Monday, May 18, 2020

What Is Pluralism Definition and Examples

The political philosophy of pluralism suggests that we really can and should â€Å"all just get along.† First recognized as an essential element of democracy by the philosophers of Ancient Greece, pluralism permits and even encourages a diversity of political opinion and participation. In this article, we will break down pluralism and examine how it works in the real world. Key Takeaways: Pluralism Pluralism is a political philosophy holding that people of different beliefs, backgrounds, and lifestyles can coexist in the same society and participate equally in the political process.Pluralism assumes that its practice will lead decision-makers to negotiate solutions that contribute to the â€Å"common good† of the entire society.Pluralism recognizes that in some cases, the acceptance and integration of minority groups should be achieved and protected by legislation, such as civil rights laws.The theory and mechanics of pluralism are also applied in the areas of culture and religion. Pluralism Definition In government, the political philosophy of pluralism anticipates that people with different interests, beliefs, and lifestyles will coexist peacefully and be allowed to participate in the governing process. Pluralists acknowledge that a number of competing interest groups will be allowed to share power. In this sense, pluralism is considered a key element of democracy. Perhaps the most extreme example of pluralism is found in a pure democracy, where each individual is allowed to vote on all laws and even court decisions.   In 1787, James Madison, known as the Father of the U.S. Constitution, argued for pluralism. Writing in the Federalist Papers No. 10, he addressed fears that factionalism and its inherent political in-fighting would fatally fracture the new American republic. Madison argued that only by allowing many competing factions to participate equally in the government could this dire result be avoided. Though he never used the term, James Madison had essentially defined pluralism. The argument for modern political pluralism can be traced to early 20th century England, where progressive political and economic writers objected to what they saw as the growing tendency of individuals to become isolated from each other by the effects of unrestrained capitalism. Citing the social qualities of diverse yet cohesive medieval constructs such as trade guilds, villages, monasteries, and universities, they argued that pluralism, through its economic and administrative decentralization, could overcome the negative aspects of modern industrialized society. How Pluralism Works In the world of politics and government, it is assumed that pluralism will help achieve a compromise by helping decision-makers become aware of and fairly address several competing interests and principles.   In the United States, for example, labor laws allow workers and their employers to engage in collective bargaining to address their mutual needs. Similarly, when environmentalists saw the need for laws regulating air pollution, they first sought compromises from the private industry. As awareness of the issue spread, the American public voiced its opinion, as did concerned scientists and members of Congress. Enactment of the Clean Air Act in 1955 and the creation of the Environmental Protection Agency in 1970 were the results of various groups speaking up—and being heard—and were clear examples of pluralism in action. Perhaps the best examples of the pluralism movement can be found in the end of white apartheid in South Africa, and the culmination of the racial Civil Rights Movement in the United States with the enactment of the Civil Rights Act of 1964 and the Voting Rights Act of 1965. The ultimate promise of pluralism is that its process of conflict, dialog, and negotiation leading to compromise will result in the abstract value known as â€Å"the common good.† Since first conceived by the ancient Greek philosopher Aristotle, â€Å"the common good† has evolved to refer to anything that is of benefit to and shared by all or most members of a given community. In this context, the common good is closely related to the theory of the â€Å"social contract,† the idea expressed by political theorists Jean-Jacques Rousseau and John Locke that governments exist only to serve the general will of the people.   Pluralism in Other Areas of Society Along with politics and government, pluralism’s acceptance of diversity is also embraced in other areas of society, most noticeably in culture and religion. To some extent, both cultural and religious pluralism are based on ethical or moral pluralism, the theory that while several diverse values may forever be in conflict with each other, they all remain equally correct. Cultural Pluralism Cultural pluralism describes a condition in which minority groups participate fully in all areas of the dominant society, while maintaining their unique cultural identities. In a culturally pluralist society, different groups are tolerant of each other and coexist without major conflict, while minority groups are encouraged to retain their ancestral customs. In the real world, cultural pluralism can succeed only if the traditions and practices of the minority groups are accepted by the majority society. In some cases, this acceptance must be protected by legislation, such as civil rights laws. In addition, the minority cultures may be required to alter or even drop some of their customs which are incompatible with such laws or values of the majority culture.   