Thursday, May 28, 2020

Sexism In Rock N Roll - Free Essay Example

Thesis: Sexism is still alive in the rock world. Women artist in bands really dont get an fair chance. Women writers or women in general with a musical talent can basically have the craziest ideas that doesnt get appreciated as much a man in a rock band. Men expect women to be half naked in order to get attention. Women should be able to be theirselves and wear what they please without being judged or shamed about their ideas. Its really no secret that popular music, rock n roll can be sexist and misogynistic. Rock nroll came to life in the 50s, with Chuck Berry, Elvis and Little Richard, they all became popular in the 60s when The Rolling Stones and The Beatles took over the world. At the time sex, drugs and rock n roll was a mantra, an rousing war cry for a generation in transition, hypnotized by the men on stage with their guitars and glorified in music magazines like Rolling Stone. A cool rock band was formed. Like most industries during that time, the music industry was dominated by men. Men worked most of the positions of power and controlled the flow of information. The rock ?n roll establishment created a culture that reflected this male domination (McLeod 2002). Before she was a pioneering woman in rock, Patti Smith commented that rock ?n roll is for men. Real rock ?n roll is a mans job. I dont want to see no chicks tit banging against a bass (Smith in Janowitz 1987). For that Smith went on to achieve, in hindsight we can view this statement as somewhat tongue-in-cheek. It does, however, reflect a commonly held belief that serious pop music is the domain of men (Davies 2001). The success of Patti Smith and others, like Aretha Franklin and Tina Turner, suggest that women arent necessarily excluded from pop and rock music, were just not sure exactly where they fit in. The study falls heavily on gender role theory and asks the question, where do women fit into popular music? Using content analysis, the research looks at a selection of Rolling Stone magazine Greatest of All-Time lists and aims to compare the way in which men and women are represented by these lists. The research is to help fill a gap in scholarly work that looks at gender roles, music and journalism at the same time. Also in order to find womens place in rock n roll, we need to make a link between the music created by women, the medias representation of this music and how this differs from men. How does Rolling Stone magazine, as media and as part of the rock ?n roll establishment, construct gender roles in music, and what is the female role? Much of this tends to focus on the notion that pop music journalism is dominated by men (McLeod 2002). Kembrew McLeod makes an serious connection between the masculine culture and the fact that only a few women occupy positions of power within the rock journalism establishment. For McLeod, this establishment was very much established. McLeod argues that this culture remains dominant: Who works as a rock critic in large parts depends on ones immersion in the social sphere that rock critics inhabit, which in many ways resembles the old boy networks that for years dominated most businesses (2002). Stories about women in music magazines are often included because of and or focused on, the womans appearance. One person only has to look at covers of Rolling Stone in order for this to be apparent. Cover stories about men are mostly concerned with career or musical contribution to the world. Those about women on the other hand are often featured a scantily clad artist, model or pop starlet on the cover, and a suggestive headline. Women are less likely than men to learn a rock instrument like guitar, bass and drums at an early age because society dictates what young boys and girls are supposed to do and there is also a lack of female musical role models for young girls to emulate. Girls are less likely to be included in the formation of an adolescent band because these are more often than not based on friendship rather than musicianship and boys, being boys, will pick their ?buddy over some girls as well as the fact early adolescent social life is gendered. The study looks at a selection of Rolling Stone magazine Greatest of All-Time lists, which can be found on the Rolling Stone website. Five lists have been chosen for the sample. They are: the 100 Greatest Singers of All-Time; 100 Greatest Guitarists of All-Time; 100 Greatest Artists of All-Time; the top 100 of the 500 Greatest Albums of All-Time; and the top 100 of the 500 Greatest Songs of All-Time. The included lists were published in print between 2003 and 2008. Subsequent updates have appeared on the Rolling Stone website. Rolling Stone magazine lists were chosen over other similar lists, such as Billboard, thebest100lists.com and thetoptens.com, because of its longevity and standing within both the mus ic and journalism worlds. Since