Wednesday, October 30, 2019

Genetically modified food Essay Example | Topics and Well Written Essays - 2000 words

Genetically modified food - Essay Example However, in the contemporary world, scientists have adopted complex measures by integrating the laboratory with breeding, and narrowing down to the building blocks of such attributes; the genes. As such, various methods of genetic modification, alteration, and improvement have developed organisms that are an improvement of the already existing organisms. The improvement is in terms of the rate of growth, resistance to more harsh conditions, and productivity. This has been integrated with food production, with the widespread of genetically modified foods. As much as such developments promote the wellbeing of individuals through reduction of food insecurity and increasing the nutrient density and shelf life of food, many fail to understand the ramifications that such technology holds. Different individuals hold different opinions regarding the genetically modified foods, with some arguing for it, while others against it. However, genetically modified food should be forbidden because it can break the ecological balance. Genetic modifications, also known as â€Å"genetic engineering† involves a deeper meaning than the phrase sounds. With reference to the word engineering, Rifkin suggests that it involves the application of the principles of engineering in life’s genetic blueprints. Rifkin goes further to explain such engineering principles in his article, â€Å"The Bio Tech Century†, as predictable outcomes, efficiency, quality control, quantifiable measurement standards, and utility (Rifkin 2). As such, genetically modified foods are edible plants and animals whose DNA has been altered in terms of the genetic framework to favor a certain sequence, through genetic engineering. Such alterations could be geared towards producing foods that are resistant to pests, grow rapidly, or have an improved nutrient profile. On the other hand, ecology involves the scientific

Monday, October 28, 2019

Tell Me About Blood Essay Example for Free

Tell Me About Blood Essay 1)What is the significance of a lower-than-normal hematocrit? What is the effect of a bacterial infection of the hematocrit? Can cause bleeding destruction of red blood cells causing sickle cell anemia and an enlarged spleen it can also cause decreased production of red blood cells which in turn can cause cancer and bone marrow suppression. Nutritional problems as well as over hydration are caused by lower-than-normal hematocrit levels. Bacterial infection may lower your hematocrit levels. 2)Compare the development of lymphocytes with the development of the other formed elements. Lymphocytes and other formed elements are developed from pluripotent stem cells. The pluripotent stem cells generate myeloid stem cells and lymphoid stem cells. Lymphoid stem cells begin development in the red bone marrow, but some are completed in the lymphatic tissue, where they give rise to lymphocytes. Myeloid stem cell begins and complete their development in the red bone marrow and give rise to red blood cells, platelets, basophils, monocytes, neutrophils, and eosinophils. 3)What is erythropoiesis? Which factors speed up and slow down erythropoiesis? Erythropoiesis is a process in which red blood cells are produced. It is stimulated by decreased O2 in circulation, which is detected by the kidneys which then secrete the hormone erythropoietin, increased level of physical activity can also cause an increase in erythropoiesis. It slows down when there is sufficient oxygen carrying capacity of the blood. 4)Explain what would happen if a person with type B blood were given a transfusion of type O blood. Nothing would happen type O is a universal donor. 5) References Li, W., Wang, J., Long, R., Su, G., Bukhory, D., Dai, J., Wang, Z. (2014). Novel Antibody against a Glutamic Acid-Rich Human Fibrinogen-Like Protein 2-Derived Peptide near Ser91 Inhibits hfgl2 Prothrombinase Activity. Plos ONE, 9(4), 1-13. doi:10.1371/journal.pone.0094551 Sreenivasamurthy, S. K., Dey, G., Ramu, M., Kumar, M., Gupta, M. K., Mohanty, A. K., Keshava Prasad, T. S. (2013). A compendium of molecules involved in vector-pathogen interactions pertaining to malaria. Malaria Journal, 12(1), 1-7. doi:10.1186/1475

Saturday, October 26, 2019

Comparing A Midsummers Nights Dream, King Richard II, and King Lear :: comparison compare contrast essays

