Sunday, May 24, 2020

Fathers Day - Free Essay Example

Sample details Pages: 4 Words: 1122 Downloads: 4 Date added: 2017/09/24 Category Advertising Essay Type Narrative essay Tags: Celebration Essay Did you like this example? Fathers Day is a widely known celebration honoring fathers and celebrating fatherhood, paternal bonds, and the influence of fathers in society. It is celebrated on the third Sunday of June in many countries and on other days elsewhere. It complements Mothers Day, the celebration honoring mothers. Contents[hide] * 1 History * 1. 1 Commercialization * 2 Spelling * 3 Dates around the world * 4 International history and traditions * 4. 1 Argentina * 4. 2 Australia * 4. 3 Costa Rica * 4. 4 Denmark * 4. 5 Germany * 4. 6 Hindu tradition * 4. Japan * 4. 8 Seychelles * 4. 9 Nepal * 4. 10 New Zealand * 4. 11 The Philippines * 4. 12 Roman Catholic tradition * 4. 13 Romania * 4. 14 Singapore * 4. 15 Taiwan * 4. 16 Thailand * 4. 17 United Kingdom * 4. 18 United States of America * 4. 18. 1 Antecedent * 5 See also * 6 References * 6. 1 Bibliography * 7 External links| [edit] History Fathers Day is a celebration inaugurated in the early twentieth century to complement Mothers Day in celebra ting fatherhood and male parenting. It is also celebrated to honor and commemorate our forefathers. Fathers Day is celebrated on a variety of dates worldwide and typically involves gift-giving, special dinners to fathers, and family-oriented activities. Contrary to popular belief, the first observance of Fathers Day actually took place in Fairmont, West Virginia on July 5, 1908. The special day was organized by Mrs. Grace Golden Clayton, who wanted to celebrate the lives of the 210 fathers who had been lost in the Monongah Mining disaster several months earlier in Monongah, West Virginia, on December 6, 1907. The First Fathers Day Church, now the Central United Methodist Church, still stands in Fairmont today. [1] Various other sources believe (possibly because West Virginia did not officially register the holiday. [citation needed]) that the first Fathers Day was held nearly two years later on June 19, 1910 through the efforts of Sonora Smart Dodd of Spokane, Washington. Afte r listening to a church sermon at Spokanes Central Methodist Episcopal Church in 1909 about the newly recognized Mothers Day, Dodd felt strongly that fatherhood needed recognition, as well. 2] She wanted a celebration that honored fathers like her own father, William Smart, a Civil War veteran who was left to raise his family alone when his wife died giving birth to their sixth child when Sonora was 16 years old. [3] The following year with the assistance of Reverend Dr. Conrad Bluhm, her pastor at Old Centenary Presbyterian Church (now Knox Presbyterian Church), Sonora took the idea to the Spokane YMCA. The Spokane YMCA, along with the Ministerial Alliance, endorsed Dodd’s idea and helped it spread by celebrating the first Father’s Day in 1910. Sonora suggested her father’s birthday, June 5, be established as the day to honor all Fathers. However, the pastors wanted more time to prepare, so on June 19, 1910, young members of the YMCA went to church wearing r oses: a red rose to honor a living father, and a white rose to honor a deceased one. [3] Dodd traveled through the city in a horse-drawn carriage, carrying gifts to shut-in fathers confined indoors by illness. [3] It took many years to make the holiday official. In spite of support from the YWCA, the YMCA, and churches, Fathers Day ran the risk of disappearing from the calendar. [4] Where Mothers Day was met with enthusiasm, Fathers Day was often met with laughter. [4] The holiday was gathering attention slowly, but for the wrong reasons. It was the target of much satire, parody and derision, including jokes from the local newspaper Spokesman-Review. [4] Many people saw it as the first step in filling the calendar with mindless promotions. [4] A bill to accord national recognition of the holiday was introduced in Congress in 1913. 5] In 1916, President Woodrow Wilson went to Spokane to speak in a Fathers Day celebration and wanted to make it official, but Congress resisted, feari ng that it would become commercialized. [3] US President Calvin Coolidge recommended in 1924 that the day be observed by the nation, but stopped short of issuing a national proclamation. Two earlier attempts to formally recognize the holiday had been defeated by Congress. [6] In 1957, Maine Senator Margaret Chase Smith wrote a proposal accusing Congress of ignoring fathers for 40 years while honoring mothers, thus [singling] out just one of our two parents[6] In 1966, President Lyndon B. Johnson issued the first presidential proclamation honoring fathers, designating the third Sunday in June as Fathers Day. [3] Six years later, the day was made a permanent national holiday when President Richard Nixon signed it into law in 1972. [3][6] In 2010, the Fathers Day Centennial Celebration[7] occurs in Spokane with a month of events commemorating the day. In addition to Fathers Day, International Mens Day is celebrated in many countries on November 19 for men and boys who are not father s. [edit] Commercialization The Associated Mens Wear Retailers formed a National Fathers Day Committee in New York City in the 1930s, which was renamed in 1938 to National Council for the Promotion of Fathers Day and incorporated several other trade groups. [8] This council had the goals of legitimizing the holiday in the mind of the people and managing the holiday as a commercial event in a more systematic way, in order to boost the sales during the holiday. [8] This council always had the support of Dodd, who had no problem with the commercialization of the holiday and endorsed several promotions to increase the amount of gifts. 