Wednesday, September 2, 2020

Class, Race and Gender in The Associate essays

Class, Race and Gender in The Associate papers Numerous issues in regards to class, race, and sexual orientation in corporate America are brought to the bleeding edge in The Associate. The issue in this film is that Whoopi's character, Laurel is one who doesn't get rewarded reasonably on the grounds that she isn't in the exclusive class of the top-level officials, she is dark, and a lady. She has the cerebrums and the thoughts, yet at the same time can't excel on account of the shame behind these marks. Out of edginess of hitting the corporate discriminatory limitation, she makes Robert Cutty, probably rich, white, and male the way to accomplishment in corporate America. The issue of class is an intriguing one. Frequently class isn't viewed as a thought autonomous from race or potentially sex. The American privileged might want to see America as a ridiculous nation managing each citizen with equivalent open door for financial increase and achievement. So as to propagate this perfect of a boorish society, the poor are in this way racialized or potentially femininized. Race and sexual orientation are utilized to occupy consideration away from issues of class disparity. The individuals from these classifications are then characterized by generalizing marks of sluggish, unfit, explicitly unbridled, and uneducated which forestall their accomplishment in the public eye. Notwithstanding, class exists and is an autonomous perfect from race and sex. Classes exist according to each other in manners that are regularly oppositional, i.e., the advantages and benefits of one class are to the detriment of different classes similarly that men and whites get benefits that are frequently to the detriment of ladies and minorities. This perfect of the special versus the under-favored is apparent in The Associates depiction of corporate America. Free of sex, Sally is a prime case of the lower class inside an organization. The camera unobtrusively delineates her not exactly well-off situation by putting her out of sight when in Franks office while Laura is con... <!

Saturday, August 22, 2020

Coca Cola Analysis

1 I. Presentation â€Å"Coca-Cola and Shasta. † These two items are in a similar industry and both were concocted around a similar time. In any case, an altogether different discernment comes to purchasers? mind when they hear these two words. In the 21st penny ury, Coca-Cola is viewed as one of the most important brands on the planet, though Shasta is for the most part known in United States, especially in the West Coast district. Coca-Cola is possessed and operat ed by The Coca-Cola Company, and Shasta is at present claimed by National Beverage Corp. This report will look at, think about, and break down the two organizations as far as activity, advancement, the executives, and finance.In expansion, SWOT examination and Porter? s Five Forces will be led to assess the organizations? positions in the business. The report will likewise distinguish a few issues that the two organizations right now confront and propose choices and suggestions all together help Shasta, an auxiliary of National Beverage Corp. , to acquire piece of the overall industry. Table 3 shows that National Beverage Corp. makes up just around 2. 8% of the soda pop industry in 2010. Organization Background Dr. John Pemberton, a drug specialist from Atlanta, concocted Coca - Cola in 1886. The world? s biggest non-mixed drink organization trademarked its name and logo in 1893.After thirty years of foundation, the organization opened up to the world in 1919. The offer cost of its first sale of stock (IPO) was $40 an offer (Datamonitor, 2010). Coca-Cola extended fast ly; it is as of now accessible in excess of 200 nations and reaches about 99% of the total populace (National Geographic Channel, 2011). Utilization pace of trademarked or authorized items adds up to 1. 7 billion servings per day. As of December 31, 2010, the organization has 139,600 representatives around the world (The Coca-Cola Company, 2011). So also, Shasta was established in 1889, three years after Coca-Cola. In Northern Ca lifornia, Mt.Shasta, â€Å"a gathering of representatives opened a wellbeing and get-away hotel at the s ite and highlighted normally carbonated spring water. † The carbonated water got positive criticisms from customers who remained at the wellbeing and get-away hotel . Soon after, t hese agents built up Shasta Mineral Springs Company and began selling the item all through the West Coast locale, including California, Oregon, and Washington. In 1928, the organization was renamed The Shasta Water Company, and started to broaden its carbonated water line to a fragment with more flavors. In 1985, Shasta was acq uired by National Beverage Corp.Despite of the securing and item broadening, Shasta is serving a similar West Coast advertise that it was serving decades back (Shasta Beverage, Inc, 2010). Target Market Coca-Cola sees everybody as potential consu mers. Coca-Cola focuses on all age gatherings; in any case, the one with most potential is the age bunch between 18 to 25 years of age , which will in general have occupied ways of life. Moreover, the organization endeavors to request understudies and family-situated shoppers. The financial status of these socioeconomics ranges from lower to upper-lower pay level (Grimm, 2000). These are a couple of qualities of Coca - Cola? target advertise. Soda Industry 2 Shasta? s principle center is assortment. Despite the fact that the organization sells an assortment of cola, the deals of different flavors are better. Insights show that ethnic gatherings incline toward enhanced beverages over cola. In view of this examination, Shasta has fixated its objective market on et hnic gatherings. Shasta? s segment targets: low to center salary customers, less instructed people, and huge families. Psycho - graphically, the organization targets people who search for worth and quality in an item, similar to Shasta cola, as an option in contrast to Coca-Cola or Pepsi (C.Anicich, E-mail Interview, April 20, 2011). Table 3: Indust ry Trends and Comparison Analysis (source: Beverage Digest) Source: Beverage-Digest (Top-10 CSD Results for 2010). II. Operational Analysis ? The Coca-Cola Company Raw Materials Water is the primary fixing utilized in Coca-Cola? s items. The soda pop is produced using weakening water with concentrates and sugars. The moves utilized in Coca - Cola? s drink stays a mystery; in this way, the organization doesn't permit shooting during assembling forms. As indicated by National Geographic (2011), the drink is made with 90 percent water.Because water? s taste shifts at each area, Coca-Cola needs to kill the water to guarantee that its items taste reliably around the world. The other fundamental fixing is high fructose corn syrup (HFCS) and since imported sugar is progressively costly, Coca-Cola utilizes HFCS as its essential sugar. Assembling Coca-Cola is the biggest player in the non-mixed refreshment industry. It works in more than 206 nations and has 900 packaging plants and productio n lines worldwide with areas, for example, Eurasia, Africa, Europe, Latin America, just as North America (National Geographic, 2011).Due to this, these makers must stick to severe principles so as to create sta ndardized CocaCola? s items. In addition, Coca-Cola deals with its assembling forms effectively. For Soft beverage Industry 3 model, the new industrial facility in Baton Rouge works 24 hours every day, five days per week, and can deliver up to 4. 5 million refreshments in a single day. Moreover, in ongoing endeavors to be ecological inviting, the organization declares that it will change its electrical types of gear and lessen water utilization. The choice is anticipated to spare the organization around one million dollars every year. DistributionsCoca-Cola has the world? s biggest dissemination framework; thus, it is a ble to arrive at pretty much every district (Coca-Cola Co. , 2011). The organization disperses its refreshments to customers through different retailers, whol esalers, candy machines, and dissemination focuses. Moreover, it offers its syrup and concentrates to bistros and cafés utilized in wellspring drink distributors. ? National Beverage Corp. (Shasta) Raw Materials National Beverage Corp. teams up with numerous providers for crude materials and bundles. In addition, the organization solidifies its buying capacity for cost regulation purposes (National Beverage Corp. 0K, 2010). This bit of leeway permits the organization to contend with significant drink organizations. A portion of the materials used to deliver the refreshments are sugars, juice condensed, carbon dioxide, water, glass, p lastic bottles, aluminum jars, paper, containers, and terminations (NBC 10K, 2010). The expenses of the materials are extremely unpredictable; reasons being are a direct result of gas costs, taxes, outside trade vacillations, and so on. Therefore, the organization buys forward concurrences with providers to limit the cost increments on specific materia ls. Assembling National Beverage Corp. ets up assembling plants deliberately. Its twelve assembling offices are situated close to significant U. S. metropolitan urban areas; in this manner, enab ling the organization to disseminate items immediately and effectively (NBC 10K, 2010). In assembling plants, the organization containers and jars its refreshments. National Beverage Corp. accepts that responsibility for offices gives an upper hand o ver a few contenders? reliance on outsider bottlers (NBC 10K, 2010). Thus, the organization is capable form its own upper hand and become s progressively experienced and productive. Dispersions National Beverage Corp. tilizes a cross breed circulation framework to convey items through three essential appropriation channels: bring home, accommodation and food-administration (NBC 10K, 2010). Bring home channel conveys to supermarkets, wholesalers, and discount stores, for example, Costco. Furthermore, the accommodation channel, which disperses to service station and advantageous stores, for example, 7-Eleven stores. This channel permits the organization to charge higher selling cost than different channels on account of lower deals volumes. The last channel is food-administration. This channel appropriates its items to schools, lodgings, carriers, eateries, and other food related places.Soft drink Industry 4 III. Limited time Analysis ? The Coca-Cola Company Word-of-Mouth Consumers are discussing brands and organizations consistently, and it so happens that countless discussions are about Coca-Cola. As per Keller Fay Group, an exploration advertising firm, an investigation of 25,142 shoppers shows that Coca-Cola is right now the most discussed brand in America (Wang, 2008). This discovering exhibits and measures the example of buyers? discussions every day. What's more, the CEO of Keller Fay Group, Ed Keller, states, â€Å"†¦these brands fall under the domain of „social classes? what's more, have more prominent r ecurrence of procurement. Thus, shoppers are presented to bundled merchandise? logos and mottos as often as possible. The more items customers buy every day, the almost certain that they are to begin discussions about the items inside their groups of friends. The table underneath shows the ten most discussed brands and Coca-Cola is put first. Top 10 Word-of-Mouth Most Talked About Brands: 1. Coca-Cola 6. Passage 2. AT&T 7. Dell Computers 3. Verizon 8. Sony 4. Pepsi 9. Chevrolet 5. Wal-Mart 10. McDonald's Public Relations Coca-Cola has solid advertising since it is consistently on the front line of adding to the network and society.For example, Coca-Cola as of late reports to the press that it has quite recently settled the Coca-Cola Japan Reconstruction Fund, which vows to raise 2. 5 billion yens ($31 million U. S dollars), to help the remaking of Japan throughout the following three years (â€Å"Coca-Cola raises†, 2011). Because of this liberal demonstration, Coca-Cola w ill get extraordinary open media presses. Online life Since the development of web based life on the Internet, Coca-Cola has expanded its quality in the worldwide network. For instance, Coca-Cola? s Facebook page has more than 5. 18 million fans and as yet developing, which makes Coca-Cola? page one of the top fan pages on Facebook (Staff, 2010). This delineates the im

