Tuesday, December 31, 2019
Keynes Macroeconomic Theory Essay - 1181 Words
How did Keyness idea of the reasons for the macro-economic instability challenge the prevailing economic orthodoxy? After 100 years of the industrialization era modern economics began to see a change and shift of ideas. These ideas were brought to the front by John Maynard Keynes, who in 1936 transformed much of the modern economics by a single book The General Theory of Employment, Interest and Money. Keynes also wrote other titles as well as ÃâA Tract on Monetary Reform (1923) which was an attempt to secure a monetary policy instead of the gold standard. Keynes (2002) believed that the stable economy of Britain was more desirable than the stable value of the pound on the foreign exchange. He argued against going back to the goldâ⬠¦show more contentâ⬠¦Keynes also suggested that to keep both in balance a managed monetary system should be introduced. Keynes published this book during the Wall Street crash and yet again Keyness idea was not paid much attention to as economists as well as government officials were not aware of how serious the depression was going to be. Then Keynes wrote his book ÃâThe General Theory of Employment, Interest, and money but the ideas in this book were inspired by the work of other economists. Michael Tugan-Baranowskys development was later an important part of Keyness analysis. He said that the imbalance between savings and investments were at the heart of the business cycle. He said that the imbalance could not be overcome by changes in the interest rates, as he argued that there were reasons than the interest rate that motivated people to save. An even more important breakthrough was made by a Swedish economist. Knut Wicksell was the Swedish economist, and it was based on his ideas that Keynes developed the theory of national income which led to the Keynesian revolution. Says Law suggested that any money saved will eventually get invested, and if there was some imbalance in savings and investment it would be fixed by a rise or fall in interest rate. However,Show MoreRelatedJohn Maynard Keynes Contribution to the Theories of Macroeconomics805 Words à |à 3 PagesMacro Questions Part I Describe John Maynard Keynes contribution to the theories of Macroeconomics. Why was he such an important economist? Discuss the theories of two other 20th century economists who made a significant contribution to the study of economics. John Maynard Keynes is one of the founding fathers of the modern economic thought. So influential was John Maynard Keynes in the middle third of the twentieth century that an entire school of modern thought bears his name Keynesian EconomicsRead MoreJohn Maynard Keynes : The Father Of Macroeconomics1502 Words à |à 7 PagesAbstract John Maynard Keynes, also known as the ââ¬ËFather of Macroeconomicsââ¬â¢, is a twentieth century economist, whose impact on economic theories has proven substantial contribution to reconstructing of economical values. He had influential individuals who helped intrigue and develop his interests in economic. Keynes interests were beyond economics; he took active stance on proposing post-war monetary funds, important for Germanyââ¬â¢s reparation and reconstruction funds after World War II. Through hisRead MoreJohn Maynard Keynes s Economic Theory And Policy After World War II1307 Words à |à 6 Pagesemployment. John Maynard Keynes came up with a theory as a counterargument: that aggregate demand is the single most powerful force in any economy. Keynes explains that free markets are not able to balance themselves out enough to lead to the full employment everyone was waiting for. The 1930s gave rise to Keynesââ¬â¢ ideas, especially after the publication of his revolutionar y book The General Theory of Employment, Interest, and Money in 1936. ââ¬Å"Keynesian economics dominated economic theory and policy afterRead MoreEssay Keynesian Economics1662 Words à |à 7 Pages Macroeconomics is the branch of economics concerned with the aggregate, or overall, economy. Macroeconomics deals with economic factors such as total national output and income, unemployment, balance of payments, and the rate of inflation. It is distinct from microeconomics, which is the study of the composition of output such as the supply and demand for individual goods and services, the way they are traded in markets, and the pattern of their relative prices. At the basis of macroeconomicsRead MoreMacroeconomics Term Paper : Keynesian Economics999 Words à |à 4 PagesMacroeconomics Term Paper: Keynesian Economics John Maynard Keynes: A famous economist John Maynard Keynes once said ââ¬Å"by a continuing process of inflation, government can confiscate, secretly and unobserved, an important part of the wealth of their citizenâ⬠(Brainy, n.d., p.1). Keynes had studied in an economics and finance program, and he searched for a solution as he felt that a depression in our economy may be rising. The solution that Keynes discovered was completely different than any otherRead MoreBiography of John Maynard Keynes Essay990 Words à |à 4 Pageshistory of economics, there have been many experts and professors whose ideas and theories have fundamentally affected our thoughts and practices, but none has been as influential on this subject as John Maynard Keynes. He was a British economist who revolutionized economic thinking and to this day his work continues to be appreciated and utilized by many into what is known as ââ¬Å"Keynesian Economics.â⬠John Maynard Keynes was an Englishman born in 1883, who went on to become one of the most influentialRead MoreKayne vs Hayek1370 Words à |à 6 PagesChanya Udomphorn ID# 5380040 Macroeconomics Mr. Rattakarn Komonrat Keynes vs. Hayek Macroeconomics is a branch of economics dealing with the performance, structure, behavior, and decision-making of the whole economy. Macroeconomists study aggregated indicators such as GDP, unemployment rates, and price indices to understand how the whole economy functions. They develop models that explain the relationship between such factors as national income, output, consumption, unemployment, inflationRead MoreEssay on Keynesian Revolution1244 Words à |à 5 PagesKeynesian Revolution Classical economic theory assumed that a ââ¬Ëfree-marketââ¬â¢ economy is a ââ¬Ëself regulatingââ¬â¢ system that continually tends toward a full-employment equilibrium, with optimum economic benefits for everyone. Therefore, the best government economic policy is to ââ¬Ëexcuse itselfââ¬â¢ and give utmost freedom to individual enterprise. A key element of the ââ¬ËKeynesian revolutionââ¬â¢ was its demonstration that these basic assumptions are false, both in theory and practice, and its assertion that, thereforeRead MoreFinance Is Based On Economics841 Words à |à 4 Pagesneeds by humans. Macroeconomics started with John Maynard Keynes, an English economist, who published a book entitled General Theory of Employment, Interest and Money in 1936. Keynes offered a clarification for the fallout from the Great Depression, when goods remained unsold and workers unemployed, a feat that left classical economists stumped. Keynes theory explained why markets may no t clear. This theory evolved throughout the 20th century, diverting into several macroeconomic schools of thoughtRead MoreKeynes Versus Friedman745 Words à |à 3 PagesKeynes versus Friedman To begin with, I would like to say that these to economists made perhaps the greatest and the most significant contribution to economy in the twentieth century. They are beyond any doubt among most powerful intellectuals that set their feet over the ground. Ideas they created, patterns they discovered and laws they introduced have become fundamental in political economy and macroeconomics. Still, these two brilliant minds did not share each othersââ¬â¢ views over some basic economics
Monday, December 23, 2019
College Has Changed Me At The University Of Arizona
Before attending the University of Arizona, I felt a need to set a specific goal to achieve in ten years later. The collegiate journey was more different than I aspect. With far more about many options in careers, I had realized that broader goals could help me explore what actually interest me the most. Before I started college, I had chosen pre-physiology. However, I am majoring in biomedical engineering now and really enjoy taking engineering courses. Currently, I have broadened my horizons to consider both graduate and medical schools unlike before. Before, I never believed that one can change goals so rapidly. Now, college has changed me. With the help of scholarships like AAFASAA, I have the chance to get more involved with the community. Thus I am re-applying for this scholarship because it had created many impacts upon my new life as a college student. By participating in the AAFASAA events last summer, I formed mentoring relationship with many upperclassmen and faculty, who then later introduce me to be a part of the Asian community. Also, I feel the eagerness to learn more about the Asian clubs in the UA to build up my Asian identity. Currently, I am an active member is the Society of Asian Scientists and Engineers (SASE), APAMSA, and Vietnamese Students Association club. I also joined the EDGE program to receive some help in the transition to college. These clubs have many different events such as career building, teaming, or getting help with research. The clubsShow MoreRelatedFamily Is The Most Significant Impact On My Life876 Words à |à 4 PagesFamily is my everything. Family has shaped both my character a nd my identity; however, my sister has had the most significant impact on me. My sister, Jordan, and I grew up as any typical sisters would. We never saw eye to eye and fought over who borrowed whose shirt. That all changed the summer going into my freshman year of high school and her freshman year of college. Jordanââ¬â¢s dream college was Arizona State University and unfortunately we were still living in Colorado at the time. My family wasRead MoreEssay on Profile of a Person1649 Words à |à 7 PagesRaphael Colmanette 1 Dr.McDonough 10/16 First Year Writing Clash Of Cultures There are a lot of people around Belmont University with different concepts, different goals, different experiences, different cultures, but most important, different methods of thinking. When I realized that I would need to write a profile of someone else, I thought it would be the easiest essay that I have ever done. Contrary to my expectations, I realized that to write someone elses profile is kind of hard,Read MoreMy Identity And Representation : I Am An International Student At Arizona State University1861 Words à |à 8 Pagesstudent at Arizona State University, so my life in the United State could not live without friends, family support and other outside social groups. Living by myself in other country, I have to face a lot problem in every single day, that is the main reason for me to take a part it and join them. I belong with many social groups, and those groups relate to my life and changed my identity, in each group I represent different role and things. Primarily, I am a part of Chinese group at Arizona state universityRead MoreCollege At Arizona State University1611 Words à |à 7 Pages(MU) at Arizona State University (ASU). Not everyone loves crowded, cramped, and/or cluttered places. In fact, some people want a space that is calm, inviting, and their own. For the students that attend Barrett, The Honors College at Arizona State University it is just that, a secluded welcoming part of ASU. Not only is Barrett a portion of ASU that seems distant from other dorms, it has its very own unique feel. You can walk into Palo Verde East or West, Manzanita, or even the University Tower andRead MoreEssay on Back to School1283 Words à |à 6 Pageshead now and then, but I never really intended to follow through with it. However, now that I am back in school, it has changed my goals in my life, not only for me but also for my children. I want to be a positive role model. I would like to be someone they could look up to and be proud of. As for me, my role model was my grandfather, I always looked up to him and he has never let me down. I grew up on the Navajo reservation, without running water and electricity. We used oil lanternsRead MoreSocioautobiography1571 Words à |à 7 Pagesï ¿ ½PAGE ï ¿ ½ A Slice of My Life Chamberlain College of Nursing SOCS 185 ï ¿ ½ A slice of My Life The older I grow the more everything begins to come together in relation to the type of person I am today, and how the choices my family and I have made have shaped and become the definition of this thing I call life. I have a pretty good idea about who I am as a person, but after all the discussions we hold in class, I was starting to become curious about the kind of person I am in the eyes of our societyRead More An Event that Defines Me Essay990 Words à |à 4 PagesAn Event that Defines Me There really is no particular event in my life that I can say defines me. Though there are a series of events that has shaped me into the person that I am today. The events that have defined my life have been trials that have tested my integrity and my faith. I have stumbled and fallen but have gotten up time and time again to only go further than before. There have been walls and obstacles that have kept me from being an individual that values higher educationRead MoreIs Arizona Cardinals All Pro Wide Receiver? Essay1154 Words à |à 5 PagesThis advertisement features Arizona Cardinals all-pro wide receiver, Larry Fitzgerald, who ââ¬Å"fulfilled the promise he made to his mother by completing his Bachelor in Communication at University of Phoenix. With perseverance, he has now become a role model to others who value higher education.â⬠This is an extremely captivating ad, illustrating Mr. Fitzgeraldââ¬â¢s desire to keep the promise he made before his motherâ⠬â¢s untimely death, over a decade ago. The target audience for this commercial are adultRead MoreAn Opportunity At The 4 + 1 Program878 Words à |à 4 Pagesstarted developing my career goal since I was a teenager in middle school. As time passes, my goals have changed from wanting to be a police officer, to now striving to be a judge. My family has been very inspirational to me; they have been there for me in positive and negative situations. When I achieve my career goals in life, with the support of my loved ones and Arizona State University (ASU), I will bring back to my community a role model for others to follow. In ASU, I am planning to pursueRead MoreHow Change Is A Essential Part Of Life936 Words à |à 4 PagesMy choices over the course of this semester have changed me for the better. I started this class oblivious to the norms and traditions of a college English class. I must admit that for the first few weeks I was shocked at how different college is from my sim ple high school English course. I now have a different outlook on life. At the beginning of the semester I wasnââ¬â¢t sure whether or not I wanted to further my education at a four year university, or successfully complete my AA degree and then enter
Saturday, December 14, 2019
Introduction of Information Security Systems Cis4385 Free Essays
