Wednesday, May 6, 2020
Quantitative Risk Analysis In Information Security Management
Question: Describe about the Quantitative Risk Analysis in Information Security Management? Answer: Introduction This is a report on the application of modern information security tools and techniques contrasting in practical scenarios. In order to demonstrate these applications, this report draws a comparison of a failed conspiracy of the late 16th century known as the Babington Plot, famous for the way the English intelligence network managed to use espionage and cryptanalysis to safeguard the throne, and postulates how such a conspiracy would have benefited from modern information security technology. The Babington Plot was a conspiracy to assassinate Queen Elizabeth I and replace her with Queen Mary Stuart alongside a Spanish invasion into England. It was thwarted by Sir Francis Walsinghams efforts over 20 years to establish a valiant spy network and infiltrate the ranks of any potential threats. On account of his spies, Walsingham was able to collect damning evidence against all conspirators, especially Mary Stuart, who was the primary target of his espionage and ended up being executed for her involvement in the plot. The key evidence that made the case was acquired by a security leak in the communications between Mary Stuart and her supporters, both within and outside England, created by Walsingham that allowed him to intercept all such communications. After a detailed breakdown of the shortcomings of the communication channels established by the conspirators, this report presents a postulated scenario of such a plot occurring in the 21st century and how modern technology could play a role in plugging the gaps in the original 16th century plot. Information Security Techniques Used Before discussing the exact techniques employed during the course of the plot in order to establish secure communication, we must first look at the major persons of interest who were directly involved in the line of communication. The following is a brief of these people: Mary Stuart, Queen of Scots: She was a legitimate heir to the throne of England and had been chased out of Scotland by Scottish rebels. She was imprisoned by Queen Elizabeth I for 19 years at various locations and under the charge of various jailers. Sir Francis Walsingham: Then spymaster in the employ of Queen Elizabeth I, he was able to discover the ongoing plot and planted a double agent, Gilbert Gifford, in the line of communication between Mary and her co-conspirators in order to collect evidence against the conspirators thus eliminating Mary from the line of succession. John Ballard: He was a Jesuit priest as well as an agent of the Roman Church who was able to group together a number of other conspirators in a plot not just spanning the assassination of Queen Elizabeth but also encompassing a Spanish invasion of England, deposing Queen Elizabeth (a Protestant) and replacing her with Queen Mary (a Catholic). Anthony Babington: A Catholic recruit of John Ballard, he served the role of a courier for messages between the imprisoned Mary and other conspirators for a duration of time. He was also instrumental in Marys communications with her foreign supporters. Thomas Phelippes: He was a cryptanalyst in the employ of Walsingham and was directly inserted in the line of communication for decoding all letters sent to and received from Mary and making copies of the letters. Gilbert Gifford: A double agent who was originally involved in a previous plot against Queen Elizabeth but was captured by Walsingham and eventually agreed to act as a double agent in order to avoid punishment. Throughout the course of Marys imprisonment, a number of channels and techniques were employed for communication. However, the crux of the Babington Plot was the communication between the conspirators after a July 1584 decree by Queen Elizabeth that prevented all communications to and from Mary, thus also eliminating the possibility of incriminating her in a plot. A new line of communication had to be established, and this was tailor-made by Walsingham to suit his needs. The communications to Mary were received by the French ambassador to England as diplomatic packages. These were passed on by him to Gifford who would then hand them over to Walsingham. Walsingham would allow his cryptanalyst Phelippe to decode and copy the letters, then reseal the letters and return them to Gifford. As per previous arrangement, Gifford would hand this letter to a local brewer who would hide the letters in a water-tight casing inside the stopper of a barrel, thus smuggling them to Mary. The reverse pr ocedure was followed for letters originating from Mary. It is notable that the cipher used in these communications, a nomenclature cipher, was provided by Walsingham himself. The nomenclature cipher was a very popular type of cipher used in the 16th century for secure communication and is regarded as a type of substitution cipher which employs homophonic substitutions. The following is an analysis of this episode from the standpoint of achieving the three goals of secure communication confidentiality, integrity and availability. Confidentiality. The primary device employed by Mary and her conspirators to ensure confidentiality was to encode letters using a cipher which was supposedly known only to the two parties involved in the communication. There