Today, the United States is considered a cultural â€Å"melting pot† in which indigenous and immigrant cultures live together while keeping their individual traditions alive. Many U.S. cities have areas like Chicago’s Little Italy or San Francisco’s Chinatown. In addition, many Native American tribes maintain separate governments and communities in which they practice and hand down their traditions, religions, and histories to future generations. Not isolated to the United States, cultural pluralism thrives worldwide. In India, while Hindus and Hindi-speaking people are the majority, millions of people of other ethnicities and religions live there as well. And in the Middle Eastern city of Bethlehem, Christians, Muslims, and Jews struggle to live peacefully together despite the fighting around them. Religious Pluralism Sometimes defined as â€Å"respect for the otherness of others,† religious pluralism exists when adherents of all religious belief systems or denominations co-exist harmoniously in the same society.   Religious pluralism should not be confused with â€Å"freedom of religion,† which refers to all religions being allowed to exist under the protection of civil laws or doctrine. Instead, religious pluralism assumes that the different religious groups will voluntarily interact with each other to their mutual benefit.   In this manner, â€Å"pluralism† and â€Å"diversity† are not synonymous. Pluralism exists only when engagement between religions or cultures molds diversity into a common society. For example, while the existence of a Ukrainian Orthodox church, a Muslim mosque, a Hispanic Church of God, and a Hindu temple on the same street is certainly diversity, it becomes pluralism only if the different congregations engage and interact with each other.  Ã‚   Religious pluralism can be defined as respecting the otherness of others. Freedom of religion encompasses all religions acting within the law in a particular region. Sources â€Å"Pluralism.† The Social Studies Help Center.â€Å"From Diversity to Pluralism.† Harvard University. The Pluralism Project.â€Å"On Common Ground: World Religions in America.† Harvard University. The Pluralism Project.Chris Beneke (2006). â€Å"Beyond Toleration: The Religious Origins of American Pluralism.† Oxford Scholarship Online. Print ISBN-13: 9780195305555Barnette, Jake (2016). â€Å"Respect the otherness of the other.† The Times of Israel.

Wednesday, May 6, 2020

Case Of Ellen Hughes Finnerty V. Board Of Registered...

Case of: Ellen Hughes Finnerty v. Board of Registered Nursing Introduction to Case According to FindLaw (2008), Ellen H. Finnerty, a registered nurse is requesting the Board of Nursing in Texas to set aside the judgment where she was disciplined for gross negligence and incompetence. The board’s decision came after an incident where Finnerty chose not to comply with a physician’s order to intubate a patient before said patient was transferred to the ICU. In August 2002, Finnerty was working at Huntington Memorial Hospital as a charge nurse. A nurse (A. Magi) that was caring for patient(J.C.) begin to display symptoms of respiratory distress, such as rapid and labored respirations of 40 and an oxygen saturation of only 70%. With the assistance of a respiratory therapist, the patient was suctioned and Nurse Magi received orders from the primary care physician for 100% oxygen via a nonrebreather mask with the oxygen saturation to be maintained above 94%, several different blood test, for the administration of a diuretic. After the orders were perf ormed and the patient was continually monitored, there were no changes to the respiratory rate. Another call was placed to the PCP, there was an order given for the patient to be transferred to the ICU and stat intubation. These orders were relayed to Finnerty, who then assessed the patient, but did not disclose her findings with the medical staff. Lab results indicated that insuffient blood oxygenation and acidosis. TheShow MoreRelatedStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 PagesCommunication 335 Leadership 367 Power and Politics 411 Conflict and Negotiation 445 Foundations of Organization Structure 479 v vi BRIEF CONTENTS 4 The Organization System 16 Organizational Culture 511 17 Human Resource Policies and Practices 543 18 Organizational Change and Stress Management 577 Appendix A Research in Organizational Behavior Comprehensive Cases Indexes Glindex 637 663 616 623 Contents Preface xxii 1 1 Introduction What Is Organizational Behavior

Risk Management for Emerging Trends & Technology - myassignmenthelp

Question: Discuss about theRisk Management for Emerging Trends Technology. Answer: Introduction The advent of the information technology especially to each aspect of the human life as well as the business has been very obvious and there is no need to accentuate it more. The information technology continuous to be of great importance especially to the financial industry. It has been very important as well as a priceless resource (Afreen, 2014). This concept is no longer a news that the business now are in the information age which is characterized to the ever changing information technology revolution as well as the information superhighway on which every corporate organization should have, in the event it would survive in the 21st Century. The financial industry has been affected radically by the aspect of the information technology