Cyber Threats Essay

Cyber Threats Essay.

Before we get into the major cyber terrorism threats that we all have to deal with I wanted to first define what cyber terrorism is. According to the U. S. Federal Bureau of Investigation, cyber terrorism is any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents Unlike an annoying virus or computer attack that results in denial of service, a cyber terrorist attack could lead to physical violence or extreme financial harm.

According to the U. S. Commission of Critical Infrastructure Protection, possible cyber terrorism targets include the banking industry, military installations, power plants, air traffic control centers, and water systems. Cyber terrorism is often referred to as electronic terrorism or information war. Based on recent reports and the information presented to congress, America has a long way to go before security threats are adequately addressed. Almost half of 2,131 U. S. ompanies polled had no formal security policies in place, and most relied primarily on user passwords and multiple logons for protection.

Only 49% of U. S. companies had plans to raise user awareness of policies and procedures in the next 12 month. Unbelievably only half of 150 companies surveyed by InformationWeek Research one week after the terrorist attacks said that they plan to reassess the security of their facilities in light of those events. We need more people to be doing more creative thinking about computer security, than those who are trying to attack us.

In December, 2000 the Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction (aka The Gilmore Commission) released their second annual report which stated two possible cyber terrorist scenarios. First, “It is easy to envision a coordinated attack by terrorists, using a conventional or small-scale chemical device, with cyber attacks against law enforcement communications, emergency medical facilities, and other systems critical to a response. ” Second, “it is conceivable that terrorists could mount a cyber attack gainst power or water facilities or industrial plants – for example, a commercial chemical plant that produces a highly toxic substance – to produce casualties in the hundreds of thousands. ” The report adds that “the most likely perpetrators of cyber-attacks on critical infrastructures are terrorists and criminal groups rather than nation-states. ” Denning, 2003 So, what can be done proactively to prevent cyber terrorism and cyber crime attacks? The first and easiest thing for you to do is harden and secure your systems by establishing secure configurations.

Next you can prepare for intrusions by getting ready for detection and response. You also need to make sure you detect intrusions quickly when they do occur. You also need to respond to intrusions quickly to ensure you minimize the damage to your systems. Lastly you need to improve your security to help protect against future attacks. There are thousands of ways to help protect against cyber terrorism threats but I think the following are the simplest and most effective ways to start, Make sure all accounts have passwords and the passwords should be unusual, difficult to guess.

Be sure to change the network configuration when defects become known. Constantly check with venders for upgrades and patches that can be installed to help strengthen your defenses. You can also choose to audit systems and check logs to help in detecting and tracing an intruder.

Cyber Threats Essay

Technology-the Future of Terrorism Essay

Technology-the Future of Terrorism Essay.

From the extensive evolution of computers to the introduction and mass popularity of the Internet. From bombs to missiles, from bases to shuttles. The world of technology is seemingly endless. In modern times computers and the Internet possess tremendous power and have a wide range of capabilities for better or for worse. Terrorism is for the worse and yet unfortunately, the evolution of technology has advanced the means to commit acts of terrorism, both actual terrorism but also cyber terrorism.

T hink about the seemingly endless depth of technology, the complex features that go into making a bomb mechanism, you can only come to the solid conclusion that yes, technology has had a worldwide effect on the act of terrorism.

There are two ways in which you can view this obvious revelation into the grim world of terrorism.

You can look at it with the first way as mentioned, that terrorism has unlocked doors for terrorists to use to their advantage; new hi-tech gadgets being illegally manufactured to their advantage on a daily basis, the Internet being seemingly insecure enough to meet fellow terrorists, hack into government files and plot all forms of terrorist attempts.

It seems as though technology advances, the resources for terrorism flourish. The second way however contradicts the first in a sense; as technology improves and gives the terrorists new means to attack, with that comes new means to defend against them.

High tech security measures such as CCTV cameras, infrared and heat sensors and seemingly space-age computer techniques make defending, foiling and preventing terrorist attacks much more easy than in the grim past. Ever since the New York bombings on September 11, 2001, not only America, but the entire world has been on the edge of their seats in fear, just waiting for an all out terrorist attack to throw the entire population of human-kind into disbelief and awe, followed by the beginning of world war 3. Bombs have been in existence for decades, gun power has been in existence for decades, does this count as technology?

