Thursday, September 3, 2020

History project- religious development in India Essay

With the happening to the Mughals in India and the Turkish principle, there were numerous turns of events and changes in the Indian culture and religion. The Sultans of Delhi and Mughal endured various religions, particularly Hinduism, however they were supporters of Islam. This lead to the beggining of indo-islamic culture. Since day break of history, India has been the support of strict turns of events. In the early medival period, two parrelel developments in Hinduism and Islam speaking to the Bhakti and Sufi developments rose in India. The Indo-Islamic strands have been woven into the surface of India by interweaving Bhakti and Sufi conventions. Bhakti development The Bhakti development is a Hindu strict development where the fundamental profound practice is cherishing commitment towards Shiva or Vishnu. Bhakti development is likewise firmly identified with Sufism of Islam which rose in a similar timeframe and both supported ‘love of God’ as the simplest method to achieve God. The Bhakti development began in old Tamil Nadu. The Nayanmars and the Alvars assumed a significant job in the Bhakti development. The Bhakti development existed together calmly with different developments in Hinduism. It was at first thought to be strange, as it opposed station differentiations and ignored Brahmanic customs, which as indicated by Bhakti holy people were redundant for salvation. Over the span of time, in any case, attributable to its huge prominence among the majority it became ‘orthodox’ and keeps on being one of the most significant methods of strict articulation in current India. The world ‘Bhakti’ implies commitment to God. The Bhakti development had its beginning in the Bhagavadgita and the Upanishads. The Bhaktas of God didn't have faith in such a rank qualifications. They pushed love and dedication to God and disposed of a wide range of customs and functions. They lectured unity of God and â€Å"that all religions were nevertheless streets prompting the equivalent goal†. Boss Principles of Bhakti Movement: The main standards of the Bhakti development were as per the following: 1. It is Bhakti or commitment to God alone that can assist man with achieving salvation. 2. It is imperative to follow a genuine master for acknowledging God. 3. All men are equivalent and nobody is predominant or substandard. 4. Rank differentiations, customs, fasts, and so on. , are pointless and turn into dead end. 5. All men ought to be open minded. Impacts of the Bhakti Movement: The Bhakti development had extensive consequences for the individuals. Right off the bat, it helped a ton in expelling the current sharpness between the Hindus and the Muslims. Both turned out to be progressively lenient towards one another. Furthermore, the Bhaktas uncovered the emptiness of void customs and services and instructed the individuals to surrender indecencies like confidence in strange notions and so on. This development delta a hit to the prevalence of the Brahmins, for it proliferated the equity all things considered. This likewise helped in checking changes. Thirdly, the Bhakti reformers lectured in the basic language of the individuals, which offered ascend to the vernacular dialects, for example, Bengali in the east, Gujarati and Marathi in the west and Punjabi in the north. Significant Bhakti Reformers Ramanuja : Ramanuja was perhaps the soonest reformer. His lessons depended on the Upanishads and Bhagwad Gita. he had instructed in the language of the normal man. Before long an enormous number of individuals turned into his supporters. Ramananda was his follower. Ramananda : Ramananda was the primary reformer to lecture in Hindi, the fundamental language spoken by the individuals of the North. He was instructed at Benaras. He lectured that there is not all that much or low. He was a fervent admirer of Rama. He thought about God as a caring dad. He lived in the fourteenth century A. D. Kabir : Kabir was an enthusiastic supporter of Ramananda. He needed solidarity between the Hindus and the Muslims. He lectured that both the Hindus and the Muslims are the offspring of a solitary God. He had no confidence in icon adore, strict customs and services. The enthusiasts of Kabir were known as Kabir Panthis. Chaitanya : Chaitanya, an incredible aficionado of Lord Krishna, was a holy person from Bengal. From his very adolescence, he had demonstrated extraordinary enthusiasm for training and examined Sanskrit. He wedded the little girl of a Saintly individual. Later at 24 years old, he disavowed the common life and turned into a sanyasin. His adherents viewed him as a manifestation of Lord Vishnu. He helped the old and the penniless. He was against the imbalances of the station framework. He underlined the requirement for resistance, mankind and love. He spread the message of Bhakti in Bengal. He promoted ‘Sankritan’or open singing of God’s name. He was tended to 'Mahaprabhu’ by his supporters. Meera Bai : Meerabai was a Rajput princess. She wedded the Rana of Mewar. She was a devout fan of Lord Krishna. Her tunes or songs are even today sung all over India. Her castle was kept open to individuals of all positions to join her Bhajans of Lord Krishna. She had lived generally of her life in Mathura, the origin of Krishna and Vrindaban. There is a sanctuary devoted to Meerabai in Chittor, the capital of Mewar. Sufi development Sufism was a change development inside Islam which applies more noteworthy weight on free reasoning, liberal thoughts and lenience. The Sufis trusted in the correspondence of every single individual and fraternity humankind. The Sufi development began in Persia. A portion of the Sufi holy people additionally came to India. They started to lecture their liberal thoughts and to expel the bay between the Hindus and the Muslims and consolidate them. The word Sufi has been taken from the Arabic word ‘Suf’ which implies fleece. The development may have been given the name Sufism in view of the course fleece pieces of clothing they wore as a characteristic of their dismissal of common things. Sufis have generally taken promises of neediness and abstinence. Sufism created strict works on concentrating on severe poise that empower both mental and magical experiences just as lost self, with a definitive objective of supernatural association with God. The Sufi development comprises of friendly requests in which pioneers train and help pupils in the dominance of Sufism’s philosophical standards and ceremonial practices. Such customs and practices incorporate composition and presenting verse and psalms; the absolute generally well known and delightful writing of the Islamic world has been composed by Sufis. Sufis take part in an assortment of ceremonial practices planned to assist them with acknowledging association with God, for example, unmistakable types of custom petition including the recitation of God’s names, just as substantial ceremonies, for example, those practices by the purported â€Å"Whirling Dervishes,† a Turkish Sufi request that rehearses reflection and thought of God through turning. Educating of Sufism: 1. There is one God, the Eternal, the Only Being; none else exists spare He. 2. There is just one Master, the Guiding Spirit all things considered, who continually drives his adherents towards the light. 3. There is one Holy Book, the sacrosanct original copy of nature: the main sacred text, which can edify the peruser. 4. There is one Religion, the unswerving advancement the correct way towards the perfect, which satisfies the life’s motivation behind each spirit. 5. There is one Law, the Law of correspondence, which can be seen by a sacrificial soul along with a feeling of stirred equity. 6. There is one Brotherhood, the human fraternity, which joins the offspring of earth unpredictably in the parenthood of God. 7. There is one Moral Principle, the adoration which springs forward from abstemiousness, and blossoms in deeds of usefulness. 8. There is one Object of Praise, the excellence which elevates the core of its admirer through all viewpoints from the seen to the Unseen. 9. There is one Truth, the genuine information on our being inside and without, which is the quintessence of all astuteness. 10. There is one Path, the obliteration of the bogus sense of self in the genuine, which raises the human to everlasting status and in which dwells all flawlessness. The Sufi Movement there is no brotherhood in the normal sense, the organization is just to direct the administration and to answer the need of a cleric which consistently exists in our regular day to day existence. Those appointed in the Sufi Movement are called Sirajs and Cherags. There is no qualification among ladies and men. The commendable soul is appointed; this gives a guide to the world that in all spots †in the congregation, in the school, in parliament, in court †it is lady and man together who make advancement complete. And yet every Sufi is a minister, an evangelist, an instructor, and an understudy of each spirit that he meets on the planet. The Sufi petitions, for example, Saum and Salat are not man-made supplications. They have slid from above, similarly as in each time of profound reproduction supplications were given. What's more, there is each force and gift in them, particularly for the individuals who accept. Sikhism Guru Nanak is the originator of the religion of Sikhism and is the first of the ten Sikh Gurus. His introduction to the world is praised worldwide on Kartik Puranmashi, the full-moon day which falls on various dates every year in the period of Katak, October-November. Master Nanak headed out to places far and wide showing individuals the message of one God who stays in all of God’s manifestations and establishes the interminable Truth. He arrangement a special otherworldly, social, and political stage dependent on uniformity, club love, goodness, also, goodness. Nanak was conceived on 15 April 1469, presently celebrated as Guru Nanak Gurpurab. Today, his origination is set apart by Gurdwara Janam Asthan. His folks were Kalyan Chand Das Bedi and Mata Tripta. His dad was a patwari (bookkeeper) for crop income in the town of Talwandi, utilized by a Muslim proprietor of that region, Rai Bular Bhatti. He had one sister, Bibi Nanaki, who was five years more seasoned than him and turned into a profound figure in her own right. Nanak likewise looked for some kind of employment with Daulat Khan, when he was around 16 years of age. On 24 September 1487 Nanak wedded Mata Sulakkhani, little girl of Mul Chand and Chando R

