Monday, May 25, 2020

Gender Separation in Public Restrooms - 1233 Words

For most of the general population, the decision of which restroom to use when in public is really not much of a decision at all. No thought needs to be put into it, people just choose one and go. For a transgender person deciding upon which restroom to use can be an agonizing decision to make, one that can lead to severe anxiety. Most businesses and schools have very clearly defined â€Å"men’s† and â€Å"women’s† restrooms. Within the transgender community, it is not that black and white. A transgender person is defined as somebody whose gender identity is different than the sex they were assigned with at birth (â€Å"New Law†). In simpler terms, it is a person who identifies as the opposite sex. This makes choosing which restroom to use when in†¦show more content†¦Some people think that it should remain as such. Although this may be a sound argument, it lacks any real substance. Men and women have lived together since the beginning of time and to say that each doesn’t know what the other does in the restroom is absurd. Another issue some people have is that bathrooms are often used for socializing, hence why women frequently use the restroom together. Many people are concerned that integrating restrooms could cause the loss of the same-sex socialization. However, there is no reason that there can’t still be socializing in a mixed-gender bathroom. Lack of privacy is yet another concern of people opposed to gender-neutral restrooms. Moreover, a lack of gendered privacy seems to be the concern. Many people already have a level of discomfort when using a public restroom. For women, it tends to lean towards the lack of femininity that is associated with the elimination of body waste. Expelling excrement has long been viewed as taboo and something that girls just don’t do. Many women find issue with being able to use the facilities when only women are in there. Therefore the thought of having to do it with men in the same room can be a very uncomfortable idea. However, the reality is people on a subconscious level know what goes on in the bathroom. Men know that women do the same things that they do. While it is something that is seldom discussed, everyone knows what theShow MoreRelatedGen 205 Fall 2015 Final Exam Essay Questions1422 Words   |  6 Pagesfor your final paper? I do not understand. What perspective? Question 2 Identify 3 cultural symbols of gender privilege and describe how interactional and structural levels of society reinforce this gender privilege. How is this privilege shaped by intersectionality? Gender Binary Hegemonic masculinity Intersectionality The interactional and structural levels of society reinforce this gender privilege is mentioned in Messner’s article. The author explains how the â€Å"barbie† and the â€Å"seamonster†Read MoreThe Transgender Issue Societal Gender Constructs Essay2227 Words   |  9 PagesThe Transgender Issue Societal Gender Constructs Recently, courtrooms have been filling up with the issue of transgender rights and the need for protection of these people’s basic rights that everyone else has (Scherer 32). The most pressing, or popular issue, within this battle, seems to be which public bathrooms should be used by transgender individuals. On the one hand, conservatives believe that everyone should go to the bathroom specified for the gender they were born with, claiming thatRead MoreInformative Speech About Transgender1407 Words   |  6 Pagesclichà © sexual orientation standards. They might be gay, transsexual, transvestite, or sex eccentric. Since the get-go and the presence of humanity, transgender have been particularly a piece of the general public. It is quite recently that they have been given a name and a status in the general public as of late, and now there is even medicinal innovation accessible particularly for them. The procedure is at least somewhat all inclusive: an infant is conceived; a specialist, parent, or birth chaperonRead MoreThe As Rites Of Passage Coordinates891 Words   |  4 PagesTrans, as Rites-of-Passage Coordinates Gender transition makes for a provocative quilting point. It shapes various Western social conventions regarding binary-gender identities into an intelligible and recognizable rite-of-passage. Originally theorized by anthropologist Arnold Van Gennep (date), rites-of-passage configure social status-changes into a visible tripartite process denoted by a starting point of separation, followed by a transitional (or liminal) stage, and concluding with a reinstallationRead MoreGender Transition Is An Intelligible And Recognizable Rite Of Passage794 Words   |  4 Pages Gender transition makes for a provocative quilting point as it shapes Western social conventions regarding binary-gender identities into an intelligible and recognizable rite-of-passage. Originally theorized by anthropologist Arnold Van Gennep (date), rites-of-passage configure social status-changes into a visible tripartite process denoted by a starting point of separation, followed by a transitional (or limina l) stage, and concluding with a reinstallation back into society under the new stationRead MoreThe American National Government Is A Influential Political System1622 Words   |  7 Pagesframework for the federal government. It also functions as a contract between the national government and the states that created it.