were multiple vulnerabilities in their designs. Firstly, the secrecy of the cipher had been compromised. Thus, all their communications were easily decoded and recorded. Secondly, a single cipher was used for all communications which ensured that once the cipher is known to an interceptor, all further messages are insecure. Thirdly, verification of the secrecy of the cipher was difficult to achieve. Even if a single cipher is to be used throughout all communications, if there were a mechanism in place to check if the cipher has been leaked to outside parties, then appropriate counter-measures could have been taken. Integrity. There were no mechanism in place to ensure integrity of messages. Therefore, it was extremely easy for anyone in the communication chain or for someone intercepting messages in the middle of the chain to modify the contents of the messages being conveyed. This was exploited by Walsingham in the instance of a reply from Mary to an authorization request for the assassination plan, approving of the plans of her supporters but not expressing authorization. The original letter was kept by him as evidence and a duplicate letter was forged, in which instructions to reveal the identities of all co-conspirators and their roles was added by him along with authorization to proceed with the plan, and sent to the French ambassador as a letter from Mary herself. Availability. There were minimal considerations given to ensuring availability of the messages, especially from the viewpoint of modern information security. The meandering routes taken for all communication and the long distances to be travelled made it so that, in the absence of any high-speed data transmission technology, the only concern of the conspirators was to ensure secure delivery of messages. Walsingham was keen to ensure steady communication between Mary and her supporters as this was the most important pre-requisite for gathering evidence against Mary. Modern Techniques Now that we have discussed the original intricacies of the plot and the various mechanisms employed for secure communication during the conception of the Babington Plot in the late 16th century, we can proceed to adapt the scenario to the 21st-century. Should a similar scenario arise in the present era, the following adaptations of the original plot are quite probable. Firstly, the communication link would definitely be digital. As the people involved in the conspiracy are distributed far apart from each other geographically, it is only logical that digital communication media, most likely the internet and e-mail, would be employed. Secondly, due to the addition of high-speed computing in to the mix, both the cryptography and cryptanalysis techniques would be significantly upgraded. Instead of a simple substitution cipher, which can be easily cracked using computers, a more sophisticated encryption algorithm would be used. Thirdly, the role of Gilbert Gifford would experience a notable change. Modern day message carriers, the role previously played by Gilbert Gifford, are computers and not people. Thus, it is highly likely for Mary to communicate directly with Babington and other conspirators without needing Gifford to relay her messages. It is thus more likely for Gifford to only receive copies of their exchanges for the purpose of managing logistics or such, if at all. The other people and props involved purely in communication of messages, such as the brewer and his beer barrels, can be imagined to have been replaced by e-mail Servers and electronic devices hard-wired with communication protocols. Fourthly, new security concerns arising out of usage of modern technology will need to be addressed. Most of these are modern day complications, derivations or branches of existing security issues which have been born due to the advances in technology, for example new forms of social engineering attacks. Therefore, to imagine the enactment of the Babington Plot in the modern era such that Mary Stuart and her fellow conspirators would strive to establish a secure line of communication via modern e-mail technology, it can be postulated that these techniques would be employed: Mail Transfer Agent (MTA). This is a modern day take to the brewer and his beer barrel from the original plot in the 1580s. Messages are transferred between the conspirators using a well-known MTA as this ensures that the MTA will ensure many aspects of secure transmission, including a measure of confidentiality, integrity and most importantly availability. In the modern day, digital transmission of data should be almost instantaneous and availability of message transmission services as well as transmitted data is a huge concern. Therefore, relying on a well-established and publically respected MTA is recommended. Authenticated Encryption. Authenticated Encryption (AE) is a data encryption technique which employs a block cipher to simultaneously provide confidentiality, integrity and authenticity. Some of this is redundant but recommended nevertheless with the usage of an MTA. An example of an AE would be combining a Message Authentication Code (MAC) with another data encryption function. A MAC uses the concept of a secret key shared between two end-users to ensure authentication and data integrity by using this key to generate meta-data (hash) specific to the key and the original data. Thus, any changes to the data or any