Thursday, August 27, 2020

(Hitchcock, Shadow of a Doubt (1942), Hitchcock, Strangers on a Train Essay

(Hitchcock, Shadow of a Doubt (1942), Hitchcock, Strangers on a Train (1951)and Hitchcock, The Lady Vanishes) - Essay Example In his vocation he spearheaded various procedures that improved the nature of movies in the thrill ride and anticipation classes (Bays). More than six decades, Hitchcock coordinated more than fifty element films both at the British film and in Hollywood. This doesn't imply that his vocation was smooth right in truth the majority of his first movies didn't do so well. As indicated by Donald Spoto (1976), Hitchcock’s initial seventeen movies didn't get a lot of acknowledgment as they were a greater amount of recorded interests (8). In Donald’s text he shows that Hitchcock’s vocation took a jump for the better beginning from 1935, which saw him produce and direct incredible bits of craftsmanship (Spoto 9). All through his profession he delivered a wide scope of astounding movies. It would require some investment if one somehow managed to break down all the best movies by Hitchcock. In any case, with the end goal of this paper we get the opportunity to break down thr ee of his best works of art. This incorporates the 1942 Shadow of a Doubt followed by the 1951 Strangers on a Train and the 1938 The woman evaporates. These incredible movies were shot utilizing novel styles that catches the viewers’ consideration driving into a ton of tension, puzzle and profound respect for the great work. The intriguing part with Hitchcock is that for every creation and scene in the movies, he realized who to work with for him to deliver the best outcomes. He went to the degree of looking for German and British experts just to get the correct picture and the ideal shot. The German specialists helped him bring out exceptional methods, for example, acquire the privilege â€Å"silent shrieks†, expressionist lighting, rakish shadows and upsetting mirror reflections (Spoto 29). A portion of his celebrated commitments to the film business additionally incorporate the vibe of â€Å"voyeurism†; a strategy where the camera’s development copies a person’s look and in this manner connecting with the watcher more to the scenes (Bays, n. p.). Shadow of a Doubt is one of Hitchcock’s’ incredible gem, shot in 1943 the movies topics rotated around suspenseful thrill ride a kind wherein the greater part of his motion pictures were sorted. In the wake of increasing a positive crowd and a great gathering for the film everywhere throughout the country; the film was assigned for an Academy Award in the Best Story classification. In 1991, the US national Film Registry chose to be a piece of the Library of Congress as its subject depicted recorded and social hugeness (McDevitt and Juan 158). The film includes an excellent opening picture which includes an ideal synchronization scene of a couple whirling with Merry Widow Waltz out of sight. Flawlessness in the picture goes on all through the film with other extraordinary scenes, for example, analyst walks perfectly coordinating with the ambient sounds as uncle Charli e is being trailed (McLaughin 147). Shadow of a Doubt’s highlights, for example, the delightful recording and interesting lighting all depict the shocking advances of style and method by Hitchcock. The chief makes stunning camera points that structure unrivaled depiction of feeling in the characters. Utilizing sharp altering and camera close-ups, Hitchcock gives an accentuation on Uncle Charlie’s evil nature in the scene where Uncle Charlie and Charlotte eat and Charlotte carries on in a flighty way. As a mental thr

