Sunday, December 29, 2019

Eugenics In The 1920s Essay - 1388 Words

The 1920s were an interesting decade to say the least. The end of the first world war in 1918 spurted social change all over the world, and the United States was not immune to these changes. During the World War the American people suffered an immense amount of emotional turmoil. The end of the war, coupled with the favorable outcome for the United States, shifted the American peoples energies. Especially those of the younger generations, from those of feeling uncertainty and fear to a joyous carpe diem mentality. This led to the emergence of the roaring 20s. The rise of the flapper, a consumer society, and jazz music all epitomized this decade. However, not everyone was on board with these social changes. Typically, the older generations†¦show more content†¦One of the most radical changes of women’s attitudes in the 1920s was the fact that they treated sex in a more casual manner. With this casual sex mentality that women embraced also came the possibility of higher rates of venereal disease. The film â€Å"Are You Fit to Marry?† addresses this issue. Featuring Dr. Harry Haiselden, one of the most notorious advocates for radical Eugenics in the 1900s, the film revolves mostly around three couples and the possibilities that they are not eugenically fit to marry. One of the couples, Claud and Anne, marry despite the fact that Claud has tainted blood. This taint stems from an indiscretion Claud’s grandfather had with a â€Å"working class woman† in which he contracted a â€Å"venereal disease† (Pernick 1996, 146). This disease is passed down the generations, and when it comes time for Claud and Anne to have a baby, the baby is born a â€Å"defective† (Pernick 145). Anne is now forced to make the decision of asking Dr. Dickey (Haiselden) to save the baby or let the baby die. The film then shows Anne â€Å"the revelation of the future† (Haiselden and Lait 1927). She sees her son through all his stages of li fe, boyhood, young adulthood, and adulthood. In boyhood, other kids his age poke fun of him for being different. During young adulthood he becomes a derelict, even attempting to shoot the doctor that saved his life. The vision ends with the man inShow MoreRelatedArticle Abstracts: Concept of Nazism1283 Words   |  5 Pagesunderstood than thought by many people, especially members of the general public that have not examined the issue. Hayek, F. (1944). The Socialist Roots of Naziism. in The Road to Serfdom. Chicago: University of Chicago Press, pp. 183-98. In this essay and historical examination, the author attempts to provide an explanation for how Nazism came to flourish not as simply a right wing and fascist element, but through the combination of what are traditionally though of as left-wing and right-wingRead MoreEugenics, The Progressive Development Of The Idea1622 Words   |  7 PagesThe term â€Å"eugenics† derived from Greek with the prefix eu- for â€Å"good† and the suffix -genos for â€Å"birth† is defined as the science which deals with all influences that improve the inborn qualities of a race. The idea began to arise in the eighteenth century with the theories of evolution and the discussions of race, which gave an opportunity for some to consider and judge that certain traits and features were better and more appealing than others. In this analysis, we will be focusing on the beginningRead MoreThe Social Darwinism Of The World War I1311 Words   |  6 Pagesstate-enforced Social Darwinism of eugenics. Despite the widespread Christian attack on Darwinian tenets, Christians did not fight the eugenics movement in an effective way. Eventually, even legislatures controlled by Christians fell to the false promises of eugenics. Despite poignant criticism of eugenics among scientists in the United States, more than 30,000 individuals were forcibly sterilized. In an ironic twist of fate, the Nazis Party s adoption of American Eugenics programs le d to the virtualRead MoreEugenics Within The United States2293 Words   |  10 PagesEugenics within South America Social injustice or inequality would have thought to have been a thing of the past. Yet, there are some countries who still practice this in a form called eugenics. Eugenics is â€Å"the science of improving a human population by controlled breeding† in order to achieve the social hierarchy said country desires (The Definition of Eugenics). As extreme and of the past as this sounds, this action is happening all over the world and even right under the United States nose. SouthRead MoreThe Present-Day Discussion Surrounding Abortion Has Been1696 Words   |  7 Pagesthere are other less obvious factors at work; creating a role for women’s bodies and dictating the ways in which they can and cannot use them. The role of biopolitics is one is that is often overlooked, especially within the American context. In this essay, I will be examining the different ways that discourse about abortion shaped itself in both the United States and Turkey from the beginning of the twentie th century to the present day, as well as how the discussions shifted over time. Observation ofRead MoreThe Eugenics Movement And The United States1810 Words   |  8 PagesThe eugenics movement in the United States beginning in the late 19th century and extending to the mid 20th century was a biosocial movement, which advocated procedures to improve the genetic composition of the American population. This essay will examine how eugenic ideologies influenced public and social policy in the United States between 1880 and 1950. The essay will first discuss the background of eugenics and how the eugenics movement gained momentum in the United States. Secondly, it willRead MoreThe Journalist, Poet And Author G. K.1781 Words   |  8 Pages Lewis, who discussed Chesterton’s influences on his life and work in his autobiography, Surprised by Joy (Lewis, 1955). His perspectives on English identity, as well as the nature of nationality and social belonging, disseminated through var ious essays and articles in London newspapers (including his own publication, G. K.’s Weekly), were both based on a firm belief in the importance of Christian traditions in society, in addition to vehement opposition against Puritan ideas, arguably in responseRead More Nature vs Nurture Essay804 Words   |  4 Pageson and he disregards the individual as a mere holding unit- the vehicles. I do not however agree on the totalitarian effect of genes on an individual. I believe that nature and nurture interacts to bring about the complete individual. In this essay, I shall use the impact of nature vs nurture on IQ of people to illustrate my viewpoint. This is because the inherent interest of researchers as people on the factors that influence IQ has allowed a wealth of references to be discussed as below. Read MoreThe Most Important Factor that Contributes to Evil Doing Essay4266 Words   |  18 Pages Using the arguments of both Arendt and Orwell I will focus on how the state perpetuated the commission of evil in the imperialist structures. Next I will examine Foucault’s arguments about biopolitics and show how the role of the state in the Eugenics and biopolitics movements of the early 20th century was essential to the commission of evil. Finally I will focus on the Abu Ghraib prison abuses and how the state not only encouraged, but also legalized the torture of prisoners using the writingsRead MoreHelen Keller: An Idol to Deaf People?2987 Words   |  12 Pagesconsider her to be an inspiration to the deaf and blind due to her success in life. While this information may be factual, why is the rest of her life left out? Why is her political views disregarded? Where is the information showing her support of eugenics? Is Helen really the advocate that we originally thought she was? Was Helen an advocate that believed all disabled people should receive equality? Or were her views on advocacy different? There are many questions as to why our society focus on Helen