Friday, August 21, 2020

American Printing Essay Example | Topics and Well Written Essays - 500 words

American Printing - Essay Example This is a significant symbol in the mechanical improvement of the press business. In 1885, Otto Mergenthaler developed a linotype that acquired a lot of proficiency print creation (Burr, 55). Through this creation, machine typesetting turned into a significant inclination in print creations. Printers of this time profited by this stock in their archive handling. The linotype involved a console that looked like that one of the sort author. This development was perfect for paper and book creation. Along these lines, the Mergenthaler’s innovation was not for business archive handling (Burr, 56). It simply fit creation and creation of papers and reading material. It involved a period of firm rivalry among the predominant distributers in the USA. Bill Barnes and McCann were the predominant typesetters of the day (Rumble, 87). They would in this way take part in firm rivalries in their sythesis of print creations. These rivalries would consistently qualify McCann as the victor. In this way, he would show quick abilities over his rival Bill Barnes (Rumble, 88). The swifts were generally famous after the innovation of the linotype by Mergenthaler. This involved inclusion of the specialized creations during the early long periods of the nineteenth century. During this period, significant improvements were made in the field of science, and the print business achieved recognizable advantages (Rumble, 96). For example, the innovation of the linotype machine encouraged effective print creations in this time. The specialized innovations started the workshop culture even in the print business. Ladies experienced serious separation during this time. The rise and progressive advancement of the print business showed brutal encounters that confronted ladies. The whole print industry pushed for men’s pettiness (Burr, 53). This was obvious in the structure and standards of the worker's organizations built up during this period. Male predominance was

Tuesday, May 26, 2020

Write a Narrative Essay Topic That Stands Out - How to Get Started

Write a Narrative Essay Topic That Stands Out - How to Get StartedIf you are wondering what to write about in your essay, how to begin, and how to write a persuasive essay, read on. The purpose of this article is to help you be sure you are writing your narrative and descriptive essay topics effectively.A narrative essay topic focuses on events or experiences that are vivid and compelling. It should be one you relate to and can show what the writer experienced, heard, seen, or felt. A lot of writers use their imagination to get around this rule.On the other hand, a descriptive essay topic covers things that make sense. The writer gives examples of the events or issues that make sense, and not the things that happen or are done, which seem to happen all the time. So if you want to illustrate what happened, but aren't able to give an example, then your descriptions need to be able to go either way.Writing an essay for your junior high school requires a different style of writing than a narrative essay topic does. Usually a narrator's voice is needed in a narrative essay topic, because that is the way a person's experience can be understood by others. It is a person's way of communicating. Because your sentences must be direct and to the point, it is important that you make yourself understood quickly, so that others will be able to understand you.In the story of Jane's life, there are several narrators. But each has their own voice, and in the descriptive essay topics, you could not write about the times you had your homework, because the narrator would then have nothing to relate to. Instead, you could write about how Jane finished her homework each day. Your sentences are simple, simple sentences.Like a narrative essay topic, you also want to tell a story about your first day at school. One word: Start! You can use the first day as a beginning, or end of the descriptive essay topic, whichever works best for you.Each word you use to describe is important. Each s entence you use to show what happened, and how it was possible or what happened was necessary, can be effective.

Saturday, May 16, 2020

Fly Away Peter, David Malouf Essay - 1030 Words

Fly Away Peter In what ways does David Malouf use interesting literary techniques in Fly Away Peter to explore ideas and themes? â€Å"Two little dickie birds, Sitting on a wall; One named Peter, One named Paul. Fly away Peter! Fly away Paul! Come Back Peter! Come Back Paul!† Traditional Throughout ‘Fly Away Peter’ Malouf utilises a variety of literary techniques such as contrast, Imagery, Symbolism and foreshadowing to portray ideas and themes. The title ‘Fly Away Peter’ makes reference to the traditional English nursery rhyme ‘Two Little Dickie Birds’. Moulaf utilises this nursery rhyme to make the connection between themes within ‘Fly Away Peter’ and everyday life. â€Å"Two little dickie birds, Sitting on a wall;† These opening†¦show more content†¦The invisible paddock talked about in the first sentence is foreshadowing of the introduction of the two planes of life. Moulaf is also using symbolism. The â€Å"invisible paddock† symbolises the sky, and as later introduced the view from the sky is the second plane of life. Moulaf has used the lines; â€Å"One named Peter, One named Paul† to link the characters of the book to the religious views and ways of living in the 1960’s. In the 1750’s the rhyme ‘Two Little Dickie Birds’ talked of two birds names Jack and Gill, in the early 1900’s the names were changed to the disciples ‘Peter and Paul’. In ‘Fly away Peter’ Moulaf has used this link between the birds name to introduce the religious connections. The bird peter symbioses Jim and Paul symbolises Ashley in the context of ‘Fly away Peter’. Throughout the novel Moulaf uses the literary technique of narration to tell parts of the story. â€Å"The world Jim found himself in...† this narrator figure symbolises God. Jim and Ashley also symbolise angels. This references the first quote Moulaf placed in the front of the novel. The â€Å"divine creature† is an angel. Jim and Ashley are angels incarnated in a human form, and the ‘flying away’ is the time on earth and the coming back is the return to heaven. In the novel Jim dies from injuries sustained form a battle, and in this the cycle of his life is complete and he returns to heaven. The lines â€Å"Fly away peter, Fly awayShow MoreRelated Fly Away Peter by David Malouf Essay943 Words   |  4 Pages`Fly Away Peter by David Malouf - To what extent is Jims understanding of self enhanced by his contact with those around him? Fly Away Peter is essentially a story about life. Through the life of Jim Saddler the reader becomes aware of the ideas posed by the author, David Malouf. Jims life, if anything, is indeed a journey, unfolding through various broadening experiences that lead to Jims eventual understanding of the world and his own self. However, to simply say that this understandingRead MoreThe Significance Of Social Class Within Fly Away Peter852 Words   |  4 PagesThe Significance of Social Class Within Fly Away Peter Nursery rhymes rely on meter and rhyme to stick into our memories (Twinkle Twinkle). Yet, much like our own experiences, we do not remember just the words; (Twinkle Twinkle) or events, we recall the many actions and movements that bring each tale to life. Two Little Dicky Birds exemplifies this notion, as the physical actions associated with each line resemble the many travels we make throughout our lives (Twinkle Twinkle). BeingRead MoreFly Away Peter1730 Words   |  7 PagesCreating Other Worlds in Fly Away Peter  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In the novel Fly Away Peter, David Malouf explores the individual’s ability to transcend the immediate, and create ‘other worlds’ of his or her own: Meanwhile the Mind, from pleasure less, †¨Withdraws into happiness: ...it creates,... †¨Far other worlds... Malouf uses the continuity of life to highlight the importance of the individual’s mind set against the meaning of human existence. Malouf’s three main characters, Jim Saddler, Ashley CrowtherRead MoreThe theme of Struggle in the Australian national identity and literature2843 Words   |  12 Pagesstruggle has been highlighted in Australian literature, struggle can also be found in the ANI. Struggle—specifically seen in the landscape and war has been incorporated into the works of well-known Australian authors, Miles Franklin, AB Facey, and David Malouf. The first struggle which has influenced Australian society and literature is that of the landscape. A country’s landscape is more than just scenery; it is the interaction between people and place, the basis on which a society is built. LandscapesRead MoreAnalysis Of The Poem Purple And Bh60 823 Words   |  4 Pagesenlisting in the war. Similarly shown in ‘BH60’, as Woodward gains the rank of captain after killing a German soldier, a vast contrast to his life prior to the war, working in the mines. By using the setting of war in contrast to the life before the war, Malouf and Sims are able to change the perspective of the audience by confronting them with the idea that war is life changing as it leads to death. BH60 ends with Woodward marrying his sweetheart, which contrasts greatly with the tragic end of ‘FAP’ withRead MoreFly Away Peter1817 Words   |  8 PagesThe novel Fly Away Peter expresses specific attitudes and values by encouraging th e reader to identify with the central character, Jim Saddler. David Malouf, the author, attempts to expose the brutality of war and encourages readers to realise that one can be living a very sheltered lifestyle oblivious of the cruelty and negative side of life. In this text dealing with the experiences of Jim during World War I and events leading up to his signing up, the author uses biblical allusions, evocativeRead MoreBelonging Essay4112 Words   |  17 Pagesintegration, closeness, rapport, fellow feeling, fellowship. Antonym: alienate, verb 1) cause to feel isolated 2) lose the support or sympathy Synonyms for alienate, verb, estrange, divide, distance, put at a distance, isolate, cut off, set against, turn away, drive apart, disunite, set at odds/variance, drive a wedge between. Waverley Library 32 Denison Street, Bondi Junction NSW 2022 Phone 9386 7733 www.waverley.nsw.gov.au/library 1 From the 2009 - 2012 Prescriptions document: http://www.boardofstudies