Friday, August 21, 2020

Jane Kenyon’s The Blue Bowl Essay -- Poems Poetry Analysis

Kenyon’s analysis of entombment and the grieving procedure and the way in which it neglects to give a feeling of conclusion to the individuals who have lost a friend or family member is the fundamental basic topic in The Blue Bowl. Through her striking portrayal of both the common setting and the melancholy blasted enthusiastic hint encompassing the internment of a family’s house pet and the occasions that follow in the time after the feline is settled, Kenyon can summon a passionate reaction from the peruser that reflects that of the poem’s real characters. Her cautious utilization of word usage and the poem’s introduction through a first-individual point of view, empowers Kenyon to put the peruser with regards to the sonnet, in this way making the peruser a member as opposed to an insignificant eyewitness. By joining these two abstract methods, Kenyon present a convincing contention with proof supporting her scrutinize of internment and the grieving proc edure.      Kenyon’s decision of a first individual viewpoint fills in as one of two primary methods she utilizes in building up the reader’s capacity to identify with the poem’s enthusiastic ramifications and hence further her contention in regards to the purposelessness of mankind’s scan for conclusion through the grieving procedure. By deciding to compose the sonnet in the primary individual, Kenyon urges the peruser to decipher the sonnet as a story told by a similar individual who succumbed to the catastrophe it subtleties, as opposed to as an insignificant record of occasions saw by an outsider. This addition of the character into the story permits the peruser to deliberately decipher the messages communicated through her utilization of word usage in portraying the occasions during and after the internment.      The lingual authority Kenyon utilizes for her depiction of the poem’s physical and mental setting fills in as Kenyon’s essential methods for introducing her contention in regards to the idea of the grieving procedure and its inability to enable the individuals who to have lost friends and family. The poem’s first refrain starts as follows, â€Å"Like natives we covered the feline with his bowl. Exposed gave we scratched sand and rock once again into the hole(1-4).† The initial two words, â€Å"like primitives,† give the peruser quick understanding into Kenyon’s sentiment with respect to the idea of the internment itself. She considers it to be a methods for dealing with death that is less developed than the psychological condition of those that it endeavors to help. At the point when the primary refrain is deciphered all in all, the peruser is... ...ten through grieving, in this way permitting her to outline one final model supporting her contention in regards to the disappointment of internment and the grieving procedure to give a feeling of conclusion to the individuals who have lost a friend or family member.      Through the cautious utilization of word usage introduced through a first-individual viewpoint, Kenyon can utilize The Blue Bowl as a mode for social editorial seeing what she sees as a crude grieving procedure that doesn't enable the individuals who to embrace it. Through a cautious investigation of the sonnet, the peruser can comprehend Kenyon’s evaluate of the grieving customs that people use to lighten the misery brought about by the passing of a friend or family member and decipher the inadequacies that Kenyon finds. Kenyon’s utilization of point of view joined with explicitly picked word usage empowers her to introduce a social discourse in regards to what she accepts to be the innate inadequacies in the enthusiastic impacts of the internment itself and the feeling of conclusion it should bring yet neglects to accomplish during a run of the mill time of grieving. Works Cited Kenyon, Jane. Verse 180 - The Blue Bowl. Library of Congress Home. Web. 11 Dec. 2015. .

