Wednesday, January 29, 2020
Solving the Byod Problem for the Enterprise Essay Example for Free
Solving the Byod Problem for the Enterprise Essay Introduction Enterprise computing, as we know it, is facing a dimensional shift with the widespread diffusion of the BYOD (Bring Your Own Device) phenomenon. BYOD is the latest trend hitting businesses where employees are bringing their own personal mobile devices. Some of these devices include smartphones and tablets which are brought into their place of work, and used on the corporate network for purposes such as accessing files, email servers, and databases. Over the past few years, employees in many organizations are bringing their own personal devices to the work environment to handle business needs. With employees using their own devices, CIOs and IT departments across the nation are frantically trying to keep up with their employees by ensuring their networks are safe and secure. There is no doubting mobile devices have taking over a big part of our lives. These devices travel with us wherever we go while always being within a short reach away. People are beginning to realize the usefulness of getting work done from their own mobile devices. With this trend enterprises are in need of a policy for employees bringing their own devices to work. Although a relaxed BYOD policy can offer an organization many benefits, it tends to be a double edged sword. A lax policy leaves sensitive data vulnerable; an overly strict one stifles employees trust relationship with their employer. A balance must be struck between offering employees a pleasant and enjoyable work environment and maintaining the security of enterprise data. As the expectations of workspace personnel evolve, organization leaders must find ways to adapt and overcome the challenges that arise when corporate culture has a conflict with social standards and consumer trends. Management must consider the potential detriment to the workforce morale and how this could ultimately result in productivity loss. This is evident in the current 90% of employers who have chosen to allow personal devices at work with little or no precautions (Miller, Voas, and Hurlburt, 2012). Most workers consider themselves, not the company, to be responsible for the personal devices they use for work purposes. This all begs the question, how should an organization go about implementing a BYOD policy? Which policy can best suit a particular type of business? Should organization leaders place priority on protecting its data assets, or must they protect the health of their workers? If the latter is chosen, what compromises must employees be expected to make to ensure a necessary, minimal level of security is in place? These are all the major questions IT departments are seeking answers for when providing a BYOD environment. This research paper will provide a working outline with the correct steps needed for the development process for a BYOD work environment. The paper will touch upon key subjects addressing the careful decisions that must be made in order to set up the proper policies. An organizationââ¬â¢s main goal is making certain your business has both a safe and secure network while keeping the employees satisfied. II. Key Issues. The key issues for the implementation of BYOD involve five main areas. The main areas are people, planning, management of technology, assessment and execution. The first main area, people, involves how management must communicate with the enterpriseââ¬â¢s employees, provide leadership and proper governance. The second area, planning, management must provide a plan to implement BYOD into the enterprise that aligns with the business, à communicates the IT strategy to the business and provides sound quality control. The third area, management of technology, IT management should provide a flexible and standard BYOD policy for employees. The fourth area, assessment, management should provide a way to measure risk, eliminate risk and provide a sufficient audit of the BYOD policy. Lastly, execution of the BYOD policy should provide an implementation that coincides with the needs of the other key issues. III. Models and Frameworks. Models and frameworks provide the ability to analyze, ââ¬Å"a structured set of essential components of an object for which clear expressions is necessary and perhaps even mandatory for creating, operating, and changing the objectâ⬠(Zachman, 2008). The object is the enterprise and the ability to implement any new business policy requires structure from models and frameworks. The models and frameworks that relate to providing structure in implementing BYOD are the Zachman Framework, Rogersââ¬â¢ Diffusion of Innovation Theory, Risk IT framework and Val IT Framework. The Zachman Framework is the foundation for architecture of any kind and enterprises that are growing in complexity can be represented with the Zachman Framework. With bring your own device the enterprise architecture of an organization will need to change to fit with the architecture change that BYOD brings. The two columns from the Zachman Framework that BYOD will affect is the Where and W ho columns. The Where column involves the network and how the system of an enterprise will change in