the 1970s Rolling Stone has been thought of as a credible and reliable source of music and political news (Brady 2009) .Upon undertaking the preliminary research, it became apparent that it was necessary to document the instances where a female appears more than once in the sample. Many of the men and women, who are listed in the top half of one of the lists, appear in one or more other lists. For example, the 18 men and 2 women who appear in the top 20 of the Top 100 Singers of All-Time list, all feature in the top 70 of the 100 Greatest Artists of All-Time. Johnson-Grau, in Sweet Nothings, points to the idea that women artist and musicians must be extraordinary in order to warrant recognition in the company of men (2002, p. 210). The decision to exclude vocalists is based on the view that ensemble instrument playing is both the principal site of musical authority in rock music and the activity from which women have been most fully excluded (1999, p. 99). the total female entr ies over the entire sample. Looking at these numbers its not hard to view these women as ?extraordinary. Not because they are rated alongside men, but because all of them have been considered, by their contemporaries and music experts, to be amongst the greatest contributors to music in more than one category. While they are few, at least in relation to men, these women whove left their indelible mark on popular musics history are regarded extremely highly by the rock ?n roll establishment, of which Rolling Stone magazine is an important part. Aretha Franklin, Tina Turner, Janis Joplin, Dusty Springfield, Joni Mitchell, Patsy Cline, Bonnie Raitt, Ronnie Spector, Patti Smith and Stevie Nicks are the exception to the rule that rock critics and historians of pop music have a tendency to forget things that they dislike or that do not fit their particular version of rock ?n roll authenticity (Johnson-Grau 2002, p. 203). The sexualisation of women in the media is a hotly debated topic. Countless studies have looked a t the way in which the media portray women, and thus help create gender roles (see Belkaoui 1976; Tuchman 1979; and Carter Steiner 2003). Two main theories stand out. The first is that most women are portrayed in traditional gender roles, that is mother, wife, sister etc.; and the second is that most media focus on a womans aesthetic qualities rather than their ideas and achievements (see Tuchman 1978; Bahr 1980; Macdonald 1995; and Allen, Rush Kaufman 1996). Both of these are substantiated by the data. Rolling Stone presents the sexy, sassy, elegant powerhouse Tina (Jackson for Rolling Stone 2004); the confident, Gospel-singing, passionate Aretha (Rolling Stone 2004 [A]); and the sweet, delicate, naked within a song Dusty (Rolling Stone 2008). All of these depictions fit into what is culturally normal for women. Furthermore, they all suggest an element of sex, or imply the artist embodies a certain image. While its not difficult to argue that sex and fashion are an intrinsic part of the music industry, Phil Dwyer argues that music is actually a part of the fashion industry (Dwyer 2003) . Johnson-Grau puts forward the notion that women in the music industry are almost exclusively compared with other women (2002, p. 210). The data collected doesnt refute this. Furthermore, the data indicates that female musicians are more likely than men to be likened to anyone else, regardless of sex. Over the modified sample of 98 articles, there were 24 comparisons between artists made. On 15 of these occasions, the artist being compared to somebody else was female. Expressions such as: created possibilities for; set the road map for the success of; set the stage for; or influenced everyone from were found to be far more common in the descriptions of women, than they were in the descriptions of men. The notion that women need to be extraordinary, courageous and inspirational in order to succeed in the music business has been thoroughly examined in this discussion. Perhaps one more ingredient is also needed. The above data seems to suggest that the rock ?n roll establishment likes to be able to trace the lineage of female musicianship, by comparing each generation of women in music to the previous one. Frith believes the misogynist culture of rock music forms a symbolic barrier to womens participation in rock ?n roll (1981, p. 228) . The sexualisation of women in the media is a hotly debated topic. Countless studies have looked at the way in which the media portray women, and thus help create gender roles (see Belkaoui 1976; Tuchman 1979; and Carter Steiner 2003). Two main theories stand out. The first is that most women are portrayed in traditional gender roles, that is mother, wife, sister etc.; and the second is that most media focus on a womans aesthetic qualities rather than their ideas and achievements (see Tuchman 1978; Bahr 1980; Macdonald 1995; and Allen, Rush Kaufman 1996).

