Saturday, May 23, 2020

Socrates Essay - 1596 Words

Socrates believes that the everyday world is an illusion compared to the world of knowledge. People are often too distracted by money and materialistic things to appreciate truth and reality. Socrates says, â€Å"the capacity for knowledge is innate in each man’s mind.† This exemplifies the point that man has the ability to look into the world of truth, but when one is caught up in superficiality then truth does not receive the attention and glory that it should. This is why Socrates feels that the arts, such as poetry, should be censored; it would help decrease the digression of society’s intellect. In today’s world television and movies are complications that only hinder the thought processes in society.When people are consumed in the†¦show more content†¦Since the material world is simply an illusion of the world of knowledge, then television and movies are an illusion of this illusion. One cannot look to these for the answers, or even try to relate it to their own life. It is not real and should not be looked upon as truth. Although movies are an exaggeration of real life, it is not an exaggeration of â€Å"the good† but rather, of the emptiness and shallowness of life.The allegory of the cave illustrates the difference between the materialistic world and the intelligible world. Socrates describes a man with his arms and legs chained, and his neck in a brace, which only allows him to look at a wall with shadows. This is a metaphor for the man who does not transcend to the world of enlightenment. They can only see shadows of what is real and true. Man memorizes these shadows and thinks that he is intelligent; however, truth lies beneath the depths of the everyday world, but can only be established when the layers of immateriality are torn away. Another aspect of the cave is the idea that if man escapes the cave and sees the light he is no longer able to see the shadows that he used to see. This would cause him to believe that the shadows were truer than the light; hence, the illusion of reality would be real to the man, rather than truth. This creates discordance because man will not be able to understand truth and that which is incontestable. The cave also symbolizes the idea thatShow MoreRelatedSocrates : The Suicide Of Socrates1405 Words   |  6 PagesSocrates was born in 470 BCE in Athens, Greece. His father was Sophroniscus, a sculptor and stone mason from Athens and his mother was a midwife by the name of Phaenarete (30 Interesting Socrates Facts 2014). Socrates original profession was masonry and sculpting, before becoming a philosopher. On a day in 399 BC, Socrates ( roughly 71 years at the time) went to trial.Now why would anyone want to send an old man to court? Three answer is that Socrates was accused of refusing to recognize theRead MoreSocrates And The Apology Of Socrates1322 Words   |  6 Pages Socrates is quite the unique individual compared to most, if not all, other Greeks at that time. In the Apology, Socrates gives an analogy of himself being a gadfly and that his gadfly like actions are favorable for Athens and that the actions are goods he is providing. From his service he claims to live a more private life than a public life when discussing virtue. This paper is going to discuss Socrates and his analogy of a gadfly, approach to others about virtue, his conduct effect on democracyRead MoreSocrates As A Martyr And Socrates927 Words   |  4 PagesIn philosophy class this semester we spoke a lot about Socrates and his trial. We were required to read the dialogue ‘Apology’ by Plato. The à ¢â‚¬ËœApology’ Dialogue is what Plato recorded during the speech Socrates gave to the court defending himself against the charges of corrupting the young, and by not believing in the gods in whom the city believes† these two were the main charges, but underneath that there were also other significant charges such as being considered an antidemocratic or pro-SpartanRead MoreSocrates : The Problem With Socrates908 Words   |  4 PagesThe Problem With Socrates: The problem with Socrates concerns the problem with the role of value and reason. Nietzsche believes that the bulk of philosophers claim that life is a corrupt grievance for mankind. Nietzsche reasoned that these life deniers were decadents of Hellenism, as a symptom of some underlying melancholy. For someone to paint life in such a negative light they must have suffered a great deal through the course of their own life. Furthermore, these no-sayers agreed in various physiologicalRead MoreSocrates Worldview Of Socrates1855 Words   |  8 PagesPart 1: Socrates’ Worldview Socrates is a widely renowned teacher, who has taught and demonstrated a variety of lessons that regard how he views the world. Socrates has described his view on morality, purpose, death, and the ultimate. He has spoken about these views through multiple texts including The Last Days of Socrates and they have been interpreted through the text Socrates by George Rudebusch. Through these worldviews, Socrates has given people the opportunity to expand their wisdom andRead MoreSocrates1461 Words   |  6 PagesSocrates was one of the greatest Greek philosophers. His work was not to propose any specific knowledge or policy: it was to show how argument, debate, and discussion could help men to understand difficult issues. Most of the issues he dealt with were only political on the surface. Underneath, they were moral questions about how life should be lived. Such is the influence of Socrates that philosophers before him are called the Presocratic philosophers. Socrates made enemies, three of whom broughtRead MoreSocrates1099 Words   |  5 PagesSocrates the