differences in the key used for generating the hash will cause a mismatch with the original hash. In addition to this, the original message is encrypted using a data encryption algorithm (e.g. AES) and the MAC may be generated before or after encryption. Key Distribution. This is one of the greatest concerns of modern day information security. In the case of asymmetric encryption algorithms, public key servers have been able to resolve this issue in large parts. Symmetric key encryption algorithms are trickier in their needs for secure distribution of keys and this is often achieved by first establishing a secure communication line with the help of asymmetric keys. As was mentioned in the shortcomings of the original communication line in the Babington Plot, using a single cipher (or in this case key) for extended periods of communication causes vulnerabilities to arise and thus it is recommended for the key to be changed on a periodic basis. Conclusion and Recommendation The study and analysis of the circumstances and facts surrounding the Babington Plot have revealed that concerns regarding secure communication have been carried down from several centuries ago to the modern day. Emergence of new technology has changed the way these concerns apply to real life, and has introduced new forms and factors that affect these applications, but the basic concepts of confidentiality, integrity and availability are largely unaffected. The Babington Plot was thwarted by the presence of a large number of security leaks. These leaks were a product of the extensive spy network established by Sir Francis Walsingham and demonstrated that while the conspirators were committed to their cause, they were unable to outsmart their enemies. Thus, it can be said that the conspirators lost the information war, a term which is generally associated with the Information Era or the 21st century, but definitely holds true even for a case from the 16th century. It is thus highly recommended for any endeavor that requires secure communications to check and re-check all their communication links for conformity to the basic standards of information security. The techniques highlighted in this report are some suggestions that could benefit secure communications but should not be regarded as the entire gamut of security measures available in the modern day. The information war, between spies and counter-spies, guardians and hackers, thieves and security forces, is constantly on-going and ever-changing in form. Thus, caution and awareness are the only reliable tools to step towards victory. Reference Pachghare, V. K. (2015).Cryptography and information security. PHI Learning Pvt. Ltd.. Oppliger, R. (2015). Quantitative Risk Analysis in Information Security Management: A Modern Fairy Tale.IEEE Security Privacy, (6), 18-21. Rebollo, O., Mellado, D., Fernndez-Medina, E., Mouratidis, H. (2015). Empirical evaluation of a cloud computing information security governance framework.Information and Software Technology,58, 44-57. Jajodia, S. (2015). Advances in Information Security. Chen, X., Zhang, Z., Chen, H. H., Zhang, H. (2015). Enhancing wireless information and power transfer by exploiting multi-antenna techniques.Communications Magazine, IEEE,53(4), 133-141. Ab Rahman, N. H., Choo, K. K. R. (2015). A survey of information security incident handling in the cloud.Computers Security,49, 45-69. Kenkre, P. S., Pai, A., Colaco, L. (2015). Real time intrusion detection and prevention system. InProceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014(pp. 405-411). Springer International Publishing. Haya, G. M. (2015, June). Complexity Reduction in Information Security Risk Assessment. InProceedings of the 2015 ACM SIGMIS Conference on Computers and People Research(pp. 5-6). ACM.
Meriwether Lewis Speech free essay sample
We exist in a world where there are many heroes and heroines, were people showcase their courage, bravery, skill, and curiosity, where many arenââ¬â¢t afraid to take a leap outside of their boundaries. These are the people that we remember, they leave legacies, and they make an impression in our world. I happen to be one of those people who took a chance; for that is why Iââ¬â¢ve become one of the most remembered people in all of American history. Hello, my name is Meriwether Lewis. Most people probably already know that I was a co-leader in the Corps of Discovery, but many do not know my entire life story. For that reason Iââ¬â¢ll start where it all began. I was born on a warm summer day in August of 1774 in the small county of Albemarle. I was born and grew up in the community of Ivy, Virginia along with my sisters Jane and Lucinda and my step-siblings Rueben, John Jr. We will write a custom essay sample on Meriwether Lewis Speech or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page , and Mary Garland. I am the son of Lt. William Lewis and Lucy Meriwether. I never had the privilege to spend much time with my father as a child. My father died of pneumonia in 1779. A year later my mother married Captain John Marks, and we all moved to Georgia in May of 1780. While I lived in Goosepond, Georgia, I enhanced my skills as a hunter and naturalist. I had a large dose of curiosity as a child and still do today. I still remember that chilled January night when I ventured out of the house to hunt. A mile into my walk, a blizzard struck with tremendous force. When