Tuesday, May 26, 2020

Information Security Career From www.isc2.org Website Research Papers

Abstract This research is based on the requirements of an individual interested in the Information Security as stipulated by the International Information Systems Security Certification Consortium, (ISC)2. The requirements focus on major domains to be covered by completion of the certification. In this text, certifications discussed include; Certified information Systems Security Professional CISSP, Systems Security Certified Practitioner SSCP, Information Systems Security Architecture Professional ISSAP, Information Systems Security Engineering Professional ISSEP, and GIAC Security Essentials Certification GSEC. In summation, this research is essential for both professionals and non-professionals interested in Information Security. Introduction Information security is the process of protecting the availability, privacy and integrity of information from unauthorized access or modification. A tremendous increase in technological advancement in the corporate world has seen many companies store business and individual information on computer databases. Most of this information stored, is processed and transmitted across networks to other computers. Should this confidential information fell into the wrong hands, it could lead to lost business, identity theft, law suits or even bankruptcy of the business. Thus, protecting confidential information is a business requirement and in many cases also an ethical legal requirement. Over time, information security has evolved significantly and developed even more important in recent years. From a career perspective, there are even more areas where a professional can work in the field. Some of the specialty areas within information security include; Network Security, Application and Database Security, Security Testing, Information Systems Auditing, Digital Forensics Science and Business Continuity Planning, among others. Professionalism An entry into this field of information security can be accomplished through self-study, college or university schooling in the field or through week-long focused training camps. Many colleges, universities and training companies offer many of their programs online The International Information Systems Security Certification Consortium, also known as (ISC)2, is a global, not-for-profit leader in educating and certifying information security professionals. The (ISC)2 is recognized worldwide for their gold standard certifications and high quality education programs. The (ISC)2 provides career services, education products, and certification credentials to information technology security professionals in more than 135 countries. The mission of the (ISC)2 is stated as: we make society safer by improving productivity, efficiency and resilience of information-dependent economies through information security education and certification. (ISC)2 develops and maintains their Common Body of Knowledge, CBK on information security topics. This knowledge defines global industry standards, and serves as a common framework of terms and principles. In this way, the (ISC)2 allows professionals worldwide to discuss, debate, and resolve matters pertaining to the field. Subject matter experts continually review and update the CBK. The (ISC)2 certifications are in high demand to both individuals and employers for the seamless safety and protection of information and infrastructures. The certifications under study in this research and currently offered by (ISC)2 include: Systems Security Certified Practitioner (SSCP ®) Certified Information Systems Security Professional (CISSP ®) Information Systems Security Architecture Professional (CISSP-ISSAP ®) Information Systems Security Engineering Professional (CISSP-ISSEP ®) CISSP Certified Information Systems Security Professional The CISSP is a credential for professionals who develop policies and procedures in information security. It was the first credential in the field of information security, accredited by the American National Standards Institute, ANSI to International Organization for Standardization, ISO Standard 17024:2003. This certification is not only an objective measure of excellence, but also a globally recognized standard of achievement. The CISSP credential is ideal for mid-level and senior-level managers who are working toward or have already attained positions as CISOs, CSOs or Senior Security Engineers. Its validity is for only three years, after which it must be renewed by either re-taking the exam or by reporting at least 120 Continuing Professional Education, CPE credits since the previous renewal. For a candidate to take CISSP examination, he/ she must meet the following requirements: Have a minimum of five years of direct full-time security professional work experience in two or more of the ten domains of the (ISC)2 CISSP CBK, or four years of direct full-time security professional work experience in two or more of the ten domains of the CISSP CBK with a college degree. On the other hand there is a one-year waiver of the professional experience requirement for holding an additional credential on the (ISC)2 approved list. The ten domains of the (ISC) ² CISSP CBK include: Access Control – policies, standards and procedures that define who users are, what they can do, which resources they can access, and what operations they can perform on a system. Application Development Security – Software based controls, development life cycle and principles Business Continuity and Disaster Recovery Planning – Response and recovery plans and restoration activities Cryptography – Basic concepts and algorithms, signature and cryptanalysis. Information Security Governance  and Risk Management – policies, standards, guidelines and procedures. Risk management and practices and planning and organization. Legal, Regulations,  Investigations and Compliance – Major legal systems, common and civil law and regulations regarding law and information security.   Ã‚   Operations Security – Media, backups and change control management.    Physical (Environmental) Security – Layered physical defense and entry points including site location principles Security Architecture and Design – principles and benefits, trusted systems and computing base, and system and enterprise architecture. Telecommunications and Network Security – network security concepts and risks, business goals and network security.    Complete the Candidate Agreement, attesting to the truth of his or her assertions regarding professional experience and legally commit to adhere to the (ISC)2 Code of Ethics. Successfully answer four questions regarding criminal history and related background. SSCP Systems Security Certified Practitioner Systems Security Certified Practitioner (SSCP) is a vendor-neutral Information Security certification governed by the (ISC)2. SSCP is designed for the hands-on practitioner who implements the plans and policies designed by information security managers, CISOs, CSOs or equivalent. The main goal of SSCP is to validate mastery of the technical implementation side of information security systems and the ability to collaborate with those that write policy. It is ideal for those working towards positions such as Network Security Engineers, Security Systems Analysts, or Security Administrators. This is also the perfect course for personnel in many other non-security disciplines that require an understanding of security but do not have information security as a primary part of their job description. This large and growing group includes information systems auditors; application programmers; system, network and database administrators; business unit representatives, and systems analysts. SSCP candidates must meet the following requirements prior to taking the SSCP examination: Subscribe to the (ISC)2 Code of Ethics. Have at least one year of cumulative work experience in one or more of the seven domains in information security. The seven domains of the (ISC) ² SSCP include: Access Controls policies, standards