Monday, September 30, 2019

Process and Outcome Evaluations

A Process Evaluation has three main components, which are program planning and development, program interventions, and database management system. These three main components are used to achieve these aims, describe program interventions’ development, implementation, and activities, provide quantitative and qualitative data on the services delivered and their effectiveness, and document the appropriateness and acceptability of the program within the target community. The Process Evaluation will answer the question â€Å"did you do what you said you were going to do?† (Yuen, ., & Terao, 2003). Examples of Process Evaluations are:1.The teacher takes attendance each day to find out which students are missing too much class. 2.Over the Christmas holiday the truck group Straight Six Mafia collected 13 boxes of food for the local food bank and $300 in donations for Labor of Love, by holding a truck show. 3.WIC employees pass out brochures containing information where its clie nts may receive other services. Outcome Evaluations are used to look at how effective the interventions are. Data before the intervention and after are collected and compared to yield this information. It assess the outcomes/effectiveness of the programs activities and the impacts the program has on the target population. This evaluation answers the questions â€Å"What benefits did the recipients of service obtain?† and â€Å"How well did you do?† (Yuen, ., & Terao, 2003). Examples of Outcome Evaluations are:1.Workforce Services asks that their clients complete a short interview/survey to see how their experience was and if their needs are being met. 2.Columbus Community Center compared the amount of services it provided last year to this year after they received the new grant to improve the employment program. 3.Career Step contacts alumni students to see if their programs help them receive permanent employment. Process and Outcome Evaluations A Process Evaluation has three main components, which are program planning and development, program interventions, and database management system. These three main components are used to achieve these aims, describe program interventions’ development, implementation, and activities, provide quantitative and qualitative data on the services delivered and their effectiveness, and document the appropriateness and acceptability of the program within the target community. The Process Evaluation will answer the question â€Å"did you do what you said you were going to do?† (Yuen, ., & Terao, 2003). Examples of Process Evaluations are:1.The teacher takes attendance each day to find out which students are missing too much class.2.Over the Christmas holiday the truck group Straight Six Mafia collected 13 boxes of food for the local food bank and $300 in donations for Labor of Love, by holding a truck show.3.WIC employees pass out brochures containing information where its client s may receive other services. Outcome Evaluations are used to look at how effective the interventions are. Data before the intervention and after are collected and compared to yield this information. It assess the outcomes/effectiveness of the programs activities and the impacts the program has on the target population. This evaluation answers the questions â€Å"What benefits did the recipients of service obtain?† and â€Å"How well did you do?† (Yuen, ., & Terao, 2003). Examples of Outcome Evaluations are:1.Workforce Services asks that their clients complete a short interview/survey to see how their experience was and if their needs are being met.2.Columbus Community Center compared the amount of services it provided last year to this year after they received the new grant to improve the employment program.3.Career Step contacts alumni students to see if their programs help them receive permanent employment.

Microbiology 311 Lab Report

Rebekah Worley February 21, 2012 Mitchell Section 4 Biol 311 Staining and Identifying Unknown Bacteria Introduction: The microbiology lab up to this point has been used to teach the students how to stain and identify bacteria. There are several types of staining through which the bacteria can be identified based on the color and shape. The staining methods used in the lab are Gram Staining, Capsule Staining, Endospore Staining, and Acid Fast staining. One of the most significant method of staining is the Gram Staining, as it is highly dependent (McCarthy, 25).In the specific experiment that was done, Gram Staining was used and the bacteria that was found was purple and round (cocci) shaped. Through this the bacteria was identified as Staphylococcus epidermis. Material and Methods: The first step to identifying the bacteria was to heat fix it to the slide. The materials used were a slide, water, a Bunsen Burner, bibulous paper and clothes pin. The unknown bacteria was in a vial in sol id form. The steps on page 19 and 20 of the Customized Biol 311 General Microbiology Laboratory Manual were followed to heat fix the bacteria.After this gram staining was used to identify the unknown bacteria. The materials used for gram staining include the slide the was heat fixed, bibulous paper, crystal violet, distilled water, Gram's iodine, 95% ethyl alcohol, safranin, oil and a microscope. The steps on page 26 of the Customized Biol 311 General Microbiology Laboratory Manual were used to stain the bacteria. Several changes were made in the procedure. The crystal violet was on the slide for 1 minute rather than 20 seconds. The decolorizing step was used with alcohol for 10 seconds rather than 20 seconds.The only other change was that the safranin was on the slide for 1 minute instead of the recommended 20 seconds. The slide was put under the microscope at 1000x magnification using oil immersion. Results: When looking under the microscope the bacteria was found to be purple and cocci shaped. Because of the specific color and shape of the bacteria it was easily identifiable as Staphylococcus epidermis. From this it is seen that only a Gram stain was necessary to identify the bacteria. Discussion: From this experiment it is seen that bacteria is easily identified when stained correctly.Going through the procedure with accuracy is vital, and when done right the bacteria is clear and concise. When the bacteria was stained in this experiment the color was difficult to determine at first. After exploring the bacteria on the slide it was seen to be mainly purple. If the staining had not been done properly it would have been a lot more difficult to distinguish between bacteria. This was an important thing to learn because staining is so vital in identifying unknown bacterium. Works Cited McCarthy, Charlotte M and Harold Benson. Customized Biol 311 General Microbiology Laboratory Manual. 2nd. ed. New York. McGraw-Hill 2002 Print.

Saturday, September 28, 2019

Induction in health and social care Essay

Explain why induction is important for practitioners, individual and settings. Induction process is very valuable and of great importance for any early year practitioner, individual or organization. In my opinion this is an ongoing process starting from the advertisement. a) For practitioners: The process of Induction is important for the Early birds in the nest so as to help them integrate into their roles in the organization quickly and effectively. They should be familiarized with the campus first. Like cafeteria, restrooms, classrooms, emergency exits etc. After that introduction with her new colleagues, rules and regulations, benefits and facilities that she will enjoy working here will follow next. Necessary trainings in safety and all her questions/ needs should be addressed. Induction is also very important for the new employees to let them know the organizational structure of the work place. The mission vision of the workplace is introduced and they are informed as to what quality drive is expected from them. They are given an opportunity to know where they stand in the crowd. The timetable of the CPDs and school extracurricular activities are handed out to them. They are given documents related to class they are going to start teaching. b) For individuals: Induction should not be limited to the new comer only rather it should be executed for the old employees as well. I would like to organize induction process at least twice a year. One before the new session starts in September, because they might need a lot of motivation and enthusiasm after spending 6-8 weeks holidays away from school. This can also be extended to 4-5 days. In this process we can review policies and procedure to refresh their minds and remind them of the goals they have to achieve throughout the year, in case of some policies being altered it’s a good time to share with them and get their opinion. Some new incentives can also be shared to boost up their energy and loyalty with the organization. This is a good time to introduce a new staff if there is any or if any staff member is promoted then he/she can be given induction about the new responsibilities attached  with the new position. c) For organizations: If the employees are properly inducted then they will work more efficiently and happily for the workplace. The progress of each child will be consistent and improved, as a result parents are happy and a reputation is built and demand of that work place will increase more in market. 1.3 Explain the link between induction process, qualifications and progression routes in the sector. Every workplace wants to ensure that they recruit new teachers that are most suitably skilled and qualified for their jobi This they do by a rigorous recruitment process. Then through a structured induction process the workplace prepares them for a new role and motivates them so that they give their best. This also helps the newbie to develop upon the knowledge and skills they already have. An effective induction helps the new staff to meet the core standards of the work place and provide a foundation for CPDs towards becoming a more effective teacher. The leader is responsible for selecting mentors for the induction process from the staff depending upon the requirements of the induction process. The mentors should have the skills, expertise and knowledge to coordinate the induction effectively. The  observations and notes taken from the induction process states where the new staff is standing and now what skills and abilities should be focused for further development. Thus the progression should continue to give the new staff a chance to enhance their qualifications and skill where they lack. 1.4 Analyze the role of the induction process in supporting others to understand the values, principles and agreed ways of working within a work setting The induction is a planned process which involves various members. The process of induction depends upon how clear and effective your induction policy is. The policy clearly states the role of each member involved in the induction process; and there is a checklist present for each phase. In this way let a newbie join at the beginning of the session or in the mid of the session every newbie is going to enjoy the induction process so that she understands all her duties and responsibilities adhered to the job. This newbie will learn all the tricks of the trade going on in the organization pretty well including the mission vision and what quality work is expected from her to derive learning and motivation from the students. It is not a one day process it depends the new recruit. If he/she is already an experience teacher then induction for a few weeks are enough but if it’s newly qualified teacher then induction can go as long as 1 term or may be more than that. However if the new teacher is not being monitored as it should be by the mentor or instead of mentoring the mentor has started dictating than induction process loses its effectiveness. It merely becomes a chit chat session If the induction is done effectively with the old staff members as well. One of the advantages of the process is that you get to know where your staff stands. The members of your staff are hard working but lacking in some skills or the other, there you can hold different workshops and training sessions by calling the expertise. Also during the session the mission vision, policies new or updated can be explained/refreshed so your team  members avoid mistakes and know what you expect from them during their tenure. In this way you can ensure quality education for your students by providing competent staff members. However this can turn the table over if the policy does not fully cover all areas of induction and that there is no checklist to keep track of the induction progress. 1.5 Analyze the role of induction in safeguarding individuals and others with a work setting One of the aims of the induction process is safeguarding individuals from any harm coming to them. If I were to head the process of induction in my setting then first and foremost I would make sure that I have all the policies updated and required for safeguarding, e.g. fire safety, health and safety, child protection policies etc. I would make sure that each member of my staff undergoes basic child protection and first aid training, to raise awareness that equips them to recognize and respond to child welfare concerns. This training would start soon after a staff is appointed. They would also be induced on how to deal with emergency situations such as fire. I would hold a fake fire alarm schedule so that the staff and the children know how to react in emergency situations. However, this might not be effective if a large number of staff is present as time can become an issue. But yes if the process is scheduled in batches then this can be overcome. Once it happened in a classroom a child who was usually active was feeling low and wanted to lie down from time to time. Had not my colleague taken child safety training she would have let him sleep but she quickly responded and dashed to the clinic by the time the child had collapsed in her arms. The Dr. called the parents and the child was taken in an emergency to a nearby hospital. The Doctors praised the teacher for timely help otherwise the child’s condition could have worsened. The parents later on admitted that the child had fever and that they gave him medicine which had a  sedative effect. In the end I would like to conclude that to make induction effective w.r.t. time, money and resources there should be an effective carefully planned induction policy and checklist. This policy should be revised from time to time and should also involve feedback from the staff in order to update and make the policy more effective. The team chosen should be carefully chosen according to their abilities. However If there is no check list or policies and procedures up to date or not in place or the mentor is not qualified and knowledgeable enough then the induction process will lose its spirit and it can go totally wrong leaving behind a mere chit chat session.

