Orchestra
Its significance follows that they are a group of musicians that play instrumental music, chiefly in unison, often consisting of 25 members. Therefore, scholars chiefly create what scholars refer to as unique sounds through strings, percussion, brass, and woodwinds, which are the various orchestral families. First, the strings family mainly refers to a technique widely recognized as pizzicato. They include cello, violin, harp, double bass, and viola. Percussion follows the idea that sound is produced when an instrument is struck, shaken, or scraped. Therefore, the latter’s instruments keep the rhythm, add color and excitement, as well as create unique sound effects, specifically in an orchestra. Notably, the brass family incorporates instruments made of metal alloy or brass whose purpose is to sound when a musician vibrates their lips against a mouthpiece fitted inside the respective instrument. They include the French horn, Tuba, trumpet, and trombone. Lastly, the woodwinds family, which includes the oboe, flute, clarinet, and bassoon, are instruments meant to produce sounds in any of the mentioned instruments as they vibrate when a musician blows air into the read (single or double).
Regarding the significance of orchestra in developing western music, the 20th century has seen the latter breakthrough following the rise of superstar conductors and composers. Mozart and Beethoven, composers, are significant players in developing orchestra types of music. Orchestra has promoted the development of more than 16 genres of western music over the years. They include soul, jazz, classical, blues, baroque, rap, bluegrass, heavy metal, etc. the world has seen the rise of legends in the 20th century, for instance, Michael Jackson, Elton John, Dolly Parton, Bob Marley, whose work remains to be sensational across the globe. The majority of modern musicians, specifically in the west, are walking in the footsteps of such legends who have inspired many, thereby promoting the development of western music. Orchestra has become a significant part of modern western music as well as the cultural heritage. According to Mathias (2016), an orchestra promotes volunteerism, allowing residents to enjoy arts locally. This platform encourages young and old talents for local musicians who want to perform, enhancing music development.
Moreover, numerous orchestral musical innovations are being produced now and then in the United States. This gives rise to new practices and groups that have a passion for music, with New York Philharmonic, Chicago Symphony Orchestra, and Boston Symphony Orchestra being among the older groups and still existing today, inspiring many to venture their talent and passion into western music.
Symphony
Music scholars and composers perceive symphony as a prolonged composition for orchestra, in reality, consisting of several movements and one leverages sonata form. Joseph Haydn, an Austrian composer, is the father of symphony. From the classical era in the early 1740s to the early 1820s, as per European music history, together with the orchestra grew to the extent that triggered a reaction. This culminated in the neoclassical movement in the 1920s, in which most composers turned toward formal discipline and principles of balance. They, therefore, used new techniques to enhance dynamic coherence. Scholars associate symphony with the ultimate embodiment of the idealist notion of music. As per the notion, music is the ‘highest of the arts.’ Following the Greek definition of the symphony, which identifies the latter as the aspect of ‘sounding together, the harmony of sound,’ symphony has propelled western music to a great extent. With significant groups forming, such as the Dallas Symphony Orchestra and the National Symphony Orchestra, with some having musicians of up to 100 members (symphony orchestra), the symphony’s format invites the various sections of an orchestra in order to perform a given musical conversation. This also includes melodies that are established in exposition. Symphony and Orchestra have infinite possibilities. They will remain the deep musical expression’s definitive medium. Notably, symphonies are the centerpieces of orchestra concerts and have a specific scope, completeness, as well as ambition (Sapio, 2022).
Consisting of four sections, that is, an allegro, a light relief movement, a slow lyrical movement, and a fast and summary finale, symphonies have contributed to an increase in great composers who strive to bind symphony groups together. In this aspect of inner unity, they become one integrated whole, unlike what scholars refer to as unrelated pieces. Through such humble beginnings, classical music was founded on being an emblematic genre. Notably, the symphony has retained its status up to the 21st century seeing the rise of musical modernism and experimentation, which failed to overtake the symphony. As a result, the symphony is a significant pillar and is deeply rooted in modern American music. The development of music in the U.S. and symphony is part of its story to date. Orchestra and symphony have aided American music to grow over the years within the western classical music matrix. Their significance motivated composers to transform expressions of American life, history, attitudes, feelings, ideals, and moods, which tailored their music to what it is today.