string(147) " in the case of server failure, theft, and disaster, but transfers the risk of losing the money those servers are worth in the case they are lost\." 1. Which if the following IPv6 address type is assigned to multiple interfaces but packets will only be delivered to one? a. Multicast b. We will write a custom essay sample on Introduction of Information Security Systems Cis4385 or any similar topic only for you Order Now Anycast c. Unicast d. Broadcast Grade:1 User Responses:b. Anycast Feedback:a. An anycast address is assigned to a group of interfaces on multiple nodes. Packets are delivered to the ââ¬Å"firstâ⬠interface only. 2. Routers operate at which OSI layer? a. Physical b. Transport c. Network d. Session Grade:1 User Responses:c. Network Feedback:a. Routers operate at the network layer making routing decisions based on IP addresses. 3. Which of the following is NOT a private IPv4 address? Choose all that apply. a. 192. 168. 5. 60 b. 172. 25. 6. 4 c. 10. 0. 6. 5 d. 26. 68. 6. 1 Grade:1 User Responses:d. 26. 68. 6. 1 Feedback:a. The private IP address ranges are as follows. IP Class Assigned Range Class A 10. 0. 0. 0-10. 255. 255. 255 Class B 172. 16. 0. 0-172. 31. 255. 255 Class C 192. 168. 0. 0-192. 168. 255. 255 4. What is a server that evaluates Internet requests from LAN devices against a set called? a. Proxy b. Firewall c. Load balancer d. NAT server Grade:1 User Responses:a. Proxy Feedback:a. A server that evaluates Internet requests from LAN devices against a set of rules is called a proxy server. NAT servers perform private to public address translation; load balancers manage traffic between cluster hosts; and a firewall filters traffic based on access control lists. 5. Which type of device maintains awareness of the status of connections, thereby preventing IP spoofing attacks? a. Stateless packet filtering firewall b. Stateful packet filtering firewall c. NAT filter d. Application-level gateway Grade:1 User Responses:b. Stateful packet filtering firewall Feedback:a. A stateful packet filtering firewall is one that monitors the state of each connection by examining the header of each packet. Read thisà Chapter 2 ââ¬â Why Security is Needed A stateless packet filtering firewall does not do this. NAT filters perform only private-to-public address translation. An application-level gateway provides protection to a specific application such as FTP. 6. Which of the following firewall services works at the session layer of the OSI model? a. Application layer gateway b. Stateful filtering c. NAT d. Circuit-level gateway Grade:0 User Responses:c. NAT Feedback:a. Circuit-level gateways work at the Session Layer of the OSI model and apply security mechanisms when a TCP or UDP connection is established; they act as a go between for the Transport and Application Layers in TCP/IP. After the connection has been made, packets can flow between the hosts without further checking. Circuit-level gateways hide information about the private network, but they do not filter individual packets. 7. Which of the following are the two main functions of a proxy server? a. Caching of web pages b. NAT c. Domain authentication d. DHCP Grade:1 User Responses:a. Caching of web pages,c. Domain authentication Feedback:a. A proxy server secures a network by keeping machines behind it anonymous; it does this through the use of NAT. It also improves web performance by caching web pages from servers on the Internet for a set amount of time. b. A proxy server secures a network by keeping machines behind it anonymous; it does this through the use of NAT. It also improves web performance by caching web pages from servers on the Internet for a set amount of time. 8. Which of the following devices can detect but not prevent attacks across the entire network? a. NIDS b. Host-based IDS c. NIPS d. Protocol Analyzer Grade:1 User Responses:a. NIDS Feedback:a. Network Intrusion Detection Systems (NIDS) detect but do not prevent attacks across the entire network. Host-based IDS can protect only the host on which it is installed. Network Intrusion Protection Systems (NIPS) can detect and prevent attacks across the entire network. A Protocol Analyzer can capture traffic but not act upon it. 9. When a NIPs blocks legitimate traffic, what is it known as? a. False negative b. True negative c. False positive d. True positive Grade:1 User Responses:c. False positive Feedback:a. A blocking of traffic is a positive action, and when it is in response to legitimate traffic, it is considered a false action; thus it is a false positive. A false negative would be when an action is NOT taken on traffic that is not legitimate. The other two options are normal actions; a true negative is the allowing of legitimate traffic, whereas a true positive is the blocking of illegitimate traffic. 10. Which of the following types of NIPS reacts to actions that deviate from a baseline? a. Signature-based b. Heuristic c. Anomaly-based d. Bit blocker Grade:1 User Responses:c. Anomaly-based Feedback:a. Anomaly-based NIPS recognizes traffic that is unusual and reports it. Signature-based NIPs are configured with the signatures of attacks. Heuristics looks for patterns in the traffic, whereas bit blocker is a not a type of NIPs. 11. Which of the following systems attempt to stop the leakage of confidential data, often concentrating on communications? a. DHCP b. DNS c. DLP d. STP Grade:1 User Responses:c. DLP Feedback:a. Data loss prevention (DLP) systems are designed to protect data by way of content inspection. They are meant to stop the leakage of confidential data, often concentrating on communications. As such, they are often also referred to as data leak prevention (DLP) devices, information leak prevention (ILP) devices, and extrusion prevention systems. Regardless, they are intended to be used to keep data from leaking past a computer system or network and into unwanted hands. 12. When a company buys fire insurance they are ____________ risk. a. accepting b. avoiding c. transferring d. reducing Grade:1 User Responses:c. transferring Feedback:a. It is possible to transfer some risk to a third-party. An example of risk transference (also known as risk sharing) would be an organization that purchases insurance for a group of servers in a datacenter. The organization still takes on the risk of losing data in the case of server failure, theft, and disaster, but transfers the risk of losing the money those servers are worth in the case they are lost. You read "Introduction of Information Security Systems Cis4385" in category "Papers" 13. Which of the following processes block external files that use JavaScript or images from loading into the browser? a. URL filtering b. Content filtering c. Malware inspection d. Blacklists Grade:1 User Responses:b. Content filtering Feedback:a. Content filtering is a process that blocks external files that use JavaScript or images from loading into the browser. URL filtering blocks pages based on the URL. Malware inspection looks for malware based on a signature file, and blacklists are items to be denied by spam filters. 14. Which of the following actions should NOT be taken for the default account on a network device? a. Delete it. b. Change the password. c. Disable it. d. Leave it as is. Grade:1 User Responses:d. Leave it as is. Feedback:a. The default account has a well-known username and password, so it should be either deleted or disabled, or at a minimum its password should be changed. 15. Firewall rules are typically based in all but which of the following? a. IP addresses b. MAC addresses c. Port numbers . Content type Grade:1 User Responses:d. Content type Feedback:a. Firewall rules are typically based on IP addresses, MAC addresses, or port numbers, but they cannot filter for content. 16. Which of the following is the target of a double tagging attack? a. VPNs b. VLANs c. Collision domains d. DMZs Grade:1 User Responses:b. VLANs Feedback:a. A double tagging attack can enable the attacker to view traffic from multiple VLANs. 17. A network created to allow access to resources from the Internet, while maintaining separation from the internal network is called a ______? a. VPN b. VLAN c. Honeypot d. DMZ Grade:1 User Responses:d. DMZ Feedback:a. When talking about computer security, a Demilitarized Zone (DMZ) is a special area of the network (sometimes referred to as a subnetwork) that houses servers which host information accessed by clients or other networks on the Internet, but which does not allow access to the internal network. 18. How can access to the remote management of a router be protected? a. Content filtering b. ACLs c. Firewalls d. IPS Grade:0 User Responses:c. Firewalls Feedback:a. Remote access to a router is usually done via Telnet or SSH. The port used (vty line) can be secured using an access control list. The other options can all be used to help protect routers but not access the remote management function. 19. You need to allow access from your network to all web sites. What port numbers should be opened in the firewall? Choose all that apply. a. 25 b. 443 c. 80 d. 119 e. 22 f. 23 Grade:1 User Responses:c. 80 Feedback:a. HTTP and HTTPS are the two services you need to allow access to use ports 80 and 443 respectively. 20. Which of the following mitigation techniques can prevent MAC flooding? a. Secure VLANs b. Prevent ICMP responses c. 802. 1x d. 802. 1q Grade:1 User Responses:c. 802. 1x Feedback:a. MAC flooding, which involves overwhelming the memory of the switch with MAC frames sourced from different MAC addresses, can be prevented by requiring authentication on each port through 802. 1x. Secure VLANs cannot prevent this because the frames donââ¬â¢t need to enter a VLAN to cause the problem. ICMP is at Layer 3, these frames are at Layer 2, and 802. 1q is a VLAN tagging protocol that does not prevent frames from entering the switch through access ports. 21. Which of the following attacks cannot be mitigated with a flood guard? a. Smurf attack b. Fraggle c. Teardrop attack d. Session theft Grade:1 User Responses:d. Session theft Feedback:a. The smurf, fraggle, and teardrop attacks all involve sending a flood of packets to a device, using different types of malformed packets. A session theft attack is when a session cookie is stolen and used to authenticate to a server. 22. Loop protection is designed to address problems that occur with which device? a. Switch b. Hub c. Router d. Firewall Grade:0 User Responses:b. Hub Feedback:a. Loops occur when switches have redundant connections causing a loop. Loop guard (or loop protection) can prevent loops on the switch. 23. When creating an ACL which of the following statements is NOT true? a. The order of the rules is important for proper functioning b. You must include a deny all statement at the end of the rule set for proper functioning c. The more specific rules should be placed at the beginning of the rule list d. Once created, the ACL must be applied to an interface Grade:1 User Responses:b. You must include a deny all statement at the end of the rule set for proper functioning Feedback:a. There is an implied deny all statement at the end of each ACL and it is not required to include one. 24. Which of the following is an example of insecure network bridging in a LAN? a. Laptop connected to a hotspot and an ad hoc network . Laptop connected to a wireless network and the wired LAN at the same time c. Router connected to two subnets d. PC connected with two NIC to the same LAN Grade:1 User Responses:b. Laptop connected to a wireless network and the wired LAN at the same time Feedback:a. When a laptop connects to a wireless network and the wired LAN at the same time, it can create a bridge between the two allowing access to the LAN. The other scenarios do not create a security problem for the LAN. 25. When the administrator creates a rule on the firewall to prevent FTP traffic, this is a type of __________rule. . implicit deny b. implicit allow c. explicit deny d. explicit allow Grade:1 User Responses:c. explicit deny Feedback:a. When traffic is specified to be prevented, it is an explicit deny. When it is denied simply because it was not specifically allowed, that is an implicit deny. 26. Network Access Control (NAC) is an example of_______________. a. role-based management b. rules-based management c. port-based access d. application layer filtering Grade:1 User Responses:b. rules-based management Feedback:a. Network Access Control (NAC) uses rules by which connections to a network are governed. Computers attempting to connect to a network are denied access unless they comply with rules including levels of antivirus protection, system updates, and so onââ¬âeffectively weeding out those who would perpetuate malicious attacks. 27. What type of device is required for communication between VLANs? a. Hub b. Switch c. Router d. Firewall Grade:1 User Responses:c. Router Feedback:a. Hosts in different VLANs are also in different subnets and routing must be performed for them to communicate. 28. Which of the following would be least likely to be placed in the DMZ? a. Web server b. DNS server c. Domain controller d. FTP server Grade:1 User Responses:c. Domain controller Feedback:a. All the options except a domain controller are often placed in the DMZ so they are accessible to the outside world. A DC however is sensitive and should NOT be placed in the DMZ. 29. Subnetting a network creates segmentation at which layer of the OSI model? a. Layer 1 b. Layer 2 c. Layer 3 d. Layer 4 Grade:1 User Responses:c. Layer 3 Feedback:a. Subnetting a network creates segmentation using IP addresses, which is Layer 3. 30. What service is required to represent multiple private IP addresses with a single public IP address? a. NAT b. DHCP c. DNS d. DLP Grade:0 User Responses:a. NAT Feedback:a. Network Address Translation (NAT) is required to represent multiple private IP addresses with a single public IP address. The specific form of NAT required to represent multiple private IP addresses with a single public IP address is called Port Address Translation (PAT). 31. Which of the following is NOT a remote access protocol? a. MS-CHAP b. CHAP c. LDAP d. PAP Grade:1 User Responses:c. LDAP Feedback:a. Lightweight Directory Access Protocol is used for accessing directory services such as Active Directory. It is not used in remote access. All other options are remote access protocols. 32. Which of the following devices are susceptible to war dialing? a. Modems b. Firewalls c. Content filters d. Load balancers Grade:0 User Responses:a. Modems Feedback:a. Any devices that accept phone calls such as modems or PBX systems with remote phone access are susceptible to war dialing. 33. When computers are not allowed to connect to the network without proper security patches and virus updates, the network is using a form of _____________. a. PAT b. DAC c. NAC d. DMZ Grade:0 User Responses:d. DMZ Feedback:a. Network Access Control (NAC) uses rules by which connections to a network are governed. Computers attempting to connect to a network are denied access unless they comply with rules including levels of antivirus protection, system updates, and so onââ¬âeffectively weeding out those who would perpetuate malicious attacks. 34. Which of the following items do not need to be changed on a new router to ensure secure router management? a. IP address b. Administrator name c. Administrator password d. IOS version Grade:1 User Responses:d. IOS version Feedback:a. All the options except the IOS version can be set to defaults from the factory and should be changed because they are well known. 35. Which of the following is NOT an example of cloud computing? a. SaaS b. IaaS c. PaaS d. BaaS Grade:1 User Responses:d. BaaS Feedback:a. Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS) are all forms of cloud computing. 36. On which concept is cloud computing based? a. load balancing b. virtualization c. RAID d. DLP Grade:1 User Responses:b. virtualization Feedback:a. All forms of cloud computing use virtualization. 37. A three legged perimeter is a form of ______________. a. VPN b. DMZ c. NAT d. ACL Grade:1 User Responses:b. DMZ Feedback:a. A three-legged perimeter is a firewall or server with three NICs: one pointed to the LAN, one to the Internet, and one to the DMZ. 38. Which of the following is NOT a benefit provided by subnetting? a. It increases security by compartmentalizing the network. b. It is a more efficient use of IP address space. c. It reduces broadcast traffic and collisions. d. It eases administration of the network. Grade:1 User Responses:d. It eases administration of the network. Feedback:a. Subnetting provides a number of benefits but easing administration is not one of them. 39. Which of the following is the result of implementing VLANs? . Larger broadcast domains b. Smaller collision domains c. Smaller broadcast domains d. Larger collision domains Grade:1 User Responses:c. Smaller broadcast domains Feedback:a. VLANs break up the network into subnets and as such result in smaller broadcast domains. 40. Which of the following services helps conserve public IP addresses? a. NAT b. DHCP c. DNS d. SLIP Grade:0 User Responses:c. DNS Feedback:a. By allowing the use of private IP addresses inside each network and by representing those groups of private IP addresses with a single public IP address, public IP addresses are conserved by NAT. 41. Which of the following remote access protocols are used with VPNs? Choose all that apply. a. PPTP b. PPP c. L2TP d. SLIP Grade:1 User Responses:c. L2TP,d. SLIP Feedback:a. Point-to-Point Tunneling Protocol (PPTP) and Layer Two Tunneling protocol (L2TP) are used with VPNs. PPP and SLIP are used for dial-up. /b. Point-to-Point Tunneling Protocol (PPTP) and Layer Two Tunneling protocol (L2TP) are used with VPNs. PPP and SLIP are used for dial-up. 42. Which of the following security protocols operates at the network layer of the OSI model? a. IPSec b. SSH c. SSL d. TLS Grade:1 User Responses:a. IPSec Feedback:a. One of the key features of IPSec is its operation at the network layer enabling it to protect any type of communication operating at the upper layers of the OSI model. 43. Which of the following are components of SNMP? Choose all that apply. a. NMS b. IPSec c. Agent d. CARP Grade:1 User Responses:b. IPSec,c. Agent Feedback:a. The three components of SNMP are a network management system (NMS), agent software, and the managed device, where the agent software operates. /b. The three components of SNMP are a network management system (NMS), agent software, and the managed device, where the agent software operates. 44. SSL is designed as a secure replacement for which of the following? a. PPP b. Telnet c. TLS d. SSH Grade:0 User Responses:d. SSH Feedback:a. SSL is designed as a secure replacement for Telnet, which transmits in clear text. 45. Which of the following protocols supersedes SSL? a. SSH b. TLS c. S/MIME d. EAP Grade:0 User Responses:a. SSH Feedback:a. TLS 1. 2, the latest version, is used when establishing an HTTPS connection and supersedes SSLv3. 46. The operation of which of the following protocols makes the SYN flood attack possible? a. IPX/SPX b. AppleTalk c. TCP/IP d. RIP Grade:1 User Responses:c. TCP/IP Feedback:a. TCP/IP uses a three-way handshake for its connection, and the SYN flood attack attempts to take advantage of the operation of this connection operation. 47. Which of the following provides secure web access? a. SFTP b. HTTP c. HTTPS d. SSH Grade:1 User Responses:c. HTTPS Feedback:a. HTTPS uses port 443 and is the standard for secure web access. 48. SCP is a secure copy protocol that uses the port of which other protocol for transfers? a. HTTPS b. SSH c. SSL d. FTPS Grade:0 User Responses:d. FTPS Feedback:a. Secure copy (SCP) is another example of a protocol that uses another protocol (and its corresponding port). It uses SSH and ultimately uses port 22 to transfer data. 49. Which of the following protocols is abused when a ping flood occurs? a. SNMP b. IGMP c. ICMP d. EIGRP Grade:0 User Responses:a. SNMP Feedback:a. Ping floods use ICMP echo request packets aimed at the target. 