Wednesday, August 26, 2020

Analysis Of Human Cultural Identity

The point of this paper is to incorporate examination of human social personality, see the accompanying five authentic and social periods: illumination; Greek and Roman culture; Jewish - Christian culture; Renaissance - Reform culture ; And industrialization - innovator culture. It additionally represents the connection between away from of every period and the social time. The social personality of illumination can be portrayed as the likelihood to accentuate human reasons. This thought can be clarified by models like Thomas Jefferson, Dennis Diderot, Protestant. The connection among culture and science gives the premise to understanding social personality. An approach to give significance as a unit of mental science for combination and examination to every individual 's physiological state. Human fundamental physiological needs - food, sexual orientation, shirking of agony and so on - are a piece of a reasonable model of social character. Different parts incorporate things that touch social request. With this degree of psychosocial incorporation, widespread requirements are guided and sorted out by culture. Feeling, acknowledgment, acknowledgment, attribution, personality, association and need of cooperation with others are dynamic and can be distinguished through culture. For instance, in light of the near state, it unmistakably shows that social incorporation and psychosocial coordination cross. The point of this paper is to incorporate investigation of human social personality, see the accompanying five recorded and social periods: edification; Greek and Roman culture; Jewish - Christian culture; Renaissance - Reform culture ; And industrialization - innovator culture. It likewise outlines the connection between away from of every period and the social time. The social personality of illumination can be depicted as the likelihood to stress human reasons. - Separating individuals' way of life from the world and all that it gives. A few people believe this is on the grounds that they don't care for the course of the world. Others accept that society won't acknowledge the individuals they need to turn into. Be that as it may, now and again, the explanation is as basic as religion. Amish is an ideal case of customary culture and has over 300 years history in the United States.

Saturday, August 22, 2020

Positioning Strategy of Grameen Phone

Situating Strategy By making item, administration, station, individuals and picture separation Grameenphone arrive at the purchaser contact point all the more successfully and effectively in contrasting and their rivals in the exceptionally serious media transmission division. 1. Item Differentiation: Network (best, quality): Grameenphone has the biggest system with the most stretched out inclusion around the nation, bringing 98 percent of the populace under the inclusion of its system. The whole Grameenphone arrange is additionally EDGE/GPRS empowered, permitting GP endorsers of access the Internet from anyplace inside its inclusion area.The 10,000 Base Stations are situated in around 5,700 destinations around the nation. The organization has so far contributed more than BDT 10,700 crore (USD 1. 6 billion) to manufacture the system foundation since its commencement in 1997. It has contributed over BDT 3,100 crore (USD 450 million) during the initial seventy five percent of the prese nt year while BDT 2,100 crore (USD 310 million) was put resources into 2006 alone. Grameenphone is executing a forceful turn out program by putting in new system components with an accentuation on keeping up quality service.A number of steps are being taken to recognize the issues spots in the system so as to continually improve quality. Extraordinary endeavors are being taken to continually screen and guarantee arrange quality in the urban regions. In Dhaka and other significant urban communities in-building inclusion arrangements and microcells have been conveyed to give improved inclusion in significant tall structures and occupied road intersections. 2. Administration Differentiation: Business Solutions is a finished, quality business interchanges administration from Grameenphone †planned particularly for the business network in Bangladesh.Their Business Solutions groups are here to help furnish their clients with tweaked media communications arrangements through discussion with their clients. Informing Services GrameenPhone have different informing administrations permit the clients approaches to convey more intelligent, quicker, more proficiently and more expense viably in a hurry. SMS (Short Message Service): Fast and reasonable informing through SMS. Send a SMS to any cell phone in Bangladesh and to in excess of 115 nations with their global SMS administration. Voice SMS: Save time and customize message through a voice SMS.This administration gives the adaptability to record it as long as 120 seconds of sound †MMS (mixed media informing): The MMS administration furnishes to take pictures redo it with movement, music, video cuts and send it over the globe in practically no time. Cell email: Send messages without a PC. With cell email, Customers have the offices to email any GP number through a SMS and email any PC over the globe. SMS Banking: Enjoy bother free record refreshes from eminent banks like Standard Chartered Bank, BRAC Bank, Bank As ia, and so forth. Client ServicesGP endeavor to deal with their clients all broadcast communications needs. Key Account Managers and Customer Service Managers are doled out to give organized support of Business Solutions subscriber’s directly from the earliest starting point of the relationship. Need Service GP have confidence in the significance of human touch in the business world. As they step into third year of giving inventive correspondence arrangements, Business Solutions plans to give upgraded need administrations. Organized Hotline 121 Enjoy organized client assistance by essentially dialing 121.Dedicated clients care supervisors are accessible nonstop, 24 hours every day and 7 days per week just to serve. Business Solutions postpaid supporters can call 121 completely liberated from cost. Worth Added Services Take client business higher than ever. Business Solutions pioneers in presenting best in class Value Added Service to help. Missed Call Alert Missed Call Alert and get SMS notice of the endeavored cancel when telephone was. To buy in the administration, type on and send to 6222. Stock Information The most recent updates of the Dhaka and Chittagong Stock Exchange are currently in buyer palm.To profit this administration, go to GP WORLD (wap. gpworld. com), at that point Business City, and download the Bull application. 4. Channel Differentiation GP increase upper hand through the manner in which they plan their channels inclusion aptitude and execution. 3. Individuals Differentiation: Almost a large portion of the all out number of workers of GrameenPhone Ltd. today (Tuesday), partook in the organization's greatest client care program to date. â€Å"This client assistance battle follows up on the â€Å"Stay Close† guarantee from GrameenPhone.As a mindful organization, GrameenPhone values its endorsers, remains by them and deals with them when they need help,† clarified GrameenPhone CEO Anders Jensen. Supervisory crew drove by, more than 2000 workers, speaking to the greater part of the useful divisions and all the provincial workplaces of GrameenPhone, went through the day connecting with the clients in 124 well known neighborhood and significant open places the nation over. The reason for existing was to collaborate with the clients, help them in unraveling their cell phone related questions, and show Grameenphone's dedication as an accommodating and client situated organization. . Picture Differentiation GrameenPhone logo separates from different organizations. Therefore client effectively distinguish them in the market, which is another successful upper hands for GrameenPhone. Situating Statement: Company and Brand Positioning ought to be summarized in a situating articulation. GrameenPhone situating articulation is â€Å"Stay Close† which clarify that client can without much of a stretch express their feeling with their nearby family members and companions through utilizing GrameenPhone.

Friday, August 21, 2020

Success depends upon maturity!

Success depends upon maturity! Maturity is many things. It is the ability to base a judgment on the big picture, the long haul.It means being able to resist the urge for immediate gratification and opt for the course of action that will pay off later.One of the characteristics of the young is I want it now. Grown-up people can wait.Maturity is perseverancethe ability to sweat out a project or a situation, in spite of heavy opposition and discouraging setbacks, and stick with it until it is finished.The adult who is constantly changing friends and changing mates is immature. He/she cannot stick it out because he/she has not grown up.Maturity is the ability to control anger and settle differences without violence or destruction. The mature person can face unpleasantness, frustration, discomfort and defeat without collapsing or complaining. He/she knows he cannot have everything his/her own way every time. He/she is able to defer to circumstances, to other people-and to time. He/she knows when to compromise and is n ot too proud to do so.Maturity is humility. It is being big enough to say, I was wrong. And, when he/she is right, the mature person need not experience the satisfaction of saying, I told you so.Maturity is the ability to live up to your responsibilities, and this means being dependable. It means keeping your word. Dependability is the hallmark of integrity. Do you mean what you say-and do you say what you mean? Unfortunately, the world is filled with people who cannot be counted on. When you need them most, they are among the missing. They never seem to come through in the clutches. They break promises and substitute alibis for performance. They show up late or not at all. They are confused and disorganized. Their lives are a chaotic maze of broken promises, former friends, unfinished business and good intentions that somehow never materialize. They are always a day late and a dollar short.Ann LandersMaturity is the ability to make a decision and stand by it. Immature people spend their lives exploring endless possibilities and then doing nothing. Action requires courage. Without courage, little is accomplished.Maturity is the ability to harness your abilities and your energies and do more than is expected. The mature person refuses to settle for mediocrity. He/she would rather aim high and miss the mark than low-and make it.Maturity is the art of living in peace with that which cannot be changed, the courage to change that which should be changed, no matter what it takes, and the wisdom to know the difference.By Ann landers

Sunday, May 24, 2020

Family Resiliency From Adversity - Free Essay Example

Sample details Pages: 2 Words: 671 Downloads: 6 Date added: 2019/02/15 Category Society Essay Level High school Tags: Family Essay Did you like this example? I believe society would greatly benefit from resources that would support resilience of adversity when overcoming unstable environments. In the news we see a lot about the Migrant Caravan and how the United States government is unwilling to provide refuge for these people who are in need. While the United States and the Honduran governments differ in resources and conditions, their willingness to help people who are seeking refuge is the same rejection. Don’t waste time! Our writers will create an original "Family Resiliency From Adversity" essay for you Create order I wish I knew what the solution would help satisfy all the people involved in this predicament. It is an emotional topic for me to discuss the military involvement because I am an Army veteran, I know what it is like to be given orders that I do not comply with. The racism and discrimination families of not only the immigrants but even the law enforcement, military and civilian by standers in that environment will be impacted. Ann S. Masten states how resiliency is not something that can be defined objectively because it is influenced by historical and sociocultural context. Highlighting cultural expectations and the environment as contributing factors of adaptive characteristics of individuals. Resiliency varies among cultures and experience, while it may be in some peoples favor to seek haven and leave everything behind to move forward, others would rather stay no matter what the conditions may be and stay strong throughout the struggle. There are many factors to account for when considering resiliency. Factors including who is involved, such as children, family, financial resources, and emotional states. Optimal resiliency would be positive and will empower an individual enough to overcome adversity. For example, taking into consideration migrating family’s risk of premigration traumas occurring in the home country, traumas in route to the new country, and the often-hostile environment in the new country (Torres, 2018). Torres research highlights the negative health related implications these traumas have on an immigrants physical and mental state rooting from government policies and practices. Experiences with trauma shape children especially, they see the world as a bad place that does not help their family. These personality traits develop their susceptibility or protective in?uence, the physical or sociocultural value and meaning of traits (Masten, 2014). These negative experiences are what lead to maladaptive characteristics like sexual and drug abuse. Those bad habits are what resiliency in an individual could help them overcome. While international agencies are investing in resources to promote healthy development and resilience, is it enough? It is heartbreaking to know the horrors that are occurring from the California fires, people disappearing, being found dead, losing their homes, and the families who travelled thousands of miles, who would put their life in danger to just try to find refuge. Our society needs resources and the awareness that will help society cope. â€Å"There is a need for more knowledge about risk and protective processes and how to prepare for speci?c threats to human development (Masten, 2014).† Reformed policies can facilitate migration and decrease the traumas that individuals and families experience. I don’t believe in pressing people to be religious, but it is something that has help me personally. I think now is the time religion can be a good coping mechanism for those who do believe in hope for a better future. I believe it is important for society to be resilient and develop positive coping mechanisms in preparation for natural disaster, family separation, violence and many other dangerous situations. I focus on migrating families because it is something that has affected my family directly. I understand that things won’t get better until there are reformed policies that will be implemented but I know I can raise awareness through social media. References Masten, A. S. (2014). Global perspectives on resilience in children and youth. Child Development, 85(1), 6–20. https://doi-org.mimas.calstatela.edu/10.1111/cdev.12205 Torres, S. A., Santiago, C. D., Walts, K. K., Richards, M. H. (2018). Immigration policy, practices, and procedures: The impact on the mental health of Mexican and Central American youth and families. American Psychologist, 73(7), 843–854. https://doi-org.mimas.calstatela.edu/10.1037/amp0000184

Wednesday, May 13, 2020

My Photography Goal of Capturing Oppression, Personal...

