Wednesday, May 6, 2020

Independence Day of Bangladesh free essay sample

Bangladesh is surrounded by India, Myanmar and the Bay of Bengal. A republic in south Asia, Bangladesh was formerly East Pakistan, one of the five provinces into which Pakistan was divided at its creation, when Britains former Indian Empire was partitioned in August 1947. East Pakistan and the four western provinces were separated by about 1600 km of Indian territory. East Pakistan was formed from the former Indian province of East Bengal and the Sylhet districts of Assam. Although the East was more populous, government was based in West Pakistan. From the very inception of its formation, language remained the most problematic issue. Same status for Bengali language with Urdu and English was the demand and the movement involving all sections of the people of East Pakistan gave a strike call on 21 Feb, 1952. On that very day, police fired on a students rally and several students died. Since then the day has been observed as the Language Day (Bhasa Divas). We will write a custom essay sample on Independence Day of Bangladesh or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page East Pakistan became and independent entity named Bangladesh on 16, December, 1971, following civil war in which India actively supported the East. Leader of this independence movement, Sheikh Manipur Rahman became the first prime Minister. In January 1957 parliamentary government was replaced by a presidential form of Government. Sheikh Manipur Rahman became President, assuming absolute power. In February, Bangladesh became a one-party state. On 15 August, 1957 Sheikh Manipur and his family were assassinated in a coup. Chief of Army Staff, Major-Gen. Ziaur Rahman (Gen. Zia) took over power on 7 November, 1957. In June 1978 the countrys first direct presidential election resulted in a victory for Zia, who formed a Council of Advisers. Parliamentary elections followed in February 1979, in which President Ziaur Rahmans Bangladesh Nationalist Party (BNP) won 207 of the 300 directly elective seats in the Jatiya Sangsad. Political instability recurred, however, when Gen. Ziaur was assassinated on 30 May 1981 during an attempted military coup. The elderly Vice-President , Justice Adbus Sattar, took over as acting President but was faced with Strikes and demonstrations over the execution of several officers who had been involved in the coup. On 24 March, 1982 there was a bloodless Military coup, by which Lieut. Gen. Ershad became chief martial law administrator. President Sattar was deposed. The Constitution was suspended and Parliament ceased to function. Assanuddin Chowdhury was sworn is as civilian president on 27 March. Lieut. Gen. Ershad assumed the presidency on 11 Dec,1983. Although the Governments economic politics achieved some success and gained a measure of popular support for Ershad, the all party alliance of MRD Movement for the Restoration of Democracy gained momentum. In Jan 1986 a National Executive Committee was formed and the National Party launched, composed of government supporters. Gen. Ershad was re-elected President on 15 October, 1986. Gen. Ershad was deposed and arrested after a popular uprising in December 1990. Mr Shahabuddhin Ahmed took over as Acting President. In the general elections held in February 1991 Bangladesh National Party led by Begum Khaleda Zia won 140 seats. Begum Zia was sworn in PM. In the general elections help in June, 1996, Awai League won 146 seats and Sheikh Hasina Wazed, daughter of the late Sheikh Mujibur Rahman, became the PM of Bangladesh. Jatiya Party quit the Govt in Mar 98.