Saturday, August 22, 2020

Teaching ICT at School Reasons, Concerns and Solutions

Theoretical Purpose Over the previous scarcely any years, the criticalness of data and PC innovations has duplicated a few times. New media has opened a pool of chances in each and every field, expanding the pace of globalization and adding to business development.Advertising We will compose a custom appraisal test on Teaching ICT at School: Reasons, Concerns and Solutions explicitly for you for just $16.05 $11/page Learn More Methods The given investigation will give the topics that ought to be educated in ICT classes in schools with the goal that understudies might utilize the most recent advancements to further their potential benefit in contemplating, find out about the system of their subjective procedure and become deep rooted students. Results The presentation of the ICT standards into the training framework will assist instructors with getting new aptitudes all the more effectively. Throughout the exploration, a diagram of the key ICT subjects was finished. Conversation The o utcomes have demonstrated that, among the ICT topics that ought to be seen as the school material, computerized education, instructive frameworks and human correspondence in ICT ought to be recorded. Presentation: Nature of the Problem There is no mystery that with the coming of data advances, the scene of correspondence, business and media has changed fundamentally. Data innovation has spilled into extremely single region and part of people’s lives, and it has gotten significant to figure out how to utilize these progressions to people’s advantage; for example, ICT educating can reveal some insight into versatile learning (El-Hussein Cronge, 2010). In any case, bringing ICT into the school educational plan is laden with various challenges. Mission statement, Scope and General Method The reason for the given paper is to characterize the topics of ICT that ought to be instructed to understudies at school, just as the strategies for educating the previously mentioned sub jects. Perceiving how the given point is somewhat wide, the extent of the paper will concern the subjects that can be instructed to secondary school and undergrads. With respect to the examination strategy, the standard of grounded hypothesis will be utilized so as to structure the essential examples for educating ICT. The standard of grounded hypothesis will be the key technique. Theory Because of the open doors regarding innovation and correspondence that ICT opens before educators and understudies, it is generally sensible to utilize ICT as the way to achieve such objectives as the move from an old to a moderately new showing worldview (EACEA, 2009, 14), additional open doors for instructor training (UNESCO, 2005, 55) and expert turn of events (EACEA, 2009, 14), increasingly effective study hall the executives (EACEA, 2009, 14), better collaboration between schools (EACEA, 2009, 14) and accessibility of the vital hardware (EACEA, 2009, 14). The given objectives can be accomplishe d by presenting such themes as research and e-mindfulness, correspondence, control and science, demonstrating and reproduction and taking care of data.Advertising Looking for appraisal on training? We should check whether we can support you! Get your first paper with 15% OFF Learn More Methods As it has been worried over, the standards of the grounded explore were utilized throughout characterizing the key ICT topics to be educated in schools. The key qualities of a decent ICT exercise will be characterized and generally sensible and proficient techniques for educating ICT will be recognized. At last, the difficulties with respect to ICT instructing at schools will be diagrams, and essential methods for tending to these difficulties will be given. Results and Original Hypothesis An effective utilization of intelligent materials is a decent technique for acquainting understudies with the open doors gave by the ICT, (Eurydice, 2011, 10). The given methodology is vital in that it takes into consideration showing understudies the advantages of the ICT in a realistic manner. More to the point, the given technique assists understudies with applying the gained aptitudes to rehearse following these abilities were found out, as it was done in Malaysian schools in 2002 (Chan, 2002, 2). The third alternative that educators have as far as techniques for instructing ICT to understudies in schools is to use such systems as task based learning, customized learning, individualized, or understudy focused, learning, logical examinations and internet learning (Eurydice, 2011, 43). The given strategies are similarly significant, since, however having apparently various attributes, they are totally focused at a similar objective, i.e., creating students’ freedom in the utilization of ICT. The issue in regards to study hall the board ought to likewise be raised. As ESEA report says, homeroom the executives procedure turns out to be significantly simpler with the presentation of the ICT advances, which permits the two understudies and instructors to concentrate on the class exercises and, hence, makes the most suitable learning and educating condition. Patterns Discussion ICT helps understudies in their meta-insight process. Phelps and Graham’s study shows that the combination of ICT into meta-perception process prompted rather productive outcomes in fourteen schools (Phelps Graham, 2008, 129). At specific focuses, the objectives of ICT considering and meta-comprehension cross †both are planned for helping understudies perceive the need to take part in long lasting learning and pick the best strategy for self-learning. As Shannon (2008) put it, it is conceivable â€Å"to become a self-coordinated student utilizing metacognition† (Shannon, 2008, 14). Perceiving how ICT takes into account empowering self-learning in understudies (Eurydice, 2011, 43), it appears to be sensible to utilize meta-discernment systems as the reason for instruc ting ICT in schools.Advertising We will compose a custom evaluation test on Teaching ICT at School: Reasons, Concerns and Solutions explicitly for you for just $16.05 $11/page Learn More furthermore, ICT obviously influences the teachers’ ability and polished skill also. ICT gives a plenty of chances to proficient development, including quick obtaining of new data, collaboration with different specialists and accessibility of various preparing programs. The last however certainly not the least, such capacity of ICT as a superior command over the innovative part of the exercise assists educators with concentrating on the correspondence with understudies instead of overseeing gear. At long last, increasingly productive time the executives is likewise an undeniable bit of leeway. Conversation It would not be right to guarantee that there are no substantial issues concerning educating ICT in schools. To begin with, the progressions to the educational plan that the incorporation o f ICT classes request is in all probability trigger extensive authoritative issues, particularly in regards to time the executives. As per the information gave above, much of the time, the presentation of the ICT considers came at the expense of different subjects. In this manner, while furnishing understudies with an opportunity to get the hang of utilizing the ICT innovation, one must roll out the necessary improvements to the educational program and the remainder of the classes. To explain the previously mentioned issue, it will be generally sensible to apply the rule of web based instructing referenced previously. The given methodology takes into consideration understudies to have a progressively adaptable calendar and to pick the time the board framework that they like and that suits them best. Along these lines, the accompanying topics must be introduced in the ICT educational program: Research and e-mindfulness; Communication; Control and science; Modeling and reproduction; H andling information. Of the considerable number of subjects referenced over, the issue with respect to research and e-mindfulness appears the most significant one. It takes into consideration both inspiring understudies for finding out more and getting autonomous in their exploration. Along these lines, the given subject must be the course need. End With the appearance of data and registering innovations, people’s social, individual and, above all, scholarly life has changed significantly. While the new choices opened for understudies appear to be fairly appealing, including ICT into the school educational plan may be all in all a problem.Advertising Searching for evaluation on training? We should check whether we can support you! Get your first paper with 15% OFF Find out More So as to maintain a strategic distance from the potential issues, it is important to pick the technique that will permit educators to direct understudies as opposed to keeping an eye on in their ICT investigation. Along these lines, understudies will have a chance to both figure out how to utilize ICT proficiently and to become long lasting students. Reference List Chan, F. M. (2002). ICT in Malaysian schools: Policy and techniques. Web. EACEA (2009). Investigation of the effect of innovation in grade schools. Web. El-Hussein, M. O. M., Cronje, J. C. (2010). Characterizing versatile learning in the advanced education Landscape. Instructive Technology Society, 13(3), 12â€21. Eurydice (2011). Key Data on Learning and Innovation through ICT at School in Europe 2011. Web. Phelps, R. Graham, A. (2008). Creating innovation together, together: An entire school metacognitive way to deal with ICT instructor proficient turn of events. Diary of Computing in Teacher Education, 24(4), 125†133. UNESCO (2005). ICTs for optional instruction. Web. This appraisal on Teaching ICT at School: Reasons, Concerns and Solutions was composed and put together by client Aryana P. to help you with your own investigations. You are allowed to utilize it for research and reference purposes so as to compose your own paper; be that as it may, you should refer to it in like manner. You can give your paper here.

Friday, August 21, 2020

How Entrepreneurs Impact an Economy Free Essays

Acquaintance As economies proceed with coordinate because of globalization and officially shut economies like India and China walk toward complete advancement, business enterprise is on the expansion. A nearby investigation of created and industrialized economies shows a shared factor that stands apart among every one of them, which is the significant pretended by business enterprise and business people in such economies. This wonder has demonstrated to us that if an economy is to grow completely, enterprise ought to be permitted to thrive. We will compose a custom paper test on How Entrepreneurs Impact an Economy or on the other hand any comparable theme just for you Request Now Along these lines it is the goal of this paper to basically break down the effect of business people in some random economy. In this paper the essayist will distinguish and talk about the numerous advantages stood to an economy through business people and enterprise and the drawbacks of the equivalent and reach determinations on the general effect of the business visionaries. Development People frequently resort to business enterprise for one of the accompanying reasons, since they discover a market specialty and have the answer for benefit from such specialty, since they have been not able to discover appropriate work or a reasonable methods for money and hence have turned to utilizing their innovativeness to create a salary for themselves, or in light of the fact that they have the mechanical expertise and the monetary assets (or ready to source the entirety of the abovementioned) important to produce pay by fulfilling a need in the commercial center. Independent of which of the above drove a person to turn into a business visionary plainly development and imagination is the driving element and in this way it very well may be expressed that the greatest effect of business visionaries to an economy is the inventive commitment that they make. Employment Creation As expressed in the past area one of the primary reasons that people will in general become business visionaries is on the grounds that they can't secure appropriate positions. Subsequently, by being venturesome, inventive and finding a market specialty, in addition to the fact that they are ready to produce a pay for themselves to utilize others in their business tasks. Subsequently one of the best effects that business people make on an economy is work creation and the decrease of joblessness levels inside that economy. In created nations we see that right around 40 †half of the workforce are utilized in little and medium scale business endeavors that were fired up by extremely ambitious people. Moreover in nations like India we see that a large number of ladies have had the option to get their families out of neediness through independent work and business that has been made conceivable by various Non Governmental Organizations and because of the accessibility of such assets through miniaturized scale money and so on. Africa is another genuine case of little scope business people assisting with lessening neediness and help many maintain a strategic distance from dejection. In this way dependent on everything that has been expressed above it is clear that business visionaries can cause an extraordinary level of effect on an economy through occupation creation and pay age. Expanded Competition Another positive effect of business on an economy is the expanding level of rivalry in that economy as new business visionaries join the quarrel in existing residential markets. While one may dare to state that this will just prompt market immersion, the upside of such a marvel is, that it makes all the players in the market reconsider their operational capacities, increment esteem expansion, lower costs and become progressively productive. Along these lines it tends to be expressed that opposition diminishes probability of restraining infrastructures and oligopolies in the commercial center and is useful to the client and the economy in general. Expanded Productivity One of the upsides of expanded rivalry in an economy is that people and firms keep on sourcing strategies that can all the more likely improve their tasks, use assets all the more productively and in particular lessen costs while including esteem. This regularly brings about an expansion in profitability in an economy and an increment in the total national output (GDP), which is for sure an advantage for the economy. While adversaries will in general express that when efficiency expands the joblessness can frequently build, hence lessening the positive effects, it is the assessment of the essayist that expanded profitability which would then be able to prompt expanded joblessness will at that point cause more people to be imaginative, discover specialty markets, become business visionaries and start producing greater work openings, in this manner re-designing the haggle the economy forward. New Markets As expressed in the past area expanded rivalry in the commercial center can cause immersion and subsequently numerous business people perhaps headed to look for new markets for their items and benefits or adjust showcase entrance strategies. Whichever way such a marvels of expanded rivalry, which at last makes people search for new markets can be considered as a constructive effect on the economy and along these lines business visionaries can be considered to assume a significant job in the economy. As reconciliation of economies proceeds because of globalization business people frequently will in general search for business sectors that are outside of their household circle in this manner creating remote income and expanding the flourishing of the economy all in all. While this perhaps an extremely shortsighted clarification of the effect that business visionaries make on an economy, it is likewise protected to state that the work age, expanded rivalry, showcase extension, advertise entrance and sourcing new markets all outcome in pay age that at last assistance an economy to turn out to be increasingly prosperous, coax millions out of neediness and create assets for social government assistance exercises that at last elevate the expectations for everyday comforts of its populace. Negative Impacts of Entrepreneurs The single biggest negative effect of business visionaries on an economy is the looting of assets, which can have an unfortunate effect on the earth. While such negative effects are relieved somewhat in created economies because of the requirement of natural assurance guidelines and guidelines, this isn't the situation in creating economies. Further enterprise requires a specific level of business information and expertise, without which innovative endeavors can frequently fall flat, which can likewise cause numerous budgetary hardship that in outrageous cases can even prompt dejection. Social Entrepreneurship Today we see the domain of social business enterprise developing exponentially which is an exceptionally constructive sign and has assisted with coaxing millions out of destitution, decline joblessness, decline the quantity of individuals reliant on social government assistance and all things considered inspire the expectations for everyday comforts and personal satisfaction of millions. Further social business enterprise activities are additionally regularly observed as ‘green initiatives’ that contemplate the effect on the common habitat and in this manner endeavors to keep this at any rate, along these lines expanding mindfulness about such issues, abstaining from looting of characteristic assets and rationing the earth at every possible opportunity. In this manner it very well may be expressed that the negative effects of business visionaries on an economy can be alleviated somewhat through social enterprise. End In view of everything that has been examined above it is clear that the positive effects of business people on an economy, far exceed the contrary effects. Occupation creation, decrease in joblessness levels, expanded rivalry, opening new markets, expanding profitability, outside salary age and destitution easing are a portion of the positive effects that business people have on an economy. Anyway it is not necessarily the case that there are no negative effects, for example, the wastage and looting of assets, yet taken overall it is evident that the business people decidedly sway an economy. Instructions to refer to How Entrepreneurs Impact an Economy, Essay models

