Wednesday, May 20, 2020

Communication Within Millennials - Free Essay Example

Sample details Pages: 2 Words: 625 Downloads: 8 Date added: 2019/08/02 Category Sociology Essay Level High school Topics: Millennials Essay Did you like this example? Communication Within Millennials Before the invention of the telegraph in 1844 by Samuel Morse a message traveled through the bodys oral cavity and right into the earlobe. Today individuals communicate via email, social media messaging, texting, and types of technology that avoids instant responses and the anxiety of being in the presence of another person. The approach of communication has changed a lot due to technology. Don’t waste time! Our writers will create an original "Communication Within Millennials" essay for you Create order With the great increase in mobile technology and smartphone usage comes the question of how communication has been negatively changed as a result. Millennials have grown up developing communication skills with people by talking with them mostly in person and over the phone, they have had to rewire their lives when technology boomed all over the world. In todays generation, we portray poor communication skills because we are focusing on communicating mainly through texting and social media. In an Atlantic article, A New Kind of Social Anxiety in the Classroom, Alexandra Ossola reveals the idea that younger children have been using certain aspects of technology to avoid the building social skills. It has been debated that some smartphone owners go on their phone to avoid certain aspects of everyday conversation. After a while, people become accustomed to looking at their phone to communicate, rather than talking with someone else in person. This habit can make people feel uncomfortable with talking to others in person, and disrupt the connection and bonding that could have been. Alexandra stresses the importance of communication among society, we each need to feel a sense of belonging. With the growing technology businesses and corporation, the need to connect in person is slowly fading as you can now reach out to someone with a few clicks of a button. Along with Alexandra, Rachel Zahatis also shares her opinion regarding the decline in communication in the Chicago Tribune article,   Technology ruins communication. She believes solely in the idea that, Human beings are innately social creatures and we need to continue to stress the importance of stepping away from the screens long enough to make connections with others. This issue of turning to smartphones in any spare moment leads to the problem that smartphones cause with everyday conversations. People become less accustomed to focusing on the present and lose sight of the importance of face-to-face communication. When people develop the habit of taking out their phones at any free period, they lose the drive to communicate with people in person because the vast capabilities of the device are more stimulating than the conversations. Once communication is lost, connections are lost. Rachel Zahatis also stresses about communication within the workplace. There are managers who ask for a text message reminding them of an event or to change an employees availability. Facebook groups that are created for swapping shifts discourage any personal conversations with my co-workers outside of the workplace. I have even had managers communicate with me via Facebook about work-related issues. There also is an extreme discomfort to interview for a job because that would require long conversations and interpersonal communication skills. Outside of the workplace, communication is even worse. We, as a society, have become so dependent on cell phones, text messaging and social media that we do not even know how to connect with friends. One-on-one conversations are terrifying and phone calls are absolutely taboo. If one does venture out of the technological bubble for coffee with a close friend it is a sure-fire thing that the cell phone is sitting face-up on the table, right next to the cup. We walk through this world with our heads down. Immersed in the technological realm, we disregard the real. We converse with our hands rather than our mouths, tapping keyboards and touchpads to the rhythm of our thoughts.

Monday, May 18, 2020

Use Of Verbal And Symbolic Languages On The Handmaid s Tale

The social nature of humans makes it necessary for the establishment of a system that acts as the channels through which messages and ideas can be passed to the intended people. Language refers to the body of words together with the systems for which the words get used that are familiar to people who live in the same community, geographical region or share the same cultural tradition. Figurative language is a classification that exists within the complex societal settings and is often integrated that compromise of communication general concepts to specific initiatives. Therefore, in addition to spoken language, coded language can be taken by a given society in order to give both the direct and the indirect messages to the intended people. In The Handmaid’s Tale, the Atwood has chosen the use of verbal and symbolic languages to pass across her experience in the past as well as at the time of narration. In the process of narration, she has successfully established various ways through which human language can influence, control and even oppress the society that has adopted the particular language. Names given to individuals always reflect their personality, thoughts and feelings and. Therefore, affect the very fabric of human interactions. When the human naming concept gets violated, the individuals who lose their names part with their identity and even at times show change of character. According to the narrator, Gilead generates an official vocabulary that is used to ignore

