Tuesday, December 24, 2019

The Handmaid s Tale By Margaret Atwood - 1943 Words

The Handmaid s Tale is written by Margaret Atwood and published in 1985. The novel takes place in a city that used to be in the United States, now called the Republic of Gilead. The Handmaid s Tale explores themes of a new totalitarian theocratic state society that is horrific, constantly terrifying, controlling and segregating its subjects. Its main concentration is on the subjugation of women, and it also explores the plethora of means by which the state and agencies gain control and domination against every aspect of these women s lives. The use of coded language and restrictive dress codes also play an important factor as a means of social order and control in this new society. In the Republic of Gilead there’s a Handmaid†¦show more content†¦To this end, Handmaids are assigned to bear children for Commanders and other Offices or members of the elite that cannot conceive naturally. The protagonists and narrator is a female named Offred. The given occupational Hand maid alias of Offred simply means she is ‘Of her Commander who is named Fred . Offred is an intellectual woman, she is also kind, caring, and very thoughtful and perceptive. Unlike her mother, Offred is not a feminist advocate, and has displayed her un-comfort for activism several times throughout the novel. She had a former husband named Luke, and they had a little daughter together before the new regime took over. Offred s purpose is to serve the Commander and his wife, Serena Joy. When Offred is at the crucial point in her menstrual cycle when she is most fertile, the Commander must have passionless sex with Offred in order to accomplish the objective of impregnating her. This is Offred s third attempt; she was not successful with the two Commanders before this one. If Offred fails again she will be declared an Unwoman and sent to the colonies for hard labor. Offred s freedom is completely restricted. She can not have the door to her room totally shut, and she can leave the house only on specific purposeful trips such as to visit the wall or for purchasing grocery items. All the while, Gilead s secret police forces, known only as

Monday, December 16, 2019

Problems of Small Scale Industries Free Essays

The path of small entrepreneurs is not rosy. Small entrepreneurs face the following types of problems: (1) Problem of raw materials: A major problem that the small entrepreneurs face is the procurement of raw materials. They have to confront with numerous problems like; i. We will write a custom essay sample on Problems of Small Scale Industries or any similar topic only for you Order Now Availability of inadequate quantity ii. Poor quality of materials iii. High cost of raw materials etc All these factors adversely affect the proper functioning of small units. (2) Problem of finance: Finance is one of the most important problems faced by small entrepreneurs. As finance is the life blood of a business organization and no business organization can function properly in the absence of adequate funds. The problem of finance in small sector is mainly due to two reasons i. e. (i) Scarcity of capital in the country as a whole. (ii) Weal credit-worthiness of small units in the country. Due to their weak economic base, they find it difficult to take financial assistance from the commercial banks and financial institutions. Therefore, small entrepreneurs have to obtain credit from the money lenders on a very high rate of interest. (3) Problem of marketing: One of the major problems faced by small entrepreneurs is in the field of marketing. They are not in a position to get first hand information about the market i. e. information about completion, taste, liking disliking of consumers. Therefore, they are not able to upgrade their products according to the changing business environment. These small units acceding to the changing business environment. These small units often do not process any marketing organization. As a consequence, their product quality compares unfavorably with the quality of the products of the large scale industries. Therefore, these industries suffer from a comparative disadvantage as compared to large scale industries. (4) Problem of under utilization of capacity: Most of the small entrepreneurs are suffering from the problem of under utilization of capacity. Small scale units are making only 40 to 50 percent use of their installed capacities due to various reasons such as shortage of finance, raw-materials, power and under-developed markets for their products. (5) Outdated technology: Most of the small entrepreneurs depend upon old techniques and equipment. These units find it very difficult to modernize their plant and machinery due to limited capacity and capital. He quality of products and productivity tend be low in the absence of modern technology and that too at higher cost. They are in no position to complete with their better equipped rivals operating modern large scale units. For example, Khaki products even after government subsidy seem to be costlier. (6) Poor project planning: Poor project planning is another problem faced by small entrepreneurs. In the absence of education and experience, these entrepreneurs do not attach much significance to viability studies. They do not bother to study the demand aspect, marketing problems, sources of raw materials. Inexperienced and incompetent entrepreneurs often submit unrealistic feasibility reports and incomplete documents which invariably result in delays in completing promotional formalities. They cannot afford to avail services of project consultants due to limited financial resources. (7) Inadequate infrastructure: Insufficient quality and quantity of transportation, communication and other basic services particularly in backward areas is another problem. Inadequate infrastructure results in under utilization of capacity and wastages. Inadequate infrastructures also adversely affect the quality, quantity and production schedule of the enterprises operating in these areas. Therefore, their functioning will become uneconomical and unviable. (8) Problem of skilled manpower: A small entrepreneur located in backward area may not have problem of unskilled workers but it may be exposed to the problem of non-availability of skilled workers. Skilled workers may be reluctant to work in their areas and small scale enterprise may not afford to pay the wages and other facilities demanded by these persons. Unavailability of skilled manpower result in lower productivity, deterioration of quality, increase in wastages, rise in other overhead costs and finally adverse impact on the profitability of these small scale units. (9) Managerial problem: Another serious problem for small scale units is managerial inadequacies. Modern business demands vision, knowledge, skill, aptitude and whole hearted devotion. The managerial competence of the entrepreneur is very important for the success of any venture. An entrepreneur is required to undergo training and counseling for developing his organization revolves. Therefore, he must be fully conversant with all aspects of management. Lack of proper commitment and managerial skill will add to the problems of entrepreneurs. (10) Other problems: In addition to above discussed problems, the small scale industries have been constrained by a number of other problems such as trained technicians, technological obsolescence, unorganized nature of operation etc. How to cite Problems of Small Scale Industries, Essay examples

