Monday, December 30, 2019

Biomedical Engineering And A Brave New World - Free Essay Example

Sample details Pages: 4 Words: 1127 Downloads: 1 Date added: 2019/05/17 Category Literature Essay Level High school Tags: Brave New World Essay Did you like this example? Describe the methods of biological engineering envisioned by Huxley In A Brave New World written by Aldous Huxley, a dramatic twist of biological engineering is introduced. The book drops the reader off in the middle of one of the most obvious ones, The Hatchery. This method of biological engineering is envisioned by Huxley to be a way to sort out different varieties of identical humans. Don’t waste time! Our writers will create an original "Biomedical Engineering And A Brave New World" essay for you Create order The way this works is by removing the ovaries from the women in the society and incubating them artificially. The eggs are then replicated and separated so they develop differently, and with different abilities. The babies will be born and made into ranges of superiority, ranging from Alpha to Epsilon. The lower of the five, gamma, delta, and epsilon are then replicated into 96 replicas. The way in which these embryos are created differently is through a brutal womb simulation in which they are shocked and divided which weakens them. The Alphas and Betas are left perfectly sound to grow normally and stronger. When its time for the embryos to be born, the Gamma, Delta, and Epsilon suffer the trauma of lack of oxygen and alcohol interference. These allow for the children to be guaranteed to have learning blocks, lack of capability, and defects. This type of unnatural birth simulation has other factors that prepare these babies for their unescapable social destiny (Huxley, 16). Aside from the actual formation of these babies, the way they are raised in early childhood allows for them to develop and adapt to conditions that simulate the living conditions they will be put into, not just to make them adapted but to allow them to learn to enjoy this environment. To explain briefly, this is an extreme case of genetic engineering that not just creates a specific form of a child, but adds to the formulation of the ideal society, which is only ideal to the creator of the social system, Henry Ford. Assess the social and poli tical criticisms that Huxley was leveling in his dystopian novel In the brilliant dystopian novel, theres a variety of characters who develop at different paces, living a life that is predetermined for them. In this novel, there is a character named Bernard, an Alpha who finds himself feeling depressed because of the reality of this world. Early on in the novel, Bernard is offered Soma which is a drug that allows the characters to erase their negative feelings and enjoy a high like feeling where theyre surrounded by positivity. This initially poses a deeper theme to the readers, which is essentially the idea that Soma is like medication in a society that never fixes a person of their mental issues, but rather pushes them off and covers them up for temporary happiness. As I reflect on society it becomes clear that it is mimicking out society that doesnt advertise therapy but instead advertises vacations, toys, gadgets, and the newest iPhone. This sort of mindset stigmatizes therapy into a category of things for crazy people. It is almost as if we are being told to keep working hard for CEOs and to avoid our mental health so we dont quit our jobs. This is only one of many criticisms displa yed in Brave New World. Another pressing criticism presented is the different viewpoints of the characters. There are those who are living the life intended by Ford, mindless, classically conditioned work, and there are those living with the knowledge of the truth behind their existence. John and Bernard are some of those who know the truth in their society. As they begin to see the truth in society, they begin to feel angry and depressed. Due to their newfound knowledge, they are banished to islands so they dont disrupt the flow of society. This poses the question of it is better to live blissfully ignorant or unaware and depressed. In our society, we have many people who are politically aware and are constantly fighting. This fight can be exhausting and depressing, while those who are blissfully unaware of the pain of politics live a sheltered life. This novel is a strong reminder that while there are two sides to every story, no matter how drastic they may seem, they need to be taken into careful consideration. Discuss your own vision of genetic engineering in the future It is 2018, and it seems that every day the media has a new idea for how to perfect the human body, whether it be with makeup, fat removal surgery, or plastic surgery. It seems that with these post birth changes that the average human is still never satisfied with the ir body or abilities. Although this is already somewhat in the works, I believe that in the future, genetic engineering will be available for a developing fetus. Although there are many flaws such as money determining the future of a childs health, the ideal benefit would be to be able to eliminate deadly diseases, defects, and life-threatening issues to a child before they are born. If we were able to detect and genetically modify a child so they could be free of life-threatening problems, there would be a healthier community, allowing us to focus more on improving our physical and mental health. There are some issues that arise from this though, the first being that if a child is born and find out their parent eliminated something like autism, the child may wonder would my parents have loved me if I was autistic?, leading to a very depressing life. The second issue that is proposed is the fact that science is always evolving. If babies can be cured of cancer, parents will eventually start demanding ways to modify their childs physical and mental abilities, like being able to be extremely athletic or smart. And with great abilities and medical advances come great prices. This will end up sorting society into more of an upper and lower class, the upper class consisting of extremely smart, healthy indivisuals, and the lower class consisting of the natural humans. It is almost as if life becomes a pay to win simulation. While the idea of being able to eliminate great risks, the idea of advanced science falling into the hands of a population so rooted in greed is dangerous. With this being said, my final thought is a question that I do not yet have the answer to, which is: If the science is developed to assist developing humans, why cant we cure those who are currently living? In the future, I hope genetic engineering and modificati on can only be done and used for good, and for all. Huxley shows a dramatic portrayal of a society gone wrong, and Earth is not far from this if we keep living in greed and ignorance.