Wednesday, May 6, 2020

Euthanasia Essay Assisted Suicide - 927 Words

Euthanasia and Assisted Suicide In her paper entitled Euthanasia, Phillipa Foot notes that euthanasia should be thought of as inducing or otherwise opting for death for the sake of the one who is to die (MI, 8). In Moral Matters, Jan Narveson argues, successfully I think, that given moral grounds for suicide, voluntary euthanasia is morally acceptable (at least, in principle). Daniel Callahan, on the other hand, in his When Self-Determination Runs Amok, counters that the traditional pro-(active) euthanasia arguments concerning self-determination, the distinction between killing and allowing to die, and the skepticism about harmful consequences for society, are flawed. I do not think Callahans reasoning establishes that†¦show more content†¦The difference is underlined by saying that a healthy person would not have died of the natural cause, but the injection would kill both a sick and a healthy person. That is, I think, the wrong way to look at it. Narveson argues that the act of shutting off of the life-s ustaining system is in fact killing the patient, for the patient would have continued living had the action not been taken (the natural course of the disease would have been stayed). Thus the act does indeed kill the patient, and is therefore subject to all the moral considerations thereof: what condition the patient was in and the wishes of the patient had she been able to express them, among other things. In this way, if letting die is not morally wrong as is suggested by Callahan, then killing in the context of euthanasia is not wrong and the self-determination and the killing-letting die likeness arguments for euthanasia do hold. The third argument in Callahans paper brings the consequences of legalizing euthanasia to the forefront, namely the abuse of the law; the difficulty of precisely writing, and the enforcing, the law; and the inherent slipperiness of the moral reasons for legalizing euthanasia in the first place (EI, 413). Any law may be abused. Any law on euthanasia, however, may be carefully crafted in such a way as to minimize these potential abuses (particularly since Holland has already legalized euthanasia, so many potential loopholes can beShow MoreRelatedEuthanasia And Assisted Suicide Essay3656 Words   |  15 PagesEuthanasia and Assisted Suicide Explanatory Essay â€Å"At least 36 terminally ill people died last year after taking lethal medication prescribed by doctors under the Washington State’s new physician assisted suicide law passed in 2009† (Caplin et all). This law makes euthanasia and assisted suicide an option for the terminally ill patient without the interjection from others. Due to the physician-assisted suicide and euthanasia law, terminally ill patients have been requesting physician-assisted suicideRead More Essay on Euthanasia and Doctor-Assisted Suicide1175 Words   |  5 PagesUnderstanding Euthanasia and Assisted Suicide    This paper will address some of the more popular points of interest involved with the euthanasia-assisted suicide discussion. There are less than a dozen questions which would come to mind in the case of the average individual who has a mild interest in this debate, and the following essay presents information which would satisfy that individuals curiosity on these points of common interest.    Euthanasia and assisted suicide are legal in theRead MoreEuthanasia Essay : Euthanasia And Assisted Suicide910 Words   |  4 PagesBackground about Euthanasia in The Netherlands. Patients Rights Council. Patients Rights Council, n.d. Web. 03 Mar. 2015. This website address euthanasia, assisted suicide, advance directive, disability rights, pain control, and more. This article features background information on euthanasia and assisted suicide in the Netherlands. In the Netherlands, for euthanasia or assisted suicide to be legal, â€Å"The patient must be experiencing unbearable pain†¦ must be conscious, The death request must beRead MoreEuthanasia Essay : Euthanasia And Assisted Suicide1755 Words   |  8 PagesIsabella Costa Simao Professor James Kershner English Composition I (ENL 101-02) April 23, 2015 Research Paper Euthanasia and Assisted Suicide Death is always a sensitive subject to talk about. That we are all going to one day die is certain. What is unknown is the condition under which it is going to happen. The process of dying is never easy, neither for the individual that is on his or her last stage of live, nor for the family and friends that have to watch someone they love goingRead More Assisted Suicide and Euthanasia Essay1436 Words   |  6 PagesAssisted Suicide and Euthanasia   Ã‚  Ã‚  Ã‚  Ã‚  Assisted suicide is one of the most controversial topics discussed among people every day. Everyone has his or her own opinion on this topic. This is a socially debated topic that above all else involves someone making a choice, whether it be to continue with life or give up hope and die. This should be a choice that they make themselves. However, In the United States, The land of the free, only one state has legalized assisted suicide. I am for assistedRead More Assisted Suicide Or Euthanasia Essay1709 Words   |  7 Pages ASSISTED SUICIDE or euthanasia On July 26, 1997, the U.S. Supreme Court unanimously upheld decisions in New York and Washington State that criminalized assisted suicide. As of April 1999, physicians-assisted suicide is illegal in all but a couple of states. Over thirty states have established laws prohibiting assisted suicide, and of those who don’t have statues, a number of them prohibit it through common law. In Michigan, Jack Kevorkian was initially charged with violating the state statue. HeRead More Euthanasia Essay - Assisted Suicide1579 Words   |  7 PagesAssisted Suicide/Euthanasia      Ã‚   Remarkably, few have noticed that frail, elderly and terminally ill people oppose assisted suicide more than other Americans. The assisted-suicide agenda is moving forward chiefly with vocal support from the young, the able-bodied and the affluent, who may even think that their parents and grandparents share their enthusiasm. They are wrong.    Thus the assisted suicide agenda appears as a victory not for freedom, but for discrimination. At its heartRead MoreEssay on Assisted Suicide and Euthanasia911 Words   |  4 PagesAssisted suicide brings a debate that involves professional, legal and ethical issues about the value of the liberty versus the value of life. However, before conceive an opinion about this topic is necessary know deeply its concept. Assisted suicide is known as the act of ending with the life of a terminal illness patients for end with their insupportable pain. Unlike euthanasia, the decision is not made by the doctor and their families, but by the patient. Therefore, doctors should be able to assistRead More Euthanasia Essay - Assisted Suicide and the Supreme Court1540 Words   |  7 PagesAssisted Suicide and the Supreme Court      Ã‚   After the nations highest court declared that U.S. citizens are not constitutionally guaranteed the right to a physician-assisted suicide, the movement has sort of lost its steam. Why do the Supreme Court Justices consider legalization dangerous? How did it win legislative approval in Oregon in the first place? What is the current trend in public opinion about this question? This essay will delve into these questions. After the U.S. Supreme CourtRead More Euthanasia Essay - Religious Views on Assisted Suicide1212 Words   |  5 PagesOfficial Religious Views on Euthanasia and Assisted Suicide      Ã‚  Ã‚  Ã‚   This essay is dedicated to the expression of the various official views of religious bodies within our nation. Most major denominations are represented. These religions have long been the custodians of the truth, serving to check the erratic and unpredictable tendencies of political, judicial and social bodies which would have Americans killing off their elderly and handicapped.    The National Association of Evangelicals

Tuesday, May 5, 2020

Inherit the Wind Character Overviews and Quotes free essay sample

A twenty-four-year-old science teacher and the defendant in the trial. A soft-spoken and humble man, Cates has been arrested for teaching his students the theory of evolution from biology textbook. His outlook on human knowledge is skeptical, and he wonders about the nature of the universe.   As his jailer, Mr. Meeker, points out, Bertram Cates is not a criminal type. A quiet, unassuming twenty-four-year-old, Cates is innocent, naive, and wondrous about the world—and he suffers emotionally as a result of the townspeople’s treatment of him. He struggles to stand up as an individual even as the crowd opposes his views and actions. Although he remains idealistic throughout Inherit the Wind, he often needs Drummond’s encouragement to persevere with his cause. Cates doubts himself at times, especially when Rachel pleads him to admit his guilt and beg forgiveness. In several instances in the play, Cates displays the humanity of an open, forgiving mind, as do the other evolutionists and progressives. Ironically, forgiveness comes more readily to Cates than to his staunchly Christian neighbors—foremost among them Reverend Brown, whose fire-and-brimstone sermons led Cates to abandon the church. Although Rachel unwittingly and unwillingly betrays Cates by testifying against him at Brady’s behest, he sympathizes with her pain as she becomes distraught during her time on the witness stand. In fact, Cates urges the court to dismiss Rachel from the stand, which denies her the chance to defend Cates when questioned by Drummond. In the end, when Cates leaves town with Rachel, we see that his trial has opened Rachel’s mind as well. Matthew Harrison Brady A national political figure and a three-time loser in presidential campaigns who arrives in Hillsboro to lead the prosecution in Cates’s trial. A Christian fundamentalist and Nebraska native, Brady defends the literal truth of the Bible against what he labels Cates’s big-city agnosticism. Drummond, however, exposes the obvious contradictions of this viewpoint, much to Brady’s embarrassment. At the beginning of Inherit the Wind, Brady arrives pompously, confident that the trial is as good as won. Scornful of the threat that Drummond might present to him as the opposing attorney, Brady exhibits hubris, or excessive pride, in failing to consider the prospect of his own humiliation. Playing on his home turf in rural Christian Tennessee, Brady basks in the glow of his simple-minded supporters’ praise. When Drummond undermines Brady’s authority, Brady breaks down, for he lacks the inner strength to reconsider his own beliefs and adjust to an unexpected challenge. We learn that Brady ran for president in three consecutive elections but never succeeded. This failure plagues him throughout his life and manifests itself during the trial. When Brady falls ill following his floundering responses to Drummond’s line of questioning, he deliriously spews forth the speech he had prepared for a possible presidential victory. Brady is a caricature of the real-life prosecutor William Jennings Bryan. Like Brady, Bryan lost three presidential elections and died shortly after the Scopes Monkey Trial. In Inherit the Wind, as in the national media in 1925, Brady’s / Bryan’s death symbolized the humiliation he suffered in the trial and the end of an obsolete brand of politics. Bryan was Democrat, but in the decades after his death, his party took on a more progressive, liberal stance. Not that conservative elements disappeared from American politics—they now exist as tenets of the Republican party. Although his politics and values are rigidly fundamentalist, Brady remains a complex character. Although he subscribes to a rather traditional brand of Christianity, he embraces more of the Bible than the Hillsboro preacher Reverend Brown does. When Brown harshly calls for eternal hellfire as punishment for Cates and all those who side with him—including even his own daughter—Brady interrupts Brown and reminds the crowd of the Christian doctrine of forgiveness. Brown’s version of Christianity, with its frequent casting out of sinners, is grounded in the harsher books of the Old Testament. Brady’s, on the other hand, recognizes the more compassionate elements of Jesus’ message and the possibilities that this compassion creates for mankind. Henry Drummond A famous lawyer from Chicago whom the Baltimore Herald sends to defend Cates. Drummond, a believer in human progress, argues for freedom of thought. The infamous criminal-defense attorney Henry Drummond arrives in Hillsboro vilified as an atheist but leaves, after losing the trial, as a hero. To the audience—and to many of the townspeople—Drummond makes a convincing case for the right of a human being to think. He accomplishes this feat by exposing the contradictions underlying his witnesses’ inherited religious beliefs. During the case, Drummond demonstrates that people know less than what they believe themselves to know. His greatest triumph in the name of free thought is getting Howard Blair to admit that he has not made up his mind about evolutionary theory. When we hear this admission, Drummond’s point becomes clear: freedom of thought becomes the freedom to be wrong or to change our minds. The world, viewed in this light, is full of possibilities. Although Drummond typically exposes the shortcomings of his subjects’ beliefs in gentle fashion, his cross-examination of Matthew Harrison Brady causes humiliation and hysteria. Brady self-destructs when his convictions about the literal truth of the Bible wither under the light of Drummond’s skepticism. Until that point, Drummond deploys his wry wit—his purple suspenders from Nebraska, his cracks about the unfairness of Brady’s title and the judge’s announcement of a Bible meeting but no evolutionist meeting—to no one’s harm, while ironically exposing the injustice that his defendant faces. While Drummond’s attack of Brady is not mean-spirited, it is devastating. At the same time, the power of Drummond’s attack stems not so much from Drummond’s wit as from the weight of Brady’s egotism, stubbornness, and arrogance as they collapse in his ranting testimony. Unlike Brady, Drummond does not conceive of truth as a set of fixed rules that can be read from a book and imposed on society. His wonder about the world, which he shares and encourages in Cates, allows him to â€Å"look behind the paint,† to interpret events for more than their obvious meanings. Drummond’s thorough examination of his witnesses’ beliefs exposes complexities and contradictions in the same way that Cates’s microscopes reveal to his students complexities of life and matter not visible to the naked eye. E. K. Hornbeck A cynical, wisecracking journalist and critic who speaks in colorful phrases. Hornbeck travels to Hillsboro to cover the trial for the Baltimore Herald. He despises Brady’s religious fundamentalism and the townspeople’s simple-minded acceptance of Brady’s views. In his column, Hornbeck portrays Cates as a hero. Rev. Jeremiah Brown The figure of religious authority in Hillsboro. Reverend Brown preaches a creed based on the fear of God and the punishment of sinners. Rachel Brown The daughter of Reverend Brown. Twenty-two-year-old Rachel teaches the second grade at the school where Cates also taught. Rachel is close friend of Cates, and their relationship has a romantic element. Rachel fears her father’s disapproval and becomes upset when Brady calls on her to testify about her personal conversations with Cates. IN DEPTH: Rachel’s romance with Cates runs parallel to her own personal development and highlights the primary conflict in the play—fundamentalism versus freedom of thought. Rachel’s budding emotions pull her away from her father, Reverend Brown, the religious leader of Hillsboro. As Rachel tells more of her story, her father and the form of Christianity practiced in Hillsboro appear more and more cruel and heartless. Rachel relates that her father always frightened her, even from a young age. He publicly confirms her fears at a town prayer meeting, when he damns her soul for supporting Cates. As Rachel’s romantic interest, Cates, who teaches evolution to his students and brings an open mind to matters of science and religion, stands in bold opposition to Rachel’s father and his views. Perhaps most important, Cates refrains from imposing his own views on others and is willing to engage in constant questioning of ideas. Throughout Inherit the Wind, these two characters—Cates and Reverend Brown—test Rachel’s loyalties. At the conclusion of the trial, Rachel separates from her father and departs with Cates—a choice that enables her personal liberation. The Judge The judge presiding over Cates’s trial. The judge conducts the trial impartially, although his personal views about the Bible’s legitimacy are in line with those of the rest of the townspeople of Hillsboro. At the mayor’s prompting, the judge gives Cates a lenient sentence after the jury’s guilty verdict. Meeker The bailiff at the Hillsboro courthouse. Meeker lets Cates in and out of his jail cell and jokes that Cates is a threat to the community. Mrs. Brady Matthew Harrison Brady’s wife. Mrs. Brady monitors her husband and nags him not to overeat. Brady calls her â€Å"Mother. † Melinda Loomis A twelve-year-old girl. Melinda believes in the Bible and fears the idea of evolution. Howard Blair A student in Cates’s science class. Howard grasps the idea of evolution in only a rudimentary way, as we see when he asks a worm in the play’s opening scene what it wants to be when it grows up. At the trial, Howard gives testimony that is used against Cates. Mrs. Krebs An outspoken Hillsboro woman. On behalf of the Hillsboro Ladies’ Aid, Mrs. Krebs serves lunch to Brady on his arrival in town. Tommy Stebbins An eleven-year-old boy who drowned while swimming in a river. Cates befriended Stebbins, who had a curious nature and enjoyed looking through Cates’s microscope. According to Reverend Brown, Stebbins was damned when he died because he was never baptized. Brown’s harsh condemnation of Stebbins disgusted Cates, who stopped attending church. Mr. Bannister A member of the jury. Bannister has read neither Darwin nor the Bible because he is illiterate. Elijah A mountain man. The illiterate Elijah sells Bibles to the townspeople and preaches his beliefs to the crowd. Mayor The mayor of Hillsboro. The mayor supports Brady and welcomes him to town by naming him an honorary colonel in the state militia. Under pressure from the state capitol, he instructs the judge to pass a lenient sentence at the trial’s conclusion. Tom Davenport The local district attorney. Davenport assists Brady during the trial. He attempts to stop Drummond’s humiliation of Brady at the end of the trial, but by the time he objects, Brady has already made a fool of himself. Harry Y. Esterbrook A radio host from WGN in Chicago. Esterbrook broadcasts the announcement of the verdict and Cates’s sentencing and cuts off Brady in the middle of his victory speech. Jesse H. Dunlap A farmer and cabinetmaker. Dunlap stands as a potential juror, but Drummond dismisses him because of his enthusiastic support of Brady. Sillers An employee at the local feed store and a member of the jury. Drummond accepts Sillers as a juror after Sillers tells him that he focuses on making a living while his wife takes care of religious matters for both of them.