regard to BYOD. The technology will need to be provided by or to employees that will change the architecture of an enterprise. The system will be with employees everywhere which means the business will be with employees everywhere they go. Leaving the business in a more vulnerable state that may create the loss of important data, which will increase the need for employees to be more responsible. The Who column needs to interact with the Where column that provides a distributed system that will require Responsibility from the organizationââ¬â¢s employees. The business role of the employeeââ¬â¢s device will need to have specifications, be defined and represented. The engineer perspective will need to define for the devices role for both the device and employee. The architect perspective will need to à define the potential locations for the system and where it can reach. With a clearly defined system role for the devices themselves the business management perspective should focus on how the devices are defined for the employees. To implement BYOD the enterprise will need to focus on those columns of the Zachman Framework. While the Zachman Framework provides the structure organizations will need the Rogersââ¬â¢ Diffusion of Innovation Theory provides aspects of innovation that will help mold business policies that should increase the ability of BYOD to be implemented. Rogersââ¬â¢ Diffusion of Innovation Theory provides four theory elements. The four theory elements are the innovation, communication, time and social system. ââ¬Å"The innovation does not need to be new in terms of being recently developed, it only needs to be new to the person or organization that is adopting and implementing itâ⬠(Lundblad, 2003). The theory continues that there are five parts to the innovation that increase rate of implementation as each of these characteristics increase. The five characteristics of the innovation are ââ¬Å"relative advantage, compatibility, complexity, trialability, and observability (Rogers, 1995)â⬠(Lundblad, 2003). Relative advantage is a perceived improvement over the current status. To implement BYOD their needs to be a perceived improvement according to the employeeââ¬â¢s view. Planning the implementation of BYOD will help make sure the improvement is seen and the employees will accept the innovation. The characteristic, Compatibility measures how well the innovation aligns with organization. Implementing the system in line with the organization with good understanding of the business will increase the compatibility and make the implementation possible. The next characteristic is complexity which is the measure of ease of use. Knowing the end users of the implementation and what they want in a BYOD implementation will help them have a positive user experience and increase the rate of adoption. Another characteristic is trialability. It is the measure of testing and more testing makes adoption faster. Providing good quality control when testing will make sure that the implementation will be in line with the implementation planning. The last characteristic is observability and it is the measure of visibility others have of the innovation and if more visible the faster the adoption. Providing end users with a positive visible experience will make employees more willing to go along with the innovation. ââ¬Å"The second element of Rogers diffusion of innovation theory is communication, or the process by which people develop and share information with each other to achieve common understanding (Rogers, 1995)â⬠(Lundblad, 2003). The need for IT managers to speak the businessââ¬â¢s language is very important. So an emphasis will need to be on communication for the IT department to ensure all needs of the business are being met. ââ¬Å"Realizing value from business change requires effective communicationâ⬠(IT Governance Institute, 2008). Time and social system are the last two theory elements. Time involves the different adoption rates of innovation and social system involves members in group or organization with a common goal. ââ¬Å"Opinion leaders, change agents, and champions are the people within a social system who have the ability to influence the diffusion of innovation within a social system (Rogers, 1995)â⬠(Lundblad, 2003). Winning over the most influential employees of the business will help influence other employees and ensure the business wants the implementation of BYOD to succeed. The last two frameworks needed to be taken into account when implement BYOD is Risk IT framework and Val IT Framework. The Risk IT framework needs to be taken into account when implementing BYOD or any other system. There are six Risk IT principles that will help effectively assess risk. The Risk IT principles are connect to business objectives, align IT risk management with ERM, balance cost/benefit of IT risk, Promote fair and open communication, establish tone at the top and accountability and function as part of daily activities. (ISACA, 2009) Effective enterprise governance of IT risk should have the potential amount of risk the enterprise is ready to take clearly defined with business objectives (ISACA, 2009). ââ¬Å"Effective enterprise governance of IT risk always connects to business