Saturday, May 23, 2020

Harlem And The Sun By Langston Hughes - 1091 Words

â€Å"What happens to a dream deferred? Does it dry up like a raisin in the sun?† This poem, Harlem, created a whole play based on one line (Hughes, 1055-1056). Langston Hughes wrote the poem Harlem due to his major role in the Harlem Renaissance. A Raisin in the Sun was concocted by Hughes one line, this play tells the story of an African American family living in the slums during a time when racial dilemmas were at an all time high. The family receives money from Mama’s husband passing away, but the family has disputes on how the money should be spent (Hansberry, 443-512). Throughout the play the title has significance by Hughes poem Harlem, African American lives in the 1950s, and the different dreams of the family members. One of the many proceedings that makes the title significant is the relation to Hughes poem Harlem. Harlem is a poem questioning what happens to a dream that does not come true. As we read the poem we find that all of the suggestions are of the dreams wasting away, except the last saying that the dream explodes, which is much more active and meaningful. â€Å"Langston Hughes was educated on the streets of Harlem listening to the hopeless and marginalised sing the blues. Many of his poems were written to the rhythm of blues music. Hughes listened and learned from the streets† (Price, 5). Harlem was written during the times of the Harlem Renaissance, which means Hughes was addressing the problem of African Americans not obtaining the same rights as whiteShow MoreRelatedThe Life and Poetry of Langston Hughes Essay776 Words   |  4 Pagesin American Cultural History, Langston Hughes was born February 1, 1902 in Joplin, Missouri. Growing up, he dealt with some hard times. His p arents divorced when he was little and he grew up with neither of his parents. Hughes was raised by his grandmother since his father moved to Mexico after their divorce and his mother moved to Illinois. It was when Hughes was thirteen that he moved out to Lincoln, Illinois to be reunited with his mother. This is where Hughes began writing poetry. HoweverRead MoreLangston Hughes And The Harlem Renaissance1476 Words   |  6 Pages Langston Hughes, a Voice for the Taciturn Take a time machine back to one of the most culturally-rich times in history, the Modern Age. More specifically, set your destination to northern Manhattan in the early 20s. When you step onto those bustling streets, you’ll find yourself swept up in the Harlem Renaissance. The contemporary writers you are surrounded by are legends such as Langston Hughes and W. E. B. DuBois, and the contemporary musicians you may hear at a local nightclub include some ofRead MoreLiterary Analysis of Langston Hughess A Dream Deferred1028 Words   |  4 Pagesthe themes, figures of speech, word placement, and flow of the piece, and A Dream Deferred, is no exception. In Langston Hughess poem, A Dream Deferred, the theme is that no really knows to dreams if they are not reached, and very realistic figures of speech help convey this idea; the poem can be surprisingly related to Mr. Hughess life through the subtitle and quotes from Langston himself. The meaning of, A Dream Deferred, is that no one really knows what happens to dreams that are not fulfilledRead MoreThe Harlem Renaissance By Langston Hughes1033 Words   |  5 Pagescalled the Harlem Renaissance. After World War I, many blacks migrated from the south to up to the north to places like Chicago, Detroit and New York. The people in Harlem felt the racial pride and this caught the attention of many musicians, writers, and artist. The Harlem Renaissance period lasted from 1920 to around 1935. Even though this period was short, it still lives on though all African American artists today. According to Biography.com in the article about Langston Hughes, there wereRead MoreHarlem: a Dream Deferred1043 Words   |  5 PagesHarlem: A Dream Deferred Langston Hughes Literally Analysis Dreams are aspirations that we hope to reach on our lifetime. They are the day that gives us the drive to live our lives and accomplish our goals. When reaching our goals, we will do anything to get to our destination. But what happens when your dreams deferred and put on hold due to unseen circumstances? Or what do you so when someone tells you that you can not so the things you want to so because of the pigmentation of your skinRead MoreAnalysis of Harlem by Langston Hughes602 Words   |  3 PagesAnalysis of Harlem by Langston Hughes Through the turbulent decades of the 1920s through the 1960s many of the black Americans went through difficult hardships and found comfort only in dreaming. Those especially who lived in the ghettos of Harlem would dream about a better place for them, their families, and their futures. Langston Hughes discusses dreams and what they could do in one of his poems, Harlem. Hughes poem begins: What happens to a dream deferred... Hughes is asking whatRead MoreHarlem Renaissance Poets: Langston Hughes, Claude McKay, and Countee Cullen1065 Words   |  5 PagesThe Harlem Renaissance was a time where creativity flourished throughout the African American community. At the time many African Americans were treated as second class citizens. The Harlem Renaissance acted as artistic and cultural outlet for the African-American community. The Harlem Renaissance, otherwise known as â€Å"The New Negro Movement† was an unexpected outburst of creative activity among African Americans In the poems Harlem by Langston Hughes, America by Claude McKay, and Incident by CounteeRead MoreHughes Use of Literary Devices658 Words   |  3 Pages Langston Hughes Use of Literary Devices Only a half of century after the abolition of slavery, the African Americans began the movement of the Harlem Renaissance in the 1920‘s. Suppressed by whites, segregation, second-class citizen ship and a poor education Langston Hughes became one of the most inspirational poets of his time. Langston Hughes let the world know of his existence through his poetry. Ignited with passion, pride and knowledge of the journey through slavery and there after, HughesRead MoreThe Dream Deferred By Langston Hughes1020 Words   |  5 Pages â€Å"Dream Deferred,† is a poem written by Langston Hughes discussing what may become of a dream that is put off, delayed, or postponed by external influences. Throughout the poem, Hughes uses questions about concrete things in everyday life and compares them to the ignored dreams. Langston Hughes isn’t referring to the dreams we have when we go to sleep at night, he’s referring to an aspiration or a desire. â€Å"Does it dry up Like a raisin in the sun?† (Hughes 970) The vision of his dream is vanishingRead MoreEssay on The Poetry of Langston Hughes During the Harlem Renaissance1694 Words   |  7 PagesI. Introduction: The Harlem Renaissance The village of Harlem, New York was originally established by Dutch Governor Peter Stuyvesant in 1658. It was named after a Dutch city, â€Å"Nieuw Harlem. It sits on a 5.5 square mile area of Manhattan north of 96th Street. The 1830s saw the abandonment of Harlem due to the fact that the farmlands failed to produce. The economic recovery in Harlem began in 1837. It boasted prosperous, fashionable neighborhoods that offered a diverse, rich background provided

