Tuesday, December 31, 2019

The Soul of Darkness in Joseph Conrads Heart of Darkness...

Heart of Darkness: The Soul of Darkness Heart of Darkness The name itself implies a sense of unknown evil, and invokes thoughts of secrecy and mystery. Written by Joseph Conrad in 1902, Heart of Darkness tells of a physical journey down the Congo during its era of Imperialism, yet also of a mental sojourn into the core of insanity. It also paints paradoxes of seemingly clear concepts and states, such as the mental condition of central character Kurtz, an enigmatic ivory trader deep in the heart of the Dark Continent. Two of the characters provide insight into Kurtzs moral paradox. The Intended views Kurtz as an emissary of light while Marlow views Kurtz as a god of darkness. Marlow, though he only knew Kurtz†¦show more content†¦And I wasnt arguing with a lunatic either. Believe me or not, his intelligence was perfectly clear-concentrated, it is true, upon himself with horrible intensity, yet clear; but his soul was mad. Being alone in the wilderness, it had looked within itself, and...it had gone mad...he struggled with himself, too...I saw the inconceivable mystery of a soul that knew no restraint, no faith, and no fear, yet struggled blindly with itself (Conrad, 112-113). Marlow realized that it was not the mind that had been lost, but the soul. Kurtz became to Marlow, a great and terrible fallen angel, who yearned for the light even as he plunged ever deeper into the Darkness. Kurtzs Intended, on the other hand, believed her beloved to be an incorruptible man of supreme goodness and light. She recognizes the sharp intellect and bright intelligence in her lover, yet almost inexplicably fails to see the raging storm of darkness roiling close beneath the surface. She saw the well respected man, the great amassed wealth, his ambitions for ultimate greatness; like a goddess looking upon her final creation, she looked, and saw that it was good: ...his example, she whispered to herself. Men looked up to him - his goodness shown in every act(Conrad, 129). Perhaps she was as mad as her companion-to-be, though from different causes. Professor Richard Yatzeck of LawrenceShow MoreRelated Light and Dark in Heart of Darkness Essay1180 Words   |  5 PagesLight and Dark in Heart of Darkness       The brightest of lights can obscure vision while darkness can contain truths: one must not be distracted by the sheen of light, which conceals the deeper reality present in darkness. Joseph Conrads novel Heart of Darkness illustrates this idea with the use of several symbols. White Europeans are used as symbols of self-deception, and objects with an alabaster quality are symbols of barriers to inner truth. Black is the foil of white; it representsRead More An Image of Africa Essay1050 Words   |  5 PagesAn Image of Africa Heart of Darkness by Joseph Conrad has been depicted as â€Å"among the half-dozen greatest short novels in the English language.† [pg.1] Chinua Achebe believes otherwise. In Chinua Achebe’s An Image of Africa: Racism is Conrad’s Heart of Darkness he simply states that, â€Å"Joseph Conrad was a thoroughgoing racist† [pg.5] Achebe argues that the racist observed in the Heart of Darkness is expressed due to the western psychology or as Achebe states â€Å"desire,† this being to show AfricaRead MoreEssay on Feminist Theory in Heart of Darkness1199 Words   |  5 PagesMonsters in Heart of Darkness Joseph Conrad’s varying depiction of women in his novel Heart of Darkness provides feminist literary theory with ample opportunity to explore the overlying societal dictation of women’s gender roles and expectations in the late nineteenth and early twentieth century. The majority of feminist theorists claim that Conrad perpetuates patriarchal ideology, yet there are a few that argue the novel is gendered feminine. Sandra Gilbert and Susan Gubar claim â€Å"Conrad’s Heart of Darkness†¦penetratesRead MoreJoseph Conrad s Heart Of Darkness957 Words   |  4 Pages1977 focuses on the racist views woven into Joseph Conrad’s 1899 novella, Heart of Darkness. Achebe claims that Conrad uses many western stereotypes of Africa and subtly weaves them below the surface of his writing. However, due to the popularity of the novella and the skill of Conrad, his racist views go undetected. The most obvious indicator of Conrad’s racist views is the depictions of the people. They are described as â€Å"savage creatures,† yet Conrad’s novella is noted for its excellence and notRead MoreContradicting Symbolism in Joseph Conrads quot;Heart of Darknessquot;915 Words   |  4 Pages Joseph Conrad utilizes several important literary techniques throughout his story Heart of Darkness. One predominant method of his storytelling is the use of contrasting sensory imagery between black and white and altering the symbolism the colors entail. This theme is clearly prevalent when we read of Marlows childhood dreams and when comparing and contrasting the Africans, the Europeans, and the corruption of the ivory trade. Generally, Africa and Africans are described in terms ofRead More Light and Dark of Colonialism and Imperialism in Heart of Darkness1542 Words   |  7 PagesThe Light and Dark of Colonialism Exposed in Heart of Darkness       In Heart of Darkness, Joseph Conrad, challenges a dominant view by exposing the evil nature and the darkness associated with the colonialist ventures. It is expressed by Marlow as robbery with violence, aggravated murder on a great scale, and men going at it blind - as it is very proper for those who tackle a darkness. The European colonialists are portrayed as blind lightbearers, people having a faà §ade of progress and cultureRead MoreJoseph Conrad s Heart Of Darkness1488 Words   |  6 PagesJoseph Conrad’s s novel Heart of Darkness portrays an image of Africa that is dark and inhuman. Not only does he describe the actual, physical continent of Africa as â€Å"so hopeless and so dark, so impenetrable to human thought, so pitiless to human weakness†, (Conrad 154) as though the continent could neither breed nor support any true human life. Conrad lived through a time when European colonies were scattered all over the world. This phenomenon and the doctrine of co lonialism bought into at hisRead More Symbols and Symbolism in Conrads Heart of Darkness Essay789 Words   |  4 Pages Symbols and Symbolism in Conrads Heart of Darkness      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Symbolism has long been a tool of the storyteller, finding its origins in the folklore of our earliest civilizations. In more recent years, however, symbolism has taken on a new role, forming the skeleton upon which the storyteller builds the tales of his or hers thoughts and adventures. Knowing the power of this element, Joseph Conrad uses symbols to help the reader explore dark interiors of men. The symbolsRead MoreLight and Dark in Joseph Conrads Heart of Darkness Essay1735 Words   |  7 PagesLight and Dark in Heart of Darkness      Ã‚  Ã‚  Ã‚   Joseph Conrads novel, Heart of Darkness, was written to explore the soul of man. If the book is viewed only superficially, a tragic story of the African jungle is seen, but when examined closely, a deeper meaning arises. Through his narrator Marlow, Conrad uses the theme of light and dark to contrast the civilized with the savage.      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Through the individual characters, Conrad creates the division between dark and light and blackRead More The Evil of Colonialism and Imperialism in Heart of Darkness by Joseph Conrad1559 Words   |  7 PagesColonialism in Heart of Darkness   Ã‚  Ã‚   A masterpiece of twentieth-century writing, Heart of Darkness exposes the tenuous fabric that holds civilization together and the brutal horror at the center of European colonialism. Joseph Conrads novella, Heart of Darkness, describes a life-altering journey that the protagonist, Marlow, experiences in the African Congo.   The story explores the historical period of colonialism in Africa to exemplify Marlows struggles. Joseph Conrads Heart of Darkness is most

Sunday, December 22, 2019

The Recidivism Rates Throughout The United States - 849 Words