Saturday, December 21, 2019

Eating Disorders Eating Disorder - 966 Words

Eating Disorders Many people, both women and men of all ages, suffer from the psychological disorder, eating. Up to thirty million people in the world suffer from some kind of an eating disorder. There a two types of eating disorders, anorexia and bulimia, and have several methods of treatment. What is an eating disorder, and what do they cause? Eating disorders are maladaptive and very serious interruptions in eating. They can come in the form of overeating, or not eating enough, they are often accompanied by severe misconceptions about body weight and body image. Eating disorders typically begin when the patient is a young adolescent, but can occur before then or many years after, they may be gentic, or occur on their own. Whatever age and reasons these behaviors start, it is still critical, and the patient needs to seek help immediately. The first type of eating disorder, anorexia nervosa, otherwise known as anorexia, is life-threatening weight loss. There are four main key points when observi ng the patterns of an anorexic person. The first being that the patient will not keep a normal body weight, they urge to get that number to a painstakingly low digit, and won’t bring it back up. That brings us to our second key sign. During this stage, the patient will not gain any weight in fear of seeing larger, mainly three digit numbers is severe cases, or becoming fat. Third, the patient, most often female, has the wrong image of her body. When looking in the mirror,Show MoreRelatedEating Disorders : Eating Disorder1205 Words   |  5 PagesEating Disorders in Today’s World Eating disorders are alive and well in today’s world and they are a major problem. An eating disorder can look like a few different things, ranging from a severe reduction of food intake to over eating to feelings of negativity towards your body shape or weight (Lehigh University). While some disorders can only be found in specific age groups, races, etc., eating disorders can be found amongst all and it does not necessarily have to be pointed towards food (LehighRead MoreEating Disorders : An Eating Disorder1184 Words   |  5 Pagesas an eating disorder. Weir (2016) goes on to explain the origins behind eating disorders in individuals. This topic is important because, in the United States, many women and men suffer from a clinically significant eating disorder at some point in their life. It is important to know the influences that cause an individual to experience an eating disorder. Genetically, or environmentally, or both genetically and environmentally. Anorexia ner vosa, bulimia nervosa, and binge eating disorder are eatingRead MoreEating Disorders And Eating Disorder1573 Words   |  7 Pagesaffects people called an â€Å"eating disorder.† Why did you choose this topic? I chose this topic because it is a very prevalent issue in our society today, and a close friend of mine is suffering from an eating disorder. What question(s) did you want to answer or what was your hypothesis regarding this topic? As mammals, there is no chance of escaping the need to consume food in everyday life. However, when it comes to food there can be a major concern of eating too much or eating too little. Doing eitherRead MoreEating Disorders And Eating Disorder1104 Words   |  5 PagesEating disorder is a serious problem happens in both men and women. Eating disorder is a sort of disease in which a person is having a strange routine of eating like consuming a huge amount of food each time they eat. This can incorporate not eating enough nourishment or indulging. Eating disorder influence many people around the world. The larger part of peoples who are dealing with this issue are ladies. A person with eating disorder issue may focus nonsensically on their weight and shape. EatingRead MoreEating Disorders : An Eating Disorder1906 Words   |  8 Pagesobtain their body goal, thus causing an eating disorder. An eating disorder is a psychological condition that is characterized by abnormal or disturbe d eating habits. There are three types of eating disorders; which are Anorexia Nervosa, Bulimia Nervosa, and Binge Eating.These disorders affect all aspects of a person’s life, including their psychological, emotional, and physical health. There are many factors that contribute to individuals developing eating disorders including: genetics, family pressuresRead MoreEating Disorders And Eating Disorder1410 Words   |  6 Pagesâ€Å"An eating disorder is about anxiety and control and healing from trauma and food and weight are just the tools of destruction† (Floyd, Mimms, Yelding, 2008). An eating disorder is defined as a severe disturbance in eating behavior. An eating disorder, as defined by our text book for class, is psychological disturbances that lead to certain physiological changes and serious health complications. The three most common and most easily identifiable forms of eating disorders include anorexia nervosaRead MoreEating Disorders : Eating Disorder 2461 Words   |  10 PagesEating Disorders Even though eating disorders are less prevalent in society today than they have been in the past, they are still one of the most diagnosed mental illnesses today. These three illnesses have short term as well as long term effects that can leave a damaging toll on the patients’ lives and are very hard to overcome. This is shown through not only the characteristics of Anorexia nervosa, Bulimia Nervosa, Binge-eating Disease, but also through the psychological and physical harm theseRead MoreEating Disorders And Eating Disorder1496 Words   |  6 PagesAn eating disorder is an illness that causes serious disturbances to your everyday diet, such as eating extremely small amounts of food or severely overeating. A person with an eating disorder may have started out just eating smaller or larger amount of food, but as some point, the urge to eat less or more has gotten out of control. Severe distress or concern about body weight or shape may also signal an eating disorder. Common eat ing disorders include anorexia nervosa, bulimia nervosa, and a binge-eatingRead MoreEating Disorders : Eating Disorder1031 Words   |  5 Pagesâ€Å"The eating disorder is a very jealous and abusive partner. It requires a lot of devotion in the extent that you have to devote yourself to tending to the anorexia. There s not a lot of time left over for adult life,† was stated by Dr. Doug Bunnell, a specialist in eating disorders. Eating disorders effect a variety of people. Age, race, and gender aren’t role playing keys in eating disorders. Not everyone gets an eating disorder, but if they do then, it will more than likely destroy their livesRead MoreEating Disorders : An Eating Disorder Essay771 Words   |  4 Pagesabout you. Benji I suspect you have an eating disorder.in particular, anorexia. An eating disorder is a psychological disorder that interferes with peoples eating habits. Eating disorders falls under the avoidant/restrictive food intake disorder category. Eating disorders are more prevalent in women than in men. Over 10 million women and 10 million men suffer from an eating disorder. But, Anorexia Nervosa is more common among Caucasians. Eating disorders impacts women everyday by inaccurately depicting

Thursday, December 12, 2019

Project Execution and Control

Question: Discuss about the Project Execution and Control. Answer: Feedback of posts by Student 1 The forum of the student had started with a systematic and concise definition of the project management. The definition is a brief summation of the various facilities and features of project management for the operations in the organization. The first paragraph had even mentioned the theory of Iron Triangle (or Triple constraints) (Ebbesen Hope, 2013). It defines that the internal and external factors have a deterministic role for the management of various resources. The second paragraph had explained the phases of project life cycle in brief taking reference from PMBOK guide which is a very useful book for the project management. The student had classified the project stages in objectives (functional and partial), deliverables (immediate or time being), milestone of the project, overall scope of the work, and the availability from commercial point (Snyder, 2014). The uses of some example points have been helpful for making the statements more understandable and clear to the reader. As per mentioned by Schrameyer et al. (2016), the examples used by the student for the tools that can be useful for implementing change management in project management are Trello and Office 365. The references used by the student are all valid and they have been taken from valid resources and journals. Some of the references used by the student have been taken from project management journals and articles. The use of proper statement structure and simple words has provided the ease of understanding the posts. The referencing style is APA and it is used at many universities from all over the world. Feedback of posts by Student 2 The student has not opted for usual definition of the project and the project management. However, he had analyzed and evaluated the project and it functions from a sourced journal by Zhang (Zhang Fan, 2014). The student have highlighted the importance of the project management operations by pointing the various functions of change followed by project managers such as budget modifications, materialistic changes, and scope modifications. It has been highlighted in the first paragraph that the there are some aspects and scope that are basically hard to be predicted and hence the change management is required. The configuration change management had been suggested by the student for employing the changes of the project operations (Teller, Kock Gemnden, 2014). The use of careful review of the documents has been passed for the problem of change management and the way to deal with the impact of the change management. The student had shared his/her experience for the tools required for the management of project. The student had used Excel for managing a project when he/she was 18 years old. The references used by the student are all valid and they have been taken from valid resources and journals. The last paragraph had been personified for making people more understandable of the concept of change management in project operations (Cameron Green, 2015). The use of proper statement structure and simple words has provided the ease of understanding the posts. The referencing style is APA and it is used at many universities from all over the world. References Cameron, E., Green, M. (2015).Making sense of change management: a complete guide to the models, tools and techniques of organizational change. Kogan Page Publishers. Ebbesen, J. B., Hope, A. (2013). Re-imagining the iron triangle: embedding sustainability into project constraints.PM World Journal,2(III). Schrameyer, A. R., Graves, T. M., Hua, D. M., Brandt, N. C. (2016). Online Student Collaboration and FERPA Considerations.TechTrends,60(6), 540-548. Snyder, C.S., 2014. A Guide to the Project Management Body of Knowledge: PMBOK () Guide. Project Management Institute. Teller, J., Kock, A., Gemnden, H. G. (2014). Risk management in project portfolios is more than managing project risks: A contingency perspective on risk management.Project Management Journal,45(4), 67-80. Zhang, Y., Fan, Z. P. (2014). An optimization method for selecting project risk response strategies.International Journal of Project Management,32(3), 412-422. Project Execution and Control Question: Discuss about the Project Execution and Control. Answer: Risks when Teams are Culturally or Geographically Diverse Culturally and geographically diverse teams can provide several risks in an organization. Some argue that business is the right place for people to learn about diversity. According to Barak (2016), diversity in a workplace can hamper performance and can facilitate open hostility as in culturally diverse teams strong contradictory opinions exist. On the other hand, in the case of geographically diverse teams, problems occur in terms of working styles. People with different background possess different style of working that can hampers overall productivity of a team. Strategies toMitigate Such Risk The four-T model that includes four elements can be used to mitigate any risks related to culturally and geographically diverse workplace. Those four Ts are training, transparency, time and togetherness (Kirton Greene, 2015). Employees must be trained so that they can understand the concept of diversity. Employees must be given ample amount of time to get used to diversity. They also need exposure to understand each other appropriately. On the other hand, communication and information distribution must be transparent while dealing with diversity related issues (Bond Haynes, 2014). Last but not the least, togetherness is also important that will imply the feeling that all workers are working in the same company and will share same goals and objectives. Quality Assurance and Control Quality assurance means maintaining desired level of quality in a service. In a diverse workplace, if it is assured that quality will be provided to each of the employees without considering their religion, sex, background or ethnicity then any confusion related to diversity will be minimized (Jonsen et al., 2013). Employees will think that there will not be any biasness in the workplace based on diversity. It will encourage them to adapt to the diverse workplace. Quality control is known as a method that makes sure that performed examine adheres to a distinct set of quality criteria (Kundu Mor 2017). If the employees of a diverse workplace are ensured that the management has implemented quality control in the workplace where everything would be transparent then issues will be minimized automatically. On the other hand, quality control methods will also make sure that issues are handled properly using appropriate strategies. References Barak, M. E. M. (2016).Managing diversity: Toward a globally inclusive workplace. Sage Publications. Bond, M. A., Haynes, M. C. (2014). Workplace diversity: A socialecological framework and policy implications.Social Issues and Policy Review,8(1), 167-201. Jonsen, K., Tatli, A., zbilgin, M. F., Bell, M. P. (2013). The tragedy of the uncommons: Reframing workforce diversity.Human Relations,66(2), 271-294. Kirton, G., Greene, A. M. (2015).The dynamics of managing diversity: A critical approach. Routledge. Kundu, S. C., Mor, A. (2017). Workforce diversity and organizational performance: a study of IT industry in India.Employee Relations: The International Journal,39(2).