Sunday, December 22, 2019

Child Abusers And Children And Adults All Over The World

Child abusers coexist with children and adults all over the world, but this does not necessarily have to be public knowledge. People in support of child abusers having public records often feel their children are safer with this knowledge, allowing them to determine where to live and raise their children. Others argue these public records are a violation of rights dictated within the Constitution and abusers should be allowed to maintain their privacy regardless of their crime. Both sides advocate for the rights of either the abuser or the child to ensure protection. According to the U.S. Centers for Disease Control and Prevention, sexual abuse involving children is defined as, â€Å"any completed or attempted (noncompleted) sexual act, sexual contact with, or exploitation (i.e. noncontact sexual interaction) of a child with a caregiver† (Murray, Nguyen, and Cohen, 322). Although varying opinions exist about the functioning definition of child sexual abuse, the debate over th e controversy of child abuser’s identities is typically discussed based on this definition. This ongoing debate revolves around the question as to whether or not the public should know the identities of those convicted of child sexual abuse and how much information should be made public based on the individual offender’s case. Currently, a child sexual abuser’s personal information such as, â€Å" the offender’s name, address, offense, place of employment or schooling, and license plate number, along with aShow MoreRelatedEffects Of The Abuse On Young Adults1694 Words   |  7 PagesChild abuse is an all too common practice in the United States with over six million children affected every year (Centers for Disease Control and Prevention, 2014). In 2012, 82.2% of child abuse perpetrators were found to be between the ages of 18-44, of which 39.6% were recorded to be between the ages of 25-34 (11 facts about child abuse, 2015). Child abuse is a real prob lem in this world. Child sex abuse includes body contact, such as kissing and oral, anal, or vaginal sex. Sex abuse can alsoRead MoreBackground And Consequences Of Child Sexual Abuse1585 Words   |  7 Pagesinternet browsing. Relevant sources have been properly referred. This report is presented to bring the harsh facts regarding Social Responses to Child Sexual Abuse in Nigeria, author do hope this piece of paper will bring the light on relevant facts and concerned authorizes take some steps to make the condition better. Chapter I: Background and Consequences of Child Sexual Abuse Introduction Sexual forcefulness is a common occurrence and happens worldwide. Data obtainable proposes that in some countriesRead MoreDomestic Abuse Essay1497 Words   |  6 PagesChild and domestic abuse is a serious matter which needs to have additional focus, especially in this day and age. Abuse is most often causes harm to others. Abuse may either be verbal, emotional, or physical or times all three. In today’s society there are many different types of abuse including, physical, sexual, emotional, psychological, and neglect. All these types of abuse can affect people in multiple different ways, creating anywhere from short term to long term notable effects in the personRead MoreEssay on Child Abuse: The Epidemic That Must Cease 1443 Words   |  6 Pages Child abuse is epidemic in many countries as well as the United States. It is estimated that every thirteen seconds a child is abused in some manner: physically, sexually, emotionally or by neglect (Friedman). Each year, there a re over 3 million reports of child abuse in the United States involving more than 6 million children. Child abuse can be reduced with proper education of the parents and with greater public awareness. Child abuse is the physical, sexual, emotional mistreatment, or neglectRead MoreChild Abuse And Children All Over The World1689 Words   |  7 PagesChild abuse happens to children all over the world. There are four different types of child abuse. physical abuse, sexual abuse, emotional abuse and child neglect. Approximately 5 children die everyday because of child abuse. child abuse can physically and mentally harm a child by having Symptoms of nightmares, depression, and isolation. These symptoms can continue into adulthood. â€Å"one out of three girls and one out of five boys will be sexually abused before they reach age 18†. nobody knows whatRead MoreChild Abuse, Cause And Effect On The Rest Of Their Lives1419 Words   |  6 PagesBrittany Tacy Child Abuse, Cause and Effect on The Rest of Their Lives By Jeffery Jay Romero, December 8th, 2015 â€Æ' Introduction: There’s a sad truth about this life in which people will not always treat each other with the respect and courtesy that we expect to see in the civilized world. It could just be stress that causes someone to lash out and harm another individual, or any number of factors leading up to said event. It becomes even sadder when the victim involved is a child and the perpetratorRead MoreDomestic Violence : The United States Department Of Justice1741 Words   |  7 Pageskeep power and control over another partner. The violence can be sexual, physical, economic, emotional, or psychological actions or threats of actions that impacts another person. Any actions that manipulate, intimidate, isolate, humiliate, terrorize, frighten, threaten, coerce, hurt, blame, wound, or injure someone can be domestic violence (The United States Department of Justice). Other definitions: A survivor or victim is the individual who the abuse is aimed towards. An abuser or batterer is theRead MoreVerbal Emotional And Emotional Abuse1486 Words   |  6 Pagesthere