References
Mathias, S. (2016 June 27). Why community orchestras are important. Parker Symphony Orchestra. Retrieved from: https://parkersymphony.org/why-community-orchestras-are-important
Sapio, M. (2022 June 17). The American Symphony. The Imaginative Conservative. Retrieved from: https://theimaginativeconservative.org/2022/06/american-symphony-neil-butterworth-michael-de-sapio.html
Outsourcing Trends And Overcoming The Challenges Of Data Sharing When Outsourcing Sample College Essay
Abstract
Data outsourcing is becoming more prevalent as effective strategies enable businesses to depend on outside providers for data management and storage. Data transfer is turning into a significant problem as information system outsourcing rises. Data security has become a global issue for governments and businesses. The paper discusses how an organization might deal with problems with data-sharing while outsourcing service providers. The findings indicate that a well-drafted contract will reduce the danger that outsourcing data presents. However, most service agreements do not adequately address the difficulties of data collecting. Data breaches, integration problems, and illegal access to private data are some of the challenges that might arise with outsourcing data. Organizations must thus use the finest techniques to guarantee that data is handled correctly when it is outsourced to a service provider. The successful implementation of the outsourced project and the outsourcing partnership depend on the data exchange. To secure data effectively while outsourcing, it is crucial that both the customer and service provider use the optimal security measures.
Introduction
The outsourcing of information technology (IT) infrastructure has increased dramatically across all sectors, including the government, industrial, and pharmaceutical industries (Elias Malope & Naidoo, 2020). More and more businesses are teaming up with third-party software and service providers to handle their IT-related needs, such as application development, system integration, and IT management. Outsourced data may help businesses run more smoothly and effectively in the marketplace if done correctly. While many businesses have found success outsourcing their development efforts to a software service provider, many have also found that data transmission is a significant barrier. Data inconsistencies on the part of the vendor may lead to poor project results, compromised security, and even the loss of information should include the outsourcing agreement between the client and vendor end (Hintze, 2018). Data maintenance problems create difficulties for the client and the outsourced service provider. There is an increasing tendency toward maintenance; however, few service contracts adequately handle data outsourcing or management concerns (Elias Malope & Naidoo, 2020). As more and more businesses are turning to third-party suppliers and service providers, this paper will discuss how such businesses might handle data sharing issues.
Definition of terms
Information systems (IS) outsourcing is the practice of a business delegating its IS responsibilities to outside service providers in order to reap financial, technical, and strategic advantages (Almutairi & Riddle, 2018). Information systems outsourcing is the choice made by the company to outsource some or all of its IS operations to accomplish its objectives.
Data management is creating and applying rules, processes, and procedures to manage an enterprise’s whole data lifecycle requirements (El Arass & Souissi, 2018). When data is gathered and maintained by a software vendor or service provider, problems may arise if the upkeep management is improper. Adequate data management necessitates the gathering, analyzing, and using models for decision-making to ensure efficient data upkeep. Over the last several decades, a growing practice has been to outsource all or a significant portion of data maintenance to a third-party service provider as part of a maintenance service contract.
Literature Review
One potential benefit of outsourcing IT is that it allows the business to devote more resources to other areas, such as brand building, customer service improvement, and product development (Elias & Naidoo, 2020). IT outsourcing providers’ potential to provide more advanced IT capabilities might improve the company’s efficiency and output. Another benefit of outsourcing IT is that it provides companies with access to IT experts that have received extensive training and certification. According to Gurung and Prater (2017), IT service providers should not rely on a single person’s expertise but instead should put together a group of people who have shown themselves as competent in the field. Because of this, the business may avoid having to pay to train new IT workers. The figure below shows how businesses are increasing their investment in IT outsourcing due to its immense benefits and opportunities it exposes the businesses too.
Figure 1: Global spending on IT outsourcing services in 2018. (Statistica,2019).
By using the service provider’s buying power and supplier connections, outsourcing IT allows organizations to save money on capital-intensive IT resources, including hardware, software, licenses, and in-house IT staff (Gurung & Prater, 2017). When customers outsource their IT services, they have access to cutting-edge tools that allow them to expand and improve their operations. Organizations may save operational costs by outsourcing the hosting and maintenance of their IT services to a service provider, who will also be in charge of IT infrastructure updates, security patches, skill development, and general maintenance (Elias & Naidoo, 2020). Additionally, outsourcing IT helps lessen the possibility of IT failures. TA service providers’ better-pooled skills and expertise allow them to assume responsibility for issues like adherence, data leaks, contingency planning, and recovery plans (Gurung & Prater, 2017). Compliance, security, and dependability of IT services are all potential threats, but they may be mitigated when reputable IT service providers collaborate with other skilled third parties to maintain their current data centres up to date with legislation and technology ( Gurung & Prater, 2017).