Thursday, December 5, 2019

Computer Security Breach Took Place At Experian or T-Mobile

Question: Discuss about the Computer Security Breach Took Place During September-December 2015- At Experian or T-Mobile. Answer: Introduction Digitalization and technological advancement has occurred at such a pace that it has become difficult for the companies to fight against the ever increasing hacks, simply because with each advancement, the kind as well as the number of hackers has also increased. One of the most stunning and shocking security breach that occurred in October 2015 was when Experian, announced that a business unit of it has been attacked. The contravention is said to have happened on a server which stores personal information of about 15 million customers and applicants of USA on behalf of one of its clientele T-mobile. The hack has happened of both new applicants as well as those applicants whose credit check was yet to be done for the services or financing of the device for the three year period of 2013 to 2015 (Cheng,2015). On investigation it has been concluded that data such as names, addresses, phone numbers, date of birth and some of the encrypted fields such as the Social Security number and the ID numbers which were mentioned in the passports and the driving licenses of the applicants were hacked by the attackers. Assessment Of The Issue On analyzing the said hack, it is understood that the main focus of these hackers were to attack a particular server of Experian that had stored the crucial and confidential information of T-mobile customers and the server which was used to safeguard the information of those customers whose credit corroboration for the two year period September 2013 to September 2015 was to be conducted. The time of occurrence of the said hack was very small and the occurrence of the malafide attack happened within closed doors. Here the hackers focused their entire vision only on attacking the T-mobile data stored server and nothing else (Chabrow,2015). Sources have revealed that Experians Decision Analysis credit information support portal allows entry without any pass-codes to every individual, who are authorized to upload haphazard file attachments of various types without any restrictions and also authentication with regards the creditability of the file being uploaded. It is this accessibility which had given the attackers a prospect to instill malafide and spiteful attachments within the main server. These infused files and attachments caused T-mobile suffer the attack of leakage of confidential data of its consumers (Pagilery,2015). The CEO of T-Mobile took a very wise decision of protecting the customers whose data had been compromised and post the same deal with the security glitches that were present within the Experians network. It has compromised upon the goodwill of both T-mobile as well as Experian. However, T-Mobile has made all efforts to put the blame on Experian alone on whom they had believed and the fact the mobile company is very stringent with regards privacy policies (Larson,2015). But it was very important for T-mobile to counter check the past reputation and experience of Experian in the said task of storing confidential data securely. Solutions To Prevent Such Hacks However there lie various solutions which would help to protect the occurrence of such attacks in future. Some of it are that the entities whose job is to store such private information of other companies should have an upgraded system installed with adequate firewalls so that such a kind of hack can be detected well on time and necessary action be taken before much loss as it is a loss of three entities, the one who is storing the data, the one who is giving its data to be stored as well as the customers whose data have been compromised (Thielman, 2015). Experian should revisit its present practice of safeguarding data and instill stringent and stricter encryption technologies, double validation while entering any data base by the clienteles as we as the staff members, server virtualization should be buoyant and opportune scrutinizing of the system so that such infringements can be prohibited in the upcoming years (Allan, 2015). However, Experian has disclosed that the banking related data has not been leaked and that they are all safe. The company is also sending a written intimation to all the customers who are probably been infected by the attack thus extending them a no cost credit examining service for twenty four months. Warning bells have already been rang into the ears of the consumers so that if they notice any such unusual emails and similar interactions from sources which are not known to them, then the same should be ignored (Finkle,2015). Home Depot 2014- Data Security Breach 2014 is construed to be a year with many severe cyber attacks and security breaches of which some are JP Morgan Chase and Home Depot. The case study being discussed here is that of Home Depot which if not the biggest but is concluded to be one of the biggest breaches. On 8th September 2014, Home Depot declared that its payments card system had been hacked. However the investigation had started on the 2nd September and the company was still trying to analyze the level of impact and the depth of the contravention. As much as 56 million credit card details were stolen that covered a six month period from April to September 2014 (krebsonsecurity.com. 2014). This retail breach has outgrown the Targets breach of 40 million card violation. However as per the company officials, it was a very unusual kind of malware which was infected within the companys system. Assessment Of The Main Issue The main issue that was understood on the said case being investigated was the installation of such a malware which was uncommon and newer to all. After Target hack, companies had undertaken measures to safeguard their data but this malware was something different. Here the main issue was that the attacker utilized a vendors user name and password to enter the system of the network and injected a customized malware to get hold of the credit card details of the various shoppers. Thus here the main issue was the leakage of the vendors security information which led to the attack (Pagliery, 2014). The company failed to learn a lesson from the data breach of Target which had occurred in the near past and continued to use the old methodology of magstripes. Thus it can be said that the main problem here was that the usual way of installing the malware into the self check out registers were not adopted instead the same was specifically formulated in such a manner which would first and formo st elude the already installed firewall. Therefore the said attack cannot be compared to the previous retail attacks as the company had taken precautions to protect itself after the Target breach but was unaware of the fact that the hackers could think of such a different way out to hack as well. Who Were Affected And How The hack had led to stealing of 56 million customers credit card data thus impacting the banking credentials. The attackers, hacked the data of those transactions that took place between April to September 2014. The main attack has been done to the U.S. and the Canada stores of Home Depot. It was understood that the stealers were taking away the card data from the cash registers of Home Depot till 7th September,2014. The company was also equally hit by the said breach as it had hit their reputation and also led to a huge financial loss. The violation led to disruption of the normal business operations and the cost involved would be somewhere around $560 million. Home Depot had lost many of its consumers to the competitors. However, due to the duopoly kind of a market structure in which Home Depot operates, it is estimated that the company would not loose out on much revenue. One of the reasons behind the same is that the company will continue to gain in the benefits of an upbeat US e conomy and housing market. The impact that it has had is due to the lawsuits being filed by customers on them along with the claims being made by the customers for returning their lost money. Home Depot is expected to spend an amount of $3 billion due to the said fraud (forbes.com. 2015). Apart from the impact the said attack as had on the company, it has also impacted those customers whose data has been compromised. They are now scared as to the level of breach and how their credit and debit cards details would be misutilized. They would be unaware of the misutilization until and unless occurrence of the instances. Unfortunately, even if the customers were also affected yet the have no other choice but to visit the Home depot outlets only for buying home improvement goods. However, the only issue is that they have become too wary with regards the usage of cards therefore it has posed a big problem in case of huge purchases (Stempel, 2016). Another major way in which the said hack has impacted the customers is that hackers have got the accessibility to alter the PIN numbers and thus make withdrawals. They have been also selling these stolen data and the personal information of these card holders to the criminal websites internationally. How Was The Attack Carried Out The hack was carried out in a very different manner wherein the attackers had not the usual method of attacking. It is construed that they had used the point of sale (POS) malware to get inside the card terminal of Home Depot. The malware named FrameworkPOS is said to be somewhat similar to BlackPOS. The said malware targets the POS terminals with the help of a Windows operating system. US is found to be more prone to such credit card hacks simply because it is dependent upon such payment terminals that scan the magnetic stripe on the back of the card which gives a way to copy the data to the malware that gets injected within the system. Thus in this case the malware was specifically designed for attacking the Home Depot terminals due to which it could not be found by the age old anti-viruses installed (Smith, 2014). How The Attack Would Have Been Prevented The company had installed Symantec Endpoint Protection which is an anti-virus but had not activated the Network Threat Protection system. Had the same been activated then it would have been able to prevent various intrusions into the systems. Further had the company installed Point to Point encryption technology then it would have encrypted the data during the swipe as well as in the memory. Also very surprising was the kind of operating system being used by Home Depot. Windows XP is the most vulnerable to attacks. Thus upgrading the same to the latest version with adequate safeguards and firewalls would have also helped to safeguard the attack (Hawkins 2015). The segregation and divorce of the POS network from the rest of the corporate network is also one of the most sought after methods of preventing such attacks. Lastly, Home Depot suffered also due to a bad management of the third party vendor credentials. The attackers entered via a specific vendor id and password. Thus they should introduce an identity and access management solution which would help to take care of the identities and access of all the third party vendors as well. Thus the theft could have been prevented here in this case had the system been upgraded and the vendor credentials safeguarded well. Conclusion On a concluding note, it can be construed that due to the non-availability of a good system installed by Experian within their organization, the hack occurred. Had the same was protected well, then such a mishap would not have occurred. Further, even T-mobile is at fault as they had blind folded trusted Experian even when it is a well known fact that Experian had been always a party of such negligence in the past as well. Experian has earlier also had such unprotected systems installed. Therefore, T-mobile should take stringent actions against Experian so that such an occurrence can be prevented. References: forbes.com. (2015). Home Depot: Will The Impact Of The Data Breach Be Significant? Retrieved from https://www.forbes.com/sites/greatspeculations/2015/03/30/home-depot-will-the-impact-of-the-data-breach-be-significant/#2b2a04f74bf1 Hawkins,B. (2015). Case Study: the Home Depot Data Breach. Retrieved from https://www.sans.org/reading-room/whitepapers/casestudies/case-study-home-depot-data-breach-36367 krebsonsecurity.com. (2014). Home Depot: 56M Card Impacted, Malware Contained. Retrieved from https://krebsonsecurity.com/2014/09/home-depot-56m-cards-impacted-malware-contained/ Pagliery, J. (2014). Home Depot confirms months- long hack. Retrieved from https://money.cnn.com/2014/09/08/technology/security/home-depot-breach/ Stempel,J. (2016). Home Depot settles consumer lawsuit over Big 2014 data breach. Retrieved from https://www.reuters.com/article/us-home-depot-breach-settlement-idUSKCN0WA24Z Smith,G. (2014). Home Depot Admits 56 Million Payment Cards At Risk After Cyber Attack. Retrieved from https://www.huffingtonpost.in/entry/home-depot-hack_n_5845378 References: Allan,P. (2015). Experian Hacked, T-mobile Credit Applicant Data Stolen [Updated]. Retrieved from https://lifehacker.com/experian-hacked-t-mobile-customer-data-stolen-1734117798 Chabrow,E. (2015). Experian Hacks slams T-Mobile Customers. Retrieved from https://www.bankinfosecurity.com/experian-breach-a-8563 Cheng,R. (2015). Data-breach hits roughly 15M T-Mobile customers, applicants. Retrieved from https://www.cnet.com/news/data-breach-snags-data-from-15m-t-mobile-customers/ Finkle,J. (2015). Millions of T-Mobile customers exposed in Experian Breach. Retrieved from https://www.reuters.com/article/us-tmobile-dataprotection-idUSKCN0RV5PL20151002 Larson,R. (2015). T-mobile, Experian Sued Over Data Hack Affecting 15 Million. Retrieved from https://www.bloomberg.com/news/articles/2015-10-07/t-mobile-experian-sued-over-hack-on-15-million-customers Pagilery,J. (2015). T-Mobile customers info breached after Experian hack. Retrieved from https://money.cnn.com/2015/10/01/technology/tmobile-experian-data-breach/ Thielman,S. (2015). Experian hack exposes 15 million peoples personal information. Retrieved from https://www.theguardian.com/business/2015/oct/01/experian-hack-t-mobile-credit-checks-personal-information REFERENCES: forbes.com. (2015). Home Depot: Will The Impact Of The Data Breach Be Significant? Retrieved from https://www.forbes.com/sites/greatspeculations/2015/03/30/home-depot-will-the-impact-of-the-data-breach-be-significant/#2b2a04f74bf1 Hawkins,B. (2015). Case Study: the Home Depot Data Breach. Retrieved from https://www.sans.org/reading-room/whitepapers/casestudies/case-study-home-depot-data-breach-36367 krebsonsecurity.com. (2014). Home Depot: 56M Card Impacted, Malware Contained. Retrieved from https://krebsonsecurity.com/2014/09/home-depot-56m-cards-impacted-malware-contained/ Pagliery, J. (2014). Home Depot confirms months- long hack. Retrieved from https://money.cnn.com/2014/09/08/technology/security/home-depot-breach/ Stempel,J. (2016). Home Depot settles consumer lawsuit over Big 2014 data breach. Retrieved from https://www.reuters.com/article/us-home-depot-breach-settlement-idUSKCN0WA24Z Smith,G. (2014). Home Depot Admits 56 Million Payment Cards At Risk After Cyber Attack. Retrieved from https://www.huffingtonpost.in/entry/home-depot-hack_n_5845378