the storm finally halted, I realized how completely lost I was. My parents found me that morning. I had never seen them so furious in all my life. Even though I stopped hunting at night, I was still quite fascinated with natural history; little did I know that this minute interest would develop into a lifelong passion. When I turned thirteen, I was sent back to Virginia for an education by numerous private tutors. My Uncle Nicholas became my new guardian. Many years later, in 1793, I graduated from the college of Liberty Hall. In 1795, I joined the U. S. Army, commissioned as a Lieutenant, where I served until 1801. Among my commanding officers was William Clark, who later would become my co-leader in the Corps of Discovery. That same year, I was appointed as an aide by President Thomas Jefferson, who my father knew well. When Jefferson began to plan for an expedition through the recently purchased Louisiana Territory, he chose me to lead the expedition. After the Louisiana Purchase, Jefferson wanted to get an accurate sense of the new land and its resources. Our exploration was the first transcontinental expedition to the Pacific Coast by the United States. During our two-year exploration, we encountered many hardships and rewards. I also developed a great relationship with William Clark and Sacagawea. I can remember that day when she helped us cross the Rocky Mountains. At one point we had an encounter with a group of Indians. Of course, Sacagawea translated for us. It turned out that the chief of that tribe was her own brother, who she had not seen in over eight years. He was so pleased to see her that he let us use their horses in order to help us cross the Rocky Mountains. We would not have completed our expedition if I werenââ¬â¢t for those few horses. We returned in 1806, bringing with us an immense amount of knowledge about the region, as well as numerous plant and animal specimens. I wrote everything down in multiple journals like this one. Feel free to have a look. Because of our success, we brought home with us an awareness of a rich and beautiful part of the continent. This awareness is what helped the U. S. develop and prosper for years to come. Years after our expedition, I continued to research the U. S. lands. I planned on publishing my journals too. On October 10th, 1809 I stopped at an inn called Grinderââ¬â¢s Stand, about 70 miles southwest of Nashville, Tennessee. In the predawn hours of October 11th, the innkeeper heard gunshots and found me badly wounded, with gunshots to my head and abdomen. I died shortly after sunrise. Many people consider that my death was a suicide. Others are convinced that it was murder. Centuries later, my death still remains a mystery. Even though I may have had an unresolved ending, I am still remembered for all of my contributions to the U. S. I gave the U. S. a great awareness of our unknown land. When I died I left a legacy of curiosity, knowledge, determination, and bravery that is still an inspiration today. May my legacy live on through you and teach you that with determination and a little curiosity, anything is possible.
Tuesday, April 21, 2020
The Things They Carried Essays - The Things They Carried, Emotion
The Things They Carried They carried all they could bear, and then some, including a silent awe for the terrible power of the things they carried. The men in this story were subjected to things that changed their lives drastically. And the things they carried were some of the heaviest things they will have ever carried in their lives. Ammunition and supplies weighted these men down although it was their emotions and feelings that felt the heaviest. The Things They Carried, by Tim OBrien, is a story that reveals the true nature of war. The ammunition and supplies that these men carried were true tests of muscular strength. M-16 assault rifles, M-60 machine guns, M-79 grenade launchers, along with pocket knives, mosquito repellant, chewing gum, cigarettes and matches filled their packs. They carried these packs with them everywhere that they went; up hills, down hills, through trenches, across fields, and through swamps. These soldiers went through massive amounts of emotional struggle. One man who regularly received letters from a girl and he uses her as a vent for his emotions. More than anything, he wanted Martha to love him as he loved her, but the letters were mostly chatty, elusive on matter of love. He would sometimes taste the envelopes flaps, knowing her tongue had been there. Their emotions were heavy, very heavy. The men were always thinking about something, sometimes there was not much else to do. They thought about the war, girls, home, family and being lonely. This war carried the soldiers greatest fear, which was the fear of blushing. Men killed, and died, because they were embarrassed not to. The soldiers had to learn how to carry their packs as well as their heavy minds. Everything was a struggle for them, both physically and mentally. They carried all they could bear, and then some, including a silent awe for the terrible power of the things they carried. In conclusion, The Things They Carried was a powerful story of war. The men that were involved in this war, as well as many other wars, were subjected to many horrible situations. So this story truly reveals the nature of war. American History
Thursday, April 16, 2020
Sample Essay - Are Cats the Best Pets?