50. Which of the following security mechanisms are built into IPv6? a. IPSec b. SSL c. HTTPS d. EAP Grade:1 User Responses:a. IPSec Feedback:a. IPv6 has IPSec support built in. 51. What method is used by SSL to obtain and validate certificates? a. SPI b. PKI c. TLS d. EAP Grade:1 User Responses:b. PKI Feedback:a. SSL and TLS use a public Key Infrastructure (PKI) to obtain and validate certificates. 52. What port number does FTPS use to protect the transmission? a. 21 b. 88 c. 443 d. 445 Grade:0 User Responses:a. 21 Feedback:a. FTPS uses SSL or TLS over port 443 to make a secure connection. 53. Which of the following protocols uses port 22, normally used by SSH, to make a secure connection? a. FTPS b. SCP c. SFTP d. SSL Grade:0 User Responses:b. SCP Feedback:a. Secure FTP (SFTP) uses port 22, the port for SSH, which is why it is also sometimes called SSH FTP. 54. Which protocol uses ports 161 and 162? a. SMTP b. IMAP4 . SNMP d. IGMP Grade:0 User Responses:a. SMTP Feedback:a. SNMP is used to collect information about and make changes to devices on the network. It uses ports 161 and 162. 55. Which protocol uses the same port as HTTPS? a. SCP b. FTPS c. SFTP d. IMAP4 Grade:0 User Responses:c. SFTP Feedback:a. FTP secure (FTPS) uses port 443, which is also used by HTTPS. 56. Which protocol uses port 69? a. SCP b. FTPS c. TFTP d. IMAP4 Grade:1 User Responses:c. TFTP Feedback:a. TFTP uses port 69. 57. What port number is used by Telnet? a. 80 b. 443 c. 21 d. 23 Grade:1 User Responses:d. 23 Feedback:a. Port 23 is used by Telnet. 58. Which port does HTTP use? a. 80 b. 443 c. 21 d. 23 Grade:0 User Responses:b. 443 Feedback:a. HTTP uses port 80. 59. Which port does SCP use to transfer data? a. 80 b. 22 c. 21 d. 23 Grade:0 User Responses:c. 21 Feedback:a. SCP uses SSH and thus port 22 to transfer data. 60. Which protocol uses port 443? a. HTTPS b. FTPS c. TFTP d. IMAP4 Grade:1 User Responses:a. HTTPS Feedback:a. HTTPS uses port 443. 61. Which two protocols use port 22? a. HTTPS b. FTPS c. SSH d. SCP Grade:2 User Responses:c. SSH,d. SCP Feedback:a. SCP uses SSH and thus port 22 to transfer data, so both protocols use this port. b. SCP uses SSH and thus port 22 to transfer data, so both protocols use this port. 62. Which ports does the NetBIOS protocol uses? Choose all that apply. a. 138 b. 139 c. 137 d. 140 Grade:3 User Responses:a. 138,b. 139,c. 137 Feedback:a. The NetBIOS protocol uses ports 137 through 139. /b. The NetBIOS protocol uses ports 137 through 139. /c. The NetBIOS protocol uses ports 137 through 139. 63. What protocol uses port 53? a. HTTPS b. FTPS c. SSH d. DNS Grade:0 User Responses:b. FTPS Feedback:a. DNS uses port 53. 64. Which port number does RDP use? a. 3389 b. 1723 c. 1701 d. 140 Grade:1 User Responses:a. 3389 Feedback:a. Port 3389 is used for Remote Desktop (RDP). 65. What protocol uses port 25? a. HTTPS b. SMTP c. SSH d. DNS Grade:1 User Responses:b. SMTP Feedback:a. SMTP uses port 25. 66. Which of the following statements is true regarding WPA and WPA2? (Choose all that apply. ) a. WPA uses 256-bit encryption. b. WPA2 uses 128-bit encryption. c. WPA uses TKIP. d. WPA2 uses AES. Grade:2 User Responses:c. WPA uses TKIP. ,d. WPA2 uses AES. Feedback:a. WPA uses TKIP 128-bit encryption, whereas WPA2 uses 256-bit AES. /b. WPA uses TKIP 128-bit encryption, whereas WPA2 uses 256-bit AES. 67. Which statement is NOT true with regard to WPA2? a. Uses AES encryption b. Meets requirements of 802. 11i c. Uses TKIP encryption d. Uses 256 bit encryption Grade:1 User Responses:c. Uses TKIP encryption Feedback:a. WPA uses TKIP but WPA2 uses AES. 68. Which of the following is the security provided in the original 802. 11 standard? a. WPA b. WPA2 c. WEP d. CCMP Grade:1 User Responses:c. WEP Feedback:a. Wired Equivalent Privacy (WEP) is the security provided in the original 802. 11 standard. 69. What is the authentication system that calls for a supplicant, authenticator, and authentication server called? . EAP b. WPA c. WPA2 d. WEP Grade:1 User Responses:a. EAP Feedback:a. Extensible Authentication Protocol (EAP) is an authentication system that calls for a supplicant, authenticator, and authentication server. 70. Which of the following implementations of EAP requires certificates on the client and the server? a. EAP-FAST b. EAP-TTLS c. PEAP d. EAP-TLS Grade:1 User Responses:d. EAP-TLS Feedback:a. EAP-TLS requires certificates on the client and the server. 71. Which of the following versions of EAP is Cisco proprietary? a. LEAP b. EAP-TTLS c. PEAP d. EAP-TLS Grade:1 User Responses:a. LEAP Feedback:a. Lightweight EAP is a version that works only on Cisco devices unless the device is from a partner that participates in the Cisco Compatible Extensions program. 72. Why are MAC filters not effective in preventing access to the WLAN? a. The MAC addresses of allowed devices are contained in the beacon frames sent by the AP. b. The MAC addresses of allowed devices are contained in any frames sent by the allowed device. c. The administrative effort to maintain the MAC list is prohibitive. d. If the user changes his MAC address, the filter will disallow entry. Grade:1 User Responses:b. The MAC addresses of allowed devices are contained in any frames sent by the allowed device. Feedback:a. The MAC addresses of allowed devices are contained in any frames sent by the allowed device and can be seen by those using wireless protocol analyzers. The MAC address can then be spoofed for entry. 73. Which of the following frame types contain the SSID? (Choose all that apply. ) a. Beacon frames b. Data frames c. Association frames d. Authentication frames Grade:3 User Responses:b. Data frames,c. Association frames,d. Authentication frames Feedback:a. The SSID is contained in all frames. If the SSID is hidden, it is removed only from the beacon frames. /b. The SSID is contained in all frames. If the SSID is hidden, it is removed only from the beacon frames. /c. The SSID is contained in all frames. If the SSID is hidden, it is removed only from the beacon frames. 74. TKIP was designed to correct the shortcomings of which of the following? a. EAP b. WPA c. WEP d. WPA2 Grade:1 User Responses:c. WEP Feedback:a. TKIP was designed to correct the shortcomings of WEP. It was a temporary solution for use until the 802. 1x standard was completed. 75. Which of the following encryption protocols is used with WPA2? . TKIP b. CCMP c. WEP d. DES Grade:1 User Responses:b. CCMP Feedback:a. Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is the encryption protocol used with WPA2. It addresses the vulnerabilities of TKIP and meets requirements of IEEE 802. 11i. 76. Which antenna types would be best for shaping the signal away from the front of the building for security purposes while still providing coverage in the other part of the building? (Choose all that apply. ) a. Yagi b. Omni c. Parabolic dish d. Semidirectional Grade:2 User Responses:a. Yagi,d. Semidirectional Feedback:a. You can use a yagi antenna, which is a type of semidirectional antenna, to shape the coverage area as called for in the scenario. /b. You can use a yagi antenna, which is a type of semidirectional antenna, to shape the coverage area as called for in the scenario. 77. How can you keep the existing radiation pattern of the antenna while reducing the coverage area? a. Increase the power of the transmitter. b. Decrease the power of the transmitter. c. Change the polarity of the antenna. d. Remove one of the attenuators from the line. Grade:1 User Responses:b. Decrease the power of the transmitter. Feedback:a. Reducing the power level maintains the radiation pattern while making the area of radiation smaller. 78. What organization created WPA? a. FCC b. Wi-Fi Alliance c. IEEE d. ISO Grade:1 User Responses:b. Wi-Fi Alliance Feedback:a. The Wi-Fi Alliance created WPA to address the weaknesses of WEP. 79. To which standard is WPA2 designed to adhere? a. 802. 16 b. 802. 11f c. 802. 11i d. 802. 11e Grade:1 User Responses:c. 802. 11i Feedback:a. WPA2 is designed to adhere to the 802. 11i security standard. 80. Which of the following is the weakest form of security? a. TKIP b. WPA c. WEP d. EAP Grade:1 User Responses:c. WEP Feedback:a. WEP is the weakest form of security. It has been cracked and is not suitable for Enterprise WLANs. 81. A ______________ attack intercepts all data between a client and a server. a. DDoS b. Man-in-the-middle c. Replay d. Smurf Grade:1 User Responses:b. Man-in-the-middle Feedback:a. Man-in-the-middle is a type of active interception. If successful, all communications now go through the MITM attacking computer. 82. When a group of compromised systems attack a single target it is a called a _______________ attack. a. DDoS b. Man-in-the middle c. Replay d. Smurf Grade:1 User Responses:a. DDoS Feedback:a. A distributed denial-of-service attack occurs when a group of compromised systems launches a DDoS attack on a single target. 83. When valid data transmissions are maliciously or fraudulently repeated, it is called a _______________ attack. a. DDoS b. man-in-the middle c. replay d. smurf Grade:1 User Responses:c. replay Feedback:a. When valid data transmissions are maliciously or fraudulently repeated, it is a called a replay attack. 84. What attack sends large amounts of ICMP echoes, broadcasting the ICMP echo requests to every computer on its network or subnetwork? a. DDoS b. Man-in-the middle c. Replay d. Smurf Grade:1 User Responses:d. Smurf Feedback:a. A smurf attack sends large amounts of ICMP echoes, broadcasting the ICMP echo requests to every computer on its network or subnetwork. The ICMP request is sent to a broadcast address. When all hosts receive the ICMP broadcast request, these host send ICMP replies to the source address, which has been set to the address of the target. 85. Changing your MAC address to that of another host is called ___________________. a. spear phishing b. spoofing c. pharming d. vishing Grade:1 User Responses:b. spoofing Feedback:a. Spoofing is when an attacker tails the IP or MAC address of another computer. 86. Which of the following is more an aggravation than an attack? a. Spear phishing b. Spoofing c. Spam d. Vishing Grade:1 User Responses:c. Spam Feedback:a. Spam or unwanted email is more an aggravation than an attack. 87. Which of the following uses instant messaging as its vehicle? a. Spim b. Spoofing c. Phishing d. Vishing Grade:1 User Responses:a. Spim Feedback:a. Spam Over Instant Messaging (SPIM) uses IM to deliver the spam. 88. When VoIP phone calls are used in the pursuit of social engineering, it is called__________. a. spim b. poofing c. phishing d. vishing Grade:1 User Responses:d. vishing Feedback:a. Vishing is phishing performed with VoIP calls, which are harder to trace than regular calls. 89. What type of attack is an advanced scan that tries to get around firewalls and look for open ports? a. DDoS b. Man-in-the-middle c. Xmas attack d. Smurf Grade:1 User Responses:c. Xmas attack Feedback:a. Usually using Nmap, the Xmas attack is an advanced scan that tries to get around firewalls and look for open ports. 90. __________________ is when an attacker redirects one websiteââ¬â¢s traffic to another bogus and possibly malicious website. a. DDoS b. Pharming c. Xmas attack d. Smurf Grade:1 User Responses:b. Pharming Feedback:a. Host files and vulnerable DNS software can also be victims of pharming attacks. Pharming is when an attacker redirects one websiteââ¬â¢s traffic to another bogus and possibly malicious website. Pharming can be prevented by carefully monitoring DNS configurations and host files. 91. ___________ is when a person that is not normally authorized to a server manages to get administrative permissions to resources. a. Whaling b. Pharming c. Spear phishing d. Privilege escalation Grade:1 User Responses:d. Privilege escalation Feedback:a. Privilege escalation is when a person that is not normally authorized to a server manages to get administrative permissions to resources. 92. Which problem is the most difficult to contend with? a. Malicious insider threat b. Fraggle attack c. Distributed denial-of-service d. Whaling Grade:1 User Responses:a. Malicious insider threat Feedback:a. Because the attacker already is inside the network with company knowledge, a malicious insider threat is the most difficult to contend with. 93. What type of attack can DNS poisoning lead to? a. Whaling b. Pharming c. Spear phishing d. Privilege escalation Grade:0 User Responses:c. Spear phishing Feedback:a. Pharming attacks lead users from a legitimate website to a malicious twin. The easiest way to do this is to poison the DNS cache so that the DNS server sends them to the malicious site. 94. Strong input validation can help prevent ____________________. a. bluesnarfing b. SQL injection c. session highjacking d. header manipulation Grade:0 User Responses:c. session highjacking Feedback:a. SQL injection attacks user input in web forms that is not correctly filtered. This can be prevented with input validations. 95. LDAP injection is an attack on __________________servers. . SQL b. directory c. web d. email Grade:1 User Responses:b. directory Feedback:a. Lightweight Directory Access Protocol is a protocol used to maintain a directory of information such as user accounts or other types of objects. 96. XML injection can be prevented with __________________. a. IDS b. IPS c. input validation d. complex passwords Grade:0 User Responses:d. complex passwords Feedback:a. The best way to protect against this (and all code injection techniques for that matter) is to incorporate strong input validation. 97. The .. / attack is also known as ________________. a. irectory traversal b. SQL injection c. session highjacking d. header manipulation Grade:1 User Responses:a. directory traversal Feedback:a. Directory traversal, or the .. / (dot dot slash) attack is a method to access unauthorized parent (or worse, root) directories. 98. _____________ is when commands and command syntax are entered into an application or OS. a. Directory traversal b. Command injection c. Command highjacking d. Code manipulation Grade:1 User Responses:b. Command injection Feedback:a. Command injection is when commands and command syntax are entered into an application or OS. 99. Buffer overflows operate against the _________ of the computer. a. NIC b. disk c. CPU d. memory Grade:1 User Responses:d. memory Feedback:a. A buffer overflow is when a process stores data outside of the memory that the developer intended. 100. What is the difference between an XSS and XSRF attack? a. The XSS attack exploits the trust a userââ¬â¢s browser has in a website, whereas the XSFR attack exploits the trust that a website has in a userââ¬â¢s browser. b. The XSFR attack exploits the trust a userââ¬â¢s browser has in a website, whereas the XSS attack exploits the trust that a website has in a userââ¬â¢s browser. . The XSS attack creates a buffer overflow on the website, whereas the XSFR attack creates a buffer overflow on the client. d. The XSS attack creates a buffer overflow on the client, whereas the XSFR attack creates a buffer overflow on the website. Grade:1 User Responses:a. The XSS attack exploits the trust a userââ¬â¢s browser has in a website, whereas the XSFR attack exploits the trust that a website has in a userââ¬â¢s browser. Feedback:a. The XSS attack exploits the trust a userââ¬â¢s browser has in a website. The converse of this: the XSRF attack exploits the trust that a website has in a userââ¬â¢s browser. In this attack (also known as a one-click attack), the userââ¬â¢s browser is compromised and transmits unauthorized commands to the website. 101. _______________ are placed by programmers, knowingly or inadvertently, to bypass normal authentication and other security mechanisms in place. a. Landing spots b. Backdoors c. Hotspots d. Code heels Grade:1 User Responses:b. Backdoors Feedback:a. Backdoors are placed by programmers, knowingly or inadvertently, to bypass normal authentication and other security mechanisms in place. 102. An XSS attack is also called a(n) __________________ attack. a. Zero day b. Command injection . Xmas d. Cross site scripting Grade:1 User Responses:d. Cross site scripting Feedback:a. XSS attacks, also called cross site scripting attacks, exploit the trust a userââ¬â¢s browser has in a website through code injection, often in webforms. 103. ______________can be used by spyware and can track people without their permission. a. MAC addresses b. Cookies c. IP addresses d. Attachments Grade:1 User Responses:b. Cookies Feedback:a. Cookies are text files placed on the client computer that store information about it, which could include your computerââ¬â¢s browsing habits and possibly user credentials. 104. Which of the following attachments is the riskiest to open? a.. exe b.. pdf c.. doc d.. txt Grade:1 User Responses:a.. exe Feedback:a. A . exe or executable file is one that contains a program that will do something, perhaps malicious to the computer. 105. Stolen cookies can be used to launch a(n) ____________________. a. XSS attack b. SQL injection c. session highjack d. header manipulation Grade:1 User Responses:c. session highjack Feedback:a. Session cookies authenticate you to a server and can be used to highjack your session. 106. Header manipulation alters information in ______________ headers. a. LDAP b. file c. HTTP . SQL Grade:1 User Responses:c. HTTP Feedback:a. Header manipulation alters information in HTTP headers and falsifies access. 