republic), we are able to find pieces about importance of our ego as well. Plato is one of the most important philosophers in western history. That brings us a question, why ego is such significant for both western and eastern philosophers and religious works? Sigmund Freud, who carried on Plato’s thinking on humanity and our society, pointed out what Plato has vaguely discussed about that the significance and impact the ego has on us. In Platoâ€℠¢s Allegory of the Cave, what the prisoners are actually experiencing the fight between id and ego. The process of getting out of the cave and getting used to the sunlight are the process of taming the ego inside the prisoners (Jowett 12). In Freud s theory, the ego mediates among the id, the super-ego and the external world. Its task is to find a balance between primitive drives, morals, and reality while satisfying the id and superego. Its main concern is with the individual s safety and allows some of the idShow MoreRelatedPlato s Allegory Of The Cave1716 Words   |  7 PagesIn Plato’s, Allegory of the cave, a key theory I found was the importance of education. Plato uses an â€Å"allegory to illustrate the dilemma facing the psyche in the ascent to knowledge of the imperishable and unchanging forms† (104) Based on my research of the republic, the allegory can reveal multiple hidden messages. Plato describes, ordinary mortals are chained within an underground chamber, which according to Fiero, represents the psyche imprisoned within the human body. These mortals can’t lookRead MorePlato s Allegory Of Cave1979 Words   |  8 PagesJaneva Walters December 6, 2016 Dr. T. Brady ENG 391 Plato’s Allegory of Cave The allegory of the cave is regarded as one of the most reputed and acclaimed works by the Greek philosopher Plato in modern literature as well as philosophy. First published and presented in his work known as a Republic (514a–520a), the dialogues that have been used as conversation can be regarded as fictitious as the main conversation takes place between Plato’s brother Glaucon and Socrates. First and foremost, allegoricalRead MorePlato s Allegory Of The Cave1814 Words   |  8 PagesIn Plato’s, â€Å"Allegory of the Cave†, a key theory I found was the importance of gaining knowledge. Plato uses an â€Å"allegory to illustrate the dilemma facing the psyche in the ascent to knowledge of the imperishable and unchanging forms† (Fiero, 104). Based on my research of the Republic, the allegory can reveal multiple hidden messages. Plato describes in the Allegory, ordinary mortals who are chained within an underground chamber, which according to Fiero, r epresents the psyche imprisoned within theRead MorePlato s Allegory Of The Cave1379 Words   |  6 Pagesbeen in a cave? Caves are dark, cold, and often times dangerous. People who lose their source of light in a cave often face death from physical injury or hypothermia, unless otherwise rescued. The Greek philosopher Plato illustrated the difference between reality and illusion through a story about prisoners who lived their entire existence in a cave. Plato tells the â€Å"Allegory of the Cave† as a conversation between Socrates, his mentor, and Glaucon, one of Socrates’ students. Plato’s allegory of theRead MorePlato s Allegory Of The Cave Essay1630 Words   |  7 Pagescondition impressed by an image can sometimes like as a flame, spreading throughout other discourses for long after its initial kindling. Such is the case with Plato s allegory of the cave, which has for over 2,500 years inspired significant contributions to theorizations of truth. Despite t he age of Plato s work, the truth in the allegory is demonstrated by its own universality; as a formative piece of literature, the story acts as a gateway into Western discourses of truth. Truth remains an elusiveRead MorePlato s The Allegory Of The Cave1965 Words   |  8 PagesIn this paper I shall argue for Socrates’ notion in the Allegory of the Cave, saying that the purpose of education is not to place knowledge to the mind where there was none, but instead to recognise the already underlying existence of such insight inside the mind, and to help divert the ones in need of teaching onto the correct path to find and retrieve such knowledge. Plato in his time was a dedicated student of Socrates, so most of Socrates â€Å"logos† and concepts heavily influenced Plato’s futureRead MorePlato s Allegory Of The Cave910 Words   |  4 Pagesnature within them to reach their potential. Allegory is to reveal a hidden meaning, normally a moral, based on fictional stories. Plato Allegory of the Cave reminds us that the theory of Forms is real and suggests that the one with the empirical science would share his mind with the commoner in society. We must grasp the complex different types of Forms – opinion, knowledge and beauty really meant for Plato. In Plato’s Allegory of the Cave, Plato talks about dualism, mind (soul) and body. InRead MorePlato s Allegory Of The Cave Essay1370 Words   |  6 Pagesflesh to satisfy the god (Ahmed 2010). All of these civilizations were interactive with their environment, but imagine if one knew only of the reality they believed inside of a cave not experiencing e vents within the real world. In Plato’s, Allegory of the Cave, he describes the scenario of prisoners kept isolated in a cave left to come up with a reality that they comprehended with the images that they saw in front of them. This applies especially to politics, because people are left to decipherRead MoreAnalyzing Plato s Allegory Of The Cave874 Words   |  4 PagesI’ll be analyzing Plato’s Allegory of the Cave through my own interpretation. An allegory is defined as â€Å"a story, poem, or picture that can be interpreted to reveal a hidden meaning, typically a moral or political one.