Genericville city has a cosmopolitan population of about 100, 000 people and is highly dependent on tourism. The city has a large river following through the central hub. In certain places along the river banks of the city, there are marshlands or wetlands that help the excess water from the river to accumulate during period of flooding. These wetlands, a delicate ecosystem, help to provide home and nutrition for various plants, animals, birds, and fish. The marshes provide good breeding grounds for fish and birds. Besides it is also popular with the eco-tourists who want to experience the beauty of the area without destruction of the environment. However, the marches in Genericville city also act as a breeding ground for mosquitoes which can be a haven for various infections such as West Nile fever. As per the CDC in 2006, more than 4200 were affected with the disease and about 177 died. Birds also play a vital role in the transmission of the infection. The Genericville community including poor and the rich are at a risk of getting infected with the virus (Appendix B).
It was proposed to launch a program in Genericville to help eradicate West Nile Fever from the area. The estimated benefit from such a program would mean that the number of mosquitoes in the area would reduce by about 90%, with a reduction of cases of West Nile Fever from 50 to 5. The chances of mortalities from the infection would reduce to below 20%. The main idea of the program was to reduce the mosquito population by using the organophosphate insecticide Malathion. However, the risks of getting exposed to Malathion is also high, and further Malathion may possess certain amount of risk of damaging the environment with degradation of human, animal, plant, aquatic and bird health. However, the Agency for Toxic Substances and Disease Registry, 2005, feels that Malathion can be rapidly degraded to harmless substances in the environment, and controlled use of the same possess very trivial risks to the environment and human health. Further, the exposure to Malathion can be minimized through educational and awareness programs (Appendix B).
Today every process or action in life has a risk. If an event is certain to occur, the risk is said to be 1, and if it is certain not to occur, the risk is said to be O. Hence, the risk of certain events occurring in the environment is said to lie between 0 and 1. There are four processes in risk assessment including Hazard Identification, Dose-response assessment, Exposure Assesment and Risk Characterization (Chapter 4.1).
Hazard identification – It is important to determine if exposure to Malathion can increase the risk of adverse health effects (Chapter 4.1). Malathion has use both in urban and in rural settings. In rural settings, the insecticide is used to control pests that would damage crops. The effect of Malathion on the environment is reduced by using minimum levels of the chemical, ensuring that it can be used only on the host crop, and better application techniques. In urban settings, the insecticide is used to control mosquitoes that can act as vectors for West Nile Fever. Many homes, recreational centers and urban gardens are using the same since many years. In the year 2006, the EPA begun to classify Malathion as a suggestive evidence for carcinogenicity, but sufficient evidence for the same does not exist from long-term studies. Hence, Malathion use for the general public had to be registered, although it did not have a significant risk on human health (APHIS, 2007).
Dose-response assessment – It is important to study if the amount of Malathion exposure would cause an adverse health problem (Chapter 4.1). In study animals (such as rats and mice), Malathion can cause cancer only when used at very high doses. Besides, the studies demonstrated that cancer can occur by chance and may not as a result of exposure to Malathion. Malathion is not a known mutagen that can result in cancer. As use of Malathion as an insecticide is in very low doses, there is no significant risk that it can cause cancer. Besides, when used in the environment, Malathion can degrade rapidly and hence does not pose a risk to even bird health. There may be a risk to certain beneficial organisms and aquatic life. Malathion under certain conditions (if not used in a pure form or when disposed off into chlorinated water) may breakdown into malaoxon which is several times toxic than Malathion. The way in which Malathion is used and the low-level of the substance in various insecticide products would mean the risk from malaoxon is also negligible. Studies have demonstrated that the risk to any non-target organism in the environment would also be low (APHIS, 2007).
Exposure assessment – it is important to determine how much and how often humans are exposed to the Malathion in the environment (Chapter 4.1). Malathion would be directly used in area having mosquito breeding grounds, which includes wetlands away from human populations. The insecticide would be used in very trivial quantities such that the target organisms (Mosquitoes and other vectors) are attacked and non-target organisms (such as birds and aquatic life) are not affected. As Malathion would not be directly used on the non-target organisms and the fact that Malathion is used in very low concentrations, in least-damaging techniques and ability to undergo breakdown quickly in the environment, the insecticide would be effective on lowering the numbers of mosquitoes breeding in the marshlands, but at the same time have a negligible damaging effect on the environment. Malathion can be applied by spraying trucks or aircraft-mounted sprayers. Human exposure and exposure to animals and aquatic life in the environment would be trivial (APHIS, 2007).
