Saturday, December 28, 2019

A Very Brief Biography of Nelson Mandela - 1229 Words

On July 18th, 1918, the powerful and praiseworthy Nelson Rolihlahla Mandela was born in Transkei, South Africa into the royal family of the Xhosa-speaking Thembu tribe. From an early age, Mandela demonstrated his passion for fighting for the rights of his people. He was greatly inspired by the stories he heard about his ancestors during their times of struggle. It is through determination and dedication that Mandela accomplished many of his goals including an end to apartheid. In fact, Mandela received a Nobel Peace Prize for this outstanding achievement. However, his journey was not simple, for the heroic and moral leader faced difficult struggles and had to make compromises throughout his lifetime. When Mandela was only nine years old, his father, Hendry Mphakanyiswa, who served as the chief of the tribe, died. As a result, Jongintaba Dalindyebo, another member of the Thembu tribe, adopted Mandela. Mandela was the first member in his family to receive a formal education and attended primary school in Qunu where his teacher Miss Mdingane gave him the name Nelson, implementing the tradition where all students received â€Å"Christian† names. He completed his Junior Certificate at Clarkebury Boarding Institute and went on to Healdtown, a Methodist secondary school. There, he excelled in boxing, track, and academics. Nelson Mandela then continued his studies at the University College of Fort Hare, the only western-style advanced institute for South African blacks at the time.Show MoreRelatedNelson Mandelas Leadership4907 Words   |  20 PagesMANDELA’S LEADERSHIP June 6, 2012 TITLE PAGE CAUCASUS UNIVERSITY CAUCASUS SCHOOL OF BUSINESS COURSE TITLE: Developing effective leadership skills COURSE CODE: MGS-3211 INSTRUCTOR: Dara Ahmed GROUP PRESENTATION: N1 PRESENTATION TITLE: NELSON MANDELA’S LEADERSHIP GROUP MEMBERS: Tamar Geladze DATE: 6th of June, 2012 12 Page 2 NELOSN MANDELA’S LEADERSHIP June 6, 2012 TABLE OF CONTENT TITLE PAGE...........................................................................Read MoreEssay about Nelson Mandela’s Childhood Defined His Identity3002 Words   |  13 PagesThe life of Nelson Mandela is an interesting example of this ideology. In his case, the connection between childhood and life is special and goes even further than the first instinctive connections that often come to mind. When one examines the interesting details the childhood of Nelson Mandela, one is compelled to conclude that Nelson’s Mandela childhood environment fashioned his politics. In order to understand fully how the childhood environment of Nelson Mandela fashioned hisRead MoreThe Theory Of Multiple Intelligences1889 Words   |  8 PagesThis essay will evaluate the theory of multiple intelligences in relation to Nelson Mandela; it will be split into three main sections. Firstly, explaining the theory of multiple intelligence as a whole, then giving a brief biography of Nelson Mandela and his life achievements. Finally, I will focus in more detail on one particular category of intelligence in Gardner’s theory; interpersonal intelligence. One of the multiple intelligence s stated by Gardner s theory. This part of the essay willRead MoreThe Union Of South Africa1986 Words   |  8 Pagesvaluable sources that are going to be used to explore this are Nelson Mandela’s illustrated Long Walk to Freedom , and the article â€Å"The Union of South Africa† created by the South African History Online (SAHO). The illustrated Long Walk to Freedom: The Autobiography of Nelson Mandela: This source is Nelson Mandela’s autobiography, and follows his life from his birth in 1918 until the South African elections in May 10 1994 . Nelson Mandela began writing it in 1974 during his imprisonment on Robben IslandRead MoreIs Sports Just A Proxy For Politics?1886 Words   |  8 Pagessports for over a century. One of the first African Americans to encounter this unfavorable behavior was Jesse Owens, a 1936 Olympic gold medalist in Berlin. â€Å"Hitler’s enactment of the games was largely intended to showcase white supremacy, and the very presence of a successful black athlete was a threat† (Taha). The United States disregarded Hitler’s views and sent Jesse Owens to the 1936 Berlin summer Olympics, in spite of Hitler’s white supremacy laws. After Jesse Owens won several gold medalsRead MorePatriotism and People Who Commit Acts of Civil Disobedience Essay2107 Words   |  9 Pagesseems as if the citizens have no right to disobey laws that they know to be unjust. Yet by this measure, the heroes of the past such as the American colonists, abolitionists, women’s suffragists, Gandhi, Martin Luther King Junior, Rosa Parks, and Nelson Mandela would be little more than common criminals. All of these heroes broke the law in the name of a greater justice, and today all of them are revered as being the most patriotic of all people. The attribution of patriotism to people who commit actsRead MoreA Journey Comparative Book A New Dawn Has Broken 1490 Words   |  6 PagesVictory. Tony Blair ended two decades of Conservative Party rule campaigning for New Labour. A Jo urney by Tony Blair accounts for his time as Labour leader and Prime Minister of Great Britain. As Tony Blair states in the introduction of the book, his biography is not a memoir. It is instead Blair s personal reflection of history occurring around his surroundings during his term. Tony Blair is depicted here as not only a politician, but as a family man, explaining some events not occurring in his politicalRead MoreReading Lolita in Tehran as a Critic to the Changes in the Education System During the Revolution2374 Words   |  10 PagesReading Lolita in Tehran as a critic to the changes in the education system during the revolution â€Å"Education is the most powerful weapon which you can use to change the world.† Nelson Mandela Introduction Although â€Å"Reading Lolita in Tehran† is classified as a memoir which by definition is â€Å"a special kind of autobiography, usually involving a public portion of the author’s life as it relates to a person, historic event,Read MoreBook Review Success Built to Last3070 Words   |  13 Pagescreativity, thus they are compelled to try and introduce something new. They are simply the people who tried to make a difference and they succeed. The first element Meaning is discussed in Part I which is comprised of 3 chapters. The following are the brief summary of each chapter in Part I: Chapter 2 (Love it or Lose it – Passion and the Quest for Meaning), relates a harsh truth that of an individual does not love what he/she does, he/she will lose to someone who does. A person who is not half-heartedRead MoreCoco Cola18335 Words   |  74 Pageswith yellow caps, this variant can be found in some areas of the US around April.[10] Risks arising from over-consumption[edit] In the February 2010 death of a 31-year-old New Zealand woman, the coroner concluded were it not for the consumption of very large quantities of Coke by Natasha Harris, it is unlikely that she would have died when she died and how she died; Harris was found to have suffered from  hypokalemia  and had an  enlarged liver, and  deposits of fat  within the liver, which pathologist

