Wednesday, October 30, 2019

Skill of Narration Essay Example | Topics and Well Written Essays - 1500 words

Skill of Narration - Essay Example Plutarch's central argument is the possibility of anybody to rise above his circumstances by the exercise of his will and hard work. He gives a detailed portrait of Coriolanus. He explores Coriolanus' family background, culture, psychology, and morality. These determinants and the historical context shaped his character. Plutarch shows us how sentiments are the humans' strongest motivating force. The passionate urge in Coriolanus, operative from child hood to reach the stature of a great soldier, drives him to work for it with determination. Plutarch thus forcibly presents the psychological reasons behind the journey from ordinary circumstances to that of a significant figure in the Roman history glorified by generations of people. Plutarch's strength as a narrator springs from his penetrating vision of the psychological side of his subject. The distinguishing feature of Corilanus' character was his detachment from personal glory usually found in most people of ambition. This trait is so very well expressed in chosen word that a flood of light is thrown on his subject as in this excerpt: And, whereas others made glory the end of their daring, the end of his glory was his mother's gladness; the delight she took to hear him praised and to see him crowned, and her weeping for joy in his embraces rendered him in his own thoughts the most honoured and most happy person in the world. The aesthetic approach of Plutarch is in stark contrast to the didacticism of Bede who writes on a saint of heroic Christian virtues. The central concern of Bede to edify his readers by the exemplary conduct of Cuthbert deflects from the purpose of providing aesthetic pleasure. While Bede reveals the character of Cuthbert conforming to the Christian ideal, the inner side of the Saint is not sufficiently looked at nor is it understood in the style of narration. Cuthbert as a saint working miracles is in the realm of supernatural, while Coriolanus performing heroic feats is in the realm of the natural. Bede's life of Cuthbert is in the form of a string of miracles. Since the aim of the biography was to instill in the reader faith in the powers of saints in the performing of miracles, the literary flourishes are somewhat rudimentary. The sentences do not have the vigour of narrative found in the style of Plutarch. However a believer by the disposition of his mind might find relish in th e style of Bede, as it elevates him to realize the power of God's saints in their miracles. The typical miracle conveys the ineffectiveness of human intervention in a crisis. Bede concludes the miraculous way in which the saint put our a fire: But it was not only in the case of an apparition of a fire that his power was shown; for he extinguished a real fire by the fervency of his tears, when many had failed in putting it out with all the water they could get. NARRATIVE IN VASARI'S LIFE OF DONATELLO AND AUBREY'S LIFE OF THOMAS HOBBES The endowments of a writer are usually reflected in his technique of narration. Vasari was a painter and an architect and in the assessment of Donatello he is able to look at him from the angle of an artist that gives the writing a quality of credibility and hence, on the part of the reader, greater willingness to accept the piece of writing. However, the endowments of Audrey was some what limited compared to the standing the Thomas Hobbes enjoyed while

Monday, October 28, 2019

Australian Rules essay Essay Example for Free

Australian Rules essay Essay Australian rules is set in a small rural town, where the relationships between the white townspeople and the Aboriginal people on the mission are complex, conflicted and marred by deeply entrenched racism. The local football team in many ways serves to represent the town, it reflects the conflicted relationship between the white people and the Aboriginal people- we begin to understand this as the film unfolds. Other themes inherent in the film are themes of family, love, loyalty and violence- the secrecy of domestic violence and the more overt forms of racial violence that spill out onto the public spheres of the football field and the pub. The opening narration informs us that half the football team is Aboriginal and that there would not be a football team without the Aboriginal players, therefore we understand how the town team relies on the talent and number of the Aboriginal players. We then witness the contradiction of the white and Aboriginal boys playing side by side as team members followed by the social segregation between the members after the match. This segregation is highlighted by Blacky (a white boy from town) and Dumby (an Aboriginal boy who is the best player on the team) whose friendship transcends these borders and we also witness ways that this segregation between the white teenager and Aboriginal teenagers is culturally imposed by certain adults. In one of the beginning scenes, just after a football match, Dumby and Blacky want to ‘hang out’ together, but Dumby is taken back to the mission by an older friend and Blacky cannot follow. Blacky, Clarence and Dumby all call out to each other ‘Nukkin ya’ and this use of Aboriginal language between two Aboriginal teenagers and Blacky the white boy signifies the level of their friendship and mutual acceptance. Pickles’ comment to Blacky that ‘now he even talks like one’, symbolises the town’s disapproval of such respect for Aboriginal culture and Aboriginal people. The character of Pretty, Dumby’s older friend from the mission, plays an important role in the film. He was once a talented football player himself but no longer ‘kicks goals for whitefellas’ and he is significant because he is the main character to verbalise that Aboriginal people are treated differently and unfairly. He is somewhat aggressive in his approach, expressing bitterness and resentment, yet it is implied that his approach is reactionary to the way he has been treated, and his statementsoverlooked by the white coach- are significant examples of changing responses to uneven power dynamics. For example the white coach tells Dumby to make sure all the Aboriginal team players turn up to the next match and Pretty interjects stating that it doesn’t work that way anymore, his metaphor of ‘yes sir, no sir, three bags full sir’, clearly refers to the history of Aboriginal people being used as servants and points out that the coach’s approach of ordering Dumby around is no longer appropriate. Unfortunately the coach does not take this message on and rather than acknowledging the Aboriginal boys as talented, valuable and indeed essential team players, he nervously treats them as unreliable boys who may destroy the team’s chances by not turning up. This attitude of relying on Aboriginal talent, whilst refusing to appropriately acknowledge this talent is made explicitly clear during the award giving ceremony that takes place after the team win the finals. Pretty is made to leave the ceremony after he disputes the truth of a speech about the egalitarian nature of football ‘where you can be anyone, from anywhere, and receive the recognition you deserve’. Pretty is immediately proved to be right when the awards are given only to white boys, and Dumby, who is obviously the most talented player on the team is left completely unacknowledged. There is a direct shift in Dumby’s response and he becomes more like Pretty, demonstrating anger and resentment, rather than his normal cheerful, co operative self. This gives us insight into Pretty’s character and how he may have developed the attitude that he has towards white people. Pretty and Dumby’s break-in to the pub that very night can be interpreted as a direct response to the unfairness of the award ceremony- although there are characters, such as the coach, who are not willing to see the connection. The fact that Dumby is then murdered by Blacky’s father is a complicated event with many layers of meaning. The insights we have been given about Blacky’s father prior to the shooting is that of a man who dominates his family, puts down his sons for showing vulnerability and who physically abuses his wife. There are instances in which we can see links between the violence he demonstrates towards his family and the verbal and physical violence he feels justified in displaying towards Dumby, and then later towards Dumby’s sister, Clarence. There is a scene in which the father physically attacks Blacky and forces Blacky to declare loyalty to him (regarding the shooting), meanwhile verbally abusing Clarence with racial slurs and ordering her to get out of his house. During this scene the camera pans onto the faces of the Blacky’s mother and siblings and we see how domestic and racial violence become enmeshed, that the father’s attack on Blacky for being with Clarence is an act of violence that hurts his whole family. Interestingly it is Clarence who is the least cowed in this scene, she does not show fear and walks out with dignity. In this way we can see how control and domination is a particular pattern in this family, but is not taken on by Clarence. In many ways, the shooting, and the following events, are catalysts for great changes, both in the town, and more specifically in Blacky’s family. Blacky rejects his parent’s demands to maintain loyalty to his father and instead Blacky remains loyal to his friendship with Dumby. Blacky’s rejection of his father’s authority instigates other members of the family, such as his mother and next youngest brother who subtly take Blacky’s side. The scene where his brother urges him to get up and face his father, (when his father beat him to the ground), symbolises the request of his family for Blacky to represent them all and challenge the father’s authority. The resolution of the film sees the father gone, leaving Clarence and Blacky happily together but planning to this town ‘that has nothing for them’. The fate of the town is not so happy, the boys from the mission won’t come to town and there is no longer a football team. In many ways we can see how Australian rules reflects the complexities of human relationships- of love and loyalty and hatred and violence, and clearly demonstrates how deeply entrenched racism hurts everyone. The town, through its racism has destroyed the tentative trust of the Aboriginal people and has lost its ‘glory’- its winning football team. Its seems empty, a place only good for leaving.

Saturday, October 26, 2019

Reflexivity :: Enthnography Anthropology Essays

Reflexivity Anthropologists research and write. They participate and observe in order to produce ethnographies. While some anthropologists venture to â€Å"exotic† lands to study the â€Å"natives,† others conduct ethnographic research within their own culture. Despite the diverse cultures they examine and the use of a tape recorder instead of a pen and a notebook, the ethnographic process is virtually the same. Or is it? Although similarities between ethnographies exist, when it comes down to it, ethnographies differ from one anthropologist to the next and one culture to the next based on the writing techniques applied by the ethnographer, the position of the anthropologist (age, gender, class, culture), and his or her life experiences. Some ethnographers use reflexivity, a writing tool that personalizes ethnography as the anthropologist writes about his/herself in the work. In a reflexive ethnography, the anthropologist positions his/herself in relation to the examined c ulture and writes about his/her ethnographic experience, an experience which hopefully bridged the gap between the anthropologist’s culture and studied culture, converting the â€Å"outsider† status of the anthropologist to an â€Å"insider† position. Reflexivity allows the ethnographer to show how and why it is that he/she empathizes with a culture and to allow the audience an opportunity to identify with a culture that is not his/her own. Ultimately, reflexivity conveys the importance to acknowledge the similarities and differences that exist between cultures. In a reflexive ethnography, anthropologists locate their position in another culture and outline their experiences inside and outside of the examined culture. George E. Marcus describes reflexivity as â€Å"the practice of positioning† (Marcus 198). Reflexivity â€Å"locates the ethnographer . . . his or her literal position in relation to subjects† (Marcus 197-198). In other words, reflexivity conveys to the audience that the ethnographer â€Å"was there.† In most cases the ethnographer uses phrases such as, â€Å"I realized,† or, â€Å"I examined,† or simply â€Å"I.† This declaration of first-hand cultural knowledge grants the ethnographer authority to write about and understand a culture because he/she participated and observed the culture in action. Renato Rosaldo writes about positioning and the authority it gives him to write about the Ilongot tribe. In â€Å"Grief and a Headhunter’s Rage,† he writes, â€Å"The ethnographer, as a positioned subject, grasps certain human phenomena better than others. He or she occupies a position or structural location and observes with a particular angle of vision .

