Saturday, August 31, 2019

Mariono Blanch Autobiography

Hi, I’m Mariono im 15 years old and during my 15 years of existence I’ve learned many things I’ve also experienced many things, but I also have surrounded my beliefs around things I was taught. The one major thing that I go by which I call a belief is expressing your feelings and not holding them in ask for help if you need it. I say this because I had to learn the hard way and hurting others while learning. My mom is a single parent she is also flight attendant so she travels a lot and I didn’t really have a male figure in my life because my father left when I was younger so I had a lot of anger in me and I never really said anything. I wouldn’t say that I had an attitude but it was like I was mad at the world I felt like I was being punished for nothing so as I got older people would bring up my situation more and more. They would ask me questions like are you okay? Are you happy? Should we talk about it? Then I would be dishonest because I was so determined that I was going to keep a motto me, myself and I. I also would get jealous sometimes when I saw happy families together because that feeling turned me kind of bitter. As my teen years started to come the more accomplishments I achieved the more angry I got because I wanted that father and son bond time. It started to affect me a lot I started to think different in school, lashing out at people for nothing so of course people started to notice the difference in me. Then people started offering me help and some I didn’t even know so then I stopped talking a lot and one day me and my mom had a disagreement about a box of cereal and then my body just let go and I snapped. It was like I couldn’t control myself I was letting so much out over something so small and once I cooled down I sat down and thought about it and I thought to myself I can’t live like this. So I ask my mom for some changes so now I live with a full figure family a little bother a little sister and I have a dad to talk to and now I can release myself. Sometimes I will think about my past and the choices I made and how I grew up and when I do I just simply talk to someone without being afraid of being judged. I try to spread and help people with my belief as much as I can and I just want to close out by saying your body is like a temple it’s a certain amount of everything it can take before a reaction come out so you should try to take care of it as much as possible don’t leave stress in anger and you ask for help then release it.

Friday, August 30, 2019

Life Philosophy Essay

The meaning of life is to give life meaning Do not let what you cannot do interfere with what you can do. Life Philosophy of John Wooden Even a fool knows you can’t reach the stars, but that doesn’t stop a wise man from trying. â€Å"You can’t make someone Else’s choices. You shouldn’t let someone else make yours. † Life Philosophy of Gen. Colin Powell Man is not the creature of circumstances, circumstances are the creatures of men. We are free agents, and man is more powerful than matter. Life Philosophy of Benjamin Disraeli. When an affliction happens to you, you either let it defeat you, or you defeat it†¦ Life Philosophy of Rosalind Russell A life lived in fear is a life half lived. To live a creative life, we must lose our fear of being wrong. â€Å"It is better to be hated for what you are then to be loved for what your not† There are always two choices. Two paths to take. One is easy. And its only reward is that it’s easy. Positive thinking will let you do everything better than negative thinking will. Life Philosophy of Zig Ziglar You will never achieve what you never begin†¦ The measure of a man is the way he bears up under misfortune. Don’t wait for your ship to come in, swim out to it. Man cannot discover new oceans unless he has the courage to lose sight of the shore. Philosophy of Life by Andre Gide If one seeks advice, give them direction, not correction. Sooner or later, those who win are those who think they can. Philosophy of Life by Richard Bach Do the things you know, and you shall learn the truth you need to know. Philosophy of Life by George Macdonald Let us not be content to wait and see what will happen,  but give us the determination to make the right things happen. Philosophy of Life by Peter Marshall It is better to fail in originality than to succeed in imitation. Don’t take life too seriously. no one gets out alive, anyways. Before you talk about what you want – appreciate what you have. A man either lives life as it happens to him, meets it head-on and licks it, or he turns his back on it and starts to wither away. Life Philosophy from Gene Roddenberry You see, in life, lots of people know what to do, but few people actually do what they know. Knowing is not enough! You must take action. Life Philosophy from Anthony Robbins If you believe you can, you probably can. If you believe you won’t, you most assuredly won’t. Belief is the ignition switch that gets you off the launching pad. Life Philosophy from Denis Waitley You can do what you think you can do and you cannot do what you think you cannot Life Philosophy from Ben Stein Find something you love to do and you’ll never have to work a day in your life. Life Philosophy from Harvey Mackay You can do what you want to do. You can be what you want to be. Life Philosophy from R. David Thomas Philosophies in Life PHILOSOPHY may be defined as the study and pursuit of facts which deal with the ultimate reality or causes of things as they affect life. The philosophy of a country like the Philippines is made up of the intricate and composite interrelationship of the life histories of its people; in other word, the philosophy of our nation would be strange and undefinable if we do not delve into the past tied up with the notable life experiences of the representative personalities of our nation. Being one of the prominent representatives of Filipino personalities, Jose Rizal is a fit subject whose life philosophy deserves to be recognized. Having been a victim of Spanish brutality early in his life in Calamba, Rizal had thus already formed the nucleus of an unfavorable opinion of Castillian imperialistic administration of his country and people. Pitiful social conditions existed in the Philippines as late as three centuries after his conquest in Spain, with agriculture, commerce, communications and education languishing under its most backward state. It was because of this social malady that social evils like inferiority complex, cowardice, timidity and false pride pervaded nationally and contributed to the decay of social life. This stimulated and shaped Rizal’s life phylosophy to be to contain if not eliminate these social ills. Educational Philosophy Rizal’s concept of the importance of education is clearly enunciated in his work entitled Instruction wherein he sought improvements in the schools and in the methods of teaching. He maintained that the backwardness of his country during the Spanish ear was not due to the Filipinos’ indifference, apathy or indolence as claimed by the rulers, but to the neglect of the Spanish authorities in the islands. For Rizal, the mission of education is to elevate the country to the highest seat of glory and to develop the people’s mentality. Since education is the foundation of society and a prerequisite for social progress, Rizal claimed that only through education could the country be saved from domination. Rizal’s philosophy of education, therefore, centers on the provision of proper motivation in order to bolster the great social forces that make education a success, to create in the youth an innate desire to cultivate his intelligence and give him life eternal. Religious Philosophy Rizal grew up nurtured by a closely-knit Catholic family, was educated in the foremost Catholic schools of the period in the elementary, secondary and college levels; logically, therefore, he should have been a propagator of strictly Catholic traditions. However, in later life, he developed a life philosophy of a different nature, a philosophy of a different Catholic practice intermingled with the use of Truth and Reason. Why the change? It could have been the result of contemporary contact, companionship, observation, research and the possession of an independent spirit. Being a critical observer, a profound thinker and a zealous reformer, Rizal did not agree with the prevailing Christian propagation of the Faith by fire and sword. This is shown in his Annotation of Morga’s Sucesos de las Islas Filipinas. Rizal did not believe in the Catholic dogma that salvation was only for Catholics and that outside Christianity, salvation was not possible even if Catholics composed only a small minority of the world’s religious groups. Nor did he believe in the Catholic observation of fasting as a sacrifice, nor in the sale of such religious items as the cross, medals, rosaries and the like in order to propagate the Faith and raise church funds. He also lambasted the superstitious beliefs propagated by the priests in the church and in the schools. All of these and a lot more are evidences of Rizal’s religious philosophy. Political Philosophy In Rizal’s political view, a conquered country like the Philippines should not be taken advantage of but rather should be developed, civilized, educated and trained in the science of self-government. He bitterly assailed and criticized in publications the apparent backwardness of the Spanish ruler’s method of governing the country which resulted in: 1. the bondage and slavery of the conquered ; 2. the Spanish government’s requirement of forced labor and force military service upon the n natives; 3. the abuse of power by means of exploitation; 4.the government ruling that any complaint against the authorities was criminal; and 5. Making the people ignorant, destitute and fanatic, thus discouraging the formation of a national sentiment. Rizal’s guiding political philosophy proved to be the study and application of reforms, the extension of human rights, the training for self government and the arousing of spirit of discontent over oppression, brutality, inhumanity, sensitiveness and self love. Ethical Philosophy The study of human behavior as to whether it is good or bad or whether it is right or wrong is that science upon which Rizal’s ethical philosophy was based. The fact that the Philippines was under Spanish domination during Rizal’s time led him to subordinate his philosophy to moral problems. This trend was much more needed at that time because the Spaniards and the Filipinos had different and sometimes conflicting morals. The moral status of the Philippines during this period was one with a lack of freedom, one with predominance of foreign masters, one with an imposition of foreign religious worship, devotion, homage and racial habits. This led to moral confusion among the people, what with justice being stifled, limited or curtailed and the people not enjoying any individual rights. To bolster his ethical philosophy, Dr. Rizal had recognized not only the forces of good and evil, but also the tendencies towards good and evil. As a result, he made use of the practical method of appealing to the better nature of the conquerors and of offering useful methods of solving the moral problems of the conquered. To support his ethical philosophy in life, Rizal: 1. censured the friars for abusing the advantage of their position as spiritual leaders and the ignorance and fanaticism of the natives; 2.  counseled the Filipinos not to resent a defect attributed to them but to accept same as reasonable and just; 3. advised the masses that the object of marriage was the happiness and love of the couple and not financial gain; 4. censured the priests who preached greed and wrong morality; and 5. advised every one that love and respect for parents must be strictly observed. Social Philosophy That body of knowledge relating to society including the wisdom which man’s experience in society has taught him is social philosophy. The facts dealt with are principles involved in nation building and not individual social problems. The subject matter of this social philosophy covers the problems of the whole race, with every problem having a distinct solution to bolster the people’s social knowledge. Rizal’s social philosophy dealt with; 1. man in society; 2. influential factors in human life; 3. racial problems; 4. social constant; 5. social justice; 6. social ideal; 7. poverty and wealth; 8. reforms; 9. youth and greatness; 10. history and progress; 11. future Philippines. The above dealt with man’s evolution and his environment, explaining for the most part human behavior and capacities like his will to live; his desire to possess happiness; the change of his mentality; the role of virtuous women in the guidance of great men; the need for elevating and inspiring mission; the duties and dictates of man’s conscience; man’s need of practicing gratitude; the necessity for consulting reliable people; his need for experience; his ability to deny; the importance of deliberation; the voluntary offer of man’s abilities and possibilities; the ability to think, aspire and strive to rise; and the proper use of hearth, brain and spirit-all of these combining to enhance the intricacies, beauty and values of human nature. All of the above served as Rizal’s guide in his continuous effort to make over his beloved Philippines.

Thursday, August 29, 2019

Love - veterans homelessness Research Paper Example | Topics and Well Written Essays - 2000 words

Love - veterans homelessness - Research Paper Example The term â€Å"homeless veterans† has been explained in two steps in the Congressional Research Service article written by Perl (2011). According to Perl (2011), a homeless veteran is a person who has actively served in the military, naval or air force and was not discharged dishonorably. At the same time a person is considered a homeless veteran if he or she satisfies the definition of â€Å"homeless veteran† according to the McKinney-Vento Homeless Assistance Act. According to the Act a person is considered homeless if he does not have a proper nighttime residence or his nighttime residence is temporary or not appropriate for human beings. In this paper I aim to discuss the veterans homelessness in San Francisco. I intend to explore peer reviewed books and articles for an in depth analysis of the literature, history and current status of the homeless veterans. At the same time the city policy towards the homeless shall also be discussed. Towards the end some of the main causes of homelessness among veterans shall be discussed. Homelessness has been a problem in the US since 1980s. However with the American involvement in the Iraq and Afghan war the problem has become much stronger as scores of veterans that have served the country are found dying on the streets. Veterans suffer all kinds of homelessness but their number is greater in the chronically homeless category when compared with the non-veterans. According to a survey carried out by the VA and quoted by Stone (2008), there are about 2, 075 homeless veterans in San Francisco. Out of these, 533 have been categorized as â€Å"chronically homeless†. A chronically homeless person is an individual who has a disabling condition, is homeless for more than a year or has four episodes of being homeless in three years. The needs of the homeless veterans are almost similar to the demands of the general homeless population of San Francisco.