This family is mourning the loss of a loved one in Uruguay. The photographer captured the moment of sadness for this family and shows the essence that everyone feels at some point in their life. The father has fallen to his knees in sadness and loss of body control for his lost wife. The children pray for their losses as they see their father lose his composure. I am going to travel the world and develop my personal imagination in my ability to portray my feelings through photography. I have always had a fascination with photography and would like to bring my skills of photography to the point I can portray my thoughts to others. I would like to travel the world in order to be open to sights, sounds, touch, and emotions that I am conveyed†¦show more content†¦Their decision came out of a hope it would be easier for me to deal with. I was holding her in my arms as the doctor placed the liquid into her IV. This was a horrible pain I hope that all those that dont care about an imals could feel to feel the life leave from a deeply loved pet. I believe my 16yr lifelong companion left this world to heaven. She was more than a pet she was a family member. Photography will allow me to display the amount of affection that is between a person and their pet. I could attempt to capture this loving bond throughout my travels around the world. My second pet lost happened two weeks ago now, she was a Siamese cat. She was always more of my sister cat as she passed away in her arms. My sister would never let her have bad care she took her to Boston from Virginia for these past two years. She was eighteen and died naturally. I am still trying to comprehend the news of this event as it is hard to accept that a loved one is gone even if the loved one is just a cat. With photography I will show others that have this emotional attachment to their pets and cannot let them leave their side. I will prove that animals are more than just animals and that they are family members and deserve care. I have struggled through many depressions in my life not knowing the current condition of my mother and not wanting to know. During my last summer at home my mom’s condition worsened she

Wednesday, May 6, 2020

The Number One Article on Optional Practical Training Essay Samples

The Number One Article on Optional Practical Training Essay Samples The absolute latest you may apply for OPT is 60 days following your program end date. Even if you just use a couple of months and then return to school, you CANNOT recover the rest of the months of OPT and use them at a subsequent date. Part-time employment is 20 hours each week or less. All students on post-completion OPT are expected to report any of the subsequent changes within 10 days of the first shift. Another reason could possibly be that different aged samples were used, like a baby plant that might get a greater absorbance in comparison to an aging plant. Sadly, this line is practically always busy. So How About Optional Practical Training Essay Samples? There are a few special circumstances where you're able to be a part-time student. It's possible for you to work with several organizations, so long as each position is directly linked to your main area of study. You don't need to get a job offer prior to applying for optional practical training. A job offer isn't required to be qualified to make an application for optional practical training. The student's proposed employment is related to the student's major subject of study. Thus, for example, a student can do OPT for their undergraduate degree (if done in the USA) and then again for their graduate degree (if done in america). He has not used all of the practical training available at the current level of study. Students that are unsure whether their activities may be considered cheating are encouraged to talk to their instructor. A standard small business report follows the exact format. More research should be carried out. Part-time practical training is going to be deducted at one-half the full-time speed. You should also have a great understanding of a report structure. Top Optional Practical Training Essay Samples Secrets In this instance, it's possible to either attempt to enter without it, which can be risky and OIS doesn't advise you to achieve that. For instance, if you participated in 10 months of pre-completion OPT, you'd be eligible for only as m uch as two months of post-completion OPT. The requested start date can't change once the OPT application was mailed. You're going to be notified while the letter is prepared to be picked up. If you decide to travel, please note IPS can't help facilitate your re-entry if it's denied. The optional essay may also demonstrate that you're seriously interested in attending a specific law school. Doing this will permit you to be more acquainted with the typical content and basic formats which are usually seen in an academic essay. The same is applicable to top essay writers. If you would like to make an academic essay that's both outstanding and relevant, always place the items that we've discussed above in mind. It's a motorized version of the standard rickshaw or velotaxi, a tiny three-wheeled cart driven by somebody. Since academic essays are popular in the business of education and research, you should make sure your writing is both logical, interesting and informative. An academic essay always must be relevant. Your academic essay should evoke an emotion that is needed to spark different ideas, opinions and other sorts of responses. Always keep in mind that it should be playful it must not bore your audience. Optional Practical Training Essay Samples: No Longer a Mystery You can also take a look at financial report examples 10. Reports are thought to be one the best approaches to relay an info. You can also see sample activity reports It is a list of folks who sponsor or assist you in producing the report. Only provide the needed and relevant data in your report.