Friday, December 20, 2019

Student Athletes And Physical Education - 1604 Words

It is often discussed whether or not it is fair that student athletes have to take physical education in order to graduate. Envision a student who does very well in school and would like to take advanced placement or running start classes in order to better prepare themselves for college. This student, however, cannot take these classes because he or she has to take physical education, a gradation requirement, and does not have the schedule flexibility to fit both classes in. Almost every school in the United States requires students to take physical education in order to graduate. Since physical education is a requirement, students are not able to take important advanced placement or running start classes. Should students who are involved in athletic extracurricular activities be required to take physical education in order to graduate? Physical Education is a course that became popular within public schools during the 1950’s. It was a fun class that students could include in their schedules to give them a â€Å"play time† during the school day. As time went on, the true benefits of the class became more and more obvious. Physical education wasn’t just a nice break in the day for students anymore, it was a time for them to exercise and stay physically active to keep them healthy. As the benefits of physical education were further noted, the course started becoming mandatory throughout our country’s school systems. Every school’s curriculum is different when it comes to how manyShow MoreRelatedExempt Student Athletes from Physical Education Essay614 Words   |  3 PagesSchool sports have the same purpose as regular physical education classes; they both ensure to stay healthy and help students exercise. If thats the case, many student-athletes are wondering why they need a physical education class in high school. Student athletes should be exempt from physical education classes because less chance of injuries and instead have the choice to take other course electives. Many student athletes including myself wonder why we have to take a P.E. class especiallyRead MoreThe Effects of Athletics on Student Performance Essay1302 Words   |  6 PagesAmerica, approximately 55% of students participate in extracurricular sports activities. (Koebler, Jason. High School Sports Participation Increases for 22nd Straight Year. US News. U.S.News World Report, 02 Sept. 2011. Web. 03 Dec. 2013.) Academic performance, popularity, and physical fitness are all directly affected by involvement in athletics. Overall, and contrary to popular belief, those students who participate in athletic activities often have higher physical, mental and emotional abilitiesRead MoreImplied Curriculum: Physical Education for All Students935 Words   |  4 PagesPhysical education is a component of the American education system about which politicians, administrators, doctors, and others frequently debate. Some see it as an integral part of a student’s education - a part that is often underemphasized due to time and budget constraints. Others see it as a non-essential, indicating that a student’s academic day should not be interrupted with something as non-academic as sports (Pill, 2012). In fact, currently only 2.1 percent of high schools provide the nationallyRead MoreWhat Should P.e. Be?1439 Words   |  6 Pages Adam Cain Kinesiology 10/6/2015 What Should P.E. Be? A Physical Education teacher has the responsibility of promoting physical activity safely inside and outside of school. The safety of the students performing the physical activities directed by the instructor is important to prevent injuries. The PE teacher must instruct his or her students on how to correctly perform correct techniques when performing athletic exercises or sports. Preventing major andRead MoreThe Importance Of High School Sports On Education1247 Words   |  5 PagesHigh School Sports and their mark on Education Each and every year, millions of students will participate in high school sports. In the same year, there will be millions of people questioning whether or not sports will benefit the students education. â€Å"The number of participants in high school sports increased for the 25th consecutive year in 2013-2014 with a record total of almost 7.8 million, according to the annual High School Athletics Participation Survey conducted by the National FederationRead MoreHealth And Performance Effects Of Alcohol Use By Intercollegiate / Varsity Athletes1232 Words   |  5 Pagesintercollegiate / Varsity athletes? Alcohol is the most commonly used recreational drug globally and its consumption, often in large volume, is deeply embedded in many aspects of Western society . It is used by members of all societies in countries around the world, either consumed moderately or in excess. University is a place in one’s life when those who have just finished secondary school go to experience a higher quality of education. Some of these students enter university as student-athletes, playing sportsRead MoreLink between Sports and Academics846 Words   |  3 Pagesreasons the community should work together towards a healthy educated country by making physical education classes in schools and universities mandatory and encouraging students to be athletes. First, physical activity reduces chances of health problems and increases proper brain functioning. In fact, a recent survey, which was made by the local government, indicates that students who participate in physical fitness programs or any kind of annual sport meet are found to be physically and mentallyRead MoreSports and Academic Achievement1494 Words   |  6 PagesStudents that participate in athletics have greater academic success than students who do not participate in athletics. Central Michigan University April 24, 2012 Abstract Many studies have been done regarding the positive impact that athletics has on a student’s life. Studies have looked at the physical impact that athletics has on a student’s life like sportsmanship, healthy