Tuesday, December 31, 2019

Key Stakeholders And Their Involvement - 1159 Words

Key Stakeholders and their Involvement In this accident, many groups of people were affected in various ways. Three main stakeholders involved were the company’s shareholders, the government and the fishermen. Shareholders following the explosion, BP’s shares dropped by 54%, resulting in a loss of $105 billion in share value (Jarvis, 2010). This greatly impacted BP’s financial status, as shareholders are vital to the financing of businesses. Share prices have been falling since the explosion, and have not returned to the original value before the incident (Read, 2010). Dividends were also not given out that year (ibid). As such, BP had to take measures to regain shareholder confidence. This incident also led to the resignation of BP’s†¦show more content†¦In the fishing industry, the incident led to an approximate $2.5 billion loss, while tourist industries experienced a loss of a predicted $23 billion (Jarvis, 2010). In addition, the moratorium placed on deep water drilling left 58,000 workers unemployed (ibid). In its Annual General Meeting in 2011, BP faced protests against BP’s executive’s remunerations and voiced their injustice (Webb McVeigh, 2011). Facebook pages such as â€Å"Boycott BP† and RIP Spongebob, who died in an oil spill cause of BP† have been set up by activists, and have garnered 847,730 and 468,157 likes respectively (Jarvis, 2010). Hence, the impacts on these stakeholders have varying degrees, but are nonetheless affected one way or another by BP’s mistake. Ethics and Values According to BP’s Code of Conduct, BP †commits to â€Å"excellence and to the disciplined management of our operations† (BP, 2013a). In this case, this is broken, as the oil wells were not properly checked. Site managers Robert Kaluza and Donald Vidrine were accused of acting irresponsibly when handling the checks on the rig (CBS News, 2012). Furthermore, BP’s former vice president David Rainey was charged for the deliberate understatement of the amount of oil that was being discharged into the Gulf (ibid). In addition, BP was accused of overpaying their CEOs. Bonuses of $100,000 to top managers were deemed improper in the light of the disaster. Claims made by shareholders and victims whose livelihoods

Monday, December 23, 2019

Leadership Is The Organization Of Function Without...

As a leader I strive to empower peak performance without excessive constraints and reliance on continuous leadership inputs to accomplish the set goals. Leadership is the ability of an individual to empower and develop an organization and its people to achieve its mission with little or no constant involvement from their management. This is achievable by empowering subordinates to be autonomous. This requires a leader to instill the necessary competence in the organizations to ensure proficiency in their respective areas of responsibility. This autonomy can be achieved by articulating the objective with the understanding that there are many methodologies to achieve the objective. Leaders must have confidence that the required†¦show more content†¦An example of this is my organizations activity committee. The committee comprises of a board of eight individuals from different branches of the organization that plans events for the group. This planning required meetings to dis cuss and vote on certain details. After numerous hours discussing the details, the committee came to an agreement on the details. However, instead of making the decisions, the committee took all the info and presented it to the director to make the final decisions. These decisions included issues like venue, cost of participation and other normal planning resolutions. While this example is not a direct mission impact, it illustrates how we have instilled the notion that decisions have to be made at the highest level possible, without regard to implication. This concept reinforces the potential for single point failure and ultimately diminishes the overall competence of the workforce. This analysis is the basis of my philosophy. For a leader to embrace this philosophy and convert from theory to practice, they must exhibit several key traits. Respect is the foundation of any successful leader. Devoid of respect, any leader will not have the trust necessary for empowerment. Without respect and I am referring to both respect for subordinates and respect for leadership, empowerment, the ultimate goal, is virtually impossible. Empowering your employees will produce an overall environment of mutual respect,

Sunday, December 15, 2019

Teacher and Students Free Essays

string(100) " school to help a student, he may feel he has sacrificed his own needs to the needs of the student\." A FIELD STUDY PORTFOLIO IN ADVANCE MONTESSORI EDUCATION CENTER OF ISABELA PRESENTED TO: DR. ROMEO Z. TARUN FS INSTRUCTOR IN PARTIAL FULFILLMENT OF THE REQUIREMENTS IN FIELD STUDY 5 (Learning Assessment Strategies) And FIELD STUDY 6 (Becoming a Teacher) MAYFLOR F. We will write a custom essay sample on Teacher and Students or any similar topic only for you Order Now GUIYAB BSED III HGBAQUIRAN COLLEGE S. Y-2013(2nd SEMESTER) Table of Contents I. Title Page ————————————————————————————-1 Table of Contents ————————————————————————-2 Acknowledgement ———————————————————————–3 Dedication ———————————————————————————-3 AMECI Philosophy, Vision, Mission —————————à ¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€-4 II. Field Study 5 – Learning Assessment Strategies Episode 1 – My Assessment List —————————————————————————-5 Episode 2 – My ATM Card (Available Test Measurement) ———————————8 Episode 3 – Log Me ——————————————————————————————10 Episode 4 – MYMP (Me You Must Practice) —————————————————-11 Episode 5 – My PROPT (Pro duct-Oriented Practice Test) ————————————12 III. Field Study 6 – Becoming a Teacher Episode 1- The Teacher: My Goal as a Person —————————————————16 Activity 1 – The Global Teacher: Your Goal Activity 2 – The Professional Teacher Episode 2 – The Teacher in the Classroom ———————————————————24 Episode 3 – The Teacher and the Community —————————————————-31 Documentation ————————————————————————–34 Personal Profile —————————————————————————35 Date Time of Visit ——————â€⠀Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€œ36 Acknowledgement I would like to thank our Heavenly Father for helping and guiding me always as I have finished this requirement. I would also like to extend my gratitude to the following persons: To my parents, for their love, care, guidance and patience as well as financial support; To my classmates, who are always my companions when we are doing this observation in Advance Montessori Education Center of Isabela (AMECI); and To the instructors who have been molding me and my classmates, for us to have a better future and a nice performance most especially to our FS instructor Dr. Romeo Z. Tarun who encourages us to conduct this observation. Dedication I would like to dedicate this Field Study to all students concerned and to those who appreciate my work. As I have done this observation, I can say that I have answered the questions very carefully in order to understand better and associate more particularly in this study. I hope that I have