objectivesâ⬠(ISACA, 2009). Controls should also be implemented to address risk. ââ¬Å"Controls are implemented to address a risk and based on a cost-benefit analysis. In other words, controls are not implemented for the sake of implementing controlsâ⬠(ISACA, 2009). IT risk should always be taken into account. ââ¬Å"Risk management practices are appropriately prioritized and embedded in enterprise decisionmaking processâ⬠(ISACA, 2009). Val IT is another framework that should be assessed when implementing BYOD to ensure the creation of value with the implementation. Val IT is used with CobIT, ââ¬Å"Val IT both complements CobIT and is supported by itâ⬠(IT Governance Institute, 2008). ââ¬Å"CobIT processes manage all IT-related activities within the enterpriseâ⬠(ISACA, 2009). ââ¬Å"Val IT and CobIT provide business and IT decision makers with a comprehensive framework for the creation of value from the delivery of high-quality IT-based servicesâ⬠(IT Governance Institute, 2008). Four questions can be asked to assess the enterprise and ensure value. (IT Governance Institute, 2008). All the frameworks of Risk IT, Val IT and CobIT can interconnect and provide an efficient management of IT. (ISACA, 2009)With both Val IT and CobIT, Risk IT can help enhance risk management and should be applied to an enterprise that is implementing a BYOD policy. IV. Plan of Action PLANNING Planning should be considered a crucial part when creating a BYOD policy. Depending on how a policy is created will determine the success it has going forward. A lackadaisical approach during the development can cost a company immediate complications (Pendleton, 2012). The planning stage is where management will cover the concerns and questions related to creating a standard policy for the organization to administer. It is imperative the planning stage not be taking lightly. Planning should never be rushed or thrown together in an ââ¬Å"ad-hocâ⬠like manner. Carelessness shown during planning can have devastating effects for the companyââ¬â¢s future (McKendrick, 2012). PEOPLE Developing a successful policy should promote an open collaboration between both the employees and the organization (AbsoluteSoftware 2012). Important details to include are the specifics for the guidelines set for users on the network. These areas of policy can become very blurry for both organizations and their staff to deal with (Kaneshige, 2012). It is vital to outline details for what usages are allowed on the network, a userââ¬â¢s classification on the network, the user restrictions for specific classifications, and the disciplinary actions for abusing the use. Personal ownership must be directly associated to the users on the network. Violations to the end-user agreement develop for network usage must be outlined with explanations that are clear and concise. Management must set a good example by following the regulations put into place just as any employees are expected to do. Realizing value from business change requires effective communication- a critical requirement difficult to achieve without widespread acceptance of a consistent set of terminologyâ⬠(IT Governance Institute, 2008). MANAGING TECHNOLOGY When initiating a policy into the business structure there are key subject matters to be addressed. It is important to designate the governance for the plan being implemented. So there will be an enterprise wide discipline for the policy. Each device that is allowed to have access to the network becomes a problem waiting to happen if lost or worse, stolen with malicious intent. There are key strategies to keep in mind when preparing a solution for defending against possible vulnerabilities on mobile devices. The components offering the most reliable solutions are focusing on access control and identity management (Chickowski, 2012). The capability to have both the control and visibility on events on the companyââ¬â¢s network is key for management. Lately, there has been various mobile security providers stating the solution is to control the data, rather than the device itself (Corbin, 2012). Personal owners are still strongly encouraged in taking preventive actions to securing th eir device. Nevertheless, IT departments can only do so much [software-wise] when taking security precautions handling devices on the network. In the case of IT being the direct barrier of prevention, the use of devices and à software the directed focus is more information-centric (Corbin, 2012). IT staff must direct attention towards securing data itself by blending the right amount of features to check authorizations and authentications. This layered approach centered at the information will provide more control over security wherever it should move or stop. The protection of corporate data is of utmost importance for a business. Any data obtained through lost or stolen devices would be a nightmare for an organization; but, having data fall into the wrong hands could compromise a companyââ¬â¢s integrity to other competitors can be disastrous. Therefore, it is crucial that preventive measures are put in place to ensure the integrity of an organization and its data. A beneficial solution to security is to include proper hardware and software that facilitates automatic