† (Fine Levin-Waldman, 2016) The Founders of the American political system created three branches of government. The separation of power is divided among the executive, legislature, and judicial branch. One strength of the U.S. Constitution can be found in the Fourteenth Amendment section one that states, â€Å"All persons born or naturalized in the United States, and subjectRead MoreNon Fictional Characters From The Movie The Great Debaters 1316 Words   |  6 PagesFor Instance, could anyone be shamed or turn down by a certain racial group at the same time. America has felt the urge to teach young children and adults not the need for positive human relati ons, but the primary source should focus on how race, gender, labor and political social problems. It’s clear to understanding what it meant to be separated but not equal, not by default. For Example, sixty years ago African Americans were recognized by decline image for the world, a continued issue for decadesRead MoreHomosexuality As A Mental Disorder Essay1550 Words   |  7 Pagesneighborhoods have helped unite members of the community, it has also induced a sense of isolation from society. The welcoming environment of gayborhoods prevent sexual minorities from venturing to foreign settings that are not as accepting of LGBTs. Public spaces are known to contain homophobes that express their intolerance for sexual minorities through both physical and verbal abuse. In July of 2016, a gay man from the Bronx was attacked while he was walking home from work. Marquis Devereaux, whoRead MoreThe Life Of Charles Dickens A Christmas Carol1062 Words   |  5 Pagesperiods(Fiske). The future was bright for those looking to take advantage of new opportunities in skilled labor, but life was worse for those at the bottom(Picard, The rise of). New inventions such as; the iron cooking range , sun pictures, and public restrooms arose. The cotton, coal, trade, and ship-building industries were booming. Aside from shaping the historical reality of the time, Dickens represented narrative pathways, perspectival frames, and models of behavior that guided his modern societyRead MoreAffirmative Action And The Civil Rights Act2055 Words   |  9 Pagesregard to race, religion, and national origin. The law was intended for all groups to have an equal opportunity for employment and higher education, and it required that affirmative action be taken to ensure certain groups were employed or admitted. Gender was later added to the list of factors that could not be used to discriminate against a person. Affirmative Action was needed in America at the time because of the countr y’s history of discrimination against certain groups, particularly African Americans

Friday, May 15, 2020

Informed Citizenry - Free Essay Example

Sample details Pages: 3 Words: 972 Downloads: 3 Date added: 2017/09/20 Category Business Essay Type Analytical essay Tags: Discussion Essay Information Essay Did you like this example? â€Å"An informed citizenry will benefit from applying both creative thinking and critical thinking in solving the challenges of our society. † The definition of an informed citizen is having sufficient and sufficiently reliable information or knowledge to be able to understand a subject or situation and make appropriate judgments or decisions regarding it. If I had to have a personal definition on an informed citizen I would say that it means involving ourselves with the overall knowledge of politics to the point that we can exercise our views and opinions in a responsible way. The definition for creative is using or showing use of the imagination to create new ideas or things. The definition for critical thinking is disciplined intellectual criticism that combines research, knowledge of historical context, and balanced judgment. To really evaluate those words should be the first approach to changing yourself. I say that because if a person did not possess any of t hose qualities, then they should because the opportunities that those two words contain are limitless. When the topic of politics comes up in a discussion, it is almost like having a discussion about religion. What I mean by that is whenever a discussion on religion or politics comes up; people get into these deep discussions about what’s right and what’s wrong. No matter how close you are to your friends or family, this discussion usually draws opinions out into the open that cause conflict. In general I would say that this is a normal outcome because as human beings it is natural to have opinions and it’s our right to express them freely. Just because we have the right to express our opinion, does that mean that we should express it? Being an informed citizen should be the first thing to do when getting into a discussion about politics. I know that many people have heard the saying â€Å"knowledge is power†, well the fact of the matter is, thatâ⠂¬â„¢s true. Education is just the basics of becoming an informed citizen. You have to be able to absorb everything around you about everything and be able to tie it into one summary efficiently. You can tell the difference between a random somebody and an informed citizen expressing their opinions. Could you imagine what the world would be like if more than half of the population was considered informed citizens. Well if you think that is crazy, let’s take it up a notch and imagine if all the informed citizens used critical and creative thinking towards solving challenges in our society. The opportunities will always be limitless, when it comes to informed citizenry. Politics have like an unspoken code that really requires a lot in order to be listened to. Education is a key factor when it comes too really to having an opportunity to be heard. I personally feel that the government is well aware of the fact that most people are not informed citizens. Also I feel they kn ow that we will always have our own opinion, but the government knows that people will not do nothing about it because people don’t know how to. There are many challenges in society that honestly do need attention, but it seems like it’s the same story over and over; war first! To a lot of people, politics are a boring subject. Why do we think this is boring when it constantly affects us everyday in everything that we do? Well I guess that is because the government is good at playing the