Relation between Nature and Man in A Midsummer's Night's Dream, King Richard II, and King Lear  Ã‚        Ã‚  Ã‚   A Midsummer's Night's Dream, King Richard II, and King Lear all represent different philosophies people hold regarding the phenomenon of their lives. The relationships between humans and outside forces differ between the plays too. A Midsummer's Night's Dream emphasizes natures part in human life. It is seen as the driving force for everything good and bad. Divine decree is the emphasis in King Richard II. The characters all seem to have a general acceptance of outcomes as what the gods wanted. Lastly, King Lear has man viewing nature as destructive and angry. He wants to control nature's fury and decide for himself what should be acceptable and legitimate. While none of these philosophies can be labeled as "wrong" or "right", each does have valid support within the given play.    The first play, A Midsummer's Night's Dream has a lot of nature metaphor is in families. The very first conversation in it has a king blaming the moon and night time for his not being able to marry. Theseus wanted to marry Hippolita right away but four moonshines were delaying him. Another example comes from Lysander. He saw roses in Hermia's cheeks and rain falling from her unhappy eyes. When Lysander wakes up and sees Helena, He decides he wants her instead of Hermia. He says, " things growing are not ripe until their season . . . [which] leads me to your eyes" (MND II, 2,100-110). He compares himself to unripe fruit or something that has not reached its final or mature stage in growth. Lysander said that he only fancied Hermia because he was young and naà ¯ve but now that he was "ripe", he wanted Helena. This is a parallel made by Lysander to nature. Not only did he believe that nature controlled all actions but he truly believed everything followed the same life pattern. Later, Lysander is confronted by Hermia and he compares her to terrible things like animals and serpents because he no longer saw her as his love but as someone he outgrew. This reference shows a part of life that is not wonderful and pretty but loathsome and dirty.    Nature is obviously a very big part in the play too because of the continual reference and almost constant presence of the fairy King Oberon and his Queen Titania.

Thursday, October 24, 2019

A Millimeter Too Far: Metastatic Melanoma Essays -- Disease, Disorder

Summary Metastatic Melanoma is defined as the transformation of normal melanocytes due to unregulated growth factors involved in normal cell proliferation. Identifying the altered genes via mutation, deletion or amplification will enable us to find a treatment that is tailored to correct that particular gene. Introduction Melanoma determines skin pigmentation. Neural crest cells give rise to Melanocytes which transfer to the skin and hair follicles during embryonic progression. There are 5 phases in which melanoma develops, firstly nevus, then dysplastic nevus, next radial-growth phase, after that vertical growth phase and finally metastatic melanoma. The most important transition is RGP to VGP because this is where keratinocyte mediated growth control is lost, related with tumour thickness being a forecaster of metastatic melanoma. Risk factors are environmental and genetic; exposure to ultraviolet radiation causes melanocytes to produce melanin, which is taken up by keratinocytes and hereditary mutations create susceptibility to developing melanoma. Symptoms are small dark spot, with irregular borders or a change in an existing mole. However, tests such as skin biopsy are carried out to verify whether the mole is a tumour or not. At the early stage, melanoma is excised with low chance of it reoccurring, but with metastatic melanomas an aggressive form of treatment would be needed such as chemotherapy and radiotherapy. Protective clothing, sun screen and early detection prevent melanoma from developing. Genes Altered In Metastatic Melanoma The development of melanoma is the attainment of mutations in regulatory genes. Three pathways have been found to be deregulated in melanocytic tumours, including the RAS-RAF-MEK-ER... ...l autonomous growth: the Rb/E2F pathway. Cancer Metastasis Rev. 18 (3), 333-43. 5. Linley AJ, Mathieu MG, Miles AK, Rees RC, McArdle SE, Regad T. (2012). The helicase HAGE expressed by malignant melanoma-initiating cells is required for tumor cell proliferation In Vivo. The journal of biological chemistry. DOI: 10.1074/jbc.M111.308973. 6. Maelandsmo GM, Flà ¸renes VA, Hovig E, Oyjord T, Engebraaten O, Holm R, Bà ¸rresen AL, Fodstad O. (1996). Involvement of the pRb/p16/cdk4/cyclin D1 pathway in the tumorigenesis of sporadic malignant melanomas. Br J Cancer. 73 (8), 909-16. 7. Melnikova VO, Bolshakov SV, Walker C, Ananthaswamy HN. (2004). Genomic alterations in spontaneous and carcinogen-induced murine melanoma cell lines. Oncogene. 23 (13), 2347-56. 8. Pà ³pulo H, Lopes JM, Soares P. (2012). The mTOR Signalling Pathway in Human Cancer. Int J Mol Sci. 13 (2), 1886-918.