9] In this aspect she can be considered the opposite of Anna Jarvis, who actively opposed all commercialization of Mothers Day. [9] The merchants recognized the tendency to parody and satirize the holiday, and used it to their benefit by mocking the holiday on the same advertisements where they promoted the gifts for fathers. [10] People felt compelled to buy gifts even though they saw through the commercial facade, and the custom of giving gifts on that day became progressively more accepted. [10] By 1937 the Fathers Day Council calculated that only one father in six had received a present on that day. 10] However, by the 1980s, the Council proclaimed that they had achieved their goal: the one-day event had become a three-week commercial event, a second Christmas. [10] Its executive director explained back in 1949 that, without the coordinated efforts of the Council and of the groups supporting it, the holiday would have disappeared. [10] [edit] Spelling Although the name of the event is usually understood as a plural possessive (i. e. day belonging to fathers), which would under normal English punctuation guidelines be spelled Fathers Day, the most common spelling is Fathers Day, as if it were a singular possessive (i. . day belonging to Father). In the United States, Dodd used the Fathers Day spelling on her original petition f or the holiday,[2] but the spelling Fathers Day was already used in 1913 when a bill was introduced to the U. S. Congress as the first attempt to establish the holiday,[5] and it was still spelled the same way when its creator was commended in 2008 by the U. S. Congress. [11] [edit] Dates around the world The officially recognized date of Fathers Day varies from country to country. This section lists some significant examples, in order of date of observance. Don’t waste time! Our writers will create an original "Fathers Day" essay for you Create order

Wednesday, May 13, 2020

Individual Identity Essay - 1387 Words

The quest to find one’s identity and have a sense of individuality is rampant in Kazuo Ishiguro’s Never Let Me Go. The humanistic urge to have purpose is embodied in the characters of Kathy, Tommy and Ruth very differently. They each know that their life’s purpose is to donate until â€Å"completion,† yet on the way there they explore themselves and find out there is more to each of them than their vital organs, even if that is how society has labeled them. The three main characters, clones who are lepers of Ishiguro’s dystopian society, attempt to find purpose in their existence beyond containers of vital organs. The clones’ background at Hailsham gave them insight into culture, art, and the world for everyone else but there identity was†¦show more content†¦it all goes away when the connections she had concluded. Kathy and the clones knew they were different from the â€Å"regular† humans, but to what extent, they had no idea. â€Å"We certainly knew- though not in any deep sense- that we were different from the normal people outside; we perhaps even knew that a long way down the line there were donations waiting for us. But we didn’t really know what that meant† (69). Despite the fact that the clones knew their true purpose, they stayed unsatisfied and continued their search for an individual identity. Many of the clones believed that if they found their â€Å"possible,† or person they were cloned from, they would be able to figure out who they were. â€Å"Nevertheless, we all of us, to varying degrees, believed that when you saw the person you were copied from, youd get some insight into who you were deep down, and maybe too, youd see something of what your life held in store† (140). However, once they were cloned from these people they no longer had anything to do with their original. â€Å"There were some who thought it stupid to be concerned about possible at all. Our models were an irrelevance, a technical necessity for bringing us into the world, nothing more than that. â€Å"It was up to each of us to make of our lives what we could† (140). The clone’s depended on their model for their own existence but are left to fend for themselves after they come into the worldShow MoreRelatedIdentity and the Way Individuals Shape Their Identities for Themse lves1341 Words   |  6 PagesIdentity and the Way Individuals Shape Their