Recent orders

Self- Concept

Self- Concept

Self-concept is a term that is used to define the feeling, thoughts and opinion of a person about himself. I general, it means how we evaluate ourselves or we can say that what aware of oneself is the concept of oneself. It is mainly related to cognitive aspect of a person’s thinking. It helps in understanding the person bout himself. It depends on various factors through which a person or a child makes his own opinion like personality traits, how we look, what are our moral values and goals in life, how we play a role in our life etc. All these factors help a person in analysis his situation and role and make the opinion about him. It is like a self-image what a person imagine or feel about him. It is continuous changing concept because it changes as our feelings and attitude change with time. As according to Baumeister (1999) Self – concept is “the individual’s belief about himself or herself, including the person’s attributes and who and what the self is”. In psychology, ‘self’ word defines the meaning of a person’s existence. It means how a person sees himself in terms of his self- image, feeling and thoughts about his weakness and strengths and perception about emotions, values and talents etc. The analysis of self gives the answers of two questions – who am I? And why I am here? In this regard, self – concept is a term that answers the question “Who are you”. This is related to the image what a person has views about himself. How he perceives himself personally in terms of how others perceive him, his own interpretations and evaluations and cultural teaching. Carl Rogers (1959) defines the three different component of self-concept –

Self- image – It shows a person’s knowledge about himself and others. It shows how a person knows or does not know about him and others. It can be increased by knowing more about oneself, listening by others etc.

Self – Esteem – It is related to the values. How a person place himself or his perceived self – worth about himself. It can be increased by seeking affirmation.

Ideal Self – It means how we want to be look like or represent ourselves in front of others.

In social word, the concept of self helps a person in analysing his worth and role in relations to others. He tries to impact his image in positive way on others. This is the reason that self-concept is related to explaining and prediction about one’s behaviour and feeling.

In our life, all these three terms – self-concept, self-esteem and self-efficacy are interrelated and not only important but necessary also to study and apply it into life. Self – concept helps in analysing ourselves while self-esteem is also very important part because a person should be aware about how he relates to himself his values. How a person place himself or his perceived self – worth about himself. It can be increased by seeking affirmation. For Example – if we are going to apply for a job, after attending the interview, what we expect acceptance or rejection about our self. it shows how we place our self. It shows our perceived self-worth after the interview. Thus from this example, it is clear that self-esteem helps a person in comparing himself with others that helps in improving their communication with others. Every person is different in itself. This is the reason that we find different level of self-esteem in others. Some people have very high level of self-esteem while others are found low in self-esteem. High Self-esteem people are those who have high self-respect and confidence and always want to earn the feeling of being unique and recognition. While the people who are low in their self-esteem found very boring and frustrating and show a negative attitude towards life. They have low confidence in themselves and have fear about taking initiative in new work. There are four important factors that influence the self-esteem of a person. These are reaction of others, comparison with others, social roles and identification. All these factors help a person in measuring his own self-esteem. Self-efficacy is also a very important part of self-judgement of a person. It means a person’s judgement about his own ability for performing a particular task. We can observe it whenever we found somebody to say either with confidence or lack of confidence like I can do it or I can’t do it because of lack of experience or any other reason. It shows the confidence of a person for a particular job and encourage him whether to pick or not to do a task.

I remembered one social experience when I was going to meet some old people who live in a house. I was associated with them before my marriage. But after my marriage, I started to stay in in a foreign location and this is the reason that it was not possible to meet them frequently. So after going there, I realised that everyone was very happy and eager to see me. This experience realised me my worth in eye of others and feel me important for them. It increases my confidence and a feeling of doing some work for them. It shows me how important I am for them and I can do lots of things for their betterment. This experience gives me a goal in my life for them.

Another experience was related to one social gathering where I met with my lots of sisters, brothers and cousins. We met each other and I found that all are doing very well in their life. In fact, I found them that they are very successful in their life because they are holding good positions in the renowned company. This experience forced me to think and evaluate about myself and I found that I do not exist anywhere. So it encourages me to do something good like them. This experience works me like an inspiration that encourages me to do hard work in my life to become like them.

There is no doubt that sometimes we learn something good and positive from others and some other times, we discourage and feel negative about oneself and feel scared for taking any new initiative in life. So it depends on our self-concept, self-esteem and self-efficacy. It helps us in understanding our behaviour, feeling, abilities and worth in social environment.

References

Saul McLeod (2008). Self-Concept. Retrieved on May 5 2013, from http://www.simplypsychology.org/self-concept.htmlSaul McLeod (2007). Carl Rogers. Retrieved from on May 5 2013, from http://www.simplypsychology.org/carl-rogers.htmlBaumeister (1999). The Self in Social Psychology. Philadelphia, PA: Psychology Press (Taylor & Francis).