reached the expectation of my instructor and to anyone who can read as you scan this portfolio, may I give you a little knowledge. MISSION LANNA NATIONAL HIGH SCHOOL shall deliver quality basic Education with the use of indigenous and modern technology under the school system through the empowered competent, committed Teachers; and School Personnel’s who are accountable to the total development of every learner in the attainment of quality life, and where the family, community, and other institution actively support this effort. VISION LANNA NATIONAL HIGH SCHOOL an institution of learning with competent, committed and responsible Teacher’s, School personnel, and Supportive stakeholders, where every learner is academically competent equipped with life skills and imbued with the desirable values of a person who is Makabayan, Makatao, Makakalikasan, and Maka-diyos. Field Study 6 Professional Education Subject: The Teaching Profession Activity1: The Teacher: My Goal As a Person At the end of this activity, you will be competent in clarifying your values about teaching, and in articulating and demonstrating your personal philosophy of teaching. The end goal is to be a positive role model for students. My Task To be an effective teacher in the future it is important to be aware of yourvalues  about  teaching. Write  your  mission  statement  or  philosophy  that  you  willuphold with conviction. To each your goals do the following tasks. Interview with Teacher 1 Teacher’s Name: Thelma Cabanilla Gender: Female Subject Taught: English School: LNHS a. My goals for my students are: I believe that the purpose of teaching is not to teach students how to memorize  facts,  or  how  to  know  all  the  correct  answers. The  purpose  of  teaching  lies  in  getting  students  to  truly  understand  the  concepts  being examined. I also believe that as a teacher, I must know what to teach in my classroom. It is vital that I have a solid understanding of the subject matter being taught. I realize that I  cannot  rely  solely  on  textbooks,  but  rather  I  must  seek  out  other  sources  of  information to aid in my teaching. b. What I want to teach my students are: I firmly believe that through proper motivation and guidance, my students will  engage  actively  in  the  class  and  improve  their  innate  talents. Act  with conviction based on what they learned and finally prove their worth as responsible citizen with a personality worthy of emulation as they claim their rightful place in our society. c. I  will  teach  my  students  by By  being  a  facilitator  in  the  classroom. As  a  facilitator,  I  will  guide my students through the subject matter in order to assist the students in their own discoveries. The  constructivist  learning  theory  is  one  that  I  believe  to  beworthwhile,  thus  I  agree  with  the  fact  that  students  can  construct  their  own learning. All students are capable of learning, and all students have something to contribute to the classroom environment. Each student can bring new insights into a subject or raise questions about a subject that has not yet been considered. It is important to maintain a positive attitude about the students you teach. Interview with Teacher 2 Teacher’s Name: Timoteo Taquiqui Gender: Male Subject Taught: English School: LNHS a. My goals  for my students  are: My goal as a teacher is to equip students with the essential tools needed in life. By giving students knowledge and  skills they  need to succeed  as  adults,  by  urging  them  to  pursue  their  dreams,  and  by impressing on them the joy that comes  from learning, I believe that I  can positively  influence  my  students  and  give  them  a  Ã¢â‚¬Å"love  of  learning†. Teachers are virtually limitless in their capacity to touch many different lives; I look forward to being a part of this. b. What I want to teach my students are: I believe that by creating a student-centered learning, my students will be able to take charge of their own learning with little assistance from the eacher. This will inculcate a sense of responsibility in them in terms of  achieving their learning goal. As a teacher, one of my roles would be to coach and facilitate them throughout the learning process by providing information and giving useful guidelines in order for them to achieve their learning target. c. I  will  teach  my  students  by I will teach my students by instilling a passion for lifetime learning. Our students are in need of life lessons. They need to learn content, but they also need help learning how to think, how to believe, and how to succeed. SUMMARY TABLE OF INTERVIEW RESULTS * Values are principles, qualities, or objects that a person perceives as having intrinsic worth. Every individual has a personal hierarchy of values that may include success, wealth or monetary comfort, love/companionship, a sense of  accomplishment or achievement, and of  course, survival. When a teacher spends time after school to help a student, he may feel he has sacrificed his own needs to the needs of the student. You read "Teacher and Students" in category "Papers" * â€Å"a  good  leader  is  a  good follower†. In  a  classroom, obviously, the teacher is the leader and the students are the followers. And in order for the followers to obey the rules  implemented  by  the leader, the leader must first observe  those  rules him/herself. * Progressivist – teaches to develop learners into becoming enlightened and intelligent citizens of a democratic society. * Existentialist – to help students understand and appreciate themselves as unique individuals who accept complete responsibility for their thoughts, feelings and actions TEACHER * Existentialist–  helpsstudents  define  their  ownessence  by  exposing  themto various paths they take in  life  and  by  creating  an environment  in  which   They freely  choose  their  own preferred way. Idealist Stimulates learner’s  awareness  of  ideas and be a transmitter of cultural heritage My Reflections LEARNING  is  a  never-ending  quest  in  search  of  answers  for  many questions. It is a process of revealing the mystery of life, a dynami c and fundamental step towards a gradual transformation of a learner from naive to learn. Thus, a learner must be guided accordingly by the hands who want to mold him to be the best epitome of his alter ego. The fate of a learner lies in the hands of teachers and in the teaching and learning process. In an informal setting, they say that anyone can be a teacher; simplybecause  anyone  can  teach  a  thing  to  an  individual  base  on  his  previous experiences. In formal education, licensed teachers are tasked to mold the young  minds  of  the  learners. Therefore,  a  teacher  must  be  efficient  and effective in her chosen field of endeavor. Impart to her students all necessary faculties needed for them to be competitive globally and to act accordingly as true Christians with a Filipino pride. Learning Activity 2: The Global Teacher:  Your Goal At the end of this activity, you will gain competence in developing yourself become a global teacher. Your Tasks: The rapid change in technology makes the world smaller and links people with one another in one global community. To become an effective