Tuesday, May 19, 2020

Dorothea Lange 20th Century Photographer

Known for: documentary photographs of 20th century history, especially the Great Depression and her image of a Migrant Mother Dates: May 26, 1895 - October 11, 1965Occupation: photographerAlso known as: Dorothea Nutzhorn Lange, Dorothea Margaretta Nutzhorn More About Dorothea Lange Dorothea Lange, born in Hoboken, New Jersey as Dorothea Margaretta Nutzhorn, contracted polio at seven and the damage was such that she limped for the rest of her life. When Dorothea Lange was twelve, her father deserted the family, perhaps fleeing charges of embezzlement. Dorotheas mother first went to work as a librarian in New York City, taking Dorothea with her so that she could attend public school in Manhattan. Her mother later became a social worker. After graduating from high school, Dorothea Lange began to study to become a teacher, enrolling in a teacher training program. She decided instead to become a photographer, dropped out of school, and studied by working with Arnold Genthe and then Charles H. Davis. She later took a photography class at Columbia with Clarence H. White. Beginning Work Dorothea Lange and a friend, Florence Bates, traveled around the world supporting themselves with photography. Lange settled in San Francisco because they were robbed there in 1918 and she needed to take a job. She began her own portrait studio in San Francisco by 1919, which soon became popular with civic leaders and the wealthy of the city. The next year she married an artist, Maynard Dixon. She continued her photography studio, but also spent time promoting her husbands career and caring for the couples two sons. The Depression The Depression ended her photography business. In 1931 she sent her sons to boarding school and lived separately from her husband, giving up their home while they each lived in their respective studios. She began photographing the effects of the Depression on people. She exhibited her photographs with the help of Willard Van Dyke and Roger Sturtevant. Her 1933 White Angel Breadline is one of the most famous of her photographs from this period. Langes photographs were also used to illustrate the sociology and economics work for University of Californias Paul S. Taylor. He used her work to back up grant requests for food and camps for the many Depression and Dust Bowl refugees coming to California. In 1935, Lange divorced Maynard Dixon and married Taylor. In 1935, Lange was hired as one of the photographers working for the Resettlement Administration, which became the Farm Security Administration or RSA. In 1936, as part of the work of this agency, Lange took the photograph known as Migrant Mother. In 1937, she returned to the Farm Security Administration. In 1939, Taylor and Lange published An American Exodus: A Record of Human Erosion. World War II The FSA in 1942 became part of the Office of War Information. From 1941 to 1943, Dorothea Lange was a photographer for the War Location Authority, where she took photographs of interned Japanese Americans. These photos were not published until 1972; another 800 of them were released by the National Archives in 2006 after a 50-year embargo. She returned to the Office of War Information from 1943 to 1945, and her work there was sometimes published without credit. Later Years In 1945, she began working for Life magazine. Her features included the 1954 Three Mormon Towns and the 1955 The Irish Country People. Plagued by illness from about 1940, she was diagnosed with terminal cancer in 1964. Dorothea Lange succumbed to the cancer in 1965. Her last published photo essay was The American Country Woman. A retrospective of her work was exhibited at the Museum of Modern Art in 1966. Books by Dorothea Lange: Dorothea Lange and Paul S. Taylor. An American Exodus. 1939. Revised 1969. Original edition reprinted 1975.Dorothea Lange. Dorothea Lange Looks at the American Country Woman: A Photographic Essay. Commentary by Beaumont Newhall. 1967.Dorothea Lange and Margaretta K. Mitchell. To a Cabin. 1973.Dorothea Lange. Photographs of a Lifetime. Essay by Robert Coles and afterword by Therese Heyman. 1982. Books About Dorothea Lange: Maisie and Richard Conrat. Executive Order 9066: the Internment of 110,000 Japanese Americans. Introduction by Edison Uno, epilogue by Tom C. Clark. 1972.Milton Melter. Dorothea Lange: A Photographers Life. 1978.Therese Thau Heyman, with contributions by Daniel Dixon, Joyce Minick, and Paul Schuster Taylor. Celebrating a Collection: The Work of Dorothea Lange. 1978.Howard M. Levin and Katherine Northrup, editors. Dorothea Lange, Farm Security Administration Photographs, 1935-1939, from the Library of Congress. Introduction by Robert J. Doherty, with writings by Paul S. Taylor. 1980.Jan Arrow. Dorothea Lange. 1985.