are many people on a daily basis who suffer from verbal-emotional abuse. In today’s society too many of our children live in homes where they face verbal-emotional abuse on a regular basis. In this paper we will discuss what verbal emotional abuse is, why so many children face verbal-emotional abuse and how to tell what the signs of verbal emotional abuse are in order to assist a child in need. Verbal emotional abuse is defined in many ways because there are so many underlying meanings that fallRead MoreChild Abuse And Its Effects On Children1056 Words   |  5 Pages Child Abuse One million children in forty- eight states were victims of substantiated child abuse and neglect in 1994 (Child - Abuse Prevention 1). Out of all the abuse allegations in 2000 only 879,000 cases were able to be proved. Which approximately 1200 children died as a result of child abuse or neglect and forty-four percent of these were younger than one years old. Defenseless children are severely abused constantly every year across the United States, leaving life -long negative effectsRead MoreThe Effects of Alcohol Abuse1472 Words   |  6 PagesIn the world we live in today, people have quite easy access to things that can corrupt them. These things cloud one’s judgment and coerce people into doing things they should not. Alcohol is one of those things. Alcohol is extremely easy to get ahold of. It can be attained from anywhere; there are bars and liquor stores on every corner. One can get alcohol in grocery stores, gas stations, people can even brew it themselves if they k now how. Alcohol that is commonly abused comes in a large variety

Saturday, December 14, 2019

Ict And Science As A National Curriculum Subjects Education Essay Free Essays

string(303) " for illustration scientific discipline at foundation phase is introduced to kids throughout drama and activities that encourage them what they need physically and what they need to make to detect in order to research the universe around them, this is called cognition and apprehension of the universe\." In linguistic communication, literacy and communicating kids will be able to speak with assurance, sing vocals, be able to compose and read some words. The counsel believes that larning in this country involves â€Å" communicating, speech production and listening in different state of affairss and for different intents, being read a broad scope of books and reading simple texts and composing for a assortment of intents † . hypertext transfer protocol: //www. We will write a custom essay sample on Ict And Science As A National Curriculum Subjects Education Essay or any similar topic only for you Order Now preschool.me.uk/goals.php In Mathematical development kids will larn math throughout games and narratives and they will be more comfy with Numberss. Harmonizing to foundation phase counsel, larning in mathematical development country is made up of â€Å" numeration, screening, fiting, seeking forms, doing connexions, recognizing relationships and working with Numberss, forms, infinite and measuring † hypertext transfer protocol: //www.thevillaschoolandnursery.co.uk/school2.htm In Physical development kids will go more skilled at motor and motion of their organic structure. Furthermore, in originative development kids will detect colorss, texture and forms and making things such as doing music. Science contains grasp and cognition of the universe ‘s part in the early twelvemonth foundation stage.A Harmonizing to foundation phase counsel this learning country must include â€Å" activities based on first manus experiences that encourage geographic expedition, observation job resolution, anticipation, critical thought, determination devising and treatment † hypertext transfer protocol: //www.thevillaschoolandnursery.co.uk/school2.htm The mathematical, scientific discipline and linguistic communication development countries will so be sorted into early larning aims in order to warrant that what the bulk of kids are expected to achieve at the terminal of the foundation phase The course of study support is designed â€Å" to assist practicians plan to run into the diverse demands of all kids so that most will accomplish and some, where appropriate, will travel beyond the early acquisition ends by the terminal of the foundation phase † . ( Tassoni, P 2005 ) In the early twelvemonth foundation phase, the practician ‘s chief function is to promote kids to larn and accomplish independency, they must plan important activities and need do certain that every spot of activities are comprehensive to all children.A Acoording to Macleod-Brudenell, ( 2004 ) , everybody has to be included in the planning and work together. Parents/ practicians must often acquire together and discourse to convey up to day of the month every kid ‘s profile in order to give a distinguished and efficient course of study to run into the assorted demands of immature individuals. National course of study The Curriculum counsel which links to the instruction period that shortly follows after the Foundation phase is the National Curriculum. The National Curriculum is aimed at kids from the age of 5 to 16. It was foremost set up late in 1988 for primary and secondary schools. To get down with, the National Curriculum is a design used by all schools that are run by the authorities in England, its end is to attest that acquisition and instruction is well-balanced and dependable across the state. The standard of the National Curriculum is puting out topics that are traveling to be taught within schools, the rules or achievement marks in every topic are what instructors use to estimate the kid ‘s betterment, and the methods in which a kid ‘s advancement is assessed