Wednesday, August 28, 2019

Ethics Case Study Example | Topics and Well Written Essays - 500 words - 1

Ethics - Case Study Example It will also eradicate corruption and many other wrong doings. The pressure could be in the working conditions or the way the employees are treated by the management. The benefit of coming up with this system is that it will be able to protect the integrity of the organization no matter how small it is. These hotlines are good. As they are currently referred to as a whistleblower, because of how one can tell of their problem without fear. This is because of the fact that they are able to discuss anything without the fear of retaliating. For example if there is bad leadership in the firm the people will speak out without the fear of being sacked. The firm should change the leadership style and come up with exactly what people need. Through this, the employees will always be proud of what they do. The employees should always be updated on the progress of the company. This is to ensure that they can be able to have an open chance of contributing to what is going on in the organization. Having this system is ethical because we go by the culture of the firm and follow the ideas of the employees. It creates a feeling of patriotism in the firm. It also motivates the employees to work hard and boosts their self-morale because they are able to participate in the managerial ideas. It makes them become the best and give the best they have for the firm. On top of all these the employees should be taught on their code of conduct while dealing with the hotline. This is to avoid lack of respect to the system. This is not for discouraging the employees from expressing their ideas or complains (Boehme 2). It will help them conquer the fatigue caused when the employers start being unrealistic in their hotlines. It helps them remain in the context of what has really brought them to work. The organization should make sure that they implement the ideas which are raised by their employee. This will motivate them to use

Tuesday, August 27, 2019

Emerging Trends in Health Care Term Paper Example | Topics and Well Written Essays - 500 words

Emerging Trends in Health Care - Term Paper Example As elucidated by Sena, adoption of technology in healthcare is one of the emerging trends affecting health care. Just like in any other industry, the use of technology is imperative in healthcare as healthcare organizations strive to align their services with their objectives of providing quality services to their clients. In essence, the use of technology has made the job of doctors and nurses easier and patients are able to access healthcare services more rapidly. A good example of how technology is used today in healthcare is electronic health records which improves efficiency of services. Doctors and physicians are therefore able to access patients' medical information in their computers by just a click. Secondly, according to Sena, individuals seeking treatment today are more involved in the provision of care. This can be attributed to the fact that the modern man is more sophisticated in terms of education. Therefore, people today tend to evaluate all available healthcare avenues in order to make an informed decision on the institution offering the best services. This has also been contributed by the fact that people are able to access information particularly through the internet. Consequently, people in the contemporary world can identify differences in terms of services, costs, as well as quality of services in different institutions as relevant information is available on the internet. The third emerging trend is closely linked to the current high spending in healthcare that has pushed up health insurance premiums.

Monday, August 26, 2019

Wine Industry Association of WA Lab Report Example | Topics and Well Written Essays - 1250 words

Wine Industry Association of WA - Lab Report Example Today Australia is having more than one thousand wineries and about twenty thousand wine-industry workers are living in the country.† 1 If someone thinks the wine as a romantic unchangeable institution, he can be forgiven, but it is not true. The wine has always been influencing the market.† 2 sustain the global reputation. The organization is having 9 main wine producing regions and few sub-regions. Western Australia produces merely 3 percent of the Australia’s wine but astonishingly nearly 30 percent of its premium quality wines are produced in this region.† 3 The education centers are the new concept to pull up the sales. The top management takes the decisions and the lower level staffs follow that. The board of the Directors includes the top management team like producer [category A], Vice president Grower, treasurer producer, producer [category B], distributer, general manager and some other top ranked officers. Second level staffs are basically marketing and even manager, sales manager, export manager. These are basically the internal structures of the organization. Some volunteers are there to do exhibitions and trade fare and to manage the wine education centers. of the whole nation are produced in the Western Australian wine industry. South Australian Wine industries are very much reputed for the high volume of wine they produce. However, few of the promising competitors are Wine makers federation of Australia, Wine Grape Growers Association, Australian Wine and Brandy Corporation and Grape & Wine Research & Development Corporation. Most of these competitors are having their own wine education centers. The macro-environment is the larger view of the environment in which the particular wine industry is performing their acts. PESTEL analysis is very much important to understand the socio-economic impact on the industry. Economic Factors: These factors are

Sunday, August 25, 2019

Issue 9&10 Assignment Example | Topics and Well Written Essays - 750 words

Issue 9 - Assignment Example The article further argues for an alternative point of view, which is not seeing the concept of effective leadership as gender-oriented instead of competency-oriented (Rao, 2012). HRM experts in companies who have set up opportunities for both men and women to debate serious leadership qualities have assisted them to grow into successful leaders. The representation of women as business leaders in numerous patriarchal cultures is skewed unequally. Issue 9 also includes a response from Ann Pomeroy, who essentially argues that yes, women make better business leaders than men. According to Pomeroy, organizations such as Safeway are making substantial progress in ensuring gender diversity in leading positions (Rao, 2012). Safeway’s diversity approach entails efficient communication, initiatives that concentrate on growing leadership skills, mentoring, and matching work and personal lives. A negative response by Herminia Ibarra and Otilia Obodaru is included in Issue 9, which contends that the assumption that women are underrepresented in leadership roles within organizations is wrong statistically. Ibarra and Obodaru used all-round evaluations for data gathered for five years and discovered that women in fact outdid men in many leadership degrees measured, despite them scoring lower than men did on â€Å"envisioning† (Rao, 2012). Issue 10 questions the existence of the glass ceiling in United States businesses (Rao, 2012). While also using report statistics to support this argument, this article compares their deductions. For instance, Issue 10 suggests that statistics are misleading because women still deal with invisible limits to grow into leaders in their respective professions. Reasons women face these invisible constraints include family responsibilities, career disruptions, inadequate socialization at work through old boys’ network, inability to relocate for career reasons, and an organization’s lack of stable

Saturday, August 24, 2019

Value and Risk Management in Construction Case Study

Value and Risk Management in Construction - Case Study Example Resulting damage of hazards and threats, which became risks, might be to the physical condition and security of employees, to place, gear or an whole installation, to the surroundings, to products, or to monetary assets (Waring, 2001). For those belongings of risks to commerce, this account suggests you ways to avoid/transfer; reduce/control or luxury them in case they occur to your business. The report finished upon the leadership of Mr. Dennis, Master of Marketing. If we analyze then we come to know that naturally, a decision to invest 5M in a capital project involves a mainly irreversible obligation of resources that is generally subject to an important degree of risk. Such verdicts have far-reaching effect on a company's productivity and elasticity over the long term, thus necessitate that they be part of a cautiously developed strategy that is based on dependable appraisal and forecasting actions. In order to handle these risk managerial decisions, TW has to make an evaluation of the size of the outflows and inflows of funds, the life span of the speculation, the degree of risk attached as well as the price of obtaining funds. Moreover, one of the mainly significant steps in the capital budget... In order to handle these risk managerial decisions, TW has to make an evaluation of the size of the outflows and inflows of funds, the life span of the speculation, the degree of risk attached as well as the price of obtaining funds. Moreover, one of the mainly significant steps in the capital budgeting cycle is working out if the benefits of investing big capital sums overshadow the costs of these investments. The variety of methods that business TWs use can be classify in one of two ways: customary and inexpensive cash flow techniques. Traditional methods comprise the Average Rate of Return and Payback; discounted cash flow (DCF) methods using Net Present Value and Internal Rate of Return. Net Present Value (NPV) According to the expert analysis net present value is a way of comparing the value of money now by means of the value of money in the potential. A euro nowadays is value more than a euro in the future; since inflation erodes the buying power of the prospect money, as money offered nowadays can be invested and so grow. The technique is a three-stage process: "To compute the present value of each component of cash spending in a proposal and then, to add these person present values together to offer a total present worth of the expenditures; To likewise compute the present value of each component of cash income in a proposal and, then, to add these personage present values together to offer a total current value of the incomes; To subtract the total present value of expenditures from the whole current value of the incomes, in order to decide the net current value"; Tinic, S. M., and West, R. R. (1986) If this computation produces an NPV that is optimistic, the

English take home final Essay Example | Topics and Well Written Essays - 500 words

English take home final - Essay Example Figure of speech: Almost every aspect of the poem has a symbolic meaning. Every detail flashes a gruesome and encoded message that readers are forced to decipher. Edgar often uses his fiction to describe his addictions such as laudanum. This drug comes from poppies. On the arms, the â€Å"field azure† may be an area with poppies. If so, this makes freedom in the story seem ironic. If it exemplifies addiction, it exemplifies captivity, hence showing the contrast between confinement and freedom. The Cask of Amontillado Setting: The setting has an important purpose. It suggests confinement or freedom, in opposition or harmony to the freedom or characters’ confinement. This is known as the â€Å"Gothic Interior.† The Montresor family catacomb and the carnival season are direct. The latter is a literal celebration of freedom which both Fortunato and Montresor are participating in as the story begins. Diction: Poes employs elevated diction. This is a polysyllabic, formal style. This is evidenced by the poet’s writing style which is formal in type. Besides mastering words, the Poet has an extensive vocabulary as seen in the poem. To achieve the goal of determining whether the author of Romeo Juliet borrows borrowed ideas from West Side Story (or vice-versa), there is need to compare and contrast the two stories. The major male characters possess several similarities. Romeo and Toni miss the foremost fight at the plays’ beginning. The two fall in love and unluckily are killed. In contrast, Toni existence occurs in the 1950’s, while Romeo’s in late 1500’s. The leading female characters, Juliet and Maria, come from families which detest each other’s families of the boyfriends. However, Juliet dies in her story unlike Maria who lives. In the plays, the leading male character takes life of their lover’s relative. Tybalta, Juliets cousin, is killed by Romeo just as Toni kills Bernardo who is Marias brother. The Prince and the Lieutenant tried

Friday, August 23, 2019

The mirror has two faces Movie Review Example | Topics and Well Written Essays - 1250 words

The mirror has two faces - Movie Review Example The Mirror Has Two Faces is about different views people hold about love,sex,relationships and marriage.The title represents how different insights are seen on the same topicwith the â€Å"mirror† being the topic of love and relationships and the â€Å"two faces† being the different views held by the characters of the movie,mainly Rose and Gregory. A mirror is supposed to be a reflection of the person standing in front of it, and the title of the movie mentions that it has two faces, most probably the person and its reflection, but these faces are not necessarily one and the same person thinking the same thoughts. Hence, the title makes one curious as to what it truly means. The characters’ ideas about sex, love, and marriage: The characters of the movie hold various perspectives on sex, love and marriage. Alex holds romantic views and showers Claire with affection to the point that it suffocates her. To him, he is like a romantic hero. Claire is so bent on using her beauty to attract men but when she gets them, she easily gets tired of them and is searching for another pursuit to keep her excited and interested. Hannah is kind of self-obsessed that to her, love should center on her own happiness and should boost her self-esteem. Henry is more down to earth and is a sounding board to Gregory’s ideas on love and sex and has a more grounded belief that a balance should be struck in order for a relationship to work, although he himself dates younger women not for their intelligence but mostly for their physical appeal. The central characters of Rose and Gregory provide the conflict in the story. For Rose, a romantic relationship should be fueled by passion and romance to support the deep love that the couple has for each other. They should know each other very well, including seemingly insignificant details and should be able to respond to each other’s needs even if help is not solicited. Gregory, on the other hand, burned severa l times from his previous romantic relationships, believe that sex complicates matters. He believes that relationships based on romantic love and physical attraction are worthless because it creates illusions that eventually end up disappointing people because they cannot keep up to the expectations of each other. Where the chief characters are on their relationship journey. The Whiteheads describe marriage both as an institution and as a journey. In the movie, marriage as an institution was not clearly agreed upon by the characters and was not depicted in such a way that it is a solid, immovable establishment. Instead, it would be more appropriate to describe the main characters’ marriage as a journey of friendship gone backwards. Theirs was founded on a deep friendship without the physical affection most man-woman relationships share even before marriage. Gregory claims that they are lucky to have reached their level of relationship to have skipped sexual tension and have g one straight to a meeting of minds and hearts. On the other hand, Rose thought differently. For her, the journey was just beginning and sexual intimacy is a necessary part of the journey towards the marital union, in the truest sense of the word. After they have cleared things with each other of what to expect from their marriage and are now looking at the same road and destination, they anticipate a smoother journey together with all the necessary ingredients to make their marriage stronger. The styles of communication & conflict used by the couples. It has always been known that communication is a key to successful relationships. In the movie, there were various communication styles that reflected the views of the characters. There were scenes wherein Gregory would voice out his passionate beliefs in his theories about a sexless relationship because it does not complicate matters and elevates the relationship to a higher level of respect, trust, admiration. Rose cannot put one wor d in. Because Rose was in love with Gregory, she tried to accept his beliefs, shunning aside her

