The Digital Divide Challenges

Introduction

Over the last couple of decades, people have experienced numerous changes as the world continues to embrace digital technology (Newell 30). However, the digitization effect has not spread across the world in an even manner, as people in some countries still do not have access to certain technologies already in use (Newell 38). Experts argue that most countries are currently dealing with the challenge of addressing the great digital divide in order to increase peoples ability to access digital technology.

According to the United Nations (UN), the digital divide refers to economic and social differences between regions, countries, and people that influence their knowledge and use of digital technology (Newell 43). It entails numerous inequalities in the world in terms of the way people from different socioeconomic classes have different degrees of access to digital technology and its related information (Rouse par. 1).

It further considers technological gaps between households, whereby people living in certain neighborhoods can have limited access to a certain type of technology while those from a different area have full access. Some of the digital technologies that have created a huge divide include the internet, television, cell phones, and personal computers, among others (Rouse par. 2).

Inequality in access to technology between countries is often referred to as the global digital divide. It is important to address the challenge of the digital divide because it will help to promote crucial elements such as democracy, sustainable development, high literacy levels, economic prosperity, and social growth among others (Rouse par. 4).

Efforts by the United Nations

The concept of the digital divide has changed a lot over the years. In the early 20th Century, it referred to inequalities in access to telephones (Servon 195). Towards the end of the same period, the digital divide included the element of accessibility to the internet. The main focus was on the inequalities in access to communication networks with a bandwidth that could be divided and shared simultaneously by multiple signals (Servon 206).

The concept of the digital divide in the 21st Century entails inequalities in access to technological tools such as personal computers. Over the years, the UN has made numerous efforts in a bid to increase the number of people across the world with good access to technology. Its biggest concern has been the growing trend in which the ability to access technology depends on whether one is rich or poor (Servon 214). Rich people have better access to technology compared to the poor.

This concept was triggered by differing levels of access to technology between developed and developing countries. One of the notable efforts by the UN in addressing this challenge has been promoting the use of Wi-Fi networks (Newell 90). This initiative was started in 2003, between the UN and numerous partners who aimed at bridging the digital divide. According to technology experts, increasing access to a wireless local area network can help bridge the digital divide gap, especially in developing countries (Servon 223).

The reason for this is that Wi-Fi networks can benefit several people at a particular time. In addition, the technology is inexpensive, unregulated, and easy to use (Servon 228). The UN identified the high cost of internet connection as one of the main causative factors of the global digital divide (Newell 101). This is a good idea because people will get a chance to gain more knowledge about digital technology.

Organizations that focus on dealing with the digital divide

Numerous organizations have taken the initiative of ensuring that people have better access to technology. One such organization that considers addressing the digital divide as one of its top agendas is the Knight Foundation (Martinez and Patel par. 1).

The organization has numerous programs geared towards helping people have better access to the internet and technological devices such as computers. Its first project was in Detroit in 2009. At the time, over 60% of households in the city did not have access to reliable internet and had no devices such as computers.

Their efforts are geared towards creating awareness by training people on technology and the use of digital devices. The foundation also aims at helping the poor neighborhoods in Detroit to have their own broadband network that would allow people in the city to access the internet from their homes (Martinez and Patel par. 2). Despite the organizations numerous efforts, it is yet to fully achieve its objective of ensuring everyone in Detroit has access to a reliable internet connection.

This challenge has been caused by a number of limitations, as clearly outlined in the report that the foundation released after the end of the first phase of the project (Martinez and Patel par. 4).

Some of the notable challenges include digital illiteracy, lack of internet-enabled devices, financial barriers placed by internet providers, high costs for internet access, and lack of reliable partnerships (Martinez and Patel par. 5). This is a good idea because the private sector is doing its best to complement efforts by governments in dealing with the digital divide.

The digital divide in South Africa

South Africa is one of the developing countries that have made major milestones in dealing with the challenge of the digital divide. The country has tried to ensure that its citizens have good access to technology despite having numerous social, economic, and political challenges (Reece 100). The telecommunication industry in the country was created in 1958. Over the years, it has experienced a number of changes due to effective state policies geared towards promoting the growth of technology.

One of the most effective strategies that the country has used in bridging the digital divide is the liberalization of the telecommunication industry (Reece 109). This means that no company can enjoy the monopoly of the industry because the government has created an environment that encourages competition among different service providers. According to experts, this policy has helped to improve peoples accessibility to technology due to reduced costs (Reece 117).

Reports indicate that over the last couple of decades, the number of schools in South Africa with computers has been increasing at a high rate. In addition, 39% of schools in the country are already using computers for learning. The country has introduced computer literacy into its curriculum for both primary and secondary schools, as the need to prepare the children for the fast-changing digital world continues to grow (Reece 127).

Despite these efforts, the government still reckons that there is a lot to be done before reaching the digital milestones achieved by developed countries. This challenge has been heightened by the reluctant nature of political leaders in developing policies that will create a way for massive changes in the countrys policy on technological development (Reece 133).

Conclusion

Addressing the challenge of the digital divide is crucial in promoting democracy, sustainable development, high literacy levels, economic prosperity, and social growth, especially in developing countries. In order to bridge the digital divide, it is important to ensure that people have access to digital devices that can enable them to access the internet.

Without essential tools such as computers, it is hard to achieve the desired levels of digital literacy essential for bridging the gap. In addition, the high cost of installing Wi-Fi networks and accessing the internet is still high for most people, especially in developing countries.

Works Cited

Martinez, Jorge, and M. Patel. Five Lessons in Bridging the Digital Divide. 2012. Web.

Newell, Alan. Design and the Digital Divide: Insights from 40 Years in Computer Support for Older and Disabled People. San Francisco: Morgan &Claypool Publishers, 2011. Print.

Reece, Catherin. The Digital Divide in South Africa: Identifying Emerging Inequalities in Internet Access and Online Public Spheres. Cape Town: University of Cape Town, 2008. Print.

Rouse, Margaret. 2014. Web.

Servon, Lisa. Bridging the Digital Divide: Technology, Community and Public Policy. New York: John Wiley & Sons, 2008. Print.

Security Management: Addressing Challenges and Losses

Challenge Description

In the environment of the 21st century, technological savvy seems to have become an inherent quality, as most people use online tools for a range of purposes for social to business ones. However, because of the lack of research on the identified realm, the issue of security remains the primary problem that needs addressing urgently. Although the security management area faces a range of challenges that must be managed in a manner as efficient and expeditious as possible, it is the human factor that has been the cause of concern since the very beginning of the technological breakthrough.

Because most users refuse to take the security issues and the related risks seriously, thus, neglecting a variety of safety and precaution measures, the instances of a personal and corporate data breach are getting increasingly common. With the rapid development of the software devised to trick people into providing their personal data, coupled with a complete lack of concern among most users, the security management process is getting increasingly more complicated and, therefore, requires a set of drastic measures aimed at increasing the users competency (Human factors in information security management systems, 2013).

Therefore, the lack of responsibility concerning compliance with the existing security rules can be considered the primary issue to be addressed in the context of security management. A recent report indicates that most people using the corresponding tools that provide them with security, in general, and information security, in particular, prefer to bypass the policies that they consider inconvenient: In fact, most employees say they are at least somewhat likely to look for security workarounds if they cant access their favorite applications or websites at work, according to a survey by Software Advice of 529 employees of U.S. businesses (Scarpati, 2016).