Identities for Themselves One of the central issues of psychology is identity and the way individuals shape their identities for themselves. People live in different regions all around the globe and are consequently exposed to a distinct type of culture, religion, education, family values and media. These influences instill certain rigid values in people from birth, which configures their self-concept and the way they perceive other individualsRead MoreIdentity Is A Combination Of Two Individual Perceptions1428 Words   |  6 PagesDrue Professor: Mahala Pacs 1 22 October 2015 My Identity Is Identity is a combination of two individual perceptions, it refers to both a sense of who we are as a person and as a contributor to society. The first form of identity is self identity or true identity, which is the concept of yourself that you identify. The second form of identity, outer identity, is the concept or way others perceive you. Both identities collectively make up an individual and are the product of many years of life evolvementRead MoreCultural Identity Is The Belonging Of An Individual1958 Words   |  8 PagesCultural identity is the belonging of an individual to a group. According to the iceberg model of culture, this group typically shares the same behaviors, beliefs, and values and thought patterns. As someone whose response to the question â€Å"where are you from?† sounds more like strained sounds than actual words, I have struggled tremendously with determining the cultural identities that construct my identity. I often feel more like a cultural chamel eon than an individual possessing cultural identitiesRead MoreGender and Individual Identity596 Words   |  2 PagesGender is commonly conceived as a central part of an individual’s identity that extends further than merely one’s physiological sex. The idea of women and men being separated by innate differences has been scientifically disproved due to the lack of evidence. It is thereby apparent that gender is a discursive construct by means of creating prominent social role identities that hierarchically separate men from women. These classificatory practises have vast effects that tend to propel male authorityRead MoreRelationship Between Individual Identities And Organizational Culture2498 Words   |  10 PagesOur everyday behaviour, whether at work or at home is believed to be shaped through our individual identities (Watson, 2006), however the extent to which these individual identities are shaped by the organisation is questionable. This essay will scrutinize the relationship between individual identities and organisational culture, looking at whether individual identities are actually shaped by the corporate culture, whilst reflecting on whether or not experiences outside of work can also have an influenceRead MoreIndividual Identity Is Constructed By Many Things, Ranging1598 Words   |  7 PagesIndividual identity is constructed by many things, ranging from perceptions from others to perception of self, and is constantly changing as life’s complexities increase. Fear, or the distressing feeling of anxiety and angst, is also an unlikely but extremely important component of composition of identity as one gets older, for it is fear that shapes identification and interaction, especially in a group setting. A case where this is apparent is within Predominantly White Institutions, or PWIs, andRead MoreAn Individual s Identity Is Shaped By Many Aspects Of Their Life1419 Words   |  6 PagesAn individual’s identity is shaped by many aspects of their life, but the ones where they either experienced hardship or were oppressed are the most prominent in defining their identity. Individuals who identify as LGBTQ often have to deal with issues of inequality in their everyday lives, because the dominant group, straight individuals, create an environment where others feel oppressed. In many situations the dominant group feels as though anyone not like them needs to change, and because theyRead MoreThe Nature Of Identity Is Attributed By The Environment That Influences The Experiences That The Individual Intakes1464 Words   |  6 PagesThe nature of one’s identity is attributed by the environment that influences the experiences that the individual intakes. Self is the fundamental being that separates individuals due to the uniqueness of their minds and the experiences that influence the distinctiveness of identity. Martha Stout’s background in psychology initializes a deeper understanding of sel f through the analysis of stories told by her patients who suffer from dissociation in her writing called â€Å"When I Woke Up Tuesday MorningRead MoreCriminal Responsibility in Individuals with Dissociative Identity Disorder3385 Words   |  14 Pagescourt for a plea of insanity. Multiple personality disorder or more recently known as dissociative identity disorder (DID) is a dissociative disorder characterized by its bizarre feature of two or more distinct identities or personality states which intermittently take control of the affected person’s behavior (4th