Risk characterization – It is important to determine the chances of having adverse health effects based on the dose-response assessment and exposure assessment (Chapter 4.1). As the drug would be utilized in very low concentrations and that to not directly on human populations (or bird or aquatic populations), the risk of adverse effects would be minimized (APHIS, 2007).
Based on the information that the City of Genericville is facing an epidemic of West Nile Virus Fever, and that an effective solution in the form of Malathion is available to control the mosquito population without significant risk to the environment (including human, plant, bird, animal and aquatic life), I support a vote for using Malathion in pest control programs. Currently, there no significant risk, as Malathion is not noted to cause cancer, except in vey high-doses in study animals. The intention of having this program along with several other issues being handled including:-
· Educating the population about West Nile Virus Fever
· Pest control in homes by other means (Use of mosquito nets, keeping doors/windows closed at dusk or dawn hours, removing stagnant water, etc)
· Providing primary healthcare services including diagnostic, treatment and preventive interventions for West Nile Fever
· Ensuring research and development – seeking a vaccine against the West Nile Virus, better and less harmful insecticides, etc
· Monitoring bird, plant, and aquatic health
· Environment protection of the marshlands
· Educating the tourists about ways of protecting themselves from West Nile Fever and also about environmental protection
References
Animal and Plant Inspection Service (2007). EPA’s Risk Assessment on Malathion, Retrieved on May 7, 2010, from Web site: http://www.aphis.usda.gov/publications/plant_health/content/printable_version/faq_epa_risk_malathion.pdf
Appendix B (provided by you)
Chapter 4.1 (provided by you)
Risk Assessment Of Illegal Physical Or Internet Intrusion
With the ever increasing cases of hackers, spoofs, sniffers or even Phreakers constantly gaining unauthorized access to private accounts, databases and systems, the need for beefed up security for individuals or organizations is eminently pressing, now more than ever before. A recent report by BBC News (2010) documents of a 25 year-old Frenchman hacking into US president Barack Obama’s Twitter account and doing the same into several other accounts owned by celebrities.
So if the most senior person on earth can get his account hacked, then how much more can we be vulnerable? The nature of our uniquely specialized programs makes us a target for many competitors and consequently; it is mandatorily imperative that a comprehensive risk assessment of our security is done to patch any loopholes that might end up costing us dearly.
Stoneburner, Goguen and Feringa (2002) define risk as “A function of the likelihood of a given threat-source’s exercising a particular potential vulnerability and the resulting impact of that adverse event on the organization.” According to them, “the likelihood of a threat can only be determined by assessing potential vulnerabilities against the system that is in place.” If insufficiencies are revealed, positive recommendations are made so as to avoid casualties thereof. After doing all that, it is advisable to conduct a pilot test to ascertain if the security breaches have been noted and solved. From here onwards, full implementation can be done depending on the organizational budgets, man-power and priorities. As a general rule, the riskier the threat, the faster it should be solved.
The world of technology is a highly dynamic arena that requires everyone to stay on toes; and we here are no different. In United States, there are a handful of federal laws that are in place to protect organizations in-terms of their privacy. However, this has not been able to utterly curb unauthorized access of databases or private accounts (Nehf, 2007). If this worrying trend is to stop, it is elementary that each one of us takes a personal initiative of ensuring security. As an organization, we may have the most secure security system. But if the workers here do not take precautions when handling secure and private information about the company, the security system may just be as good as nothing.
It is also fundamental that old worn-out systems and security gadgets are replaced with new ones. This applies to both computer-based programs like firewalls, hardware, software and antivirus as well as physical components like padlocks. By doing this, the company avoids the risks of being easily permeated. However, do not change to a new security measure just because it is new, there are countless times that old systems have proved more secure than the current ones. Choice should therefore be ultimately guided by professional ethics and going for the safest and most secure system (US Department of Commerce, 2001, p. 2).
According to Grippo and Siegel (2001), once a computer is connected to a network used by many people, the risk of subterfuge increases and its security can be easily compromised. In solving this problem, Grippo and Siegel recommend that the individual/organization should use several security layers (both physical and internet-based) i.e. “The more layers, the greater the degree of security.” An ideal multi-layered networking security system, therefore, is one that offers confidentiality, integrity, authenticity, accountability and authority to its legitimate users (Grippo & Siegel, 2001).