Thursday, November 28, 2019

Inside The Mouse Essays - Walt Disney Parks And Resorts,

Inside The Mouse Disney World places social controls on its visitors and workers in many ways. Disney is a very large corporation and has the power to implement these controls. The major forms of social control that I found were; consumerism, security, technology, location, conformity, and standards of behavior. Through these forms of social controls, Disney is able to control its visitors and workers. Consumerism at Disney starts before the visitors even get to Disney World. The consumerism starts with the pictures in the brochures. Selling the visitors on Disney World even before they get there. Showing pictures of happy families enjoying themselves at Disney World sells the idea of a safe and nice vacation to the visitors. When the visitor finally arrives at Disney, they are bombarded with products that have the Disney logo on them. Selling the visitors official Disney products. The products sold at Disney symbolize the goodness that Disney possesses. When the visitors purchase these products of memorabilia, it gives them the identity that they are good also, just like Disney is. If the visitors' identity is good, they will feel safer at Disney World. This leads into the next form of social control at Disney World, security. Visitors to Disney World very rarely hear about accidents or crimes committed there. As Karen Klugman says in the book, Unless you live in Orlando and watch Channel 6 or know someone who works at the parks, you have probably never heard of any problems (104). I personally have never heard of any problems at any of the Disney parks. Having only been to the park in Orlando and the park in Tokyo, Japan, I felt very safe at both locations. This could be because Disney is a very safe place or that the news never gets out. I would imagine that the news never gets out past the cities the parks are located in. By keeping the parks safe, Disney gives the visitors a very good sense of safety. Disney is able to control its own environment for the visitors. It is a very powerful and rich corporation. There is always a Disney staff member around to help with minor accidents. If a child falls and scraped their knee I am sure, that Goofy or Mickey is right around the corner to help comfort the chil d. When Disney staff do this it gives the parents a greater sense of security for their children and themselves. With information booths and staff running around everywhere in costumes the visitors feel safe, especially the visitors with children. When Disney staff do this it gives the parents a greater sense of security for their children and themselves. With information booths and staff running around everywhere in costumes the visitors feel safe, especially the visitors with children. If a child gets separated from their parents, it will not be long before the child is returned or kept in a safe place until their parents are located. These are some of the reasons that Disney is a safe and pleasurable place for a family vacation. There is no perceivable danger to the visitors in a trip to Disney World. The world of technology also affects the visitors and workers at Disney. Through great advances in technology, Disney is a safe and almost crime free environment. With the use of surveillance cameras and new technology for rides and other attractions, Disney is a fairly safe place. There are surveillance cameras on the rides to ensure that unruly guests will not exit or disturb the attractions. With this technology making the environment inside Disney safer, the visitors feel safer. The technology at Disney also keeps dishonest and delinquent employees out of trouble. I am sure that the employees are watched as much if not more than the visitors are. If an employee decides to wonder off and take a break on the clock or skim a little amount of money out of the cash register someone will notice. This gives not only the employees a sense of a safe environment to work in; it also gives the visitors the same feeling. If the employees at Disney are honest and accountable, the visitors will feel safer being there. As described in Inside