Monday, May 18, 2020

Management Assignment - 2340 Words

Content 1. Introduction 1.1) About Herbalife 1.2) Mission of Herbalife 1.3) Herbalife Way 1. Macro Environmental Factors 2.4) Political/Legal Forces 2.5) Economic Condition 2.6) Social/Cultural Environment 2.7) Technology Changes 2. Micro Environmental Factors 3.8) Customer 3.9) Intensity of rivalry among competitor 3. Four Management Functions that affects the economy 4.10) Planning 4.11) Organizing 4.12) Leading 4.13) Controlling 4. Conclusion 5. Recommendation 1. Introduction 1.1) About Herbalife Herbalife is a global nutrition, weight management and skin care company. It runs the business in 84 countries (As†¦show more content†¦This factor encloses research and development activities, automation, and technology incentives and so on. It can define the barrier of entry to the market, efficient level of production, outsourcing decision. For Herbalife, they have Nobel laureates to do research their products in their own labs. Herbalife always pressed in Time magazine and magazines in US but they never press and advertise in Singapore. To penetrate Singapore market, they should advertise and press in Singapore’s magazines and newspapers. 3. Micro Environmental factors Internal or micro environmental factors include Poter’s Five forces- bargaining Power of consumers, barging power of suppliers, threat of substitution, intensity of rivalry owing competitor, threat of new entrants. Among them, I want to discuss the following. 3.1) Customers Customers are one of powerful things in the business. They want the highest quality and the lowest price. Bargaining power of the customer mean that more than negotiation of the price and broader meaning than that. Customer’s words also helpful and work for the company. Once they satisfy with the products or service, they advise other people to use the product. For Herbalife, customer service needs to be better. They very take care the new customers but not very much to the old one. This fact must be aware because the new or the oldShow MoreRelatedAn Assignment On Operation Management Essay3566 Words   |  15 PagesAn assignment On Operation Management Submitted by: Submitted to: Date of submission: Table of Contents Executive Summary: 3 Introduction: 4 WH Smith 4 Reasons for selecting WH Smith as the selected organization: 4 1.1 Importance of operation management: 4 1.2 Operation management of an organization: 5 1.3 Process model for operation management: 6 2.2 Importance of Three E’s: 6 Economy: 6 Effectiveness: 7 Effectiveness: 7 2.2 Impact of tension on cost and quality: 7 2.3 Significance ofRead MoreManagement Assignment Ryanair5707 Words   |  23 PagesBusiness Management (BM291) Assignment Date: 30/11/09 â€Æ' Table of Contents Introduction 3 Q1. Manager Profile Job Description 3 Assignment 3 Key Accountabilities: 3 Management Roles 4 Meeting challenges 4 Reporting 4 Summary of work experience educational attainment 5 Organisational Chart 6 Q2. Comparisons against Fayol’s key managerial roles 7 Q3. Future challenges of the Ryanair Director of Operations 10 Q4. Effectiveness of the Manager 11 Bibliography 13 QuestionnaireRead MoreStrategic Management Assignment2863 Words   |  12 PagesB3115 TITLE: Strategic Management Aims of the assessment: †¢ To examine the role of strategic management in planning an organisation’s future development. †¢ To develop knowledge and practice in the application of strategic management concepts and techniques. †¢ To develop analytical, evaluative and enterprise skills/competences associated with the formulation of organisational strategy. The learning outcomes assessed in this assignment include the student’s ability to: Read MoreOperations Management Assignment2347 Words   |  10 PagesTable of Contents Case: Operations Management at Toyota 2 Conclusion 3 Case: Southwest Airlines Operation Management 3 Background: 3 Analysis of operation Management: 4 Conclusion 6 References: 7 Southwest Airlines Operations - A Strategic Perspective 7 â€Æ' Case: Operations Management at Toyota Toyota is among the leading automobile manufacturers of the world selling almost 9 million models at all the five continents. Toyota has been awarded a position in the top 10 fortune global 500 enterpriseRead MoreOPERATIONS MANAGEMENT ASSIGNMENT8173 Words   |  33 Pages LEADSTAR COLLEGE OF MANAGEMENT AND LEADERSHIP TUTOR MARKED ASSIGNMENT (TMA) FOR OPERATIONS MANAGEMENT ASSIGNMENT WEIGHT: 50% STUDENT NAME Abreham Kelile Kaba ID LMBA0013/2014 BACTH 1ST Part I: Multiple Choice Questions (1 point each) Choose the best answer from the following Questions _C__Q1.One advantage of Just-in-Time (JIT) Management of stock is _____a. It reduces the need to plan and organize _____ b. it removes the need for delivery Quality Control _____ c. it reduces the cost of holdingRead MoreCost Management Assignment1355 Words   |  6 PagesaCost Management Assignment Semester 1 2011 Table of content Detail: Pages Introduction 1 Q.NO.1 2 Q.No.2 3 Q.No.3 4 Q.No.4 5 Q.No.5 6 Q.No.6 7 Summary: 8 Introduction Cost Management delivers concise articles, experienced-based columns and case studies to evaluate how your present investment justification criteria and methods compare with those of other organizations, Learn about changing cost management methods and techniques and how they can be used to improve yourRead MoreProject Management Assignment13761 Words   |  56 PagesAssignment 2 ------------------------------------------------- 157.246: Project Management and Systems Implementation PURPOSE 1 INTRODUCTION TO PROJECT MANAGEMENT 1 INTRODUCTION TO MICROSOFT PROJECT 2 FORMAT OF THIS ASSIGNMENT 3 USING MICROSOFT PROJECT IN PC COMPUTER LABORATORY 3 File SAVE and BACKUP requirements 3 Starting Microsoft Project 4 THE PALMERS GOLF COURSE PROJECT 4 Project background 4 Setting the Project Start Date 4 Setting default values 5 ï  ¶ Set Current Date 5 ï  ¶ SetRead MoreInformation Systems Management Assignment1656 Words   |  7 PagesInformation Systems Management Assignment Management is one of the most important human activities and has critical impact on life, growth, development or destruction of an organisation. In an organisation, managers with any rank or status should understand their basic duties i.e. maintaining a sustainable conductive environment where people can fulfil their commitments and objectives through collaborative approach. (Akhtar, 2011) A manager is responsible to achieve the business’s goals, visionsRead MoreHuman Resource Management Assignment3150 Words   |  13 PagesASSIGNMENT ACKNOWLEDGEMENT SHEET FOR SUBMISSION OF ASSESSMENT Serial No: 40074724 Please note: 1. Assignments must be submitted on or before the date due.2. Students must ensure that they are not guilty of plagiarism which is, essentially, referring to the words/ideas of others without acknowledgment. Students must comply with the statement below. | Students Declaration The attached assignment is my own work, and has never been submitted for assessment on any other courseRead MoreAssignment : Business And Management College Essay1535 Words   |  7 PagesRETAIL BUSINESS AND MANAGEMENT COLLEGE ASSIGNMENT NATIONAL DIPLOMA IN BUSINESS LEVEL 5 UNIT STANDARD 11648 v5 11649v5 Ques 1. Formal business meetings: ï  ¶ Annual general meetings ï  ¶ Extraordinary general meetings ï  ¶ Board meeting †¢ Annual general meetings: This meeting takes place once a year. In this meeting every member should be invited like from all the management and owner to every worker in the workplace, organization, company etc. It mostly held before the elections and main events. Performances