† In Plato’s Republic the short excerpt The Allegory of the Cave can be viewed through multiple perspectives. Plato’s image of the cave is known as the â€Å"theory of forms†¦ The theory assumes the existence of a level of reality inhabited by ideal â€Å"forms† of all things and concepts (Revelations:Read MorePlato s Allegory Of The Cave1217 Words   |  5 Pagesthe other persons and sometimes that can get a little out of hand, depending on who you are dealing with. I guess the major point in all this is to never judge a book by its cover, always learn yourself. In Plato’s â€Å"Allegory of the Cave†, there are these prisoners that live in a cave and have never seen any natural sunlight. They can only see shadows of things displayed on the wall by the light coming from the fire. The prisoners get happy and interested by the shadows they see. The shadows could

Wednesday, May 6, 2020

Improving Police Community Relations Between Police And...

Improving police-community relations allows officers to do their job more effectively, it can also help officers have a better morale and find their jobs safer and easier. If a level of trust is established between police and the community they serve, members of the community will be more willing to offer their help to solve crimes, and give out information about possible suspects. It is extremely important for the police to have an open line communication to the community if they want to increase the community’s level of satisfaction. Improving police-community relations will not only benefit the police department, it will also help community members. If the residents of a respective area trust their police officers they will be able to have less fear and feel safer around their neighborhood. It will also help because if the police and the community work together crimes will be resolved quicker which will lead to criminals being apprehended, crime levels being lower and the community being safer. There are many things that distinguish community policing from traditional policing. For example, in traditional policing the focus and most important goal is to apprehend criminals and bring them to justice. However, community policing focuses on ways the police department and the community could get together to prevent crime and become a team. One of the major differences is that in community policing there is a pact of shared responsibility, in which both community residentsShow MoreRelatedPolice Influence On Society : The United States943 Words   |  4 PagesPolice Influence on Society The United States is one of the most civilized and structured countries in the World. Since the early settlers came to the new country and established settlements there has been a need for law enforcement. As most of the settlers immigrated from English colonies it is no surprise that law enforcement in the new world was modeled from English culture however, no matter if its United States or England government is the foundation of law enforcement. As such, policingRead MoreImproving The Relationship Between The Police And The Public960 Words   |  4 PagesPSC 201 Fall 2015 Improving the Relationship Between the Police and the Public There are many reasons why the police have a difficult time interacting with the communities they are supposed to protect and serve. These issues did not occur overnight however the string of police involved shootings throughout the United States seems to wedge a bigger gap between the pubic and the police, along with poor communication skills and lack of positive engagement with the community. Police officers deal withRead MoreCultural Competence Of Law Enforcement Agencies865 Words   |  4 PagesDiscussion Although the questionnaire and interview processes are useful in gaining a better understanding of the cultural competence of law enforcement agencies, they are not helpful in improving the cultural competency of those agencies. This is where instituting mandatory cultural competency training comes into play. For example, the Equal Employment Opportunity Commission proposed steps and recommendations to increase cultural competency and one of those steps was to â€Å"develop and deploy effectiveRead More Profiling and Police/Community Relations Essay1435 Words   |  6 Pagesprofiling and police-community relations are comprised of a two-fold focus. The first focal point concentrates on attitudes members of a community have about profiling in accordance to actions conducted by police officers upon them in the course of their duties. The second focal point concentrates on the profiling of police officers, as completed by early intervention systems, in an