Tuesday, May 5, 2020

An Approach to Information Security Management free essay sample

An Approach to Information Security Management Anene L. Nnolim, Annette L. Steenkamp College of Management Lawrence Technological University Abstract This paper reports on part of a doctoral dissertation research project in information security management. The intent of this research is to attempt to determine how information security management could be enhanced as a structured and repeatable management process, and to develop an appropriate architectural framework and methodology that could enable integration of information security management with enterprise life cycle processes. Over the years, the focus of information security has evolved from the physical security of computer centers to securing information technology systems and networks, to securing business information systems. The proliferation of computer networks and the advent of the Internet added another dimension to information security. With the Internet, computers can communicate and share information with other computers outside an organization’s networks and beyond their computer center. This new mode of communication meant that the existing security model was inadequate to meet the threats and challenges inherent in this new technology infrastructure. We will write a custom essay sample on An Approach to Information Security Management or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page A new model of information security management is needed to meet the security challenges presented in this new environment. This has motivated the focal area of this research in information security management. Part of meeting this new challenge could also include the resurrection of risk as an important component of information security management. The results of this research would be important to any organization with a need for a secure business environment. The research results will also be important to individuals responsible for managing information security in their organizations, as well as to senior executives and members of corporate boards of directors, because of their increased statutory responsibilities to secure various types of information in their organizations. From the results of the research so far, the information security management viewpoint calls for a phased approach with iterative process models that include several elements, supporting methods and specific outputs. The viewpoint should also include an integrated process improvement model, with supporting methodology. Currently, the main doctoral research is in the â€Å"demonstration of concept† stage. In this stage, the conceptual model will be validated in terms of the stated research problem. Potential outcomes and value of validation of the research proposition could be an approach to implementing an information security management system. This would include an In Proceedings of the 6th Annual ISOnEworld Conference, April 11-13, 2007, Las Vegas, NV www. isoneworld. org Pg 2-2 information security policy framework, a methodology, and a supporting process model that is regarded as essential to managing information security in the enterprise. Key words: Information security management, information security architecture, security policy, security process improvement, information security viewpoint, risk management. Evolution of Computer Security Strategies Before computer security evolved into the many dimensional fields of today, the primary security focus of most organizations was in providing physical security to their assets. For organizations with early computers, this included securing and protecting data from natural disasters or malicious activities. With the advent of the personal computer, it was inevitable that security objectives would eventually include computer security. Up to the early 1980’s when computers were used simply as business tools to automate business processes, the focus of computer security objective was securing computer centers since most computers were located in computer centers. The security strategy was mainly accomplished through physical security (Vermeulen and Von Solms, 2002). Up to the early 1990’s as computers began to be used throughout the enterprise, the focus of security objective shifted to securing information technology (IT) systems and computer networks. The security strategy this time was accomplished through software that resided on IT systems (Vermeulen and Von Solms, 2002). From the early 2000’s to the present, computers became components of IT systems that supported information as business assets. The focus of security objective was on securing business information systems, and this was accomplished through information security management (Vermeulen and Von Solms, 2002). The proliferation of computer networks and the advent of the Internet added another dimension to information security. With the Internet, computers can communicate and share information with other computers outside an organization’s networks and beyond their computer center. This new mode of communication meant that the existing security model was inadequate to meet the threats and challenges inherent in this new technology infrastructure. A new model of information security management is needed to meet the security challenges presented in this new environment. The objective of the new model would be the protection of business information systems in the enterprise. Securing business information systems also involves some risk. As a result, meeting this new challenge for security management would require that risk management be an important element in information security management. Achieving the objective of this new model requires comprehensive information security management strategies. Purpose and Scope of the Research The intent of this research is to examine information security management in the enterprise. It will attempt to determine how information security management could be enhanced as a structured and repeatable management process. The research also aims to develop an appropriate architectural framework and methodology that could enable integration of information security management with enterprise life cycle processes. In Proceedings of the 6th Annual ISOnEworld Conference, April 11-13, 2007, Las Vegas, NV www. isoneworld. org Pg 2-3 The results of this research would be important to any organization with a need for a secure business environment. The research results will also be important to individuals responsible for managing information security in their organizations, as well as to senior executives and members of corporate boards of directors, because of their increased statutory responsibilities to secure various types of information in their organizations. This dissertation research project will be limited to examining the information security management viewpoint and related views. This includes the process and method for architectural descriptions for the information security management viewpoint, in the context of enterprise security domain. A review of other enterprise security viewpoints may be undertaken, to enable the presentation of research findings in the appropriate context. Problem Statement and Research Question The problem statement for this research is a lack of a comprehensive framework, supporting process model, and methodology that can enable the implementation and management of information security. Related to the problem statement are three research questions. The questions cover important aspects of information security management, i. e. principles, policy framework, integration with enterprise life cycle processes, and its significance to enterprise planning process. The questions are: 1. What are the underlining principles influencing the transition of information security, from a traditional IT environment of managing data and application security, to managing information security as an integrated component of the enterprise business strategy and management process? . How can an enterprise security framework facilitate the effective management of information security? 3. How can information security management become a significant element of the enterprise strategic planning model? Research Proposition This research is based on the following propositions: 1. Enterprise information security can be managed effectively using a frameworkbased approach and supporting methodology . 2. Information security management could be a structured and repeatable management process if a systematic approach is followed to its implementation. Research Design The research approach followed is mixed methods. The strategy of inquiry is concurrent procedures. Concurrent procedures strategy is defined as situations â€Å"†¦ in which In Proceedings of the 6th Annual ISOnEworld Conference, April 11-13, 2007, Las Vegas, NV www. isoneworld. org Pg 2-4 the researcher converges quantitative and qualitative data in order to provide a comprehensive analysis of the research problem† (Creswell, 2003, p. 16). The rationale for selecting mixed methods design is to get a better understanding of the problem identified in this research. The mixed methods would allow for both text and statistical analyses of data, and would permit more flexibility when designing questions for possible interviews, i. e. both open- and closeended questions (Creswell, 2003, p. 17). The knowledge claim position for this research will be pragmatism. Creswell (2003) noted that some of the characteristics of the pragmatism knowledge claims are problemcentered, consequences of actions, real-world practice oriented, and pluralistic (Creswell, 2003, p. 6). These seem to fit well within the scope of this research. The proposed methods of investigation for this research are: a) Continue the literature survey and perform a comprehensive analysis of literature on information security management. b) Develop a conceptual model of a solution to the problems of inadequate information security management. c) Demonstrate the conceptual model by means of an appropriate method, such as an example of how to apply the approach to developing an information security system for the organization. ) Conduct in-depth structured interviews with senior executives in different industries, using a set of questions derived from the conceptual model. The interviews would be limited to senior executives responsible for information security management in their organization. This may include interviews with information security professionals. Research Process In the process model used for this research, the various activities, timelines, and expected deliverables are outlined. The major phases of the research process model are Research Planning (Problem identification, Proposal development), Research (Literature review, Conceptualization of solution), and Research Experiment (Demonstration of concept, Interpretation of findings, Presentation and defense of dissertation) Research Validation Methodology To validate the propositions for this research, it will be necessary to design a demonstration of the concept in the form of an example of how the approach might be implemented within an organization. Validation of the proposition will be done by means of criteria for evaluating validity, reliability, and generalizability of the approach. The results of the research project will be evaluated in terms of: a) Whether they support or refute the research propositions, b) Whether they provide the basis to confirm or reject the conceptual solution, and c) Applicability of the demonstration-of-concept example to the conceptual solution. In Proceedings of the 6th Annual ISOnEworld Conference, April 11-13, 2007, Las Vegas, NV www. isoneworld. org Pg 2-5 Summary of Focal Theory The Open Group (2006) defines a viewpoint, also known as a metaview, as: A specification of the conventions for constructing and using a view. A metaview acts as a pattern or template of the view, from which to develop individual views. A metaview establishes the purpose and audience for a view, the ways in which the view is documented (e. g. for visual modeling), and the ways in which it is used (e. g. for analysis) (The Open Group, 2006, Glossary, p. 8). Various security viewpoints in the enterprise make up an enterprise composite security viewpoint. These are physical security, data security, information security, application security, and infrastructure security viewpoints. Each viewpoint has various additional views. The concept of information security management in the enterprise may be viewed at three main levels, namely strategic, tactical, and operational. These levels correspond to the types of security issues that are of concern to management, including the general nature of expertise required to manage security, at that level (Belsis et al, 2005, p. 93). The distinguishing factors between the domains are strategic (impacts corporate strategy), tactical (regarding the methodologies/practices used to manage security), and operations (installation and operation of security tools and measures) (Belsis et al, 2005, p. 193). In other words, the motivators for security management are that it should be policy-driven (strategic level), guidelines-driven (tactical level), and measures-driven (operational level). It would seem that majority of information security management activities in the past have been focused at the operational level, and very little attention was given to information security management as a continuum at all three-enterprise levels. Slewe and Hoogenboom (2004) alluded to this when they noted â€Å" for security measures the focus is often on logical and technical measures†¦Ã¢â‚¬  (Slewe and Hoogenboom, 2004, p. 60). It can be inferred, then, that information security management has not reached a maturity level that could make it a repeatable management process. This has motivated the focal area of this research, namely information security management in the enterprise. Sample Literature Review The literature review for the research was organized into themes. This facilitated the analysis of literature materials. Examples of these themes include architecture framework, governance, risk management, policy, and standards, etc. A sample of the literature review follows. Eloff and Eloff (2003) proposed that organizations use a holistic approach to information security management, and establish an information security management system. This system would integrate policies, standards, guidelines, code-of-practice, technology, human issues, legal, and ethical issues. This means using a process model approach to manage information security. The authors propose â€Å"process security† and â€Å"product security† in information security management. In â€Å"process security†, the focus would be on planning In Proceedings of the 6th Annual ISOnEworld Conference, April 11-13, 2007, Las Vegas, NV www. isoneworld. org Pg 2-6 and implementing management practices, procedures, and processes to establish and maintain information security. In â€Å"product security†, the focus would be on the use of certified software products in the IT infrastructure in order to establish and maintain information security (Eloff and Eloff, 2003). Doherty, N. F. , and Fulford, H. (2006) discussed the aligning of information security policy with strategic information systems plan (SISP). It would seem that a broader strategy of aligning information security policy with corporate policy strategy might be better in the long run. The argument in support of aligning information security policy with SISP is that it would provide a framework to ensure that systems are developed with security built-in. However, if information security policy is aligned with corporate policy, the same systems development objective could still be accomplished. To comply with security regulations of the Health Insurance Portability and Accountability Act (HIPAA) organizations are required to secure individual identifiable personal information (HIPAA, sub. F, Sec. 261). The security regulations identifies three safeguard standards that must be met by organizations covered under the Act, namely administrative safeguards, physical safeguards, and technical safeguards. Geffert (2004) observed that in the process of complying with this Act, organizations could end up with an effective enterprise risk management system (Geffert, 2004, p. 21). On the other hand, Sarbanes-Oxley Act (2002) does not deal specifically with information security. However, the focus of the act is mostly on corporate governance, i. e. corporate accountability and responsibility of officers of the organization. Botha, J. , and von Solms, R. (2004) presented a theoretical model of business continuity planning methodology that could be generally applied to most businesses, as part of an information security management strategy. Out of the three information security fundamental principles of confidentiality, integrity, and availability, this study maintains that availability tends to assume greater importance than the other two principles in business continuity planning (Botha von Solms 2004, p. 329). Their theoretical model is a sevenphase planning methodology, namely project planning, business impact analysis, business continuity strategies, continuity strategies implementation, continuity training, continuity testing, and continuity plan maintenance (Botha von Solms 2004, p. 31-332). This is similar to that proposed by Heng (1996). However, before most organizations can use this methodology, they would need to first identify their specific organizational properties. These properties become variables in the organization’s business continuity plan. Gerber, M. , and von Solms, R. (2001) attempted to determine the importance of risk analysis in identifying security controls, and whether there are oth er alternative approaches to risk analysis for accomplishing similar goals (Gerber von Solms 2001, p. 577). They identified several factors that influence an organization’s security requirements. These are (a) business requirements for confidentiality, integrity, and integrity, (b) legal, statutory, or regulatory requirements, and (c) risks to the infrastructure. They argue that if the security requirements analysis determines the appropriate security controls, then this alternative analysis is called â€Å"security requirements analysis† (Gerber von Solms 2001, p. 582-583). In Proceedings of the 6th Annual ISOnEworld Conference, April 11-13, 2007, Las Vegas, NV www. soneworld. org Pg 2-7 Stakeholder involvement is an important component of information security management. Tsohou, A. , Karyda, M. , and Kokolakis, S. (2006) examined the potential use of cultural theory as a tool for identifying patterns in stakeholders’ perception of risk, and its effect on information system risk management. They maintain that awareness and training are not the only social factors tha t influence stakeholders’ perception on security threats (Tsohou et al, 2006, p. 198). The fundamental principle of cultural theory is that the way people socially interact encroaches on the systems of symbols they use to understand the world. The study uses this theory, as a foundation framework, to associate social context with information security risks and security management practices (Tsohou et al, 2006, p. 207). Human factors have always had some impact on information security programs in organizations. Besnard and Arief (2004) used a multidisciplinary approach to investigate some of the human factors in computer security. For example, a legitimate user may devise work-arounds if the security control measure that has recently been installed cannot provide good usability to the user. In some cases, legitimate users could unknowingly facilitate attacks from outside the organization. Ultimately, end user responsibility is a key component to improving user behavior in information security. International Standards Organization/International Electrotechnical Commission (ISO/IEC) 17799 (2000) provides procedures and code of practice for information security management in the enterprise. It outlines a general framework that provides a common basis for developing enterprise security standards and effective security management practices. Other independent organizations that may be relevant to information security management include British Standards Institution (BS), Committee of Sponsoring Organizations (COSO) of the Treadway Commission, and International Federation for Information Processing (IFIP) Technical Committee 11. Conceptualization of the Solution The research is still in progress, and the dissertation has not been published. From the results of the research so far, the information security management viewpoint calls for a phased approach with iterative process models that include several elements, supporting methods and specific outputs. The viewpoint should also include an integrated process improvement model, with supporting methodology. Other developments from the research include a meta model with detailed meta primitives, an architecture framework, a security governance structure, and a security management process model. Demonstration of Concept As the research progresses, part of the demonstration of concept stage will include conducting in-depth structured interviews with senior executives in different industries, using a set of questions derived from the conceptual model. The interviews will be limited to senior executives responsible for information security management in their organizations. This process may also include interviews with information security professionals. In Proceedings of the 6th Annual ISOnEworld Conference, April 11-13, 2007, Las Vegas, NV www. isoneworld. org Pg 2-8 Conclusion The potential outcome and value of validation of the research proposition could be an approach to implement an information security management system. This approach would include an architectural framework and methodology, a security policy framework, and a supporting process model that could enable integration of information security management with enterprise life cycle processes. References Belsis, P. , Kokolakis, S. , Kiountouzis, E. (2005), Information systems security from a knowledge management perspective, Information Management Computer Security, Volume 13, Number 3, 189-202. Besnard, D. , Arief, B. (2004), Computer security impaired by legitimate users, Computers Security, Volume 23, 253-264. Botha, J. , von Solms, R. (2004), A cyclic approach to business continuity planning, Information Management Computer Security, Volume 12, Number 4, 328-337. Creswell, J. W. (2003), Research Design: Qualitative, Quantitative, and Mixed Methods Approaches, 2nd. Edition, Sage Publications, London. Doherty, N. F. , Fulford, H. (2006), Aligning information security policy with the strategic information systems plan, Computers Security, Volume 25, 55-63. Heng, G. M. (1996), Developing a suitable business continuity planning methodology, Information Management Computer Security, Volume 4, Number 2, 11-13. Eloff, J. , Eloff, M. (2003), Information security management – a new paradigm, Proceedings of the 2003 annual research conference of the South African Institute of Computer Scientists and Information Technologists on enablement through technology SAICSIT, 130-136. Geffert, B. T. (2004), Incorporating HIPAA security requirements into an enterprise security program, Information Systems Security, November/December, Volume 13, Issue 5, 21-28. Gerber, M. , von Solms, R. (2001), From risk analysis to security requirements, Computers Security, Volume 20, 577-584. ISO/IEC 17799 (2000), Information Technology – Code of Practice for Information Security Management. Sarbanes-Oxley (2002), Sarbanes-Oxley Act of 2002. Slewe, T. , Hoogenboom, M. (2004), Who will rob you on the digital highway? Communications of the ACM, Volume 47, Number 5, May 2004, 56-60. The Open Group (2006), The Open Group Architecture Framework (TOGAF), Version 8. 1, Enterprise Edition The Open Group, San Francisco. Tsohou, A. , Karyda, M. Kokolakis, S. , Kiountouzis, (2006), Formulating information systems risk management strategies through cultural theory, Information Management Computer Security, Volume 14, Number 3, 198-217. Vermeulen, C. , Von Solms, R. (2002), The information security management toolbox – taking the pain out of security management, Information Management and Computer Security, Volume 10, Number 3, 119-125. Anene L. N nolim Anene is a Doctoral Candidate for the degree of Doctor of Management in Information Technology (DMIT) at Lawrence Technological University in Southfield, Michigan. He holds a bachelor’s degree in business from State University of New York, Buffalo, and an In Proceedings of the 6th Annual ISOnEworld Conference, April 11-13, 2007, Las Vegas, NV www. isoneworld. org Pg 2-9 MBA from Stephen F. Austin State University, Nacogdoches, Texas. He has a Human Resources Management Certificate from University of Guelph in Ontario, Canada. He is a certified Project Management Professional (PMP). Currently, he is the principal consultant at InfoTSG, Inc. (www. infotsg. com), an IT services consulting company with interests in business process management and information security management. His professional experience includes several years of management and leadership positions in government, telecommunications, and IT industries in Canada and U. S. He is an Adjunct Professor in business process management at Lawrence Technological University, and On-Line faculty at the University of Phoenix, teaching IT, management, and business courses. Annette Lerine Steenkamp Annette Lerine Steenkamp is Program Director of the Doctoral Program in Management of Information Technology and Professor in Computer and Information Systems in the College of Graduate Management at the Lawrence Technological University, Southfield, Michigan. She holds a PhD in Computer Science, with specialization in Software Engineering. Dr. Steenkamps research interest is in approaches to information technology process improvement, enterprise architecture and knowledge management. Current research is concerned with the application of CMMI in the education sector, redesign of organization processes for mobile technology adoption, knowledge management frameworks, alignment of IT and organization strategies, and systems integration. In Proceedings of the 6th Annual ISOnEworld Conference, April 11-13, 2007, Las Vegas, NV www. isoneworld. org