Sunday, December 8, 2019

Case Study for Diane Company- myassignmenthelp.com

Question: Write about theCase Study for Diane Company. Answer: Introduction Diane runs a consultancy firm. Dianes Company has several employees as well as clients. They advise their clients for setting up corporate intranets and designing DBMS. They are also responsible for giving security related advises to their clients. Diane has taken up a project to design the DBMS of a company that is medium sized. Diane has allowed the participation of the client in the process of designing. The client opted for a less secured system as the cost of a highly secured system will be high. According to Diane, the system requires more security features as it contains sensitive information. This report analyzes the entire case study from the ethical point of view. It analyzes the entire situation the is presented in the Dianes Company case study by taking the help of Doing Ethics Technique or DET. This report answers eight main questions to evaluate the situation and determine whether it is ethical or not. This report also analyzes the Dianes Company case study from the perspective of ICT Professionals by taking the help of ACS Code of Ethics. This report also combines the analysis based on DET and ACS and gives overall recommendations regarding the situation. Analysis using DET DET or Doing Ethics Techniques is used for the purpose of analyzing ethical issues in various situations (Wachs 2017). This technique helps the people to think in an ethical manner. It does not ensure best solutions but it helps in providing an ethical solution. Eight questions can be answered to get an accurate result. The Dianes Company case study is analyzed by DET and by answering eight questions as follows: What is going on? The Dianes Company was founded three years ago. It deals in consulting business. Diane is involved in giving several types of corporate advices to the clients. There are several employees and clients of this company. Recently this company has taken up a DBMS project of a company that is medium sized (Bernstein and Jain 2014). The client is also participating in the process of design of the DBMS. Diane has found out that this database will store sensitive and valuable information and therefore it requires advanced and strong security features. The cost of incorporating strong security features will become much more than they had planned and this made the client opt for less secured system. According to Diane, if the system does not have strong security features then it will become easy for any attacker to hack into the system and therefore she gives suggestion to use a strong security system. She tried to explain about the various risks of a less secure system but the computing direct or, personnel director as well as the CEO was in favor of a less secure system (Shapiro, Stefkovich and Gutierrez 2014). Diane is in a state of dilemma whether she should build a highly or less secure system. What are the facts? Several facts have been observed in the case study. Dianes Company is a consultancy firm. The business is running for the past three years. The company provides advice regarding designing of DBMS and setting up corporate intranet. This company is also engaged in advising their clients regarding security. Recently Diane has taken up a project for designing DBMS of a medium sized firm. The client is also involved in the design process of the DBMS. The company needs to take decision regarding the degree and level of security that is to be incorporated in the system. Several options were presented to the client. The project cost would be higher than the planned cost by incorporating strong security features. The client wanted a less secured system because it would be less costly. The computing director, personnel director as well as the CEO was in favor of a system with less security features. Diane knew the security risks that can harm the system and wanted to build a highly secured system. What are the issues? There are several issues involved in this case. The case depicted a scenario where Diane can understand the importance of the security risks involved in the DBMS that they are designing for a medium sized company. The client as well as the computing director, personnel director and the CEO is in favor of a system with less security features. They are unable to understand the information security needs of the DBMS. This can lead to a conflict between Diane and directors of the company. This issue of conflict can disturb the harmony of the work environment leading to low productivity and low customer satisfaction (Shafer-Landau 2014). Another issue can be conflict between Diane and the client company. The client company might misunderstand Diane and think that she is suggesting in designing a high security system because of high price. The client company might not understand the real importance of the security needs (Ford and Richardson 2013). This situation can lead to low customer sa tisfaction. Another important issue that can occur is ethical in nature. Designing a less secured DBMS will harm the company later. It will not be ethical for a IT company to deliver a project with less secure features. Delivering a less secure project will not only affect the reputation of Dianes Company but also affect the users as their sensitive data will be lost due to any security threat and attack. Who is affected? The people who are affected in this case study are the CEO, computing director, personnel director, Diane and the client company. There can be conflict among the stakeholders due to the security decisions of the DBMS of the client company. This can lead to disharmony in the work environment leading to low