and procedures that define who users are, what they can do, which resources they can access, and what operations they can perform on a system. Cryptography the protection of information using techniques that ensure its integrity, confidentiality, authenticity and non-repudiation, and the recovery of encrypted information in its original form. Malicious Code and Activity – countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses and other related forms of intentionally created deviant code. Monitoring and Analysis – determining system implementation and access in accordance with defined IT criteria. Collecting information for identification of and response to security breaches or events. Networks and Communications the network structure, transmission methods and techniques, transport formats and security measures used to operate both private and public communication networks. Risk, Response and Recovery the review, analysis and implementation processes essential to the identification, measurement and control of loss associated with uncertain events. Security Operations and Administration identification of information assets and documentation of policies, standards, procedures and guidelines that ensure confidentiality, integrity and availability. Information Systems Security Architecture Professional (ISSAP) Information Systems Security Architecture Professional is an independent information security certification concentration of the CISSP governed by the (ISC)2. This concentration requires a candidate to demonstrate two years of professional experience in the area of architecture and is an appropriate credential for Chief Security Architects and Analysts who may typically work as independent consultants or in similar capacities. The architect plays a key role within the information security department with responsibilities that functionally fit between the C-suite and upper managerial level and the implementation of the security program. He/she would generally develop, design, or analyze the overall security plan. Although this role may typically be tied closely to technology this is not necessarily the case, and is fundamentally the consultative and analytical process of information security. According to the (ISC)2 Information Systems Security Architecture Professional (ISSAP) Candidate Information Bulletin, candidates for the ISSAP must meet the following requirements: Be a CISSP in good standing Demonstrate two years of professional experience in systems security architecture Maintain the ISSAP credential in addition to the underlying CISSP Adhering to the (ISC)2 Code of Ethics. The six major domains of the CBK covered by CISSP-ISSAP certification are: Access Control Systems and Methodology – details the critical requirements to establish adequate and effective access control restrictions for an organization. Access control protects systems, data, physical infrastructure and personnel in order to maintain their integrity, availability and confidentiality. Communications Network Security addresses the security concerns related to the critical role of telecommunications and networks in today’s distributed computing environments. The security professional understands the risks to communications networks across data, voice and multimedia. Cryptography requires the security professional to understand cryptographic methodologies and the use of cryptography to protect an organization’s data storage and communications from compromise and misuse. Security Architecture Analysis requires the evaluation and choice of different architectures, and understanding the risks associates with each type of design. Technology Related Business Continuity Planning (BCP) Disaster Recovery Planning (DRP) involves the identification of adverse events that could threaten the ability of the organization to continue normal operations. Once identified, the security professional will implement countermeasures to reduce the risk of such incidents from re-occurring. Physical Security Considerations recognizes the importance of physical security and personnel controls in a complete information systems security model. Information Systems Security Engineering Professional (ISSEP) This concentration was developed in conjunction with the U.S. National Security Agency (NSA) providing an invaluable tool for any systems security engineering professional. CISSP-ISSEP is the guide for incorporating security into projects, applications, business processes, and all information systems. Security professionals are hungry for workable methodologies and best practices that can be used to integrate security into all facets of business operations. The SSE model taught in the IATF portion of the course is a guiding light in the field of information security and the incorporation of security into all information systems. Candidates for the ISSEP must meet the following requirements: Adhering to the (ISC)2 Code of Ethics Be a CISSP in good standing Pass the ISSEP exam The four major domains of the CBK covered by CISSP-ISSEP certification are: Systems Security Engineering employs Information Assurance Technical Framework (IATF) processes to discover users’ information protection needs and design systems that will effectively and efficiently address those needs. It also covers concepts of defense in depth, risk assessment, and the systems lifecycle. Certification and Accreditation (CA) identifies, understands, and implements the Certification and Accreditation (CA) processes. Technical Management describes system development models and relates security tasks to these models. U.S. Government Information Assurance (IA) Governance (e.g., laws, regulations, policies, guidelines, standards) identifies, understands and applies the practices as defined by the United States Government Information Assurance regulations. GIAC Security Essentials Certification (GSEC) GSEC (GIAC Security Essentials Certification) from the SANS Institute targets security Professionals that want to demonstrate they are qualified for IT systems hands-on roles with respect to security tasks. Candidates are required to demonstrate an understanding of information security beyond simple terminology and concepts. GSEC has nearly one third of its focus on testing skills that people need to secure the most common and most important operating systems, so it test knowledge the professional can put to work immediately in their jobs. Therefore, it is more focused on what security professionals actually have to do, and goes deeper in technical concepts. The primary goal of the program is to address the need to validate the skills of security professionals and developers. GIAC certification provides assurance that a certified individual meets a minimum level of ability and possesses the skills necessary to do the job. The standards for the GIAC certification were developed using the highest benchmarks in the industry. Before a person can attempt the GSE, they must successfully complete three GIAC certifications (GSEC, GCIA and GCIH) with GIAC Gold in at least two. In addition, you must have real world, hands-on experience in these subject areas. The GSE hands-on examination ensures each candidate has a high-degree of competence in each of the objectives listed below. GIAC reserves the right to request that candidates who are unsuccessful in one domain of the GSE lab by a slim margin complete additional work outside of the GSE lab before awarding any credential. GIAC also reserves the right to require any candidate to retake the entire lab. Five domains of the GSE Certification include; IDS and Traffic Analysis Incident Handling ITSEC Security Technologies Soft Skills GIAC certifications cover five IT security job disciplines: Security Administration Security Management Forensics IT Audit Software Security Reference (ISC) ², Inc. Certification Programs. 1996-2010. 6th December 2010. https://www.isc2.org/credentials/default.aspx The SANS Institute. GIAC Global Information Assurance Certification. 2000 -2010.6th December 2010. http://www.giac.org/