teacher, you should been downed with skills and knowledge to make you a global teacher. Characteristics of the Global  Teacher A global teacher works hard and gives her best to teaching. A global teacher utilizes technology. A global teacher has a good command of English. A global teacher is responsible and committed to teaching. A global teacher can execute her lesson well. A global teacher must be globally competitive and aware of the educational system outside the country. Your Analysis For the response of the teachers, what conclusions can you draw about the characteristics that a global teacher should have in terms of: a. Knowledge A global teacher then should be equipped with various useful knowledge that would help him face the multiple challenges in the world of teaching, and being  knowledgeable  means  possessing  excellence  in  communication  skills, adaptive  to  environmental  changes  and  one  who  teaches  in  a  world  class standard. b. Skills To become a global teacher, we should master skills and competencies, which can address global demands, thus it is being updated on what modern world can offer. As a global teacher, we should easily learn everything that has importance concerning teaching for this would make us better. c. Values Being  a  global teacher  means  a  lot of  responsibilities,  so  he  must  beamed with characteristics that will enable him endure the challenges in the field of  teaching, and that is showing your compassion, commitment and excellence on the teaching profession. Your Reflections Reflect on the image of the global teacher. Make an essay about a global teacher and the challenges that they face in a globalize world. Exciting, and rewarding are just some characteristics that explain teaching. Overcoming anxiety and nerves in the first year is our greatest challenge. Moving into the classroom for the first time can be a daunting and challenging experience for everyone. You are required to immediately equip four years of knowledge into your teaching and classroom management. While this may seem to be a difficult time, it will only get easier. There are many rewards with being a teacher, however it is important to note that it is not a role to be taken lightly – it is a difficult role to fill. As teachers, we need to understand that every child will learn differently. No matter their culture, gender or socio-economic status, so as teachers you have to encourage and have a level field in your  classrooms. You  have  to  know  how  to  reach  each  student. As  teachers  you need to let the students know that they don’t have to follow the stereotyped roles of  society. The teachers of 2010 and beyond will face many challenges that we are currently unaware of. What we can do to prepare for those challenges is look at where things may be headed in terms of technology and population and cultural diversity. Make  an  illustration  here  on  how  you visualize  the  global teacher. Learning Activity 2: The Professional Teacher Your Goal: At the end of this activity, you will manifest a deeper understanding of the rights, duties, and responsibilities of professional teachers and how these impact you as a future teacher. Classify the information you have gathered using the matrix that follows: Magna Carta for Public Teachers Magna Carta for Public Teachers Magna Carta for Public Teachers Professionalism Systems of  Monitoring She said that DepEd officials evaluates the school annually  The principal also observes the teachers’ performance regularly Magna Carta for Public Teachers Rewards and Incentives System She insists that still there should be additional allowance for teachers. Magna Carta for Public Teachers Professionalism Professionalism Respect Discipline She emphasized t hat in the school where she belongs, disciplinary actions are laid in case a teacher has done any malpractice Disciplinary Procedures The teacher does a lot of paper works, but if you really love teaching, you’ll never feel the burden Compassion Enthusiasm Duties and Responsibilities Professionalism Commitment to teaching profession She is enjoying her benefits as a professional teacher Rights and Privileges of  Ã‚  Teachers Your analysis Give the values reflected by the policies and guidelines found in the school. All aspects of policies and practices in school are the values and the way the whole school  and  community  interacts  with  each  other. Everyone  is  expected  to  be responsible for his or her own behavior, respect the rights of others and share values. It is vital that children, staff and parents work actively in partnership to enable all children to realize their full potential. There should be continuity to actively encourage parents to become involved in the life of the school. There must be a commitment to raising awareness of wider issues, by involving members of the learning community and exploring the surrounding environment. Learning is a lifelong process and it is our responsibility as adults to model effective learning. This vision statement therefore applies to everyone who has a role to play in the provision of education at our school – governors, support staff, teaching assistant sand teachers. Your Reflection Reflect on the policies and guidelines that concern the teachers. The codes of conduct mandate several rules and regulations that teachers must adhere to. First, teachers are responsible in taking care of the students who are under their supervision with the main objective of assuring their safety and welfare. Second,teachers  should  observe  confidentiality  of  information  that  is  related  with  theircolleagues  students  and  families  that  the  educators  acquire  during  their  teachingprofession, unless the disclosure of this information is needed for the well being of a person. Third, teachers should maintain the good reputation of the teaching profession by showing acts of honesty and integrity as well as making sure that their privateinterests  especially  outside  of  school  does  not  interfere  with  their  professional responsibilities. Fourth,  teachers  should  respect  all  the  members  of  the  schoolcommunity  namely:  students,  parents,  co-workers,  and  school  management  bymaking sure that they are treated equality and are not discriminated by gender, sexual orientation, religion, age, race, and others. Fifth, teachers should conduct their relationship with their students in a professional, respectful, and appropriate manner. Sixth teachers should not practice their teaching responsibilities while in the influence of any substance that weakens their capability to perform their duties properly. Lastly,teachers  must  present  comprehensive  and  accurate  information  and  documentsregarding their professional status credentials, and related experiences. Express  your  insights  and  feelings  regarding  the  demands  of  being  a  future professional teacher. Good teachers typically have good organization skills. They have the ability to work with many different types of people. Patience is also a very good quality. It is true that some people, from the time they are in first grade, know they want to be teachers. For others, the idea to become a teacher can be a sudden insight, or a feeling  