Outsourcing provides businesses enticing benefits, including cost savings, the capacity to focus on core company operations, flexibility, and quality enhancement (Almutairi & Riddle, 2018). Security issues, such as breaches of confidentiality and availability failures of IS services [3], are more likely to occur in the outsourcing setting due to the less stable surroundings and increased systems integration. Almutairi & Riddle (2018) contend that serious difficulties and worries accompany the growing reliance on technology and the need to outsource IT requirements in businesses. Migration processes, technological operations, and data security are all technical difficulties; interpersonal conflicts and misunderstandings are examples of human difficulties. Almutairi & Riddle (2018) proposed the OSCR framework to efficiently handle the security and compliance risks related to IS outsourcing. It intends to provide businesses with a thorough technique to reduce, neutralize, or remove security threats in the early phases of project execution. The suggested framework is flexible, straightforward, and simple and may be used for any outsourced IT project.
Park et al. (2021) state that most healthcare companies are very concerned about keeping the privacy and security of their patients’ massive volumes of medical data. Healthcare professionals and academics have paid close attention to the security and privacy of electronic health records (EHRs). Numerous encoding and decryption techniques and critical management systems have been developed to assure security. Nevertheless, sharing and scalability problems have suggested additional security mechanisms. However, these innovations can lead to other challenges, such as inefficiency. Systems for managing EHR data on the blockchain have been suggested as a way to save processing time. EHRs might be compromised, however, since outsourcing firms set up the majority of blockchain systems. Therefore, we provide an EHR administration system based on blockchain that includes proxy re-encryption in this article. Park et al. (2021) suggested an EHR management system built on blockchain that includes PRE. Data integrity is ensured because of the security of the blockchain, which only allows authorized users to get the stored EHRs. Moreover, PRE protects the privacy of encrypted EHRs. Because our technology isolates the proxy server from the blockchain, the blockchain outsourcing firm cannot see the plaintexts of the EHRs even if the system administrator discloses a user’s private key.
According to Moon et al. (2018), the number of security incidents due to ICT outsourcing is always growing. Moon et al. (2018) looked at potential ICT outsourcing security flaws and how they may be fixed by using the appropriate security measures, from which they were able to derive a list of things to check for during security audits of outsourced IT. Moon et al. (2018) created a model to evaluate companies that outsource ICT security management. A company’s role is to analyze the security level of ICT outsourcing using the model and assessment approach and then evaluate each inspection element’s level of security to decide what sort of security measures should be adopted. According to Moon et al. (2018), their research will help businesses now utilizing or considering using ICT outsourcing assess their security level and reduce the risk of security mishaps or that lack industrial confidentiality and critical information.
Akbar et al. (2018) conclude that although there are many advantages to outsourcing software development to countries with lower labour costs. There are also disadvantages, such as communication, coordination, and control difficulties caused by language and cultural barriers between development sites located in different parts of the world. The absence of in-person communication between members of a dispersed development team directly results from their geographic separation. Not only that, but Akbar et al. (2018) note that trust issues in dispersed teams are a direct result of the absence of regular in-person meetings. There was also a lack of development visibility into the product for the foreign teams.
Outsourcing and long-distance data transmission pose substantial challenges to protecting sensitive information in cloud computing. According to Zhang et al. (2018), protecting users’ privacy during data transfers from the network edge to a non-uniformly distributed cloud server is one of the most pressing issues in this emerging field. Bandwidth and resource constraints have reached a limit for the antiquated, centralized cloud computing system due to the growth of IoT devices and the large volume of data produced at the network’s edge. As a result, edge computing, which makes it possible to store and analyze data at the network’s periphery, has the makings of innovative technology. Technology based on cryptography is proposed by Zhang et al. (2018) to address data privacy and security issues. The most common computing models have long struggled with privacy and data security. However, edge computing’s novel characteristics, such as parallel processing, real-time computing, and information perception, have given rise to a variety of new concerns in this area.
Discussion
Service Provider Selection
Selecting a provider that provides the finest services for an organization’s outsourcing activities and is by data security rules and regulations may help it overcome data sharing problems (Tabrizchi & Kuchaki, 2020). Companies often start ITO projects to improve their competitive position in the market. Organizations decide whether or not to launch an ITO program and, if so, which service provider to choose depending on their requirements for IT services, including data storage, cloud computing, and retrieval infrastructure. Customers and service providers alike may benefit from an ITO collaboration. As a result, it would be advantageous for an outsourcing company to outsource its ITO projects to a service provider that can carry them out more efficiently than they could do so internally. Successful ITO projects for an outsourcing business need the development of ITO plans and the selection of a service provider who can aid their implementation (Wang et al., 2018). Outsourcing often involves handing over an organization’s most valuable IT assets to third parties, which may make it more susceptible to service provider failure or opportunism and reduce its long-term adaptability and competitiveness (Pellicelli, 2018). As a result, a company’s IT outsourcing strategy must emphasize the significant risk associated with these techniques, such as losing all corporate IT expertise and exploiting service providers.
