Monday, May 25, 2020

Interview About A Friend Of Mine - 1741 Words

For my interview I chose to ask a close friend of mine some questions on how she parents her child. She is 25 years old, married, and has a 6-year-old girl named Audrey. I actually had to conduct a phone interview because she lives in a different city and I wasn’t able to meet up with her. I explained to her that I would be writing a paper about her experience as a parent, her family relationship, and even some questions about her child. I made sure that she knew that the names in the paper would be changed so she would remain confidential. Before the interview started I told her that if there were any questions that she did not want to answer that she just had to tell me, and I would be more than happy to skip those questions. She called me on a weeknight and her daughter was already in bed so she was able to answer the questions without any distractions. Throughout this whole semester we have learned that there is no right or wrong way to parenting. We have learned that som e approaches to parenting might be more effective than others, but there isn’t a one size fits all approach when it comes to being a parent. I asked â€Å"Lauren† basic questions on how the experience of being a parent has been, what are some challenges she has faced, and how she juggles it all from working to being a wife to being a mother. I found that most of her responses were consistent with what we have learned throughout this whole semester. According to The process of Parenting Baumrind, andShow MoreRelatedEssay On Interview With Three People833 Words   |  4 PagesI interviewed three people, my mother, my father, and my friend, Makaila. My mother is an avid church goer that finds comfort in God and often spreads her joy and love to all that she encounters. My father is a disabled 60 year old that endures diabetes and it often affects his life. Makaila is wild and free spirit that believes in people not being complete idiots by discriminating people. My mother, Joyce, is a Conservative Republican that belongs to a small Lutheran Christian church in StreetsboroRead MoreI Am the Messenger by Markus Zusak795 Words   |  3 Pagesmassive impact on how that person develops. Where you are dictates who your friends are, what school you attend, what job you get, and even who you might marry. Zusak grew up in Australia and still lives there currently. Though I Am the Messenger is not directly stated to take place in Australia, Zusak made quite clear during an interview that took place between him and the blog Yapping About Young Adult. In this interview, Zusak states that I Am the Messenger is â€Å"very Australian . . . AustraliansRead MoreCoffee Is The Good Morning921 Words   |  4 Pagesclose friend of mine, and revisiting class readings, I was able to find new perspectives on the ways in which coffee contributes to and impacts daily life through its broad spectrum. In order to gain more insight, I considered Guest’s advice on preparations and strategies for conducting fieldwork. First, I determined who would be a good candidate to interview. Being that Tori is a fellow coffee lover, I asked for her informed consent before conducting a 30 minute, semi-structured interview consistingRead MoreThe Textual Analysis Of The E ! Tv Show Essay1397 Words   |  6 Pagesthat the show has and if it actually has the power to influence relationships. Specific aspects about the relationships that I researched in WAGS, was the hierarchy of women. The hierarchy stands; wives at the top, following girlfriends (in serious relationships), and dating or single women at the bottom. This analysis looked to see if the hierarchy is played out in actual reality. Through this interview with this WAGS follower, she did not find the show applicable to her life. This audience memberRead MoreEthnographic Interview1520 Words   |  7 PagesEthnographic Intervie w: Taiwan Culture Experience 1 Ethnographic Interview: Taiwan Culture Experience Vntge Jayne Clark Atlanta University Communication Cultural Diversity, Professor Howell March 14, 2011 2 PRECONCEPTIONS Culture is defined as the traditions, customs, norms, beliefs, values and thought patterning passed down from generation to generation (Jandt 2010). The world consists of many different cultures. InRead MoreMy Interview to a Lutheran Essay561 Words   |  3 Pages For this interview paper I wasnt sure who I was going to interview at first. I was thinking of all of the religious places of worship in my home town of Sheboygan, but I wanted to interview someone I knew. So I decided to interview my roommate. Ive known him since sixth grade, and he is a Lutheran. I was raised a Catholic and I had a lot of friends who were Lutheran. When I was a kid I really didnt think any differently about it, but now for this paper I get to interview a friend and see whatRead MoreFamily Intimate Relationship Interview1128 Words   |  5 PagesFamily Intimate Relationship Interview Throughout this interview process, it was extremely difficult to find a family not similar to mine. However after many weeks of searching, I found a wonderful family that lives not to far from my hometown, the Lindsay family. While interviewing this family, I spent approximately four hours at their small home in Lake City, TN. This experience was difficult and rewarding at the same time. To me, meeting new people is very hard because I am a really shy personRead MoreObservation Of A Child At The Children s House998 Words   |  4 Pageshad the notes that I needed to write about friendships and play, I intended to ask a child the questions that were provided in the rubric. Initially, most of the children were scattered around playing by themselves, in pairs or groups of 3. After observing for about 10 minutes without anything interesting happening, I was about to go to a child and start interviewing him or her. Then a little girl who I later found out to be named Alex gathered a gro up of about 5 other children to play â€Å"house†. AlexRead MoreAn Insider Of The Subculture Know Hip Hop923 Words   |  4 PagesIn my room took place a meeting with a friend of mine that consider himself an insider of the subculture know as hip-hop. Quin Smith is a 24-year-old African American male employee at Geico, as a Sales Representative and close friend. He is 5’2, with short wavy black hair, that typically wear collar t- shirts, dark blue jeans, and his favorite pair of white shoes. Now, to you he may seem like a short nerd with no life (lol) but, not true. I mean, he is a nerd, but a handsome vibrant nerd that lovesRead MoreExploring The Concepts Of Love And Romance980 Words   |  4 Pageswhat I hear, â€Å"love is dead†. It is not uncommon for my friends and I to discus the current state of our relationships or lack thereof. Conversations sparked by the various campus crushes that needed to be talked about, later developed into large group discuss ions amongst the guys and girls of my social circle trying to understand the current state of romance. These discussions, or more often debates, have enabled us to share our ideas about dating, relationships, and hookup culture in ways that many