Friday, September 27, 2019

Teams Essay Example | Topics and Well Written Essays - 1000 words

Teams - Essay Example A set of strategies perceived to be suited to rectifying the Team's collaboration and sense of belongingness will be presented. Finally, a conclusion shall synthesise the main points of this paper, and reiterate the support for a team-centred culture, represented by the procedural manual, as a solution to the current Team environment. 1) Value: Having the ability to work independently - this is a value inherent in the role of an 'independent worker'. The employee is able to organize themselves, set goals, manage time, maintain their progress and evaluate their outcomes. Being able to rely on their skills and knowledge to achieve a task, the independent worker is self-reliant and often takes the initiative. Furthermore, when entering into a group assignment, the independent worker brings a wealth of knowledge, skills and competencies that contribute to the development of the group. Such diversity cultivates empathy, tolerance for differences, and appreciation for another's point of view. 2) Value: Distributed Responsibility and Leadership - each member of the Team acknowledges their accountability for their decisions and actions, and accepts that a combination of leadership styles must be available to guide and monitor group development. This value includes the consensus that a Team member needs to act in a professional manner, and that this requires a commitment to the group assignment. 3) Value: Communication - to consider others in our interactions, by being open and sincere in or contributions and conferencing. Each member of the group is expected to support the group and interact with other members to plan, problem solve and discuss Team issues. Each person will be listened to and provided with the opportunity to speak freely of their issue or suggestion. Members are encouraged to express their reservations with the current procedures and processes, as this will enhance the accuracy and relevance of the manual, as well as encourage group members to form bonds of trust, support, consideration and overall coherence. 4) Behavior - Democratic Vote - A decision will be made by the majority. As such, all members will have the opportunity to voice their points of view, while at the same time being required to justify their position. Issues which require a vote must have all Team members present. However, if the decision made is later evaluated and found to be lacking in effectiveness it will be revised and modified. 5) Behavior: Motivation - The Team aims to encourage and support each member, as when asking them about their job and issues at work. As a group, solutions will be brainstormed so that it is not the independent worker with the sole responsibility for progressing toward set goals. The Operations Manager will also review Team Development and comment on goals and progress. At meetings, praise is given for achievements, both as a group, and as individuals contributing to the group.Now to turn to the identified strengths and weaknesses of the Team's culture. Firstly, it is a strength that the Team decided upon a set of core

Thursday, September 26, 2019

Macbeth Essay Example | Topics and Well Written Essays - 500 words

Macbeth - Essay Example Lady Macbeth is portrayed as a moral support for Macbeth in winning the throne. The novel, hence, involves the two extremely different sides of our society where one gender is the symbol of strong and stubborn desires and the other gender plays a tenderly and loving role. Lady Macbeth is sometimes seen as a positive force and influence on Macbeth but critics claim that she had negative desires, cruelty and brutality dwelling in. The varying and confusing character of lady Macbeth with specific reference to her husband’s influence on her actions form a debate which is discussed in this paper using the perspectives of different critics. The paper will discuss the traits of Shakespearean women in different novels and flow the discussion towards the character of Lady Macbeth. The negative traits of her character and the brutality found in her will be discussed with special reference to the expectations of that society of women. The counterclaims about Lady Macbeth in terms of the influence of Macbeth on her character will be discussed. This discussion will be supported by evidence from the research of critics and their arguments.

Article Example | Topics and Well Written Essays - 250 words - 21

Article Example The final step is direct action where people present themselves to present their cases. Law and order exist for the purpose of establishing justice is a valid statement because, for the realization of fair treatment of all people, the governing rules must apply to everyone. If there is no law and order, then people will do all types of crime and get away with such actions. The society would be a place where the powerful and strong have their way over the weak and poor if there is no law and order. Therefore, the law serves to place all citizens at equal and give everyone access to institutions that can protect people’s rights. Law and order in my community helps in giving protection to poor people from the rich taking their property or forcing the poor to work without proper compensation. The law, therefore, enhances justice. Unjust laws may also include situations where rich people use their influence to get laws passed allowing them to pay less tax in comparison to the poor. In addition to this, unjust law also includes a scenario where the majority passes laws, or objects the passing of laws that may affect the majority in a negative way while helping the marginalized groups. The best written paragraph is paragraph 17 because King provides a different approach to the understanding of a just law and unjust law. The difference is that he deviates from the traditional response that the law ought to respect human rights. In that paragraph, he voices the need for the majority to bind themselves by the laws they pass, and allow the minorities to participate in making laws. Tension is beneficial when applied correctly because it keeps authorities on their toes for fear of repercussions in case they make the wrong decision. The tension that King referred to was the tension of the fear of an outbreak of violence. King was termed as being an

Wednesday, September 25, 2019

UNIT 4 INDIVIDUAL PROJECT Essay Example | Topics and Well Written Essays - 500 words

UNIT 4 INDIVIDUAL PROJECT - Essay Example Anti-Abortionists on the other hand agree in unison that it is pretty much in defiance as laid down in the holy books of God to commit such a heinous act like abortion. The rationale that can be provided here is that if at any point in time it was in defiance with the laws as proposed and put forward by God, then it is between the woman under question and her God and she is the one who will be the recipient of chastisement with regards to the abortion decision that she has taken. A number of people are of the view that abortion can threaten a mother’s life and hence should be deemed as illegal right from the onset. Again there are some opinions which suggest that if the mother does not want to have the baby then it would be best to at least give birth to the newborn and give it to some orphan house so that those women who do not have children in their lives can raise their families in accordance. This seems pretty valid since giving a newborn for the sake of adoption is a good route none the less if a family is against the birth and the eventual raise of the baby. This is due to the fact that at times it has been seen that these children suffer immensely as they sit for ages in the orphanages making them look like unwanted guests in this world. Different people raise different opinions but this is true that each one of us has a responsibility towards the society and thus we should be responsible enough of take it. Indeed abortion is a very sensitive topic that has been shown flames during its discussion in different meetings and seminars. Controversy is one thing that is sure to make rounds of these board room meetings and hospital seminars. Then again, choosing whether one should have an abortion or not is pretty much dependent on the family and more so the mother, if not the father as well. This is said so as to make sure that the society does not have to pay for the unwanted and

Tuesday, September 24, 2019

Creative Homiletics Term Paper Example | Topics and Well Written Essays - 2000 words

Creative Homiletics - Term Paper Example It is a calling that is considered to be the most important one since it outdoes all the other earthly responsibilities. It is a sacred undertaking as it involves proclaiming the word of God to other people. There are certain goals that preachers usually have concerning the members of their congregation. One of them is to see individuals being transformed into the image of God. This is mainly because the teachings from the bible have rules and regulations that were written down by those who were inspired by God. In short it means that it is God himself who wrote the Bible. This therefore, gives a clear impression that those who follow the rules in the Bible are like God. The other goal is to make sure that the listeners may end up obtaining wisdom that during the end times they may be presented perfect in the eyes of God. The teachings in the bible aim at molding individuals to make them live holy lives so that they can avoid hell in the second coming of Jesus. The preachers in this case, are used as vessels of the Lord to make sure that they proclaim the news to people so that individuals may prepare themselves for the second coming of Jesus, to go to heaven with Him. To lead people and to save them from hell is another goal that preachers have for their members. Teachings in the bible discourage practicing things that are not pleasing to the eyes of the Lord. This means that God intends his people to live holy lives and He uses preachers as messengers so that they can pass on this message to the entire world. The listeners are expected to follow the teachings they are offered for them to avoid hell and live eternally with Jesus after his second coming. In the current society, there are individuals who still do not understand the meaning of bible teachings. In such cases, preachers are expected to make them do away with the wrong mentality of bible teachings. To make this possible, preachers have to do away with the wrong motives for preaching so that they can be effective. Some of the wrong motives for preaching include: 1. Not for a profession. 2. Not because of possession of good speaking skills. 3. Not to make cash. 4. Not to be given the praise of man. 5. Not to have it because it is an honorable position. 6. Not to be like somebody else. 7. Not to cut somebody up. There are various ways of undertaking the homiletic process in that there are various ways in which a preacher has to preach. This means that it is not an option but preachers have to follow these procedures. Preachers do not convey their religious messages with their own wisdom but with the power of God. Preachers are guided by the Holy Spirit to convey messages direct from God and not what they think the message should be. Here they usually speak in the common language of man and not with enticing words. They do not use enticing words because they do not aim at making the listeners believe what they come up with but what they are directed to preach. Homilists usually de liver sermons a guided by the Holy Spirit. This means they convey information as delivered to them by the Spirit of the Lord and that is why they are referred to as the vessels of God. During their times of preaching, this homiletics practice can result to success and at times it may result to death. The reason behind this is that there are times where the congregation conquers with the message being delivered and there are times wh

Monday, September 23, 2019

Bob took a pistol with him on a visit to the hospital to see his Essay

Bob took a pistol with him on a visit to the hospital to see his terminally ill father. At his father's request, Bob killed hi - Essay Example Bob action can be considered to be well thought before committing the crime because he carried a pistol with him to the hospital to see his father. A loaded pistol by any definition is a lethal weapon and the action of carrying it to the hospital, a place that does not present any reasonable threat to his life or that of his father is an indication of his intention to kill. In this case, his action amounts to murder and he is guilty of first-degree murder if it is not proved that, his terminally ill father requested Bob to shoot and kill him. However, if his father requested Bob to shoot him in the head and kill him, Bob’s action amounts to the crime of assisting self-murder and hence he would answer to the charges of manslaughter. According to Jordan, Van Dyke and Malone (2008,) helping someone to commit suicide is a criminal offense in the United States. In this case, if it is established that Bob assisted his father to commit suicide by obeying his request to shoot him, he is guilty of second-degree murder. The laws governing assisted self-suicide vary in different states across the US, and Oregon is the only jurisdiction in the world that allows doctors to assist terminally ill patients to commit self-suicide (Siegel, 2008). References Jordan, P., Van Dyke, M. & Malone, L.(2009).