By following the aforementioned five precepts by Grippo and Siegel, it becomes relatively easy for an organization to pinpoint security breaches. This is because everyone has a unique responsibility and thus being answerable to what is placed under his/her jurisdiction. In addition to the above, it is equally important that security systems are periodically reviewed by professionals. Without periodical check-ups and reviews, a window of opportunity is opened for infiltration by unauthorized users. As an example, it is greatly detestable for an organization to use the same password over and over again. By doing this, an employee who might have fallen out with the organization can use that information and cause great havoc. This is in fact, the reason why institutions like banks constantly change or review their systems.
The US Department of Commerce (2001, p.9) supports the issue of security review by saying that “For general support systems, reviews should ensure that management, operational, and technical controls are functioning effectively.” It continues by saying that “Security controls may be reviewed by an independent audit or a self-review.” Finally, it recommends that the rigorousness of this practice should be regulated depending on the nature of the organization being dealt with or the department in question.
For those who significantly use the internet, caution should be observed since accessing a file that contains viruses may destroy an entire network or even make the system vulnerable to unauthorized access. Once a system or network is permeable to access by unauthorized users, confidential information may get leaked to the outside world and thus creating cavity for a vista of endless hazardous possibilities.
As an important note, the advancements in the software world have made it quite easy for online users to privatize their use of the internet and thus making them more secure. This helps in protecting them against hackers who prey on unsecure internet users. Such programs include PrivadaProxy, Anonymizer, and Zero-knowledge’s freedom. The use of such programs really boosts the immunity of an organization against illegal users and curbs the in-traffic of unwanted programs that may compromise the security and efficiency of a system (Buchholz and Rosenthal, 2002).
With regards to physical security, a stringent protocol should be observed by everyone gaining access to this organization. Any malicious behavior by anyone that might compromise the safety of the organization should be reported immediately. Security officers, on the other hand, should ensure that they ardently perform their job. Any small spell of laxity can prove very detrimental to this organization and therefore should be avoided at all costs.
In conclusion, it is vital to note that the primary reason for great concern in security is to protect me and you as well as this organization. It is therefore paramount that all of us work collectively so as to ensure our safety and security of the organization which in effect would facilitate the smooth running of things. Grippo and Siegel (2001) note that no organization can ever be 100% secure, but every organization can always strive to ensure tight and rigid security. This does not necessarily connote spending millions of dollars in the name of security; you can as well spend moderately and have a secure system. Just do not forget that for us to get ultimate freedom; there must always be a price that we have to pay!
References
- BBC News. (March 24, 2010). Obama Twitter account ‘hacked by Frenchman.’ Retrieved May 3rd, 2010, from http://news.bbc.co.uk/2/hi/8586269.stm
- Buchholz, R. A., Rosenthal, S.B. (2002). Internet Privacy: Individual Rights and the Common
- Good. SAM Advanced Management Journal. 67(1), 34+. (Questia library)
- Grippo, F., & Siegel, J. S. (October, 2001). Security issues on the internet. The CPA Journal. 71(10). 64+. (Questia library)
- Nehf, J. P. (2007). Shopping for privacy on the internet. Journal of Consumer Affair. 41(2). 351+. (Questia library)
Risks And Rewards Related To The Solution To The Management Problem
Assess the risks and rewards related to the solution(s) to the management problem
Risks and rewards may be of many forms, financial ones or even professional and emotional forms. The risks and rewards both vary greatly from one person to the other, as the perceived value may be higher or lower depending on the consideration given to the non monetary factors and a person’s appetite for risk. From the very onset of a business the assessment of risk and rewards sets in; for example the establishment of a business and its success is the highest reward, on the other hand the risk of failing is always present. So it is essential to balance the risk and return throughout the life of a business to be successful.
Business and risk and returns:
Businesses across the globe have various priorities depending on their position in the market and their aspirations. A business may face many internal as well as external risks. The management actions and policies may help to reduce or inflate these horizons. For example a risk pertaining to suppliers may cause a significant loss to a business unless management policies are structured to overcome such contingencies. However a business would probably focus on a high risk area. Managerial solution to administer risk may be: Integration of risk management as a core value of the company, performing risk analysis, implementing methods to minimize risk and preparing a plan for identifying risk early and taking preventive measures. (Hill Terry, 2007)
The returns and risks associated may often not be visualized properly. This may cause severe problems and here comes in the relevance of risk assessment and management. Risk analysis tools are used to identify and assess factors that may lower the returns of a project. So it can also be used as a preventive tool. Steps to systematic risk management may be mentioned as follows:
1. Identify risk: the risk could be from the regulatory bodies, a change in perception of product value in customer mind, supplier risk, and risk of fire or forces of nature, competitive product, obsolescence, fall of global markets or any financial crisis.