Saturday, May 16, 2020

Personal Statement On Identity And Personality - 1491 Words

Identity is very significant in one’s life. Every person in this life goes through a phase of self-assessment that involves trying to identify the different elements that compose one’s identity and personality, which can be perceived as an ultimate personal quest to answer the question â€Å"who am I?† Many cultures have rituals that provide the foundation for self-development of the individual and provide a pathway that guides the individual to the answers he or she is looking for. Since my birth, I belong to certain Community or Social Groups which can influence my identity and personality. The first was my nationality and family. I have been born in India and I belong to Hindu Culture and Religion group. I had been given my name â€Å"Harshit† by my aunt which means â€Å"One who gives happiness or Joyful or Happy†. I represent my Identity by showing my group which I belong to and how the group affects my personality. When I came to the United St ates for my further undergraduate studies, I joined classes, sports clubs and university clubs. These activities were part of my college curriculum. Overall, now I belong to multiple Social Groups such as my family, my classes, Hindu culture and religion, universities clubs, community groups and sports club. Within these groups, I have acquired good knowledge and have completely changed my conduct, how to get involved in social life and how to communicate effectively and fluently in English. The First and most significant group in my life is myShow MoreRelatedThe Results Support The Hypothesis That People From Individualistic Cultures857 Words   |  4 Pagestheir personality. They are also less influenced by situational and social factors so they are more consistent in showing their personality traits whereas individuals in collectivistic cultures may tailor themselves to their environment. They would rather blend in with the crowd rather than stand out so they have less of a desire to show their personality traits. The hypothesis that trait consistency would be a better predictor of adjustment for individualistic cultures while personality coherenceRead MoreDifferent Perspectives On Dissociative Identity Disorder1710 Words   |  7 Pageslife, sometimes even leading to Dissociative Identity Disorder. Even though Dissociative Identity Disorder has a place in The Diagnostic and Statistical Manual of Mental Disorders, the legitimacy of the psychiatric disorder is still a very much a controversial issue. In these two articles, â€Å"Multiple Personality -- Is It Mental Disorder, Myth, or Metaphor?† published in the Huffington Post website by Frances(2014) and Dimensions of â€Å"Multiple Personality Disorder† by Murray(1994) published by the ProQuestRead MoreIdentity and the Way Individuals Shape Their Identities for Themselves1341 Words   |  6 PagesIdentity and the Way Individuals Shape Their Identities for Themselves One of the central issues of psychology is identity and the way individuals shape their identities for themselves. People live in different regions all around the globe and are consequently exposed to a distinct type of culture, religion, education, family values and media. These influences instill certain rigid values in people from birth, which configures their self-concept and the way they perceive other individualsRead MorePersonal Identity : The Vehicle Of Consciousness1384 Words   |  6 PagesIntroduction I will be arguing that the essential component of personal identity is the not the vehicle of consciousness, but rather the collection of experiences, personality traits, and ethical beliefs, individual hold. I will show that though the vehicle of consciousness may be a substantial visual and sentimental sense of the self, it is not as necessary experiences and personality traits to the extent of personal identity being present and maintained through space and time. Who am I? IndividualsRead MoreThe Body, Soul, And Brain1426 Words   |  6 PagesWhen it comes to personal identity and survival of the self, it is difficult to say what defines a person throughout time. The three arguments are for the body, soul, and brain. These theories argue that each respective component of a person, must remain the same throughout time in order for a person to be unchanged. The brain theory is more plausible than its counterparts. To prove this, first, I will describe the soul and body theories, which I oppose, and then present an argument based on theRead MoreHow Personal Branding And Maintenance Of One Is Crucial For The Development And Success Of Future Careers1615 Words   |  7 PagesThis study focuses on the various aspects of personal branding and how the development and maintenance of one is crucial for the development and success of future careers. With today’s tough and competitive job market, jobseekers are struggling to stand out from their peers and are used to being passed over and forgotten about by potential employers. Developing a personal brand ensures that individuals are not left behind and that they develop the competitive advantage that positions them for theRead MoreJohn Locke And Personal Identity1224 Words   |  5 PagesJohn Locke states that personal identity is a matter of physiological continuity that is based on the consciousness of a person rather than the individual’s body. Personal identity is constituted by memory connections; specifically the depiction of autobiographical memory connections that result in constituting personal identity. John Locke states that a person’s personality and psychology can be transferred to another body and that individual can still stay the same person because the consciousnessRead MoreSocial Networking Sites Among People1130 Words   |  5 Pagesupload pictures, share thoughts, etc. leads to addiction. The massive growth in use of these sites has generated con cern among some parents, educational officials, and political leaders with the potential risks posed on young people in the time when personal information is made available at such public platform. 