Sunday, September 22, 2019

Body Image Essay Example for Free

Body Image Essay Ones body is what makes one who one is. Every inch of someone is what sets a person apart from everyone else. Even though everyone has an opinion about what his or her perfect body would be, changing ones personal features would take away from individuality. I personally would never have plastic surgery because when I look at myself, I do not see a young woman with a funny looking nose and big bug eyes, but I see a beautifully sculpted masterpiece that God has made just for me. It is a body that gives me character, individuality, and confidence. In my personal opinion, and I say this as humbly as I can, I am a beautiful young lady. I have a very animated face that goes well with my personality, which is humorous, but in a mature fashion. I can be serious and stare at others with my endless snowflake hazel eyes, but if I get too drastic for the mood, it is easy to look at my nose and then laugh to lighten the air. I take pride in the fact that there is no one else on this earth exactly like me. Not just my inner beauty, but my outer beauty makes me different from everyone else. Life would be so boring if everyone looked exactly the same, but what is inside oneself makes one beautiful, not only inside, but outside as well. I personally could not be more content and happy with who I am. If I were to walk down the street, there would be many different comments going through peoples heads as I passed. Some people would find me attractive, and some would find me ugly. Some people might find me beautiful, and others might find me weird looking. The bottom line is that it does not matter what they think. It only matters what I think because I am the only one in the whole world that has to live with myself. I am proud to be me, and no surgery could make me any more confident, or any happier to be me. In conclusion, unless I had a huge rock fall on my face, which made it difficult to eat or breathe properly. I would never have plastic surgery done to any part of my already existing body. I would never second-guess my own character, individuality, or confidence. I am perfect just as God made me.