A company should be aware of the data it will give, applicable privacy and security legislation, and other requirements before choosing a service provider. For instance, specific categories of personal information in the United States, such as bank account numbers and social security numbers, may result in data breach reporting (Tabrizchi & Kuchaki, 2020). Knowing the outsourcing provider’s nation of origin is crucial so that data may be remotely stored, processed, and transmitted in accordance with their security regulations. Many nations, including the European Union (EU), have unique regulations concerning transferring personal data outside their borders to other nations (Aaronson & Leblond, 2018). Organizations must be aware of the legal requirements for incorporation by adhering to the proper duties for collecting, using, securing, and transferring business data to collaborate with service providers in other nations.
The organization should do an information security assessment before selecting a vendor or service provider to ensure it satisfies the bare minimum criteria set out by privacy and security law (Hintze, 2018). Personal data, subject to more limitations than business data, may be especially vulnerable, but an information security assessment can help an outsourcing firm identify the greatest risks and vulnerabilities. The outsourced company should develop or revise its information security strategy once the information security assessment is finished to address any compliance issues and data protection threats. Selecting and using third parties with access to regulated data is a crucial aspect of any information security policy, and it should be recorded as such. Checklists, evaluation tools, on-site inspections, and interviews with key security specialists might all be a component of the approach for selecting a third-party provider as part of the information security plan. In order to correctly manage and safeguard firm data with third-party suppliers, an information security strategy must be constantly applied.
Request for Proposal (RFP) and Service Level Agreement (SLA) are two governance agreements that companies must prepare before an outsourcing company can begin selecting service providers from whom it will get its ITO services (Bhatti et al., 2021). Based on the goals of the outsourcing business and the SLA that details what services will be given by the vendors, the RFP is released to the interested service providers. A company that outsources its work to others can use either a single-stage or a multi-stage ITO strategy. When an outsourcing deal is finalized, the client company hands over control of its IT assets like servers and workstations to the outsourcing vendor and manages the vendor in accordance with the terms of the contract and any agreed-upon ITO initiatives. If desired, an outsourcing firm may also create a strategy for handling the aftermath of contract termination.
Cultural and Language Barriers
The greatest challenges businesses have when outsourcing services are linguistic and cultural boundaries, which may lead to coordination issues that can be complicated (Lin, 2020). IT outsourcing success is primarily determined by the contractual connection between the outsourced company and the service provider. This is true whether outsourcing occurs in eastern or western culture. The outsourcing company must trust that its data will remain secure after being handed to the supplier. As a result, reliability and continued dedication to the IT outsourcing initiative’s stated objectives are essential qualities in a reliable outsourcing partnership (Wang et al., 2020).
Numerous studies have shown that a positive client-provider connection is just as important as high-quality service when it comes to the effectiveness of outsourcing. While some outsourcing businesses say that a partnership’s success depends heavily on the two parties’ same values and beliefs, others stress the need to have buy-in from upper management. The success of any outsourcing partnership depends on both parties having a thorough and accurate grasp of the other’s needs, which can only be achieved if the outsourced firm provides detailed instructions for the provider to follow (Wang et al., 2020). By keeping their attention on the agreements outlined in the outsourcing contracts, both parties will be able to reap the benefits of the outsourced project. At the beginning of the outsourcing partnership, the outsourced company must identify the structures, forms, and communication channels between its internal team and supplier. Investment in strengthening outsourcing partnerships is key to the success of the IT outsourcing project (Wang et al., 2018).
Contract Agreements
By effectively leveraging the contract arrangements with the service provider, a company may avoid the problems associated with data sharing during outsourcing. When a company works with a service provider to outsource its data, they do so in order to manage or store it more efficiently than it could internally (Hintze, 2018). This is known as a data outsourcing contract. The construction of reasonable and suitable security measures that safeguard regulated data is guaranteed by a contract agreement, which the supplier must adhere to. Effective management and execution of an outsourced contract may make for a successful outsourcing relationship (Pankowska, 2019). The outsourced project, however, might collapse if the contract is improperly written. Any outsourcing project’s setup is thought to include contract management as a critical component. Most contracts contain the privacy and data protection requirements businesses must meet to operate legally in a given nation. Contracts that respect these standards may help to advance data protection.
A contract agreement enables an internal team to keep an eye on the methods used during the original selection process and to have periodic meetings to assess if any adjustments are required because of new security concerns or regulatory requirements. The success or failure of the outsourcing agreement is most strongly influenced by the outsourcing contract, which establishes the requirements that the service provider must meet (Hintze, 2018). The performance metrics and many service level agreements (SLA) that include financial penalties to encourage the provider to fulfil goals are often highlighted in outsourcing contracts. Outsourcing companies may protect themselves from being stuck in a bad deal by including a clause allowing them to terminate the contract if the service they were promised does not provide (Pankowska, 2019). The success of an IT outsourcing project may be ensured by first establishing a contract agreement, which will reduce the opportunity for opportunistic conduct. Service-level agreements with the outsourcing partners based on mutual trust and commitment may also help a contract arrangement succeed.