Greek Philosopher December 14, 2014 PHI/105 In the beautiful city of Athens, Greece, there was a philosopher Socrates, and his Socratic method, was laid on the groundwork for the Western systems of logic and philosophy. Socrates did believe that he didnt know anything, and It was because of this that the Oracle told Socrates that he was wise and that he should seek out the wise men to hear what they had to say. So Socrates began to travel to different parts of Greece to questionRead MoreSocrates659 Words   |  3 PagesSocrates Socrates was accused of many things in the Athens market. Socrates was accused of being a man who makes the worse argument into the stronger argument. A man who knows about the heavens and earth and therefore any one who believe this must not believe in the gods. Socrates was accused of being an atheist. Most of the people that followed him around his quest were inquisitive. Where as most adults would walk by Socrates with his â€Å"annoying question† the youth stopped to see what heRead MoreSocrates : A Man By The Name Of Socrates963 Words   |  4 PagesIn 469 B.C. a man by the name of Socrates was born. Socrates was a very wise man that cared about doing the right thing. He believed that the best ways to develop ideas was in the give and take of conversation, and that the best way to educate people was to ask them a series of questions leading in a particular direction (now named â€Å"Socrates method). Socrates had been quick to identify the drawbacks of democracy, and he had also been the teacher of two men who in different ways harmed Athens: AlcibiadesRead MoreSocrates s Views On Socrates1314 Words   |  6 PagesSocrates could undeniably be described as one of the most influential philosophers and greatest thinker of his time. His views can be interpreted many different ways, but most would agree that he sought out wisdom and truth for the betterment of himself and his community. Though Socrates was one of the most intelligent men of his time, he was very foolish to never write his own book. For this reason, after his passing, one of his students, Plato, began to write a book about his teachings and ideas

Wednesday, May 6, 2020

Leadership in a Global Environment Free Essays

Management vs. Leadership Management Leadership – Vision strategy – Keeping an eye on the horizon – Creating shared values – Helping others grow – Reducing boundaries – Focusing on people – Based on personal power – Acting as a coach – Emotional connections – Open mind – Listening – Nonconformity – Insight into self – Creates change and a culture of integrity Source: Daft (2008), p. 15 Leadership Direction: Planning budgeting – Keeping an eye on the bottom line – Organizing staffing – Directing controlling – Creating boundaries – Focusing on products – Based on position power – Acting as boss – Emotional distance – Expert mind – Talking – Conformity – Insight into organization Alignment: Relationships: Personal Qualities: Outcomes: – Maintains stability – Creates culture of efficiency De finition of culture Internet in Leadership Germany Members of a group or a society sharing a distinct way of life with common values, attitudes and behaviors that are transmitted over time in a gradual, yet dynamic process. We will write a custom essay sample on Leadership in a Global Environment or any similar topic only for you Order Now Source: Harris, J. E. / Moran, R. T. (1979). International Context Culture Bbehavior Values Attitudes Source: Adler (2002) p. 17. Values – attitudes – behavior Internet in Leadership Germany Values = explicit or implicit desirable to an individual or group = influences the selection from available modes, mearns and ends of action International Context = can be both consciously and unconsciously Attitudes = expresses values and disposes a person to act or react in a certain way to something Bbehavior = any form of human action Source: Adler ( 2002), p. 18. Linking values to behavior Internet in Leadership Germany Bbehavior Value Sample Countries/Areas China/Thailand Australia/United States 1 2 Use of understatement Asking people to call you by your first name Taking off from work to attend the funeral of an aunt Not helping the person next to you on an exam Disagreeing openly with someone at a meeting Not laying off an older worker whose performance is weak H Indirectness F Informality Centrality of family Self-reliance 3 B Venezuela/Korea International Context 4 5 6 I Switzerland/Canada Germany/England A Directness E Respect for age Japan/Pakistan 7 At a meeting agreeing with a suggestion you think is wrong D Saving face Asia generally 8 Inviting the teaboy to eat lunch with you in your office J Egalitarianism Cambodia/Vietnam 9 Asking the headmaster’s opinion about something you’re an expert on G Defence to authority India/Brazil 10 Accepting, without question that something can’t be changed C External Control Saudi Arabia/Turkey Source: www. uop. edu/sis/culture. Culture: The hidden dimension Culture has observable aspects and suspected, imagined, or intuited. Internet in Leadership Germany Holiday customs Facial expressions Paintings Food Music Eating habits Literature Concept of personal space Work ethic Gestures International Context Rules of social etiquete Religious beliefs Concept of beauty Childraising beliefs Importance of time Values Concept of leadership Concept of fairness Concept of self General world view Nature of friendship Source: www. uop. edu/sis/culture. Cultural dimensions by Hofstede Internet in Leadership Germany – based on the first and most detailed cross-cultural research study – national culture explained more of the differences in work-related values and attitudes than did position, profession, age or gender International Context 1. Power distance . Individualism 3. Masculinity 4. Uncertainty avoidance 5. Long term orientation Source: www. geert-hofstede. com. Power distance Internet in Leadership Germany 1. Power distance = degree of equality, or inequality, between people in the country’s society. International Context High Power Distance – Core value: respect for status – Core distinction: powerful/dependant – Key element: centralization Low Power Distance – Core value: people‘s equality – Core distinction: whether or not responsible for a certain task – Key element: decentralization Individualism 2. How to cite Leadership in a Global Environment, Papers