Just as the number of people in prison grows, so too does the number of people leaving prison. Research shows that 95 percent of all prisoners in the United States are released at some point (Katel 2009). The Department of Justice reports that more than 600,000 prisoners are released each year (John Oliver 2015). This means that hundreds of thousands of people reenter society and are expected to have learned from their time behind bars. Unfortunately, most of these people released back into society are not properly prepared. As a result, they end up back in prison. There are numerous studies that examine the recidivism rates in various states and in the nation. The studies come back with similar results. A Department of Justice study of recidivism in 30 states found that more than two-thirds (67.8%) of released prisoners were arrested for a new crime within three years and more than three-fourths (76.6%) were arrested within five years (DOJ Recidivism 2010). Other studies give simila r numbers, including the fact that over half (51.8%) of people released from prison end up back behind bars (Jonson and Cullen 2015). These numbers indicate serious problems with prisoner reentry into society. Some scholars go so far as to claim that the results of various studies â€Å"reveal that inmate reentry is marked by widespread failure. High proportions of released offenders have contact with the law, often soon after reentry, and about half are reincarcerated,† (Jonson and Cullen 2015).Show MoreRelatedFactors That Lead To Recidivism1353 Words   |  6 PagesResearch Question/Objective: What are some factors that lead to recidivism of female juvenile offenders? The objective to this question is to find out whether sexual abuse and environmental factors lead to recidivism amongst girl juvenile offenders. These are two factors that have not been researched enough amongst juvenile offenders and can be addressed to help guide these girls to a better path in their lives. Recidivism: Recidivism is when a convicted criminal has the tendency to reoffend. ItRead MoreHow Recidivism Is Better Than Others, And The Researcher1262 Words   |  6 Pagesquestions will be important for better understanding recidivism, why the government has difficulty in combating it, and also how to improve aftercare programs to decrease the level of recidivism. In this vein, Maltz (1984) took to the analysis of the recidivism phenomenon, reviewing different definitions of the word and relating these definitions to the evaluation of goals programs of the criminal justice system. The researcher also discuss data on recidivism, noting there are different methods for analyzingRead MoreJuvenile Delinquency And Juvenile Criminal Justice System1475 Words   |  6 PagesIntroduction: Juvenile delinquency is an ever growing issue in the United States, according to the Office of Juvenile Justice and Delinquency Prevention, â€Å"In 2012, there were 3,941 arrests for every 100,000 youths ages 10 through 17 in the United States† (OJJDP, 2014). The way juveniles are treated in the criminal justice system is very different than the way adults are. In 1899, in Cook County, Illinois, the first juvenile justice system in the country was founded. This established an alternativeRead MoreWhy Recidivism Is So Common?1306 Words   |  6 Pagesamount of people relapsing back into criminal behavior once released, which only leads them into a federal or state prison. Recidivism can be perceived into different category’s based upon the why factor. Criminal acts that result in rearrests, and reconviction or return to prison with or without new a new sentence during a three-year period following the prisoner’s release is considered recidivism. There are many di fferent reasons why a person goes back into prison once being released, whether by choiceRead MoreThe Reasons For Why Recidivism Occurs1441 Words   |  6 Pagesmember of society and not the criminal they once were. This does not occur most of the time. In fact, the exact opposite has occurred so much that there is a term for it now. That term is recidivism, which is when a person goes back to a life of crime after some sort of reform. There are many reasons for why recidivism occurs. Sometimes the people who commit a crime are just going to commit crime no matter what, that person met people in prison which helped them to commit more crime, maybe even thatRead MoreSolitary Confinement : A New Idea Of Punishment And Maintaining Order1708 Words   |  7 Pagesisolation unhealthy, but it contributes to increased recidivism rates, sometimes referred to as the revolving door phenomenon. Although solitary confinement provides the staff and general prison population with safety, there are alternatives that can be used rather than continuing the revolving door with the cruelty, expensiveness, and ineffectiveness of solitary. Solitary confinement is by no means a new concept; it has been used throughout history as a way of punishment and maintaining order.Read MoreThe Death Of The Prison1446 Words   |  6 Pagesutilize two ways to achieve their goals. One is managing the prison employees. The other is delivering services to the inmate population. So there is a specific group to work with and control the inmates. The mission of prisons has changed somewhat throughout history. â€Å"It is as follows: to protect the citizens from crime by safely and securely handling criminal offenders while providing offenders some opportunities for self-improvement and increasing the chance that they will become productive and law-abidingRead MoreDoes Incarceration Affect Recidivism?1433 Words   |  6 PagesDoes Incarceration Affect Recidivism? The United States is the world’s leader in incarceration with 2.2 million people currently in the nation’s prisons or jails. Incarceration is a widely argued topic with many understood viewpoints, and it directly deals with three main important correctional topics which are deterrence, rehabilitation, and recidivism. The definition of incarceration is the state of being confined in prison. Not only does incarceration affect people directly by taking away theirRead MoreReducing Recidivism Rate Of Juvenile Offenders1241 Words   |  5 PagesReducing Juvenile Recidivism Jessica D. Pettit The University of Texas at Tyler Abstract This paper explores the factors that contribute to the recidivism rate of juvenile offenders. Recidivism refers to a person s relapse into criminal behavior, often after the person receives sanctions or undergoes intervention for a previous crime. It explains the advantages and disadvantages that intervention programs, extracurricular activities, education and home and family life have on juvenileRead MoreSimulation Strategies For Reducing Recidivism Risk1318 Words   |  6 PagesTaxman, F. S., Pattavina, A. (2013). Simulation Strategies to Reduce Recidivism Risk Need Responsivity (RNR) Modeling for the Criminal Justice System. New York, NY: Springer New York. Currently, there is little use of evidence-based programs or best practice within correctional settings. There is some consensus that offenders’ programs do not produce expected outcomes. Valid risk and assessment tools should be used, being able to identify is an offender is open to altering their behavior. Using

Saturday, December 14, 2019

Momentum trading and Business Cycle Risk Evidence from BRIC Countries Free Essays

string(249) " investors who have quick access to information are capable of making superior abnormal returns while those who do not have quick access to information tend not to make superior risk-adjusted returns by using such information as a basis of trading\." 1. Introduction. BRIC (Brazil, Russia, India and China) countries are growing at an alarming rate. We will write a custom essay sample on Momentum trading and Business Cycle Risk: Evidence from BRIC Countries or any similar topic only for you Order Now This growth can be attributed to a number of factors including globalisation, financial liberalisation which has led to an increase in cross-border capital flows, technological developments and the internet. These countries are forecast to witness tremendous growth in the years ahead. The alarming growth of BRIC countries has attracted investors in search of suitable environments for portfolio diversification to consider BRIC countries as potential destinations for diversifying their portfolios. This paper presents a proposal to study the link between business cycles and momentum trading in the BRIC stock markets. The paper aims at understanding how business cycle risk affects momentum profits in BRIC countries. The study also seeks to provide an understanding of how momentum profits are affected by firm specific characteristics such as firm size and book-to-market ratios in BRIC countries. 