In a sense, yes, but it has been since the revelation of the power of the Internet that terrorism has reached its all time high. With the capabilities of hacking into important Government systems, terrorists have the power to view and take advantage of every week point available to a specific country. With the wounds exposed, the terrorists attack. Is there really any way to sense when an attack is coming? Ever since the 9/11 bombings in New York and the 7/7 bombings in London, many people automatically wrongly associate those of the Muslim faith to be terrorists.

The war on terrorism has inadvertently invoked a new era of race issues and prejudice; inadvertently one may think, but could this be what the terrorists wanted? There is no question that technology has changed terrorism in both of the aforementioned ways, for better and for worse. As technology continues to advance, terrorists will continue to find new means of attacking, just as the government will find new means of defending against them. It is just one big cycle that keeps advancing as time goes by. Technology has the power to change the future of terrorism. It has the power to advance it and it has the power to destroy it.

It is simply a question of which one will prevail first, which is in its entirety, a very scary thought. 2-Terrorism has existed for centuries and continues to be a very real threat in modern times. The techniques to carry out an act of terrorism may have changed, but the fundamentals of why terrorists decide to carry out a terrorist act have not. Cyber terrorism is a newer technique terrorists utilize to inflict their acts of violence, fear and intimidation on their targeted victims. While it may have changed the dynamics of how terrorism is carried out, the underlying factors are much the same.

The purpose of terrorism is to inflict terror through acts such as force, violence or destruction. Historically this has been carried out through bombs, hostage taking, assassinations, hi-jackings and weapons of mass destruction attacks. Throughout history many different kinds of weapons or intimidation have been used to invoke terror towards others. Technology is the latest tool employed to meet this destructive objective. Cyber terrorism is the newest approach and it is one which has high potential to bring about devastating results much like the kinds of preceding violent attacks, but on a grander scale.

Today’s politically motivated attacks are launched with the intention to cause weighty harm, and cyber attacks certainly have high potential to trigger severe injury, economical damage and even death. Many nations across the globe rely upon their technical infrastructures. What better way to terrorize people than to attack the very foundation their society is built upon and relies on to survive? Many nations take the act of cyber terrorism seriously because it threatens the very core and existence of their society.

Technology does not change the act of terrorism per se because the same ntents which have always been present when a radical commits an act of terror are there. Their goal is often to cause bodily and financial harm. Terrorism is an act primarily fueled by hatred and intolerance for those who are different. With the advent of technology terrorists have found another weapon they can utilize to cause widespread damage. It is in this respect that technology has changed terrorism. While technological advances have not necessarily changed the intents for terrorism, they’ve certainly impacted what radicals are capable of and this is where terrorism has changed.

What it has done is provide the terrorists with another method to commit an act of terror and reach a larger number of victims. It also provides terrorists with an opportunity to pinpoint specifictargets without ever having to set foot on the soil of the region they are attacking. -google earth Cyber terrorism is a very real concern and security issue in today’s world. The U. S. government has cyber attacks listed right up there with nuclear, chemical and biological threats.

Although while cyber terrorism may not be a weapon of mass destruction, it is a weapon of disruption which is also harmful (Linda Volonino, Principles and Practice of Information Security). Can you imagine if an entire banking, emergency service, power plant, telecommunications, military or government infrastructure fell victim to a successful cyber terrorist attack? This could bring down the heart of an economy or government. Even if one target of this list was cyber attacked it would cause mass chaos or in some cases worse if it resulted in injury or death.

While the motivators of terrorism remain the same, when terrorists use technology as a weapon it has strong potential to be a very dangerous one which can result in mass destruction. The problem with technology is that it never stands still. What is new today is out of date within a year and while many see this is progress, it produces difficulties when we apply it to something like terrorism. And it’s usually the counter-terrorists who are playing second fiddle to the terrorists responding to their advances and uses of new technology.

It shows that while technology can have its uses, it also has many weaknesses. The computer is extremely useful to modern life and our fight against terrorism, but is also useful to the terrorist in carrying out their everyday work. In short, technology has changed terrorism dramatically and will continue to do so, like a stone gathering snow as it rolls down a hill. Technology has opened up opportunities for both sides but it also means that neither can win but the war between them can only become more violent, more deadly and more extreme.