that  ferments  for  years  in  some  remote  corner  of  their  consciousness. Regardless of  where  the idea  comes  from,  for  many,  the images  associated  with becoming a teacher are compelling. Teachers must be flexible to handle the inevitable obstacles that occur each day. Teachers must be able to handle problems and a room full of students all at one time. Problems also arise outside of the classroom setting. In addition,  school  politics  and  colleagues  with  different  teaching  styles  can  cause tension. EPISODE 2: My Tools ORGANIZATIONAL PLAN Each day that I  spend in the classroom presents new  challenges. Every situation and each different child requires an individualized response from the teacher. As I’ve observed the organizational plan, the classroom structured is flexible. The instructions are care both individually and by group. And the teacher is ensuring that furniture arrangement promotes learning opportunities. She has a seating chart. She maintains plans for materials and assignment management. And she creates bulletin boards that foster learning. She ensures bulletin boards are informative, relevant, aesthetic, and related to class activities. SCHEDULING During my observation, I’ve noticed that the teacher is following guidelines to ensure a  successful scheduling. First she  incorporates any  pre-scheduled  school  wide activities and routines into her schedule. She makes sure to include any activities that the whole school needs to be doing at the same time. For instance, many schools havea  Drop  Everything  and  Read  (DEAR)  time  right  after  lunch. Second,  she  createspredictable routines that her  students can  follow easily. Setting  aside a  short amount of time in the morning for students to complete arrival routines and get organized forthe  day  helps  to  teach  elementary  students  the  importance  of  being  prepared. Likewise, having specific dismissal routines they must follow helps them to make surethey  are  taking  home  everything  they  need  at  the  end  of  the  day. Third,  she coordinates with her grade-level peers. Fourth, she allows for some flexibility in her schedule. Lessons can run longer (or shorter) than she expected or some activities like earthquake and fire drills and special assemblies may interrupt her schedule. She said it’s okay if every once in a while you don’t accomplish everything you planned for the day. I think the activities were scheduled properly. The time was allotted sufficiently for the activity. Individual and group activities were all planned that’s why it saved time and it’s very organized. And through the guidelines she’s following she’s coming up with an excellent scheduling. RECORD KEEPING The attendance is monitored by checking the permanent seat plan, through this the teacher can record easily the absences and present in the class. The teacher has a record book where she gets every time she checks the attendance. I’ve seen a portfolio cabinet wherein all of the portfolios of the students are put. The teacher said that it’s very helpful if they have portfolio so that they can monitor their individual performance. PHYSICAL ENVIRONMENT The physical environment of the classroom is very conducive to learning. The classroom is clean, properly ventilated and lighted, and free from noise distraction. Also the bulletin and displays were neatly arranged. They have seat plan so the seats of the students are organized and permanent. I think the seating arrangement also suits the learning experience of the pupils. The classroom furniture is matching the size of the students. DISCIPLINE The teacher is establishing the discipline inside the classroom by following some rules and guidelines. First is by selecting a discipline policy that is appropriate for her students. She considers her students’ age and developmental level when selecting a plan. Second is by pairing the rules with both consequences and rewards. If she will punish misbehavior, she also wants to recognize good behavior. She tries to mix positive and negative nearly equally in her plan to ensure that students see that good behavior is rewarded just as much as bad behavior is punished. Third she created a poster on which this discipline policy is clearly outlined. Featuring her policy on a poster allows students to refer to the regulations regularly and gives her something to which to draw students’ attention when discussing behavior. She placed her poster prominently on a classroom wall. I think her approach is very preventive. By creating and implementing a classroom discipline plan to prepare her students to follow the rules and regulations that they will be bound by once they reach adulthood. Simultaneously, she’ll be maintaining a calm, productive classroom atmosphere conducive to conventional studies. ROUTINES The  routines  are  properly  established  and  organized. The  teacher  is  alsofollowing some guidelines in establishing routine in the classroom. she organizes her classroom to be effective in providing structure and routine before her students arrive. There  should  be  a  space  for  their  backpacks,  lunches  and  homework. She labels everything clearly. Materials and sections of the classroom should also be labeled. This will allow students to become more familiar with where things go. Then when she says it is time to clean up, they will be able to do so effectively. Third, she sets a schedule. This sounds easy, but it is very important. Structure and routine are essential to keeping children focused and your stress level down. And I think all the procedures are placed properly and effectively. When routines and procedures are carefully taught, modeled, and established in the classroom, children know what’s expected of them and how to do certain things on their own. Having these predictable patterns in place allows teachers to spend more time in meaningful instruction. Classroom Management Matrix Classroom Management Area Observation Description of the Supportive Measures Observed Your Analysis Comments on the Effectiveness of the Supportive Measure Your Analysis Recommendations 2. Schedule During my observation, I’ve noticed that the teacher is following guidelines to ensure a successful scheduling. First she incorporates any pre-scheduled school wide activities and routines into her schedule. She makes sure to include any activities that the whole school needs to be doing at the same time. I think the activities were scheduled properly. The time was allotted sufficiently for the activity. Individual and group activities were all planned that’s why it saved time and it’s very organized. And through the guidelines she’s following she’s coming up with an excellent scheduling. One of the hardest things to do as an elementary school teacher is to find the time to fit everything in. There are so many skills to teach and only so much time in the day. To make sure that the entire curriculum is taught effectively, it helps to create a classroom schedule. 