Friday, May 1, 2020

Victoria Protective Data Security Framework-Myassignmenthelp.Com

Question: Discuss About The Victoria Protective Data Security Framework Answer: Introducation Based on figure I above, there are two main categories of threats to the VIC government public sector data, based on the Victoria Protective Data Security Framework; internal threats and external threats. The internal threats are further subdivided into employee risks/ threats, where the employees are the cause of security risks. Employee risks can further be subdivided into intentional/ malicious threats and unintentional threats. The intentional threats/ risks include malicious theft of information for monetary gain or just malice where a staff member intentionally steals and shares sensitive information with malicious third parties. This may also be achieved by staff leaving backdoors for attackers to access the VIC public sector information without authorized access, such as by not implementing strong security policies in access points such as on routes and external access. Unauthorized access to information or editing information deliberately, such as overwriting or deletion of public sector data is another form of intentional security risks. Unintended internal risks from staff/ employees include accidental deletion, overwriting, or editing of information, or failure to save edited information, causing malware infection by using external storage devices that are infected, or exposing the VIC public sector data by exposing access credentials. Inability to follow set ICT security policies either due to ignorance or lack of such policies is also another unintended internal risk. Another source of internal risks includes organizational culture that is due to several factors of omission and commission. These include poor security policies such as failure to use strong passwords, not updating/ patching software regularly, and inability to constantly review and update security policies and threats, and noncompliance. Other factors/ causes for risks due to organizational culture include hiring ICT staff that do not meet the standards (are unqualified) and using external vendors without vetting. Cultural issues also include lack of clear policies such as restricting access to specific information, failure to encrypt information, poor setup for data bases and backups, and inability to undertake sensitization initiatives on ICT risks to educate users/ employees. Because there is increased use of the internet, there are other extern al risks that include cyber-attacks, loss of data due to disasters, and risks of data loss/ theft due to external service providers, such as cloud service providers or software/ device providers and vendors whose products fail, or have vulnerabilities that malicious persons exploit. The table below further classifies these risks into high, medium, medium-low, and low level risks. Classification of Risks Risk source Risks and Their Classification High level risk Medium level risks Medium-Low level risks Low level risks Internal risks Deliberate internal risks Deliberate data theft Deliberate backdoors Deliberate deletion/ modification/ editing of VIC public sector data Unintended internal risks Ignorance of security policies or lack of them thereof Accidental deletion/ modification/ editing of VIC public sector data Use of external infected storage devices Opening infected files or clicking links to exploit sites through e-mail Organization culture risks Hiring of unqualified/ incompetent IT staff Understaffing IT security staff Lack of/ inadequate management support Noncompliance with Victoria Protective Data Security Framework (VPDF) Failure to update and patch software, firmware Poor administration in access control Failure to continuously review and update ICT security policies Poor setup of ICT resources such as failure to back-up, implement RAID systems (bad system architecture) Poor SLA agreements with cloud providers External risks Cyber attacks Malware, DoS, DDoS, viruses Phishing Data loss Data loss due to disasters such as fires, unreadable data Comparative Analysis of Deliberate and Accidental Threats Deliberate threats include intentional threats and risks to the VIC public sector data accruing from deliberate and intentional actions that pose risks to data. Such risks are usually due to human intervention/ mediation. For instance, one of the biggest deliberate threats to data is theft of such data either out of malice or for financial gain in which a staffer deliberately exposes or gives confidential public sector data to third parties with malicious intent, such as hackers or scammers. This can also happen when a disgruntled staff member, such as a fired/ demoted employee providers malicious entities with passwords for accessing confidential public sector data. This can happen where staff steals data from internal servers or from the cloud storage servers for which they have access. This is a very high level risk, since security policies can be overridden by such actions/ threats. These attacks carry huge risks because there is a high potential for sensitive data being exposed to the public, or personal details being stolen and sold for financial gain, with few options for detection of such actions (Rowe, Akman, Smith Tomison, 2013). Deliberate threats can also be external in which malicious entities use various tools to access and misuse/ exploit the VIC public sector data. Such exploits are undertaken through phishing, malware attacks; for instance, sending files/ links containing malware to staff e-mail accounts that then gives the hackers access to the public sector data. These are done using malware such as ransom-ware, worms, viruses, or Trojans that either gain access to the public sector data and steals and sends the information over the network, or denies the users access to this data. Such attacks can also result in theft and loss of access to crucial data where the attackers demand ransom, as happened in the UK when the National health Services (NHS) computer systems were attacked by a deadly ransom-ware (Fox News, 2017), or permanent deletion of information, such as the attack on Aramco, the Saudi Arabia petroleum company where all its data stored in computers and servers were