Thursday, October 24, 2019

Computer security Essay

1. What is a PHP Remote File Include (RFI) attack, and why are these prevalent in today’s Internet world? RFI stands for Remote File Inclusion that allows the attacker to upload a custom coded/malicious file on a website or server using a script. This vulnerability exploits the poor validation checks in websites and can eventually lead to code execution on server or code execution on website (XSS attack using javascript). RFI is a common vulnerability and all website hacking is not entirely focused on SQL injection. Using RFI you can deface the websites, get access to the server and do almost anything. What makes it more dangerous is that you only need to have your common sense and basic knowledge of PHP to execute this one, some BASH might come handy as most of servers today are hosted on Linux. 2. What country is the top host of SQL Injection and SQL Slammer infections? Why can’t the US Government do anything to prevent these injection attacks and infections? The United States of America is at the top of the list when it comes to SQL Injections and SQL Slammer infections, China comes in second. Cybercriminals have made vast improvements to their infrastructure over the last few years. Its expansion is thousands of websites vulnerable to SQL Injections. Malicious code writers have exploited these vulnerabilities to distribute malware so quick that the government cannot contain such a large quantity. The infected web servers redirected unsuspecting visitors to malicious websites, then the victim’s computers were then subjected to client-side exploit code. Once infected, these computers were added to the thousands of bots under the control of hackers. The attackers knew antivirus companies would write updates and software vendors will patch their code so they mad e sure their malicious web sites were loaded with a variety of exploit codes. 3. What does it mean to have a policy of Nondisclosure in an organization? It is a contract where the parties agree not to disclose information covered by the agreement. It outlines confidential material, knowledge, or information that the parties wish to share with one another for certain purposes, but wish to restrict access to or by third parties. 4. What Trends were tracked when it came to Malicious Code in 2009 by the Symantec Report researched during this lab? DoS attacks are always common, however targeted attacks using advanced persistent threats (SPT) that occurred in 2009 made headlines. 5. What is Phishing? Describe what a typical Phishing attacks attempt to accomplish. Phishing is Internet fraud that attempts to gain user’s credentials by deception. It includes theft of passwords, credit card numbers, bank account details and other confidential information. Phishing messages usually take the form of fake notifications from banks, providers, e-pay systems and other organizations. These notifications encourage its recipients, to enter/update their personal data. Excuses can vary but usually relate to loss of data, system breakdown, etc. 6. What is the Zero Day Initiative? Do you think this is valuable, and would you participate if you were the managing partner in a large firm? It is a program for rewarding security researchers for responsibly disclosing vulnerabilities. The outcome can be good for the company in means of protecting its infrastructure from harm, but may also expose weaknesses that can damage the company’s reputation. This policy further reassures researchers that in no case will any of their discoveries be â€Å"swept under the rug.† I would participate, but we must pass an internal audit with flying colors before signing up with the program. 7. What is a Server Side Include (SSI)? What are the ramifications if an SSI exploit is successful? The Server-Side Includes attack allows the exploitation of a web application by injecting scripts in HTML pages or executing arbitrary codes remotely. It can be exploited through manipulation of SSI in use in the application or force its use through user input fields. The attacker can access sensitive information, such as password files, and execute shell commands. The SSI directives are injected in input fields and they are sent to the web server. The web server parses and executes the directives before supplying the page. Then, the attack result will be viewable the next time that the page is loaded for the user’s browser. 8. According to the TippingPoint Report researched in this lab how do SMB attacks measure up to HTTP attacks in the recent past? Symantec identified a significant shift in an attackers tactics: 31% of targeted attacks were aimed at businesses with fewer than 250 employees. This shows a threefold increase from Symantec Corp.’s 2012 report, and is the latest sign that attackers are broadening their search for susceptible targets. 9. According to the TippingPoint Report, what are some of the PHP RFI payload effects DVLabs has detected this year? The common vulnerabilities in a CMS are unpatched or poorly patched plug-ins rather than the core system. Poor patch management represents a large hole in the overall security of the organization. 10. Explain the steps it takes to execute a Malicious PDF Attack as described in the Tipping Point Report? Each new release of a toolkit is likely to contain a new zero-day exploit that gives the attacker higher chances of infecting targeted hosts. Some toolkits keep very old exploits (4+ years) to cover a corner case in which targeted hosts are running older, unpatched versions of vulnerable software. Attackers infecting as many hosts as possible to increase profitability by monetizing the exploited systems. 11. What is a Zero Day attack and how does this relate to an organization’s vulnerability window? A zero day vulnerability is a hole in software that is unknown to the vendor. Hackers exploit before the vendor realizes it and hurries to fix it. The organization is vulnerable until the vendor comes out with a patch. 12. How can you mitigate the risk from users and employees from clicking on an imbedded URL link or e-mail attachment from unknown sources? Constant awareness efforts continuously made the organization. Ensure spoofing is included in the organizations AUP, practice risk mitigation exercises to embed in the users minds not to click on unsolicited messages, especially those from social media. 13. When auditing an organization for compliance, what role does IT security policies and an IT security policy framework play in the compliance audit? They play a very important role. Managers are responsible for placing and monitoring IT controls on systems. Senior managers are responsible for making the organization meet governance requirements. System administrators are responsible for implementing IT controls and provide data custodian functions. Risk managers are responsible for managing risks associated with compliance within the organization. IT auditors are responsible for information assurance. Data owners are responsible for identifying which data needs to be protected. 14. When performing a security assessment, why is it a good idea to examine compliance in separate compartments like the seven domains of a typical IT infrastructure? They are tied together. 15. True or False. Auditing for compliance and performing security assessments to achieve compliance requires a checklist of compliance requirements. True. There are different requirements per each compliance.

Wednesday, October 23, 2019

Xbox

Get Free Xbox Live Membership Codes This method requires a glitched code I personally bought, the code doesn’t work when you try to redeem it, however to the employee’s at Xbox is shown on their screen as Active and working but does not tell them what the code is actually for (1 month, 3 month, 12 month, 4k msp etc. ) I know what you’re thinking already, bullshit? No, try it yourself below. Note: They could ask for the code anytime, so be ready. Make sure you’re signed in on a NEW silver account every single time you do this or it will not work.Also, on the Silver account fill out billing info with a fake address name, ect. Also, edit your bio and motto and everything else such as your gamerpicture so it looks like a real account. *Don’t just rush into this method without following the directions stated above or it will not work! * K8F3V-78HXG-YRRJ4-TW8XQ-RR7M3 1. Go to Xbox. com and get on Contact Us -> Support 2. From the drop down menu, choose Xb ox Live -> Prepaid Codes 3. 3.In the description type â€Å"Help with prepaid codes, very confusing† Or something along those lines. *Change what you write here everytime! * 4. When they welcome you, just go with what they say, act normal. Tell the Agent a scenario, say you got your code for you birthday from your mother. You got the code, wrote it down on a piece of paper and planned to use it when you needed it. Then, say that you tried to use it and it gave you an error code on the xbox. (Be creative with this story, make it convincing! ) 5.Tell them you can’t take the card back because you trashed the card after you wrote it down on a notepad on your computer for covinence. 6. If they ask you to troubleshoot the issues just don’t reply for a while, then tell them it didn’t work, or if they ask what the code was tell them it was for whatever you’re wishing to obtain. 7. If they ask what the error was when redeeming, the error on xbox. com is â⠂¬Å"This code is not valid† and the error on the console is â€Å"This code isn’t valid. Please enter a valid code. † 8.They will probably go on for a while asking you different questions , just answer the questions and feed them the lies you think they want to hear and you’ll be fine. 9. Eventually they should either : Offer you a 1 month code as they can’t give you anything else because you don’t have the original card, escalate the request for you and you will receive your desired code via email in a few days OR they will tell you they can’t do anything (If they say this to you, you have failed. You should just end the conversation then X it off and try again in an hour or so)