2. Objectives of the study The objective of the study is to determine the impact of business cycle risk on momentum profits and thus momentum trading in BRIC countries. Research Questions The study aims at answering the following questions: Are there momentum profits in the stock markets of BRIC countries If so, what is the impact of Business Cycle risk on these profits What are the regulatory implications of momentum profits in BRIC countries Significance of the Study The study is significant to market regulators in that it will enable them design regulatory requirements aimed at reducing inefficiencies in BRIC stock markets thereby increasing their ability to attract capital. The study will also help foreign investors to gain more confidence in BRIC countries. Finally, the study will serve as a reference point for future researchers interested in conducting research on momentum profits. Limitations of the Study The study is limited only to BRIC countries. This limitation means that generalising results to other countries may not be possible. It is also limited only to a number of firms in these countries which suggests that results obtained may not be generalised to all firms. Finally, the variables employed in the study may not adequately measure momentum profits or adequately conceptualise how momentum profits are affected by business cycle variables. 5. Literature Review. A momentum trading strategy is a trading strategy that is designed based on past performance. The trading strategy is based on the assumption that â€Å"history will repeat itself†. A momentum trading strategy is therefore a strategy, which assumes that the return performance will persist in the medium term (Signos and Chelley, 1994). Momentum profits were first observed by Jegadeesh and Titman (1993). Accordingly, the study observed that stocks that performed well in a previous period also performed well in the current period, while those that performed poorly in the previous period also performed poorly in the current period. This means that a trading strategy that went long on previous winners while shorting previous losers would result in positive abnormal returns. In particular Jagadeesh and Titman (1993) observed the realisation of positive abnormal returns of 1 percent with the momentum strategy. In addition, a number of other studies have observed significant positive abnormal returns with the momentum trading strategy (e.g., Moskowitz and Grinblatt, 1999; Jegadeesh and Titman, 2001; Liu et al. (1999), Hong and Tonks, 2003; Gregory et al., 2001; Griffin et al., 2003; Gregory et al. 2001; Rouwenhorst 1998). The implication of the existence of such a Band Wagon (money making strategy) is that markets were not efficient. According to the weak- and semi-strong form efficient market hypotheses, all information available to the general public is already reflected in stock prices. This means that investors cannot realise superior risk adjusted returns by adopting a particular trading strategy such as the one proposed by momentum trading (Ross et al., 1999; Bodie et al., 2007). Attempts to attribute this finding to inefficient markets have been opposed by Fama and French (1993, 1995, 1996) who argued that observing momentum profits cannot be attributed to inefficient capital markets. Rather the single factor capital asset pricing model (CAPM) has been criticised for not being able to properly explain the variability of the cross-section of stock returns. This model suggests that stock market returns depend on a single factor (i.e., the return on the market portfolio). However, Fama and French (1993, 1995, 1996) contest this view and argue instead that stock returns could be explained by additional factors such as the book-to-market ratio and firm size. A three factor model is therefore proposed which takes into account the impact of size and book-to-market ratio and is found to perform better than the single factor CAPM (Fama and French, 1993, 1995, 1996). In addition, the three factor model was extended to a four-factor model to include a momentum factor w hich measures the difference between the return on portfolios of stocks that performed well in the previous period and the return on portfolios of stocks that performed poorly. Including a momentum factor in the three-factor model thus making it a four-factor model enabled the model to be able to explain the momentum profits observed in Jagadeesh and Titman (1993) and the other studies identified in the Literature. In summary, Fama and French argue that anomalies such as those observed in momentum trading cannot be attributed to inefficiencies in capital markets. Rather they should be attributed to inadequacies in the models that are used in explaining the cross-section of stock returns. Other explanations have been offered for the observation of momentum profits. According to behavioural finance theorist, momentum profits are a result of slow movement of information. Behavioural finance theorists are against market efficiency theorists who argue that information is rapidly reflected in stock prices. Among behavioural theorists, Hong and Stein (1999) argue that momentum profits can be attributed to slow diffusion of information across interested investors. This means that some investors receive information about stock prices earlier than others and as such appropriate action faster than others. By so doing, investors who have quick access to information are capable of making superior abnormal returns while those who do not have quick access to information tend not to make superior risk-adjusted returns by using such information as a basis of trading. You read "Momentum trading and Business Cycle Risk: Evidence from BRIC Countries" in category "Essay examples" Barberi s et al. (1998) argues that momentum profits can be attributed to overreaction or underreaction of stock prices to news. The explanation from behavioural theorists conflict with those of Fama and French because behavioural theorists also suggest that there is nothing like an efficient market. Given the conflict between behavioural theorists and proponents of market efficiency, alternative explanations have been provided by recent studies. These studies argue that momentum profits are influenced by business cycle variables (e.g., Antoniou et al., 2007; Liew and Vassalou, 1999). Contrary to this view Griffen et al. (2002) in a study examining the link between business cycle variables and momentum profits across many countries argue that momentum profits are not a function of business cycle variables. While many studies have investigated the relationship between business cycle variables, most of these studies focus on developed markets with very little attention paid to emerging markets such as those of BRIC countries. Given the increasing role that BRIC countries play in the global economy, it is important to understand whether there are momentum profits in these countries as well as the role that business cycle risk has on momentum profits. This study is therefore a positive step toward contributing to the literature on momentum profits and business cycle risk by extending previous studies to stock markets in BRIC countries. 6. Research Methods This study will employ an econometric model to study the relationship between momentum profits and three sets of variables: (i) business cycle variables; (ii) firm specific variables (iii); and behavioural finance variables. The relationship between momentum profits and these variables can be represented using the following econometric model: (1) Where is a measure of the momentum profit of country i at in year t; is a vector of firm specific variables; is a vector of the past cumulative raw returns; and are the sensitivities of the momentum profits to changes in firm-specific variables and past cumulative returns respectively. The magnitude of the effect of these variables will be determined by testing the significance of the parameters at the 5% level of significance. In order to study business cycle variables, a model was developed by Chordia and Shivakumar (2002) and later extended by Antoniou et al. (2007). The model is an econometric model which establishes the relationship between momentum profits and business cycle variables. The model can be stated as follows: (2) Where is the return (inclusive of dividends) of firm i in month t, BC is a vector of j (j=1-6) macroeconomic variables representing business cycle variables (DY, Rf, TERM, DEF, FX, and GDP), and is the error term of stock i in month t. DY is the dividend yield; Rf is the risk-free interest rate; DEF is the premium for default risk premium which is estimated as the difference between the yield on long-term corporate bonds and the yield on long-term government bonds; The term spread (TERM) is the difference between the yield on long-term government securities minus the yield on short-term government securities; FX is the foreign exchange rate; and GDP is the change in GDP (Antoniou et al., 2007). As earlier mentioned, stock returns depend on two factors: market factors and firm-specific factors. There is a trade-off relationship between the manner in which each group of factors