Sunday, November 24, 2019

Procurement and Contracting Process

Procurement and Contracting Process Introduction Due to economic related challenges or opportunities and need to establish strategic competencies, companies often resort to outsourcing. This report considers the outsourcing options to be explored to ensure Travel Magazine is up and running despite budgetary constraints. Advertising We will write a custom essay sample on Procurement and Contracting Process specifically for you for only $16.05 $11/page Learn More Outsourcing involves subcontracting or giving third parties work that would otherwise be done within the organization (McIvor, 2005, p. 7). Many organizations especially in the developing world are tending towards outsourcing. Outsourcing is an easy option but it all depends on organizational characteristics. Considerations in Outsourcing There are many reasons why institutions choose to outsource their operations. However, at the core of the outsourcing decision is desire to develop a competitive advantage or edge. The competitive adva ntage is gained through being able to focus on core business, enjoying expertise that is not available in the organization, use of technology that would otherwise be expensive investing in, or benefiting from economies of scale enjoyed by the outsourcing partner. Travel Magazine plans to outsource so as to cut start up costs due to limited capital. Outsourcing will enable the company to share assets or use the assets of other companies thus it does not have to invest in the assets. Secondly, outsourcing will enable the company to produce high quality magazines by relying on already established expertise in another company. The company will seek out only vendors with prerequisite experience and expertise for each given outsourced service or activity. The outsourcing process will enable the company to invest the available capital in the core of the business. Outsourcing comes with a number of benefits but there are also numerous challenges or demerits that the company has to consider in making the outsourcing decisions (McIvor, 2005, p. 23). One key concern is the capability of the company to which Travel Magazine processes are outsourced to deliver quality. Unless considerable care is taken, outsourcing could compromise the final product i.e. quality of the magazine. Secondly, control of business of processes should be designed into the outsourcing contracts. This measure is taken into consideration because Travel Magazine as a company could easily loose control over the Magazine if all the core functions are outsourced. The outsourcing contract has to be designed in a way that it secures the company’s independence in the future. A magazine publishing company has to control its information sources.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Business Processes to Outsource The outsourcing process starts with analyzing organizational processes to determine which ones are worthy outsourcing. Travel Magazine as a company has a number of functions that it can outsource. The functions include accounting, editorial, photography, publishing, distribution, printing, layout, advertising, editing, articles, etc. due to budget constraints; the company has to outsource at least five functions. The guiding principle for outsourcing any of the processes or functions is its relative contribution to quality for customers, cost reduction and competitiveness of the magazine. The processes that should be outsourced include photography, advertising, printing, distribution and publishing. Printing a magazine requires heavy investment in printing machines. Fortunately, there are many organizations that specialize in printing; printing is their core business. By outsourcing the printing process, the organization will save money i.e. no need to invest in expensive printing machines. The money saved can be invested in core business of the organiza tion. Photography is also worthy outsourcing because it allows the organization to focus its efforts on core business. Although photography is an integral part of the magazine quality, there are a number of organizations that specialize in such services. Outsourcing to such institutions will mean that the organization gets best shots from wherever at relatively low costs. Secondly, taking good photographs, especially for a magazine, is dependent on many years of experience. Outsourcing such a function would ensure the company accesses experts in the field at lower costs when compared to hiring staff and developing own photography studios. Advertising is a tricky affair because marketing determines whether a brand resonance for the magazine is built in the long run or not. Given the organization is young and has a budgetary constraint, developing a marketing branch that is fully empowered to do effective advertising may not be cost effective. There are many marketing and advertisin g agencies in the market that can be used. These agencies have built the structures and mechanisms or ensuring correct and effective execution when it comes to market communication. They have the personnel with long experience of delivering on brand building and retail activations. Engaging them would mean riding on their long experience and thus following a proven track.Advertising We will write a custom essay sample on Procurement and Contracting Process specifically for you for only $16.05 $11/page Learn More Distribution is best outsourced so as to benefit from already established trade channels. If the company is to set up its own distribution channel or develop its own selling points; that would be an expensive venture. Secondly, that would mean creating competitors out of the established distributors. There are established distributors in the market who specialize in the distribution of various magazines. All the company needs to do is sign a contra ct with any of them and the distribution needs are catered for. The distributors would deliver the magazine to all corners through their channels. All the company has to do is identify the niche market and thus contract a distributor with wide penetration in the niche areas. Finally, publishing is also better off outsourced. Publishing is not a core function or process despite its importance. Once again, relying on established publishers would mean the company does not have to develop its publishing function. Developing such is an expensive venture that is capital intensive. In the information age we live in, much magazine sales sell online. Finding a reputable publisher to publish the magazine online will be a welcome move. This will mean that the company does not have to invest in IT requirements that would facilitate online publications. The company will maintain in-house business processes such as accounting, editorial, layout and article sourcing or development. Given the orga nization is going to outsource many processes; accounting has to be done in-house for proper monitoring of the different concerns. If accounting is outsourced, the organization looses total control over processes in the way. It would have to wait or rely on accounting reports from elsewhere to maker pertinent decisions. If the process is left in-house, a financial manager can closely monitor all processes and facilitate towards better decision making by management. Sales from a magazine and by extension profits are largely dependent on its perceived quality. Quality of a magazine is dependent on kind of information it contains, the magazine layout, language use (general look and feel matters a lot). Therefore, strategic positioning of a magazine largely depends on perceived value and import of articles contained in the machine. Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The perception is build basing on article content, positioning in the magazine and general structure. It is content, then look and feel that make customers irking for the next copy of a magazine. Therefore, keeping editorial, layout and article sourcing or development in-house is of great importance. Keeping those functions in-house helps maintain the company’s independence. As illustrated, the magazine sells based on articles and general look and feel. Therefore, if that comes from in-house, it means that the organization is actually in charge, it is the primary source of the magazine. If those processes are outsourced and a problem or misunderstanding happens, the other institution can easily paralyze the companies operations. However, if these core functions are maintained in-house, any breach of contract or misunderstanding by providers of the outsourced services can easily be dealt with. If it is a problem to do with distributors, the organization can easily engage some other distributor or a number of distributors. Preliminary Performance Targets/ Level of Service Expected from Vendors Once an organization is clear about what processes are worthy outsourcing, the next step is to be clear about performance expectations (Brown Scott, 2005, p. 25). Performance targets should guide the decision on what vendor is best suited to handle an organization’s processes. The performance levels in each outsourced process will be determined by the characteristic performance indicators in each process. When it comes to printing, the printing vendor would have to guarantee production of timely clean copies. The vendor must have capacity to do custom printing and be timely about deliveries. A vendor that is dealing with many clients and does not have enough capacity could easily end up affecting Travel Magazine’s operations. Therefore, the vendor must have capacity that will be specifically assigned to the magazine’s printing as per schedule. Performance in distribution is determined by level of penetration into designated niche markets. The distributor must have capacity to transport the magazines and assure protection i.e. no theft and no defacing. Timely delivery of the magazines into markets will also be of critical concern. The distributor has to have capacity to deliver the magazine to all parts of the niche market in a timely way. All people who know how to use a camera can take photographs. However, the photographer’s expertise and photo development technology determines final quality of a photograph. The photography vendor will need to have mechanisms of ensuring quality is guaranteed and photo shooting at all designate sites is facilitated. Quality will be guaranteed by professionals who know camera positioning and other aspects of photo shooting like depth and distance calculations. For a travel magazine, the vendor will also need illustrate capacity to avail relevant photos from all interesting sites as may be required. Performance on the advertising front is determined by the level of brand resonance achieved and sales volume increase over time. The advertising firm will have to demonstrate capacity to develop relevant market communication and design point of sale material that adhere the magazine to target population. Retail activations are also a critical aspect of trade development and thus the agency has to have capacity to instate awesome retail execution and brand performance measurement mechanisms. The service level expected on the publishing front has to do with acute capacity to drive internet sales of the magazine. Preferably, the organization will engage a publisher with capacity to drive internet sales volumes. Publishing online and related sales is the in-thing in the publication industry of late. Many people spend their time online and e-trade is the way to go. The publishing company has to have capacity to complement the efforts of our editorial team by ensuring the right content is carried in the magazine and it is well structured in the layout. Type of Contract for Outsourced Processes The contract between company and service providers will have to be flexible enough to cater for future changes in market structure (Brown Scott, 2005, p. 27). For example, the company was forced to outsource over five processes due to economic down turn. However, the economic fortunes are likely to change. When it comes to distribution and publishers, the company will seek a distributor and publisher that can accept a revenue sharing kind of contract. This means that the distributor will be getting a given percentage of total revenues they help generate for the company. This kind of contract is good because it means the distributor earns of own efforts. Such an arrangement, normally, motivates distributors to drive sales highly. The contract with printers will be a fixed price contract. A fixed price will be set for every batch of printing work done. Som ehow batch estimates are predetermined; therefore, fixed contracts will work just fine. The photography work is not like the printing work due to inability to reach exact estimates of involved costs. Therefore, the company will pursue a cost plus margin kind of contract with the photography service provider. The advertising agency will have different actions or levels of activity to drive sales. Therefore, a hybrid system consisting of cost plus mark up and fixed pricing will be used. When it comes to retail execution, cost plus mark up will be used because different costs are involved depending on geographical dispersion. Fixed pricing will be used when it comes to above the line market communications. Criteria for Selecting Preferred Vendor Cost reduction is the major drive towards outsourcing of business processes. However, pricing will not be the only criterion for choosing a vendor. This is so because tender prices do not often reflect quality guarantee. For each of the process es, we shall be keen on service provider capacity and characteristics. A concern for quality and competitive edge will drive the vendor selection. Some of the required characteristics have been described under expected service levels. Each vendor will have to meet stipulated service levels at a competitive price to be awarded the tender. Number of Vendors per Process Some processes are better handled by a multiple vendors while some are best handled by a single vendor. In advertising, at least two vendors will be welcome. One vendor will deal with market communication especially above the line communication. Another vendor will deal with retail execution e.g. sensitization and promotion awareness activities. In printing and publishing, a single vendors will work just fine to benefit from economies of scale due to consolidated service sourcing. More than one distributor will be used for the distribution of the magazine. Using different distributors ensures wide coverage and diffuse s distributor bargaining power. Finally, a single vendor will be sourced for the photography contract. This is important for consistency plus there is little service variation needed. Time Line for Contracting Process Time Activity 1st and 2nd Month Prepare the Service Level Requirement based on research 3rd and 4Th Month Open Tendering (RFP) 5th Month Outsourcing Contract Negotiations 6th Month Refining Contracts as per negotiations 6th Month Contract signing and Post tendering negotiations 7th and 8th Month Implementation preparations 9th month Magazine Roll out Reference List Brown, D. Scott, W. (2005). The Black Book of Outsourcing: How to Manage the Changes, Challenges, and Opportunities. New York: John Wiley and Sons McIvor, R. (2005). The Outsourcing Process: Strategies for Evaluation and Management. Cambridge: Cambridge University Press

Thursday, November 21, 2019

Law, Governance, Regulation and Ethics Essay Example | Topics and Well Written Essays - 1000 words

Law, Governance, Regulation and Ethics - Essay Example The first issue raised in â€Å"Wall Street’ is based on the ethics which are broken throughout the film. The ethics that are associated with the movie include gathering confidential information about the stock market. This is done not only by obtaining illegal information but also includes breaking into offices and taking confidential information. This is first done by Gekko and is later followed by Fox with the desire to move up with his placement in the corporate world. The approach which is taken is one which is based on a combination of legalities and ethics. According to the law, there are requirements with confidentiality that are put into place. This is to protect businesses with privacy and from unfair deals which may occur without the companies knowledge. This is followed by private property rights which make it unconstitutional for an individual to take information. By breaking these ethical considerations, there is a break in both government and corporate regulati ons while harming others that are a part of the main process for obtaining information (Nelson, 2005: 3). The concept of ethics on a legal basis is important to note because it combines with individual behaviors, legalities and responsibility that is a part of the corporation. The work of Fox becomes important because he is a representative of the company which he works for. When he takes the private information through illegal information it causes him to be a representative of the company, leading to a direct overlap between ethics and corporate governance (Mullerat, 2010: 48). However, this becomes misunderstood as his actions lead him to a raise and as one of the best performers of the institute. More important, the response from the country which has gained prestige in the market is interested in hiring Fox after his sentence because of the work which he has done. The actions taken by the corporations reflect directly in the understanding of what it means to be legally responsi ble and to be honest and fair in different dealings. The actions taken with the main characters show that there isn’t an understanding of the ethical responsibilities of individuals as well as how this reflects in the corporation. The importance of the private interactions and the association with the ethical considerations with governance is important to note because of how it affects others who are a part of the company. This becomes the main battle that is associated with ethics. From the viewpoint of both Gekko and Fox, there is the belief that â€Å"greed is good.† However, there are also others who are harmed from this, including the reputation of the businesses, the customers who respond to the dealings and the others who have to pay for the information which is taken and the deals which follow. The concept of corporate citizenship becomes the main component with the actions taken. This states that an individual who is in a business is not only responsible for m aking money or representing the company. The information which is taken, actions which are violated and the unfair dealings reflect directly with the citizen relationships and how others are affected. The corporate governance is one which leads to individuals having a sense of responsibility toward the company, stakeholders, customers and others affiliated with the business. If the