Tuesday, October 22, 2019

Free Essays on William Blakes Contrary States

William Blake’s Theory of Contrary States BY: DELORES JOHNSON William Blake was a talented poet. Many fans and critics alike think him one of the greatest poets of his time. It will be my duty and my pleasure to try a new approach to his writings and some insight to his poems. Of all his poetry that I have read I find the most contrast within the two collections of lyric poems called Songs of Innocence and Experience (1789-1794). These poems represent how Blake felt about â€Å"the two states of the human soul.† The poems in these collections were meant to contrast each other to reflect that. â€Å"Without contraries there is no progression† was often heard from his lips. I agree with that sentiment. I m a college student and as such I am going down an enlighten road. I truly believe that there is a constant struggle between the bourgeois and the proletariat. I believe that there is some evidence of Blake being aware of this struggle as demonstrated in the poems â€Å"Holy Thursday† and â€Å"The Chimney Sweeper†. These poems display ironic views and an overly trusting attitude towards the government. Blake was a controversial poet who often stirred up the political pots of his time. In fact I think that it was his hope to awaken some sympathy within the dormant hearts of the affluent people within his society, to the plight of the common man. So in this essay my goal is to show that Blake was a spiritual man, a man of sympathy and a natural love towards children. Yet I will still be able to uncover with my research why Blake was so avid a believer in man’s contrary soul.... Free Essays on William Blakes Contrary States Free Essays on William Blakes Contrary States William Blake’s Theory of Contrary States BY: DELORES JOHNSON William Blake was a talented poet. Many fans and critics alike think him one of the greatest poets of his time. It will be my duty and my pleasure to try a new approach to his writings and some insight to his poems. Of all his poetry that I have read I find the most contrast within the two collections of lyric poems called Songs of Innocence and Experience (1789-1794). These poems represent how Blake felt about â€Å"the two states of the human soul.† The poems in these collections were meant to contrast each other to reflect that. â€Å"Without contraries there is no progression† was often heard from his lips. I agree with that sentiment. I m a college student and as such I am going down an enlighten road. I truly believe that there is a constant struggle between the bourgeois and the proletariat. I believe that there is some evidence of Blake being aware of this struggle as demonstrated in the poems â€Å"Holy Thursday† and â€Å"The Chimney Sweeper†. These poems display ironic views and an overly trusting attitude towards the government. Blake was a controversial poet who often stirred up the political pots of his time. In fact I think that it was his hope to awaken some sympathy within the dormant hearts of the affluent people within his society, to the plight of the common man. So in this essay my goal is to show that Blake was a spiritual man, a man of sympathy and a natural love towards children. Yet I will still be able to uncover with my research why Blake was so avid a believer in man’s contrary soul....

Monday, October 21, 2019

ISLLC Education Standards

ISLLC Education Standards Free Online Research Papers Over the past two decades, a reform movement of responsibility has emerged in the field of education. With the emergence of No Child Left Behind (NCLB) and our nation’s focus on accountability for education, we have begun to look beyond the classroom teacher for liability. In 1996 a new standard of measurement for school administrators was created. The Interstate School Leaders Licensure Consortium Standards (ISLLC) was created for school leaders by a conglomerate of states, affiliations and organizations. The six ISLLC Standards are based on extensive research from these groups in the areas of leadership, authority, and analysis of policies and procedures (Council of Chief State School Officers [CCSSO], 2008). Creation of the ISLLC Standards has established a way to measure accountability and responsibility for school leaders by school districts and states. The original six standards were revised in 2007 and adopted into practice in January 2008. In August of 1994, the ISLLC initiative began to emerge (Southern Utah University [SUU], 1996). The original consortium consisted of 24 states, a grant from The Pew Charitable Trusts, and help from the Danforth Foundation and the National Policy Board for Educational Administration (NPBEA) (SUU). Furthermore there were several professional associations joined with the ISLLC: American Association of Colleges for Teacher Education, American Association of School Administrators Association for Supervision and Curriculum Development, Association of Teacher Educators, National Association of Elementary School Principals, National Association of Secondary School Principals, National Association of State Boards of Education, National Council of Professor of Educational Administration, National Policy Board of Educational Administration, National School Boards Association, and University Council for Educational Administration (SUU, p. 6). The group operated under the guidance of the Coun cil of Chief State School Officers (CCSSO) (SUU). The original set of standards were designed to be applicable to all formal leadership positions. Each of the six initial ISLLC Standards are comprised of knowledge, disposition and performance criterion. These criterions are so elaborate for each standard there were as few as 19 or as many as 39 knowledge, skills and dispositions (CCSSO, 2008). The CCSO based this type of measurement on the belief that â€Å"dispositions are the proclivities that lead us in one direction rather than another† (SUU, p. 8). They felt it was easier to measure school administrators, at all levels, based upon the dispositions, since they support and give meaning to the performance and knowledge pieces. The original ISLLC Standards were redesigned and finalized in 2008 (CCSSO, 2008). Undertaking the revision was an extensive researched based endeavor. The modification process was led by the NPBEA (CCSSO). Through careful consideration by the NPBEA and its member organizations, it had become clear that the original ISLLC Standards had become too restrictive. The knowledge, performance and dispositions design of the 1996 ISLLC Standards listed examples of leadership indicators and seemed to exclude other areas that could have been included (CCSSO). One of the important factors of the new ISLLC 2008 Standards are that they allow an association between assessments of school administrators and the standards. With the social change to accountability for teachers and administrators, the new ISLLC Standards allow states and school districts to set guidelines for evaluating performance of school administrators. Not only can performance be evaluated, but the new ISLLC Standards are a driving force behind how responsibility and authoritative roles are aligned (CCSSO). When the first ISLLC Standards were released, there was very little research or agreement on the influence that school leaders had over school or student improvement. Along with the ever-changing fabric of society, it is widely accepted that school administrators have a great deal of influence over both (The Wallace Foundation, 2008). The revised Standards support this theory and allow school administrators to be held accountable for school and student success. During my research of the ISLLC Standards, I came across three very beneficial websites. They were the CCSSO’s website, Southern Utah University’s Education Department, and The Wallace Foundation. The CCSSO’s website contained the original 1996 ISLLC Standards along with an informative description of how the research began, the original consortium that performed the research and provided input, and the guiding principles for the standards. While exploring that website it provided insight to how and why the Standards were created. Understanding the driving force behind their creation enabled me to understand the full aspect of their influence. Southern Utah University’s website was beneficial as well. It provided the insight on the importance of the revision of the standards. The main focus on the revision was to provide a framework for each state to develop its expectations for school administrators and leaders. The Wallace Foundation website was helpful in providing links directly to the research that went into creating the revised Standards. Now that I am well-informed on the ISLLC Standards, I will be able to implement them into daily practice. Standard One states that an educational leader will articulate, implement, and facilitate a learning environment that is shared and supported by all involved (CCSSO, 2008). This will be achieved by establishing a school wide vision statement that is adopted by not only the staff, but the community as well. An important aspect of creating a vision statement will be to effectively identify goals and establish the ability to monitor and track the status of those goals. Standard Two is created to promote a school environment that is conducive to student learning and professional growth for the staff (CCSSO). Creating an environment that is conducive to learning is imperative school wide. As a school administrator I would accomplish this by supervising instruction, promoting the use of up-to-date technology, and promoting an environment that encourages student involvement in thei r learning. Standard Three addresses creating a safe, effective, and efficient learning environment (CCSSO). Applying this on a daily basis will be achieved by supporting quality instruction, student learning, and most importantly protecting the welfare of the staff and students. The fourth Standard addresses creating a partnership between the faculty and the community (CCSSO). As a school administrator incorporating this into daily practice will be done by establishing a relationship with community members, business partners, and families in the area. The fifth Standard instills an ethical and professional demeanor on educational leaders (CCSSO). Applying this to daily practice is crucial because the school administrator is the role model for professional and ethical behavior. If the school leader demonstrates these values, the remainder of the staff will easily follow. Upholding an environment of integrity, fairness and professionalism is certain to increase student and st aff morale, and self-esteem. The final Standard encourages a school leader to become actively involved and influencing the political, social, economic, legal and cultural context of the school (CCSSO). In order for a leader to be effective, they must be able to promote student success by becoming an advocate for their students. This can be accomplished by acting to influence the social, economic, legal and cultural structures that affect student learning and success. In conclusion, the ISLLC Standards were created to establish a form of measurement, and accountability for school leaders. The constantly changing foundation of our society is influencing states and districts to establish a uniform policy on ensuring that effective leaders are placed appropriately. Colleges and Universities are utilizing the ISLLC Standards to create educational programs that use them as a foundation for creating high-quality school leaders. ISLLC Standards support the role of principals and school leaders and offer concrete policy recommendations that flow from these standards (CCSSO, 2008). With a newly established consensus on the important role school leader’s play in increasing student achievement, we need to provide the vehicle to create strong leadership values (The Wallace Foundation, 2008). The ISLLC Standards fulfill this task by creating a set of guiding policy standards in which high-qualify leaders are developed. References Council of Chief State School Officers (2008). Educational Leadership Policy Standards: ISLLC 2008 as Adopted by the National Policy Board for Educational Administration. Retrieved July 3, 2009, from ccsso.org/publications/details.cfm?PublicationID=365 Southern Utah University (1996). Interstate School Leaders Licensure Consortium: Standards for School Leaders. Retrieved July 3, 2009, from suu.edu/ed/pdf/isllc.pdf The Wallace Foundation (2008). Educational Leadership Policy Standards: ISLLC 2008 A Foundation for Helping States and Districts Improve Education Leadership. Retrieved July 3, 2009, from wallacefoundation.org/NewsRoom/PressRelease/Pages/EducationalLeadershipPolicyStandardsISLLC2008.aspx Research Papers on ISLLC Education StandardsStandardized TestingInfluences of Socio-Economic Status of Married MalesThe Relationship Between Delinquency and Drug UseHip-Hop is ArtResearch Process Part OneThree Concepts of PsychodynamicBringing Democracy to AfricaPETSTEL analysis of IndiaOpen Architechture a white paperRelationship between Media Coverage and Social and

