Wednesday, 8 November 2017

Wild West Goes East

Battle, K. (2014). World Bank Issues: The policy imposed on Russia. In Covell, K., & Howe,
R.B. (Eds), A question of commitment: People’s rights in the World (pp. 21-44). Waterloo, ON: Wilfrid Laurier University Press.

Ken Battle explains that the World Bank has developed a free-market strategy and wants it to be applied everywhere, regardless of the nature of the problems.  The World Bank workers in Europe and Washington are responsible for handling the task of reconstructing the Former Soviet Union (FSU). The author further outlines some fundamental assumptions supporting the belief that all societies should support the World Bank even when its policies are not up to the mark. A large number of consultants coming from the West to reform the FSU have no experience of working outside their cities. Battle laments that the government has scaled back this program in favor of the Universal Child Care Benefit (UCCB). However, he could make the work stronger and better by conducting a few surveys. The author does offer valuable sources to prove his points and helps other analyze the financial reality and the scope of the World Bank in the United States of America. Despite an abundance of experiences about what type of policies the World Bank introduces, Ken sees lots of new projects that may fail in coming months.

English Annotation

Ehrenreich, B. (2016). Nickel and dimed: On (not) getting by in America. New York: Henry Holt and Company.
Here, Ehrenreich tries to ascertain whether it is possible for a person to live on a minimum-wage in the United States and Canada or not. The author beautifully reflects and summarizes her work, her financial problems, and her relationship with the workers of the World Bank. She is familiar with the limitations of her work and the ethical implications of her research tactics and has talked about the similar problems in the text. Ehrenreich also compares the current and previous waves of globalization.

The focus of her research is the impacts of economic integration on developed countries.  A few years ago, the International Monetary Fund (IMF) and the World Bank endorsed a framework to achieve sustainable results. It placed requirements that countries receiving debt relief and concessional lending will adopt specific poverty reduction strategies and will have to fund both local and international projects. The author supplements her experience with scholarly research and highlights the rising costs of living in the developed countries, including the United States of America and Canada.

An Overview of Essential Elements of a Pharmacy Technician’s Life

A pharmacy technician ensures medications are filled accurately in a specific window of time. Unlike nurses and pharmacists, a pharmacy technician mostly assists in mixing, measuring, labeling and counting dosages of medicines. He is not responsible for advising patients how much dosage they need and what are the side effects of a particular drug (Bower, 2015).
One of the most complicated and challenging aspects is maintaining knowledge of all existing and new medications. A pharmacy technician has to deal with a variety of clients every day, so he needs to know everything about the local and international medicines (Snyder, 2014).
He should be extra diligent while performing his duties as serious health problems will arise if mistakes are made with a patient’s prescription. A pharmacy technician typically works at a drug store, but there are various opportunities for experienced and hard-working individuals (Dixon, Scheidegger, and McWhirter, 2016). He can serve in private clinics and hospitals where he will be able to prepare a great variety of medications in collaboration with other healthcare professionals (Bower, 2015).
It’s important for pharmacy technicians to have exceptional customer service skills so they can confidently support their seniors and juniors (Snyder, 2014). Moreover, a pharmacy technician should be able to count medications, interpret prescriptions and work with a range of patients, ensuring that their requirements are fulfilled in a better way. He must demonstrate extraordinary organizational and communication skills and should be detail oriented to perform his tasks properly (Dixon, Scheidegger, and McWhirter, 2016).
Keeping in mind the ample demand for healthcare professionals, a pharmacy technician can acquire knowledge in diverse healthcare industries and should be willing to take the feedback seriously (Bower, 2015). There is a great amount of growth in the health industry, so pharmacy technicians must be ready to accept challenges when it comes to looking after the patients (Dixon, Scheidegger, and McWhirter, 2016).