Wednesday, May 6, 2020

Satire in Jane Austens Pride in Prejudice Essay - 3688 Words

Jane Austen’s Satirical Writing: Analyzing the Satire of Social Class Within Pride and Prejudice Jane Austen’s Pride and Prejudice delves into the issue of why social standing in a society based solely on class should not be the most important thing when evaluating the worth of a person. Through several different literary techniques – such as letters and abundant focalizers – Austen conveys important information about key issues she has with the significance placed on social standing. The theme of class and social standing is echoed constantly throughout Austen’s novel in numerous ways, highlighting several aspects of the gentry that she distrusts. The entirety of the novel focuses mainly on the distances placed between characters†¦show more content†¦In assessing the weight that social standing has on the progression of the story in Pride and Prejudice, one can attain a great bit of insight into why specific characters act the way they do throughout the novel. The infamous Bingley sisters, for instance, are so attached to the idea of mater ial wealth that they fail to realize when their comments are unacceptable. Ms. Bingley herself, who is so attached to the idea that she is superior to Elizabeth in every way, cannot understand why Mr. Darcy could possibly find Elizabeth attractive in any sort of manner. It is her status-hungry and conceited personality that allows the audience to see the sheer difference between her and her brother, Mr. Charles Bingley. Unlike his sisters, he is not trying to climb up the social hierarchy to gain status and power; instead, he shows a gentler, more levelheaded side to the gentry as he falls in love with Elizabeth’s older sister, Jane. It is characters with personalities and ideals like Mr. Bingley’s that Austen revered and trusted above all others. Curiously enough, however, the hardheaded Mr. Darcy, who is very aware of his social standing, is the one character in the novel who goes through the most drastic personality change. Though Elizabeth Bennet had the positive, clever and levelheaded personality that Austen herself may have had when dealing with the social mobility of her time, it is insteadShow MoreRelatedClass In Pride And Prejudice Analysis844 Words   |  4 Pagesembodies† (17). Yet, while Jane Austen’s Pride and Prejudice sets out to challenge societal misgivings, it also suggests hints at a reinforcement of a patriarchal and capitalistic hierarchy. Therefore, one must ask if Austen’s work is readily attempting to challenge society and transform it to match the more feminine and self-aware conceptions presented in the text through its protagonist, Elizabeth Bennet, and her experience. Ultimately, does Austen in Pride and Prejudice reinforce or challenge ‘class’Read More Comparing S atire in Canterbury Tales, Pride and Prejudice and The Rape of the Lock1351 Words   |  6 PagesUse of Satire in Canterbury Tales, Pride and Prejudice and The Rape of the Lock Jane Austen and Alexander Pope had had a myriad of writing styles and techniques from which to express the desired themes of their works.   Satire, however, seemed to be the effective light-hearted, yet condescending, tool that enabled them to surface the faults and follies of their moral and elite society.   In Chaucers Canterbury Tales, satire is used to the full extent in revealing the glutton within a piousRead MoreSatire Of Being Earnest And Jane Austen s Pride And Prejudice1533 Words   |  7 PagesNineteenth century European society was characterized by organized religion and a rigid class system. Oscar Wilde’s The Importance of Being Earnest and Jane Austen’s Pride and Prejudice use satire to reveal faults in these elements of society. Many of Wilde’s criticisms of society are provoked by his closeted homosexuality. He portrays religion as a restricting, meaningless convention and depicts the aristocratic class as a hypocritical and unempatheti c lot. Austen similarly finds faults in theseRead MoreNorthanger Abbey as a Precursor to Pride