lifestyle, discipline, strategy, and time management. We will be looking at studies that have explored the impactRead MoreAthletics For A Majority Of The Student Population1616 Words   |  7 PagesAthletics in Education Athletics, for a majority of the student population, provides a very meaningful experience in education. People that participate in athletics will have better self-esteem, social confidence, and more academic achievement. Participating in an athletic program will help the student contribute to the school community, which will help them identify with school values. One factor that may be overlooked in the participation of sports is that it helps students have better physical healthRead MoreThe Effects Of Athletic Participation On Academic Performance1571 Words   |  7 PagesThe purpose of the literature review was to determined the effects of athletic participation on academic performance and if there were differences between the male and female athletes of the Mennonite High School. In order to determine whether participating in sporting events have an impact on the student’s academic performance, the researcher collected existing data during the sport season period, the re the participants’ assessment grades (AG) were calculated. These scores were compared with the

Thursday, December 12, 2019

Harry Chapin poetry essay Example For Students

Harry Chapin poetry essay Cats in the Cradle Poetry Essay chose this song as my poem for my project because I felt Like the story that it tells Is common in todays society. I liked this song because although it is sad, it has an upbeat and very catchy chorus that has deeper meaning. With many songs of today, they sacrifice deeper meaning for catchy lyrics that dont really mean anything. I think this song Is about a man that has a son but Is very busy with work and never has time for the son. The son keeps on saying that he is going to be just like his father ND as he gets older, the son begins to have no time for his dad. This is a very sad song but I enjoyed that Harry Chapin was able to tell this story in such a creative way. Harry Chapin uses multiple literary devices In the song Cats In the Cradle. One literary device would be foreshadowing. Foreshadowing Is used when the little boy says, Im goanna be like you dad, you know Im goanna be like you. In the end of the song the son is always too busy to spend time with his dad just like the dad was too busy to spend time with the son. Foreshadowing Is used when the son told the dad that hes going to be the same as him. In the end this comes true. A second literary device that Chapin used was symbolism, when Chapin says, Little boy blue and the man on the moon he is using symbolism to refer to the son and the dad. These two symbols have multiple meanings. The little boy blue is the son and the little boy blue comes from an old nursery rhyme. In the nursery rhyme Is says little boy blue come blow your horn. I find that the son asking his dad to spend time with him is the little ay blue blowing his horn and trying to get attention. The father is seen as the man on the moon. I believe that the father is symbolized as the man on the moon because he is constantly traveling and never has time to spend with his son. Astronauts are gone from their fearfulness for months at a time and this Is how I find Harry Chaplin relates the dads constant business trips to. This song tells of a father and son who cant schedule time to be with each other, and its a warning against putting your career before your own family. The verses tell a story of a father with his newborn son. Although the dad gets the necessities of raising a child accomplished, he doesnt allow himself to put in quality time with his son because of his career. This seems like no big deal because of his life working and paying bills. Over time, both father and son change roles. The father realizes his sons ambitions and goals of college, grades, and driving and wants to spend more time with him. But realizes that now his son has no time for him. In the last verse, the son is all grown up with a job and kids f his own. We see that the son has no time to spend with his father. Sadly, dad realizes that his boy has become Just like him. This song is based on a poem that Hardys wife Sandy wrote. Harry Introduced the song at all his concerts and said, This is a song my wife wrote to zap me because I wasnt home when our son Josh was born. It took the birth of his son for Harry Chapin to decide to turn the poem into a song. Harry Chapin poetry essay By Suitabilitys I chose this song as my poem for my project because I felt like the story that it tells is his song is about a man that has a son but is very busy with work and never has time for the son. .u27240a0c41961e040ef59bf224fdce02 , .u27240a0c41961e040ef59bf224fdce02 .postImageUrl , .u27240a0c41961e040ef59bf224fdce02 .centered-text-area { min-height: 80px; position: relative; } .u27240a0c41961e040ef59bf224fdce02 , .u27240a0c41961e040ef59bf224fdce02:hover , .u27240a0c41961e040ef59bf224fdce02:visited , .u27240a0c41961e040ef59bf224fdce02:active { border:0!important; } .u27240a0c41961e040ef59bf224fdce02 .clearfix:after { content: ""; display: table; clear: both; } .u27240a0c41961e040ef59bf224fdce02 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u27240a0c41961e040ef59bf224fdce02:active , .u27240a0c41961e040ef59bf224fdce02:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u27240a0c41961e040ef59bf224fdce02 .centered-text-area { width: 100%; position: relative ; } .u27240a0c41961e040ef59bf224fdce02 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u27240a0c41961e040ef59bf224fdce02 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u27240a0c41961e040ef59bf224fdce02 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u27240a0c41961e040ef59bf224fdce02:hover .ctaButton { background-color: #34495E!important; } .u27240a0c41961e040ef59bf224fdce02 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u27240a0c41961e040ef59bf224fdce02 .u27240a0c41961e040ef59bf224fdce02-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u27240a0c41961e040ef59bf224fdce02:after { content: ""; display: block; clear: both; } READ: West Indian Poetry Analysis EssayThe son keeps on saying that he is going to be Just like his father Harry Chapin uses multiple literary devices in the song Cats in the Cradle. One literary device would be foreshadowing. Foreshadowing is used when the little boy song the son is always too busy to spend time with his dad Just like the dad was too busy to spend time with the son. Foreshadowing is used when the son told the dad comes from an old nursery rhyme.

