Recent orders

ABSTRACTION IN BAYEUX TAPESTRY AND TRAJAN’S COLUMN (2)

ABSTRACTION IN BAYEUX TAPESTRY AND TRAJAN’S COLUMN

Student’s name

Instructor

Department of affiliation

Course

Date

Abstraction in Bayeux Tapestry and Trajan’s Column

All art is abstract at some point and this concept has always existed even in the beginning of the use of art. It is this same concept that McCloud extends and expounds for the reader to be able to understand it fully and from his perspective. Mccloud explains how comics work but also defines abstraction through his writing. On page 31 of the book, we can try to understand the abstraction from humans to more of the cartoon. This is because on this page the first photo looks more like a human being and as the comics continue discussing film critics and abstraction though the literal word is not mentioned here. Therefore they discuss the idea which abstraction is generally about. Therefore a definition can be derived from here and state that McCloud defines abstraction as the focus on an idea and not something real or tangible just like it is cartoons as stated in the understanding comic’s book. This makes life more interesting and as stated calls for further investigation. Therefore the definition of abstraction by McCloud can be said to be a concept that focuses on ideas just like it is in cartoons and does not focus on reality. Therefore from this book, I choose symbols that represent what is being talked about and which generally are ideas and no tangible evidence of what is being talked about. Therefore in this case we can say that symbols are what represent abstractions because they are not tangible items that can have a definite shape. And this is clear in the understanding of comics as McCloud uses cartoons to show how this is.

In Trajan’s column, we learn about time and its relation to abstraction. This is because even though it might be true that emperor Trajan at the age of 19 lead people to war to conquer a kingdom by the name Dacians it is not fully comprehensible at this period and it makes it even harder to understand because there is no evidence towards that. The remains of the evidence have been watered down by acid rain and the long period of destruction which have occurred and therefore in these recent times this dies not to act as just history with evidence but rather it becomes abstraction which we have to try and understand because we cannot fully grasp how that time was like. We cannot fully understand the aspect of having a king who is 19 years old and we also cannot fully understand what the remains mean. Furthermore, there is a little more abstraction in the issue of having the Dacians being understood. In this, it is pure abstraction since we can’t fathom what kind of kingdom it was and what how their kingdom, as well as their leadership, looked like since it was cleared from existence and consumed by the roman kingdom at that ancient time. Therefore this helps us to understand abstraction even in a more clear and complex manner.

Even though the column still exists it has suffered a lot from the history of civilization and it remains a place of history and a place of abstraction because no matter how a person tries to understand this time in age it remains an idea in their mind and it does not exist anywhere in the current sphere of reality. Therefore this is the basic idea about abstraction that ideas exist in our minds and they do not exist in reality and therefore we have to represent them either in writing them or drawing them using symbols like McCloud does in his book understanding comics. He also dissects the idea very well not only in word but also in vision whereby as the cartoons and drawings talk about the abstraction he draws them looking more like human in the first photos but at the end of the page he makes sure they look more like cartoons and symbols rather than human drawings.

In Bayeux Tapestry we also learn of how ancient times and color affect our understanding and creation of images due to the abstraction of a concept. This is an embroidered clothe almost 70 meters long and 50 centimeters wide. Its main depictions are the Norman conquest of England and it dates back to the 11th century. Its main characters include; William, Harold, Wessex, and many more who were involved in the activities of the norman kingdom at that period in time. The cloth has seventy scenes and all these talks of that period when England was conquered. It is embroidered and not woven and therefore it can be said to not be typically tapestry but embroidery. This, therefore, helps us to understand abstraction even in a clearer manner because we have to feed our minds with the idea that this kind of thing and vent took place especially when it is supported by evidence which does not give us the real situation but only gives us symbols to help us make the mental images. Color also plays a great role in the whole of this because we get to see which colors they liked most and in the creation of mental images as we understand abstraction we are likely to make colored images.