Saturday, May 2, 2020

Smart Phone free essay sample

It has been said that a smartphone is â€Å"a microcomputer in your hand. † Discuss the security implications of this statement.? gt;Just a couple of years ago the biggest software concern we had about our cellphone was whether or not it could play Snakes. Today, smartphones have become a popular target among hackers and malware producers. It is a high-reward business because most people are unaware that their cellphone is just as vulnerable to cyber attacks as their desktop computer. Think about all of the things that you do on your cellphone, and then imagine a worst case scenario we can keep our cellphones, and our data, safe. gt;The most obvious threat to the security of our smartphones is simply for the device to falls into the wrong hands. As silly as this sound, most cases of smartphone data theft begins with a lost or stolen phone. The first line of defense is common sense. Dont put your phone down in a public place, and dont leave it where it is easily grabbed. In short, treat your phone as you would your wallet. In case your phone does get snatched by a passing evildoer, the next step is to make sure that you have a secure screen lock. For Blackberry, iOS and Windows phones use a secure password. Something thats easily remembered, but not easily guessed. If it includes personal information such as your name, birthday or address it is not safe. For Android users, make sure that your unlock pattern is relatively complex and crosses over itself. If not, somebody can deduce your pattern from the repeated smudge marks on your screen. gt;As with every computer, a good password alone is not enough to protect us. If our phone does get lost or stolen there is a line of software that will help you recover it, or wipe the data if you are unable to do so. The first step is a piece of software that will lock your phone down. This software will turn off the phones screen and disable it, preventing an attacker from being able to easily access your information through the phones operating system. Most of these programs will also be able to lock down the phones communication ports stopping people from simply plugging your phone into a computer and downloading the information that way. The next piece of software will turn on the GPS on your phone and lock it on. This way, as long as your phone has a battery with some life in it your hone will continuously broadcast its location. This can be a huge help in a situation where you have simply lost your phone. Activate this feature and your phone will pop up on a map making it a simple matter to locate it. In the case of a theft, you can provide the location to the police department, gt; Vastly increasing the odds of recovering your phone. The last ditch effort in the case of a lost or stolen ph one is software that will completely wipe the memory. This is useful when other means of recovery have failed, and you have given up on hopes of recovering your phone. This software will remove all traces of personal information. In addition to the threat of losing physical control of your phone, there is the threat of malware. Smartphone malware is similar to the viruses and Trojans found on your home computers. Recently, Google had to remove 50 apps from their app store that they found to be malicious. These apps had already been downloaded to thousands of phones apiece. Apple and Amazon have also experienced malicious apps infiltrating their app stores. People get a false sense of security downloading programs from these large companies. gt;They assume that these corporations have already weeded out all of the bad apples, and only post the good. While this is certainly the goal, it is impossible to be 100% certain 100% of the time. Oftentimes, a software programmers account will get hacked. The culprit will take down their legitimate app and replace it with a copy that contains malicious code. This is usually discovered within hours, but by then the app has already been distributed to enough people to make the attack worthwhile. Another attack that has become popular is one in which a developer submits a legitimate program in order to get it approved for the app store. gt;Once the app has been approved and downloaded by a sufficient number of people, the developer releases an update which contains malicious code. These attacks are much harder to control, as the updates will go out immediately to every person that has downloaded the app. For these attacks you need a good anti-malware program running on your phone. Most of the major players in the PC malware game have mobile security suites as well. Familiar names such as AVG, A vast, Avira, Kaspersky, Norton, and McAfee all have mobile suites. Most of these suites include all of the protections that were mentioned earlier. However, the interface can vary greatly from provider to provider. Some will allow you to engage and interact with the anti-theft features via text messages to your phone, while others will use an internet browser. Some suites will be free and others will have to be paid for. You will still have to do your homework to determine which security suite will best fulfill your needs. Hopefully Ive armed you today with the information youll need to make an informed decision. As always, if you are still unsure whether or not youre phone is safe consult a professional for their opinion. 