Friday, April 3, 2020

Prior to 1959, faulty equipment was the probable c Essays

CRM Prior to 1959, faulty equipment was the probable cause for many airplane accidents, but with the advent of jet engines, faulty equipment became less of a threat, while human factors gained prominence in accident investigations (Kanki, Helmreich Anca, 2010). From 1959 to 1989, pilot error was the cause of 70% of accident resulting in the loss of hull worldwide (Kanki, Helmreich Anca, 2010). Due to these alarming statistics, in 1979 the National Aeronautics and Space Administration (NASA) implemented a workshop called "Resource Management on the Flightdeck" that led to what is now known as Crew Resource Management (CRM) or also known as Cockpit Resource Management (Rodrigues Cusick, 2012). CRM is a concept that has been attributed to reducing human factors as a probable cause in aviation accidents. The concepts of CRM weren't widely accepted by the aviation industry, but through its history, concepts, and eventual implementation, Crew Resource Management has become an invaluable resource for pilots as well as other unrelated industries around the world. Over the course of the thirty years spanning from 1959 to 1979 there were many incidents that led to a need for a system to reduce human factors in major accidents, but in the seventies, there were some significant accidents that highlighted a need for action. A very notable crash was the Eastern Airlines Flight 401 on December 29, 1972. The flight was making their approach in Miami when the landing gear light would not illuminate. All members of the flight crew attempted to troubleshoot the problem with the autopilot on. Air Traffic Control (ATC) instructed the pilot to divert away from the airport at 2000 feet while they figured out the issue. The autopilot function.

Sunday, March 8, 2020

Open-mindedness is the future

Open-mindedness is the future Free Online Research Papers Open-mindedness is the future â€Å"Racism isn’t born, folks, it’s thaught. I have two-year-old son. You know what he hates? Naps! End of list† This quote is written by Dennis Leary and I agree, racism and prejudice are usually not words that can be found in a little boy or girl’s dictionary. However I think a lot of people automatically creates a defence against what isn’t exactly similar to themselves, instead of open up and try to learn something about the other culture. I think it’s the competitor switch that goes on and they want to prove themselves as better than the other. I know a lot of people who denies being racists, but makes jokes and talks degrading about foreigners and different cultures. I think that it has never been less racism than it is today. My grandmother is more prejudiced than me, probably because she wasn’t used to foreigners when she was young. That is an example that proves that we’re are not born with racism, but the defense against what’s new goes on. Racism has been in progress for decades, Europeans took Africans as slaves the races and Hitler tried to wipe out all the Jews. These are just some of the examples and mostly it was white people who tried to prove themselves as the better ones. We have white groups as Ku Klux Klan, and black groups as Black Panthers who are driven by hate against other races. Almost as long as people can remember it has been some kind of fence between the different cultures, most clearly against black and white. I think media can be blamed for a lot of the hate going on today. After 11 September they have presented the Middle East as one big terrorist organization. And a lot of European countries is influenced by America. We are watching American movies, TV shows and news that of course represents Americans as angels and Iraqis as devils. I don’t think it’s many ambulatory people that haven’t heard Bush’s nickname for the Middle East, â€Å"The axis of evil†. It has probably been in every newspaper and TV station in the western world. When many people find it much easier to just listen to the leader instead of drawing own conclusions, the hating just goes on. It’s true that there are a lot of illegal foreigners who is hiding in Norway and are working black. Of course that creates frustration among Norwegians, but it doesn’t mean that everybody is like that. Most of them are legit workers that deserves to live here just as much as anybody else. What about the Norwegians who moves to Gran Canary with full social security, but at the same time is stealing jobs from the locals. Of course the natives are furious. We don’t like being compared to those few criminal Norwegians, so we shall not take for granted that all foreigners in Norway are bad people. There are different people in every country. I understand that people were skeptical for 200 years ago, but in a modern, internationalized community like today it won’t work. Research Papers on Open-mindedness is the futureWhere Wild and West MeetHip-Hop is Art19 Century Society: A Deeply Divided EraThe Hockey GameHonest Iagos Truth through DeceptionThe Effects of Illegal ImmigrationComparison: Letter from Birmingham and CritoNever Been Kicked Out of a Place This NiceMarketing of Lifeboy Soap A Unilever ProductRelationship between Media Coverage and Social and

Thursday, February 20, 2020

Post-Colonial Nigeria Political History Essay Example | Topics and Well Written Essays - 1250 words

Post-Colonial Nigeria Political History - Essay Example Consequently, Nigeria not only remained dependent of the United Kingdom several years after the winning of freedom from the latter, but also turned out to be victim of ethnic-racial and religious conflicts after obtaining the status of a sovereign state. Hence, wide-scale corruption, red-tapism, nepotism, hoarding, lawlessness, unemployment and poverty remained the most dominant challenges faced by the country during its post-colonial years till today (Ihuegbu 2002). Like all the newly liberated nations on the map of the globe, Nigeria also experienced ethnic, racial, religious, regional and class discrimination in the country, where the communities belonging to eastern, western and northern parts of the vast country appeared to be determined to dominate over other ethnic and regional communities in one way or the other. Hence, Nigeria became the prey to civil war, and remained as the crowd of people after half century of breaking the shackles of slavery, which could not be stated as a nation in the real sense of the world. A coalition alliance under the title Nigerian People’s Congress came at the helm of the governmental affairs, through elections, in order to establish a conservative Islamic political system in the country. Since both Christian and Muslim communities are in majority in the country, the prominent leader of Christian-dominated National Council of Nigeria and the Cameroons (NCNC) Nnamdi Azikiwe (1904-1996) was nominated to be the first Governor General of Nigeria, who belonged to the majority Igbo ethnic group of Nigeria (Rustad 2008). Since the northern Yoruba community, having significant proportion in the national population, was not invited to participate in national affairs, they chose to form opposition alliance Action Group under the leadership of Obafemi Awolowo. Somehow, the differences among the Hausa, Yoruba and Igbo ethnic tribes turned into political rivalries, where all these regional groups were determined to obtain politi cal supremacy in order to enforce the system of their choice subsequently. Since the unrest was in vogue in different parts of the country, where the communities were at daggers drawn in Nigeria, a plebiscite was held in 1961 in order to decide the fate of southerner and northern Cameroon, where the former voted in favor of Cameroon, while the latter decided to remain as an inevitable part of Nigeria (Rustad 2012). However, instead of introducing improvements in political structure, the country was dragged to a long-lasting bloody civil war, called Nigeria-Biafran War (1967-70), which paved the way towards the further division of the country into sects and factions causing heavy losses in men and material subsequently. The military personnel also added their share in bringing an end to the civilian government with the alleged allegations of corruption and favoritism is every area of the state. Like other third world countries of Asia and Africa, Nigeria also fell into the hands of t he military regime during early 1970s, which ended in 1979, resulting in the ruination of the social and economic fabrics of the country. The military ruler General Obasanjo assured the peaceful transfer of power to the elected civilian leader Shehu Shagari.  