SECURITY-THREAT-GROUP1

SECURITY THREAT GROUPS

STUDENT NAME

AFFILIATION

PROFESSOR

SUBMISSION DATE

Security threat groups pose threat to safety of other inmates and are a concern for correctional administrators. STGs is considered a formal or informal group in most city state prisons ,but clearly definition is prison gangs who are clustered with more than two members in custody. The SGT is primarily gang members getting together upon parameters such as (gang history, purpose, involvement in illegal activities structure and composition) but due to concern the term gang is not used. This informal group of prison inmates are involved in various activities that contribute to disruption within facilities and are a constant security concern.

The prison system is used as a hub for either punishment for crimes against society, prevention of future crimes or rehabilitation. The prison inmates are incarcerated to prevent them from doing any harm to society (Roth, 2006). This has been the case but due to gang affiliations the correctional agencies have been having a difficult time maintaining their goal. According to reports there has been recurring threats and disruptive behavior that has resulted into gang crime or gang violence while in custody. SGTs are involved in illegal activities that increase and poses a threat to other inmates, staff, prison guards and the institution.

In the prisons they have been known to be involved in illegal activities such as murder assault and kidnapping. Due to their affiliation STGs are known to hold control over other inmates by threatening and instilling fear. STGs may be considered as large groups such as the Aryan brothers or the Texas mafia but smaller and less complex prison gangs pose a major problem around the country to prison administrators.

Groups within the correctional facilities are involved in controlled substance distribution not limited to the correctional facility. These groups affect society at large by enforcing their rules outside the boundaries of the correctional facility. Gang affiliated members put out instructions while still in custody and are considered more dangerous because of their power (Skarbek, 2014).

Street gang member get their instructions from incarcerated gang members and carry out gang violence as per instructed. This poses a threat to society with the increased gang wars and the supply of illegal substances in the streets. Kidnappings, assault and murder are a constant norm in regards to gang affiliated regions. Racial extremism is a racial conflict that spreads inside the prisons. Inmates are segregated to a particular racial group and protect their territory as a unit SGT (Skarbek, 2014). This type of criminals further carried out extortion rackets to individuals who feared the safety of their lives.

An STG example is the Nuestra family that was able to conduct and carry out death hits and drug deals in secured housing units. The family distracted law enforcements to their activities by forming a different SGT for administrators to focus on. This are the threats that SGT pose to correctional facility and the problem needs to be solved (Skarbek, 2014)

Measures have been considered while vetting the threats of Security Threat Groups. The most affected parties are the prison administrators since they are with inmates on a daily basis. Staff members should be trained on handling this types of incidences. Through gang awareness and gang recognition training, the staff will have an idea of how the groups operate. Staff programs should be implemented and increase in administrators should be enforced. In statistical terms in most prisons the number of guards is unproportioned to the number of prisons thus blind spots will eventually develop (Miller & Gaines, 2012).

Gang control strategies have been implemented over the past few years to control the threats. This has been done through organizational, legal and legislative means (Miller & Gaines, 2012). Probation is one such method as it helps the offender live in the community under supervision. This measure tries to rehabilitate and reintegrate the offender into the society with probability that he/she will not commit a new offense.

The most effective and commonly used method is suppression strategies .This focuses on reducing gang violence, and recruitment within the institution. This can be done by taking steps like placing violent convicts or gang leaders into solitary confinement .Suppression can also be done by putting up segregation units or isolating problem inmates and gang members in pods to restrict interactions with other members.

Reference

Skarbek, D. (2014). The Social Order of the Underworld: How Prison Gangs Govern the American Penal System (1st ed.). Oxford: Oxford University Press.

Miller, R. L., & Gaines, L. K. (2012). Criminal Justice in Action (7th ed.). Cengage Learning.

Roth, M. (2006). Prisons and Prison Systems: A Global Encyclopedia (1st Ed.). USA: Greenwood Publishing Group.P.300-349

SECURITY POLICIES

SECURITY POLICIES

Student’s Name:

Institutional Affiliation

SECURITY POLICIES

Introduction

Serious new organizational security concerns have been brought with the widespread adoption of e-business. From the beginning the Internet has exhibited multifarious vulnerabilities in its Internet protocols, host systems, network administration and in its underlying communications nodes and network. The Internet’s ever-changing vulnerabilities have been continuously exploited by disgruntled employees, competitors, hackers and others, leading to loss of privacy and security, lost of customers, financial damage, uncertainty and disruption, and corporate embarrassment. In addition among the many employees often granted internet access for valid business purposes have been reported as having abused or misused the tool, either from lack of awareness of valid, value-adding business Internet usages, lack of understanding its insecurities, purely or from malicious intent. This makes the internet both a risky and profitable tool that needs protection in order to be effective to the organization.