Saturday, May 16, 2020

The Rise of Politically Partisan Infotainment - 2039 Words

Fox News: The Rise of Politically Partisan Infotainment Consumers now have access to more information than in any other point in history, and are being subjected to partisan news on a larger scale than ever before. Partisan news outlets, such as Fox News and MSNBC tailor their broadcasts to appeal to the confirmation bias of their target audiences. Each network not only chooses which stories to run based on the interest of their target demographic, but also frames the facts in a way that leads consumers to believe that their own beliefs, however factual, are correct, which aligns with a scientific principle known as confirmation bias. Confirmation bias is the tendency for people to seek out information that aligns with their beliefs,†¦show more content†¦198) Before the shift to bias or partisan news, the U.S. was brought together by World War II. Many people received their information only by newspaper or radio and there was a sense of pride knowing that journalists were sharing truthful information with the public. Thussu (1998) said that it is a journalists duty to explain the information they were providing and not â€Å"indulge in cheap ‘event journalism.’ â€Å"It was never good enough to throw our hands up in horror that people were dying †¦ We had to work out why – to chase the story back to its roots, and write about its origins fearlessly, even if it turned out that the ultimate beneficiary of the people’s suffering was a politician or a proprietor who had power over your own livelihood, or even your own life. A journalist’s right to investigate was not God-given: it was earned by playing one’s part responsibly in guarding the values of human society.† In the late 1950s and into the 1960s responsibility played a large role in how news was distributed. Three television networks, ABC, CBS, and NBC, were among the outlets with formally trained news anchors who brought forth a sense of unity in the country. But, as the years progressed and people began to develop special interests, the ways news was relayed transformed (Turow, 1997, p. 40). However, the biggest transformation was in the early 2000s when the threeShow MoreRelatedStudy Guide5838 Words   |  24 PagesGovernment supposed to protect freedom, maintain order or promote equality? Is there conflict between these goals? Chapter 5. Congress   Key Terms: Article I Necessary and Proper Clause Implied Powers Bicameral Reapportionment Incumbents Partisan Gerrymandering Baker v Carr Bill Committee/Subcommittee Seniority Hearings Mark-Up Rules Committee Filibuster Cloture Pocket Veto Veto Override Majority Party/Minority Party Speaker of the House Whips Unified Government Divided Government-