Wednesday, April 15, 2020

Frederick Douglas Essays (1241 words) - Slave Narratives

Frederick Douglas Frederick Douglass' Name & the Duality of His Nature Frederick Douglass was an emancipated slave who passed from one master to another until he finally found the satisfaction of being his own; he went through almost as many names as masters. His mother's family name, traceable at least as far back as 1701 (FD, 5) was Bailey, the name he bore until his flight to freedom in 1838. His father may or may not have been a white man named Anthony, but Douglass never firmly validated or rejected this possibility. During transit to New York (where he became a freedman) his name became Stanley, and upon arrival he changed it again to Johnson. In New Bedford, where there were too many Johnson's, he found it necessary to change it once more, and his final choice was Douglass, taken, as suggested to him by a white friend and benefactor, from a story by Sir Walter Scott (although the character in that story bore only a single 's' in his name). All throughout, he clung to Frederick, to 'preserve a sense of my identity' (Norton, 1988). This succession of names is illustrative of the transformation undergone by one returning from the world of the dead, which in a sense is what the move from oppression to liberty is. Frederick Douglass not only underwent a transformation but, being intelligent and endowed with the gift of Voice, he brought back with him a sharp perspective on the blights of racism and slavery. Dropped into America during the heat of reform as he was, his appearance on the scene of debate, upon his own self-emancipation, was a valuable blessing for the abolitionists. In their struggles so far, there had been many skilled arguers but few who could so convincingly portray the evils of slavery, an act which seemed to demand little short of firsthand experience, but which also required a clear understanding of it. Douglass had both, and proved himself an incredibly powerful weapon for reform. While the identity of his father is uncertain, it is generally accepted that the man was white, giving Douglass a mixed ancestry. Mirroring this, he was also blessed with an eye that could bring into focus different perspectives and, just as many multi-racial children today are able to speak multiple languages with ease, he had the ability to translate in the most eloquent fashion between the worlds of the black man and white man. Thus, ironically, the torturous beginning of Douglass' existence was inadvertently made (by him) into a treasure for 'us' (being mainly white America). The story of the American Dream, wherein a young man, born into a hostile world, never loses sight of one goal, is not all that distant in theme from Narrative of The Life of Frederick Douglass. The story of the American Dream has been embedded deeply in our (American) culture from the beginning. Similarly anchored in the American consciousness is the presence of a 'slavery-complex'. Along these lines Douglass' role is a major one, for relatively few first-hand accounts of slavery as powerful and representative as his exist, in light of the magnitude of the crime, and few voices have been as far-reaching. More recent heirs of this 'office' such as Malcolm X have carried the torch further, just as America's racial sickness still clings to our collective consciousness. Frederick Douglass has been described as 'bicultural'. In other words, he occupied a middleground shared by blacks and whites alike. This designation proves to be thematically consistent with his biological (if we are to take his word for it) as well as psychological characteristics. Dual-natured in this fashion, he is made accountable for both sides. This can be seen in his gravitation towards freedom when he was a slave, and manifests itself just as strongly in his vision, once he was able to look back, of the 'graveyard of the mind' that American slavery was for him -- as it was for the rest of black America. "They would sometimes sing the most pathetic sentiment in the most rapturous tone, and the most rapturous sentiment in the most pathetic tone...they would sing, as a chorus...words which to many would seem unmeaning jargon, but which,

Thursday, March 12, 2020

The Works of Charles Darwin essays

The Works of Charles Darwin essays Charles Darwin had the greatest influence on the world of science by proving the evolution of living things. He had first noticed the similarities of plants and animals on the Galapagos Isles while embarking on a five-year cruise on the H.M.S Beagle. After noticing the similarities between the plants and animals on different islands, he decided to study them more closely. Charles published his first work "The Origin of Species" with the work he had collected on his voyage. In his book, he explained how Organisms had for millions of years been evolving ways to help them better survive. Darwin stated that the organisms had steadily adapted to their surroundings to ensure their survival. In his work, Darwin stated that changes were to have occurred during reproduction. The most valuable traits were to become dominant while the weaker, less valuable traits became recessive. That is why having brown eyes, as opposed to blue eyes, is a dominant trait among humans because it helps protect your eyes from the sun. To illustrate what Charles Darwin would later call "Natural Selection"; he used an example of long-necked and short-necked giraffes. The Long-necked giraffes could get to more food on higher parts of the trees. When the all food on the lower parts of the trees was consumed, the short-necked giraffes starved, and eventually died out, leaving only the long-necked giraffes to mate and pass on their traits of long necks to the next generation. This is what Darwin would call "survival of the fittest." This is also an example of how traits (such as long necks, can become dominant). Darwin also hypothesized about how humans came to have different colors of skin. He concluded that the color of your skin was greatly dependent on where you lived. People who lived in hotter places with longer hours of bright sunlight tended to have darker skin. The extra pigment helped shield them from sunburn. Once again, a perfect example of nature adapt...

Tuesday, February 25, 2020

The concept of Corporate Responsibility has been defined as 'An Essay

The concept of Corporate Responsibility has been defined as 'An umbrella term embracing theories and practices relating to how - Essay Example The society plays a very important role towards the success of a given business. The goods and services provided by a given business organization will be of value to the organization if they can be marketed within the society. The economic status of the society will determine the types of businesses that are likely to prosper in the area. The extent to which a given society reflects what is observed in the international market will influence how a given organization can adopt the international standards. Origin of corporate responsibility The market is characterized by high level of competition with the needs of customers constantly changing. Successful organizations are those that continuously monitor the changing market trends and making the adjustments as they are observed (Zadek, 2004, p.1). As a way of gaining competitive advantage, a business organization would be prompted to develop its reputation within a given society by giving back to the society (Warburton, 2004, P.2). The organization can decide to initiate charity programs aimed at social development like providing some free education scholarships or providing healthcare services to some vulnerable community (Metaxas & Tsavdaridou, 2010, p1). The views of every stakeholder in the organization need to be sought in developing these adjustment mechanisms. These are then applied towards the general development in the society. The contributions that a business organization has towards the improvement of the society have been a point of concern for the scholars, politicians and the common person in the recent years. Over a long period, ideas had been developed by businesses that suggest a need for them to contribute to the development of the society. Various organizations had opted to use their assets to improve the living standards of their employees (Blowfield, Blowfield, and Murray, 2008, p.12). These initiatives generated a mixture of views relating business to the society. It was acceptable that the businesses operated to generate profits by meeting the customer demand. However, it was noted that there would be lack of control over the amount of profit to be gained and the quality of the products given by the businesses (Blowfield, Blowfield, and Murray, 2008, p.12). Issues arose concerning the prices of goods and even the wages for the employees of an organization as to who should be responsible for setting the standards. There has also been a question as to whether the business should actually give back to the society. An attempt to derive a solution to these conflicting issues called for what we term as corporate responsibility. This involves the participation of various parties in ensuring that business activities are carried out in a manner that does not violate the rights of the individuals in the society and that it contributes to the general wellbeing of the members of the society (Taming the Corporation, 1998). The government is one such party that intervenes to enact legislations that govern procedures like wage and price establishment by the companies (Tuccille & Stone, 2003, p.6). The kind of management and leadership in the organization and specifically the roles of the leaders in the business are then important issues to be addressed. The overall responsibility of the company/organization is also considered in examining what constitutes corporate respon

Sunday, February 9, 2020

Risk Management College Essay Example | Topics and Well Written Essays - 1000 words

Risk Management College - Essay Example When the market goes up by 10%, stock B goes down by 3%. A combination of the two stocks will reduce total potential returns (since stock B is under-performing), but also reduce portfolio viability as compared to market changes. Whereas the two stocks are influenced by the market (which is the very definition of systematic risk), they change in opposite directions, which will reduce total portfolio risk. No, portfolio diversification to betas cannot entirely remove potential market risks. While unsystematic risks are eliminated in a larger portfolio, market risks still that affect most of the assets/stocks in a portfolio are not. Even entirely diversified portfolio stocks are vulnerable to market changes. Furthermore, beta coefficients are more reliable for short-term risk-assessment and can be misleading in the long-run. This is so, because beta coefficients mostly reflect past price movements, and are not reliable indicators for assets/stocks with no or recent price history (McClure, B., 2004) IPO, or the Initial Price Offering is the process of bringing private companies to the public market for the first time. The IPO represents a significant stage in the growth of a company, because it provides access to public capital markets and increases company credibility and exposure. Companies usually decide to go public because they need access to additional capital to implement long-term business strategies or use funds for acquisitions. Furthermore, this is capital that does not have to be repaid and does not involve interest payments. IPO also gives opportunities for new future stock offerings. Companies go public also to get media attention. Nowadays IPOs are used as marketing instruments to increase public awareness, and enhance brand name recognition. In other cases companies may go public to change management style and settle managerial problems using the challenging approach of capital restructuring. Task 4: What Steps Are Involved With Taking A Company Public When a company wants to offer their stock to the general public for the first time, the first step is the announcement of its intent (1), and then it usually asks an "underwriter"(2) - usually an investment banking company - to undertake this operation - in return for a fee. The underwriter agrees to pay the issuer a certain number of shares at a certain price, and then resell those shares to buyers. The underwriter and the issuer set a tentative date, and issue a preliminary prospectus (3) is with financial and business information about the issuer. The underwriter then gives presentations to people from the brokerage industry (4) to present good investment opportunities. The issuer then releases the stock to the underwriter (5), and the underwriter releases the stoc