Sunday, October 20, 2019

10 traits of a great manager, according to Google

10 traits of a great manager, according to Google There are many reasons that Google has been successful in its bid to become a globally dominant company. (Its onetime motto, â€Å"don’t be evil,† probably didn’t hurt.) But one of the most important factors is one you can’t see by going online and using one of their many tools, or asking your Google Home to tell you: effective management. You don’t build a company that big and that successful without quality people at all levels.In its regular Project Oxygen studies to analyze how to improve management and leadership at the company, Google has come up with a number of traits that make a good manager.1. â€Å"Is a good coach†A coach is only as strong as what his or her players produce. A high-quality manager supports the team, always working closely with team members to provide guidance, motivate them, and make sure that everything is moving along as it should.2. â€Å"Empowers team and does not micromanage†It may seem like getting the outcome you want from employees means micromanaging their every move. In reality, it’s a fast way to take power away from individuals and make them less likely to grow and change in ways that make the work better. A great manager knows when to step back and let team members take agency and initiative, building their own confidence and leadership skills while getting the work done. Trusting your team to do what they need to do is a morale booster, and helps create more productive, more satisfied employees.3. â€Å"Creates an inclusive team environment, showing concern for success and well-being†If employees don’t feel supported, work is likely to suffer and you start losing talented people. A great manager makes sure that each team member feels valued and supported in their work. Knowing that your manager cares about you, and not just the work output, improves morale and helps employees feel like a necessary part of the team’s goals.hbspt.cta.load(2785852 , '9e52c197-5b5b-45e6-af34-d56403f973c5', {});4. â€Å"Is productive and results-oriented†Setting goals and making sure everyone is working effectively toward them is a key part of managing well. It’s up to the manager to set those expectations, and show that he or she is just as committed to them as everyone else.5. â€Å"Is a good communicator- listens and shares information†Nothing causes frustration in the ranks faster than poor communication to and from the top. There’s a reason that communication skills are on just about every job description under the sun. It’s not just about passing information, it’s also about knowing how to hear and understand what’s going on, react appropriately, and communicate outward. That means being able to navigate sticky work politics, as well as take feedback and concerns from employees.6. â€Å"Supports career development and discusses performance†A great manager doesn’t just see team members as faceless worker bees doing the same job over and over indefinitely. A great manager works with team members to find opportunities for improvement and define job goals in a way that pushes them forward. Performance reviews (whether formal or periodic â€Å"how are things going?† check-ins) can identify ways employees can grow and let them know you’re there to support that.7. â€Å"Has a clear vision/strategy for the team†Another morale killer: not really understanding how or why the work is being done. Managing well includes coaching employees toward a particular goal or strategy. Sometimes those are handed down from above as part of a larger corporate mission, but other times it means defining what your group hopes to achieve. Having a clear strategy and communicating that to team members shows how everyday work is contributing to the company’s larger goals or mission. It’s your job to make sure everyone’s seeing the forest and t he trees.8. â€Å"Has key technical skills to help advise the team†It may be that your job is assembling and cultivating experts- not being an expert yourself in a particular process or skill set. You don’t necessarily have to be better than your employees at everything, but you should definitely have enough technical skill to be able to speak intelligently about it, and be ready to provide guidance or support when necessary.9. â€Å"Collaborates across Google†No team is an island. (Okay, that’s not quite how it goes, but you get the gist.) No matter how specialized your team may be, chances are you have to get information from other teams, communicate with other teams, or collaborate on projects with other teams. It’s important to make sure those connections with other groups and colleagues across the company are valued, and ensure that communication is smooth between your team and others.10. â€Å"Is a strong decision maker†Being the boss means having to make the decisions, tough or not. Getting input from others is important, but if you want to push your managerial skills to the next level, that means owning the decision-making process and backing your decisions with as much information and education as possible.If you’re looking to boost your bossing, paying attention to these 10 qualities will help you become a well-rounded manager.

Saturday, October 19, 2019

How to prevent identity theft Speech or Presentation

How to prevent identity theft - Speech or Presentation Example While such crimes are easy to commit, their complexity makes them hard to investigate and prosecute them. It calls for each of us to identify-smart and make sure such crimes are stopped from spreading. It is a challenging task, but easy to win. What simply needs to be done is to follow the tips given by the experts, exercise extra care and we shall all be ahead of these identity thieves by a big step. It is a responsibility of each of us to rise to the occasion to prevent identity theft. But before we are ready to take up the task, we need to be informed of what identity theft mean. This paper is a presentation of how to prevent an identity thief. Identity theft, or identity fraud, according to the United States Department of Justice, are terms that are used when referring to all forms of crime in which an individual wrongfully obtains and makes use of personal data of that other person in some way involving deception typically for personal, economic gains (National Crime Prevention Council, 2005). Research has shown that by 2004, there were on average twenty million incidents involving identity theft in the U.S alone (Joseph, 2005). How this happens with all the securities in place, is a question everyone would want to know its exact answer. However, according to a study that was released by two research bodies (Better Business Bureau and Javelin Strategy), in early January 2005, most of the theft do take place offline, which is quite opposite of what majority of people might think (Joseph, 2005). The study found out that online information theft only accounts for about 11.6% of the total identity fraud cases. This, in essence, implies that limiting your use of own computer does not help much. Nonetheless, rushing into grabbing headline scandal that involve theft of thousands of personal records, coupled with the advent of pharming and phishing these involved in the theft might go a long way to the above figures dramatically. The findings of these studies, on the other hand, are extremely troubling. These studies indicate that almost half of the identity thefts are often committed by those people known to the victims. One other study in 2004, reported that on average 655,000 complaints that were registered with the agency, 60 percent were to do with fraud and 40 percent involving complaints of theft identity. Basing on the figures released by this study, the predominant form of identity theft was that of Credit card fraud that accounts for 30 percent of the theft reported. Utilities fraud was ranked second accounting for 20 percent of the identity theft. This was followed by Bank fraud that account for 17percent of identity theft. The FTC, as well conducted some study concerning theft committed on the internet, and it came up with 206,568 as a figure for the internet identity theft. It was also noted that about 89 percent of the victims said they suffered a financial loss, which was averaged at $1,440. Basing on these study Phoenix-Mesa- Scottsdale, Bernardino-Ontario, Las Vegas-paradise, and Riverside-San reported the highest number of identity theft. The FTC found out that of all that reported having been victimized in the U.S 8 percent aged 60 years and above with the largest number, 30 percent, falling in the range between 18 to 30 age group (Joseph, 2005). Following those figures, it becomes clear that identity theft is real and

Friday, October 18, 2019

US Steel Tariffs Essay Example | Topics and Well Written Essays - 2250 words

US Steel Tariffs - Essay Example In 2001, US Steel lost $62 per every domestically produced ton. US Steel, the largest American producer, now that LTV, National Steel, and Bethlehem Steel went bust. US Steel Kosice made a profit of $55 per ton. USSK plans to purchase still mills in the Czech Republic as well. To remedy the situation and the strengthening the domestic steel sector by decreasing imports of cheaper steel and therefore shielding domestic steel producers from foreign competition. The US argued that under the World Trade Organization agreements safeguard measures are acceptable if the domestic industry is severely harmed by the cheaper imports and if these measures are limited to a timeframe of less than four years. The government hopes the industry will take advantage of the break to modernize and become more efficient. The history of the industry, however, sheds doubt on the industry's ability to overcome past inefficiencies (Abboushi, 2006). In March 2002, Bush imposed tariffs of up to 30 percent in th e first year of the new regime on $8 billion of steel imports, mainly from Europe, South Korea, and Japan. This is about one tenth of the global market. The tariffs were scheduled to decline to 24 percent in the second year and 18 percent in the third. Both Europe and Japan are challenging these measures in the WTO (Vaknin, 2004). The optimal tariff maximizes welfare of a large trading country that acts like a monopoly in trade. It is based on the naive assumption that trading partners do not retaliate. It is arguing that US could gain from a tariff if its trading partners do not retaliate. Economists are not arguing that US should restrict imports for this reason. Maximize U[y1 + z1,y2 + z2], subject to F(y1,y2,L,K) = 0. Figure 1 Use Steel trade indifference curves. z2 Optimal Tariff: to = 1/(* - 1), where * = - (z*1/p*1)(p*1/ z*1) is the price elasticity of foreign import demand. For the above reasons, on June 5, 2001, President Bush announced his optimal tariff comprehensive initiative to address the challenges facing the U.S. steel industry. But The American Institute for International Steel (AIIS) opposes the tariffs. Steel distributors largely support President G.W. Bush's decision to impose the tariffs because they expect it to stabilize the market for their suppliers and help financially-struggling mills regain liquidity. Can Protectionist measures ever be justified on economic grounds There is a classic case to suicidal protectionism of the recent steel quarrel between the USA and the EU. American steel producers ended up imposing quotas and tariffs on manufacturers they have only recently purchased in central and Eastern Europe (Vaknin, 2004). This argument has never been used by protectionists. The administration has backtracked. It promised to consider more than 1000 requests to exclude up to $1 billion in steel imports from the tariffs. The gaffe-prone then US Treasury Secretary, Paul O'Neill, said that this is done in order to reduce the "shrillness" of the conversation. More likely, it is aimed to prevent the emergence of an anti-American trade coalition (Vaknin, 2004). U.S. trade policy has been facing widespread criticism around the world. The economic devastation suffered in the United States resulting from the tragedy could be ameliorated by resurgence in the U.S. steel industry. Significant indications of the crisis began to emerge

Human right abuses in Ahwaz, south Iran, racism and genocide Essay

Human right abuses in Ahwaz, south Iran, racism and genocide - Essay Example First of all, it should be noted that in the epoch of human right protection, genocide is positioned as one of the most cruel violations and abuses imposed on humans. People of Ahwaz are subjected to genocide, though they are indigenous nation of Iran. These people are Arabs and the Iranian regime is intolerant to them and these people are often imprisoned for their beliefs or for their nationality (Security Council Meeting). Imprisonment of people from Ahwaz is another challenge, because they are cruelly treated, do not have attorney and visits of doctors or family members are forbidden. Moreover, people in Ahwaz do not have a fair opportunity of education. People of Ahwaz are deported to other cities, because the Iranian regime wants to change demographic population of this nation. Natural resources of Ahwaz are intolerantly used by Iranians and Ahwaz became the most polluted city in the world in 2009. There is a lack of water and the World Health Organization is on alert concernin g a high level of pollution of Ahwaz (Iraqi refugees). Thus, the Iranian regime is on the way of genocide extension against people of Ahwaz. They do not provide them with required conditions for life; they imprison and even kill representatives of Ahwazi nation. Conditions of life of Ahwazi nation are dreadful and there is a direct and intentional physical destruction of this nation. There is a prevention of childbirth giving. Moreover, the Iranian regime is transferring people from one group to another forcibly. Therefore, there is a direct intrusion in all spheres of life of the Ahwazi nation. Fortunately, the international community is interested in the interests’ protection of Ahwazi Arabs. There is a great shift in prevention of genocide against this nation in comparison with 2005, when the ethnic genocide of Ahwazi Arabs by the Iranian government was confirmed by the international committees. Unfortunately,