1. Organization Plan As I’ve observed the organizational plan, the classroom structure is flexible. The instructions are carried both individually and by group and the teacher ensures that furniture arrangement promotes learning opportunities. Teacher success, in relation to both student learning and teacher efficacy, can often be traced to the ability of the teacher to manage the classroom. Research shows that effective classroom organization and management during the first few weeks of  school are crucial in determining expectations and behavior patterns. I think the teacher really implement and create a good organizational plan. I have observed that she provides a productive, safe environment conducive to learning. 3. Record Keeping Effective, continuous record keeping lies at the heart of our best teaching and learning. It enables us to plan, to organize, and to create the best learning environment for each child. Record keeping is an effective tool for tracking contributions made by individual students in our classroom, for assessing students, for informing students and parents about growth overtime, and for setting goals. I think the teacher has effective record keeping technique. She’s right in creating a seat plan to easily check the attendance of the pupils. Also, it is correct to have a portfolio for each student so that they can monitor their performance and enhance it right away if  needed. The attendance is monitored by checking the permanent seat plan, through this the teacher can record easily the absences and present in the class. The teacher has a record book where she gets every time she checks the attendance. I’ve seen a portfolio cabinet wherein all of the portfolios of the students are put. The teacher said that it’s very helpful if  they have portfolio so that they can monitor their individual performance. Model whenever you can and tone your language to suit large mixed ability classes, small groups, weak students, and finally, the age of your students. She coordinates with her grade-level peers. She allows for some flexibility in her schedule. Lessons can run longer (or shorter) than she expected or some activities like earthquake and fire drills and special assemblies may interrupt her schedule. She said it’s okay if every once in awhile you don’t accomplish everything you planned for the day. Effective enforcement of  classroom discipline is a pre-requisite for the smooth operation of any classroom. Although your main goal as a teacher is to provide your students with the academic lessons they need to succeed in adulthood. I think her approach is very preventive. By creating and implementing a classroom discipline plan to prepare her students to follow the rules and regulations that they will be bound by once they reach adulthood. Simultaneously, she’ll be maintaining a calm, productive classroom atmosphere conducive to conventional studies. The  teacher is establishing the discipline inside the classroom by following some rules and guidelines. First is by selecting a discipline policy that is appropriate for your students. Consider your students’ age and developmental level when selecting a plan. Second is by pairing the rules with both consequences and rewards. 5. Discipline 4. Physical Environment The physical environment of the classroom is very conducive to learning. The classroom is clean, properly ventilated and lighted, and free from noise distraction. Also the bulletin and displays were neatly arranged. They have seat plan so the seats of the students are organized and permanent. I think the seating arrangement also suits the learning experience of the pupils. The classroom furniture is truly matching the size of the students. Every teacher knows that a safe, clean, comfortable and attractive classroom can stimulate learning and help build a classroom community. But for many teachers, setting up the physical environment of  their classrooms can be quite daunting, especially when faced with older buildings, crowded classrooms and insufficient storage space. I think the teacher did a good job in creating a physical environment that is very conducive to learning. She has a classroom suited to the learning ability and level of her Grade II pupils. I can conclude that if she maintains it, definitely she can come up with her goals in providing a classroom promoting a healthy and wonderful learning experience. I think the routines she formulated are very unique yet effective. Actually, if I’ll be in the actual field, I’m going to follow her superb and operative routines so that I can also ensure a well managed time and well organized classroom. 6. Routines The routines are properly established and organized. The teacher is also following some guidelines in establishing routine in the classroom. First she organizes her classroom to be effective in providing structure and routine before her students arrive. There should be a space for their backpacks, lunches and homework. Second, she labels everything clearly. Materials and sections of the classroom should also be labeled. This will allow students to become more familiar with where things go. Then when she says it is time to clean up, they will be able to do so effectively. Third, she sets a schedule. This sounds easy, but it is very important. When students arrive in her classroom they should know that they have until a certain time before their desks should be cleared and the teaching starts. Also she plans for the in-between times as well. Structure and routine are essential to keeping children focused and your stress level down. And I think all the procedures are placed properly and effectively. When routines and procedures are carefully taught, modeled, and established in the classroom, children know what’s expected of them and how to do certain things on their own. My Analysis 1. In what area of classroom management was the teacher most effective? Which of  the supportive measures were effective? Why? The area of classroom management wherein she’s most effective is discipline. I think all of her supportive measures were efficacious. During my observation, I’ve noticed that the pupils were well disciplined and behave not only during discussion but even the teacher is away. So it just shows that the guidelines she’s following to maintain  a  good  discipline is  working. She already  starts  to  develop  good  moral character among pupils. 2. In what area of classroom management was the teacher least effective? Which supportive measures were not effective? Why? I think she’s very effective in all aspects. I am not seeing any flaws regarding her organizational plan, record, keeping, physical environment, scheduling, discipline and routine. It might not be perfect but I think the important thing is to fulfill your goals in accordance to your guidelines. . Suggest more effective ways for your answer in number 2. Since I am seeing her classroom management with no flaws, I’ll just leave a good message about it. Effective classroom management is about the teacher keeping the students actively involved in the entire lesson. By practicing the teaching strategies above, teachers will greatly reduce classroom management prob lems. My Reflections 1. Describe at 3-5 characteristics of a teacher who can establish a well-managed classroom? There are so many classroom management characteristics like: Adaptability is the ability of a person to blend him / herself according to the external situations. Decisiveness – having the power to decide; conclusive. Characterized by decision and firmness resolution. Delegation – is the handing of a task over to another person, usually a subordinate. It is the assignment of authority and responsibility to another person to carry out specific activities. 