Thursday, May 14, 2020

Reflection And Reflection Of Group Counseling - 916 Words

Reflection of Group Counseling As I began the Group Process and Dynamics course, I was excited to become educated and experienced with group counseling. Group counseling is a topic I have enjoyed in the past and have continued to be fascinated by. I have learned the elements of a group process through observation and research. The group process consists of several elements that come together when the group begins and ends when the group is terminated. I have observed group norms, group cohesion, the generation of trust, the manifestation of resistance, the emergence of conflict and resolution, healing forces, the reactions of group members, and the various stages a group develops through (Corey, Corey, Corey, 2010). Throughout this course, I was able to derive a conceptualization of groups. From this course I will take with me the understanding of how effective group counseling can be for individuals. Groups have been known to be as effective as individual therapy and a great source of treatment. Group counseling is designed as a part of a treatment plan that helps individuals and guide them through change. Group counseling is a versatile practice, which can be used in several settings and with different populations (Corey et al., 2010). This course has given me the opportunity to reflect on my own personal leadership style, the challenges that may arise, and an action plan to continue my group leadership knowledge and skills. My Leadership Style Through this course,Show MoreRelatedGroup Counseling Reflection1746 Words   |  7 Pagesissues. Now days counseling is something very common that is offered by a professional counselor in different types of setting. When we talk about counseling some individuals might think of having a one to one session with a counselor. However, the reality is that even though one to one sessions are very common, there is also group counseling which is â€Å"an excellent treatment choice for numerous intrapersonal and interpersonal issues and for helping people change†¦Most of these groups are not unstructuredRead MoreGroup Counseling Reflection Paper4779 Words   |  20 PagesStudies in Counseling Reflection CPY 540 Paladino: Advanced Theory and Practice of Group Counseling As I reflect upon my experience as a group leader in this class, I learned that therapeutic factors can be group driven or facilitated by the group leader. Cohesion stood as a vital aspect of an effective group, and I realized that as a group leader I needed not only to facilitate the group but to remain as a vital part of the group to assure cohesion. By subsisting as an effective group leader, IRead MoreReflection Of Group Counseling Process And Mental Health Group Activities829 Words   |  4 PagesA Reflection of Group Counseling Process and Mental Health Group Activities One might say the best teachers are the ones who go over and beyond the call of duty to assist their children. This idea could especially be proven true given the factors that are affecting the social and academic capabilities of the students we teach on a daily basis. One emerging, yet commonly overlooked factor is mental health. Mental health is one of those issues seen to be taboo in schools but is becoming a widespreadRead MoreGroup Counseling With South Asian Immigrant High School Girls : Reflection And Commentary Of A Group Facilitator1854 Words   |  8 PagesThe article, â€Å"Group counseling with South Asian immigrant high school girls: Reflection and commentary of a group facilitator,† focused on integrating South Asian girls into a new school in a new country through group counseling. The first author was South Asian herself, therefore, she felt that she was competent to work with these students. She explained that the South Asian people are collectivist therefo re; a group setting would match the student’s cultural norms and values. The authors beginRead MoreCounselling Reflection1203 Words   |  5 PagesRUNNING HEAD: Reflection on counseling 1 Reflection on counseling session recording Chua Ci Jie Introduction to Counselling James Cook University, Singapore Reflection on counseling Reflection on counseling Counseling is interpreted as a therapeutic practice of utilizing dialogue to assist clients in better understand and coping with their individual problems or health issues (Counseling, 2003). The individuality of the counselor has been extensively regarded as a vital tool in the provisionRead MoreTheory Of Group Counseling Paper1438 Words   |  6 Pages Theory of Group Counseling Paper Alex Dossett CHRD 766; Group Counseling South Dakota State University Describe how your experience of the leading, participating in, or observing groups have informed or influenced you regarding your own group leadership skills, leadership style, and perception about groups; Describe your perspectives about the functions of a therapeutic group in assisting client changes; Discuss the elements or factors contributing to the development of the group, and changesRead MoreA Research Study On Mini Lecturing1351 Words   |  6 Pagesstudent led counseling groups. The primary skill used depended on the group. Overall, I think encouraging and supporting were the primary skills used to alleviate anxiety and generate group discussion. This was evident during the all the group sessions where the group leader’s success relied heavily on group participation and interaction with the member’s and the leader’s. The first group relied more on mini lecturing and information giving which was appropriate for psychoeducational group. Mini-lecturingRead MoreThe Definition Of Multicultural Competence873 Words   |  4 PagesThe definition of multicultural competence means in part to approach the counseling process from the context of the personal culture of the client (Sue, Arrendondo McDavis, 1994; Sue Sue, 2007). Professional ethics compel counselors to ensure that their cultural values and biases do not override those of the client (ACA, 2005). The presenters shared personal examples of their individual cultures and how these impacted their personal and professional lives, including their professional self-awarenessRead