107. An ActiveX control is an example of a(n) _________________. a. cookie b. add-on c. cipher d. virus Grade:1 User Responses:b. add-on Feedback:a. You can enable and disable add-on programs such as ActiveX controls in the Programs tab by clicking the Manage add-ons button in Internet Explorer. 108. When an attack targets an operating system vulnerability that is still unknown to the world in general, it is called a __________. a. P2P attack b. zero day attack c. whaling attack d. DDoS attack Grade:1 User Responses:b. zero day attack Feedback:a. A zero day attack targets an operating system vulnerability that is still unknown to the world in general. 109. __________________is a concept that refers to the monitoring of data in use, data in motion, and data at rest. a. DLP b. DHCP c. DEP d. DMS Grade:1 User Responses:a. DLP Feedback:a. Data Loss Prevention (DLP) is a concept that refers to the monitoring of data in use, data in motion, and data at rest. It does this through content inspection and is designed to prevent unauthorized use of data as well as prevent the leakage of data outside the computer (or network) that it resides. 110. Which form of DLP is typically installed in data centers or server rooms? a. Endpoint DLP b. Network DLP c. Storage DLP d. Comprehensive DLP Grade:1 User Responses:c. Storage DLP Feedback:a. Storage DLP systems are typically installed in data centers or server rooms as software that inspect data at rest. 111. Which of the following is an example of drive encryption? a. AppLocker b. BitLocker c. Windows defender d. Trusted Platform Module Grade:1 User Responses:b. BitLocker Feedback:a. To encrypt an entire hard disk, you need some kind of full disk encryption software. Several are currently available on the market; one developed by Microsoft is called BitLocker. 112. The beauty of hardware-based encryption devices such as HSM (and TPM) is that it is ____________ than software encryption. a. more difficult to crack b. easier to use than software encryption c. faster than software encryption d. can be used to calculate data other than encryption keys Grade:1 User Responses:c. faster than software encryption Feedback:a. Hardware security modules (HSMs) are physical devices that act as secure cryptoprocessors. This means that they are used for encryption during secure login/authentication processes, during digital signings of data, and for payment security systems. The beauty of hardware-based encryption devices such as HSM (and TPM) is that it is faster than software encryption. 113. A _________________ is a chip residing on the motherboard that actually stores the encrypted keys. a. DLP b. DHCP c. DEP d. TPM Grade:1 User Responses:d. TPM Feedback:a. A Trusted Platform Module (TPM) chip is one residing on the motherboard that actually stores the encrypted keys. 114. Which of the following is NOT required to encrypt the entire disk in Windows? Choose all that apply. a. TPM chip or USB key b. A hard drive with two volumes c. HSM Module d. Cryptoprocessor Grade:2 User Responses:c. HSM Module,d. Cryptoprocessor Feedback:a. Hardware security modules (HSMs) are physical devices that act as secure cryptoprocessors; however, they are NOT a part of encrypting the entire disk in Windows. /b. Hardware security modules (HSMs) are physical devices that act as secure cryptoprocessors; however, they are NOT a part of encrypting the entire disk in Windows. 115. Probably the most important security concern with cloud computing is _______________. . less secure connections b. loss of physical control of data c. weak authentication d. bug exploitation Grade:1 User Responses:b. loss of physical control of data Feedback:a. Probably the most important security control concern is the physical control of data that is lost when an organization makes use of cloud computing. 116. Which of the following is NOT a solution to security issues surrounding cloud computing? a. Complex passwords b. Strong authentication methods c. Standardization of programming d. Multiple firewalls Grade:1 User Responses:d. Multiple firewalls Feedback:a. Solutions to these security issues include complex passwords, strong authentication methods, encryption, and standardization of programming. 117. Which form of DLP is typically installed on individual computers? a. Endpoint DLP b. Network DLP c. Storage DLP d. Comprehensive DLP Grade:1 User Responses:a. Endpoint DLP Feedback:a. Endpoint DLP systems run on an individual computer and are usually software-based. They monitor data in use such as email communications and can control what information flows between various users. 118. Where could you disable the use of removable media on a computer? a. Device manager . BIOS c. Control panel d. Programs and features Grade:1 User Responses:b. BIOS Feedback:a. BIOS settings can be used to reduce the risk of infiltration including disabling removable media including the floppy drives and eSATA and USB ports. 119. What are two shortcomings of using BitLocker drive encryption? a. Weak encryption b. Expensive c. Performance suffers d. Shorter drive life Grade:2 User Responses:c. Performance suffers,d. Shorter drive life Feedback:a. A drive encrypted with BitLocker usually suffers in performance compared to a nonencrypted drive and could have a shorter shelf life as well. /b. A drive encrypted with BitLocker usually suffers in performance compared to a nonencrypted drive and could have a shorter shelf life as well. 120. Which form of DLP is typically installed on the perimeter of the network? a. Endpoint DLP b. Network DLP c. Storage DLP d. Comprehensive DLP Grade:1 User Responses:b. Network DLP Feedback:a. Network DLP systems can be software or hardware solutions that are often installed on the perimeter of the network. They inspect data that is in motion. 121. Software as a service (SaaS) is a type of _____________ computing. a. HSM b. cloud c. role-based d. TPM Grade:1 User Responses:b. cloud Feedback:a. Software as a Service (SaaS) is the most commonly used and recognized example of cloud computing. SaaS is when users access applications over the Internet that are provided by a third party. 122. Which form of DLP inspects ONLY data in motion? a. Endpoint DLP b. Network DLP c. Storage DLP d. Comprehensive DLP Grade:1 User Responses:b. Network DLP Feedback:a. Network DLP systems can be software or hardware solutions that are often installed on the perimeter of the network. They inspect data that is in motion. 123. Which of the following is NOT an example of cloud services? a. SaaS b. IaaS c. PaaS d. BaaS Grade:1 User Responses:d. BaaS Feedback:a. Examples of cloud services include Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). 124. When an electronic control suffers an error, reports the error, and shuts down, it is called_____________. a. Failopen b. Failsafe c. Failclose d. Failshut Grade:1 User Responses:b. Failsafe Feedback:a. When the control fails and shuts down, it is a failsafe. When it fails and leaves a vulnerable system, it is a failopen. 125. What should be the first thing you check when an intrusion has been detected? a. Firewall logs b. Server logs c. Workstation logs d. Security patches Grade:1 User Responses:a. Firewall logs Feedback:a. Logging is also important when it comes to a firewall. Firewall logs should be the first thing you check when an intrusion has been detected. You should know how to access the logs and how to read them. 126. Which log on a Windows server is where you could learn if Joe logged in today? a. Applications b. System c. Security d. DNS Grade:1 User Responses:c. Security Feedback:a. The security log contains entries about logins and access to resources both successful and unsuccessful. 127. Which of the following is NOT an example of physical security? a. Mantraps b. Security logs c. Video surveillance d. Hardware locks Grade:1 User Responses:b. Security logs Feedback:a. Security logs track activities on the network which is logical not physical security. 128. Which of the following is NOT a type of door lock? a. Cipher b. Keyed c. Cardkey d. Mantrap Grade:1 User Responses:d. Mantrap Feedback:a. A mantrap is a two door system designed to prevent tailgating. 129. Which of the following is NOT an example of operating system hardening? a. Disabling unnecessary services b. Removing the NIC c. Protecting management interfaces d. Password protection Grade:1 User Responses:b. Removing the NIC Feedback:a. Hardening the system should not reduce its functionality, and removing the NIC would do that. 130. Which of the following standards is often referred to as port-based security? a. 802. 1x b. 802. 11 c. 802. 11n d. 802. 1 Grade:1 User Responses:a. 802. 1x Feedback:a. 802. 1x enforces perimeter security by keeping the port of the station closed until authentication is complete. 131. In which type of monitoring is network traffic analyzed for predetermined attack patterns? a. Signature-based monitoring b. Anomaly-based monitoring c. Behavior-based monitoring d. Reactive-based monitoring Grade:1 User Responses:a. Signature-based monitoring Feedback:a. Network traffic is analyzed for predetermined attack patterns. These attack patterns are known as signatures. 132. A(n) __________________ uses baseline reporting and other analyses to discover vulnerabilities and weaknesses in systems. a. NAT b. SPA c. SLA d. PSK Grade:1 User Responses:b. SPA Feedback:a. The security posture can be defined as the risk level to which a system, or other technology element, is exposed. Security Posture Assessments (SPA) use baseline reporting and other analyses to discover vulnerabilities and weaknesses in systems. 133. Which of the following indicate a problem currently occurring? . Trends b. Baselines c. Alarms d. Averts Grade:1 User Responses:c. Alarms Feedback:a. Although alerts indicate an issue that MAY need attention, alarms indicate a problem currently occurring. 134. Which of the following are detection controls? (Choose all that apply. ) a. IDS b. IPS c. Video cameras d. Security guard Grade:2 User Responses:a. IDS,c. Video cameras Feedback:a. Detection controls, such as Intrusion Detection systems and video cameras record only activity; they do not prevent it. /b. Detection controls, such as Intrusion Detection systems and video cameras record only activity; they do not prevent it. 135. Which of the following is designed to prevent tailgating? a. Mantraps b. Security logs c. Video surveillance d. Hardware locks Grade:1 User Responses:a. Mantraps Feedback:a. Mantraps use double doors to prevent tailgating. 136. Which of the following is a proximity reader? a. a security card that transmits the location of the holder b. a device that tracks how close an individual is c. a security card reader that can read the card from a distance d. a card reader that locks the door when the holder is a certain distance from the door Grade:1 User Responses:c. security card reader that can read the card from a distance Feedback:a. These cards use radio waves to transmit to the reader. 137. By frequently updating systems and by employing other methods such as group policies and baselining, you _____________ the systems. a. brace b. harden c. virtualize d. hardline Grade:1 User Responses:b. harden Feedback:a. By frequently updating systems and by employing other methods such as group policies and baselining, you harden the system. 138. Installing service packs is a part of the ___________ process. a. baselining b. hardening c. scaling . security templating Grade:1 User Responses:b. hardening Feedback:a. Hardening the OS is accomplished through the use of service packs, patch management, hotfixes, group policies, security templates, and configuration baselines. 139. ______________ can be described as unauthorized WAPs that inadvertently enable access to secure networks. a. Rogue access points b. Evil twin c. War driver d. Phisher Grade:1 User Responses:a. Rogue access points Feedback:a. Rogue access points can be described as unauthorized wireless access points/routers that enable access to secure networks. They differ from an Evil twin in that an Evil twin is strategically placed for the purpose of accessing the network or performing a high jacking attack, whereas rogue access points generally may be placed by employees for their convenience. 140. Which wireless attacks include the introduction of radio interference? a. Rogue Access Point b. Evil twin c. War driver d. Bluesnarfing Grade:1 User Responses:b. Evil twin Feedback:a. The evil twin attack includes jamming the network to cause the stations to associate with the evil twin AP. 141. When executing the Evil twin attack, what value must match on the Evil twin and the legitimate AP? . IP address b. SSID c. MAC address d. Admin password Grade:1 User Responses:b. SSID Feedback:a. The Evil twin attack includes jamming the network to cause the stations to associate with the Evil twin AP. The stations will not roam to the Evil twin unless the SSID is the same as the legitimate AP. 142. ________________ is when a person attempts to access a wireless network, usually while driving in a vehicle. a. War chalking b. Radiophishing c. War driving d. Bluesnarfing Grade:1 User Responses:c. War driving Feedback:a. War driving is when a person attempts to access a wireless How to cite Introduction of Information Security Systems Cis4385, Papers
Friday, December 6, 2019
Parts Emporium Synopsis Essay Example For Students
Parts Emporium Synopsis Essay This case describes the problems facing Sue Mackey, the new materials manager of a wholesale distributor of auto parts. She seeks ways to cut the bloated inventories while improving customer service. Backorder with excessive lost sales are all too frequent. Inventories were much higher than expected when the new facility was built, even though sales have not increased. Summary data on inventory statistics, such as inventory turns, are not available. Mackey decides to begin With a sample Of two products to uncover the nature Of the problems?the EGGS exhaust gasket and the DEBBY drive belt. B. Purpose The purpose of this case is to allow the student to put together a plan, using either a continuous review system (Q system) or a periodic review system (P system), for two inventory items. Enough information is available to determine the EX. and R for a continuous review system (or P and T for a periodic review system). Because cookouts are costly relative to inventory holding costs, a 95 percent cycle-service level is recommended. Inventory holding costs are 21 percent of the value tot each item (expressed at cost). The ordering costs ($20 for exhaust gaskets and for drive belts) should not be increased to include hares for making customer deliveries. These charges are independent of the inventory replenishment at the warehouse and are reflected in the pricing policy. C. Analysis We now find appropriate policies for a Q system, beginning With the exhaust gasket. Shown here are the calculations of the EX. and R, followed by a cost comparison between this continuous review system and the one now being used. The difference is what can be realized by a better inventory control system. Reducing lost sales due to backorder is surely the biggest benefit. I. EGGS Exhaust Gasket a. New plan Begin by estimating annual demand and the arability in the demand during the lead time for this first item. Working with the weekly demands for the first 21 weeks of 1994 and assuming 52 business weeks per year, we find the EX. as follows: Weekly demand average 102 gaskets/week Annual demand (D) = 102(52) = 5304 gaskets Holding cost = SSL . 85 per gasket per year (or 0. 21 0. 68. $12. 99) ordering cost $20 per order EX. SSL . 5 = 339 gaskets Turning to R, the Normal Distribution appendix shows that a 95 percent cycle-service level corresponds to a z 1. 645. We then find Standard deviation in weekly demand (tot) = 2. 6 gaskets, Where t = 10 Standard deviation in demand during lead time (LO) 2. 86 R Average demand during the lead time 4 Safety stock = 2(102) I = 210. 6, or 211 gaskets *This case was prepared by Dry. Rob Bergman, University of Houston, as a basis for classroom dis cussion. CNN-108 Chapter 13: Parts Emporium b. Cost comparison After developing their plan, students can compare its annual cost with what would be experienced with current policies. Cost Category Current Plan Proposed Plan Ordering cost $707 $313 133 314 Holding cost (cycle inventory) TOTAL $846 $627 The total of these two costs for the gasket is reduced y 26 percent (from SASS to $627) per year, The safety stock with the proposed plan may be higher than the current plan, if the reason for the excess backorder is that no safety stock is now being held (inaccurate inventory records or a faulty replenishment system are other explanations). The extra cost this safety stock is minimal, however. Only 4 gaskets are being held as safety stock, and their annual holding cost is just another $1. 5(4) = $7. 40 Surely the lost sales due to backorder is substantial with the current plan and will be much less with the proposed plan. One symptom of such losses is that 1 1 units are on backorder n week 21, A lost sale costs a minimum of $4. 16 per gasket (0. 32. 512_99)_ If 10 percent of annual sales were lost with the current policy, this cost would be $416(0. = 52,206 per yea r. Such a loss would be much reduced with the 95 percent cycle-service level implemented with the proposed plan. 2. 08032 Drive Belt a. Nevi plan The following demand estimates are based on weeks 13 through 21.