development (Ullman, 2011). The aspect of IT has become an important aspect to the business resource since lack of it may lead to poor decisions and it ultimately could lead to the business failure. The financial industry has been impacted and the o rganization which are operating in this sector has implemented the use of the technology (Afreen, 2014). The information technology has offered the industry with the wherewithal in dealing with the challenges of the aspect of new economy poses. The information technology has been the cornerstone for the recent financial industry reforms which are aimed in increasing of the speed as well as the reliability for any of the financial operations as well as the initiative of strengthening the financial sector. The revolution of the information technology has set the stage for the unprecedented increase in the financial activity across the world. The progress in the technology development has reduced in the costs associated to the global funds transfers. Aztek is an organization which operate in the financial services in Australia and it is one of the leading in the provision of these services. The company currently has been facing a lot of competition and to achieve a competitive edge they intend to implement a project on BYOD to enable the workers bring their devices to the workplace (Willcocks, 2013). The project is intended to save a huge amount of income to the organization. There would be a review of the various businesses that have allowed the workers to bring their devices at workplace. Moreover, the advantages as well as drawbacks that are faced in these organization. Additionally, the report will look at the effects of the application trends especially in the landscape of information technology. This project implementation will have both some positive remarks and shortcomings, therefore, discussing on the benefits that are associated to the adoption of the systems and drawbacks are important to highlight. This project also encounters the aspect of the security concern which has been captured as the project has been associated with many of the insecurity issues. The concept of risk assessment has been discussed and it elaborates on the various threats, consequences as well as the vulnerabilities which have resulted from the implementation of the project of Aztek organization. The report has explored on the recommendations which are aimed to prevent t he organization from the issues of insecurity. There are also policies as well as procedures which have been applied in the agreement of employment to guide against the aspect of Bring Your Device applications. In this research study, it would discuss on the aspects to consider on the project of BYOD in the workplace. Some of the devices which the organization would recommend them to bring to the workplace are the mobile phones, laptops as well as the tablets (Tokuyoshi, 2013). All the aspects which relates to the business will be looked at based on the trends of the business and how to adopt the project to leap huge benefits from it. There will be a review of the BYOD which will be highlighted for the financial industry (Astani, Ready Tessema, 2013). There would also be establishment of the industrial regulation, the relevant government as well as the best guidelines which would be highlighted. This project under the research would be based to the current security exposure of the organization. There is also review of the risk assessment especially on the threats, vulnerabilities as well as the consequences that are adopted when it comes to control of the project on BYOD. The research woul d also focus on the sector risk recommendations for this project which is underway to implementation. Other aspects which would be discussed are on the data security especially to Aztek organization (Astani, Ready Tessema, 2013). This aspect is very important part to implementation of this project since there are issues of threats which will be exhibited when the employees are allowed to bring on their own devices to the place of work. Security is important especially in the flow of the data and who would have access to it (Caldwell, Zeltmann Griffin, 2012). When this project is implemented Aztek Corporation will significantly improve on some of the areas which are lagging behind and it would also increase on the overall competitive advantage over the other organization in the same industry. Review of project in relation to financial industry Government regulation The broad framework of regulation is determined by Australian government. They have the responsibility to the day to day supervision of the financial organization as well as the market. Aztek Corporation being part of an industry in the financial sector they need to comply with certain financial conduct which are relevant to the protection of vital financial information. The organization needs to look deeply to the privacy Act 1993 before implementing BYOD to the workplace (Arregui, Maynard Ahmad, 2016). They government has regulated some laws which could govern the financial institutions in view of the BYOD aspect. The government has highlighted that a business entity may which allow their employees to bring their own devices to the place of work. The laws has clearly highlighted some of the devices which should be brought are; mobile phone, tablets and laptops. Moreover, the Australian government has explained also that the business need to outline clearly on the rule which