Thursday, January 30, 2020

The Role Of Security Management Essay Example for Free

The Role Of Security Management Essay ABSTRACT Personal information security is usually considered a technical discipline with much attention being focused on topics such as encryption, hacking, break-ins, and credit card theft. Security products such as anti-virus programs and personal firewall software, are now available for end-users to install on their computers to protect against threats endemic to networked computers. The behavioral aspects related to maintaining enterprise security have received little attention from researchers and practitioners. Using Q-sort analysis, this thesis used students as end-users in a graduate business management security course to investigate issues affecting selection of personal firewall software in organizations. Based on the Q-sort analysis of end-users in relation to seven variables identified from review of the information security literature, three distinct group characteristics emerged. Similarities and differences between groups are investigated and implications of these results to IT managers, vendors of security software and researchers in information security area are discussed. ACKNOWLEDGEMENTS I would like to thank my supervisor Professor ____________ for his great supervision and guidance throughout the duration of my thesis project. I would also like to thank all colleagues for their help and support. Finally, I wish to thank my family for their continued support throughout the thesis. TABLE OF CONTENTS Page ABSTRACT†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦2 ACKNOWLEDGEMENTS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.3 TABLE OF CONTENTS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..4 LIST OF ACRONYMS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.5 CHAPTER 1 – INTRODUCTION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦6 †¢ Statement of the Problem†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦7 †¢ Research Question†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦8 †¢ Significance of the Research†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦9 †¢ Design and Methodology†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.10 Q-Sort Analysis†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.12 †¢ Organization of the Study†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦14 CHAPTER 2- LITERATURE REVIEW†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦14 CHAPTER 3 – RESEARCH QUESTION FINDINGS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.18 Data Analysis†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..18 -Analysis of Results†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦26 -Limitations of the Study†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..29 Chapter 4- SUMMARY AND CONCLUSIONS Summary†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦30 Conclusion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.31 Recommendation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..33 REFERENCES†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..34 LIST OF ACRONYMS Operational definition of these variables as it relates to the study are provided: Performance [PERF] : Refers to how well the software operates under various conditions (such as high traffic, types of data, port scans, etc.) Ease-of-use [EOU]: Refers to usability of the product (such as screen design and layout, access to features using tabs, buttons, etc.) Updates [UPDTS]: Refers to product updates at regular intervals after product has been installed and used Features [FEATR] : Refers to the number of program options and features available in software Reports [RPORT]: Refers to Intrusion Reports and log files generated by the firewall software Cost [COST]: Refers to price paid for the product (either as shrink wrapped package or as a download) Configuration [CONFIG]: Refers to setup and configuration after product has been installed Support [SUPPRT]: Refers to availability of online help and technical support either by phone or e-mail Installation [INSTLL]: Refers to initial installation of the product. Chapter 1 – INTRODUCTION Security describes a process of protection from any harm. It also describes the countermeasures put in place by that process. Harm may indicate a loss of confidentiality, integrity, and availability. Security management focuses on preventing harm resulting from both random acts of nature and intentional strategic actions (Schechter, 2004). Security is considered to be a very important issue while developing complex personal information systems (Mouratidis et al., 2002). Security is a major concern in todays digital era. The Internet offers a low cost, but insecure means of reaching people. Owing to the ubiquity of the Internet, it is difficult to control and trace intrusions or attacks by unauthorized people, hackers, etc. Electronic commerce applications need secure mechanisms for accurate user identification, accessing sensitive database, storing and transmitting sensitive information, etc. Personal identification numbers (PINs), passwords, smart cards and digital certificates are some of the means normally used for this purpose. However, these means do not really identify a person, but only knowledge of some data or belonging of some determined object (Sanchez-Reillo et al., 1999), e.g. public key infrastructure (PKI) cannot assure identity of the maker of a transaction, it can only identify the makers computer. An imposter can easily masquerade as a legitimate user and defraud the system. Information must be readily available in organizations for making decisions to support the organizational mission. Murphy, Boren, and Schlarman (2000) state that due to increased connectivity and the urgency to exchange information and data among partners, suppliers, and customers on a real time basis, the need to protect and secure computer resources is greater than ever. As a result, this has created the possibility of exposing sensitive corporate information to competitors as well as hackers who can now access organizational computer resources from remote sites. Statement of the Problem The potential loss of such information to an organization goes beyond financial losses and includes the possibility of corrupted data, denial of services to suppliers, business partners and customers, loss of customer confidence, and lost sales. Security in business processes (i.e., maintaining proper authentication, authorization, non-repudiation, and privacy) is critical to successful e-business operations. Enabling business functions over the Internet has been recognized as a major component for the success of businesses and, by mitigating risks in a cost-effective manner, security is now being viewed as a component of business operations (Deise, Nowikow, King, Wright, 2000). Decisions about information systems made by managers are vital to the success, and even survival, of a firm (Enns, Huff, Golden, 2003). Despite increased security threats, organizations have traditionally allocated very little of the total IT budget to information security. Forrester Research estimates that in Fortune 500 companies, the average amount of money as a percent of revenue that is spent on IT security is 0.0025 percent or slightly less than what they spend on coffee (Clarke, 2002). Organizations must evaluate and prioritize the optimum mix of products and services to be deployed for protecting confidentiality (maintaining privacy of information), integrity (maintaining information is not altered in transit), and availability (maintaining access to information and resources) of corporate assets. The decision to deploy certain technology is based on variables such as the organizational business model, level of risk, vulnerability, cost, and return on investment (Highland, 1993). There are several ways in which information can be protected. One method to safeguard information is by using controls. The concept of controls can be applied to financial auditing as well as technical computer security. General controls include personnel, physical and organizational controls as well as technical security services and mechanisms (Summers, 1997). Computer security controls can be hardware or software-based and may include biometric devices, anti-virus software, smart cards, firewalls, and intrusion detection systems that can be used to build the enterprise security infrastructure. Additionally, these controls may be preventive, detective, or corrective. Research Question This paper will focus on one such computer security control Personal Firewalls. Firewalls intercept traffic and make routing and redirection decisions based on policies. Some firewalls can also inspect packets and make transformation and security decisions; therefore, they are critical components in maintaining security in organizations. There are different types of firewalls, such as hardware, software, enterprise, and personal firewalls. Personal firewalls are client-based solutions that are installed on desktop/laptop computers and may be administered individually from a central location. Successful selection and adoption of firewalls (enterprise as well as personal) is based on various factors, some of which are technical while others may be behavioral. This exploratory study looks at the new genre of personal firewalls and, based on the review of the literature, attempts to answer the following research questions: 1) What are the factors that could result in successful selection of personal firewalls in organizations? 2) What are the empirical evidence to support deployment of firewall software? Significance of the Research The study hopes to shed light on behavioral aspects of information security, which may be tied to perceptions of end-users who may influence technology selection in their organization. This will provide empirical evidence to an area that has been identified as lacking in research (Dhillon Blackhouse, 2001 Troutt, 2002) and provide directions and guidance for future studies. Another significance of this study is to look at end-user perception is that it may affect how well the user does his or her part in staying vigilant to combat threats posted by hackers to organizational assets. The end-user may be a conduit to organizational data being compromised. Proper software selection as well as positive user attitude and motivation for using the software are therefore important to ensure ongoing use of personal firewall software. Kettinger and Lee (2002) address the fact that the proliferation of personal computing and individualized software, and popularity of the Internet in organizations have resulted in users playing an important role in driving IT implementation. Their study found that for users selecting their own IT applications (such as desktop software programs), there is greater user satisfaction after implementation. Grantham and Vaske (1985) also state that positive user attitudes are important predictors in continued system use. This is especially important for personal firewall use because computers are at risk at all times when connected to the Internet. In reference to software selection, Chiasson and Lovato (2001) emphasize: Understanding of how users form perceptions of software innovation would help software designers, implementers and users in their evaluation, selection, implementation and ongoing use of software. However, with the exception of some recent work, there is little research examining how a user forms his or her perceptions of innovation overtime (p. 16). The area of information security as it relates to maintaining confidentiality and integrity of data stored on personal computers can benefit from identification of factors that would make it possible to safeguard corporate assets that are at risk as a result of remote data access by employees. Software selection for deployment on company computers cuts across different user levels in terms of knowledge and level of expertise of the user. Selection of software therefore must be done to accommodate all types of users ranging from novices to experts. The latter category of users may have higher tacit knowledge of tasks to be able to compensate for the interface without realizing it (Gery, 1997). Organization of Study The purpose of this paper is to investigate self-referent perceptions of end-users, and use Q-Sort analysis to investigate factors affecting deployment of security firewall software in organizations. The paper is organized as follows: review of research on information security is presented to the reader along with extraction of variables from the literature that may determine firewall deployment in organizations; The Q-Sort Factor Analysis method used for the study is explained and the research design is provided; Along with data analysis, results of the study are then explained, which is followed by discussion and applications to practice. Due to the nature of research design used in this study, limitations are also explained. Research Design and Methodology Subjects in this exploratory research study were 31MBA students enrolled in a security and Control of Information Systems course. The students came from different backgrounds, such as finance, liberal arts, nursing, and computer science. From a business perspective, the course examined implications of information security risks faced by organizations. Although technical issues of security, such as authentication, authorization, and encryption that make electronic commerce sites successful in processing business transactions securely were also explored in the course, the primary focus in the course was from a business perspective. There was no structured lab work during class, but to gain a better understanding of security issues, students were expected to complete hands-on exercises outside class. During initial weeks, topics covered included the PWC model, TCP/IP vs. OSI models, network, e-mail, database