Friday, November 29, 2019
Tips for Writing an Effective Research Paper
Tips for Writing an Effective Research Paper Research paper can be defined as the culmination and final product of an involved process of research, critical thinking, organization, source evaluation, and composition. To the ââ¬Å"untrained eyeâ⬠it might seem research papers are super easy to write. Whatââ¬â¢s difficult about that? You just Google things and write them down, right? Let me tell you something, itââ¬â¢s not entirely correct. Research papers arenââ¬â¢t just about Googling things. Due to common misconceptions about writing this type of work, I decided to give you some tips and tricks for writing effective research paper. The chances are high you will have to write this type of paper sooner or later and knowing the basics will make the complex task easier. What is and what isnââ¬â¢t a research paper? Okay, Iââ¬â¢ve already mentioned a brief definition of research paper and before we move on to various tips you should follow, letââ¬â¢s discuss this aspect more thoroughly. Research paper is a result of several processes (mentioned above) and itââ¬â¢s more helpful to think of it as a living thing which grows and changes as youââ¬â¢re interpreting, exploring, and evaluating sources regarding certain subject. On the other hand, research paper is NOT summary of the topic, book, or an ordinary essay. It is a genre which requires great amount of investigating and evaluating. The primary goal of research paper is NOT to only inform the reader what others have to say about certain topic, but also to create unique unbiased perspective and objective approach. Types of research paper In order to write an effective research paper you have to know two its two main types. They are: Argumentative research paper ââ¬â includes introduction wherein you introduce the topic along with thesis statement. The primary point of this type of work is persuasion which is why it usually requires debatable and controversial topics Analytical research paper ââ¬â usually begins with the writer asking a question to which (s)he has to provide an answer. This type of work requires more exploration and evaluation of the topic. Choosing and understanding a topic It doesnââ¬â¢t matter whether youââ¬â¢re a student or write for a living, you already know the drill ââ¬â sometimes you get the list of topics to write about and sometimes you have to come up with your own. Regardless of the scenario, ability to choose and understand topics is of crucial importance for success of your paper. If you get the title to write about, you should: Read it thoroughly Determine what you have to analyze and explore Create a concept Contact professor or client in case you find certain aspect of the topic confusing. In case you have to come up with title, you should: Brainstorm Think of debatable or controversial events, studies, literature works, or events from politics to base your research upon Read about current society affairs Choose to explore something youââ¬â¢re interested in Write down all ideas you come up with Read your list thoroughly and check for type of ideas that appear the most. Remember, when creating a title for your work; donââ¬â¢t think of it in terms of whether itââ¬â¢s going to be easy to find resources on Google. The reason is simple; research paper is fluid and you may approach to it from several different angles. Plus, thinking about Google results constantly will prevent you from fully developing your ideas. Getting started Now that you know research paper isnââ¬â¢t a mere summary of the info you find, types of research papers, and how to come up with your own title, youââ¬â¢re ready to move on to the next stage ââ¬â writing your paper. Although research papers arenââ¬â¢t that easy to write as they require a great deal of organization, researching, and time it doesnââ¬â¢t mean you canââ¬â¢t conquer this obstacle. Here are a few tips that will help you: Analyze the title you get/create a title following tips listed above Think critically Research and find as many sources as possible making sure they are reliable While researching, write down notes in order to easily create concept later Create an outline or concept for your work from introduction to conclusion Write first draft without stopping to edit or check for grammar or spelling mistakes Once youââ¬â¢re done with the first draft, check your work to see whether you should add something Edit and proofread Mention references. When writing a research paper you should bear in mind that information you enter, regardless of how big or small it might be, should contribute to the overall paper i.e. it should have its purpose. It is also important to be honest. Sometimes the process of researching and investigating or developing the argument throughout your paper will lead you to a conclusion that you donââ¬â¢t really agree with. But, instead of coming up with conclusion that is incorrect or based on facts that arenââ¬â¢t there, you should be honest and complete your work with integrity. And finally, donââ¬â¢t rush! Research papers require more organization and evaluation than other types of work and if you get a reasonable deadline to write them, thereââ¬â¢s no point rushing in order to finish it as soon as possible. Research papers arenââ¬â¢t just summaries of events, Google info, or book reports. They put you in a role of detective who has to solve a mysterious murder (or some other crime). Tips from this article showed you tips and tricks you should bear in mind when writing this type of work. Once again, donââ¬â¢t rush, create a structure, and opt to approach the topic from different angles.
Monday, November 25, 2019
China and the Internet essays
China and the Internet essays The worldwide network of computers known as the Internet poses an interesting dilemma to the government of China. The widespread and cheap access to unrestricted information that the Internet offers could pose a serious threat to the authoritarian government of China. In contrast, the benefits to business and efficiency that the Internet can bring are too great to be ignored, especially as China makes an entrance into the World Trade Organization and the global economy. How will China handle these conflicting pressures? Todays Internet can trace its roots back to the ARPAnet, a collection of computers designed to share information among universities and researchers. ARPAnet was conceived by the United States government in 1969 and has grown steadily since. Now a truly global network of computers located all over the world, no single nation owns the Internet. Global governing bodies and standards have been established to control and direct the continued growth of the Internet. Since a single nation cannot control the content that can be found on the Internet, those that wish to restrict or control access must resort to content filtering or blocking through software and hardware barriers, laws controlling and patrolling access, and the limiting of physical access to an internet connection. To filter and block content the Chinese government employs both software filtering and limited physical access to the Internet. In early 2001, China rolled out government developed filtering software dubbed Internet Police 110 (reportedly named for Chinas emergency police telephone number) that will not only block Web surfers from viewing offensive pornographic and violent online content a not uncommon practice throughout the Internet world but will also steer Internet users away from sites the government views as threatening to the Chinese Communist Party regime. (Gebler, Chinese Web F...
Thursday, November 21, 2019
Change Strategy within a Specific Organizational Frame Term Paper
Change Strategy within a Specific Organizational Frame - Term Paper Example It was revealed in 2013 that Tescoââ¬â¢s beef burgers had at least 30% of horse meat, which led the organization to make a statement to the effect that its customers had been betrayed by the companyââ¬â¢s suppliers, promising to get to the bottom of the scandal (bbc.com, 2013). In effect, the company promised to uncover what had happened, to get back to its customers with an explanation, and to work harder to ensure that such a problem never occurred again (Meikle & Lawrence, 2013). Moreover, Tesco also promised to refund customers who still had the contaminated food in their houses in full. In relation to Tescoââ¬â¢s current threatening issue, an urgent change is required. To begin with, all the products from the identified supplier must be withdrawn from sale immediately, which requires the companyââ¬â¢s staff to be urgently involved in the process of elimination. In addition, the company has to rescue its reputation with consumers in the market place, which requires a long term strategy of change to influence consumers. For instance, Tesco could entirely stop selling meat products before bringing back their meat sales gradually with highly regarded suppliers (Morris, 2014). There are four main frames under which an organizationââ¬â¢s change can be framed, which are structural, political, human resources, and symbolic. Pollack and Pollack (2014) note that organizations operate simultaneously at all times on the four levels, and that addressing a problem in the organization may require an organization to pay special attention to one frame, while the other frames remain strong and functional. In Tescoââ¬â¢s case, the structural frame will be the main frame used, specifically because of its image of the organization as a rational machine system. In addition, this frame also reinforces the critical nature of creating structural forms that are aligned to the goals, environment, technology, and task of the
Wednesday, November 20, 2019
Step by Step Procedure Essay Example | Topics and Well Written Essays - 500 words
Step by Step Procedure - Essay Example It identifies the individual studentââ¬â¢s capabilities and skills. It also constructs an ambitious and hopeful future. Planning involves the student in the monitoring program and makes the student feel important and engenders concepts of ââ¬Å"self-determinationâ⬠(Individualized Service Plan, n.d., p. 11). Based on this conceptual framework, the following Step-by-Step Academic Plan is suggested for intervening in and monitoring an individual studentââ¬â¢s academic instruction and progress. Step 1: Once a student is identified and his or her specific needs are identified, conduct a survey calculated to gather information relative to the studentââ¬â¢s identified area of risk in terms of learning and the studentââ¬â¢s academic goals overall. Step 3: Record the basic information in the Academic Plan. Basic information includes, Student name, identification number, date, high school, academic year and whether or not the student is one academic probation. Step 4: Provide a summary of the studentââ¬â¢s needs. For instance record the studentââ¬â¢s year at school, where academic support is required and the studentââ¬â¢s academic goals. State the studentââ¬â¢s academic goals in his or her own words. Step 5: Set out the steps to be taken and monitored relative to the Academic Plan. Identify the start date and record the need identified in a specific subject. Next establish the studentââ¬â¢s academic goals with respect to the area in which the student is underachieving. List the studentââ¬â¢s responsibilities with respect to meeting the desired goals. For instance the student may be required to attend tutoring or will study or do both for a specific period. List the advisorââ¬â¢s responsibilities as well. The advisor may be required to collaborate with the studentââ¬â¢s tutor relative to progress in the area of assistance. The advisor may also be required to have on-going study conferences with the student. The advisor will also be required to monitor the
Monday, November 18, 2019
Reducing Energy Consumption in Residence Essay Example | Topics and Well Written Essays - 750 words
Reducing Energy Consumption in Residence - Essay Example However, there is evidence (Herring, H., Roy, R., 2002) to show that using energy (and in particular electricity) more efficiently does not necessarily lead to a reduction in energy use. Indeed there is evidence that using energy more effectively actually tends to increase its use - given the opportunity; people prefer to be warmer, rather than to reduce the cost of heating for example. (This, and other examples of the ââ¬Å"Rebound Effectâ⬠are discussed in a wide range of studies, some of which are listed below) Given this, it would seem that enabling students to use energy more effectively and economically may serve not to decrease its consumption, but rather to increase it. There is a growing trend now towards a principal of ââ¬Å"the polluter paysâ⬠(Oââ¬â¢Conner, M.,1997, chap.1) by which is meant that there is a fiscal cost of pollution (including greenhouse gasses) and that those responsible for its creation should be required to bear its economic cost. There is also a tendency for suppliers of services (particularly in the energy market) to unbundle their services, allowing consumers to see clearly what they are buying and at what cost. It would be possible for the University to combine these two trends, and to separately charge students for their energy use, instead of as at present including this in their overall accommodation charges. In doing so students would then become aware of exactly how much they are paying for energy, and be incentivised to manage their consumption.