2. What characteristics do you have at present that can make you an effective classroom manager? Elaborate how these characteristics can help you. I think I have the empathy, adaptability, and decision making skills. I can definitely sue those skills to ensure an effective classroom management. Adaptability will of  course help me to adjust easily to situations and changes. For example, if I’ll be transfer in different classroom I can still create a new and good atmosphere to my students which will promote a conducive learning environment. Also, if I have the empathy I can understand their  individual differences which will help  me to maintain and foster good discipline and routines inside the classroom. And last, if I have the good decision making skills I can create a guidelines and rules to insure and effective classroom management. . What characteristics do you have at present that can hamper you from becoming an effective classroom manager? How can you overcome these characteristic? Honestly I need to develop and gain more patience because I think that’s the characteristic that I have that will definitely hamper me in having an effective classroom management. I know that I can overcome this because I’m already practicing it in my daily life. I’m beginning to be more patient at all time regardless of  whatever the situation is. EPISODE 3: THE TEACHER AND THE COMMUNITY The role of the teacher in a positive school-community relationship is extremely important since it is the teacher who is the backbone of the educational system. Although  school  boards  create  school  policy  and  administrators  interpret  thesepolicies, teachers are the personnel who implement school policy. Teachers must alsobe  prepared  to  make  the  most  favorable  impression  possible  in  even  the  mostinnocent  of  circumstances  in  order  to  maintain  public  support. The  community’s perceptions of the teacher affect their perceptions of the school and How to cite Teacher and Students, Papers

Friday, December 6, 2019

Australia Central Bank Targeted By Hackers

Question: Produce a Class Presentation on Australia Central Bank Targeted By Hackers by the development of your report presentation is your first opportunity to showcase your work. Answer: Introduction Information and communication technology has become an important part of ICT infrastructure of any business, government institution, university, entertainment and healthcare institution. It has made the business process of these institutions and organization a lot easier, accelerated the growth of the organization. With parallel to the advancement of information and communication technology, cyber-crimes are getting increased day by day. Technology has become more efficient, more robust, so is cyber-crimes. Any organization that use some form of ICT technology, should think about possible cyber-crime attacks to their organization. The biggest target of these attacks are data from the targeted system. Cybercrime is also known as computer crime. Cybercrime is a special type of crime where computers are used as an instrument of illegal actions. There are different types of cybercrime, including fraud, unauthorized access and theft of intellectual property, violation of privacy, and information security attacks like DoS etc. The aim of this report is to analyze how cybercrime is particularly becoming a threat for government and other organization as well. Computer and Internet were mostly spread in the US countries at the time of inception of these technologies. In earlier days, most of the cybercrimes used to happen in those countries. But now the scenario is different, now the whole world is under the risks of cybercrimes. Background The Reserve Bank of Australia or RBA faced a cybercriminal attack in March 2013. The attack used malware embedded in emails with a subject line Strategic Planning FY2012. The people who received the email, opened it and became the victim of the attack. The malware contained into the email was targeted to bypass the security measurements of the banks ICT infrastructure. But, according to RBA, the malware was not successful and no data from the Bank had been lost or corrupted. The attack targeted information related to G20 meetings. It was suspected that China is behind the attack. Though RBA did not comment on this and the China government also denied the claim . Overview of Cyber Crime Internet is an important factor behind cybercrimes. In most of the cases, the main intention behind cybercrimes is stealing information from others including individuals, organization, government institutions etc. there is an important difference between traditional crime and cybercrime. Cybercrime is not aimed for any physical body like traditional crimes. Cybercrime is aimed for virtual entities or collection of databases, networked computers of an organization etc. [4] Another important attribute of cybercrime is the non-locality. Cybercrime actions are not confined within a town, state, country even continent. It may span over any part of the globe. Thus, enforcement of laws on cybercriminal activities is quiet challenging and different than other types of crime. Types of Cybercrime There are different types of activities that comes under the tag of cybercrime. The broad spectrum of cybercrime activities have been categorized into three groups. In the first group, there are cybercrime activities like breaches to corporate or personal privacy, obtaining digital information illegally, blackmailing some firm or individual through the use of digital techniques and media etc. It also contains the growing number of cybercrime in identity theft. In the other group, there are cybercrimes based on transactions. For example, fraud, human and child trafficking, child pornography, money laundering, digital piracy, counterfeiting etc. The differentiating factor for these crimes is, crimes are targeted to specific victims and the criminals can hide themselves as anonymous over the Internet. Insider attacks from corporate organizations is related to this group of cybercrime. In insider attacks sometimes people from an organization deliberately leaks sensitive organizational information to third party. In the third group, the cybercrimes that are involved in attempts for disrupting services of some network or Internet, are included. These type of cybercrimes are involved in spamming, Denial of Service or DoS attacks, hacking, cyber terrorism activities etc. However, cyber terrorism is another special type of cybercrime. Cyber terrorism activities can be life threating to mass public. These attacks are generally targeted to economy and technological infrastructure of some nation. Privacy Invasion and Identity Theft Identity theft and privacy invasion show how cybercrimes can impact differently on the virtual and physical entity of an individual or some organization. For example, in US social security number of an individual is an important private information [6]. If an