Tuesday, January 28, 2020

Importance of Data Security and Data Safety Essay Example for Free

Importance of Data Security and Data Safety Essay To prevent companies from using or passing on confidential information to other companies without the permission of the person who the data is about, companies will need to protect the data. With the popularity of the Internet there are opportunities for thieves to steal their personal data. So the government set a law (data protection act) which is used to protect peoples rights concerning how data is used and you also have the right to see such information and have any errors corrected. Also organisation will want to keep data confidential because it will not want its competitors to know how the business is going. List the 8 principles of the Data Protection Act The Data Protection Act says the personal data should: 1. Be adequate, relevant and not excessive. For example college should keep students details and details must be just what is needed and nothing more. 2. Be processed in accordance with the data subject right. For example the person that the data refers to have the right to read the information about him/her and the organisation should provide hem/her with information they need. 3. Be accurate and be kept up to date. There is a duty to keep it up to date, for example to change an address when people move. 4. Not be kept longer than necessary. For example it is alright to keep information for certain length of time but it would be wrong to keep information about past customers longer than a few years at most 5. Be obtained and processed for limited purposes. For example the organization must use the data only in the way it is described and it must not use it for any other purpose. 6. Be secure. This includes keeping the information backed up and away from any unauthorised access. It would be wrong to leave personal data open to be viewed by just anyone. 7. Not be transferred to countries outside Europe without adequate protection. Unless the country that the data is being sent to has a suitable data protection law 8. Be processed fairly and lawfully. For example if you put your money at bank no one can transfer your money without your permission. (a) What is the difference between the Internet, Intranet and Extranet? (P8) Internet: Are public networks that allow the user to use any of its facilities. Intranet and Extranet: is like a private internet. It is like a website that is only accessible to the members of a business or company. The different between Intranets and Extranet is: Intranet: Allow the members of organisation to access the access the system with an organisation. Extranet: Allow the members of organisation to access the system from different location but only by the users who have been given access rights. (b) * What is a browser? Is programme that can read web pages, by downloading HTML code and that allows the browser to interpret the code to the web page. A browser displays web pages, keeps track of where youve been, and remembers the places you want to return to, the most used browsers are Internet Explorer and Netscape Navigator. * Describe the role of a browser when using the Internet, Intranet and Extranet Browser allows the people to access information, view images, hear music and watch video, in the term of intranet and extranet the browser allows user to share documents, access databases and allow group work. * Describe the role of email when using internet communications. You can send email to an individual or to a group of people at the same time, you can create mailing list so that you can write a message and send it automatically to number of people. Also you can send files such as pictures, word document and sound as attachments to your message. (a) List major threats to an organisation that could happen while using the Internet. (P9) 1. Hacking (use to steal the personal details and private files of company) 2. The spreading of viruses (use to destroy or damage the important files of company) 3. Internet fraud (taking credit card details from customers) 4. Spay ware (is biggest threat in the computer system which allows someone to log into your computer and use it for their own purpose) 5. Spam ( sending unwanted messages especially commercial advertising) Purpose of assignment In this assignment, I have to do research and get information on the importance of data security and data safety. M research must be from ICT sources and non ICT sources and by using the evidence that I collect I should explain the importance of keeping customer information confidential, the main provision of data protection act, the role of browsers and email in internet communications, the difference between internet, intranet and extranet, the major threats to organization from internet and finally a poster that explains the importance of data safety and data security. The assignment will also gather key skills portfolio evidence. M5 Physical Security: Use of security guards, locks, reinforced doors, windows and walls depending on what is being protected. Use of ICT to enforce security entry on doors, and protected areas of buildings i.e.: swipe cards, fingerprint ID, voice recognition. Firewall: This is a security device, which acts as a single entry/exit point for information and access to a computer system. All traffic must pass through the firewall and therefore a system is secure from external threats. A firewall usually sits between the internal network of an organisation and access by the internet. Virus Protection: It is usual for systems to have some form of anti-virus software installed and running in the background. All files and devices introduced to the system would be scanned, any attempts to alter system files would be blocked, and notification made to the user/system administrator. Preventing the use of floppy disks is a good method of eliminating one source of potential virus problems. Identification of Users: A system of user IDs and passwords is a simple method of preventing unauthorised personnel accessing the system. These should be managed by the system administrator. With this, only some users will have access to certain programmes and data therefore increasing the level of security on sensitive data. In addition, some users may only be able to read the data and not write the data. Other users may not have the ability to delete or even to access certain files. Encryption software: the data may be encrypted (coded) into a form, which can only then be decoded by the intended user. If the data falls into the wrong hands, it will be meaningless. Backups: To guard against the loss of data, backups should be regularly made. These