Saturday, September 21, 2019

Change Management Strategies at IKEA

Change Management Strategies at IKEA IKEA is the worlds most successful mass-market retailer, selling Scandinavian-style home furnishings and other house goods in 230 stores in 33 countries and hosting 410 million shoppers per year. An acronym for founder Ingvar Kamprad and his boyhood home of Elmtaryd, Agunnaryd, IKEA began operating in Sweden in 1943 and continues its original ethos based upon cost obsession fused with design culture. No design, no matter how inspired, finds its way into the catalogue if it cannot be made affordable.As a means of expanding the business, the company considered change in its business in the form of selling 2nd hand furniture by reconditioning damaged or old furniture stocked in its warehouse and offering furniture reconditioning services to customers. In developing this kind of business, it expects to make this constitute fifty percent of its business. 2. Term of reference In this part of the section, we will list several aspect of theoretical approaches that we could apply in the company to plan and implement the change. 3. Planning and implementing the change 3.1. The need factor during the change Waste reduction and improvement in recycling wastes are the issues that are driving the need for change. IKEA incurs waste because of damaged furniture during transportation, handling or wear-and-tear when stocked for longer periods in the warehouse. Although the compa . Problem/Issues that Prompted the Need for Change Waste reduction and improvement in recycling practices are the issues that prompted the need for change. Eastern Furniture Company incurs waste because of damaged furniture during transportation, handling or wear-and-tear when stocked for long periods in the warehouse. Although the company takes its cue from the inflow and outflow of furniture from its warehouse for delivery to customers in determining which furniture to make in greater volume and which furniture to stop making or make in lesser volume, the company has to manage a bulk of damaged furniture that it cannot sell. These take up valuable warehouse space and comprise loss for the company. Overall, the issue is one of efficiency, which has two elements. One is the ability to maintain a good ratio between the input allocated or employed and the output generated. Ideally, there should be balance in the ratio to ensure break-even but to ensure positive returns the ratio should be greater in favor of output. (Thompson, Strickland Gamble, 2007, p. 93) Waste represents input not transformed into output. The company wanted to place greater weight on output by optimizing resources use. Another is the enhancement of the skills in avoiding or preventing wastage of resources and time. The company has to minimize waste of both resources and time to improve performance. 3. Identifying and Assessing the Causes of Change Understanding the change and clarifying the justifications for the change is an important management process. There are various diagnostic tools useful in assessing change. These clarify the change and points to compelling reasons that supports the decision to implement the change. One tool is the force field analysis, which refers to the process of listing down the pros and cons of the planned change and evaluating the merit or soundness of the decision as well as the viability of the change (Hurt, 1998, p. 55). The table below shows the forces supporting and discouraging the implementation of the planned change. Forces for Change -boost resource management efficiency -increase sales -control cost -enhance profitability address customer demand -add value for products and services to customers increase market share -ensure sustainable growth Planned Change (establish a 2nd hand furniture trading) Forces against Change -increase operating cost -pull or stretching of available resources -resistance from managers and employees -risks of incurring further losses A number of forces support change. These forces encompass different areas from the improvement of resource management practices by optimizing output from the input used, financial performance in terms of sales and profitability by controlling cost, and marketing outcomes by meeting new demand and adding value to customers. The occurrence of these forces of change could mean sustainable growth for the company. However, there are also important forces discouraging the change. These include increasing operating cost because of the expansion of the business, the pull of resources from the existing business to the new business that means the stretching of available resources. There could also be resistance from managers and employees because of the change in organizational structure. The risk of incurring further losses in case the company is unable to manage effectively the rigors of the change process is also an adverse factor. By balancing these forces, it appears that the forces supporting change weigh greater than the forces discouraging change. Achieving the benefits is viable given the stable financial situation of the company and the opportunities for expansion in the market. The company has sufficient resources to invest in the change and the expected returns are high because of the growing market for refurbished and environmentally friendly furniture products and services. The establishment of a 2nd hand furniture business also adds value to its product and service offering to customers by providing customers with the opportunity to help in conserving the environment by minimizing waste through recycling. However, the company needs to address the forces discouraging change by developing a sound resource management and investment plan, developing preventive and contingency plans for risks, and easing the resistance of managers and employees. By addressing these discouraging factors, the company can e nsure expected results from the change. Another tool is critical pathways, which refers to the use of directions and schedules in planning tasks and monitoring completion to ensure the achievement of the expected results. Using this tool determines the viability of the change and the areas requiring focus. (Thompson, Strickland Gamble, 2007, p. 93) The table below shows the tasks required in the implementation of the change, the commencement period, the period for completion, type of activity, and the relative depends on the tasks necessary for completion. Task Commencement Completion Type Task Interdependence 1. marketing study Month 1 1 month Sequential 2. consultation of managers and employees Month 1 2 month Parallel 3. brainstorming and preliminary planning Month 2 2 months Parallel 2 4. expansion strategy implementation (i.e. mergers and acquisitions, joint venture, takeover, etc.) Month 4 2 months Sequential 1-3 5. restructuring and hiring of new employees Month 4 3 months Parallel 4 6. preliminary marketing activities Month 7 6 months Sequential 1-5 7. preliminary evaluation Month 10 1 month Sequential 1-6 8. final evaluation Month 12 1 month Sequential 1-7 The entire change process happens in a twelve-month period. The identified tasks support the viability of the change. The tasks distinguish the preparatory activities, implementation proper activities, and post-implementation activities that the company needs to complete the change process. The tasks also coincide with the issues requiring consideration such as resistance during the restructuring process relative to the results of the consultation with managers and employees and the development of the appropriate marketing activities coinciding with the results of the marketing study. The determination of the sequencing of tasks and interdependence of the tasks also supports the viability of the change by determining priorities during a particular period to ensure due preparation and evaluation of implementation. Overall, the critical pathways analysis supports the commencement of the change and identifies the tasks for completion to achieve the change. 3. Stakeholder Analysis The change process is organization-wide, which means various parties likely affected by the change involving the development of a 2nd hand furniture service. Stakeholders pertain to the parties linked to the business firm who stand to experience benefits or adverse effects from the change (Friedmand, 2007, p. 172). Identifying the stakeholders and the respective interests is important to develop ways of wining over these various stakeholders who are likely to contribute to the success of the planned change. Determining stakeholders or the parties affected by the change together with the impact of the change to these parties is also important in prioritizing stakeholder interests as well as the resolution of issues faced by the stakeholders. (French Delahaye, 1996, p. 22) There are a number of stakeholders in the planned change falling under either internal or external stakeholders. First is top management of the organization who decide on the change, direct strategy implementation, and carry accountability for the outcomes of the change. Second are middle managers affected by the change and comprise implementers of the tasks constituting change. Third are employees also affected by the change and serve as movers in the change process. These three stakeholders also constitute internal stakeholders as they form part of the organization and directly experience and participate in the change process. Fourth are suppliers of furniture retailed by the company who could be affected by the expansion. Fifth are investors and investment parts providing capital needed in the change process. Sixth are customers for whom the change is directed and from whom the impact of change is assessed. These last three stakeholders comprise external stakeholders by not being part of the organization. These stakeholders influence the change indirectly but could influence the success of the change management activity. There are a number of tools in analyzing these stakeholders. The application of these tools identifies stakeholder interests and clarifies the prioritization of stakeholder interests, in case of conflict. This is necessary to ensure that the intended impact for stakeholders and the expected response from these stakeholders ensure the achievement of objectives for the planned change. One analytical tool is the power model, which classifies stakeholders according to their relative power or influence in swaying the change process. There are four classifications of stakeholders relative to power, which are promoters, defenders, latents or apathetics. These classifications vary according to the interest in achieving the change and the influence on the change process. The model also determines the stakeholders included in the decision-making over the change process depending on the relationship with the company and the influence on the operations of the company. (Cooper, 2004, p. 13) Stakeholder Classification Prioritization of Change Influence on the Change Internal Stakeholders External Stakeholders Promoters High High Top Management Investors or Investment Partners Defenders High Low Middle Manager Latents Low High Employees Customers Apathethics Low Low Suppliers In implementing this analytical tool, the identified stakeholders fall under different classifications. This determines differences in interest and the means of managing these interests. In achieving the planned change via policy support, there should be strong support from the top management and middle managers. It is important achieve strong support from top company officers as well as middle managers to ensure the development and implementation of policies towards the planner change. To ensure successful implementation, it is important to consider and integrate the interests of investors to gain capital that supports the change process, employees who would implement tasks comprising the change process, and customers whose acceptance determine the marketability of the new business. Another analytical tool is the resource dependence theory (Frooman, 1999, p. 191) that classified the relationship between the firm and stakeholders into four types, which are 1) firm power, 2) high interdependence, 3) low interdependence, and 4) stakeholder power. The nature of the relationship determines the issues requiring resolution to manage effectively stakeholders. The core idea of this analytical tool is the recognition of the limited self-sufficiency of business firms so that they have to rely on their environment to address difficulties. Firm-Stakeholder Relationship Stakeholders Firm Power Middle Managers, Employees, Stakeholder Power Customers, Top Management High Interdependence Investors and Investment Parties Low Interdependence Suppliers The implementation of this analytical tool shows the stakeholder priority of the organization in achieving the planned change in the context of resource accumulation. Since the company has strong dependence on investors and investment parties as source of capital and investors also rely on the company to experience returns. This means that the company should develop mutual positive relationship with investors and investment parties. Since the power of stakeholder is high in the case of customers and top management, which means that the company should consider the important roles of top management in directing change policy and customers in justifying the area of change. 4. Change Implementation Strategy Determining the appropriate and effective change implementation strategy is an important part of the management of the planned change. The change implementation strategy determines points to the viability of the change by identifying the nature and direction of the intended change together with the corresponding roles of the parties involved and the activities requiring completion. There are two considerations in developing the change implementation strategy. One is the direction of the change, which is either top-down or starting from the front line. Another is the source of the factors for change, which is either internal or external. A top-down change implementation refers to planned change because change emanates from the implementation of change policy from the top management. This means that change occurs through directives from the top expressed through change in the attitudes and behavior of employees as well as work processes and output. Top-down change implementation strategy is also similar to the hierarchical model of change, which places stress on the manner of utilizing the firm structure, compensation and incentive system, and other control systems to facilitate the achievement of the intended change. As such, senior management serves as architects of the change and manages the organization to achieve the desired change. The hierarchical model usually applies in changes involving the change in structure, staff, compensation systems, incentives, performance measures, and other similar change. Control serves as the means of ensuring the change. Rational connection between the planners and doers also ens ures change implementation, which means that the intended change should be rational in terms of firms and stakeholder benefits to be accepted by the doers, which is made up of the front line employees. However, this also has limitations such as the use of inaccurate information to support decisions over the change process and problems in motivating change at the lower levels of the organizational structure. In addition, this aligns with the economic perspective of organizational change. (DeWit Meyer, 2004, p. 297) Change commencing from the front line refers to the encouragement of creativity and innovation at the bottom level of the organization. The creation of an innovative working environment and implementation of incentives for innovative outputs encourage employees to determine solutions to problems they experience in the delivery of products and services and dealings with customers. The implementation of these solutions comprises the change. This has relation to the cultural model of change implementation, which emphasize on the participation of employees at the lower level in the formulation and implementation of strategy in terms of information feedback to their immediate managers or supervisors. As such, there is a fusion between the roles of thinkers and doers because managers participating in doing while employees also take the role of thinkers. Because of this, the change focuses on the infusion of organizational culture across the firm. Top management provides broad guidance in i nnovation. (Goold Quinn, 1990, p. 176) This works well for decentralized business firms. However, this also limitations including the assumption that the managers and employees are well-informed and able to make informed decisions on areas of change and sound solutions to front line problems. Focus is difficult to maintain in using this model. The change process would also likely involve costs and involves a certain period. Not all organizations can afford the high price for change from the grassroots or culture-based change or have the luxury of time to wait for protracted change. (Parsa, 1999, p. 73) There is also an alternative change implementation perspective, the collaborative model, which requires the participation of senior managers in the process of strategy formulation. This means that top management facilitates brainstorming, consensus building and other collaborative methods in planning the change so that top management also comprises the bridge for change implementation on the part of middle managers and employees. (Goold Quinn, 1990, p.176) As an integrative model, this addresses the problem of information inaccuracy likely to occur in the implementation of top-down change as well as the assumption of complete information at the grassroots in applying the cultural model (Parsa, 1999, p. 73). The distinction between thinkers and doers blurs but this does not completely disappear because of the assumption of the parties of dual roles. Based on the understanding of the planned change, which is expansion by establishing a 2nd hand furniture business and requiring prioritization of the interests of investors and customers, the appropriate change implementation strategy is the collaborative model. The change involves the acquisition of business units, restructuring of the organizational structure, and hiring of new employees. The acquisition of new business units is a strategic issue for resolution at the level of top management with feedback from senior managers to support sound decision-making. The hiring of new employees and restructuring of the organizational structures are management issues for resolution at the senior management level obtaining policy guidance and confirmation from top management while at the same time obtaining feedback from middle managers and employees on emerging problems and effective solutions. Senior managers serve as the fulcrum balancing or bridging change implementation and the change process. Successful change ensures the interests of investors and customers. Change implementation strategy could also be internal and external. Internal change implementation means that the parties involved in the change are members of the organization and the achievement of change depends on internal competencies. External change means that the parties facilitating change do not form part of the organization and infuse external competencies into the change process. However, these are not conflicting, which means change implementation could involve both internal and external factors, with the extent of combination depending on the requirements of change implementation. (Grant, 2002, pp. 132-133) The change implementation strategy for the planned establishment of a 2nd hand furniture business involves the combination of internal and external factors. The internal factors refer to top management directives or guidance, consensus building and feedback from senior managers, and feedback from middle managers and employees over issues and solutions emerging from the front line. The external factors include capital infusion from investors, feedback from external consultants, and acquisition of business units. 5. Addressing Resistance Key to the success of the change implementation strategy is the identification and understanding of the factors blocking the implementation of change. Kotter (1996, p. 3) described blocks as the entirety of the hindrances and issues experienced by business firms in the course of implementing change. This requires resolution to ensure the successful implementation of change. An impending block to change implementation is resistance or disagreement, disapproval or opposition to some aspects or all of the planned change. If unaddressed, resistance could lead to delays, accumulation of additional costs or even the failure of change implementation. Resistance finds explanation through the transition curve (Fisher, 2001, n.p.) [See Figure 1 below] that explains the response of parties to the change as a process. Upon learning of the planned change, the affected parties experience anxiety because of concerns over whether they can cope with the change. This could lead to happiness because of the realization that change, which could be anticipated, could happen or denial because of the inability to accept the change. However, this could immediately turn into fear because of concerns over the expectations of their role and the impact on them that could develop into depression when in the stage of uncertainty. This could then lead to two directions. One is towards gradual acceptance and moving forward as the affected parties develop confidence in the change and their roles in the implementation of change. Another is towards hostility and absolute resistance because of the inability to find their place and role in the expected change. Recognizing the adjustment to change as a process implies that business firms should address the fears and threats faced by the parties affected by the change to ensure that the attitudes and behaviors of stakeholders lead to acceptance and moving on. Based on the transition curve, resistance to the planned establishment of a 2nd hand furniture business would likely come managers and employees. The change involved the acquisition of new business units to comprise 50 percent of the business. The different nature of the business means change in existing practices and norms. The change also involves the restructuring of the organization, which means the removal of some positions and creation of new one and the removal or reassignment of people. These situations build fear among managers and employees. The change also involves the hiring of new personnel, which could be perceived as threats by existing employees. Specifically, there could be several sources of resistance to the planned change. One is the concern of employees over the changes in their employment status after the implementation of the change. The initial response to threats on employment status is resistance by fighting against the change to prevent the cancellation of positions and removal of personnel. Another is the concern over possible changes in their tasks if they remain employed with the company after the establishment of the new business. Employees experience security by developing knowledge and skills necessary to accomplish their work effectively. The change requires the accumulation of new knowledge and skills that challenge the security of employees. Still another is the different perspectives of managers and employees towards the purpose and impact of the planned change. The different in opinion could divide support for the change. Last is the adverse perception towards the change because of lack of consultation. The implementation of change without sufficient consultation, based on the perspective of managers and employees, could develop negative regard towards the change. Addressing the problems of resistance that develop in a process could also be through a process that requires strong leadership. Addressing resistance is a three-stage process [See Figure 2 below] that commences with the unfreezing of the present status of the organization, followed by the guided movement towards the new position, and concluding with the freezing of organizational life at the new position. This means top management, with feedback from senior managers, should determine the existing position of the company, articulate the new position, and implement policies or activities that move the organization from the current to the new position. This finds further explanation by the parallel three-step process. The first step is defrosting of the status quo, followed by the taking of actions that usher change, and concluding with the anchoring of the achieved changes using corporate culture. This also highlights the importance of leadership and adds the incorporation of the chan ge in the corporate culture as the means of ensuring that the organization remains at the new position. (Lewin, 1997, pp. 330-334) These three-step processes address resistance in a number of ways. Completing the first step means that the company has identified a rational justification for the change by understanding problems in the present status of the company and developing a vision of the outcome of the required change to address these problems and gain benefits. Implementing the second step requires the identification of activities and processes that encourage the intended behavior or action from all stakeholders. These behaviors and actions comprise movement towards the new position. The application of the third process through activities that secure the comfort and satisfaction of the organization towards change should ensure the stability of the organization in its new position. (Lewin, 1997, pp. 330-334) Specific actions or activities that could help the organization address resistance. First is the establishment of a sense of urgency over the need for change. It is common for people to require a reason for agreeing and participating in change. Leaders or top management has to provide an acceptable justification to expect change from managers and employees. Second is the development of the vision for change and communicating this to the parties affected. People also expect to make changes when they know where they are going. This means that leaders need to clarify where the change would lead the organization to expect managers and employees to understand the importance of their role in the change process and the impact of the change on them. Third is the establishment of a guiding coalition made-up of a team nurturing and supporting the change. The team has to exert influence because of their qualifications and other forms of influence towards managers and employees. Fourth is the em powerment of employees to participate in the change process with confidence. This means that leaders should provide room for the development of ideas on the part of managers and employees. This environment develops flexibility, which supports change. Fifth is the establishment of short-term goals that is realizable in a short period because people are not likely to cooperate in change without seeing positive results, no matter how minute, in the short-term. Sixth is the encouragement of additional changes to secure long-term or sustainable change to take advantage of the momentum of change by encouraging open communication and innovation. Seventh is the reinforcement of change through positive developments in the organization that justifies the better position of the company after the change. (Kotter, 1996, pp. 33-145) 6. Project Evaluation The evaluation of the project constitutes another important aspect of change management. Evaluating the project ensures the resolution of problems as well as the prevention of issues. One project evaluation model is the lifecycle of change management. The implementation of this mode commences with modifications at the model level and then the translation of these changes at the implementation level. This minimizes rework at the implementation level while at the same time developing a model for use in the assessment of the outcomes of change implementation. (Singh Shoura, 2006, p. 25) Simulation is a means of considering possible modification at the model level. In application to the establishment of a 2nd hand furniture business, simulation could apply to the assessment of different modes of mergers and acquisitions to determine the best means of achieving the desired change. The selected option is subject to implementation and expected outcomes, based on the model as the point of r eference. Another situation implementing the lifecycle model is the consideration of the role of leadership in the change implementation process. Ideally, leadership should develop the vision for change and guide movement towards the change through activities that comprise the change such as the assumption of new tasks by managers and employees. This ideal serves as the means of evaluating the role of leadership in actual practice. Managers should also facilitate consultations and feedback sharing within and across the different levels of the organization. This ideal comprises the point of reference in assessing the role of managers in the change process. Overall, the intention of the lifecycle model of change is that the organization should remain operational after the implementation of change but placed at a better position compared to the previous state before the change. The comparison of the difference between the old and present status in terms of strategic objectives tells so mething about the merit of the change and the effectiveness of the change implementation strategy. (Singh Shoura, 2006, p. 25) 7. Conclusion Change management is important in achieving strategic objectives. There are a number of elements for consideration in implementing change management. One is the clarification of the change by determining the problem or issue underlying the planned change. This is important to rationalize and justify the change. Another is the assessment of the change by weighing the forces that persuade and dissuade the change. The persuading factors should outweigh the dissuading factors to support the change. Still another is the identification of the stakeholders or the parties affected by the change together with the interests for purposes of the prioritization of interests in case of conflict. The development of the change implementation plan is also important because this determines the activities comprising change and the role of the parties in achieving the change. Understanding the blocks to change, particularly resistance is also important to ensure a smooth change process. Lastly, designin g a project evaluation is also an important element because this determines the extent of achievement of the change and areas for improvement in the course of implementation.