2. What people, organization, and technology factors must be addressed by smartphone security? Most organizations will find that they do indeed have a need for mobile security, and could use guidance on the most effective best practices. These include: †¢ Force encryption of data at rest on mobile devices Force secure connectivity on unsecured public networks †¢ Confirm unauthorized mobile devices do not have access to corporate LAN †¢ Confirm mobile user spending is in line with the mobile policy and additional costs can be recovered †¢ Over-the-air decommissioning (remote bricking) of lost or stolen devices to help prevent access to the data †¢ Authentication: set the device to auto-lock; set limit for unauthorized login attempts. Keep device out of sight when not worn †¢ Handheld devices should be enterprise property Before an employee departs, obtain device and remove corporate data †¢ Have a clear policy on remote data deletion and do not hesitate to execute it †¢ Classify data according to the sensitivity of the data carried †¢ Only permit digitally signed applications †¢ Be agile—quickly and flexibly adapt to changing mobile landscape Most organizations will find that they could use help in addressing the complexities of mobile device and application security. As mobile device processing power is increasing, more sophisticated security controls can lso be applied, and it’s important to work with a provider who has a comprehensive understanding of all of the issues. A qualified provider should have expertise across three key dimensions—business, operations, and technology—because they combine to control the costs, and strengthen the security of the devic e, information and your overall organization. The provider should offer solutions that leverage existing assets, personnel, and technologies, and should provide coverage across the entire project lifecycle, including consulting services and managed security services. In order to help organizations secure their mobile applications and the underlying supporting infrastructure, a provider should have wide and deep experience with all aspects of security. For example, they need to understand that applications function more like native apps rather than utilizing a standard browser and that mobile apps are not restricted to using standard HTTP/HTTPS. They must also have access to many security testing resources, as fragmentation in hardware, operating systems, applications, and operators can present challenges. For example, there are multiple versions of the same applications for disparate mobile operating systems. In addition, there are countless mobile devices, and the supported technologies (communication, access control, storage, etc. ) vary by manufacturer and OS (Symbian, Oracle J2ME, Qualcomm BREW, iPhone, Windows Mobile, Window Phone 7, webOS, and Android). TECHNOLGY ON SMART PHONE SECURITY: Findings of two recent examinations of mobile devices highlight how designers of smartphones and tablet PCs failed to fully account for security and privacy implications. Today’s smartphones and tablet devices perform the same functions as a PC, says Dan Hoffman, chief of mobile security at Juniper Networks. â€Å"However, the vast majority of devices lack security software and mistakenly relies upon the operating system to keep people safe. In one study, security firm Cryptography Research showed how its possible to eavesdrop on any smartphone or tablet PC as it is being used to make a purchase, conduct online banking or access a companys virtual private network. The process used to encrypt data can be deciphered, enabling a criminal to use them to access a financial account or a company etwork, says Benjamin Jun, Cryptography Researchs chief technology officer. These type of attacks do not require the device to be modified, and there is usually no observable sign that an attack is in progress, Jun says. Cryptography Research is working with one of the major smartphone. And tablet companies right now to put countermeasures in, Jun says. No known actual attacks have occurred, he says. In another demonstration, researchers at security firm McAfee, a division of chipmaker Intel, highlighted several ways to remotely hack into Apple iOS, the operating system for iPads and iPhones. . What problems do smartphone security weaknesses cause for businesses? We are all so mobile these days. And its so cool that we can take our business with us in our back pocket. But there’s a problem with that too. It’s easy to forget how much sensitive da ta our phones have access to. Losing it could put your business at a huge risk. In a news release from Deluxe Corporation, they said nearly 40 million Americans currently access bank accounts and financial records through mobile devices, such as smartphones and tablets, according to Consumer Reports. But, unlike most computers and laptops, mobile devices rarely feature security software. Recognizing this weakness, hackers are increasingly preying on small business owners, accessing mobile devices to steal sensitive data and commit acts of fraud. -gt;With smart phones users can search the internet, make phone calls, listen to music, have navigation, and download applications from their Smartphone’s application market. When a user downloads an