should be aimed at governing the workers in this aspect of BYOD in the workplace (Arregui, Maynard Ahmad, 2016). Moreover, they should also make sure that these rules which they will implement should not be in collision to the freedom and the rights of the workers. In the event that the workers break the rules which have been established by the entity they should be fined and punished. Some of the rules which Aztek Company has established are based on these aspect; the workers should ensure that the data of the company is not accessible to the outsiders (Caldwell, Zeltmann Griffin, 2012). Additionally, the information of the business should not be shared to any individuals who is not part of the company and there flow of the information should be within the business and the employees only no other third party unless it is stipulated by the business. In many institutions the aspect of Bring your own device (BYOD) is not supported because of the shortcoming it bring to the business. In some of the cases the incompetences as well as careless of the staffs has led to exposure of the vital information of the business to third parties or even to the public (Medudula, Sagar Gandhi, 2016). The rival firms could use this useful information to highlight some of the opportunities of the organization and take advantage of the situation. The BYOD concept is a vital aspect when it comes to achieving on the goals and the goals of the organization (Miller, Voas Hurlburt, 2012). It may help in the reduction of the costs as the funds which would be used to buy new devices could be channeled towards other projects in the business. This project would rely bring forth benefits to the organization and this has been a trend which is taking the industry by storm (Arregui, Maynard Ahmad, 2016). BYOD would help the business and it would likely help the workers to perform better, however, this project would be associated with some serious shortcoming IT risks. The financial services sector overview Aztek Corporation has been an established financial corporation that has been offering financial services to the clients across Australia (Astani, Ready Tessema, 2013). The organization has encountered various risks. Over the years the company has been concerned with the issue of ensuring the confidentiality with their data (Mphahlele, 2016). They are aiming at ensuring they establish objective which are more realistic to the project they want to implement which would be significant saving of a lot of income. In the financial services industry there has been establishment of various regulation which have governed the functions of the organization that are in this sector (Jaumotte, Lall Papageorgiou, 2013). The government of Australian has greatly encouraged and at the same time supported the businesses in adopting of the information technology in all their operations since it has been observed to reduce on the cost to the business (Caldwell, Zeltmann Griffin, 2012). There is need of the business in financial industry in Australia to observe all the implemented policies in relation to the information technology in their new projects. The proposed project which Aztek organization is aiming to venture may not likely face any critics as other organization are also aiming to implement on the same to be able to reduce on some of the shortcoming such as increased cost of purchasing resources. BYOD in the workplace would likely have some negative impact to the organization as their data would be exposed and it would be viewed by public individuals or organization (Caldwell, Zeltmann Griffin, 2012). Some of the notorious employees may carry data from the organization which could be accessed by their families or even relative if they are not kept safe. The confidentiality of the organization of the business is important and therefore, there is need to keep it safe. Current security at Aztek organization. Aztek organization has been able to manage to all their applications of IT along with the resources (Thomson, 2012). This clearly shows its security posture which are within their own business aspects. There is no individual who can gain access to the data of the organization unless they are connected within the network of the corporation (Mansfield-Devine, 2012). The network of the organization has been managed by the IT professionals who are employed by this business entity (Caldwell, Zeltmann Griffin, 2012). There is use of the access management systems which have been implemented to secure their system. They are able to monitor as well as change on any framework within the system to suit their business needs (French, Guo Shim, 2014). The organization security posture which has been utilized in Aztek Company could have some risks concerns but the organization ensures there is security of the data (Astani, Ready Tessema, 2013). Aztek Company aims at implement the project on BYOD to the workplace, employees need to use these device in performing their duties. Based on the research more than seventy two percent of the organization support the BYOD but the threat of the data leakage has been more prevalent than ever before, as the workers look at the access of the corporate sensitive information on their mobile devices when they are outside the organization network. The sole responsibility in relation to the data security should be shared amongst the providers and the organization. When the data of the organization has been exposed by the employees to the public