productivity. Low productivity will dissatisfy the customers. On the other hand if the company decides to deliver a low secure DBMS then it will affect the entire reputation of the company (Durkheim 2013). If later on the systems vulnerabilities are exploited by the attackers to access the sensitive information then it will harm the users of the DBMS. The financial data and other valuable data will be lost. The users will be affected in this case. What are the ethical issues and implications? IT companies must look into the safety features of the projects that they deliver. They must deliver a safe project incorporating security features in the system. It will not be ethical for a company to deliver an unsafe project that can harm the client company in the future (Dewey 2016). If the company delivers an unsafe project and later on if any security breach occurs then it will harm the reputation of Dianes company and will also affect the users whose valuable data will be lost. What can be done about it? A mutual decision can be taken in order to resolve this issue. Diane can compromise with her decision. She can compromise with the security features of the DBMS for the client company. This solution is unethical. Diane can explain the importance of information security and convince the client to opt for a highly secure database system. What are the options? There are several options that can be taken in order to resolve the issues: Diane can agree to deliver the DBMS to the client company with low security features. Diane can try to explain the need for information security to the client and convince to deliver a highly secure system. Diana can give up the project because she does not want to deliver a less secure product to the client. Which option is best and why? The best option is to convince the client to take up a highly secured DBMS. The client should not compromise the security features because of the cost of the system. If Diane agrees to sell a less secure product to its client company then it will not be an ethical act. Loss of sensitive data will harm the users and it will also affect the reputation of Dianes Company. According to Deontology theory it is morally correct if Diane carries out her responsibility and delivers a safe system to its client (Conway and Gawronski 2013). Selling a safe product will produce happiness among the users, stakeholders as their data will be secured and it will give happiness to the shareholders of the company as it will create a good reputation of the company (Albee 2014). Therefore according to Utilitarianism theory, this decision is the best decision (Mulgan 2014). The contract theory can be divided into moral as well as legal contracts that promote ethical activity. In this case study, Diane has entered into a legal contract for developing DBMS for the client company. She knows that the database will contain sensitive data and loss of valuable data can harm the users of the system. Dianes moral values stop her from developing an insecure or less secure database system as this can cause an adverse effect in the future (Levitt and Moorhead 2013). Therefore the best option according to Contract theory is not to develop an insecure system or convince the client to choose a secure database system. Analysis using ACS Code of Ethics ACS code deals with professional conducts. Its main focus is to guide the behavior in a professional society. This code of conduct encourages adherence to certain society values: 1. Public Interest Primacy: According to this code, the interest of the public should be given primary importance. In this case study, Diane is morally correct because she looks into the interests and benefits of the client first (Craft 2013). She thinks about the negative effects of a less secure system and suggests the client to opt for a highly secured system. She discusses the negative effects of a less secure DBMS and aims to preserve privacy and confidentiality of the data of the stakeholders. Here Diane is acting in an ethical manner as she gives importance to the public interest. Enhancement of Quality of Life: According to this code, the ICT professionals must try to improve the quality of the life of all those people who will be affected by their projects and works (Crane and Matten 2016). In this case study, Diane understood the importance of information security. She understood the severe effects of selecting a less secure DBMS. She told her clients that the employees will be able to gain access to the client data and she also explained the chances of hacking that can occur. Here it is clear that Diane thought about improving the quality of life of the client by suggesting them to choose a highly secure system and hence it is ethically correct. Honesty: According to this code, the ICT professionals must be honest with their clients. They must not hide any important aspect of the services or products which they are delivering (Hart and Graham 2012). They must not give any false ides to the clients for selling products. This code of conduct also includes rules like not to accept bribery and differentiate professional and personal opinions and advices. In this case study, Diane is honest with her clients and tells the client company about the negative effects of adopting a less secure DBMS. Competence: According to this code, the ICT professionals must work in a competent as well as diligent manner for stakeholders. Their aim is to deliver products that will be able to meet the operational as well as financial needs of the clients. They are supposed to give the best advices to the clients. In this case study, Diane is involved in the designing and development of DBMS for a medium sized firm. She suggests the client company a