effort to reduce complaints from members of the community. The literature on the attitudes which community membersRead MoreThe Future of Policing1461 Words   |  6 Pagescurrently affecting policing is police-community relations. There is a strong emphasis now on community policing, which promotes trust and better relationships between police officers and community members, and less on the militaristic style (Stephens, 2005). Improving police-community relations not only accents the importance of diversity, but it reduces prejudice and discrimination by officers. Community policing helps build trust between the police and community members by relying on citizens toRead MoreCriminal Justice System1524 Words   |  7 Pagesreduce the crime and the fire of crime. In order to achieve this it is using different agencies and the major of them are the Police, Prosecution, Courts, Prisons and Probation. They all are operating in synchrony for achieving their legal responsibilities and particularly for reducing the level of crime. The aim of this essay specifically is to discuss the functions of the police and how they actually fit with the objectives of the Criminal Justice System as a whole. The Criminal Justice System is focusingRead MoreLeadership And The Ability Of Influence Change1494 Words   |  6 Pageslieutenant with the University Police at Buffalo State. He received his bachelor’s degree of science in Criminal Justice. During his undergrad years, he was placed on the Dean’s List numerous times. He started as a University Police Officer and was later promoted to lieutenant. Last year, he was nominated for the Professional Service Award, following a hit-and-run incident involving a driver who struck a student at Grant and Letchworth streets. He assisted the Buffalo police in arresting the driver, andRead MoreCultural Diversity Within The United States1194 Words   |  5 Pagescluster of tension and conflict between police and minority communities within the United States. The job of a police office r is to enforce the law and protect all citizens regardless of their race, gender, or sexual preferences; however, more and more police departments across the United States are being accused of targeting and harassing those who are different. State and local police departments have been left to their own devices on how to police minority communities and improve cultural differencesRead MorePolicing Paper735 Words   |  3 Pages(CAPS). The Chicago Alternative Policing Strategy came about in April 1993 and was first implemented in five of the 25 police districts in Chicago. Rogers Park, Morgan Park, Austin, Marquette, and Englewood were the first locations of the CAPS Program. The reasons these locations were picked was determined by their crime problems, economics, demographics, and their levels of community organization. In 1994 the other 20 districts of Chicago were participants of the CAPS Program. OutreachingRead MoreLack Of Discipline Against The Los Angeles Police Department1624 Words   |  7 Pagesdiscussed in this paper is that there is a lack of discipline against the Los Angeles police officers who engage in misconduct and the use of force. Top officials are not being held accountable for the lack of oversight in order to protect the interest of the department. The second pattern that is discussed is that police claims makers give the public a false sense of accountability. Instead of accepting accountability, police claim makers give the media unclear answers on what officials are attempting to

Organizational Behavior Communication Paper - 1190 Words

Southwest Airlines Organizational Behavior amp; Communication Paper Erica Sepulveda Communications for Accountants/Com 530 January 30, 2012 Southwest Airlines Organizational Behavior amp; Communication Paper Airlines, such as Southwest Airlines, strive to provide the best customer service that they can offer to keep their customers happy. A prospective Southwest passenger may probably make their reservation by calling the customer service number, logging on to the company’s website, or booking at an airport with a Southwest Airlines agent. The employees that assist these prospective and actual passengers are considered the backbone of the company and do their best to represent Southwest in the finest†¦show more content†¦pg 168). Additionally, they mention that what we perceive may not be what the situation actually turns out to be. Reading information or listening to others rant about how wonderful the culture is within a company doesn’t necessarily mean its all good. While employees may be happier than miserable working for Southwest, I highly doubt that there aren’t challenges that are faced at times in their positions. Research has shown that Southwest Airlines espoused values mirrors their enacted values. However, suppose it didn’t. What happens if the perceptions of their culture, communication and work environment is said to be â€Å"peachy†, however it really isn’t? Suppose employees were really unhappy and the mission statement of Southwest really wasn’t followed in the way they operate their organization. This leads to bad perceptions, along with potential employees amp; customers assuming