affect stock returns. That is the higher the impact of firm-specific factors, the lower will be the impact of market factors and vice versa (Antoniou et al., 2007). To estimate equation (1) equations 3 has to be estimated and its parameters used as inputs to equation (2). After estimating equation (2) its parameters can then be used as inputs to equation (1). In this study, both time-series and cross-sectional regressions are used. Cross-sectional regressions are preferred over time series regressions because they help to avoid data-snooping biases which tend to occur in time-series regressions. In the time-series regressions, individual stocks are used which help to reduce the degree of loss of information that tends to occur when portfolios are used. Using first-pass time series regression, which allows the parameters to also fluctuate with firm-specific variables. The firm-specific factors include firm size and book-to-market ratio. The first-pass time-series regression can be stated as follows: (3) is the return on firm i at time t, BC is a the vector of business cycle risk variables identified earlier, FF (Fama and French factors) are the firm-specific variables. Once equation (3) has been estimated, the parameters will be used as inputs to the second pass regression equation (4) below: (4) Where is the output of equation (3). It is the unexplained variation from equation (3). These include the intercept coefficient and the residual term (+) of the regression equation (3); is a vector of firm characteristics, which include firm size and book-to-market ratio for security i at time t. represent the three sets of past cumulative raw returns (for m=1-3) over the second through third (RET 2-3), fourth through sixth (RET 4-6) and seventh through twelfth (RET 7-12) months prior to the current month t. (Antoniou et al. 2007). 6. Data Stock price data for stocks in the BRIC countries will be retrieved from the Thomson Financial Datastream Database. Data on dividend yields will also be retrieved from this database. The database also reports data on exchange rates. GDP, interest rate and exchange rate data will be retrieved from the IMF International Financial Statistics (IFS) database. Stock price data will be used to calculate the monthly return for each stock over the 60 monthly holding periods from January 2007 to December 2011. The returns will be used as inputs to the first-pass regression. Given that this study is based on quantitative models that have been applied in other studies, there would be no need for pilot testing. Conclusion This paper was aimed at providing a research proposal to study how momentum trading is affected by business cycle variables. The proposal began by providing a general background on the topic. It later focused on the literature review, methodology and data description. The study will apply quantitative analysis to quantitative data from BRIC countries. The findings will provide a better understanding of momentum trading in BRIC countries and help policy formulation on how markets can become more efficient in these markets so as to enable investors make invest with greater confidence. References Antoniou A., Lam H. Y.T., Paudyal K. (2007). Profitability of momentum strategies in international markets: The role of business cycle variables and behavioural biases. Journal of Banking Finance volume 31, issue 3, pp. 955-972. Barberis N., Shleifer A., Vishny R.W.(1998). A model of investor sentiment, Journal of Financial Economics 49, pp. 307–343. Chelley-Steeley, Patricia and Siganos, Antonios, (2004). â€Å"Momentum Profits in Alternative Stock Market Structures†. Available at SSRN: http://ssrn.com/abstract=624583 Fama E.F., French K.R. (1996). Multifactor explanations of asset pricing anomalies, Journal of Finance 51 (1996), pp. 55–84. Griffin, John M., Martin, J. Spencer and Ji, Susan, â€Å"Momentum Investing and Business Cycle Risk: Evidence from Pole to Pole† (March 18, 2002). AFA 2003 Washington, DC Meetings; EFA 2002 Berlin Meetings Presented Paper. Available at SSRN: http://ssrn.com/abstract=291225 or DOI: 10.2139/ssrn.291225 Hong H., Stein J.C. (1999). A Unified Theory of Undereaction, Momentum Trading, and Overreaction in Asset Markets. Journal of Finance. Vol. 6, pp 2143-2184 Jegadeesh N., Titman S. (1998). Returns to buying winners and selling losers: Implications for market efficiency, Journal of Finance 48, pp. 65–91. Liew, Jimmy K.yung Soo and Vassalou, Maria, (1999). â€Å"Can Book-to-Market, Size, and Momentum Be Risk Factors That Predict Economic Growth?† Available at SSRN: http://ssrn.com/abstract=159293 or DOI: 10.2139/ssrn.159293 Rouwenhorst, K.G. (1998). International momentum strategies, Journal of Finance 53, pp. 267–284. Wu, X. (2002). A conditional multifactor analysis of return momentum, Journal of Banking and Finance 26 (2002), pp. 1675–1696 How to cite Momentum trading and Business Cycle Risk: Evidence from BRIC Countries, Essay examples Momentum trading and Business Cycle Risk Evidence from BRIC Countries Free Essays string(57) " suggest that there is nothing like an efficient market\." 1. Introduction. BRIC (Brazil, Russia, India and China) countries are growing at an alarming rate. We will write a custom essay sample on Momentum trading and Business Cycle Risk: Evidence from BRIC Countries or any similar topic only for you Order Now This growth can be attributed to a number of factors including globalisation, financial liberalisation which has led to an increase in cross-border capital flows, technological developments and the internet. These countries are forecast to witness tremendous growth in the years ahead. The alarming growth of BRIC countries has attracted investors in search of suitable environments for portfolio diversification to consider BRIC countries as potential destinations for diversifying their portfolios. This paper presents a proposal to study the link between business cycles and momentum trading in the BRIC stock markets. The paper aims at understanding how business cycle risk affects momentum profits in BRIC countries. The study also seeks to provide an understanding of how momentum profits are affected by firm specific characteristics such as firm size and book-to-market ratios in BRIC countries. 2. Objectives of the study The objective of the study is to determine the impact of business cycle risk on momentum profits and thus momentum trading in BRIC countries. Research Questions The study aims at answering the following questions: Are there momentum profits in the stock markets of BRIC countries If so, what is the impact of Business Cycle risk on these profits What are the regulatory implications of momentum profits in BRIC countries Significance of the Study The study is significant to market regulators in that it will enable them design regulatory requirements aimed at reducing inefficiencies in BRIC stock markets thereby increasing their ability to attract capital. The study will also help foreign investors to gain more confidence in BRIC countries. Finally, the study will serve as a reference point for future researchers interested in conducting research on momentum profits. 5. Literature Review. A momentum trading strategy is a trading strategy that is designed based on past performance. The trading strategy is based on the assumption that â€Å"history will repeat itself†. A momentum trading strategy is therefore a strategy, which assumes that the return performance will persist in the medium term (Signos and Chelley, 1994). Momentum profits were first observed by Jegadeesh and Titman (1993). Accordingly, the study observed that stocks that performed well in a previous period also performed well in the current period, while those that performed poorly in the previous period also performed poorly in the current period. This means that a trading strategy that went long on previous winners while shorting previous losers would result in positive abnormal returns. In particular Jagadeesh and Titman (1993) observed the realisation of positive abnormal returns of 1 percent with the momentum strategy. In addition, a number of other studies have observed significant positive abnormal returns with the momentum trading strategy (e.g., Moskowitz and Grinblatt, 1999; Jegadeesh and Titman, 2001; Liu et al. (1999), Hong and Tonks, 2003; Gregory et al., 2001; Griffin et al., 2003; Gregory et al. 2001; Rouwenhorst 1998). The implication of the existence of such a Band Wagon (money making strategy) is that markets were not efficient. According to the weak- and semi-strong form efficient market hypotheses, all information available to the general public is already reflected in stock prices. This means that investors cannot realise