it could lead to devastating effects (Astani, Ready Tessema, 2013). The organization could be sued by the customers and get fined heavily especially when the information about the customers have been breached. The financial institution in most of the time deals with data which is sensitive and when it is exposed by the employees there are adverse effect of that company (Caldwell, Zeltmann Griffin, 2012). There is need to educate the employees on how to keep the information safe. The data of Aztek Company should only be accessed and shared within the business. When using their own devices in the workplace there could be encrypted and passwords so that they are only accessed by individuals who have authentication (Song, 2014). The employees should not access this information when they le ave place of work, and any information which is accessed while they are home, it is a breach of the policies of the organization and they could be charged when they are known (Eslahi, Naseri, Hashim, Tahir Saad, 2014). Deleting this information when leaving place of work would be one of step which could be utilized. Bring your own device (BYOD) concept. This concept refers to the policy of permitting the workers to bring their own devices such as the laptops, tablets and the smartphones to their place of work, and utilize those devices in accessing the privileged information and applications of the company (Fincham, Fleck, Procter, Scarbrough, Tierney Williams, 1995). This phenomenon has been referred to as the information technology consumerisation. This concept has been making significant inroads especially to the business world, with about seventy five workers in high growth markets (Caldwell, Zeltmann Griffin, 2012). Aztek organization adopting the BYOD concept will be implemented by information technology department within the business. In this project there would be selection of the application which are useful to implement and manage the devices which these staff bring to the workplace (Astani, Ready Tessema, 2013). The expert should establish a network connection which would be utilized by the workers to enable them perfo rm on their duties using their devices. There are few organization which have adequate control measures in regards to the risk associated with the adoption of this concept (Schwalbe, 2015). Aztek corporation need to establish guideline which will govern the staff on how to use their devices while working in the organization. Factors of information technology platform that impact BYOD In most of the organization today they have implemented policies in relation to protecting the organization data and incorporating the concept of BYOD (Kulkarni, Shelke, Palwe, Solanke, Belsare Mohite, 2014). In the event that an employee connect their devices to the network of the organization, the data is at risk if appropriate mechanism are not in place to address the confidentiality of the data (Caldwell, Zeltmann Griffin, 2012). Some of those devices at times do not have an updated software or perhaps they have a malicious software installed on them and the owners are not aware. Once these devices are connected they may infect the system in the organization which could compromise on the data and in some instances leads to data loss. Benefits and drawback associated with BYOD. Benefits Increase productivity: There is increased flexibility as well as productivity. When the workers are granted access to the corporation data base as well as allowing them to use their own devices to streamline on their work it would increase on the work volume they are undertaking (Sangani, 2013). Increase on the satisfaction of the workers: When a business permit the workers to use their own devices at the place of work, they tend to enjoy more (Caldwell, Zeltmann Griffin, 2012). They would invest additional time to explore as well as understand their devices which is relation to their duties. Cost saving: It has been observed that organization could spend less on the software as well as the hardware. This responsibility tends to be transferred to the employees who take it up as they view it is a benefit on their end (Vorakulpipat, Polprasert Siwamogsatham, 2014). Cutting edge technology: This is a benefit of BYOD in the organization since it tends to increase the access to the cutting edge technology (King, 2016). The workers tend to upgrade to the latest devices, as well as accompanying software platforms much faster than the organization. Drawbacks Security: This is one of the greatest concern when it comes to using of the personal devices especially in the work environment (Morrow, 2012). The security fears are in most of the times arising around the data, since it will be Aztek asset which would be at risk (King, 2016). When there is insufficient security particularly to the owned devices could lead to exposure of the sensitive data of the organization to manipulation practices. Privacy issues: The BYOD usually blur the line between the workers liability as well as the organizational liability (Scarfo, 2012). This practice may raise various challenges when it comes to IT department as a result of increased need for the consideration especially in the intrusion of the privacy. The copyrights issues: This could arise especially when it comes to the ownerships of any creations for example the inventions which have been created as well accessed through the devices of the employee. Risk assessment. This concept of the BYOD has been associated with