Thursday, August 22, 2019

Primary education Essay Example for Free

Primary education Essay India has made large strides in educating its population of more than a billion people, yet a lot remains to be done. It is commonplace now that education is both intrinsically valuable and also instrumental for economic well-being, and this is true for individuals and entire nations. No country in the world has been able to develop without the spread of mass education. An educated population is a prerequisite for take-off into high economic growth. Table 1 in the appendix shows literacy rates for India as a whole and by sex. It also shows the decadal rates of change from 1901 to the present. 2 Literacy rates have increased for both males and females, and though the latter continues to lag behind the former, there has been a narrowing of the male-female gap in literacy: from 24. 8% in 1991 to 21. 7% in 2001. In 2001, the absolute number of illiterates declined historically for the first time by nearly 32 million. In terms of state-wise performance, Kerala continues to occupy first rank as it has done historically; on the other hand, densely populated states like Uttar Pradesh, Rajasthan and Bihar are yet to overcome their educational inertia. 3 The average figures for India as a whole hide a great deal of variation among states. Table 2 in the appendix provides literacy rates for states for the years 1991 and 2001, for the population as a whole, by sex and also provides the decadal rate of change. In 2001, Kerala, Maharashtra and Himachal Pradesh had more than 75% of their population of 7+ years literate. On the other hand, even in 2001, less than half of Bihar’s population of seven years and above was literate with female literacy rate only 33. 6%. In terms of zones, states in the South and West outperform states in the North and East. 2. Primary Education Primary education refers to the education of children between the ages 6-11 years (grades 1-5). Universalization of Primary Education (UPE) is a constitutional provision in India and there has been a steady expansion in the spread of primary education since Indian independence in 1947. The Indian educational system is the second largest in the world after China. In 2001-02, there were nearly 0. 66 million primary schools in India 1 This study has been undertaken as part of the United Nations Millennium Development Goals Project. 2 Before the 1991 census, only those belonging to the age-group 0-4 years were excluded from the population in order to compute literacy rates and the basis of the computation was the entire population. From the 1991 census onward, literacy rates were computed based on the population aged 7+ years and above. 3 In Bihar, Nagaland and Manipur as well as Delhi and Chandigarh, the absolute number of illiterates has increased in the 1990s. 4 providing access to 84% of habitations with a primary school located within a distance of one kilometer. Between 1997 and 2002, the gross primary school enrolment rate4 for India was 111 for males and 92 for females. The net primary school enrolment rate5 on the other hand was only 78 for males and 64 for females. The net primary school attendance rate between 1999 and 2002 was 79 for males and 73 for females. However, of the children who entered primary school, only 68% reached grade 5 between 1995 and 1999 (UNICEF, 2004). Table 3 provides data on gross primary school enrolments by sex between 1950-51 and 2001-2002. As can be seen from the table there has been a steady increase in the numbers of boys and girls attending primary school over time. In Table 4, state-wise enrolment of boys and girls as a percentage of their age-group is provided for 1997-1998. Girls’ enrolment has been steadily increasing over time and in 2001-02, nearly 45% of girls in the age-group 6-11 were enrolled in school. These statistics are heartening because at least until the 1990s, one of the most dismal aspects of India’s education system was the large percentage of the population in the younger age groups that were out of school. Socio-economic disparities Despite the strong constitutional backing for the provision of primary education in India6 and its expansion over time, the system is characterized not only by low achievements but also by large unevenness of achievements. Huge gaps remain between rural and urban areas, and the probability of getting any education at all sharply depends on gender, caste and income. Women, scheduled castes and tribes and the poor are faced with formidable barriers when it comes to getting basic education. Of the 200 million children in the age group 6-14, it is estimated that 59 million are out of school. Of these 35 million are girls and 24 million are boys (Ministry of Human Development, GOI). Apart from socio-economic determinants, the educational infrastructure and the management and the governance of the educational system in India are far from efficient or sufficient. The government is the largest provider of education in India with only about 10% of primary schools owned by the private sector. 7 The quality of education provided by the public education system is low which translates into low educational abilities even for those who are able to complete primary education cycle. Moreover, there is a lot of ‘waste’ in the educational system with dropout rates as high as 40% for the country as a whole and in some Indian states, they are as high as 75%. Though the number of primary 4 Gross primary school enrolment rate is computed as the number of children enrolled in primary school regardless of age divided by the population of that age group. 5 Net primary school enrolment rate is computed as the number of children in that age group enrolled in primary school divided by the population of that age group. 6 In 2002, the Supreme Court of India decreed that free primary education was a constitutional right. 7 Around 3% of private schools are aided by the government, which makes government intervention in the education sector even greater. 5 schools in the country increased, more than 1 lakh8 habitations still do not have access to a primary school within a distance of one kilometer. Teacher-pupil ratios are inadequate: less than 2 teachers are available in rural areas to teach a class size of around 100 students. Teacher motivation and teaching incentives are also very weak. India perhaps has the highest rate of teacher truancy in the world. Poverty and Education. Empirical evidence strongly shows that, both at the level of the household as well as at the level of the country, there is a positive relationship between income (and wealth) and educational attainment. More income simply means more resources available to spend on the acquisition of education. With more than 250 million people in India living on less than a $1 a day, poverty remains a major barrier to educational access. Although education is provided ‘free’ by the government, the cost of uniforms, textbooks and transportation costs are beyond the reach of many households (Tilak, 2004). Added to these direct costs are the indirect (opportunity) costs of wage/domestic labor which children perform and the costs of acquiring education become considerable for households. Graphs 1 and 2 in the appendix show simple regressions of literacy rates for sixteen states against state poverty rates and state per capita income for 2001. As is expected, literacy rates decline with poverty and rise with per capita incomes. State per capita incomes seem to explain literacy rates better than poverty rates. Filmer and Pritchett (2001) using Demographic Health Survey data for India find that the gap in enrolment between the highest and the lowest wealth class is as much as 52 percentage points. Gupta (2003) using the 52nd round of National Sample Survey data finds that the percentage of people who have completed five years of schooling declines as one descends consumption deciles. In the lowest consumption decile, the proportion of people who have not completed the primary school cycle is greater than 80%. 9 While poverty status and income class are strong determinants of who goes to school and for how long, they do not make up the whole story. Indian states of Kerala and Himachal Pradesh even with fewer resources at their disposal have been able to achieve much better educational and health outcomes compared to rich states such as Punjab and Haryana in India. This is true even when we look at cross-country outcomes. For example, Sri Lanka and Botswana do much better in education and health terms than would be predicted based on their level of resources; the Latin American countries do much worse given their resources (Mehrotra and Jolly, 1998). 8 One lakh is equal to 100,000. 9 These graphs are meant to be illustrative of the association between resources and education and do not claim any direction of causality. The relationship between resources and educational attainment is bidirectional. The poor cannot afford schooling. With little human capital, the opportunities to escape persistent poverty are very restricted and the poor can be trapped in a low education, low income vicious cycle across generations. A large literature has analyzed both theoretically and empirically persistence of poverty inter-generationally due to lack of resources to invest in education.

Wednesday, August 21, 2019

River based tourism in Nepal: An analysis

River based tourism in Nepal: An analysis Rivers based Tourism in Nepal Introduction Nepal is rich in water resources so river plays an important role that flows from Himalayas to Terai. In Nepal, rivers are treated as goddess (SAARC Tourism, 2009). Rivers are the ever flowing and also inspiring source of beauty and also people can enjoy the infinite adventure to the fullest (SAARC Tourism, 2009). In Nepal, when the mountain melts then the river flows across the country and this makes the country the choice of more thriller and adventure. There are more than thousands of river in Nepal so Nepal is the second largest country in water resources after Brazil (prabin, 2010). There are many big as well as small rivers in Nepal so most of the big rivers in Nepal flow from Mountain Region such as Karnali, Arun, Tamakoshi and so on (Khadka, n.d.). These rivers are also called snow fed rivers. Rivers in Nepal are divided into three basic categories they are Koshi, Gandaki and Karnali. Among these Koshi is one of the longest rivers in the country and comprises of different rivers like Arun, Tamakoshi, Indravati, Dudhkoshi, Tamor, Likhu and Sunkoshi (Thamel Dot Com, n.d.). In Nepal, many tourist visits only for the adventurous purpose. Rafting, kayaking could be one of them. So tourist comes to Nepal for rafting because Nepal is one of the best countries for rafting. Bhotekoshi River is one which is just three to four hour far from Kathmandu which provides some of the most adventurous activities like rafting, kayaking and cannoning and also this river is one of the best rivers for rafting in the world. Objective of the study The objectives of the following research are as follows: To find out the state of river tourism in Nepal To understand the profile of river based tourist visiting Nepal. To assess prospects and growths of river based tourism in Nepal. Hypothesis Researcher has created some statement according to the result of an experiment. Hypothesis 1 Most of the foreigners from US, England, Australia and Canada visited Nepal only for adventurous purpose like hiking, rafting, trekking and kayaking. Hypothesis 2 The tourists of age group from 16-30 years visited Nepal only for adventure. Hypothesis 3 Most of the foreigners visits Nepal for adventure purpose are male. Hypothesis 4 Political instability directly affects river based tourism and also in country’s economy. Problem statement What is the current situation of river based tourism in Nepal? Sub-problems Against which gender and age group do river based tourism attract tourist? What is the age group of the instructor who will train to raft? Is the age group from 16-30+ above preferred to go for rafting? How many foreigners come for rafting or kayaking? How river based tourism practices in Nepal? Is there any agent working for river based tourism? How travel agents promoting river based tourism in other countries? What are the different promotional activities used by travel agent for river based tourism? What are the impacts of river based tourism in Nepal? How government plays their role in the development of river based tourism? How travel agent provides security while rafting and kayaking to the tourists? Literature Review There are many rivers in Nepal which flows from Koshi to Mahakali. Almost all of the rafting company in Nepal favors tourism that cherishes the visitors with providing deep knowledge and conserving the cultures and environment they visit (Himalayan River Operator Nepal, 2014). According to Nepal Gateway,† Bhotekoshi River is also called White Water River and is one of the best and Short River rafting in Nepal with the intense of thrilling rafting adventure ( Nepal Gateway Trekking, 2014).