that this organization is voicing something that it’s not. This is an example of how misalignment between espoused values and enacted values would affect perceptions within Southwest Airlines organization. Conflict within Southwest Airlines Conflict is another important topic that should be considered in organizations like Southwest Airlines. â€Å"Conflict results from differences between group members differences in personality, perception, information, culture, and power or influence†Show MoreRelatedOrganizational Behavior and Communication Paper979 Words   |  4 PagesOrganizational Behavior and Communication Paper Evelyn Smith COM 530 October 8, 2010 Organizational Behavior and Communication Paper This paper discusses the culture of the American Red Cross, noting whether the organization’s values align with espoused or enacted values. Also covered will be to what extent is communication in the American Red Cross determined by its organizations culture. Communication plays a fundamental role in perception and organizationalRead MoreOrganizational Behavior and Communication Paper Communications 530747 Words   |  3 PagesOrganizational Behavior and Communication Paper Nordstrom Inc., started as a small shoe store in Seattle, Washington in 1901. Since that time it has become one of the leading and successful shoe and apparel retailers in operation today. After reviewing different information regarding Nordstrom Inc. espoused values and enacted values, it is apparent that they are in alignment. Espoused values are the core values of the company. The history and organizational beliefs, developed into policy for theRead MoreThe Attributes Of Managing Organizational Behavior1173 Words   |  5 PagesThis paper will inform readers about the attributes of managing organizational behavior. This paper articulate an effective leadership approach from a biblical perspective. This paper describe core attributes and their roles for managing behavior. This paper presents linkage and support form scripture in the Bible. I have integrate biblical principles about leaders and leadership behavior. Lastly, this paper presents the distinctions from popular models i n purpose and perceptive. My paper will discussRead MoreWhat Strengths Of Organizational Leadership Presented By Sales And Marketing1635 Words   |  7 Pagesfor sexual harassment; and HR Manager (SS) Sheila Simmons lacks communications skills, and high job stress. Identifying the strengths of organizational leadership presented by Sales and Marketing (PI) Kenneth Bright along with OD consultant can lead and manage the organizational change. The OD consultant plans to introduce and communicate the change initiative to the employees begin with an interview questions by gender, organizational levels and age. Using Lewin’s method (B), functions (f), personality(P)Read MoreOrganizational Behavior Terminology and Concepts Paper850 Words   |  4 PagesOrganizational Behavior Terminology and Concepts Paper The following essay will be described the organizational behavior terminology and concepts applied in the organization. The following topics will be presented: Organization culture as internal and external environment of control. Diversity as of individual differences based on gender, race and ethnicity, age, disabilities, and sexual orientation. As the last subject communication as the human skill that helps the organization to work well withRead MoreOrganizational Behavior Essay1086 Words   |  5 Pagesdefines organizational behavior. Organizational behavior can help organizations expand, communicate, learn, and develop for better performance in the competitive, vibrant, and ever changing economy we all live in. It is important for organizations to learn the different behaviors, cultures, diversity, communications, effectiveness, and the learning styles that make up the organization and its environment. This paper will define and explain the terminology and concepts of organizati on behavior throughRead MoreOrganizational Structure Of An Effective Organization857 Words   |  4 Pagesmission and goals, which must all work aligned to accomplish excellence. An effective organization must have balance and strength in different areas. In the following research paper, we will discuss those areas in detail. These areas include the organization structure of an effective organization, the best the communication strategies to send the different messages across the company, the effective process for decision-making and problem-solving. Additionally, we will explore the process for effectiveRead MoreOrganizational Commitment and Communications Paper1151 Words   |  5 PagesOrganizational Commitment and Communications Paper Jennifer Watson COM/530 Communications for Accountants Allen Sutton July 4, 2011 Organizational Commitment and Communications Paper The selected organization is Walt Disney Company. In this paper the subject to discuss is how different leadership styles affect group communication, analyze different sources of power and the affects on group and organizational communication, identify the motivational theories effective within the culture ofRead MoreIntegrative Paper1526 Words   |  7 PagesOrganizational Behavior