Saturday, June 13, 2020

Dissertation on the Effects of E-government on the Transparency of the Government of China

Dissertation on the Effects of E-government on the Transparency of the Government of China Abstract The concept of transparency has always been debated upon by the general public and experts as they critique the performance of their national governments. Many have argued that the government is difficult to reach out to due to the danger of misconduct by some of its officials and the possibility of waiting for the government to respond to each case for months. Upon the introduction of the internet and its prominent role in improving business and social processes, many experts have noted that the internet can be utilized to improve governance. Out of the various propositions and solutions, the idea of creating an e-government became a favorite project in improving government affairs. However, upon China’s implementation of the said program, many have questioned if it is genuinely skilled in changing the Chinese government given the various factors that must be considered to enable it to succeed. The study will examine the effectiveness of Chinas e-government on the transparenc y of the Chinese government. The study will also discuss how it has managed to replace the standard governance strategies of the oldest civilization in Asia. Keywords: e-government, chinas e-government, Chinese politics, Chinese e-government CHAPTER I: INTRODUCTION Transparency and effective management are usually the factors on which voters and experts look for in examining executive candidates, especially those who are re-running for a position in the government. Many of the governments opposition notes corrupt practices and weak governance, but they have vehemently denied these accusations and try their best in developing strategies in proving to their constituents that they are sincere in their desire to provide a clear government. Most of these development programs have failed while some have managed to improve most management processes to be fit in the modern time. Gronlund and Horan (2004) stated that the concept of E-government was created sometime in the late 1990s alongside the emergence of the internet and the creation of e-Commerce which was then a fledgling concept. Unlike its current function, the e-government system has first been used by practitioners whom are looking for new systems to include the use of the internet in certain new programs and systems. However, upon the introduction of the system, the definition of the E-government has varied in each government. But, they still have the same goals and the same function that revolves on creating a more systematic government that would cater to the public and improve the government’s democratic processes. This particular notion on the function of the e-government program has remained in most official documents and programs that uses the system however the part wherein the system is for the improvement of the democratic processes of the government is downplayed in both definitio n and application. (Gronlund Horan, 2004) Upon the introduction of the internet in the early 1990s and the wonders of the World Wide Web, many have noted its use in improving government affairs and governance and have formulated the e-government model. In the definition given by Holliday and Yep (2005), the e-government system is the use of ICT to disseminate information properly to all sectors and allow the public to participate in government-related decision making. Through the e-government system, channels are available for the public to access vital publications, reports and studies and the public finds the luxury to seek for government services. It is in full hopes of those who have conceptualized the e-government model that it would be used by developing countries in improving their own governments. The e-government system has first been used by practitioners experimenting in the application of the internet to different leadership styles and strategies. However, upon the application of the model to governments, its mea ning has evolved to fit each government belief. Although the centre has varied, it still promotes automating most of the government processes and introducing public-influence to existing government dealings and decision-making. What lacks in the definition is the development of the democratic processes of the government as it is downplayed in both research and implementation. Without this improvement, the e-government program can only be referred to as e-governance (Gronlund Horan, 2004). The international community has understood the purpose of e-government in improving its services and has directly applied it into their developing design. The United Nations had issued their opinion on the idea of e-government through the Human Development Report of 2001. The assessment had argued that using the ICT would allow the United Nations to demonstrate the importance of using technology to enable development. The World Bank has also applied the E-Government design and released a handbook entitled The E-Government Handbook for Developing Countries in November 2002. After a year, the United Nations Conference on Trade and Development followed suit as they met up in Geneva and Tunis in 2003 and 2005 respectively and discussed how they could use the ICT in the system. Other developed countries such as the United States and the United Kingdom have already applied the e-government program in their own governments while others followed suit. The United States has even been consider ed to have the best e-government type in the world after Singapore. (Holliday Yep, 2005) The influence of the e-government model has managed to reach even the Eastern continents which gained utmost attention. One such country, which have quickly gained a fascination with the model, is the Chinese government. Upon the dawn of the early 1990s, China has gradually developed itself as one of the most influential Asian nations in the present century after Japan. However, the country was late in introducing technology to the country which could be seen in their discovery of the internet. Unlike the other developed countries and its neighbors, China has only experienced the internet in 1994. Since then, they have slowly enabled it to become mainstream. According to Xiong (2002) and Luo (2009), studies have noted that the number of online users in China reached at least 12,540,000 computers since 2002 which can be estimated to 2.6% of the entire population. In terms of usage, at least 7597.5MB is the accumulated bandwidth used around the country while domain names under the CN l ine counts up to 127319 users, most of which are from the government with 5,864 websites. Through this data and some techno-cadres, some have pushed for the application of the e-government program to the current Chinese system of governance. Some even argued that China is capable of overtaking the US in its position as the most powerful nation if the country continues to improve in both its political and financial sector. However, there is still the problem that not all who go online visit government sites and the concern that not all have the capacity to go online to view these improved sites. The e-government system’s success is detrimental to the number of people who access the government website and those who seek services through this method. Despite this setback, many departments have already promulgated the e-government program, resulting to 145 gov.cn domain names by May 1998. It has also managed to reduce the workload of government departments and gave more time for decision-making and implementation. To the national government, there is a need to create a system that would allow each executive department and offices to work efficiently online and merge them without a risk of potential backlashes, information leakage and dumping. The e-government, in their opinion, would be an ideal instrument that would allow them to work hand-in-hand in any level. However, they had a problem in developing a system that would fit the Chinese setting. After a couple of months, China Telecom have managed to find a solution and proposed the Chinese model of e-government. This proposal then led to the creation of the Chinese â€Å"Government Online Project† which immediately began as early as 1990 (Xiong, 2002) (Luo, 2009). Despite the eagerness of the Chinese e-government to administer the system, there are still questions on how accurately the model would improve the state of affairs of the country. Some argue that the current e-government system fails to cover some aspects of data sharing to their groups while some argue that the change is not visible in some departments and levels. Once the international community heard of the Chinese intension in applying the e-government program, they have immediately criticized the system how it would become. With the Chinese entering the competition in e-government application, how exactly would it change the Chinese traditional government and its effectiveness ? Did China change anything to allow the program to perform its function? What are opinions raised by the public, by non-government organizations and critics upon the Chinese e-government? What are the notable lapses the program has missed? How did the e-government program show the governments openness in promoting transparency and public influence in government affairs? What may happen in the future of Chinese e-government and would it be corrected? This paper will explore these questions and the issue on the Chinese e-government program and explain what has changed in the political stance of China since its inception. Statement of the Problem: For this study, the main question to be discussed is the effects of e-government on the transparency of the Chinese government and how it has changed the Chinese, the effectiveness of the system and how people and critics are reacting to this change. The question serves as a stepping stone to the secondary questions this paper intends to respond. The intention of the Chinese e-government is as an act that would indicate China’s acceptance to technological development. It can also be seen as a step in improving its century old beliefs. The supporting questions are as follows: first, what are the differences between the US e-government to the Chinese e-government strategy? Why do data have to be withheld from the public? Third, how did China change its approach to implement e-government to showcase their transparency? How about the proposed solutions and the criticisms, what are they? Lastly, what are the possible conclusions and changes that would occur once the government reac ts to the continuously advancing technology that would allow the public to obtain information? Other questions would be raised in the conclusion and recommendations for future research regarding this issue. Significance and Objectives: For this study, it aims to tackle briefly the history and significance of e-government and how it enables governments such as the Chinese government to create a means to allow the public to be involved in government decision-making and policies and promote transparency. This study intends to convey to its readers the efforts done by the national governments in finding a way on opening itself to the nation by applying new concepts such as e-government in allowing much information and influencing ability to be given to the people, as well as improving the services of the government. Knowing the concept of e-government would allow readers and other researchers to understand how the system works, what it is for and to make a comparison should the system be updated in the next few years. Understanding the system would also allow readers to understand how transparency generates through this system. Another goal of the study is to recognize the possible decisions and improvements that China would apply to its e-government system once technologies update, giving the people more chances to view information about the government online and get more areas and groups that have not yet been included in the current e-government network. China may rely for a practical approach once they improve their e-government to match the current technological advancements. Nevertheless, there are still possibilities that they would try and maintain the same system. The recommendations can also fix minor problems in addressing the update in the system. Lastly, this paper can also serve as a secondary source concerning either transparency through e-government, e-government or Chinas e-government to provide an overview. It would also explain to the general public the idea on how the Chinese government embraced the advantages that would be beneficial for the country. This study also shows how various actors around the world view the Chinese position in promoting transparency. Scope and Limitation: The study will focus on sources that discuss studies, critiques and updates on the Chinese e-government policy, due to the extremely broad theory of e-government and the available sources for the topic alone. Most of the sources would be acquired from books, journals, news clippings and articles written since the inception of e-government in China up to the present. This period would allow the study to absorb the changes and debates raised regarding the Chinese model. As part of the literature review, the study would be using sources detailing the history and structure of the US E-government system as it would serve as a comparison and a basis for the Chinese model. A limitation for this paper has met is the insufficient secondary sources regarding the subject on the Chinese e-government program. The languages on which some of the main sources can be seen as limitations to the study given the researchers unfamiliarity in the Chinese language. Some of the sources, books, journals and articles are too expensive for purchase and free copies thereof are unavailable for use. This paper will not, however, consider the status of the other countries with respect to China’s transparency and e-government strategy as this would be a long argument to understand and determine. It will also not discuss events or policies done by the Chinese government in the intervention of these groups with regards to their complaints about the e-government system. This paper will also not discuss the use of the E-government program in China’s unique provinces such as Hong Kong and Taiwan. Definition of Terms: The definitions stated below appeared on the sources the researcher has reviewed. E-government – this is the use of information and communication technology or ICT to disseminate information properly to all sectors and allow the public to participate in government-related decision making. E-Government (US Definition) – According to the US E-Government Act of 2002, it refers to â€Å" use of Government of web-based Internet applications and other information technologies, combined with processes that implement these technologies.