MorePastoral Reflection paper1611 Words   |  7 Pagesï » ¿ Pastoral Counseling Reflection Paper University Abstract This paper shares a reflection of my pastoral counseling experiences. My experiences have been while serving overseas as a M, along with my time serving at Church as the Assiocate Pastor. In this paper I will share past events and what I have learned from them when it comes to counseling. I will share what I have learned through reading the assignment required by PACO 500 and how it has changed the way I view my past experiencesRead MoreGroup Reflection : Group Process767 Words   |  4 PagesGroup Reflection Group My concept of what a group consist of is a story that needs to be told and heard from many people with similar issues or problems. The group is a tool to help each member to gain some insight on how they can change or make a difference in their lives for the future. I feel that a group is a place where new relationships can develop and to find self again. Group Process The group process is facilitated by a counselor by the process has to be done by the members. It can be easy

Wednesday, May 6, 2020

The Lottery, By Shirley Jackson - 1772 Words

Conformity is not based mainly on containing and supporting a society, but also to dominate and control what is within. The control of repressed individuality benefits those at the top of a power structure. From early on, men were considered the breadwinners and women were to maintain households; whether due to a difference in physical, emotional, or mental state; this was an unquestioned hierarchy. Therefore, any women who pushed back were ultimately punished for threatening the system. In â€Å"The Lottery†, Shirley Jackson uses literary devices of symbolism, irony, and characterization to reveal the danger of blind obedience, and implanting the thought of resistance for women. To an extent, conformity is necessary in reality; time has shown that laws, rules, and regulations that are innately bad can serve as the catalyst for rebellion, as recorded for the French Revolution, Vietnam War, and Czarist Russia. Conformity lays the groundwork for good laws to be constructed, and until that time, men are able to abuse and utilized the current laws for their own superior gain. One of the biggest â€Å"rebellions† is backed purely by feminism, where women are repressed by men. Unfortunately, in the past not many women knew their true value, and were prematurely silenced; however, Jackson is revealing the reality of the restraints. The author utilizes symbolism throughout her storyline to great effect. The physical properties, the black box, the slips of paper, the placing of the box on theShow MoreRelatedThe Lottery, By Shirley Jackson1195 Words   |  5 PagesOn the surface, Shirley Jackson’s short story, â€Å"The Lottery,† reads as a work of horror. There is a village that holds an annual lottery where the winner is stoned to death so the village and its people could prosper. Some underlying themes include: the idea that faith and tradition are often followed blindly, and those who veer away from tradition are met with punishment, as well as the idea of a herd mentality and bystander apathy. What the author manages to do successfully is that she actuallyRead MoreThe Lottery by Shirley Jackson757 Words   |  4 Pagessucceed but many fail just like the main character Tessie Hutchinson in Shirley Jackson’s short story â€Å"The Lottery†. When someone hears the word â€Å"lottery †, he or she may think that someone will be rewarded with prize. But â€Å"The Lottery† By Shirley Jackson is different than what one thinks. In the story, a lottery is going to be conducted not like Mega Million or Powerball one play here. In the story, the person who wins the lottery is stoned to death instead of being rewarded with the prize. TessieRead MoreThe Lottery By Shirley Jackson931 Words   |  4 PagesIn 1948 Shirley Jackson composed the controversial short story â€Å"The Lottery.† Generally speaking, a title such as â€Å"The Lottery† is usually affiliated with an optimistic outlook. However, Jackson’s approach is quite unorthodox and will surely leave readers contemplating the intent of her content. The story exposes a crude, senseless lottery system in which random villagers are murdered amongst their peers. Essentially, the lottery system counteracts as a form of population control, but negatives easilyRead MoreThe Lottery By Shi rley Jackson1504 Words   |  7 Pagesâ€Å"The Lottery† by Shirley Jackson In The Lottery Shirley Jackson fills her story with many literary elements to mask the evil. The story demonstrates how it is in human nature to blindly follow traditions. Even though some people have no idea why they follow these traditions. The title of the story plays a role in how Shirley Jackson used some literary elements to help mask the evils and develop the story. The title â€Å"The Lottery† serves as an allegory. When people think of the lottery majorityRead More`` The Lottery `` By Shirley Jackson894 Words   |  4 Pagesshort story â€Å"The Lottery†, author Shirley Jackson demonstrates Zimbardo’s concepts in three different areas: Authority figures, Tradition and Superstition, and Loyalty. The first concept Jackson portrays in â€Å"The Lottery† is the authority figures. Jackson indicates that the lottery is being held in the town center by one authority figure, Mr. Summers, annually on June 27th. Every June 27th, without fail, townspeople gather in the town square to participate in the annually lottery even though mostRead MoreThe Lottery, By Shirley Jackson1510 Words   |  7 PagesShirley Jackson’s â€Å"The Lottery† illustrates several aspects of the darker side of human nature. The townspeople in Jackson’s â€Å"The Lottery† unquestioningly adhere to a tradition which seems to have lost its relevance in their lives. The ritual that is the lottery shows how easily and willingly people will give up their free will and suspend their consciences to conform to tradition and people in authority. The same mindless complacency and obedience shown by the villagers in Jackson’s story are seenRead MoreThe Lottery By Shirley Jackson8 11 Words   |  4 Pagesâ€Å"The Lottery† was published by Shirley Jackson. The story was true expression of Jackson’s genuine thoughts about human beings and their heinous competence in an annual village event for corn harvest . First, her used to word symbolized main point of the story. Second, Jackson was inspired by few historical events happened in the past and a life incident in her life. Lastly, She was able to accomplish the connection between historical and biographical with the story. Therefore, Shirley Jackson’sRead MoreThe Lottery By Shirley