Wednesday, October 23, 2019

Skype Improvement

In todays devices and services world more and more people choose to use Skype from devices like smartphones and tablet PCs hat rely on battery power, that on average have less processing power than modern desktop computers, and that are not physically or permanently connected to the Internet. This shift in the way people use Skype has required to enhance Skype's P2P connectivity as well as conserving battery and processing power, while delivering even more of the functionality and reliability that our users expect.Skype clients will continue to evaluate bandwidth, connectivity and firewall settings to select the most appropriate path for the call and continue to connect devices for P2P calls across the Internet so that users get audio and video connections that ‘Just work. As Skype continue on this Journey, these new technologies are helping to drive improved battery life and improved connections making Skype as a whole more resilient and providing a platform for exciting new f eatures.Introducing new features Skype have to introduce exciting new features such as video messaging which lets you catch up whenever or wherever the users are, connecting the users with the special people in their life even when their schedules conflict. Skype should invest in ringing new Skype scenarios online, putting the people who matter most to the users Just a click away. For example, in Outlook. com the users are enabled to connect through Skype without leaving your browser.Improving registration and account security Skype should improve their sign-up, sign-in, and security features. Great new features such as two step verification, will bring additional security to the users. As Skype continue to their new secured communication platforms, such as Xbox, Microsoft account will mean that the users have Just one account to remember and an unlock communications with a growing community of over 700 million Microsoft account users worldwide.Improving Skype chats Skype users send billions of chat messages every month, and enhancing the performance and quality of this core messaging experience is one of the key improvements the Skype should highlight. The Skype cloud should add the ability to queue and deliver chat messages even if the intended recipient is offline – so you can be ‘always reachable' to the people who matter most. Skype also should broaden

Tuesday, October 22, 2019

mp3s essays

mp3s essays As we are approaching the 21st century communications is becoming a vital key in business and home computing. As a result we are constantly inventing new ways in order to make communications easier for the user to access in our daily lives. Therefore the information superhighway has sparred awareness in home technology or lack of home technology. The abbreviation MP3 stands for MPEG (Moving Picture Experts Group) layer 3, which is a standard format for storing compressed music. An MP3 file is an audio file that has been compressed (anywhere from 1/5th to 1/17th of its original size) without any noticeable loss in sound quality. That means a great sounding file, in a package small enough that it can be downloaded and/or stored on your PC (MP3 files can be identified by their file extension, .mp3.). The basic idea is that music digitized at CD quality has information that can be suppressed with little or no quality loss, as perceived by most people. Thanks to this and some mathematics, it is possible to compress a digitized track to about 8 percent of its original size, or a compression ratio of 12:1. This means that, while a regular music CD can contain about one hour of music (74 minutes, actually), a similar CD used to store mp3 files can contain almost 12 hours of music. MP3 is used particularly for music distribution over the Internet, but is also used for other purposes such as real-time digital audio transmissions over ISDN (used by reporters). How is it possible to do this you ask? Well, I won't get into the technical details, but basically the MP3 encoder removes the parts of the sound not audible to the human ear. This means that MP3 is a 'loss' type of compression (comparable to JPEG in the graphics area). This means that what comes out from your CD or Wave file is NOT the same thing that comes out of the MP3 that has been created from the CD/Wav. The sound data that has been lost will not be returned if the MP3 is...