Wednesday, May 6, 2020

Sexual Orientation, By Sarah Waters - 1825 Words

Throughout human history, various minority groups find themselves the targets of prejudice, discrimination, and even violent acts of hatred. One of the most notable ways in which the struggles of these groups are documented and exemplified is through literature. Sexual orientation, and more specifically homosexuality, is a prominent point of controversy within the world of fiction writing, as well as through the nonfictional history of various societies. Sarah Waters’ Affinity is a prime example of how history and fiction can intertwine. Waters wrote this novel in the 1990’s, but set it in London during the Victorian Era. In order to create a realistic narrative, Waters had to ensure that it was historically accurate, even down to the societal impact of Margaret’s sexual preferences. Though it was not overtly discussed, the eighteenth and nineteenth centuries marked the era in which â€Å"†¦homosexuality in its modern form truly began to emerge†(Wille tt 351). From the start of Affinity, Margaret’s emotional and psychological flaws are exposed through her diary. She also reveals details about her relationship with Helen, which ultimately foreshadows the outcome of her future romantic relationships. Many of Margaret’s hardships come from the pressures that her society puts on her and, in turn, she develops unhealthy relationships with those around her. Her isolation plays a huge factor in her dependence on Selina, another woman who appears to be in the same position as MargaretShow MoreRelatedThe Benefits of Sexual Education in Public Schools2013 Words   |  9 Pages . Miraculously, some might learn to tread water, but many would drown† (11). Strasburger conveys the message that there is a problem with sexual education and urges his readers to do something about it. Teens should be able to make educated decisions, so they can protect themselves and their partners from unwanted pregnancies and sexually transmitted diseases (STDs) and be able to maintain that safety from teenage years to adulthood. The bulk of sexual education programs within the United StatesRead MoreWffw3529 Words   |  15 Pagesquestionable.| ___D_ 4. Motives can take the form of a.|needs, drives, and incentives.|c.|stimuli, events, and actions.| b.|requirements, desires, and impulses.|d.|both a and b| ___A_ 5. Examples of physiological needs are a.|oxygen, food, water and proper temperature.| b.|love, esteem and finances.| c.|waste elimination.| d.|both a and c| ___D_ 6. Motives are believed to give rise to a.|incentives.|c.|behavior.| b.|drives.|d.|needs.| __B__ 7. Needs can be described as a.|physiologicalRead MoreAutonomic Nervous System and Obj8649 Words   |  35 Pagesform of a.|needs, drives, and incentives.|c.|stimuli, events, and actions.| b.|requirements, desires, and impulses.|d.|both a and b| ANS: A DIF: 2 REF: 9-188 OBJ: 1 MSC: TYPE: Factual 7. Examples of physiological needs are a.|oxygen, food, water and proper temperature.| b.|love, esteem and finances.| c.|waste elimination.| d.|both a and c| ANS: D DIF: 1 REF: 9-188 OBJ: 1 MSC: TYPE: Conceptual 8. Motives are believed to give rise to a.|incentives.|c.|behavior.| b.|drives.|d.|needs.| Read More3rto Resourcing Talent Essay5855 Words   |  24 Pagesbenefits of attracting and retaining a diverse workforce Diversity means difference. In an employment context, it means ensuring that organisations recruit and retain the best person from the widest possible talent base regardless of gender sexual orientation, age, race, religion or disability. The emphasis is placed on valuing difference as opposed to fitting in. 3 ways in which an organisation can benefit from diversity are: †¢ Aiding recruitment and retaining talent from a wide talent base Read MoreNcfe Level 2 Customer Services Essay7047 Words   |  29 Pages | |situations such as road traffic collisions, entrapments, animal | | | |rescues, chemical spillages, flooding, water rescues and of course | | | |fires. The fire brigade is also involved in a lot more, they do | | | Read MoreFundamentals of Hrm263904 Words   |  1056 PagesManager Marketing Assistant Production Manager Senior Production Editor Freelance Development Editor Senior Designer Interior Design Senior Media Editor Senior Photo Editor Production Management Cover Design Cover Credit George Hoffman Lise Johnson Sarah Vernon Amy Scholz Laura Finley Dorothy Sinclair Sandra Dumas Susan McLaughlin Kevin Murphy Laura Ierardi Allison Morris Hilary Newman mb editorial services David Levy  ©Michael Eudenbach/Getty Images, Inc. This book was set in 10/12 ITC Legacy SerifRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 PagesMunich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Editorial Director: Sally Yagan Director of Editorial Services: Ashley Santora Acquisitions Editor: Brian Mickelson Editorial Project Manager: Sarah Holle Editorial Assistant: Ashlee Bradbury VP Director of Marketing: Patrice Lumumba Jones Senior Marketing Manager: Nikki Ayana Jones Senior Managing Editor: Judy Leale Production Project Manager: Becca Groves Senior Operations Supervisor: ArnoldRead MoreLibrary Management204752 Words   |  820 Pages . . . . . . . . . . . . . . . . . . . . . . . . . . 233 11—The Human Resources Functions in the Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Training and Staff Development . . . . . . . . . . . . . . . . . 236 Orientation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 Initial Job Training . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 Training and Staff Development for Established Employees . . . . . . . . . . . . . . . . . . Read MoreEssay on Walmart16417 Words   |  66 PagesSams Club 2.3 Walmart International 2.4 Vudu 2.5 Private label brands 2.6 Entertainment 3 Corporate affairs 3.1 Finance and governance 3.2 Competition 3.3 Customer base 3.4 Economic impact 3.5 Employee and labor relations 3.6 Gender and sexual orientation 3.7 Logos 4 See also 4.1 Television and film 4.2 Other 5 References 6 Further reading 7 External links History Main article: History of Walmart Early years (1945–1969) In 1945 a businessman and former J. C. Penney employee, Sam WaltonRead MoreManagement Course: Mba−10 General Management215330 Words   |  862 Pagesnext years of the twenty-first century. Pacesetter companies are succeeding by means of a leadership attitude characterized by firm financial responsibility to customers, investors, employees, and other stakeholders. This leadership attitude and orientation simultaneously focuses on the rewards and risks of the opportunistic Feigenbaum−Feigenbaum: The Power of Management Capitol 1. New Management for Business Growth in a Demanding Economy Text  © The McGraw−Hill Companies, 2004 7