Technology has changed Terrorism because it has allowed terror networks to communicate with other terrorists and media networks around the world. Alqeada promotes videos recruiting susceptible to disaffected Muslims who disagree with the US policies in and around Muslim countries. The Internet is an unlimited vast resource which can advance humanity when used for good purposes but with limited laws regarding the Internet because of the ever changing technologies, it is difficult to make laws to keep up with the growing technology.

Terror groups exploit this and use websites for propaganda purposes, recruitment of Arabs and Muslims to radical extremism. Terror groups are using the Internet to funnel money from charity groups in the US and Europe to finance their terror organizations by collecting charitable donations from mosques and other religious institutions. The US is constantly monitoring suspected organizations affiliated with radical groups and keep an eye on the banking transactions sent abroad. Video games which help many control and develop skills in shooting, driving air planes, and driving cars.

The FBI monitors merchants which sell video technology to Afghanistan and Pakistan because any technology which can be used to teach or advance technical skills are restricted. Recently, the Obama and the McCain campaigns were hacked into by a foreign government trying to know their policies in advance. the US has to develop a system to protect themselves from the Chinese government and hackers which constantly launch cyber attacks against many other countries besides the US. The Chinese are notorious for stealing information and technologies from other governments.

Since 9/11 Terrorists have been trying to reach the US and launch a large scale attack against the US and its allies. Security has tighten in airports, intelligence agencies have infiltrated these terror cells in the US and abroad and have stopped many planned attacks such as the NYC Lincoln tunnel attack. Many of these terror networks have lost their ability to organize an attack such as that of 9/11. The US government has a cyber anti terror network in the Pentagon and in many key government agencies protecting from the many cyber attacks that are launched against these agencies on a daily basis.

Terrorist groups which have the inability to harm Americans on US soil may launch a cyber attack that could cripple Wall Street, destroy our infrastructure by hacking into electric plants, airports, transportation systems and banking industry. The Us still has outdated technologies regarding electric company grids which have not been updated into modern systems, it was rumored that last year when the entire East Coast lost electricity that it was a cyber attack the electric companies denied this rumor and said it was just to much usage and the system could not carry load.

America has to develop technologies to counter cyber attacks and even use the foreign nations hacking against them by sending back a virus or worm that could destroy their system to discourage future cyber attacks. The Us should develop laws and catch up with the ever changing technologies regarding money laundering and funneling of illegal money to Terror organizations using US and European banks, there should be a coalition between major banks around the world to catch this activity and cut out all their money because without money the terrorists can’t buy weapons and recruit people actively.

TV reports throughout the world about the technology tools probably used by the terrorists in their effort to execute their hideous attack against the USA are sensational. Firstly, their communications must have been encoded to a point that intelligence services all over the world did not have the slightest idea that a criminal act of so grand a scale was on the way to be executed. We have heard from extravagant tools that can hide messages within the photographic images’ dots (stenography), satellite mobiles that encode communication and so on.

All these TECHSare existent as well as widespread-even the mobiles we, simple citizens use nowadays encode our conversation, still in a relatively simple way, so that absolute security is not offered. The issue immediately raised is how and why such technologies have been released in the market, since the fact that they are to be used by bloodthirsty terrorists to assassinate thousands of people, is certain. The question of dangerous technology is a fair, yet a simplistic one.

The first issue one has to think about is that once a technology is born, there is no way for it to be restricted on a long-term basis. It is knowledge, and knowledge cannot be stopped with wire fences. Even in the event of technology diffusion being restricted by law, its possession by criminals cannot be prevented, and that constitutes another problem. They are in possession of the means and of the financial support to acquire it:. The second question that has to be raised is, “to what extent should we accept “dangerous” technology ban?

Should that be Cryptography? Should that be Flight Simulation Programs? (let us not forget that it is quite possible that the terrorists had been trained as to how to approach their targets using the Microsoft Flight Simulator program, one amongst the most common programs in the world. ) Technology and Terrorism: a brief Scenario Technology is double bladed sword and is to be handled with due care. It can be utilized for the welfare of the society as discussed earlier. Misuse of the same will definitely damage and destruct the society like anything.