† E-Government (Chinese Definition) it enables the government to open up its services to the public by making it available online, improve its work and let it become efficient and boost the economy through the system E-governance – this term is mixed with the definition of e-governance. However, for the term, E-governance constitutes the success of how the e-government system would become successful as this would determine how the government delivers the services and information the public would need. Informatization – the Chinese use this term to refer the importance of the ICT sector to the public, notifying them on how the ICT sector could promote change in the country especially in the government. Techno-cadre – these are officials who have been promoting for the ICT sector in improving the government. CHAPTER II: REVIEW OF RELATED LITERATURE Overview: The e-government system creates the hope of finding a governance strategy that can match the present time. For developing countries, this is just a way to automate the government and governed. Some see it as a way for the public to transform government services and decision-making and establish a clear future. Chinas intensions on applying the e-government have some merits that they wish to try it now that the public is becoming aware of the happenings in their government by accessing online media websites, discussion boards and even online panel debates. Nevertheless, for a country such as the United States, how exactly is their e-government system unique from all the others? The United States is the remaining superpower and the only country that can stand against any rising threat that may arise from any corner of the world. Its governance programme is a model for many countries in the hope that they could obtain the same level in their own governments. As the Congress signed the E -Government Act of 2002, the United States has been able to utilize the internet for the government by creating new online mediums to spread the word to the people, get access to their services and even let them speak up regarding their opinions on government services and policies. Nevertheless, there are still consistent flaws pointed out by critics such as server downtime, hacked official webpages and even information censorship. Despite all of these criticisms, the United States has continued to evolve and with their e-government promotion and impose laws that would secure online users from any cyber assault and damage. How exactly did the United States manage to create an almost fool-proof and flourishing E-government program that many envy in the field of politics? This review of related literature will explore the concept of e-government outside China and use it as a foundation in analyzing if Chinas e-government has the same problems, concepts and recommendations raised from other e-government models. The review will begin by discussing the history of the E-government model of the United States given that its approach is one of the best in the globe after Singapore. The study will also explain how the US E-government program works, its structure and some examples as to where it has showed its effectiveness. The country will be able to provide a fair comparison to the Chinese e-government model and determine how they differ from one another. It will also solutions to Chinas current e-government model and identify recommendations to the systems lapses. The scholars in this review wrote about various problems and advantages they have seen regarding the US E-governance policy. They also write about how effective the system is and recommendations on how the US government can develop and enhance the program in the future. A review of the threats and challenges the US E-government system identifies the flaws of the e-government system . This would constitute the end of the review alongside the short comparison of both models. Identifying the threats to the US E-Government system can also pose as a foundation on how they can be remedied and saved. Although the United States’ e-government program is still a lot better and more reliable than the fledgling e-government version of China, both governments have invested a lot of dollars to improve the ICT sector which paved way for both of these programs to automate their system of government. The flaws on state jurisdiction and transparency determine a country’s e-government system to be a success. The United States E-Government Program In the field of e-government, the United States is one of the main countries that have managed to utilize the power of e-government. The country has struggled to united its various agencies in the beginning of the 1990s. According to the Forman (2002) the federal government has only started in creating an e-government task force in 2001 with the Office of Management and Budget noting that the task force aims in improving services for each sector and improves its ability. For the US, this plan is how they perceive a successful e-government. However, the US has still yet to develop this version of e-government with their set of goals. The federal government also outlined how the e-government program can be expanded to include four main groups Government to Citizen (G2C), Government to Business (G2B), Government to Government (G2G) and Internal Efficiency and Effectiveness (IEE). The G2C approach provides the one-stop access needed by citizens when they seek for government information and services, G2B concentrates on eliminating redundancy for businesses and using the ICT for help. G2Gs concentrates in creating a connected network with all government levels to facilitate information sharing and collaboration. The IEE initiative promotes efficiency in government operations. (Forman, 2002) Seifert and Relyea (2007) stated that this strategy kick started the US e-government policy-making when President George W. Bush signed on December17 the E-government Act of 2002. This is not just the enacted statute that concentrates on information technology and security as many policies have already been signed before the Act. However, the E-Government Act of 2002 is the first of its kind that stresses the purpose and development of an e-government in the country. E-Government Act of 2002 is a subsidiary law to promote the Clinger-Cohen Act signed in 1996, created just a couple of years upon the dawn of the Internet. The Clinger-Cohen Act concentrates on decentralization of IT management in the government, how to launch new IT procedures and how to choose a chief information officer to serve as the administrator of these ID procedures. The E-Government Act of 2002 introduces a means for the public to gain access to publications disclosed from the public. A $345 million budget for the act is to ensure success in applying the e-government system. The OMB maintains the information technology investment of the country and ensures that it will continuously be citizen-friendly, efficient and performance-based. According to the Act, e-government refers to â€Å"use by Government of web-based Internet applications and other information technologies, combined with processes that implement these technologies. To (A) enhance access to and delivery of Government information and services to the public, other agencies and other Government entities; or (B) bring improvements in Government operations that may include effectiveness, efficiency, service quality or transformation.† (Seifert Relyea, 2007) The application of the E-Government Act of 2002 enabled improvement in the system because of its effectiveness in identifying the sectors it has to address immediately. The webpage USA.gov is a notable example on how the US E-government enabled easy access to government websites and services. The website itself accommodates viewers with updates like jobs, weather, contact information, forms and even FAQs regarding the 40 different branches and agencies of the government. The report also included the OMB emphasis on a National Contact Centre that would allow the public to obtain information regarding any government services even with the use of a cellular phone or chat, spoken in either English or Spanish. The report also noted the development of the disaster relief services using the FEMA completed in December 2008, enabling disaster victims to acquire and apply for benefits from the various agencies required. (Mathews, 2010) Conclusion With regards to how much the US federal government used to automate the entire US government especially its services, the cost is not a secret as everyone agrees it has been a substantial investment. The country has already used $60 million in the introduction of E-Government Act of 2002 in 2003. It gradually increased over to $600 million in 2007. The allowance covers development, implementation and maintenance with regards to all related projects and security development with the Internet. The government has noted that this budget would reduce any long-term costs that the government may face in the next decade. However, many arguments can be raised regarding which group who needs to pay for all these costs. At present, the funds of the federal government come from the taxpayers fee and dues. Since the E-governments main purpose is to improve the governments productivity and information sharing to the public, citizens would not continue to pay for this project due to the realization that it is for the government’s productivity. Many would also argue that not all can access these services so why would they bother supporting it. Another threat to the program is how the US government controls and manage all the information they collect per user of the system. There are some webpages which downloads data without informing the user. This can be compared with the Chinese system as the Chinese government was more focused on watching their citizens and the data downloaded from each government site. Despite this, Mathews states, many Americans are not that happy that their government is snooping in their online business as the information the government takes out of their personal computers. Americans have this notion of distrusting their governments given the numerous times the government has failed to respond to problems regarding corruption, fraud and how they fail to provide the citizens of what they want. Since the E-government system would require people to use the program to succeed, this notion of suspicion may cause the entire system to falter. (Mathews, 2010) The Associated Press (2010) noted that the US e-government is also going to have a problem in addressing the citizen’s concern over cyber-security and how the government imposes the program in each state and agencies of the federal government. Since most of the records of most US national webpages uses in databases connected to the internet, there may be cases that national security would be compromised immediately once hackers access the system. Vital databases connected to the nation’s security would immediately weaken the whole country in a single attack. At present, the country does not a fixed policy in addressing the problem of Internet threats and presently enacted laws are not that easily enforced given the nature of the internet. If federal officials do not allot much time to improve the system, there would always be a possibility of security threat. Since each section also has a different approach in organizing their business and decision-making, there may als o be confusion in uniting these different groups in one system especially in the e-government mechanism (Associated Press, 2010). Through this literature review, the US e-government programme has raised many key points that the Chinese model can use in updating its own version. Unlike the Chinese model, the US e-government program has several policies such as the E-Government Act of 2002 that enabled change to the current system and supports it. The US has also studied all possible conclusions their current system has which could harm the e-government system in any form. The federal government has quickly understood the importance of transparency, but, they have failed in understanding the notion of the US people onto them. Despite the improvements, there is still a perception that the government cannot be trusted given all the controversies behind many of the countrys politicians. There is also the problem that with the nature of the system to be connected to one system, one wrong move would cause the whole country to decline from one cyber attack. Nevertheless, the complex system has answered most of the ques tions and lapses raised by many experts when it comes to governance. The unique factor of the US version is the 99% automation it has introduced to the entire government structure. In comparison with the Chinese model, the Chinese government has failed to understand the importance of their application of the e-government which caused most of its departments and agencies to develop mediocre webpages to cater to its constituents. There is also the nature of the e-government system which shows that China is fearful in all the actions of its people, especially once they see the governments websites. Since the US is a federal nation, the Chinese belief in communism and its belief pressed by its ruling party has drastically prevented it to climb the ladder as one of the top e-government policies promoted today. Many politicians still believe that they must be the people to store these data and publications instead of sharing it with the public. What makes the Chinese e-government system unique from the US version is the structure of the Chinese model and its impact in all sectors of government. This can be seen in the Twelve Golden Projects which comprised the second stage of the Chinese application of the program. Understanding these challenges would be crucial in updating the e-government system. The challenges, flaws and significant improvements can serve as an important factor in revising the system and create an almost fool-proof electronic government action that no one can use. This comparison shows that no matter what the meaning of the e-government policy is in another country, it would come to the extent that it would face the same flaws and use different solutions to the flaw. These solutions can be further enhanced if there is a constant understanding between nations to create a workable e-government system that both developed and developing countries can apply. CHAPTER III: METHODOLOGY Research Design In this section, the researcher will discuss the methods, types and instruments of the research that would help in understanding how the study design. The selection of the subject is due to the researchers interest in the growing popularity of the Chinese economy and the impact it has to the United States. Its projected that the United States will end up defaulting on their debt due to the on-going recession and debt crisis in the country. This would then give the opportunity for the Chinese to overtake the US in their position as the largest and powerful nation in the world. Should the situation continue, the Chinese may be able to control and influence the United States as to how it dictated the state of affairs of China in the past? This research hopes to educate people regarding the solutions applied by each national government around the world in fighting against corruption and promoting transparency. This research is to open up a discussion on how the government could develop a nd promote transparency. Its decided to apply basic research as the nature of this research discusses the subject thoroughly and then add more information to supplement the discussion. In this case, the subject is the e-government of China and the additional information would be the effects and recommendations to the system. This research has also incorporated both qualitative and descriptive methods to allow the researcher to focus on the discussion of the topic. This research has also incorporated a few quantitative data to analyse how the Chinese e-government faired with the people and the governments production of decisions, programs and policies. With qualitative research, data collection does not necessarily mean it will be solely numerical as it would be a narrative. While for descriptive research, it will allow readers, other researchers and the researcher himself to understand the subject without the stress of analysing numerical data. As mentioned in previous statements, the purpose of this paper is to examine how the effects of e-government changed the concept of transparency in the Chinese government