background and letting us think that things are they way they are and will not change. For example, I personally have not seen more people mad at the government and ready to give them a piece of their mind since the whole gas crisis. If we, as Americans, took more care in ourselves and considered ourselves to be informed citizens and critical and creative thinkers, we would be in a way better position. When it comes to creative and critical thinking it goes far beyond the government and politics. There are also other topics that affect us that the government has their hands in. For example education is a very big challenge that we face on a day to day basis in America. It is simple to see that there are some cities that are not providing sufficient education for our youth. How unfair we all see this to be, but what can we say we have done. That is where critical thinking comes into play. I mean that is only if you want to have a helping hand in changing your own future. One thing I will admit is I have totally missed out on a lot of opportunities because I bit my tongue. Until today I never heard of informed citizenry and I wonder how many other people out there don’t know what that is. Not knowing something is a big disadvantage with this society. They preach very hard about education and how everybody would go to school and make something of themselves. What people don’t know is that there is more too it than just an education, its about learning everything not just a trade. I had to do a great amount of research to get a good understanding on what it means to be an informed citizen. The definition for creative is using or showing use of the imagination to create new ideas or things. The definition for critical thinking is disciplined intellectual criticism that combines research, knowledge of historical context, and balanced judgment. To really evaluate those words should be the first approach to changing yourself. I say that because if a person did not possess any of those qualities, then they should because the opportunities that those two words contain are limitless. Don’t waste time! Our writers will create an original "Informed Citizenry" essay for you Create order

Wednesday, May 6, 2020

A Comparison of Two Film Adaptations of Hamlet Essay

I was raped, the girl said to me overtaken with tears. I was taken by surprise and was at a complete loss for words. She had just taken one of the darkest secrets of her life and brought it out to the splendid light for just me to gaze upon. A little apprehensive, I responded, Im sorry. What is one to say at the revelation of such a horrid thing? Anything else I thought of saying sounded stupid and insensitive, so I opted for silence and hugged her to comfort her to the best of my ability. A few months later the girl came to me and thanked me. She said that my gesture meant more to her than anything anyone else had said about the rape. I then realized that sometimes, if not most of the time, actions can speak louder than words. The†¦show more content†¦The first scene gives a little comic relief when the guards become confused after seeing the ghost. When the camera enters the looming castle a celebration is being had and is abruptly interrupted by the mysterious Hamlet. Th e real life of the play starts to be seen upon Hamlets entrance; Hamlets costume and character are very bold and start to add to the impact of the setting, costume, and gestures throughout the film. Roger Ebert thinks alike: The camera watches and then pans to the right, to reveal the solitary figure of Hamlet, clad in black. It always creates a little shock in the movies when the foreground is unexpectedly occupied. We realize the subject of the scene is not the wedding, but Hamlets experience of it. Branaghs film is very powerful and hard-hitting, the vivid and colorful scene in the palace is a good example of this. Emotion and feeling is easily expressed by the extraordinary acting and is very evident in the scene where Ophelia, played by Kate Winslet, returns Hamlets, played by Kenneth Branagh, love letters. When he and Ophelia talk they show great passion and love and Hamlets face shows evidence of it very clearly. But when Ophelia hands Hamlet back his letters his face goes hard as stone and he lashes out at Ophelia for her cruelty. His words are sharp but lose most of their effect if not played correctly. The emotion needed to display this scene is brought to the screen as Branagh screams at Ophelia as heShow MoreRelatedReview Of Waiting For Godot, Hamlet, And Moulin Rouge903 Words   |  4 Pagesand orchestral scores can add to the experience of a theatrical play, but films have adapted these aspects as well and have proven to be a more successful form of entertainment. Theatre productions have become secondhand in comparison, though still viewed as a high class of an entertainment, it is not nearly as successful to reaching a widespread audience as the film industry has accomplished. The resulting film adaptations that have theatre-like qualities often fail completely due to their inabilityRead MoreHamlet Film Adaption Vs. Play Comparison1216 Words   |  5 PagesHamlet Film Adaption vs. Play Comparison Shakespeare’s Hamlet has countlessly been formatted into film depictions of the play. Each film seemed to be on one end of the spectrum of either being closely interpreted or completely remodeled a different idea of what Hamlet is. The film version of Hamlet released in 2000 seems to follow closely to the play in some aspects, yet at the same time having its own unique identity Despite there being many differences with the play Hamlet and the film adaptationRead MoreChristian Beliefs Of Shakespeare s The Movie Of The Play 956 Words   |  4 Pagesdevelop the film, Almereyda incorporated more modern traits in the film, such as technology and color. There is not much of the religious