Friday, September 20, 2019

Network Security and Vulnerability Threat Table

Network Security and Vulnerability Threat Table LAN Security Is the local area network that access control using the private VLANs and its a networking device within a small geographical area. They are not safe and secure compared to other networks because its easy to access the WLAN security compared to others its more of convenience over security thus it will help business and IT organizations to improve on their network by providing suitable choices for WLAN security for organizations to have a safe WLAN in their working place they must have procedures that outlines forms of double connections that are allowed in the work place for security purposes, also to consider security and its impacts to other networks for instance theWLAN ,to have client devices and APs,also to perform attack and vulnerability monitoring respectively to support this type of network and lastly to carry out a regular assessment about WLAN security in the organization. The wireless system helps devices to connect to the computer minus them being connected to the network,WLAN consists of client devices for examples the laptops and the access points(APs),the APs connect client devices with distributing system(DS) and DS its the only way by which client devices can pass information or communicate with LAN and other networks. Also we have wireless switches that help the WLAN is administrators to manage it. WLAN Architecture It has the following components including the client devices,APs and the wireless switches, this part tries to show the importance of having a standard mechanism of security   thus providing recommendations for implementing, evaluating and maintaining those configurations of the client devices. The architecture of an organization should be standard when it comes to the issues of security configurations because it provides a base for security thus reducing the vulnerabilities and consequences of attacks that might be successful, it will improve the consistency and predictability of security. The following makes up WLAN architecture: roaming, microcells, infrascture, and independent. Independent WLAN is the simplest one which consists a group of computers that are equipped with client adapter and access points are not necessary in this case. Infrastructure WLAN consists of wireless stations and access points combined with DS that help roaming and mediating wireless network traffic. Microcells and roaming; a microcell is an area coverage for an   AP,they help users to move between   access points without having to log in again and restarting the applications again, for roaming to work, access points must have a way of exchanging information as a user connect Threats of WLAN The following explains the security threats of WLAN that are likely to happen: eavesdropping, spoofing and denial of service A) Eavesdropping Involves attack against the confidentiality of data that is transmitted across the network, eavesdropping is a big threat because the attacker can intercept the transmission over air from a distance that is away from the organization B) Spoofing It is where the attacker could gain access to data and resources in the network by assuming the identity of a valid user this is because some networks do not authenticate the source address thus the attackers may spoof MAC addresses and hijack sessions. C) Denial of service This is where the intruder floods the network with either genuine or fake information affecting the availability of the network resources, WLAN are very vulnerable against denial service attacks due to the nature of the radio transmission. LAN Security Is a wireless networking device within a small locality that access control using the private VLANs. Identity management Is the system discipline whereby the right people access the right and valid information at the right moments and for good particular reasons. Physical security Its the protection of the hardware, software, networks, and data from actions that could cause loss or damage to an organization for instance theft. Personal security Availability Is the quality or state of information or data of being available and easily accessed. Privacy Is the state of a person to seclude himself or herself, or information about him or her, so its the procreation of information or confidentiality of data. Cyberattactks in tabular format Type of attack Effect Malware Its a computer code that a malicious function, used to destroy   or steal private data in a computer. Password attacks They attack on cracking a person or user is password so that the attacker may obtain access to a secured system. Denial of service Focuses on the interruption of a network service when an attacker sends volumes of traffic to the network that is targeted. The following will be employed to mitigate the above types of attacks on the computer: Threat intelligence reports, are documents that describe types of system and information that is on mission or the one being targeted and information important to the organization. We have security alerts that are notifications about the current vulnerabilities and some security concerns. Tool configuration is the recommendations for mechanisms that support the exchange, analyzing, and the use of threat information. Indicators can also be used, they suggest or tell that an attack is imminent or its underway for instance we have the IP. Plan of protections openStego-its a free steganography that has the following functions: Data hiding where it can hide data within a cover file watermarking files with an invisible signature. Quickstego -helps someone to hide text in pictures so that its only users of quickstego who can be able to retrieve and go through those messages. Oursecret -enables the user to hide text files for instance images and videos thus suitable for sending confidential information. Veracrypt -it adds enhanced security to the algorithms used for system and partions encryption making it immune to new developments in brite-force attacks. Axcrypt -it integrates seamlessly with windows to compress, encrypt, decrypt, store, send, and work with individual files. GPG-it enables to encrypt and sign data, communication, as well as access modules for all public directories. Cryptographic mechanisms to organization Cryptographic is writing is in secret code within the context of any application and these are the requirements for it; Authentication, privacy, intergrity, and non-repudiation They include:schannel CNG provider model,ECC cipher suites,AES cipher suites and the default cipher suite preference. so the basic mechanism is to covert data into   cipher text form and then again into the decipherable when it gets into the user. Encryption and decryption is the main mechanism which works and ensures free flow of data within the system. Benefits The use of using public keys enables individuals to convert data into the encrypted form. Used to hide crucial important and vital information. Helps in preventing leakage of vital data from a network Helps in the authentication of users over the transfer or flow of data in electronic way. Risks associated with these are that they make the problem of general key recovery difficult and expensive and too insecure and expensive for many applications and users as large. File encryption tools Veracrypt, axcyrpt, Bitlocker, GNU Privacy Guard and 7-zip File encryption method We have the following methods; exceptions, syntax, remarks and security Results of the encryption files They provide an overview and pointers to resources on EFS They also point to the implementation strategies and best practices Encryption technologies Shift/Caesar cipher-its a tool that uses the substitution of a letter by another one further in the alphabet. Polyalphabetic cipher-is a cipher that is based on substitution using the multiple substitution alphabets. Perfect cipher-these are ciphers that can never be broken even with after an unlimited time. Block ciphers-is an algorithm deterministic that operates on fixed-length groups of bits. Triple DES-is a symmetric-key block cipher that applies the DES algorithm three times to the data bits in the system. RSA-is a public-key in the cryptosystems and is used for the transmission of secure data. Advanced encryption standard-its a cipher based on the substitution-permutation network and works fast in both the hardware and software. Symmetric encryption-these are the algorithms that uses the same cryptographic keys for both encryption and decryption of the cipher text. Text block coding-are the family of error-correcting codes that do encode data in bits. Information hiding and steganography-is the process of concealing a file, video, image or file. Digital watermarking-is the practice of hiding digital information in a carrier signal in the system. Masks and filtering-masks show which of the part of the message is displayed. Description security architecture of the organization It has the following components including the client devices,APs and the wireless switches, this part tries to show the importance of having a standard mechanism of security   thus providing recommendations for implementing, evaluating and maintaining those configurations of the client devices. The architecture of an organization should be standard when it comes to the issues of security configurations because it provides a base for security thus reducing the vulnerabilities and consequences of attacks that might be successful, it will improve the consistency and predictability of security. The following makes up WLAN architecture: roaming, microcells, infrascture and independent. Independent WLAN is the simplest one which consists a group of computers that are equipped with client adapter and access points are not necessary in this case. Infrastructure WLAN consists of wireless stations and access points combined with DS that help roaming and mediating wireless network traffic. Microcells and roaming a   microcell is an area coverage for an   AP,they help users to move between   access points without having to log in again and restarting the applications again, for roaming to work, access points must have a way of exchanging information as a user connect. the cryptographic means of protecting the assets of the organization Cryptographic is writing is writing in secret code within the context of any application and these are the requirements for it; Authentication,privacy,intergrity and non-repudiation They include: schannel CNG provider model, ECC cipher suites, AES cipher suites and the default cipher suite preference. so the basic mechanism is to covert data into   cipher text form and then again into the decipherable when it gets into the user. Encryption and decryption is the main mechanism which works and ensures free flow of data within the system. Benefits The use of using public keys enables individuals to convert data into the encrypted form. Used to hide crucial. important and vital information. Helps in preventing leakage of vital data from a network Helps in the authentication of users over the transfer or flow of data in electronic way. the types of known attacks against those types of protections Password attacks-its a third party who tries to get access of information by cracking the password. Malware-codes with malicious intent to steal data or destruction of the computer system. DOS attacks-it majors on or targeting disruption of the network and can be prevented by keeping the system secure. Strong passwords are the only way against this attack. Malware should be avoided by doing away with links to unknown users. How to ward off the attacks Malware-avoid clicking and downloading attachments from unknown users. Phishing-through verification of any requests from organization via email over the business phone. Passwords attacks-use of strong passwords DOS attacks-the system of the organization to be kept secure with software updates. Encryption Technologies Data Hiding Technologies and Shift/Caesar cipher-its a tool that uses the substitution of a letter by another one further in the alphabet. Polyalphabetic cipher-is a cipher that is based on substitution using the multiple substitution alphabets. Perfect cipher-these are ciphers that can never be broken even with after an unlimited time. Block ciphers-is an algorithm deterministic that operates on fixed-length groups of bits. Triple DES-is a symmetric-key block cipher that applies the DES algorithm three times to the data bits in the system. RSA-is a public-key in the cryptosystems and is used for the transmission of secure data. Advanced encryption standard-its a cipher based on the substitution-permutation network and works fast in both the hardware and software. Symmetric encryption-these are the algorithms that uses the same cryptographic keys for both encryption and decryption of the cipher text. Text blocks coding-are the family of error-correcting codes that do encode data in bits. Information hiding and steganography-is the process of concealing a file, video, image, or file. Digital watermarking-is the practice of hiding digital information in a carrier signal in the system. Masks and filtering-masks show which of the part of the message is displayed. Network security vulnerability and threat table above Common Access Card Deployment Strategy How identity management can be part of security program and CAC deployment plan Identity management involves telling what the user can do to certain devices at a given time. Identity management can be part of the program because of its reasons well known for instance: increasing security, also production while decreasing the cost and effort. The program tools of identity management need to run as application towards a server because it defines the type of user and devices allowed to work on a certain network this for it to be part of the program, must depend on alerts, reports, policy definition and alarms Thus offering directory integration and connection of the wireless and non wireless users and meeting almost the operational and security requirements. Deployment plan of the common access control Can come for different reasons so as to deploy and enforce the authorization policy for instance: The organization -wide authorization policy   that is driven from compliance level of organizational requirement.also departmental authorization policy where they have some special data handling the requirements that would be passed to various department. Then the specific data management relating to compliance and targeting at the   protection of the right access of information. Email Security Strategy Types of public-private key pairing Public keys may be disseminated widely but private are only known to user owner. This makes two functions-the authentication when public key is used to verify or show a private user sent a message and encryption where the holder of the private key can decrypt the message. Authentication-is when the public key is used to verify that a holder of the paired private key sent the message. Non-repudiation-its an attribute of communication that seeks to prevent the occurrence of the untrue or false denial of involvement by either party because it provides the originator of data with credible evidence showing information was received as it was addressed. Hashing -its used to index and retrieve items in database because it is faster to find an item through the use of shorter hashed key thus hashing being the transformation of a string of characters into a shorter fixed length than the original size. This added security benefit will ensure integrity of messaging by: Speeding being high   this is when the number of entries is large because maximum number of entries can be predicted in advance so that the bucket array can be allocated once also one may reduce the average lookup cost by a careful choice of the hash function and even the internal data   of structures. Pretty Good Policy-its a program that is used to encrypt and decrypt email over the internet as well as to authenticate digital messages with signatures the stored files that are already encrypted. GNU privacy Guard-its an encryption software program since it uses the combination of conventional symmetric-key cryptography for speed. Public key infrastructure -its a cryptography key that enables the distribution and the identification of the public encryption keys thus enabling the devices to exchange data securely over various networks. Digital signature -its an electronic signature that can be used to authenticate the identity of the person sending the message. Mobile device encryption-they help mitigate security risks whereby data must be encrypted while it is in transit and when in storage. How to use smartcard readers tied to computer systems Smartcard are the credit-sized plastic cards that do contain the circuit card that are integrated they can be deployed together with readers to provide user authentication and the non-repudiation for wider range of security purposes. A single smart card can be issued to each network user so as to provide a single set of credentials for logging to remote networks. Complexibility of cost and technical of email encryption strategic to security benefits The following elements must be considered: The basics because encryption is a process that is based on the cipher that makes or ensures information is hidden.Aslo choosing what to encrypt because it will be part of the risk management and the planning process of data governance. The three states of data in order for data to be secure from data in motion to data at rest and last data in use. Recommendation Smart card can be deployed together with readers to provide user authentication and the non-repudiation for wider range of security purposes. A single smart card can be issued to each network user so as to provide a single set of credentials for logging to remote networks A deployment plan   its a step to step on what need to happen in the last stage in the email security strategy, for a deployment plan to be effective the following must be put into consideration: Layered application that deals with the design management dependencies  Ã‚   between components also the people who structure application layers should not be same again to structure the hardware infrastructure. Reference Atul.kahate, cryptography, and Network security Tata mc Graw.Hill Publishing Company Limited, 2003 E .kranakis primarily and cryptography, Wiley, 1986