and how it improved the image of the Chinese and the international community on Chinas transparency. All of the selected research methods will highlight the critical factors leading to the changes introduced by the Chinese e-government. It will help in predicting Chinas action once technology opens up more channels to the public, and issues that emerged because of the update. This analysis can also be considered a case study as it concentrates on the effectiveness of the e-government policy in promoting government transparency in the Chinese context, allowing the researcher an in-depth analysis over the topic and a clear perspective on how transparency can be achieved with the use of information technology. Variables: The independent variable in this study would be the e-government program of China. As stressed in the first few paragraphs of the introduction, the E-government idea is the use of the ICT in providing the public information they need regarding government dealings, researches and reports and a means to influence the government on the decisions they may partake into when needed. The IT industry can serve as a medium for the Chinese government to answer all inquiries and questions by the public in the nations e-government position in the next decade. The dependent variable in this study are the effects of e-government and perceptions of the public about the e-government system. The implication of these effects of e-government would not only affect the countrys political system, but, it also would change how the Chinese would see their government and how much their opinion matters. Transparency would also come into play once these effects determine whether or not they have served their purpose in introducing the e-government program. Data Gathering Procedure This research will concentrate primarily on Chinas e-government program implemented in the country’s state and local government units, including agencies. Most of the articles used in this study came from secondary sources due to the subjects broad range. Journals and books discussing recommendations and studies by researchers and scholars about the introduction of e-government in China and the issues that revolve around the matter fall under the set of secondary sources. Digital copies of the articles pertaining to the arguments on Chinas e-government also belong to this category. Data also used from articles, press releases and documents posted by some of Chinas English news organizations, another good source for updates pertaining to the opinions and updates regarding Chinas e-government strategy. Some sources would also come from online subscriptions JSTOR and SAGE and through Google Scholar. Data Analysis An analysis of the information would discuss effects of the Chinese e-government and why its watched by the international community. As discussed in the analysis of related literature, an e-government program would never be successful without proper analysis and strategy in the end of the government. The United States was able to keep the program with various governmental policies to establish cyber safety and efficiency in introducing transparency. This research will take two sides: first is the effects of an information technology program such as the e-government program in a non-democratic country such as China and how it has drastically change the whole government programme of the country. The possible future actions of China with regards to their E-government program would also be discussed. The body of the study begins with the background of the Chinese e-government policy and the notion of even applying the concept of information technology in the system. It would then be supported by discussing how the system itself works, the goals of the system and what it intends to showcase to the people who would also be benefiting from the program. The discussion includes the analysis on the changes it has introduced and the number of policies it has approved since its application. The study would also include the advantages and disadvantages of the e-government policy as noted by several experts in and out the country and how it affects the system all together. A discussion on the distinguished flaws will also be raised in the body of the study especially how the world sees the virtue of the e-government project. A short comparison between the Chinese and US models will also be discussed in the studys literature review. Hypothesis: Transparency has always been connected with the theory of moral governance every time a government analysis or comparison to the current administration arrives. The usual arguments such as hidden information regarding government transactions and less involvement of the people influence the main problem. Of course, governments have vehemently denied these allegations as this would destroy their public image and state that these are false rumors. Developed countries have this problem the worst especially because some of their constituents belong to C and D level of the country. This paper argues that the application of the e-government program in China has managed to change the views on politics and governance. It has enabled government officials and employees to keep proper track of their assigned duties and allot more time in creating policies and programs. The Chinese public, on the other hand, now finds the accessibility of information, services and news from e-government webpages whenever they need it and even comment on how they see a program launched by the government. However, there are still flaws and gaps that the Chinese e-government strategy is yet to address as data is still not properly distributed to other prominent organizations and civilian groups. Some argue that there are regions who do not have this system, while some are inconsistent. Since China has applied e-government whilst their online community is slowly understanding the importance of the internet, not only has it enabled China to earn revenue upon the application of the system, but it has also ranked high as one of the ten countries with an effective e-government system and a high transparency grade. Nevertheless, it is still a work in progress as there have been complaints and arguments that the e-government system has failed to answer questions regarding the information transmitted and services offered by these sites, the availability of these data specifically to NGOs and private organizations and the systems constant shutdowns and errors. Hypothesis Testing The application of the e-government program in China, the program has managed to change how politics and governance means for the public. This serves as the studys main premise. However, there are still flaws and gaps that the Chinese e-government strategy is yet to address as data is still not properly distributed to other prominent organizations and civilian groups. Nevertheless, it is still a work in progress due to the comments that it has still failed to include fundamental aspects of its reach and influence. The Chinese version is now a model for some developing nations in creating their own version of the system due to Chinas continuously improving image at present. The hypothesis is to be proven only if the effects of e-government has managed to fulfill its purpose. However, the hypothesis is to be disproven if the country has noted that the flaws of the Chinese e-government strategy not just limited their access to the governments deals and finances, but if it has also kept the country completely in the dark regarding policies that should be consulted to the public view. The theory would also be disproven if there are essential critiques raised by experts on the department of politics and economics in the effectiveness of the e-government in China. CHAPTER IV: ANALYSIS, DISCUSSION, CONCLUSION Like any other country, the Chinese have their own meaning in defining the need, purpose and intent of an e-government. The definition of e-government for China would be difficult to identify given the country’s non- democratic perspective. However, most Chinese officials agree that the e-government system enables the government to open up its services to the public by making it available online. It has also updated its work efficiency. It has also allowed the economy to improve thanks to the system. Since China has a centralized political system, a creation of a Chinglish (Chinese-English) â€Å"informatization† would allow the government to develop the ICT sector to the public without a backlash. The discussion as to how the ICT sector could help the country in creating the dianzi zhengwu or the e-government system began immediately. Politicians such as Deng Xiaoping have expressed that improving and developing the countrys telecommunications sector would be essential to initiate economic growth. As the government slowly planned out the system, the focus became the e-governance image of the system and not the e-government process itself. This only constitutes government websites or zhengfu shangwang. Jiang Zemin, former minister of the electronic industry, followed the lead of Deng Xiaoping and showed interest in investing in the information technology sector like US vice-president Al Gores theory of improving the digital network. Jiangs desire to utilize the internet is evident in one of his interviews. Of course with Zemin’s backup, the Chinese e-government programme has gained its form. With this development, it would allow the government to introduce change within the system. It will alter its functions and improve its services. This would then allow the government to become competent and cost-free. Zemin also states that this would create a more transparent and fair administrative system.(Zhang, 2002) Lagerkvist (2005) noted that the Chinese effort in promoting the information and communications technology industry was perfect. It has promoted a clear field for both domestic and external groups. This promotion of the sector is also a way for the international community to show that the Chinese government is prepared to open up its doors. Many have noted that leaders such as Zemin can be classified as techno-cadres, people who are into improvement through the use of the technological developments as a way to solve traditional governmental policies in the country. Former Prime Minister Zhu Rongji expressed that informatization strengthens efficiency in the government and entices employees to work harder and be more responsive to the public. His opinion perceives changing the current administration and enabling automation through ICT would help clean the government and become productive. The hope that the e-government program can wipe out any misunderstanding about government is foun d in Zhu’s speech. (Lagerkvist, 2005) Liang (2006) explains how the history of the Chinese E-government program began. The Chinese E-government system was presented by the General Office of the State Council and called it san wang yi ku or Three Networks and One Database consisted of an internal, visible and external networks and a database system. The internal network consists of the Intranet, handling all classified information and inter-agency operations. The specific network is the Extranet which connectes the Intranet with office functions and allow local governments to share information. The external network is the Internet, source of information to the public and how they could be part of the system. Finally, the database system is the one that supports all of these networks and enables users with preferences to request for services that would be appropriate with their requirements. China has stopped in presenting the structure of the program, but, continuously invested in the system with $5 billion worth of budge t. Many analysts noted that Chinas IT industry would also be affected by the sudden interest of the Chinese in updating the system as analysts estimate that $10 billion worth of funding would be given by 2009, 15.9% of annual growth. Of course, the Chinese government anticipated the programs effects into the entire system. They came up with three stages as a result of this prediction which would help the e-government program fulfill its obligation. (Liang, 2006) Figure 1. Three Stages of E-Government Development in China. This chart shows how China has allotted time in enacting its three stages in developing e-government. (World Bank) The first stage is the Office Automation in Agencies which began from the 1980s to the early 1990s. The stage noted the establishment of office networks that would connect the city, regional and national level networks together. This also enabled most of the city or national-level governments to reduce the amount of paper they need to use to view information and policies. Lovelock and Ure (2002) explained the following stages known as the Twelve Golden Projects, created around December 2001 alongside the creation of the Chinese Information Office. Premier Zhu Rongji enabled the stage to proceed as he had State Council Document No. 17 to be released just eight months later. The period became known as the Twelve Golden Projects because it concentrates on twelve different networks. These networks primarily cover sectors of society and government which can influence the countrys position. This then enables the e-government program to become an effective and accurate government policy with a fluid aim for each section. The twelve golden projects are as follows: 1. Administrative Resources System (bangong yewu ziyuan xitong) is a system that would allow all government work in any position to be part of the e-governance mechanism of the government. This would rotate from video-conferencing to a government disaster management system that would facilitate the community through the World Wide Web. 2. The Golden Macro Project/ Macro Economic Management (jinhong) concentrating in enhancing intergovernmental connectivity and sharing that would help in creating a transparent and more efficient policy-making 3. The Golden Tax Project (jinshui) concentrates in discovering and punishing any case of tax evasion by using false receipts and invoices that can easily be done with the government computer. This project has been one of the most successful ones in the stage as it has managed to cover 45% of taxpayers in the country. 4. The Golden Customs Project/ Golden Gate Project (jinguan) was launched in 2001. It concentrates on four points: the management of quotas and licenses, import and export statistics, tax returns for exporting companies and international trade currency transactions normally done by the government. The projects long-term objective is to make sure Chinas international trade and economic transaction mechanism is revolutionized through the use of computer networks. 5. The Golden Finance Project (jincai) was applied earlier than the first four programs applied in 1999. The projects main focus is to integrate the eleven sub-systems in the national level and handle its income and budgeting to all its finance related inquiries. The project also focuses on the creation of vertical channels that would encompass the provincial and municipal departments of finance. 6. The Golden Card Project (jinka) promotes the use of an electronic currency to the public that would help in e-commerce and improve financial markets with the use of a unified payment clearance system. This will also enable the government to monitor any illegal and legal activity by an individual that would strengthen their efforts in promoting anti-corruption efforts in the government, whether local or national. 7. The Golden Audit Project (jinshen) establishes a unified digital auditing system for all levels of government in the country and reviews all transactions done by its officials and related groups. 