influence as was seen in the play. Religion played a major role in the development of the play and seeing that it is completely left out of the movie is significant. The essential complexity of this play was formed on the relationship of Christian beliefs of morality competing with the classic principles of revenge tragedy. The inner turmoil that Hamlet was experiencingRead MoreHamlet Film Vs Film Essay1737 Words   |  7 Pagesproductions of Shakespeare’s Hamlet, some of which remain true to the text while others take greater liberties with the original format. Director Kenneth Branagh’s 1996 production of Hamlet was true to Shakespeare’s work in that the film’s dialogue was delivered word or word as it is presented in the text. In contrast, Franco Zeffirelli conducted his 1990 production of Hamlet in a much more liberal direction in which lines, scenes and characters were omitted from the film. I argue that from the perspectiveRead MoreThe Adaptation of Books and Short Stories Into Films2345 Words   |  9 PagesWhen discussing the adaptation of books and short stories into film, one must begin with the understanding that adaptation can refer to two related yet distinct phenomena. The most common definition of adaptation connotes a kind of translation, wherein a filmmakers attempts to recreate a story more or less faithfully by translating the essential elements of the original text into a new medium. A less frequently discussed definition for adaptation refers to a kind of evolutionary response, whereinRead More1. Throughout the play, the playwright Edward Albee made it so there is a clear showing of several800 Words   |  4 PagesGeorge, when he enters with the flowers in hand, or snapdragons, he is seen quoting a line of dialogue that comes from Williams play, the famous line Flores para los muertos, which means flowers for the dead. Now here is the explanation or the comparison that can be made here. We all know that, in the play Streetcar, this particular line is used to foreshadow Blanches death. Not her physical death though, more so, it is used to foreshadow her emotional and spiritual death. In Woolf, George is usingRead MoreSimilarities of The Lion King and Hamlet Essay1956 Words   |  8 PagesSimilarit ies of The Lion King and Hamlet In 1994, the critics hail an animated masterpiece, not only for its artwork and music, but also for the plotline: an evil uncle displaces the heir to the throne and sends him into exile. Years later, following both a prophecy and an encounter with the ghost of the old king, the heir is persuaded to return to his home, avenge his fathers death, and take his proper place as the ruler of the kingdom. At first glance, Disneys The Lion King has all the classicRead MoreEssay about Film Versions of Shakespeare Comedies2208 Words   |  9 PagesFilm Versions of Shakespeare Comedies Shakespearean plays are complex, intricate pieces of work in which a diverse range of interpretations and readings can be made. This is particularly true of his comedies, where the light-hearted humour is often offset by darker, more serious undertones. In adapting these comedies it is for the director – in the cinematic context – to decide how to interpret the play and which elements are privileged and which are suppressed. This variance in interpretationRead MoreAnalysis Of Shakespeare s The Tempest 2603 Words   |  11 Pages they think of plays like Romeo and Juliet, Macbeth or Hamlet. One of the most influential plays written by Shakespeare is not one listed above. The play that reflects the life and all of Shakespeare?s plays is The Tempest. This work was and still is influential in both America, Britain and around the world. Although William Shakespeare was an influential writer in American and British literature, The Tempest reaches beyond a comparison to the new world- America and points to an autobiographicalRead More The Use of Nature in Thomas Hardys Tess of the DUrbervilles5188 Words   |  21 PagesLastly, when winter sets in, withering the spirit of the poor deserted Tess, time, place and circumstances change and we are transported to the barren wasteland of Flintcomb-Ash. Thomas Hardy was born on 2nd June 1840 in Higher Bockhampton, a hamlet near to Dorchester in the county of Dorset. He was born five months after the marriage of his mother Jemima Hands to Thomas Hardy, a master mason. Prior to the marriage, Jemima had served as cook to her future husband. Hardy?s birthplace was a

Tuesday, May 5, 2020

Data Mining Applications For Risk Detection â€Myassignmenthelp.Com

Question: Discuss About The Data Mining Applications For Risk Detection? Answer: Introduction This report analyzes the IT risks that are prevalent in allowing employees to bring their own devices in the work place. The assessment analyzes the IT risk that Aztek will be exposed to by allowing their employees to bring their own devices such as laptops, tablets, and mobile devices to the workplace to be used as the main or the only devices in achieving task at the workplace. IT risk management is the process of applying methods and techniques of risk management to manage situations and scenario that exposes a business organization to undesirable outcomes. IT Risk management is considered as part of the broad enterprise risk management. This structuring, establishing, maintaining and continuous monitoring, repair and maintenance of information security management system helps to ensure the important data and the systems are secure and free from interference. Some of the common risks in IT include lack of proper documentation, poor communication in the organization, lack of proper coordination in the organization, risk of failure of the devices, lack of data security, third party risk management issues, risk of fraud and misconduct, risk of complacency by the employees, risk of crisis occurring in the organization, risk of misuse