Wednesday, December 4, 2019

Emerging Technologies and Innovation (Information Technology)

Question: Discuss about the Emerging Technologies and Innovation (Information Technology). Answer: Introduction: The interaction of the individuals over the social networking sites is on continuous increase. The people are more or less always connected with the help of the social networking sites. These social networking sites are used by the individuals for various purposes, either for the business purpose or for the purpose of communicating with other individuals over the personal matters. The users today are enjoying the facilities of remaining in contact with each other at any point of time and even if they reside at any place. For the people in the earlier days it had been a wonder to stay in touch with each other when they are residing in different countries or territories. The innovations and the new inventions made by the emerging science and technology led to the emergence of the software and the related sites that started making the connections among the individuals for various purposes much more smooth and easy that can be done within a few seconds (Feng et al. 2014). The social networking sites such as Twitter, Facebook , Flickr, MySpace, and other messaging sites such as the mobile messengers that can be used through the mobile networks are gaining more and more popularity among the Internet users (Cheminod et al. 2013). The Internet users are very much engaged in utilizing the advantages of such networking media. The sharing of the data has now turned to be a broad application and one of the essential parts of everyday life. People nowadays or rather in todays digital world cannot think of leading their lives without the presence of such social networking sites, at every stance, or rather at every moment they are in need of remaining connected or on line via the medium of such data. The popularity and increasing usage of the data sharing allow the real time communication among the users, they allow instant messaging as well as internet calling among the users even though they reside at different locations. The users of the OSN or the online soc ial networking sites, such as Facebook, Twitter, Instagram, MySpace are able to share the required information or data very easily. These social networking sites provide the spaces to the people through which they can easily carry connect with the people who are unknown to them and can develop new contacts. However, this act of enjoying the anonymous communication or sharing the data privately can lead to various disadvantages. There always remains a risk of the data getting hacked by the internet hackers or when such data will be exploited for the adversarial actions, as for instance when the individuals make an access to the private network without any legal permission and share the data in an illegal manner by the means of profiling the owner of the data whose private information is breached by such adverse action(Galliers Leidner, 2014). The digital world today has given rise to many advantages and the people can receive many valuable data regarding a plethora of aspects, people nowadays hardly need to wonder or rack their brains for searching any meaning or any information. The presence of Internet and all the kinds of informative software applications have made it quite possible. However, the use of the online social networking sites for the purpose of communicating with the help of the messengers in Facebook, chats, hangouts, MySpace, Twitter and many other applications or networking sites, have brought to the forefront many privacy issues as these networking sites always remain susceptible to diverse risks such as the leakage of information, corruption of data and also the breach of privacy (Li et al.2012). The information, thus, which is shared by the individuals engaged personally and the data shared by the corporate sectors for the need to be kept safe and secured from being illegally exploited. The corporate business sectors possess a great necessity of preserving their information related to the business interests. Therefore, the organizations save their critical information with the help of the International Standard known as the Information Security Management system (ISMS), thereby preserving the vital data from security discloses. An ISMS is the security system that uses the ISO standards in order to protect the privacy and confidentiality of the critical information (Hill et al. 2014). Significance of the study: The major purpose or the importance of this in depth study is to acquire the required information from the studies made earlier regarding the similar topic and to integrate the similar information acquired with that of the opinions that he himself possess and thus, in the process, make the readers understand and get knowledge about various aspects of the online social networking sites and the issues related to the maintenance of privacy of the communication that is conducted with the help of the means of such social networking sites. The report has attempted to undertake an in-depth study of the Industrial Control Systems (ICS) that is used for protecting the safety of the information related to the public infrastructures that is very vital for the country. The researcher thus gives information about all the security measures and standards that can be adopted and are usually adopted by the companies both the private and public sectors in order to secure the privacy of the information and most important data (Hahn et al. 2013). Specific aims of the Report: ISMS can easily protect the information and retain the privacy of certain matters; however it is not taken to be much suitable for the purpose of tackling the critical information. Although ISO 27001 marks the infrastructure of the ISMS, and it can save the privacy of the general information systems and can be implemented easily, it cannot provide the safety that is needed by the infrastructure owners of IC, who therefore actually follow the safety standards of IEC 61508 and IEC 61511. Therefore, as a result, for the maintenance of the confidentiality, availability, security and privacy of the entire information systems or the ICS a new Information Security Management System is required to be developed (Lees 2012). Therefore, the purpose of this report is to identify a new model SNSM for anonymous