product that will fulfill the maximum operational needs of the company (Gotterbarn 2013). She knew that the client company will store sensitive data in its system and this will require high security. She gave correct advice to the client company for preventing any loss of valuable data. Professional Development: According to this code, the ICT professionals must enhance their own professional development (McDermid 2015). They must also try to enhance the professional development of the staffs and employees working in the organization. The focus must be to be aware of advanced technologies, practices as well as standards related to work. The staffs of the organization must be motivated to upgrade their skills and knowledge. In this case study, Diane is fully aware of the recent technologies and the security threats and risks. She knows the importance of information security (Gray and Schein 2012). She knows the negative impact of a less secure database. She even tries to enhance the professional development of the CEO and directors by explaining them about the various risks associated with less secure database. Professionalism: According to this code, the ICT professionals must try to enhance the societys integrity. This code also aims at increasing the respect of the members towards each other in the society (Boughton 2013). The aim of this code is to resolve ethical dilemma so that appropriate actions can be taken. The company must take action against any member who does not follow ACS code of ethics or conduct (Wright and Mordini 2012). This code is responsible for promoting cooperation among different professionals. Public interest is given primary importance. In this case study, there is a dilemma regarding designing of a less secure database system (Miller et al. 2012). The client company does not want a highly secure database because of high cost factor. The ACS code of ethics does not support the idea of developing a less secure database system. Conclusion This report concluded that Diane should not agree to build a less secure database system for the client company. According to this report it is not ethically correct to build and design a less secure database system for the client. The ICT professionals must take care of the security features of the products and services that they deliver to the clients. This report analyzed the situation by using the Doing Ethics Techniques and suggested that the best option is to convince the client to opt for a highly secure database system. Loss of sensitive data will harm the users and it will also affect the reputation of Dianes Company. The best option as suggested by the DET is supported by the ethical theories. The client should not compromise the security features because of the cost of the system. This report also analyzed the situation by using ACS code of ethics. ACS code deals with professional conducts. In this case study, Diane was morally correct because she looked into the interests and benefits of the client first. She thought about the negative effects of a less secure system and suggested the client to opt for a highly secured system. She discussed the negative effects of a less secure DBMS and aimed to preserve privacy and confidentiality of the data of the stakeholders. The ACS code of ethics does not support the idea of developing a less secure database system. References Albee, E., 2014.A history of English utilitarianism(Vol. 1). Routledge. Bernstein, M. and Jain, V.K., 2014. Ethical decision-making. InNeurosurgical Ethics in Practice: Value-based Medicine(pp. 135-146). Springer Berlin Heidelberg. Boughton, C., 2013. 5. What is an ICT professional anyway?.Professionalism in the Information and Communication Technology Industry,3, p.77. Conway, P. and Gawronski, B., 2013. Deontological and utilitarian inclinations in moral decision making: a process dissociation approach.Journal of personality and social psychology,104(2), p.216. Craft, J.L., 2013. A review of the empirical ethical decision-making literature: 20042011.Journal of Business Ethics,117(2), pp.221-259. Crane, A. and Matten, D., 2016.Business ethics: Managing corporate citizenship and sustainability in the age of globalization. Oxford University Press. Dewey, J., 2016.Ethics. Read Books Ltd. Durkheim, E., 2013.Professional ethics and civic morals. Routledge. Ford, R.C. and Richardson, W.D., 2013. Ethical decision making: A review of the empirical literature. InCitation classics from the Journal of Business Ethics(pp. 19-44). Springer Netherlands. Gotterbarn, D., 2013. 13. ICT governance and what to do about the toothless tiger (s): Professional organisations and codes of ethics1.Professionalism in the Information and Communication Technology Industry,3, p.267. Gray, K. and Schein, C., 2012. Two minds vs. two philosophies: Mind perception defines morality and dissolves the debate between deontology and utilitarianism.Review of Philosophy and Psychology,3(3), pp.405-423. Hart, R. and Graham, R., 2012. The ICT Profession Body of Knowledge. Levitt, D.H. and Moorhead, H.J.H. eds., 2013.Values and ethics in counseling: Real-life ethical decision making. Routledge. McDermid, D., 2015.Ethics in ICT: an Australian perspective. Pearson Higher Education AU. Miller, T., Birch, M., Mauthner, M. and Jessop, J. eds., 2012.Ethics in qualitative research. Sage. Mulgan, T., 2014.Understanding utilitarianism. Routledge. Shafer-Landau, R., 2014. The fundamentals of ethics. Shapiro, J.P., Stefkovich, J.A. and Gutierrez, K.J., 2014. Ethical decision making.Handbook of ethical educational leadership, pp.210-228. Wachs, M. ed., 2017.Ethics in planning. Routledge. Wright, D. and Mordini, E., 2012. Privacy and ethical impact assessment.Privacy impact assessment, pp.397-418.