Service Provider Optimizations and Performances
A service provider may assist a business overcome data sharing obstacles by providing the most optimized versions of their goods. This allows the business to focus on providing its customers with the best possible service performance. Businesses that choose to outsource often do so to improve the effectiveness of their operations; hence, service providers need to possess the optimal optimizations and give the highest performance levels for their clients. A disadvantage of a company looking to outsource its services is choosing an unqualified service provider to handle the outsourced tasks. Neglecting to carry out a contract agreement may have unforeseen detrimental effects on the success of the outsourcing operation.
Pay-for-performance contracts are outcome-oriented contracting that may be used to decide a contractor’s compensation, the length of their contract, or even the possibility of future work with the organization (Elkomy et al., 2019). When a business hires an outside firm to handle its information technology needs, it often has a number of goals in mind and draws up contracts outlining the criteria to use in evaluating the service provider’s performance, as well as any bonuses or fines that could be levied. Developers at service providers may improve their firm’s capacity to offer business services by defining integration issues that may arise when clients outsource data. Outsourcing firms might benefit from service providers that make the most of their potential for growth via training and new ideas. Providers of services need to stay ahead of the competition by keeping up with emerging outsourcing trends like cloud computing, data management, and application integration.
The outsourcing company and the service provider may receive and share data in a dyadic process (Wang et al., 2018). There must be solutions for problems with data transmission if the outsourced project is to succeed. When a company outsources its data management, the service provider must outline any data transfer concerns before allocating resources. Developers working on behalf of service providers should design and deploy systems that make it easy for their customers to share their data, thereby reducing the opportunity for opportunism. Initiating a lasting outsourcing connection with its partners is facilitated by the optimizations implemented by the service provider. Hintze (2018) argues that having a data processor rather than a data storer as a third-party provider is preferable for most businesses since it gives them more say over the data’s use and protection. If an employee has reason to believe that their employer should not learn specific details about them then it may be in their best interest to use a product provided by a third party acting as the data controller.
Service provider developers must set up systems that allow ongoing monitoring of the surrounding environment and network integration. Managers’ decision-making abilities and the range of available alternatives benefit significantly from the accessibility to real-time data made possible by scanning (Hintze, 2018). Decision-makers may grasp existing and anticipated changes in their external surroundings by using efficient environmental scanning software. A service provider may also look into management activity to discover what is going on in an organization’s environment and what patterns are emerging. Service providers may be informed of any changes in the client environment once the scanning is complete, allowing developers to update their resources and fix any problems that may have arisen. When outsourcing data, the correct precautions should be taken since both businesses depend on the initiative’s success. The long-term success of the outsourcing relationship is ensured when service providers optimize their offerings and give outstanding performances that align with the outsourcing endeavours’ interdependent objectives.
Conclusion
Organizations are outsourcing their data for various reasons, including using the knowledge and experience of the service provider. However, outsourcing data may result in several problems, such as integration difficulties, unwanted access, and stolen data. The successful implementation of the outsourced project and the outsourcing partnership depend on the data exchange. In order to secure data effectively while outsourcing, it is crucial that both the customer and service provider use the optimal security measures. Organizations that make the most of their data capabilities see greater returns on their outsourcing investments due to things like better vendor selection, more efficient relationship management, more fruitful contract drafting, less disruption during transitions, and a more strategic fit between the service provider’s expertise and the company’s goals. Better product and service performance assessments may be made by the service provider and sent to the customer for decisions due to using correct data methodologies. The success of outsourcing depends on the client and the supplier being able to effectively share information since this will lead to better service for the end users.