superior risk adjusted returns by adopting a particular trading strategy such as the one proposed by momentum trading (Ross et al., 1999; Bodie et al., 2007). Attempts to attribute this finding to inefficient markets have been opposed by Fama and French (1993, 1995, 1996) who argued that observing momentum profits cannot be attributed to inefficient capital markets. Rather the single factor capital asset pricing model (CAPM) has been criticised for not being able to properly explain the variability of the cross-section of stock returns. This model suggests that stock market returns depend on a single factor (i.e., the return on the market portfolio). However, Fama and French (1993, 1995, 1996) contest this view and argue instead that stock returns could be explained by additional factors such as the book-to-market ratio and firm size. A three factor model is therefore proposed which takes into account the impact of size and book-to-market ratio and is found to perform better than the single factor CAPM (Fama and French, 1993, 1995, 1996). In addition, the three factor model was extended to a four-factor model to include a momentum factor w hich measures the difference between the return on portfolios of stocks that performed well in the previous period and the return on portfolios of stocks that performed poorly. Including a momentum factor in the three-factor model thus making it a four-factor model enabled the model to be able to explain the momentum profits observed in Jagadeesh and Titman (1993) and the other studies identified in the Literature. In summary, Fama and French argue that anomalies such as those observed in momentum trading cannot be attributed to inefficiencies in capital markets. Rather they should be attributed to inadequacies in the models that are used in explaining the cross-section of stock returns. Other explanations have been offered for the observation of momentum profits. According to behavioural finance theorist, momentum profits are a result of slow movement of information. Behavioural finance theorists are against market efficiency theorists who argue that information is rapidly reflected in stock prices. Among behavioural theorists, Hong and Stein (1999) argue that momentum profits can be attributed to slow diffusion of information across interested investors. This means that some investors receive information about stock prices earlier than others and as such appropriate action faster than others. By so doing, investors who have quick access to information are capable of making superior abnormal returns while those who do not have quick access to information tend not to make superior risk-adjusted returns by using such information as a basis of trading. Barberis et al. (1998) argues that momentum profits can be attributed to overreaction or underreaction of stock prices to news. The explanation from behavioural theorists conflict with those of Fama and French because behavioural theorists also suggest that there is nothing like an efficient market. You read "Momentum trading and Business Cycle Risk: Evidence from BRIC Countries" in category "Essay examples" Given the conflict between behavioural theorists and proponents of market efficiency, alternative explanations have been provided by recent studies. These studies argue that momentum profits are influenced by business cycle variables (e.g., Antoniou et al., 2007; Liew and Vassalou, 1999). Contrary to this view Griffen et al. (2002) in a study examining the link between business cycle variables and momentum profits across many countries argue that momentum profits are not a function of business cycle variables. While many studies have investigated the relationship between business cycle variables, most of these studies focus on developed markets with very little attention paid to emerging markets such as those of BRIC countries. Given the increasing role that BRIC countries play in the global economy, it is important to understand whether there are momentum profits in these countries as well as the role that business cycle risk has on momentum profits. This study is therefore a positive step toward contributing to the literature on momentum profits and business cycle risk by extending previous studies to stock markets in BRIC countries. 5. Research Methods This study will employ an econometric model to study the relationship between momentum profits and three sets of variables: (i) business cycle variables; (ii) firm specific variables (iii); and behavioural finance variables. The relationship between momentum profits and these variables can be represented using the following econometric model: (1) Where is a measure of the momentum profit of country i at in year t; is a vector of firm specific variables; is a vector of the past cumulative raw returns; and are the sensitivities of the momentum profits to changes in firm-specific variables and past cumulative returns respectively. The magnitude of the effect of these variables will be determined by testing the significance of the parameters at the 5% level of significance. In order to study business cycle variables, a model was developed by Chordia and Shivakumar (2002) and later extended by Antoniou et al. (2007). The model is an econometric model which establishes the relationship between momentum profits and business cycle variables. The model can be stated as follows: Where is the return (inclusive of dividends) of firm i in month t, BC is a vector of j (j=1-6) macroeconomic variables representing business cycle variables (DY, Rf, TERM, DEF, FX, and GDP), and is the error term of stock i in month t. DY is the dividend yield; Rf is the risk-free interest rate; DEF is the premium for default risk premium which is estimated as the difference between the yield on long-term corporate bonds and the yield on long-term government bonds; The term spread (TERM) is the difference between the yield on long-term government securities minus the yield on short-term government securities; FX is the foreign exchange rate; and GDP is the change in GDP (Antoniou et al., 2007). As earlier mentioned, stock returns depend on two factors: market factors and firm-specific factors. There is a trade-off relationship between the manner in which each group of factors affect stock returns. That is the higher the impact of firm-specific factors, the lower will be the impact of market factors and vice versa (Antoniou et al., 2007). To estimate equation (1) equations 3 has to be estimated and its parameters used as inputs to equation (2). After estimating equation (2) its parameters can then be used as inputs to equation (1). In this study, both time-series and cross-sectional regressions are used. Cross-sectional regressions are preferred over time series regressions because they help to avoid data-snooping biases which tend to occur in time-series regressions. In the time-series regressions, individual stocks are used which help to reduce the degree of loss of information that tends to occur when portfolios are used. Using first-pass time series regression, which allows the parameters to also fluctuate with firm-specific variables. The firm-specific factors include firm size and book-to-market ratio. The first-pass time-series regression can be stated as follows; is the return on firm i at time t, BC is a the vector of business cycle risk variables identified earlier, FF (Fama and French factors) are the firm-specific variables. Once equation (3) has been estimated, the parameters will be used as inputs to the second pass regression equation (4) below: Where is the output of equation (3). It is the unexplained variation from equation (3). These include the intercept coefficient and the residual term (+) of the regression equation (3); is a vector of firm characteristics, which include firm size and book-to-market ratio for security i at time t. represent the three sets of past cumulative raw returns (for m=1-3) over the second through third (RET 2-3), fourth through sixth (RET 4-6) and seventh through twelfth (RET 7-12) months prior to the current month t. (Antoniou et al. 2007). 