provisioning that can be administered by the IT de partment. The Identity Services Engine (IES) by Cisco is one great example to the controllability needed for security. This software offers an efficient way for enterprises to manage network connections through an identity and access control policy platform. With access to vital information in real-time, enterprises can make proactive governance decisions about access (Cisco, 2012). This is the type of authority organizations need to ensure a safer network for users while securing valuable data. In connection with the security policies established there are legal issues bound to arise from the control organizations place over data being transferred and stored on employee devices. This topic of rights can leave both sides feeling uneasy. Nonetheless, businesses must protect their data that accessed by users on the network. The development process of the BYOD policies is where organizations will want to include details pertaining to ownership. Such discussion must include the liability for the information being used, how and when should a device-wipe be used, and exit strategies taken for employees leaving the business (Hassell, 2012). A great example of this problem would be defining the jurisdiction concerning who has authority and rights of the data located on an employeeââ¬â¢s device if he or she should be terminated or leave the company. These are all big issues that must be addressed depending on the vulnerability of your corporate data; otherwise, this going unstated that lead to annoying litigation for management. EXECUTION/ASSESSMENT Finally, once the components of execution and governance have been covered it is necessary for the organization to assess its current transition. It is here management must audit the new BYOD strategy to determine their Return on Investment (ROI). When reviewing the results of a recently implemented strategy there are two sets of key questions to measure the success of its use. The governance-related questions based from a Val IT approach include: Are we doing the right things? (The strategic question) and Are we getting the benefits desired? (The value question). The last set of questions are COBIT focused taking on an IT view. These two are: Are we doing them the right way? (The architecture question) and Are we getting them done well? (The delivery question) (IT Governance Institute, 2012). The combination of both the Val IT and COBIT frameworks create a synergistic relationship that will ensure a highquality IT-based service is creating value across the enterprise. V. Critical Success Factors The critical success factors for successful management of the BYOD policy are to plan, manage, assess, execute and communicate. Planning must be done first using Rogersââ¬â¢ Diffusion of Innovation Theory and Zachman Framework as a basis to planning to ensure the BYOD policy is going to be accepted by the enterpriseââ¬â¢s employees and align with the business. Communication needs to be an important part of planning to understand the business objectives. Planning must include how BYOD will be managed, executed, communicated and assessed. The management of the technology needs to ensure data safety using authentication and governance. The BYOD policy needs to be assessed before execution. ââ¬Å"The risk that a large IT-enabled project will fail for lack of business change should be assessed by top management at the very conception of the project and by project management at key phases over the life of the projectâ⬠(Gibson, 2004). Other frameworks to assess the BYOD policy are Risk IT, Val IT and CobIT. These are needed to understand the business risk associated with the BYOD policy, ensure value and assess the IT processes involved in the IT strategy switch. To execute, management needs to implement the policy with good quality control aligning it with the plan and technology management of the BYOD policy. Management needs to also communicate the governance and rules of the BYOD policy to ensure discipline. Explanation of consequences is also needed so employees understand the consequences of their actions using their own devices as a part of the enterprise. Lastly, the BYOD policy will need to be audited continuously to guarantee the safety and integrity of information while operating properly to attain the enterpriseââ¬â¢s goals and objectives. Work Cited Aala Santhosh Reddy. (June 2012). Bring Your Own Device (BYOD) Making It Work For Your Organization. In Slideshare.com for Cognizant Research Center. Retrieved , from http://www.slideshare.net/cognizant/making-byod-work-for-your-organization 13450463. BYOD Policy Implementation Guide. London: Absolute Software, 2012. PDF. Cisco Systems, Inc.. (2012). Cisco Identity Services Engine Software 1.1.1 (aka 1.1MR). In Cisco. Retrieved , from http://www.cisco.com/en/US/prod/collateral/vpndevc/ps5712/ps11637/ps11195/qa_ 67-658591.html. Ericka Chickowski. (June 19, 2012). Visibility and Control Still an Issue With BYOD Policies. I Network Computing: For IT By IT. Retrieved , from http://www.networkcomputing.com/security/visibility-and-control-still-an-issue wi/240002308. Gibson, C. (2004). It-enabled business change: An approach to understanding and managing risk. Retrieved from http://papers.ssrn.com/sol3/papers.cfm? ISACA. (2009). The risk it framework. Retrieved from http://www.isaca.org/Knowledge Center/Risk-IT-IT-Risk-Management/Pages/Risk-IT1.aspx IT Governance Institute. (2008). Enterprise value: Governance of it investments. the val it framework 2.0. Retrieved from http://www.isaca.org/KnowledgeJoe McKendrick. (October 23, 2012). 