is through studies. At cardinal phases 1 and 2 in the national course of study the statutory topics that every pupils should analyze are design and engineering, information and communicating engineering, art and design, history, English, geographics, physical instruction, , mathematics, scientific discipline, Religious instruction and music. However, Science, Maths and English are considered as the National Curriculum ‘s chief topics. The map of the Foundation phase Curriculum is support for the National Curriculum in the countries within the Foundation phase Guidance communicating, literacy, linguistic communication, mathematical sweetening, general cognition and a good apprehension of the universe. These are all in line with the aims inside the model for learning maths, literacy and scientific discipline at degree 1 of the National Curriculum. hypertext transfer protocol: //curriculum.qcda.gov.uk/key-stages-1-and-2/ Difference in EYFS and national course of study Harmonizing to Macleod-Brudenell, ( 2004 ) , the early twelvemonth foundation phase concentrates on the procedure led theoretical account, nevertheless the National Curriculum concentrates on the Content Led theoretical account in order to promote kids to take an effectual duty in society every bit good as supplying them with accomplishments, cognition and apprehension. The construction of the National Curriculum is different to foundation phase. For illustration in the national course of study, it ‘s the determination of schools to take how they want organise their school course of study to include the programmes of survey. â€Å" The programmes of survey ( the Education Act 1996 ) , set out what students should be taught in each topic at each cardinal phase, and supply the footing for be aftering strategies of work. When planning, schools should besides see the four general instruction demands ( usage of linguistic communication, usage of ICT and wellness and safety and inclusion ) that apply across the programmes of survey † . hypertext transfer protocol: //czone.eastsussex.gov.uk/sites/gtp/library/professional/Documents/induction/The % 20Structure % 20of % 20the % 20National % 20Curriculum.pdf In the national course of study, national makings are the most of import methods of clear uping accomplishments in National Curriculum topics. Most of pupils will hold to stay working at degrees 1-3 in the first cardinal phase and so accomplish degree 2 by the terminal of the cardinal phase, at degrees 2-5 in cardinal phase pupils achieve degree 4 by the terminal and degrees 3-7 at cardinal phase 3, degrees 5/6 will be attained by the shutting phases of the cardinal phase. hypertext transfer protocol: //curriculum.qcda.gov.uk/key-stages-1-and-2/Values-aims-and-purposes/about-the-primary-curriculum/index.aspx In the national course of study, instructors must do a program of survey and the capablenesss of their pupils. And so they need to describe one time a twelvemonth at the terminal of each cardinal phase to parents to discourse the betterments of pupils. the major difference in foundation phase and the national course of study is that there are tonss of activities that are available for kids in foundation phase, chiefly everything they learn is through activities and drama, for illustration scientific discipline at foundation phase is introduced to kids throughout drama and activities that encourage them what they need physically and what they need to make to detect in order to research the universe around them, this is called cognition and apprehension of the universe. You read "Ict And Science As A National Curriculum Subjects Education Essay" in category "Essay examples" They will besides be encouraged to foretell, do determinations, work out jobs and believe. Every spot of activities and drama in foundation phase countries of the national course of study helps kids to develop physically and creatively. However in the national course of study the survey is acquiring harder and instructors are rigorous about survey towards students. The most of import focal point of the foundation phase course of study is to fix pupils for the following degree which is traveling to a primary school by the age of five. It observes the kid as â€Å" active scholars † and â€Å" going a student † . Throughout the early twelvemonth foundation phase the scholar ‘s accomplishment is measured all the manner through formal observations, appraisals and cheque lists. This is called the Foundation Stage Profile. There are no marks of peculiar proving in foundation phase in contrast the national course of study which kids have to be assessed for every topic at the terminal of each cardinal phase in order to see how the kid is come oning. A There are some alterations that occur which kids experience when they leave foundation phase and travel up to identify phase 1. These include distancing from drama to work activities, they will besides travel from thematic to capable activities, and besides they ‘ll see more formal method of instruction. Importance of scientific discipline as a national course of study The national course of study promotes the significance of Science to assist kids to derive cognition and apprehension of the universe around them. It is because of scientific discipline that kids find the ground for expected â€Å" phenomenon † that they see in their mundane life. It does hold a monolithic influence on the universe and it besides helps keep the good health of people. Furthermore, Science teaches about cooperation and struggle managing, it helps people in holding strong communicating accomplishments. For case, when giving description on a research, pupils have to utilize appropriate