6. Data Stock price data for stocks in the BRIC countries will be retrieved from the Thomson Financial Datastream Database. Data on dividend yields will also be retrieved from this database. The database also reports data on exchange rates. GDP, interest rate and exchange rate data will be retrieved from the IMF International Financial Statistics (IFS) database. Stock price data will be used to calculate the monthly return for each stock over the 60 monthly holding periods from January 2007 to December 2011. The returns will be used as inputs to the first-pass regression. References Griffin, John M., Martin, J. Spencer and Ji, Susan, â€Å"Momentum Investing and Business Cycle Risk: Evidence from Pole to Pole† (March 18, 2002). AFA 2003 Washington, DC Meetings; EFA 2002 Berlin Meetings Presented Paper. Available at SSRN: http://ssrn.com/abstract=291225 or DOI: 10.2139/ssrn.291225 Antoniou A., Lam H. Y.T., Paudyal K. (2007). Profitability of momentum strategies in international markets: The role of business cycle variables and behavioural biases. Journal of Banking Finance volume 31, issue 3, pp. 955-972. Liew, Jimmy K.yung Soo and Vassalou, Maria, (1999). â€Å"Can Book-to-Market, Size, and Momentum Be Risk Factors That Predict Economic Growth?† Available at SSRN: http://ssrn.com/abstract=159293 or DOI: 10.2139/ssrn.159293 Rouwenhorst, K.G. (1998). International momentum strategies, Journal of Finance 53, pp. 267–284. Wu, X. (2002). A conditional multifactor analysis of return momentum, Journal of Banking and Finance 26 (2002), pp. 1675–1696 Jegadeesh N., Titman S. (1998). Returns to buying winners and selling losers: Implications for market efficiency, Journal of Finance 48, pp. 65–91. Barberis N., Shleifer A., Vishny R.W.(1998). A model of investor sentiment, Journal of Financial Economics 49, pp. 307–343. Fama E.F., French K.R. (1996). Multifactor explanations of asset pricing anomalies, Journal of Finance 51 (1996), pp. 55–84. Hong H., Stein J.C. (1999). A Unified Theory of Undereaction, Momentum Trading, and Overreaction in Asset Markets. Journal of Finance. Vol. 6, pp 2143-2184 Chelley-Steeley, Patricia and Siganos, Antonios, (2004). â€Å"Momentum Profits in Alternative Stock Market Structures†. Available at SSRN: http://ssrn.com/abstract=624583 How to cite Momentum trading and Business Cycle Risk: Evidence from BRIC Countries, Essay examples

Friday, December 6, 2019

Emergency Management And Homeland Security â€Myassignmenthelp.Com

Question: Discuss About The Emergency Management And Homeland Security? Answer: Introduction The aim of this report is to provide guidance to the A4A organization considering the processing and storage of data that is about to store in the information systems. The scope of this report is to provide a security risk management approach for the organization to the integrity, confidentiality, and availability of information that are being stored in the information systems of the organization. A4A is Non-Governmental Organization that is about to transform its existing system into the information system that means various data and information are about to be uploaded into the database. This will be vast transformation that will include outsourcing of the systems for other organizations and for larger space, they will need cloud storage that could result in various security issues related to the organizational operational activities and all the data related to the employees that are looking forward to join the organization. This report focuses on the guidelines that could help in achieving information security in better and efficient way for the data and information related to the organization. Risk assessment process have several step and these steps have been explained in the below report. Applicable Policy The policy for security of information by the Australian Government policy has been promulgated through the ISM and the PSPF. Several requirements those are mandatory within the PSPF that can be helpful to relate the handling of A4A information (Sylves 2014). A4A can only be able to achieve effective information security for the information that is about to save in the system regarding its members and operational activities. This can only be achieved if it becomes the part of the culture, operation and practices plans of the A4A. This implies that the A4A should not build protective security as an afterthought rather it should build it into the governance processes. The organization should proactively mitigate and manage the identified security risks at its early stages that are associated with the information storage system. Australian Privacy Law Set of thirteen APPs (Australian Privacy Principles) has been included within the Privacy Act 1988 (Cth) that can be helpful in regulating the handling of personal information by the A4A (Arregui, Maynard and Ahmad 2016). The information those have been remarked as personal should be determined by the A4A and handling of these information should be done according to the principles of the APPs. Privacy Legislation The pieces of legislations that are applicable to this policy can be listed as: Firstly, Freedom of Information Act 1982, secondly, Privacy Act 1988 and Archives Act 1983 (Zetler 2015). Risk Assessment Framework This can be stated as the set of guidelines for the risk assessment process on the basis of existing frameworks that is being defined in the Australian Standards AS/NZS ISO 31000:2009 Risk management that includes HB 167:2006 Security Risk Management, and guidelines and principles. Risk assessment can be referred as the subjective process and A4A should ensure that the defined process is justifiable, documented, and transparent (Saint-Germain 2015). It is the best option for many objectives like firstly, identifying the level of risk tolerance, secondly, identifying the specific risks to the employees, assets, and information that are being stored in the system. Third benefit is that identifying the appropriate protection in order to mitigate the risks that have been identified previously. Applying ISO 31000 The process of risk assessment process should be consistent within the existing standards. In order to successfully manage the risk assessment, the whole process can be sub-divided into five key points that can be stated as (Draper and Ritchie 2014): Establishment of the Context: This step states to define the external and internal influences that can have impact on the implementation of the arrangement directly or indirectly. Identification of the Risks: Developing a robust list of the identified risks, this might have the capability to affect the success in implementing this arrangement. Assessment of the identified Risks: After the first two steps it states to analysing the list of identified risks in contrast with the organisations likelihood, impact, and the tolerances. Selection of Proper Treatments: This step includes choosing risk assessing strategies that are appropriate for A4A including the controls for those identified risks. Development of overall Risk Assessment: This is the last and final step that includes summarization of the output of identified risks in accordance with the mitigating measures or control into all the categorized risks. Control risks Evaluate Risks Analyze risk Identify risk Established Context Consultation and communication Monitor and Review Figure 1: Risk Assessment Process (Source: Created by Author) Establish the Context The assessment process that is going to be implemented with the system of A4A must address the security, organizational and strategic risk management contexts in order to eliminate all the existing risks. All facets of the functions or activities of the organization will be covered by the security risk assessment (Whittman and Mattord 2013). For a successful risk management system it is necessary that the risk management is appropriate to be prevailing and emerging risk environment. Establishment of the context is a very critical objective as it provides a platform on which all the respective activities of the risk assessment are being conducted. How to Determine A4A Context Internal environment in which the organization is willing in order to achieve its goals can be stated as the context of the A4A. Following are the objectives that can be included in this topic: A4A Organizational structure, governance, accountabilities or responsibilities, and roles. Extent and nature of the contractual relationships (Wensveen 2016). Culture of the A4A including its security culture Policies and objectives including the strategies that are being made to achieve them. Perception, values of, and relationships with the internal stakeholders Models, guidelines, and standards that are being adopted by the organisation Lastly, information flows, decision making processes, and information systems The Strategic Context of Outsourcing A4A must consider the aspects of the strategic contexts that are relevant according to the situation that will be the factors which will be implemented in the risk assessment management process. These include, firstly, relevant Australian regulation, policy, and legislation considering the facts that are responsible for safeguarding the information related to the operational activities of the A4A (Peppard and Ward 2016). Secondly, it includes