10 steps for writing a secure BYOD policy. In ZDNet.com. Retrieved , from http://www.zdnet.com/10-steps-for-writing-a-secure-byod-policy 7000006170/ Jonathan Hassell. (May 17, 2012). 7 Tips for Establishing a Successful BYOD Policy. In CIO.com. Retrieved , from http://www.cio.com/article/706560/7_Tips_for_Establishing_a_Successful_BYOD_Poli y. Kaneshige, T . (March 06, 2012). BYOD: Making Sense of the Work-Personal Device Blur. In CIO.com. Retrieved , from http://www.cio.com/article/701545/BYOD_Making_Sense_of_the_Work_Personal_De ce_Blur. Kenneth Corbin. (August 23, 2012). BYOD Security Demands Mobile Data Protection Strategy. In CIO.com. Retrieved , from http://www.cio.com/article/714550/BYOD_Security_Demands_Mobile_Data_Protecti n_Strategy. Lundblad, J. (2003). A review and critique of rogers diffusion of innovation theory as it applies to organizations.Organization Development Journal, 21(4), 50-64. Retrieved from http://search.proquest.com/docview/197971687?accountid=7113 Miller, K., Voas, J., Hurlburt, G. (2012). BYOD: Security and Privacy Considerations. IT Professionals. 14 (5), 53-55. Retrieved from http://ieeexplore.ieee.org Mark Pendleton. (August 13, 2012). Top Concerns When Creating a BYOD Policy. In NEC Corporation of America . Retrieved , from http://info.necunified.com/bid/153070/Top Concerns-When-Creating-a-BYOD-Policy. Rob Humphrey. (March 07, 2012). Manage Risks Reap Rewards: BYOD. In Kensington Safe Zone with Rob Humphrey Blog
Tuesday, January 21, 2020
Progression Of Music From The 1940s To The Present Essay -- essays res
Progression of Music From the 1940's To the Present The progression of music from the 1940's to the present has seen extremes, it has been controversial at times, traditional at times and inspirational at times, but never have the American people turned away music in its entirety. There have been times when parents did not approve of the music that their children chose to listen to, but the parents had never turned away music. Music has been criticized and promoted. Since the 40's music has progressed from Ballads (which were still lingering around from the 30's) to blues (popular among Blacks) to rock and roll, to pop, and back again. In the 1940's ballads were popular. Ballads were dancable music performed by big bands. They were composed of stringed instruments, wind insteruments, and a singer or two. This was the time period when music started to be broadcasted live over television and record albums were entering the home. (Hays) The 50's marked a beginning for a new era of music to be known as Rock & Roll. Many of the artists took advantage of the Electric guitar, developed for popular music in the 1930's but never really became popular until the 50's. Rock & Roll was a combination of many music styles in an upbeat sort of fashion. One example of when country had an impact on Rock & Roll was with Bill Haley and Jerry Lee Lewis. Jerry's career was huge, with his hits like "Whole Lotta Shakin' goin' On" and "Great Balls of Fire". That is, his career was huge, until the it was made public that he fell in love with a married his 13 year old cousin. In 1957 Rock & Roll had been turned upsidedown when Buddy Holly hit the airwaves with "That'll be the Day." Buddy Holly rolled out hit after hit after hit. That is, until his plane went down in Iowa. He died at the young age of 22. That night his music was playing non-stop and has not stopped playing to this day. The blues and gospel of James Brown and Jackie Wilson was popular with the black community. "Someday, maybe someone will discover the reason that Chuck Berry, Do Diddley, Fats Domino, and Little Richard never connected with black audiences" (25 years,p15). This may be because they might have almost been embarrassed from their blues roots. In the 60's such st... ...n the 90's or present day, the synthesizer is still being used in dance and techno music. Also introduced into the 90's was the computer. The computer has been around a while, but not been used in the music industry. Today just about anyone can produce their music using this tool. Also metal has become more aggressive, popular and contains political lyrics. Lite rock has also developed and has captured the ears of many listeners. Music has progressed from fun to an industry in itself. People can now earn a living off of music, often luxurious life. Along with the music progressing the American people have progressed. The world of music continues to change and may never stop progressing until the world stops progressing. Footnotes 25 Years of Rock & Roll (USA:Lorelei Publishing Co. Inc.,1979) William Hay, Twentieth-Century Views of Music History (USA:Berne Convention.,1972) Bibliography 25 Years of Rock & Roll. USA:Lorelei Publishing Co. Inc.,1979 Ewen, David. American Popular Songs. New York:Random House, 1966 Hay, William. Twentieth-Century Views of Music History. USA:Berne Convention, 1972 Wilder, Alec. American Popular Song New York:Oxford University Press, 1972