Saturday, November 16, 2019
Supply Chain Human Rights in Clothing Retailers
Supply Chain Human Rights in Clothing Retailers EXECUTIVE SUMMARY The present report is about the Importance of upholding human standards of the workers both inside and outside their home countries in the large clothing retailers. Human rights still remain to be one of the most challenging issues all over the world because of international variations in politics, history, social and cultural differences. The implementation of human rights, however, does not go unexcused in any place of situation regardless of the circumstances. Upholding of human rights is very important and it is the fundamental right of every human being. This report specifically focused on the Clothing Retailers operating in the United Kingdom. These include: Nike, Gap, Levi Strauss and Marks and Spencer. The task of this report was to examine how these multinational firms uphold human rights in their operations all over the world. The report has found out that among other factors, globalisation also contributed to a great extent for international firms to violate human rights. In the 1980s, shaped by globalization, clothing retailers and brand manufacturers were forced to source their produce and manufactured goods from low-wage, economically less developed countries. These less developed countries were in most cases characterised by child labour, sexual harassment, and intolerable working conditions. Global awareness about inhuman conditions in working places drew together voices of numerous activists from all over the world to divert the trend. During the 1970s, various national and multinational organization, Non governmental organization and trade unions accused these clothing retailers companies for violating human rights. These multinational companies were specifically blamed for their failure to put into consideration the economic level of less developed countries in which they operated. This criticism led to establishment of voluntary labour codes by these companies in an effort to uphold their image. Most of these voluntary labour codes adopted principles in the International Labour Organization (ILO) Conventions. Among other things, this report examines the historical aspect of clothing retailers and the challenges involved in upholding human rights in their supply chain production. The report further examines the role played by these clothing retailers in upholding human rights in their operations all over the world. CHAPTER ONE: 1. BACKGROUND INFORMATION 1.1. Introduction Human rights or sometimes referred to as natural rights are free and fundamental liberties entitled to an individual without the interference from any government or group of people for whatever reasons. A persons civil liberties are protected by the constitutions that define them and the organizations that exist to promote them. Under any circumstances the implementation of human rights does not go unexcused in any place or situation. Every individual regardless of his/her social economic status deserves to be treated with dignity. But due to rapid economic development, multinational companies are becoming more susceptible to violating human rights because of increasing international competition, undistributed wealth, and weak national laws (Krage, 2007). The World Commission on the Social Dimension of Globalization (2004) in one of its reports indicated that the global economy is changing in many ways. These massive changes affect multinational investment, capital markets, technology and business, more specifically impacting companies, consumers, workers and governments. The report further concludes that globalization has led to interdependence in economic relations that has created more opportunities for the advancement in business, investment, finance, organization of global production, and also more social and political interaction between organizations and individual around the world (World Commission on the Social Dimension of Globalization, 2004). It is unfortunate that not all countries are developing with the same pace and outcomes. Some countries specifically the developing countries, cannot utilize these rapidly growing expansion to their advantages (Misol, 2006). For example, there are plenty of evidences that increasing g lobal competition puts workers human rights in jeopardy because company protection standards are lowered and an employees civil liberties are often denied (Christerson and Applelbaum, 1995; Hathcote and Nam, 1999). In the 1970s, considerable criticism was raised against multinational companies regarding their operations in less developed countries. Nongovernmental organizations, national and international trade unions and many host countries raised concern that these multinational companies carried out their activities without giving any considerable and attention to host countries where they subcontracting or outsourcing their clothing factories to the economic and social development of those countries. This endless criticism by a number of activists from all over parts of the world led to the establishment of voluntary labour codes of conduct by these multinational companies (White and Taft, 2004). This report therefore is a result of the search of literature review regarding the upholding of human rights standards by large clothing retailers in their day to day operations, both within their countries of origin and overseas. 1.2 Aims and Objectives The general aim of this report is to examine the trend of large clothing retailers in upholding human rights in their operations with particular emphasis to those operating in the United Kingdom. These multinational large clothing retailers in question are: Nike, Gap, Marks Spencer and Levi Straus. To realize the desired aim, the report focused on the following objectives: Ã · To explore the historical background with regard to textile sector and their compliance to human rights. Ã · To examine the rise of the ethical business and the effects of Voluntary Labour Standards (Codes of Conduct) in the textile industry. Ã · To examine the role played by these multinational large clothing retailers in upholding human rights as well as challenges facing them. CHAPTER TWO: 2. LITERATURE REVIEW, ANALYSIS AND DISCUSSION 2.1 LITERATURE REVIEW 2.1.1 Human Rights, Ethics and Business Ethics defined Human rights, ethics and business ethics defined in differently ways by different authors and all the definitions in the essence of the same thing. According to Rory Sullivan, he define Human rights as a moral right that apply to all employees in all nations regardless and acknowledge and protects those rights in the sense that human right are said to be unchangeable. On the other hand, Boddy (2005) argues that human rights means the idea that people have fundamental rights and liberties, and affected, those rights include consent, privacy, conscience, free speech, fair treatment and to life and safe. Similarly, the United National Universal Declaration for Human Rights (UDHR) defines human rights as a way of the incorporated economic, social cultural rights, such as right to work, right for educations, respect for their culture and a decent standard of living (Rude Mares). Crane (2007) refers as the ethics as the study of morality and the application of reason to explain special rul es and principles that determine right and wrong for a given situation at given time, those rules and doctrine are called ethical theories. However Fritz et al, (1999), and Hunt et al (1989) define ethical company as the conduct of conduct which are positively related to employees organizational commitment. Boddy (2005) define ethics as code of right principles and values that guide the actions of people and groups through set standard of the behaviour which is acceptable, especially when an action or decision can harm others. Taylor (1975) define business ethics as the business environment and basis of right decision, principles, and set of laws of the ways of carrying out the businesses activities between different parties within the organization, such as employees, customers, suppliers and the shareholders in the determination of the what is right or wrong to all parties. White and Taft (2004) indicate that ethics have been divided into two main categories, namely: teleological and deontological. With teleological ethics the emphasis is on the consequences or results of actions. This approach to ethics takes no accoun t of whether actions are rights or wrong but rather depends on whether harm or good results from the action. On the other hand, the teleological theories, includes utilitarianism, egoism, and care. The essence of the approach maintain that acts do not have intrinsic value but should be evaluated on the basis of the actions they produce and their effects others. The utilitarianism approach is based on the early ideas from Jeremy Benthams belief in empiricism and that of John Stuart Mill in the 18th century (Rosenstad, 1997; Velasquez, 1998). Utilitarianism takes a societal perspective on costs and benefits of ethical choice, indicating that any action should be evaluated in terms of its consequences. The idea is to determine how much good or harm it causes and the effects it impart on all parties. Utilitarianism is thus meant to promote the welfare of all persons by minimizing harm and maximizing benefits. This approach gives much attention to achieving desirable effects to many people taking into consideration human rights. The recent United States health care policy is seen as one of the utilitarian-driven public policy decision, in which the change is geared to a system that provides fundamental health and illness services to everyone. With deontological approach to ethics, White and Taft (2004) explain that an action or a decision in itself has intrinsically good or bad (or right or wrong) and thus it cant be judged by the mere results. Rights, justice, fairness, truth-telling, and virtue ethics form the deontological approach of reasoning. For example, a moral person would based on what is rights to her or him in making an ethical decision, putting into consideration the moral principles, rules or regulations, regardless of the circumstances of results. 2.1.2 Sourcing in the Textile Industry Christerson and Appelbaum, (1995) pointed that during the nineties there was a massive shift in the manufacturing of clothing to low wage countries throughout the world. International companies sourced products internationally in order to achieve a cost advantage. Traditionally, the framework of competition in the textile/clothing sector is described by dividing operators into two different strategic groups in terms of production management models. Firstly, there is a group identifiable as clothing operators (either manufactures or retailers). This group is primarily concerned with designing, modelling, forecasting and contributing to the development of fashion trends. Firms in this category are busy working on marketing strategies of product designed and proposed long before the actual time of consumption. The second group includes firms that compete with one another on the basis of their ability to adjust to the fashion trends imposed by others. By doing this they ensure speed and reliability to their already secured markets. These firms compensate for the lack of product planning by virtue of a production management model whose main characteristics are rapidity and flexibility. The two groups, therefore, have different factors that lie behind their success. In the first group, priority in their operations is to make sure that they have good command and influence fashion trends associated with a strong brand image. In the second group, the emphasis is on effective marketing strategies (Hathcote and Nam, 1999). Stiff competition, shaped by globalization, clothing retailers and brand manufacturers were forced to sourced their produce and manufactured goods to low-wage, economically less developed countries (Crewe, 2004; Klein, 2000). Consequently the late 1980s and early 1990s saw traditional European and U.S. based garment and footwear companies start off shoring and outsourcing much of their production from developing countries (Jones, 2005). This trend was particularly visible in low-skilled industries, such as the garment, footwear, and toy industries (Christerson and Appelbaum, 1995; Hathcote and Nam, 1999). Under conditions of competition, individuals cannot comply with moral norms. This leads to higher costs which in turn leave them worse off than their competitors. Situations like this systematically lead to an erosion of compliance with moral norms. Via evolution, individuals behaving morally will be signed out. Karl Marx and Max Weber saw this problem clearly. Both pointed out that competitive market makes it impossible for single individuals to follow the calls of morality and self-interest at the same time. The structures of society have changed in modern times, but ethical concepts and categories have at least to a large extent not changed. Most conceptions of ethics still require us to be moderate, to share, to redistribute, to sacrifice. They call for altruism, for the priority of common good and the like. The pursuit of self interest, of individual advantages, is often still ultimately seen as something like and evil drive that needs to be tamed (Christoph, 2005). Globalization has therefore been one of the factors for previous human rights violations in many multinational companies (Misol, 2006). Ambitious to mass super profits, these multinational companies embarked on child labour exploitation, suppression of labour rights in their supply chains. This led to persistence public outcry that helped to amplify global awareness about the injustices and human rights violations done by multinational companies in their chain supply production. 2.1.3 The Rise of Ethical Business and Corporate Social Responsibility There is a wide spread attention and interest in self-regulation, corporate social responsibility that continually press many companies to adhere to human rights in their operations. Ethical business, involving corporate codes of conduct for worker welfare and environmental protection, it is a subject that has attracted significant interest from academicians, the media and nongovernmental organizations (NGOs) for many years now (Hughes, 2005). (Crane et al 2007) indicate how the importance of business ethics it is, in attracting different massive amount attention for various people example the shouter of the consumers and pressure groups that appearing to have an increasing of the challenging the firms in the asking of the more ethical and reasonably ways of doing business. Ethical business has emerged since the early 1990s as a specific example of corporate social responsibility, most commonly involving the establishment of minimum labour standards for producers in supply chains (Hathcote and Nam, 1999). Blowfield (1999), however, highlights that the issue of ethical business is broadened to incorporate a wider range of standards, including those concerned with the environment. Furthermore corporate social responsibility stand in the implementation for set core values that includes avoiding human rights abuses, upholding the right for the workers to join or form labour unions, elimination of compulsory and child labour and avoiding workplace discrimination (Cavusgil, Knight and Riesenberger 2008) However people like the later Rev. Leon Sullivan had been much concerned about code of conduct of human rights in workplace and in 1999, he developed a set of guidelines for corporate social responsibility, he argue that for the companies operations around the world should support and follow the Global Sullivan of corporate social responsibility. The aim and objectives was to maintain economic, social, and political justice by companies where they are doing business, to support human rights and to encourage equal opportunity at all levels of employment in developed and developing countries (www.thesullivanfoundation.org). Concerns in the early 1990s over child labour, physical and verbal abuse and violations of core labour rights in the production of toys, soccer balls, rugs, and garments marked the beginning of a wave of anti-sweatshop protests and media campaigns (Varley, 1998). Some of the earliest campaigns focused on production in China for companies like Levi Strauss and others, where the Tiananmen Square massacre in 1989 and U.S.-China trade negotiations drew special attention to human rights abuses. Bonacich and Appelbaum (2000) mentioned other anti-sweatshop protests that brought remarkable attention regarding human rights violations were those that showed child labour in the production of soccer balls in Pakistan, rugs in India, and garments in Bangladesh and Honduras. One of the most dramatic early sweatshop scandals occurred in the U.S, in the Los Angeles, California suburb of EI Monte. It was there, in 1995, that government inspectors discovered Thai immigrants working as indentured serv ants in an apartment complex, sewing garments to be sold by major retailers, including Montgomery Ward, Target, and Sears (Su 1997). The next year, labour rights activists brought sweatshops further into the American media spotlight, by exposing child labour in a Honduran factory producing Kathie Lee Giffords line of clothing for Wal-Mart, as well as a New York City sweatshop also producing Kathie Lee Giffords brand (Bonacich and Appelbaum 2000). Further to this, the suppression of labour rights in Indonesia, El Salvador, and several shocking instances of physical abuse in other parts of the developing world raised concern. In the early 1990s activists first accused footwear companies like Nike, Wal-Mart, and the Gap of profiting from exploitation, child labour, and the suppression of labour rights in their supply chains. These companies, however, responded by denying the responsibility (Hughes, 2005). According to Cavusgil, Knight and Riesenberger (2008) activists also accused International business specifically in the case of the multinational companies for ignores human rights by exploited workers around the world mostly in labour standard; low wages factories in developing countries by create substandard working conditions, example for the sweatshops in Asia where they imported clothing and auto workers in Mexico. Jenkins et al (2002) argue that the rise of voluntary corporate code of conduct in the 1990s can be linked to some extent to the processes of globalization. They mention the specific drivers of voluntary ethical trading initiatives as being: a) the growth of global supply chains that extend beyond the reach of national governments; b) the rise in the power of corporate brands and reputation, which makes large companies vulnerable to negative publicity; c) an increase in public awareness of overseas production conditions via improvements in global communications; and d) the growing importance to the investment community of ethical performance on the part of public companies. Furthermore, there were various initiatives concerned with labour and environmental issues that were categorized as ethical business. These included: (1) Multistakeholder organizations such as the UK Ethical Trading Initiative (ETI), the Dutch Fair Wear Foundation, and the Fair Labour Association and Worker Rights Consortium in the USA, which all set minimum labour standards for producers; (2) labelling initiatives such as the Kenya Flower Council, which cover industry-specific environmental and labour standards; (3) individual corporate initiatives for establishing minimum standards in supply chains (Blowfield, 1999). These early initiatives were among the significant steps in promoting ethical business. Blowfield (1999) and Jenkins et al, (2002) argue that these initiatives also developed within the context of the United Nations Global Compact such as international standards which aimed to promote corporate citizenship in the global economy. Despite the organizational differences between existing ethical trading initiatives, most companies used some kind of code of conduct as the key tool for establishing workplace standards. 