backups should be stored in a separate place, preferably in a fireproof environment. Passwords software: Password protection usually involves a person typing in: * A User Name to identify the person. * A Password to identify the person. He should be the only one to know what it is. Computer viruses: which are programs that destroy the way computer operates without the knowledge of the user, there are huge numbers of viruses some are extremely malicious with the ability to delete or damage files and programs. Some of the threats that they cause to computer systems include: * Deleting data on the hard disk of the organisation computer system. * Enabling hackers to hijack the organisation system and use it for their own purposes. How do viruses spread: * CDs and floppy disks containing infected documents. * Emails containing infected attachments. Hackers: who gain unauthorised access to computer systems for the purpose of stealing and corrupting data, also gaining access to financial information about the organisation business or their customers for the purposes of fraud. Security measures may include * Each user should be given a user name and a password. * Computer usage may be logged. * Computers should be disconnected from a network when not in use. * Use a firewall a computer running software, which detects hackers dialling in to a network. Spam: authorised users downloading a web page or receiving an email with hidden active content that attacks the organisation system or send sensitive information to unauthorised people. Organisation can stop spreading of spam by using spam filtering software Spy ware: is software that is placed on organisation computer when the employee visits certain websites, it is used to secretly gather information about the organisation usage and sends it back to advertiser or other interested company to tracking the organisation system use .it can also slow down or crashes the organisation computer Pop up: Many company advertisers on the Internet by using windows that pop up in the middle of computer screen to display a message. They might also open when you click a link or button on a Web site, and they might open either over or under the window, you wish to view. Some pop-up windows can contain inappropriate content or can be a way for employee of organisation to accidentally download dangerous software (called spyware or adware) onto organisation computer. Infringement of copyright: Internet users are not allowed to copy or print some internet materials such as; video, music, files and photos without the permission of copyright holder and sometimes they may have to pay a licence to do so. Theft and fraud: credits card fraud for example people can steal the details on credits card and using them illegally to buy goods Sole trader: A sole trader is the actual owner of a business, a sole trader also has unlimited liability. All the debts of the business are the debts of the owner. They can not issues shares .The whole meaning behind Sole means that she/he does not have partners. (e.g. electrical repair, picture framing, photography, diving instruction, retail shops, and hotels) Partnership A Partnership can be liable for all debts, it is easy to setup, but is also inexpensive to form. Forming partnership requires an agreement that is some times called partnership agreement between two to twenty individuals which entitles them to jointly own and carry on a trader business together. A partnership is a contract between two or more persons who agree to pool talent and money and share profit or loss. Private limited company A Private limited company has limited liability (the shareholders cannot loose more than their original shareholdings), and a minimum of two shareholders and a maximum of fifty shareholders. It cannot offer its shares to the public. A private limited company is treated as a legal entity. Public limited company A company which may have an unlimited number of shareholders and offer its shares to the wider public. (e.g. Cadbury and Tesco) Multi-National company A company that does business in more than one country, usually by setting up branch offices. Tesco Characteristics * Type of company: Tesco is an international retailer and is a publicly owned company (Public Limited Company Plc). * Products: including food and non-food business, personal finance, internet shopping, electrical items, home entertainment, toys, sports equipment, and many more. * Profit / loss: Tescos Profit and Loss 2005 2004 Sales at net selling prices 37,070 33,557 Turnover including share of joint ventures 34,353 31,050 Less: share of joint ventures turnover (379) (236) Operating profit/(loss) 1,949 1,735 Share of operating profit/(loss) of joint ventures and associates 130 97 Net profit/(loss) on disposal of fixed assets 53 (9) Profit on ordinary activities before taxation 1,962 1,600 Underlying profit before net profit/(loss) on disposal of fixed assets, integration costs and goodwill amortisation 2,029 1,708 * Size of company: Tesco operates 923 stores and employs 240,000 people , there are 639 branches in Great Britain and 182 in the rest of Europe * Location: they operate in UK, Hungary, Poland, Czech Republic, Slovak Republic, Thailand, South Korea, Taiwan and the Republic of Ireland * Purpose of company: to create value for customers to earn their lifetime loyalty. * Aims: Built good non-food sales expanded into retailing services and exploited e-commerce successfully. * Objective: 1. To deliver a consistently strong customer offer. 2. Making their shopping trip as easy as possible. 3. Constantly seeking to reduce their prices to help customer spend less. * Logo: Cadbury Characteristics * Type of company: is an international retailer and is a publicly owned company (Public Limited Company Plc). * Products: chocolate and drinks brands. * Profit / loss: Cadbury Profit and Loss à ¯Ã‚ ¿Ã‚ ½ (Millions) 2006 à ¯Ã‚ ¿Ã‚ ½ (Millions) 2005 Turnover 6,508.00 6,085.00 Operating Profit / (Loss) 1,003.00 825.00 Net Interest (188.00) (205.00) Pretax Profit 843.00 642.00 Post Tax Profits 703.00 497.00 Total Dividend Paid n/a n/a Retained Profit / (Loss) for the financial year n/a n/a * Size of company: they operate in more than 35 countries and they employs over 55,000 people * Location: Americas, Europe, Middle East and Africa and Asia Pacific. * Purpose of company: the organization work together to create brands people love. * Aims : 1. Deliver shareowner performance. 2. Ensure their capabilities are best in class. 3. Reinforce reputation with employees and society * objective: 1. Responding to consumer needs quickly. 2. Grow shareowner value. 3. Attract and develop the best kind of people.