References

Bower, H. (2015). The gender identity disorder in the DSM-IV classification: A critical
evaluation. Australian and New Zealand Journal of Psychiatry, 35, 1-8. doi:10.1046/j.1440-1614.2001.00859.x
Snyder, C. R. (Ed.). (2014). Coping: The psychology of what works. New York, NY: Oxford
University Press.
Dixon, A. L., Scheidegger, C., & McWhirter, J. J. (2016). The adolescent mattering experience:

Gender variations in perceived mattering, anxiety, and depression. Journal of Counseling and Development, 87, 302-310

Monday, 2 January 2017

Impact of Security Approach, Policy Awareness, and Top Management Involvement on Information Security Compliance in Universities: A Case of Pakistan

Introduction

These days, information security has become the most preferred choice of almost every country for upgrading its economy. It is also helpful for it to becoming competitive in the global markets. Not only in the developed states like the US, the UK, and Australia, but also the under-developed countries like India and Pakistan have enhanced the productivity to a greater extent with the continuous involvement of security management and information technology. Nowadays, it has become significant for organizations and education institutions to receive, distribute, and store the information in a better way. This is only possible when we develop better understanding and utilize the best ways of security. It would not be wrong to say that the world’s economy has moved from low-value basic industries to a fast paced high-value information based economy. Now the institutions with readily available information foundations are given high preference and are considered to be successful. Thus, we can say that the reliability of an organization is purely dependent on how well-structured and reliable its information and security system is. With the passage of time, information security has brought drastic changes in the landscape of the world of IT. Students of all subjects want to seek admission to universities that provide them with both high-quality education and complete feel of being secured.
The modern era is a diversified combination of information society which has become the most defining feature of our 21st century. Nowadays, the organizations need to receive, distribute and store the information for better understanding and utilization. It has become an important asset for organizations. The institutions with workable and sound information foundations are considered to be highly reliable. Thus, the reliance and resilience of an organization depends on a well-managed and stacked information structures, accordingly a good information security management system should be in place to protect all important information of an organization and to avoid threats and risks of information being damaged or hacked (Martijn and Groenleer, 2009).
The prime educational institutions like universities, because of having large and complex structures, need to rely heavily on information to achieve their objectives globally. Almost all the activities of universities like research undertaking, teaching and learning are dependent on accurate and latest information. The operational and strategic controls also demand high quality information system based on latest technology and a good structure. Thus, the universities adopt a good comprehensive information system to leave their mark in this competitive environment (Veiga & Eloff, 2007)
The practical execution towards information security is also dependent on analytical crafting of a good comprehensive strategy. It needs to be supportive of organizational culture, level of engagement of senior management, their approach towards organizational security management and the level of awareness created in organization for information security needs and its benefits (Tipton & Krause, 2009).
It is of paramount importance to understand the current status of information security before moving forward. According to Von Solms (2000), information security has passed three stages of evolution: the first is the technical stage which started in early 80s when the information security used to be done technically. But the need of more management involvement was realized in this stage, thus, the second stage started which is called the management stage. In this stage, there was increased involvement of management in information security management. However, soon it was further realized that information security needs to be more effective in a way that the standards should be set and the security should be compared against those standards. Thus, the third stage of information security started which is called institutional stage. It involves adoption of international standards, codes, ethics and continuous measurement of information security against those standards. However, beyond technology and these waves of information security, the management and governance is its most important facet (Gordon and Loeb 2006).  
Whitson (2003) says that information security must ensure the integrity and secrecy. Besides this, it should also be readily available. This is what Central Intelligence Agency (CIA) model says. This model was considered to be the most important model of security but now it does not meet the requirements of modern world. It is too simple and includes only the basic elements while ignores some key facets of information security like responsibility and accountability. It is because the CIA model was developed in the age of computing while the environment of IT has now changed significantly. Whitson (2003) says that information security is achievable with the help of tactics like analysis of risk, use of security policies, providing awareness and training to employees, documentation and preparing for recovery from any damage or disaster. Anderson (2001) says that effective information security management is possible with the help of significant involvement of stakeholders and exercising the relevant security standards.
Past two decades have seen a significant development in security management which has broadened the scope and framework of information security. A proper security management system should comprehensively recognize what is being implemented, what are the deficiencies and what needs to be done to remove deficiencies and improve processes (Martins and Eloff, 2001). Unfortunately if the management is not involved in information security then there could be a drastic problem of many controls or not a single control for monitoring in this area.
The measurement of information security management is very necessary but difficult to undertake. Because it will also be helpful to determine whether the business goals are aligned with the security management system in place. However, the measurement of information security and the relevant benefits attached to it are difficult to judge; this is why the management is usually reluctant to implement it (Kankanhalli, Teo, Tan and wei, 2003). It needs meeting of the standards, risk assessment and evaluation of internal control systems. Some of the researchers are of the view that information security can be managed effectively only under some international certification. They are also of the view that for effective implementation of information security, the recognized standards of security should be followed. It is because these standards provide the direction to an organization for development of operative strategies (May, 2003).
Although information security management is very vital but unfortunately it is not given due importance in universities. In addition to it there are always problems in implementation and the impact of such security management practices on work is often not measured. There is need to have a proper coordinated approach as to adoption and implementation of information security management in this competitive and globalized environment is concerned. There is also very limited academic literature on the selected topic for this study (Bojanc & Borka, 2013). Therefore, the current research will highlight the importance of information security compliance at universities and will also suggest how it could be improved. It will take into account the impact level of awareness, security approach, security policy and top management engagement in information security compliance.
Research Objectives
The objectives of this research have been divided into the followings:
·         To investigate the impact of information security compliance at Universities of Pakistan
·         To identify the issues, universities are facing in compliance of information security management
·         To suggest ways in order to have better compliance in place for information security management
Research Significance
There is a significant importance of this study because to the best of researcher’s knowledge, it is the first study to be conducted on information security management of universities of Pakistan. It will study the existing situation of information security management in universities, will identify the issues in it and will also suggest the ways to improve it. With the help of this study, the universities of Pakistan will be able to improve their information security and will identify the role of everyone in maintaining their important aspect for their proper working.
The framework to be set for universities will also be able to use at other organizations whether large or small to manage their information security programs. Another contribution of this study will be its addition to literature on the topic of security management as stated earlier it will be the first study to investigate information security compliance at universities of Pakistan.