The lack of awareness on the subject matter would not have been a major obstacle on the way of improving the information security management process. Indeed, designing the strategy that would allow introducing people quickly and efficiently to the essentials of security in the workplace, as well as in their private use of the Internet and the related resources is not that hard.

However, the issue cuts much deeper, being related to peoples unwillingness to change their traditional behavioral patterns for something that they consider insignificant. In other words, a vast amount of audience takes security management very lightly when it comes to the use of the corresponding information security strategies (Ciupitu & Tudorache, 2015).

Therefore, the human factor can be viewed as one of the most drastic security-related issues that need to be managed as fast and efficiently as possible. No matter how well-built the security framework can be, there will always be a possibility of failure unless the people using the corresponding technological devices accept the existing safety standards and follow the instructions closely.

Therefore, the approach toward instructing people to comply with the guidelines and make decisions related to security management based on the existing standards needs to be designed. At the same time, the independence and initiative of the users should not be restricted or impaired. In other words, a gradual transfer from the current behavioral patterns to the desired ones will have to be accomplished. As soon as the people using the technology in question recognize the need to follow the existing security rules, the threat of data leakage will be reduced significantly.

Loss Prevention Assessment

Consistent auditing has been suggested as one of the means of addressing the issue, yet the strategy might use adjustments (Ahmad & Maynard, 2014). On the one hand, regular supervision of the security management process, as well as the suggestion that the staff members should submit reports regarding their application of the corresponding measures in the course of carrying out their routine tasks, deserves encouragement.

Making sure that the employees follow the set rules is crucial. However, it is also imperative to make sure that the staff members understand the significance thereof, as well as the gravity of the possible effects of incompliance. Differently put, there is an obvious need in challenging peoples concept of security in the workplace and making them realize the significance of following the existing security standards.

Therefore, apart from carrying out audits on a regular basis, the managers should consider the use of reports as the tool for assessing the loss prevention mechanism to be deployed in the context of the company. As long as the staff members realize the importance of following the standards set by the company as far as the security issues are concerned, and understand the implications of abusing these rules, the entrepreneurship is likely to avoid major information security risks.

Naturally, the process of assessment should also incorporate elements such as an overview of the recent updates made to the security management system. For instance, the software installed on the computers, the tools used to secure the intranet of the corporation from the invasion of hackers, etc. must be scrutinized in the most accurate way possible (Averweg, 2012). In addition, it is necessary to make sure that the routine actions, such as the regular change of passwords, should be carried out carefully and that the corresponding data should be stored in an appropriate manner.

However, as stated above, the focus should be on the human factor. Svensson (2013) makes a very valid point by reporting the tendency to apply personal judgments to the choice of security measures as one of the crucial concerns to be addressed in the future: Not only is it important to have rules covering what to do and not to do, it can also be relieving for the personnel not having to judge what is right and wrong themselves but instead refer to the policy when being restrictive (Svensson, 2013, p. 9).

The strategy outlined above, however, should not inhibit the employees willingness to develop independence as far as their work responsibilities are concerned. Instead, the people working for the company should consider the use of the appropriate tools and strategies as the extension of their responsibilities. In fact, the process of building security literacy among the employees should start with the promotion of the concept of Corporate Social Responsibility (CSR) as the foundation for the decision-making process in the context of the organization.

As soon as the target audience accepts the new philosophy of security management, they can be introduced to the courses that will help them increase their competencies in using the corresponding tools and maintaining the security rates high in the workplace. The courses, in their turn, must be viewed as a necessity, since the employees may require assistance in understanding the strategies for managing security rates and maintaining the latter high.

Reference List

Ahmad, A, & Maynard, S. (2014). Teaching information security management: reflections and experiences. Information Management & Computer Security, 22(5), 513-536.

Averweg, U. R. (2012). eThekwini Municipalitys intranet for augmenting knowledge-sharing in the organization. South African Journal of Information Management, 14(1), 1-6.

Ciupitu, S. A., & Tudorache, D. (2015). The management of the organization based over the informational system. Knowledge Horizons. Economics, 7(1), 41-44.

Human factors in information security management systems. (2013). Web.

Scarpati, J. (2016). Five essential network security topics and trends to watch. Web.

Svensson, G. (2013). Auditing the human factor as a part of setting up an information security management system. Stockholm: KTH Electrical Engineering.

Mobile Internet Consumption and Challenges

Not long ago, the mobile internet was something out of the ordinary. Today, telecom operators continue to increase the download speed thanks to the development of mobile broadband networks, so that the amounts of data transmitted by portable devices increase exponentially. While the mobile internet creates enormous communicational opportunities and becomes more easily accessible, there still exist some difficulties on the way to the all-encompassing fast and qualitative mobile internet coverage.

The advent of the mobile Internet is directly related to the development of mobile technologies. The first relatively limited but still working technology was WAP, which allowed to get Internet access through mobile operators and pay only for downloaded information (Mennecke & Strader, 2002). WAP nowadays is considered not a very successful initiative. Gao, Hyytinen and Toivanen in their research state that such failure was caused not by the low connection speed or absence of consumer demand but rather by groundlessly high prices (2014, p. 484). With the development of GPRS, the mobile internet became much faster and affordable. GPRS functioned on the principle similar to the ordinary Internet: the data was divided into packets and sent to the recipient and are assembled there. GPRS later was improved, and the EDGE technology was established (Ergen, 2009).

With the emergence of 3G in 2001 and later establishment of smart mobile devices, the mobile Internet entered into a new era. Nowadays, 3G covers major cities of the world and their suburbs. 3G is as well based on packet data but operates at ultra-high frequencies transmitting data at speeds up to 10 Mbit/s (Bidgoli, 2008). Of course, 3G was not the limit and ITC providers gradually developed and turned to even faster and more qualitative standard 4G. For the International Telecommunication Union, 4G is as a wireless communication technology that allows to transmit data at speed up to 1 Gbit/s by stationary objects and up to 100 Mbit/s by mobile devices (International Telecommunication Union, n.d.).

According to the Internet Society recent report, such development will cause the mobile internet spread of 71% worldwide by 2019 (2015, p. 9). However, this penetration will not be free from difficulties. The main problem with the mobile internet nowadays is that the volume of traffic in mobile networks is growing much faster than the operators build the required infrastructure (Bechmann & Lomborg, 2014). One may have paid attention to the fact that in crowded public places mobile internet runs either very slowly does not work at all. This phenomenon is akin to a traffic jam  the operator infrastructure limits are tightly stuffed by the subscriber traffic. The traffic on cellular networks confidently shows exponential growth, which rates from 50 to 100% in different countries, and the end to this trend is not visible. The primary reason of such capacity crunch is the smartphone revolution that led to the spread of mobile use popular services. Moreover, mobile traffic is consumed and generated more and more uneven in space; this further aggravates the lack of capacity of cellular networks in the hot spots (Rodriguez, 2015).

As Frietshe notes, the main problems of the mobile internet are an adequate quality of service and a reasonable level of security (2013, p. 122). Indeed, the access issues, personal information exposure, mobile cyber attacks become significant threats to the mobile internet users (Internet Society, 2015). Their devices become their alter ego and the harm caused to them may affect the person significantly.