communication schemes in social network Security model after studying the standards such as the ISO, NIST SP 800-53s and the IEC 61511 standards. Thus, the researcher in this pursuit will deal with the following aims that would help in conducting the study or the research: To identify the importance characteristics of the anonymous communication schemes in the social network To find out the processes by which the security and privacy are working in the anonymous communication schemes in the social network To study and identify the security control or requirements of three international standards, namely, IEC 61511, NIST SP 800-53s and ISO Thus, the researcher would try to deal with the above aims and conduct the study in order to know the probabilities of designing a new system of Information or a new model that can help in the preservation of the data sharing (Wirth et al. 2016). Issues (Problem Statement): In this very section the researcher will provide the readers an in-depth study about the feature of the communication systems, the modes of data sharing and several other aspects regarding the importance of security in the communication systems. Through the collection of information about different aspects related to the topic from the secondary data sources the report would make the readers aware of each aspect through a profound and thorough study of the issues (Chretien Kind, 2013). The issues that usually arise are regarding the exposure of the identities of the users who may not like to get their real identities revealed, however, by default some of the social networking sites or websites may require the users to reveal their true identities for the sake of creating their profiles in those online social networking sites. Such privacy issues affect largely the perspectives of various users to use those sites for conducting certain important communication or work. Thus, two major issues can be identified based on this present scenario of privacy concerns. These two issues entail the identity of the users and the anonymity of the users. The users after revealing their true or real identities in the social networking websites get an exposure and their profiles or the accounts formed in such sites become known by other users too. Now, often it may happen that the hackers or the attackers of the privacy of the profiles with help of search engines try to index the ac counts of certain users if they are the users of a common social networking site. This in turn enables the hacker of the accounts to find the information about the victims or the users with the help of the search results, and thereby expose the anonymity of the users of such social networking websites or applications. There are other ways too which can be used by the attackers, namely the Neighborhood Attack and De-Anonymization attack, for the purpose of accessing the privacy of the profiles of certain users (Rock et al. 2013). Literature Review: This section would deal with an in depth study related to the International standards that are adopted by the business organizations in order to protect the breach of the private and vital communication. Through this section the readers will become aware about the importance of such international standards that are implemented by the companies as well as the significance of safeguarding the security of such information that takes place among various organizations and among the individuals regarding the personal issues. With the help of the secondary data sources this report will try to answer and deal with the identification of the features of the anonymous schemes, the incorporation and the issues related to such incorporation of the ISO, NIST and IEC and the explanation of their models finally would also inform about the solutions to such issues that can ensure the permanent safety of the social networking sites from the online hackers. The researcher in this section of the report would make a combined study by taking in consideration the studies conducted by previously by other researchers and also by integrating with it the researchers own views (Litt, 2013). Introduction and Application of the International Standards (ISO 27001, NIST SP 800-53, IEC 61511) and the issues related to them: (Model Explanations) ISO 27001: These international standards form the basis for the management of the security of the professional or corporate data as well as they are capable for safeguarding the personal information. ISO is one such International standard.ISO is the International standard that can be termed as the determination for the security of the data in the administration framework. This standard has proved to be very useful in protecting the information or the privacy of the organizations and thereby it can be termed as the information security management system of the organizations. This security management system had replaced the BS 7799 part 2. Although this standard has proved to be very useful for the business organizations, it cannot be used by the organizations for the authorization of the particular information and security controls, the reason is that wide ranges of organizations use this international standard. This standard enables the organizations to preserve the privacy of the assets, such as the financial data, details of the users as well as the details of the third parties. The certification to the ISO is possible for the organizations as per the set standards of the security management, but it is not mandatory (Kass-Hout Alhinnawi, 2013). NIST SP 800-53: NIST or National Institute of Standards and Technology is one such international standard that forms one of the parts of the particular publication series that is the 800 series; it helps in dealing with the programs in the risk management series or framework that deal with the security control. This international standard helps in providing the U.S. federal information systems a catalog of security controls. This standard aid the federal agencies in the incorporation of the Federal Information Security Management Act of 2002, so that the companies or the federal organizations can manage the cost effective programs in order to preserve or save their information systems and the data sharing that is done for conducting the communication with other parties. The special publication of NIS that is known as the Guide for Assessing Security Controls in Federal