† Almost all the rivers of Nepal flow from the mountain region and come with the high forces with continuous rapid action and this makes the tourist more adventurous and thrilling. Adventure tourism is not just trekking and mountaineering, now rafting and river based any activities are also counted as the adventure tourism. According to The Ministry of Cultural, Tourism and Civil Aviation,† the statistics shows that there has been the increment of the tourists in Nepal for the purpose of adventurous activities (Binu, 2013).† According to N. P. Bhandary R. K. Dahal and M. Okamura,† Pokhara is one of the tourist destinations of Nepal where on 5 may, 2012 a devastating debris mixed flood in the downstream of Seti River where many people are killed in that disaster (N.P. Bhandari, n.d.).† . The tourism statistics by Ministry of culture, Tourism and civil Aviation (MOCTCA, 2012) shows that the numbers of tourists who are in the age group 16-30 years visit the country mainly for adventurous purpose (Binu, 2013). Nepal’s main asset is water and it is the second highest in the world. According to Pashupati SJB Rana,† if the rivers of Nepal are harnessed, controlled and utilized properly in a sustainable manner then there will be the development in the tourism sector and as well as in the local areas also which simply results in the development of the country (Lohani, 2011).† So this helps in the tourism sector and for those people who gives the interest towards river. If the government does this in time then some of the environmental factors could be controlled like flood, landslide etc. If the tourist comes to Nepal then the country’s economy automatically rises up. According to (MOCTCA) Ministry of culture, Tourism and civil Aviation,† the countries like England, France, US, Australia, Japan, Canada, Russia visited Nepal for adventurous activities like rafting, trekking, hiking and others (N.P. Bhandari, n.d.).† â€Å"Nepal has no less than 83000 MV hydro potential. But availability of the fund is a major constraint so according to Binod Bhattarai tourism has suffered a setback in recent years because of political instability as well as economical condition and ling draw ethnic conflict (Lohani, 2011).† Climate change can also have a direct effect in river based tourism. In the winter season, the flow of river will be low because melting point of an ice is low so there will be low tourist turnover and by this economy of the country will automatically be low. Rafting in Nepal Rivers of Nepal flow rather faster than any of other countries in the world. Bhotekoshi River ranked top 6 in the world in case of rafting ( Himalayan River Operator Nepal, 2014). So many foreigners visit Bhotekoshi River for the main purpose of rafting. There are many agents who are helping foreigners as well as local people for the development of rafting. So rivers of Nepal flow so fast that for the rafter they can enjoy the thriller and adventurous moment. Another popular destiny for rafting is Trishuli River. Trishuli River is also very popular river for rafting for foreigners and as well as local people. Just 3 to 4 hours it takes from Kathmandu to reach Trishuli River so people can easily go there. Kayaking Kayaking is one of the adventurous games done in the excitement of white water kayaking on warm and Friendly River (Himalayan River Operator, 2014). Just with a single boat, a single person with international level experienced instructor, people can enjoy the excitement in the river flowing very forcedly. Kayaking is very popular in Bhotekoshi River and as well as in Trishuli River. Sightseeing Rivers are not only for rafting and kayaking but also people can spend hours and hours sitting at the bank of the river. They can relax and can enjoy the flow of the river. The image of the sun reflecting on the river could be the beautiful moment and the people cannot forget that moment and it is very hard to imagine. Rivers of Nepal is one of the nature’s gifts that one can fell like heavenly experience. Limitation of literature review Limitation is the certain of limits. This study has some problems and limited as well. Certain limitations are highlighted towards below: Respondent has not given proper attention due to lack of time and resources. Study was carried out within Thamel area. Busy schedule of authorized person led impossible to fetch maximum data. Some data were on hypothetical assumption because due to the lack of fact knowledge and written statement. Conclusion: Literature Review There are many rivers in Nepal among them Bhotekoshi and Trishuli River are the best for rafting and kayaking. These rivers are also called White Water River with thrilling and adventurous activities. The rivers of Nepal come with high forces which flow from mountain region and make the foreigners more adventurous and thrilling. All the data collected by the researcher shows that there has been the increment of the tourist in Nepal in case of river based tourism. The age group from 16-30 years visits Nepal every year for adventure. Also the foreigners from different countries visited Nepal for rafting, trekking, hiking and others. Nepal is rich in water resources so it ranked second in the world. The researcher found that rivers are being polluted day by day; this directly affects the economy of the country as well as river based tourism. If the government does not take action about this then river tourism will be diminished slowly. Methodology Sample Minimum hundred of randomly selected persons of equally Nepalese and foreigner will be asked to participate here in the survey. The population of foreigner people found more comparing towards other ordinary people close to Thamel area. Therefore, 65% of the foreigners are interested in tourism activities where as 35% of the Nepalese are involved in tourism activities. However, current surveys explain that flow of foreigner citizens are growing in the coming days. Finally after the long survey, targeted place will be sited at Thamel area so that calculation of international citizen will count easy. Method The research use Qualitative methods to collect all the possible data. Hundreds of respondent are participated in this study. Researcher collected all the questionnaire and this questionnaire are asked to the respondent. Qualitative interviewing is done by two ways process which gives the researcher to gather all the data more or less subjective and value overloaded (Healey, 1999-2014 ). Research tools The study is done in order to grasp the ideas on what was the current state of River based tourism in Nepal. Certain research tools are required to achieve appropriate data and information certain tools are: Observation: There are two types of observation which includes participative and non-participative. Internet/books: The researcher read all the books and as well through online basis to collect the proper and appropriate data. Interview: Interview simply means the conversation of a person gathering some information from another person. So, the researcher will gather all the possible data through the interview. Questionnaire: Researcher draws some possible questionnaire to collect the necessary data. The researcher has collected some questions in which respondent will give all the possible answers, by this researcher will get the appropriate data. The local respondent will be asked according to the questions collected or any information related to the respondents. Data collection Researcher will collect the data through online methods. Also the researcher would collect the data through face to face interview so researcher can get highest responses rate in survey research. Furthermore, this allows the researcher to get the appropriate answers. Finally data can be collected through online or face to face interview which saves the time and as well as data or information can be entered directly in the database safely and easily (University of Wisconsin Eau claire, n.d). Data analysis Data analysis is the process of the evaluating the data using analytical and logical reasoning to find out each component of the data provided (Dasta Analys, 2014). Data analysis is done by gathering data from various sources, then reviewed and then analyzed to find out the conclusion. The researcher collected all the data from the various source and came to the result. Timeline of activities Conclusion Researcher found that river is one of the most important resources of Nepal and it flows from Himalayan to Terai Region. Many foreigners visit Nepal for the purpose of rafting, cannoning or kayaking. There are many rivers which are suitable for rafting and some of them are Bhotekoshi River and Trishuli River. The pollution is increasing day by day in Kathmandu so the researcher found that the number of tourist is decreasing day by day. Now the rivers are being polluted day by day so the researcher found that in the near future these types of adventurous activities like rafting, kayaking will be diminished soon. Not only rivers are for rafting or kayaking purpose one can their time by sitting at the bank of the river, relax and can watch the flow of rivers. Due to political instability of Nepal, most of the time there will be strike so this directly affect the economic condition of Nepal and by this many tourist could not come to visit Nepal. The countries like US, England, Australia, and Canada mostly visit Nepal for the adventurous purpose like rafting or kayaking. The researcher has found that now rafting, kayaking are also categories into adventurous activities. Appendix Q.1. Which are the potential river sites where river based tourism is possible? Q.2. What are the different activities of river based tourism? Q.3. What are the types of river suitable for river tourism? Q.4. What are the potential customers of river based tourism? Q.5. What are the government policies and plans for river based tourism Reference Himalayan River Operator Nepal. (2014). Rafting in Nepal. Retrieved from himalayanriveroperator: http://www.himalayanriveroperator.com/rafting-in-nepal.php Nepal Gateway Trekking. (2014). Bhote Koshi River Rafting. Retrieved from nepalgatewaytrekking: http://www.nepalgatewaytrekking.com/nepal/rafting-kayaking-package/bhote-koshi-river-rafting.html Binu. (2013, September 1). Adventure tourism gains popularity. Retrieved from ametreks: http://ametreks.com/blog/2013/09/01/adventure-tourism-gains-popularity/ Dasta Analys. (2014). Retrieved from Businessdictionary: http://www.businessdictionary.com/definition/data-analysis.html Healey, M. (1999-2014 ). Tools for Qualitative Research. Retrieved from ehow: http://www.ehow.com/info_8036314_tools-qualitative-research.html Himalayan River Operator. (2014). Kayak Clinics and Expedition. Retrieved from himalayanriveroperator: http://www.himalayanriveroperator.com/kayaking-in-nepal.php Himalayan River Operator Nepal. (2014). Adventure Adrenaline Whitewater Rafting and Kayaking in Nepal. Retrieved from himalayanriveroperator: http://www.himalayanriveroperator.com/ Khadka, S. K. (n.d.). Nepal main rivers and watersheds. Retrieved from newworldatlas: http://newworldatlas.blogspot.com/2011/08/nepal-main-rivers-and-watersheds.html Lohani, M. P. (2011). Harnessing Nepal Water Resources and expanding tourism potential . Retrieved from telegraphnepal: http://www.telegraphnepal.com/national/2014-11-20/harnessing-nepal-water-resources-and-expanding-tourism-potential.html N.P. Bhandari, R. D. (n.d.). Preliminary Understanding of the Seti River Debris-Flood in. Retrieved from hils: http://www.hils.org.np/ranjan/papers/setiIssmg.pdf prabin. (2010, March 28). NATURAL RESOURCES IN NEPAL: Forest, Water, Soil and Minerals. Retrieved from nepaldestination: http://nepaldestination.blogspot.com/2010/03/natural-resources.html SAARC Tourism. (2009). Rivers of Nepal. Retrieved from nepal.saarctourism: http://nepal.saarctourism.org/rivers.html Thamel Dot Com. (n.d.). Rivers of Nepal. Retrieved from thamel: http://www.thamel.com/htms/rivers.htm University of Wisconsin Eau claire. (n.d). Quantitative and Qualitative Data collection methods . Retrieved from uwec: http://people.uwec.edu/piercech/ResearchMethods/Data collection methods/DATA COLLECTION METHODS.htm