In general, the rise of mobile internet consumption will bring both positive and negative consequences for operators and users. On the one hand, smartphone users become directly dependent on access to the Internet in carrying out their daily tasks. On the other hand, the operators will have to invest more in the infrastructure of new networks and to optimize the existing ones, as the average revenue per user will decline due to competition and other factors.

References

Bechmann, A., & Lomborg, S. (2014). The ubiquitous Internet: User and industry perspectives. New York, NY: Routledge.

Bidgoli, H. (2008). Handbook of computer networks. Hoboken, NJ: John Wiley & Sons.

Ergen, M. (2009). Mobile broadband including WiMAX and LTE. New York, NY: Springer Verlag.

Frietshe, W. (2013). IPv6 based mobile routing. In C. McDonald (Ed.), Converged networking: Data and real-time communications over IP (pp. 121-145). New York, NY: Springer Publishing.

Gao, M., Hyytinen, A., & Toivanen, O. (2014). Problems in launching the mobile internet: Evidence from a pricing experiment. Journal of Economics & Management Strategy, 23(3), 483-506.

International Telecommunication Union. (n.d.). . Web.

Internet Society. (2015). Global internet report 2015: Mobile evolution and development of the internet. Web.

Mennecke, B., & Strader, T. (2002). Mobile commerce technology, theory, and applications. Hershey, PA: Idea Group.

Rodriguez, J. (2015). Fundamentals of 5G mobile networks. Chichester, UK: John Wiley & Sons.

Regency Plazas Project Management Challenges

Some of the major challenges facing the Regency Plaza project include frequent changes, poor emphasis on quality, and delays. Due to the frequent changes introduced in an attempt to satisfy consumers, several condominiums underwent modifications, and thus, their completion delayed. Since the project manager wants the contractor to use the shortest time to complete the project, while minimizing the cost of construction, project completion has to be fast.

Minimal costs and speedy nature of construction has led to several developments that are substandard and require adjustments. The adjustments and frequent changes have led to disagreements among the project manager, the hotel management, and contractors, who complain that the cost of construction is rising and the changes slow the pace of the project.

The Millers unit is facing various challenges that comprise delays and increased cost of purchase. Imperatively, the closing date of the Millers unit changed from June to August, and hence, instigated a delay affecting the initial agreement. The feature of extending completion date had serious effects on the Millers, who had finalized their arrangements concerning the unit.

Additionally, even after extension of the closing date, very little activity has continued on the unit thus, clarifying the fact that the unit might take more time to attain full completion. Besides the delay, the unit also requires several adjustments, which has prompted the project manager to send several invoices to the Millers requesting money to facilitate the adjustments. Increased invoices not only affect the purchasing agreement, but also inconvenience the Millers financial plans.

The root causes of the major challenges facing the Millers unit include untimely changes and absence of consultations. Notably, the interior designer changed several parts of the unit during the last period when the project was almost attaining full completion. As a result, the project manager had limited time that inhibited consultations.

In case of consultations, the project would not attain completion at the right time. Inhibited consultation occasioned from the fact that it would take several weeks and delay the project. Therefore, the project manager decided to continue with the project downplaying consultations, a factor that initiated development of a substandard unit. Fundamentally, it is evident that the interior designer did not consult with the project manager, but made the changes alone.

Some of the initiatives that the project manager was to undertake in solving the root causes of the challenges comprise high levels of supervision and extensive consultations. Through high levels of supervision, detection and correction of serious changes like those made by the interior designer could materialize during the early stages.

Early detection and correction of unwanted changes implied that the project would attain full completion at the right time and meet the required standards. Moreover, the project manager needed to engage in extensive consultations so that the project would attain the required standards and instances of poor developments would reduce. It is important to elucidate that delay of the project could be better than speedy construction that resulted in development of substandard units.

Among the options that Hodgkins has for the Millers unit, the most desirable option is to tell the Millers that customization of the unit cannot materialize at the agreed time. Based on the option, the Millers will make the adjustments themselves after the contractors close on the unit. It is imperative to understand that communication is a very important element that facilitates effective service delivery and provides a good framework for redress. By communicating to the Millers, a productive solution, which best solves the problem, is attainable.

Project Cost Management: Global Issues and Challenges

The article written by Smith is focused on the project cost management profession. In particular, the author examines those global problems and challenges that are faced by its representatives. The information revealed by the author is likely to be beneficial for those individuals who are occupied in various fields but provide cost management services in the framework of the global construction industry. The necessity to develop the discussed paper can be explained by the existence of numerous high profile projects that are associated with critical resource overruns. Such issues faced at all project levels made Smith consider the possibilities of more efficient cost management.

The author states that cost management professionals are often not obliged to be registered as professionals in the field. That is why many of them do not have the experience required for high-quality services and have poor specialist technical competencies. The article discusses those problems that are faced by these individuals to provide recommendations that can improve cost performance.

Smiths work is based on a literature review so it reveals true to life experiences of professional cost management associations. In particular, the sample includes authoritative sources that discuss information about seven organizations, such as the International Cost Engineering Council, the Royal Institution of Chartered Surveyors, and the Association for the Advancement of Cost Engineering, etc.

The researcher states that projects with under-estimated costs have a negative influence on both developed and developing countries gross domestic product, as about 90% of their construction projects are proved to have cost overruns up to 100%. Due to globalization, those organizations that operate in the construction and infrastructure market are brought together. For the representatives of developed and developing countries to establish equality considering project cost management, a set of standards, competencies, and certification programs should be established.

The research methodology selected by Smith provides an opportunity to identify those challenges and issues that are major ones for professionals. Numerous discussions and meetings that have been held between 2010 and 2013 are selected as the major source of information for research. In particular, they are associated with the International Cost Engineering Council and its key members. The author examines these materials thoroughly, which provides him with an opportunity to point out problems observed at global and regional levels. Analyzing this information, he also manages to speak about the future needs of professionals and the whole industry.

According to Smith, the major issue is the failure to identify the profession globally. Different scientists resort to a variety of terminology so that no universal description of the profession exists. As a result, it is not possible to make numerous counties establish the same standards. Their absence restricts the profession and makes it difficult to work towards global goals. Finally, those practices that are provided by professionals all over the world differ significantly.

As knowledge is not shared and common standards are not established, developed, and developing countries perceive associated services in different ways. In addition to these global problems, each region faces its peculiar problems. For instance, the project cost management profession is not equally established in North and South America, and Canada. Disciplines associated with this profession in Europe are very disparate. The influence of the Middle and Far East firms on the international ones is enormous. African professionals do not receive enough knowledge and experience from other countries. Finally, the Asia Pacific recognized the cost management profession only recently. However, it develops rather fast, facilitating its global expansion.

Based on the discussed information, the author of the article developed eight recommendations that are meant to streamline global recognition of the profession and minimalize issues and challenges faced by it. First of all, Smith urges the creation of global leadership that can be represented by a global association of cost management professionals. He believes that in this way, professional standards can be easily shared among different counties.

In addition to that, he considers the creation of a single professional title to be critical because it affects the way this profession is perceived. Global professional standards and certification should be developed to share common bodies of knowledge and ensure the quality of provided services. ISO standards should be created to facilitate the institutionalization of the profession. The development of certification programs can ensure that all professionals receive needed education and can cope with their duties.

Interaction with the key global organizations can be advantageous as it facilitates international cooperation. Recognition by the World Trade Organization can provide professionals with numerous benefits. Finally, the transportability of services is needed for them to be used internationally.