Wednesday, February 5, 2020

Monitoring and Controlling Project Deliverables Essay

Monitoring and Controlling Project Deliverables - Essay Example There are many differences between physical security, and information security. Information security is concept that entangles most aspects of the society, majorly because of the ubiquitous adoption of computing technology in the modern world. In our daily lives, we use computers at work place for our employers, play on computers in homes, study online, do business, and check emails, and so on. The level of development in the modern world has greatly improved especially with the increased rate of innovation, and growing technology. Everyone in the modern world is impressed at how the level of technology is increasing so fast because they benefit from it in very many different ways (Matford & Whitman, 2012). Owing to the fact that most people have the urge to make things easier in the modern world, everyone is turning towards the direction of Information technology because online seems to be the future of everyone, and everything. The web is viewed as the future of most activities in the world today since currently it serves as a very useful tool even though it also has some intimidating proposition. Although technology enables more productivity and allows access to much information, it also carries a lot of security issues. Employers preserve information about their companies, employees, and other important documents on the computer systems. Banks also store vital information on money transaction between them, and other clients. One of the most common challenges in the modern technology world is hacking, and piracy. When someone hacks information about a company, then this leaves the company in danger of either breaking down or losing credibility from the public that it serves because this interferes with its reputation, and competitors can take advantage of this situation. Employers can lose millions of dollars, and suffer damage of reputation, face legal

Monday, January 27, 2020

Risk Factors for Sudden Infant Death Syndrome (SIDS)

Risk Factors for Sudden Infant Death Syndrome (SIDS) Article 1 Socioeconomic Position and Factors Associated With Use of a Nonsupine Infant Sleep Position: Findings From the Canadian Maternity Experiences Survey SIDS is the surprising loss of life of an baby young than one year of age. SIDS continues to be mysterious after a thorough case research, such as efficiency of a complete autopsy, evaluation of the loss of life field and evaluation of medical record.Unexpected Child Loss of life Issue has always been a challenge to scientists.. So far no concepts or details are able to provide a effective response for this. Physicians have did not figure out whether the child instantly had a center problem or just basically missing the capability to take in. Over 70 different concepts have been suggested to describe the cause of SIDS The chance of SIDS usually mountains in babies older between 2-4 several weeks of age, it is very unusual within the first month of birth and threat decreases after six several weeks of age. Research has revealed that about 90% of SIDS fatalities happen in babies young than six several weeks of age. In SIDS an baby between the age groups of two to four several weeks is discovered deceased during a period of sleep. The surprising loss of life of previously healthy babies is all the more surprising and harmful. Sudden baby loss of life is a terrible event for any mother or father or care provider. This is the most severe disaster mother and father can face, a disaster which results in them with unhappiness and a feeling of weeknesses that continues throughout their lives. SIDS is also generally known as Bed loss of life, Cot loss of life, Sudden mysterious loss of life in beginnings (SUDI). Unexpected Baby Loss of life Issue has always been a challenge to scientists. The cause (or caus es) of SIDS is still a secret. SIDS is one of the top causes of infant death in USA. So far no concepts or details are able to give a effective response for this. Physicians have did not figure out whether the child instantly had a center problem or just simply missing the capability to take in. Over 70 different concepts have been suggested to describe the cause of SIDS. In facedown position, air activity around the oral cavity is also affected. This can cause the baby to rebreathe just blown out co2. Normal air activity is avoided by Smooth bed linens and gas-trapping things, like bed linens, bed linens, waterbeds and soft beds. Some of the concepts relevant to SIDS describe that the childs higher air gets obstructed making the child suffocate. One concept says that blood vessels structure of the child may have sudden development of the level of body fat and thus, the mind of the child prevents performing. Some fault defective neurological program in children for SIDS as it is not able to notify the child and awaken it up when the fresh air provide is low. SIDS children may not have this procedure at all. SIDS may be due to a defective defense mechanisms or the way a child rests such as smooth bed linens in which the children unintentionally hide their experience and then cannot convert and thus get choked. Covering the child too firmly in a cover may also cause to SID. Article 2 Heart Rate Variability in Sleeping Preterm Neonates Exposed to Cool and Warm Thermal Conditions The term babies with apparent deadly event (ALTE), premature babies of low birth weight are at risk for SIDS. Some state that friends of babies who have succumbed to SIDS are at risk. The study states that the babies who die of SIDS have irregularities in functions like respiration, hypertension and arousal. The structural differences in a specific part of the mind may add to the chance of SIDS. Exams of the mind stems of SIDS victims have revealed a developing delay in formation and function of several serotonin-binding nerve routes within the mind. These routes regulate respiration, pulse rate, and hypertension reactions. The study examine that increase in the heat range due to overdressing, using extreme covers can cause to an improved fat burning capacity in these babies and ultimate loss of respiration control. Apparent life-threatening activities (ALTEs) are medical activities in which young babies show unexpected changes in respiration, shade, or muscular mass. ALTEs are triggered due to popular breathing attacks, gastro esophageal flow back illness or convulsions. But there is no medical proof connecting ALTEs to SIDS.Some of the baby fatalities followed by immunization made people believe immunization as a cause of SIDS which has now proven to be wrong by research. SIDS is non-contagious and is not genetic and obviously it is not due to bad being a parent. Infants are very delicate to changes in heat range. Child may sleep greatly if the space is too heated and may not awaken in time in case of any problems in respiration. Breast fed children are secured against attacks that can cause to SIDS. Parents can pay attention to their children while they are resting through digital products. They increase an alert if the child prevents respiration. But they are not known to prevent SIDS. They are suggested for children with higher threat for SIDS. Pacifiers give included security for children up to 6 month. Because heating up may increase a childs chance of SIDS, outfit your baby in light, relaxed outfits for resting, and keep the 70 degrees at a level thats relaxed for an mature. If youre concerned about your baby remaining heated, outfit him in a onesie, sleepwear that protect arms, legs, arms, and legs. Remember, dont use a protect your baby can get twisted in it or take the protect over his face. Article 3 Clinical Digest Cot lack of life, better known as S.I.D.S., is one of the top causes for the overpriced baby death amount rate in this nation these days. It is often misinterpreted or unrecognizable. For the most part, the causes of SIDS are unidentified to the community. This is modifying, however, as attention is ever improving. Thus, the objective of this document will be to describe unexpected baby lack of life problem and its known or recommended causes. Also, the record of SIDS, the issues and psychological struggling that outcomes from the lack of a kid, the cost it requires on the enduring brother, and possible guidance or other help that is available for mother and father who may have missing a kid to SIDS are such places that will be researched. Overall I desire to accomplish a better knowing of all these recommended subjects within the body of the document. Despite decreases in occurrence during the past two decades, cot loss of life (SIDS) remains the leading cause of loss of life for babies older between 1 month and 1 year in western world. Behavioral risks identià ¯Ã‚ ¬Ã‚ ed in epidemiological studies include vulnerable and side roles for baby rest, smoking visibility, soft bedding and rest areas, and heating up. Proof also indicates that pacià ¯Ã‚ ¬Ã‚ er use at rest time and room discussing without bed discussing are associated with reduced chance of SIDS. Although the cause of SIDS is unidentified, premature cardiorespiratory autonomic control and failing of excitement responsiveness from rest are key elements. Gene polymorphisms with regards to this transportation and autonomic neurological system development might make aà ¯Ã‚ ¬Ã¢â€š ¬ected babies more susceptible to SIDS. Strategies for threat reduction have assisted to decrease SIDS occurrence by 50–90%. However, to decrease the occurrence even further, greater progr ess must be made in reducing prenatal smoking visibility and applying other recommended baby care methods. Ongoing research is needed to recognize the pathophysiological basis of SIDS. In the UK, present suggestions say that mother and father should choose where their child rests, however, the most secure choice is in a bed or cot in the same space. The researchers discovered that the chance of SIDS was more regular in breast-fed children young than 3 several weeks who distributed the bed with their mother and father, even if the mother and father did not use alcohol, medication, or smoking. Furthermore, the chance of bed-sharing reduced as the child got mature. The most frequent interval for the incident of SIDS was between 7 and 10 several weeks. The writers indicate that a important loss of SIDS worth could be achieved if mother and father did not discuss beds with their children. Article 4 Alcohol as a risk factor for sudden infant death Syndrome SIDS is the unexpected loss of life of an baby young than one year of age. SIDS continues to be mysterious after a thorough case research, such as efficiency of a finish autopsy, evaluation of the loss of life field and evaluation of medical record. The unexpected loss of life of formerly healthy babies is all the more surprising and harmful. Sudden baby loss of life is a terrible occasion for any mother or father Alcohol during maternity is one of the greatest risks to a unborn infant. Consumption can put the mom and unborn infant at threat for several things. For example: miscarriages, stillbirths, early babies, and low-birth-weight babies. When a lady is drinking regularly it boundaries her nutritional consumption that both she and the unborn infant need to develop. Consuming during maternity can also have an impact on baby growth. Alcohol remains in the blood circulation twice as long in a unborn infant than it does in the mom. This can cause the most harm to the unborn infant during the first trimester when body system components and body system parts are developing, such as the mind, center, and anxious system. Scientists discovered those fatalities may result from kids being exposed to alcohol in the uterus and from alcohol-using moms creating dangerous surroundings for the kids after beginning. Previously, studies have tied SIDS to parents smoking and to risky surroundings, but few stu dies have looked at whether alcohol could be involved in some of the fatalities. They in comparison the number of SIDS and baby fatalities that happened in kids of moms with a clinically diagnosed consuming issue, to cases among the kids of moms without a analysis. The researchers discovered that kids created to moms who consumed intensely during maternity had a seven-fold increase in the chance of SIDS, in comparison to kids of moms without a consuming issue. Babies also had a nine-fold increased chance of SIDS when their moms consumed within the year after beginning, in comparison to kids created to moms who didnt drink. The results of this study indicate that expectant mothers alcohol-use problem improves the chance of SIDS and (infant deaths) through immediate effects on the unborn baby and ultimately through ecological risks,† The writers add that past studies suggest children revealed to alcohol in the uterus may have irregularities in the brainstem, which could lead to problems controlling basic body features like respiration.