potential jurisdictional and foreign laws access to information, and third objective that is being included in this is the potential benefits of off shoring or outsourcing arrangements that is being arranged to manage the systems that needs to be installed. Identifying Risk Identifying risk can be used in manner to comprehensively determine the sources of risk that are applicable and the events that have potential to impact the business of A4A organization. There should be full description on the issues that is being identified in manner to make the decision makers completely understand the facts that is all about. A4A risk management team should determine the risks that are related to the availability, integrity, and the confidentiality of the types of data that is being saved in the information system considering the personal information of the employees and the operational data or information (Webet al. 2014). As mentioned in the AS/NZS 4360:2004 risks can be defined as The chance of something happening that will have an impact on the objectives. How to Determine Agency Risk Tolerance Intolerable risk Scope for A4A Tolerable risk Increasing risk Figure 2: Risk Tolerance (Source: Created by author) This determination can be made during the Establishing the context phase during the risk assessment processes. Risk tolerance is completely dependent on the organizational context of the A4A and Heads of the A4A. Tolerance level can be stated as the sum of risk appetite of A4A. The risk tolerance will be based on the the principle of managing risk to the reasonably practicable low level, while it still allows the scope for the innovation and flexibility in business practices. Boyens et al. (2014) stated that it can be affected or changed changing the evaluation criteria, which implies that appetite risk of the head of the A4A for the risk can be variable that can depends upon: Firstly, prevailing community and political expectations and sensitivities. Secondly, incident security nature such as hacking terrorist attack etc., thirdly, emergence or existence of security trends such as cyber-attacks, data breaches, trusted insider etc. Another factors may be business or strategic priorit ies, ability of the government, individual or the organization to compensate losses and lastly but not least availability of the resources for treatment. Questions To Consider When Determining Risks within Cloud Context In order to establishing context in a risk management it is very necessary to understand the nature of the vulnerabilities, criticality, and potential or relevant threat. The questionnaire that can be included in this section in order to facilitate it can be listed as (Rebello et al. 2015): The aggregated value of the information holdings to the A4A How the integrity, availability, and confidentiality of A4A will be affected What would be the look of an unintended disclosure? What would be the look of an event or incident How outsourcing might affect the information of the A4A including the sources of risks and related threats How much impact on losing information can affect the A4A A4A can take into account the individual security plans while searching for the information that are related to the risk identification process due to the existing presence of information on security of the information. Potential Threats When Outsourcing Information Data Loss: There may be the permanent deletion or loss of data, which could be a result of malicious activity or by any accident. Data Breaches: The information those are very sensitive for the organization could be leaked or stolen or might be manipulated by an unauthorized user (Peltier 2016). Service traffic or Account Hijacking: this another potential threat that might lead the external entities eavesdropping on the operational activities such as manipulating data, transactions, through phishing, fraud, and return falsified information. DOS (Denial of service): this threat or attack can block the user from accessing their application or data that will affect the organization and its consumers too. API (Application Programming Interface) and Interfaces Insecure: In manner to circumvent the security processes, vulnerable interfaces may be exploited maliciously and accidentally both. Malicious Insider: The insider formal stakeholders like contractor, former employee, or any of the other business partners can be threat who had or has the access authority to the network of the A4A organization (Dhillong, Syed and Sa-Soares 2017). This access authority can be misused for personal gain or profit by impacting negatively to the organization. Insufficient Due Diligence: Implementing cloud services into the system of the A4A without considering the scope of undertaking the vulnerabilities and weaknesses of this implementation. Shared Technology Vulnerabilities: Cloud infrastructure such as GPU, CPU caches etc. are vulnerable to scalable sharing practices if there is not any design established for the multi-tenant architecture. Mapping Risks In order to completely understand the impact of the risks that are identified, there should be proper emphasis on the vulnerabilities or causes that the identified risks possibly cause to the organization. In order to inform the risk assessment, it is essential to gauge the likelihood and the consequences of the risk events. Mapping risks will help in dividing the risks into categories according to their priority, which can be helpful in guiding the source allocation in order o mitigate the identified risks (Beckers et al. 2013). Various objectives are considerable during the mapping risks system those can be stated as: the sectors where there is the impact of the risks, the frequency of risk happen, outcome of the risk eventuating, the individuals that will be affected by the occurrence of the risk event and lastly, the stakeholders that are involved in the risk assessment including the impact of these risks on the stakeholders and many more. Assessing Risk After the relevant identification of the risks the assessment process can be used for the determination of the level of risks. There should be holistic evaluation of the likelihood of the risk that might occurred, acceptable level of the tolerances that can be presented by the graph mentioned in the figure 2, and the consequences of the identified risk events (Oppliger, Pernul and Katsikas 2017). In manner to address the consequences and likelihood levels there should be proper consideration on the effectiveness control and the sources of risk events. Risk assessment includes the level of control and oversight organizations have on the management of their information. For better explanation an example can be that the A4A confidential information related to the employee and the operational activities can be assessed in the relation to the integrity, availability, and the confidentiality including the aggregation (Soomro, Shah and Ahmed 2016). The risk assessment should be assessed on the basis of the potential impact of the risks for the A4A for the sectors mentioned above including all the stakeholders that might be affected due to these risks. Guidance on Determining Potential Consequences This step is completely dependent on the profile of the information that is about to store in the information system of the A4A. Information related to the donors, employees sensitive information such as bank account number, social security number and many more, all the transactional informational and much other information are about o store in the information system of the A4A (Albakri et al. 2014). The expose of such information could relate to the privacy and security issue of the individuals that are related to the A4A. Evaluating the Risks Evaluation of the risks related o the unintended expose of information about the operational activities and the data about the employees involves the consideration of the risks within the context of the potential treatment and A4As risk tolerance options (Yang, Shieh and Tzeng 2013). In many of the circumstances the unauthorized expose or access of the information that is being stored in the system might be quantified almost the whole in financial terms on the basis of revenue loss that results it in a matter of financial calculation. However, for these circumstances, A4A can consider a wide range of factors that includes the impact on the reputation of the organization due to the expose of this sensitive information that includes loss of data related to the employees and organizational operational activities (Feng, Weng and Li 2014). These objectives results in the complexity for calculating the risks level and the acceptance resides with the head