Information Systems and Organizations enable the evaluation of certain security control measure in order to identify what will be th e correct modes of the security controls. This is undertaken for the sake of protecting the privacy of the information of the families, individuals and other organizations and the nation. NIST is also known as the NIST special publication, which deals with the assortment of some of the fundamental set of baseline security controls that are used to recommend the security control measures for the federal information systems and organizations (Vyrynen et al. 2013). The fourth version of the NIST had taken a more holistic and different approach by hardening the systems with the help of applying the new forms of architecture in order to safeguard the information systems from the cyber attacks. It has been observed by many that the NIST is more concerned with the check box compliance rather than the actual security (Wirth et al. 2016). Many issues have reported against the security control measures of the NIST SP 800-53 or more probably the revised version 4. It has been observed that this version of the NIST is making the companies too much contended regarding the security of their information systems. It has been also reported that the mechanisms used by the NIST are not that much new and are rather obsolete, and therefore very less time is spent in solving the issues regarding the security control. Many companies even after the incorporation of the NIST SP are not that much safe as they are still vulnerable and are on the verge of being attacked by the cyber attack (Vyrynen et al. 2013). IEC 61511: IEC 61511 is another technical international standard that has been applied by many organizations for the preservation of the information related to the instrumentation of the firm. The firm incorporates IEC 61511 in order to protect the engineering systems of the companies and the information related to them. This international standard adapted by the organizations in order to analyze the probable risks and in order to ensure the certification of the SIS or Safety Instrumented Systems. This is for increasing the security controls among the users of the online social networking sites. The companies those adapt the IEC 61511 for the protection of the information or more precisely for the reduction of the risks undertake the Certification of Compliance with the IEC 61511, because this is very much important for the Process Industry Segment. The companies for the reduction of the risks use this particular technical standard, the risk reduction is set as the major priority by the IEC 615 11. Many critics or scholars such as Rahman and others have opined that for the purpose of the reduction of the risks there should be a graph in the facebook in order to design and assure a photo-based authentication that will preserve the privacy of the users by reducing the risks. Some other critics or researchers like Zhou have proposed that for the sake of maintaining smooth communication throughout the indirect social relationships via the media of the online social networking sites, there should be the introduction of the holographic encryption. This will also allow the free access of the resources throughout such indirect social relationships; however, there need to be exclusive information about the third party who is the owner of the resources (Jkl Berki, 2014). IEC61511 is very much useful in assuring the companies regarding the provision of the safety functions, reduction of the risks at every step and thereby the protecting the information systems of the organizations and management of the functional safety through the proper evaluation of the risks (Schumacher et al. 2013). However, there are some of the issues that challenge the proper execution of the IEC 61511 in the organizations. One of those issues is that IEC is that the there remains many steps in the process of the implementation of the IEC 61511, which make the entire process lengthy, that is the SIS design cycle becomes lengthy. Therefore, it requires very well planning and proper scheduling of the entire methodology of the application of IEC 61511, so that the SIS design cycle can be well managed to rescue it from the involvement into more critical dimensions (Jkl Berki 2014). Need for an advanced approach for securing anonymous communication scheme for social networking: Importance of Security in Anonymous communication scheme in social networking: In accordance with the opinions of the critics namely Danezis and Mittal, the use of layered encryption is very much needed for receiving the full control over the members of the online social networking sites, such as the facebook, MySpace and Twitter, etc. This is because the encrypted keys will be able to utilize to encode the information of the manager or the actual owner of the data. This will in turn ensure that the other users or the members of the online social networking sites are not able to get an access to the data and thereby the privacy or the safety of the data is conformed. It has been observed that among all other social networking sites, it is Face book that has the provisions for safeguarding or rather encrypting the real data by the process of filtering the whole of the URL that is able to connect the users to the website that is peripheral. Many critics or researchers have stated that Face book is able to provide warning to the users when they are on the verge of clicking on any website that is completely a fraudulent one. If the users are not warned about the fraudulence that is carried out by the hackers of the profiles and the information contained in the accounts or the profiles of the victims, the users will be always at loss and they may continue using the unknown websites, thereby falling victims to the traps of those hackers. The users of the face book may not remain aware of such fraudulence messages or the websites and therefore in such a case the user can compress the continue button or can click on the cancel button. Therefore, the concept or the aspect of the security is applicable to both the anonymity and the security of the data sharing through the online social networking sites (Hill et al. 2014). Significance of the Privacy in Anonymous Communication Scheme in the Social Networking: The owner of the data should be very much aware of the need to preserve the privacy of the