2.1.4 Voluntary Labour Standards (Codes of Conduct) Pressures on multinational companies by anti-sweatshop groups, labour unions, shareholders, activists, and consumer groups played an important role for companies to adopt labour standards. Standards refer with corporate code standard mention International by ILO (International Labour Organization) to the extent to which is explicitly or implicitly can either be done through the inclusion of the basic provisions of international organizations in the corporate codes standards (Van Tulder Kolk, 2002). Similarly, there were also greater pressures from governmental campaigns all over the world. Where in European countries, some of the government such as France were be advocating for greater attention to human rights in the sphere of international business. Along with such efforts from various countries, the European Commission had been carried out a research in the international subcontracting companies about the social aspect of textile clothing and footwear firms. Aiming to the extent in which the researches discover that these multinational companies adhered to human rights in their operations (Kolk and van Tulder, 2002). In 1996, President Clinton Launched the White House Apparel Industry on Workplace Standard (AIP), he launched the AIP after seen the violation of human rights in the clothing industries by multinational companies, the aim was to established standards and to ensure apparel and footwear were not made under sweatshops working conditions (Meyer and De Wit (2004). Due to the human right violation in textiles sectors precisely in the sweatshops conditions, The Clinton Administration established campaign against sweatshops in the clothing Textiles worked under sweatshops conditions in USA, the campaign was called No-Sweat and was introduced for the purpose fighting against sweatshops in which resulted to establishment of the Trendsetter List of companies in the Textiles Clothing and Footwear Factories. The campaign was aiming for the Clothing Textiles Factories to respect human rights and labour legislation in the production and marketing activities of the clothing and footwear in general, to make sure that both the clothing companies and their subcontracting companies as are, they must significant put into consideration and respecting these rights. The lack of the about not respect the rights, a number of labour legislation and human rights had been identified by the Department of Labour in the Textiles Clothing and Footwear factories, in subcontracting in particular of apparel production, facing the multinational companies, that was exploitation with a number of cases involving in human rights particularly the immigrant workers in sweatshops established on the United States regional, took steps to clean up the sectors. However, United States boundary put up on the sweatshops issue, took up steps to clean the sector (Elliot and Freeman (2001). Specifically in the area of child labour and, for example, the United States Government took a number of steps to alleviate the problems. Between 1994 and 1996 because of the important of the issue, the Bureau of International Labour affairs managed to organize three public gatherings to have views on child labour. These public platforms brought together a number of activists and the public at large to discuss various issues related to child labour. Specifically, they focused on the worst conditions of child abuse in the less developed countries that they exported products to the United States. A number of resolutions were made but all geared to put to end the merciless violations of human rights and child labour (Elliot and Freeman (2001). The Association of the Clothing Manufacturers of the USA and the Amalgamated Clothing Textiles Workers Union in 1995 agreed to have a National Branch for Collective Agreement. The agreement among other things included: the need to establish minimum standards regarding number of working hours, wages, and working conditions. In addition, the agreement also focused on a number of issues ranging from non-intolerance forced work, child employee, liberty of association, to occupational safety and health (White and Taft, 2004; and Giwerth, 1982). This was a trend in many parts of the world. Several national and multinational organizations and trade unions endeavoured to draw attention to respect human rights. Pressures from activities increased the formation of human rights association and in 1998 established of the Fair Labour Associations (FLA) to the overseas compliance, the Workplace Code of Conduct. The goals of Fair Labour Association (FLA) were for the companies required to monitor t heir own factories and their subcontractors to make sure there is compliance of the Code of Conduct in the textile factories (Meyer and De Wit, 2004). Klein (1999) pointed out that many firms had invested heavily in branding and reputation capital and therefore any high profile scandals and political pressures could tarnish their reputation. In the face of such pressure, it was not surprising that firms adopted voluntary standards to try to deflect criticism, pre-empt regulation, and signal their social responsibility to consumers and investors. The important factor in adoption of voluntary labour codes was to uphold public image which the company wanted to project to its customers, employees, suppliers and shareholders. Thus the clothing retailers public image became important than anything else. These multinational companies worked hard to clear their images and had no option but to promote codes of conduct. The public image was particularly important because it determined the extent to which the companys products could be bought. Given the rapidly growing competition in the global markets and communication in technology, it was essential for a company to improve the working conditions in its operations and retain its good image to customers (Kolk and van 2002). The United Nation Universal Declaration of Human Rights was adopted by the General Assembly in 1948 (Schulz, 2001). The declaration proclaims on the issue of the slavery or servitude subjected to inhuman or degrading treatment or punishment put them into detention or exile and arbitrary arrest subjected. Moreover the declaration goes on to proclaim that everyone needs to live in liberty and everyone have a right to security, everyone have equal protection against any discrimination, and everyone have a the rights for work, everyone have free choice of employment, to just and favourable conditions of work, and to protection against unemployment as a result of discrimination has entitled. The international Labour organization (ILO) was created in 1919 as a tripartite organization of government, business, and union representatives from 174 nations. Since then, it has adopted 177 lengthy labour conventions or standards. Seven of these are considered fundamental human rights, addressing issues such as forced labour, equal pay for men and women, discrimination in the workplace, and the minimum age for employment (White and Taft, 2004). Organizations such as Amnesty International have specified clearly workers right such as freedom of association, the right of collective bargaining and working conditions and soon. The organization is for Human Rights and as Watch Report on human rights well being all around the world and strives to ensure the protection and progression of them as well. Amnesty International is an organization whose vision was derived from the United Nations Universal Declaration of Human Rights, was adopted by the General Assembly Resolution in 1948. It is adopted for the reasons monitoring the protection and standard of human rights as were established in thirty articles that later set the primary foundation to the policies and standard that carried out by NGOs and other agencies with the purpose to protect and promote fundamental rights (www.amnesty.org). The Social Accountability International (SAI), established in 1977, is an organization that for promotes human rights for workers around the world. Its SA8000 standards are obtained from the Universal Declaration of Human Rights and the International Labour Organisation (ILO) convention. The standards are designed to make workplace more humane and also to offer more benefits for the companies and its employees. Employees that work under SA8000 standards they have profit from the enhanced opportunity of collective bargaining and to organize trade unions. Also, employees become more educated about their rights which in turn, commits to have assurance for a better work environment. The companies as whole, benefits from the SA8000 guidelines because it strengthens and put company values into action and enhances the company reputation (Krage, 2007). The International Labour Organization Declaration (ILO) on the Fundamental Principles at work were adopted in 1998 and was an expression of commitment by governments, employers and workers organizations to uphold basic human rights (Kolk et al 2001).The Declaration covers four areas; liberty of the trade union and the right to collective bargaining, elimination of forced and compulsory work, Abolition of child employee and elimination of discrimination of human rights. The Voluntary Principles on Security and Human Rights were developed by governments of the U.S. UK, Norway, Netherlands and NGOs, who all were have the common interest in human rights and corporate social responsibility (voluntaryprinciple.org). There were six principles that all participants agents agreed on in order to promote and protect human rights in multinational companies. The six Voluntary Principle as stated on their website are as follows: acknowledge that security is a fundamental need; Understanding that governments have the primary responsibility to promote and protect human rights; Particularly those set forth in the Universal Declaration of Human rights; Emphasizing the importance of safeguarding the integrity of company personnel and property; Taking note of the effect of those companies, activities and decisions affect the local community; Understanding that useful, credible information is a major component of security and human rights. The Global Reporting Initiative (GRI) is multi-stakeholder governed institution that provides global standards for the promotion of sustainable development. Judy Henderson, immediate past-Chair, Board of Directors says The GRI is a unique, multi-stakeholder organization founded on the conviction consistent, regular and comparable reporting, provides transparency and can be a powerful catalyst to improve performance (globalreporting.org). There are nearly 1000 organization in over 60 countries that have established their involvement with the GRI reporting framework. This reporting framework guides corporations and organizations on the reporting their sustainability performance to promote company progression and improvement in all area of business. The reporting guidelines contain principles, guidance, and standard disclosures that formulate a structure that cooperating organizations can voluntarily adopt (www.globalreporting.org). The UNs Global Compact is a purely voluntary guide to promoting responsible corporate citizenship. Its two main objectives are: to mainstream its ten (10) principles in business activities around the world and initiate actions to support United Nations goals (www.unglobalcompact.org) 2.1.5 Adoption of Voluntary Labour Standards (Codes of Conduct) by Multinational Companies and their Impact The rapid diffusion of labour standards (codes of conduct) stems from the response to external pressures (actual or threatened) from media, activists, government, and consumers (Shaw, 1999). In a like manner, (H Supply Chain Human Rights in Clothing Retailers Supply Chain Human Rights in Clothing Retailers EXECUTIVE SUMMARY The present report is about the Importance of upholding human standards of the workers both inside and outside their home countries in the large clothing retailers. Human rights still remain to be one of the most challenging issues all over the world because of international variations in politics, history, social and cultural differences. The implementation of human rights, however, does not go unexcused in any place of situation regardless of the circumstances. Upholding of human rights is very important and it is the fundamental right of every human being. This report specifically focused on the Clothing Retailers operating in the United Kingdom. These include: Nike, Gap, Levi Strauss and Marks and Spencer. The task of this report was to examine how these multinational firms uphold human rights in their operations all over the world. The report has found out that among other factors, globalisation also contributed to a great extent for international firms to violate human rights. In the 1980s, shaped by globalization, clothing retailers and brand manufacturers were forced to source their produce and manufactured goods from low-wage, economically less developed countries. These less developed countries were in most cases characterised by child labour, sexual harassment, and intolerable working conditions. Global awareness about inhuman conditions in working places drew together voices of numerous activists from all over the world to divert the trend. During the 1970s, various national and multinational organization, Non governmental organization and trade unions accused these clothing retailers companies for violating human rights. These multinational companies were specifically blamed for their failure to put into consideration the economic level of less developed countries in which they operated. This criticism led to establishment of voluntary labour codes by these companies in an effort to uphold their image. Most of these voluntary labour codes adopted principles in the International Labour Organization (ILO) Conventions. Among other things, this report examines the historical aspect of clothing retailers and the challenges involved in upholding human rights in their supply chain production. The report further examines the role played by these clothing retailers in upholding human rights in their operations all over the world. CHAPTER ONE: 1. BACKGROUND INFORMATION 1.1. Introduction Human rights or sometimes referred to as natural rights are free and fundamental liberties entitled to an individual without the interference from any government or group of people for whatever reasons. A persons civil liberties are protected by the constitutions that define them and the organizations that exist to promote them. Under any circumstances the implementation of human rights does not go unexcused in any place or situation. Every individual regardless of his/her social economic status deserves to be treated with dignity. But due to rapid economic development, multinational companies are becoming more susceptible to violating human rights because of increasing international competition, undistributed wealth, and weak national laws (Krage, 2007). The World Commission on the Social Dimension of Globalization (2004) in one of its reports indicated that the global economy is changing in many ways. These massive changes affect multinational investment, capital markets, technology and business, more specifically impacting companies, consumers, workers and governments. The report further concludes that globalization has led to interdependence in economic relations that has created more opportunities for the advancement in business, investment, finance, organization of global production, and also more social and political interaction between organizations and individual around the world (World Commission on the Social Dimension of Globalization, 2004). It is unfortunate that not all countries are developing with the same pace and outcomes. Some countries specifically the developing countries, cannot utilize these rapidly growing expansion to their advantages (Misol, 2006). For example, there are plenty of evidences that increasing g lobal competition puts workers human rights in jeopardy because company protection standards are lowered and an employees civil liberties are often denied (Christerson and Applelbaum, 1995; Hathcote and Nam, 1999). In the 1970s, considerable criticism was raised against multinational companies regarding their operations in less developed countries. Nongovernmental organizations, national and international trade unions and many host countries raised concern that these multinational companies carried out their activities without giving any considerable and attention to host countries where they subcontracting or outsourcing their clothing factories to the economic and social development of those countries. This endless criticism by a number of activists from all over parts of the world led to the establishment of voluntary labour codes of conduct by these multinational companies (White and Taft, 2004). This report therefore is a result of the search of literature review regarding the upholding of human rights standards by large clothing retailers in their day to day operations, both within their countries of origin and overseas. 1.2 Aims and Objectives The general aim of this report is to examine the trend of large clothing retailers in upholding human rights in their operations with particular emphasis to those operating in the United Kingdom. These multinational large clothing retailers in question are: Nike, Gap, Marks Spencer and Levi Straus. To realize the desired aim, the report focused on the following objectives: Ã · To explore the historical background with regard to textile sector and their compliance to human rights. Ã · To examine the rise of the ethical business and the effects of Voluntary Labour Standards (Codes of Conduct) in the textile industry. Ã · To examine the role played by these multinational large clothing retailers in upholding human rights as well as challenges facing them. CHAPTER TWO: 2. LITERATURE REVIEW, ANALYSIS AND DISCUSSION 2.1 LITERATURE REVIEW 2.1.1 Human Rights, Ethics and Business Ethics defined Human rights, ethics and business ethics defined in differently ways by different authors and all the definitions in the essence of the same thing. According to Rory Sullivan, he define Human rights as a moral right that apply to all employees in all nations regardless and acknowledge and protects those rights in the sense that human right are said to be unchangeable. On the other hand, Boddy (2005) argues that human rights means the idea that people have fundamental rights and liberties, and affected, those rights include consent, privacy, conscience, free speech, fair treatment and to life and safe. Similarly, the United National Universal Declaration for Human Rights (UDHR) defines human rights as a way of the incorporated economic, social cultural rights, such as right to work, right for educations, respect for their culture and a decent standard of living (Rude Mares). Crane (2007) refers as the ethics as the study of morality and the application of reason to explain special rul es and principles that determine right and wrong for a given situation at given time, those rules and doctrine are called ethical theories. However Fritz et al, (1999), and Hunt et al (1989) define ethical company as the conduct of conduct which are positively related to employees organizational commitment. Boddy (2005) define ethics as code of right principles and values that guide the actions of people and groups through set standard of the behaviour which is acceptable, especially when an action or decision can harm others. Taylor (1975) define business ethics as the business environment and basis of right decision, principles, and set of laws of the ways of carrying out the businesses activities between different parties within the organization, such as employees, customers, suppliers and the shareholders in the determination of the what is right or wrong to all parties. White and Taft (2004) indicate that ethics have been divided into two main categories, namely: teleological and deontological. With teleological ethics the emphasis is on the consequences or results of actions. This approach to ethics takes no accoun t of whether actions are rights or wrong but rather depends on whether harm or good results from the action. On the other hand, the teleological theories, includes utilitarianism, egoism, and care. The essence of the approach maintain that acts do not have intrinsic value but should be evaluated on the basis of the actions they produce and their effects others. The utilitarianism approach is based on the early ideas from Jeremy Benthams belief in empiricism and that of John Stuart Mill in the 18th century (Rosenstad, 1997; Velasquez, 1998). Utilitarianism takes a societal perspective on costs and benefits of ethical choice, indicating that any action should be evaluated in terms of its consequences. The idea is to determine how much good or harm it causes and the effects it impart on all parties. Utilitarianism is thus meant to promote the welfare of all persons by minimizing harm and maximizing benefits. This approach gives much attention to achieving desirable effects to many people taking into consideration human rights. The recent United States health care policy is seen as one of the utilitarian-driven public policy decision, in which the change is geared to a system that provides fundamental health and illness services to everyone. With deontological approach to ethics, White and Taft (2004) explain that an action or a decision in itself has intrinsically good or bad (or right or wrong) and thus it cant be judged by the mere results. Rights, justice, fairness, truth-telling, and virtue ethics form the deontological approach of reasoning. For example, a moral person would based on what is rights to her or him in making an ethical decision, putting into consideration the moral principles, rules or regulations, regardless of the circumstances of results. 