8. The Golden Shield Project (jindun) concentrates in using specialized ICTs to develop efficient police control and crime prevention around the country that would improve the current image of the law-enforcing agency. 9. The Golden Social Security Project (jinbao) establishes a national system that would protect labor and social security and this system would then enable governments in all levels to enact recommendations if any breach happens in these sectors. 10. The Golden Quality Project (jinzhi), transforms quality supervision that enables transparency to reign in the system especially in the newly created national network. 11. The Golden Agriculture Project (jinnong) promotes the use of ICT in the field of agriculture that then can be applied in three key forms: a monitoring and alert system that is used to announce any updates crucial in agriculture production and animal raising. This would include whether updates, infestations and even animal diseases; an information system that would inform the public about new materials for agriculture and cattle and finally a system that would provide tutorials and samples of the current technological breakthroughs in the field of agriculture. Finally, 12. The Golden Water Conservancy Project (jinshui) is created to increase the information to the public about the concept of water conservation that would help in saving Chinas water supply. This project also enacts a creation of a National Flood-Control and Draught-Relief Command System with a National Supervision Network for Water and Soil Conservation as China has constantly been destroyed by several floods and landslides, killing thousands in progress. Aside from these twelve golden projects, there have been other projects called golden projects. Some of these were called as the Golden Bridge Project (jinqiao), the Golden Hygiene Project, the Golden Travel Project, the Golden Wisdom Project and the Golden Trade project. The implementation of the Golden Projects allowed the government to react immediately. At least 50 and more agencies have applied the project into their official webpages. (Lovelock Ure, 2002) Figure 2. Government Agencies’ Response to the Golden Projects. This chart shows how much has supported the Golden Projects of the Chinese E-government system. Ma, Chung, and Throson (2005) explained the next stage called the Government Online Project or the â€Å"Zhengfu Shangwang Gongcheng† established in 1999. This stage encourages all government levels to build their own customized webpages in the internet. These sites would then become their digital image for online users to request for services and information China Telecom and the State Economic and Trade Commission, assisted by the various different government agencies and groups supports this stage. For this stage, the goals are identified into three different aims: post relevant government information, create documents and publications open for access and finally to implement administration through the use of databases as this would increase efficiency in the part of the administration. The GOP is the most complicated out of all the three stages as it needs to create a centralized administrative system to share information. This stage also promotes office automation and red uces corruption at all levels. It is also through this project that would change how to use the Internet. It would enable employees to improve the government’s efficiency and transparency in all levels (Ma, Chung, Thorson, 2005) Of course, many have noted that the Chinese e-government program has met many different reactions from the different groups in the country. Each has noted that there are still lapses in the e-government system, which must be addressed by the Chinese government for them to say that it is a successful project. Xu and Astone (2000) noted that the Chinese e-government could be more successful if there is a definite system on how the government would enact their policies and how they would promote it to the public without showing how hard it is to enact the system. The Chinese Communist Party has an immensely complex system which enables the higher ops to keep the information all to themselves which is not a concept well grasped in modern political systems as this shows the Party’s unwilling attitude towards any reform that would affect their influence. Since this is the case, the e-government of China cannot move forward. Without a stable and systematic government Party, funding w ould also be a problem. Since China has many departments and agencies, it is impossible to fund each website with the budget allotted by the national government. Even the beginning of the Government Online Project had to be compromised by just a command mechanism (Xu Astone, 2000) In the case of the public, Junhua (2001) showed that many are still not connected and aware of an e-government system implemented in the country which is extremely crucial should the government want to claim that they do have an efficient system. With regards to how people see their government webpages, some have seen that it does not provide the people of what they need. There are no definite data in the government sites that would show visitors documents, giving them the notion that the government is hiding something from them which they do not want to see. This can easily be translated as a clandestine and illegal activity that may promote the misuse on behalf of the government (Junhua, 2001). Han and Zhang (2011) refuted this notion of the public with regards to government websites as their study has pointed out that several webpages of the government, especially in the local regions such as Guangxi Zhuang Autonomous Region, has listed relevant information such as reports, briefi ngs and speeches which people can read. However, they have notice that these webpages do not include a list of publications which makes it hard for the public to search for other forms of government documents (Han Zhang, 2011). In a study done by Yang (2006), there was another group in China that is monitored by both the public and the government considering that it would affect them the most if changes happened within the government. The group is called the vulnerable groups. Unlike the US and the European vulnerable groups, Chinas vulnerable groups are the people whose life is highly dependent with the countrys economic growth and the relationship of the group with other groups. Chinese scholars often defined vulnerable groups as those social colonies who need help and support from this nation and society because they cannot maintain the living standard for themselves and their family members with their own strength or ability. Yang notes that the situation of the vulnerable groups has even reached the foundations of the Communist Party of China. Of course, the government has introduced numerous strategies to help this group. Figure 3. Asia Rankings of 2005 with regards to E-government capability. This table shows the ranking of Asian countries that applied the e-government policy (World Bank) As the country applies the e-government policy, Yang notes, the system itself may enable the government to develop the countrys management skills in improving the efficiency and services the government offers. However, there is still a problem as to how it could immediately affect the vulnerable groups given that these groups came to be because several government policies and social structure dictated it to happen. The group, like with the normal public, also have limited mediums which are less than effective to influence the governments decision-making. This turns the Chinese E-government to be an independent kingdom that the government can use to do any clandestine activity. Yang also noted that since the e-government system has various definitions, the system slowly shifts to concentrating on providing a sense of ease and the bulk of the benefits the e-government system rather than giving the public the power it has given the application of the system. The Chinese e-government pro gram can only reach these groups if they can provide services and teach them to become confident in approaching the government. The government must be able to create a working economic system that would enable these groups to feel the economic changes and melt in the society without feeling some backlash. If the Chinese government cannot refocus the benefits of the e-government program and enable everyone to experience the benefits of the said program, the current application of the E-government program in China will continuously face many challenges regarding its popularity with these special groups. (Yang, 2006) Conclusion The E-government policy may seem to be a perfect system that would enable the governments to open up its doors to the public to address the problem of government transparency. Not only does this change the publics view on how they could reach out to the government without the fear of scrutiny and a flicker of corruption, it also changes how governance must be done at this age. Although these improvements can be exceedingly detrimental to the whole country in general, there are still some things to consider on how much, which group pays and how to implement the system which comprises each agency and department of the government. If these lapses and questions are not properly resolved by the governments, there is no hope on finding a successful e-government policy that would work in their country. In the Chinese perspective, although the concept is still far from being perfect in terms on how well it has enabled the public to acquire information, services and improvement and how well it opens up the government to the people; the program is well on its way to changing the Chinese concept of how governments must be run by its officials. At present, there is still a question on how much transparent the Chinese government has become since there are still government officials who would rather stick to the old system of governance to keep their influence. There is also the question on how much information is transmitted to the public and groups who access them through government webpages. There is also the issue of cyber-security that would also concern the publics safety while accessing these webpages. Chinas e-government policy is also questionable to some due to its obsessive tendencies on user views. Not all Chinese government agencies can also open up decent and efficient webpa ges due to the budget given to this program. Some groups are also not capable of going online given their social background and financial capacity. This is immensely troubling considering how much money the Chinese government spends each year. Some studies have also shown the inaccuracies in some government websites which unedited. Some do not possess valuable information needed to assure that the government is not hiding anything from the public. In its comparison with the United States, these countries possess the same problems when it comes to e-government programs. Both countries do not have much funding when it comes to the system. There is also a flicker of distrust in terms of the public’s view of the program and the data accumulated from each user visit. Seifert and Chung (2009) provided a table on the comparison between the two e-government programs. However, what varies from these two is the application of each country’s belief for the US, it is more democratic giving out what people would want. China, on the other hand, embodies a tighter and secured system as compared to the US model of immediate solution. (Chung Seifert, 2009) Figure 4. Comparison between the US and Chinese E-Government Policies. This table shows the different policies and positions of both models of e-government. It is without a doubt that the government is trying its best in recovering from these lapses and locating solutions that would help in developing the system. Given the current structure of the Chinese model, it is already perfect as it is. There is a need to reassess the current structure of the model and identify one by one the lapses each stage has failed to comply and resolve. Whats needed is cooperation between the ruling party and the people themselves for them to understand what the other does not have. The government must be open for reform and must embrace the system, helping the public in progress in understanding the e-government system and opening channels for those who cannot access it. The public, on the other hand, must be open to try the system and see for themselves if the government has opened itself to them. No matter how much technology would change, it would not work unless these two different sides open themselves for reform. References Associated Press. (2010, February 7). Cybersecurity Threats. Retrieved November 7, 2011, from KX News: http://www.kxnet.com/getArticle.asp?ArticleId=517578 Chung, J., Seifert, J. (2009). Using E-Government to Reinforce Government Citizen Relationships: Comparing Government Reform in the United States and China. Social Science Computer Review, 27(3), 3-24. Forman, M. (2002, February 27). Implementing the Presidents Management Agenda for E-Government. Retrieved November 2, 2011, from United States of America Official Web Portal: http://www.usa.gov/Topics/Includes/Reference/egov_strategy.pdf Gronlund, A., Horan, T. (2004). Introducing E-Gov: History, Definitions and Issues. Communications of the Association for Information System, 15, 713-729. Han, Y., Zhang, Z. (2011). E-Government in Guangxi, Peoples Republic of China: Administrative Reforms towards Citizen-centered Service-oriented Government. European Group for Public Administration Conference (pp. 1-25). Bucharest: European Group for Public Administration. Holliday, I., Yep, R. (2005). E-Government in China. Public Administration And Development, 25, 239-249. Hood, C. (2007). When Transparency Meets Blame-Avoidance? Public Management Review, 9(2), 191-210. Junhua, Z. (2001). Chinas Government Online and attempts to gain technical legitimacy. Asian(80), 93-115. Lagerkvist, J. (2005). The Techno-cadres Dream: Administrative Reform by Electronic Governance in China Today? Sage Publications, 19(2), 189-216. Liang, G. (2006). Under the Golden Shine: Chinas Efforts to Bridge Government and Citizens. United Nations Centre for Regional Development, 1-20. Lovelock, P., Ure, J. (2002). E-Government in China. Technology Research Project: University of Hongkong, 1-15. Luo, G. (2009). E-Government, People and Social Change: A Case Study in China. Electronic Journal of Information Systems in Developing Countries, 38(3), 1-23. Ma, L., Chung, J., Thorson, S. (2005). E-government in China: Bringing economic development through administrative reform. Government Information Quarterly, 22, 20-37. Mathews, K. (2010, May 5). E-Government in the United States: Steps to Advance Its Success. Retrieved November 3, 2011, from Indiana University: http://www.indiana.edu/~spea/pubs/undergrad-honors/volume-4/matthews_kimberly.pdf Seifert, J., Relyea, H. (2007). E-Government Act of 2002 in the United States. Washington, DC: US Congressional Research Service. World Bank. (n.d.). Achieving E-Government: Chinas Information Revolution. Retrieved November 8, 2011, from World Bank: http://siteresources.worldbank.org/EXTINFORMATIONANDCOMMUNICATIONANDTECHNOLOGIES/Resources/282822-1176738081732/China-ch6.pdf Xiong, C. (2002). E-Government in China, Present and Future. E-Administration for the Benefit of Citizens (pp. 1-6). Paris: Tsinghua University. Xu, D., Astone, M. (2000). E-Government In China. Troy State University Publications, 1-10. Yang, F. (2006). The Status of Vulnerable Groups in the Chinese e-Government Construction. Peking University School of the Government, 1-16. Zhang, J. (2002). A critical review of the development ofthe Chinese E-government. Perspectives, 3(7), 1-16.