The scientists and researchers of the whole world are trying their best to explore newer technology for the benefit of the society. But their dreams have been shattered and certain anti social elements have misused the modern technology in terrorism Modern technology has added great terrors and horrors to terrorism. Modern technology has also been characterized as a negative response to globalization. The terrorists are using and trying to use every possible technological resource to fulfill their evil targets.

They are utilizing the knowledge of various engineering disciplines which mainly includes Computes & I. T. Electronics and Telecommunications, Ammunition Engineering, Bio technology, space engineering, Chemical science and other core branches of engineering too. Technology: A tool misused by terrorists. Terrorists are employing various communication devices for easy, faster and optimized communications. It is observed that they are mainly taking the help of cell phones, radio audio signals, micro chips (a data handling device) and other advanced electronics and telecommunication devices. It is proved that they are widely using Laptops and Internet services and software to plan, develop and fund terrorist activities.

Technology-the Future of Terrorism Essay

Effects of Terrorism Essay

Effects of Terrorism Essay.

Victims of terrorist attacks by the year 1985 was at 816 people, in 2001 the number of deaths rose to 3,295 because of the attacks on the 11th of September, 2001. 2996 people died on this day. More than 1,000 people died because of acts of terror in 2003. Nobody expects this kind of stuff to happen. But since it does happy, people have to live in fear, and worry about “what if” this happens again. A lot of people are even the government are constantly asking themselves “are we ready? ”.

This can happen any time, and any day. There is no way to really prepare yourself since you don’t know when and what will happen next.

It is believed that terrorist strike for a couple different reason. There are a lot of people in the world who hate the United States and would risk their life as a suicide bomber. They use murder, kidnapping, hijacking, and bombings to perform these attacks. “The single biggest threat to U.

S. security, both short-term, medium-term and long-term,” President Barack Obama said April 11, is the possibility that terrorists might obtain a nuclear weapon. The second biggest threat to world history’s mightiest military state, it goes without saying, are terrorists without nuclear weapons but armed with box-cutters, rifles or homemade explosives. In order to solve the problem of terrorism , the root of the problem must be found. People start to apply terrorism to certain races, religions, and nationalities because the cause is not exactly known. Doing so and blaming one nation, may make them angry and want to fight back which will lead to terrorism. After the September 11, 2001 attacks, the government knew that things had to be different. Security almost everywhere was stepped up and there was a lot of changes taking place. If you flew on an airplane before 9/11 and then flew again after, you would definitely notice the difference.

There used to be a fairly fast security check out at the airports. Now, there are hours of security procedures that are required before you are able to pass security and board your flight. Simple things such as fingernail clippers could be confiscated because they pose a threat. This isn’t only limited to airports though. When you attend a large event, such as, lets say a football game, you will noticed a high presence of security there too. None of these security measures existed before terrorism. It’s all a matter of cause and effect. Terrorism has been around for a very long time, but has been on the rise in the last 10 years.

Nobody knows what causes a terrorist attack. Some people say it has to do with race, nationality, or even religion. If a terrorist doesn’t like the way that a government works, that right there could be another reason. Due to all the terrorist attacks, security almost everywhere has been upped. Terrorism has no warnings, and can happen anytime. It endangers the life of every person in the United States. Since there is no warning, the best thing is to just know what to do when a terrorist hits, and with all the recent attacks, and the security being upped, hopefully we are just one step closer to solving this problem.

Effects of Terrorism Essay

Chiquita Bananas Essay

Chiquita Bananas Essay.

Chiquita is blamed for the actions of two terrorist organizations that extorted money from the company. Victims and their families of the attacks performed by these two terrorist organizations are looking for compensation from Chiquita, claiming that the company is responsible for making those attacks happen. Chiquita has to make a decision whether or not to take the responsibility for the actions performed by the two organizations.

Key Facts/Background FARC and AUC (two Colombian organizations currently designated by the U.

S. as terrorist organizations) purportedly threatened Chiquita’s executives to hurt employees in the Colombian plant if the company failed to provide the payments for their “protection. ” Chiquita continued to do so until two years after the U. S. designated AUC as a terrorist organization. The U. S. government fined Chiquita for giving “protection money” to FARC and AUC.