2.1.2 Sourcing in the Textile Industry Christerson and Appelbaum, (1995) pointed that during the nineties there was a massive shift in the manufacturing of clothing to low wage countries throughout the world. International companies sourced products internationally in order to achieve a cost advantage. Traditionally, the framework of competition in the textile/clothing sector is described by dividing operators into two different strategic groups in terms of production management models. Firstly, there is a group identifiable as clothing operators (either manufactures or retailers). This group is primarily concerned with designing, modelling, forecasting and contributing to the development of fashion trends. Firms in this category are busy working on marketing strategies of product designed and proposed long before the actual time of consumption. The second group includes firms that compete with one another on the basis of their ability to adjust to the fashion trends imposed by others. By doing this they ensure speed and reliability to their already secured markets. These firms compensate for the lack of product planning by virtue of a production management model whose main characteristics are rapidity and flexibility. The two groups, therefore, have different factors that lie behind their success. In the first group, priority in their operations is to make sure that they have good command and influence fashion trends associated with a strong brand image. In the second group, the emphasis is on effective marketing strategies (Hathcote and Nam, 1999). Stiff competition, shaped by globalization, clothing retailers and brand manufacturers were forced to sourced their produce and manufactured goods to low-wage, economically less developed countries (Crewe, 2004; Klein, 2000). Consequently the late 1980s and early 1990s saw traditional European and U.S. based garment and footwear companies start off shoring and outsourcing much of their production from developing countries (Jones, 2005). This trend was particularly visible in low-skilled industries, such as the garment, footwear, and toy industries (Christerson and Appelbaum, 1995; Hathcote and Nam, 1999). Under conditions of competition, individuals cannot comply with moral norms. This leads to higher costs which in turn leave them worse off than their competitors. Situations like this systematically lead to an erosion of compliance with moral norms. Via evolution, individuals behaving morally will be signed out. Karl Marx and Max Weber saw this problem clearly. Both pointed out that competitive market makes it impossible for single individuals to follow the calls of morality and self-interest at the same time. The structures of society have changed in modern times, but ethical concepts and categories have at least to a large extent not changed. Most conceptions of ethics still require us to be moderate, to share, to redistribute, to sacrifice. They call for altruism, for the priority of common good and the like. The pursuit of self interest, of individual advantages, is often still ultimately seen as something like and evil drive that needs to be tamed (Christoph, 2005). Globalization has therefore been one of the factors for previous human rights violations in many multinational companies (Misol, 2006). Ambitious to mass super profits, these multinational companies embarked on child labour exploitation, suppression of labour rights in their supply chains. This led to persistence public outcry that helped to amplify global awareness about the injustices and human rights violations done by multinational companies in their chain supply production. 2.1.3 The Rise of Ethical Business and Corporate Social Responsibility There is a wide spread attention and interest in self-regulation, corporate social responsibility that continually press many companies to adhere to human rights in their operations. Ethical business, involving corporate codes of conduct for worker welfare and environmental protection, it is a subject that has attracted significant interest from academicians, the media and nongovernmental organizations (NGOs) for many years now (Hughes, 2005). (Crane et al 2007) indicate how the importance of business ethics it is, in attracting different massive amount attention for various people example the shouter of the consumers and pressure groups that appearing to have an increasing of the challenging the firms in the asking of the more ethical and reasonably ways of doing business. Ethical business has emerged since the early 1990s as a specific example of corporate social responsibility, most commonly involving the establishment of minimum labour standards for producers in supply chains (Hathcote and Nam, 1999). Blowfield (1999), however, highlights that the issue of ethical business is broadened to incorporate a wider range of standards, including those concerned with the environment. Furthermore corporate social responsibility stand in the implementation for set core values that includes avoiding human rights abuses, upholding the right for the workers to join or form labour unions, elimination of compulsory and child labour and avoiding workplace discrimination (Cavusgil, Knight and Riesenberger 2008) However people like the later Rev. Leon Sullivan had been much concerned about code of conduct of human rights in workplace and in 1999, he developed a set of guidelines for corporate social responsibility, he argue that for the companies operations around the world should support and follow the Global Sullivan of corporate social responsibility. The aim and objectives was to maintain economic, social, and political justice by companies where they are doing business, to support human rights and to encourage equal opportunity at all levels of employment in developed and developing countries (www.thesullivanfoundation.org). Concerns in the early 1990s over child labour, physical and verbal abuse and violations of core labour rights in the production of toys, soccer balls, rugs, and garments marked the beginning of a wave of anti-sweatshop protests and media campaigns (Varley, 1998). Some of the earliest campaigns focused on production in China for companies like Levi Strauss and others, where the Tiananmen Square massacre in 1989 and U.S.-China trade negotiations drew special attention to human rights abuses. Bonacich and Appelbaum (2000) mentioned other anti-sweatshop protests that brought remarkable attention regarding human rights violations were those that showed child labour in the production of soccer balls in Pakistan, rugs in India, and garments in Bangladesh and Honduras. One of the most dramatic early sweatshop scandals occurred in the U.S, in the Los Angeles, California suburb of EI Monte. It was there, in 1995, that government inspectors discovered Thai immigrants working as indentured serv ants in an apartment complex, sewing garments to be sold by major retailers, including Montgomery Ward, Target, and Sears (Su 1997). The next year, labour rights activists brought sweatshops further into the American media spotlight, by exposing child labour in a Honduran factory producing Kathie Lee Giffords line of clothing for Wal-Mart, as well as a New York City sweatshop also producing Kathie Lee Giffords brand (Bonacich and Appelbaum 2000). Further to this, the suppression of labour rights in Indonesia, El Salvador, and several shocking instances of physical abuse in other parts of the developing world raised concern. In the early 1990s activists first accused footwear companies like Nike, Wal-Mart, and the Gap of profiting from exploitation, child labour, and the suppression of labour rights in their supply chains. These companies, however, responded by denying the responsibility (Hughes, 2005). According to Cavusgil, Knight and Riesenberger (2008) activists also accused International business specifically in the case of the multinational companies for ignores human rights by exploited workers around the world mostly in labour standard; low wages factories in developing countries by create substandard working conditions, example for the sweatshops in Asia where they imported clothing and auto workers in Mexico. Jenkins et al (2002) argue that the rise of voluntary corporate code of conduct in the 1990s can be linked to some extent to the processes of globalization. They mention the specific drivers of voluntary ethical trading initiatives as being: a) the growth of global supply chains that extend beyond the reach of national governments; b) the rise in the power of corporate brands and reputation, which makes large companies vulnerable to negative publicity; c) an increase in public awareness of overseas production conditions via improvements in global communications; and d) the growing importance to the investment community of ethical performance on the part of public companies. Furthermore, there were various initiatives concerned with labour and environmental issues that were categorized as ethical business. These included: (1) Multistakeholder organizations such as the UK Ethical Trading Initiative (ETI), the Dutch Fair Wear Foundation, and the Fair Labour Association and Worker Rights Consortium in the USA, which all set minimum labour standards for producers; (2) labelling initiatives such as the Kenya Flower Council, which cover industry-specific environmental and labour standards; (3) individual corporate initiatives for establishing minimum standards in supply chains (Blowfield, 1999). These early initiatives were among the significant steps in promoting ethical business. Blowfield (1999) and Jenkins et al, (2002) argue that these initiatives also developed within the context of the United Nations Global Compact such as international standards which aimed to promote corporate citizenship in the global economy. Despite the organizational differences between existing ethical trading initiatives, most companies used some kind of code of conduct as the key tool for establishing workplace standards. 2.1.4 Voluntary Labour Standards (Codes of Conduct) Pressures on multinational companies by anti-sweatshop groups, labour unions, shareholders, activists, and consumer groups played an important role for companies to adopt labour standards. Standards refer with corporate code standard mention International by ILO (International Labour Organization) to the extent to which is explicitly or implicitly can either be done through the inclusion of the basic provisions of international organizations in the corporate codes standards (Van Tulder Kolk, 2002). Similarly, there were also greater pressures from governmental campaigns all over the world. Where in European countries, some of the government such as France were be advocating for greater attention to human rights in the sphere of international business. Along with such efforts from various countries, the European Commission had been carried out a research in the international subcontracting companies about the social aspect of textile clothing and footwear firms. Aiming to the extent in which the researches discover that these multinational companies adhered to human rights in their operations (Kolk and van Tulder, 2002). In 1996, President Clinton Launched the White House Apparel Industry on Workplace Standard (AIP), he launched the AIP after seen the violation of human rights in the clothing industries by multinational companies, the aim was to established standards and to ensure apparel and footwear were not made under sweatshops working conditions (Meyer and De Wit (2004). Due to the human right violation in textiles sectors precisely in the sweatshops conditions, The Clinton Administration established campaign against sweatshops in the clothing Textiles worked under sweatshops conditions in USA, the campaign was called No-Sweat and was introduced for the purpose fighting against sweatshops in which resulted to establishment of the Trendsetter List of companies in the Textiles Clothing and Footwear Factories. The campaign was aiming for the Clothing Textiles Factories to respect human rights and labour legislation in the production and marketing activities of the clothing and footwear in general, to make sure that both the clothing companies and their subcontracting companies as are, they must significant put into consideration and respecting these rights. The lack of the about not respect the rights, a number of labour legislation and human rights had been identified by the Department of Labour in the Textiles Clothing and Footwear factories, in subcontracting in particular of apparel production, facing the multinational companies, that was exploitation with a number of cases involving in human rights particularly the immigrant workers in sweatshops established on the United States regional, took steps to clean up the sectors. However, United States boundary put up on the sweatshops issue, took up steps to clean the sector (Elliot and Freeman (2001). Specifically in the area of child labour and, for example, the United States Government took a number of steps to alleviate the problems. Between 1994 and 1996 because of the important of the issue, the Bureau of International Labour affairs managed to organize three public gatherings to have views on child labour. These public platforms brought together a number of activists and the public at large to discuss various issues related to child labour. Specifically, they focused on the worst conditions of child abuse in the less developed countries that they exported products to the United States. A number of resolutions were made but all geared to put to end the merciless violations of human rights and child labour (Elliot and Freeman (2001). The Association of the Clothing Manufacturers of the USA and the Amalgamated Clothing Textiles Workers Union in 1995 agreed to have a National Branch for Collective Agreement. The agreement among other things included: the need to establish minimum standards regarding number of working hours, wages, and working conditions. In addition, the agreement also focused on a number of issues ranging from non-intolerance forced work, child employee, liberty of association, to occupational safety and health (White and Taft, 2004; and Giwerth, 1982). This was a trend in many parts of the world. Several national and multinational organizations and trade unions endeavoured to draw attention to respect human rights. Pressures from activities increased the formation of human rights association and in 1998 established of the Fair Labour Associations (FLA) to the overseas compliance, the Workplace Code of Conduct. The goals of Fair Labour Association (FLA) were for the companies required to monitor t heir own factories and their subcontractors to make sure there is compliance of the Code of Conduct in the textile factories (Meyer and De Wit, 2004). Klein (1999) pointed out that many firms had invested heavily in branding and reputation capital and therefore any high profile scandals and political pressures could tarnish their reputation. In the face of such pressure, it was not surprising that firms adopted voluntary standards to try to deflect criticism, pre-empt regulation, and signal their social responsibility to consumers and investors. The important factor in adoption of voluntary labour codes was to uphold public image which the company wanted to project to its customers, employees, suppliers and shareholders. Thus the clothing retailers public image became important than anything else. These multinational companies worked hard to clear their images and had no option but to promote codes of conduct. The public image was particularly important because it determined the extent to which the companys products could be bought. Given the rapidly growing competition in the global markets and communication in technology, it was essential for a company to improve the working conditions in its operations and retain its good image to customers (Kolk and van 2002). The United Nation Universal Declaration of Human Rights was adopted by the General Assembly in 1948 (Schulz, 2001). The declaration proclaims on the issue of the slavery or servitude subjected to inhuman or degrading treatment or punishment put them into detention or exile and arbitrary arrest subjected. Moreover the declaration goes on to proclaim that everyone needs to live in liberty and everyone have a right to security, everyone have equal protection against any discrimination, and everyone have a the rights for work, everyone have free choice of employment, to just and favourable conditions of work, and to protection against unemployment as a result of discrimination has entitled. The international Labour organization (ILO) was created in 1919 as a tripartite organization of government, business, and union representatives from 174 nations. Since then, it has adopted 177 lengthy labour conventions or standards. Seven of these are considered fundamental human rights, addressing issues such as forced labour, equal pay for men and women, discrimination in the workplace, and the minimum age for employment (White and Taft, 2004). Organizations such as Amnesty International have specified clearly workers right such as freedom of association, the right of collective bargaining and working conditions and soon. The organization is for Human Rights and as Watch Report on human rights well being all around the world and strives to ensure the protection and progression of them as well. Amnesty International is an organization whose vision was derived from the United Nations Universal Declaration of Human Rights, was adopted by the General Assembly Resolution in 1948. It is adopted for the reasons monitoring the protection and standard of human rights as were established in thirty articles that later set the primary foundation to the policies and standard that carried out by NGOs and other agencies with the purpose to protect and promote fundamental rights (www.amnesty.org). The Social Accountability International (SAI), established in 1977, is an organization that for promotes human rights for workers around the world. Its SA8000 standards are obtained from the Universal Declaration of Human Rights and the International Labour Organisation (ILO) convention. The standards are designed to make workplace more humane and also to offer more benefits for the companies and its employees. Employees that work under SA8000 standards they have profit from the enhanced opportunity of collective bargaining and to organize trade unions. Also, employees become more educated about their rights which in turn, commits to have assurance for a better work environment. The companies as whole, benefits from the SA8000 guidelines because it strengthens and put company values into action and enhances the company reputation (Krage, 2007). The International Labour Organization Declaration (ILO) on the Fundamental Principles at work were adopted in 1998 and was an expression of commitment by governments, employers and workers organizations to uphold basic human rights (Kolk et al 2001).The Declaration covers four areas; liberty of the trade union and the right to collective bargaining, elimination of forced and compulsory work, Abolition of child employee and elimination of discrimination of human rights. The Voluntary Principles on Security and Human Rights were developed by governments of the U.S. UK, Norway, Netherlands and NGOs, who all were have the common interest in human rights and corporate social responsibility (voluntaryprinciple.org). There were six principles that all participants agents agreed on in order to promote and protect human rights in multinational companies. The six Voluntary Principle as stated on their website are as follows: acknowledge that security is a fundamental need; Understanding that governments have the primary responsibility to promote and protect human rights; Particularly those set forth in the Universal Declaration of Human rights; Emphasizing the importance of safeguarding the integrity of company personnel and property; Taking note of the effect of those companies, activities and decisions affect the local community; Understanding that useful, credible information is a major component of security and human rights. The Global Reporting Initiative (GRI) is multi-stakeholder governed institution that provides global standards for the promotion of sustainable development. Judy Henderson, immediate past-Chair, Board of Directors says The GRI is a unique, multi-stakeholder organization founded on the conviction consistent, regular and comparable reporting, provides transparency and can be a powerful catalyst to improve performance (globalreporting.org). There are nearly 1000 organization in over 60 countries that have established their involvement with the GRI reporting framework. This reporting framework guides corporations and organizations on the reporting their sustainability performance to promote company progression and improvement in all area of business. The reporting guidelines contain principles, guidance, and standard disclosures that formulate a structure that cooperating organizations can voluntarily adopt (www.globalreporting.org). The UNs Global Compact is a purely voluntary guide to promoting responsible corporate citizenship. Its two main objectives are: to mainstream its ten (10) principles in business activities around the world and initiate actions to support United Nations goals (www.unglobalcompact.org) 2.1.5 Adoption of Voluntary Labour Standards (Codes of Conduct) by Multinational Companies and their Impact The rapid diffusion of labour standards (codes of conduct) stems from the response to external pressures (actual or threatened) from media, activists, government, and consumers (Shaw, 1999). In a like manner, (H
Subscribe to:
Posts (Atom)