Essay about A Tragic Showdown Macbeth vs Oedipus - 549 Words

When we think of the tragedy, we think of something bad happening to someone. This cannot be a tragedy. To know what tragedy is we have to take a look at what Arthur Miller thinks of as tragic. In his essay Tragedy and the Common Man, Arthur Miller says, â€Å"As a general rule, to which there may be exceptions unknown to me, I think the tragic feeling is evoked in us when we are in the presence of a character who is ready to lay down his life, if need be, to secure one thing – his sense of personal dignity: From Orestes to Hamlet, Medea to Macbeth, the underlying struggle in that of the individual attempting to gain his â€Å"rightful† position in his society.† I agree and disagree with Miller’s first statement. Just take a look at Oedipus†¦show more content†¦The questions I asked â€Å"Does Oedipus’s dignity really lie in just finding and punishing Laius’s killer and Has Macbeth secured his sense of personal dignity† a re important because these questions go beyond the plain understanding of what a tragic hero is. We define Oedipus and Macbeth as tragic heroes because the former killed his father and married his mother and the latter kills so many to secure his throne. Oedipus becomes a tragic hero because of the way he gains his personal dignity. As I stated before Oedipus fulfills his promise of punishing King Laius’s killer by punishing himself when he gouges out his eyes and then goes into exile. Macbeth does not do anything for his personal dignity. On the contrary, he destroys it through the countless killings to become king and secure his throne. The only idea that I have to grapple with is how Macbeth could be included in the group of characters who are ready to sacrifice their life to secure their sense of personal dignity. I say this because when the former dies, he dies as a result of all the people he betrayed and killed for the throne of Scotland. Macbeth’s counterpart Oedipus does die, though not physically. When we die there is a darkness around us. So in a way, Oedipus does kill himself by taking away his own eyesight. Arthur Miller gives a clear understanding of what a tragic hero is. A tragic hero is someone like