application onto his or her phone they are at risk from adware privacy. Most users to include myself did not believe that Smartphone’s were not at risk from privacy risks and viruses. -gt;Android marketplace applications for malware, a weakness in the program allows for potential hackers to covertly update apps that have passed Bouncer security, so they can then load malicious websites or view files on the targeted smartphone. Through this method hackers could ostensibly take full control of the users phonean end result that could be potentially devastating for a business if the phone contains sensitive information. While identity theft through mobile devices is becoming more common, these devices are equipped with security features to help users to protect themselves – but it’s up to you to activate them. Here 1) Turn on password protection and auto-lock feature on all smart phone, tablet and laptop devices. If your phone is lost or stolen, this is an extra measure to protect your information. By password protecting your device and activating an auto-lock feature, users can control the number of password attempts before the device locks itself. 2) Enable remote tracking and wiping capabilities. Remote tracking allows users to physically track the location of the phone, while remote wiping allows you to clear all data if your phone goes missing. 3 )Expect the best, plan for the worst. While there are extra precautions that can reduce the likelihood that you or your business might become a victim of fraud, there is no failsafe. Dealing with the effects of fraud and identity theft can cause massive disruptions to your business. Put plans in place so that if you become a victim, you can resume business as quickly as possible. . What steps can individuals and businesses take to make their smartphones more secure? Setting Up A PIN and/or A Password Protection: The easiest way that you can instantly instill an â€Å"Iron Clad† smartphone security protection protocol is by creating an uncrackable PIN or a secure password that anyone who uses the smartphone needs to unlock. This is usually located and accessible on the mobile devices â€Å"Settings† tab, this depending on the smartphone model and OS platform. The only option that you may have is creating a secure PIN number. Setting a password is generally considered to be a lot more secure however. If your smartphone is equipped with Google’s Android OS version 2. 2 or later, then you’re also able to set a swipe pattern as well on these devices, this to unlock the smart phone. What you do is configure Remote Find and then Data Wipe. If you unfortunately happen to lose your smartphone, or if it’s stolen, the remote find and data wipe app will allow you to remotely locate the devices location and then erase all of the information that’s stored on it. It’s also advised that you back up this data on a regular basis as well. So this way, whoever happens to get access to your mobile won’t be able to access it. What this involves is initially installing the app on the device and then creating an online account from where you’re able to track the smartphones exact location once you’ve is placed it. Then you can completely wipe its contents as a last resort if you need to. Warning On Attachments As Well As QR Codes: This is similar to the approach that you most likely are taking when opening any unfamiliar email attachments that you receive from unknown senders on your desktop computer. You should be taking extra precaution while on your smartphone when clicking on or opening any links and files from someone you don’t know . Otherwise, you could potentially and unknowingly be installing a virus that some unsavory individual has embedded into an attachment designed to steal your data, track your movements, access all of your contacts, and everything else in between. This also applies to scanning any QR Codes (Quick Response) as well, where hackers are now able to easily infect your device with malware by you clicking on one of these square codes. Make sure that you always practice extreme due diligence, especially as these devices are a lot more portable and vulnerable. Always Update Your Smartphone Software: Installing security as well as OS updates as they become available are always recommended, as they will often contain updated â€Å"fixes† for any security flaws and vulnerabilities. Also make sure that you backup the device regularly, this includes all of your contacts and stored data. So in the event that you ever lose it, you can replace or reinstall that information on the new phone. Make sure that you download applications directly from the official App stores and no where else. Always look for reviews as well as ratings and complaints before you download an app. Always make sure that you keep them updated after they’re installed as well. Wi-Fi Security: Always disable any automatic wireless connections on your device, especially if you routinely use free Wi-Fi networks, or if you have a habit of leaving your Wi-Fi connection on. Turning off the devices automatic Wi-Fi connection settings will reduce the risk of hackers who may have created a public Wi-Fi network, designed just to steal personal data that’s traveling over it. For the same reasons, always turn off your Bluetooth as well when it’s not in use. Always make sure that you keep your smartphone on your person or visible where you can always see it. The best and easiest practice when it comes to smartphone security is to know exactly where it is at all times. When you consider all of the valuable personal as well as the sensitive business data that’s on it, it’s a good idea to know where your smartphone is at all times.