Monday, May 11, 2020

Identifying the Most Common Hardwood Trees

Hardwoods or broadleafs  are trees  classed as angiosperms or plants with ovules enclosed for protection in an ovary. When appropriately watered on good fertile sites or fed  in the landscape with a special tree fertilizer mix, these ovules will rapidly develop into seeds. The  seeds then drop from trees as acorns, nuts, samaras, drupes and pods. Hardwoods have either simple or compound leaves. Simple leaves can be further divided into lobed and unlobed. Unlobed leaves may have a smooth edge (such as a magnolia) or a serrated edge (such as an elm). The most common North American tree is the red alder. It has oval-shaped leaves and a reddish-brown bark. They can grow as tall as 100 feet and are found mostly in the western United States and Canada. Difference Between Hardwood and Broadleaf Broadleaf  trees can be evergreen or they can persist in dropping their leaves over the entire  winter. Most are  deciduous and lose all their leaves over a short annual fall drop. These leaves can be either simple (single blades) or they can be​ compound with leaflets attached to a leaf stem. Although variable in shape, all hardwood leaves have a distinct network of fine veins. Here is a quick leaf identification key of the common hardwoods in North America. Hardwood: Trees with broad, flat leaves as opposed to coniferous or needled trees. Wood hardness varies among the hardwood species, and some are actually softer than some softwoods.Deciduous Perennial plants which are normally leafless for some time during the year.Broadleaf: A tree with leaves that are broad, flat and thin and generally shed annually. Difference Between Hardwood and Softwood The texture and density of the wood a tree produces puts it in either the hardwood or softwood category. Most hardwood trees are deciduous trees, which lose their leaves annually, like elm or maple. Softwood comes from a conifer (cone-bearing) or evergreen trees, such as pine or spruce. Ron Biedenbach / EyeEm / Getty Images The wood from hardwood trees tends to be harder because the trees grow at a slower rate, giving the wood its greater density. Most Common Hardwoods Unlike the conifers or softwood firs, spruce and pines, hardwood trees have evolved into a broad array of common species. The most common species in North America are oaks, maple, hickory, birch, beech and cherry. Forests, where a majority of their trees drop leaves at the end of the typical growing season, are called deciduous forests. These forests are found worldwide and are located in either temperate or tropical ecosystems. Deciduous trees, like oaks, maples, and elms, shed their leaves in the fall and sprout new ones every spring Common North American Hardwood List Here are some of the most common hardwood trees found in North America, along with their scientific names. ash  - Genus  Fraxinus  beech  - Genus  Fagus  basswood  - Genus Tilia  birch  - Genus  Betula  black cherry  Ã‚  - Genus  Prunus  black walnut/butternut  - Genus  Juglans  cottonwood  Ã‚  - Genus  Populus  elm  Ã‚  - Genus  Ã‚  Ulmus  hackberry  Ã‚  - Genus  Ã‚  Ã¢â‚¬â€¹Celtis  hickory  Ã‚  - Genus  Ã‚  Carya  holly  Ã‚  - Genus  Ã‚  IIex  locust  - Genus  Robinia  and  Gleditsia  magnolia  Ã‚  - Genus  Ã‚  Magnolia  maple  - Genus  Acer  oak  - Genus  Quercus  poplar  Ã‚  - Genus  Populus  red alder  Ã‚  - Genus  Ã‚  Alnus  royal paulownia  Ã‚  - Genus  Paulownia  sassafras  Ã‚  - Genus  Ã‚  Sassafras  sweetgum  - Genus  Liquidambar  sycamore  Ã‚  - Genus  Ã‚  Platanus  tupelo  Ã‚  - Genus  Ã‚  Nyssa  willow  Ã‚  - Genus  Ã‚  Salix  yellow-poplar  - Genus  Liriodendron japatino / Getty Images

Wednesday, May 6, 2020

Personal Computer Company At Apple - 960 Words

Brief Chronology: †¢ 1976 With $1,300, Steve Jobs and Steve Wozniak found Apple Computer, Inc. †¢ 1980 Apple converts to public ownership. †¢ 1982 Apple becomes the first personal computer company to reach $1 billion in annual sales. †¢ 1985 John Scully assumes the helm after a management shakeup that causes the departure of Jobs and several other Apple executives. †¢ 1991 PowerBook line of notebook computers is released. †¢ 1994 Power Macintosh line is released. †¢ 1996 Acquisition of NeXT brings Steve Jobs back to Apple as a special advisor. †¢ 1997 Steve Jobs is named interim chief executive officer. †¢ 1998 The all-in-one iMac is released. †¢ 2000 Jobs, firmly in command as CEO, oversees a leaner, more tightly focused Apple. †¢ 2001 The iPod is†¦show more content†¦Apple expects this trend to continue during 2008 and to reach sales of 10 million iPhones, stealing 1 percent of the mobile phone market share. (Chapman Haskisson). One year following the untimely death of Steve Jobs, the company he co-founded and led for most of his adult life appears to be thriving and lacking any serious obstacles to its break-neck growth in a rapidly changing technology market. (Gallagher, 2012) That said, Apple Inc. still has plenty of challenges ahead. Some of those stem simply from the nature of the fast-paced, hyper-competitive consumer technology business the company currently competes in — and largely dominates. (Gallagher, 2012) Other challenges may be more unique to Apple and its singular focus on a relatively narrow line of products. And long-term, the company may still feel the loss of a leader who possessed an uncanny ability to see around corners, and bend other strong personalities to his will. (Gallagher, 2012) â€Å"The guy who could literally pull rabbits out of his hat no longer exists,† said independent technology analyst Roger Kay. (Gallagher, 2012) Apple’s had a phenomenally strong year since Jobs’ death from cancer last October, which left the company permanently in the hands of the senior management team he spent years cultivating, led by CEO Tim Cook. It’s also had some stumbles along the way. (Gallagher, 2012) Some missteps with features such as