data and therefore the owner of the data should undertake the execution of the privacy preservation configuration whenever there is a need to share the personal data (Bennett et al. 2015). Thus, the privacy preservation scheme by the medium of the well-managed revocation of the online social networks is the major concern of todays digital world. The privacy of the data of an OSN user is the liability of the user or the owner himself. The owner of the data possesses the exact control over the pictures, videos, and other copyrighted materials and the owner of the data is himself or herself responsible for the revelation of the information that is contained in his or her profile (Li, 2014). It is usually presumed that the information contained in the profile of a particular user is private and safe with the owner in case of Face book or Twitter or any other such online sites. However, in reality t he other members of the group who are there in the contact list of the owner are aware of the personal details of each other. The OSN applications such as the Facebook and the Twitter are not at all the anonymous online applications because these are such applications that require the users to reveal the identity of the users while signing in and opening their profiles. Thus, it is quite visible and evident that the privacy that is assumed to be maintained by the users regarding their profiles are actually show or reveal the information or the identity of the users through the means of the photos or the video that are uploaded by the users (Knapp Langill, 2014). Value or the Significance of the safety in the Anonymous Communication Scheme in Social networking: There is a tremendous need for the safety of the anonymous communication as such communication and the data related to such communication suffer positive or the passive and active attacks in the ad-hoc network routes (Feng et al. 2014). In case of the passive attacks, the intruder is not able to adapt the message stream and thereby the invader cannot perform any such function, this makes the invader incapable of making disrupting the function of the routing protocol (Roman et al.2013). Therefore, theses are attacks are the passive attacks. On the other hand, the attacks become active when the flow of the data is prevented as well as degraded. The active attacks delete the data as well as modify the data. In accordance with the critics and the researchers like Pishva and Hoang, besides these active and passive attacks, there are also the intersection attacks as well as the predecessor attacks and time attacks (Roman et al. 2013). Solution to the issues: The issues that have been identified with regard to the communication and sharing of the data among the users of the online social networking sites as well as the issues or the problems that cause hindrances during the installation or application of the International standards by te companies also have certain solutions. The solutions can be the following: Anonymity via Virtual Private Network (VPN) - This is the higher mode of the security control that helps in solving the problem of the proxy (Valente, 2012). The usage of the Virtual Private Network enables the encryption of the information or the data sent from the PC of the clients and then the information is again sent to the server of the VPN through the VPN tunnel that remains secured (Guerrero et al. 2013). The major strength of the Virtual Private Network is that the information packets that are sent from the source or the Pc of the clients remain encrypted and then are decoded after reaching the servers through the VPN tunnel. The hackers will try to retrieve the privacy of the data shared between the source clients and the servers and this will be done through the decrypting of the message after hacking the security key of the VNP (Knapp Langill, 2014). Preservation of the anonymity by the use of TOR (The Onion Router)- Here comes the another method that would help in the protection of the privacy of the data that is shared among the individuals for the sake personal matters and among the business organizations. This can be presumed to be one of the best modes as it helps in the transmission of the fully unique and safe encrypted information to the destination clients. This is because the messages that are transferred or that originate from the source client have to undergo or pass through a number of assessment procedures. The methodology of TOR is a very complex internal working mechanism. It helps to trace the activity of the users very easily (Galliers, Leidner, 2014). Although it may seem to be a complicated process, this is a good one as it makes the utilization of the cryptography and various layers of encryption. When the data is transmitted from the source to the destination clients, the information in this method is required to pass through various hubs, where the data is scrambled, de-encode and re-encoded with the help of the open key or the codes of the hubs. Thus, in each of the hub, the message that is under transmission will have to pass through the decoding of the encryption for the revelation of the next layer of the encryption, in accordance with the rules of the methodology of TOR (Lees, 2012). The entire process, thus, leads to the formation of the Onion Ring as the name itself suggests. As and when the information or the messages enter the last hub, the data need to pass through a final decryption of the encryption and finally the unique data gets delivered to the destination where it needs to reach without the breach of its privacy (Knapp Langill 2014). Therefore, the incorporation and adaptation of the TOR will be the most suitable means for the protecting the entire process of anonymous communication that is being carried through the online social networking sites (OSN) and thereby the safeguarding the privacy of the data sharing through decryption and encryption processes (De Coster McEwen, 2015). (Model Explanation) Conclusion: Thus, it becomes quite evident from the fact that the due to emergence of the new technologies and the increase in the innovation in the field of science, interaction and comfort zone of interaction has developed through the means of Information Technology, however, it has also caused many disadvantages, that need to be resolved. The privacy of the individuals and their information that is at stake at todays digital world