Methodology

Research design

There is a range of methodologies both qualitative and quantitative available for conducting research.  A qualitative research is one which provides rich data helpful for exploring a particular phenomenon and to make an in-depth analysis of the phenomenon being investigated. The techniques commonly used in qualitative researches are interviews, focus groups, observations, postcards etc. on the other hand, quantitative methods are helpful to arrive at more generalized results. They also provide detailed study of a particular behavior. The techniques commonly used to conduct quantitative research include surveys, observations and secondary data (Bryman and Bell, 2007).

This research will use a mixture of both qualitative and quantitative methodologies to investigate the information security compliance status at universities of Pakistan. In this regard, the use of qualitative techniques will be made to make an understanding of the issue under investigation while quantitative techniques will be used to evaluate the actual information security status at selected universities of Pakistan so that recommendations could be made on the basis of results obtained from this technique. This will be done as per the recommendations of Mason (2002), Ritchie and Lewis (2003) and O’Leary (2004). With the help of qualitative techniques, this research will investigate for the issues in the existing security status in universities and to suggest improvements in it. On the other hand quantitative methodology will help to make objective measurement of the phenomenon under study. Also, the results of quantitative research are more helpful to be generalized across groups (Bryman and Bell, 2007).

The rationale of using this methodology is that it covers both qualitative and quantitative aspects. It is also widely used by the researchers for carrying out research in information security management. The questionnaire to be used in current research has also been used in prior researches and has been confirmed to be valid. Thus, the current research has also adopted the same methodology.

Limitations

This research will also carry few limitations as for instance it will investigate the information security compliance of universities at a single point of time. It may be improved later-on due to technologically enhanced management or change in technology etc., so, the research is valid only for the time period in which it will be conducted. Furthermore, it includes only 8 to10 universities of Pakistan and that too only private sector; so, the results of study may differ when the research is conducted for all universities of Pakistan. The results of study will be concluded on the basis of response from higher management of universities and will not take into account the views of students who usually have closer links to hack information from information security practitioners.
Data Collection and Sample Size

The data will be collected from higher management of universities including Vice Chancellors as well as registrars of universities using a structured questionnaire. This questionnaire will be adopted from the researches of O’Leary (2004) and Lane (2007). So, the instrument will confirm the validity and reliability being already used in research.

The sample size will be 8 to 10 private sector universities of Pakistan and 5 persons from each university will be interviewed through questionnaire. The rationale behind using only private universities is that the security measures at both public and private sector universities may differ significantly which cannot be comprehensively covered in a single research. The sampling technique to be used for this purpose is simple random sampling so that unbiased results could be obtained. Also, the same type of methodology has been recommended by Lane (2007) for conducting information security management study in universities.