Monday, January 20, 2020

Essays --

Dear Sir/Madame, It is with much pleasure that I submit my application for a Master’s Degree Programme in â€Å"Healh and Business† starting in September 2014 at University of Eastern Finland. As for my educational background, I obtained from Highest Medical School â€Å"Aieti† on a faculty of medicine where I completed all courses in English. Currently I work as an interpreter/translator at United Water Supply Company of Georgia. I have also taught Histology to first-year international students at Petre Shotadze Medical Academy. Medicine is a tradition in my family. My great grandparents, grandparents, parents, even godfather and godmother are doctors. This is a path that I am passionate about and while being part of it, I am surrounded by amicable environment. I decided to follow the footsteps but accomplish the goal in a different manner. I would like to engage myself in activity where I would have a chance to combine and link medicine to business - the mix that explores the framework for medical management systems. While doing internship in Chemotherapy department of Klaipeda Medical Center in Lithuania, each day proposed challenging but fascinating discovery. Themes connected to organization of the hospital and service delivered to patients was especially engaging. I had read and learnt about various methods about organizing and providing service to patients but I was still thrilled as it was my first time when I actually had to perform everything myself. At the start, I encountered a lot of failures but thanks to persistence and determination I grasped the procedure and became one of best students. As a result, having participated in diverse conferences and congresses related to medicine, health management and development, I would l... ...n insurance, health and government regulations and parallel its model to ones of developed countries, propose/suggest solutions to abate the adversity of medical system. As for my financing plan for studies, I have savings specially designed for my further studies. Since the University of Eastern Finland is tuition-free, with the help of my savings from work remuneration, family and a sponsor I will be able to cover all living costs. I am interested to live in a shared apartment first of all it is more affordable and it will be easier to live with other students as it helps to overcome cultural shock while living in a foreign country. Sharing a roof with other students is also beneficial to learn more about the hosting or other countries and their culture. Thank you for considering my application, and I look forward to your acceptance. Sincerely, Nino Tevzadze