Monday, October 21, 2019

Tips on How to Set College Goals

Tips on How to Set College Goals Having goals in college can be a great way to stay focused, motivate yourself, and keep your priorities in order when things get stressful and overwhelming. But just how can you set your college goals in a way that sets you up for success? Think About Your End Goals What kind of goals do you want to achieve during your time in school? These goals can be large (graduate in 4 years) or small (attend a study session for chemistry once a week for at least a month). But having a main goal in mind is the first, and perhaps most important step, in setting realistic goals. Be Specific With Your Goals Instead of Do better in Chemistry, set your goal as Earn at least a B in Chemistry this term. Or better yet: Study at least an hour a day, attend one group study session a week, and go to office hours once a week, all so that I can earn a B in Chemistry this term. Being as specific as possible while setting your goals can help make your goals as realistic as possible- meaning youll be more likely to achieve them. Be Realistic About Your Goals If you barely passed most of your classes last semester and are now on academic probation, setting a goal of earning a 4.0 next semester is probably unrealistic. Spend some time thinking about what makes sense for you as a learner, as a student, and as a person. If youre not a morning person, for example, setting the goal of waking up at 6:00 a.m. every morning to hit the gym is probably not realistic. But setting the goal of getting in a good workout after your Monday, Wednesday, and Friday afternoon Shakespeare class probably is. Similarly, if youve been struggling with your academics, set reasonable goals that focus on helping you make progress and improve in ways that seem reachable. Can you leap from a failing grade last semester to an A this semester? Probably not. But you can aim to improve to, say, at least a C if not a B-. Think About a Realistic Timeline Setting goals within a time frame will help you set deadlines for yourself. Set goals for a week, a month, a semester, each year (first-year, sophomore year, etc.), and graduation. Every goal you set for yourself, too, should have some kind of time frame attached. Otherwise, youll end up putting off what you need to do since theres no deadline by which you promised yourself youd reach your goal. Think About Your Personal and Intellectual Strengths Setting goals can be challenging for even the most driven, determined college students. If you set yourself up to do things that are a bit too challenging, however, you can end up setting yourself up for failure instead of for success. Spend some time thinking about your own personal and intellectual strengths. Use your strong organization skills, for example, to create a time management system so you stop pulling all-nighters every time you have a paper due. Or use your strong time management skills to figure out which co-curricular commitments you need to cut in order to focus more on your academics. In essence: use your strengths to find ways to overcome your weaknesses. Translate Your Strengths Into Details Using your strengths- which everyone has, so dont sell yourself short!- is the best way to get from idea to reality. When setting goals, then, use your strengths to make sure you: Have a plan and a way to get there. What is your goal? What specific things are you going to do to reach it? By when?Have a way to check your progress. How will you know if your goal is working? When will check in with yourself to see if youre making the smaller steps you need to take along the route to reaching your big goal?Have a way to hold yourself accountable. What will happen if you dont do what you promised yourself youd do? What will you change?Have a way to adapt to change. Inevitably, something will happen that will throw a wrench in your plans. So what will you do to adjust to change? Being too strict with your goals can be counterproductive, too, so make sure youre flexible.Have rewards built in along the way. Dont forget to reward yourself for reaching mini-goals along the way to reaching your big goals! Setting and working toward goals takes major work and dedication. Reward yourself to keep your motivation up and to, well, just be nice to yourself. Because who doesnt like a little recognition, right?