ed., text rev.; DSM–IV–TR; American Psychiatric Association, 2000). Though the individual may or may not be aware that the other personalities exist, they will have knowledge of their amnesicRead MoreHow Technology Has Made Individuals Identity More Susceptible From Be Stolen920 Words   |  4 Pages In the past several years, technology advancement has made individuals identity more susceptible to be stolen. I find this topic to be very interesting because I have had my identity compromised. Several years ago when I was nineteen I was completing credit reports on several popular credit reporting websites. Each time I would finish answering the questions and putting all of my pers onal information into the website I would be directed to another questionnaire where I would be asked to list properties

Wednesday, May 6, 2020

The Westerner vs “The Bride Comes to Yellow Sky” Free Essays

Claire Schneider Joseph Libis English 1002 May 30, 2009 Two works of Literature, â€Å"The Bride Comes to Yellow Sky†, the short story, and â€Å"The Westerner†, the film, try to convey the civilization of the old west, which allows for settlement and development of traditional American values, which are associated with honest and hard working people in the West Texas frontier. Although, one of these works does a better job of conveying overall theme. Between â€Å"The Bride comes to Yellow Sky† and â€Å"The Westerner†, I would say that â€Å"The Westerner did a better job of civilizing on the Western frontier. We will write a custom essay sample on The Westerner vs â€Å"The Bride Comes to Yellow Sky† or any similar topic only for you Order Now Throughout the film, it seemed as they were always arguing with each other, but in the end Jane Ellen Mathews, and Carl Hardin became friends. One way to prove this would be that Carl had said that he thought Jane Ellen’s hair was the most beautiful hair he had ever seen. He wanted to keep a lock of her hair. To me, that says a lot if you want to keep a lock of some ones hair. There was a scene in which there was a play in which Judge Roy Bean purchased all of the tickets for. Before the play began, Carl Hardin appeared, and they started to have a shooting match. I’m not sure what the reason was. After a long match, they both decided to call it even and make up. It’s always great when movies wind up having a great ending. Two of the characters, Jane Ellen, and Carl Hardin, wanted to have a home together. In Bride Comes to Yellow Sky, two people have just gotten married, and are on board a train to Yellow Sky. When they arrive back in Yellow Sky, they rush towards Jack Potter’s house, but they see, on their way six men sitting at a bar, and a man comes out and announces that Scratchy Wilson has been drinking again. In the very beginning of â€Å"The Westerner† there were men sitting at a bar drinking. This would be one similarity that the two works of literature share. How to cite The Westerner vs â€Å"The Bride Comes to Yellow Sky†, Papers

Tuesday, May 5, 2020

Security and Risk Management Proposal for MYOB Australia - Samples

Question: Discuss about the Security and Risk Management Proposal for MYOB Australia. Answer: Introduction The chosen organization for the investigation of various risks and preparation of risk management plan is MYOB (Mind Your Own Business), Australia. MYOB is an Australian based organization that develops tax and accounting softwares for helping small and medium sized business organizations. Since the advent of cloud computing services, MYOB has hosted its entire operations online in the cloud interface (Lim et al., 2013). Instead of physical storage and manual handling of the operations, the cloud based system is much more efficient and does not require additional physical storage space. However, due to hosting the entire operations, the company faces some serious security risks. The main risks will be discussed later in this report. Due to the chances of occurrence of the risks, some disaster may occur during anytime that will not only disrupt in the business operations but will also incur serious long term consequences in the business of MYOB. Hence, it is important to prepare a con tingency plan in order to recover the system from the possible attacks and security issues. However, contingency planning is only a short term plan for system recovery. It is more important to develop a risk management plan in order to ensure that the chances of the risks are minimized to as low as possible. Moreover, business continuity planning is required in order to maintain business continuity in spite of occurrence of the risks. In this report, the current situation at MYOB has been analyzed with the help of some risk analysis tools and techniques. Moreover, the main risks have been identified and a contingency plan has been prepared. Finally, a proposal has been prepared for the business continuity planning of the organization. Investigation In order to investigate the existing situation at MYOB and identify the risks associated with it, a number of tools and