Creating Value In A Dynamic Business Environment †Free Samples

Question: Discuss about the Creating Value In A Dynamic Business Environment. Answer: Introduction: The report explains about the different financial position of a company. It explains about the different funds which could be used by the company to raise the funds. At the same time, it explains about the risk and return from both internal and external financial system. In addition, it explains about the financial statement projection of the company and the performance and profitability level of the company. More to it, it calculates the different ratios of the company and explains about the position of the company in the market and the industry. Further, it briefs about the financial position, risk and return of the company and lastly, it briefs about the project evaluation of the company and budgeting of the company. Financial position of the company: The calculations and the analysis on the financial report of the company explain about the different levels and the positions of the company. Through the analysis on the different source of funds, it has been evaluated that there are various ways through which the company could raise the funds. All is required by the company is to manage the funds according to risk and return of the funds (Higgins, 2012). Though, according to the analysis, it has been found that the retained earnings, equity and debt are good options for the company to raise the funds for short term as well as long term. Further, the study has been done on the financial statement of the company and the performance and profitability level of the company. through the financial statement of the company, it has been evaluated that the net profit of the company is $ 270000 out of which $ 84000 have been transferred into retained earnings and rest amount has been given by the company to its dividend holders which expresses that the company is managing and enhancing a good amount of profit. Further, it explains that the cash inflow of the company is $ 379000 which explains about the good liquidity position of the company. And lastly, the balance sheet of the company express about the good financial position of the company (Hilton Platt, 2013). Thirdly, the study has been done on the financial statement of the company and the different levels of the company such as liquidity level, profitability level, solvency level etc. through the financial statement and ratio analysis calculations of the company, it has been evaluated that the position and the performance of the company is quite competitive with the position of the industry (Ward, 2012). The investment ratios of the company explains that the company is a good choice for the purpose of investment as it is offering more returns to the stockholders than the industry. Further, the liquidity ratio of the company explains that the company is required to enhance the level of the current assets to manage the better liquidity position in the industry. The current position explains that it would be difficult for the company to pay the short term debt amount to the debt holders. Further, the efficiency, leverage and profitability ratios of the company explain that this company is one of the good options in the industry to make an investment (Renz Herman, 2016). The ratios explain that the company would offer huge returns to the investors and the stakeholders of the company. Further, the study on total cost of the company explains that the currently company is required to pay 10.7% of total interest as the cost amount. It explains that the current cost of equity, cost of preferences share and cost of debt of the company is 10.7% and the market risk premium is 9.46% which explains that the current capital structure of the company is quite better and at this point, the risk and the cost both of the company is quite competitive (Schaltegger Burritt, 2017). In addition, the alterative projects have been studied for the company to make an investment. And through the calculations and evaluation on the project, it has been found that the project is offering negative net present value of the company which means if the company would invest into the project than it has to bear the loss. Thus it is suggested to the company to not to make an investment in the given project and must evaluate the other project which would offer positive NPV and at the same time, the IRR of the project should be greater than 10.7% (Zimmerman Yahya-Zadeh, 2011). Lastly, the future forecasting has been done on the financial performance of the company. The budgeting analysis of the company explains that the sales of the company would be variable according to the season and thus the purchase and the inventory level of the company would also vary. Further, the cash budget of the company explains that the cash position of the company is average in starting of the year and it has been better at the end of the year. In addition, the accounts receivable budget of the company explains about the huge credit sales and good collection strategy of the company. At the same time, the accounts payable budget also explains about the average payment strategy of the company. It explains that the company is managing the strategies in a good manner (Brigham Ehrhardt, (2013). Though, the company is required to manage and maintain the cash position of the company in a better way. The current cash position explains about the average liquid position of the company. And the break even sales of the comapny is 513 units whereas the average sales of the company is 530 units in lean season and average 750 units in peak season. It explains that it is quite difficult for the company to achieve the break even sales. Though, the sales of the company is quite lower and thus it is suggested to the company to enhance the level of sales and the price so that the profitability level of the company could be more. Further, the company is also required to make few more changes to comfortable achieve the level of break even sales always (Brigham Houston, 2012). Conclusion: Thus, through the above analysis, it has been found that the financial performance of the company is average. It is required by the management of the company to adopt new strategies and policies to make the financial performance better. References: Brigham, E. F., Ehrhardt, M. C. (2013).Financial management: Theory practice. Cengage Learning. Brigham, E. F., Houston, J. F. (2012).Fundamentals of financial management. Cengage Learning. Higgins, R. C. (2012).Analysis for financial management. McGraw-Hill/Irwin. Hilton, R. W., Platt, D. E. (2013).Managerial accounting: creating value in a dynamic business environment. McGraw-Hill Education. Renz, D. O., Herman, R. D. (2016).The Jossey-Bass handbook of nonprofit leadership and management. John Wiley Sons. Schaltegger, S., Burritt, R. (2017).Contemporary environmental accounting: issues, concepts and practice. Routledge. Ward, K. (2012).Strategic management accounting. Routledge. Zimmerman, J. L., Yahya-Zadeh, M. (2011). Accounting for decision making and control.Issues in Accounting Education,26(1), 258-259.