of the organization How to Consider Potential Risk Treatment Options The risks related to the security of the organization cannot be eliminated completely but it can be minimized to an extent level as the security cannot be absolute. Thus the aim should be provided in tolerating the threats that includes firstly, for the identified risks rating level while making selections for the risk treatments for the systems that are being introduced for the storage of information should be conducted proportionally (Raghupati and Raghupati 2014). This could be divided into six step processes where A4A: firstly, prioritise the intolerable risks, secondly, establishment of the treatment options, thirdly, identification and development of treatment options, fourth, Evaluating the treatment options, fifth, detailing the review and design the selected options also considering the management of residual risks, sixth, communication and implementation. Communication and Consultation There should be a consultation and communication plan management that should be established at very early stage during the risk assessment in order to determine the processes that will be informed or communicated to the stakeholders including external and internal stakeholders (Itradat et al. 2014). Proper and effective communication and consultation during the process of the risk assessment can be helpful in ensuring the facts that are responsible or the successful implementation of the risk assessment process and that are responsible with a stake in the process through understandings that will implies that what decision is need to be made in order to successfully assess the identified risks and enhance the performance of the organization. The risk that could potentially affect the organization should be well communicated during the process of the risk assessment, particularly if it is related to the employees of the A4A. The perception of the stakeholders is also very important whi le communicating about the identified risks during the process of risk management. Risk Monitoring and Review This is also one of the important guidelines for risk management processes for the information security. Following are the considerable facts that could be included in this process: Does transforming manual system into technology based operation have a continuous program or not and the cloud vendors have it or not (Layton 2016). The controls and their strategy of implementation can play an effective role or not such as tokenization and encrypting the files before saving into the cloud or database. The controls or the processes that are being introduced are cost effective and efficient or not that means considering other facts that might be applicable to reduce the threat. The introduced controls and changes complying with the legal requirements or not (Baskerville, Spangnoletti, and Kim 2014). For example Cloud solution meets the legislative requirements of Australia. Documenting the Risk Assessment and Risk Treatment At the final stage the A4A management should document all the considerable, acceptable, and calculated that can be associated with the security risks in the arrangements that is about to change within the organization (Haufe, Dzombeta and Brandis 2014). Approval Process The delegates and the heads of the organization need to consider the risk assessment before transforming the whole system into technological way. Ultimately this implies that the head of the A4A will also be responsible for managing risk into the organization, and the acceptance and understanding of the risks manifested through transformation, outsourcing, and cloud integration within the system (Luthra et al. 2014). Conclusion Based on above report it can be concluded that there should be proper management process in order to enhance the information security system within an organization. The guidelines that have stated above can play very important role in managing the information and data those are being stored into the system and keep it well secured and protected from unauthorized user that could lead to serious damage through exposing, manipulating or deleting the saved data. Cybercrimes can be considered as the most important issue regarding the information security and these guidelines can prevent the organization from being looted by such intruders and protect the assets of the organization. Other than the above guidelines it can be recommended that the security levels should be divided into the categories based on the level of authorization or posts. This could help in two ways the higher post individual will be able to monitor the individuals those are at lower post and the confidential informati on will be much safer. Through the guidelines mentioned above, A4A can achieve the highest level of security for the information related to the organization and be safer from any loss. References: Albakri, S.H., Shanmugam, B., Samy, G.N., Idris, N.B. and Ahmed, A., 2014. Security risk assessment framework for cloud computing environments.Security and Communication Networks,7(11), pp.2114-2124. Arregui, D.A., Maynard, S.B. and Ahmad, A., 2016. Mitigating BYOD Information Security Risks. Baskerville, R., Spagnoletti, P. and Kim, J., 2014. Incident-centered information security: Managing a strategic balance between prevention and response.Information Management,51(1), pp.138-151. Beckers, K., Ct, I., Fabender, S., Heisel, M. and Hofbauer, S., 2013. A pattern-based method for establishing a cloud-specific information security management system.Requirements Engineering,18(4), pp.343-395. Boyens, J., Paulsen, C., Moorthy, R., Bartol, N. and Shankles, S.A., 2014. Supply chain risk management practices for federal information systems and organizations.NIST Special Publication,800(161), p.1. Dhillon, G., Syed, R. and de S-Soares, F., 2017. Information security concerns in IT outsourcing: Identifying (in) congruence between clients and vendors.Information Management,54(4), pp.452-464. Draper, R. and Ritchie, J., 2014. Principles of security management: Applying the lessons from crime prevention science.Professional Practice in Crime Prevention and Security Management, p.91. Feng, N., Wang, H.J. and Li, M., 2014. A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis.Information sciences,256, pp.57-73. Haufe, K., Dzombeta, S. and Brandis, K., 2014. Proposal for a security management in cloud computing for health care.The Scientific World Journal,2014. Itradat, A., Sultan, S., Al-Junaidi, M., Qaffaf, R., Mashal, F. and Daas, F., 2014. Developing an ISO27001 Information Security Management System for an Educational Institute: Hashemite University as a Case Study.Jordan Journal of Mechanical Industrial Engineering,8(2). Layton, T.P., 2016.Information Security: Design, implementation, measurement, and compliance. CRC Press. Luthra, R., Lombardo, J.A., Wang, T.Y., Gresh, M. and Brusowankin, D., Citibank and NA, 2014.Corporate infrastructure management system. U.S. Patent 8,706,692. Oppliger, R., Pernul, G. and Katsikas, S., 2017. New Frontiers: Assessing and Managing Security Risks.Computer,50(4), pp.48-51. Peltier, T.R., 2016.Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Peppard, J. and Ward, J., 2016.The strategic management of information systems: Building a digital strategy. John Wiley Sons. Raghupathi, W. and Raghupathi, V., 2014. Big data analytics in healthcare: promise and potential.Health information science and systems,2(1), p.3. Rebollo, O., Mellado, D., Fernndez-Medina, E. and Mouratidis, H., 2015. Empirical evaluation of a cloud computing information security governance framework.Information and Software Technology,58, pp.44-57. Saint-Germain, R., 2005. Information security management best practice based on ISO/IEC 17799.Information Management,39(4), p.60. Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs more holistic approach: A literature review.International Journal of Information Management,36(2), pp.215-225. Sylves, R., 2014.Disaster policy and politics: Emergency management and homeland security. CQ Press. Webb, J., Ahmad, A., Maynard, S.B. and Shanks, G., 2014. A situation awareness model for information security risk management.Computers security,44, pp.1-15. Wensveen, J.G., 2016.Air transportation: A management perspective. Routledge. Whitman, M. and Mattord, H., 2013.Management of information security. Nelson Education. Yang, Y.P.O., Shieh, H.M. and Tzeng, G.H., 2013. A VIKOR technique based on DEMATEL and ANP for information security risk control assessment.Information Sciences,232, pp.482-500. Zetler, J.A., 2015. The legal and ethical implications of electronic patient health records and e-health on Australian privacy and confidentiality law.