3.0 Discussion Addiction towards social networking sites has been noticed at a larger level among individual, major attention is been given to Facebook as it has become most popular amongRead MoreThe Strange Case Of Dr. Jekyll And Mr. Hyde1186 Words   |  5 Pageslives. Wilde disagreed with Stevenson and believed that the second persona can be safe, and not affect anyone else. Brontë used her story to shed light on the secret desires of women by producing characters with dual identities. These dual identity characters consisted of a personality embodying how women want to act, and the other one represented how women were expected to act. In principle, all of these authors agreed on the basic concepts of dualism, however, they all had separate ideas of theirRead MoreBody Image And Self Image818 Words   |  4 Pagesclothing helps in building the self-image. PERSONALITY One’s personality is made up of one’s thought, feelings and behavior. They are influenced by in-born traits, experience and external factors. One’s personality is unique. Apparel is a tool to express one’s personality to others. Some examples of clothing selection under influence of different personalities are as follows: ï‚ § Natural personalities usually prefer relaxed-style clothing ï‚ § Classic personalities usually prefer elegant, well-fitted, tailored

Wednesday, May 6, 2020

African Americans in World War Ii - 997 Words

For many African Americans, the war offered an opportunity to get out of the cycle of crushing rural poverty. Black joined the military in large numbers, escaping a decade of Depression and tenant farming in the South and Midwest. Yet, like the rest of America in the 1940s, the armed forces were segregated. The Army accepted black enlistees but created separate black infantry regiments and assigned white commanders to them. Of the more than 2.5 million African Americans who registered for the draft in WWII, about 900,000 served in the Army. But about only 50,000 African Americans were allowed to serve in combat. African-American soldiers and civilians fought a two-front battle during World War II. There was the enemy overseas, and also†¦show more content†¦For at least one serviceman from Wichita, Kansas, the irony of being asked to die for a country that denied him basic civil rights was too much. James Thompson wrote to the Pittsburg Courier, and asked â€Å"Should I sacrifice to live ‘half American?† The newspaper responded by calling for a â€Å"Double V† campaign. The campaign borrowed on the well-known two-finger â€Å"V for Victory† salute from Winston Churchill. The paper proclaimed that blacks should work for the victory of democracy both at home and abroad. The Double V campaign caught on. Civil rights leaders such as A. Philip Randolph saw the unique situation created by World War II and the acute need for workers as an opportunity to demand equality. In 1941 Randolph threatened President Roosevelt with a 100,000-person march on Washington, D.C., to protest job discrimination. In response, Roosevelt issued Executive Order 8802, prohibiting discrimination in defense jobs or the government. On the home front, the U.S. government desperately needed workers to fill newly created defense jobs and factory positions left open by soldiers who had left to fight. More than two million African Americans went to work for defense plants, and another two million joined the federal civil service. As these new opportunities drew more and more African Americans into cities, they opened the way for economic mobility. As the war dragged on, it affected American society at nearly every level. It shook upShow MoreRelatedAfrican Americans During World War II921 Words   |  4 Pages442nd Infantry Throughout American history many minority groups have experienced discrimination. One of these groups was the Japanese-Americans, especially during World War II. In this essay, I will be focusing on a segregated Japanese-American combat unit known as the 442nd Infantry to highlight the discrimination suffered by Japanese-American soldiers. After the Japanese bombed Pearl Harbor in 1941, The United States declared war against Japan and joined the Second World War. In 1942 President RooseveltRead MoreThe Influence Of African Americans Into World War II712 Words   |  3 Pagesthe entrance of America into World War 2 display different emotions and all these to different degrees. Even so, the presence of urgency, anger and fear are abundantly common clear in the words of Americans after entering this war. Not to any less degree of importance was the common expression of respect for president Roosevelt among the interviewed Americans. One of the most expressed feelings of the interviewees was