Integrative Paper Abstract This paper is an analysis that gives the concepts presented by John P. Kotter’s, â€Å"The Heat of Change†, book and the concepts presented by Ivancevich, Konopaske, and Matteson’s, Organizational Behavior and Management text book. Kotter wrote and gave comparative situations on dealing with human behavioral and how to better manage them when presented in an organizational situation. He gave real lifeRead MoreOrganizational Trends: Increasing Productivity With Communication1383 Words   |  6 Pagesï » ¿Running head: ORGANIZATIONAL TRENDS: INCREASING PRODUCTIVITY WITH COMMUNICATION Organizational Trends: Increasing Productivity with Communication Organizational Trends: Increasing Productivity with Communication Organizational studies continues to gain respect and compel attention within many professional communities, include the business community. A trend in organizational behavior that will impact businesses for the next decade is how communication relates to productivity. The 21st century

Quantitative Risk Analysis In Information Security Management

Question: Describe about the Quantitative Risk Analysis in Information Security Management? Answer: Introduction This is a report on the application of modern information security tools and techniques contrasting in practical scenarios. In order to demonstrate these applications, this report draws a comparison of a failed conspiracy of the late 16th century known as the Babington Plot, famous for the way the English intelligence network managed to use espionage and cryptanalysis to safeguard the throne, and postulates how such a conspiracy would have benefited from modern information security technology. The Babington Plot was a conspiracy to assassinate Queen Elizabeth I and replace her with Queen Mary Stuart alongside a Spanish invasion into England. It was thwarted by Sir Francis Walsinghams efforts over 20 years to establish a valiant spy network and infiltrate the ranks of any potential threats. On account of his spies, Walsingham was able to collect damning evidence against all conspirators, especially Mary Stuart, who was the primary target of his espionage and ended up being executed for her involvement in the plot. The key evidence that made the case was acquired by a security leak in the communications between Mary Stuart and her supporters, both within and outside England, created by Walsingham that allowed him to intercept all such communications. After a detailed breakdown of the shortcomings of the communication channels established by the conspirators, this report presents a postulated scenario of such a plot occurring in the 21st century and how modern technology could play a role in plugging the gaps in the original 16th century plot. Information Security Techniques Used Before discussing the exact techniques employed during the course of the plot in order to establish secure communication, we must first look at the major persons of interest who were directly involved in the line of communication. The following is a brief of these people: Mary Stuart, Queen of Scots: She was a legitimate heir to the throne of England and had been chased out of Scotland by Scottish rebels. She was imprisoned by Queen Elizabeth I for 19 years at various locations and under the charge of various jailers. Sir Francis Walsingham: Then spymaster in the employ of Queen Elizabeth I, he was able to discover the ongoing plot and planted a double agent, Gilbert Gifford, in the line of communication between Mary and her co-conspirators in order to collect evidence against the conspirators thus eliminating Mary from the line of succession. John Ballard: He was a Jesuit priest as well as an agent of the Roman Church who was able to group together a number of other conspirators in a plot not just spanning the assassination of Queen Elizabeth but also encompassing a Spanish invasion of England, deposing Queen Elizabeth (a Protestant) and replacing her with Queen Mary (a Catholic). Anthony Babington: A Catholic recruit of John Ballard, he served the role of a courier for messages between the imprisoned Mary and other conspirators for a duration of time. He was also instrumental in Marys communications with her foreign supporters. Thomas Phelippes: He was a cryptanalyst in the employ of Walsingham and was directly inserted in the line of communication for decoding all letters sent to and received from Mary and making copies of the letters. Gilbert Gifford: A double agent who was originally involved in a previous plot against Queen Elizabeth but was captured by Walsingham and eventually agreed to act as a double agent in order to avoid punishment. Throughout the course of Marys imprisonment, a number of channels and techniques were employed for communication. However, the crux of the Babington Plot was the communication between the conspirators after a July 1584 decree by Queen Elizabeth that prevented all communications to and from Mary, thus also eliminating the possibility of incriminating her in a plot. A new line of communication had to be established, and this was tailor-made by Walsingham to suit his needs. The communications to Mary were received by the French ambassador