Sunday, October 20, 2019

Gods and Ducks †Get It Right

Gods and Ducks – Get It Right Gods and Ducks Get It Right Gods and Ducks Get It Right By Maeve Maddox Deus ex machina: from Mod.L. translation of Gk. theos ek mekhanes, lit. the god from the machina, the device by which gods were suspended over the stage in Gk. theaterOnline Etymology Dictionary. I heard an NPR reporter use this expression to refer to a character in the 2001 cult movie Donnie Darko. (Spoiler alert: stop reading now if you dont want to know the ending.) Anyone hearing the reporters use of the expression would have thought that it was just a fancy way of saying a supernatural force that saves someones life in a story. For those who, like me, never heard of Donnie Darko, heres the story according to a summary on IMDb: While sleepwalking, a troubled teenager named Donnie Darko meets Frank, a mysterious personage dressed in a diabolical bunny suit. That same night a jet engine crashes into the Darko house, destroying Donnies empty bedroom. Donnie feels that he was saved from death by Franks supernatural powers. At Franks instigation, Donnie commits several vicious acts of vandalism, but in the end, thanks to a time warp, Donnie is killed by the falling jet engine and the vicious acts remain undone. The NPR reporter called the man in the bunny suit a deus ex machina. Deus ex machina is a plot device. It is a character or an event introduced at the last minute to save a character or resolve the story. An author uses it because hes written himself into a corner. It is unexpected and does not arise from the logic of the story up to that point: The heros car is teetering at the edge of a cliff in a remote wilderness. The front wheels are over the abyss and the hero cant open the door to jump to safety. The hero can do nothing to save himself. Just then, out of the blue, a helpful stranger happens to drive up in a tow truck and pulls car and driver to safety. Thats deus ex machina. Donnies man in the bunny suit does appear suddenly and unexpectedly, but he doesnt resolve the story. According to the film summary, it was Donnies sleepwalking that saved him from being killed by the jet engine. Franks appearance begins a chain of events that advance the story. The plots resolution, however, arises from its internal logic and occurs when Donnie chooses to drive into the time tunnel. For some reason the reporters inexact use of deus ex machina reminded me of a political reporters misuse of the expression lame duck. After the November elections in 1996 I heard a reporter, also on NPR, refer to Bill Clinton as a lame duck President. In political terminology, a lame duck is a public official serving out his term after an election. The expression is a negative one, conveying the sense that, since the incumbent will soon be out of office, hes lost all power and influence. Clinton could have appropriately been referred to as a lame duck President after the 2000 elections, but not in 1996 when he was preparing for a second term. It could be argued that both usages described above are more or less correct, but with the vast vocabulary at their disposal, people who use words professionally can be more particular. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Expressions category, check our popular posts, or choose a related post below:85 Synonyms for â€Å"Help†Deck the HallsIs Your Novel "Mystery," "Thriller," or "Suspense"?

Saturday, October 19, 2019

Deception in Criminal Justice Term Paper Example | Topics and Well Written Essays - 1250 words

Deception in Criminal Justice - Term Paper Example But we can assume that criminal investigation might have started from the period of Adam itself. In any case, one thing is clear that the deception tactics also started along with the criminal investigation. Crime punishment is one of the core elements of criminal justice system along with giving suitable crime prevention programs. Despite of the severe punishments associated with crimes, the criminal behavior seems to be increasing in the current world. In other words the severity of punishments is not influencing the criminals much. This is purely because of the loopholes in criminal justice system procedures for the criminals to escape from punishments. No criminal wants to be punished for their criminal activities and they will try all type of tactics to influence the Investigative, Interrogative and Testimonial Processes. The criminal justice system is malicious in most of the countries because of the over influence of criminals on the criminal justice system. Deception can main ly occur at three levels of the crime detecting and punishment process; criminal investigation, interrogation and the testimonial process. Investigation of the criminal activities is mainly conducted by the crime investigation agencies like police. In many cases, the criminals are more influential than the police officers. They might have influences at the top levels of the political and judicial systems which controls the criminal justice system. Sometimes instead of the criminal, the investigating police officer will get punishment because of the higher influences of the criminals. Morality and ethical values are rapidly disappearing from most of the segments of human life and human profession and criminal justice system is also not an exception. In short, police officers are also human beings and they are also living in this corrupted world. Criminals can influence the investigating officer using bribes and