Jackson934 Words   |  4 Pagesâ€Å"The Lottery† by Shirley Jackson signifies the physical connection between the villagers and their unwillingness to give up their tradition. â€Å"The Lottery† is very unpredictable and quite misleading. The black box has no functionality, except every June 27th. Shirley Jackson depicts the black box as an important and traditional tool. Although the villagers in â€Å"The Lottery† are terrified of the goal of the lottery and the black box, they are unwilling to let go of the tradition. Shirley Jackson portraysRead MoreThe Lottery by Shirley Jackson799 Words   |  4 Pagesthe mood and to foreshadow of things to come. The Lottery by Shirley Jackson is a story in which the setting sets up the reader to think of positive outcomes. However, this description of the setting foreshadows exactly the opposite of what is to come. In addition, the theme that we learn of at the end leads us to think of where the sanity of some human beings lies. The story begins with the establishment of the setting. To begin, Shirley Jackson tells the reader what time of day and what time ofRead MoreThe Lottery by Shirley Jackson1764 Words   |  7 Pagesfilled with excitement and eeriness, leaving the reader speechless. The Lottery , a short story written by famous writer Shirley Jackson, created an uproar on June 26, 1948, when it was published in the magazine The New Yorker (Ball). The gothic thriller, set in an unknown time and place, shares the tradition of a small town, a little larger than three hundred people, in which a drawing is held once a year. In this â€Å"Lottery,† each family’s husband draws a slip of paper from a black box. The husband

Tuesday, May 5, 2020

The Case Study of Procter and Gamle-Free-Samples for Students

Question: Discuss about the Case Study of Procter and Gamle. Answer: Introduction Technology is something that is being used by the business organizations and users from all across the globe. There are many technological tools and components that are used by the business units to execute the business operations and tasks. The technical tools have provided the business units with a lot many advantages for the ease of execution of operations and the streamlining of the activities as well. The report covers the case study of Procter and Gamble (PG) by explaining the importance of information governance in the organization. There is also an analysis of the use of Information Technology and Information System in the other organization along with the use of cloud computing, cloud-based applications, social media integration, and possible areas of improvements and importance of security in the organization. Procter and Gamble Role of Senior Leadership in Information Governance Information Governance (IG) is defined as a set of discipline including a number of different processes and methods so that information security is maintained and the business objectives are achieved. The business organizations in the present time are making use of technology for the management if their information sets and for the execution of the business tasks and operations. There are several assets that the organizations must manage so that the streamlining of the business activities is achieved. One such significant asset for the organization is the information and data sets. Procter Gamble (PG) is a multi-national corporation that is based out of America and has its headquarters in downtown Cincinnati, Ohio. The Company is a manufacturer of family, household and personal care products. The company has done numerous modifications and enhancements to make sure that information management is carried out in an adequate manner. Information Governance is one of the major pillars to make sure that the information and data sets are correctly managed and organized. There are a lot many activities that are involved in the management and organization of information. It is, therefore necessary that the resources are selected for the information governance. Senior resources and leadership engaged with the organization has a lot of responsibility for required information governance (Ico, 2014). PG is a multi-national company that was set-up in the year 1859 and now operates in more than 180 countries all across the globe. Due to widespread operations, customer base and office units, there are huge clusters of data sets that PG manages on a per day basis. The senior leadership and management of the organization took several steps for adequate and efficient information governance and management. The senior leadership started with the setting up of Global Business Units (GBUs) for the company. These GBUs were formed on the basis of the various product categories that are offered by the organization, such as personal care, health care etc. The next step of action was to set up Market Development Organizations (MDOs) to make sure that the company had a competitive advantage over the local firms and units. Global Business Services (GBSs) along with several corporate functions were executed. This practice led to the classification and allocation of more than 129,000 employees to four different verticals. This initiative was taken so that the management of the employees could be done with ease (Wolverhampton, 2017). Passerini was provided with the charge of GBS in the year 2003. IT capabilities and efficiencies of the organization were transformed as an outcome. Information and Decision Solutions (IDS) were the units that were set up and brought in action so that information sets could be handled in a better manner and the information organization could be done correctly. This also proved to be of a great aid in the analytics and decision making activities for the business executives. Bob McDonald was termed as the companys CEO and President in the year 2009. Bob further transformed the IT practices and laid a great emphasis on the IT capabilities. Technology is changing at a rapid pace and it is necessary that the organizations adapt to such changing face of technology. The senior leadership at PG adopted the idea of changing technology and data analytics including other technologies under the domain of Business Intelligence were adapted for better information management and analysis. The senior leaders and middle level managers worked together to enhance the technological capabilities. The company experienced increased profits and revenues as an outcome. The senior leadership that is engaged with an organization thus has a huge role to play in information organization, management and governance. The senior leadership carries out the tasks around activity monitoring along with control and evaluation. A number