research and communications accomplishments. This afterwards will be functional, as it promotes personal relationships. It ‘s besides throughout scientific discipline that kids gain cognition in relation to covering with conflicting point of position, and besides let go ofing when to collaborate with others and work on their ain. hypertext transfer protocol: //www.truthinscience.org.uk/site/content/view/24/45/ Furthermore, larning about scientific discipline helps them to be more accountable and a more responsible society, this is because they ‘ll larn how to believe crucially and besides they ‘ll hold a better apprehension on how things function in the universe ; hence, they would be able to do appropriate determinations and do a healthier and more unafraid environment. The importance of ICT as a national course of study The National Curriculum besides promotes the significance of ICT across the course of study. Information and communications engineering is by and large anything that uses electricity. For illustration: computing machine, picture, Television and etc. Schools have a major duty in developing ICT ability. Numerous facets of ICT are critical for all schools. These are include: the significance of spread outing ICT accomplishments to develop apprehension of the persons and the society as a whole, to be able to administer ideas and work as a squad, the ability to derive accomplishments and cognition throughout a scope of methods and techniques, and besides to do the most usage of ICT to keep instruction and acquisition across the course of study. Presents in all schools Children of the immature age need assorted cognition of ICT if they want to be successful in their future life. The most of import purpose of national course of study by seting ICT along states is to develop kids ‘s accomplishments, cognition and attitudes in association to communications and information engineering. It ‘s besides to promote them to develop their assurance, ego regard and apprehension in utilizing ICT and supply them with quick and researchable entree to great sum of information. Furthermore, to assist them to decide jobs, analyze on their ain and to pass on and collaborate with other people and better their communicating accomplishments. hypertext transfer protocol: //curriculum.qcda.gov.uk/new-primary-curriculum/essentials-for-learning-and-life/ICT-capability/ICT-across-the-curriculum/index.aspx Reception program For the subject of scientific discipline I have done an activity with kids aged 4 to 5 old ages old in response category, to advance their apprehension and cognition of scientific discipline, the World around them and how it works. 6 kids took portion in the activity. The activity was based on mini animals, which is a scientific discipline topic within the foundation phase course of study. Mini beasts include ladybugs, spiders, caterpillars, butterflies, etc. The lesson was in relation to what they eat, where they live and where we can happen them. This activity was based on scientific discipline ; nevertheless it supports kids in developing their apprehension and cognition in other countries of the curriculum as-well such as: maths, art, ICT, communicating and linguistic communication. Mathematicss: I asked kids to number mini animals on the smart board and so I asked them to number how many legs they have. ICT: I used Information Communication Technology to pull up mini animals on the smart board and encouraged kids to come and pull mini animals on the smart board and so compensate their name next to images. Communication: I encouraged kids to discourse what they eat and where they live Art: I asked kids to pull mini animals on a piece of apparent paper and so utilize coloring material pencil to color them in. I feel that the kids learned a batch from this activity as they had n’t yet done the scientific discipline course of study ; therefore they have n’t got much apprehension and cognition on scientific discipline and the universe around them. I feel that this activity promoted the kids ‘s acquisition and development in the course of study every bit good as promoted their communicating, linguistic communication and usage of ICT. However, some of the kids needed extra support. This activity was really educational for the kids, taking portion in it has supported them in increasing their apprehension. Personal contemplation By making this lesson I learned how to be after and use activities for the right phase and age of the kids that I will work with. I besides gained cognition of how to collaborate with kids during the activity and how to measure their acquisition. I ‘ve learned how to back up the kids who may necessitate it and how to make resources and put up activities suited for them. This activity besides helped me in deriving assurance and improved my communicating accomplishments. Furthermore, it helped me derive experience of working with kids and admiting them. Key phase 1 lesson program I besides planned another scientific discipline activity for kids age 7 old ages olds within the national course of study. The activity involves natural philosophies which will increase kids ‘s apprehension and cognition of scientific discipline, every bit good as deriving a good apprehension of how conduction and circuitry plants. What I ‘m traveling to make is to learn kids that in order for a circuit to work decently there must be no spread in the circuit so the electricity can blemish. For this lesson the kids will hold an independent pick on which the equipments they can think that would carry on electricity. Harmonizing to national course of study counsel â€Å" Children should be taught that it is of import to roll up grounds