Sample Essay - Are Cats the Best Pets?In this sample essay, you will be asked to make a decision regarding the best pet for your children. You will need to make this decision based on their ages, personality, and interest in animals.You may get numerous benefits from getting a cat. Cats love to lie around and cuddle with you. As your kids grow older, your children will be more likely to ask to be your little kid again. Your kids may even find out how much you enjoy having a cat instead of a dog.After you make up your mind about cats, decide if they are good or bad for your children. Although cats are very affectionate towards children, there are a lot of advantages to getting a cat. Cats are easier to take care of. If you get a kitten, it will take less time to train it and bring it back to good behavior. The positive side is that the cat may also be more affectionate towards your children.With this reason, it is a good idea to get a cat that is well-trained and obedient. You should also consider the price of a cat because getting a kitten will be a lot cheaper than getting a big cat. Another advantage of having a kitten is that it is usually easy to train your children to behave with your cat. You may be able to teach them to keep their distance from other children.If you have a small family, a cat will be very practical. Cats are known to be quite social animals. They can easily communicate with you as long as you use a special collar. The collar will alert you whenever your child is trying to communicate with the cat.It is a good choice to go for a friendly cat that is trained and well-behaved. Before you get your cat, you should consider the environment where the cat will be living. As the cat gets used to the surroundings, it will become more sociable. This is especially true if you are going to give the cat a home in your home.When you decide to get a cat, consider its cost because it is a good idea to get one that is friendly and nice to look at. Also co nsider the convenience. You do not have to feed the cat. You will not have to clean it. You will be able to see your cute kitty from afar.Cats are the best pets for people who are looking for a good deal. In addition, you will be able to enjoy your special time with your cat. However, before you choose a cat, you need to think about the environment where the cat will be living and the price you are willing to pay.
Monday, March 16, 2020
The Study of International Copyright Law
The Study of International Copyright Law Formative Evaluation One of the greatest problems which foreigners in general and foreign students in particular encounter as they get accustomed to the new place and its traditions and social interaction is the law and its multiple issues, namely the copyright law.Advertising We will write a custom essay sample on The Study of International Copyright Law specifically for you for only $16.05 $11/page Learn More Devoting these sessions to teaching foreign students the peculiarities of the copyright law in the U. S. and comparing it to the systems of copyright law existing in the other countries, one can help people to avoid a number of upsetting conflicts and misunderstandings. Workhouse Sessions In the process of the session I tried to help students think on their own, creating the right environment for analytical and critical thinking. Giving them hints so that they could get the overall idea of the topic, I could further on count on their feedback and thei r eager participation. It was of crucial importance to drive students to the idea that copyright laws in different countries may vary. As the students realized this fact, it was necessary to drive certain parallels with the copyright laws in different countries before proceeding to the idea of the international copyright law. One of the most important parts of the lessons was the revision if the material learned in the previous sessions, for this helped students to track the differences in the copyright law systems of different states. Discussions Another crucial part of the sessions was the discussions of the learned material and further development of the topic. Working in small groups, the students could remember the material better and develop their own critical thinking and deductive abilities. Summative Evaluation One of the peculiarities of the given sessions would be the fact that the students will be able to assess the lessons themselves. Such approach will help to obtain m ost objective results and will lead to eliminating any possible misunderstandings concerning both the material and the learning sessions.Advertising Looking for essay on education? Let's see if we can help you! Get your first paper with 15% OFF Learn More Aims Achieved With help of a small survey which students will be handed it will be possible to realize if they find the lessons useful themselves. Thus, answering such questions as what the relevance of the content to the given studentââ¬â¢s personal work was, one will be able to assess the knowledge obtained during the course. In addition, the information gathered will provide a truthful and objective portrait of a teacher. Feedback Another important part of the lesson sessions is the discussion of the material learned during the lesson. In conversations and discussions of all aspects of the information obtained the students will be able to develop their skills to communicate; in addition, they will be a ble to learn the complicacies of the international copyright law faster. It is worth mentioning that such system of learning will also develop the studentsââ¬â¢ ability to convey their personal opinion concerning important issues and take the opposing opinion with due respect. Studentsââ¬â¢ Evaluation One of the parts which the students will like is the personal critical evaluation of the teacher and the courses in general. As the students provide their impressions concerning the way the teacher explained the material to them, it will be possible to consider the teacherââ¬â¢s approach from various points of view. Thus, the students will contribute to the shaping of the teacherââ¬â¢s personal experience as well. Studentsââ¬â¢ Ideas and Suggestions It must be also kept in mind that the course was designed to help students orientate themselves better in the existing copyright system; therefore, each studentââ¬â¢s personal impression of the lesson will be considered an important piece of information. Thus, with help of the second part of the survey, it will be possible to find out whether the experience was valuable for the students or not. Self-Assessment With help of the above-mentioned lesson sessions, the students will be able to obtain deeper knowledge on the subject. To evaluate the effect that the courses will have on the students, it will be necessary to construct the evaluation plan. It seems that the most reasonable structure will look in the following way: the useful experience which I obtained during the classes; my personal impressions of the students and the classes; studentsââ¬â¢ ideas of my teaching Since the lessons will provide me with the precious genuine experience which I will use for my further personal development, the lesson sessions and the survey will provide me with the information which is most important for my professional competency.Advertising We will write a custom essay sample on The Study of Internat ional Copyright Law specifically for you for only $16.05 $11/page Learn More With help of the critique and the suggestions which the students will provide me with, it would be possible to continue the professional development, taking into consideration the issues which the students will point me to. In addition, it is extremely important that the survey includes both the critical evaluation of the teacher and the suggestions which the students can give to improve the course of the lessons and the approach of the teacher. With help of this significant issue it will be possible to continue self-development. It also seems to me that the studentsââ¬â¢ behavior and attitude towards the learning material is going to predetermine my ideas of the workshop and its value for me and for them. As long as the students will find the sessions interesting and useful in terms of their knowledge of foreign and international law, it will be clear that the lessons have proved usefu l and interesting for them. This is the studentsââ¬â¢ experience which is going to be of crucial importance for me.