of verification and validation activities are carried out by the senior leaders in the form of reviews, inspections and walkthroughs. Such practices bring out the areas of improvements and the necessary changes that shall be made. The senior leadership in an organization is always aware about the organizational strategies, vision, mission, purpose and goals. There are several resources in an organization structure with resources deployed at different levels. The senior leadership is at the higher level in the structure and has the utmost clarity on the goals and business objectives. Also, in order to execute the changes that are highlighted, it is necessary to have the necessary authority and ownership for the same. The senior leadership has an authority to bring the steps in action and can also manage the resources in an efficient manner (Arma, 2011). PG could witness and experience the business gains due to the efficiency and capability of its senior leadership and management. The skill set of the senior leaders and their decision making abilities led to the enhancement of the organizational profits and also led to the higher customer engagement and satisfaction levels. Critical Analysis of the Organization on the Use of Is IT Organization Overview XYZ is a business organization that works in the domain of finance and provides financial solutions to its customers. The company has its headquarters in Sydney, Australia and is spread over five different locations in the country. The company currently has more than 260 employees in different departments and units. The company has made sure that the information sets are adequately managed and the latest technology is always adopted by the organization. There are numerous cloud services, social media platforms and likewise that are used and implemented in the organization. Cloud Infrastructure in the Organization Cloud computing is defined as a form of computing that utilizes the computing resources over the network for the execution of business operations and activities. There are various cloud services and platforms that have been developed for the execution of business tasks. XYZ Company has included a lot many cloud services and activities in its structure, such as cloud based database, digital market, cloud-based Customer Relationship Management (CRM) systems, cloud-based finance management and account management systems along with communication protocols (Iyoob, 2015). Cloud Delivery Model: Platform as a Service (PaaS) The company makes use of the cloud delivery model as cloud Platform as a Service (PaaS). This model is used in the business applications and development of the financial solutions for the clients making use of cloud resources and elements. This is the cloud model that provides the framework for the development as well as the customization of the business tasks and activities (Intel, 2013). The company carries out a number of business tasks and operations in terms of development, testing and many others. The use of the PaaS model in the organization leads to the simplification of the tasks and is also a cost-effective approach. The cloud vendors that the company works with include Amazon Web Services (AWS) and Microsoft Azure. These cloud vendors manage the operating system framework along with information storage and virtualization activities. The company also makes use of an enterprise PaaS solution so that a self-service portal is formed for the management and organization of the entire computing infrastructure. The model also works well with the private cloud deployment model that is used by the organization (Nasr and Ouf, 2012). The PaaS model provides a number of advantages to the company in terms of automatic updates along with the decrease in the costs. The model also provides the business organization with the necessary compatibility with the rest of the technical solutions and components that are used. Private Cloud Model The deployment model that is used in the company is the private cloud model. This model makes sure that the cloud services are securely used by the clients in the virtual environment. There is an enhanced control and privacy that is reflected in the business organization with the use of this model. This model also provides a number of benefits to the organization which are as listed below. The primary advantage that the cloud model provides to the company is the security of information and data sets. The model also offers the benefits in terms of dedicated resources along with firewalls and on-site resources. Enhanced control is another benefit that is offered by the cloud model to the organization as well as its resources. The tracking of the progress and the applications also becomes easy (Ibm, 2009). There are several resources that are engaged in the organization. Resource allocation is improved because of the cloud model and the availability of the resources does not appear as a challenge for the senior management and leadership (Gorelik, 2013). Application reliability is always maintained with the aid of virtual partitioning. Cloud Software - CRM Customer Relationship Management (CRM) is software that is used by the business organizations for better customer engagement and management of the customer data and information sets. There are several cloud-based CRM systems that are available in the market and the one that is used by the XYZ Company is the Salesforce CRM. This software is designed by Salesforce and it has provided XYZ Company with the capability to easily manage the customer data and information. There are several other benefits and features that are included in this software as automated analysis of the data sets, social media integration, improved workflows and improved customer engagement along with many others. The company has managed to gain benefits out of this CRM system due to the correct implementation of the software in the company. One of the essential activities that were carried out as the first step of implementation was the planning of the cloud-based implementation of Salesforce CRM. The step included the definition of the objectives along with the definition of the schedule and budget. The next step included the allocation of the roles and duties to the members of the project team. Stakeholder management was also carried out efficiently so that the stakeholders remained satisfied of the outcomes of the system. Salesforce CRM is a system that had to be customized as per the requirements of the organization. This was done with ease owing to the planned implementation of the software using the phased approach for the same. Setting up of the Key Performance Indicators (KPIs) was the next step and the Salesforce report builder was also used to keep a track of the progress. Maintenance and support activities were carried out as the final step of the implementation process. The use and implementation of cloud-based CRM has made sure that there are several advantages offered to the organization. The customers can easily contact the business organization in case they get stuck during the execution of a specific operation or activity. There are also other benefits that are offered in terms of improved customer relations and engagement. Social Media Platforms Social media has come up as an integral part of the business organizations in the present era. It has become mandatory to ensure that social media presence is made and is reflected to the stakeholders and the customers. There are also dedicated social media management teams that are being set up in the organizations for the management of social media platforms and networks (Modeus, 2013). XYZ Company also made sure that it included the social media platforms and networks in its business tasks and activities. There are numerous social media accounts, such as Facebook, Twitter, Instagram and likewise that have been set up by the company and are managed for a variety of different purposes, such as information sharing and handling, management of customer relationships along with marketing and advertising tasks. The social media networks that have been set up by the organization are managed by the social media management team that comprises of social media managers, social media advertisers, social media analysts and associates. These social media accounts are used by the company to make sure that the information is handled in a better way and there are maximum benefits that are gained out of the same (Cvijikj, 2011). The customer interaction has also improved as a result of the social media integration that is carried out by the organization along with speedy resolution of customer queries and complaints. Impacts on the Organization The company is making use of numerous information systems and technology in their architecture. There have been positive impacts of the same on the organization along with the emergence of a few points of concern. The implementation of these systems has led to the improvement of sharing of information along with the enhancement of the communication capabilities internally as well as with the external stakeholders. The enhanced communication and sharing has also allowed better employee integration and connection. The employees have gained the ability to immediately connect with their supervisors for guidance and resolution of the queries. The automated system has led to the enhancement of the decision making abilities along with the decision support activities. There are Decision Support Systems (DSS) and Management Information Systems (MIS) that have been implemented so that the senior management and leadership can take decisions quickly using the information and data sets that have been provided to them (Esmt, 2016). Big Data tools are also being used in the organization for advanced management and analysis of the data sets. There are huge clusters of data that are used by the organization on a daily basis. Big Data tools have provided the capability to make sure that these data sets are correctly organized and managed. These tools are integrated with other technical tools and applications as well. There have been a few negative implications of the information systems and technologies in the organization in terms of the security attacks and risks. The data sets that are associated with XYZ Company comprise of the financial and accounting details of the customers and employees along with the personal information of these entities. There are also details of the projects undertaken by the company along with the shareholder and stakeholder that is involved. The exposure of such information to the entities that are not authorized to view or modify them may lead to adverse impacts. There can also be legal obligations due to the occurrence of such cases. The company makes use of cloud-based services and applications, such as private cloud model, customer relationship management system and many more. There are also social media platforms and networks that are used. The attacks on such applications and the data sets that are associated with these applications can be dangerous for the or ganization. In case of XYZ Company, security is one of the aspects that needs to be enhanced for the organization. Possible Improvements Technology is something that is witnessing a constant change. There are new tools and technologies that are being developed on a daily basis and XYZ Company is also required to maintain pace with the same. There are changes and improvements that are required to be done in the infrastructure and the architecture along with the procedures and methodologies that are used for maintenance, management and deployment of the technology. The organization is spread over five locations and each of these locations has its own set up and resources. The employees that are engaged with these locations need to communicate and collaborate with the internal staff members along with the external stakeholders. It has been observed that there are cases of inefficient and ineffective communication that come up that lead to further issues. There are also issues in the networking infrastructure of the organization which can be improved. It is also necessary to make sure that the network integration is improved so that the resource sharing capabilities are improved. The company currently follows only the private cloud for the deployment of cloud services and applications. There are other cloud models that can be used, such as community and hybrid cloud models. These models provide a combination of public and private cloud models which provide the best of the both models. There are scenarios wherein it is necessary to use public cloud only. Hybrid cloud will provide the organization with the capability to use both. There are also numerous NoSQL databases that are available. Such databases shall be used by the organization in place of the SQL databases and MySQL databases. These databases will be easy to integrate with the Big Data tools along with the Business Intelligence tools. (He, 2014). The organization works on the finance solutions and services for the customers. The information category that is usually associated with such solutions and services is generally extremely critical in nature. The organization shall, therefore make sure that the security of the applications is maintained. There are new