to England as diplomatic packages. These were passed on by him to Gifford who would then hand them over to Walsingham. Walsingham would allow his cryptanalyst Phelippe to decode and copy the letters, then reseal the letters and return them to Gifford. As per previous arrangement, Gifford would hand this letter to a local brewer who would hide the letters in a water-tight casing inside the stopper of a barrel, thus smuggling them to Mary. The reverse pr ocedure was followed for letters originating from Mary. It is notable that the cipher used in these communications, a nomenclature cipher, was provided by Walsingham himself. The nomenclature cipher was a very popular type of cipher used in the 16th century for secure communication and is regarded as a type of substitution cipher which employs homophonic substitutions. The following is an analysis of this episode from the standpoint of achieving the three goals of secure communication confidentiality, integrity and availability. Confidentiality. The primary device employed by Mary and her conspirators to ensure confidentiality was to encode letters using a cipher which was supposedly known only to the two parties involved in the communication. There were multiple vulnerabilities in their designs. Firstly, the secrecy of the cipher had been compromised. Thus, all their communications were easily decoded and recorded. Secondly, a single cipher was used for all communications which ensured that once the cipher is known to an interceptor, all further messages are insecure. Thirdly, verification of the secrecy of the cipher was difficult to achieve. Even if a single cipher is to be used throughout all communications, if there were a mechanism in place to check if the cipher has been leaked to outside parties, then appropriate counter-measures could have been taken. Integrity. There were no mechanism in place to ensure integrity of messages. Therefore, it was extremely easy for anyone in the communication chain or for someone intercepting messages in the middle of the chain to modify the contents of the messages being conveyed. This was exploited by Walsingham in the instance of a reply from Mary to an authorization request for the assassination plan, approving of the plans of her supporters but not expressing authorization. The original letter was kept by him as evidence and a duplicate letter was forged, in which instructions to reveal the identities of all co-conspirators and their roles was added by him along with authorization to proceed with the plan, and sent to the French ambassador as a letter from Mary herself. Availability. There were minimal considerations given to ensuring availability of the messages, especially from the viewpoint of modern information security. The meandering routes taken for all communication and the long distances to be travelled made it so that, in the absence of any high-speed data transmission technology, the only concern of the conspirators was to ensure secure delivery of messages. Walsingham was keen to ensure steady communication between Mary and her supporters as this was the most important pre-requisite for gathering evidence against Mary. Modern Techniques Now that we have discussed the original intricacies of the plot and the various mechanisms employed for secure communication during the conception of the Babington Plot in the late 16th century, we can proceed to adapt the scenario to the 21st-century. Should a similar scenario arise in the present era, the following adaptations of the original plot are quite probable. Firstly, the communication link would definitely be digital. As the people involved in the conspiracy are distributed far apart from each other geographically, it is only logical that digital communication media, most likely the internet and e-mail, would be employed. Secondly, due to the addition of high-speed computing in to the mix, both the cryptography and cryptanalysis techniques would be significantly upgraded. Instead of a simple substitution cipher, which can be easily cracked using computers, a more sophisticated encryption algorithm would be used. Thirdly, the role of Gilbert Gifford would experience a notable change. Modern day message carriers, the role previously played by Gilbert Gifford, are computers and not people. Thus, it is highly likely for Mary to communicate directly with Babington and other conspirators without needing Gifford to relay her messages. It is thus more likely for Gifford to only receive copies of their exchanges for the purpose of managing logistics or such, if at all. The other people and props involved purely in communication of messages, such as the brewer and his beer barrels, can be imagined to have been replaced by e-mail Servers and electronic devices hard-wired with communication protocols. Fourthly, new security concerns arising out of usage of modern technology will need to be addressed. Most of these are modern day complications, derivations or branches of existing security issues which have been born due to the advances in technology, for example new forms of social engineering attacks. Therefore, to imagine the enactment of the Babington Plot in the modern era such that Mary Stuart