How to Write a 20 Page Research Paper in Under a Day Free Essays

How to Write a 20 Page Research Paper in Under a Day So you’ve procrastinated again. You told yourself you wouldn’t do this 2 months ago when your professor assigned you this. But you procrastinated anyway. We will write a custom essay sample on How to Write a 20 Page Research Paper in Under a Day or any similar topic only for you Order Now Shame on you. It’s due in a few hours. What are you going to do? Pick a Topic The important thing about this is to think of ABSOLUTELY EVERYTHING, no matter how silly or far-fetched. It’ll make your professor go â€Å"hmm, didn’t think about that one†. You can even get your friends to help you with this one. The more the merrier. It’s best to do this on a computer, because†¦ Reorder everything Put your most obvious argument first. Then put weird off the wall stuff, regardless of importance. Put the strongest argument for your case next. Now list the incidents that will help argue for your point. Don’t know of any incidents in the news to help argue your point? That’s ok. Make up some, except keep it really really generic. When it comes time to quote the source, remember this: There are over 6 billion people in the world. There are countless newspapers and other sources that document people doing†¦ stuff. If you list incidents that are generic enough and your topic isn’t extremely weird, at least one person out there has done something notable/stupid/crazy enough to make it to the news. Also, people have sued each other over everything imaginable. Find a court case database. Your topic has SOMEHOW manifested itself in court at some point in history. I can almost guarantee it. Just make sure that the situations you come up with are physically possible. Now, list everything that could be construed to be the answer to the question â€Å"if elected, what would you do about this issue? † It’s best to keep all this in the form of an outline. Spaces Now add several lines of space under each bullet. Keep adding spaces until your text document has reached the goal size of your paper. Now print it out. Get the hell away from your computer The reason why you should do this is because everyone magically becomes ADD when they are near a computer. You can check your AIM messages later. Write Write a fiery rant in each of the spaces you alloted. Get pumped. Just don’t begin every paragraph with â€Å"I swear upon my father’s grave†¦ † Also try not to repeat yourself too much. Be very specific. Talk to your reader as though they’ve never heard of your subject before. Write at about the same size that your typed version will be. Don’t worry too much if you don’t fill in all the spaces. But if you feel strongly enough about your topic, then this really shouldn’t be a problem. If you’re like me and can’t think linearly you can skip around as much as you want. Go Back Inside Type everything. You’ll also notice more things occur to you as you type. Go ahead and throw them in in the corresponding categories. Don’t jump around too much at this point though. Maintain focus and bash out that essay as fast as possible. Although you should do this as fast as possible, be a typo nazi. Those little things really make it evident you did this at the last minute. Time for that whole â€Å"research† part Believe it or not, nothing you said was original. Remember what I said earlier about 6 billion people? Apply now. Pick each topic/case/scenario/subpoint. Anything you had to say about those has already been said by some scholar or professor or newspaper. Google it up. It won’t take long. Take a few key words from your main argument of each section and see what you get. Paraphrase their main argument or quote a few lines. Add the proper citations. Do NOT plagiarize. Formatting Print. Turn in. Good job. Have a cookie. How to cite How to Write a 20 Page Research Paper in Under a Day, Essays

Parts of Speech Essay Summary Example For Students

Parts of Speech Essay Summary The traditional term parts of speech was developed in Ancient Greek linguistics and reflects the fact that at that time there was no distinction between language as a system and speech, between the word as a part of an utterance and the word as a part Of lexis. The term parts Of speech is accepted by modern linguistics as a conventional, or non-explanatory term (name-term; to denoted lexical-grammatical classes Of words correlating With each Other in the general system of language on the basis of their grammatically relevant properties. There are three types of grammatically relevant properties f words that differentiate classes of words called parts of speech: semantic, formal antinational properties. They traditionally make the criteria for the classification of parts of speech. The semantic criterion refers to the generalized semantic properties common to the whole class of words, e. G. : the generalized (or, categorical) meaning of nouns is thinness, of verbs process, to adjectives substantive property, to adverbs non-substantive property. It doesnt take all that much work to do and depending on what you watch, you are able to get a lot of information, and also get entertainment while doing so. One major problem with television is that people are becoming very dependent upon it. There are a lot less people going out and participating in sports because it takes up too much time and they dont get to have their TV time which personally think is ridiculous. People are becoming a lot lazier as the television becomes more advanced Now lets speak about the different kinds of people provoking on television and qualities these people should have in order to make things more interesting. Its still quite difficult to appear on television without the following qualities: intelligence, talent, beauty, leadership qualities, and energy. Its far more interesting to listen to a football report full of energy than to a peaceful story a commentator hankers to tell you. Similarly, weather forecasts would not be so exciting if announcers were plain. There are plenty of arguments for and against television but it is, however, unlikely to be a thing of the past in the near future. There is such a wide variety of programs that everyone can choose something hes particularly interested in. For instance, if you are an animal lover you may be fascinated to watch such channels as Animal Planet or BBC One. The latter is not a channel broadcasting programs only about animals but nevertheless the orgasm of that kind come out on BBC One regularly. However, the most popular program is still news. It is the main reason as to why so many people have a television set at home. What can more interesting than watching the latest news report trot the other end to the world? Fully agree that one can read the same news on the Internet which is also a great resource because many sites give you the opportunity to follow any event taking place in the world every minute. Nevertheless, there are a few channels which have roll captions giving you the same opportunity. One thing that the Internet cannot give you now is picture transmission. Many will start arguing that it can but let them realize that there are still a lot of people using modems to browse the web.