Thursday, September 19, 2019

Hardys Jude the Obscure :: Religion Religion Jude Hardy Essays

Hardy's Jude the Obscure   Ã‚  Ã‚  Ã‚  Ã‚  In Hardy's Jude the Obscure, Hardy shows his views on religion and commitment to the Church which were said to have declined in the latter years of his life. (Ingham, xxvii) Throughout the book Hardy displays his feeling that religion is something that people use in order to satisfy themselves by giving their lives meaning. One instance in which Hardy clearly displays this is when he writes, "It had been the yearning of his heart to find something to anchor on, to cling to." (Ingham, 94) In order to bring out this point Hardy chooses to create Jude as an orphan and has him come from obscure origins. By doing this he creates a character who is looking for something to give him an identity. As a result of his relationship with Mr. Phillotson (who leaves for Christminster in order to become ordained), he finds religion and feels that he can use it to help him gain an identity. Hardy feels that people should shy away from their old ways of thinking and begin to form new opinions of their own. He feels that people should not just blindly follow religion without deciding for themselves that this is what they want. People should not be as Jude who becomes obsessed with religion simply because his mentor Phillotson felt this way. One of the major reasons that causes Hardy to have these views is that he feels religion leads to hypocrisy. He feels that man has many desires that go against the laws of religion, and these desires lead man to feel very hypocritical. These feelings of hypocrisy then cause man to have many inner conflicts that lead to many problems. This negativity towards religion is seen both through symbols in the book and in the plot itself. The symbols that convey this message are the name Jude, which is an allusion to Judas Iscariot who was a traitor to Jesus. The name Jude can also be a reference to the wandering Jew. The second symbol is Christminster. Christminster symbolizes a world in which Jude sees how remarkable the Church is, but it is a place that exists only in Jude's imagination. Another symbol that we encounter is that of Samson who is symbolic of man going after women that are forbidden to him. We also encounter a reference to Nebuchadnezzar's furnace, which is used to question God by asking why the righteous suffer. Finally, the job Jude chooses is also symbolic of the anti-religious attitude that is shown.   Ã‚  Ã‚  Ã‚  Ã‚  The negativity towards religion is first revealed in the name Jude.

Wednesday, September 18, 2019

The Artists of the High Renaissance Essay -- Visual Arts Paintings Art

The Artists of the High Renaissance High Renaissance, that period of art at the beginning of the sixteenth century, has been referred to as one of the great explosions of artistic and creative genius in history. Most notable it seems, for producing three of the greatest artists in history: Da Vinci, Michaelangelo, and Raphael, the High Renaissance was referred to as such not only because it was a period of great and high art, but equally so, because it was essentially the culmination of the cycle of art which preceded it, known as the Early Renaissance. â€Å"Renaissance† stems from the French verb â€Å"naitre,† meaning â€Å"to be born†. Thus, the Renaissance would forever be known as the â€Å"rebirth† of critical artistic thoughts and ideals. Emerging from the much more gothic and religious period that came before, the Renaissance would most certainly prove to be one of the most enlightened periods in art and thought that history would ever see. Italian High Renaissance artists achieved ideal of harmony and balance comparable with the works of ancient Greece or Rome. Renaissance Classicism was a form of art that removed the extraneous detail and showed the world as it was. Forms, colors and proportions, light and shade effects, spatial harmony, composition, perspective, anatomy - all are handled with total control and a level of accomplishment for which there are no real precedents. The High Renaissance included such great artists as Bacchiacca, the painter of Ev...