Tuesday, August 20, 2019

Green and Sustainable Supply Chain Management

Green and Sustainable Supply Chain Management Environmental changes across the world have generated a movement to identify the causes of global warming and develop solutions to end it before it is too late. In an effort to achive this, many countries are creating laws and regulations with the specific aim to reduce carbon emissions and greenhouse gas effect. The truth is that environmental change is upon us. Not only do we have climate problems but we are also dealing with a resource depletion issue. With economies like India and China growing at double digit rates, the population of the world continues to grow creating shortages of many resources that we use to take for granted. Many consumers, stakeholders and businesses are becoming more involved in the growing green movement. Influenced by customer loyalty shifting towards environmentally friendly products, businesses are trying more and more to make their supply chains greener by introducing sustainability strategies throughout their organizations and supplier relationships. The recent focus on sustainability has resulted in a growing need for integrating environmentally safe choices into supply chain management practices. The concept Green Sustainable Supply Chain Management GSCM can be defined as the process of using environmentally friendly inputs and transforming them through change agents into outputs that can be reclaimed and re-used at the end of their lifecycle therefore, creating a sustainable supply chain. The whole idea of a sustainable supply chain is to reduce costs while helping the environment. 2. Sustainability and Profitability A Green Sustainable Supply Chain integrates ecological factors and supply chain management principles to identify the environmental impact of an organizations supply chain processes. Businesses are becoming aware of the importance of this integration to enable a sustainable business strategy. Many are now seeking out solutions and guidance on how to implement a sustainable supply chain. A sustainable supply chain should not be only optimal for the organization, but also optimal in terms of a limited environmental impact. The sustainable supply chain is no longer exclusively about green issues, but also about generating efficiencies and cost containment. As organizations restructure to reduce their companys environmental footprint, supply chains have become a key area of focus. Many people think that being environmentally friendly increases costs. In the past, most of the companies were focused on reducing unit costs. Only later, many companies could do the change and look instead at total landed costs with the on-set of global trade. Some companies also started looking at the usage costs with a piece of equipment- total cost of ownership TCO. Sustainability is a tremendous weapon for companies to reduce their costs. There are many facets of the supply chain that could be improved by looking at it from a sustainability point of view. The consulting firm A.T. Kearney released an analysis of businesses submitting information to the Carbon Disclosure Project that finds more than half of them along with 25 percent of their suppliers are generating cost savings as a result of adopting sustainable supply practices. It is a major action because they believed that at least half of the carbon emissions attributable to some global companies are generated in their supply chains. The Carbon Disclosure Project 2011 Supply Chain Report, which covers 57 global companies and more than a thousand of their supply chain partners, shows that 86 percent of those companies derived value out of addressing their supply chain processes as part of a corporate sustainability initiative. PepsiCo. Is a very good example of this, A.T. Kearney reports that the company saved more than $60 million in energy -16% reduction per-unit across its beverage plants as the result of managing the carbon associated to those activities. Walter Todd, the vice president of operations for PepsiCo UK and Ireland, where many of these savings took place, says: With a robust strategy and proven benchmarks in place, PepsiCo set out to engage and educate suppliers about potential opportunities to innovate their own operations. By providing suppliers access to the same energy assessment tools we use in our own operations, weve seen a mutual return on investment. Pepsi-Co also saved around $44 million by switching from corrugated to reusable plastic shipping containers for bottles. Other major companies have also reported significant savings thanks to a sustainable supply chain strategy: Dell is saving over $20 million annually as a result of packaging improvements. They achieved its goal of becoming carbon neutral by 2008. One of Sherwin-Williams facilities reduced disposal costs from $95,000 to around $39,150 in less than two years through source reduction, refurbishment of metal containers, and recovery of fiber and steel. Texas Instruments is saving $8 million per year by reducing its transit packaging budget for semiconductor business by implementing source reduction, recycling and reusable packaging systems. Raymour Flanigan Furniture has saved more than 15 million pounds of waste after renovating a building to serve as a recycling center, now they have the capacity to prepare scrap polystyrene, plastic film, and cardboard for market. Commonwealth Edison generated $50 million in financial benefits from managing materials and equipment by taking a lifecycle management approach to production management. Dow Corning saved $2.3 million by using reconditioned steel drums in 1995 and conserved 7.8 million pounds of steel. It is interesting to notice how several companies have developed new revenue sources on the waste they used to throw out. If a sustainable supply chain can be developed, money can be saved by not having to dispose harmful by-products, reduce of obsolescence, decrease the spent on scrap and resources spent on complying its regulatory issues. Another key issue that sustainable companies are focusing on is the logistics and transportation of the product. A simple action such as filling the trucks as full as possible can represent significant savings; Dell has increased its average truck load and worked with UPS to optimize delivery strategies. Multinational company 3M has developed an innovative system to install adjustable decks in trucks. By placing pallets on two levels they were able to reduce the number of daily truckloads by 40% and save around $110 k per year. Sustainability can be profitable. Improvements in transportation efficiency, operations, raw material selection and packaging are all in the top of the list of green sustainable supply chain initiatives. 3. Sustainability as a competitive advantage Greener supply chain management practices represent a competitive advantage thanks to the increasing customer awareness and regulatory norms. Across industries, there is also a shift in the focus of GSCM programs from compliance to creating value for customers and shareholders. The implementation of Green Supply Chain initiatives has evolved from strictly a compliance issue into a means of generating value. The following table shows how to create value out of traditional cost compliance, including environmental, safety and health business contributions. More and more companies are using sustainability as a competitive advantage to grow market share within their industry. A green supply chain usually pushes the organization towards an improvement of their products, processes, quality and productivity. It can also be considered as an enabler for innovative decisions and brand differentiation improvement. GE now has an Ecomagination program focused on growing their revenue stream from environmentally friendly products to around 20 billion dollars by 2011. They recognized the opportunity associated with saving the environment. Nowadays many companies are offering customers environmentally produced power and charging a premium for that offering. The green initiatives also help a company to maintain and enlarge their customer portfolio. Environmental concern and social responsibility are now considered as an important part of a succesful business strategy. All competitors are under same market force to change their direction and priority towards a more green initiative, therefore, efforts and investments on this area are becoming more and more important. In addition, more countries will enforce importers to import green products to their nations with tax incentives and this will trigger the chances to do global business. In the same direction, new product development should not be only the responsibility of product design and engineering department; it should also include the fully team-work among marketing, engineering, procurement, logistics and materials operations in order to find the best solutions, like how to ship the products effectively, how to ensure that processes will not generate hazardous wastes and emissions to the environment, what green components can be purchased, what is the optimal packaging size and re-cycle materials to pack each prodcut, etc. In brief, companies have to consider the new product development process as part of the green supply chain strategy. The development, implementation and commitment of green supply strategy are not only to fulfill the customer needs; but also to meet general publics expectations to improve and enhance the role in social responsibility and environmental concerns. In exchange, the company will gain sustainable competitive advantage in the industry. 4. Sustainability and Suppliers Management One of the bigger issues facing companies these days is the actions of suppliers. Companies today are being held accountable for environmental or social problems created by their suppliers. Corporate buying practices can impact suppliers ability to improve their business conduct. Pressure on cost and efficiency can force suppliers to contravene some of their own standards in order to meet their customers commercial requirements. But as the opposite effect, companies can use their purchasing power to help install best practices in small and medium-sized companies. In fact, the companies that engage their suppliers around these issues constitute one of the most important drivers for spreading corporate green and sustainable principles around the world. Collaboration is the key. Many companies are performing environmental audits or implementing rules of conduct to check the actions of their suppliers. The most successful green efforts in supply chains are based on the creation of value by sharing with suppliers and subcontractors the intelligence and know-how about environmental and emerging regulatory issues and emerging technologies.   Suppliers and customers can strengthen each others performance, share cost of ownership and social license to operate and create a reciprocal value.   Supply chain sustainability must be driven by the originating manufacturers that rely on deep tiers of suppliers and vendors for their products. The reported supplier human rights and environmental violations done by Apples suppliers, is an example of the challenges that suppliers face in managing or influencing these issues on the ground.   Apple recently did the right thing by transparently releasing its Apple Supplier Responsibility 2011 Progress Report, which underscored just how challenging and difficult multi-tiered supply chain management can be. GE and other multi-national companies- including Wal-Mart, Honeywell, Citibank and SABIC Innovative Plastics- have partnered to create the EHS Academy in Guangdong Chinese province.   The objective of this non-profit venture is to create a better trained and capable workforce of environmental, health and safety professionals and give them the management, implementation and technical knowledge to be able to proactively ensure that real performance is sustainable and integrated fully into the overall business strategy and operating system of a company.   Chinese regulatory agencies are also invited to participate as well. The model that GE is using in China offers a positive example of collaborative innovation. One of the main difficulties is the enforcing of supplier sustainability, spceially in growing economies like China or India.   Only a small percentage of suppliers meet the requirements in the codes of conduct- including worker compensation and environmental requirements- of major multinational companies. There are still major challenges related to wages, working hours, overtime compensation, lack of unions and social insurance.   One factor contributing to the difficulties is the high presence and mobility of migrant workers. 5. Green SCOR model Green SCOR incorporated within the SCOR framework can provide immense help by offering information on best practices, waste disposal process and metrics to increase the success of Green SCOR initiatives. It also provides environmental metrics that can be included in the calculations for optimizing the supply chain. GreenSCOR focuses on the impacts of SCM in each stage of the product life cycle. GreenSCOR integrates best practices and metrics into the entire supply chain planning process. It also enables a systematic study of the supply chain to unearth opportunities for making the supply chain greener. Best practices include collaborating with partners on environmental issues, reducing fuel and energy consumption and minimizing and reusing packaging. It also includes the metrics to measure the effects of greening, including carbon and the environmental footprint, emission costs per unit, energy costs as a percent of production costs, waste produced as a percent of production and returned products disposed of versus remanufactured. Processes to address waste management, such as how to collect and manage waste produced during production and testing (including scrap and non-conforming product). It also enables more efficient use of resources and increases the visibility of financial and operations benefits of supply chain practices. Lastly, the metrics can be effectively used to monitor the progress an organization is making towards a green supply chain. By implementing this model a company increases the chance of success of any green initiative. 6. Challenges when implementing a GSC Contrary to what many people could think, making a business sustainability operational within a supply chain is becoming easier, not harder. There is more information available from procurement managers, environmental directors, design engineers, marketing, communication staff and operations managers- among others- and this deffinitely makes a difference when a supply chain decides to go green. But still big challenges like the lack of information about the green supply chain practices and the lack of tools to optimize the supply chain with environmental management makes the implementation less easy. With the trend of global sourcing tracking the carbon footprint of finished products can be difficult; however, new initiatives have emerged for adopting the practice of requesting a carbon footprint from suppliers. Barriers to global trade because of the increasing environmental regulations, more restrictions on hazardous substances, bigger emphasis on lean manufacturing and increased supplier auditing and verification are creating the critical road toward new supply chain management expectations. The seek for efficiencies in supply chain management and producing products while reducing waste is a vital imperative in a recovering economy. Shareholder value, company valuations and possible mergers and acquisitions are affected by supply chain sustainability. This impacts cash management and liquidity, for example, carbon-intensive sectors may see an increase in the cost of capital. The World Resources Institute is working on the new supply chain and product lifecycle greenhouse gas protocols that will frame the new expectations of value chain sustainability accounting and reporting. Increased attention will be paid on conflict minerals, fair labor and other social aspects of sustainability, management of hazardous substances in toys and other consumer products. It is acknowledged by all organizations that the needs of the community are as important as those of other traditional stakeholders. Larger companies are identifying the critical supply chain partners that have the greatest product impact and collaboratively address the environmental and social footprint of their products through the value chain. Consumers will play a leading role behind greater supply chain collaboration. Consumer awareness about sustainability demands a more CO2-friendly supply of products and services. Other main challenge is in monitoring sub-supplier sustainability, this has become a tough task for companies with complex global supply chains.  It is the responsibility of the direct suppliers to ensure that their sub-suppliers acknowledge, understand and accept the companies sustainable requirements.   However, when a supply chain is long and complex, ensuring compliance at many thousands of sub-suppliers represents a major challenge. The future of sustainability will inevitably include the sustainability of entire supply chains, not just direct suppliers One example of this recently has been Dells use of bamboo in its packaging.   The company worked to secure Forest Stewardship Council (FSC) certification for its entire bamboo supply chain, from forest to manufacturing.   The packaging is still a small percentage of Dells overall packaging needs, but it is a start. Another example could be IKEA, according to their sustainability annual report, the company is moving in the right direction.   Although the company they fell short of its goal of having 30% of its solid wood sourced from verified responsibly managed forests, they are working actively to increase the number, especially in China and Russia. The company has a team of nine forestry specialists who are dedicated to the two countries and is working towards certifying forests which are closer to the production facilities of IKEAs suppliers.   IKEA has the goal of having 35% of its solid wood sourced from certified forests by 2012. If companies are not able to manage product compliance such as regulatory norms, they can suffer business interruptions such as product redesigns, delayed market launches, product returns and recalls. Therefore, effective lifecycle management is a key differentiator for short-term as well as long-term to get an advantage and stable position in the market. Suuply chain network and logistics optimization is also key when implementing a GSC, inefficient transportation methods represent a significant part of the ecological problem. It has been illustrated by a recent report that found that as much as 75 per cent of a companys carbon footprint comes from transportation and logistics alone. Transportation management includes load consolidation and route planning to drive cost savings and reduction of environmental impact. Another important challenge is related to establish a reverse logistics network that supports life cycle design and demanufacturing processes. Producers are required to meet specific targets for material recycling and recovery, relative to the total amount of packaging that they have put into the marketplace. This helps to shift the responsibility for collecting packaging and end of life products from local government to producers. Reverse logistics manages the handling and disposition of returned goods, improving a companys ability to put returned goods back on the market. Companies implementing reverse logistics processes can dramatically reduce the waste going into landfills and increase opportunities to reintroduce products to market. Xerox implemented a reverse logistics solution and achieved huge financial benefits of equipment remanufactured and parts reuse amounting representing over $100 million and reduced the waste from landfills. Another important point is the ability to simulate the unpredictable events in the supply chain network flow and evaluate the supply network design frequently. Companies need to work esigning optimum supply chain networks for sustainability incorporating criteria like fuel usage and carbon emissions. Process optimization is another challenge; companies should improve the synchronization of production with customer demand and supplier capacity. The main areas of green manufacturing are reduction in energy, water consumption, waste and emissions that are part of manufacturing processes. And the last challenge I will include is the green reporting, measuring and reporting the environmental impact is the first step towards reducing them. There are direct benefits to organizations from measuring and reporting as because it gives a better understanding of the risks and exposure. Globally, sustainability and environmental reporting are becoming one of the most important management concerns due to increasing pressures of legislation as well as other initiatives. The challenge remains to quantify and report the emission and environmental footprints. It can be a time consuming and costly process that requires extraction of data from multiple systems and manipulating it to arrive at required reports. 7. Findings and conclusions Economic activity has an impact on the environment and the society; industries need to conmsider this into their business operations and costs. It is becoming critical to measure and manage the environmental and social impact of activities and procesess across the supply chain. Green practices and a sustainable supply chain have become a necessity due to both regulatory obligations and economic benefits, yes; a green supply chain can help a company to discover hidden sources of profitability. Increasingly the companies are giving more importance to sustainability to promote loyalty of customers, who are getting more aware about the socio-ecological implications of businesses. A green sustainable supply chain enables business to improve products, process and supply quality and productivity. It also pushes the company to make innovative decisions that respond to green economy requirements, by doing this, companies gain access to key markets through diverse certifications. By using a model such as GreenSCOR incorporated in SCOR version 9, the chances of success in any green initiatives increases. Some key success factors and reccomendations in the implementation of a green sustainable supply chain were identified: Stakeholders should be actively engaged in the sustainability strategies of the business. Green initiatives should be aligned with the strategic objectives of the company. GSCM Best Practices should be adopted when implementing a green supply chain. Technology and models such as SCOR should be used to enable the green initiatives. The company should boost its responsiveness to the expectations of the consumer. Green practices should be designed for minimal environmental impact, focussing the efforts to reduce packaging and in-transit damage when shipping. Planning and inventory management should pay special attention to reducing inventory and identifying optimal distribution solutions. Transportation solutions should be improved by collaboration. Procurement departments should perform lifecycle analysis for choosing products or solutions to minimize environmental impact. Suppliers relationship management should include the regular monitoring of suppliers and sub-suppliers sustainability. Benefits should be extended to the local community, as starting point.

Monday, August 19, 2019

Shakespear In Love :: essays research papers

SHAKESPEARE IN LOVE   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Shakespeare in love is a story of two lovers who are unable to be together because Shakespeare is a player and they woman is a woman or royalty. The movie starts with Shakespeare writing a comedy play for a man. But this play was soon to be changed to a love story. Shakespeare was listening to people try out for the part in his play when all of the people finish he thinks all is lost but, a young boy comes on the stage and recites a line that catches Shakespeare's ear. The boy runs off and William follows. He follows the young boy to a castle and goes in and see's a girl. He falls in love with her at first sight. but the man who is to marry the young woman stops William and threatens to kill him. The man asks for William's mane and he gives him the name of another playwriter. the man kicks Shakespeare out of the castle where he goes to the window of viola where he talks to her. Then the next day the young boy who William followed continued to come to play rehearsal's . The play Shakespeare was working on was to become the modern play of 'Romeo and Juliet.'; the rehearsal's go on while Shakespeare thinks the young boy is the nephew of the nurse of viola but on a boat ride back to the castle Shakespeare finds out that the young boy is but the viola who he has fell in love with. Shakespeare follows her and this is where he sleeps with her. Then for the rest of the rehearsal's the two are both knowing that they are in love. But, viola is to be married to a rich man who has permission of the queen to marry her. Viola is heart broken but, she goes on with the play. The two make the play 'Romeo and Juliet'; from their own love experiences together. But the man who is to marry viola finds out that Shakespeare is sleeping with viola and is enraged. But, the players have found out that the stage has been shut down by the rebels due to the fact that a woman was in their play. But another man offers to the players that they can use his stage to put on the play. The man to marry viola has made a wager with the queen in that she states that no play can tell the story of true love.

Sunday, August 18, 2019

The Good and Evil in Literature and Poetry :: Othello

The Good and Evil in Literature and Poetry Sir Philip Sidney, in his quote about poetry (literature) as it pertains to real life vice and virtue, is indeed correct that it can have a lasting effect on the way one acts, however, he is making a gross generalization when he states that a portrayal of pure virtue can divinely inspire, where as a portrayal of evil can herd the masses away from evil deeds. The true social value of poetry and literature is not in the portrayal of vice against virtue, but rather when the two meet inside a protagonist. It is the illumination of the paradox of right and wrong that gives us truly poignant literature. We can truly understand things about ourselves when we read about characters being pulled in two directions: as Queen Elizabeth in her struggles between romantic and patriotic love, or Othello as he is torn between jealousy and love, or as Abraham struggles with the murder of his son as a testament of faith. Queen Elizabeth is an obvious example of how such a paradox can be helpful and inspirational. She writes, in On Monsieur’s Departure, about how she has a duty to the state, but at the same time, wishes to love romantically in spite of it. The reader can truly relate to the character, because she is not without fault, nor is she without virtue–literature which sheds equal value to the good and the bad in humans is the most illuminating and useful. The irony in this situation is the fact that the modern reader cannot even be sure which of the desires expressed by the queen is virtue and which is vice. Love of country is good, but fulfilling one’s own needs is good too. Ultimately, we learn from Elizabeth’s poem that one must make choices–that what is virtuous can also be harmful, and likewise. Othello gives us a similar glimpse into the train-wreck that is the human mind when determining right from wrong. As the plot unfolds, the reader finds it hard to fault Othello’s actions, as he is only trying to do what is right and honorable. Even after he is duped into believing his wife is an adulterer, he still has a deep love for her (which is why Iago’s lies eat at him as they do). Eventually, Othello commits a murder which he views as the only "right" thing to do.