security, digital certificates and signatures, risk assessment, and privacy issues. Also, during Week 5, students had been previously tested on the topics using short-answer type questions to determine learning competency of factual information and applications related to information security in organizations. The test score counted towards 15% of overall course grade. With coverage of the aforementioned topics, it was safe to assume that students had knowledge of current security issues facing organizations in todays economy. Because there is no consensus on the common body of knowledge acceptable for all security professionals, and since this was an exploratory study, the study was conducted in a controlled environment with ahomogenous population of students to minimize confounding by extraneous variables. Using MBA students as surrogates for professionals or executives in reference to use and evaluation of technology has also been found to be acceptable (Briggs, Balthazard, Dennis, 1996). The hands-on firewall assignment in this course covered installation, configuration, and use of one standard personal firewall software (ZoneAlarm). After students had a chance to use the software, they were asked to participate in the study. No class discussion was conducted on results of the firewall tests in case it affected students perceptions about the software, which could have influenced their response. Therefore, the data reflected individual student perception without class discussions. Students were given instructions to visit a Web site that explained the nature of the study and provided information on how the Q-sort statements should be sorted. This was important since students are more used to completing questionnaires in a survey format that use Likert scale, open-ended, or closeended questions (such as those used during end of term class evaluation of instruction), but may not be familiar with the peculiarities of the Q-sort procedure. To reduce data errors and extract usable data, instructions were presented in detail before the respondents were shown the statements for the study. Q-Sort Analysis Q-sort analysis uses a technique for studying human subjectivity (Stephenson, 1953; Brown, 1980; McKeown Thomas, 1988). It is useful in exploratory research and a well-developed theoretical literature guides and supports its users (Thomas Watson, 2002). Q-sort methodology is suited for small samples and relies on theories in the domain area being researched to develop items for analysis. A disadvantage of the Q-sort methodology is that it is not suitable for large samples, and it forces subjects to conform to certain expectations (such as fitting responses within a normal distribution). Brown (1986) suggests that 30 to 50 subjects are sufficient for studies investigating public opinion. Q-sort uses an ipsative (self-referenced) technique of sorting participants statements about subjective conditions. It is a variation of factor analysis technique that uses Q-methodology theory to analyze correlation measure (Brown, 1980). Respondents to Q-sort studies are required to sort statements into predefined normal distribution type scale in which a fixed number of items fall under each category. The rankings provide clusters of perceptions of individuals consensus and conflict, which can be used to place individuals with similar characteristics into groups for further study, hi the past, the Q-sort technique used index cards for sorting, but now Web-based data collection programs (such as WebQ) are common. Initially the statements are presented to respondents in random order, and each respondent organizes statements into predefined categories. To view entered data, the respondent also can update statement rankings to see where the statements fall under each category. One advantage of using the WebQ method is that data submission errors are reduced since the program verifies that the statements are sorted according to predefined requirements. Figure 1. WebQ questionnaire Adapted from: Brown, 1980. In this personal firewall study, the statements were to be classified by respondents as Most Important (+2), Important (+1), Neutral (O), Less Important (-1), and Least Important (-2). To provide a forced distribution that is expected in the Q-Sort methodology, respondents were given instructions to identify one statement as Most Important, two statements each as Important and Less Important, and three statements as Neutral. The instrument used is shown in Figure 1 Chapter 2-LITERATURE REVIEW In the area of information security, research has often lagged practice. Dhillon Blackhouse (2001) have stressed the need for more empirical research to develop key principles for the prevention of negative events and therefore to help in the management of security. Despite known vulnerabilities in applications and operating systems, companies continue to deploy software to stay competitive, and steps taken to secure products and services are knee-jerk reactions to media stories that are more reactive than proactive in nature. Most IT managers lack a coherent framework and concrete methodology for achieving enterprise security. A security plan that includes technology, personnel, and policies would be a much better approach to developing an enterprise security strategy. One such model is the Enterprise security Framework Price Waterhouse Coopers (PWC) model. The PWC model is comprehensive because it addresses the entire enterprise of security architecture. The model emphasizes information security strategies within the organization using a holistic rather than apiecemeal approach. The framework is based on four pillars: security vision and strategy, senior management commitment, information security management structure, and training and awareness. Within the pillars are decision drivers, development, and implementation phases. Firewalls are placed in the development phase since they are used to provide interpretation of corporate standards at the technical level. For a detailed discussion of the PWC model, the reader is referred to Murphy, Boren, and Schlarman (2000). Firewalls can be considered a last line of defense in protecting and securing information systems. Wood (1988) provided a context for information security systems planning and proposed that reactive and incremental improvement approaches to address security are harbingers of a more serious problem. Other factors identified in Woods model are the lack of top management support, information overload, insufficient staffing, and limited resources. Straub and Welke (1998) advocate using deterrence, prevention, detection, and recovery security action cycle to mitigate systems risk and use prioritized security controls. Data on computer crimes is often under-reported because companies are not willing to risk public embarrassment and bad publicity. Most companies choose to handle these incidents internally without keeping documentation or reporting to local, state or federal authorities (Saita, 2001). There is a need for unbiased empirical studies in the information security area that will provide insight into problems affecting todays technology dependent corporations and industries. With a strong need to collect and analyze computer security data, the CSI/FBI Computer Crime and security Survey is published yearly (see http:// www.gocsi.com). This study provides descriptive statistics but does not attempt to identify relationship between variables, as is expected in analytical surveys. Also, results reported in this annual survey have been identified by the publishers themselves to be potentially misleading due to the limited number of respondents and their accuracy as a result of anonymous nature of the surveys. These results have also been called into question because of lack of statistical or scholarly rigor and self-serving interest (Heiser, 2002). Despite these limitations, the CSI/FBI survey provides a useful role in comparison of yearly data for similar parameters. The area of human computer interface provides a link between the user and software applications. User satisfaction is a function of features, user interface, response time, reliability, installability, information, maintainability, and other factors.†If a products user interface catches a users attention and is simple to learn and use, and has the right price and features, then the product may gain competitive advantage (Torres, 2002, p. 15). The theory of user interface design and user involvement in completing task-based actions related to Internet and security software has been substantiated by two studies in which user interaction with peer-to-peer software (Good Kerkelberg, 2002), and PGP software (Whitten Tygar, 1999) were examined. Good and Krekelberg (peer-to-peer study) found that applications connecting to the Internet need better usability and software design to maintain integrity of information stored on a users computer. In this study, individuals assumed responsibility of keeping firewalls operational at all times. This contributed in large part to maintaining effective enterprise security. Whitten and Tygar (PGP study) found that user errors are a significant portion of computer security failures, and further concluded that user interfaces for security programs require a usability standard much different from other consumer software. (Although this study is not directly concerned with user satisfaction, but is more focused on factors that affect deployment rather than development of end-user software in a specific area, some factors may be directly tied to user satisfaction as will be shown by correlational analysis). Due to increasing mobile and off-site access by employees using cable modems, DSL connections, and wireless devices to access corporate resources, personal firewalls are a necessary component to maintain overall enterprise security in an organization. Because of the nature and availability of personal firewall software, most companies choose to acquire it rather than develop it in-house. Software acquisition that results in productivity gains and strategic advantage is of critical concern to organizations, and factors that relate to these benefits must be correctly identified and understood for software acquisition decisions (Nelson, Richmond, Seidmann, 1996). Purchase of commercial software includes identifying requirements, evaluating packages from different vendors, configuring, installing, and evaluating it either as server or client-based solution. This may further involve requirements acquisition that leads to product selection (Maiden, Ncube, Moore, 1997). As a method of selection, professionals in charge of evaluating personal firewall software could draft a feature requirements document, and evaluate vendor products by comparing available features as well as using demonstration versions of software. This would be followed by user experience with the software. As mentioned earlier, the need for user involvement in information systems has been considered an important mechanism for improving system quality and ensuring successful system implementation. It is further believed that the users satisfaction with a system leads to greater system usage (Baroudi, Olson, Ives, 1986). The requirements for software though must be as measurable as possible to enable product selection and may also use repertory grids in which stakeholders are asked for attributes applicable to a set of entities and values for cells in an entity-attribute matrix. This would produce representation of requirements in a standardized, quantifiable format amenable even to statistical analyses (Maiden, Ncube, Moore, 1997). In relation to the security area, Goodhue and Straub (1991) found company actions and individual awareness to be statistically significant in a study of perceptions of managers regarding controls installed in organizations. Chapter 3 – RESEARCH QUESTION FINDINGS Data Analysis Q-Sort analysis is a type of inverse factor analysis in which the cases (subjects) rather than statement variables (features) are clustered. As recommended by Brown (1980), a procedure that arranged statements based on responses of a single individual was used for data analysis. The responses involved statements of opinion (also called Q-sample) that individuals rank-ordered based on the feature requirements in personal firewall software. The arrayed items (Q-sort) from the respondents were correlated and factor-analyzed. The factors indicated clusters of subjects who had ranked the statement in the same fashion. Explanation of factors was then advanced in terms of commonly shared attitudes or perspectives. A review of security literature (Hazari, 2000; Northcutt, McLachlan, Novak, 2000; Scambray, McClure, Kurtz, 2001; Strassberg, Rollie, Gondek, 2002; Zwicky, Cooper, Chapman, Russell, 2000) was used to extract the following statement variables relating to requirements in persona l firewall software: performance, ease-of-use, updates, features, reports, cost, configuration, and support. Table 1. Participant ranked scores Variable Mean SD PERF 4.45 0.77 EOU 3.39 1.08 UPDTS 3.23 0.88 FEATR 3.03 0.93 RPORT 3.00 1.03 COST 2.97 1.20 CONFIG 2.55 0.85 SUPPRT 2.35 0.98 INSTLL 2.00 0.89 Prior to conducting the Q-sort analysis, ranked scores of all participants (before identifying factor groups) on each statement variable were calculated for preliminary descriptive statistics. These are shown in Table 1, where a mean score of 5 = Most Important and 0 = Least Important). Correlation between the nine feature variables shows a low level of correlation between statements. This indicates there is a high degree of independence between the statement categories as used in the analysis. This finding is important since it supports the assertion that the statements represent relatively independent factors obtained from the review of the literature. In the correlation matrix shown, Table 2 shows significant correlation (p 0.05) between cost and updates, cost and reports, ease-of-use and performance, ease-of-use and updates, and installation and support. Table 2. Correlation matrix between variables COST FEATR EOU PERF INSTLL UPDTS RPORT CONFIG SUPPRT COST 1.00 -0.21 0.27 0.18 -0.13 -0.43 -0.49 -0.08 -0.10 FEATR 1.00 -.29 0.35 -0.16 0.06 -0.17 -0.13 -0.25 EOU 1.00 0.44 0.00 -0.37 -0.27 -0.20 -0.04 PERF 1.00 -0.10 -0.11 -0.13 0.13 -0.14 INSTLL 1.00 -0.13 -0.04 0.18 -0.53 UPDTS 1.00 0.26 -0.15 0.17 RPORT 1.00 1.00 0.03 CONFIG -0.24 SUPPRT 1.00 As mentioned earlier, in Q-factor analysis, the correlation between subjects rather than variables are factored. The factors represent grouping of people with similar patterns of response during sorting (Brown, 1980; Thomas Watson, 2002). Following guidelines for Q-factor analysis, eight factors were initially identified with eigenvalues 1 (an eigenvalue is the amount of variance in the original variable associated with the factor). These factors and their percentage of variance are shown in Table 3. Table 3. Eigenvalues of unrelated factors Eigenvalues % Cumul.