Sunday, January 19, 2020

A Mans Struggle to Heal Himself in Big Two-Hearted River Essays

A Man's Struggle to Heal Himself in Big Two-Hearted River Ernest Hemingway's "Big Two-Hearted River"* is such a rich text that it has probably received more literary critical attention than many novels of several times its length. Hemingway's ardent use of intricate detail and his intentional, calculated use of short, simple sentences help to make "River" a treasure chest of critical ideas and possible interpretations. Historically, much of the criticism of "River" has examined the dark underlying themes of the story, such as the alleged omission of some preceding, devastating event and Nick's wounded spiritual and mental state. These sentences, such as "There was no town, nothing but the rails and the burned-over country," are representative of the abundance of similar language throughout the story and make it easy to understand why many critics focus on dark themes, devastation and mental instability. Without denying or dispelling any of the valid "dark" critiques, I intend to show that "River" may also be easily understood in a more posi tive light as an account of one man's struggle to heal himself by returning to what he knows and loves. The intense detail that abounds within the story makes an easy job for the deconstructionist. The intricate descriptions of Nick's actions are susceptible to deconstructive criticism, as may be seen in James Twitchell's "The Swamp in Hemingway's 'Big Two-Hearted River." Twitchell focuses on the physical improbability of the swamp existing adjacent to the river as it is described in the story. A swamp is an area where the water moves very slowly, if at all; however, Nick describes the river as being lined with boulders, having a pebbly bottom, and "fast moving water" (209). Twitchell po... ... Green, James L. "Symbolic Sentences in 'Big Two-Hearted River.'" Modern Fiction Studies 14 (1968): 307-312. Kyle, Frank B. "Parallel and Complementary Themes in Hemingway's Big Two-Hearted River Stories and 'The Battler.'" Studies in Short Fiction 16 (1979): 295-300. Smith, B.J. "' Big Two-Hearted River:' The Artist and the Art." Studies in Short Fiction 20 (1983): 129-32. Stewart, John F. "Christian Allusions in 'Big Two-Hearted River.'" Studies in Short Fiction 18 (1978): 194-96. Svoboda, Frederic J. "Landscapes Real and Imagined: 'Big Two-Hearted River.'" Hemingway Review 16 (1996): 33-42. Twitchell, James. "The Swamp in Hemingway's 'Big Two-Hearted River.'" Studies in Short Fiction 9 (1972): 275-76. Weeks, Lewis E. Jr. "Two Types of Tension: Art Vs Campcraft in Hemingway's 'Big Two-Hearted River.'" Studies in Short Fiction 11 (1974): 433-34.

Saturday, January 11, 2020

How to Change a Flat Tire

You can easily get sucker into paying more than fifty dollars for having a towing company change flat tire for you. Instead, you can save yourself money by doing it yourself. It is a simple process that takes less than half an hour. Most of the tools you need are already in your car. These tools include a Jack, a tire iron, a spare tire, and road flares. The first step is to set up the road flares. Flares are available at most department stores and are a very good idea to carry. Setting flares makes the car more visible, decreasing the chance of an accident while you are changing the tire. To properly set flares, you should have four of them. Take each flare and light it, following the directions on the package. After you light them, lay them on the ground in the following pattern. Lay the first one about fifty feet behind your car, and about four feet from the white line on the side of the road. Set the rest of the flares in a straight line, with the last one being about three feet from the driver’s side rear corner of your car on the white line. This will allow other drivers to see that there is an emergency, and allow them time to merge. The next step is to begin the tire change. To do this you must take the rest of the tools out of your car. The tire iron is probably in the trunk along with the spare tire. The car jack might be in the trunk, or it might be under the hood next to the engine. It depends on what type of car you have. Once you have all of the tools out, find the tire iron. The tire iron in most vehicles is a bent piece of steel flattened on one end, with a socket on the other. Use the flattened end to pry off the hubcap. Then use the socket to loosen all five lug nuts. Do not remove the lug nuts at this time because it will cause the car to fall. Once you loosen the lug nuts, you will begin lifting the car with the jack. There are only four places on the car where you can put the jack. They are close to the tires, and reinforced to hold the weight of the car. There are pictures and written directions on the side of the jack, telling you where to use it. Find the spot where the jack goes, and determine if the ground will support the weight of your car. If it might not, you will want to stick a board, or another hard object under the jack. This will allow you to jack up the car, even in the softest ground. Once the tire is off the ground about four to five inches, remove the lug nuts, and take the tire off. Take your spare tire, line it up with the lug bolts, and slip it on. Put all five lug nuts back on and tighten them as much as possible. It is easier to put the top ones on first, because this will keep the ire from falling off. Lower the car back to the ground, and remove the jack. Tighten the lug nuts as tight as possible. There is a special way to tighten the lug nuts, if you do not do it this way, your tire may be on the hub crooked. After tightening one lug, go directly across to tighten the next one, be sure to re-tighten all of the lug nuts at least four times. This will make your tire go on the hub perfectly straight. Then, put all of the tools away, and put your flat tire in the trunk. Before you go, read the spare tire to see if there is any speed limitations. Some car manufacturers design their spares to travel only at slow speeds. Check your tire for any specific regulations. If you do not abide by speed limitations, the tire could blow out, causing not only damage to the rim, but also possibly body damage to the car. How to Change a Flat Tire Donna Pierce ENG032 G02 02-21-2013 Illustration Essay First Draft Going back to College As a college student, all my fellow students are worried about what they will do for spring break. I, on the other hand, am trying to figure out what to do with my grandchildren. I have been out of school for 28 years. Being back in college is exciting, but it can also be very stressful too. So many things have changed since I was in school. For instance, the subjects are a lot harder than 28 years ago.For example, the math classes with algebra are nothing like the algebra that I learned back in the day. Also, all of our homework has to be done online. We didn’t really use the internet back then. Furthermore, it’s really nice getting to meet new friends that are my age and older. For instance, we all get together and have study groups to try to help each other out. To sum it up, going back to college at an older age has its advantages and disadvantages.The subjects are different to s ome extent, but I just have to work that much harder to understand and learn the internet better. It’s really nice having friends that you can get together with as a study group to help each other understand and try to accomplish our goals. I feel that going back to school will help me learn that it doesn’t matter how old you are, you still can accomplish your goals in life if you put forth the effort.

Friday, January 3, 2020

Maturity Structure Of Firms Assets Liabilities Finance Essay - Free Essay Example