Security policy

A security policy can be described as a strategy on how a company can implement information security technologies and principles. A security policy is different from security procedures and processes, in that both specific and high level guideline on how the company’s data should be protected will be included in the policy; however it will not provide a specific guideline for implementation or how it is going to be accomplished. This leaves room for choosing which methods and security devices are efficient for the budget and company. A security policy is vendor and technology independent, its main aim is to establish the policies, that if implemented will help attaining the recommended goal. All the company data and electronic system are covered under the security policy. A security policy as a general rule would not include the company’s data hard copies under its cover but some overlaps are inevitable, since at some point the now soft copies were initially hard copies. Three main objectives must be covered within a security policy namely; it must provide protection for the integrity of your company’s information, it must allow for the privacy and confidentiality of the company and it has to provide for the companies information availability (Dojkovski, Lichtenstein, & Warren, 2012).

Three security policies recommended for organization

Password policy is a security policy that would be efficient for any organization mainly since it’s designed as a set of rules that help enhance the security of a computer. It encourages the users to implement and use properly strong passwords in the systems. In most organization password policy is part of their official regulations and as such may often be taught as part of security awareness training. Its main advantage in a company is that it is designed in a way that it is able to effectively protect the organizations network resources by requiring strong passwords that are secure. It mitigates password capture through having secure transmission of the passwords; it mitigates cracking and guessing through a limit on entries frequency, construction of strong passwords. Avoidance and password expiration of recent used passwords, mainly to prevent re-use of passwords and reduction of the user load through use of local password management and Single sign on to enable stronger policies.

An NSP or network security policy is also a recommendable security policy for any organization. It can be described as a generic document that outlines computer network access rules, lays out some of the companies basic architectural environment of the network security and company security. The document that is written by a committee is usually several pages long as a security policy it is beneficial since it not only helps keep out unauthorized entries but also governs email attachments, habits of web browsing, use of encryptions and passwords and data access. It specifies these rules for individuals or groups throughout the different levels of the company. As an organizational security policy NSP would exert control over potential risky and keep malicious users out within an organization making it a good choice as a security policy. It will moreover make it easier to securely access personal files from any location (Gaskin, 1998).

Among the many security mechanisms available for storing personal and confidential information, data encryption is the most efficient and widespread. In that regardless of the storage method either hard or soft ware it is still easy, reliable, and fast. It is considered a powerful tool since it guarantees mitigations from any possible corruption without any flaws mainly due to its reliance on global standards for data encryption. It will also ensure that a company is compliant with security policies as part of its wide solutions; its solutions are efficient and cost effective for any organization. In case data encryption is written correctly it will enable the storage of critical data in the background while normal business is uninterrupted. In an organization it will help to protect and save any important information, whether on a desktop or laptop, email server, removable storage media, corporate network or a PDA file.

How to implement security policies

When preparing to implement a security policy it must first be backed by the company’s topmost management team. Since if they are not in support of the implementation it will lack the departmental corporation and it will more likely fail, therefore all heads of departments must get involved especially the legal services and the human resource must play a major role in the implementation.

Next is the reviewing of all the available security policies and understanding how they are important or can fit in the organization. Ensure that before the policy is enacted the relevant tools that align with it are in place. Next differentiate between procedures, policies and processes. Here there is need for careful consideration of the necessary procedures and processes needed after the policy is done. Certain procedures in addition must be created or added to help support the new policy. For example on how to notify the users if they are non- responsive or on how your users respond in case they suspect an incident with the security policies.

Next there should be emphasis on the user education, and on that note a training session on the policy should be held regularly to provide the basic data and training on security awareness and policy implementation. Users must acknowledge and accept the user- level policy in writing that will state if they have read the policies and they agree with it. This should be coordinated and handled by the human resource department where the user will sign the policy with other HR documents that might need the user’s signature.

Lastly it is important to note that there is no policy that will ever be applicable 100% successfully in all case scenarios no matter how well implemented it is. However, even in such cases exceptions can only be granted if they are well documented and written. It is important to note from the start that an exception to the policy can only be reviewed if the reasons benefit the business and this it cannot be excepted since the policy is regarded as the company’s official standard(Lichtenstein, & Swatman, 2001).

Conclusion

There are two similarities shared by the security policies that are efficient namely; they provide attainable and realistic security goals and they accurately reflect an organizations strategy for security. Recognize that a security policy should not be shelved after being created, but rather be consulted actively throughout the organization of the company. By incorporating into the company management process your custom security policy, it is possible to enjoy risk reduction for years to come or meet applicable regulations, depending on how it is implemented.

.

Reference

Dojkovski, S., Lichtenstein, S., & Warren, M. (2012). Challenges in fostering an information security culture in Australian small and medium sized enterprises. In ECIW2006: proceedings of the 5th European conference on Information Warfare and Security (pp. 31-40). Academic Conferences Limited.

Gaskin, J.E. (1998) Internet acceptable usage policies. Information Systems Management, 15(2).

Lichtenstein, S., & Swatman, P. M. (2001). Effective management and policy in e-business security. In Proceedings of Fourteenth International Bled Electronic Commerce Conference.