Therefore in conclusion we can say that understanding comics is an essential part of understanding abstraction. However, abstraction can be understood better when there is a combination with other artworks like I have discussed above the Bayeux Tapestry and the defeat of the Dacians by the emperor of the ancient roman kingdom Trajan. These two give us insights and the ability to understand abstraction more clearly.

References

Gameson, R. (Ed.). (1997). The study of the Bayeux tapestry. Boydell & Brewer Ltd.

Lancaster, L. (1999). Building Trajan’s column. American Journal of Archaeology, 419-439.

McCloud, S. (1993). Understanding comics: The invisible art. Northampton, Mass.

Musset, L. (2005). The Bayeux Tapestry. Boydell Press.

Richmond, I. A. (1935). Trajan’s army on Trajan’s Column. Papers of the British School at Rome, 1-40.

Business Contingency Planning

Business Contingency Planning

Name

Institution

Business Contingency Planning

Question 1

Question 1.1

Cybersecurity risks are likely to increase due to a projected increase in service requests from various remote points. Vulnerabilities in the remote access points are expected to impact the security and privacy of information within the UC information systems. Home networks could be used as an entry point for hackers and penetration activities to gain permissive access to sensitive information system resources and data. The implementation of remote access services will impact the confidentiality and integrity of information in cases where the users do not comply with security measures in deploying their connections. Establishing remote access services to facilitate the learning activities by the UC system will require the integration on new applications which re likely to have backdoors for malicious activities and exploitation.

The provision of services to facilitate learning will depend strictly on remote support systems which pose a risk of increased load and limitations on the bandwidth. The services provided by the information system are likely to be unreliable, resulting from poor connection and access to resources. An increased load of services requests is expected to cause congestion when the capacity is overwhelmed thus interruptions and distractions.

The UC information systems face the threat of staffing due to unreliable information dissemination and management of system resources. The measure of employee productivity through the virtual environment is unpredictable and can not conclude accurate metrics on services ordered. The supervision of output for each staff in the university is a challenge and impacts the ability to track progress and efficiency in ensuring business continuity.

The reliability of the UC information system services will depend on individual network infrastructure, which is likely to impact productivity in cases of weak internet connection or poor access platforms.

Question 1.2

The review process will start with the development of a contingency planning policy framework to define the objectives for the exercise. Roles and responsibilities will be specified in the policy statements to provide guidelines for contingency planning.

The second step will involve conducting a business impact analysis to effectively identify possible operation interruptions as a result of risks impacting business processes (Moturi, 2014). This phase will prioritise UC information systems components to support the business functions and objectives (Moeller, 2013). Business process and IT governance plan documents will be used to support information gathering for comprehensive impact analysis process. The business stakeholders will also be interviewed to obtain useful first-hand information which will impact decision making in designing response plan (Bechor et al., 2010). Students and department staff will be interviewed through questionnaires regarding the services using the UC information systems (Moeller, 2013). The top management will also be involved in the information gathering process to gain authority and support in conducting the contingency planning process. Identified business processes will be used to obtain useful data on the requirements for operation, including the resources supporting the process (Swanson et al., 2010). The information collected will be reviewed through the evaluation process to create prioritised documentation of the business processes and functions (Moturi, 2014). The requirements for each process will also be identified. A business impact analysis report will be documented based on the findings of the study to aid in decision making (Bechor et al., 2010).

The third phase will involve the identification of possible preventive control to address the vulnerabilities facing defined business processes (Moturi, 2014). All the control measure will be evaluated to determine the most effective and reliable measures to compact the identified risks. The selected measures must be reliable and effective in addressing security and privacy information concerns (Bechor et al., 2010).