Sample details Pages: 16 Words: 4868 Downloads: 2 Date added: 2017/06/26 Category Finance Essay Type Narrative essay Did you like this example? Financial economics had made significant progress in asset management, the coordination between firms cash inflows with cash outflows by matching the maturity of income generated by assets with the maturity of interest incurring debts. People knew little about the maturity structure of firms assets and liabilities, because willingly obtainable and thorough information regarding a firms liabilities and liabilities like commitment were not easy and time overwhelming to gather in our country, while many papers had explained how imbalances in the maturity period of asset and liability structure could be the main reason of currency and financial crises in the emerging markets, the factors that create such imbalances in the first place had established comparatively little attention so far. The agency costs could be reduced if firms issue short-term debt and, thus, were evaluated periodically. Don’t waste time! Our writers will create an original "Maturity Structure Of Firms Assets Liabilities Finance Essay" essay for you Create order Information asymmetry and conflict between shareholders and debt holders could be intensified in transition economies for three reasons: (i) lack of shareholder and creditor protection owing to the imperfect legal system; (ii) the high level of uncertainty enables firms with overdue debt to switch to high-risk assets, which increases flotation and/or transaction costs; and (iii) the ownership structure of companies in emerging markets could create potentially higher agency costs because managers dominate the board of directors and comparatively greater control rights (Harvey, Lins and Roper (2004). Smith and Warner (1979) argued that riskier and smaller companies had higher agency related costs because managers of small companies had mutual interests with the shareholders since they were holding a larger proportion of the equity. The managers were interested in progress of the equity value even it reduced the firms total value. The purpose of the study was to seal the gap of ma turity mismatch between firms assets and liabilities, and theoretically how mismatch might lead to and exacerbated maturity mismatch due to market uncertainty, and how maturity mismatch increased output instability on the non/financial firms. Second, this research provided empirical results that supported the predictions that firms debt maturity had positive impact on maturity of its assets, however little support for firm size and the impact of growth options were inversely related to debt maturity to test these predictions the study made the model which depended on the following variable like debt maturity ratio, asset maturity ratio, market to book value ratio, and firm size. A common recommendation was that firms should compare the maturity period of its assets to that of its long term liabilities. If long term liabilities had less maturity period with respect to assets, then there might not be sufficient cash on hand to pay back the principal when it was outstanding. On the other hand, if debt had a greater maturity period with respect to assets, then cash flows from assets moved toward an end, whereas debt expenses stay outstanding. Maturity matching could lessen these risks and then structure of corporate hedging that decreased predictable expenditure of financial distress. In a related element, Myers (1977) disputed that maturity matching could control agency conflicts between equity holders and debt holder ensured that debt reimbursements were planned to communicate with the reduction in the worth of assets. In a model of this fact, Chang (1989) revealed that maturity matching could reduce organization expenditure of debt financing. Hoven and Mauer (1996) study also revealed well-built support for the standard textbook recommendations that firms should compare the maturity period of their assets to that of their liabilities. Research investigation specified that asset maturity was an important aspect in explaining distinction in debt maturity st ructure. The sample of firms were taken from non/financial firms listed on the Kse-100 index and their financial data consisting from year 2003 to 2008 and those firms were used to analyzed the distinctive financial characteristics. The reasons for choosing non-financial firms, because it played significant role in the economy of this country and the measurement of maturity matching of assets and liabilities and reduction in agency cost would help these firms to avoid risks like liquidation and fluctuation in interest rates. If the period of the maturity of assets was larger than the maturity period of its liabilities, then the maturity structure was at risk to growing interest rates, because the higher maturity period assets were more responsive to interest rates than the lower maturity period liabilities. If interest rates went up then the assets were turned down in value more rapidly than the liabilities. If interest rates remained constant, then there might be a deficit in su pporting the liabilities. One way to diminish this problem was to rebalance the assets such that the maturity period of the assets were equal to the maturity period of the liabilities, then any interest rate had a minor effect on outcome. If in the above case, the asset maturity period was too high, the maturity period must be shortened. This short fall might be achieved by either rebalancing the structure with shorter maturity period assets or by shorting longer maturity period assets, and if the firms debts and debt like obligations were larger than its assets in amount then this mismatch between the maturity period of assets and liabilities could lead it towards liquidation so to keep away from that liquidation the firms should keep up matching between the amount of its assets and liabilities, and companies that had a greater reliance on external finance faced a comparatively weaker agency problem. De Haas and Peeters (2006) agency cost issue could be alleviated by the higher variability of firm value, which could interfere with the firms ability to pay off its obligations. The main advantage that Non-Financial firms listed on KSE-100 Index could acquire from this study was to avoid the mismatch between the maturity period of its assets to that of its debts and the agency cost problem. 1.2 Statement of Problem The objective of this study was to seal the gap of maturity mismatch between firms assets and liabilities, and the importance of agency cost problems, which showed theoretically how mismatch might lead to and exacerbated maturity mismatch due to market uncertainty, and how maturity mismatch increases output instability in the Non-Financial firms listed on KSE-100 Index. The purpose of this study was to observe the debt maturity structure described by Shah and khan (2005); Myers (1977); Titman (1992); Diamond (1991); Barnea, Haugen, and Senbet (1980); Jalilvand and Harris, (1984); Ozkan, 2000, Yi, 2005 and Whited, (1992); Warner (1979); Hoven and Mauer (1996); Barclay and Smith (1995); Barnea, Haugen, and Senbet (1980, 1985); and Hart and Moore (1995) presented the detail regarding the debt maturity structure. The scope of study was to analyze the maturity matching structure between firms assets and liabilities, and agency cost problem. 1.3 Hypotheses H0: There was a positi ve impact of asset maturity on Debt maturity. H1: There was a positive impact of Firm Size on Debt maturity. H2: There was an inverse impact of Market to Book Ratio on Debt maturity. 1.4 Outline of the Study The outline of the study processed as follows. Chapter one based on the introduction of the thesis, which contained introduction about debt maturity structure by different researchers, the statement of problem, and hypotheses etc. Chapter two contained literature review given by different researchers, theories on debt maturity structure, and factors which were directly or indirectly related to debt maturity structure. In chapter three, research methods were described, which contained method of data collection, sampling technique, sample size, research model developed, and statistical technique. Chapter four contained on findings and interpretation of the results. Chapter five contained the conclusion, discussions, implications, recommendations, and future research. Chapter six contained those references of different authors, which were related to this study. CHAPTER 02 LITERATURE REVIEW The literature included two types of theories about the debt maturity structure: agency cost theory, and maturity matching theory. 2.1 Agency Cost Theory Myers (1977) discussed that risky debt financing caused low investment benefits when a firms investment had chances to look for growth option and low investment benefits could be assured by providing short-term debt to mature before the growth options were utilized. The hypothesis was that the firms assets had a greater ratio of growth options in shorter-term debt. Titman (1992) presented that if growing firms had the greater chances of bankruptcy and positive future-outlook then those firms could acquire incentives from borrowing short-term debt. There was an acceptance in the literature that growth (market-to-book ratio of assets) should be inversely correlated to debt maturity in the agency/contracting costs perspective. Hart and Moore (1995) defined the role of long-term debt in controlling managements capability in increasing funds for future projects. It was analyzed that long-term debt may restrict self-interested managers from financing non-profitable investments enta iled a direct variation of long-term debt with market-to-book ratio. Therefore, the relationship between growth options and debt maturity structure had an experimental issue. Diamond (1991) defined liquidity risk as the risk that debtors were lost control rents because creditors do not want to refinance, and therefore they decided to liquidate the firm. Because short-term debt had seen by Diamond as debt that mature before the profits of an investment were received, it was necessary to refinance short-term debt. For firms with high credit worthiness, the liquidity risk was not relevant. A decreased in credit worthiness did not lead to a crunch of credit to the firm. For this reason, firms with a high credit rating were expected to borrow on the short term. For firms with a medium credit rating, the liquidity risk could be important, but they also interested to borrow on the long term. Firms with a low credit rating were therefore forced to borrow on the short term. Barnea, Hau gen, and Senbet (1980) found that organization conflicts, similar to Myerss (1977) underinvestment problem, could be restrained by reducing the maturity of debt. Therefore, smaller firms which faced additional harsh agency conflicts then larger well-maintained firms might use shorter-term debt to mitigate these conflicts. In most cases, the costs of a public debt issue were fixed, and these costs were therefore self-determining of the size of the debt. Because public debt had a longer maturity than private debt, a positive relation between the size of a firm and the maturity of debt was proposed. However, those reasons did not apply to small unlisted firms, because these firms make very little use of public debt. The present study also included leverage and industry affiliation as determinants of debt maturity. Arguably, larger firms had lower asymmetric information and agency problems, higher tangible assets relative to future investment opportunities, and thus, easier access to long-term debt markets. The reasons why small firms were forced to use short-term debt include higher failure rates and the lack of economies of scale in raising long-term public debt. It was further argued that larger firms were tend to use more long-term debt due to firms remaining financial needs (Jalilvand and Harris, 1984). Agency problems (risk shifting, claim dilution) between shareholders and lenders may be particularly severed for small firms. Bondholders attempt to control the risk of lending to small firms by restricting the length of debt maturity. Large (small) firms, thus expected to had more long (short)-term debt in capital structure. Consequently, these arguments implied a positive impact of firm size on debt maturity. It was widely accepted by the current literature that larger firms had lower agency costs of debt (Ozkan, 2000, Yi, 2005 and Whited, 1992), because these larger firms were believed to an easier access to capital markets, and a stronger negotiat ion power. Hence both these arguments favored larger firms for issuing more long-term debt compared to smaller firms. In addition to it Smith and Warner (1979) argued that smaller firms were more likely to face higher agency costs in terms of a conflict of the interest between shareholders and debt holders. Hoven and Mauer (1996) found out only little evidence for the agency cost aspect that debt maturity used to restrict the conflicts of interest between share holders and debt holders. Although smaller firms in the sample used short term debt, findings also suggested that firms with big amounts of growth options small leverage, and hence small to moderate incentive of debt maturity structure to reduced the conflicts of interest above the utilization of those options. Barclay and Smith (1995) tested the determinants of corporate debt maturity hypothesis that firms with greater growth choices in investment opportunity sets issued large amount of short-term debt, study also foun d that firms issue large amount of long-term debt. The findings were robust to surrogate measures of the investment opportunity set, techniques as well which proposed to growth options in the firms investment opportunities be key in discussing both the time-series and cross-sectional fluctuation in the firms maturity structure. Study also supported strong relationship among firm size and debt maturity: superior firms issue a considerably bigger proportion of long-term debt. This was uniformed with the observance that small firms were dependent more heavily on bank debt that traditionally had shorter maturity than public debt. Smaller firms had large growth options, which indicated to employ shorter-term debt to reduce the agency conflicts; these indications assumed debt as uncertain. Though, the capital structure theory suggested that these firms employed moderate amounts of leverage to mitigate the risk of financial loss. As such, firms with low leverage and low chances of finan cial loss would likely be unbiased to employ debt maturity structure to restrict agency conflicts, all other matters remain constant. Agency cost theory also proposed that smaller to medium size firms relatively faced higher agency costs problems because the possible divergence of risk shifting and reducing the concentration between equity holders and managers (Smith and Warner, 1979). To overcome this issue and to control the agency cost short-term debts were recommended Barnea, Haugen, and Senbet (1980, 1985). The large constant flotation cost of constant securities comparative to the small size of the firm had an additional barrier that stops all small firms access to the capital market. Smith (1986) argued that managers of regulated firms had less discretion over investment decisions, which reduced debts agency costs and increased optimal leverage. Shah and khan (2005) evidenced the blended support for the agency cost, study results showed that smaller firms employed more sho rter term debt then longer term debt; even there was no evidence that growing firms employ more of short-term debt as assumed by (Myers, 1977) that debt maturity varied inversely to proxies for firms growth options in investment opportunities, The implication of firm size variable also verify the information asymmetry hypothesis, established it costly to access capital market for long term liabilities. 