of devices and the risk conflicts between the employees and the organization (Olson Wu,2008). This report analyzes all the potential risk situations in the environment of Aztek. The paper analyzes the potential loss from this risk and helps to examine on whether or not the company should go ahead with the project. The paper also analyzes the project in respect to the Financial Service Sector which includes government and private institutions. This will help to provide important information to help in carrying out this task, the existing recommendation in this industry and the consequences and threats arising from the IT framework being used by the organization. Review of project in respect to the financial services sector The project of Aztek allowing employees to bring their own devices and use them at the workplace has many risks associated with it. Given that Aztek is a financial institution, it is clear that there are risks levels are high since the financial services industry is already at risk due to the probability of theft or fraud. Most financial institutions in Australia and globally, nowadays use mobile devices or tablets to provide services to clients. The use of these devices has been driven by the growth in the usage of internet and mobile technology by customers. This has resulted to change in behavior of consumers. Consumers nowadays are not interested in visiting financial institutions physically and they prefer getting the services they require from the comfort of their mobile device or other gadgets such as tablets or laptop (Moran, 2014). The need for fast and efficient services has resulted in increase in usage of technology in financial services industry. This has therefore broug ht about the need for most of the staff working in financial organizations to use these electronic devices while carrying out their tasks at the workplace. The risks that are most prevalent for Aztek allowing its employees to use their own devices to perform tasks in the organization include. The employees may tend to misuse social media. Social media sites are the bottom line of today`s mobile phone technological innovations. There are very many social media sites today and most of them are compatible with mobile phones and other devices such as laptops and tablets. Allowing employees to bring their own devices to the company for use in performing tasks related to the their job might result to employees misusing social media (Harkins, 2013). This may be through posting personal messages to customers and this may result to undesirable consequence for the company. The company has social media accounts which it uses to communicate regularly with its customers and which helps the company to get feedback from customers. Therefore allowing customers to use personal devices to carry out tasks related to the job may lead to customers using social media in appropriately and may end up ruining the companys relationship with customers. The employees may also engage customers unprof essionally by starting dating or any other casual inappropriate behavior. Allowing customers to use their personal devices at the workplace may lead to violation of regulatory requirements in the industry. The financial services industry has many regulations related to the transactions and relations with customers. The financial industry restricts the sharing of client information with other people and it may result to serious violations which may end up being so costly for the business. The use of personal devices by employees may result to the risk of violating the privacy regulations in the industry. The financial industry has strict regulations regarding the privacy of customers and therefore the risk of this project is too high. The financial industry regulators have put restriction on the handling of financial records regarding the handling of accounting information. The recording of cash transactions and other aspects of accounting that are sensitive in te operations of the business are sensitive and therefore the industry regulations have set basic rules and policies regarding the accounting information. Use of personal devices by employees of the in Aztek may result to increase in contradicting information being entered by different employees and thus making it difficult to account for the daily transactions at the company. The use of personal devices by employees at Aztek may also result to unauthorized employees getting access to confidential company information. This is because the use of these devices will make it easy for all employees to access passwords and other security to the IT system of the company (Hussain, 2010). Due to this access, the employees who are not allowed to assess particular information may get access to this information and thus resulting to loss of confidentiality within the organization. Some employees may tend to misuse the confidential information obtained and this may result to harm for the company. The confidential information obtained may also be traded to the competitors and used to intimidate Aztek. This may eventually give the competitors a competitive advantage and therefore ruin the market share of Aztek. Review of project in regard to current security posture of Aztek The use of personal devices by the employees of the company may result to violation of some company policies and procedures. The companys code of ethics has clear indications concerning the operations of the company and the conduct of employees at the workplace. By allowing employees to use their personal devices at the workplace, this would be in contradiction to the policy which indicates that only specific employees are allowed access to data and information concerning the company accounts and information on customers. Only senior company employees are allowed to assess the data on important customer information. Therefore