Wednesday, November 20, 2019

Remote surgery, the challenges and opportunities Essay

Remote surgery, the challenges and opportunities - Essay Example Despite the new discoveries in the future there are many challenges and opportunities of technology in the field of healthcare. The following essay will discuss the challenges and opportunies of remote surgery (Lee 56) In remote cancer care, there have been challenges and opportunities experienced in healthcare. Cancer is associated with decreased productivity, death, physical and social problems in cancer patients and their household. Thus, cancer prevention, screening and making treatment in time is essential. Robot surgery has affected the cancer treatment arena.Computerrised and robotic devices can offer enhanced slightly by tremor abolishment, motion scaling, high quality pictures and visions for surgeons, decreased blood that is lost during invasive procedures, great reduction in narcotic use and reducing the number of days patients stay in hospital. All the same there are some challenges such as inadequate of surgical community support, high costs incurred during treatment, an absence of tactual and tactile response. In prostatectomy surgery challenges include inadequate data showing functional results compared to a single port laparoscopy or an open surgery .it has now been found that there are no clear corresponding clinical trials that prove the robotic surgery to be better than the other surgical practices. The other challenge is the licensing of robotic surgeons, this is because it is a critical area of surgery and the surgeons are expected to renew their license in order to show that they are competent in the skills required to fly the plane. The advantages in robotic surgery during prostatectomy include distinct cosmetics benefits and reduced blood loss. The idea that a small incision can be made done in the stomach compared to a big incision during the invasive procedures is quite interesting but this should be done after considering the expenses in terms of time and equipments if there is no

Monday, November 18, 2019

Read an article about Google Unveils App For Paying With Phone, and Essay

Read an article about Google Unveils App For Paying With Phone, and write your response - Essay Example For now, this app allows the usage of cards issued by Citibank and a virtual card by Google, but Google is trying to incorporate the cards of other banks as well, as soon as possible. This technology can be used at 124,000 merchants in the US and 300,000 merchants outside the US. Google has done what many firms have been trying to do since years, the â€Å"Mobile Wallet† technology. One can be sure of the app’s success, as it has been approved by many retailers and with its promotional offers and coupons, Google would leave no tables unturned. Google would also collect some fee from the retailers every time this app is used by the customers, just like the plastic cards. Though this technology needs some time to see the light, Google has been engaging top brands to accept payments through this technology. The other attractions of this app comprise the loyalty points and discounts that one can get using this app. On the other hand, controversies have already rounded this technology. PayPal has filed a suit against Google and a couple of its executives for the usage of PayPal’s trade secrets. Despite the positive and the negative aspects of the app, it is sure to come up with many other interesting features as well.

Friday, November 15, 2019

Touch Screen Alarm Clock Marketing Plan

Touch Screen Alarm Clock Marketing Plan The latest technological gadgets have gained immense popularity in the last few years and the customers are eager to try out new products and services. Considering the increasing demand of touch screen alarm clock as identified by Brandon (2010), our company will be introducing this product in the market and will ensure that it successfully meets the requirements of every customer by charging reasonable price for the product range. Market Research findings Since the business environment is becoming fierce and competitive, it has become vital for the companies to carry out a market research before launching the product in the market (Ranjhita, 2011). With the help of the research, it was found that touch screen alarm clock has huge potential for the new entrants and entry barriers are relatively low (Cako, 2005). In US, every top ranked brand is offering its products but there are some areas where people have limited access to these clocks. The three areas identified by our company are Ohio, Florida and California; the geographic segmentation has been done to get a clear picture of the type of customers that the company will be targeting. From the analysis of the research findings, it is decided that the brand name will be Express Alarm Clock and it will comprise of two models on the basis of features. One model will be simple with less features and other will be with complicated and extremely high technical features. The other aspects of the marketing plan are discussed below in detail. Target Market In order to reach the right market, it is important that the target market is decided beforehand which will ensure that there will be certain number of consumers who would be willing to buy the product (Flink, 2011). The target market of this new touch screen Alarm Clock is as follows: Gender: Male and Female Age: 8 years and above Income: $30,000 and above Lifestyle: Depending on the life cycle stage; young children and adults are fun-loving, adventurous and technologically savvy. Older people i.e. 40 years and above prefer to have simple technical gadgets with easy to understand features. Occupation: Depends on the life cycle stage but would mainly comprise of students, part-time or full-time employed people, professionals and housewives Positioning Statement Since every brand is developed with the aim of creating distinctive image in the market, its positioning needs to be accurately done so that the customers are communicated the message appropriately (Ferrell Heartline, 2008). The positioning statement of Express Alarm Clock is to be the number one touch screen alarm clock with simplistic features, durable quality and advanced functionalities that will allow the users to carry the gadget everywhere easily and with utmost ease. Product offerings Initially, there will be two models launched in the market to meet the demands of the touch screen alarm clock market. Every customer is looking for affordable touch screen alarm clocks, so the company will introduce two models; one will be priced for economical customers and other will be priced for brand conscious and high quality product customers. The two types of product offerings with their descriptions are given below: Simple Express Alarm Clock This product will be used simply for alarm setting purposes. It will be performing only this function and maximum five alarms can be easily set in this clock. The main target for this clock is older people who are looking for touch screen alarm clocks with easy to use features so that they can use the gadget without difficulty. LED Express Alarm Clock This model will have all the features that the customers are looking for in such alarm clocks. The design of the model has been done with perfection so that the customers love its style and design and get attracted to the product at once. The amazing features of the clock are MP3 player, Built-in FM radio and Wi-Fi along with alarm clock setting. Pricing Strategy As there are so many competitors in the touch screen alarm clock industry such as Sony, Apple, Sharp, Timex, Android, Westclox and many more, it is important that the pricing strategy is selected in accordance with the competitors. As the company is new in the market, it should either follow competitive pricing or cost plus pricing (Ernst, Hoyer RÃ ¼bsaamen, 2010). Both of the models will follow competitive pricing so that the customers can easily compare the product features and all other aspects and ensure that they make adequate purchasing decision. The price of Simple Express Alarm Clock will be $10 and LED Express Alarm Clock will be $25. Simple Express Alarm Clock will be available in Black, Blue and Green colors and LED Express Alarm Clock will be available in Blue, Red and Black colors. Distribution Strategy The distribution strategy is one of the key components of the complete marketing plan as the only way to reach the target market is to choose compatible distribution locations (Sikdar VEL, 2010). The products of the company will be available in two places to ensure that every customer has easy access to them. First of all, the products will be available at the consumer shopping centers and retail stores such as Wal-Mart, Target, Costco and many more. The other distribution network that will be used is the companys website. Any customer who is looking for the touch screen alarm clock online will have to just visit our site, review various options available for them and make final decision after carefully evaluating all options offered by the company. However, the distribution will be done only in Ohio, Florida and California. After success of the products, the company might expand into other regions after carefully surveying the markets. Promotion Strategy The promotional strategy will ensure that the desired message is communicated to the target audience with accuracy so that the sales level can be successfully achieved (Flink, 2011). The foremost aim of the promotion strategy is to create awareness about the companys presence in the market and it will make use of complementary mediums so that the customers can develop an association with the brand. Initially, the advertising mediums that will be used are Television Commercials, advertisements in newspapers and billboards along with flyers, posters and advertisements in the leading magazines. Similarly, a trade show will be organized on the commercial street so that it can create awareness about its presence in the market. In order to be present on Internet, the stores website will be developed and all information about the company will be provided on the site. As the latest trend in the market is of social media marketing, our company will develop a webpage on social networking sites such as Facebook, MySpace, LinkedIn and Orkut so that the customers can start talking about the products on our community page. There are various discussion forums as well where people gather and discuss about the products and services of different companies and give their viewpoints about them as well. The social media will be beneficial for our company as it will enhance our online presence and increase the sales amount at an accelerating rate (Weber, 2007). In order to attract our customers, we will offer various attractive packages such as discount packages, gifts for purchasing products of more than $100, arrange contests to distribute various prizes to the customers and give special offers to the loyal customers. We will introduce loyalty cards for our customers who will keep on purchasing new products that are launched by our company on continuous basis. The marketing efforts of the company will be reviewed monthly as the technological advancements take place on an ongoing basis and new products are introduced quickly as well. The initial source of evaluation for the company will be the difference in the estimated and actual sales of the product (Ferrell Heartline, 2008). On the website, the customers will be allowed to give their feedback about the product features and the existing customers will be asked to participate in the survey of the touch screen alarm clocks. Sales and Service Strategy As the touch screen alarm clocks will be developed with latest technology and will have new and unique features, it is vital for our company to have an effective after sales and customer service strategy. With the help of this strategy, we will have a well-trained and competent sales force who will ensure that each customers complaints are properly handled and they are provided instant solutions to their problems. After selling the products to our customers, our sales representatives will call them after one month of purchasing to get their feedback about the products. With the help of this survey, we will be able to monitor the performance of our products and it will ensure that we take appropriate step in case of any problems so that the customers are relieved of their worries. In order to make sure that each of our customers is satisfied with his/her purchasing decision, we will offer one year warranty card and will entertain our customers aptly so that they become our loyal customers.