techniques have been used. These tools and techniques are described as follows. Documentation Review Documentation review is a basic risk assessment technique that is used to analyze the existing situation in an organization. Analysis and review of the existing situation helps to identify the gaps that may result in the security risks and issues. For this project, a documentation review was conducted where the documents of MYOB were reviewed for analyzing the current situation of the company. Delphi Technique In Delphi technique, a team of experts are contracted anonymously and some information is sent to them for analysis and review. The whole process is kept anonymous in order to avoid biasing. After the information is sent, the experts analyze it and reach suitable conclusions (Sadgrove et al., 2016). These conclusions are listed, documentation and sent back. This Delphi technique is an effective analysis tool as a team of experts conduct the entire analysis process. Interview Personal or questionnaire interview is one of the most effective tools for risk analysis in an organization. In addition to understanding the existing situation at the organization, several diverse ideas can be generated in the interview that helps to analyze various aspects of the organization instead of focusing on just one. In this particular project, a questionnaire based interview has been conducted on the current employees of MYOB. The main aim of this interview was to identify the gaps that may cause risks in the companys existing business system. Instead of conducting overall overview, the employees opinions were collected (Suter II, 2016). The advantage of this approach was that different employees opined about various gaps that the existing situation of MYOB currently has. SWOT Analysis SWOT analysis is also an effective tool that can be used to identify four main aspects of an organization Strength, Weakness, Opportunity and Threat. However, SWOT analysis is only based on overall rough analysis and cannot be considered as 100% accurate. Still, SWOT analysis has been used to identify the overall situation at the organization including its strengths and opportunities. Risk Analysis Matrix The identified risks are analyzed with the help of risk analysis matrix as follows. Details of the Risk Responsible Stakeholder Risk Reason Risk Effect Suggested Management Strategy System Integration with a 3rd party without prior verification of identity can be a major risk. Unverified 3rd party softwares can cause serious damage to the organizations setup. Marketing Manager Some 3rd party entities are only developed by unethical users who ingrate with a parent software provider and then steal confidential information and customer details from the same. They do it to earn ransom and unethically use other persons personal information. This type of risk mainly affects the company employees as well as the clients. However, this also disrupts the regular operations of the company significantly. Before integrating with a 3rd party entity, the company must verify the identity of the same. Technical Setup can be a major reason for the vulnerability of system risk. System Administration Since technology is evolving every day, the company needs to update its softwares accordingly. However, if the hardware is also not updated accordingly, the softwares may not be supported and the company will lose market competitiveness. The main effect of unavailability of technical setup is that the company will not be able to update its softwares and hence, will lose market competitiveness. The company needs to upgrade its hardware technical setup at regular intervals (say 6 months). Internal Sabotage can also be a significant risk in this field Operations Manager The main origin of this risk is the internal employees of the company. Some unethical employees may try to sabotage the organizations operations by performing unethical operations in the office premises that include surfing unsafe websites, using own flash drives, using own computer in the office server and others. The effect of this risk can be significant on the companys internal server. Malwares can easily enter into the server and maybe able to destroy many important business documents stored inside the server. In order to manage this risk, suitable monitoring of employees is necessary. Moreover, strict policies should be implemented regarding the use of personal flash drives and systems in office. Poor auditing and lack of business insight can also result in disastrous consequences for the organization. System Auditor and Senior Consultant Due to lack of proper auditing, the company may not be able get hold on the existing market. Moreover, due to lack of market insight, the company can lose market competitiveness while its rivals will gain more market share. The main effect of this risk is that the company will lose market competitiveness as well as share to the rivals. Without market insight and auditing, no organization can advance in the current market. A suitable