Monday, January 13, 2020
Personal Reflection Essay
This reflection will discuss personal diffidence and how it has influenced my academic studies, including my practice within placement settings. Gibbs reflective cycle (Gibbs, 1998) has been utilised as it illustrates a clear structure for the process of reflection. To conclude this reflection will draw together the themes which have emerged and highlight a clear action for future learning that will be used in order to enhance my future practice. Within my previous occupation as a health care assistant I was subject to workplace bulling which was allowed to continue for an extensive period of time due to ineffective management of the situation. Vartia (2001, p. 68) suggests that one of the consequences for the targets of workplace bulling is a feeling of low self confidence. This is indeed true of myself; although this occurred prior to commencement of university, I perceive that I am diffident stemming from this experience. This diffidence has influenced my academic studies and my practice upon placement. Feelings: I feel that I find it challenging to settle down within new groups of people. Whilst on placement I feel it takes a significant amount of time to work within my fullest capacity within the team. Spouse (2008, p. 21) state that entering a new placement area can be a daunting experience; suggesting this may be because you are joining a team of strangers who already know each other. However I feel that my previous experience has heightened my apprehension and indeed Bach and Grant (2009) suggest past experience contributes to our attitudes and values and affects what we notice about other peoples behaviour and how we interpret it. Therefore I may unintentionally be vigilant for behaviour that represents past experience. I feel I become emotive when conflict arises both upon placement and within the university environment; therefore I have a tendency to avoid sources of conflict. Furthermore; although I am aware of the need to challenge poor practice witnessed and have done so within the past; it is something that I find particularly challenging and uncomfortable to deal with. I find it uncomfortable to challenge people because I perceive this as a negative source of conflict. I am somewhat afraid of the reactions this may evoke and the impact this could have on my working relationships within the team I am placed. Within my academic studies in the university learning environment specifically; this diffidence has manifested as an apprehension of speaking within groups. This is especially apparent when it is required to perform group presentations. Although my one to one communication and communication within familiar groups is of good quality, communication within unfamiliar groups can be hindered by this diffidence. I am concerned that if allowed to continue; diffidence could be detrimental to my future practice as a nurse. Hagbaghery et (2004) qualitative research findings suggest that nurses perceive competence and self confidence as the most important personal factors influencing nurses clinical decision making, therefore in order to enhance my future practice I feel that it is imperative that I overcome this. Evaluation: Upon evaluation of these feelings I perceive I have progressed and gained confidence thus far, however there is still margin for improvement. I feel that upon a recent eight week placement period whereby I moved across four placement settings; I had an abundance of practice within adapting and participating within new teams. Although I felt that transition across four settings somewhat hindered myself working to my fullest capacity; the positive aspect of this was that it facilitated gain in self confidence. Nash, Lemcke and Sacre (2008) suggest that initially when encountering a new workplace culture trying to be accepted within this new culture can be uncomforting and lead to feelings of inadequacy; however by the end of this eight week period I feel I gained a significant amount of self confidence and I felt confident with my ability to integrate into new teams effectively. Communication is the interaction with people and is at the core of nursing according to McCabe and Timmins (2006, p. 4), therefore I acknowledge that in order to work to my fullest capacity within the nursing profession it is imperative I overcome this apprehension of speaking within groups and performing presentations. I have reflected upon previous experiences within university; contrasting performing our first group presentation to a recent group presentation experience. I perceive a vast improvement however again there is still margin for improvement and gain in confidence. Brankenbridge and Blows (2008, p. 216) have highlighted that there are different ways in which you can challenge, constructive and destructive. Constructive challenges highlight alternatives and leave the person with something of which they can reflect upon, build upon and change. Destructive challenges are delivered in an unskilful fashion leaving the person who has been challenged feeling put down and bad and potentially