Wednesday, November 13, 2019

Too Close For Comfort :: essays research papers

Too Close For Comfort   Ã‚  Ã‚  Ã‚  Ã‚   In this case study, the ethical dilemma is â€Å"individual versus community.† Debra Borchert is bothered by Jerry who is a developmentally delayed. He is following her and bumping into her and making her feel uncomfortable. Debra’s difficult decision is whether or not to tell the manager Jerry is bothering her, risking getting him fired, and also risking the store not hiring anymore mentally challenged kids. Jerry also might not get hired anywhere else; the job at the grocery store was a good one for him. Debra’s brothers were very similar to Jerry, and she wished they could be able to have jobs just like Jerry so that is another reason why she didn’t want to complain. On the other hand it would be a good idea to tell the manager something because she feels uncomfortable, and she should think about herself before being concerned with what is going to happen to Jerry.   Ã‚  Ã‚  Ã‚  Ã‚  An example in the case study where Debra feels like she wants to tell the manager that she is bothered by Jerry is when he is following her, stepping on her foot in line, and bumping in to her. She knows he is challenged and probably doesn’t mean any harm, but she feels she has no choice but to say something.   Ã‚  Ã‚  Ã‚  Ã‚  Another example of when she feels like she should tell the manager is later on the case study when she feels like Jerry forgot about her; however he comes over from a different register just to help her with her bags. To keep away from him she used the cart as a border so she had something between her and him.   Ã‚  Ã‚  Ã‚  Ã‚  On the other hand, as an example of why she thought she shouldn’t complain is because as I said before in the thesis statement. She doesn’t want to make the mistake of ruining other developmentally challenged kids chances of getting jobs. She feels that she should probably just put up with it and go on with her life. Especially because her brother has a very similar disease.   Ã‚  Ã‚  Ã‚  Ã‚  In conclusion to my thoughts on this case study, I think that Debra choosing not to say anything was a good idea. I think she did the right thing by just trying to avoid Jerry because getting him in trouble would only make it worse for him and her.

Sunday, November 10, 2019

Inuit Art & Canadian Nationalism Essay

Inuit refers to a certain group of people who had acclimatized and inhabits the cold and harsh climatic regions of Canada. They are similar to Eskimos who live in Arctic regions of Russia and Europe and North America. Their art is a reflection of urbanization with elements of cultural experiences which denote the activities carried out within their daily life as dictated by the environment. A good Inuit art work is the one mended with vast landscape and traditional Inuit culture. Achieving such Inuit art work is sometimes challenging and controversial but it is a reflection of honest work. The Canadian Inuit art is a good example such as the one brought out by James Houston writings. James Houston was first artist to get involved in the Canadian Inuit art in 1948 with the objective of searching new land to paint. People living in the new land were very friendly, warm and the environment was vast, beautiful and cold. Interaction with the Indian and Inuit people in the Arctic provided the best opportunity for James to introduce Inuit culture to the world. Introduction of Inuit culture was made possible with the use of remarkable stories and art. There are four main particular exciting Inuit art work by James Houston in his writings. These include the White Archer, Akavak, Worlfrun and Tiktaliktak (Graburn, 2). The art work was collected in a good volume which illustrates the story about Arctic and nationalism. Many Canadian art and craft galleries, souvenir shops, and museum stores clearly confirm that tourist art is a measure of Canadian and Inuit work. Inuit art for the last say half a century has been appropriated by people living in the southern part of Canada. In addition, Inuit art is seen as one of the brightest jewels representing Canadian cultural mosaic. Inuit art is considered as one of the most important resource in establishment of Canadian identity. In many particular instances, Inuit images are viewed as symbols for identification in part or whole of the Canadian identity. Many Canadians identify themselves with Inuit art as it is one of the unquestionable means of identity. The Canadian government is usually devoted to identify between non-Aboriginal and Aboriginal peoples. The rhetorical power is used to establish a body of identifications for national identity. However, there are other indigenous images used by Canadians to represent national identity but Inuit art is the most outstanding. Indigenous art also play a very important part in identification and act as a symbol for national community identification. Organizational, individual and institutional identification needs in Canada are served through striking graphic power, prints, carvings and ability to be recognized (Maryllbelle, 1). The good graphical work creates expressive symbols for federal government. This is a clear representation of Canadian symbolism in the form of art graphics. Successive governments have tried to recognize the construction of unique Canadian identity as one of the most critical part of their mandate. For purpose of maintaining consistency, the Canadian government has tried to distinguish Canada from other countries through the use of Inuit art. A line on map could have been used to differentiate Canada from other countries but since confederation, art graphics have been in use. There are certain drawbacks in any given state that result to individual division such as ethnicity, language or religion. The use of Inuit art has no negative effects as are related to religion, language or ethnicity. Canadians have tried to differentiate themselves from U. S and other countries through the use of symbols or identity with genuine characteristics. Canadian identity has been constructed by constant shifting rhetorical identification and division process that aim at bringing communities together. It also aims at separating communities from one another as history shows how Canadians have tried to negotiate the nature of the countries core values. Identification of core values is shaped by discursive resources which were developed in the course of European settlement in Canada. Association of parties with material objects creates a marker which supports a sense of nationalism. A wide or broad group of cultural producers creates relevant material objects that interprets objects deemed fit for forming cultural equipment. Artists, dancers, painters, filmmakers, musicians, writers and sculptors play a very important part in promotion of patriotic education. This has been performed since the early twentieth century whereby material objects are provided in styles which fit the service of nationalism. In addition, societies rely on advertisers, teachers, publishers, journalists and other opinion leaders to interpret material objects. The same artists and opinion leaders disseminate the interpreted information to people with a view of constructing an appropriate conceptual linkage between material objects and national feeling (Marryllbelle, 1). The Canadian government plays a very important role in promotion of art work through incorporation of educational programs in schools and other public social gatherings. The Canadian government officially clarifies stresses and introduces appropriate pieties for material resource assortment that reflects values of country through public presentations, campaigns and internet. The use of public campaigns is to familiarize people about cultural products which help to promote art work. Canadian citizens store have their confidence in attitudes relating to resources for future reference. The retrieval of cultural attitudes arises in instances when certain national institutions try to stir up patriotic passion. Vocabularies at national levels are considered as reasons for, results of, and development of identification constructions on the basis of common interests of the citizens. The Inuit art is a reflection of Canadian language which tries to emphasis on cultural values leading to diversity of human ideas. Language is one main tool of identification which provides individuals with self worth and a sense of belonging. In the event a small group of community living within a given state loses its language, the members of the community feel left out in their identity as a cultural group. To avoid loosing identity by certain minority groups, certain commissions are formed to fight for rights of such minority communities (Stern & Stevenson, 8). Other alternative way of preserving the dignity of minority groups is through the use of art work which reflects the cultural believes of the individuals. A close look on the Canadian native art reveals that it has contributed to international exposure over the past centuries. Huge budgets have been drawn by government to support promotion of art with a view of carving out a national identity. Promotion of Eskimo art is one relative example to reflect the level at which government is in support of the Inuit art. The history of Canada showed that establishment of a national identity figure was made to promote cultural features. The desire to establish an iconic identification figure arose since the 19th century. This is a time when the Canadians wanted to establish their own identity separate from that of United States and British. After the First World War, considerations relating to public opinions changed through the efforts of seven artists (Grabaum, 1). Although they had no roots in Canada many of them were trained in Europe, their exposure and expertise into artistic work made the group of seven to travel many parts of Canada and established became one of the most sought Canadian arts. The spirit of Canada was captured in the national art and a modern style was clearly identified as suitable and had unique features reflecting Canadian culture. A large number of young artists in Canada started painting in the same vein as the seven artists. The disbursement of the seven artists group led to promotion of art work in the entire Canada. The Second World War provided a chance for Canada to establish Canadians artists (Pupchek, 7). This marked the turning point in the category of Canadian art history. Canada was very enlightened and happy with their war time military in addition to artistic efforts. This led to a revival in Canadian nationalism in various fields of art and culture which has been depicted in many journals and magazines. Nationalization of the Canadian art was a step prompted by government position to increase its support to art work. James Houston’s travel to the North gave him the chance to meet with the Inuit’s where he collected some of their art work, crafts and souvenirs. He inspired other artists who eventually started to carve small figures using soapstone which were basically used to make pots and lamps. The Inuit art was very instrumental as it was used to establish Canada as a great Northern power. The favorable image of Inuit art being products of nature, creativity of artists in ecological matters, lack of competition with mainstream art and adept at creation of materials made it possible for Inuit art to be used as a sign of Canadian national heritage.