and Prejudice Essay1614 Words   |  7 PagesJane Austen’s Northanger Abbey is frequently described as a novel about reading—reading novels and reading people—while Pride and Prejudice is said to be a story about love, about two people overcoming their own pride and prejudices to realize their feelings for each other. If Pride and Prejudice is indeed about how two stubborn youth have misjudged each other, then why is it that this novel is so infrequently viewed to be connected to Austen’s original novel about misjudgment and reading one’s fellowsRead More Essay on Pride and Prejudice as Romantic Novel and Romantic Criticism1398 Words   |  6 PagesPride and Prejudice as Romantic Novel and Romantic Criticism       To a great extent, Jane Austen satirizes conventional romantic novels by inverting the expectations of love at first sight and the celebration of passion and physical attractiveness, and criticizing their want of sense. However, there are also elements of conventional romance in the novel, notably, in the success of Jane and Bingleys love.    The first indication of Austens inversion of accepted romantic conventionsRead MoreNontraditional Women in Jane Austen ´s Pride and Prejudice Essay983 Words   |  4 Pages19th century, these women express attitudes that deviate from the typical stereotype. Pride and Prejudice offers Jane Austen’s take on the traditional 19th century woman through indirect characterization, tonal elements, and heavy satire and irony to portray the idea that flawed women (in the 19th century sense) hold the key to success. Charlotte Lucas, the rational, plain often overlooked character in Austen’s novel is one of these nontraditional women. She is older than many of the central charactersRead MoreJane Austen: Pride and Prejudice 1086 Words   |  5 PagesJane Austen, born December 16, 1775, was an English novelist whose works of romantic fiction earned her a place as one of the most widely read authors in English literature. Austen’s novels critique the life of the second half of the eighteenth century and are part of the transition to nineteenth-century realism. Though her novels were by no means autobiographical, her fictional characters do shed light on the facts of her life and but more importantly, they offered aspiring writers a model of howRead MorePride and Prejudice: Exploring the Chasm Between Love and Marriage in Georgian England1675 Words   |  7 Pagesâ€Å"Pride and Prejudice†, is a novel which explores the huge chasm between love and marriage in Georgian England. Jane Austen’s presentation of passion and matrimony reiterates the fact that marriage is a â€Å"business arrangement†. Austen uses irony to make fun of polite society in this satire and Austen also emphasizes the point that social hierarchy dictates whom you can marry. The pressures of men and women in Georgian England are revealed through her exploration of the aristocracy’s prejudice againstRead MoreIrony in Pride and Prejudice995 Words   |  4 PagesIrony in Pride and Prejudice Irony forms the alma mater of Jane Austen’s novels. Likewise, â€Å"Pride and Prejudice† is steeped in irony of theme, situation, character, and narration. Austen uses it to establish the contrast between appearance and reality. As one examines â€Å"Pride and Prejudice†, one discovers the ironic significance of how pride leads to prejudice and prejudice invites pride. Importantly, the novel elucidates how both â€Å"Pride† and â€Å"Prejudice† have their corresponding virtues bound upRead More Essay on the Irony of Pride in Pride and Prejudice1262 Words   |  6 Pagesof Pride in Pride and Prejudice      Ã‚  Ã‚   Jane Austen uses the elements of both pride and prejudice to develop the satire in her novel. Austen presents pride as both a vice and a virtue. Austen first introduces pride as a vice of arrogance and prejudice, but as the characters in the novel develop so does the concept of pride. Towards the end of the novel pride becomes the vehicle for many of the noble actions taken by the main characters. Austen skillfully interweaves the two parts of pride, the