the aspects of threats, vulnerabilities as well as consequences which are the challenges (Disterer Kleiner, 2013). There is need to carry out a risk assessment to be able to identify those risk and vulnerabilities to enable the organization to mitigate them. In this assessment it will identify on the threat, vulnerability, as well as the consequence. Management of the unknown third party access to the mobile application: many of the workers when they install free application in their devices to use and when they utilize then for the official duties, there could arise a situation of access by the 3rd party especially if they are not secure hence they can access the sensitive data. This risk may not impact on Aztek organization. In this risk it is rated as low since the organization has been able to implement mechanism to handle on the issue. Probable challenge of the management of data and the compliance: Many of the businesses ensures that their security is intact especially that of the data. They ensures that both their cloud based as well as storage hardware devices are secure. Aztec organization due to the nature of their business usually deals with data that is very sensitive particularly the one containing the information of the clients. Further, the organization has been able to employ mechanism to prevent such information from being access by unauthorized individuals. Probable challenge of the management of the data and compliance: Aztek organization would likely encounter various challenges especially to the implementation of the data administration along with the support to compliance. The organization intends clearly outline on the compliance aspects in relation to the third party applications. Data leakage as a result of loss of the employees devices: many of the devices which are used by the employees in the workplace do not have a password which is installed in them. In the event that they get loss, there could be devastating repercussion to the organization if the information get accessed by another person. To ensure this the organization has urged the employees to input passwords as well as the data they access is encrypted. This will be represented in a table format to highlight the level of the threat, consequence and how to mitigate on the above raised risk issue. Threats Level of threat Vulnerabilities Consequences How to mitigate(controls) 1. Risk of management of the unknown third party access to mobile applications: The risk does not affect Aztek Corporation, and is rated low as they have mechanism in place. low This can occur in the event that the employees do not undertake their tasks appropriately. This project could fail Blacklist or failure of installing the software which is risky or unregistered license. Monitoring of BYOD policy. 2. Unable to track the corporate data: leads to exposure of the data to public. medium Using of the organization data inappropriately. Failure of the entire project which could lead to the closure of the organization. Implementation of mechanisms to prevent the exposure and to track down the information which is accessed by users. 3. Failure of management of data and compliance. low The employees do not observe current rules and regulations that are established. The organization may not utilize the project to achieve their goals. Formulation of the policy documents which contains the policies which govern them on the project of BYOD. 4. Data leak caused by the loss of the devices for workers. medium Exposure of the confidential information of the organization. Loss of clients and image of the company. Poor performance of the employees as their tools they use to carry out their duties are lost and all their information is lost (Raths, 2012). Ensuring the data is encrypted. The devices used by employees have passwords and programs to keep the data secure. Data security: Aztek organization have been entrusted by the client with sensitive information which should not be exposed to the third parties. In this project which they intend to adopt the data may be exposed to the users who are not authorized in the event they do not implement proper mechanism to keep it secure (King, 2016). Aztek organization has been dealing with the information which is sensitive in nature and it should not be disclosed to the public at any particular instance (Afreen, 2014). The project which the organization adopted is based on the BYOD to the workplace which could lead the data to be exposed to the unauthorized individual in the event they do not implement it well. The organization need to formulate some regulations and guidelines that could govern them when it comes to the implementation of such project. The organization should be in a position to manage this project through their tech individuals who are deployed when the implementation process is initiated (Afreen, 20 14). The organization need to monitor on who has the access to the data, as well as how it flows. This is to curb some employees who are very careless since they could mishandle it or even give an access to the unauthorized parties. There is need to address the risks which have been identified above appropriately. Risk How to mitigate them. 1. Management of the unknown third party access to mobile applications: Blacklist or failure of installing the software which is risky or unregistered license. Monitoring of BYOD policy 2. Probable challenge in the tracking of the data. Implementation of mechanisms to prevent the exposure and to track down the information which is accessed by users. 