Sunday, May 17, 2020

Fake News the Epidemic Free Essay Example, 1250 words

The basic of this story was that Edgar Welch found a news article about children being in slaved. Later to found out that "The intel on this wasn't 100 percent" (The Classroom Where Fake News Fails, December 22, 20165:25 AM ET). Fake news can come in the form as a post on any social or political website. House Minority Leader Nancy Pelosi was arrested according to a news website thelastlineofdefense. org. This site stated that Nancy Pelosi was taken out of office in handcuffs (BREAKING: Nancy Pelosi Was Just Taken From Her Office In Handcuffs n. d.). This does not make sense because Pelosi was at a press conference on March 13, 2017, in Washington D. C. in response to the Congressional Budget Office's report. Also, she attended a town hall meeting in San Francisco on March 25, 2017. In addition, one day before the town hall meeting she attended in a press conference on March 24, 2017, in Washington D. C. (Chris Nichols, Sunday, April 2nd, 2017 at 6:00 a. m.). Some news websites defi ne fake news in a term "Pants on Fire". We will write a custom essay sample on Fake News the Epidemic or any topic specifically for you Only $17.96 $11.86/pageorder now Pants on Fire is a statement that is not accurate and makes a ridiculous claim (Chris Nichols, Sunday, April 2nd, 2017 at 6:00 a. m.). Thinking back now Fake news is in essence made up facts of information. They hold no weight when they are thoroughly dissected by way of fact checking. Fake news is a growing problem in the 2017 world and without being able to properly perceive it. People will never be able to know the difference between the two. Understanding or having a guideline to what real news is will help distinguish between the two. According Jacel Edgar in her article "How to tell the difference between fake news vs. real news" she explains three strategies to decipher between real and fake news. First Edgar state to consider your source. Always check the URL, publication, and look Legal section. Second Edgar says to "Dig into the details". She states to look closely at all detail information and make sure not to only look at the title. She states most people only look at the title of an article or bold 25 front comic san headline about a so-called crisis, incident, epidemic, and natural disaster happening. The last step is to check for multiple sources because most mainstream news stations have a breaking news team. If that team is not writing about the same thing as another news station's breaking news team, then most likely it is a fake story. She says to always compare news stations to each other to get different viewpoints of a story Jacel Egan, January 12, 2017).

Wednesday, May 6, 2020

International Criminal Law Essay Example

Essays on International Criminal Law Essay The paper "International Criminal Law" is a perfect example of an essay on law. The international criminal law prohibits some categories of conduct identified as grave atrocities and ensures that the perpetrators of criminals get accountable for their actions. The law principally covers matters relating to war crimes, genocide, aggression crimes, and crimes against humanity. It specifically deals with person subjects. The criminal law mostly includes the prohibitions addressed, and the penal sanctions for the violations of the prohibitions put in place by the different states (Schabas 7).   International Criminal Law came into being after World War 1. After the war, international crime tribunal envisaged the perpetrators of war crimes. For instance, the Treaty of Versailles designed in trying Wilhelm of Germany. The Second World War signified the international tribunal’s move to try not only crime wars but also crimes against humanities. As a subset of the International Law, International Criminal Law developed under the 1946 Statute, Article 38(1) of the Court of Justice. International law comprised of general principles of law, customary international law and the treaties (Bantekas and Nash 16). International criminal law developed to deliver justice to victims and to guide on the prosecution of serious crimes like crimes against humanity, genocide and war crimes (Schabas 12). Individual Criminal Responsibility is the liability associated with individual violations of the application of the 1968 UN Convention and Common Article 3. The Hungarian courts applied international law in the prosecution of international offenses defined by the International Criminal Law. The three bodies are intertwined connected in advocating international human rights (Bantekas and Nash 27). The International Criminal Court is a permanent tribunal that prosecutes individuals for crimes against genocide, humanity, and war crimes. The court is significant in maintaining international justice and, therefore, gives authority to the bodies of international law on the treatment of individuals regarding humanitarian law and human rights. It covers jurisdiction only where the subject is a citizen of a state party or when a crime occurs in the country of a member state party (Schabas 37).

