Friday, February 28, 2020

Assignment 2 Essay Example | Topics and Well Written Essays - 1000 words - 2

Assignment 2 - Essay Example Assessing the risk comprehensively includes evaluating the total magnitude and likelihood of the potentiality of losses, and also offers a full understanding, of the roots and impact of these losses (Kevin, n.d.). A comprehensive risk assessment involves the following steps: 1. Setting and understanding the context. It involves articulating the objectives and the parameters of the institution considers when managing risks. This is assesses the current situation, needs gaps and evaluates what already exists, to build on the capacity and avoid duplication of efforts. This is carried out through a systematic inventory and evaluation of the already existing risk assessment studies and the available data (FIRESCOPE, 1994). 2. Hazard identification This involves finding the type, location, intensity, and likelihood of threats and risks prevalent in a given community. 3. Evaluating exposure This identifies the population and the property that is at risk and demarcates disaster prone areas. 4. Analysis of vulnerability This determines the capacity of the elements in a given community at risk to withstand the risk conditions. 5. Impact analysis This outlines the estimation of potential losses of the exposed population, property, livelihood, environment and the economy. 6. Profiling the risk This evaluates the various cost effective risk reduction options available, in terms of the ability of the community in risk reduction and its socio-economic concerns. 7. Formulation and revisions of action strategies and plans. This involves setting priorities, allocation of resources (both human and financial) and initiating relevant programmes. The all hazards approach entails inclusion of all the possible types of risk or threat in risk assessment. It aims to include all the types of risk, irrespective of the source, to give a standardized overview guided by a set of principles and steps. It’s a comprehensive and integrated means of assessing threats and risks. Assessing r isks using the all hazards approach in an integrated way significantly reduces the vulnerability of people, property, environment and the economy (Service, 2010). Question 2 Business continuity refers to the ability of an organization to provide support and service to its clients and its ability to keep up its viability before, during and after a business continuity occurrence. It’s a holistic management approach that recognizes the potential impact that would threaten the firm and it offers a framework of building the capacity and resilience for an effective response so as to safeguard its interests. Although it may be more practical for large businesses, it is very important to maintain full functioning throughout a disaster crisis. Business continuity plans also outlines the basic concerns like the leadership command in an event a company leader dies or is really ill. They also address backup plans for drastic scenarios such as patent lawsuits, labour disputes, or bottlene cks distortions. This allows the leaders to review the threats and weaknesses to their organization from a detached point of view. Tight plans guarantee the teams that the leaders are aware of how to turn on a dime when in challenging times. The process can also highlight the weaknesses of an organization can correct way before facing a disaster. For a business to be successful, it has to constantly meet the needs to its customers. Failure to

Wednesday, February 12, 2020

Why Mobile Phone Conversations Are Never Private Essay

Why Mobile Phone Conversations Are Never Private - Essay Example The privacy of mobile phones for instance, has been a predominant topic in the field of feminist media studies (Baker, 2006, p.1). Through the use of mobile phones, many people have been subjected to unwarranted infringement of personal privacy depending on the gender of the individual and this has led to various studies aimed at investigating how different genders use mobile phones and how the use of these devices has contributed to politically-motivated social history (Hijazi-Omari & Ribak, 2008, p.154). This paper seeks to explore the relationship between the use of mobile phones by teenage girls and the resulting privacy issues. The paper will further focus on the contemporary media practices and how they have influenced different people’s lives depending on their genders. Moreover, the paper will examine the various elements of insecurity applicable in the use of mobile phones and how these pronounce the privacy complexities (Stuart, 2007, p.1). Eavesdroppers, hackers and thieves Despite the conventional privacy belief associated with the use of mobile phones, their use has actually exposed many people to the traps of unintended and self privacy infringing illegal use (Stuart, 2007, p.2). Today, the use of mobile phones has increased to a level that it does not matter where you are or what you are doing but whether your hands are free to hold the handset to your ears for conversation as long as the other person is ready to communicate. The freedom brought by the use of mobile phones has highly influenced the social structures of various communities and even cultures that never used to communicate physically can now access and communicate to the other party devoid of the cultural barriers (McRobbie, 2007, p.720). In this regard, feminist populations in communities that do not allow women to freely mingle with men have been able to freely communicate with their male counterparts without the culturally defined blockages. However, it is imperative to no te that the use of mobile phones has also worked to fuel various illegal activities since other people are able to intercept the communication between the users of mobile phones making the communication media vulnerable (Baker, 2006, p.1). Given the frequency of use and the location of the users of mobile phones, eavesdroppers, hackers and thieves have found it easy to access the mobile phone devices and this enables them to plan and execute their illegal acts without the consent of the mobile phone users (Stuart, 2007, p.1). In many occasions people share their experiences and even personal information with the other users of mobile phones without considering their location and whether there are people around them who could use such information for other purposes. Take for example the use of mobile phones in a cyber cafe or even in a foods store. In these places, different people come for different purposes and some people can access other electronic equipments like lap tops and ot her computer devices (Krotz, 2011, p.2). When an individual either in a line waiting to be served or already enjoying the services of the facility begins to communicate with another person sharing individual experiences and personal information, another person in the same place could easily record the personal information and even schedules and this will aid their planning and execution of illegal acts (Earle, 2010, p.1). Eavesdroppers, hackers and thieves have made the use of mobile phones less private as should be according to the conventional beliefs (Privacy Rights Clearinghouse, 2010, p.2). In this regard, hackers have shown that they don’t actually need the physical mobile devise to track and utilize personal information of the owner of the mobile phon