permanently deleted in a matter of minutes (Perlroth, 2012). Such deliberate attacks can also lead to data loss, as happened in Australia and other countries where a malware propagated itself over networks, attacking office and home computers and encrypting files such that users could not access them (Griffith, 2017). Such deliberate risks are the most dangerous, with their risk level being very high and high risks. The reason why they are very high or high risk threats is because of the potential/ possible level of damage, as well as the difficulty in controlling/ preventing them. While cyber-attacks can be prevented/ mitigated through such security measures as implementing strong firewalls and using network analysis tools that are regularly patched and updated, along with networks isolation use of antimalware software, malware attacks have become even more sophisticated (Bakhtiyari Ismail,2012). Malware have become sophisticated and stealthy by confusing detection tools, such as through multiple stage loading, environmental awareness, obfus cation of internal data, and time based evasion techniques (Mazurczyk Caviglione, 2015). Such deliberate attacks, either internal or undertaken by external entities are very destructive; hence their classification as being either very high or high risk attacks (Choo, 2011). Accidental threats also pose huge risks to data security; while such actions are unintended, the consequences can also be massive. For instance, when a user accidentally deletes or overwrites, or edits but fails to save sensitive data such as that stored in the cloud; such data may not be recoverable, or have a steep price for recovery. Third party vendors, contractors, and even staff with privileged access to certain data have caused breaches to data by accident. The vast majority of data breaches such as network openings or malware invasion have been caused by innocent accidents, such as when a user accidentally overwrites data (Durbin, 2016). While such innocent accidents can lead to the loss of data, modern public (and private)organizations employ measures where data is backed up in real time; such mistakes and errors can also be rectified through instant data recover, for instance, for accidentally deleted data, or data reconstruction and editing (Rashmi et al., 2015). However, the problem becomes exacerbated when employee or vendor mistakes open doors for external entities such as hackers; this can happen by vendors not updating or patching their software and firmware, or when an employee opens a mail with malware embedded in them, or clicks links to malicious sites that then initiate attacks that, for instance, erase data and lead to theft of data. In such cases, there is a confluence of both accidental mistakes and external cyber threats that amplify the effect of the accidental threats. In retrospect, therefore, accidental threats are ranked as medium to high; given that some accidents can be rectified (medium threats) while some accidents can open doors to more serious risks and threats to public sector data, such as malware attacks or identity theft (Rasmi et al., 2015). Challenges the VIC government will face in deciding whether ICT security should be handled internally or outsource ICT security for public sector data is highly critical; being a government agency, the VIC government will most definitely be attacked, either through internal or external risks. The challenge is in whether security should be handled in-house or be outsourced to professionals. While outsourcing security has its benefits; there are also several challenges. Existing laws may prevent, or hinder access to personal information by third parties. Outsourcing essentially implies that aspects of data management, such as processing or storage/ backups are done by external third party organizations (Libicki, 2000). Under the Australian Privacy Act, an entity such as the VIC government is the holder the public sector data for its citizens; and so it is obliged to ensure this data and information remains private, even if such data management, such as storage is outsourced to third parties, but its the VIC government with express authority and right to deal with the information. For instance, stor ing public information in the cloud, a service offered by third parties may allow the vendors including human resource) software vendors to have access to the VIC public sector information data bases through shared storage of log-in ID. Further, the third party to which the security is outsourced may make mistakes or lead to data security breaches, through acts of omission or commission; the VIC government will still remain liable for such data breaches. Outsourcing security, a concept termed ISO (information security outsourcing) has the challenge of creating complexities, in environments that are less secure, while the organization is still supposed to be responsible for such data. ISO is a concept that has still not been adopted significantly, with research showing that 59% of firms outsource some aspects of their information security, such as penetration testing. However, just 13% of organizations have reported, according to the same research, to have adopted full ISO. When many vendors are involved, there are added complexities although some risks (pertaining to security) are reduced. Outsourcing requires an elaborate ICT security framework to evaluate risks pertaining to information integrity, confidentiality, and availability where many different vendors are to be evaluated. This approach also creates a new security model that must be evaluated. Looking at the other aspect of in-house security management; the risk profile and analysis show that internal threats are exacerbated by cultural issues, such as lax security measures. Generally, public organizations tend to be more lax on ICT security compared to private organizations. Further, a systematic cultural issue can be multiplied at different levels of the organization, further enhancing the threat of both internal and external ICT security threats. Because governments are not premier ICT service businesses, there is a tendency to have unsuitable internal security policies or gaps in implementing the outlined security policies. The best approach, therefore would be to adopt