Sunday, January 12, 2020

Design Thinking and Innovation at Ideo

IDEO QUESTIONS. Juan Pallares 1. What is the role of prototyping in IDEO? Is it central to their process? For IDEO, prototyping is the core of its design process, and how they use it is one of their competitive advantages. IDEO believes in explaining anyt design idea with prototypes, which helps people to focus on the same idea, or to find improvements of a single design easily. Prototyping is also a better way to show the customers the design your are thinking of, and helps them to get involved with the design process, aligning both designers and customers mindsets. . Should IDEO accept the Visor Project? Why? Like everything, it depends of the needs of IDEO. Initially I would recommend not accepting the project, unless they were in need of cash. Visor project would require a design process much more tight that the one employed in IDEO, with almost no barriers to creativity and the free flow of ideas. The time and cost requirements would imply designers and brainstormers would have their ideas enclosed to the requirements, that would â€Å"orient† the ideas in one specific direction since the beginning.In a design process, that could kill the project. 3. In case they will accept, what challenges and risks are they facing? First of all, in a company where communication of ideas is key (show and tell is an example), having a secret project would reduce the source of ideas just to the ones involved in it, reducing the possible outcomes. More over, in a company where people involved in a project are the ones that are most passionate about it, forcing some people to work in a project without telling to anyone else reduce the motivation of the design team.Another challenge is the lack of testers. One of the success of the Palm V was the marketing research done by Boyle, which opened their â€Å"designers minds† to different users with broader needs, thus avoiding insider`s egocentric point of view. This would not be possible in this secret project, unl ess considering an outside marketing company for developping the research, with the increase in costs associated. Related to the project specifications, one of the big challenges would be to work with only existing and tested technologies.IDEO design process starts with product designers and engineers, and after the product is designed on its basic form, costs are considered. Working with actual technologies would reduce the â€Å"innovative† spirit of the team, and could possible lead to just a product make-up, a product similar to the existing ones but with a different shape. And the innovative image of IDEO could be damaged because of that. 4. In which cases will you outsource the product development of your company? Only in two situations I would outsource the product development of my company. First, if product design is not a crucial aspect of my industry.If I? m a manufacturer of golf balls, even if there is always room for competitive advantage through innovation, it is not a crucial fact for everyday business. Second, if the company which I will outsource my product development to, is known for its quality in terms of design/ innovation. In this case outsourcing would be a perfect strategy for my company, leaving the design to people with more expertise and recognition (it can be also a marketing tactic). Always of course, with constant monitoring of the aligning between the design and the values/image of my company.