Now the victims and families of FARC and AUC are coming forward to claim compensation for damages they incurred due to actions that were financed in part by the money provided by Chiquita.

If the law that permits victims and their families to sue providers of support to the terrorist organizations passes, Chiquita may face multiple lawsuits for providing this support to FARC and AUC, which may amount to millions of dollars. The law is not yet in place but the problem that Chiquita is facing is already here. Stakeholder Analysis

Based on the case one of the main stakeholders is Chiquita. Giving money to FARC and AUC in the first place was not only illegal (after 2001) but also not aligned with, what could be perceived as company’s dedication to protect its employees—giving money may have (and actually did) encourage the AUC to continue to threaten Chiquita just like FARC did. The company did not show that they are constant and coherent in their vision of corporate and social responsibility. They did not care about the communities they operated in as much as they cared about their own well being.

The issue is that the payments were already made and the company admitted to it, which ended with a plea agreement with the U. S. government. Now, the challenge is whether or not to admit that Chiquita is responsible for actions of FARC and AUC because “extortion” money has been paid. This may result in either lawsuits or settlements for all the damage incurred by the two terrorist organizations, which in turn will result in definite lowering of the bottom line and losing credibility.

At the same time (just like with the Tylenol case) if Chiquita acknowledges by itself the wrongdoing, it may recover its image of socially responsible company and show that it is aligned with their beliefs of protecting people (just as they protected their employees, they should protect all the people who are affected by their actions). If Chiquita will wait until law is passed and then fight over the responsibility, it will be costly, but also the company will loose all the credibility they built with the customers and shareholders over the decades. The U. S. judicial system is another main stakeholder.

If the law is passed, the courts in U. S. will be tasked with making a decision of whether Chiquita is indeed liable for, what the company was believing to be, paying the extortion and “protection” money to safeguard their employees against harm from FARC or AUC. Here the court may be in a dilemma, since the illegal activity that Chiquita engaged itself in was believed to be because it was trying to protect lives of their employees. Now, with one more law in place—to compensate those who suffered from FARC and AUC—the dilemma will boil down to determining if what Chiquita believed to be the reasoning behind these payments, was indeed it.

If yes, could we punish Chiquita for trying to protect their employees? The other main stakeholders are the victims (and their families) of FARC and AUC’s actions. They are trying to bring to justice people who are responsible for their suffering. Now, the challenge is that they are trying to bring to justice a company that was not directly but rather indirectly harming them. The reasoning behind this is the belief that the money Chiquita paid was indeed used in hurting those people. The victims and their families have right to demand justice.

The question remains, of who actually should be brought to justice. Options Analysis Based on the current situation (company already admitted to paying the money, internal documents that the money did provide benefits exceeding the protecting of the employees were unveiled, threat of lawsuits), Chiquita has couple limited options, which are based on justice and duty. First option is to come out now and take the responsibility for the actions of FARC and AUC. The law may not be in place yet, but this decision may show that Chiquita is standing by its promise to protect people affected by its actions.

This option definitely addresses the claims of victims and their families—they will get the compensation they are seeking. Chiquita will face multiple lawsuits and will be harmed financially, which affects shareholders of the company. In this case the reasoning behind the payments is brought in place—whether it was for corporate gain or protection of employees. Another option would be to refuse paying compensation to victims of FARC and AUC based on the fact that Chiquita did nothing directly to harm them. Moreover, they were protecting people by paying the terrorist.

If the law holding the company responsible for these actions is not in place, the company and the U. S. justice system are “off the hook” and the victims and families can’t seek to have their claims fulfilled. If the law holding the company responsible is in place, then Chiquita is going to be brought to justice and both the justice system and the victims will have their legal claims fulfilled. Recommendation It comes down to determining whether the company benefitted in other ways than protecting their employees from paying for the “protection” from FARC and AUC. From the information provided in the internal documents it seems like it did.