All in all, I believe that Smith managed to fulfill the purpose of his research successfully. He identified those major issues that are faced by the project cost management profession at both regional and global levels. Moreover, he provided a range of recommendations, revealing how they can be overcome. To my mind, the author used authoritative and reliable sources, which proves that his conclusion can be trusted. However, it would be advantageous if he supported his recommendations with some evidence instead of simply sharing his personal views. Moreover, it would be great if he discussed some ideas revealed by professionals, for instance, their perceptions of the current state and their hopes for the future.

The Projects Implementation: Challenges and Difficulties

As the matter of fact, the success of the organization is highly dependent on the projects the company implements into the working process. The managers should be flexible in the decision-making process and try to evaluate the chances of the projects success from the very beginning. The primary purpose of the report is to provide the recommendations regarding the question whether the future projects will beneficially influence the client organization.

Aim of the Project

The analysis of the potential milestones and accomplished phases of the project are significant to take into consideration as it may provide the understanding of the potential success of the project. The fundamental aim of the project is to improve the work of the remote offices by innovation in the sphere of communication in the building. The outcome is seen in terms of advancing the work of the employees and facilitating the connection between the workers and customers to improve the quality and delivery of service. To trace the triumph of the project, the accent should be laid into its lifecycle.

Timeline

Despite the fact that the project exceeded the limitation time, it should be pointed out that the reason for it was the limited timeline that was not focused on the practical side of the issue. However, the practice cannot be excluded from the lifecycle of the project. The company made a long way towards the evaluation of the shortcomings of the present system, software, discovering the best suppliers, and creating the strategy that would satisfy the objectives of the project. It worth stating that the task was challenging, time-consuming, and demanding. Although the completion of the stage required more time than supposed, the company took right decision as the question of eliminating risks received the priority.

Execution

The stage of execution was accomplished before the deadline, and it encompassed the following phases, namely procurement, ordering, and delivery. After the installation of the software was completed, the employees took part in the training program that helped to get better involved in the changes made and be ready to work with the advanced software. The company examined the work of the new software and provided the in-depth comparatively analysis regarding the work of the previous and newly implemented system.

The company followed the plan; however, the accent was made on the successful performance rather than keeping pace with the schedule. The testing period and the feedback of the workers are essential factors that should be taken into consideration to improve the working process. It will be beneficial for the future implementation of similar projects. The company understands the possible risks and aims to reduce the chance of it.

Conclusion

In conclusion, it should be pointed out that despite the company faced a number of challenges and difficulties during the implementation of the new system and working on the project, the organization managed to deal with the problem and perform successfully. The prosperity of the company depends on the highly professional staff and ability to make right decisions and be flexible. Challenges cannot be omitted while working with the project; however, eliminating risks and being responsible for the outcome contributes to the positive development.

Ability to choose right strategy and to focus on the needed projects is an essential aspect that influences the success of the company. The client organization should take the above stated into account as the success of the company depends on the quality of the project performance.

Security Management: Addressing Challenges and Losses

Challenge Description

In the environment of the 21st century, technological savvy seems to have become an inherent quality, as most people use online tools for a range of purposes for social to business ones. However, because of the lack of research on the identified realm, the issue of security remains the primary problem that needs addressing urgently. Although the security management area faces a range of challenges that must be managed in a manner as efficient and expeditious as possible, it is the human factor that has been the cause of concern since the very beginning of the technological breakthrough.

Because most users refuse to take the security issues and the related risks seriously, thus, neglecting a variety of safety and precaution measures, the instances of a personal and corporate data breach are getting increasingly common. With the rapid development of the software devised to trick people into providing their personal data, coupled with a complete lack of concern among most users, the security management process is getting increasingly more complicated and, therefore, requires a set of drastic measures aimed at increasing the users competency (Human factors in information security management systems, 2013).

Therefore, the lack of responsibility concerning compliance with the existing security rules can be considered the primary issue to be addressed in the context of security management. A recent report indicates that most people using the corresponding tools that provide them with security, in general, and information security, in particular, prefer to bypass the policies that they consider inconvenient: In fact, most employees say they are at least somewhat likely to look for security workarounds if they cant access their favorite applications or websites at work, according to a survey by Software Advice of 529 employees of U.S. businesses (Scarpati, 2016).

The lack of awareness on the subject matter would not have been a major obstacle on the way of improving the information security management process. Indeed, designing the strategy that would allow introducing people quickly and efficiently to the essentials of security in the workplace, as well as in their private use of the Internet and the related resources is not that hard.

However, the issue cuts much deeper, being related to peoples unwillingness to change their traditional behavioral patterns for something that they consider insignificant. In other words, a vast amount of audience takes security management very lightly when it comes to the use of the corresponding information security strategies (Ciupitu & Tudorache, 2015).

Therefore, the human factor can be viewed as one of the most drastic security-related issues that need to be managed as fast and efficiently as possible. No matter how well-built the security framework can be, there will always be a possibility of failure unless the people using the corresponding technological devices accept the existing safety standards and follow the instructions closely.

Therefore, the approach toward instructing people to comply with the guidelines and make decisions related to security management based on the existing standards needs to be designed. At the same time, the independence and initiative of the users should not be restricted or impaired. In other words, a gradual transfer from the current behavioral patterns to the desired ones will have to be accomplished. As soon as the people using the technology in question recognize the need to follow the existing security rules, the threat of data leakage will be reduced significantly.

Loss Prevention Assessment

Consistent auditing has been suggested as one of the means of addressing the issue, yet the strategy might use adjustments (Ahmad & Maynard, 2014). On the one hand, regular supervision of the security management process, as well as the suggestion that the staff members should submit reports regarding their application of the corresponding measures in the course of carrying out their routine tasks, deserves encouragement.

Making sure that the employees follow the set rules is crucial. However, it is also imperative to make sure that the staff members understand the significance thereof, as well as the gravity of the possible effects of incompliance. Differently put, there is an obvious need in challenging peoples concept of security in the workplace and making them realize the significance of following the existing security standards.

Therefore, apart from carrying out audits on a regular basis, the managers should consider the use of reports as the tool for assessing the loss prevention mechanism to be deployed in the context of the company. As long as the staff members realize the importance of following the standards set by the company as far as the security issues are concerned, and understand the implications of abusing these rules, the entrepreneurship is likely to avoid major information security risks.

Naturally, the process of assessment should also incorporate elements such as an overview of the recent updates made to the security management system. For instance, the software installed on the computers, the tools used to secure the intranet of the corporation from the invasion of hackers, etc. must be scrutinized in the most accurate way possible (Averweg, 2012). In addition, it is necessary to make sure that the routine actions, such as the regular change of passwords, should be carried out carefully and that the corresponding data should be stored in an appropriate manner.

However, as stated above, the focus should be on the human factor. Svensson (2013) makes a very valid point by reporting the tendency to apply personal judgments to the choice of security measures as one of the crucial concerns to be addressed in the future: Not only is it important to have rules covering what to do and not to do, it can also be relieving for the personnel not having to judge what is right and wrong themselves but instead refer to the policy when being restrictive (Svensson, 2013, p. 9).

The strategy outlined above, however, should not inhibit the employees willingness to develop independence as far as their work responsibilities are concerned. Instead, the people working for the company should consider the use of the appropriate tools and strategies as the extension of their responsibilities. In fact, the process of building security literacy among the employees should start with the promotion of the concept of Corporate Social Responsibility (CSR) as the foundation for the decision-making process in the context of the organization.