Friday, May 1, 2020

Business Organizations Professional Research and Communication

Question: Discuss about the Business Organizations for Professional Research and Communication. Answer: Introduction Outline of the thesis: In this present market circumstances, the researcher has found that the competition intensity has drastically increased among the retail organizations of Australia. The success of the business organization is solely dependent on the service level with the, which organizations delivers to the targeted customers in the market (Agyei-Mensah, 2016). All the department and the employees of the business organization needs to work coordinately in order meet the needs and enhance the market position of the company in the competitive market (Belleflamme Lambert, 2016). Basically, it is the responsibility of the business organizations to protect all the organizational data as well as the important information about the targeted customers of the organization. Every business organizations incorporate specific policies and procedure in order to run the business in an authentic way (Besson Rowe, 2012). Information system securities are an effective process, by which the business organizations mainly keep all the important information, confidential data and documents of the business organization (Beynon-Davies, 2013). Brocke et al., (2013) commented that by restricting access of the information and important data of the business organization, the management mainly tries to protect the unethical use of the information by the individuals. It has been found that none of the business organization ever discloses the information system securities with others. Presently all the renowned retail organizations has given much emphasis on the information system security management and operations (Bruno et al., 2016). Through this effective initiative, the organization mainly tries to protect the organizational system from hacking. Presently, the governmental bodies has incorporated few policies for operating and maintaining the information system securities within the business organizations (Chan et al., 2014). Different business organization uses and implements different kinds of policies and procedures in order to maintain and operate the information system securities in the business organization (Chang et al., 2013). By giving much emphasis on the information security system the business organization mainly, try to operate the system and the business in a unique way. In order to conduct this study, the researcher has mainly chosen Woolworths as the company. Additionally it has also focused on the information system securities is creating an impact on the overall operational system and the performance level of the business organization in the global market. Background of the organization: Woolworths is considered as one of the largest supermarket. It mainly maintains a big store chain in the Australian market. Additionally it has been found that the company mainly sells the grocery products in the market. The researcher also has found that the company has got almost its stores in 961 locations. As per the report of 2015, the total revenue of the company is around $42.132 billion. On the other hand, around 11,000 employees work in the company. The main competitors of the company Metcash limited and Wesfarmers limited. Presently the market share of the company has reduced due to disclosing of companies information to the other parties in the market. Problem statement: In the recent market situation the competition is facing a tough situation in order to build up the business in the market. Presently, the researcher has found that the company is unable to effectively maintain and operate the information system securities within the organization. On the other hand, it has been found that the employees who are operating the system do not have much knowledge about the system and its operations. Due to this reason, most of the informations and data are being disclosed to the third parties. Chuang Lin (2013) commented that this is directly creating an adverse impact in the overall operations and management of the business organization. Apart from this it has been also found that the technologies and the software are, which the company is using is not much effective to protect the system from hacking and password disclosing. Research objectives: The main objectives of the study are as follows: To understand the importance of information system securities in an business organization To evaluate the information system security operates by Woolworths in the organization To Identify the challenges and barriers that the Woolworths is facing to manage the entire information system security To analyze the effective strategies implemented by Woolworths in order to manage and operate the system To provide suitable recommendation for Woolworth for future development of the organization Research questions: What is the importance of information system security in a business organization? What way Woolworths operates its information system securities in the business organization? What are the barriers and the challenges Woolworths is facing in managing the information system security? What are the unique strategies Woolworths is incorporating for managing the system? What are the effective recommendations suggested to Woolworths for the future development of the organization? Structure of the dissertation: Figure: Structure of the dissertation (Source: Created by the Author) Literature Review IntrodUction: In this chapter, the researcher has mainly focused on the previous thesis done by the other researchers and scholar sin this particular topic. The previous study helps the researcher to comprehend the research topic in an effective way. On the other hand, here the researcher also has discussed several models and theories related to the topic. Concept of information system securities: In the current scenario, the information system security has become much common in every business organizations. In order to maintain the privacy of the organizational policies, the business organization has implemented effective softwares and technologies for keeping the confidential documents, data, and information of the business organization (Chung Kim, 2016). Additionally, this particular system helps the company to protect their entire system from hacking. On the other hand, it restricts the unethical usage of the organizational data. On the other hand, the information system securities also help the company to protect the telephonic conversation data also (Deman Klun, 2015). Sometimes, it becomes very much risky for the business organization to protect the authentic data of the business organization. Effectiveness of information system securities: In the present competitive situation, it has become much significant for the big business organization to maintain the data of the business organization (Sousa Oz 2014). By implementing effective system, the business organization can maintain the secrecy within the business organization (Feng et al., 2014). Additionally, it helps the business organization to overcome any sort of risk related to the information system. Presently, the retail business organization like Tesco, Sainsbury and Morrison are framing effective plans for managing and operating the information system security effectively within the business organization. Fichman et al,. (2014) commented that Leakage of the important information and data can destroy the business organization image as well as also can destroy the whole operational system of the organization. There is some important information, which needs to be protected from unauthorized access (Galliers Leidner, 2014). It has been also found that poor and ine ffective system can harm the entire operation of the business organization. On the other hand, it has been found that the customers are now much concerned Components of information system securities: Gibson, (2014) put forward that the information system securities play an important role in the business organization. As per the organizational policies and the nature of the business, the business organization mainly implements the effective plan in order to maintain system in an accurate way within the organization (Zhang et al. 2013). Here the researcher has found that there are mainly three components of information system securities, namely confidentiality, integrity and availability. Integrity: Here the researcher has found that through integrity of information the business organization mainly tries to protect the information of the organization from any sort of modification or manipulation by any unauthorized parties. Any kind of manipulated information or modified information can easily create an adverse impact on the operations as well as the image of the company (Gozman Currie, 2015). Additionally, it has been also found that Cryptography plays an important role ensuring the data integrity. There are many business organizations, were the employees of the business organization modifies the information and the data of the business organization (Li et al. 2013). This creates a huge barrier in the whole operational system of the business organization. Confidentiality: By maintaining the confidentiality, the business organization mainly tries to protect the information from any sort of misuse. Kim and Solomon, (2013) commented that the key element of the information confidentiality is encryption. Through encryption, the right people can easily access the important information and data of the business organization (Kong et al., 2015). It has been found that there are many business organizations, which does not maintain the policies incorporated by the governmental bodies for maintaining the confidentiality of the data and information of the business organization (Lauffer, 2015). Availability: The availability of information means that the business organization gives the power only to the authorized parties to access the information and the data of the business organization (Kuhn et al. 2014). The authorized people can access the information at the right time. Additionally, it has been found that different softwares and techniques are being used to protect the important information of the organization (Lnsiluoto et al,. 