Friday, February 28, 2020
Climate change(global warming) Article Example | Topics and Well Written Essays - 500 words
Climate change(global warming) - Article Example The greenhouse gases both absorb and forward the sunââ¬â¢s radiations. Other greenhouse gases include carbon dioxide and water (Archer, 2011). The major contributor to global warming is the burning of fossil fuel. One major contributor to global warming is the motor vehiclesââ¬â¢ carbon monoxide emissions (Weart, 2008). Factories produce carbon monoxide gases. The factories and motor vehicles use fossil fuel to produce electricity. Moreover, the thinning of the worldââ¬â¢s ozone layer increased global warming. The ozone layer reduces the ill effects of the sunââ¬â¢s incoming radiating rays. Certain products produce CFC by-products. The CFCs reduce the earthââ¬â¢s ozone layer. With the thinning of the ozone layer, there is an increase in the quantity of the unfavorable incoming harmful sunââ¬â¢s rays (Archer, 2011). Global warming has significantly unfavorable effects on Californiaââ¬â¢s agricultural environment. Californiaââ¬â¢s greenhouse gases reduce the earthââ¬â¢s emission of infrared rays, triggering global warming. Californiaââ¬â¢s greenhouse gases reduce the sunââ¬â¢s dangerous rays from being reflected by the earthââ¬â¢s surface back into outer space, increasing Californiaââ¬â¢s temperature. The fossil fuel emitted by Californiaââ¬â¢s motor vehicles contributes to Californiaââ¬â¢s global warming statistics (Archer, 2011). Consequently, Californiaââ¬â¢s global warming, melting its snow sources, triggers lower water availability. Specifically, Southern California experienced a 26 percent water source reduction. Sacramento suffered a 24 percent water source reduction. San Joaquin continues to bear the 23 percent water decline. With less water, California suffers from possible food production decline. Consequently, farms must spend more to acquire the required plant water. The increasing water cost precipitates to higher California food prices. With higher food prices, less people can afford to have a full meal. Lesser demand reduces farm profits
Wednesday, February 12, 2020
Doesn't matter Essay Example | Topics and Well Written Essays - 500 words
Doesn't matter - Essay Example The two party system limits more party entrances and thus limits flexibility on the part of the decision making process. However, based on public policy, the system promotes transparency with regard to use of public resources where both parties are accountable. In consideration of the various stakeholders in the policy process, the system though limited in representation is able to diffuse resources effectively without external interference. Democracy is essential since the voters have been empowered to choose whoever they want and thus the governance represents what the voters chose. To some extent, the growth and influence of the independent voter is constructive because it represents the type of governor they want. If good, then the voter has played a good role in being informed and choosing a good leader which is constructive to govern. However, the growth of the independent voter might have been out of coercion or incentive which may influence the decision making and eventually poor leadership. This translates to bad policy process where resources may be utilized by the few elite. Growth and influence of private corporations are a challenge to governance in that it has raised interest groups as a form of government. As a result it has led to corruption, mismanagement and collusion of regulation and enforcement. Apart from that the interest groups may have led to proper representations and thus good policy for the public interests. The influence of lobbyists is constructive to govern and may still pose a threat. Lobby groups such as AARP and NRAhave been known to raise chaos and eliminate people from office or being voted in. They are also responsible for equitable distribution of resources to the marginalized regions thus promoting good governance and better policy for the public good. They have promoted problem identification, intervention strategies, implementation and evaluation with regard to
Subscribe to:
Posts (Atom)