by allowing all employees to use their personal devices to carry out tasks at the organization, it may result to the employees and the organization itself disregarding the ethics and policies of the company. The risk of violating the company policies may lead to lack of discipline among employees in regard to other matters in the company. The project by Aztek of allowing all employees to bring their personal devices for the use in carrying out company tasks results to the risk of losing important company data. By allowing employees to use their personal devices to carry out tasks related to the job,it may expose the company to unprecedented risk situation breach of security. The personal devices of employees may not be that secure and might be corrupted with many different viruses in form of software. Therefore, when these devices are allowed access to the companys databases and other software, it may destroy all the data available in the system. The backup data servers may also be destroyed and this leads to the loss of important information on customers and the company itself. This would cost the company directly and indirectly since information is very important in this financial services industry. The company may end up getting sued by various customers on the loss of their records by the company. The company woul d also lose important historical information which is used for decision making by the company. Loss of data on the company may bring about total failure of system used to store the data and this also costs the company a lot of money to reinstate these systems. The use of personal devices by employees may enable the employees to interfere with the databases of the company. This may result to loss of bulk data of the company and also loss of security on the accounting information systems used by the company. The other IT risk associated with the allowing employees to bring their own devices to the company for use in performing tasks is that it results to loss of productivity in the company. By employees using their own devices such as laptops and mobile phones may result to employees using a lot of the time at work on engaging in personal issues and activities using their devices. Particularly social media frenzy has become an issue at the workplace with many young employees who represent the largest proportion of the companys employees. A research conducted in Australia by Hillson, (2011) indicates that 73% of employees use almost every minute they find themselves free at the workplace on social media. Employees are always alert to check the responses and messages they get on social media and this distracts them from the target that the company is focusing on. It would be difficult for the supervisors to know whether an employee is using the device for their own communication or they ar e using the device for work purpose. The employees in the company may decide to take advantage of this project to spend time in social media and other forms of communication to chart with friends instead of them concentrating satisfying the needs of customers which is their main mandate. This therefore results to loss of a lot of man hours which would have otherwise have been used to serve clients and answer their questions as well as address their complaints. This therefore results to decrease in productivity of employees and therefore the company loses a lot of revenue due to this. The company also incurs a lot of expenses on paying employees who are not maximizing output. Assessment of risk based on threats, vulnerabilities and consequences derived from the IT Framework Hardware impact is another major risk that Aztek is exposed too in regard to the new project of allowing employees to carry their own devices for use in carrying out tasks related to the company operations. The devices owned by different employees vary in terms of hardware components. The devices that possibly could be used in the company include mobile phones, laptops and tablets. These devices hardware components are different from one another since they are from different manufacturers. This means that these devices are different in usage and some of them may be more difficult to use than the others. Some personal devices may also fail to perform complex task at the workplace and therefore making it difficult for some employees to perform their duties effectively (Sukel, 2016). Some of these personal devices may be more difficult to use than others and these differences may present a major challenge for the organization. The organization needs to train all the employees on how the y can use their personal devices to perform tasks at the organization. The risk of the hardware devices owned by the employees being incompatible with the software used by the company is very high. The software used by Aztek to record and store the financial information on customers and all the transactions with other business organization is very complex (Ghosh, 2012). This means that there is a very high possibility that the software fails to fit in with the hardware components of the employees and hence the devices may not be able to accomplish the objective that Aztek intended. The compatibility of the software and the hardware components is a very crucial aspect of in the IT project and therefore, in case any of the devices fails to run the software of the company, the employees will get inconvenienced or will be forced to buy another device. The risk of storage issues and future referencing of information is a major risk for Aztek project of allowing employees to bring their own devices for the use in performing tasks at the workplace. Some of the devices owned by the employees have very minimal storage spaces and may not be able to handle information related to the companies` operations (Koyuncugil Ozgulbas, 2011). This therefore means