Project Execution and Control

Question: Discuss about the Project Execution and Control. Answer: Feedback of posts by Student 1 The forum of the student had started with a systematic and concise definition of the project management. The definition is a brief summation of the various facilities and features of project management for the operations in the organization. The first paragraph had even mentioned the theory of Iron Triangle (or Triple constraints) (Ebbesen Hope, 2013). It defines that the internal and external factors have a deterministic role for the management of various resources. The second paragraph had explained the phases of project life cycle in brief taking reference from PMBOK guide which is a very useful book for the project management. The student had classified the project stages in objectives (functional and partial), deliverables (immediate or time being), milestone of the project, overall scope of the work, and the availability from commercial point (Snyder, 2014). The uses of some example points have been helpful for making the statements more understandable and clear to the reader. As per mentioned by Schrameyer et al. (2016), the examples used by the student for the tools that can be useful for implementing change management in project management are Trello and Office 365. The references used by the student are all valid and they have been taken from valid resources and journals. Some of the references used by the student have been taken from project management journals and articles. The use of proper statement structure and simple words has provided the ease of understanding the posts. The referencing style is APA and it is used at many universities from all over the world. Feedback of posts by Student 2 The student has not opted for usual definition of the project and the project management. However, he had analyzed and evaluated the project and it functions from a sourced journal by Zhang (Zhang Fan, 2014). The student have highlighted the importance of the project management operations by pointing the various functions of change followed by project managers such as budget modifications, materialistic changes, and scope modifications. It has been highlighted in the first paragraph that the there are some aspects and scope that are basically hard to be predicted and hence the change management is required. The configuration change management had been suggested by the student for employing the changes of the project operations (Teller, Kock Gemnden, 2014). The use of careful review of the documents has been passed for the problem of change management and the way to deal with the impact of the change management. The student had shared his/her experience for the tools required for the management of project. The student had used Excel for managing a project when he/she was 18 years old. The references used by the student are all valid and they have been taken from valid resources and journals. The last paragraph had been personified for making people more understandable of the concept of change management in project operations (Cameron Green, 2015). The use of proper statement structure and simple words has provided the ease of understanding the posts. The referencing style is APA and it is used at many universities from all over the world. References Cameron, E., Green, M. (2015).Making sense of change management: a complete guide to the models, tools and techniques of organizational change. Kogan Page Publishers. Ebbesen, J. B., Hope, A. (2013). Re-imagining the iron triangle: embedding sustainability into project constraints.PM World Journal,2(III). Schrameyer, A. R., Graves, T. M., Hua, D. M., Brandt, N. C. (2016). Online Student Collaboration and FERPA Considerations.TechTrends,60(6), 540-548. Snyder, C.S., 2014. A Guide to the Project Management Body of Knowledge: PMBOK () Guide. Project Management Institute. Teller, J., Kock, A., Gemnden, H. G. (2014). Risk management in project portfolios is more than managing project risks: A contingency perspective on risk management.Project Management Journal,45(4), 67-80. Zhang, Y., Fan, Z. P. (2014). An optimization method for selecting project risk response strategies.International Journal of Project Management,32(3), 412-422. Project Execution and Control Question: Discuss about the Project Execution and Control. Answer: Risks when Teams are Culturally or Geographically Diverse Culturally and geographically diverse teams can provide several risks in an organization. Some argue that business is the right place for people to learn about diversity. According to Barak (2016), diversity in a workplace can hamper performance and can facilitate open hostility as in culturally diverse teams strong contradictory opinions exist. On the other hand, in the case of geographically diverse teams, problems occur in terms of working styles. People with different background possess different style of working that can hampers overall productivity of a team. Strategies toMitigate Such Risk The four-T model that includes four elements can be used to mitigate any risks related to culturally and geographically diverse workplace. Those four Ts are training, transparency, time and togetherness (Kirton Greene, 2015). Employees must be trained so that they can understand the concept of diversity. Employees must be given ample amount of time to get used to diversity. They also need exposure to understand each other appropriately. On the other hand, communication and information distribution must be transparent while dealing with diversity related issues (Bond Haynes, 2014). Last but not the least, togetherness is also important that will imply the feeling that all workers are working in the same company and will share same goals and objectives. Quality Assurance and Control Quality assurance means maintaining desired level of quality in a service. In a diverse workplace, if it is assured that quality will be provided to each of the employees without considering their religion, sex, background or ethnicity then any confusion related to diversity will be minimized (Jonsen et al., 2013). Employees will think that there will not be any biasness in the workplace based on diversity. It will encourage them to adapt to the diverse workplace. Quality control is known as a method that makes sure that performed examine adheres to a distinct set of quality criteria (Kundu Mor 2017). If the employees of a diverse workplace are ensured that the management has implemented quality control in the workplace where everything would be transparent then issues will be minimized automatically. On the other hand, quality control methods will also make sure that issues are handled properly using appropriate strategies. References Barak, M. E. M. (2016).Managing diversity: Toward a globally inclusive workplace. Sage Publications. Bond, M. A., Haynes, M. C. (2014). Workplace diversity: A socialecological framework and policy implications.Social Issues and Policy Review,8(1), 167-201. Jonsen, K., Tatli, A., zbilgin, M. F., Bell, M. P. (2013). The tragedy of the uncommons: Reframing workforce diversity.Human Relations,66(2), 271-294. Kirton, G., Greene, A. M. (2015).The dynamics of managing diversity: A critical approach. Routledge. Kundu, S. C., Mor, A. (2017). Workforce diversity and organizational performance: a study of IT industry in India.Employee Relations: The International Journal,39(2).