urgency. For some it was a determination for the war to be over with even thoughRead MoreEssay on African Americans During the Post World War II Era1824 Words   |  8 Pagespost World War II era, many African Americans had began to become a more urbanized center of population, around 1970. (Inmotionaame, pg. 1) The regular population included about 70 percent of just the natural population to live in more urbanized cities. (Inmotionaame, pg. 1) Soon African Americans dominated, having 80 percent of their community to live and take the same benefits in more urbanized centers of the Unites States. (Inmotionaame, pg. 2) Only about 53 percent of African Americans and othersRead MoreThe Fight For Freedom For Equality947 Words   |  4 Pages2015 American History The Fight For Freedom, The Fight For Equality Throughout American History African Americans have been the victims of racial oppression and exploitation. Despite the racial inequality and unjust treatment cursed upon them, African Americans still stood up for their country in times of need. World War II in particular helped pave the way for African Americans to finally begin being recognized as people of equal value, of equal social status and establish post war integrationRead MoreWas World War II A Good War? Essay1517 Words   |  7 PagesWar is often a time of bloody battles and numerous casualties; on both sides of the playing field. World War II was one of the bloodiest wars in history; it not only involved the mass genocide of a specific group of people, but it also brought on major changes in America. As a result of the war, many opportunities would open up for women in the work force. When the men were off fighting the war, there was a need for employees to take over the jobs that the men had to do. The emergence of wome n inRead MoreFighting A War At Home And Abroad1643 Words   |  7 Pages FIGHTING A WAR AT HOME AND ABROAD OSCAR AGUILAR CYPRESS COLLEGE PROFESSOR JOSE M. ZAMORA May 12, 2015 Introduction World War II was a pivotal moment in U.S history for men and women of all colors. Years of hatred and violence were now going to be over looked by racial groups in order to fight against an overseas enemy. Racial groups contributed to the war effort despite having their civil rights violated, oppressed and even removed. Segregation during this period of war was very muchRead MoreTeam America: World Police1682 Words   |  7 PagesIn the aftermath of World War II, every nation of the world emerged mentally and, in some cases, physically altered. The physical affects of the Second World War spanning from Pearl Harbor to the battleground that made up most of Western Europe to Nagasaki and Hiroshima are visual pictures engrained in the minds of all, past and present, but the American ideology that these destructive images helped to give rise to would directly shape American domestic and foreign policy for approximately the nextRead MoreThe Civil Rights Movement During World War II955 Words   |  4 PagesDuring World War II, America as a nation faced many challenges both at home and abroad. Some of these challenges at home included Strikes and protests in war production factories, which was due to increasing differences between the government and employers, with the workers/labor unions. Another was the Civil rights movement for African-Americans, which advocated for equal rights for all Americans, when African Americans joined the war efforts by both joining the military and working in the war factoriesRead MoreThe Impact of World War II on the United States674 Words   |  3 Pages World War II had an extensive impact of the United States. In spite of all the battles being fought off America mainland, the war affected all aspects of American life back home. World War II may be known as the worst war in history, but a lot of good came out of it. If it was not for World War II many economic changes, social changes, and political changes may have never happen ed. Prior to WWII the economy was in bad shape. The U.S. was in a depression. Unemployment was at twenty five percentRead MoreLife On The Home Front During World War II1717 Words   |  7 PagesMahmudul Rapi 841 Life on the Home Front During World War II During the 1930s. the United States faced one of the greatest economic depressions in history, known as the Great Depression. Since many people essentially manipulated the stock market to their advantage, they eventually got richer. However, on October 29,1929, the stock market crashed since so many people wanted to sell their stocks but so few people wanted to buy these products, which caused prices to collapse. This led up to issues

Tuesday, May 5, 2020

Designing Operational Technology with Security