that the company may face issues on storing customer data and important transactions undertaken by the company. Aztek by adopting this project exposes itself to the risk of losing storage space and hence losing some important information which could be useful to the organization. Aztek may also be forced to buy extra storage devices to be used in the company. The project of allowing employees to use their own devices to carry out tasks related to the employees job description may result to the company losing intellectual property rights and company business secrets. This is because; the employees may get an opportunity to hack into the databases of the company which has very secretive and important information on the company. The employees may decide to reveal this information to a third party with bad faith. This information may be used to benefit other organizations in the same or other industries without the permit or the license from Aztek. The leakage of the trade secrets and the intellectual property rights may result to the competitors using this data and important information to benefit them. Aztek may on the process end up losing customers to the competitors and hence loss of revenue and decrease in profit margins of the company. The other IT risk that is associated with this project is that it may result to misstatement and omission in the financial statements. The accounting process is very critical in achieving correct information when preparing the final reports for an organization. If Aztek allows employees to use their personal devices in recording financial transactions, the employees may omit some of the information with hidden purpose motive. The employees may also record the wrong information intentionally and it may be difficult for the management to notice the misstatement and the omissions. This misstatement and omissions may be carried out to the final financial reports. This may result to the company incurring very high costs in internal audit of financial statements. It may also create a perception among clients and potential investors that the company is not transparent in its dealings and may be trying to exaggerate financial information for its own gain (Solozhent, 2009).The handling of the companys financial transactions by many employees in Aztek may result to the company being unable to track and verify information entered on its database. The other risk associated with the project of allowing employees to use their own devices to perform their own tasks at Aztek s that it would result to unsupport by management. The implementation of this project would result to a situation where the employees make decisions on their own accord possibly without consulting the management of the company. When the employees use their own devices, they may develop a sense of ownership of the company itself and may feel the need to exercise a lot of control in the company. This has the danger of employees making the wrong decisions that are not of interest to the company. Decision making of the company becomes decentralized and there is likely loss of control and coordination in the company. Apart from decision making that is unsupported by management, the project may bring about a situation where there is lack of communication within the organization. Giving orders and instructions to the junior staff by the supervisors becomes tiresome since the flow of information and communication becomes distorted. Communication between the company and customers as well as other corporate partners becomes very difficult since the employees may give conflicting responses to questions and comments made by the customers. When this happens therefore, customers lose confidence in the organization and they may decide to seek for the financial services elsewhere. Aztek may therefore start performing poorly financially and this has detrimental effect on all the stakeholders in the company. The implementation of the project on employees using their own devices to perform work related tasks may result to the risk of the business failing to achieve its objective. Aztek has clearly stated long term and short term goals. The goals are outlined in the companys strategic plan and the marketing plan. One of the objectives of the company this year is to expand customer base through a coordinated use of social media and other aggressive marketing techniques. For the company to achieve this, the social media communication efforts of the company have to be highly coordinated and organized in order to ensure that the company is able to transmit the desired message effectively. This therefore ensures that the company is able to communicate effectively with its customers. If all the employees are entrusted with the responsibility of communicating to customers may end up making the organization fail to achieve its objective. The loss of productivity by the companies` employees is also a major destruction for the company. Since the devices will destruct employees from focusing on their main objective and task in the company, it will affect the output of the whole organization and hence resulting to loss of income. The day to day operations of the company may also get distracted by the use of the personal devices in the company and this result to poor coordination and service delivery to clients. The company is also exposed to the risk of failure to incorporate IT policies and controls into the business. In order to implement the project successfully, the company needs to incorporate the IT policies and controls into the business framework of the company. This is important in ensuring that all the activities of the organization are well aligned to the information technology system that the company is using. This is important in helping to achieve the objective of efficiency within the business organization. failure to achieve