IT Law in Ireland

Question: What a Digital Forensics Investigator should know about IT Law in Ireland? Answer: Introduction Information storage and access to computers has brought drastic evolution with the enhancement of internet access and computer usage across the huge range of areas that includes schools, homes, government departments as well as businesses (McClure, Scambray and Kurtz 2009). These changes develop the need for particular laws, which needs to be regulated in the use of computers as well as data storage along with new techniques and tools for forensic that help in investigating the offences (McClure, Scambray and Kurtz 2009). Below are investigators of computer forensic, which is required by lawyers in support for civil as well as criminal proceedings. Legislation existing in Ireland for handling computer crime Ireland itself has no specific laws, which are meant to deal with the crimes related to computers, but as such they have two laws that could the computers crimes, and these are Criminal Justice Act 2001 that mainly deals with the offences related to fraud and theft, and the other one is Criminal Damage Act 1991 that deal with the section 2 and 5 principle offenses, and these laws cover the section 9 and 48 offenses related to computers. Section 2 (1) discusses that a person who damages without any lawful excuses for the property, or belongings that intend to damage the property or whether the property could get damaged should be guilty for the offence (McClure, Scambray and Kurtz 2009). In section 2 doesnt mention about the particular reference related to crimes related to computers, but the definition of section2 given within the statute of property fails to include about the offences linked with data (McClure, Scambray and Kurtz 2009). Section 5 (1) explains the person that work the computer without nay lawful excuse in the state having the intent to easily access the data that is kept within and outside the state or outside the state, with the intent to easily access the data, which is kept in the state, will be considered as guilty of offence and will be definitely made liable about the conviction to get fine or even get imprisonment for 3 months (McClure, Scambray and Kurtz 2009). Subsection 1 is also applied, in case whether the person or not the person has any intension to access the specific data or the data is kept by any other person. Computer crime in Ireland and Europe There is no exact definition related to computer crime, but the crimes related to computers are the one where we use the computers for committing the offence. Examples related to it are crime committed through the use of computers such as violation of copyright, personal information, bullying or child pornography (Mitnick and Simon 2002). The current legislation of Ireland is has not specified its guidelines about the crimes related to computers and either categorize the computers as considering it as criminal damage under the act of criminal damage1991 or the dishonesty form under the Act of criminal justice 2001 (Mitnick and Simon 2002). In case of Europe, the European council has tried to draft the cybercrime convention that was signed in year 2001. This draft was signed by 53 countries and there were 42 countries that have ratified it. This convention is significant in the global legislation as it makes the bond between the countries in the same way just like treaty (Mitnick and Simon 2002). Digital Forensics Investigator work in legal cases as part of their job Digital Forensics is referred as the application for the purpose of investigating as well as analyzing the technique for collecting and preserving the facts through the specific computing devices in such a manner that its suitable for presenting within the court (Leavitt 2006). For the purpose of using this information in order to prosecute the criminal act and for avoiding the suppression through conducting the trail, its important that investigators should gather the facts in careful and legal manner. An investigator of digital forensics needs to get familiar with every applicable laws as well as needs of regulatory for the purpose of ensuring that the facts are not actually admissible by court. The needs of the investigator ensure that facts collected and are processed through the legislation of privacy data protection (Turing 1936). These facts need to be preceded, analyzed as well as presented in the most unprejudiced manner. Digital Rights of individuals and organizations under Irish law and EU law In the present Ireland laws, individuals and organizations are provided with digital rights that includes the present privacy and act of data protection, along with the act of freedom of information 1997 (Gladyshev and Rogers 2012). The European commission has also published the Code of European Union internet rights, and this code mentions that every person in EU has got the possibility to easily access the services of electronic communications at the affordable prices, and could even access the distributed information and could even run the services as well as application of their interest (Gladyshev and Rogers 2012). The highest court of France has also declared that the access to internet is considered as basic rights of human beings, where else in Finland citizens has the legal rights to access around 1 Mbps internet (Gladyshev and Rogers 2012). Does international law apply in Ireland International laws in context of the regulation body try to govern the relations among the nations and the state. International laws are considered as obligatory towards the state, and this fact offers the rules related to status of law (Blick 2007). In the