ISO but with a new security and risk profile assessment or use a hybrid model between outsourcing some security aspects, such as encryption and before-incident analysis of all threats before they reach the governments actual servers. The VIC government can also institute better security protocols such as restricted access and other measures including updating and patching anti malware and network devices firmware, while ensuring only authorized persons can access data. ISO becomes feasible when combined with cloud computing to improve security and business process continuity in case of a disaster where data is lost; the VIC government can continue offering services through the cloud restoration and backup platform. Further, the risk profile shows that vendor threats are medium to high, but internal threats are high or very high. Risk and Uncertainty Risk refers to the potential to either gain or lose value; since risk is a probability, it can be given a value to make it quantitative, for example, the probability of suffering a cyber-attack for Vic government is once every four months. The risk helps to create a risk profile that can then be used to hierarchically classify risks, and then deal with them based on the risk level (Lloyd, 2008). Uncertainty, on the other hand, is a qualitative and merely perceptive, it is the level of doubt over something, for instance, the margin of error for measuring a security risk. It does not have a straightforward description, although it is always present; for example, whether the VIC government should adopt ISO or depend on in-house ICT security measures; there is uncertainty on data security if it adopted ISO. Different approaches VIC government can use for risk control The VIC government can use a hybrid and integrated approach to ICT risk control in handling public data; the risk management profile should begin internally before some aspects can be outsourced. Internally, the government should implement the VPSF in Toto. The first line of defense is to undertake a comprehensive security and risk analysis and then, using the VPSF framework, develop a security policy that is updated regularly. The security policy should ensure that access to information is restricted and on a need-to-use basis. For sensitive information or those stored in the cloud, and for certain actions, such as modifying, deleting, or transferring data, and the user must be authenticated using a two-step log-in process involving mobile (Almutairi et al., 2012). For cloud applications, there must be strong APIs that are designed to automatically log out when there is no activity for a given period. VIC should also implement regulations for restricted area IT rooms to control acce ss using biometrics (Akhgar Arabnia, 2014). Users must have strong password authentication and administrators must constantly monitor logging activity, with actions such as downloading databases being restricted. The network devices such as wireless access points must have strong encrypted passwords and data should be sent in encrypted format. The VIC government should adopt a hybrid cloud and virtualization to back up its data in case of data loss, in multiple geographical locations with providers (Stair Reynolds, 2015). Further, the government must use basic security measures including physical and software firewalls, network analysis and monitors, antimalware, all which must be updated regularly; same for firmware patches (Brown, 2014). The VIC government an outsource security monitoring for the network where a company like RedTM uses a virtual version of its ICT system to monitor malware and give warnings. The system works in a way that if a malware targets VIC government, it first enters the virtual machines, where it ca n exploit thinking those are the actual physical datacenters and RED will identify such malicious activity and give warnings. References Akhgar, B., Arabnia, H. (2014). Emerging trends in ICT security. Amsterdam ; Boston : Morgan Kaufmann/Elsevier, Almutairi, A., Sarfraz, M., Basalamah, S., Aref, W., Ghafoor, A. (January 01, 2012). A Distributed Access Control Architecture for Cloud Computing. IEEE Software, 29, 2, 36-44. Bakhtiyari, S. A., Ismail, Z. (January 01, 2012). A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS. Journal of Information Security, 3, 2, 169-176. Brown, B. C. (2014). How to Stop E-Mail Spam, Spyware, Malware, Computer Viruses, and Hackers from Ruining Your Computer or Network. Atlantic Publishing Group Inc. Choo, R. (2010). Cyber threat landscape faced by financial and insurance industry. Canberra: Australian Institute of Criminology. Durbin, S. (2016). Insiders are todays biggest security threat. [online] Recode. Available at: https://www.recode.net/2016/5/24/11756584/cyber-attack-data-breach-insider-threat-steve-durbin [Accessed 28 Aug. 2017]. 'Fox News' (2017). 'Ransomware' cyberattack cripples hospitals across England. [online] Fox News. Available at: https://www.foxnews.com/health/2017/05/12/uk-hospitals-turn-away-patients-after-ransomware-attack.html [Accessed 28 Aug. 2017]. Griffith, C. (2017). Hackers on top. [online] Theaustralian.com.au. Available at: https://www.theaustralian.com.au/life/personal-technology/hackers-on-top-after-wannacry-cyber-attack/news-story/327769be8e177dcbd9127963634ac3ab [Accessed 28 Aug. 2017]. Lloyd, Margaret M. (2008). Uncertainty and certainty: the visions and roadmaps of ICT educational policy. Otago University Press. Libicki, M. C., National Defense University. (2000). The future of information security. Washington, D.C.: Institute for National Strategic Studies. Mazurczyk, W., Caviglione, L. (March 01, 2015). Information Hiding as a Challenge for Malware Detection. IEEE Security Privacy, 13, 2, 89-93. Perlroth, N. (2017). Cyberattack on Saudi Oil Firm Disquiets U.S.. [online] Nytimes.com. Available at: https://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html?mcubz=0 [Accessed 28 Aug. 2017]. Rashmi, K. V., Shah, N. B., Gu, D., Kuang, H., Borthakur, D., Ramchandran, K. (February 25, 2015). A "hitchhiker's" guide to fast and efficient data reconstruction in erasure-coded data centers. Acm Sigcomm Computer Communication Review, 44, 4, 331-342 Rowe, E., Akman, T., Smith, R. G., Tomison, A. M. (2013). Organised Crime and Public