could be a source of conflict and negative feeling. This is why in the past I have perceived challenging people in practice as a negative action, possibly due to lacking differentiation between destructive and constructive criticism. Analysis: Although I perceive myself as diffident upon analysis I am unaware of how others may perceive my self. According to Barber, McLaughlin and Wood (2009, p. 76) The Johari Window; Luft and Ingham (1955) can show us aspects of ourselves that we believe is how others perceive us, however they further suggest that these aspects may only be a small part of our ââ¬Ëpersonalityââ¬â¢ as a whole and not necessarily how others perceive ourselves. Which means although I perceive myself as diffident; others may not necessarily perceive my self in this manner and it is essentially necessary that I develop further self awareness. Barber, McLaughlin and Wood (2009, p. 76) perceive development of self awareness as crucial in highlighting how we view and respond to others and in turn how they view and respond to us. The National Health Service (NHS) Modernisation Agency Leadership Centre (2005) have corroborated this view by suggesting self awareness can assist with understanding ones own emotions and the impact of oneââ¬â¢s behaviour on others. Therefore one of the many benefits of self awareness for myself may be understanding my colleagues, learning to relax, identifying my strengths and weaknesses and indentifying my own learning needs, Burnard (1997). I perceive assertiveness of which Siviter (2008, p. 116) defines as respecting the rights and feelings of others whilst standing up for yourself and your own rights as a necessary skill which will further facilitate a gain in self confidence. In order to be assertive it is necessary to possess the ability to express your feelings in a direct, open, honest and appropriate manner. Breckenbridge and Blows (2008, p. 217) further suggest that assertive communication is the key to successful relationships for patients, family, nurses and colleagues alike; therefore further development of my assertive communication skills will enhance my future practice and communication with staff, family and patients alike. Development of assertive communication skills may aid when and if the need arises in future practice to challenge colleagueââ¬â¢s actions or the actions of people in general. Indeed Breckenridge and Blows (2008, p. 17) suggest assertiveness is a key feature within effective challenging and therefore is an essential skill of which is required to be developed. Assertiveness aids conveyance of important messages and helps individuals stand up for the rights of themselves and others; one example of such being advocacy. Advocacy is reflected within The code in full (Nursing and Midwifery Council, 2008) who state that nurses must act as an advocate for those within their care. Therefore learning to be assertive is not a choice, it is a must if I am to live up to what is expected of me within my role as a student and future nurse. Conclusion and Action Plan: The challenge for the future is that I totally overcome this diffidence. I envisage being able to achieve by developing self awareness. I could develop self awareness by using a tool such as The Johari Window. Academically the challenge is to overcome apprehension regarding communication with unfamiliar groups of colleagues. I anticipate achieving this by taking more time to consider what I am going to before I begin and being prepared for situations where I am required to speak. With regard to performing presentations I will be prepared and rehearse what I am going to say in advance.
Sunday, January 5, 2020
Comparing and Contrasting Egypt and Mesopotamia Essay
What similarities and differences did Egypt and Mesopotamia have and why was Egypt more politically unified than its neighbor, Mesopotamia? I think in order to answer these questions it is important to look at how both societies lived. Egypt and Mesopotamia were two civilizations existing during the time period of 2000-1200 BCE.(text, 97) These civilizations were shaped by their environment, involved with trade, and faced changes in government after the 100 year drought; however, they differed in that Egypt was shaped by the Nile, traded goods for goods and changed their outlook on the pharaoh who was ruler of all; whereas, Mesopotamia was shaped by the Tigris and Euphrates, traded money for goods, and had a ruler over rulers. Theâ⬠¦show more contentâ⬠¦(text, 59) I think that a devastating environment can create devastating people. For example, in 2005 Hurricane Katrina devastated thousands it not millions of people. The negative change in the environment caused a negative change in how many people conducted themselves. People were stealing and looting for things that they needed or wanted. These actions were like those of savages. I view this to be similar to the revisit of flood destruction found in Mesopotamia. Even though both prospered after a devastating drought, they both had different approaches in which they traded goods. I think that the approach, Egypt took, made it more unified than Mesopotamia. One reason is that, according to them, they wanted nice things to put into their tombs