% 1 11.56 37.28 37.28 2 6.03 19.45 56.73 3 3.91 12.61 69.34 4 2.98 9.61 78.95 5 2.14 6.92 85.87 6 1.93 6.23 92.10 7 1.43 4.61 96.71 8 1.02 3.29 100.00 Factors selected were rotated to maximize the loading of each variable on one of the extracted factors while minimizing loading on all other factors. Factors selected for rotation are usually identified by taking those with eigenvalue greater than one (Kline, 1994). However, in this study, the more rigorous Kaiser rule of selecting factors whose eigenvalue is at or above the mean eigenvalue (in this case 3.85) was used. Factors 1,2, and 3, which represented almost 70% of total variance in data, were then subjected to principal component analysis with varimax rotation. Following rotation, a Factor Matrix indicating defining sort (i.e., respondents in agreement) identified three factor groups with similar pattern of responses. The correlation of individual respondents with factors is shown in Table 4 below. Table 4. Factor matrix of respondents (* indicates defining sort) Q-Sort 1 2 3 1 02386 -0.0398 0.8988 2 0.0227 0.1971 0.8158* 3 0.4975 -0.3790 0.5458 4 0.8575* -0.2912 0.0811 5 -0.2639 0.0196 0.7993* 6 -0.0614 0.7524* -0.2289 7 0.4014 -0.1587 0.4678* 8 0.1367 0.0728 0.9054* 9 0.5351 0.1183 0.6886* 10 0.5065 0.3263 01754 11 0.5351 0.3357 0.6886 12 0.8192* 0.7321* 0.1035 13 -0.6495* 0.3450 -0.0844 14 -0.0464 0.8598* 0.5845 15 0.6535 0.0127 0.3053 16 0.2052 0.2324 0.2452 17 -0.1340 0.4049 0.9512 18 0.7553* 0.5865 0.2987 19 0.2431 0.4049 0.6946 20 0.5983* 0.5865 -0.0334 21 0.4660 0.6533* 0.4573 22 0.5672* 0.1057 -0.3342 23 0.3501 -0.1001 0.8195 24 0.1008 0.9240* 0.0038 25 0.3329 0.0999 0.7194 26 0.2254 0.6545* 0.1329 27 0.7660* 0.1246 0.5677 28 -0.1210 -0.3611* 0.2308 29 0.3850 0.7032* 0.0144 30 0.4656 0.5605 -0.3196 31 -0.1987 0.8988* 0.2470 % explained variance 21 22 26 From Table 4 it can be observed that for Factor 1, respondents 4, 12, 13, 15, 18,20,22, and 27 were in agreement and are highly loaded on this factor. Similarly, respondents 6, 10, 14, 16, 21, 24, 26, 29, and 30 were in agreement in Factor 2, and respondents 5,7,8,9,11,17,19, and 23 were in agreement in Factor 3. The statements in which these three factor groups were ranked are shown in Table 5. Table 5. Ranked statement totals with each factor No. Statement Factor 1 Factor 2 Factor 3 1 COST 0.31 5 0.91 2 -1.45 9 2 FEATR -0.45 7 0.10 5 0.70 2 3 EOU 0.91 2 0.63 3 -0.55 6 4 PERF 1.26 1 1.72 1 1.80 1 5 INSTLL -1.92 9 -0.31 6 -0.63 7 6 UPDTS 0.52 3 -0.54 7 0.61 3 7 RPORTS 0.03 6 -1.28 8 0.55 4 8 CONFIG -1.07 8 0.12 4 -0.17 5 9 SUPPRT 0.41 4 -1.34 9 -0.87 8 Table 6 shows correlation between the factors. Similar to the findings earlier about variable independence, the factor groups also show a high degree of independence. Table 6. Correlation between factors Factor 1 2 3 1 1.0000 0.3218 0.2970 2 0.3218 1.0000 0.2298 3 0.2970 0.2298 1.0000 The normalized factor scores for each factor were examined next. This provided ameasure of relative strength of importance attached by a factor to each statement on the scale used during sorting. Tables 7(a), 7(b), and 7(c) show these scores. Table 7(a). Normalized Factor 1 score No. Statement z-score 4 PERF 1.258 3 EOU 0.910 6 UPDTS 0.542 9 SUPPRT 0.409 1 COST 0.314 7 RPORT 0.032 2 FEATR -0.454 8 CONFIG -1.071 5I INSTLL -1.922 Table 7(b). Normalized Factor 2 score No. Statement z-score 4 PERF 1.717 1 COST 0.905 3 EOU 0.626 8 CONFIG 0.116 2 FEATR 0.102 5 INSTLL -0.313 6 UPDTS -0.535 7 RPORT -1.276 9I SUPPRT -1.343 Table 7(c). Normalized Factor 3 score No. Statement z-score 4 PERF 1.805 2 FEATR 0.702 6 UPDTS 0.606 7 RPORT 0.553 8 CONFIG -0.170 3 EOU -0.547 5 INSTLL -0.632 9 SUPPRT -0.872 1I COST -1.446 From the Table 7(a) it can be seen that adherents of Factor 1 feel strongly in favor of statement 4 (Performance) and oppose statements 8 and 5. This indicates for Factor 1 group, performance is preferred over initial installation, setup and configuration of the product. The results of Factor 2 group are consistent with Factor 1; that is, performance of the product is the highest rated criterion. Ease-of-use also rated highly in Factors 1 and 2. Perceived ease-of-use in an information systems product has been shown to play a critical role in predicting and determining a users decision to use the product (Hackbarth, Grover, Yi, 2003). The largest dissension between Factor 1 and 2 groups involved statements 9 (Availability of Online Help), 7 (Intrusion Reports generated), and 6 (Regular Product Updates). The results of Factor 3 are consistent with Factors 1 and 2 with Performance criteria once again being highly rated. The most dissension between Factors 2 and 3 involved statements 1 (Cost) and 3 (Ease-of-use). The most dissension between Factors 1 and 3 involved statements 1 (Cost), 3 (Ease-of-use), and 9 (Availability of Online Help). Analysis of Results The Q-sort analysis classified subjects into three groups. Eight subjects were classified under Factor 1, and 10 subjects each were included in Factors 2 and 3. There were three subjects in the study that were not distinguished in any group. These subjects were excluded from further analysis. The classification into factors gave a better idea of group characteristics. Since Factors 1 and 2 were similar and shown to include subjects who considered Performance, ease-of-use, and Availability of Online Help as the most important characteristics, this group can be considered to be comprised of non-technical users who place more emphasis on the product performing as expected in achieving goals for security. Factor 3 subjects emphasized technical characteristics and were more interested in number of features in the product, updates to the product on a regular basis, intrusion reports generated by personal firewalls, and setup/configuration of the product after installation. This group had c haracteristics of technical users. The normalized factor scores provided a measure of relative strength of importance attached by factors to each statement on the scale used during sorting. As mentioned earlier, adherents in Factor 1 felt strongly in favor of statement 4 (Performance) and opposed statements 8 (Setup/configuration) and 5 (Installation). The results of Factor 2 are consistent with Factor 1, that is, Performance of the product is the highest rated criterion. ease-of-use also rated highly in Factors 1 and 2. The largest dissension between Factor 1 and 2 groups involved statements 9 (Availability of Online Help), 7 (Intrusion Reports generated), and 6 (Regular Product Updates). The most dissension between Factors 2 and 3 involved Statements 1 (Cost) and 3 (Ease-of-use). Results of Factor 3 were consistent with Factors 1 and 2, with Performance criteria once again being highly rated. The largest dissension between Factors 1 and 3 involved statements 1 (Cost), 3 (Ease-of-use), and 9 (Availability of Online Help). Extreme differences between all factors appeared in Cost, Intrusion Reports generated, and Availability of Online Help. There was only one statement, Performance of the product, that showed consensus among all factors; that is, it did not distinguish between any pair of factors, which indicates Performance of the desktop firewall software is an agreed upon criterion irrespective of group characteristics. The managerial implications of this study can be assessed at the level of selecting appropriate software for use on computers in organizations to maintain security. There is evidence of user satisfaction being a useful measure of system success (Mahmood et al., 2000). While the end-user may not purchase individually preferred software for installation on company owned computers, the user can influence decisions for selection by making known to IS managers the features that would contribute to regular use of security software such as personal firewalls. Given access of these machines to corporate resources, appropriate and regular use of software would contribute to maintaining enterprise security. For technical professionals (e.g., programmers) who install firewalls on their desktop, programs could emphasize the statements that are defining characteristics shown in Factor 3. For an industry that has non-technical professionals (such as Factor 1 and 2), other non-technical characteristics of the product could be emphasized thus achieving maximum effectiveness in program deployment. Increased awareness should minimize user related faults, nullify these in theory, and maximize the efficiency of security techniques and procedures from the users point of view (Siponen, 2000). The results of this study could also benefit vendors who develop software for end-users. In this study it was found that performance of the software is the most important factor that affects selection of software, irrespective of group characteristics. Due to project deadlines and market competition, software is often shipped without being fully tested as secure, and standard industry practice is to release incremental service packs that address security issues in the product. In a case of security software, this may adversely affect the reputation of a vendor once its products have been shown to have high vulnerability to being compromised. The findings of this study could provide a better understanding of importance of personal firewall security software on organizational client computers. The decision to install an information system necessitates a choice of mechanisms to determine whether it is needed, and once implemented, whether it is functioning properly (Ives, Olson, Baroud i, 1983). More research needs to be done in the area of selection of software for implementation on users computers that are owned by corporations and given to employees for off-site work. This can include regular employees vs. contractors who may connect to employer and client networks from the same computer. If the findings are to have wider applicability, qualified industry professionals and security officers responsible for maintaining secure infrastructure in corporations should be included in the analysis. The study provides management and security professionals a basis for making decisions related to enterprise security. It provides personal firewall vendors an insight into feature requirements of the personal firewall market, and provides academic researchers interested in security, a more focused approach on various dimensions of security software from the behavioral perspective. Future studies could be industry and product specific in order to assess differences in selecting general- purpose software versus security specific products. In many cases, management has looked at the need for implementing information security programs and products as a necessary encumbrance, something akin to paying taxes or insurance premiums (Highland, 1993). But organizations are increasingly becoming aware of the potential for legal exposure via lawsuits, and are deploying countermeasures (such as personal firewalls) to reduce vulnerability and mitigate risk. The chief information security officer in todays organizations should have the responsibility of managing organizational risks by using empirical models and analysis to determine strategies for protecting corporate assets. Firewalls are the last line of defense in the corporate network and therefore play a critical role in information security. With personal firewalls being a new product genre, this study was conducted since there is no research available that specifically looks at determinants for selection of security software in a corporate environment to protect organizational assets. As the information security field evolves further, decisions for security software acquisitions need to be researched further. Selection and deployment of appropriate firewalls can make a significant difference in an organizations enterprise security strategy. It is therefore also important to understand the variables (as shown in this study) that may affect decisions to select and deploy personal firewall software in a corporate environment. Limitations of the Study Due to the exploratory nature of this study, there are several limitations. The sample used in the study comprised of all students enrolled in a security course at the same university, and was further limited to the firewall topic among a wide range of technical and behavioral information security topics. Students worked with only one type of firewall software and characteristics of this particular program may have heightened their awareness of certain strengths and weaknesses in the software. Since the purpose of information security implementation in an organization is to support business objectives of the organization, information security departments are sometimes placed under the chief financial officer recognizing the direct relationship between information assets and monetary assets. Software acquisition decisions may therefore be