Even without the internal documents, Chiquita did benefit financially from being present for all those years in Colombia (Chiquita in Colombia Case, p. 4: according to AUGURA, “productivity on Latin and Central American plantations were three times greater than in the Caribbean, and costs to import were 50% lower”). The company had the direct benefit in paying the FARC and AUC for their “protection. ” Doing business in Colombia was lucrative and giving it up was (at that time) more damaging than paying terrorist. That’s why my recommendation to Chiquita is to come forward and admit to their wrongdoing and pay the claimants for their damages.

It will be hard to run a company with such past, but this lesson will (hopefully) help avoid such issues in the future (not only for Chiquita but also other companies who are doing business internationally in unstable political and security environments). Action Let’s say someone is threatening to kill me unless I give him or her my car. I know he or she may kill someone else with it—I wouldn’t give it up even if I paid with my own life for it. If my family is threatened—I give it up, since I am responsible for more people.

If the situation repeats over many years and every month I give up the car to protect myself and my family, more and more people are being killed. Do I admit to what that someone does? Am I responsible for this? I would want to think that not. But if there is a case of repeat actions like this, I would have to take that responsibility. And that’s why Chiquita should act on their core social responsibility values they preach. Synopsis By giving money to FARC and AUC, Chiquita approved of the actions of the two organizations. The solution is to now take the responsibility for these actions.

Chiquita Bananas Essay

Bel Canto Historical Analysis Essay

Bel Canto Historical Analysis Essay.

Bel Canto, the setting is reflected off of the Lima Crisis, otherwise known as the Japanese embassy hostage crisis, which began on December 17, 1996. Bel Canto is a story on the events that happen in the house of a South American country’s vice president. It portrays the relationships of the characters and their feelings toward one another as well as explains the hostage situation. In the Japanese embassy hostage crisis, similar events took place, such as the actual overtake of a mansion which contained high-ranking military officials and others of a high social standing.

Both settings deal with the releasing of hostages in exchange for demands that were never met, which led to the resolution of both the Lima crisis and Patchett’s Bel Canto. Bel Canto reflects the historical Japanese embassy hostage crisis, although Bel Canto has a third person omniscient point of view of the occurrences on the inside of the mansion. Bel Canto imitates the incidences of the Japanese embassy hostage crisis.

The Japanese embassy hostage crisis was a 126 day hostage crisis where members of a revolutionary movement known as the Tupac Amaru Revolutionary Movement had taken over 600 hostages, a decent amount of which were high ranked military officials and other well-known ambassadors. The MRTA, led by Nestor Cerpa, took over the highly fortified residence of the Japanese ambassador. Cerpa proclaimed that he would release any of his hostages who weren’t involved with the Peruvian government, and they did so. The MRTA eventually release all the captives except 72 men.

The original plan of this takeover was to change the ways of the government. In Bel Canto, although the terrorists originally came to take the president, they were a rebellious group from the country and wanted changes in the government. The rebels demanded a few things in return for the safety of the hostages. They requested “The release of their members from prison; a revision of the government’s neoliberal free market reforms, and they protested against the cruel and inhumane conditions of Peru’s jails” (Japanese embassy hostage crisis).

In Bel Canto, the rebels have demands as well: ‘The terrorists having no chance to get what they came for, decided to take something else instead, something they never in their lives knew they wanted until they crouched in the low, dark shaft of the air-conditioning vents: opera. They decided to take that very thing for which Mr. Hosakawa lived. ‘(71). Both terrorists wanted demands out of their seizures of the mansions. In both Bel Canto and in the Japanese crisis, a Red Cross official was the ‘negotiator. He attempted to setup a barter system to which the terrorists would get supplies so long as they give hostages back in return. In the Japanese crisis, Luis Cipriani had worked on getting a deal that would allow the terrorists to be let go into Cuba as exiles. This negotiation failed, as did some of the consultations from Bel Canto. Messner, the negotiator, attempts to make several negotiations with the terrorists, throughout the novel. Although both mediators do try to work the situations out with the rebels, they are not able to meet the standards of the negotiations.

In the end of both Bel Canto and the Japanese embassy hostage crisis, the terrorists were killed. They were not done in the same fashion, although the hostages were saved. In Bel Canto, the terrorists allow the hostages to be outside, and one day while they are together, a group of government troops come and shoot all the insurgents, as well as Hosokawa. In the Japanese crisis, a military assault overwhelmed the rebels and forced them to either surrender or be shot and killed. Bel Canto is very much reflected upon the happenings of the Japanese embassy hostage crisis.