Thursday, October 17, 2019

Design Issues in the System (Security) Essay Example | Topics and Well Written Essays - 1250 words

Design Issues in the System (Security) - Essay Example The usability and accessibility guidelines have to be followed to develop easy to use software system. It is vital to balance the usability and security among the various design objectives. As per the given case study, the new system implemented in the restaurant has several issues related to the system security and user interface design. It is pertinent to highlight and review these issues include but are not limited to the locking up of the system after receiving four incorrect either username or password, the system screen automatically gets locked after three minutes of remaining idle, the locked screen can only be opened by the particular / logged in cashier and if the cashier is not available the system is required rebooting to log in any other cashier. These highlighted issues are due to the bad designing of the software application that can be removed or resolved by redesigning the software application. The implemented software application has software design issues include: the system has a design flaw of locking up the system either by inserting incorrect password or leaving the system idle for some time; the system rebooting is a major software design flaw which wastes time as well as irritates the users. (Payne and Edwards, 2008). Design Issues Solution The design issues in the deployed software application can be determined by an analysis the design issues and planning the new software design or redesigning the existing software application. There are few guidelines need to be considered while redesigning the currently deployed software application to remove the above highlighted design issues. These guidelines include but are not limited to the locked system should have the capability to be logged in by just changing the username and password by any cashier, as currently the logged in cashier can only unlock the system. In this way, the manager would not be bothered every time the system is locked. Moreover, this design would remove the requiremen t of rebooting the system, as the system can be unlocked by any cashier after entering his / her correct login name and password. The software application’s security breach can be avoided by following another guideline for securing the software application by implementing security certificates for all the users (cashier / manager / administrator). Software Design Plan The tasks for redesigning the software implemented in the restaurant may include: the analysis of the existing software (highlighting key issues), redesigning of software application keeping in view the highlighted issues, building up a prototype, performing user testing, feedback from the user, prototype refinement and these tasks lead to the final product. The above mentioned tasks need to be performed by the team keeping in view that the existing software has to be modified to correct the design issues, the software should adopt new hardware, the interface of the software has to be upgraded, and overall impro ving the performance of the software application. The information observed / identified through the analysis of the existing software application should be properly utilized in the implement new software application or modifying the existing software application in such a way with increased security and highly usable software applied. The software testing and validation procedures need to be developed for testing of the software application with objectives to remove the existing design issues. Documentation is one of the key factors in the success of any software application development; therefore, it should be performed properly and document version should be maintained. After

Patrimony controversy of the Treasure of Troy Research Paper

Patrimony controversy of the Treasure of Troy - Research Paper Example Heinrich’s ease with which he learned different languages enabled him to land a good job in an import export firm. It was there that he acquired a small fortune that enabled him to start on his dream of finding the city of Troy where he believed; he would get Priam’s treasure (Krystek). However, according to many archeologists Heinrich was not considered that much of an archeologist and they claimed that it was due to luck that he even acquired the treasures. Heinrich started his excavations in 1871 using â€Å"The lliad† as a map to guide him in Hissarlick. He however had to sign an agreement with the Turkish government promising to give them a percentage of the treasures. In 1873 Heinrich found treasure there that included golden earrings, necklaces, pots of silver, gold and other items such as gold diadems believed to have been worn by queens and princesses. He also found the mask of Agamemnon in Mycenae, in Greece. Most of this treasure was believed to be own ed by King Priam who ruled Troy. He, however, left Turkey with the treasure without giving the government anything and was later sued and was fined $5000, which he gladly paid ten times over since he needed to dig for more treasures (Krystek). The whole troy treasure controversy, which dates as early as 1880, was brought about by Heinrich himself, who first discovered it in troy then smuggled it to Greece. Later during his old age he decided, he needed a permanent home for the Treasure of Troy and donated it to a museum in Berlin, Germany where it stayed till 1945 (Meyer). It was then lost in the Second World Wa

Wednesday, October 16, 2019

Design Issues in the System (Security) Essay Example | Topics and Well Written Essays - 1250 words

Design Issues in the System (Security) - Essay Example The usability and accessibility guidelines have to be followed to develop easy to use software system. It is vital to balance the usability and security among the various design objectives. As per the given case study, the new system implemented in the restaurant has several issues related to the system security and user interface design. It is pertinent to highlight and review these issues include but are not limited to the locking up of the system after receiving four incorrect either username or password, the system screen automatically gets locked after three minutes of remaining idle, the locked screen can only be opened by the particular / logged in cashier and if the cashier is not available the system is required rebooting to log in any other cashier. These highlighted issues are due to the bad designing of the software application that can be removed or resolved by redesigning the software application. The implemented software application has software design issues include: the system has a design flaw of locking up the system either by inserting incorrect password or leaving the system idle for some time; the system rebooting is a major software design flaw which wastes time as well as irritates the users. (Payne and Edwards, 2008). Design Issues Solution The design issues in the deployed software application can be determined by an analysis the design issues and planning the new software design or redesigning the existing software application. There are few guidelines need to be considered while redesigning the currently deployed software application to remove the above highlighted design issues. These guidelines include but are not limited to the locked system should have the capability to be logged in by just changing the username and password by any cashier, as currently the logged in cashier can only unlock the system. In this way, the manager would not be bothered every time the system is locked. Moreover, this design would remove the requiremen t of rebooting the system, as the system can be unlocked by any cashier after entering his / her correct login name and password. The software application’s security breach can be avoided by following another guideline for securing the software application by implementing security certificates for all the users (cashier / manager / administrator). Software Design Plan The tasks for redesigning the software implemented in the restaurant may include: the analysis of the existing software (highlighting key issues), redesigning of software application keeping in view the highlighted issues, building up a prototype, performing user testing, feedback from the user, prototype refinement and these tasks lead to the final product. The above mentioned tasks need to be performed by the team keeping in view that the existing software has to be modified to correct the design issues, the software should adopt new hardware, the interface of the software has to be upgraded, and overall impro ving the performance of the software application. The information observed / identified through the analysis of the existing software application should be properly utilized in the implement new software application or modifying the existing software application in such a way with increased security and highly usable software applied. The software testing and validation procedures need to be developed for testing of the software application with objectives to remove the existing design issues. Documentation is one of the key factors in the success of any software application development; therefore, it should be performed properly and document version should be maintained. After

Tuesday, October 15, 2019

Gun control Research Paper Example | Topics and Well Written Essays - 1500 words

Gun control - Research Paper Example Even the women also bear license for guns and uses them2. Guns maybe either shot-guns or hand guns. Generally people use the hand gun more as it is easy to carry and becomes handier. In recent times the issue of gun control has turned out to be very controversial, especially in US, as a lot of crimes and accidents are taking place due to licenses which are being given away to commoners. Crimes Guns are a potential threat to a person’s life security. Crimes are more likely to take place in the presence of guns. All people who bear license for keeping guns are not potential threats to the society. People who own only handguns typi ­cally own the guns for protection against crime. There is a two-step linkage between gun control and crime rates: (1) the impact of gun control on the availability and accessibility of firearms, particularly handguns, and (2) the effect of the prevalence of guns on the commission of crimes. The course of the outcome moves from gun control to crime r ates3. In fact, high crime rates generate political support for the implementation of more severe gun controls4. The rates of crime are bound to increase as people are freely permitted to use guns. Sometimes thieves can also burgle the gun from the house or even kill a person. Gun control proponents often point out those countries such as Britain and Canada, which have strong gun control laws have lower rates of violent crimes5. Gun violence has unevenly impacted the African American society. While overall crime rates, including gun-related crime, have come down among the general population during the past decade, gun violence has increased among African Americans. African Americans youths, especially young males, have been particularly affected by gun violence. In addition to higher rates of violent crime, suicide rates among the African American have also increased. This has compelled community leaders to decry the self-destruction of younger generations and call for increased gun control measures6. According to the Department of Justice, nearly 58 percent of gun crimes took place in large cities over the past 30 years, and disproportionately by black males between the ages of 14 and 24. Despite composing only 1 percent of the population, these young African-American males represent 16 percent of homicide victims and 27 percent of all homicide offenders7. But, certainly one cause that so many Americans are concerned about guns is that guns signify and indicate individualism and self-reliance, two characteristics in which Americans outdo the rest of the industrial world8. People sometimes may not be criminals and do not have intentions of killing someone. Those who want to show their vengeance towards someone can show it through other methods also, but it is a natural thing that when a person has better options in front of him, he will definitely make use of it. So gun is always a better option than knife or any other sharp weapon. For instance, â€Å"Adam L anza, an honors student with no criminal record, murdered his mother, stole four of her guns, and—for reasons we may never know—decided to rob the world of the lives of 20 children and six adults at Sandy Hook Elementary School. It was a murder of unarmed innocents on a scale with few precedents in American history, the second deadliest school shooting in history, and the worst massacre in an elementary school since the 1927 bombings at the Bath School in