Project Overview of Ecommerce Samples †MyAssignmenthelp.com

Question: Discuss about the Project Overview of Ecommerce. Answer: Introduction E-commerce or the electronic commerce is the technique by which the various kinds of commodities and goods are sold by retailers and those goods are bought by the customers over the Internet. The entire transaction of goods is conducted over the Internet along with the transaction of money. There are multiple alternatives to pay for the commodities over the e-commerce site and online payment is one of the alternatives (Brannen, 2017). However, security is the major concern associated with the online payment. The reason for choosing this topic is to highlight the necessity to secure the online money transaction so that the customers can enjoy a hassle-free secure service. The report will showcase the security measures by which the security of the e-commerce site can be established. Project Overview The e-commerce site is developed keeping in mind the individual customers as well as the corporate customers, this help in conducting the business operations and transaction of goods in large volumes. The e-commerce provides various kinds of facilities like non-cash payment, the customers do not have to pay in cash, and they can simply choose to pay via debit card, credit card and via online banking (Creswell, 2013). The customers can get the facility to provide 24x7 services, they can shop at their convenient times, can shop on the go. The online retail stores provide better support to the customers; the customers can keep in touch with the e-commerce industry all the time and get solutions to all their queries. Thus security and privacy are important. The e-commerce giants like Amazon, eBay invests heavy on these e-commerce websites for ensuring the privacy of the customers and the security of the website as well as the company. There is a high risk of security breaches due to the cyber-attacks from the hackers. Thus it is absolute necessity to implement security features to theses websites (Ghosh, 2012). This report will focus on to research the security measures by which the personal sensitive information can be protected and secured. The technology that is used in the e-commerce websites is Secure socket layer (SSL), https, HTTP and Secure hypertext transfer protocol (SHTTP). Secure Socket Layer is widely used convention and is used to conduct the business operations securely and effectively. It is known to provide the security features- non-reputability, validation, encryption and trustworthiness (Davies Hughes, 2014). The https is used for HTTP URLs along with SSL whereas HTTP is used for HTTP URLs and not along with SSL. The Secure hypertext transfer protocol caters secure transactions over the Internet. It assists in authentication of the client by implementing encryption method. SHTTP is incorporated into browsers to cater the routine security over the Internet. Problem Overview The security issue is the main concern for all the online retailers. The intruders can attack the system and make the system and the database of the e-commerce companies and hack the sensitive data of the company, the financial data and the personal details of the customers. If the customers' data gets breached then the data, the privacy of the customers will get compromised. The e-commerce sites can face huge loss, they can even lose the customers base. The cyber attackers generally carry out the malicious activities by incorporating virus in the system of the e-commerce server, by taking control over the insecure network of the e-retailers (Aven, 2015). Trojan horse and the logic bombs are two kinds of threats and take away the sensitive information of the system and the database. Another kind of threat is Denial of Service Attacks and this attack is responsible to take control of one system and disallow the owner to access their own system. This attack is also responsible to shut down one's server and one's system. Another popular attack is a phishing attack. The cyber attackers develop a website which is genuine e-commerce website's lookalike. They simply copy the HTML code and carry out the attack. Besides those threats discussed, there are vulnerabilities too (Lampard Pole, 2015). The vulnerabilities incur due to the attack from the SQL injection, cross-site scripting, customers choosing weak passwords and lots more. The security measures must be applied to mitigate these aforesaid threats and the vulnerabilities related to e-commerce. Understanding of Research Issues The research is based on the three questionnaires- what are the primary security concerns of an e-commerce site, what is the necessity to secure the e-commerce site, what are the ethical issues associated with the e-commerce security (Laudon Traver, 2013). Therefore, the privacy and security, technology related attacks and the ethical issues that will be focused and is the area of research. Security and Privacy: The customers will have to be concerned about the security and privacy. The theft of the customers credentials is the area of concern (Morgan, 2013). The retail industry contains all the personal details of the customers, they also have the bank card details as well, thus the question arises if those sensitive data got breached then the privacy and security of the customers will get threatened. Technology related attacks: The cyber-attack on the e-commerce is carried out by brute force attack, denial of service attack (DDoS), ICMP flood. Ethical issues: The ethical issues are associated with the data mining procedures. The retailers must use the customers data efficiently and should be attentive that it does not hurt any customers or does not make any negative impact on the customers personal life (Segovia, Szczepaniak Niedzwiedzinski, 2013). Also, if those data get breached then the retailers can be in trouble, they will lose customers' base, they will lose the reputation and ultimately they will face a huge loss. The customers must be attentive and should limit their personal data usage. They have also the right not to share the personal information at all. In this way, they can protect the data from getting breached (Time, 2012). On the other hand, if the data are to be used, they must be used ethically and effectively keeping in mind the security and privacy of the customers. Related Work and Proposed Solutions by Authors to Address Research Issues The twelve articles or twelve related works will be highlighted and along with that, the proposals of various authors in regards to security measures of the e-commerce website will be discussed via these twelve articles. The first article details the techniques and the procedures via which the e-commerce websites can be protected and secured. The two models have been discussed the first one is the oriented authorization model and the second one is the oriented authentication model. The oriented authentication model is responsible to protect the e-commerce system from the brute force attack, replay attack and the data sniffing attack (Rane et al., 2012). The authorization model deals with the session hijacking and the bypassing authorization attacks, replay attacks, ID spoofing. The oriented authorization model is also on the basis of providing the customer's permission about accessing the data. Thus it can be concluded that the authentication and authorization are important for the enhancement of the e-commerce activities. The second article focuses on the cryptography technique by which the websites can be protected. This article showcases an algorithm which is fast as well as strong via which the security of the website can be ensured (Maqableh, 2012). The article has proposed about the cryptography that involves the hash functions, that also involves the pseudorandom number generation. HTTPs, SSL and SET protocols have been showcased in the article as well. The e-commerce website if properly encrypted significant benefits can be achieved. The third article demonstrates about the malware and the virus threat that can make any companys system and database vulnerable. The dangerous among them is the Trojan Horse. The Trojan Horse is responsible to block and is responsible to bypass any type of authentication and authorization techniques (Niranjanamurthy Chahar, 2013). The online retail industry has numerous phases and they mainly deal with the delivery phase, the information, the payment phase and the negotiation phase. The phases defined above have various kinds of security measures, various kinds of encryption procedures and various kinds of integrity checks. The article has highlighted the DDoS attacks, unauthorized attacks and the data fraud and the data theft. The article has grandstand on how individuals can protect themselves from all kinds of security breaches. The fourth article highlights the pros and cons of the M-commerce and the e-commerce respectively. The pros are related to the security aspects of the e-commerce sites. The article discusses the credit card related frauds and how one should stay safe from the hackers and data fraud, data theft and the phishing attacks. The security measures which probably can protect them from all kinds of security breaches have been discussed in the article and the security measures are authentication, encryption, non-repudiation and unauthorized access (Niranjanamurthy et al., 2013). The attackers can gain entry to one's system unethically and can modify and delete the data thus the e-commerce sites must be made secure. The fifth article showcases that the online shopping must be conducted in a safe and secure manner, the digital certificate, strong passwords and the secured public key infrastructure. The e-commerce life cycle has been elaborated in the article as well. According to the author, there should be a mutual trust in running the business operations. DDoS has been highlighted as the most disastrous threat. A security framework must be built to ensure security and safety of the e-commerce website. Nowadays all the customers are very much inclined towards the online shopping and the demand is rising (Revathi, Shanthi Saranya, 2015). This protecting the website from all kinds of breaches is the need of the hour. Along with that the confidentiality, privacy and the availability must be maintained. The sixth article showcases that the e-commerce applications can be downloaded to the smartphone and the same kind of effective service can be enjoyed over the phone. The utility of e-commerce apps has been showcased. The flaws have been highlighted as well. The flaws are basically associated with encryption and GPRS authentication. The protocols related with authentication have been discussed along with the encryption mechanisms (Prakash, 2015). The m-commerce activities are increasing and becoming more demanding day by day thus the security measures must be taken into consideration. The seventh article also focuses on the network security issues. According to the article, a well-secured framework model must have the data confidentiality, data integrity and the authentication. The threats which can prove disastrous to the e-commerce websites are unauthorised access, data theft, data fraud, spamming and the DDoS attack (Gautam Singh, 2014). There are also vulnerabilities that have been discussed and along with that risks occurring due to the casualties of the customers have been highlighted. The eighth article has elaborated the various kinds of business operations that the e-commerce industry works on. The author of this article has proposed the server side security model, the client-side security model and also proposed that the data must be transacted in a secured manner (Rane Meshram, 2012). The database module is associated with the watermarking, encryption of data and the digital signature. The ninth article highlights that the e-commerce websites can be secured only by cryptography techniques. The monetary transaction must be made secure by applying security models and the cryptographic techniques. The transactions related to e-commerce contains various kinds of phases like delivery phase, payment phase, information phase and the negotiation phase (Yasin, Haseeb Qureshi, 2012). The article has proposed about the cryptography that involves the hash functions, that also involves the pseudorandom number generation. HTTPs, SSL and SET protocols have been showcased in the article. The tenth article focuses on the various aspects of the e-commerce website like merchant account, payment gateway and the shopping cart (Yusuf Zeki, 2015). A secured e-commerce must have all the required security features and measures like the availability, non-repudiation and the privacy. The major threats which are the area of concern for the e-commerce websites are DDoS attacks, Trojan Horse and various kinds of notable malware and virus attacks. SSL can be an effective tool to cater the security to the e-commerce website. The site must be designed incorporating the security and the privacy parameters. The eleventh article talks about the cards- Master Card and Visa Card. Various kinds of security protocols incorporated within to facilitate secure money transaction. Asymmetric and symmetric cryptographic technique along with the hashing technique has been depicted in the article (Khandare Meshram, 2013). The article also depicts about the SDTS algorithm via which transaction of data can be made with ease and security. Again, this article has highlighted the concept of biometric authentication. The twelfth article has elaborated the security risks and threats like DDoS attacks, network sniffing, IP spoofing, consumers can be deceived by the hackers in numerous ways and can fall into their trap (Aggarwal, 2014). The article also talks about the SSL and various other security solutions by which the attackers can be restricted conducting the malicious activities. Conclusion It can be concluded from the above discourse that the financial transactions are conducted via these online retailing websites and security is the major issues. The details of the e-commerce applications have been highlighted in the report. Along with that the security risks, threats and the privacy features have been highlighted in details. The report is based on the research of three questions-the security concerns of the e-commerce website, the necessity for securing the e-commerce website and the ethical issues related to the e-commerce security. The security solutions have been discussed. The twelve articles have been showcased in the report where various authors have given various approaches in related to the security aspects of the e-commerce website. Certain security strategies and security model must be adopted and the employees working in the e-commerce enterprise must be knowledgeable about the security solutions so that they cater the best security solutions to the custom ers and the enterprise. The security aspects like authentication, authorization has been discussed in the report via which the customers can stay safe and secure. References Aggarwal, V. (2014). E-Commerce Security Issues And Solutions: A Survey.International Interdisciplinary Research Journal,2(1). Aven, T. (2015).Risk analysis. John Wiley Sons. Brannen, J. (Ed.). (2017).Mixing methods: Qualitative and quantitative research. Routledge. Creswell, J. W. (2013).Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications. Davies, M. B., Hughes, N. (2014).Doing a successful research project: Using qualitative or quantitative methods. Palgrave Macmillan. Gautam, R., Singh, S. (2014). Network Security Issues in e-Commerce.International Journal Of Advanced Research In Computer Science And Software Engineering,4(3). Ghosh, A. K. (Ed.). (2012).E-commerce Security and Privacy(Vol. 2). Springer Science Business Media. Khandare, N., Meshram, D. (2013). Security Of Online Electronic Transactions.International Journal Of Technical Research And Applications,1(5). Lampard, R., Pole, C. (2015).Practical social investigation: Qualitative and quantitative methods in social research. Routledge. Laudon, K. C., Traver, C. G. (2013).E-commerce. Pearson. Maqableh, M. (2012).Analysis and design security primitives based on chaotic systems for ecommerce(Doctoral dissertation, Durham University). Morgan, D. L. (2013).Integrating qualitative and quantitative methods: A pragmatic approach. Sage publications. Niranjanamurthy, M., Chahar, D. D. (2013). The study of e-commerce security issues and solutions.International Journal of Advanced Research in Computer and Communication Engineering,2(7). Niranjanamurthy, M., Kavyashree, N., Jagannath, S., Chahar, D. (2013). Analysis of e-commerce and m-commerce: advantages, limitations and security issues.International Journal of Advanced Research in Computer and Communication Engineering,2(6). Prakash, K. (2015). Security Issues And Challenges In Mobile Computing And M-Commerce.International Journal of Computer Science and Engineering Survey,6(2), 29. Rane, P. B., Meshram, B. B. (2012). Application-level and database security for e-commerce application.International Journal of Computer Applications,41(18). Rane, P. B., Kulkarni, P., Patil, S., Meshram, B. B. (2012). Authentication and authorization: tool for ecommerce security.IRACSTEngineering Science and Technology: An International Journal (ESTIJ),2(1), 150-157. Revathi., C., Shanthi., K., Saranya., A.R.(2015). A Study on E-Commerce Security Issues International Journal of Innovative Research in Computer and Communication Engineering, 3(12) Segovia, J., Szczepaniak, P. S., Niedzwiedzinski, M. (Eds.). (2013). E-commerce and Intelligent Methods (Vol. 105). Physica. Time, C. (2012). Data Collection Methods.Review of Sociology,17, 225-249. Yasin, S., Haseeb, K., Qureshi, R. J. (2012). Cryptography based e-commerce security: a review.International Journal of Computer Science Issues,9(2), 132-137. Yusuf Mohamed, A., M Zeki, A. (2015). The most principle Security Issues In E-commerce.International Journal Of Scientific And Research Publications,5(12).