to use in the afterlife. The nice things were like furniture, and coffins that were constructed from wood that was imported in from Phoenicia. (text, 107) A second reason is that when ever the Egyptians colonized a new area they would build stationed forts to broaden trade routes. (text, 107) Plus, in Egypt, they traded goods for goods. (text, 107) In contrast, I believe that most of Mesopotamiaââ¬â¢s businessmen were concerned with just getting the money and nothing else, because money was so much easier to transport than heavy loads that were being traded. (lecture, Dr. Kaz , Feb 9th 2009) When Mesopotamia recovered from theShow MoreRelatedEgypt Mesopotamia Comparison961 Words à |à 4 PagesEgypt and Mesopotamia Comparison In order to completely understand the relationship between two events, comparing and contrasting is necessary. Through comparing similarities and differences it is easier to analyze why things developed and occurred the way they did. For example, in comparing Egypt and Mesopotamia it will be easier to achieve understanding of major aspects of their culture, the way other cultures impacted them, and their influence on the future. InRead MoreCivilization: Which Aspects Define1491 Words à |à 6 Pagesneed for a hierarchical government to keep them operating. By comparing the earliest civilized societies, we can determine which features set them apart from so called ââ¬Å"barbarian societiesâ⬠and why the need to become civilized arose. The birth of primary urbanization happened first in Mesopotamia. It makes sense to look for characteristics from Sumerian society because they are considered the ââ¬Å"cradle of civilization.â⬠Mesopotamia lies between the Tigris and Euphrates rivers, which provide theRead MoreComparing The River Valley Civilizations1509 Words à |à 7 PagesComparing and Contrasting River Valley Civilizations In the following treatise, the research that will be presented will provide criteria involving similarities and differences in three attributes of life in the four primary river valley civilizations. The river valley civilizations are composed of Mesopotamia, Egypt, the Indus Valley, and China. While each of these civilizations is unique in their habits and traditions, they share many similar qualities. For this work to be as comprehensive asRead MoreCompare and Contrast the Rise and Fall of Mesopotamia and Egypt1635 Words à |à 6 Pages In this project I plan on exploring the contrasts and comparisons between the rise of Mesopotamia and Egypt. I chose this particular question because during my junior year I took and AP World History class in which we of course studied the worlds history. One on my favorite things that we studied in that class was ancient Empires. Mr. Herman, my AP teacher during that time, went through the Mesopotamian and Egyptian Empires rather too quickly for my tastes. I felt as though there were a lot of thingsRead MoreThe Main Features Of Egyptian And Mesopotamian Civilizations1364 Words à |à 6 Pagessimilarities. Both were agriculturally based. In both societies, the leader held divine status. However, differences arise when comparing their academics. Both societies developed mostly equal science and elaborate art. However, Mesopotamia developed a more complex writing system and Egypt developed more advanced mathematics. The economic systems are mostly different. Mesopotamia had a more ind ependent economy while Egyptââ¬â¢s economy was more controlled by the government. Overall, there were some similaritiesRead MoreAncient Eastern Thought and the Old Testament Essay10692 Words à |à 43 Pagesfrom how modern society thinks. Thus understanding literary genre is vital to perceive the authors intents. Similarities do not disprove uniqueness; instead you may find distinctiveness in the understanding or environment of the literary work. Contrasting differences between the ancient Near Eastern genres and the Bible help make significant points clearer. Nuances can be missed if the reader is unaware of the contrasts. Cultural Dimensions of Religious Practice Identifying similarities and differencesRead MoreWorld History AP8768 Words à |à 36 Pagespolitical organization and values? â⬠¢ The Persians built an imperial political system that drew upon previous Mesopotamian polities, including the Babylonian and Assyrian empires. The Persian Empire was far larger than its predecessors, stretching from Egypt to India, and ruled over some 35 million subjects. â⬠¢ The Persian system was centered on an elaborate cult of kingship in which the emperor was secluded in royal magnificence and was approachable only through an elaborate ritual. â⬠¢ Persian emperorsRead MoreA Picatrix Miscellany52019 Words à |à 209 Pagespassage is almost completely pervaded by correspondences and parallels with Ibn Abi ââ¬Ël-Rijà ¢l, and in certain parts with Sahl b. Bishr (pp.74-81). An interpolated note gives a mathematical definition of the aspects (p.78). The chapter concludes by contrasting Aristotleââ¬â¢s exhortation to Alexander to practice astrology and the Islamic prohibition of the art. Chapter 4, a short one, discusses the doctrine of the trepidation of the sphere of the fixed stars, which must be taken into account in the drawing-up
Subscribe to:
Posts (Atom)