2016). Gap of the literature: While conducting the study, the researcher has faced several problems in the research. As the topic is a bit different, it was quite difficult for the researcher to find out authentic information and data for the study. On the other hand, the researcher was unable to find and use effective theories and models in the study. Due to this reason, the researcher solely has to depend on different available websites. Research Methodology Introduction: In this particular chapter, the researcher has used dissimilar kinds of tools and methods in order to collect the authentic information and data from different available sources. Here the researcher has collected information from both the primary sources and the secondary sources. Additionally, here the researcher also has used effective data collection method and research design in order to conduct the research study in the right way. Data collection method: In case of any research study, the data collection plays an important role. The collection of inaccurate data and information can hamper the quality of the research study. In order to collect the authentic information for the study, the research has used equally the primary sources as well as the secondary sources (Taylor et al., 2015). Through the interview and survey process, the researcher has composed the authentic statistics and information from the employees 50 employees of the company. Additionally, by using the interview process, the researcher has collected the viewpoints of the managers of the company. Research design: There are several kinds of research design, namely explanatory, exploratory and descriptive research design. In order to conduct this particular study, the researcher has mainly chosen the descriptive research design. Through using this effective research design, the researcher can conduct the study in much more detail. In depth research, study will help the researcher to analyze the topic in the right way (Flick, 2015). Additionally, it will also help the researcher to fulfill the research aims as well as objectives. Research hypothesis: Here the researcher has mentioned the researcher hypothesis: The information system securities does not create any impact on the operation of the business organization The information system securities creates an adverse impact on the operations of the business organization Result and findings Quantitative data collection process: Questionnaire 1: Relationship with the organization For how long you are working for Woolworths? Options No of response Percentage of response Total no of respondent More than 5 years 7 14 50 1-4 years 7 14 50 1-3 years 15 30 50 1-2 years 12 24 50 6 months 1 year 9 18 50 Mean Median Mode SD 3.18 3 3 1.288727 Table 1: Relationship with the organization (Source: Created by the Author) Figure 2: Relationship with the organization (Source: Created by the Author) Findings: From the above table and figure, the researcher has found that around 14% of the employees are working in the company for more than 5 months in the company. More than 4 years 14% of the employees are working in the company. On the other hand, it has been also found that more than 30% of the employees in the organization are working for 3 years in the company. Additionally, it has been found that 24% of the employees are working in the company for 2 years in the company. On the other hand, 18% of the employees are attached with the company for more than 6 months. Here the researcher has found that the mean is 3.18. On the other hand, the median is 3 and mode is also 3. Additionally, it has been found that the SD is 1.288727. Questionnaire 2: Operating services of the company Are you satisfied with the information system security program of Woolworths? Options No of response Percentage of response Total no of respondent Highly satisfied 9 18 50 Satisfied 12 24 50 Neutral 15 30 50 Dissatisfied 10 20 50 Highly Dissatisfied 4 8 50 Mean Median Mode SD 2.76 3 3 1.204752 Table 2: Operating services of the company (Source: Created by the Author) Figure 3: Operating services of the company (Source: Created by the Author) Findings: From the above table it has been found that among 50 employees, 18% employees are highly satisfied with the information system securities of the company. On the other hand, it has been found that 24% of the employees are satisfied with the services of the company. 30% of the employees are neutral. On the other hand, 20% of the employees are dissatisfied with the information system securities program of the company. 4% employees are highly dissatisfied. The value of the mean is 2.76 and the median is 3. Additionally, it has been found that the mode is 3 and the value of the SD is 1.2044752. Questionnaire 3: System securities of the organization Do you agree that an ineffective information system securities program creates an adverse impact on the business operations? Options No of response Percentage of response Total no of respondent Strongly agree 15 30 50 Agree 13 26 50 Neutral 10 20 50 Disagree 9 18 50 Strongly Disagree 3 6 50 Mean Median Mode SD 2.44 2 1 1.264266 Table 3: System securities of the organization (Source: Created by the author) Figure 4: System securities of the organization (Source: Created by the author) Findings: From the above table and paragraph, it has been found that the 30% of the employees of the organization strongly agree that ineffective information system securities programs can easily create an adverse impact on the business operations of the business organization. On the other hand, 20% of the employees are neutral. Additionally, 26% of the employees agree that the ineffective information system management can easily create an adverse impact on the overall business operations. The mean is 2.44, median 2 and the mode is 1. On the other hand it has been found that the value of the SD is 1.264266. Questionnaire 4: Service Improvement of the organization According to you, how the company can improve its information system securities? Options No of response Percentage of response Total no of respondent Implementing advance technologies 15 30 50 Upgrade software system 13 26 50 Train the employees 10 20 50 Time management 8 16 50 Others 4 8 50 Mean Median Mode SD 2.46 2 1 1.296935 Table 4: Service Improvement of the organization (Source: Created by the author) Figure 5: Service Improvement of the organization (Source: Created by the Author) Findings: The above table portrays that around 30% of the employees thinks that the company needs to implement advance technologies for improving the service system. On the other hand 26% of the employees think that the company should upgrade the softwares to upgrade the system. Around 20% of the employees think that the company should train the employees for practice the operation in an better way. Moreover, 16% of the employees think that the company should give much emphasis on the time management and 4% of the employees think that the company should focus on other. The mean is 2.46, median is 2 and the mode is 1. Additionally the SD value is 1.296935. Questionnaire 5: Implementation of strategies for better operation According to you what are the strategies that Woolworths should incorporate for developing the information system securities operations? Options No of response Percentage of response Total no of respondent Frame accurate planning 10 20 50 More effective softwares 12 24 50 Implementation of new technologies for more protection 15 30 50 Usage of effective password 9 18 50 Others 4 8 50 Mean Median Mode SD 2.7 3 3 1.216385 Table 5: Implementation of strategies for better operation (Source: Created by the author) Figure 6: Implementation of strategies for better operation (Source: Created by the author) Findings: Around 20% of the employees think that the company needs to frame accurate planning for operation the system in a better way. On the other hand, 30% of the employees think that the company needs to implement new