The fourth step of the review process will develop recovery approaches to address the risks of deploying remote access services using the UC information system. During this phase, the critical business process will be identified and prioritised based on impact metrics on business continuity. All dependencies of the identified business processes will be labelled and outlined. A Recovery Point Objectives (RPO) is defined in this stage to highlight the priority of information dependencies to enable replication of data through backup to meet and align to business process requirements (Swanson et al., 2010). The Recovery Time Objectives (RTO) will be defined in this phase to act as a guideline in the time taken for a full recovery of information during risk occurrence (Bechor et al., 2010). The Maximum Tolerable Downtime (MTD) will also depict the length of time a business process can be unavailable when risks occur (Swanson et al., 2010). Possible risks that can impact the disaster response plan (DRP) will be evaluated and assessed to create awareness and impact the priority ranking of the business processes. A response team will also be developed and roles and responsibilities assigned to team members, including a communication structure for easy information dissemination. The response team will oversee the overall recovery process and will, therefore, undergo training to ensure they are informed and prepared for risk handling.

In the fifth step, a contingency plan will be developed and will include a guidance framework for addressing and mitigating identified risks. Procedures for addressing each business process will be documented and will include the response teams and communication structures.

The sixth phase will ensure that all the system contingency plan is tested and all stakeholders given training for preparedness in case a risk occurs (Moturi, 2014). The system will be tested to ensure it works correctly and that it gives expected results.

The last phase will detail the plan for maintaining the system through updates and patches. All procedures and update requirements will be documented for reference and will guide the patching process of future versions of the system (Moturi, 2014).

Summary

The major threats facing the UC following the implications of COVID-19 outbreak include cybersecurity threats which arise as a result of the integration of virtual networks which are entry points for hacking activities (Moeller, 2013). Unreliable infrastructure is also another threat caused by increased traffic which overwhelms the remote access support systems. The information system is limited to integrity risks resulting from limitations to track productivity of staff services, making it unreliable in accomplishing the business process.

The development of the contingency plan will involve the formulation of contingency policy to act as a guideline in developing the contingency plan (Moturi, 2014). The business impact analysis phase will involve the gathering of useful information from stakeholders and other supporting documents for detailed risk evaluation.

Risks obtained from business processes will be used in the third phase to develop response controls (Moeller, 2013). The disaster recovery plan will be planned in the fourth phase and will include the assignment of a response plan to each process and will include the assignment of response teams, each with members assigned roles and responsibilities. The formulated disaster response plan will undergo testing to ensure it is effective and that the team members have training and skills in handling such real-time risks. The last step of the contingency planning process involves the creation of a maintenance strategy detailing the procedures of patching systems and the release of new versions of the application (Moeller, 2013).

Question 2

Question 2.1

System failures are a major availability threat impacting information access from the remote locations. System breakdowns have been evidenced in recent times where services are limited due to bugs in remote access systems. The incompatibility of remote platforms with the institution’s remote access systems also poses availability risk causing access limitations. Bandwidth overload is also impacting the availability of information which is caused by congestion of traffic, resulting in slow services or no services. Penetration of communication channels by hackers also is a key threat to service access which is caused by virus and malware malicious activities (Teo & King, 2012). The service requests get redirected to inappropriate links causing limitations to access information from the UC information system.

Question 2.2

The backup strategy will be a key element to consider to ensure a reflective and continuous backing up of data to the current working state. This will enable restoration of information with minimised or no damage, thus ensuring continuity of the process. The backup strategy ensures data to be backed up is identified including the monitoring functions to always allow a regular restoration process to update information using the defined frequency (Moeller, 2013).

The maximum tolerance downtime for the process will be a key element to consider to ensure that the recovery of the information is finished in time to meet the submission key requirement. Interrupted services should be assigned the response time to allow for a defined timeline estimation aimed at meeting submission key requirement. The maximum tolerance downtime for the affected service process should not exceed the timeline for submission of the assignments. The element will focus on flexibility in completion of the tasks based on the remaining deadlines.

Summary

System failure is a major risk affecting the availability of information on the UC system based on remote access deployment. Platform limitations have also contributed to the lack of services from the institution caused by incompatibility issues.

The backup strategy and response time elements are the top key elements to consider in a personal disaster response plan. The backup strategy ensures a regular restoration and backup of data changes, thus providing continuity security to meet the completion and submission of services (Moturi, 2014). Response time for the process is a key element to consider in personal disaster response plan due to the need to track task completion and submission requirements.