Nervous Conditions by Tsitsi Dangarembga Essay -- Nervous Conditions T

Nervous Conditions by Tsitsi Dangarembga â€Å"Quietly, unobtrusively and extremely fitfully, something in my mind began to assert itself, to question things, and to refuse to be brainwashed†¦Ã¢â‚¬  The main character, Tambudzai, in the novel Nervous Conditions by Tsitsi Dangarembga, is determined to get a white education without losing her native tongue and ways. However this proves to be more difficult that she would expect and seeds that are planted in her mind by the whites begin to take shape, and greatly affect her existence. I will begin by giving an overview of the story leading up to the point where Tambu heads off to begin her education at the missionary school. Next I show how Tambu has already been brainwashed into believing that the white’s educational system is better than her own. Following I will discuss the influences that Tambu had to overcome in order to refuse to be brainwashed further. Finally I will give exam to the insight that Tambu’s story offers on the situation of a person in her position.   Ã‚  Ã‚  Ã‚  Ã‚  Tambu, as we shall call her, wants very badly to attain an education. Since her brother is the oldest and male he is given the first opportunity to attain an education. Because Tambu is a female it is thought by her family that attaining an education would not benefit her family, but some other man outside of her family, because she will marry, therefore she is not given an opportunity to be educated. Tambu fights this oppression by cultivating mealies in her grandmother’s old garden, and then taking them to the city to be sold. While there she is told by a white woman that she should be in school, and her teacher who was with her states that Tambu would very much like an education but can not afford it. The woman gives Tambu ten pounds which pays for her education at the local village school for a long time. Her brother then dies, creating a opening for a student from their family at the missionary school where her uncle Babamukuru is the headmaster. Since she has no more male siblings at the time it is okay for Tambu to be educated. Tambu’s education is now of some value since her brother is gone, as it will help pull the family further out of poverty since a higher education will allow her to marry well. Tambu believes that her education will help her family, although she hopes it will be independent from marriage. Because of her desire... ...ch as white culture, and that some things are bad, such as African culture. However it can work both ways. Nyasha had to face being told that her culture was bad while in England so she conformed to the English culture; however Nyasha’s father is now telling her that all her English ways are bad, both parties sought to educate Nyasha, and she did not bother to ask why. Finally I believe that Tambu would want people to know that one’s will to succeed can cause them to be able to triumph over circumstance.   Ã‚  Ã‚  Ã‚  Ã‚  In this paper the quote from Nervous Conditions, â€Å"Quietly, unobtrusively and extremely fitfully, something in my mind began to assert itself, to question things, and to refuse to be brainwashed, bringing me to this time when I can set down this story† has been analyzed to show how Tambudzai thought she was brainwashed. Also examined were the influences that Tambudzai had to overcome in order to refuse further brainwash. Finally we deducted what insight Tambudzai would offer to a person who was in her similar situation. Like Nyasha and Tambudzai, millions were negatively affected by colonialism not only because of the plundering, but because of the loss of their culture.

Saturday, August 17, 2019

How does F. Scott Fitzgerald tell the story in chapter 2 of ‘The Great Gatsby’? Essay

The introduction of Tom’s mistress, Myrtle, in Chapter Two of ‘The Great Gatsby’ plays as the focal point of the chapter. It begins with Tom and Nick travelling into New York on the train, however they get off in the Valley of Ashes, a derelict setting between West Egg, East Egg and New York. The pair stop at a mechanics, and speak with the man who is married to Myrtle, Wilson. Myrtle, Tom and Nick then go to their New York apartment, and have a party with a few other guests. This party is the first real introduction of the mass consumption of liquor at the time, which was due to Prohibition. It highlights the excessive nature of the time, which is a constant theme in the novel, as seen at Gatsby’s elaborate parties. F Scott Fitzgerald uses the narrative techniques to establish the characters, whether they have been introduced to the reader or not already, and to expose the effects of the elaborate, greedy lives the wealthy lived on the less fortunate peopl e. The setting of the Valley of Ashes is key in telling the reader how the excessive lives lived by the wealthy is harming the less fortunate. Firstly, the repetition of the word ‘ash’ allows the reader to fully understand how desolate the Valley of Ashes is. It carries connotations of smoke, and dullness. The word ‘ash’ may be symbolic, as this is where the fire has been burnt out; there are no excessive parties, and the people here are not as colourful or as full of life as those in West Egg and East Egg. Furthermore, the valley is described as ‘fantastic farm and grotesque gardens’. As both farms and gardens are places in which things grow, it could be informing the reader that the mass production of things, along with the wild lifestyles of the wealthy, is causing this destruction, and that it will grow if it continues. It allows the reader to understand that the people living there are almost bi-products of the wealthy people’s elaborat e lives. Another interpretation of this, could be that it is proleptic and symbolic of Tom and Daisy’s actions at the end of the novel, and they are ruining people’s lives, just as the lives of those in the Valley of Ashes have been ruined. The juxtaposition between the grey setting here, and the frivolous  and colourful setting of West Egg and East Egg is symbolic of the differences between the people living in those areas, and the kinds of lives they lead. F Scott Fitzgerald uses the contrast and characterisation of Myrtle and Daisy to add to the story of ‘The Great Gatsby’. This can be seen through colour symbolism, and the juxtaposition between the colours that represent Myrtle’s character and Daisy’s character. Myrtle is said to be wearing a ‘spotted dress – blue’. Blue is a rich, sensual colour, which is juxtaposed against the colours that represent Daisy through her clothing, which are white. While white is a colour of purity, blue is a colour of sensuality. This informs the reader that Myrtle is a lot less innocent than Daisy, which we know due to the fact she is having an affair. It may also inform the reader a reason as to why Tom decided to start having the affair with her; Daisy was too innocent for him, and he wanted someone with a more obvious sexual desire and drive. The innocence of Daisy may, however, be seen as ironic by some readers, as she too has an affair, with Gatsby, and kills Myrtle. The reader can become aware that Myrtle is unhappy in her marriage and where she lives, and she is too bright and colourful herself to live somewhere are grey as the Valley of Ashes. The narrator says that ‘†¦ there was an immediately perceptible vitality about her, as if the nerves of her body were continually smouldering’. The use of the word ‘smouldering’ is significant, as it is as if Myrtle is burning, or that she is on fire. The importance of this symbolism is that it informs the reader that she does not belong in this place of ash, as she she feels as if she is a part of the fire, and that she belongs with the people that created the ash, despite the situation she is in with her husband. It could be telling the reader that she wishes to get out of there. However, when she does try to escape later in the novel, she is killed. This could be telling the reader of the social boundaries present, as those from the Valley of Ashes cannot simply leave to be a part of the frivolous lives lived in East Egg and West Egg. The narrative perspective supplied to the reader in ‘The Great Gatsby’ is the voice of Nick Carraway. His character is revealed greatly through this in  chapter 2, as his opinion on the party in New York is made clear, allowing the reader to understand that he believes he is outside of the party, and is not like the other people there. This is most obvious when the novel readers ‘I wanted to get out and walk eastwards towards the park through the soft twilight, but each time I tried I became entangled in some wild, strident argument which pulled me back, as if with ropes, into my chair’. This allows the reader to perceive the party as some sort of grotesque affair, which is unappealing. If the narrative voice had been from Myrtle or Tom’s characters, the party would have seemed much more entertaining and enticing. It highlights the fact that people in these settings were drawn into a life of drinking and promiscuity, whether they wanted to be there or not. In addition to this, the metaphor ‘†¦as if with ropes, into my chair’ emphasises the idea that Nick is trapped, almost as a prisoner, or someone being tortured. He is clearly not enjoying himself, and he is feeling forced into staying, as if he physically cannot leave. Alternatively, the use of ‘ropes’ that he became ‘entangled’ in may be symbolic of the tangled lies in which he has become involved in; he is with Tom’s mistress, despite the fact he should be loyal to his cousin, Daisy. The language used in describing New York as a city is key in allowing the reader to understand the relationship between Tom and Myrtle. The sky of the city is described as being ‘like the blue honey of the Mediterranean’. This simile is used to emphasise the sensuality and sexual basis through the presence of the word ‘honey’, which holds these connotations. This allows the reader to understand that due to the fact Tom and Myrtle’s apartment is in this ‘honey’ city, their relationship lies on the basis of sex, rather than deep romance. Alternatively, an interpretation of this could be that the sweetness of honey lures people into the city, and that the people attack it to consume, almost like bees. It allows the reader to understand that people were driven by consumerism. F Scott Fitzgerald uses a number of narrative techniques to tell the story in chapter 2 of ‘The Great Gatsby’. The reader gets a clear understanding of the elaborate lives lived by the wealthy through these techniques, and are  introduced to the consequences of such lives for the first time. The introduction of new characters such as Myrtle are also used to enhance the other characters, such as Tom, and his adulterous side. The new setting of New York City also highlights the excessive consumerism at the time, and produces more context.