Saturday, January 4, 2020

Research Justification Autism Spectrum Disorder

Research justification: Autism Spectrum Disorder has been in existence for nearly two decades. Autism was first identified by two Austrian psychiatrists, Dr. Leo Kanner and Dr. Hans Asperger in 1940s (Phetrasuwan et al., 2009). Dr. Kanner studied a small group of eleven young children in 1943 that exhibited unusual behaviour like aloneness, temper tantrums, limited spontaneity, grammatical errors during conversations, repeating sentences or mute, repetitive routines, isolated skills, serious mindedness and named them as â€Å"early infantile Autism† (derived from the Greek word autos meaning ‘Self’) (Kanner, 1943, Wing, 1997, KITA and HOSOKAWA, 2011) . In the same year Dr. Hans Asperger submitted his thesis titled â€Å"Autistic psychopathy in childhood† which was published the following year in 1944 (Lyons and Fitzgerald, 2007). He observed a group of four children who had excellent memories (KITA and HOSOKAWA, 2011, Van Krevelen, 1971) . They had impairments like monotone speech, poor motor skills, delayed social abilities, less severe linguistic delays, ego-centric behaviours, sensitive to particular sounds, aromas, textures and touch (Attwood, 1998). This type of behaviour is termed as â€Å"Asperger’s syndrome†. Autism is a life-long disability that affects people in three different aspects of life in social interaction, social communication and social behaviour. The range of levels varied depending on the type of severity (severe to mild). It has been put forth as the continuumShow MoreRelatedHigh Functioning Autism Spectrum Disorder1364 Words   |  6 PagesAvoidance in High-Functioning Autism Spectrum Disorder (South et al., 2014) that is being reviewed is an experiment with High-Functioning autistic individuals and nerurotypical individuals inquiring if there is a difference in the behavior when making decisions if there is a risk involved. The researchers begin by explaining their supporting information in conducting this experiment. They reference previous written material that explains the impairments that individuals with Autism have in their neurocognitiveRead MoreHow Psychology Has Changed Human Behavior1724 Words   |  7 Pagesmindreading abilities generally follow a developm ental pathway. Additionally, Heider and Simmel’s (1944) study of geometric shapes will be explored to demonstrate how people interpret other people’s behaviour, even in animation. Subsequently, Autism Spectrum Disorder (ASD) will be discussed to show how psychology has assisted in explaining how people with this condition have mindreading difficulties and how psychology has helped in understanding and developing their mindreading skills to help them withRead MoreGraduation Speech : Phonetic Alphabet1379 Words   |  6 Pagesclosely and experience the new skills with peer support. Also, during instruction in small group, I am able to address them directly and model vowel sounds, so they can repeat/echo correctly the pure vowel sound formation. d) My student with Autism Spectrum Disorder benefits from the opportunity of being addressed directly, with me facing the student when modeling, but without social implications as it is allowed during small group work. e) Adding visual components to teaching benefits my student withRead MoreEvidence Based Practice Essay3892 Words   |  16 Pagesquestion, linked to a relevant issue with in my nursing programme. The specific question in focus is â€Å"what are the experiences of parents/guardians caring for a child with autism†. Within this essay there will be a description as to how and why the pacific question was chosen. There will also be an explanation of how the correct research papers where allocated. Further on in the essay the three chosen papers will be analysed to determine their trustworthiness. When formulating a question there are twoRead MoreThe Disorder Of The Autism Spectrum Disorder1526 Words   |  7 PagesSam was the main character in this article, who had Asperger syndrome, which is a disorder of the autism spectrum disorder. Sam, like other children with ASD was at times hard to handle and become frustrated with his peers easily. Many times he would scream at those that he didn’t care for came near him or even touched him. His mom had a hard time connecting with Sam at times and he didn’t always listen to her. He especially never seemed to listen to her when it was time for her to take him to aRead MoreChildren With Autism Spectrum Disorder ( Asd )2137 Words   |  9 PagesTopic Statement This discussion paper aims to highlight the importance of imaginary play for children with autism spectrum disorder (ASD). Furthermore it aims to highlight the need for further research on the effectiveness of the Learn to Play program as an effective imaginary play intervention tool. What is imaginary play and what are the benefits? Many children with a diagnosis of ASD experience challenges within the areas of social interaction and communication (American Psychiatric AssociationRead MoreThe Theory Of Mind : A Research Study Into Autism Spectrum Disorder ( Asd )1830 Words   |  8 Pagesdifferent aspects of ToM have been studied in children. Additionally, adult mindreading will be evaluated to appreciate how people interpret other people’s behaviour. Subsequently, mindreading difficulties will be examined by exploring research into Autism Spectrum Disorder (ASD), indicating a link between deficits in ToM and cognitive empathy. Finally, relationship conflict will be discussed showing the cognitive processes, people use in these circumstances, which create mindreading difficulties in peopleRead MoreHow Psychology Is The Theory Of Mind1783 Words   |  8 Pagesexplaining how different aspects of ToM have been studied. Additionally, Heider and Simmel’s (1944) study of geometric shapes will be explor ed to demonstrate how people interpret other people’s behaviour, even in animation. Subsequently, Autism Spectrum Disorder (ASD) will be examined to show how psychology has assisted in explaining how people with the condition have mindreading difficulties and how psychology is helping in developing their mindreading skills. Finally, relationship conflict willRead MoreThe Transition Of The Vet1464 Words   |  6 Pagesstudio environment for school age trainees. These environments were certainly different from my previous teaching roles. They presented new and interesting challenges. Some of the more challenging situations would be working with students with Autism Spectrum Disorder and having to modify delivery and assessments for the students as each had different needs. This provided me with a very good understanding of how young people with this condition react in the classroom environment and how essentially, havingRead MoreAutism Spectrum Disorder ( Asd )2254 Words   |   10 PagesIntroduction/Background Autism Spectrum Disorder (ASD) is a developmental disability that can cause significant social, communication, and behavior challenges and was first described by Dr. Leo Kanner in 1943 (Brown Percy, 2007). Individuals with ASD can range from high functioning to low functioning in their ability to learn, think, and problem solve (Brown Percy, 2007). Behavior problems are common among individuals with ASD (Hill at el, 2014). Kogan (2009) estimates that approximately 637