Politics in Nigeria Essay Example for Free

Politics in Nigeria Essay Is there any lesson to be learnt in the war on terror where the proponents vowed never to dialogue or negotiate with terrorists, only to now realize, after the demise of thousands and loss of billions of dollars, that dialogue is the only option left for a lasting peace in Iraq and Afghanistan? Do we see such favour and sensationalism by the press on these botched attempts as we witness when the culprits happen to be Muslims? What would have happened if those Christians had succeeded in carrying out the blast? In a nation where the press in mainly in the hands of people of a particular faith, it is hard to be neutral in their reportage of these kinds of events; especially if it reinforces a stereotype and serves a hot selling item of news. John Akpava was caught with weapons at a Ministerial Press Briefing held at Radio House, Abuja. What would the press have done with this story if John Akpava were a Muslim? A ‘suicide’ bomber was allowed into the premises of the Church of Christ in Nigeria (COCIN), Jos, by a fellow member of the church, who detonated explosives that led to the death of 8 persons; 38 others were seriously injured. The Sun Newspaper of Tuesday, March 6th, 2012 reported that the said Boko Haram suicide bomber was identified by The Defence Headquarters (DHQ), as Mr. Adams Joseph Ashaba, ‘who allegedly masterminded the bombing of the Church of Christ in Nigeria (COCIN) in Jos, the Plateau State capital on February 26, disclosing, that he was actually a member of the Church.’ In another report on Daily Trust of Monday, February 27th, 2012, 8 members of the same (COCIN) were arrested this time in Bauchi with explosive devices desiring to set ablaze the church. Their arrest was almost thwarted by some Christians, but for the timely intervention of the Police. The above examples and that of the arrest of Augustine Effiong of Akwa Ibon origin who was reported by Thisday of May 21st, 2012, to have confessed his involvement in the BUK bombings, should make Muslim and Christian leaders realise that we are all in this together, and that we should work in harmony to bring about workable solution to the problem of insecurity in Nigeria. We have to do this. The problems of this country could only be solved by Nigerians. Yes, we can listen to good advice from abroad, and learn from other people’s experiences on similar matters. The ambivalence of the sacred is not to be seen as a bad thing. A polarised world is the one which should be strange. What we hold dear are not the same; our understanding of who God is and what His Laws are is also varied and diverse. The only thing we can firmly attest to as people is that we are brothers in humanity. The multiplicity of religions is a manifestation of our diverse backgrounds and reasoning. While some are content to worship the air and trees; others worship a fellow being as god. Look at Christianity and Islam for example: In either faith, we have hundreds of sects and variants. Each sect or variant in turn has its own idiosyncrasies and modes of worship and body of beliefs. The realisation that every time you are looking at the number 6 on a table, another sees the number 9 across that table helps to devise means to study and tolerate conflicting ideologies. While Muslims have been stereotypically dubbed as violent, Christians have had their share of stereotypes too. A typical uninformed Muslim thinks all Christians are Crusaders, trying to snuff out the light of Islam. He detests the Christians in his surroundings and distrusts them. When he meets the right Christian, he is confused and disorientated. He asks more and learns; he deepens his understanding and the shallowness of undue hate goes away. We also have stories of Christians referring to Muslims as idolaters and heathens who slaughter a ram every year to their god. One of such ignoramuses even wrote a book he titled â€Å"Who is This Allah?† He used that rare opportunity to show just how ignorant he is. The average uninformed Christian distrusts and despises the Muslims. The irresponsible journalism tactics employed by some media houses have also helped fuel the problem. The annual holidays connected to the Christian faith given by the Federal Government and most state governments are the Christian New Year, Good Friday, Easter Monday, Christmas and Boxing Day. We also have the weekly holidays of Saturday and Sunday to enable them go and worship. On the Muslim side we have the yearly holidays of Eidul Adha, Eidul Fitr and Mawlidun Nabiyy. The Osun state governor decided to give the Muslims their right by making 15th November, which corresponds to 1st Muharram a public holiday. Objectively, no one should have any issues with that; after all, are citizens are equal and what is sauce for the goose is sauce for the gander; but alas! That was not to be! The Christain owned Punch newspaper wrote an editorial condemning it and saying Nigeria is secular. How convenient! Muslims say he was sent by God as a messenger, bearer of glad tidings and warner against the impending doom of the end of time. They revere him and truly believe in him. They do not elevate him to a rank above prophethood. Any attack on his personality is an affront on their faith. The Muslims believe that Jesus (or ‘Eesa) the son of the Virgin Mary is alive, never died or resurrected, ascended to the heavens until his return, is a great prophet who was born in one of the four ways God perpetuates life. Any insult on him is an affront on the Muslim faith and any who disbelieves in him is not a Muslim. The Christians have two main beliefs about him. One says he is in fact God, Lord and Saviour; a part of a triune while the other contends that he was sent by God but lesser than God. These are clearly opposing views about the same people! Do we go out and persecute those who do not share the same sets of beliefs with us? Only a fool will answer in the affirmative! This madness must stop, and to stop it, we must know ourselves and what we hold dear better; that is no fool’s calling. We know and believe that if more of us know what you and I know today and if more are willing to practise our faiths to the letter, there will be little or no bloodshed. Over centuries Muslims and Christians and Jews have been murdered for the simple reason that they belong to a different faith; we can and must stop it.