this incorporation may result to disjointed effort and waste of IT resources without them achieving the purpose they were meant to achieve. Aztek is also exposed to the risk of storage, retention and forensic issues restricting the industry. The nature of the industry that Aztek is operating in makes it very important to have devices that are capable of strong large volumes of data safely(Ackermann, 2013). The devices should also have the capability of retaining data for a long time. Data retention is important since it is an important source of referencing or the company. A company can use the past data recorded by the system to solve disputes that may occur in future. Apart from exposing the company to the risk of losing important data through poor storage and data retention methods, this project also brings about the forensic issues in case of fraud. The financial services sector all over the world is associated with high level and sophisticated fraud. Therefore, in case fraud happens within the company, it is important to have in place an IT system that is able to support investigations on the crime. If Aztek allows all its employees to use their personal devices to perform tasks and functions related to their job, it would be difficult for forensics to be able to trace information and follow up the case to its very end. Since the individual employees have control of their own devices, they will most likely interfere with the evidence to conceal information which would have otherwise been crucial in the investigation. This therefore means that Aztek would expose itself to a very big risk of being defrauded by its own employees and failing to trace the criminals using reliable forensic investigation. In case fraud occurs, the company stands to lose a lot of money. Aztek would be exposed to the risk of inappropriate and inaccurate audit procedures. When the financial transactions are carried out using the personal devices of employees, it becomes difficult for the auditor to trace the original transactions and ascertain the information and records kept by the employees. This is made difficult by the fact that the employees personal devices are used for many other different purposes and it would not be professional and ethical to rely on the employees personal devices when auditing the companies` books of account. Therefore, it is risky for the company since it may rely on information that is of low confidence level and therefore may end up giving inaccurate report. It may also make it necessary for the company to put in place strong internal control measures and policies to ensure that the company complies with the standards and requirements when it comes to accounting for various items in the company. The new project by Aztek is exposed to the risk of not being viable for a long time. Sustaining the project for a long time while getting the desirable results may prove to be very difficult for the company (Bodie Taqqu, 2012). This is because; there are many issues that surround the use of personal devices at work. For example if an employee loses his/her device, it may be difficult for the employee to acquire a new one instantly and hence bringing about inconvenience at the workplace. The project is unsustainable also because of the need for very close supervision so as to ensure that the devices are being used for the right purpose at the workplace. Therefore, Aztek risks investing in the new IT system which may end up becoming unsustainable and not viable and hence may get discarded after just a short while. Conclusion Management of IT risks is very important for any business organization. This is because, it is a powerful tool to avoid the business getting into investments that are not viable or making loses due to things that could have been predicted and avoided. This paper analyzes the IT risks that the project by Aztek on allowing employees to use their own devices to perform work functions. The report analyzes the industry regulations and policies that may hinder the implementation and functioning of this system. Proper investigation and analysis is done to establish the potential risks that may come with the implementation of the project. From the analysis carried out in this essay, I would recommend that Aztek should not implement this project since its too risky for the company and may end up distracting the company from achieving its primary objective. References Ackermann, T. (2013). IT security risk management: Perceived IT security risks in the context of cloud computing. Wiesbaden: Springer Gabler. Bodie, Z., Taqqu, R. (2012). Risk less and prosper: Your guide to safer investing. Hoboken, N.J: Wiley. Cunningham, W. V. (2008). Youth at risk in Latin America and the Caribbean: Understanding the causes, realizing the potential. Washington, D.C: World Bank. Ghosh, A. (2012). Managing risks in commercial and retail banking. Singapore: John Wiley Sons. Gibson, D. (2015). Managing risk in information systems, second edition. Burlington, MA: Jones Bartlett Learning. Harkins, M. (2013). Managing risk and information security: Protect to enable. New York: Apress. Hillson, D. (2011). Managing risk in projects. (Managing risk in projects.) Farnham, Surrey [u.a.: Gower. Hussain, A. (2010). Managing operational risk in financial markets. Oxford: Butterworth-Heinemann. Koyuncugil, A. S., Ozgulbas, N. (2011). Surveillance technologies and early warning systems: Data mining applications for risk detection. Hershey, PA: Information Science Reference. Moran, A. (2014). Agile risk management. Sukel, K. (2016). The art of risk: The new science of courage, caution, and chance. Solozhent?s?ev, E. D. (2009). Scenario logic and probabilistic management of risk in business and engineering. New York: Springer. Olson, D. L., Wu, D. D. (2008). New frontiers in enterprise risk management. Berlin: Springer.