Friday, August 16, 2019

Cyber Security India Essay

†¢After China and the U.S., India has the highest number of Internet users. There are also an estimated over 381 million mobile phone subscriptions with Internet connectivity. In the list of online infection risk India ranks 9th and in personal computer across the globe, India ranks 7th. †¢A recent survey by McAfee named India next to Brazil, Romania and Mexico the least able to defend against cyber attacks. †¢Cyber security threats and hacking attempts in India rose to 22,060 in 2012 from 23 in 2004 What it means †¢Cyber terrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attacks against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. Cyber Threats Cyber threats can be disaggregated, based on the perpetrators and their motives, into four baskets: cyber espionage, cyberwarfare, cyberterrorism, and cyber crime. Cyber Warfare – attacking the information systems of other countries for espionage and for disrupting their critical infrastructure. Why Cyber Security is needed †¢Third most populous country after China and India is not any geographical entity but a ‘virtual state’ called facebook! †¢The same computing DNA that produced the communications revolution has also created acute vulnerabilities – and attractive terror targets – for societies that depend on cyberspace for national security and economic survival. †¢The growing dependency on the information technology (IT) makes cybersecurity a vital component of the India’s national security infrastructure. Lately, data collection, processing, storage, transmission capabilities, mobile, wireless, and cloud computing are increasing in huge numbers and make cyber attacks easily to occur. †¢Considered the newest domain in modern warfare, cyberspace has now joined the ranks of traditional areas assessed by militaries all over the world. And this is exactly how cyberspace should be assessed, since an effective terrorist attack against a nation’s power grid, for example, could result in massive loss of life, crippling damage to infrastructure and a blow to the economy that could take years to repair. Stuxnet has carried out what in the past could only be accomplished by directly bombing a country’s infrastructure or sending in human agents to plant explosives. †¢It can affect Infrastructures like banking system, air traffic control, power infrastructure and gas pipelines. †¢Destruction now can bypass the military force and attack via â€Å"cyber-brute-force† suppressing a country’s military control systems, navigation, communication system, shutting down or paralysing critical infrastructure and affecting the country’s economy, cyber-weapons linking nuclear weapons †¢Most common usage of Internet is by designing and uploading websites on which false propaganda can be pasted. This comes under the category of using technology for psychological warfare. †¢The web can promote and support acts o f terrorism by means of propaganda, promotion, instructional dissemination and execution, financing, training, recruiting and can also facilitate specific attacks. †¢Non-state actors have the technology to create cyber attacks or endanger the cyber environment of the global socio-political system. The 2011, Arab Spring revolution in Tunisia, Egypt, and Libya was successful to use cyberspace to pass its message. †¢Threats abound: cyber crime, cyber espionage, cyber war and cyber terrorism, all represent genuine risks to nations, firms and individuals around the world. Experts reckoned it is a matter of time before cyberspace becomes an â€Å"independent theatre of war†. †¢With the rapid march of technology, such attacks will only become more widespread as the use of Internet for manipulating things increases. â€Å"We have now entered into a new phase of conflict in which cyber weapons can be used to create physical destruction in someone else’s critical infrastructure. And there is a distinct possibility that the disruptions and dislocations it causes are permanent and severe.† E.g †¢The Flame virus (which has been circulating for more than five years and has yet to be claimed by an owner, although speculation centres around Israel) has turned the computer into the ultimate spy, gathering data files, turning on PC microphones to record nearby conversations, logging instant messaging chats, taking screen shots and even remotely changing settings on other computers. †¢Moreover, hacker groups, such as Anonymous and Lulz Security (Lulz Sec), have executed distributed denial of service (DDOS). Under that process, they were successful to deface websites to various governmental and corporate interests. They hacked NASDAQ and International Momentary Fund (IMF). †¢Internet’s capabilities dictate the rules of engagement in cyberspace to initiate on-ground battles and at the same time create a fertile ground for new, aspiring jihadist. †¢In the recent past, the case of Stuxnet virus which attacked centrifuges. While the targeted victim was the Natanz nuclear site in Iran, other organisations across the world, including in India, operating with the Siemens system suffered from collateral damage from the attack. †¢Since 2000-01, there have been regular reports of Pakistani cyber criminals defacing Indian websites and writing derogatory messages against India. On the other hand, China has become a formidable adver sary in cyber space. Recent cases of Chinese hacking into many Indian government establishment computers and even the highly secure national security domains provide enough evidence of its capability in waging cyber warfare. Since 2003, the People’s Liberation Army has trained more than 30,000 cyber warriors and another 150,000 in the private sector. According to several reports available in the public domain, the Chinese goal is to build the world’s best ‘informationised armed forces’. †¢ Existing Counter Cyber Security Initiatives. Indian Computer Emergency Response Team (Cert-In). Cert-In is the most important constituent of India’s cyber community. Its mandate states, ‘ensure security of cyber space in the country by enhancing the security communications and information infrastructure, through proactive action and effective collaboration aimed at security incident prevention and response and security assurance’. National Information Security Assurance Programme (NISAP). (a) Government and critical infrastructures should have a security policy and create a point of contact. (b) Mandatory for organizations to implement security control and report any security incident to Cert-In. (c) Cert-In to create a panel of auditor for IT security. (d) All organizations to be subject to a third party audit from this panel once a year. (e) Cert-In to be reported about security compliance on periodic basis by the organizations. Indo-US Cyber Security Forum (IUSCSF). Under this forum (set up in 2001) high power delegations from both side met and several initiatives were announced for intensifying bilateral cooperation to control cyber crime between the two countries. To mitigate supply-chain risks emanating from telecom equipment manufactured by companies belonging to China, the telecom and home affairs ministry have issued guidelines mandating service provides to secure their networks and induct equipment that has been tested as per international standards. CCTNS taking help of ISRO for making project fully indigenous Warned by intelligence agencies that using a foreign satellite in the proposed nationwide Crime and Criminal Tracking Network and Systems (CCTNS) could make critical databases vulnerable to eavesdropping by other countries, the Union Home Ministry has decided to take the help of the Indian Space Research Organisation (ISRO) to make the project fully indigenous. Since the intelligence agencies raised objections to the proposed use of the IPSTAR satellite managed by Thaicomm in the project, the BSNL diverted to this project some 400 VSATs that it had for other services. Fact Box: National Cyber Coordination Centre (NCCC) Indian government will establish its own multi-agency body — National Cyber Coordination Centre (NCCC) — that would carry out â€Å"real-time assessment of cyber security threats† and â€Å"generate actionable reports/alerts for proactive actions† by law enforcement agencies. NCCC , to be set up at a cost of Rs 1000 crore, would be a multi-agency body under Department of Electronics and IT. It will function in sync with other government agencies. These agencies include: †¢National Security Council Secretariat (NSCS) †¢Intelligence Bureau (IB) †¢Research and Analysis Wing (RAW) †¢Indian Computer Emergency Response Team (CERT-In) †¢National Technical Research Organisation (NTRO) †¢Defence Research and Development Organisation (DRDO) †¢DIARA (Defence Information Assurance and Research Agency) †¢Army, Navy, Air Force †¢Department of Telecommunications What will be its functions? †¢It will be India’s first layer for cyber threat monitoring and all communication with government and private service providers would be through this body only. †¢The NCCC would be in virtual contact with the control room of all Internet Service Providers to scan traffic within the country, flowing at the point of entry and exit, including international gateway. †¢Apart from monitoring the Internet, the NCCC would look into various threats posed by cyber attacks. †¢ The agency will provide law enforcement agencies direct access to all Internet accounts, be it e-mails, blogs or social networking data. DRDO doesn’t uses any US based company services in its organization. Challenges In India, we need to create an environment within which security is built into our cyber and communications working methods. While it is the government that correctly takes a lead in evolving a coherent picture of what constitutes vulnerability in our cyber domain and a strategy on how to counter attacks, the private sector needs to recognise the real threat it faces. And this is not a future threat or a prospective threat that we need to prepare ourselves against; this is an ongoing, current threat.Cyber threat will continue to grow due to the fast evolution and development of internet and related technologies. At the global level, nations are stepping up their cyber defence efforts. The U.S. was one of the first countries that considered this to be a strategic problem in 2006, both in terms of national security and their future economic wellbeing. †¢The major concern when dealing with Cyber threats is ubiquity and anonymity. What other international medium is highly accessible, far-reaching, ridiculously inexpensive, whereby information is transferred at the speed of light, the attacker invisible and untraceable? Unlike a missile trajectory, IP (Internet Protocol) pathways can be masked and the locations appear opaque. Implicating a source and assigning blame to the attack progenitor is extremely difficult. †¢the extreme difficulty of producing timely actionable warning of potential cyber attacks †¢the extreme complex vulnerability associated with the IT supply chain for various India’s networks †¢India’s approach to cyber security has so far been ad hoc and piecemeal. A number of organisations have been created but their precise roles have not been defined nor synergy has been created among them. †¢ Lack of awareness and the culture of cyber security at individual as well as institutiona l level. †¢ Lack of trained and qualified manpower to implement the counter measures. †¢Too many information security organisations which have become weak due to ‘turf wars’ or financial compulsions. †¢A weak IT Act which has became redundant due to non exploitation and age old cyber laws. †¢ No e-mail account policy especially for the defence forces, police and the agency personnel. †¢Cyber attacks have come not only from terrorists but also from neighboring countries inimical to our National interests. Recommendations. International Co-operation †¢Acknowledging that better indigenous snooping capabilities may not be enough to protect India’s cyber security, National Security Advisor Shivshankar Menon has advocated formulating a set of â€Å"standard operating procedures† (SOPs) — ground rules for cooperation which would help India succeed in obtaining Internet information from major powers that control much of cyber space. †¢Given the cyber reality, ‘sensible’ powers should work towards a globally acceptable cyber regime to bring in a set of rules, build transparency and reduce vulnerabilities. †¢Agreements relating to cyber security should be given the same importance as other conventional agreements. †¢The government should also consider joining the European Convention on Cyber crime. †¢A 24Ãâ€"7 nodal point for international cooperation with cyber authorities of other countries should be set up. Critical Infrastructure †¢Cyber security should be mandatory in computer science curriculum and even separate programmes on cyber security should be contemplated. Government should initiate a special drive of implementing practices in the critical infrastructure sectors and provide necessary budgetary support for such implementation. †¢ Government should establish a mechanism for measuring preparedness of critical sectors such as security index, which captures preparedness of the sector and assigns value to it. †¢Government should incorporate IT Supply Chain Security as an important element of e-security plan to address security issues. †¢Government should promote R&D in private industry through active government support for industry-led research projects in the areas of security. Establish enabling mechanisms to facilitate this. †¢Emphasis should be placed on developing and implementing standards and best practices in government functioning as well as in the private sector. Cyber security audits should be made compulsory for networked organisations. †¢Capacity building in the area of cyber crime and cyber forensics in terms of infrastructure, expertise and availability of HR and cooperation between industry, LEAs and judiciary. †¢Cyber security education, R&D and training will be an integral part of the national cyber security strategy. †¢PPP model should be explored for taking security to the regions and industry sectors. †¢Strengthening telecom security – one of the key pillars of cyber security, especially through development of standards and establishment of testing labs for telecom infrastructure(equipment, hardware). †¢More investment in this field in terms of finance and manpower. †¢The impact of the emergence of new social networking media, and convergence of technologies on society including business, economy,national security should be studied with the help of relevant experts, Legal †¢Procedural laws need to be in place to achieve cooperation and coordination of international organisations and governments to investigate and prosecute cyber criminals. †¢Government must put in place necessary amendments in existing laws or enact a new legislation like a Data Protection/Privacy Act so as to safeguard against the misuse of personal information by various government agencies and protect individual privacy. †¢Need for trained and qualified experts to deal with the highly specialised field of cyber security and laws related to it. †¢ Govt Machinery †¢Make it a mandatory requirement for all government organisations and private enterprises to have a designated Chief Information Security Officer (CISO) who would be responsible for cyber security. †¢Establishment of a cyber range to test cyber readiness. †¢ More powers to sectoral CERTs. †¢Establish an online mechanism for cyber crime-related complaints to be recorded. †¢Policymakers need to recognise this and put in place structures that allow the sharing of cyber security information through both formal and informal cyber exchanges. That requires a fast, unified action between government agencies and the private sector. †¢Indian agencies working after cyber security should also keep a close vigil on the developments in the IT sector of our potential adversaries. †¢Joint efforts by all Government agencies including defence forces to attract qualified skilled personnel for implementation of counter measures. Awareness Need to sensitize the common citizens about the dangers of cyber terrorism. Cert-in should engage academic institutions and follow an aggressive strategy. Conclusion †¢Defining how we deal with Cyber threats and attacks internationally is crucial to peace and security. If Cyber weapons are treated with indifference in comparison to other weapons then it can open the doors to multifaceted retaliation if a nation is provoked †¢Enforcing the right policies to amalgamate security of governments and law-abiding citizens is critical. The safety of individuals outweighs commercial piracy. Sophism and intellectual rhetoric redirects focus on eliminating irrefutable threats like violence and terrorism. Instead, diluted versions of policies are implemented and lives are put at risk. †¢. â€Å"India must take an early lead in creating a framework where the government, the national security experts and the industry catering to strategic sectors of economy, can come together, to pursue the goal of cyber security in the larger national cause †¢Need to prepare cyber forces . The United States was the first country to formally declare this as the fifth domain warfare after land, sea, air and space. It has also formally classified the use of cyberspace as a â€Å"force†, a euphemism for offensive capability. The Chinese adopted the concept of â€Å"informationalisation† in the mid-1990s and have relentlessly built up structures and operations in this domain. Cyber Security Dilemma †¢John Herz, an American scholar of international relations and law is credited for coining the term â€Å"security dilemma†. †¢ The dilemma expresses how both the strong and weak states can upset the balance of power that could eventually become a catalyst for war. The security dilemma could arise from the state’s accumulation of power due to fear and uncertainty about other states’ intentions. †¢ Post-9/11, successive US administrations have mostly attempted to handle global disorder by accumulating more â€Å"power†. Not surprisingly, since 2007, the US has been collecting and analysing significant amount of data available in the cyber space. †¢Cyber security dilemma of the US was recently exposed by the US whistle-blower Edward Snowden, giving details about the US National Security Agency’s controversial Prism programme. †¢ The US, clearly has been monitoring the global e-traffic covertly and in the process checking on c yber activities on Google, You Tube, Skype, Facebook, etc. This has resulted in a huge amount of metadata (a data about data). †¢ US administration has been spoofing on the rest of the world. †¢In the 21st century, with the number of computer and internet users is increasing significantly, the cyber environment has almost become fundamental to a nation’s ‘existence’. †¢ Over the years Information and Communication Technologies (ICT) have become central to various sectors from social, economic, political to defence. The fillip side to it is that various unauthorised, illegal, criminal, anti-national and terrorist activities have also become rampant. Astonishing as it may sound, but the third most populous country after China and India is not any geographical entity but a ‘virtual state’ called facebook! †¢The human rights activists and states who are under the US surveillance consider it an anti-democratic act that undermines the civil