auditing plan must be used and some expert auditors must be recruited instead of inexperienced personnel. Cyber security risk is by far the most significant risk that is faced by the organization. External agents like malwares, viruses, hackers are always targeting the cloud based servers in order to steal confidential information for ransom. Cyber attacks cause the maximum amount of damage to an organization. System Administrator The main reason for this risk is the absence of sufficient firewalls and antivirus softwares. Hosting too many confidential information in the cloud server also attracts hackers to attempt an attack on the server. The effect of cyber attacks are long reaching; confidential files and information are lost, ransom needs to be paid in most cases for the recovery of the files, loss of business continuity and finally leak of business strategy helping the rivals to gain competitive advantage The suggested management strategy is to implement cyber security measures like strong system firewalls, antivirus and other similar softwares. These softwares ensure all the threats are eliminated from the system Disaster Recovery (DR) Plan In order to prepare the disaster recovery plan, the identified risks are to be analyzed in detail. The identified risks are as follows. Integration with 3rd Party Entity As discussed in the risk analysis matrix, integration with 3rd party entity without verifying its identity or origin can be a reason for serious vulnerability or risk of the organization. During the course of the business operations, the company may need to integrate with some 3rd party softwares and systems in order to enhance the business system (Mason, 2014). The duty of these 3rd party softwares is to enhance the existing software operations including quality, performance and additional features. However, there are some fraud 3rd party softwares that appear to provide services and after integration, they just use the business link to break into the central server for stealing data and information. Since MYOB uses cloud server for hosting all the data, it is even more easier to break into it and steal information. Lack of Technical Setup During the analysis, it has been found that there is a lack of sufficient technical setup at MYOB. Initially, the technical setup was developed of the highest configuration for the system that was available then (Thakor, 2016). However, MYOB needed to upgrade the system frequently in order to accommodate new software versions. On the other hand, there have been no recent records of technical upgrade at MYOB whereas many new versions of accounting softwares have been released since. As a result, the existing technical setup does not support the latest software versions that in turn leads to the loss of market competitiveness of the company. Internal Sabotage There have been a number of records of internal sabotage inside MYOB. There are records of some employees who unethically used external flash drives inside the computer system. Due to this, many malwares entered the server and resulted in server disruptions (Eriksson et al., 2014). Moreover, the company once allowed BYOD (Bring Your Own Device) for the employees. However, after finding that many malwares were entering from the external devices, the company stopped this policy and provided systems for employees to work. Poor Auditing Poor auditing was once a serious issue in the organizational operations at MYOB. Due to recruitment of inexperienced and incompetent auditors, the company underwent a phase of business downfall. Moreover, there was a lack of market insight of the companys Senior Consultant that resulted in loss of market competitiveness of the company. Cyber Security Cyber security is a common risk for all business organizations that use cloud computing servers for data storage and management. MYOB is a company that uses cloud server to store all business and client data to save physical storage spaces as well as avoid manual data handling (Li, 2014). Hence, there is a significant threat related to the security of the data stored in the cloud server. Disaster Recovery (DR) Plan From the list of all the risks and threats, it is evident that without any disaster recovery plan, the company will not be able to recover easily if any of the significant risks actually occur. Firstly, the company needs to minimize the chances of occurrence of such a risk at all cost. In order to do that, the company needs to prepare plans in advance and take suitable measures accordingly. Secondly, the company needs to implement strict policies regarding the use of devices inside office premises violation of which will lead to serious consequences (Brindley, 2017). Thirdly, the company will need to implement strong firewalls and antivirus softwares in the existing server. Finally, the company must upgrade the existing technical setup in order to support more advanced versions of various softwares. Proposal for Contingency Plan and Business Continuity Plan (BCP) In order to prepare a contingency