Sunday, October 13, 2019

FDI and Balance of Payment Relationship in Canada

FDI and Balance of Payment Relationship in Canada Chapter One Introduction History of FDI Foreign investment was very common in the late nineteenth century. It was a strategy from British to provide fund for economic development in other nation, as well as to gain ownership of financial assets. Godley 1999 mentioned in his research that the bulk of FDI that was based on British manufacturing industry before 1890 was in industrial goods sector. He also mentions that most investors failed as a result of narrow focus and their major concern his to enhance British market. Singer Manufacturing Company was an exception due to its commitment to FDI and being the first biggest and modern Multinational Corporation in the world (Moosa, 2002). During the era of interwar in the twentieth century, FDI declined and later rose but there was an astonished development in that period, British status was lost as a world creditor, and USA became the economic and financial power and FDI was favoured by USA tax law. After the world war, FDI increased as a result of two reasons: firstly, good technology in the area of communication and transportation that eliminate distance barrier. Secondly, the need of reconstruction of war damages by European countries and rest of the rich nation around the world. (Moosa, 2002). In the 1980s, there was a decline in FDI (outward). This was due to the fact that most host countries started resisting U.S control and ownership of domestic firms. Also, host countries recovered by initiating FDI in USA which affect US net inflow. In the 1970s, there was a big fall in the U.S FDI but British was back to FDI business as a result of North sea oil boom and the abolition of foreign exchange controls in 1979. In 1980s, changes in FDI occurred in which USA became a net debtor nation and major recipient of FDI with an unfavourable net international position. This was caused by depreciation of U.S dollar, restrictive trade policy and low saving rate in U.S economy. This disenabled the U.S in financing its own investment in its economy, giving rise to needs of FDI from other nations like Germany and Japan. Also, in the 1980s Japan became a major supplier of FDI to U.S.A, Europe and South East of Asia. Most countries embrace Japanese investors because of its provision of chea p labour. The revolution of FDI in the 80s can be attributed to globalization. (Moosa, 2002). In the 1990s, there was reasonable improvement in the investment climate which exposed most countries to the benefits of FDI. Some of the reasons that led to the improvement FDI of are: removal of FDI obstacles, changes in attitude and increases in FDI intensive. The removal of local hindrances through deregulation and privatization was favourable to FDI. Another remarkable thing that happened in the 1990s was the fall in the importance of Japan as a front runner of FDI. This caused economic doom in Japanese economy. Finally, FDI has gone through many reforms from countries to countries, in the late 90s, the number of treaties for the avoidance of double tax reached a total of 1871. In 1998 and 1999 some measures like protection, liberalization and promotion was brought in by the host nation (policies) on FDI. (Moosa, 2002). Globally, the economic development of deeper and more sophisticated internal and international financial market, improvements in information network and technological advancement have made contribution to sound financial and economic integration. For a nation to partake in any of the economic gains arising from these processes it need to adopt reform policies to improve efficiency. Most countries advocate FDI to encourage economic development because of its indirect impact in the host economy due to increase in competition, technical know-how and technological spill-over via multinational corporations to domestic firms. Gorg and Greenway (2002, stated in Morris 2008, p.4) that a possible channel is one in which domestic firms are thought to imitate the technology used by the companies. This will result to better ways of local firms of making their production. Competition is another positive effect of FDI. The entry of foreign companies compels the domestic ones to be more efficient in all ramifications. The latter gains better skill will from employee training through new improved technology requirement in the production process. (Morris 2008). FDI helps local firm to bypass government bureaucracy, legality and financial obstacles encountered in the host economy. International organisations always recommend that less developed countries rely mainly on FDI as a source of external finance. Hericourt Poncet (2008, p.1) confirm that the development of cross border relationship with foreign countries help private domestics firms to bypass both the financial and legal obstacles that they face at home At the same time, many may not be pleased with the policies that encourage FDI which might be unfavourable to host economy since foreigners will have share in domestic economic activity. According to Holden (2007), there was an argument that foreign-controlled investments may be bias and not act in the best interest of locals and nationals; that profit may be exported out of the country; and that foreign ownership could have national security implications in situation where industries or products are of strategic importance. These concern links to energy and natural resource sector. The concerns may lead to countries to place restriction on investment in sector that involves strategic importance. Canadian Chamber of Commerce had an annual general meeting in 2007. A resolution was passed Attracting FDI to Canada, among the issues discussed in the meeting was an advise for Canadian government to adopt policies that encourage foreign investor to Canada, even though some call for tighter restrictions for FDI due to its demerits (Morris, 2008). Canada was among the countries that provided a shield for his economy with the provision of 1985 Investment Canada Act. This Act states that any proposed foreign direct investment above a certain amount is subject to review and approval from the industry Minister. For the proposed investment to be approved, it must demonstrate that its proposed investment provide a net benefit to Canada, some of the things the industry Minister will consider are; employment, investment in Canada to compete in the world market, the compatibility of the investment with national industrial, economic and cultural policies and many others (Holden, 2007). Using Canada (a country that has benefited from FDI in all ramifications from the perspective of macro economics level down to the micro level, from one sector to another sector) as a case study. It is obvious that Canada has gained so much in FDI both in forward linkages and backward linkages. According to the Daily (May 6, 2008), the stock of FDI in Canada sky rocketed in the last eight years, and the sector that had the biggest share were the resource based industries. The Canadian Chamber of Commerce Annual General Meeting (2007) passed a resolution titled Attracting Foreign Direct Investment to Canada. The meeting called for the Canadian government to send a clear and positive message to foreign investors that Canada wants inbound investment through a proactive investment strategy and promotion champagne (Morris, 2008). Aim Most previous studies focused on the role of FDI on economic growth but their findings shows that FDI is not significant to economics growth. Carkovic and Levine (2002), prove that FDI does not independently influence on economic growth. However, economic growth and balance of payment (BOP) as a macro-economic objectives of any rational nation, in which there is sort of trade-off in both objectives.(this will be explain in the literature review section ).(pass et al. 1995). Countries calls for FDI coming between the two objectives as result nation rationale of protectionism ( quotas ,high import duties and embargo) to resolve balance of payment problem, and to achieve import substitution and export promotion agenda. Keynesian economic growth model, which is measured with Gross Domestic Product (GDP), have many component such as government expenditure, consumption level, investment, and export minus import (BOP current account). Changes in any of these components will have multiplier effect on the economic growth. (Moosa, 2002). FDI will have direct effect on host nations balance of payment which will indirectly impact the host country growth. The question being asked in this research is there any relationship between FDI and BOP? The aim of this dissertation is to determine the relationship between FDI and Balance of Payment in Canada over the period of 1990 to 2008. This aim will be achieve by building a model to explain the casual relationship between dependent variable and independent variables to figure out the relationship between FDI and BOP. Also, hypothesis will be formulated to test some of the objectives of the study. Robin says in Saunders (2007) that with deductive research its necessary to deduct a hypothesis. The study explores six possible issues: Objectives To determine the proportion of Canadian Capital account explained by growth in FDI in Canada over the period of 1990 to 2008. To determine the proportion of Canadian Current account explained by growth in FDI in Canada over the period of 1990 to 2008. To determine the proportion of Canadian Import explained by growth in FDI in Canada over the period of 1990 to 2008. To determine the proportion of Canadian Export explained by growth in FDI in Canada over the period of 1990 to 2008. To ascertain the relationship between Canadian FDI and Canadian BOP over the period of 1990 to 2008. To examine the major (countries) contributor to Canadian FDI over the period of 1990 to 2008. Significant of the study The significant of this study is to know the role of FDI in achieving one of the macro economic objective. This to ascertain if FDI will affect BOP in Canada positively or negatively. If the effect is positive, there will be needs of improving scope or magnitude for FDI in Canada for the future .However; if it is negative there may needs for government policies to restrict the inflow of FDI to Canada so as to achieve a favourable bop. The consecutive chapters will structure in the following ways: chapter two discusses the theoretical background information related to FDI, chapter three examines the academic literature relevant to the topic and also describes the methodology while chapter four presents the empirical analysis and discusses the econometrics result. The concluding chapter provides a conclusion of the research work. Chapter two Literature Review Theoretical Background (Moosa,2002) defines Foreign Direct Investment (FDI) as the process whereby residence of a country (the source country) acquire ownership of asset for the purpose of controlling the production, distribution and other activities of a firm in another country (the host country). It involves the transfer of financial capital, technology and other skills such as managerial, marketing, accountancy, and so on. International Monetary Funds Balance of Payment Manual defines FDI as an investment that is made to get a long lasting interest in a organisation operating in an economy difference the investor. (Canada Statistics, 2008) defines FDI as a component of a nations international investment position which explains a countrys investment position: the difference between aggregate financial assets and aggregate financial liabilities. Direct investment, portfolio investment and other investment are the component of financial asset and financial liabilities. (Frankel and Romer, 1999) describe FDI as one of the crucial catalysts for economic growth in a nation especially in less developed countries. This statement describes the significance of FDI to a nation. FDI can also be described as a company from one country making physical investment into building a factory in another country. It is the establishment of an enterprise by a foreigner. (UNCTAD, 2002) defines FDI as investment made to acquire lasting interest in enterprise operating outside the investors economy. In short, a business or firm that undertake FDI become a multinational national company (MNCs) because of it ability to own many subsidiaries in many foreign countries. Foreign Direct investment (FDI) plays a crucial role in any host economy in the aspect of economic prosperity and building wealth. It also leads to increase in capital flow and, highly skilled human power, and reduction in unemployment and importation of advanced equipment and technology to enhance output level. This has a direct impact on the nations gross domestic product by promoting economic development. Mutenyo (2008), said most less developed countries now adopt policies that encourage FDI. Among these po licies are privatization, trade and exchange rate liberalization, and, tax rebate and incentives for foreign investors to enjoy the business environment. FDI is different from other components (such as international financial assets, portfolios and so on) of international investment. International Monetary Fund (IMF 2003, p.6) define FDI as a category of international investment that reflects the objective of a resident in one economy (the direct investor) obtaining a lasting interest in an enterprise resident in another country (p.6). IMF further explained that a direct investment is established when a foreign investor has more than 10% ordinary share or voting right of a host country enterprise (IMF 2003, p6-7). In Canada, direct investment is measured as the total value of equity, net long-term claims and net short-term claims held by the enterprises border (Canada Statistics, 2008). FDI has been increasing globally over the last two decades. Especially in the 90s, FDI increased more than the world economic growth. According to United Nations Conference on Trade and Development (UNCTAD) data collection pertaining to FDI regulations in 1991, it shows that between January 1991 and December 2002, total of over 1600 measures were introduced by 165 countries; more that 90% of them was in favour of FDI in terms of changes; the nature of the introduced measures ranging from security for investors, to liberalization of rules governing the inflow of foreign investors, to measures that are promotional in nature(UNCTAD, 2003). The measures were extended to the international level through double taxation treaties (DTT) and bilateral investment treaties (BIT). Over the last four decades, FDI have gone through series of transformation in Canada. Gellaty 2006 (in Morris, 2008, p6) explained the reason for the emergence of the Foreign Investment Review Agency (FIRA). Due to growing concern of FDI in the late 1960s and early 1970s, the Foreign Investment Review Agency (FIRA) was established to regulate and monitor FDI. The regulation governing FDI and FIRA was replaced with Investment Canada in 1985. The regulation was aimed at protecting and promoting FDI in Canada. There was also an implementation of Canada-U.S Free Agreement (CUFTA) and North American Free Trade Agreement (NAFTA) to promote FDI further in Canada. FDI appear to be a topic that covers both narrow and broader area. Feenstra (1999,quoted in Liebscher 2007, p.3) expresses FDI as the combination of both international trade in goods and international financial flows, and as a phenomenon more complex than either international trade or international financial flow. From micro-economics perspective, FDI raises the issues of location consideration and ownership. From the macro-economics angle, FDI considers the