liberties and individual privacy. The absence of a globally accepted cyber regime and legal structure adds further to the commotion. †¢ The excessive dependence on cyber tools has given rise to various vulnerabilities. Recently the US National Security Agency chief Gen Keith Alexander, who also heads the US military’s Cyber Command, has expressed concerns and is of the opinion that on a scale of 1 to 10, the US critical infrastructure’s preparedness to withstand a destructive cyber attack is about 3, this in spite the US having established a major defence infrastructure to defend against foreign hackers and spies. This assessment would push the US to strengthen its defences further. However, since the nature of the threat is extremely dynamic it may not be possible to build any foolproof defensive mechanism. †¢Any cyber architecture can be viewed as a doubled edged sword – either ignore it and be exposed or use it to one’s advantage. Cyber espionage is here to stay. Today, the US is upfront because of its technological superiority and ability to ‘manage’ the ICT industry and prevent few acts of terrorism from actually happening. More importantly, the data gathered would have u tility in other fields too. Conclusion: †¢Snowden has clearly exposed the US but it is hard to imagine that the US would halt its cyber activities. As a leading power, the US is accustomed to international criticism, lawsuits and questioning and at the end of the day cyber spying and spoofing actually strengthens their intelligence gathering capability. †¢It is important to note that cyber expertise offers significant amount of asymmetric advantage to the user. In the future, it is not only the US but many other states that are also likely to use this method (mostly covertly). †¢States would support a cyber regime essentially because intelligence collection is not the sole purpose for possessing cyber assets. ITC also leads to empowerment and its importance for socioeconomic development s undisputed. †¢In general, the norms of privacy in a cyber-era world would remain a constant subject of debate since the nature of technology presents a challenging task to catch the actual offender. Technologically superior power would always have an advantage. The time has come to recognize that in the future we would always be watched and mostly against our own wishes! India-US collaboration in Cyber Security Indian officials and security officers would soon be visiting the U.S. for training in an array of courses — from cyber security, megacity policing and forensics, to critical infrastructure protection, financial terrorism and anti-terrorism intelligence. â€Å"The list of training programmes include ‘Land Transportation Anti-terrorism’; ‘Weapons of Mass Destruction’; ‘Seaport Security’; ‘International Border Interdiction Training’ and ‘International Sea Interdiction Training’ to check smuggling and trafficking; ‘Handling of equipment for screening men against radiological, chemical and explosive materials’ and ‘Handling of intrusive detection at airports and seaports.’ With the growing population in cities and increasing threat perception, the U.S. has also offered India to help develop the concept of megacity policing, a step it has been promoting since the 9/11 attacks. â€Å"An advance course in surveillance, control room design and its operation by various security agencies and police authorities are key elements of this concept. Balancing vigilance and privacy As the government steps up its surveillance capabilities, the entire social contract between the state and citizens is being reformulated, with worrying consequences The Indian state is arming itself with both technological capabilities and the institutional framework to track the lives of citizens in an unprecedented manner. A new Centralised Monitoring System (CMS) is in the offing, which would build on the already existing mechanisms. As The Hindu reported on June 21, this would allow the government to access in real-time any mobile and fixed line conversation, SMS, fax, website visit, social media usage, Internet search and email, and will have ‘unmatched capabilities of deep search surveillance and monitoring’. Civil society groups and citizens expressed concern about the government’s actions, plans, and intent at a discussion organised by the Foundation for Media Professionals, on Saturday. The context Usha Ramanathan, a widely respected legal scholar, pointed to the larger political context which had permitted this form of surveillance. It stemmed, she argued, from a misunderstanding of the notion of sovereignty. â€Å"It is not the government, but the people who are sovereign.† Laws and the Constitution are about limiting the power of the state, but while people were being subjected to these restrictions, the government itself had found ways to remain above it – either by not having laws, or having ineffective regulators. States knew the kind of power they exercised over citizens, with the result that ‘impunity had grown’. â€Å"There is also a complete breakdown of the criminal justice system,† Ms Ramanathan said. This had resulted in a reliance on extra-judicial methods of investigation, and ‘scape-goating’ had become the norm. ‘National security’ had been emphasised, re-emphasised, and projected as the central goal. â€Å"We haven’t paused to ask what this means, and the extent to which we have been asked to give up personal security for the sake of national security.† It was in this backdrop that technology had advanced by leaps, and made extensive surveillance possible. The implications are enormous. The data is often used for purposes it is not meant for, including political vendetta, keeping track of rivals, corporates, and digging out facts about a citizen when he may have antagonised those in power. Pranesh Prakash, director of the Centre of Internet and Society (CIS) looked back at the killing of Haren Pandya, the senior Bharatiya Janata Party (BJP) leader in Gujarat. Mr Pandya was using the SIM card of a friend, and it was by tracking the SIM, and through it his location, that the Gujarat government got to know that Mr Pandya had deposed before a commission and indicted the administration for its role in the riots. Eventually, he was found murdered outside a park in Ahmedabad. The Gujarat Police had accessed call details of 90,000 phones. It is also not clear whether mining this kind of data has been effective for the national security purposes, which provide the reason for doing it in the first place. Saikat Datta, resident editor of Daily News and Analysis, and an expert on India’s intelligence apparatus, said a core problem was the absence of any auditing and over sight. â€Å"There needs to be a constant review of the number of calls, emails under surveillance, with questions about whether it is yielding results. But this does not happen, probably because a majority is not for counter-terrorism. There would be trouble if you build accountability mechanisms.† When he sought information under RTI around precisely such issues, he was denied information on the grounds that it would strengthen ‘enemies of the state’. Anja Kovacs, who works with the Internet Democracy Project, said this form of â€Å"mass surveillance† criminalised everybody since it was based on the assumption that each citizen was a â€Å"potential criminal†. She also pointed out that having â€Å"more information† did not necessarily mean it was easier to address security threats – there was intelligence preceding the Mumbai attacks, but it was not acted upon. She added, â€Å"Most incidents have been resolved by traditional intelligence. Investing in agencies, training them better could be more effective.† Bring in the caveats Few argue that the state is not entitled to exercise surveillance at all. In fact, a social contract underpins democratic states. Citizens agree to subject some of their rights to restrictions, and vest the state with the monopoly over instruments and use of violence. In turn, the state – acting within a set of legal principles; being accountable to citizens; and renewing its popular legitimacy through different measures, including elections – provides order and performs a range of developmental functions. This framework, citizens and civil liberty groups worry, is under threat with governments appropriating and usurping authority to conduct unprecedented surveillance. Citizen groups, technology and privacy experts came together globally to draft the International Principles on the Application of Human Rights to Communication Surveillance. It prescribed that any restriction to privacy through surveillance must be ‘legal’; it must be for a ‘legitimate aim’; it must be ‘strictly and demonstrably necessary’; it must be preceded by showing to an established authority that other ‘less invasive investigative techniques’ have been used; it must follow ‘due process’; decisions must be taken by a ‘competent judicial authority’; there must be ‘public oversight’ mechanisms; and ‘integrity of communications and systems’ should be maintained. (Full text available on www.necessaryandproportionate.org)Mr Prakash of CIS, which has done extensive work on surveillance and privacy issues, said, â€Å"An additional principle must be collection limitation or data minimisation.† Giving the instance of Indian Railways seeking the date of birth from a customer booking a ticket, Mr Prakash said this was not information which was neces sary. But it could be used by hackers and many other agencies to access an individual’s private transactions in other areas. The UPA government is finalising a privacy Bill, but its final version is not yet public, and it is not clear how far the government would go in protecting citizen rights. National cyber security Policy 2013 National Cyber Security Policy 2013 This policy aims at facilitating creation of secure computing environment and enabling adequate trust and confidence in electronic transactions and also guiding stakeholders actions for protection of cyber space. †¢ The National Cyber Security Policy document outlines a road-map to create a framework for comprehensive, collaborative and collective response to deal with the issue of cyber security at all levels within the country. †¢ The policy recognises the need for objectives and strategies that need to be adopted both at the national level as well as international level. †¢ The objectives and strategies outlined in the National Cyber Security Policy together serve as a means to: i. Articulate our concerns, understanding, priorities for action as well as directed efforts. ii. Provide confidence and reasonable assurance to all stakeholders in the country (Government, business, industry and general public) and global community, about the safety, resiliency and security of cyber space. iii. Adopt a suitable posturing that can signal our resolve to make determined efforts to effectively monitor, deter & deal with cyber crime and cyber attacks. Salient features of the policy †¢The Policy outlines the roadmap for creation of a framework for comprehensive, collaborative and collective responsibility to deal with cyber security issues of the country. The policy has ambitious plans for rapid social transformation and inclusive growth and India’s prominent role in the IT global market. †¢The policy lays out 14 objectives which include creation of a 5,00,000-strong professional, skilled workforce over the next five years through capacity building, skill development and training. †¢The policy plans to create national and sectoral level 24Ãâ€"7 mechanisms for obtaining strategic information regarding threats to ICT infrastructure, creating scenarios for response, resolution and crisis management through effective, predictive, preventive, proactive response and recovery actions. †¢The policy will also establish a mechanism for sharing information as well as identifying and responding to cyber security incidents and for cooperation in restoration efforts. †¢The policy identifies eight different strategies for creating a secure cyber eco-system including the need for creating an assurance framework apart from encouraging open standards to facilitate inter-operability and data exchange amongst different products or services. †¢There is in place a plan to operate and strengthen the national Computer Emergency Response Team (CERT-In) to operate 24Ãâ€"7 and to act as a nodal agency for all efforts for cyber security, emergency response and crisis management, as an umbrella agency over CERTs. †¢It is expected that he policy w ill cater to the cyber security requirements of government and non-government entities at the national and international levels. The policy will help in safeguarding the critical infrastructure like Air Defence system, nuclear plants, banking system, power infrastructure, telecommunication system and many more to secure country’s economic stability. National Nodal Agency †¢The National Cyber Security Policy, in order to create a secure cyber ecosystem, has planned to set-up a National Nodal Agency. The nodal agency will be coordinating all matters related to cyber security in the country. †¢The nodal agency has a wide mandate as it will cover and coordinate security for all strategic, military, government and business assets. This is distinctive, since, so far, national security regimes have been divided among the Ministry of Defence (for securing India’s borders) and the Ministry of Home Affairs (for national and internal security across States). Public-private partnership to protect national assets †¢Another defining aspect of the policy is the level at which it envisages public-private partnership to protect national assets. †¢There is a clear recognition in the policy that, apart from India’s IT, technology and telecommunications services, large parts of financial & banking services, airline & transportation services, energy and healthcare assets are not only owned by the private sector but, in fact, remain vulnerable to cyber-attacks, both from state and non-state actors. Protection centre †¢A crucial aspect of the policy is building resilience around the Critical Information Infrastructure (CII) by operationalising a 24Ãâ€"7 Nation Critical Information Infrastructure Protection Centre (NCIIPC). The Critical Information Infrastructure will comprise all interconnected and interdependent networks, across government and private sector. †¢The NCIIPC will mandate a security audit of CII apart from the certification of all security roles of chief security officers and others involved in operationalising the CII. Operationalisation †¢The policy will be operationalised by way of guidelines and Plans of Action, notified at national, sectoral, and other levels. While there is a recognition of the importance of bilateral and multilateral relationships, the policy does not clearly identify India’s position vis-à  -vis the Budapest Convention even though government delegations have attended meetings in London and Budapest on related issues in 2012. Why does India need a cyber security policy? †¢Cyber security is critical for economic security and any failure to ensure cyber security will lead to economic destabilisation. †¢India already has 800 million active mobile subscribers and 160 million other Internet users of which nearly half are on social media. India targets 600 million broadband connections and 100% teledensity by 2020. Internet traffic in India will grow nine-fold by 2015 topping out at 13.2 exabytes in 2015, up from 1.6 exabytes in 2010. †¢The ICT sector has grown at an annual compounded rate of 33% over the last decade and the contribution of IT and ITES industry to GDP increased from 5.2% in 2006-7 to 6.4% in 2010-11, according to an IDSA task force report of 2012. †¢Given the fact that a nation’s cyber ecosystem is constantly under attack from state and non-state actors both. It becomes extremely critical for India to come up a coherent cyber security policy. †¢One of the key objectives for the government is also to secure e-governance services where it is already implementing several nationwide plans including the â€Å"e-Bharat† project, a World Bank-funded project of Rs. 700 crore. Criticism The release of the National Cyber Security Policy 2013 is an important step towards securing the cyber space of our country. However, there are certain areas which need further deliberations for its actual implementation. The provisions to take care security risks emanating due to use of new technologies e.g. Cloud Computing, has not been addressed. Another area which is left untouched by this policy is tackling the risks arising due to increased use of social networking sites by criminals and anti-national elements. There is also a need to incorporate cyber crime tracking, cyber forensic capacity building and creation of a platform for sharing and analysis of information between public and private sectors on continuous basis. Creating a workforce of 500,000 professionals needs further deliberations as to whether this workforce will be trained to simply monitor the cyberspace or trained to acquire offensive as well as defensive cyber security skill sets. Indigenous development of cyber security solutions as enumerated in the policy is laudable but these solutions may not completely tide over the supply chain risks and would also require building testing infrastructure and facilities of global standards for evaluation. Indian Armed forces are in the process of establishing a cyber command as a part of strengthening the cyber security of defence network and installations. Creation of cyber command will entail a parallel hierarchical structure and being one of the most important stakeholders, it will be prudent to address the jurisdiction issues right at the beginning of policy implementation. The global debate on national security versus right to privacy and civil liberties is going on for long. Although, one of the objectives of this policy aims at safeguarding privacy of citizen data however, no specific strategy has been outlined to achieve this objective. The key to success of this policy lies in its effective implementation. The much talked about public-private partnership in this policy, if implemented in true spirit, will go a long way in creating solutions to the ever-changing threat landscape. Central Monitoring System (CMS) project – Justified †¢Indian government’s own Central Monitoring System (CMS) project. †¢roughly 160 million users are already being subjected to wide-ranging surveillance and monitoring, much of which is in violation of the government’s own rules and notifications for ensuring â€Å"privacy of communications†. †¢ While the CMS is in early stages of launch, investigation shows that there already exists — without much public knowledge — Lawful Intercept and Monitoring (LIM) systems, which have been deployed by the Centre for Development of Telematics (C-DoT) for monitoring Internet traffic, emails, web-browsing, Skype and any other Internet activity of Indian users. †¢While mobile operators deploy their own LIM system, allowing â€Å"interception† of calls by the government, only after checking â€Å"due authorisation† in compliance with Section 5(2) of the Indian Telegraph Act read with Rule 419(A) of the IT Rules †¢In the case of the Internet traffic, the LIM is deployed by the government at the international gateways of a handful of large ISPs. The functioning of these secretive surveillance systems is out of reach of these ISPs, under lock and key and complete control of the government.