As soon as the target audience accepts the new philosophy of security management, they can be introduced to the courses that will help them increase their competencies in using the corresponding tools and maintaining the security rates high in the workplace. The courses, in their turn, must be viewed as a necessity, since the employees may require assistance in understanding the strategies for managing security rates and maintaining the latter high.

Reference List

Ahmad, A, & Maynard, S. (2014). Teaching information security management: reflections and experiences. Information Management & Computer Security, 22(5), 513-536.

Averweg, U. R. (2012). eThekwini Municipalitys intranet for augmenting knowledge-sharing in the organization. South African Journal of Information Management, 14(1), 1-6.

Ciupitu, S. A., & Tudorache, D. (2015). The management of the organization based over the informational system. Knowledge Horizons. Economics, 7(1), 41-44.

Human factors in information security management systems. (2013). Web.

Scarpati, J. (2016). Five essential network security topics and trends to watch. Web.

Svensson, G. (2013). Auditing the human factor as a part of setting up an information security management system. Stockholm: KTH Electrical Engineering.

The American Red Cross Action Plan in Haiti Challenges

Introduction: Background Information

The American Red Cross is a humanitarian, non-profit organization that has been organized by volunteers and guided by its Congressional Charter, as well as the fundamental principles of the International Red Cross and Red Crescent Movement (The American Red Cross, 2011). The venture provides help to people who became the victims of natural disasters and catastrophe so as to prevent and react to the emergencies.

Two years ago, the population of Haiti suffered from a 7.0 earthquake leading to significant destructions and leaving millions of people without home (MyFox, 2012).

Minnesota, along with other U.S. states, responded actively to the disaster and donated a significant sum of money for improving the situation in Haiti. Now, the Red Cross has introduced a two-year report on the efforts and actions taken in Haiti to relieve the population (MyFox, 2012). The report presents significant progress in front of serious challenges, but some of the presented facts can lead to negative publicity concerning the action plan (MyFox, 2012).

The point is that the American Red Cross got nearly $486 million in donations whereas $330 million were spent only on Haiti recovery efforts (MyFox, 2012). One the one hand, many questions arises concerning the remaining sum of money. One the other hand, the Red Crosss campaign has not been completed yet and, therefore, there are no reasons for rushing in conclusions concerning the money left.

As the world-known non-profit organization, the Red Cross should introduce a new form of reporting through publicly presenting information about financial matters. In such a way, it is possible to enhance information transparency and accuracy to ensure the population of their donations invested to prevent disasters. Specifically, the report does not only improve communication and relations with outside stakeholders, but also attract more investors. Using a mix of media resources, therefore, can become a valuable contribution.

Mix of Media for Implementing Public Relations Campaign

Introducing different form of media for promoting publicity and transparency for organizational activities is vital because it will allow the Red Cross to create a favorable environment, as well as provide improvement to such aspects as information exchange, cultural diversity, and organizational performance.

The introduction of an action plan therefore will be significantly fostered if favorable relations with different forms of media are introduced. In this respect, newspaper services can contribute to highlighting the most important issues outlined in a sustainability report that will be released for monitoring how financial funds are distributed.

Second, creating the Red Cross Haiti Website uncovering financial expenditures, along with related purpose and mission, will also be a valuable introduction because each online user can receive an access to the information. At this point, online websites can be available to all the parties that are interested in the activities of the organization. This is of particular concern to the investors who are extremely interested in the way their money is allocated.

Finally, improvement of communication channels is possible through introducing news reports outlining financial activities performed by the non-profit organization. In addition, using social networks will also be helpful for informing about a new organizational culture in Red Cross. For instance, the organizations representation can distribute information through social network channel in a much quicker way than posting news on their official site.

Such a mix of media devices can significantly progress the initiated public relation campaign and provide a fresh insight into further fruitful cooperation of the organization with media sources. Besides, using media devices also provide clarity to all the operations performed within the organizational framework.

Establishing Community Relations to Generate Positive Publicity for the Red Cross

Using the above-established media means can significantly promote communitys understanding the policies, purposes, and mission pursued by the Red Cross due to the many reasons. First of all, the community relations promotion can increases peoples awareness of the existing problems related to natural disasters.

Therefore, recognizing the seriousness of the problem, as well as the fact that their help will be used to a full extent, they will be more likely to invest money into different volunteer programs for rescuing people. Second, introducing transparent and accountability report provides greater publicity and decreases the chances of mass media distort the received information. Avoiding misconception and giving a clear and substantial explanation of actions is step forward to creating a healthy environment within the organization.

In this respect, organizational performance can also be significantly improved with regard to the changes in the reporting system. Third, introducing sustainability reporting can deprive the Red Cross of the problem of localizing large amounts of information. These reports can be released on a regular basis so that the community will be informed about its release and be able to read everything that is connected to the organizations financial activities.

Finally, using new media resources for spreading information can contribute to the development of a powerful international framework that can take greater control of the problems at a global level. Hence, introducing sustainability reports to social media channels creates novel opportunities for advancing communication and social interaction.

Governmental Relations Tactics for Achieving Objectives

The Red Cross is headed by the Board of Governors who are in charge of management of the organization (American Red Cross, 2012). They apply to a series of documents that are periodically reviewed to meet the main purpose and accepted standards within an organization.

To take a better control of all the process, it is imperative to establish favorable relations with governments in the international space that can contribute to greater monitoring of the current problems. At this point, establishing favorable communication with the government can create much more opportunities for the American Red Cross to embark on effective governance reform through introducing sustainability reports to the governmental officials.

Such a tactics will not only provide greater respectability and authority to the organization, but expands censorship on media intervention into the organizations activity. Giving financial issues to publicity can also be encouraged by governmental strategies and reforms in the sphere of natural disasters. In such a manner, an international cooperation can strengthen the overall strategies and missions and advance the development of a new public relation campaign.

Because the governments deals primarily with controlling financial inputs and outcomes, the organizations reporting to the authorities can greatly facilitate goals accomplishment and provide a fresh insight for developing new perspectives of financial informing.

A News Release Draft

Sustainability Reporting: Reaching Transparency through Giving the Financial Statement to Publicity

A new form of reporting can provide a deeper account on financial operations and investment in different kinds of rescue operations. The new release will expands on the following issues:

  1. Regular exposition of financial investment made on a voluntary basis;
  2. Volunteers activity, including stage of all operation accomplishments;
  3. Expenditures on buying the equipment, materials, and other resources necessary to rescuing activities;
  4. Posting the material about incoming investment and immediate distribution of financial investment;
  5. The new release will be provided on the eve of sustainability report presentation to inform the concerned parties, including media and government, about the upcoming event.

With regard to the above, a news release example will look as follows:

The American Red Cross is seeking for more efficient opportunities for presenting accurate and clear information. Due to the interventions of mass media, some of our activities are distorted in different newspaper articles and online blogs.

Therefore, it is rational to introduce a website informing the U.S. citizens of all our financial activities to introduce transparency to business communication. The team leaders will be invited to think over the structure and main aspects of sustainability report, as well as discover which media coverage sources can be used to highlight the most important issues in the report.