Friday, October 18, 2019

GE Global Coursework Example | Topics and Well Written Essays - 1750 words

GE Global - Coursework Example Though, the competitive advantage is tangible and many aspects of competitive advantage can be evaluated easily. In addition, competitive edge is the most important gauge for a business environment. Moreover, it is a significant aspect to maintain and achieve organizational success (Pietersen, 2012; Turban, Leidner, McLean, & Wetherbe, 2005). This paper outlines some of the major areas and aspects of GE Global Research Corporation for the assessment of its innovative capabilities. This paper also discusses that how this organization can achieve distinctive competence in the area of innovation. The basic aim of this research is to determine â€Å"how the company has bundled its technology resources to contribute to competitive advantage in its businesses. GE Global Research: An Overview GE Global Research is one of the world leading industrial research and analytical centers, which offers ground-breaking technology for all GE’s businesses. ... n is located in Niskayuna and New York along with three other corporate management and organizing multidisciplinary facilities in Shanghai (China), Bangalore (India) and Munich (Germany). Moreover, more than 2800 researchers are working at GE Global Research Corporation, with the purpose of bringing the next technological advancements that will transform the environment of GE businesses. Furthermore, GE Global Research Corporation possess a wide-ranging set of technology expertise varying from biosciences to computing, electronics to chemistry, materials to imaging, metallurgy to fluid mechanics and everything in between (General Electric Company, 2012). GE’s Deployment of Resources Attaining a competitive edge over other competitors and distinctive position in market and improving corporate performance in relation to their competitors are the major objectives that GE business especially wants to achieve. In this scenario, the competitive edge is an idea that turns out to be a main research area as far as strategic management is concerned. In order to strive successfully, organizational polices either locally or globally and standards must meet a long run policy as compared to policy formulation for a short term. Although this task is not simple to perform, in fact it requires ample efficiency, detailed overview or regulations and comprehensive analysis of policies. Thus, in an attempt to compete and maintain effectively, locally and internationally, GE businesses should not simply do extremely well in their area but as well continue in the long run. However, the accomplishment of such a â€Å"ground breaking and sustainable competitive advantage† and market position is not a possible without an appropriate road map or policy implementation. In addition, the

Strategic Business Environment Essay Example | Topics and Well Written Essays - 2500 words

Strategic Business Environment - Essay Example This essay declares that the mission of any organization is always in line with the culture and thus aligning strategies in line with these means that only consideration of internal factors. Not anything that has to undergo a thorough review is a plan for a competing market. Besides, it seeks to maintain the norms and the beliefs of the people. This paper makes a conclusion that a strategic drift results from choices made in the organization. Not only does strategic drifts distract the management from its path of success, but also result in a complete loss of momentum. Additionally, it can lead to the wastage of money, time and other valuable resources. Overall, it increases the overall cost of operation and may sometimes lead the firm away from achieving its competitive advantage. Though undesired in the current business world, numerous causes result in a strategic drift. Some of the causing factors include paradigms, organizational culture, the reactive nature of companies and unhealthful institutionalized patterns. Organizations need to study the market condition prior to the changes occurring in it. The proactive aspect of the operation is the only tool that can control strategic drift. Besides, for sound management practices, a critical analysis of the business environment is necessary. Strategy formulations should als o be in line with the ever-changing trends, and there is a need for movement from the traditions or culture of organizations to more realistic views of the world.