Analysis Technique

Data will be analyzed using Statistical Package for Social Sciences (SPSS 20) and a spread sheet program. The techniques of analyses include multiple regression and correlation as well as descriptive statistics and graphs. This is so because these techniques have already been used in similar researches of O’Leary (2004) and Lane (2007). Other reasons include: the regression and correlation techniques are used to study the relationship and impact of dependent and independent variables whereas graph and descriptive techniques are used to better visualize the response of sample selected (Bryman and Bell, 2007). On the other hand, qualitative data will only be discussed theoretically to describe the information security practices in universities at other parts of the world.

Ethical Issues

This research undoubtedly requires the fulfillment of ethical standards to highest level as it is going to probe and investigate the security compliance of universities basing upon their security approach, security awareness, top management involvement and security policies of universities for information security management being rendered by the government. This research will not disclose any information which will make it possible to recognize the university in which the study will be conducted or the names of participants who were interviewed to take information. Any other sensitive information relating to them will also not be brought to public.

Timeline
                Task
       Day/Month/Year
             Duration
Commencement of Project (Introduction)
   
        01 October 2016

              10 Days
Literature Research & Review

        12 October 2016

              10 Days)
Collection of Relevant Data

       22 October 2016

    Three Weeks (21 Days)
Analysis
       11 November 2016
     Two Weeks (14 Days)
Writing/Drafting and  Editing.
      
       25 November 2016
         
     Three Week (21 Days)
Conclusion/Revision
Discussion with Managers

      15 December 2016

                10 Days
Submission of project
      25 December 2016
                    -



Conclusion
The aim of this research is to analyze the current information security management status of selected private universities of Pakistan and to suggest ways for improvements. This proposal has provided a brief overview of the objectives of this study and has proposed a methodology to carry it out from the previous literature on the topic. This investigative research shall abreast us with the level of compliance towards information security in universities of Pakistan. The results of this research will be very useful for each university of Pakistan whether in private or public sector to evaluate their security management techniques and to get guidance for further improvements. Thus, the current study will be very beneficial to catch the importance of an ignored area of research in Pakistan.


                                                Reference List
Anderson. P.W, 2001, Information security Governance, Information Security Technical report, vol. 6, No. 3, pp. 60-70
Bojanc, R. & Borka, J. 2013. A Quantitative Model for Information-Security Risk Management. Rolla: American Society for Engineering Management.
Bryman A. and Bell. E, 2007, Business Research Methods, Oxford, Oxford University Press.
Gordon A. L. and Loeb P. M (2006). Managing cybersecurity resources: A costbenefit analysis, McGraw Hill.
Kakanhalli. A, Teo. H, Tan. B and Wei. K, 2003, An integrative study of Information Sysytem security Effectiveness, International Journal of Information management, No. 23, pp. 139-154
Lane, T. and May. L, 2004, Information Security Management in Australian Universities, 5th Asia PacificIndustrial engineering and management Systems Conference, pp. 36
Lane. T, 2007, Information Security Management in Australian Universities – An exploratory Analysis, Masters Thesis
Martijn L.P. Groenleer (2009). Decisionmaking, MoT1450, Faculty of Technology, Policy and Management, Delft University of Technology.
Martin A and Eloff J, 2001, paper presented at 1st workshop on information security systems rating and ranking.
Mason. J, 2002, Qualitative Researching, Sage Publication, London.
May. C, 2003, Dynamic Corporate Culture lies at the heart of effective security strategy, Computer fraud and security, issue 5, pp. 10-13
O’Leary Z, 2004, The essential guide to doing research, sage Publication, London
Ritchie J and Lewis J, 2003, Qualitative research practices, Sage Publications. London.
Tipton, H. & Krause, M. 2009, Information Security Management Handbook. Broken Sound Parkway: Auerbach Publications.
Veiga, A. & Eloff, J. 2007. An Information Security Governance Framework. Bristol: Taylor & Francis, Inc.
Von Solms. B, 2000, Information Security – The Third Wave, Computers and Security, Vol. 19, No. 7, pp. 615-620

Whitson. G, 2003, Computer Seurity, theory process and management, The Journal of Computing , Vol. 18, No.6, pp.57-66