attacker manages to get the social security number of an individual then the attacker will have access to employment, tax and other details of that individual. Even in the worst case, the identity of the individual will be stolen and misused. This will cost the individual a lot. Same is true for credit card information. It can also be used for reconstructing all legal documents and information of a person. According to a study by FTC or Federal Trade Commission, identity theft impacts almost 3.3 million US citizens in 2012. They faced a loss of $35.9 billion. Most of the stolen information were credit card details, ATM card details, etc. Day by day such activities and incidents are growing in numbers. Internet Fraud Internet fraud is a common cybercrime mostly related to eCommerce. In the basic type of Internet fraud, an email is sent to the victim claiming winning of some lottery or some lucrative deals. The mail also asks the victims to transfer some amount of money to some bank account. And it cheats the victims. There are various variations of Internet frauds. Online auctions is another place where Internet frauds are very common. The main attribute of this type of cybercrime is, here the loss is not without the knowledge of victims. The victims are unable to identify the frauds. ATM fraud ATM or Automated Teller Machines are used widely for getting cash from a bank account. Users need secret PIN or Personal Identification Numbers for accessing their bank accounts. Cybercrime attackers intercepts the PIN and data from the magnetic strips of the ATM cards. Then these information will be used for making fake ATM cards and accessing the bank account of the victim illegally. Piracy and File Sharing Piracy and infringement of digital copyright is a typical and widespread cybercrime. In most of the cases, the participating entities in the crime may not be aware that they are committing some cybercrime. For example, piracy of music CD, movie DVDs is a common issue. Those are pirated and shared cross the file sharing websites by using torrents and peer-to-peer file sharing options. Common users downloads these files. This is a type of cybercrime where the entertainment industry is affected as there revenues come from selling of these CD and DVDs. When users get the free pirated copies of these over the Internet then the entertainment industry losses its business. Commercial digital distribution of music and movies and other entertainment resources have helped the entertainment industry to cope up with the impacts of piracy and copyright infringement to some extent. Hacking Hacking is the name of a collection of cybercrimes ranging from stealing information from victims to breaching privacy over the Internet. A hacker gain unauthorized access to someone elses computer or network from the system of the hacker. Sometime the reason may be curiosity or sometime there is some financial benefits. Hackers get generally identify and exploit vulnerabilities of a system to enter into a system. Then they use some malware or virus for capturing resources, making the system compromised. Sometimes they add compromised systems in their zombie networks and then use the zombie network for bigger attacks like DoS attacks. Malware and computer virus Releasing a computer virus deliberately is another type of cybercrime activity. Most of the malware are self-propagating and self-replicating. Virus and malware are used for infecting a computer or similar information systems, stealing information from those systems, consuming computing resources on those systems. Sometime it damages software and hardware components of the affected system. DoS, DDoS Attacks eCommerce websites, banking websites and other similar type of organization websites are common targets for Distributed DoS or DoS attacks. Here, the servers of such websites are flooded with huge traffic so that the upper limit of load handling by those servers are reached and the servers go down. The legitimate users of the services from those websites will no longer be able to access the servers. It costs multi-million dollar losses for the organizations. DDoS is a specialized version of hacking. In this case, a network of compromised and infected network, called zombie network is used for send traffic to the target. DDoS is more harmful and severe from a DoS attack. Spam Spam is a significant type of email based cybercrimes. Unsolicited advertisements of services and products are circulated by spam emails over the Internet. It waste the bandwidth, storage and other resources of a network and systems. So, this is a criminal offence to send spam emails to someone. However, a contrasting opinion of freedom of speech stands in favor of spams. But cybercriminals use spam emails for spreading malware and viruses and for growing zombie networks. Sabotage Sabotage is a cybercrime activity related to hijacking a website that belongs to some other organization or government body. It is also involved in damaging political and governmental resources for making severe attacks on public or nation. Forgery and counterfeiting Advancement of technology has been misused in counterfeiting activities by the cybercriminals. Updated digital printer and copier are being used in currency counterfeiting and forgery. Other than currency, immigration documents are also being illegally produced with higher levels of accuracy. Child Pornography New media technologies are being misused in cybercrimes like child pornography. Internet is also being misused heavily for benefits of the cybercriminals involved in such activities. There is no easy solution for this type of cybercrime. Impact of Cybercrime The malware attack to RBA is not a special case. Similar attacks to other banking and governmental institutions across the globe are happening daily. Some of these attacks become successful and mostly are unsuccessful. So, data is always at risk. The attack to RBA was not successful because the bank has a stronger and robust security infrastructure for its ICT resources. They regular monitors their IT infrastructure and develops awareness among its employees. So, the bank became able to identify and mitigate the attack. But this is not the case for other institutions and businesses. Larger businesses, banks, governmental institutions and enterprises can spent more investment behind securing their Information and Communication Technology infrastructure. But this is not true for small and medium scale businesses and organization. For cybercriminals, these SMEs are soft target. The attackers can steal more data from these businesses with very little efforts. According to McAfee 2013 publication , the estimated cost of cybercrime with respect to global economy, is from $300 billion to $1 trillion per year. The statistics is enough to give an idea of the severity of cybercrime on economy and businesses. The report by McAfee also identified that the defense organization of countries are particular targeted for severe cyber security attacks. Day by day cybercrime is becoming a part of war between nations and countries. When there is a growth in economy, the rate of cybercrime will also go higher. Because cybercriminals will try to utilize the economic growth for their own