Constitution of Irish Article 29.6 that regulates the global agreements defines that the global agreements holds the force of laws to certain extent that determines the Oireachtas. This means that the global agreements require to be incorporated in local laws before it get applicable in the state except the laws of European community that terms the article constitution 29 (Blick 2007). Difference in Irish computer crime laws to those in other countries, such as UK and USA Its mentioned above that Ireland failed to have computer crime laws, but the one who is explored to be offended is included under the criminal justice and criminal damage act 2001 (Jones, Bejtlich and Rose 2005). However, its noted that the UK failed to have the exclusive laws, which could deal with the crimes related to computers. There is an act of Computer Misuse 1990 that is specifically designed for the purpose of addressing the misuse of computers and explains that there are three offences that related to misuse of computers, which is mentioned below: Unauthorized access to the material saved in computers Unauthorized material modification associated with the computers (Hanna 2009). Unauthorized access with an intention to make easy for the commission of future offences (McIntyre 2008) While comparing the Oreland with other countries like USA and EU holds the comprehensive laws that are mainly regulated towards offences of computers and could be divided in few sections such as: Online security fraud Fraud on internet Online Gambling Online Firearms sale Online sale of controlled substances and prescription drugs. Internet child pornography, luring child and the other related activities Online alcohol sales Intellectual property theft and Piracy of softwares (McIntyre 2008). Changes in Irish IT law since 2003; did changes take place in 2014 Since the year 2003, two additions are done in Irish laws associated with crimes related to computers. First were the district court rules of 2003 that relates with fraud and theft offences that were later amended as criminal justice act 2001 (Hanna 2009). As per the form 34.1 the warrant provides the certain powers such as: To operate or either operated by an individual through accompanying their purpose To offer their password required for operating This act helped in bringing various changes related to offences of white collar crime. All these changes have offered power to Garda in context of the passwords and files decryption along with the duty for reporting the specific crimes (Hanna 2009). Other than computer crime law, mention about other laws that interest the computerforensics investigator Act of Freedom of Information 1997 Act of Data protection 2003 Act of Copyright and related rights 2000 (Walden 2007) Act of criminal evidences 1992 Act of Data protection 1988. New with eDiscovery eDiscovery is referred as the process that is mainly used for the facts in the legal cases related to crime and civil in context of requesting, reviewing, as well as searching the electronic information. In the year 2009, the committee of Superior courts rules tries to amend the superior court rules in the year 2009 (Reed and Angel 2000). These amendments need increase with the use of electronic technology in the interaction between more than 2 parties. The main changes could be mentioned in brief: One party in the process could try to send request in electronically storing the information in the searchable way through the other party (Casey 2011). The court might order one party to offer the information stored in electronic format in the searchable format for the other party. In the case of computers that includes the sensitive information but not the discoverable data, which could be ordered by court that act as the independent investigator for searching the appropriate electronic data (Reed and Angel 2000). A request could even be send to the court for the purpose of narrowing the discovery scope in case where the party could offer the discovery that believe in exploring the data and its documentation might be time consuming and costly (Reed and Angel 2000). Conclusion This report is helpful in understanding various policies and laws related to protection of computer misuse. This report is also supportive in understanding the crimes undertaken in Ireland and the legislative regulations for protecting it. References McClure, S., Scambray, J. and Kurtz, G. 2009. Hacking Exposed. McGraw Hill. Mitnick, K. and Simon, W.L. 2002. The Art of Deception: Controlling the Human Element of Security. Wiley Leavitt, D. 2006. The Man Who Knew Too Much: Alan Turing and the Invention of the Computer. Norton Turing, A.M. 1936. On computable numbers, with an application to the Entscheidungs problem". Proceedings of the London Mathematical Society, Series, 2 (42), pp 230 - 265 Blick, R.H. et al. 2007. A nanomechanical computerexploring new avenues of computing. New Journal of Physics, 9, pp. 1-241 Jones, K.J., Bejtlich, R. and Rose, C.W. 2005. Real Digital Forensics: Computer Security and Incident Response. Addison Wesley McIntyre, T.J. 2008. 'Cybercrime in Ireland' In: Reich, P (eds). Cybercrime and Security. Oxford: Oxford University Press Walden, I. 2007. Computer Crimes and Digital Investigations. Oxford University Press. Reed, C. and Angel, J. 2000. Computer Law; 4th edition. Grant Thornton International. Casey, E. 2011. Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. Academic Press. Gladyshev, P. and Rogers, M. K. 2012. Digital Forensics and Cyber Crime: Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers. Springer. Hanna, N. K. 2009. e-Transformation: Enabling New Development Strategies. Springer Science Business Media.