Question: Discuss about the Designing Operational Technology with Security. Answer: Introduction: The virtue should be given on keeping the higher focus in accordance with the security issues in IT sector environment. There is hundreds of hacker available who keep the eye on the confidential information to hack by making use of number of hacking tools (Lujan, 2011). It is necessity to think wider for securing the data and information from hacking and being misused by unauthorized persons. If the new virus arises in the environment and the internet generate the signal of contamination then necessary action should be taken in a direction of overcoming the virus attack. This can be done by the application of specific patch; specific port should be added to the firewall, and the addition of unique signature to the IDS devices. The violation of the information can be overcome by following three fundamental rules which are categorised as confidentiality, integrity, and availability of the data (Resnik, 2015). The higher focus should be given on developing the tactics correspondent to the arrival of viruses in daily working environment information technology. When we focus on security concern of information technology sector then we will be able to overcome the two common problems which are discussed below: It is hard to be aware unique security measures correspondent to every vulnerability which comes into existence. When we think about the vulnerabilities security issues we are only be able to overcome of the issues but not make ourselves proactively ready for the occurrence of vulnerability in any manner. In the present time of technological changes it has been observed that security is the peak step to be taken. The IT security focuses on protecting the nature and sensitivity associated with securing the data and information. From the survey and the research it has been seen that zoning is the key process which can be used for making security decision. This process involves defining of the subjects and objects which requires security. Each area should be highly focused separately to determine the risk and vulnerabilities attached with the component and the required a action can be taken. In the environment of technological changing environment, the requirement arises to pick the appropriate data from the pool of information, timely access, and analysis of independent open source intelligence are the necessary security awareness situation to fight against the emerging threats of security. The question which comes forward is that how we can make ourselves proactively ready for the occurrence of the vulnerability (Bresler, 2010). What action we can take against the arrival of the uncertain vulnerabilities. From the research of these questions we come across various practises and tools which help us to compete with the arising vulnerability. Thinking in zones, security in layering, creation of chokepoints, fundamentals of relational security, fundamentals of secret less security, practice of dividing responsibility, and lastly the failing of security are some of the best practices which can be applied to remain proactive and overcome the situation of occurrence of the vulnerability. It has been observed that the business operations and risk manager treated IT security as an art because they think that data should have to be collected to take the corrective action in taking the right judgement on the occurrence of the risk. The meaning of the term science to the expert is quantitative measure of the risk and capability of decision making (Miller, 2012). The IT security is the fundamental phenomenon which deals with management of risk associated with the project. From the survey and the research it has been concluded that 58% of the high professional treated IT security as a form of Science, 48% of the high professional treated IT security as a form of both Science and art and 57% of the high professional (Buhalis, 2012) treated IT security as a form of Art. The diversification has been seen in the opinion in relation with this question that IT security is an art or science. The result of the survey is analysed by dividing the opinion of the professionals in five different modules which are categorised as security management based on risk maturity and governance plans, metrics used for measuring the value of security of risk, development of key metrics for the evaluation of risk based security, controls provided on risk based security, and Communication, collaboration and development of culture in association with risk based security. In the survey it has been observed that the term art is means to the high professional is analysis of the ris k and capability of decision making in overcoming the risk. It has been observed that the business operations and risk manager treated IT security as an art because they think that data should have to be collected to take the corrective action in taking the right judgement on the occurrence of the risk. The meaning of the term science to the expert is quantitative measure of the risk and capability of decision making (Miller, 2012). The IT security is the fundamental phenomenon which deals with management of risk associated with the project. The measures used for IT security helps in reduction of risk, reduction in cost, and others. The human behaviour plays a major role in the management of IT security because every individual have different alternative to tackle the situation of risk occurred within the project. The good IT security is the degree of tackling with the situation. The concern with establishing IT security within the organization focuses on correct judgement on the al ternatives proposed, no impact of change in human behaviour, evaluation of the decision, and security of the data associated with the project. Risks are the major part of the project to handle for the success of the project. The IT security focuses on protecting the nature and sensitivity associated with securing the data and information. The potential harm to the data and information may result in the failure of