by doing observations and measurings when seeking to reply a inquiry. † It is indispensable to educate kids how to look into and research because it helps them to decide jobs and to hold an reply to their ain inquiries. It will besides assist them to work out any jobs that they may confront in the hereafter. For this activity I will take my laptop to the category and demo kids how electricity flows and so I will pull up the circuit on the smart board and explicate to kids that within the plastic coating there is a wire which conducts electricity. I will besides give illustrations of other stuffs that can carry on electricity. The following program which I provided for kids is a computing machine game, so what I am traveling to make is promote kids to take portion in a computing machine game activity. The activity will be to inquire kids to press a button on a keyboard to travel objects, and when they press the button the objects will travel, by making this they will come to cognize that electricity current base on ballss through a wire which causes the object on the screen to travel. This activity will advance kids ‘s communicating as they discuss and ask inquiries such as: why? How? What will go on if? And besides promote them to foretell of what ‘s traveling to go on before they do it. They will besides recognize whether the trial was just or non. By the terminal of the lesson kids will be able to cognize that chiefly metal points conduct electricity. They ‘ll besides derive cognition that largely all electrical conduction is non linked toA coloring material, weight, size and texture. Personal contemplation By making this activity I will larn how to collaborate with kids and program scientific discipline activity to spread out their apprehension about natural philosophies.I will besides place the demands of the single kid, some possibly will necessitate excess support. Furthermore, in the activity which I planned for kids, I ‘ll demo good apprehension of anti-bias pattern and anti discriminatory. Evaluation I feel that by making this activity for kids I will finish my purposes because kids will hold a good apprehension of electricity and conduction every bit good as they will bask the activity excessively. They will widen their basic apprehension and cognition of the universe around them. They will besides larn which stuffs can carry on electricity and which can non. They will besides place that even though the electrical conduction is non something to be seen but it ‘s something which is present and needed for every twenty-four hours life. How to cite Ict And Science As A National Curriculum Subjects Education Essay, Essay examples

Friday, December 6, 2019

How Do Research Proposal on Cyber Security Challenges

Question: Discuss Research Proposal on Cyber Security Challenges ? Answer: Introduction Increasing use of internet also increases risk of cyber threat. Huawei Company is also exposed to some security threats that are faced by its supply chain system. This research would explore these risks and would identify solutions to beat them. For assessing the security threats that would be identified for the company, the research would make use of the NIST framework. The key objective of the organization is to make its end points secure. For this level of security, the organization already uses some procedures like USB port protection using BitLocker. The supply chain system of the organization consists of a number of propriety applications that are developed for the company and the third party solutions integrated together to take care of its supply chain operations(Veracode, 2017). However, the IT infrastructure has resulted into certain security challenges that even the USB locker is unable to prevent as the data still passes through a network causing leakage of data. Security issues that the organization is currently facing include(DHS, 2009): The organization does not use efficient security measures that can protect the data from leaking through the network. The organization is unable to establish a control over the flow of the data or keep track of the same using its existing IT systems. The company does not have a very sound emergency response system and thus, is unable to handle the responsibilities of detection of attacks or intrusion and clearing of those attacks. The company does not use sound security tools like breach indicator and data encryption that can be used for warning company in case of any attacks or prevent the loss of data respectively. The mobile device management system and the application control system of other organization needs a significant improvement(CGI, 2013). Project Objective The objective of this research project is to identify the security risks faced by the organization and come up with the recommendations to resolve them such that the security posture of the company can be improved. Project Scope Following activities are included in the scope of the research project: Identification of various types of security risks that are faced by the Huawei Company Exploration of the causes behind the seuciryt risks that are faced by Huawei Company Discovery of the ways security issues faced by the organization can be solved Study of literature on cyber security challenges and methods to overcome them Collection of the primary data for the propose of the exploration of the objectives of this research Recommendations on the enhancement of the security posture of the Huawei Company Literature Review Key concerns of the organization is its supply chain which is facing cyber security risks that needs to be addressed by improving the security posture of the supply chain of the organization. USB