References
Aaronson, S. A., & Leblond, P. (2018). Another digital divide: The rise of data realms and its implications for the WTO. Journal of International Economic Law, 21(2), 245-272. https://sci-hub.hkvisa.net/10.1093/jiel/jgy019
Akbar, M. A., Shafiq, M., Kamal, T., Riaz, M. T., & Shad, M. K. (2019). An empirical study investigation of task allocation process barriers in the context of offshore software development outsourcing: An organization size based analysis. International Journal of Computing and Digital Systems, 8(04), 343-350. https://journal.uob.edu.bh/bitstream/handle/123456789/3557/paper3.pdf?sequence=4
Almutairi, M., & Riddle, S. (2018). A framework for managing security risks of outsourced IT projects. Proceedings of the 2018 International Conference on Software Engineering and Information Management – ICSIM2018. https://sci-hub.hkvisa.net/10.1145/3178461.3178476
Bhatti, B. M., Mubarak, S., & Nagalingam, S. (2021). Information security implications of using NLP in IT outsourcing: A diffusion of innovation theory perspective. Automated Software Engineering, 28(2). https://link.springer.com/article/10.1007/s10515-021-00286-x
El Arass, M., & Souissi, N. (2018). Data lifecycle: from big data to SmartData. In 2018 IEEE 5th international congress on information science and technology (CiSt), 80-87 https://www.researchgate.net/profile/Mohammed-El-Arass/publication/330027037_Data_Lifecycle_From_Big_Data_to_SmartData/links/5c4edca3299bf12be3e922cb/Data-Lifecycle-From-Big-Data-to-SmartData.pdf
Elias Malope, M., & Naidoo, R. (2020). Knowledge sharing challenges in subsidiary-to-subsidiary IT infrastructure outsourcing. Conference of the South African Institute of Computer Scientists and Information Technologists 2020. https://sci-hub.hkvisa.net/10.1145/3410886.3410908
Elkomy, S., Cookson, G., & Jones, S. (2019). Cheap and dirty: the effect of contracting out cleaning on efficiency and effectiveness. Public Administration Review, 79(2), 193-202. https://onlinelibrary.wiley.com/doi/pdf/10.1111/puar.13031
Gurung, A., & Prater, E. (2017). A research framework for the impact of cultural differences on IT outsourcing. In Global sourcing of services: strategies, issues and challenges. https://mds.marshall.edu/cgi/viewcontent.cgi?article=1004&context=mis_faculty
Hintze, M. (2018). Data controllers, data processors, and the growing use of connected products in the enterprise: Managing risks, understanding benefits, and complying with the GDPR. SSRN Electronic Journal. https://sci-hub.hkvisa.net/10.2139/ssrn.3192721
Lin, N. (2020). Designing global sourcing strategy for cost savings and innovation: A configurational approach. Management International Review, 60(5), 723-753. https://link.springer.com/article/10.1007/s11575-020-00428-5
Moon, J., Lee, C., Park, S., Kim, Y., & Chang, H. (2018). Mathematical model-based security management framework for future ICT outsourcing project. Discrete Applied Mathematics, 241, 67-77. https://sci-hub.hkvisa.net/10.1016/j.dam.2016.03.013
Pankowska, M. (2019). Information technology outsourcing chain: Literature review and implications for development of distributed coordination. Sustainability, 11(5), 1460. https://sci-hub.hkvisa.net/10.3390/su11051460
Park, Y. H., Kim, Y., Lee, S. O., & Ko, K. (2021). Secure Outsourced Blockchain-Based Medical Data Sharing System Using Proxy Re-Encryption. Applied Sciences, 11(20), 9422. https://www.mdpi.com/2076-3417/11/20/9422/pdf?version=1634090611
Pellicelli, M. (2018). Gaining flexibility and innovation through offshore outsourcing. Sustainability, 10(5), 1672. https://sci-hub.hkvisa.net/10.3390/su10051672
Statistica. (2019, April 30). Global market spend on outsourcing and shared services 2018. Statista. https://www.statista.com/statistics/1071929/global-market-spend-outsourcing-shared-services/
Tabrizchi, H., & Kuchaki Rafsanjani, M. (2020). A survey on security challenges in cloud computing: Issues, threats, and solutions. The Journal of Supercomputing, 76(12), 9493-9532. https://facultyweb.kennesaw.edu/lli13/alg/6823/lm11/Cloudsecuritysurvey.pdf
Wang, J. J., Sasanipoor, N., & Wang, M. M. (2018). How PMBOK standard and partnership quality influence IT outsourcing success: An investigation of the mediated moderation effects. Journal of Global Information Technology Management, 21(4), 282-300. https://sci-hub.hkvisa.net/10.1080/1097198X.2018.1536597
Wang, M. W., Tan, C. L., & Wahid, N. A. (2020). Service Quality, Facilities Management Practices and Outsourcing Service Provider Capabilities: A Critical Review and Conceptual Framework for Facilities Management Companies. Global Business & Management Research, 12(2). http://www.gbmrjournal.com/pdf/v12n2/V12N2-5.pdf
Wang, Y., Liu, Y., & Canel, C. (2018). Process coordination, project attributes and project performance in offshore-outsourced service projects. International Journal of Project Management, 36(7), 980-991. https://sci-hub.hkvisa.net/10.1016/j.ijproman.2018.02.005
Zhang, J., Chen, B., Zhao, Y., Cheng, X., & Hu, F. (2018). Data security and privacy-preserving in edge computing paradigm: Survey and open issues. IEEE access, 6, 18209-18237. https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=8327600
Pandas And Why They Are Endangered University Essay Example
There are two known species of Pandas today: the Red Panda and the Giant Panda. Despite them sharing a name, the two pandas are not related. The red Panda has a characteristic rusty shade and is relatively smaller than the other species. The scientific name of this animal is Ailurus fulgens (Akshay). Despite their bear-like appearance, the red pandas are not at all bears. They appear as a hybrid of a fox and a cat. They have an average height of 24 inches and weigh about 13 pounds. Red pandas have long, bushy tails, an adaptation to keep them warm while sleeping and for balance when climbing trees (WWF, “Red Panda | Species | WWF”). They are found in China, Nepal, Bhutan, and India. Unlike the giant pandas, red pandas prefer to inhabit dense coniferous forests, particularly on the Himalayan slopes (Akshay).