The American Red Cross hopes that introducing effective business reporting will encourage people invest more money in their activities and contribute to rescue operations conducted by volunteers. They assure that each dollar is spent for the purpose of saving lives and improving welfare of people who suffered from natural disasters.

As per the content, the proposed news release will inform the public about the structural change within an organization, as well as about the benefits those change bring in to the employees and to the public in general. Business reporting and emphasis on financial issues, therefore, can provide a useful insight into the basic activities of the American Red Cross. The reasons for introducing changes will also be highlighted.

Importance of Content, Style and Essentials for Persuading the Public

Business reports are powerful tools of public influence because they render information about companys activities by visualizing their actions through figures, tables, charts, and statistics.

This kind of approach is closely associated with rhetorical devices contributing to revealing financial discourse in disaster prevention discourse. Specifically, reaching communicational goals in a business discourse is possible through presenting the context in a persuasive and polite way (Trosborg & Jogensen, 2005, p. 13). More importantly, business reports that will be given to publicity should also take into consideration cultural diversity and, therefore, neutrality is also among the main attributes of successful report writing.

Failure to adhere to the established standards can provoke misunderstandings because different disciplinary requirements have essential differences. In this report, appropriately written business reports can become powerful instruments of public influence. Releasing sustainability reports publicly can enhance the reputation of the Red Cross and encourage people take an active part in their organizational activities.

Aside from style of writing, content also has a significant impact on public consciousness. Specifically, it is a false belief that lengthy and ambiguous sentences being full of appraisals and exaggerations can attract public attention. On the contrary, the accurate and laconic representation of information will contribute to clarity and effectiveness of business content presentation.

According to Hartley and Bruckmann (2002), even if you work in an organization, which has very strict rules about how letters and reports are representation, you will still have to make choices about which words and phrases to use, how to organize your paragraphs and so on (p. 164).

Therefore, stylistic and content choices are essential for creating a business report that should have an appropriate tone and content and provides a relevant business style. Specifically, such aspects of business report writing as brevity, emphasis, clarity, and accuracy are important criteria for success.

References

American Red Cross (2012). Media Requests. Web.

Hartley, P., & Bruckmann, C. G. (2002). Business Communication. New York: Routledge.

MyFox. (2012). What Happened to You Haiti Earthquake Donation? Web.

The American Red Cross. (2011). Mission Statement. Web.

Trosborg, A., & Jorgensen, P.E.F. (2005). Business Discourse: Texts and Contexts. US: Peter Lang.

Transgender Students on Colleges: Needs and Challenges

Transgender

Transgender is a term used to define a variety of groups of people who portray a deviation from the conventionally set gender identities. It is a case of ones identity and has completely nothing to do with an individuals sexual orientation because a transgender person can be heterosexual, bisexual, poly-sexual, pansexual, asexual or even homosexual (Beemyn, 2005, ).

Transgender is a state of the person not identifying with the assigned gender, which is mostly because of appearance or genetics. In order to accommodate all the involved groups of people, there is no attributed definition of transgender due to the diversity of the subject.

It is important therefore to note that a transgender person may portray characteristics of a given gender, or identify in a different place in the gender continuum or fail to associate with any of the traditional gender identities.

According to Carter (1999), the definition of the term transgender keeps on evolving and therefore the meaning is dynamic. There is a need therefore to understand what is inclusive in the transgender definition through comparing it with other related terminologies.

The term transsexual has its origin in the medical and psychological disciplines. Many people under the category of transsexuals have the belief that for one to fit in the category completely, they have to undergo a surgery (Beemyn, 2005, p.80).

It is however possible to reassign this change of gender simply by the administration of the hormones estrogen and testosterone. The sexual reassignment surgery (SRS) sets the foundation for the transition from one gender identity to the next or even settling in between for transsexuals.

Transsexuals are therefore considered as components under the umbrella of transgender. This follows the simple logic that the transsexuals undergo the transition for the desire to identify with a gender different from the one they were assigned at birth by considering their genitals.

Identities inclusive in transgender

According to Beemyn (2005, p.34), there is a number of overlapping identities that can be included in the transgender bracket. This includes the Cross-dressers/ transvestite, adrogynes, gender queer, drag queens and kings, and transsexuals.

The category of transvestite fetishists is not included in transgender because it is regarded as rather a paraphilia and not a gender identity. In order to be considered a transgender, the person must portray the desire to identify with a sex different from the one that they were assigned at birth (Carter, 1999, p. 45).

This leaves out the category of those people who are intersex. These people have characteristics such as genitalia that do not conform strictly to the definitions of the traditional alignments of gender. These people cannot be strictly transgender considering that they do not necessarily disagree with their assigned gender or current identity.

The condition of portraying the desire to identify with the opposite sex has however been contested by some scholars interested in the discipline. These include Bilodeau (2005, p.30), who states that by choosing that as a determining factor, an equally important group; the cross dressers/ transvestite will be left out.

This is because according to his definition of cross dressers, the people involved do not desire to identify with the opposite sex but only fancy wearing clothing that belongs to the opposite sex not because they want to feel like the opposite sex but simply because it is of the opposite sex.

This locks out those people who dress clothes belonging to the opposite sex for other reasons. A clear understanding of the challenges and the needs of students under this category is important to ensure that their welfare is catered for.

Challenges

Discrimination

According to Beemyn ,most institutions of higher learning have gender exclusive policies that marginalize the transgender students (2005, p.77).Cases have been recorded whereby transgender students feel completely out of place due to the policies that are in place in their institutions of learning.

He explores the forms of discriminatory policies that exist in these institutions. For instance, he gives an example of a situation from Ohio State University where the campus admission form expects applicants to check either the M or F boxes for their gender (Beemyn, 2005, p. 34).

In this case, transgender students wishing to join the university felt completely left out in the process since some are not fully aware of where they belong. Beemyn (2005) goes further to address the different challenges that the students face in accessing services from different facilities in the campuses and colleges (p.102).

For instance, in the halls of residence, there is a tendency by most institutions to brand a given hall as belonging to either male only or females only. This makes it difficult for transgender students to take campus housing as an option since they already feel left out by the system.

Disapproval

A more personal problem that transgender students face is that of disapproval. They encounter hostility due to their changing or already changed identities (Lombardi, Wilchins, Priesling, & Malouf, 2001, p.100). Worth noting is that people consider this a source of violence and harassment.

Hate crimes directed to the transgender students is rampant in many institutions of higher learning (Beemyn, 2005, p. 100).

In situations where these students are faced with harassment and there are no organs put in place by the institutions to help them, some end up dropping out of school or getting psychologically affected which results into poor academic performances by the students.

Some of the students have testified having faced disapproval that has eventually affected them to an extent to dropping out of school. This is worse especially when the disapproval and lack of necessary support is also present at the students home (Carter, 1999, p. 78).

According to Beemyn (2005) students who face disapproval, both in their homes and in campus were the most affected (p. 45). This in most cases results to depression and the student can no longer concentrate with his/ her studies.

Depression

The negative attention that transgender students receive results to depression. One of the most rampant occurrences is that of transgender students developing stress that deteriorates to depression. These students are abused, mistreated and worst still experience violence directed towards them simply because of their state.

When depressed, these students cannot concentrate with their studies and their overall performance is greatly affected. A good example in where a student was insulted by being called a fag and a queer simply because he looks effeminate (Beemyn, 2005, p. 34).