encryption is a major problems wit the Huawei Company as one of the security risks. Several surveys were carried out on the company representatives to understanding what kinds of problems did they face with he USB level protection and it was found that the techniques used for the USB and enterprise level security protection was not effective enough. The organization systems failed to encrypt the data that was flowing through the network of the organization. Moreover, the organization also failed to secure the end points of the systems. As a result of the security problems, the environment of the company became hostile. TO solve this issue the company implemented BitLocker for its USB protection. The encryption had to be efficient such that it enhanced the companys capability to prevent the cyber crimes from happening in the company through end point attacks. The organization is currently using third party solutions that are integrated with the devices used in the company and with other software. The time that is taken to capture the data became easy and thus, data was stored efficiently. This also allows the organization to enhance its control over the data that was flowing through the network. However, the integration of the application s with third party solutions did arise security issues that are required to be addressed. The organization is facing risk of losing the privacy and security of the network data. This is mainly because the security settings of individual solutions were not always as per the company policy demands. This has resulted into entry of cyber worms in the system affecting the security and efficiency of the system. In addition to the encryption of USB, company needs more controls over the USB access as threats can modify the access control of this end point. However, currently the company does not have any solid control over the access to USB nor does it have a control over the data that flows through the network beyond certain level. Unauthorized users can enter into the network and access the data that flows over the company network. This also poses additional risks as these entrants can spread the attacks in the network. Moreover, there are risks of unidentified devices connecting to the organizational systems which can again pose the cyber threats to the supply chain system of the company thereby reducing efficiency of the system operations. The organization lacks any effective data protection system and in the case of a malware attack, company risks losing a large amount of its data. The company was working on the reverse engineering methods for virus attack prevention but it is only in the developing phase but once it is developed, it can be expected to bring more security benefit stop the organization specially for the data recovery. Some problems that can be identified with the companys security capability include lack of effective emergency response system, absence of breach indicators, lack of effective disk encryption, lack of application control and ineffective mobile management system. Research Questions The aim of this research is to identify current security problems of Huawei Company and come up with the methods to resolve them such that appropriate recommendations can be made to enhance the security in the company. To achieve this aim, following research questionnaire required to be answered in this research: What are the security challenges that Huawei Company is facing? What are the causes behind the security issues faced by Huawei Company? What data protection measures can be used by Huawei Company for protecting the data leakage from the network? How can Huawei Company control the data flowing over its network? What kind of emergency system is being used by the organization and how can it be improved? What is breach indicator and how it can be implemented in the Huawei Company? What measures can the company take in order to encrypt its disk such that data loss can be prevented? Can application control system of the organization be improved and how? How the company and enhance its mobile device management?(EY, 2013) Research Design and Methodology A research methodology can be formulated based on the assumptions of the philosophical constructs that are relevant that are structured through the exploration of ontology that identifies existence of knowledge and epistemology which helps in understanding it. As per these philosophies, there can be two approaches a researcher can take including positivism and interpretive. Positivists say that there exists a true knowledge that can be empirically explored while interpretevists say that multiple perspectives of people form an illusion of reality. When both approaches are combined, they can be used for building theories. As this research assumes the existence of a reality and needs empirical testing of the problems faced by the organization, positivis approach would be taken in the research. For this, the researcher would make use of standard steps of identifying the research questions, selecting research design collecting data, interpreting data, analysing it, and collating findings to derive a conclusion(HP Enterprise, 2015). The research is required to explore how the company systems are working and what are the challenges or gaps in the system that need improvement. As per the research already conducted by other researchers on the organization, some useful insights were delivered. These included considerations of specific challenges that were faced by the organization and the measures that were taken by the company for improving its security. The researchers also exposed the challenges that organization faced while adopting the security