can be preserved by the use of the VPN and TOR. Out of these two, TOR has proved to be the best in evaluation of the data sharing methods and helping in the transmission of the correct and safe information to the destination (Simons 2013). References: Cheminod, M., Durante, L., Valenzano, A. (2013). Review of security issues in industrial networks.Industrial Informatics, IEEE Transactions on,9(1), 277-293. Feng, N., Wang, H. J., Li, M. (2014). A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis.Information Guerrero, J. M., Chandorkar, M., Lee, T. L., Loh, P. C. (2013sciences,256, 57-73. Galliers, R. D., Leidner, D. E. (2014).Strategic information management: challenges and strategies in managing information systems. Routledge. Advanced control architectures for intelligent microgrids, part I: decentralized and hierarchical control.IEEE Transactions on Industrial Electronics,60(4), 1254-1262. Hahn, A., Ashok, A., Sridhar, S., Govindarasu, M. (2013). Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid.Smart Grid, IEEE Transactions on,4(2), 847-855. Hill, C., Jones, G., Schilling, M. (2014).Strategic management: theory: an integrated approach. Cengage Learning. Kerzner, H. R. (2013).Project management: a systems approach to planning, scheduling, and controlling. John Wiley Sons. Knapp, E. D., Langill, J. T. (2014).Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress. Lees, F. (2012).Lees' Loss prevention in the process industries: Hazard identification, assessment and control. Butterworth-Heinemann. Li, S., Xu, L., Wang, X., Wang, J. (2012). Integration of hybrid wireless networks in cloud services oriented enterprise information systems.Enterprise Information Systems,6(2), 165-187. Mo, Y., Kim, T. H. J., Brancik, K., Dickinson, D., Lee, H., Perrig, A., Sinopoli, B. (2012). Cyberphysical security of a smart grid infrastructure.Proceedings of the IEEE,100(1), 195-209. Park, S., Lee, K. (2014). Advanced approach to information security management system model for industrial control system.The Scientific World Journal,2014. Roman, R., Zhou, J., Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things.Computer Networks,57(10), 2266-2279. Rong, C., Nguyen, S. T., Jaatun, M. G. (2013). Beyond lightning: A survey on security challenges in cloud computing.Computers Electrical Engineering,39(1), 47-54. Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerlad, P. (2013).Security Patterns: Integrating security and systems engineering. John Wiley Sons. Simons, R. (2013).Levers of control: how managers use innovative control systems to drive strategic renewal. Harvard Business Press. Sridhar, S., Hahn, A., Govindarasu, M. (2012). Cyberphysical system security for the electric power grid.Proceedings of the IEEE,100(1), 210-224. Yan, Y., Qian, Y., Sharif, H., Tipper, D. (2012). A survey on cyber security for smart grid communications.Communications Surveys Tutorials, IEEE,14(4), 998-1010. Yan, Y., Qian, Y., Sharif, H., Tipper, D. (2013). A survey on smart grid communication infrastructures: Motivations, requirements and challenges.Communications Surveys Tutorials, IEEE,15(1), 5-20. Yin, S., Li, X., Gao, H., Kaynak, O. (2015). Data-based techniques focused on modern industry: an overview.Industrial Electronics, IEEE Transactions on,62(1), 657-667. Mergel, I. (2012). The social media innovation challenge in the public sector. Information Polity, 17(3, 4), 281-292. Hoff, S. (2016). Book Review: Innovation and Inequality: Emerging Technologies in an Unequal World by Susan Cozzens and Dhanaraj Thakur. Smith, A., Raven, R. (2012). What is protective space? Reconsidering niches in transitions to sustainability. Research Policy, 41(6), 1025-1036. Valente, T. W. (2012). Network interventions. Science, 337(6090), 49-53. Najaflou, Y., Jedari, B., Xia, F., Yang, L. T., Obaidat, M. S. (2015). Safety challenges and solutions in mobile social networks. Systems Journal, IEEE, 9(3), 834-854. Chretien, K. C., Kind, T. (2013). Social media and clinical care ethical, professional, and social implications. Circulation, 127(13), 1413-1421. de Montjoye, Y. A., Shmueli, E., Wang, S. S., Pentland, A. S. (2014). openpds: Protecting the privacy of metadata through safeanswers. PloS one, 9(7), e98790. Vyrynen, K., Hekkala, R., Liias, T. (2013). Knowledge protection challenges of social media encountered by organizations. Journal of Organizational Computing and Electronic Commerce, 23(1-2), 34-55. Kass-Hout, T. A., Alhinnawi, H. (2013). Social media in public health. British medical bulletin, 108(1), 5-24. Wirth, H., Kulczycka, J., Hausner, J., Koński, M. (2016). Corporate Social Responsibility: Communication about social and environmental disclosure by large and small copper mining companies. Resources Policy, 49, 53-60. Hardwick, J., Anderson, A. R., Cruickshank, D. (2013). Trust formation processes in innovative collaborations: networking as knowledge building practices. European Journal of Innovation Management, 16(1), 4-21. Gummesson, E. (2014). Commentary on The role of innovation in driving the economy: Lessons from the global financial crisis. Journal of Business Research, 67(1), 2743-2750. Li, J. (2014). Data protection in healthcare social networks. Software, IEEE, 31(1), 46-53. Litt, E. (2013). Understanding social network site users privacy tool use. Computers in Human Behavior, 29(4), 1649-1656. Jkl, M., Berki, E. (2014). Communities, communication, and online identities. Cyber behaviour: Concepts, methodologies, tools, and applications/Information resources management association, 71-83. Cacciapuoti, A. S., Calabrese, F., Caleffi, M., Di Lorenzo, G., Paura, L. (2013). Human-mobility enabled wireless networks for emergency communications during special events. Pervasive and Mobile Computing, 9(4), 472-483. Rock, A. S., Rock, M. D. J. S., Salazar, M. D. J. S. (2013). U.S. Patent No. 8,447,690. Washington, DC: U.S. Patent and Trademark Office. Bennett, M., Gatof, J., Bowman, D., Ludlow, K. (2015). Regulating Emerging and Future Technologies in the Present. De Coster, R., McEwen, C. (2015). The Commercialisation and Adoption of Emerging Technologies: The Role of Professional Service Firms. Competitive Strategies for Academic Entrepreneurship: Commercialization of Research-Based Products: Commercialization of Research-Based Products, 227. Borgatti, S. P., Everett, M. G., Johnson, J. C. (2013). Analyzing social networks. SAGE Publications Limited.