This must have been a tough time for the student who had to balance his social identity and his academic work to make sure that he excelled in his endeavors. Such treatment directed on transgender students is a major cause of concern since it is also the biggest cause of depression to the students.

Most learning institutions lack enough facilities such as counseling centers to assist transgender students who find themselves caught up in such situations. This further contributes to the depression since the students tend to feel that no one cares for them and that they are all by themselves.

Fear of their life after campus

Transgender students live with the fear that they may face more problems in the future when they come out of their present institutions (Herbst, & Malaney, 1999, p. 43). These fears include the fear that they might not get work in their respective areas of specialization when other people discover the truth about their identities.

This is mostly in cases where by the employers or the faculty members might have a phobia and treat them harshly or deny them chances based on their identities. Some institutions in the society have policies that do not tolerate transgender people and the particular student might have interest in the specific area (Lees, 1998, p.23).

As given in the example of the Ohio State University by Beemyn, transsexual students wonder and express fear in what to expect in the future, where they strive desperately to have their gender changed in the records to reflect their current appearance. They also express fears about how others will receive them when they get out finding jobs.

Because of this fear, these students are always psychologically affected and this worry fills a portion of their minds where they should be receiving new knowledge from their teachers and professors.

These worries also confuse some students when it comes to career choice since they become confused as what to do to impress others at the expense of their happiness and personal satisfaction.

Sexual harassment and abuse from others

There are reported cases in many institutions of higher learning where transgender students are victims of sexual harassment and abuse from their colleagues (Lombardi, Wilchins, Priesling, & Malouf, 2001, p. 93).

This is mostly in cases where the institutions have no consideration of transgender students especially when it comes to the assigning of amenities such as bathrooms, restrooms and residential halls.

A good example is a case where a teacher might force a transsexual student to share a room with a bully who discovers the state of the other student and harasses him or her.

Lombardi (2001, p.89) states that these cases have been rampant in most institutions and little has been addressed concerning the efforts that are being put in place to curb such a crime.

Due to the fear of attracting unnecessary attention towards themselves, the students who become victims of their situations end up depressed and some result to desperate measures to liberate themselves while keeping it as a secret.

There have been cases where by transsexual students who are victims of sexual abuse result into murdering their predators in order to seek their redemption. In fact, most people do not always consider such incidences when dealing with the investigation of such crimes, which leads to the real problems, which the people including teachers and parents leave unsolved by the end of the day.

Low self-esteem

Institutions such as colleges and universities are supposed to prepare students for the tough challenges of adulthood that people need to address with a lot of self-confidence and esteem.

Due to the problems encountered by the transgender students in their social life, it becomes quite difficult for them to develop self-esteem since colleagues and other people they interact with always look down upon them.

In some institutions, this is worse to the extent that a transgender student cannot make a class or a school presentation without others booing them (Pusch, 2005, p.62). This makes the students to feel out of place and always lacking their own confidence.

There are many incidences where transsexual students face a good deal of ridicule from their closest friends because of their state. Since most cannot do a thing to change their current situations, they end up recoiling in themselves and as a result, their composure and overall self-esteem is lowered (Currah, Minter, & Green, 2000, p.68).

Lack of proper representation

In some colleges especially those that are of the conservative type, transgender students face the problem of people not representing them as well as not giving a forum to their problems where they can be addressed (Lees, 1998, p. 41).

This results to the problems that they face failing to be addressed fully and they end up collapsing under the weight of their challenges. However, though some institutions claim to represent fully the minority groups, they do not tackle appropriately the issue of transgender students based on their failure to address their problems to satisfaction.

Needs of transgender students

Full representation

To address the issue of transgender students often feeling left out, invisible or underrepresented, the college and campus administrators should incorporate in their systems a more inclusive education program that allows the full participation of transgender students (Lees, 1998, p.43).

Lees continues to state that the formation of associations that would act as forums for the students to share their experiences is a major need that any institution that is aimed at improving the environment to suite all groups of students and facilitate their academic excellence cannot disregard (1998, p.54).

The programming of activities in the colleges and campuses should be such that they all-inclusive. As argued by Beemyn (2005, p.39), these activities contribute to the development of the students.

There should be certain times while the activities should be specially designed to suite the transgender students for the reason of making them feel appreciated and completely part of the system.

Support

In most institutions, people address transgender issues together with that of the lesbian, gays and bisexuals (LGB) (Putsch, 2005, p.112).

However, in most cases despite these organizations having the inclusive mandate of addressing the issues of the bisexuals, they end up not solving them by the end of the day. This is mostly the case for transgender students who identify themselves as heterosexuals (Beemyn, 2005, p.56).

In order to receive this full support, transgender students need to form their own separate associations that will look into their issues separately to ensure that every issue related to transgender is reviewed and addressed accordingly. This is always possible when there is a supportive climate in the campus (Currah, Minter, & Green, 2000).

All inclusive policies

The evident discriminatory policies in virtually all campuses affect transgender students largely. The situation therefore calls for the need to amend most of the nondiscrimination policies of these institutions that include the selection of the categories of sex or sexual orientation to cover the transgender people.

In this case, people should perceive their gender expression rather than their biological gender without any interrogation as the gender identity of the student (Beemyn, 2005, p. 37).

Confirming the Love (1999, p.295) states that there are other instances whereby a transgender student wants to change the identity that is currently reflected on their documents. In these instances, the procedure to do so should be an easy one to ensure that they can do so without any form of disapproval or rough interrogation.

All inclusive housing in the campus

Most institutions have housing policies that assume that all of the students are either male or female. These policies are dangerous in that they discriminate against the transgender students and expose them to trans-phobic sexual violence and harassment.

Therefore, the responsible people should amend these policies to address the concerns of transgender students especially those who are in the process of transition from one gender to the other. There should be separate residential halls for transgender students rather than simply labeling them as for males and females only (McKinney, 2005, p.102).

When the amendment of these policies takes place with the housing of students in campuses becoming all-inclusive, the transgender students will feel appreciated based on the observance of their privacy. When they share halls of residence, they coexist easily with one another since they understand each other.

Privacy

According to Bochenek and Brown (2001), institutions accommodating transgender students need to accord them the right to privacy whereby their sexual orientation or nature should not form topics of discussion to others (p. 122).

The need follows because most unnecessary attentions result to these students feeling uneasy as well as the feeling of mistreatment by the management who seem to interfere with their privacy rights (Human Rights Watch, 2001, p. 19).

This can only happen where the student fraternity as well as other members of the campus society is educated about the nature of transgender students.

This deals with the attitudes of disapproval and hatred that can negatively affect these students. One everyone in the campus creates a suitable condition for the transgender student, social life becomes easy and the student feels that s/he is normal and part of the society.

Putting aside bathrooms and locker rooms that are designated neither for males nor for females can pass for a good way of ensuring, that the students use the facilities that do not expose them to other peoples curiosities (Rankin, 2003, p.29). The

Ease to amend vital identification College records and documents

Institutions that harbor transsexual students need to give them the opportunity to amend their names and other vital information in the college records with ease. They should allow those who decide transition from a particular gender to the other completely by the change of names to do so without any restrictions (Nakamura, 1998, p.102).

They should further help them in the process legally or otherwise to avoid incidences whereby the arm of the government might catch them up in compromising situations and have to explain why their names do not reflect their original names or their current gender.