Wednesday, May 6, 2020

The Success Of The Formation Of Ww1 - 869 Words

â€Å"No one wants war†, states David Lloyd George, an English politician during the beginning stages and rising tensions that would eventually spill over to produce the first great war of the 19th century, World War One. The factors that lead to the formation of WW1 were a combination of fragile alliances, the race for power, ignorance, and the assassination of an Austrian duke. Each of these issues contributed to rising tensions, and while the civilized world remained oblivious, the war had begun on July 1914. To begin, the benefit of having alliances is an essential way to ensure that all parties protect similar interests such as security and borders, but when these interests compete wit hone another, they turn a strong alliance into a fragile relationship of uncertainty and mistrust. This happened several times before and during the war as country’s interests changed, such as Italy switching from the allied powers to the axis for the promise of land from Germany. When these national interests take prominence over the maintenance of alliances, it leads to a constant state of uncertainty and mistrust between countries. Another issue that stretched the relations between European powers is the race for Imperialism and the rise of nationalism as a way of social control. Imperialism, from a Marxist perspective was the race for imperial powers between European powers, the colonies in an empire offered the owner an access to more wealth and power in the world, making them a targetShow MoreRelatedWho Were The German Sturmtruppen?1350 Words   |  6 PagesWho were the German Sturmtruppen (Stormtrooper), and how did they affect modern combat? The German Stormtrooper were an elite force of soldiers trained to fight a fast-paced style of combat. In 1915, WW1 had come to a halt, with miles of trench structures set all over Europe. Both Allied and Axis forces were weary of fighting this war of attrition and were desperate to try new and diverse types of warfare to break these lines. As explained by Citino, â€Å"After much trial and error, the German armyRead MoreGeorge S. Paton Jr.1608 Words   |  7 P agesvictory over Germany in the Second World War. This victory allowed America to exert its rightful place as a global superpower. Patton not only assisted America in winning the war but set it up for further victory based in his involvement in the formation of the first armored division in the U.S. Army. His tactics were developed were deployed throughout the European theater. To fully grasp the impact that General Patton has had on America’s military and America’s global dominance, one must understandRead MoreDevelopment of Foreign Policy Essay697 Words   |  3 PagesPrior to the establishment of the United States, which was formed with the end of the American Revolution, there was no foreign policy for the American new found state. However, this changed with the formation of the same. The policy then consisted mainly on its regional interests and had no regards of the international scene. This however came to pass with the advent of the Spanish-American war. What however ought to be noted is that the regional policy had in its ideals an aim of creating an ‘EmpireRead MoreWoodrow Wilson Presidency : Election Of 19121080 Words   |  5 Pagesbanking, which came to be known as New Freedom. He also ratified the 17th amendment, allowing the people to have power in their home states to elect their senators. In previous times, senators had been selected by state legislators. Another great success by Wilson was the Federal Reserve Act on December 23, 1913. This law created and established the Federal Reserve system, the central banking system of the U.S. Unlike his competitor, Theodore Roosevelt, who believed in â€Å"good† and â€Å"bad† trusts, WilsonRead MoreThe Strategic Board Game Strategy1153 Words   |  5 Pagesto alliance with to remain on the offensive end of battles becomes a reoccurring theme in history. After the game completed and several class discussions, I have a better understanding about why World War I might have happened. WW1 was a war of alliances with the formations of the Triple Alliance and the Triple Entente. The Triple Alliance was a mutual agreement between Germany, Austria-Hungary, and Italy. The three countries agreed to support each other if attacked by either France or Russia. ItRead MoreThe Strategic Board Game Diplomacy1099 Words   |  5 PagesIn our game, Germany and France always were competing for Belgium and in the end, took it over. After the game completed and our several class discussions, I have a better understanding about why World War I might have happened. WW1 was a war of alliances with the formations of the Triple Alliance and the Triple Entente. The Triple Alliance was an mutual agreement between Germany, Austria – Hungary, and Italy. The three countries agreed to support each other if attacked by either France or RussiaRead MoreThe Life and Achievements of Henry Ford1643 Words   |  7 Pagesappeared on the market in Detroit. This would lead to many publicity events and even a lawsuit with the ALAM over the Selden Patent, which he eventually won. Ford continued working on his cheap design. It was ready shortly after the new companys formation and orders came in faster than they could be filled. Ford, Charles Sorensen and a small group of dedicated engineers began working on a universal car. By October, 1908, the Model-T had been constructed. Again orders began coming in faster thanRead MoreWhy Britain Enter A Period Of Affluence From The Late 1950s, And How Did It Affect British Society2102 Words   |  9 Pagesthe Second World War have affected the economic, personal, social and political life of millions of people on our planet. One of the most cruel consequences of the war are millions dead people and soldiers in captivity. 750 000 British people died in WW1. Great Britain had 192 000 prisoners in World War 1. The humanitarian organization, Red Cross, took care of food-supply and return of the imprisoned soldiers. Immediately after the end of World War II, Britain underwent enormous social change. The countryRead MoreWoman And The New Race2076 Words   |  9 Pagessocialist viewpoint reduces the value of bodily autonomy within the first wave and encourages the association of politics and economics in a post WW1 era. Sanger incorporates these larger issues of economic prosperity and argues that birth control is pivotal to dealing with the threat of overpopulation and its consequences in disease and poverty. The formation of the ‘Women’s Trade Union League’ in 1902 was a key institution which held a sole focus on women’s working conditions prior to the acquisitionRead MoreThe Collapse Of International Order Under World War I2198 Words   |  9 Pagesthe ‘League’s ability to prevent international aggression.’ was inherently damaged, in particular in terms of military power and financial aid. (Housden, 2011, p.34) The League was forced to rely on Br itain and France, who had both been weakened by WW1. It was intended to have from all or at least most of the Great Powers, without this its authority was limited. Not only did the League of Nations fail to gain consensus from powerful nations, it also failed to maintain their membership. With Japan