Additionally, they prefer the mountains to lowland bamboo, similar to the giant Panda. Bamboo is the main diet of both the giant and the red panda species. However, the latter enjoys wild berries, mushrooms, and grass.
The giant Panda, also known as the Panda bear, is a bear species. This species is indigenous to China. Giant Pandas are mammals of the order Carnivora and Genus Ailuropoda. Unlike the red Panda, giant pandas have a characteristic white and black coat of fur and stout bodies. This panda species is the most common due to its color pattern. Although Pandas appear different, scientists have established a close relationship between Pandas and Bears. The posture, climbing technique, and body structure of these two animals are pretty much the same. Research indicates that this panda species is a real bear of the family Ursidae(WWF, “Giant Panda | Species | WWF”).
Moreover, giant pandas are considered as gentle as most bears. The average height of a giant panda ranges between five and six, feet-almost the same height as a human. Females can weigh up to 200 pounds, with males attaining up to 300 pounds. The world’s population of giant pandas inhabit the mountains of southwestern China in damp and misty forests (Lindburg). Research suggests that giant pandas require more than just bamboo to establish a suitable habitat. These animals require old-growth conifer forests with at least two varieties of bamboo and water for survival. The old-growth conifers provide tree stumps and hollow logs for panda dens (WWF, “Giant Panda | Species | WWF”). Pandas’ home is estimated to be an average of 5 square kilometers, with the males having wider ranges than females. Similar to bears, giant pandas spend most of their life eating. They spend an average of 16 hours a day feeding. Bamboo is a panda’s favorite and most important plant.
Naturally, bamboo is low on nutrients, so pandas have to eat it daily. Pandas have adaptations to enable them to feed on bamboo. Their paws consist of a pseudo-thumb and four fingers. The thumb holds bamboo in place during feeding. Their strong jawbones and cheek muscles enable them to chew the thick bamboo stalks (Lindburg). Apart from bamboo, giant pandas feed on grass, fruits, rodents, and even insects. In conservation areas or zoos, pandas are fed carrots, apples, yams, and special biscuits. Despite these adaptations, this panda species has a carnivorous digestive system and cannot digest cellulose in bamboo. As a response mechanism, pandas pass voluminous grass through their digestive tract daily, which translates into defecating up to 50 times a day (Akshay).
The family life of giant pandas is quite intriguing. They are solitary animals that spend most of their day eating and sleeping. Due to the high bamboo consumption daily, a collision of two bears results in a fight. Each Panda takes its own space so that two is a crowd. Mating and birthing are the only two social activities that pandas engage in (Lindburg). Mating occurs around spring and lasts up to three days, while birth season coincides with fall. Although they are solitary, giant pandas recognize other pandas by scent. This characteristic is essential during mating. The scent emanates from a scent gland located below their tails (WWF, “Giant Panda | Species | WWF”). Pandas rub this gland against trees, grass, or rocks when they intend to leave olfactory messages of their identity or sex to other pandas. Female pandas searching for a mate “leave” their scent around for willing males. While females use the scents to signal their need for a mate, males use scents to identify their dens.
The reproduction rate of Pandas is very slow, with females being viable for breeding once in two or three years. Typical female pandas bear about five cubs in their lifetime. Giant pandas have an average gestation period of 135 days, characterized by delayed implantation two to three months after mating (Lindburg). At birth, giant pandas have no fur and are helpless, confining their mothers to the den. The mothers give care to their cub by cradling it on one paw and holding it close to their chest. Mother pandas cannot care for more than one cub despite the high chances of bearing twin cubs. The mothers do not leave their dens to feed or drink for several days after birth. 60 days from birth, the cub’s eyes open, and at 10 weeks, they crawl.
The cub can walk at 5 months and starts to play with its mother while attempting to chew bamboo at 7 to 9 months. The cubs are nursed until 18 months, when they are sent off on their own (WWF, “Giant Panda | Species | WWF”). A giant panda at the age of 2.5 years is considered safe from predators. The common predators of panda cubs include the weasel and the golden cat. For safety, panda cubs scamper to high trees and stay there waiting for their mothers to return. The blend of black and white color of their fur enables them to camouflage on tree tops and shadows. The estimated lifespan of a wild Panda is 20 years, with an average of 30 years for pandas in captivity.