3. Probable challenge of management of data and compliance Formulation of the policy documents which contains the policies which govern them on the project of BYOD. 4. Data leakage as a result of loss of the employees devices. Encryption of the data and password programs to prevent access of the data and keep it secure. Recommendations: The Aztek organization should be able to establish a clear guidelines in regards to the aspect of BYOD to the workplace. On their guideline policy document it should pertains on the standards which the employees should act upon when they bring their devices in the workplace. This should also be incorporated in the employment agreement to curb those employees who would want to link the information for their own personal gain. Moreover, the organization should train the employees on this project bring forth the benefits it would bring to both the business and the employees. Conclusion: The technology has had a major impact towards the delivery of the financial services especially to the Aztek organization. Aztek organization is planning to implement the project of BYOD in the workplace especially the mobile devices such as mobile devices, tablets along with the laptop. This provide is expected to bring many benefits to the organization, but it is also likely to bring IT risks. One of the major risk which has been identified in the research is data security during the implementation process of the project. To be able to mitigate on this issue would be formulation of regulation that can govern in the implementation of this project. Once the issues relating to the data security are resolved the project will bring many benefits to both the organization and the employees. References Afreen, R. (2014). Bring your own device (BYOD) in higher education: opportunities and challenges. International Journal of Emerging Trends Technology in Computer Science, 3(1), 233-236. Arregui, D. A., Maynard, S. B., Ahmad, A. (2016). Mitigating BYOD Information Security Risks. Astani, M., Ready, K., Tessema, M. (2013). BYOD ISSUES AND STRATEGIES IN ORGANIZATIONS. Issues in Information Systems, 14(2). Caldwell, C., Zeltmann, S., Griffin, K. (2012, July). BYOD (bring your own device). In Competition forum (Vol. 10, No. 2, p. 117). American Society for Competitiveness. Disterer, G., Kleiner, C. (2013). BYOD bring your own device. Procedia Technology, 9, 43- 53. Eslahi, M., Naseri, M. V., Hashim, H., Tahir, N. M., Saad, E. H. M. (2014, April). BYOD: Current state and security challenges. In Computer Applications and Industrial Electronics (ISCAIE), 2014 IEEE Symposium on (pp. 189-192). IEEE. French, A. M., Guo, C., Shim, J. P. (2014). Current Status, Issues, and Future of Bring Your Own Device (BYOD). CAIS, 35, 10. Fincham, R., Fleck, J., Procter, R., Scarbrough, H., Tierney, M., Williams, R. (1995). Expertise and innovation: information technology strategies in the financial services sector. Oxford University Press. Jaumotte, F., Lall, S., Papageorgiou, C. (2013). Rising income inequality: technology, or trade and financial globalization?. IMF Economic Review, 61(2), 271-309. King, J. M. (2016). IDENTIFYING BEST PRACTICES FOR A BYOD POLICY. Kulkarni, G., Shelke, R., Palwe, R., Solanke, V., Belsare, S., Mohite, S. (2014, April). Mobile cloud computing-bring your own device. In Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on (pp. 565-568). IEEE. Mansfield-Devine, S. (2012). Interview: BYOD and the enterprise network. Computer fraud security, 2012(4), 14-17. Medudula, M. K., Sagar, M., Gandhi, R. P. (2016). Mobile Device: Applications, Over the Top Services, Identity Protection and BYOD Policy. In Telecom Management in Emerging Economies (pp. 207-227). Springer India. Miller, K. W., Voas, J., Hurlburt, G. F. (2012). BYOD: Security and privacy considerations. It Professional, 14(5), 53-55. Morrow, B. (2012). BYOD security challenges: control and protect your most sensitive data. Network Security, 2012(12), 5-8. Mphahlele, P. (2016). The impact of bring-your-own-device on work practices in the financial sector (Doctoral dissertation, University of Cape Town). Raths, D. (2012). Are you ready for BYOD: Advice from the trenches on how to prepare your wireless network for the Bring-Your-Own-Device movement. THE Journal (Technological Horizons in Education), 39(4), 28. Sangani, K. (2013). BYOD to the classroom [bring your own device]. Engineering Technology, 8(3), 42-45. Scarfo, A. (2012, November). New security perspectives around BYOD. In Broadband, Wireless Computing, Communication and Applications (BWCCA), 2012 Seventh International Conference on (pp. 446-451). IEEE. Schwalbe, K. (2015). Information technology project management. Cengage Learning. Song, Y. (2014). Bring Your Own Device (BYOD) for seamless science inquiry in a primary school. Computers Education, 74, 50-60. Thomson, G. (2012). BYOD: enabling the chaos. Network Security, 2012(2), 5-8. Tokuyoshi, B. (2013). The security implications of BYOD. Network Security, 2013(4), 12-13. Ullman, E. (2011). BYOD and security. Tech Learning, 31(8), 32-34. Vorakulpipat, C., Polprasert, C., Siwamogsatham, S. (2014, September). Managing mobile device security in critical infrastructure sectors. In Proceedings of the 7th International Conference on Security of Information and Networks (p. 65). ACM. Willcocks, L. (2013). Information management: the evaluation of information systems investments. Springer.