Wednesday, April 15, 2020

Extended Essay Research Proposal Sample

Extended Essay Research Proposal SampleIf you have written a thesis paper and now want to write an extended essay or dissertation, you can use the Research Proposal Sample of the extended essay research proposal. If you have been searching for a good material for your proposal, you may be able to find this sample online.The extended essay research proposal sample can help you be creative and very thought provoking as you create your own version of your proposal. You will be able to see a better outline of what you want your proposal to look like when you use this material.The student will be able to learn more about writing a persuasive essay in order to convince your reader. This can be a very long and difficult process, so it is important that the student learns how to do this before they are forced to make the paper. The student will also learn about how to ask good questions as well as learning how to answer them in a creative way.The persuasive essay can be a great tool for thos e who want to write a persuasive essay. This may be used in order to turn a different view on their research subject. It can also be used to learn more about how to write persuasive essays and also to know what kind of papers are accepted in these types of exams.The persuasive essay can be turned into a persuasive paper if the essay is well researched and written. The persuasive essay can also be used as a guide in the writing process. If the student uses the persuasive essay as a tool to make changes, it can also be used as a weapon against your peers.By using this persuasive essay, the student will be able to learn the tactics needed in order to be able to write a persuasive essay and it can be used as a tool to win an exam. By having the resource of the extended essay research proposal sample, the student will be able to learn to persuade others and may be able to be well rounded. When the student is well rounded they can become very creative and good writers.The persuasive essay can be written by an individual who wants to win a thesis and can also be used by the individual who wants to make a paper that persuades. If you want to use this type of paper for your project, then you will want to make sure that you are using the techniques in the essay research proposal sample.The persuasive essay is a great technique to help with your writing and can also be used in order to make a persuasive essay that will persuade the reader to take another look at the research that you have done. This essay is not hard to learn and the student can learn some techniques of writing a persuasive essay by using the research proposal sample.

Saturday, March 21, 2020

Hyperkalemia or High Potassium

Hyperkalemia or High Potassium Hyperkalemia breaks down to mean  hyper-  high;  kalium, potassium;  -emia, in the blood or high potassium in the blood. Potassium in the bloodstream is the K ion, not potassium metal, so this illness is one type of electrolyte imbalance. The normal concentration of the potassium ion in blood is 3.5 to 5.3 mmol or milliequivalents  per  liter  (mEq/L). Concentrations of 5.5 mmol and higher describe hyperkalemia. The opposite condition, low blood potassium levels, is termed hypokalemia. Mild hyperkalemia typically isnt identified except through a blood test, but extreme hyperkalemia is a medical emergency that can result in death, usually from heart arrhythmia. Hyperkalemia Symptoms The symptoms of elevated potassium are not specific to the condition. Mainly the effects are on the circulatory and nervous system. They include: weaknessmalaiseheart palpitationshyperventilation Causes of Hyperkalemia Hyperkalemia results when too much potassium is taken into the body, when cells massively release potassium into the bloodstream, or when the kidneys cant properly excrete potassium. There are numerous causes of hyperkalemia, including: kidney diseasediabetes (leading to nephropathy)medications that affect urination (NSAIDS, diuretics, antibiotics, etc.)diseases associated with a mineralocorticoid deficiencymassive blood transfusionany major tissue damage, whether it be from injury (burns, serious wounds) or medical treatment (notably chemotherapy)excessive dietary intake of potassium-rich foods (e.g., salt substitute, bananas)intentional hyperkalemia as the last step of lethal injection, to disrupt and stop the heart Not that its highly unusual for a person with ordinary kidney function to overdose on potassium from foods. Excess potassium resolves itself if the kidneys are able to process an overload. If the kidneys are damaged, hyperkalemia becomes an ongoing concern. Preventing Hyperkalemia In some cases, its possible to prevent potassium buildup by limiting dietary intake of potassium-rich foods, taking diuretics, or ending a medication that causes a problem. Hyperkalemia Treatment Treatment depends on the cause and severity of hyperkalemia. In a medical emergency, the goal is to shift the potassium ion from the bloodstream into cells. Injecting insulin or salbutamol temporarily lowers serum potassium levels.