The similarities of the negotiations between the outside world and the mansions, the motives for invasion, and the format of how the situations end are all closely related. The book may not have total accuracy of the Lima crisis, although the internal view of the occurrences in the mansion provide a different side of the hostage situation. Works Cited Japanese embassy hostage crisis. ” Wikipedia. Wikipedia. Web. 23 Jan. 2013. . Patchett, Ann. Bel Canto. 2005 ed. New York: HarperCollins, 2001. Print.

Bel Canto Historical Analysis Essay

Being on time Essay

Being on time Essay.

One of my pet peeves is people who aren’t on time for things. Just how much this upsets me was brought home to me twice today, and I decided it was time to rant about it.

The first was a meeting I was supposed to have with the director of a local non-profit organization. The plan was that he would give me a call “before noon”, to arrange a meeting shortly after noon. I was offering to put some scripts together on their website so they could post news more easily so people would know what’s up with this organization.

Off the top of my head, I’d guess it was an offer of about a thousand dollar donation of services.

He finally called at 12:30, calling my cell-phone (after I’d given him my home number, saying that was the best way to reach me), leaving a message saying we’d have to reschedule. I left for lunch and a walk to clear my head at 12:45, and finally got the message at 2:45 when I got home and wondered if maybe he’d called the cell-phone.

At this point, I don’t know if I’m even going to bother trying again. Apparently my offer of services isn’t worth enough for him to call me when he said he was going to, which makes me wonder why I should bother helping out.

The second was the president of a company for which we did some web design work. He was impressed with our work, and asked if we might want to put in a bid for some future work.

The problem is that the person we had to work with at that company, “marketing guy”, had blown off every single in-person meeting we’d scheduled during the previous project, and had been late for numerous phone calls we’d also scheduled (about a quarter of the final cost to the client was time we spent waiting for marketing guy, rather than doing productive work).

I replied that we’d be interested in looking at the work, as long as marketing guy wasn’t involved. And I’ll stick by that. I don’t think there’s enough money to convince me to work with marketing guy again.

The third event (a couple days ago) is a company I’m contracting at. At this company, there’s a regularly scheduled weekly meeting. It happens every week unless people decide there isn’t enough to talk about and we cancel the meeting. One of the team members has not been on time for the meeting that I can remember. It bugs me enough that even though this is the client providing most of my income at the moment, I think about simply walking away from the contract almost every day.

So why do I feel this strongly about being on time?

Well, most of it has to do with the saying “A Man’s Word is His Bond.” If you tell someone you’re going to do something, then you do it. If you don’t, you’d better give notice ahead of time, and have a pretty good reason.

But another part of it is respect. When schedule a meeting, I’m making a commitment to be there on time. When someone else is late to the meeting, I get the feeling that they figure they’ve got something more important than my time. “Sorry I’m late, but traffic was brutal” is an excuse I hear all the time.

Well, I had to get to the meeting through the same traffic, and I was on-time. If I’ve got a meeting in the morning, I’ll check the traffic reports or look out the window and make sure I leave early enough to get to the meeting. I respect the other people at the meeting enough that I’m not going to waste their time by being late.

I just realized that this also applies to monetary issues. I’ve had clients who never pay on time. They agree in a contract to pay my invoices net-30 and then checks arrive like clockwork 45-60 days after the invoice. I won’t work with that sort of client anymore. I’ve got yet another job that I put in a bid on yesterday, but I’ve heard through the grapevine that this client habitually pays late.

When we meet to discuss terms, I’m going to make it very clear that late payment on their part will be considered breach of contract. Fuck it. It’s not worth my time to try and wheedle payment out of them, so if they don’t pay, work is stopping, and I’ll hand the collections over to the lawyer. It may cost me the job, but at least it’ll keep me from getting upset with the client.

And I think that’s got to be my long-term approach. If a client’s not willing to honor their commitments, whether it’s showing up on time for a meeting, or getting a check in the mail, I’m not sure why I would want to work for them. I don’t need the headaches. Now I just have to figure out how to deal with the current client. Maybe changing the meeting to the afternoon will be the answer.

Being on time Essay