and her fellow conspirators would strive to establish a secure line of communication via modern e-mail technology, it can be postulated that these techniques would be employed: Mail Transfer Agent (MTA). This is a modern day take to the brewer and his beer barrel from the original plot in the 1580s. Messages are transferred between the conspirators using a well-known MTA as this ensures that the MTA will ensure many aspects of secure transmission, including a measure of confidentiality, integrity and most importantly availability. In the modern day, digital transmission of data should be almost instantaneous and availability of message transmission services as well as transmitted data is a huge concern. Therefore, relying on a well-established and publically respected MTA is recommended. Authenticated Encryption. Authenticated Encryption (AE) is a data encryption technique which employs a block cipher to simultaneously provide confidentiality, integrity and authenticity. Some of this is redundant but recommended nevertheless with the usage of an MTA. An example of an AE would be combining a Message Authentication Code (MAC) with another data encryption function. A MAC uses the concept of a secret key shared between two end-users to ensure authentication and data integrity by using this key to generate meta-data (hash) specific to the key and the original data. Thus, any changes to the data or any differences in the key used for generating the hash will cause a mismatch with the original hash. In addition to this, the original message is encrypted using a data encryption algorithm (e.g. AES) and the MAC may be generated before or after encryption. Key Distribution. This is one of the greatest concerns of modern day information security. In the case of asymmetric encryption algorithms, public key servers have been able to resolve this issue in large parts. Symmetric key encryption algorithms are trickier in their needs for secure distribution of keys and this is often achieved by first establishing a secure communication line with the help of asymmetric keys. As was mentioned in the shortcomings of the original communication line in the Babington Plot, using a single cipher (or in this case key) for extended periods of communication causes vulnerabilities to arise and thus it is recommended for the key to be changed on a periodic basis. Conclusion and Recommendation The study and analysis of the circumstances and facts surrounding the Babington Plot have revealed that concerns regarding secure communication have been carried down from several centuries ago to the modern day. Emergence of new technology has changed the way these concerns apply to real life, and has introduced new forms and factors that affect these applications, but the basic concepts of confidentiality, integrity and availability are largely unaffected. The Babington Plot was thwarted by the presence of a large number of security leaks. These leaks were a product of the extensive spy network established by Sir Francis Walsingham and demonstrated that while the conspirators were committed to their cause, they were unable to outsmart their enemies. Thus, it can be said that the conspirators lost the information war, a term which is generally associated with the Information Era or the 21st century, but definitely holds true even for a case from the 16th century. It is thus highly recommended for any endeavor that requires secure communications to check and re-check all their communication links for conformity to the basic standards of information security. The techniques highlighted in this report are some suggestions that could benefit secure communications but should not be regarded as the entire gamut of security measures available in the modern day. The information war, between spies and counter-spies, guardians and hackers, thieves and security forces, is constantly on-going and ever-changing in form. Thus, caution and awareness are the only reliable tools to step towards victory. Reference Pachghare, V. K. (2015).Cryptography and information security. PHI Learning Pvt. Ltd.. Oppliger, R. (2015). Quantitative Risk Analysis in Information Security Management: A Modern Fairy Tale.IEEE Security Privacy, (6), 18-21. Rebollo, O., Mellado, D., Fernndez-Medina, E., Mouratidis, H. (2015). Empirical evaluation of a cloud computing information security governance framework.Information and Software Technology,58, 44-57. Jajodia, S. (2015). Advances in Information Security. Chen, X., Zhang, Z., Chen, H. H., Zhang, H. (2015). Enhancing wireless information and power transfer by exploiting multi-antenna techniques.Communications Magazine, IEEE,53(4), 133-141. Ab Rahman, N. H., Choo, K. K. R. (2015). A survey of information security incident handling in the cloud.Computers Security,49, 45-69. Kenkre, P. S., Pai, A., Colaco, L. (2015). Real time intrusion detection and prevention system. InProceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014(pp. 405-411). Springer International Publishing. Haya, G. M. (2015, June). Complexity Reduction in Information Security Risk Assessment. InProceedings of the 2015 ACM SIGMIS Conference on Computers and People Research(pp. 5-6). ACM.