enhancement techniques in the organization. However, with this insight forming the base of the inquiry, a deeper inquiry is required to be made on how the identified problem can be solved and thus, the research needs a primary data exploration which would be done by using interview process(Infrascale, 2014). Secondary Research: Past journals, research reports, books, and security specific articles on the authentic websites would be explored to identify secondary resources for the literature data analyses. The resulting data would be thematically analysed to come up with critical themes for a further exploration of the study that would be important for making the recommendation that can enhance the security posture of the organization(MYOB, 2016). Primary Research: In the primary research, the interview guide would be prepared based on the themes that are identified in the secondary data analysis. The security professionals would be approach including two internal employs of the organization for the interview. There would also be 5 more professionals who would be approach form outside the company for the interviews(NIST, 2014). Data Collection The primary research data would be collected through the interview that would be conducted on the 7 professionals including 2 internal and 5 external security professionals. The sample size is small because it would make use of an extensive inquiry with individual and explore specific security problem that can be explored in depth. A huge amount of information is going to guide the research. A small sample size appears to be sufficient for the current research as it s only going to explore the problems of a specific company and also address specific issues that are already identified in the previous researches. For the interviews, the security professionals would be approached by the researcher to take face to face interview and the conversations happening during the interview would be recoded and transcribed into textual dat. An interview guide would be used for guiding the interview with open ended questions on the security challenges as well as solutions to be implemented in the s upply chain of the organization(Raddon, 2010). Data Analysis The data that would be obtained from the past research studies would be analysed using thematic analyses which would reveal some themes that would be coded for identifying common categories of challenges and possible solutions. The codes would be refined with deeper exploration of the secondary data such that the final thematic codes that are selected can be used to come up with a question set for the interview(TrustSphere, 2012). The primary research would be conducted using an interview and the data thus obtained would be analysed using a content analyses that would be based on the selected features and short descriptions related to the security challenges and solutions. A large textual data would be divided into smaller segments of data for this analysis(Raddon, 2010). Research Limitations This research has certain limitations like: Because of the limited sample size, the results cannot be generalized for a wider audience or organizations As the research makes use of only security professionals, the perspectives is limited and does not include the views of the actual users who would be using supply chain systems and facing security issues. Time Schedule (Research plan) Milestone Step Milestone Date Introduction and objectives 15th June 2017 Literature review 10th July 2017 Methodology selection 15th July 2017 Thematic data analysis 20th July 2017 Interview guide preparation 24th July 2017 Data collection 15th Aug 2017 Data Analysis and interpretation 20th Aug 2017 Conclusions and recommendations 22nd Aug 2017 Finalization of reports including proofreading and editing 24th Aug 2017 Report submission 25th Aug 2017 Conclusion In this research, a research on the security systems of Huawei Company was proposed. It was found that there were earlier researches already done that revealed the challenges of the organization such that primary research was required to further find the possible solutions that would solve the problems arising from the current risks that are faced by the organization. The researcher proposes use of secondary data analysis using thematic analyses that would reveal themes that would be used for preparation of an interview guide that would further be used for the primary data collection from 7 security professionals. The primary data is proposed to be analysed using the content analyses. Specific problems that would be explored in the research including data loss and security enhancement. Reference List CGI, 2013. Developing a Framework to Improve Critical Infrastructure Cybersecurity, s.l.: CGI. DHS, 2009. A Roadmap for Cybersecurity Research, s.l.: DHS. EY, 2013. Bring your own device - Security and risk considerations for your mobile device program, s.l.: EY. HP Enterprise, 2015. Cybersecurity Challenges, Risks, Trends, and Impacts: Survey Findings, s.l.: MIT. Infrascale, 2014. BYOD Program Best Practices for Data Protection Security , s.l.: Infrascale. MYOB, 2016. Company file security. [Online] Available at: https://help.myob.com/wiki/display/ar/Company+file+security NIST, 2014. Framework for Improving Critical Infrastructure Cybersecurity, s.l.: National Institute of Standards and Technology. Raddon, A., 2010. Epistemology Ontology in Epistemology Ontology in Social Science Research , s.l.: University of Leicester. TrustSphere, 2012. Advanced Security Methods for eFraud and Messaging, s.l.: TrustSphere. Veracode, 2017. APPLICATION SECURITY SOFTWARE. [Online] Available at: https://www.veracode.com/products [Accessed 19 May 2017].