Thursday, March 5, 2020

Definition and Examples of Modifiers in English Grammar

Definition and Examples of Modifiers in English Grammar In English grammar, a modifier is a  word, phrase, or clause that functions as an adjective or adverb to provide additional information about another word or word group (called the head). A modifier is also known as an adjunct. As illustrated below, modifiers in English include adjectives, adverbs, demonstratives, possessive determiners, prepositional phrases, degree modifiers, and intensifiers.   Modifiers that appear before the head are called premodifiers, while modifiers that appear after the head are called postmodifiers. Modifiers may be either restrictive (essential to the meaning of a sentence) or nonrestrictive (additional but not essential elements in a sentence). Examples of Different Modifier Usage Too many grammar terms in a row? Lets look at some examples. Authors  Gà ¼nter Radden and Renà © Dirven  illustrate the types with the most common ways that qualifying modifiers are used in Cognitive English Grammar. In all the examples here, the qualifiers modify the word detective and are in italics: (4a) Hercule Poirot is a  brilliant  detective.(4b)  Agatha Christies  detective Poirot is a legend all over the world.(4c) The detective  with the waxed moustache  solves the  most baffling  cases.(4d) Hercule Poirot is the  famous  detective  created by the English mystery writer Agatha Christie.(4e) Poirot is a detective  who has come to England as a war refugee.In sentence (4a), the adjective  brilliant  modifies the  predicate noun  detective.In sentence (4b), the head noun  detective  is modified by the complex  noun phrase  Agatha Christies, where the  genitive  morpheme  s  expresses the relation of possession.In sentence (4c), the noun  a detective  is modified by the  prepositional phrase  with the waxed moustache.In sentence (4d), two  nonrestrictive  modifiers are added to qualify the definite  referent  detective: the adjective  famous  and the  participial phrase  created by the English mystery-writ er Agatha Christie.In sentence (4e),  a detective  is modified by a  relative clause. Additional Examples of Modifier Types We could go further, to illustrate additional examples:   Hercule Poirot is a really good detective. The word really represents an intensifier for the adjective good. Really is an adverb, as it is modifying an adjective. Hercule Poirot is that detective. The word that is demonstrative. It distinguishes Poirot from at least one other detective. Hercule Poirot is the detective whos not wearing a deerstalker hat. The clause  is restrictive. The clause is essential to know which detective Poirot is, presumably from at least one detective who is wearing a deerstalker hat. The case was  almost  solved. The degree modifier (an adverb) shows how much of the case was solved. Instead of intensifying, degree modifiers qualify by giving the degree to which something is, like someone being fairly sure of something. Wearing a deerstalker hat, the murderer was caught by Sherlock Holmes. This clause represents a misplaced modifier  because it puts the hat on the murderers head instead of Holmes. If there were no subject of the sentence (eliminating by Sherlock Holmes), the opening phrase would be a  dangling modifier. Few detectives wear deerstalker hats. Few is a  quantifier, telling how many. Both Hercule Poirot and Sherlock homes are well-known detectives. The modifier is a  compound adjective. Source Radden, Gà ¼nter. Cognitive English Grammar. Cognitive Linguistics in Practice, Renà © Dirven, 2nd Edition, John Benjamins Publishing Company, July 5, 2007.