2.2 Maturity Matching Theory A frequent recommendation in the literature discussed that a firm should compare maturity structure of its assets to that of its debt. Maturity matching could concentrate on these threats and thus a structure of corporate hedging that decreased projected expenses of financial suffering. In a related element, Myers (1977) explained that maturity matching could control agency conflicts between equity holders and debt holders by ensuring that debt repayments had planned to match up with the reduction in the worth of assets in place. At the final stage of an assets life, the firms encountered a reinvestment judgment, concerning to debt that matures at that time assists to restore the suitable investment benefits as soon as new investments were needed. Though, this analysis specified that the maturity of a firms assets did not the only determinant of debt maturity. Growth options also played a vital role as well. Chang (1989) revealed that maturity matching could reduce organization exp enses of debt financing. Stohs and Maurer (1996) and Morris (1976) argued that a firm could face risk that did not cover sufficient cash in case the maturity of the debt had shorter maturity than the maturity of the assets or even vice versa in case the maturity of the debt was greater than asset maturity (the cash flow from assets necessary for the debt repayment terminated). Following these arguments, the maturity matching principle belongs to the determinants of the corporate debt maturity structure. Emery (2001) argued that firms avoid the term premium by matching the maturity of firms liabilities and assets. Hart and Moore (1994) confirmed matching principle by showing that slower asset depreciation signified that longer debt maturity. Therefore, this study expected a positive relationship between debt maturity and asset maturity. Hoven and Mauer (1996) found well-built support for the regular textbook recommendations that firms should compare the maturity period of fi rms liabilities to that of firms assets. Study results were indicating asset maturity a key aspect in discussing instability in debt maturity structure. Shah and khan (2005) found unambiguous support for maturity matching hypothesis. Study findings revealed that the fixed assets varied directly with debt maturity structure. Myers (1977) argued that maturity matching of firm assets and liabilities could also partially serve as a tool for mitigation of the underinvestment problem, which was discussed in the agency costs theory section. Here the maturity matching principle ensured that the debt repayments should be due according to the decrease of the asset worth. Comparing the maturities as an effort to list debt repayments to match up with the decrease in expected worth of assets now in place. Gapenski (1999) differentiated two strategies of maturity matching namely the accounting and financing approach. The accounting approach considered the assets as current and fixed ones and called for the financing of the current assets by short-term liabilities and fixed assets by long-term liabilities and equity. The financing approach considered the assets as permanent and temporary. In these terms the fixed assets were definitely permanent ones and some stable parts of the fluctuating current assets were also taken as permanent. This approach then suggested financing the permanent assets by long-term funds (long-term liabilities and equity) and temporary assets by short-term liabilities. Consequently, the financing approach generally employed ceteris paribus more long-term liabilities than the accounting approach did. The financing approach brought more stable interest costs than the accounting approach; but as the yield curve was usually upward sloped, the financing approach was also more costly. The financing approach versus accounting approach decision making was thus a classical risk return trade-off relationship. In praxis, the corporate commonly favor ed the accounting approach before the finance approach. Based on these maturity matching arguments, balance sheet liquidity implied an impact on the corporate debt maturity structure. Guedes and Opler (1996) stated that the estimation of asset maturity did not appear to be very much between firms, those issued debt (term of one to nine years) and firms that issued debt up to twenty nine years term. But firms that issued debt for greater than thirty years term had assets with significantly long lives. Assumptions expected that firms should compare the maturity of assets and liabilities showed that partially correct. Morris (1976) argued that such a strategy allowed firms to decrease uncertainty both over interest costs over the assets life as well as over the net income those were derived from the assets. (Emery (2001) the higher the term premium, the stronger should be the firms incentive for maturity matching. CHAPTER: 03 RESEARCH METHODS This study mainly focused on the impact of asset maturity, firm size, and market to book ratio on debt maturity structure of Pakistani non-financial firms. According to the Capital Market of Pakistan, this study employed on publicly listed firms on KSE-100 index. Firms were evaluated based on several factors. All the listed non financial firms were taken and following steps were adopted to conduct this study: 3.1 Method of Data Collection Secondary data comprised on non-financial firms listed on KSE-100 Index, collected from the different sources i.e. Karachi Stock Market, Balance sheet analysis report published by State Bank of Pakistan for year 2003-2008. The data comprised on following variables: debt maturity as dependent variable, asset maturity, firm size, and market to book value ratio as independent variables. Debt maturity was measured by dividing debt maturing more than one year to total debt; asset maturity was obtained by dividing fixed assets to depreciation; firm size was takes as natural l og of total assets; market to book value ratio measured as market value of firms assets divided by book value of firms assets. This research had supported the predictions that firms debt maturity had positive impact on maturity of its assets, however little support for firm size and the impact of growth options had inverse impact on debt maturity to test these predictions the study made the model which contained following variable like debt maturity ratio, asset maturity ratio, market to book value ratio, and firm size. 3.2 Research Model Developed Multiple linear regression models were used in this study such as all variables were scale variables. One dependent and three independent variables were used. This study mainly focused on impact of independent variables on dependant variable. To satisfy the regression normality assumption study used transformation on dependant variable and two independent variables, which ultimately gave the simple linear models as described below Sqrt of DEBTMAT = ÃÆ'Ã… ½Ãƒâ€šÃ‚ ± + Ln of ASSETMAT (ÃÆ'Ã… ½Ãƒâ€šÃ‚ ²1) + ÃÆ'Ã… ½Ãƒâ€šÃ‚ ¼ Sqrt of DEBTMAT = ÃÆ'Ã… ½Ãƒâ€šÃ‚ ± + + SIZE (ÃÆ'Ã… ½Ãƒâ€šÃ‚ ²1) + ÃÆ'Ã… ½Ãƒâ€šÃ‚ ¼ Sqrt of DEBTMAT = ÃÆ'Ã… ½Ãƒâ€šÃ‚ ± Ln of MV/BV (ÃÆ'Ã… ½Ãƒâ€šÃ‚ ²1) + ÃÆ'Ã… ½Ãƒâ€šÃ‚ ¼ Where: Sqrt of DEBTMAT was transformation of firms debt maturity (Debt maturing more than one year / Total debt) Ln of ASSETMAT was firms asset maturity transformed (Fixed Assets / Depreciation) SIZE was firm size (Log (natural) of total assets) Ln of MV/BV was firms market-to-book ratio transformed (Market value of firms assets / Book value of firms assets)  µ was error term ÃÆ'Ã… ½Ãƒâ€šÃ‚ ± was the Constant 3.3 Sample Size Non-financial firms varied from each other on the basis of their capital formation. This research eliminated all those non-financial firms which had some inconsistencies in their financial data. Sample of 58 firms were used from non-financial firms listed on the Kse-100index 3.4 Sampling Technique Procedure Non-financial companies listed on the KSE-100 index selected for the purpose of conducting this research study. 3.5 Statistical Technique After collecting the data from the selected population, it was analyzed by using SPSS software to study the impact of dependent variable (sqrt_Debt Maturity) on independent variables (ln_asset maturity, firm size, and ln_market to book ratio). The statistical technique Multiple Linear Regression was used to classify the variables that impact the debt maturity. CHAPTER: 04 RESULTS 4.1 Findings and Interpretation of the results: 4.1.1 Correlations Matrix sqrt_dema ln_assmt Size ln_mkttobv sqrt_dema Pearson Correlation Sig. (2-tailed) N 1 39 0.530 0.001 39 0.155 0.346 39 -0.232 0.162 38 ln_assmt Pearson Correlation Sig. (2-tailed) N 0.530 0.001 39 1 58 -0.123 0.359 58 -0.267 0.049 55 Size Pearson Correlation Sig. (2-tailed) N 0.155 0.346 39 -0.123 0.359 58 1 58 0.047 0.734 55 ln_mkttobv Pearson Correlation Sig. (2-tailed) N -0.232 0.162 38 -0.267 0.049 55 0.047 0.734 55 1 55Table 4.1.1 measured linear association between dependent variable and independent variables. In this study the correlation coefficient for sqrt_dema (dependent variable) and ln_assmt (independent variable) was 0.530; this indicated that these were positively correlated but not strongly correlated. The significance level was 0.001 which was very low significance; low significance indicated that sqrt_dema and ln_assmt were significant and linearly correlated. The correlation coefficient of sqrt_dema with firm size was 0.155; which showed that sqrt_dema and firm size were positively correlated but not strongly correlated. The significance level had relatively large 0.346 so the correlation was not significant and the debt maturity and firm size were not linearly related, and the correlation coefficient of sqrt_dema with ln_mkttobv was -0.232; which showed that debt maturity and market to book ratio were inversely correlated but not strongly correlated. The significance level had relatively large 0.162 so the correlation was not significant and the debt maturity and market to book ratio were not linearly related. TABLE 4.1.2: MODEL SUMMARY FOR DEBT MATURITY Model R R Square Adjusted R Square 1 0.624 0.389 0.336 Table 4.1.2 displays R; R squared, and adjusted R squared. R, the multiple correlation coefficients, was the correlation between the observed and predicted values of the dependent variable. Larger value of R indicated stronger relationships. R squared showed the percentage of deviation in the dependent variable explained by the regression model. Small values specified that the model did not in shape with the data well. To satisfy the regression normality assumption study used transformation on dependant variable and two independent variables to make the data normally distributed. It shows that 38.9 % variation in dependent variable (square root of debt maturity) was due to independent variables (log of asset maturity, firm size, and log of market to book value ratio). Table 4.1.3 summarized the results of an analysis of variance. In this model the value of the F statistic was less than 0.05, thus the independent variables did a fine work to clarif y the deviation in the dependent variable. TABLE 4.1.3: ANOVA FOR DEBT MATURITY Model Sum of Squares df Mean Square F Sig. 1 Regression .592 3 .197 7.228 .001* Residual .928 34 .027 Total 1.520 37 Table 4.1.4 developed the model in which square root of debt maturity was the dependant variable and the independent variables were log of asset maturity, firm size, and log of market to book ratio,  µ was the error term. TABLE 4.1.4: COEFFICIENT FOR DEBT MATURITY Model 1 Unstandardized Coefficients Collinearity Statistics B t Sig VIF (Constant) -0.733 -2.434 0.020 ln_assmt 0.266 4.063 0.000 1.055 Firm size 0.041 2.097 0.043 1.048 ln_mkttobv -0.055 -1.311 0.198 1.045 Sqrt_dema = -0.733 + 0.266*ln_assmt +  µ Sqrt_dema = -0.733 + 0.041* Size +  µ Sqrt_dema = -0.733 0.055*ln_mkttobv +  µ Debt maturity was significant and positively related to asset maturity in this model and if it changed by 1 unit then asset maturity increased by 0.266 this result supported by (Hart and Moore 1994), (Shah and khan 2005), and (Myers 1977). Firm size was significant but showed mixed positive support for debt maturity in this model and it increased by 0.041; this was supported by (Myers 1977), (Hoven and Mauer 1996), (Barnea, Haugen, and Senbet 1980); and growth options (market to book value ratio) was insignificant in this model and inversely related to debt maturity, and it decreased by 0.055; this result was consistent w ith results of (Diamond 1991), (Titman 1992), (Myers 1977), and (Barclay and Smith 1995 ). 4.2 Hypotheses assessment summary The hypotheses of the study were distinctive financial characteristics and which had a significant impact on debt maturity structure. These financial characteristics were asset maturity, firm size, and market to book value ratio. In this study each the financial characteristic tested and concluded the results. TABLE 4.2.1 : Hypotheses Assessment Summary S.NO. Hypotheses R Square Coefficients Sig. 0.05 RESULT H1 There was a positive impact of asset maturity on Debt maturity. 0.389 0.266 0.000 Accepted H2 There was a positive impact of Firm Size on Debt maturity. 0.389 0.041 0.043 Accepted H3 There was an inverse impact of Market to Book Ratio on Debt maturity. 0.389 -0.055 0.198 Accepted This study contained research hypotheses which were, debt maturity had a positive impact on asset maturity supported by (Hart and Moore 1994), (Shah and khan 2005), and (Myers 1977), debt maturity had a positive impact on firm size supported by (Myers 1977), (Hoven and Mauer 1996), (Barnea, Haugen, and Senbet 1980); debt maturity had a inverse impact on growth options (market to book value ratio) supported by (Diamond 1991), (Titman 1992), (Myers 1977), and (Barclay and Smith 1995). CHAPTER 05 DISCUSSIONS, IMPLICATIONS, FUTURE RESEARCH AND CONCLUSIONS In this study, multiple linear regression analysis exercised to examine data collected from listed Pakistani non-financial firms for period 2003-08. Regression analysis used to measure the long term debt employed by non-financial firms. Debt maturity had taken as a dependent variable in this study where as asset maturity, firm size, and market to book value ratio were independent variables to measure their effect on debt maturity structure. 5.1 Conclusion This study concluded that the most important variables were debt maturity, and asset maturity. According to this study, these variables were most important in the prediction/ anticipation of maturity structure of firms asset and liabilities. According to this study, asset maturity played important part for the model to predict the debt maturity structure. Asset maturity was positively impacted by debt maturity. This study confirmed matching principle by showing that slower asset depreciation resulted in longer debt maturity. These results were also supported by Hart and Moore (1994). Firm size was also one of the important variables for this study, this study found out only little evidence for the agency cost aspect that debt maturity used to restrict the conflicts of interest between share holders and debt holders, these results were matching with the study conducted by Hoven and Mauer (1996). These results were varied in various countries, because there had been dissimilarity in environments and circumstances. Though firms made decision accordingly, it also showed that smaller firms employed shorter term debt then longer term debt, which was consistent with the results of Shah and khan (2005). There was an acceptance that growth (market-to-book ratio of assets) should be inversely correlated to debt maturity in the agency/contracting costs perspective in this research, which was supported by Titman (1992). 5.2 Discussion All variables were considered to be in line with the literature, however, based on regression coefficients shown by many variables along with dependency problem, the final model comprised of independent variables; asset maturity, and firm size had significant value of less than 0.05 which suggests that these variables had significant impact on the debt maturity of non-financial firms listed on KSE-100 index. On the other hand, results also revealed that market to book value ratio had significant value greater than 0.05 therefore it might not necessarily lead to an impact on non-financial firms listed on KSE-100 index. 5.3 Implications and Recommendations This research was limited to the non-financial companies listed on KSE-100 index. The data had taken from 58 non-financial firms for the year 2003-08. It was suggested that such type of study should be carried out in other countries of Asia as well, as to comprehensive idea about the debt maturity structure. Moreover, it also suggested that other factors except ones examined in this study should be researched as to perfect idea about the debt maturity structure. Besides that, this study could also be replicated in other developing countries. CHAPTER 06 REFRENCES