Wednesday, February 26, 2020

Sociological Media Analysis Coursework Example | Topics and Well Written Essays - 1000 words

Sociological Media Analysis - Coursework Example Roles are reversed to personify dogs, as though we care, and how mothers must feel to have to clean up after their babies. The cost is picking up the poo, the reward is taking the baby for a walk. We as an audience do not have to understand why they are matched. The whole series are based on such anomalies. This paper will develop the Four Stage Model and Equity Theory and show how they apply to this series. The Social Exchange Theorist use both the Four stage Model and the Equity Theory as they both depend on the relational dyad of two people, or in this case two beings which create interpersonal resources: rewards, costs, and reciprocity. The resources can be symbolic and, or material. (Thibaut & Kelley 1959). The Equity Theory of Walsfer, Walsfer and Berscheid (1978) went one step deeper to explain one on one relationships.. Rewards, Cost and an addition variable of comparison and an element of fairness. Family Guy has all the element but the joy is that the concept of normal role models does not exists. Social Exchange between two people implies that Rewards and Costs are an integral part of the relationship. Rewards are defined as an interchange of resources between the couple which bring gratification and pleasure. Costs are defined as a missed opportunity, or exchanged resources that result in a loss or punishment (Thibaut & Kelley, 1959). Maybe the popularity of this program is that the Rewards and Costs are changed as are other consequences and it doesn't matter. Outcomes equal rewards minus costs. Reciprocity is the interchange between partners. The terms Rewards, Costs and Outcomes are used in all general social exchange theories and models. Reciprocity in Family Guy shows the constant role reversal but the fact that there are true relationships. It does not matter how the dyad is created. In several shows, Peter fights with the chicken for having received an expired coupon, then he goes out to dinner with him and in the same show he starts fighting again. The 4 stage Model (Thibaut & Kelley, 1959) used rewards, costs, comparison level, and comparison level for alternatives. Thibaut and Kelley made the assumption that relationships would last based on rewards and costs if the importance of previous life experiences were brought into the relationship. On this basis, we have an easier time understanding Family Guy. Peter first feels sexually harassed by his boss. He is afraid of losing his job. These are common social fears that we all have as an audience. The popularity of the program is that it deals with day to day issues, in which touch us all. The humor comes from the constant surprises of the different role models. Peter uses previous life issues to bring into recent relationships. The concept of Comparison Level (CL) explains the level of contributions that previous experiences and expectations make to determine how satisfied an individual is with his or her interpersonal relationship. Individuals come to their relationshi ps with an awareness of societal norms for relationships and a backlog of their own experiences. The societal norms for Family Guy are normal. The CL is influenced by this information and, thus, reflects (a) what individuals feel is deserved and realistically obtainable within relationships, and (b) what individuals feel is important for them to experience within a relationship. According to exchange theorists, satisfaction with a relationship alone does not

Monday, February 10, 2020

Ifnormation security and assurance Essay Example | Topics and Well Written Essays - 1750 words

Ifnormation security and assurance - Essay Example The up to date tools and technologies provided by the information technology helped businesses to computerize and organize their business operations and consequently improve their business performance. Despite the fact that, the ideas of remote working, storage, processing and communication are not new, because in every decade we have seen a lot of developments and efforts carried out in these areas. However, at the moment we in reality see these ideas as a genuine implementation, in the form of cloud computing. Actually, the cloud services are offered by a third party. So the secret data and information of an organization are stored on the servers of that third party. In this scenario, organizations believe that there emerge a number of security issues for business organizations due to cloud computing environment. This paper discusses some of the important security issues in cloud computing. Index Terms—Cloud Computing, IaaS, SaaS, Cloud I. Introduction This paper presents a detailed analysis of cloud computing related security issues. In the past few years, the cloud computing has emerged an attractive platform which provides on-demand, reliable and expandable (as these services can be reduced or expanded depending on the organization’s needs) computing power to organizations. ... With the adoption of cloud computing the business organizations are able to get a large number of advantages such as utility computing, Virtualization, scalability, the ability to outsource data and processes, pay-per-use services and access to almost infinite computing resources (Aleem & Sprott, 2013; Dahbur et al., 2011; Hudic et al., 2013). In addition, this wide variety of affordable and consistent services have caught the attention of a large number of business organizations, which have decided to shift their business data, application or major operations of it into the cloud. In fact, the recent studies and researches conducted to determine the impact of cloud computing on business organizations show a beyond belief expansion; on behalf of more than 16% of the world software sales with a market of more than $46 billion. In fact, for the majority of business organizations cloud computing is believed to be an affordable, helpful and an appropriate choice for the reason that the a doption of cloud computing allows them to diminish the total expenditure of technology ownership. Without a doubt, cloud computing model provides a wide variety of tools and techniques to improve business productivity, however, there are certain security issues connected with the use of cloud computing. In order to take benefit of cloud computing a business organization must effectively deal with these issues (Aleem & Sprott, 2013; Dahbur et al., 2011; Hudic et al., 2013). II. Security Issues Cloud computing is an attractive information technology (IT) trend which ensures the implementation of the utility computing model broadly using Virtualization technologies. Keeping in mind the numerous advantages of cloud computing, an increasing number of business