benefits. On the other hand, in case of recessions and hard times in business, sometimes business are not able to make required investment for their information security infrastructure. In such cases, the cybercriminals takes advantages of these situations. Information security risks for cybercrimes and the following consequences for businesses is quiet higher for the businesses that stores and processes valuable IP or Intellectual Property information like credit card information of customers, personal details of customers etc. There will be different implications of a potential security breach for these organization based on the attributes of the assets. Organizational value may get affected by these stolen intellectual properties. Because there are several laws and regulations that will not be favorable for the organization. The risks from sophisticated information security attacks and cybercrimes increases the cost of potential damages to the organization. Issues and Trends in Cybercrime Following trends and issues of cybercrime will help to understand the long term effects of cybercrime. Cybercrimes are getting merged with traditional crimes. Those criminals are utilizing the IT infrastructures and equipment for accomplishment of their criminal motives. Investigations of such crimes are becoming more complex. Day by day the distinction of cybercrime and traditional crimes are getting blurred. Earlier, cyber cafes were used for the cybercrime activities. Emergence of mobile device, smartphone and communication technology has made cybercrime activities more complex. A smartphone is now enough for accessing internet and accomplishment of some cybercrime. Cyber bullying is affecting innocent lives. Online banking and similar services based on traditional security infrastructure like public key cryptography, is no longer a highly secure infrastructure. Countermeasures for Cybercrimes Online security is highly dependent on digital countermeasures for cybercrimes. But, most of the cyber-attacks and cybercrime activities can be handled with proper awareness and following some sets of best practices and procedures. From the organizational viewpoint, cyber security measurements should be aligned with the risk management process of the organization. And the risk management process should be followed on regular bases. Some of the possible and important countermeasures for cybercrimes are given below, Awareness through training and workshops will help to combat with cybercrime activities. Organization should arrange such training for their employees, develop clear and concise security plans. The employees should be able to understand hacking and other cybercriminal activities. Then only they will be able to identify such activities if those happen to them in real-life. Attacks like spam and phishing can be mostly avoided by proper awareness. The digital assets including ICT infrastructure like data, computer, servers, networking equipment should be secured. Even though the budget can be a problem for SMEs they should keep SME balance between the investment and losses from potential cyber security risks. The software and systems used by organization should be up-to-date and upgraded to latest security updates. This will help to reduce the vulnerabilities in a system and making it more secure. Updates antivirus, IDS or intrusion detection system, firewalls and proxy servers should be properly installed, managed and updated. Websites and web applications are also susceptible to malware. So, those are also needed to be scanned. All sensitive data should be backed up securely and reliably. Networks should be equipped with DDoS mitigation strategies and measurements. Passwords for systems and accounts should be well managed. Stronger passwords should be used and needed to be changed frequently. While using public networks and computer, there are higher chances of cyber-attacks. These things are needed to be kept in mind and possible prevention techniques should be adapted. Use of sensitive information like credit card, identity etc. should be done very carefully. These information are needed to be shared with trusted entities only. Before sharing such information, user should check whether the connection is secure or not. This can be done by simply checking for HTTPS rather than HTTP. Users should check the sender of emails before opening an unusual email. If the email seems to be suspicious then they should refrain from clicking anywhere in the mail. Conclusion Cybercrimes are growing day by day. As, given in the background case study, such attacks happens for organization regularly. In this report, an overview of different cybercrime activities have been given along with the impact of cybercrime activities in economy, businesses and individuals lives. Following the discussion, there is a brief discussion on possible countermeasures of cybercrime activities. References [1] BBC, "Australia's central bank targeted by hackers," BBC, 11 March 2013. [Online]. Available: https://www.bbc.com/news/business-21738540. [Accessed 28 April 2015]. [2] S. W. Brenner, Cybercrime, ABC-CLIO, 2011. [3] D. Wall, Cybercrime, Polity, 2011. [4] T. Douglas and B. Loader, Cybercrime, Psychology Press, 2009. [5] R. Moore, Cybercrime: Investigating High-Technology Computer Crime, Routledge, 2014. [6] H. T. Milhorn, Cybercrime: How to Avoid Becoming a Victim, Universal-Publishers, 2011. [7] R. Santanam, Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives, Idea Group Inc (IGI), 2010. [8] A. Reyes, R. Brittson, K. O'Shea and J. Steele, Cyber Crime Investigations, Syngress, 2011. [9] J. R. Westby, International Guide to Combating Cybercrime, American Bar Association, 2003. [10] R. D. Clifford, Cybercrime: The Investigation, Prosecution and Defense of a Computer-related Crime, Carolina Academic Press, 2011. [11] M. Yar, Cybercrime and Society, SAGE, 2013. [12] McAfee, "The Economic Impact of Cybercrime and Cyber Espionage," McAfee, 2013. [13] R. Anderson, C. Barton, R. Bhme, R. Clayton, M. J. V. Eeten, M. Levi, T. Moore and S. Savage, "Measuring the cost of cybercrime," The economics of information security and privacy, pp. 265-300, 2013. [14] P. Hyman, "Cybercrime: it's serious, but exactly how serious?," Communications of the ACM, vol. 56, no. 3, pp. 18-20, 2013. [15] V. Benjamin and H. Chen, "Securing cyberspace: Identifying key actors in hacker communities.," Intelligence and Security Informatics (ISI), pp. 24-29, 2012. [16] J. V. Blane, Cybercrime and Cyberterrorism, Nova Publishers, 2013. [17] R. Schperberg, R. A. Stanley and K. C. Brancik, Cybercrime: Incident Response and Digital Forensics, Information Systems Audit and Control Association, 2010. [18] I. Baggili, Digital Forensics and Cyber Crime, Springer Science Business Media, 2011. [19] I. Bernik, Cybercrime and Cyber Warfare, John Wiley Sons, 2014. [20] S. Schjolberg, The History of Cybercrime, BoD, 2014. [21] J. I. Ross, Cybercrime, Chelsea House, 2010. [22] M. Chawki, A. Darwish, M. A. Khan and S. Tyagi, Cybercrime, Digital Forensics and Jurisdiction, Springer, 2015. [23] T. J. Holt, A. M. Bossler and K. C. Seigfried-Spellar, Cybercrime and Digital Forensics, Routledge, 2015. [24] M. Sauter, The Coming Swarm, Bloomsbury Publishing USA, 2014.