Meriwether Lewis Speech free essay sample

We exist in a world where there are many heroes and heroines, were people showcase their courage, bravery, skill, and curiosity, where many aren’t afraid to take a leap outside of their boundaries. These are the people that we remember, they leave legacies, and they make an impression in our world. I happen to be one of those people who took a chance; for that is why I’ve become one of the most remembered people in all of American history. Hello, my name is Meriwether Lewis. Most people probably already know that I was a co-leader in the Corps of Discovery, but many do not know my entire life story. For that reason I’ll start where it all began. I was born on a warm summer day in August of 1774 in the small county of Albemarle. I was born and grew up in the community of Ivy, Virginia along with my sisters Jane and Lucinda and my step-siblings Rueben, John Jr. We will write a custom essay sample on Meriwether Lewis Speech or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page , and Mary Garland. I am the son of Lt. William Lewis and Lucy Meriwether. I never had the privilege to spend much time with my father as a child. My father died of pneumonia in 1779. A year later my mother married Captain John Marks, and we all moved to Georgia in May of 1780. While I lived in Goosepond, Georgia, I enhanced my skills as a hunter and naturalist. I had a large dose of curiosity as a child and still do today. I still remember that chilled January night when I ventured out of the house to hunt. A mile into my walk, a blizzard struck with tremendous force. When the storm finally halted, I realized how completely lost I was. My parents found me that morning. I had never seen them so furious in all my life. Even though I stopped hunting at night, I was still quite fascinated with natural history; little did I know that this minute interest would develop into a lifelong passion. When I turned thirteen, I was sent back to Virginia for an education by numerous private tutors. My Uncle Nicholas became my new guardian. Many years later, in 1793, I graduated from the college of Liberty Hall. In 1795, I joined the U. S. Army, commissioned as a Lieutenant, where I served until 1801. Among my commanding officers was William Clark, who later would become my co-leader in the Corps of Discovery. That same year, I was appointed as an aide by President Thomas Jefferson, who my father knew well. When Jefferson began to plan for an expedition through the recently purchased Louisiana Territory, he chose me to lead the expedition. After the Louisiana Purchase, Jefferson wanted to get an accurate sense of the new land and its resources. Our exploration was the first transcontinental expedition to the Pacific Coast by the United States. During our two-year exploration, we encountered many hardships and rewards. I also developed a great relationship with William Clark and Sacagawea. I can remember that day when she helped us cross the Rocky Mountains. At one point we had an encounter with a group of Indians. Of course, Sacagawea translated for us. It turned out that the chief of that tribe was her own brother, who she had not seen in over eight years. He was so pleased to see her that he let us use their horses in order to help us cross the Rocky Mountains. We would not have completed our expedition if I weren’t for those few horses. We returned in 1806, bringing with us an immense amount of knowledge about the region, as well as numerous plant and animal specimens. I wrote everything down in multiple journals like this one. Feel free to have a look. Because of our success, we brought home with us an awareness of a rich and beautiful part of the continent. This awareness is what helped the U. S. develop and prosper for years to come. Years after our expedition, I continued to research the U. S. lands. I planned on publishing my journals too. On October 10th, 1809 I stopped at an inn called Grinder’s Stand, about 70 miles southwest of Nashville, Tennessee. In the predawn hours of October 11th, the innkeeper heard gunshots and found me badly wounded, with gunshots to my head and abdomen. I died shortly after sunrise. Many people consider that my death was a suicide. Others are convinced that it was murder. Centuries later, my death still remains a mystery. Even though I may have had an unresolved ending, I am still remembered for all of my contributions to the U. S. I gave the U. S. a great awareness of our unknown land. When I died I left a legacy of curiosity, knowledge, determination, and bravery that is still an inspiration today. May my legacy live on through you and teach you that with determination and a little curiosity, anything is possible.