Tuesday, May 5, 2020

Sustainable Enterprise Investors and Employees

Question: Discuss about theSustainable Enterprisefor Investors and Employees. Answer: Strengths In this article, the author performed a study involving corporate managers, consumers, investors, and employees. The results clearly indicate that there is a positive connection between the performance of corporate and sustainability reporting. Moreover, the managers agree that the cost of performing recycling as compared to making new purchases. The triple bottom line reporting ensures that there is transparency across the business operations. This article also indicates that triple bottom line concept enables the businesses to adapt the various frameworks. In this article, the investors are said not to feel an impact of a possible market crash because their operations are geared towards future growth. It is important to note that the four principles of sustainability have been covered in detail in this paper to ensure a sustainable corporation. This article also provides the various models that can be adopted by a sustainable enterprise for corporate social responsibility purposes. This is very critical for businesses that have not yet adopted the aspect of a sustainable enterprise through the social aspect of the community. The model used in this study was realistic since it gave an explanation that the variations in the responses were not due to chance. This is because the F-statistic value was 0.000 which is lower than 0.05. This article meets the standard of the subject material because it offers a clear understanding of various concepts and issues in strategic sustainability in a business. Furthermore, various approaches have been used to measure and report a sustainable enterprise. In this article, all the seven principles of business sustainability have been explored in the study to ensure a green economy. As the subject materia indicate, so does the paper support that businesseses should be viewed more from an eco-social perspective as opposed to the economic point. All the six phases of a sustainable business have been evaluated in detail in this article just as the subject materials explain. Just as the subject materials recognize, the importance of reporting, so does the article lay emphasis on the importance of monitoring the performance of a sustainable enterprise through reporting and accountability. In this article the stakeholders were included in the survey and the subject material argues t hat working with stakeholders improves the social representation of any business. Weaknesses In this article, the contribution of culture and ecology to the sustainable enterprise has not been clearly explored. A proper framework needs to be put in place by corporate to ensure that the triple bottom line policy is properly affected. Furthermore, apart from getting the views of the managers, investors, employees and consumers, this research did not factor in the assessment of the exact effects of a few green businesses to the environment like their wastes disposal methods. This could have given the true picture of the effects of a given green business to the environment. It is important to note that these form of studies involving the interviewing of managers, employees, and consumers can be slightly biased. Moreover, the model used in the design of this study was able to answer only 36 % of the dependent variables could be explained by the independent variables. Therefore this indicates that the employees' motivations were affected by a large proportion of other factors that were not considered by the present study. The article on the business enterprise does not lay emphasis on specific models for use as indicated in the learning materials. Moreover, no transformation plan has been covered in the article.