strategies for protecting the information and the data of the organization. Additionally, 18% of the employees thinks that the company must use unique passwords for improve the information system securities. The mean is 2.7. Median is 3, mode is 3 and the SD is 1.21638. Qualitative data collection process: Why the company is unable to operate and manage the information system securities effectively within the organization? As per the first manager, due to the lack of knowledge of the employees the business organization is unable to maintain the information system securities of the organization. On the other hand, the second manager, put forwarded that the company is unable to incorporate the effective technologies and softwares within the organization. Sometimes, due to the mishandling of the security codes, the important information are being leaked to the unauthorized parties. Interview question 2: What are the major barriers does the company is facing to manage the whole operating system? As per the first manager, it has been found that the employees of the business organization are not much trained and knowledgeable. Due to this reason, the employees are facing barriers to adopt and practice the new advance system within the operating system. On the other hand, the second manager put forward that due to lack of communication the employees and the management does not work coordinately with the other operating teams in the organization. Discussion and Analysis 1. For how long you are working for Woolworths? As the mean value is 3.18, it means that 15% of the employees are functioning in the corporation for more than 3 years in the company. On the other hand, the median is 3, it can be said out of 50 employees 15% of the workforce are working in the corporation for more than 3 years. This indicates that Woolworths has the scope to engage the employees more than 3 years in the company. The mode is 3, it indicates that the employees are working in the company for more than 3 years in the company. Thus, it can be said in the future there is a huge chance of increasing tenure of the employees in the organization. As the SD value is more than 1, there is a high risk for the company in future. Are you satisfied with the information system security program of Woolworths? The value of the mean is 2.76 which means that 30% of the employees neutral about the information system securities of the company. On the other hand, it can be also found that 20% of the employees are dissatisfied with the information system securities. The media is 3, out of 50 employees 30% of the employees are neutral about the security program of the Woolworths. In order to improve the services, the organization needs to focus on their security systems. The mode is 3, 30% of the employees are neutral and they also thinks that the company has got a huge opportunity to improve their information system security. Do you agree that an ineffective information system securities program creates an adverse impact on the business operations? The mean value is 2.44, this indicates that 26% of the employees agree that the ineffective information system securities can hamper the overall security system. On the other hand the median is 2, which means that 30% of the employees agrees and thinks that the business organization needs to give much emphasis on the information security system of the business organization. On the other hand, it has been found that the mode is 1, 30% of the employees strongly agrees that by giving much more importance to the information security system,, the business organization can manage the operation in a better way . The value of the SD is 1.264266, as the SD is 1 there is high risk for the company in the future. According to you, how the company can improve its information system securities? The mean value is 2.46, it indicates that 26% of the employees think that the company should implement new softwares to improve the level of protection. On the other hand it has been found that the median 2, which indicates that the employees needs to give much emphasis on the software development. The value of the mode is 1, which determines 30% of the employees think that by implementing new technologies that company can easily grab the new opportunities to development the service level. Additionally, the value of the SD is 1.296935, as the SD value is more than 1, this indicates that there are some risk factors for the company in the near future. According to you what are the strategies that Woolworths should incorporate for developing the information system securities operations? The mean value is 2.7, this indicates that think the company needs to incorporate new technologies for more protection. The median value is 3, this means that 30% of the employees feels that the company should adopt new technologies to improve the management function. Additionally, the mode is 3, 30% of the employees think that the company needs to adopt new technologies, and this helps the company to grab the new opportunities. The value of the SD is 1.216385. As the value of the SD is more than 1, this indicates that there are some risks for the corporation in the near outlook. In order to overcome the risks the business association needs to incorporate effective strategies techniques within the organization, in order to maintain the flow of the operation in the organization. Conclusion After the completion of the study, this can be said that presently information security system plays the most important role for protecting the important information and the data of the business organization. In the present scenario, the main responsibility of the business organization to protect every kind of data and information from unauthorized access. The protection of the data helps the business organization to run the business in the competitive market in a different way. On the other hand, it has been found that due to the lack of technological advancement the business organization is unable to upgrade the protection level within the organization. Due to this mismanagement the business organization is unable to retain the loyal customers of the company. This is directly creating an adverse impact on the sales as well as the market share of the company. Moreover, it has been also found that the competition level has also drastically increased within the retail organizations. Almost all the business organizations are using different kinds of strategies and techniques in order to manage and operate the information system securities within the business organization. Reflective study: In the recent times, I have found that the business organizations are giving much emphasis on the information system securities programs. The operations are mainly maintained to track all the important information of the organization and the customers. Additionally, it has been found that the different business organizations run the business in their unique way and process. In the very first chapter, introduction the researcher has mainly introduced the topic. I think that it is the first and the foremost responsibility of the business organization is to manage and operate the system of the business organization in an effective way. Additionally, I have also found that the business organization uses different kinds of strategies, techniques and policies in order to operate the system to gain additional advantage in the market. I have found that the researcher has found that Woolworths is unable to implement the new advance technologies and softwares within the company due to the inefficiency of the employees. The whole scenario is somehow affecting both the sales as well as marketing share of the business organization. The unauthorized access of the third parties is creating a barrier in the whole system in the business organization. Woolworths is considered as one of the famous retail organization in Australia. I have found that there are several competitors of the company in the market. I have found that in the first chapter, the researcher has mainly discussed the research questions as well as the objectives of the study. The main objective of the research study is to analyze that how the information system securities are directly creating an adverse impact on the business operations of the company. Additionally, I have also found that the business organization does not maintain or incorporated any sort of policies and strategies to run the information system effectively in the organization. Due to this reason the company is unable to protect the authentic data and information of the organization as well as of the customers. I have found that due to the mismanagement and inefficiency of the employees, the business organization is unable to protect the information security system of the business organization. After discussing the research question s and the objectives, I found that the researcher has also mentioned the structure of the dissertation, which mainly sho wcase in which chapter the researcher has discussed. I found that the second chapter is the Literature review chapter; this chapter is considered as one of the