Pandas have continued to be endangered despite various efforts to save them. Although they have reduced or no known predators, pandas have faced the risk of extinction. Human threats form the major threat to panda existence (Obermann). Reports indicate that the world population of wild pandas is slightly over 1800. In the years leading to 2016, the pandas were classified as endangered by the International Union for Conservation of Nature, after which they are considered vulnerable. Although pandas are endeared to many people, as indicated by the numerous efforts to increase their population, they still face a series of threats.
Habitat destruction is the main threat to panda existence. Once, wild pandas were known to inhabit the bamboo forests of China, Vietnam, and Burma. The panda habitats in temperate regions have tremendously reduced due to the growing human population. The growth of the Chinese population to over a billion people has necessitated the need to clear forested areas for settlement. The infrastructural development in China’s Yangtze basin-pandas primary habitat has resulted in fragmentation and isolation of panda populations (Cook).
Additionally, people have continued to harvest trees and other natural resources for commercial and subsistence purposes. Following these developments, it becomes increasingly difficult for pandas to find new bamboo forests and mates. Moreover, the loss of forest cover reduces Panda’s access to the much-needed bamboo for survival. Records indicate that between 1974 and 1985, the panda habitat was reduced by half following logging and farming activities in China (Obermann). In other cases, clearing the forest has resulted in the destruction of panda dens, leaving panda cubs vulnerable to cold, diseases, and predators. Pandas have had to live in habitats surrounded by farms and other human activities, making it unsafe for them to walk freely without encountering humans.
Secondly, Panda’s low rate of reproduction increases the risk of their extinction. Given their solitary nature and short breeding season, pandas have reduced their chances of multiplying. Furthermore, female pandas are unable to care for more than one cub (Lindburg). This implies that in case a wild panda bears twin cubs, one will be left to die. Although this situation can be controlled in a zoo scenario, it remains difficult to alter the survival rate of wild cubs.
Just like other animals, Pandas are often faced with food shortage-in their case, bamboo shortages. This crisis emanates from the natural life cycle of the bamboo plant. Mature bamboo plants flower and then produce seeds before dying. The seeds develop into plants suitable enough for the pandas to eat. Apparently, with bamboo plants, a particular kind grows and dies simultaneously (WWF, “Giant Panda | Species | WWF”). Therefore if there are limited bamboo varieties within a pandas home, the animal will struggle with bamboo shortage sometime. Often when the bamboos die, pandas migrate to other parts of the forest. Therefore in the case of limited bamboo forests, pandas will starve to death.
Another notorious human threat to panda existence is hunting. Hunting and poaching have been the primary reason why the world’s endangered wildlife species are categorized as so. Even though pandas are rarely hunted, they share habitats with other hunted animals (Obermann). Pandas may get caught in traps set for animals like deer and pigs. The traps end up killing the pandas, thus reducing their population. In extreme cases, wild pandas are poached for their skins for the black markets. Poaching of the Panda attracts heavy penalties for anyone caught in it. The red Panda is highly endangered following the illegal pet trade of the animal. This panda species has an appealing color and is relatively small such that people consider them cute and personable as pets. Often, domesticated red pandas die due to a lack of proper care. Moreover, poachers kill the red Panda for its body parts which are believed to have medicinal properties (Cook). Although it is illegal to buy and sell those medicine, black markets operate unhinged.
Works Cited
Akshay. “Different Species of Pandas and Where to Find Them – Nature Safari India.” Www.naturesafariindia.com, 28 Mar. 2022, www.naturesafariindia.com/different-species-of-pandas-and-where-to-find-them/#:~:text=Therearebasically3types.
Cook, Maria. “Why Are the Red Pandas Endangered?” Sciencing, 2018, sciencing.com/red-pandas-endangered-6775531.html.
Lindburg, Donald G. “Giant Panda | Facts, Habitat, Population, & Diet.” Encyclopædia Britannica, 10 May 2018, www.britannica.com/animal/giant-panda.
Obermann, Kyle. “China Declares Pandas No Longer Endangered—but Threats Persist.” Animals, 1 Sept. 2021, www.nationalgeographic.com/animals/article/pandas-are-off-chinas-endangered-list-but-threats-persist.
WWF. “Giant Panda | Species | WWF.” World Wildlife Fund, 2000, www.worldwildlife.org/species/giant-panda.
—. “Red Panda | Species | WWF.” World Wildlife Fund, 2020, www.worldwildlife.org/species/red-panda.