References

Bechor, T., Neumann, S., Zviran, M., & Glezer, C. (2010). A contingency model for estimating the success of strategic information systems planning. Information & Management, 47(1), 17-29. https://doi.org/10.1016/j.im.2009.09.004Moeller, R. R. (2013). Novel approaches to contingency planning and security. Information Systems Security, 2(3), 34-37. https://doi.org/10.1080/19393559308551365Moturi, C. (2014). Embracing contingency planning for University information resources. British Journal of Applied Science & Technology, 4(3), 492-509. https://doi.org/10.9734/bjast/2014/6356Swanson, M., Bowen, P., Phillips, A. W., Gallup, D., & Lynes, D. (2010). Contingency planning guide for federal information systems. https://doi.org/10.6028/nist.sp.800-34r1Teo, T. S., & King, W. R. (2012). Integration between business planning and information systems planning: An evolutionary-contingency perspective. Journal of Management Information Systems, 14(1), 185-214. https://doi.org/10.1080/07421222.1997.11518158

Abstract

Abstract

The Savannah State Softball program has recently experienced many shortcomings. This research examines possible factors of those shortcomings. The purpose of the research project is to examine the ethical gap within the Savannah State Softball program. Finally, the research paper suggest recommendations on how to address ethical issues based on quantitative research of best practices used within other successful organizations. As a future coach it is important to understand the guidance needs of every athlete encountered.

Introduction

The Savannah State Softball program is one of the strongest and competitive women’s sport. The Savannah State softball program was originally started in 2001 by Stephanie Anderson. The program has competed in a few different conferences which include the Southeastern Athletic Conference, Southern Intercollegiate Athletic Conference, Division II Independent and Division I-AA Independent.

Presently, Savannah State Athletics resides within the Middle Eastern Athletic Conference. Competing in the MEAC, Savannah State softball has many accomplishments. In the past five years the program has won the Southern Division three times, had the Player of the Year three years in a row. The program has also been awarded Coach of the Year, and many Rookie of the Year players. This program was selected as a topic due to the recent lack of performance on the field during the 2017 season. This program is important to revive because it has the opportunity to be one of the strongest women’s teams in the Middle Eastern Athletic Conference.

Obviously, the program has been very successful since entering the MEAC in 2010. However, the programs short comings have nothing to do with talent or skill. Unfortunately, the issues of the program deal with leadership and ethics. To address this gap we must understand that there is no written code of ethics within the Savannah State softball program.

As a future coach it is important to understand the personnel within the program and their needs for guidance. It is the coach’s job to build student athletes into effective individuals for the work force by using tools such as a code of ethics. The purpose of this project is to examine the ethical gap within the program; and provide a recommendation based on quantitative research of other athletic programs and best practices. Highlighting ethics in a program is important for several reasons such as: it builds integrity and holds athletes accountable for their actions. In order to be successful as a coach a clear and definite code of ethics is essential.

Background/ Literature Review

Ethics are an essential part to any organization. According to the Merriam- Webster, ethics are defined as “a set of rules about good and bad behavior”. Ethical codes are standards used to guide decision making within an organization. Ethical codes or standards add the moral value to the rules of the team. According to Waegenerr, Sompele, and Willem “ethical codes have gained prestige and authority in the sports sector” (Willem, 2016). As collegiate athletes it is important for student athletes to understand their role as student leaders and should be held accountable for making ethical decisions.

An ethical code is generally a formal written document outlining what is considered appropriate behavior. Kaptien and Schwartz described a code of ethics as ‘‘a distinct and formal document containing a set of prescriptions developed by and for a company to guide present and future behavior on multiple issues for at least its managers and employees toward one another, the company, external stakeholders, and/or society in general’’ (Kaptien & Schwartz, 2008). Ethical codes are guidelines for every member of the organization. Coaches are not only sports technicians but also behavioral models of those prescriptions.

Although there are various ways to explore

Enforcing the code of ethics starts with the head of the program. The head coach should be the model of what the organization stands for. Ethics are visible from every form of perception.