Friday, November 8, 2019

The Womans Bible and Elizabeth Cady Stanton on Genesis

The Woman's Bible and Elizabeth Cady Stanton on Genesis In 1895, Elizabeth Cady Stanton and a committee of other women published The Womans Bible. In 1888, the Church of England published its Revised Version of the Bible, the first major revision in English since the Authorized Version of 1611, better known as the King James Bible. Dissatisfied with the translation and with the failure of the committee to consult with or include Biblical scholar Julia Smith, the reviewing committee published their comments on the Bible. Their intent was to highlight the small part of the Bible that focused on women, as well as to correct Biblical interpretation which they believed was biased unfairly against women. The committee did not consist of trained Biblical scholars, but rather interested women who took both Biblical study and womens rights seriously. Their individual commentaries, usually a few paragraphs about a group of related verses, were published though they did not always agree with one another, nor did they write with the same level of scholarship or writing skill. The commentary is less valuable as strictly academic Biblical scholarship, but far more valuable as it reflected the thought of many women (and men) of the time towards religion and the Bible. It probably goes without saying that the book met with considerable criticism for its liberal view on the Bible. An Excerpt Heres one small excerpt from The Womans Bible. [from: The Womans Bible, 1895/1898, Chapter II: Comments on Genesis, pp. 20-21.] As the account of the creation in the first chapter is in harmony with science, common sense, and the experience of mankind in natural laws, the inquiry naturally arises, why should there be two contradictory accounts in the same book, of the same event? It is fair to infer that the second version, which is found in some form in the different religions of all nations, is a mere allegory, symbolizing some mysterious conception of a highly imaginative editor. The first account dignifies woman as an important factor in the creation, equal in power and glory with man. The second makes her a mere afterthought. The world in good running order without her. The only reason for her advent being the solitude of man. There is something sublime in bringing order out of chaos; light out of darkness; giving each planet its place in the solar system; oceans and lands their limits; wholly inconsistent with a petty surgical operation, to find material for the mother of the, race. It is on this allegory that all the enemies of women rest, their battering rams, to prove her. inferiority. Accepting the view that man was prior in the creation, some Scriptural writers say that as the woman was of the man, therefore, her position should be one of subjection. Grant it, then as the historical fact is reversed in our day, and the man is now of the woman, shall his place be one of subjection? The equal position declared in the first account must prove more satisfactory to both sexes; created alike in the image of God -The Heavenly Mother and Father. Thus, the Old Testament, in the beginning, proclaims the simultaneous creation of man and woman, the eternity and equality of sex; and the New Testament echoes back through the centuries the individual sovereignty of woman growing out of this natural fact. Paul, in speaking of equality as the very soul and essence of Christianity, said, There is neither Jew nor Greek, there is neither bond nor free, there is neither male nor female; for ye are all one in Christ Jesus. With this recognition of the feminine element in the Godhead in the Old Testament, and this declaration of the equality of the sexes in the New, we may well wonder at the contemptible status woman occupies in the Christian Church of to-day. All the commentators and publicists writing on womans position, go through an immense amount of fine-spun metaphysical speculations, to prove her subordination in harmony with the Creators original design. It is evident that some wily writer, seeing the perfect equality of man and woman in the first chapter, felt it important for the dignity and dominion of man to effect womans subordination in some way. To do this a spirit of evil must be introduced, which at once proved itself stronger than the spirit of good, and mans supremacy was based on the downfall of all that had just been pronounced very good. This spirit of evil evidently existed before the supposed fall of man, hence woman was not the origin of sin as so often asserted. E. C. S.

Wednesday, November 6, 2019

ESL Curriculum Planning for Teaching English

ESL Curriculum Planning for Teaching English This curriculum plan for non-trained teachers of ESL/EFL focuses on building a program for your class or private students. The first part focuses on the basics of ESL. There are a few important aspects to always keep in mind while developing any curriculum, be it only a few lessons or a full course: Language skills need to be recycled many times before they are actively acquired.All language skills (reading, writing, speaking, and listening) should be involved in the learning process.Understanding grammar rules does not necessarily mean that a student can use that grammar, as students need to actively practice skills they are learning. Language Recycling An acquired language needs to be repeated in a various number of guises before it can be actively used by the student. Studies have shown that new linguistic functions need to be repeated at least six times before most learners can consider the new piece of language theirs. After six repetitions, the newly-acquired language skills are usually still only passively activated. The learner will require more repetitions before he or she will be able to use the skills actively in everyday conversation. Here is an example of language recycling using the present simple: Work on the present simple rules.Read an article about the daily routines of someone.Listen to someone who describes his or her daily tasks.Have a discussion asking him or her to describe what he or she does on a daily basis. Use All Four Skills Employing all four linguistic skills (reading, writing, listening, and speaking) when working through a lesson will help you recycle language during the lesson. Learning rules are important, but, in my opinion, practicing the language is even more important. Bringing all these aspects into a lesson will add variety to the lesson and help the learner pragmatically practice the language. Ive met many learners who can knock off a grammar sheet without a mistake and then  when asked, Could you describe your sister? they have problems. This is generally due to the emphasis in many school systems for learning grammar. Putting It All Together So, now you understand the basic tenets of teaching English effectively. You might be asking yourself the question what do I teach? When planning a course, most coursebooks build their curriculum around certain themes that help glue everything together. While this can be rather complicated, I would like to provide a simple example that develops the present simple and past simple. Use this type of outline to build your lesson and remember to provide a number of elements, including listening, reading, writing, and speaking. You will find that your lessons have a  purpose and specific objectives which are clearly definable, like helping you and your learners recognize the progress you are making. Who are you? What do you do? (Daily routines)A present simple example: What do you do? I work at Smiths. I get up at seven, etc.To be present example: Im married. Shes thirty-four.Descriptive adjectives example: I am tall. He is short.Tell me about your past. Where did you go on your last holiday?A past simple example: Where did you go on holiday when you were a child?To be past example: The weather was fantastic.Irregular verbs example: Go - went; Shine - shone Finally, the lesson generally will be divided into three principal sections. Introduction:  Introducing or reviewing grammar or function.Development: Taking that grammar and working on it in reading, listening, and other forms. This section should make up the bulk of your lesson and include a number of different activities, if possible.​Review: Review the principle concepts covered during the lesson. This can be very straightforward and either student or teacher-led, depending on the level of your learners.

Monday, November 4, 2019

Internal Auditing Case Study Example | Topics and Well Written Essays - 500 words

Internal Auditing - Case Study Example One of the internal control mechanisms that the organization failed to utilize optimally is preventive control. Preventing control in internal auditing is essential because it is the first barrier that protects the organization from risks that are detrimental to its performance, growth and financial stand. The principal risks are operating errors, technological malfunction, negative regulatory pronouncements such as unfair suspensions of employees, and fraud. In Krenik’s case, the risk that internal audit failed to stop was Fraud. Had there been a strong internal control, the organization would have developed a transparent payment system such as e payables systems that would have prevented fraud (Rezaee, 2002). Detective control plays a key role in spotting irregularities that have already happened within the organization. The aim of detective control is to develop necessary methodologies and tools that can easily spot errors and irregularity within the functional areas of the organization. In this internal auditing measure, internal auditors are useful when testing risky processes and procedures. In Krenik's case, the organization failed to detect fraud because it did not have an ardent detective control mechanism that would have detected financial malpractices and it took the intervention of the bank to detect the fraud. Failure to regularly reconcile financial documents between US Airforce and the supplier and inability to make appropriate and regular follow -up of payment procedures provided a loophole through which fraud occurred (Frigo, 2002). Corrective control in internal auditing assists in correcting irregularities and errors that have been spotted within the organization’s financial data and operations. In Krenik’s case, the corrective measures to prevent future frauds are developing strong preventive control measures such as prompt and through reconciliation of transactions with the suppliers, developing an electronic payment system that is efficient and fast, and conducting regular checks on financial statements’ information.

Friday, November 1, 2019

No Silver Bullet Essay Example | Topics and Well Written Essays - 500 words

No Silver Bullet - Essay Example nform, not because it is new in the market, or perceived by many to be the most conformable, but because conformation is based on other systems and interfaces, which cannot be, in any circumstances be simplified through redesign. Additionally, when software conforms to complexities and needs, there would be no cause of alarm with regards to changeability, complexity, and invisibility. Despite the fact that the functionality and availability of software components have rapidly increased the need for writing new code has not significantly reduced. As noted by Brooks (1995, p.12), acquiring and using off-the-shelf, open-source or commercial software components may be an easier and a cheaper way of software development, but, an issue of applicability arises. Software components are more generalized and as such may not be ideal in situations where the development of customized software is intended. Therefore, instead of relying on software components, developers are opting to write new code, since they believe that it would guarantee applicability of the software being developed. The need for writing new code has not reduced significantly because of the need to ensure that the software developed confirms with the complexities and needs of systems and institutions that the software will interact with. Software components, being more generalized may not guarantee confor mity, especially with regards to interfaces and functionality. Additionally, changeability is an essential property that defines the quality and value of software. Developing software that can easily be altered to suit functionality needs when needed and when appropriate has today become very important. Some software components may not allow for changeability and, as such, developers opt to write new code rather relying on components since they can easily manipulate and alter the code they have written quickly and easily. In additional to changeability, software components are becoming less popular

Wednesday, October 30, 2019

Business Management Techniques (Manage work activities) Essay

Business Management Techniques (Manage work activities) - Essay Example ining an organizations objectives, establishing an overall strategy for achieving those objectives, and developing a comprehensive chain of command of plans to integrate and coordinate activities. The plan of action is, at one and the same time, the result predicted, the line of action to be followed, the stages to go through and the methods to be used. Organizing is the translation of goals and objectives into a structure of responsibilities and authority. To organize a business is to provide it with everything useful to its functioning- raw material, tools, capital, personnel’ (Fayol, 53). In other words it includes the determination of what tasks are to be done, which has to do them, how the tasks are to be grouped, who reports to whom, and where decisions are to be made. The engineering organization, having been formed, must be set going and this is the mission of command. This insures a successful process of the organization. A manager in command - knows his people, understands all agreements binding the firm, sets a good example, uses a meeting to focus efforts in a single direction, does not become occupied in minute details, and instills unity, energy, initiative and loyalty in the employees. Harmonizing is to integrate the actions of all aspects of the firm in order to increase the efficiency of the organization. To harmonize is to co-ordinate all the activities of concern so as to facilitate its working, and its success. Control consists in confirming everything takes place in conformity with the plan implemented, the directions issued and principles established. It also points out weakness and errors in order to rectify then and prevent recurrence. Typical operations that could be subjected to control, measured in order to monitor progress, included: Business Engineering Organization usually use flat organizational structure where their is hierarchy of authority and becomes easy for supervision, their is segregation of duties and every