the project in the near future. The myths and rumours have been seen that security of data and other credential of IT sector is the technology. In preparing the company to mitigate the risk the development of policy is quite necessary because the process of managing the risk is accompanied with number of choices and trade-offs. The process of mitigating the risk involves the participation of people because people play a major role and component of risk management equation (Robert, 2010). The major components which come forward in managing the risk are the human behaviour to control. From the above discussion it can be observed that IT security is an art of managing itself against the risk associated with the project. Fear and security of information are the interrelated terms which are treated together (Hadson, 2008). The positive effect of fear factors helps the manager to look forth to overcome the security issues raised in the initial stage of the project completion. The fear factors associated with the security of information are unauthorized accessing of the information, disclosure and disruption of the information, modification of the information, and others. The specialist of IT security focuses on making their project secure from the malicious attacks and others. It has been observed that the area of information security is growing at the faster rate. Regulation and certification are provided to the IT security. From the survey and research it has been concluded that the IT security issues are given importance in relation with increment seen in securing the data and information, professionals are hired for securing the information of technology from uncertain and unknown risk occurred inside the organization which may play the role of hindrance in the success of the project. It is a key to step to overcome the risk in the initial stage of the project so that the project is completed successfully. There are several factors responsible for the implementation of tactics used for the securing the information and data in relation with IT sector which are described below: Vital role to test the features of the product The product should meet the requirement of the organization which are clearly mentioned in the scope of work Personnel attrition should be focused The importance should be given on the changing nature of the human behaviour The problem of rework arises due to the poor implementation of inefficient security program. The cost may be raised There may be the lack of integration of the new product with the existing environment Failure of the product when it does not matches with the requirement, delivery on time, quality standards Logical conclusion should be drawn to overcome the proposed fear and risk associated with the project (Brown, 2013). The violation of the information can be overcome by following three fundamental rules which are categorised as confidentiality, integrity, and availability of the data. Conclusion: The factors which are commonly associated with the security of information are the attack of viruses, worms, phishing, and Trojan. Identity theft is the other major concern of IT security. It is a key to step to overcome the risk in the initial stage of the project so that the project is completed successfully. Fear and security of information are the interrelated terms which are treated together. In the present time of technological changes it has been observed that security is the peak step to be taken Brown, 2013). The decision to overcome the fear associated with the information security should be taken by using the knowledge and experience. The fear factor can be combatted by making use of security mind. References: Lujan, G. (2011).A psychological perspective on vulnerability in the fear of cyber crime(1st ed.). Retrieved from https://eprints.lse.ac.uk/21534/1/A_psychological_perspective_on_vulnerability_in_the_fear_of_crime_(LSERO_version).pdf Resnik, D. (2015).States need to plan with security in mind on every IT project.(1st ed.). Retrieved from https://www.statetechmagazine.com/article/2016/03/states-need-plan-security-mind-every-it-project Bresler, L. (2010). Designing operational Technology with security in mind(1st ed.). Retrieved from https://www.cyberark.com/designing-operational-technology-security-mind/ Buhalis, A. (2012). A computer security is not a science(1st ed.). Retrieved from https://www.cis.upenn.edu/~stevez/papers/GGKS03.pdf Miller, N. (2012).The art and science of security research(1st ed.). Retrieved from https://www.defcon.org/images/defcon-19/dc-19-presentations/Conti/DEFCON-19-Conti-Security-Research.pdf Robert, P. (2010).Information security Art or science?(1st ed.). Retrieved from https://prezi.com/byr_dqsuidef/information-security-art-or-science/ Hadson, I. (2008).Fear factor perception of safety in south africa(1st ed.). Retrieved from https://www.google.co.in/url?sa=trct=jq=it%20security%20fear%20factor%20research%20paper%20pdfsource=webcd=1cad=rjauact=8ved=0ahUKEwjf7o_ypNXQAhXBN48KHTNoBlMQFggaMAAurl=https://www.hsrcpress.ac.za/downloadpdf.php Martin, T. (2014).Computing security issues and research challenges(1st ed.). Retrieved from https://www.ijcsits.org/papers/Vol1no22011/13vol1no2.pdf Brown, G. (2013).A overview and study of security issues and challenges(1st ed.). Retrieved from https://www.ijarcsse.com/docs/papers/9_September2012/Volume_2_issue_9/V2I900174.pdf