plan for maintaining business continuity, the company needs to ensure some sequential steps are followed. This is explained as follows. Contingency planning for business continuity mainly contains four main steps Identify, Analyze, Create and Measure. Identify This step mainly involves identification and assessment of any risk that may occur / have occurred during the course of business operations. Identification of the risk is required in order to find and apply suitable solution. Analyze This step includes the impact of the risk on the daily business operations. If it has minor impact, it can be addressed in due course. However, if it has massive impact on the business, it must be addressed immediately at all costs (Schwing Albers, 2013). For this, analysis of the risk is necessary to understand its extent of power for affecting the business. Create In this step, a risk management plan is created in order to address the identified risk. The plan should be created such that the risk is mitigated and long term strategy is developed so that the risk does not occur anytime in the future. Measure This is the final step where the entire system is measured after the application of the risk management plan. The system is tested in order to ensure the chance of occurrence of the risk is minimized and a maintenance plan is developed. The aim of this plan is to ensure maintenance of the system is done properly in order to avoid occurrence of any risks in future. Analysis and Report on Controls In order to control the risk aspect, MYOB needs to use the risk management tools effectively. Moreover, simple application of the tools is not sufficient; it is important to apply risk management tools in all seven OSI model layers (Boritz, Carnaghan Alencar, 2014). This is to ensure the stored data is protected in every phase storage, presentation, transport, etc. Special encryption techniques can be used to encrypt the data while it is being stored in the cloud interface or transmitted to another system. If all the seven OSI model layers are protected and encrypted, it is highly unlikely to be affected by any security risks. Logical Map of Organizational Structure The logical map of organizational structure is shown in the following diagram. Conclusion In this report, the current situation at MYOB has been analyzed with the help of some risk analysis tools and techniques. Since the advent of cloud computing services, MYOB has hosted its entire operations online in the cloud interface. Instead of physical storage and manual handling of the operations, the cloud based system is much more efficient and does not require additional physical storage space. However, due to hosting the entire operations, the company faces some serious security risks. The main risks will be discussed later in this report. Due to the chances of occurrence of the risks, some disaster may occur during anytime that will not only disrupt in the business operations but will also incur serious long term consequences in the business of MYOB. In order to control the risks discussed in this report, MYOB needs to use the risk management tools effectively. Moreover, simple application of the tools is not sufficient; it is important to apply risk management tools in all seven OSI model layers. This is to ensure the stored data is protected in every phase storage, presentation, transport, etc. Special encryption techniques can be used to encrypt the data while it is being stored in the cloud interface or transmitted to another system. References Boritz, J. E., Carnaghan, C., Alencar, P. S. (2014). Business modeling to improve auditor risk assessment: An investigation of alternative representations.Journal of Information Systems,28(2), 231-256. Brindley, C. (Ed.). (2017).Supply chain risk. Taylor Francis. Eriksson, K., Jonsson, S., Lindbergh, J., Lindstrand, A. (2014). Modeling firm specific internationalization risk: An application to banks risk assessment in lending to firms that do international business.International Business Review,23(6), 1074-1085. Li, W. (2014).Risk assessment of power systems: models, methods, and applications. John Wiley Sons. Lim, S. S., Vos, T., Flaxman, A. D., Danaei, G., Shibuya, K., Adair-Rohani, H., ... Aryee, M. (2013). A comparative risk assessment of burden of disease and injury attributable to 67 risk factors and risk factor clusters in 21 regions, 19902010: a systematic analysis for the Global Burden of Disease Study 2010.The lancet,380(9859), 2224-2260. Mason, K. (2014). Risky (Agri?) Business: Risk Assessment, Analysis and Management as Bio?political Strategies.Sociologia ruralis,54(3), 382-397. Sadgrove, K. (2016).The complete guide to business risk management. Routledge. Schwing, R. C., Albers, W. A. (2013).Societal risk assessment: How safe is safe enough?. Springer. Suter II, G. W. (2016).Ecological risk assessment. CRC press. Thakor, A. V. (2016). The highs and the lows: a theory of credit risk assessment and pricing through the business cycle.Journal of Financial Intermediation,25, 1-29.