Monday, February 17, 2020

How important is the media in setting gender roles Essay

How important is the media in setting gender roles - Essay Example The children, youngsters and people at large are vulnerable to the portrayal and textual messages in media because they are regularly exposed to them. Scientific research reveals that in cognitive learning, the individual learns by listening, watching, touching, reading or experiencing and then processing and remembering the information. (Think Quest, 2008). Theory of cognitive learning essentially implies that through various means of learning processes, people are able to retain the information in the memory and apply it as and when required. The theory becomes highly relevant when applied to media portrayal of gender roles. The impact of those visuals and the textual contents are reflected in the behavioural pattern of the people who consciously or unconsciously adapt the messages and images in their attitude and behaviour. Thus, role of media become a critical element in setting gender roles within defined societal paradigms. Television is most influential format of media that co nsiderably impacts people’s opinion and promotes diversity of roles that are gender based (Carter, Branston and Allan, 1998). Oprah Winfrey Talk Show is an exemplary example of empowerment of women. In the male dominated society, the rise of Oprah Winfrey, an African American woman is nothing short of a miracle. She serves as the most influential role model for millions of women across the world who has triumphed over social and racial prejudices to emerge as a symbol of woman power. Oprah Winfrey symbolizes empowerment a woman, who has risen above gender and race. Indeed, television has greatly facilitated in promoting empowerment of women as one of the most crucial issues for the wider... This essay "How important is the media in setting gender roles?" outlines how different forms of media portrays both gender and their gender roles. The general image of women has also got a great boost from the media. The news channels, showcasing the pertinent women issues of their empowerment and equal representation in national politics have had huge positive impact on the perception and opinion of general public. It plays a prominent role in the portrayal of women, especially those above fifty years of age. But it can also be said that though women may share almost equal platform on visual media as TV anchors, newsreaders, in general, they have not been given the space and the importance that they deserve. Celebrity status and glamour seem to be the important factor for projecting them in media. Looking at the increasing number of TV soaps and mainstream cinema, one discovers that the appeal for women protagonists invariably decrease with age! There are fewer films and prime time soaps with matured female artistes as main characters. Whereas their counterparts seem to have a new lease of life after fifty years of age! Sean Connery (The Rock, Finding Forester etc.), Richard Gere’ (Chicago, Flock etc.) are few actors who are able to get main lead in cinema, while in their 50s and 60s. Gender bias seems to dominate all areas of media, including news media which is highly retrogressing and demoralising for women professionals. Then again, literature has also a unique way in perpetuating new ideologies and values within the transforming societies.

Monday, February 3, 2020

Media Relations Essay Example | Topics and Well Written Essays - 1250 words

Media Relations - Essay Example Banks have to target the young generation via such social sites. The success of any business lies under one core fundamental factor: being available where the target clients are. It has not been different for Barclays, which boasts of its great success and a huge number of clients in United Kingdom. The bank has been at the forefront in close relation with media, ensuring that it utilizes social media to reach out to its loyal customer base and tap its potential. Depending on its diverse departments, Barclays has a number of Twitter accounts all branded differently. They are quite active, with the most active being @ BarclaysFooty, an account linked to the sponsored Barclays Premier League. The site has over 159, 000 followers, which is a huge number for a bank twitter account. Most of the times, the posts are often related to football updates and other competitions with the intentions of targeting the football fans. Barclay’s wealth and investment team also have a twitter account labelled @Barclayswealth, which has over 73,000 followers. It does posts financial investment updates and other banking services offered. The customers’ service twitter account is nabbed @BarclaysOnline, having over 48,000 users. It does receive the highest number of interaction with its clients. Its website does grant its clients the link to accessing twitter. During its working hours, the twitter services and responses are quite fast and timely. All potential queries responses are dealt with from Monday to Friday, between 8am to 8pm. The clients have reported satisfaction with the social systems, with the support team responding to a good number of queries, an element that does improve their customer care and public relations with the clients (barclays.co.uk). With over half a million likes, Barclays Facebook wall has maintained a constant service to its clients, similarly to its Twitter account. It does engage its clients all through the whole day, answering all