Tuesday, May 5, 2020

Network Security from High-Security Units †Myassignmenthelp.Com

Question: How to Do Network Security From High-Security Units? Answer: Introduction In todays time, the business relies on the secured ICT systems where one can focus on laying down the technology with Network Security Services. s per the number of studies approximately ninety-one percent all the organizations get easily attacked normally once in last two years which makes it a very serious issue. Security of network lays a basic foundation of many secured ICT systems (Lu et al., 2013). Concept of network security According to the article selected on T systems, GmbH, 2017, the criminal gang are using the sophisticated malware to mainly target the organizations inorder to steal all the valuable data. To be able to save the system from the attacks, the team in company looks for options on internet. The companies have to hire a team that can look for number of options to evaluate different kind of sources all the time. According to Kaspersky Global IT Security Risk Survey of 2013, there are 91% of the companies which have been attacked atleast once along with laying out the foundation of ICT (Lu et al, 2013). The administrators are facing the challenges for the adaptation of network security systems where Deutsche Telekoms honeypots are able to record approximately 800,000 attacks every day. A well-managed system does much more than just saving the corporate based network from many diverse attacks. There are specific complementary services as well like location-based networking through VPN, DNS b ased services, and Radius that are a huge help as well. Such services are also managed with the help of T systems security based specialists who are consistently up for many options like finding through various studies. Customers can determine to put the complete managed system and also select between a hosted based solutions. The concept of the firewall is managed sometime by various experts in either case (Zhu et al., 2011). Network security from high-security units The necessary infrastructure is primarily hosted by many network security services which are places in high security and are certified with various data units. In every case, the level of security and presence given by different services is very high than technology functioned by the organizations and every kind of cost are normally lower, all thanks to professional as well as scalable infrastructure (Panteli Kirschen, 2011). Moral theories Social contract The concept of morality basis can be defined as rules that are for rational people that will have an agreement to obey for more advantages together and provide other people and also obey them at the same time (Singer, 2011). In specific situations, there is no place for any industry since the outcome is not certain and at the same time cyber attack in social contract based on network security can breach the trust, and the companies become vulnerable (GmbH, 2017). Utilitarianism It is important for every human being to function as per whatever is produced with an immense balance of happiness over complete unhappiness for every human being who will get affected by different actions (Noddings, 2013). It is important to select the overall action that will manufacture the best results for all people that impacted by different actions. The cyber attacks are impacting the company's stature in the market and bringing balance; it is crucial to deal with the problem with utmost care (GmbH, 2017). Deontology The basic approach to moral theory is known as deontology concept which is because of Immanuel Kant. The theory says that act that is as per the maxim by which people at some time will be able to become a universal kind of law. Therefore, it becomes necessary to treat the whole humanity well whether it is related to one's person or in other cases as an end and not as means (Nussbaum, 2013). Cyber attack and network security are becoming a universal problem since it is impacting people at large (GmbH, 2017). Virtue based ethics Many people can easily trace the origin of many ethics which come under virtue and the writings in Nicomachean Ethics (Singer, 2011). Virtue based ethics are more or less related to detailed account of all every possible virtue and the overall qualities of the character where people require to do well in life. The principle also maintains the overall development of many human-based virtues as the most based concern for ethics. Cybersecurity and attacks question the morality of the issues and companies are in a very vulnerable situation to lose everything in a blink (GmbH, 2017). Conclusion The concern of secretly has been a major concern and threat for the organization as well as government (Susanto12 et al., 2011). There are so many intrusions that are detected in the past for some reasons. It is very important to assume that the data can be of no or little value and many adversaries are not looking at many kinds of classified data. There are many kinds of activities as well which are observed and also has an economic based aim. Following are so of the recommendations: - White-listing: when this process executed in the proper manner, it become very hard for any adversary to be able to impact the ICT system of a company. The application can be called as a technical kind of measure that only permits particularly many authorized works to operate on the system (Susanto12 et al., 2011). A software based patch is some pieces of technology specifically designed to solve issues or also update a computer program. The patching in organization system also encompasses the second as well as third mitigation based strategies. It is also very important to make a patch in the operating system as well as an application within a time frame for many serious issues (Susanto12 et al., 2011). Very often, there are opinions that by this system without any testing, something might break on the whole system. In the main cases, patching will impact the function of the organization's ICT system. It is crucial to perfectly balance the risk that exists between taking many weeks to evaluate the patches and also saving serious issues within some period timeframe (Susanto12 et al., 2011). Reference GmbH, T. (2017).Network security the foundation for secure ICT systems. [online] T-systems.com. Available at: https://www.t-systems.com/de/en/solutions/security/security-topics/networks/network-security-75814. Lu, T., Guo, X., Xu, B., Zhao, L., Peng, Y., Yang, H. (2013, September). Next big thing in big data: The security of the ICT supply chain. InSocial Computing (SocialCom), 2013 International Conference on(pp. 1066-1073). IEEE. Noddings, N. (2013).Caring: A relational approach to ethics and moral education. Univ of California Press. Nussbaum, M. C. (2013).The therapy of desire: Theory and practice in Hellenistic ethics. Princeton University Press. Panteli, M., Kirschen, D. S. (2011, March). Assessing the effect of failures in the information and communication infrastructure on power system reliability. InPower Systems Conference and Exposition (PSCE), 2011 IEEE/PES(pp. 1-7). IEEE. Singer, P. (2011).The expanding circle: Ethics, evolution, and moral progress. Princeton University Press. Susanto12, H., Almunawar, M. N., Tuan, Y. C. (2011). Information security management system standards: A comparative study of the big five.International Journal of Electrical Computer Sciences IJECSIJENS,11(5), 23-29. Zhu, K., Chenine, M., Nordstrom, L. (2011). ICT architecture impact on wide area monitoring and control systems' reliability.IEEE transactions on power delivery,26(4), 2801-2808.