The processes of changing important details such as names in vital documents however vary from one state to the other. Some states have cumbersome procedures that require the intervention of the administrators of the school to ensure that the students succeed in the venture.

Conclusion

Despite the fact that institutions of higher learning should prepare students to become responsible adults, transgender students continue face numerous challenges while in these institutions that include colleges and universities (Brown, Clarke, Gortmaker, & Robinson-Keilig, 2005, p.65).

These challenges influence negatively on their academic performance and psychologically. In order to address completely the needs of transgender students, it is important first to be aware of the major challenges affecting them.

Institutions harboring these students need to give them the chance to excel academically and develop physically, mentally, and spiritually (Bilodeau, 2005, p.40). This can only be reached if all the challenges and needs that they have are addressed accordingly therefore making the environment conducive for their learning.

Addressing these issue amounts to upholding their human rights, which make them feel appreciated and supported and given the right environment to make it in life (Carter, 1999, p.72). Otherwise, disability does not imply inability, as these are students like others with equal potential of excelling, not only academically but also in life in general.

References List

Beemyn, B. (2005). Making Campuses more Inclusive of Transgender Students. Journal of Gay & Lesbian issues in Education, 3(1), pp.77-87.

Bilodeau, B. (2005). Beyond the Gender Binary: A case Study of two Transgender Students at a Midwestern Research University. Journal of Gay and Lesbian Issues in Education, 3(1), pp. 29-44.

Bochenek, M., & Brown, A. (2001). Hatred in the hallways: Violence and discrimination against lesbian, gay, bisexual, and transgender students in U.S. schools. New York: Human Rights Watch.

Brown, R., Clarke, B., Gortmaker, V., & Robinson-Keilig, R. (2005). Assessing the Campus Climate for Gay, Lesbian, Bisexual and Transgender (LGBT) Students using a Multiple Perspectives Approach. In S. R. Rankin, Campus climate for sexual minorities. New Directions for Student Services, 111, pp.17-23.

Carter, K. (1999). Transgenderism and College Students: Issues of Gender Identity and its Role on our Campuses, Toward acceptance: Sexual Orientation Issues on Campus. USA: University Press of America.

Currah, P., Minter, S., & Green, J. (2000). Transgender equality: A handbook for activists and policymakers. Washington, DC: National Gay and Lesbian Task Force.

Herbst, S., & Malaney, G. (1999). Perceived Value of a Special Interest Residential Program for Gay, Lesbian, Bisexual, and Transgender Students. NASPA Journal, 36(2), pp.106-109.

Human Rights Watch. (2001). Hatred in the hallways: Violence and discrimination against lesbian, gay, bisexual, and transgender students in U.S. schools. New York: Human Rights Watch.

Lees, L. (1998). Transgender Students on our Campuses, Working With Lesbian, Gay, Bisexual, and Transgender College Students: A handbook for Faculty and Administrators. Westport, CT: Greenwood Press.

Lombardi, E., Wilchins, R., Priesling, D., & Malouf, D. (2001). Gender violence: Transgender experiences with violence and discrimination. The Journal of Homosexuality, 42, pp.89-101.

Love, P., (1999). Cultural barriers facing lesbian, gay, bisexual students at a Catholic college. Journal of Higher Education, 69, pp.298323.

McKinney, J., (2005). On the Margins: A Study of the Experiences of Transgender College Students. Journal of Gay and Lesbian Issues in Education, 3(1), pp. 58-84.

Nakamura, K. (1998). Transitioning on Campus: A case Studies Approach. Working with Lesbian, Gay, Bisexual, and Transgender College Students: A handbook for Faculty and Administrators. Westport, CT: Greenwood.

Pusch, R. (2005). Objects of Curiosity: Transgender College Students Perception of the Reactions of Others. Journal of Gay and Lesbian Issues in Education, 3(1), pp. 45-71.

Rankin, S. (2003). Campus Climate for Gay, Lesbian, Bisexual, and Transgender People: A National Perspective. New York: National Gay and Lesbian Task Force Policy Institute.

Ancient Rhetoricians Role and Challenges

Introduction

Rhetoricians lived in different eras in human history. One of these eras is ancient times. People in this era used rhetoric for various purposes. The applications included making important decisions and resolving disputes. Rhetoric helped people to choose the best course of action through discussions touching on political, religious, and social issues.

If I were a time-traveling rhetorician, I would prefer to live and work in the ancient era. A number of reasons inform this preference. Rhetoricians of the time focused on moral and political issues affecting society.

Why I would like to Work as a Rhetorician in Ancient Era

Ancient rhetoricians argued that there would be differences between them and their modern contemporaries. The people who practiced rhetoric in Athens and Rome during ancient times were able to persuade others to embrace their point of view without resorting to violence. The modern era is characterized by conflicts between philosophy and rhetoric. The rivalry makes it hard to operate in modern times, which makes me prefer the largely peaceful ancient era.

Another reason I would like to be an ancient rhetorician is that the practitioners of this era were morally neutral with regard to what constituted responsibility in civil life. They regarded the moral character as a key element of reasoned arguments. They held opinions in high regard. Perspectives were viewed as a source of wisdom. In modern times, thoughts and outlooks are often dismissed as unimportant. Ancient rhetoricians also respected communities. They believed all rhetoric was based on these social entities. As such, opinions were regarded as constructs of the community in which individuals lived. Modern rhetoric concerns itself with political settings. As a result, it is more complicated compared to the ancient era.

Ancient rhetoricians hold that language can be used for various purposes. A successful rhetorician could speak convincingly on any topic. However, the language in other eras is not rigid. It changes depending on the situation. Consequently, ancient rhetoric is regarded as a form of communication skill. At the time, rhetoric and public speaking were essential aspects of a successful political life. Students paid rhetoricians in exchange for an education. As a result, the scholars made a living out of their intellectual capabilities.

Challenges Faced by an Ancient Era Rhetorician

Ancient rhetoricians faced a number of difficulties, which I must be prepared to deal with. Their major goal was to equip people with the skills needed to operate in a free society. However, not all ancient societies were free. Most of them were characterized by varying political and religious orientations. The realities would make it hard to embrace the freedom of thought among rhetoricians and their students.

Technical advances highlight human intelligence and the acquisition of new knowledge. Ancient societies were evolving. The changes made rhetoric teaching in an ancient era a complex undertaking. Rhetoricians of this era focused on persuasion in politics and civic life. Success in these endeavors needed a good speaker. As such, lack of oratory skills may negatively impact on the success of an ancient rhetorician regardless of their intelligence. In the modern era, written and literary skills may compensate for a lack of oratory capabilities.

The rise of political and religious fanaticism in the ancient era affected rhetorical practitioners, making their work more difficult. In addition, the rise of philosophers as ancient times transitioned into the modern era brought competition to rhetoricians. Philosophers urged citizens to shun rhetoric and pay attention to philosophical thinking, which they claimed embraced higher levels of enlightenment. The changing perspectives and social movements in relation to rhetorical theory will make it hard for me to work in the ancient era. While some of these challenges extend to other eras, it is important to note that they will make my work as a rhetorician more difficult than at other times.

Conclusion

During the ancient era, rhetoric flourished in open and democratic societies. It aimed at promoting freedoms of speech and assembly. It also enhanced political enfranchisement among communities. Regardless of the various challenges faced by rhetoricians of ancient times, their work was more fulfilling than in other eras.