Tuesday, September 17, 2019

Assessment of Students’ Satisfaction on the Restructured Essay

1.0 Introduction At the University of Ghana there are reports that rooms originally built to take two students, are now officially allocated to five students (after minor modifications), but unofficially occupied by as many as eight or nine – to the knowledge of the university authorities! Apart from the obvious hygiene and health hazards posed, what kind of ambience does this provide for study after classes? All of which have brought most African universities to a state of serious deterioration. This is evident not only to those who work or study in those universities but to even the most casual visitor. – (Association of African Universities, 2004) Housing is a basic human need in all societies and fundamental right of every individual. In advanced countries, housing is more accessible to all categories of people including the poor and the needy as a result of subsidies from the government. The situation is not the same in developing countries of the world. In Ghana, for example, accessibility to housing by the poor is quite a difficult situation which is worsened by the harsh economic conditions and poor enabling environment. Likewise, accessing housing facilities by Ghanaian students at the university is no exception, especially where such university happens to be the dream destination of most Ghanaians entering into tertiary institution. In tertiary institutions worldwide, the provision of accommodation to the students’ population takes different models. This includes; non-residential, where students source for their own accommodation. Residential, where the university houses all its students and dual-residential, where the university houses its student population for a period of time only, probably the first and final year, while the students during the remaining period source for their own accommodations. The experiences of students in tertiary institutions in sourcing and securing for their own accommodation around university communities are likely to be interesting and significant. However, it is worth noting that, University of Ghana, the nation’s premier university has gone through a series of development when it comes to how to accommodate its students, both undergraduates and postgraduates. 1.1 Research problem University of Ghana has undergone a series of reforms when it comes to the residential policy for its students. The ever increasing number of enrollees in the institution is what defines this restructuring of the policy governing students’ accommodation over time. In the past two years what the incumbent vice chancellor of the university term as â€Å"Decongestion† has taken place in anticipation to the fulfillment of the university achieving efficiency in its field of operation. The drive has also been fast tracked by his informal goal that the university should achieve a world-class status. Effective August, 2011, the university effectively implemented its decongestion policy allocating rooms to a maximum of three (3) students and four (4) students in the main halls and annexes respectively. This was done to address the problems of overcrowding that resulted in adverse effects of poor sanitation, pressure on residential utilities such as reading rooms and libraries, kitchen and washrooms, among other poor conditions for effective personal studies by students. Residential facilities have been increased to make the policy successful. Even though, the problem of inadequate accommodation for students is not entirely solved, the restructuring have been effective since its implementation, and it is worth investigating the effects of the new policy, whether it has achieved its goal or it is towards achieving its intended goal or otherwise. 1.2 Purpose of the study The main reason why this research is being conducted is to evaluate the satisfaction of students with the current students’ residential policy and its effects on their studies. 1.3 Objectives of the study Specific objectives of the study are as follows: 1. To assess students perception of sanitation in the halls/hostels now. 2. To assess students perception of security in the halls/hostels now. 3. To investigate students accessibility to some basic hall/hostel utilities. 1.4 Research Questions 1. What is students’ perception of sanitation in the halls/hostels now? 2. What is students’ perception of security and comfort in the halls/hostels now? 3. What is the accessibility status of students to basic halls/hostels utilities now? 1.5 Relevance of the study As a top university in Ghana and Africa and one which is striving to attain a world class status, adequate facilities should be provided and already existing ones improved, especially standards of services and facilities which include providing conducive on-campus student housing facility. The above research provides the grounding for this study and highlights the areas of new knowledge which are needed; to focus upon students’ satisfaction of residential facilities in University of Ghana. A key question is what is the level of students’ satisfaction with regards to the students housing facility (SHF) in the context of University of Ghana? The study contributes to a better understanding of SRS of UG. The results offer valuable feedback to the university authorities, facility managers and university hostel/hall administrators in terms of the present standards or the need for further improvement of the SHF through effective designs and management. The results will help to formulate guidelines in terms of allocation of rooms to students, maintenance and for future developments of student housing ensuring that the university is able to provide adequate and contemporary on-campus SHF. 2.0 Literature Review 2.1 Introduction This section reviews existing literature on the student residential facilities. It is mainly made up of previous studies, journals, articles, periodicals amongst other sources. They form the secondary source of data to the study. 2.2 The Concept of Student Residential Facility Student housing has long been regarded as an essential component of the facilities provided by the higher learning institutions in assisting students to expand their intellectual capabilities. According to Hassanain (2008), well planned student housing facilities (SHF) promote desirable educational outcomes and help to achieve the broader objectives such as social cohesion and responsible citizenship. An earlier study by Zahran (1972) reveals that a good student housing promotes interactions between roommates of different backgrounds and specializations; and thus broadens the students’ knowledge. Amole (2005) argues that facilities such as study areas or meeting places for academic discussions and social gatherings provided in the student housing will encourage informal intellectual activities outside the students’ own faculties. Price et al. (2003) related student interpersonal growth to adequate facilities and Fay (1981) highlighted the importance of students’ satisfaction in the SHF as a strategy to enhance student development. Despite the importance of SHF, little literature is available to evaluate student opinions of their housing facilities. Most studies on post-occupancy evaluation focus on family housing either public or private residences, investigating the interaction between owner-occupiers or tenants and their housing settings. Majority of these studies utilized the concept of housing satisfaction when evaluating the interactions between the residents and their physical environment (Amole, 2009b). Arguing that housing satisfaction can lead towards improving individual’s quality of life, Salleh (2008) investigates dwelling, housing services and neighbourhood factors that influence the residents of private low-cost housing in Malaysia. The study revealed that the residents are more satisfied with their dwelling units and housing services if compared to their neighbourhood facilities. Elsinga and Hoekstra (2005) study housing satisfaction among European communities and find out that except in Austria, homeowners are more satisfied than the tenants because homeownership provides security, freedom and financial benefits. In contrast, James (2008) analyses the influence of age and type of ownership on the level of satisfaction and establishes that tenant satisfaction increases with the age at a much faster rate than the type of homeownership. However, student housing and family housing are not the same. Student housing comprises of basic bedroom units with other shared facilities such as bathrooms, toilets, laundry, kitchens, common lounges and cafeterias located either per floor level, per block or for the whole student housing accommodation (Amole, 2009a). On the contrary, the basic unit for family housing is a house which includes bedrooms, bathrooms, toilets and a living area all as part of the unit with other housing facilities such as playground, shops and school at the neighbourhood (Parkes et al., 2002). In addition, student housing offers limited security of ownership and freedom if compared to family housing. Therefore, the above findings may not apply in the context of student housing. Studies on residential satisfaction (RS) from the student perspective are mostly focused on factors affecting RS; such as reasons for students to maintain their previous residence (Cleave, 1996) and predictors of student residential satisfaction (SRS) (Foubert et al., 1998; Khozaei et al., 2010b). There are also studies on student housing with narrower scopes such as the effects of floor height on over-crowding (Kaya and Erkip, 2001); students’ perceptions on indoor comfort (Dahlan et al., 2009); students’ sense of attachment with a particular student housing (Khozaei et al., 2010a); coping strategies for students staying in student housing (Amole, 2005) and the relationship between satisfaction and levels of environment (Amole, 2009b). These studies offer little guidance as to whether the students are satisfied with SHF provided. Among the limited studies on SRS are studies by Amole (2007, 2009a), Hassanain (2008) and Radder and Han (2009). Amole (2007, 2009a) investigates RS among students in Nigeria and the findings indicated a low satisfaction with the SHF provided. Radder and Han (2009) researched student satisfaction levels in South Africa and the findings indicated again a level of dissatisfaction with campus residences. Alternatively, Hassanain (2008) found that students in Saudi Arabia indicated a level of satisfaction with the SHF provided. However, the studies were conducted in countries where the culture and climate are different from that experienced in the Southeast Asia region, which is likely to affect the perceived environment of the built environment. Therefore, the results of the studies may not be applicable to the study context. 2.3 Evolution of the accommodation structure Originally, halls in the university were built to accommodate two students per room. This provision was adequate for students because not many people sought for higher education. However, as the population of Ghana increased and the need to seek higher education became prominent in the country, the number students enrolled each academic year increased rapidly as well. Residential facilities were increased and expanded to accommodate the ever increasing number of student intake which demanded restructuring of student residential policy given the limited resources the university had. In the midst of the reforms, beyond the expansion and modification of the original rooms to accommodate two persons at a time, the number increased to five (5) in a room officially, both in the main halls and the annexes. The continuous increase in the student intake amidst the unexpanded residential facilities meant that, not all students could be accommodated on campus, therefore, private hostels began to spring up to absorb the excess students who could not secure accommodation on campus. The private hostels motivation to make profit meant that they charge high prices which were unbearable by many students. This brought about one of the prominent terms that everyone who has passed through the four walls of the University of Ghana is popular with â€Å"Perching†. 2.4 The issue of â€Å"Perching† The word connotes students who illegally share residential facilities with official occupants of a room. This resulted in overcrowding in the halls, putting extreme pressure on washrooms, reading rooms, hall libraries, dry lines, among other facilities that were originally constructed for two people. This was happening who many reforms were going on. The two most popular reforms were the â€Å"in-out-out-in† and the â€Å"in-out-out-out† policies. The former meant that, all first year students were qualified for accommodation on campus, this qualification did not mean automatic allocation of rooms to freshmen but allocation was subject balloting for a â€Å"YES† or â€Å"NO† and second and third year students were to look for their own accommodation. Under this policy, final year students like first year students also qualified to be accommodated on campus; it is however, worth noting that, even for the final year students, because of the limited number of rooms available, allocation of rooms was also done via balloting a yes or no by students. The latter policy, in-out-out-out raised a lot of eyebrows as it meant that only first year students were offered accommodation on campus. And for this policy allocation to level 100 students was automatic and assured. With this policy in place the problem of â€Å"perching† worsened. The official number of occupants in a room almost doubled for almost all the halls of residence. The adverse effects of poor situation created a lot of problems; poor sanitation, insecurity, discomfort, which had direct impact on students’ health, hygiene, and efficiency. 