made by the finance department with limited input from the IT department. The purpose of this study was to explore an important topic for research on information security and determine operant subjectivity in a field where empirical research is severely lacking. The Q-sort technique itself is suitable for small sample populations (Thomas Watson, 2002), but the correlations obtained in smaller samples tend to have considerable standard errors (Kline, 1994). The exploratory nature of this study was not intended to prove some general proposition but to seek a better understanding of group characteristics that directly relate to maintaining a secure network environment (in this case by deploying personal firewalls to plug possible vulnerabilities that might exist in a network through use of computers by employees either on-site or at remote locations). The perceptions of end-users will therefore guide the selection and deployment of security technologies in an organization to provide a secure corporate environment. Chapter 4- SUMMARY and CONCLUSIONS Summary In the area of information security, research has often lagged practice. Dhillon Blackhouse (2001) have stressed the need for more empirical research to develop key principles for the prevention of negative events and therefore to help in the management of security. Despite known vulnerabilities in applications and operating systems, companies continue to deploy software to stay competitive, and steps taken to secure products and services are knee-jerk reactions to media stories that are more reactive than proactive in nature. Most IT managers lack a coherent framework and concrete methodology for achieving enterprise security. A security plan that includes technology, personnel, and policies would be a much better approach to developing an enterprise security strategy. One such model is the Enterprise security Framework Price Waterhouse Coopers (PWC) model. The PWC model is comprehensive because it addresses the entire enterprise of security architecture. The model emphasizes information security strategies within the organization using a holistic rather than apiecemeal approach. The framework is based on four pillars: security vision and strategy, senior management commitment, information security management structure, and training and awareness. Within the pillars are decision drivers, development, and implementation phases. Firewalls are placed in the development phase since they are used to provide interpretation of corporate standards at the technical level. For a detailed discussion of the PWC model, the reader is referred to Murphy, Boren, and Schlarman (2000). So it is important reason to look at end-user perception as it may affect how well the user does his or her part in staying vigilant to combat threats posted by hackers to organizational assets. The end-user may be a conduit to organizational data being compromised. Proper software selection as well as positive user attitude and motivation for using the software are therefore important to ensure ongoing use of personal firewall software. Kettinger and Lee (2002) address the fact that the proliferation of personal computing and individualized software, and popularity of the Internet in organizations have resulted in users playing an important role in driving IT implementation. Their study found that for users selecting their own IT applications (such as desktop software programs), there is greater user satisfaction after implementation. Grantham and Vaske (1985) also state that positive user attitudes are important predictors in continued system use. This is especially important for personal firewall use because computers are at risk at all times when connected to the Internet. In reference to software selection, Chiasson and Lovato (2001) emphasize: Understanding of how users form perceptions of software innovation would help software designers, implementers and users in their evaluation, selection, implementation and ongoing use of software. However, with the exception of some recent work, there is little research examining how a user forms his or her perceptions of innovation overtime (p. 16). The area of information security as it relates to maintaining confidentiality and integrity of data stored on personal computers can benefit from identification of factors that would make it possible to safeguard corporate assets that are at risk as a result of remote data access by employees. Software selection for deployment on company computers cuts across different user levels in terms of knowledge and level of expertise of the user. Selection of software therefore must be done to accommodate all types of users ranging from novices to experts. The latter category of users may have higher tacit knowledge of tasks to be able to compensate for the interface without realizing it (Gery, 1997). Conclusions In this study, Q-methodology was used to define participant viewpoints and perceptions, empirically place participants in groups, provide sharper insight into participant preferred directions, identify criteria that are important to participants, explicitly outline areas of consensus and conflicts, and investigate a contemporary problem relating to desktop firewalls by quantifying subjectivity. Similar to other IT areas, security software selection and deployment in todays environment faces many challenges, such as staying current with new threats, project deadlines, implementation issues, and support costs. Quality drives customer satisfaction and adoption of software. Human factors are important in contributing to successful software deployment in organizations, especially when it relates to desktop software applications. Organizations are now viewing security and controls as business enablers and desktop firewall technology plays a critical role in safeguarding corporate assets. In a fast-paced area where the new generation of applications and services are growing more complex each day, it is critical to understand characteristics that affect selection of end-user security products in enterprises. This study addresses a small but important area of safeguarding enterprise information security by using personal firewalls. As has been previously noted, limited research exists beyond the current study that explores behavioral aspects of information security. This study holds importance for professionals tasked with evaluating and selecting security products for company wide deployment. As the area of information security gains increased importance due to the strategic role of technology in organizations, and current events impact areas such as disaster recovery and enterprise continuity planning, a study of end-users to determine their perceptions about selection of technology controls in organizations is critical for protecting organizational assets. More research needs to be done in the area of perception of users towards other security software (such as anti-virus, intrusion detection, virtual private network software, and encryption products), and, due to varying security needs in different industries, studies could also be industry and product specific. While the findings should be considered preliminary, the results raise interesting observations about issues uncovered regarding security perceptions of feature requirements in personal firewalls. Information security is a dynamic area and, in this environment, this exploratory study contributes to evolving research by identifying variables from theoretical literature and using an empirical technique to study issues that affect safeguarding vital assets of an organization from internal and external threats. Recommendation It is recommended that in order to provide better evidence of factors that affect deployment of technology tools that create awareness of security issues and produce better informed employees, research into behavioral factors also needs to be conducted to gain insight into programs and processes that will lead to the development of a robust enterprise security strategy. Information security awareness research has been mostly descriptive and has not explored the possibilities offered by motivation/behavioral theories, or the related theory of planned behavior and the technology acceptance model, specifically in the information security domain (Mathieson, 1991 ; Siponen, 2000; Legris, Ingham, Collerette, 2003). Since security has been deployed at the perimeter of electronic network and on servers by system administrators, the area of information security has ignored users of information systems since software developers are far removed from how the user will interact with security software. Human compliance with information security rules require an understanding of how people work and think (Highland, 1993). Lane (1985) considers the human factor to be the first and most important component of security and a critical part of the risk analysis process. This is especially true in personal firewall software since the burden of maintaining a secure environment is being shared by the user and the system administrator. REFERENCES Baroudi, J., Oison, M., Ives, B. (1986). An empirical study of the impact of user involvement on system usage and information satisfaction. Communications of the ACM, 29(3), 785-793. Briggs, R.O., Balthazard, P.A., Dennis, A.R. (1996). Graduate business students as surrogates for executives in the evaluation of technology. Journal of End-user Computing, 8(4), 11-17. Brown, S.R. (1980). Political subjectivity: Applications of Q methodology in political science. New Haven, Connecticut: Yale University Press. Brown, S.R. (1986). Q-technique and method: Principles and procedures. In W.D. Berry M.S. Lewis-Beck (eds.), New Tools for Social Scientists: Advances and Applications in Research Methods. Beverly Hills, CA: Sage Publications. Chiasson, M., Lovato, C. (2001). Factors influencing the formation of a users perceptions and use of a DSS software innovation. ACM SIGMS Database, 32(3), 16-35. Clarke, R. (2002, February). Forum on technology and innovation: Sponsored by Sen. BillFrist (R-TN), Sen. Jay Rockefeller (D-WV), and the Council on Competitiveness. Retrieved October 28,2003, from hap:/ /www. techlawjournal, com/security/ 20020214.asp Deise, M., Nowikow, C., King, P., Wright, A. (2000). Executive s guide to e-business: From tactics to strategy. New York: John Wiley Sons. Dhillon, G., Blackhouse, J. (2001). Current directions in IS security research: Toward socio-organizational perspectives. Information Systems Journal, 11(2), 127-153. Enns, H., Huff, S., Golden, B. (2003). CIO influence behaviors: The impact of technical background. Information and Management, 40(5), 467-485. Gery, G. (1997). Granting three wishes through performance-centered design. Communications of the ACM, 40(7), 54-59. Good, N., Krekelberg, A. (2002). Usability and privacy: A study of Kazaa P2P file-sharing. Retrieved November 12, 2003, from http:// www. hpl. hp. com/shl/papers/kazaa/ Goodhue, D.L., Straub, D.W. (1991). security concerns of system users: A study of perceptions of the adequacy of security measures. Information Management, 20(1), 13-27. Grantham, C., Vaske, J. (1985). Predicting the usage of an advanced communication technology. Behavior and Information Technology, 4(4), 327-335 Hackbarth, G., Grover, V, Yi, M. (2003). Computer playfulness and anxiety: Positive and negative mediators of the system experience effect on perceived ease-of-use. Information and Management, 40(3), 221-232. Hazari, S. (2000). Firewalls for beginners. Retrieved December 17,2003, from http://online.securityfocus.com/ infoc Heiser, J. (2002, April). Go figure: Can you trust infosecurity surveys? Information security, 27-28.us/1182. Highland, HJ. (1993). A view of information security tomorrow. In E.G. Dougall (ed.), Computer security. Holland: Elsevier. Ives, B., Olson, M., Baroudi, J. (1983). The measurement of user information satisfaction. Communications of the ACM, 25(10), 785-793. Kettinger, W., Lee, C. (2002). Understanding the IS-User divide in IT innovation. Communications of the ACM, 45(2), 79-84. Kline, P. (1994). An easy guide to factor analysis. London: Rutledge Lane, YP. (1985). security of computer based information systems. London: Macmillan. Legris, P., Ingham, J., Collerette, P. (2003). Why do people use information technology? A critical review of the technology acceptance model. Information and Management, 40(3), 191-204. Mahmood, M.A., Burn, J.M., Gemoets, L.A., Jacquez, C. (2000). Variables affecting information technology enduser satisfaction: Ameta-analysis of the empirical literature. IntemationalJournal of Human-Computer Studies, 52, 751-771. Maiden, N., Ncube, C., Moore, A. (1997). Lessons learned during requirements acquisition for COTS systerns. Communications of the ACM, 40(12), 21-25. Mathieson, K. (1991). Predicting user intentions: Comparing the technology acceptance model with the theory of planned behavior. Information Systems Research, 3(2), 173-191. Murphy, B., Boren, R., Schlarman, S. (2000). Enterprise security architecture. CRC Press. Retrieved November 2, 2003, from http://www.pwcglobal.com Nelson P., Richmond W. , Seidmann A., (1996). Two dimensions of software acquisition. Communications of the ACM, 39(1), 29-35. Northcutt, S., McLachlan, D., Novak, J. (2000). Network intrusion detection: An analysts handbook (2nd ed.). IN: New Riders Publishing. Saita, A. (2001, June). Understanding peopleware. Information security, 72-80. Siponen, M.T. (2000). A conceptual foundation for organizational information security awareness. Information Management security, 5(1), 31-41. Strassberg, K., Rollie, G., Gondek, R. (2002). Firewalls: The complete reference. NY: Osborne McGraw-Hill. Straub, D.W., Welke, RJ. (1988). Coping with systems risk: security planning models for management decision making. MS Quarterly, 22(4), 441-469. Zwicky, E., Cooper, S., Chapman, D., Russell, D. (2000). Building Internet firewalls (2nd ed.). CA: OReilly.