and improved security tools and controls that must be used and implemented in the organization (Utica, 2014). The security attacks can have extremely severe consequences on the information properties along with the customer trust in the organization. The occurrence of security events, such as denial of service attacks, attacks on information integrity, confidentiality, and availability may lead to legal obligations as well (Msb, 2015). There are many security controls that shall be used and implemented in the organization to avoid the security attacks and risks. There are numerous network-based security attacks that take place which shall be prevented and avoided by usin g the techniques as intrusion detection and prevention systems along with other tools like network monitors and scanners. This will provide the organization with the complete network activity being carried out. There are also other security tools that have been developed in the form of anti-malware and anti-denial tools. These tools shall be installed and implemented across the organization and all of the associated systems. Malware attacks and denial of service attacks will be avoided as a result. The use and application of such security controls will provide the organizations with the ability to avoid, control, detect and prevent the security risks and attacks. The further security attacks will also be avoided as a result. The Business Intelligence tools that are used in the organization shall also be further enhanced. There must be use of data analysis and data warehouse tools that must be used. This will allow the organization to understand the customer preferences and choices along with the estimation of the customer needs and demands. The level of customer satisfaction and the customer engagement will also rise with the use of such tools and technologies. Importance of Security in Information Management There are several properties of information that need to be managed and maintained. Some of these properties include security of information, reliability of information, information privacy etc. One of the most significant aspects of information is the security of information sets. There are different data sets that are used in the organization, such as public data sets, private data sets, confidential and critical data sets, sensitive data and many more. The organization works on the finance solutions and services for the customers. The information category that is usually associated with such solutions and services is generally extremely critical in nature. There are various forms of security attacks that may take place in the organization, such as denial of service and distributed denial of service attacks, media and message alteration attacks, information breaches and loss, information leakage, physical security attacks and likewise. These attacks can have a negative implication on the confidentiality, integrity and availability of the information along with a poor implication on the information security and privacy (Kissel, 2013). Also, the frequent occurrence of security risks and attacks leads to the deteriorated customer trust and satisfaction. The level of customer engagement may also come down as an outcome along with the legal obligation. The data sets that are associated with XYZ Company comprise of the financial and accounting details of the customers and employees along with the personal information of these entities. There are also details of the projects undertaken by the company along with the shareholder and stakeholder that is involved. The exposure of such information to the entities that are not authorized to view or modify them may lead to adverse impacts. There can also be legal obligations due to the occurrence of such cases. The company makes use of cloud-based services and applications, such as private cloud model, customer relationship management system and many more. There are also social media platforms and networks that are used. The attacks on such applications and the data sets that are associated with these applications can be dangerous for the organization. The employees that are engaged with the organizations are provided with access to the internal data and information sets and there is a great level of authority that is usually provided to the employees. There are insider threats and attacks that may take place that are given shape by the employees and such attacks have a great impact on the information security along with the reputation of the organization. This is because of the reason that employees may pass on the sensitive details to the competitors of the business organization which may be misused to gain a competitive edge in the market (Geant, 2010). There are many security controls that shall be used and implemented in the organization to avoid the security attacks and risks. There are numerous network-based security attacks that take place which shall be prevented and avoided by using the techniques as intrusion detection and prevention systems along with other tools like network monitors and scanners. This will provide the organization with the complete network activity being carried out. There are also other security tools that have been developed in the form of anti-malware and anti-denial tools. These tools shall be installed and implemented across the organization and all of the associated systems. Malware attacks and denial of service attacks will be avoided as a result. The use and application of such security controls will provide the organizations with the ability to avoid, control, detect and prevent the security risks and attacks. The further security attacks will also be avoided as a result. Disaster Recovery and Risk Management In order to make sure that the security of information is maintained, it is necessary to carry out risk management process as well. Such a process will make sure that all of the security risks and attacks that may be possible in the organization are identified in advance. There is a specific risk management process that shall be designed and identified. The risk management process must include risk identification, risk assessment, risk evaluation, risk treatment, risk control and closure. In such a process, all of the possible security risks from the areas of network security, information security, malware attacks etc. will be identified and assessed. The specific treatment strategies will also be mapped with the security risks that will be identified. However, in spite of all of the efforts and initiatives, there may be cases of security occurrence and attacks. In such cases, it would be essential to have a disaster recovery plan and