important chapter of the dissertations. In this section, I have found that the researcher has mainly focused on the previous studies done by the other scholars in this particular topic. In this section, I have found that the companies like Tesco, Sainsbury, and Morrison has given their much emphasis on the information system securities of the business organization. Through this effective approach the business organization has gained several additional advantages in the company. The previous studies have helped the researcher to understand the topic and conduct the present study in a better way. In this section I have found that the researcher has mainly discussed the concept related to information system securities. On the other hand, the researcher also has discussed the components related to the information system securities. However, in the literature review section I have found several gaps in the study. I have found it was difficult to find out the relevant information and data for the study. Moreover, there was no such models and theories related to the study. It becomes quite difficult for the researcher to access the topic in a detailed way. In the next chapter, research methodology chapter, I have found that the researcher has mainly used different kinds of tools and techniques in order to collect authentic information and data for the study. I have found that in this chapter the researcher has used both the primary as well as the secondary sources for the study. From the primary sources the researcher has collected the information from the 50 employees of Woolworths and also has taken the interview of the two managers of the company. Additionally, for the secondary sources, the researcher has mainly collected the information from different websites, authentic journals as well as articles. As the research design, the researcher has mainly chosen, I have found that the researcher preferred to use descriptive design. This has helped the researcher to conduct the study in much more details. The next chapter is result and findings. In this section, I have found that the researcher has mainly analyzed the authentic data and the information, which the researcher has collected from the different sources. Here the researcher has mainly represent the collected data through graphical representation and tables. Additionally, I have found that the finding of the result has given a clear picture of the assessment. Moreover, here the researcher has interpreted the data in general way. However, in the next chapter, discussion and analysis, I have found that the researcher has mainly analyzed the data through mean median mode and standard deviation for better analysis. It has been found the the different graphical representation has showcased different kind of outcomes. In the very last chapter, conclusion, I have found that the researcher has mainly concluded the chapter. It has been found that presents almost all the retail business organizations of Australia, has given much emphasis on the information system security programs in order to maintain the operation and the system in a better way. Moreover, I have found that due to lack of implementation of technology and effective strategies, Woolworths is unable to protect the access of the important information and data from the third parties. It has been also found that due to this specific reason the business organization is unable to retain the large amount of customers in the market. Overall it has created a huge impact on the revue as well as the market share of the company. In order to improve the information system security management the business organization needs to incorporate proper strategies, technologies and softwares to upgrade the whole system within the organization. Reference list: Agyei-Mensah, B. K. (2016). Internal Control Information Disclosure and Corporate Governance: Evidence From an Emerging Market.Corporate Governance: The International Journal of Business in Society,16(1). Belleflamme, P., Lambert, T. (2016). An Industrial Organization Framework to Understand the Strategies of Crowdfunding Platforms$.International Perspectives on Crowdfunding: Positive, Normative and Critical Theory, 1. Besson, P., Rowe, F. (2012). Strategizing information systems-enabled organizational transformation: A transdisciplinary review and new directions.The Journal of Strategic Information Systems,21(2), 103-124. Beynon-Davies, P. (2013).Business information systems. Palgrave Macmillan. Brocke, J. V., Riedl, R., Lger, P. M. (2013). Application strategies for neuroscience in information systems design science research.Journal of Computer Information Systems,53(3), 1-13. Bruno, E., Iacoviello, G., Lazzini, A. (2016). The Adequacy of Information Systems for Supporting the Asset Quality Review Process in Banks. Evidence from an Italian Case Study. InStrengthening Information and Control Systems(pp. 59-75). Springer International Publishing. Chan, T., Sclafani, J., Dobrick, J. M., Yadlapalli, R. T., Bax, M., Fezza, D. X. (2014).U.S. Patent No. 8,738,514. Washington, DC: U.S. Patent and Trademark Office. Chang, M. K., Cheung, W., Tang, M. (2013). Building trust online: Interactions among trust building mechanisms.Information Management,50(7), 439-445. Chuang, S. H., Lin, H. N. (2013). The roles of infrastructure capability and customer orientation in enhancing customer-information quality in CRM systems: Empirical evidence from Taiwan.International Journal of Information Management,33(2), 271-281. Chung, C. S., Kim, D. (2016). Analysis on Personal Information Protection Issue of E-Government1. Deman, M., Klun, M. (2015, June). Efficiency and Usability of Information Systems: E-Recovery System in Slovenia. InProceedings of the 15th European Conference on eGovernment 2015: ECEG 2015(p. 79). Academic Conferences Limited. Wang, H. J., Li, M. (2014). A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis.Information sciences,256, 57-73. Fichman, R. G., Dos Santos, B. L., Zhiqiang (Eric) Zheng. (2014). Digital Innovation as a Fundamental and Powerful Concept in the Information Systems Curriculum.Mis Quarterly,38(2), 329-343. Galliers, R. D., Leidner, D. E. (2014).Strategic information management: challenges and strategies in managing information systems. Routledge. Gibson, D. (2014).Managing risk in information systems. Jones Bartlett Publishers. Gozman, D., Currie, W. (2015, January). Managing Governance, Risk, and Compliance for Post-crisis Regulatory Change: A Model of IS Capabilities for Financial Organizations. InSystem Sciences (HICSS), 2015 48th Hawaii International Conference on(pp. 4661-4670). IEEE. Kim, D., Solomon, M. G. (2013).Fundamentals of information systems security. Jones Bartlett Publishers. Kong, H., Jung, S., Lee, I., Yeon, S. J. (2015). Information Security and Organizational Performance: Empirical Study of Korean Securities Industry.ETRI Journal,37(2), 428-437. Kuhn, J. R., Courtney, J. F., Morris, B. (2015). A theory of complex adaptive inquiring organizations: application to continuous assurance of corporate financial information.The Knowledge Engineering Review,30(03), 265-296. Lnsiluoto, A., Jokipii, A., Eklund, T. (2016). Internal control effectivenessa clustering approach.Managerial Auditing Journal,31(1), 5-34. Lauffer, R. B. (2015).U.S. Patent No. 9,060,063. Washington, DC: U.S. Patent and Trademark Office. Li, J., Huo, M., Chao, S. (2015, September). A Study of Information Security Evaluation and Risk Assessment. In2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC)(pp. 1909-1912). IEEE. Lugmayr, A. (2013, July). Brief introduction into information systems management research in media industries. In2013 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)(pp. 1-6). IEEE. ORiain, S., Harth, A., Curry, E. (2012). Linked data driven information systems as an enabler for integrating financial data.Information Systems for Global Financial Markets: Emerging Developments and Effects, 239-270. Peffers, K., Dos Santos, B. L. (2013). Research opportunities in information technology funding and system justification.European Journal of Information Systems,22(2), 131-138. Pulwarty, R. S., Sivakumar, M. V. (2014). Information systems in a changing climate: Early warnings and drought risk management.Weather and Climate Extremes,3, 14-21. Schroeder, J. H., Shepardson, M. L. (2016). Do SOX 404 Control Audits and Management Assessments Improve Overall Internal Control System Quality?.The Accounting Review. Shin, S., Lee, Y. (2013). Business Performance Impact Caused by Display Restriction of Customer Information Identifier: Focusing on Domestic Securities Business.The Journal of Information Systems,22(4), 49-69. Sousa, K., Oz, E. (2014).Management information systems. Nelson Education. Zhang, L., Mol, A. P., He, G. (2016). Transparency and information disclosure in China's environmental governance.Current Opinion in Environmental Sustainability,18, 17-24. Taylor, S. J., Bogdan, R., DeVault, M. (2015).Introduction to qualitative research methods: A guidebook and resource. John Wiley Sons. Flick, U. (2015).Introducing research methodology: A beginner's guide to doing a research project. Sage