Thursday, February 27, 2020

EDIT FILE 4 (MICROFINANCE WOMEN'S EMPOWERMENT) Essay

EDIT FILE 4 (MICROFINANCE WOMEN'S EMPOWERMENT) - Essay Example ability to participate in the decisions that affect their lives at a personal level, which reflects the ‘power to’ that emerges from the concept of empowerment1. (Would it be fitting in the context of Saudi to include the collective level as well (I feel that it could be too big a stretch and ideological. What do you think?) b) women’s personal empowerment in both rural and urban areas in the kingdom. This concept of empowerment is an overarching theme that occurs on many levels: 1) In a general sense, whether women clients have become economically and socially empowered due to the support extended by the micro-finance organization. 2) More specifically, I plan to explore and assess the implications of having access to micro-finance on (control over resources, mobility, decision-making, bargaining power in the household) and socio-economic empowerment (self-confidence, self-esteem) of women clients. To highlight both the positive and negative aspects of micro-finance in the context of Saudi Arabia. A positive aspect, for example, would be for the women to become self-reliant or to have the ability to make major decisions about investments relating to their children’s future. Where as negative aspects could mean that the women would have to work longer hours or suffer an increase in domestic violence, etc. Examine how effective micro-finance can be in tackling the issue of high unemployment rates for women in Saudi. So to investigate whether micro-finance is one of the best solutions? If yes/no, then why? To study the characteristics of BRJ micro-finance beneficiaries by using their demographic and micro-finance profile (age, literacy, family size and type, occupation, loan size, enterprise, income, consumption, savings, etc.), and analyze how micro-finance services has impacted the well-being (investment in children education, health status, and nutritional intake) of the client’s family. This, I believe, is necessary in creating a case for

Tuesday, February 11, 2020

Information Security Essay Example | Topics and Well Written Essays - 2500 words

Information Security - Essay Example In addition, customers’ issues produce the need for companies to manage information security in a proper and effective manner. In this scenario, organizations integrate a task to look after customer and governmental proprietary data and details by guaranteeing observance with the laws and regulations. Thus, an organized collection of procedures, people and information technology (IT) structure that protects decisive systems and information, and secure them from inside as well as outside intimidations is known as information security management (ISM) (Sipior & Ward, 2008), (Northern Illinois University, 2007) and (Grimaila, 2004). Security Issue The basic issue which I have chosen for this SLP is about information hacking. In our daily lives we often see this kind of security breach. People around us with negative intentions steal someone’s personal information in an attempt to make illegal use of it. This personal information could encompass various sensitive things suc h as computer passwords, email passwords, social security number, credit card number and a lot of others. The basic purpose of information hacking is to create problems for others. It could be intentional or unintentional. For instance, a hacker can hack a person’s billing information along with secret password and afterward can make illegal use of this information. This security is also very critical for the organizations since organizations can face a variety of information hacking issues. In this scenario, information hacking could be very harmful for the organization. The fundamental principles should be pursued to deal with this issue are: (Sipior & Ward, 2008), (Northern Illinois University, 2007) and (Grimaila, 2004) Information fortification, support and revitalization: Organizational information security measures, comprising systems, computer units, and data along with documentation arrangement, recognized by this rule, should be implemented in such a way that practi cally lessens the danger of inside or outside violations to the safety, integrity and confidentiality of organizational information. In addition, the users of information are anticipated to protect such private information in conformity with permissible responsibilities and managerial guidelines and measures, comprising confidentiality and exposure contracts. They should comprise tactics prepared to re-establish such information to guarantee the persistence of the crucial operations for the organization (Sipior & Ward, 2008), (Northern Illinois University, 2007) and (Grimaila, 2004). Information Integrity: Information security protectors should use appropriate confirmation and corroboration actions with the intention that the information, utilized in the search of assessment and decision making, might be expected to be correct (Sipior & Ward, 2008), (Northern Illinois University, 2007) and (Grimaila, 2004). Information Secrecy and Leakage: The importance of information like an organ izational resource augments through its extensive and correct utilization on the other hand its