policy in place. This policy and plan will comprise of the measures that shall be followed in case of a security attack to control the damage and minimize the downtime. The plan will comprise of the back-up tasks and processes that the organization must follow. In this manner, even if a malicious entity succeeds in capturing the data sets, the organization will have a copy of its information sets ready in advance. Similarly, the plan will cover the encryption and cryptography processes that shall be used and implemented in the organization for the control of the disasters and associated activities. Conclusion PG is a multi-national company that was set-up in the year 1859 and now operates in more than 180 countries all across the globe. Due to widespread operations, customer base and office units, there are huge clusters of data sets that PG manages on a per day basis. The senior leadership and management of the organization took several steps for adequate and efficient information governance and management. The senior leadership that is engaged with an organization has a huge role to play in information organization, management and governance. The senior leadership carries out the tasks around activity monitoring along with control and evaluation. A number of verification and validation activities are carried out by the senior leaders in the form of reviews, inspections and walkthroughs. Such practices bring out the areas of improvements and the necessary changes that shall be made. Cloud computing is defined as a form of computing that utilizes the computing resources over the network for the execution of business operations and activities. There are various cloud services and platforms that have been developed for the execution of business tasks. XYZ Company, a finance corporation, has included a lot many cloud services and activities in its structure, such as cloud based database, digital market, cloud-based Customer Relationship Management (CRM) systems, cloud-based finance management and account management systems along with communication protocols. The company carries out a number of business tasks and operations in terms of development, testing and many others. The use of the PaaS model in the organization leads to the simplification of the tasks and is also a cost-effective approach. The deployment model that is used in the company is the private cloud model. This model makes sure that the cloud services are securely used by the clients in the virtual en vironment. There is an enhanced control and privacy that is reflected in the business organization with the use of this model. Social media has come up as an integral part of the business organizations in the present era. It has become mandatory to ensure that social media presence is made and is reflected to the stakeholders and the customers. There are also dedicated social media management teams that are being set up in the organizations for the management of social media platforms and networks. There are various forms of security attacks that may take place in the organization, such as denial of service and distributed denial of service attacks, media and message alteration attacks, information breaches and loss, information leakage, physical security attacks and likewise. These attacks can have a negative implication on the confidentiality, integrity and availability of the information along with a poor implication on the information security and privacy. The organization must make use of the security controls and risk management strategies for avoiding the same. References Arma (2011). Senior Leadership Imperative to Information Governance Success. [online] Arma.org. Available at: https://www.arma.org/r1/news/newswire/2011/07/27/senior-leadership-imperative-to-information-governance-success [Accessed 26 Nov. 2017]. Cvijikj, I. (2011). Social Media Integration into the GS1 Framework. [online] Available at: https://cocoa.ethz.ch/downloads/2013/05/1230_AUTOIDLAB-WP-BIZAPP-058.pdf [Accessed 26 Nov. 2017]. Esmt (2016). The Evolving Role of Information Systems and Technology in Organizations: A Strategic Perspective. [online] Available at: https://www.esmt.org/sites/default/files/peppard-c01.pdf [Accessed 26 Nov. 2017]. Geant (2010). Information Security Policy. [online] Available at: https://services.geant.net/sites/cbp/Knowledge_Base/Security/Documents/gn3-na3-t4-ufs126.pdf [Accessed 26 Nov. 2017]. Gorelik, E. (2013). Cloud Computing Models. [online] Web.mit.edu. Available at: https://web.mit.edu/smadnick/www/wp/2013-01.pdf [Accessed 26 Nov. 2017]. He, X. (2014). Business Intelligence and Big Data Analytics: An Overview. [online] Available at: https://core.ac.uk/download/pdf/55334437.pdf [Accessed 26 Nov. 2017]. Ibm (2009). The Benefits of Cloud Computing. [online] Ibm.com. Available at: https://www.ibm.com/ibm/files/H300444G23392G14/13Benefits_of_Cloud_Computing_634KB.pdf [Accessed 23 Nov. 2017]. Ico (2014). Information governance strategy 2014-16. [online] Available at: https://ico.org.uk/media/about-the-ico/policies-and-procedures/1043029/information-governance-strategy-2014-2016.pdf [Accessed 26 Nov. 2017]. Intel (2013). Virtualization and Cloud Computing. [online] Intel.com. Available at: https://www.intel.com/content/dam/www/public/us/en/documents/guides/cloud-computing-virtualization-building-private-iaas-guide.pdf [Accessed 23 Nov. 2017]. Iyoob, I. (2015). Cloud Computing Operations Research. [online] Available at: https://www.columbia.edu/~ad3217/publications/cloudOR.pdf [Accessed 26 Nov. 2017]. Kissel, R. (2013). Glossary of Key Information Security Terms. [online] Available at: https://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf [Accessed 26 Nov. 2017]. Modeus, G. (2013). Social media - Integrate it and perform better?. [online] Available at: https://www.diva-portal.org/smash/get/diva2:632477/FULLTEXT01.pdf [Accessed 26 Nov. 2017]. Msb (2015). Strategy for information security in Sweden 2010 2015. [online] Available at: https://www.msb.se/RibData/Filer/pdf/25940.PDF [Accessed 26 Nov. 2017]. Nasr, D. and Ouf, S. (2012). A Proposed Smart E-Learning System Using Cloud Computing Services: PaaS, IaaS and Web 3.0. International Journal of Emerging Technologies in Learning (iJET), 7(3). Utica (2014). The Need for Security. [online] Available at: https://www.utica.edu/faculty_staff/qma/needforsecurity.pdf [Accessed 26 Nov. 2017]. Wolverhampton (2017). Information Governance Board Definitions, Roles and Responsibilities. [online] Available at: https://wolverhampton.moderngov.co.uk/documents/s4114/Appendix%20B%20-%20Information%20Governance%20Board%20Definitions%20Roles%20and%20Responsabilities.pdf [Accessed 26 Nov. 2017].