2. Formulate strategies to contain risk: post identifying the risk initiatives should be taken to contain the risk. Risk is inherent to all businesses so it is crucial to find a way to overcome it, as it cannot be avoided completely.
3. Implementing strategies: strategies to identify and rectify risk constantly should be in place to avoid any huge mis-happening in the business. Applying the concepts to actionable forms is the only solution to reduce risk.
4. Continuous analysis: constant analysis will help understand how a policy should be changed to best suit the business needs.
(Damodaran Aswath, 2008)
Emotional intelligence and risk and rewards:
Authenticity: making sure that policies and procedures are in place to facilitate two way communications in the organization, avoid bias and quick resolution of problems, may help deter problems related to the staff. (Gallipeau, Dan R., 2001).
Ethics: being ethical and morale in the daily operations of the business helps organizations to combat risk of any regulatory reforms which arise from unethical conduct. It also will set in a feeling of being a just organization in the minds of the employees.
Respect: the employees, suppliers and all internal and external stockholders should be treated with respect to avoid any uncalled situation.
Stress management: the employees would are trained to face the stress and perform consistently, can stand as a mentor for others in the organization.
Therefore emotional intelligence can help the organization better manage their employees and avoid any risk of high turnover of staff or any lawsuits from the employees end. It has been seen that managers with high interpersonal skills perform help reduce people related problems and risks. Also if the employees are happy then they are motivated to perform better. So higher productivity is an intrinsic reward attached to the concept. Entrepreneurs and risk and rewards: J.B Say coined the term “entrepreneur” in 1800s, as a person who utilizes change to explore various business opportunities. Some of the rewards attached to becoming an entrepreneur are:
· Financial rewards: a well sought business idea and plan may reap good returns and wealth for the entrepreneur.
· Social rewards: the creation of jobs and providing financial stability for other members of the society is a social rewards attached.
· Independence: the independence from supervision, large corporation bureaucracy, high potential for growth and overall feeling of independence are part of the rewards on offer. (Longenecker Justin etc, 2010)
While the risks attached may be:
· Financial risk: since the financial investments are personal so the liabilities and the substantial loss possible are high.
· Social risk: friends and family may find less time with a person running his own business, especially in the initial years.
· Psychological risk: stress, time management, financial management and overall functioning of a business has to be managed by entrepreneur. So there is a lot of pressure on the person, so he may feel emotional distress.
There are many benefits or problems attached to entrepreneurship but it is essential to have a risk return analysis of a project to understand the feasibility of the business product or service before venturing into a business. (Roberts Michael, 2003)
Reference:
Damodaran Aswath, 2008, Strategic risk taking: a framework for risk management, Wharton School Publishing, New Jersey
Roberts Michael, 2003, Managing risk and reward in the entrepreneurial venture
Hill Terry, 2007, how do you measure the risk and rewards that are associated with your business?
Charette Robert, August 1999, IT Pro, The competitive edge of risk entrepreneurs
Longenecker Justin, William Petty, Leslie Palich, Carlos Moore, 2010, Small business management: launching and growing entrepreneurial ventures, South Western, USA
Gallipeau, Dan R., Jurors’ Views of Sexual Harassment, New York Employment Law Practice, 2001
http://www.gsb.stanford.edu/community/bmag/sbsm624/sbsm62402a.htm
http://www.managerwise.com/article.phtml?id=405
http://www.managerwise.com/article.phtml?id=136
http://www.managerwise.com/article.phtml?id=1
http://ezinearticles.com/?Your-Own-Business—Risks-Vs-Rewards&id=1464351
http://blogs.ft.com/gapperblog/2010/01/the-risks-and-rewards-of-sharing-information-online/
http://www.notesondesign.net/resources/design-careers/starting-a-business-risks-and-rewards/
http://findarticles.com/p/articles/mi_m0FOX/is_1998_Nov_4/ai_53165907/