2.5 The current residential policy â€Å"The University of Ghana Hostels with a capacity of 26000 beds, which was to be built at the University of Ghana, Legon, with partnership between the university and six banks was a dream come alive as long as finding a solution to the perennial problem of accommodation in our public universities is concerned† this was an assertion made by Professor C. N. B. Tagoe, Vice Chancellor of the university of Ghana (GhanaWeb, 2008). From the above statement I would to acknowledge the â€Å"Contingency theory† one of the prominent schools under the Open Systems perspective of Organizations. This theory as a branch of systems design emphasizes that design decisions are dependent on environmental conditions. Contingency theory is guided by the general orienting hypothesis that organizations whose internal features match the demands of their environments will achieve the best adaptation. Lawrence and Lorsch (1967), who coined the label â€Å"contingency theory†, argue that different environments place differing requirements on organizations. In a recent review article, Lawrence (1993) provides a partial list of factors that one or another theorist has considered important. They include size or scale, technology, geography, uncertainty, individual predispositions of participants, resource dependency, national or cultural differences, scope and organizational life cycle. With concentration on the resource dependency factor, it is indicative that, the adaptation and realization of the said solution was heavily contingent on the provision of financial resources by the six banks which are external to the organization. As the resources from the external environment was provided by the six banks, the expansion of the residential facilities have been a reality indeed, making it possible to establish four different hostels which accommodates about 7, 120 students. It is a combination of these factors that made it possible for the decongestion exercise in the five traditional halls feasible. Currently, some of the hostels have been restructured into halls and run as the traditional halls. The standard rooms accommodate four (4) persons as the annexes do. With other stringent measures put in place to control â€Å"perching† it is believed that, the purpose for which this restructuring was done is being worked towards. It must be stated categorically that, the main reason for this exercise is to improve students’ efficiency in the university. 2.6 Halls of Residence/Hostels The University believes in community living as an essential part of student life. It is therefore primarily residential, providing accommodation in Halls of Residence for both undergraduate and post-graduate students as well as flats and guest rooms for senior members and guests. There are five halls of residence (available to all students) and several Hostels. The present Halls and Hostels are as follows: Each Hall consists of junior members (students) and senior members (academic and senior administrative and professional staff), and is managed by a Council comprising members elected by persons belonging to the Hall. The Master (or Warden in the case of Volta Hall) is the Head of the Hall. Each Hall has Junior and Senior Common Rooms for students and Faculty, respectively. A tutorial system offers an opportunity for counseling students and ensuring their welfare at both academic and social levels. Students maintain interaction with each other and the wider community through recogni zed clubs and societies. Each Hall has a kitchen and a dining hall to cater for students’ feeding. Chapels and a mosque are also available for use by various religious denominations. A Chaplaincy Board co-ordinate the activities of religious groups. Social life on the campus is organised mainly by the Students’ Representative Council and the Junior Common Room Committees which provide various kinds of social programmes. LEGON HALL: Legon Hall was the first to be built on the permanent site of the University of Ghana at Legon and is, therefore, the Premier Hall of the University. Its foundation tablet was laid during the Michaelmas Term of 1951 and, in September 1952, the first undergraduates were accepted into residence. On Trinity Sunday, 31st May 1953, the first service was held in the Chapel and the first meal served in the Dining Hall. From these events, the Hall took Trinity Sunday every year as its birthday, celebrated by a common â€Å"Feast† for both its Junior and Senior Members. The Hall’s motto, Cui Datum (â€Å"To whom much is given†¦Ã¢â‚¬ ), was selected from St. Luke’s Gospel, in recognition of the special responsibility attached to the Hall’s seniority. Senior Members of t he University may be assigned as Fellows of the Hall by the Vice Chancellor and they usually keep their Fellowship for as long as they remain with the University. Persons of academic distinction outside the University may be elected as Honorary Fellows at a General Meeting of Fellows. The rest of the membership of the Hall is made up of persons in statu pupillari. The governing body of the Hall is the Hall Council, members of which are Fellows of the Hall. The principal Hall Officers are: The Master, the Vice-Master, the President of the Senior Common Room, the Senior Tutor, and the Hall Bursar. AKUAFO HALL: Akuafo Hall was established with the appointment of Professor D.A. Taylor, a Master-designate and a Hall Council in 1953. The Hall Council in 1954 decided to name the Hall Akuafo to commemorate the generous gesture of the farmers of Ghana in giving money for the foundation of the University College. A crest which depicts a cocoa tree, an open book and a drum, designed by Professor W.J. McCallien, and a motto, laboremus et sapiamus, suggested by Professor L.H. Ofosu-Appiah, were adopted by the Council. A commemorative plaque with a Latin inscription composed by Professor L.H. Ofosu-Appiah was set up to show the gratitude of the Hall to the farmers of the country and to the British Government who gave the University College funds for the building of the Hall. The Hall was officially opened on 17 February, 1956, but the first students, numbering 131, came into residence on the 5th October, 1955. The Hall has its own statutes governing the election of officers and the administration of its affairs. Once a year, the Master has to convene a meeting of the Fellows, who form the governing body, to receive his annual report. The Senior Common Room is open to all Fellows and their guests, and the Senior Combination Room to all senior members of the University. Senior Members may also invite students to the Combination Room. COMMONWEALTH HALL: The first batch of students was admitted into residence in Commonwealth Hall at the beginning of the 1956-1957 academic year. In the Lent Term of that academic year, Ghana attained its independence from Great Britain, and the Hall, hitherto known as the Third Hall, was officially christened Commonwealth Hall to commemorate Ghana’s admission into the Commonwealth of Nations. The official opening of the Hall was performed in March, 1957. It is, so far, the only all-male Hall of Residence in the University. The motto of the Hall, Truth Stands, was taken from a quotation from Satyre by John Donne (1572-1631): â€Å"On a huge hill, cragged, and steep, Truth stands and hee that will Reach her, about must, and about must goe† This motto combines both the physical situation of the Hall (on a hillside overlooking most of the University and beyond) and the proper pursuit of a University education, the search for truth. It is the only Hall of Residence in the University which has a theatre and Amphitheatre for lectures and plays. The Coat of Arms of the Hall depicts the strength and unity of purpose of members of the Hall deriving from the bonds of association enjoyed by the individual members of the Hall. High Commissioners of the Commonwealth countries in Ghana are accorded Honorary Membership of the Hall. There is a Hall Council which administers the affairs of the Hall, assisted by the Tutorial Board and the Senior Common Room Committee. VOLTA HALL: Volta Hall started as the Fourth Hall in the 1959-60 academic year, on 16th November, 1960. The University College Council, on the recommendation of the Hall Council, named it Volta Hall. The Hall consists of the main hall originally designed to accommodate 82 students, and an annex with an original capacity for accommodating 198 students, the occupation of which began in January 1966. The motto of the Hall, chosen during the Hall’s tenth anniversary celebrations, is in the Akan language and it is: Akokobere Nso Nyim Adekyee. This means that the secret or knowledge of life and nature is a gift to women as it is to men. The Hall has a governing Body which comprises all the Fellows assigned to it and those elected by the assigned Fellows. The government of the Hall rests with this body which delegates some of its powers to a Hall Council. The Hall Council consists of ten members, including the Warden, the Deputy Warden, the Senior Tutor and the Bursar who are ex-officio members. The day-to-day administration of the Hall is carried out by the Warden with the help of the Senior Tutor, who deals with all students’ affairs, and the Bursar. MENSAH SARBAH HALL: Mensah Sarbah Hall, the fifth Hall of the University, stands in the southern part of the campus. The Hall consists of a main Hall built around a quadrangle and a number of Annexes standing to the north and east. The last two south annexes are attached to the Hall. Until October 1991, Mensah Sarbah was the only co-ed Hall of Residence in the University, which made it quite unique among the Halls. The governing body of the Hall is the Council, which is responsible to the full body of Fellows who form the Senate. Students’ affairs are handled by students’ own elected government headed by a President, while the general administration of the Hall is under the Master who is assisted by the Senior Tutor and Tutors on the one hand and the Bursar on the other. Other Hall Officers are the Chaplai n, who is responsible for the Roman Catholic Chapel, the Prayer Room Warden, who is responsible for the Protestant Chapel, and the Librarian. Senior Common Room affairs are managed by an elected committee under the President of the Senior Common Room. The Hall is named after the famous Ghanaian jurist, writer and statesman, John Mensah Sarbah of Cape Coast. It has been customary for the Hall to celebrate the birthday anniversary of this great man every year. This anniversary is known as Sarbah Day and is highlighted by a dinner and a get-together. The Hall has a crest designed to bring out the principal features of Mensah Sarbah’s life. It consists of three elements: a pair of scales, a stool with a book resting upon it, and a hill surmounted by a castle. The scale signifies the legal profession, the stool and the book symbolise culture while the hill and the castle are intended to depict the familiar landscape of Cape Coast with its many hills and forts. At the same time, the castle is intended to symbolise strength and honour. The Hall’s motto is: Knowledge, Honour, Service – three words which aptly summarise the guiding principles of Mensah Sarbah’s life. VALCO TRUST HOSTELS: The idea to build a grad uate hostel was first nurtured when Legon Hall Annex C was prepared exclusively for graduate students of the Hall. The quest for a suitable accommodation for graduate students gained attention when Valco Trust Fund offered to finance the construction of a graduate hostel. As a further boost to this course, Legon Hall Annex C was converted into an Annex of the Hostel. The Valco Trust Hostel, donated to the University by the Valco Trust Fund to ease pressure on student accommodation, is a block of purpose-built, self-contained flats for 190 students. The Hostel, which was completed in June 1997, is the University’s first hostel for graduate students. A second block with similar facilities was opened in January 2006. Located behind Mensah Sarbah Hall on the southern part of the campus, the flats are arranged in single and double study bedrooms with en suite shower and toilet. There is a shared kitchen for every twelve rooms. Facilities in the hostels include common rooms, washrooms and a restaurant. INTERNATIONAL STUDENTS’ HOSTELS: The International Student’s Hostels are located on the southern part of the campus off the road to the Noguchi Memorial Institute for Medical Research. For a long time, it had been the dream of the University of Ghana to create and strengthen links with other universities in order to enhance the international student presence on campus. The first phase was commissioned in June 1999 and the second in January 2006. The Hostels are co-educational and each has 43 single rooms and 85 double rooms. In addition, there are facilities such as a well-fortified security system, kitchenettes and restaurants. REFERENCES Amole, D. (2005),â€Å"Coping strategies for living in student residential facilities in Nigeria†, Environment and Behaviour, Vol. 37, pp. 201-19. Amole, D. (2009b),â€Å"Residential satisfaction in students’ housing†, Journal of Environment Psychology, Vol. 29, pp. 76-85. Association of African Universities (2004), â€Å"Challenges Facing African Universities: Selected Issues†, African Studies Review (2004) Vol. 47, No. 1, 1-59 Dahlan, N., Jones, P., Alexander, D., Salleh, E. and Alias, J. (2009),â€Å"Evidence base prioritization of indoor comfort perceptions in Malaysian typical multi-storey hostels†, Building and Environment, pp. 2158-65. Elsinga, M. and Hoekstra, J. (2005),â€Å"Homeownership and housing satisfaction†, Journal of Housing and the Built Environment, Vol. 20, pp. 401-24. Fay, G. (1981),â€Å"A model for reviewing growth environments†, Journal of College and University Student Housing, Vol. 11 No. 1, pp. 46-7. Foubert, J.D., Tepper, R. and Morrison, D.R. (1998),â€Å"Predictors of student satisfaction in university residence halls†, Journal of College and University Student Housing, Vol. 21No. 1, pp. 41-6. Hassanain, M.A. (2008),â€Å"On the performance evaluation of sustainable student housing facilities†, Journal of Facilities Management, Vol. 6 No. 3, pp. 212-25. James, R.N. (2008), â€Å"Residential satisfaction of elderly tenants in apartment housing†, Social Indicators Research, Vol. 89, pp. 421-37. James, R.N. (2008), â€Å"Residential satisfaction of elderly tenants in apartment housing†, Social Indicators Research, Vol. 89, pp. 421-37. Kaya, N. and Erkip, F. (2001), â€Å"Satisfaction in a dormitory building: the effects of floor height on the perception of room size and crowding†, Environment & Behavior, Vol. 33 No. 1, pp. 35-53. Khozaei, F., Hassan, A.S. and Khozaei, Z. (2010a), â€Å"Undergraduate students’ satisfaction with hostel and sense of attachment to place: case study of â€Å"universiti sains Malaysia†, American Journal of Engineering and Applied Sciences, Vol. 3 No. 3, pp. 516-20. Lawrence, Paul R. and Jay W. Lorsch. (1967)â€Å"Organization and environment† Boston; Harvard University, Division of Research, Graduate School of Business Administration. Parkes, A., Kearns, A. and Atkinson, R. (2002), â€Å"What makes people dissatisfied with their neighbourhoods?†, Urban Studies, Vol. 39 No. 13, pp. 2413-38. Price, I., Matzdorf, F., Smith, L. and Agahi, H. (2003),â€Å"The impact of facilities on student choice of university†, Facilities, Vol. 21 No. 10, pp. 212-22. Radder, L. and Han, X. (2009), â€Å"Service quality of on-campus student housing: a South African experience†, The International Business & Economics Research Journal, Vol. 8 No. 11, pp. 107-19. Salleh, A.G. (2008),â€Å"Neighbourhood factors in private low-cost housing in Malaysia†, Habitat International, Vol. 32, pp. 485-93. www.ghanaweb.com, (Tuesday, 8th January, 2008) retrieved on 4th October, 2012. www.ug.edu.gh (2012) retrieved on 10th October, 2012 www.ug.edu.gh (2012) retrieved on 2nd November, 2012 www.ug.edu.gh (2012) retrieved on 5th November, 2012