fear of unemployment and the loss of freedom. For Policy makers, FDI is an issue to balance the benefits of spillovers with growing concern of the public. The concern authorities will be rational in policies that will favour FDI and all concern parties. FDI is one of the key features of the modern globalized world. According to (Peter 2008), most industrialists believed that there is international links in the late medieval and early modern era. They were also of the opinion that multinational firms became crucial in numerous ind ustries in the late nineteenth century but the period since World War II and in particular, since 1985 have seen an explosion in FDI both in relative and absolute terms to the levels of trade and gross domestic product. However, economic theory provides an extensive economics literature which was developed to investigate the causes, nature and consequences of FDI. One of the reasons for the creation of FDI is as a result of cheap cost of production in the host economy. FDI occurs when the benefits of producing in a foreign market out weighs the cost of economic of scale from producing exclusively in the firms home plant (Neary 2008, p.13). This benefit can be explained by the concept of proximity –concentration trade-off. That is foreign firms take advantage of trade off in production in home countries which will expose them to high exportation cost and international trade barriers relative to proximity to customer and low transportation cost. There are some conflicting predictions about the effect of FDI on economic growth. Blomstrom and Kokako (1998, quoted in Mutenuyo 2008, p.3) explain that spillover occurs if the entrance of multinational enterprises (MNE) result to efficiency and produc tivity benefit to the domestic firms in the host country and MNE is not able to internalize the full value of these benefits. On the other hand, negative externalities exist if the activities of FDI result to loss in efficiency, productivity and profitability among the local firms and the alien investors do not compensate them for their loss. In a nutshell, FDI can be detrimental to an economy. MNE are assumed to compete favourably with the more advanced local firms since the local firms will have an edge over the foreign investors in local market share, skills, export contracts, cordial relationship with suppliers and the customer and so on. On the other hand, the foreign firms may be more advance in technological know-how, research and development, and the financial resources for their home economy.(Hericourt and Poncet ,2009) confirms that the development of cross-border relationships with foreign companies helps private firms to bypass both the financial and legal hindrance that they face at home. Types of FDI The types of FDI can be considered from dual angle: from the perspective of foreign investor country and from the perspective of host country. Since the study is focused on Canada, FDI will be examined in both ways. There are three types of FDI- vertical, horizontal and conglomerate- from the perspective of the source nation (investors). Vertical FDI: (Hill,1998) provides a clear illustration of vertical FDI by dividing into two: Forward vertical FDI and Backward vertical FDI. The former is applicable in a situation where a local firm invest into another industry abroad that sells the output product of the local firms production process, while the latter is used when the foreign sales of a firm provide inputs for the downstream operation of the local firms. Horizontal FDI: is applicable when the goods produced in the host country are the same as in the home country for horizontal expansion (Caves, 1971). (Hill,1998) defines it as firms invest in the same industry as the same operational activity in their homeland. Conglomerate FDI is the combination of horizontal and vertical FDI. That is, firm operating in separate business, (Luladhar 2008). FDI FROM THE ANGLE OF HOST ECONOMY Export-increasing FDI: is caused as a result of items produced in host country as an input for home country; such as raw material or intermediate goods. This type of FDI will enhance the exportation of the host nation if there is high demand for the raw material or intermediate goods from the home country. Import- substituting FDI: This type of FDI is applicable when the goods previously imported from the home country are now been produced from the host economy which will generate more employment .This is caused as a result of host government policy on trade barriers, market size, labour cost and so on. Government initiated FDI: This is when the policy makers provide some incentive that attracts foreign investors into the host economy. This incentive could be tax holiday, tax discount and so on. The Determinant of FDI (Motives) There are four motives that determine FDI. These determinants provide reason why firms should use FDI to tap in business globalization. These motives are acquired inputs (raw material orientation), market orientation, cost orientation, and strategic asset seeking motives orientation. Raw Material Orientation: According to Dunning (1993), availability of raw material is the bed rock of any firm, especially the manufacturing firms. Usually the cost of importing raw material from the source to where is needed is outrageous, even the duration cost of getting the raw material to host firm is another visible problem that affects the overall performance of production. Therefore, it is more economical for firms to produce in an environment that has easy access to raw material.s (Atik et al., 2008). Market Orientation: This is when firms produce goods in a host country instead of shipping it directly from the home country. This occurs when foreign market is protected by the government restriction goods importation or high importation duties. It will cost less to produce in the host economy market to avoid international restriction and unnecessary cost. Market orientation draws foreign supplier closer to the buyers in the host economy. (Atik et al., 2008). Cost- Orientation Motive: Cost minimization is one the firms strategy to optimize profit. Porter (1998, stated in Atik et al.2008, p 29) explains that among the generic strategies of a firm, cost leadership is the best strategy. In cost leadership strategy, a firm will prefer to become the lower cost producer in its industry. So firm prefer to site their location where they will enjoy the lower cost of factors of production. Good examples of this firm from developed nation prefer to locate their firms in less developed nation because of cheap labour and other cost of production. Asset Seeking FDI: Foreign firms prefer to have access to gain industrial asset in host country which will more profitable to have in there home country. The foreign firm will sustains or advance its international competitiveness, technological advancement, and opening up the new market though its asset accusation from the host nation (Atik et al., 2008). There fore, a firm that owes foreign asset is better positioned in global market competition compare to its counterpart. Theories of FDI Most literature reveals why investors prefer to produce abroad instead of staying in the home country. Dunning 2003 p.278) assert that the growth of existing foreign value activities in service might require a different set of explanations than to follow initial decision to invest abroad. There are some theories that explain FDI and MNEs in global business especially in goods sector. (Helldin ,2007) is of the opinion that FDI theory is fragmented and consists of various economic theories. There are no complete theories that explain FDI; it was just the bits by bits from numerous authors. Hymer was one of the first authors to explain the theory of FDI in 1960(mention in Na, Lv Ligthfoot, 2006). Hymer believes that the multinational national companies (MNCs) have the potential to expand the business due their oligopolistic nature. He said MNCs have firm specific advantages that create market power on global market due to their technical know-how, product differentiation, RD and so on. Dunnings Eclectic Paradigm (Professor John H. Dunnings 1977 OLI-framework also called Dunnings eclectic paradigm) Dunning 1977,Helldin 2007, p8), explains that the three factors that constitute to MNEs location in host country. These factors are Ownership Specific Advantage (O), Location-Specific Advantage (L) and Internalization Advantage (I). Ownership specific are business advantages such as capital, advance technology, well known brand names and product with dominant standard (p8). It further explained that the higher the level of business competitive advantage are compare to foreign competitors on a specific location the more the business will be involved in foreign production. Location will also be based on the countries competitive advantage, originated in the partners home countries (Helldin, 2007). Ekstrom (1998 stated in Helldin 2007) is of the opinion that the combination of O with L is why a specific location is chosen to make FDI. The third (internalization) advantage is meeting demands on global market by trading. (Dunning 1977, Helldin 2007, p8). Ownership Specific Advantage (O): MNEs enjoys business advantage in some area such as size, established position, and monopoly power. MNEs also have some specific advantage in some business area such as capital, advance technology, research and development, highly skilled human capital, trade marks, receipt of government grant and property right over intellectual property (Bennett, 1999). Location Hypothesis (L): This hypothesis explains the existence of FDI which is a result of international immobility of factors of production: labour, natural resources and weather. The immobility factors result to location-related differences in the cost of production. Horst (1972b, quote in Moosa, 2002, p.33) used this hypothesis to explain US FDI in Canada. Most MNEs prefer to locate their production facilities in an area where there is cheap labour. Lucas (1993) proves that there is inverse relationship between FDI and wages. He explained that a rise in wages in the host economy will increase the cost of production and have adverse effect on production and FDI. This will shift the host economy from labour incentive to capital incentive and will also encourage FDI Lucas (1993). The advantages of location specific (L) include low transport cost, low purchase input, economics of large scale, good communication, low labour cost, near to market advantage, availability of local business support ( market research firm) and the avoidance of trade restriction (artificial barriers) impose by host nation to reduced import (Bennett, 1999). Internalization Hypothesis Internalization hypothesis explains that FDI arises due to the impact of MNEs. MNEs is established to replace market (external) transaction with internal transaction. Coase (1973, says in Moosa, 2002) is of the opinion that market cost can be saved by forming a firm (p, 32). He gave an example of bottleneck encountered in purchasing oil product while compelling a firm to buy a refinery. These problems are caused by market failure and imperfection in intermediate goods, including technical know how, marketing and management enterprises (Moosa, 2002). MNEs invest in host countries in order to boycott expensive suppliers and distributors. Foreign government import restrictions will be avoided through local subsidy rather than exporting direct. Also the marketing aspect will be managed and controlled by the producing firm; there will be no intermediate sales or Value Added tax (Bennett, 1999). According to Dunning (2003), internalization incentive advantages are to protect or exploit mar ket failure (p.99). The Product Cycle Theory The theory was invented by Vernon in 1966. This theory explains the competitive advantage possessed by MNEs or potential MNEs originated in a country instead of another. The competitive advantage move from a stage of local production in home market, to exportation, and then to FDI (Dunning 2003). His theory was a based on U.S. directs investment in import substitution producing activities standards and economics structure. Also the ownership advantages of firms that produces or supplies a product had a little say about the advantages of common governance (Dunning, 2003). The theory is more useful in analysis of MNEs in FDI activities such as capital exportation, services activities, inward outward investment and so on. Core –Asset Theory Core Asset Theory was propounded by Hymer in 1976. Dunning said the theory explains the territorial expansion of a firm in terms of its exclusive or privileged possession of intangible assets, which it perceived could be utilized in a foreign country Dunning (2003, p.279). Several writers have to identify which O specific right were the most significant in determining the ability of MNEs to compete in foreign market. The theory examines the role of Foreign Service firms in market seeking sector, which is different from Product Cycle Theory focus on resources based industries or manufacturing sector. Also the theory was less concerned with where firms or MNES are located. According to Dunning (2003), the theory underestimates the important of the organizational mechanism by which the competitive advantage (Product Cycle Theory) is exploited (Dunning, 2003). The theory is limited to FDI or MNEs in technological advancement ,RD, position, product quality and so on, but it just examines the growth in foreign firms in global oriented and integrated service industries (Dunning ,2003). Strategy Related the Theories Knickerbocker, in 1973, was the first person to examine the strategy of MNEs. His analysis was that MNEs activities will be a function of high seller concentration. Dunning (2003) stated that Knickerbocker hypothesized that MNE activity would tend to be concentrated in industries characterized by high seller concentration, and that firms in those industries will engage in follow my leader tactics in the timing of their foreign investments, to protect or advanced their global competitive position (Dunning, 2003, p.280). Most studies on MNEs, the area of extraction, manufacturing and the likes was in support of this theory but the theory was less relevant in foreign firms activities in service industries because of its less oligopolistic nature (Dunning, 2003). However, these theory was fragile in MNEs with high level of diversification since one of the main aims of MNEs is expansion and diversify in area like service sector which may be outside their main activities which will create problem for the theory. The Risk Diversification Hypothesis The theoretical background of this hypothesis can be traced back to the theory of portfolio selection by Markowitz (1959) and Tobin (1958). The risk diversification hypothesis was propounded by Grubelin in 1968, but the idea was revisited and made known by Rugman in 1979. The hypothesis was that MNEs reduces the portfolio risk by diversification, which is investment in foreign assets that usually consist of service industries like banking, insurance, communication and so on. Most construction firm may want to make their working capital active by buying financial assets (Dunning, 2003). This kind of investment is not capital intensive. The Aliber Thesis Alibers (1970 1971, quoted in Dunning, 2003, p.280) seek to determine why firms pay their foreign assets in local currencies when they produce abroad. The theory explains that foreign firms take advantage of the home stronger currency to acquire ownership of assets in host economy due to their weak currency. Albert also argues that fluctuation in foreign exchange market that result to undervaluation or overvaluat