Thursday, October 17, 2019

Global strategy unit Essay Example | Topics and Well Written Essays - 3000 words

Global strategy unit - Essay Example The analysis ends which a brief understanding regarding what measures the company is require to undertake so as to enhance their market presence. Aldi is a global supermarkets chain, with their headquarters located in Essen, Germany. The company has approximately 8000 stores located in different nations of the world. Aldi’s stores were first opened in the year 1990 in the U.K. There are currently 512 Aldi stores located in the U.K. Aldi mainly sells food items and beverages. Majority of the products of the company are the less expensive household items and most of these products are Aldi’s own brand. In order to sustain competition, enhance sales and attract a larger target market, the company incorporates selling a number of branded items. The number or brands sold by Aldi in their electronics and kitchen appliance category have also enhanced in the recent times. The company also provides weekly and seasonal discounts on it more expensive category of products. Such discount items also includes clothes, flowers, toys and stationeries. Internationally the stores of Aldi are subdivided into two groups, Aldi Nord a nd Aldi Sud. The U.K chain of Aldi stores fall in the Aldi Sud Category. Over the years, successful business operation and suitable market strategies have facilitated Aldi into becoming one of the valuable retail chains globally. In the U.K the operations of the company are mainly based upon the limited assortment technique. According to this concept, high quality products are restricted to a small number of brands and categories, to be purchased in bulk and sold at competitive prices. Every business activity of the company is undertaken with the motive of creating savings. Discounts are usually seen to be passed on to the consumers through the end selling prices (Barney, 1991). The current project aims to analyse the corporate and business strategies of Aldi in the U.K and accordingly understand the viability of firm’s

The Impact of the Internet and Product Development Essay

The Impact of the Internet and Product Development - Essay Example Though the internet started its development journey in the 1960s it is only in the 1990s that commercializing of the same Started. This period between the 1990s and today saw massive a leap in the number of internet users, with the same reaching 2.2 billion in 20101. Founded in or around 1976, Apple Inc.s formative years were also the internets formative years hence the close association of the two as Apple Inc., is a growing computer hardware company, produced hardware that was used hand in hand with the internet. Their growth therefore coincided. When internet marketing became a common phenomenon the company took the earliest opportunity to market itself through the internet. The company has kept pace with the latter growth in terms of the number of customers and profitability and will continue to do so as the two are closely connected. The two billion people who get to visit the internet are able to learn about apple through its may advert in its website and other popular sites in cluding search engines. The marketing of the company is therefore personalized. The adverts have gone a long way to create and model the personalities and legacies of persons connected with apple such as its late icon, Steve Jobs3.  Internet marketing is largely responsible for Apple business success today. The third largest mobile phone producer in the world, Apple has placed over a billion adverts on the internet for the time it has been in operation4. As a result, Apple is the most admired company in the united states today. The company aims to maintain its high customer base and it is convinced it can do so through solely marketing its products on the internet. The company also aims to disburse information on its products as fast as possible and the same can only be effectively achieved through the internet.  

Wednesday, October 16, 2019

Global strategy unit Essay Example | Topics and Well Written Essays - 3000 words

Global strategy unit - Essay Example The analysis ends which a brief understanding regarding what measures the company is require to undertake so as to enhance their market presence. Aldi is a global supermarkets chain, with their headquarters located in Essen, Germany. The company has approximately 8000 stores located in different nations of the world. Aldi’s stores were first opened in the year 1990 in the U.K. There are currently 512 Aldi stores located in the U.K. Aldi mainly sells food items and beverages. Majority of the products of the company are the less expensive household items and most of these products are Aldi’s own brand. In order to sustain competition, enhance sales and attract a larger target market, the company incorporates selling a number of branded items. The number or brands sold by Aldi in their electronics and kitchen appliance category have also enhanced in the recent times. The company also provides weekly and seasonal discounts on it more expensive category of products. Such discount items also includes clothes, flowers, toys and stationeries. Internationally the stores of Aldi are subdivided into two groups, Aldi Nord a nd Aldi Sud. The U.K chain of Aldi stores fall in the Aldi Sud Category. Over the years, successful business operation and suitable market strategies have facilitated Aldi into becoming one of the valuable retail chains globally. In the U.K the operations of the company are mainly based upon the limited assortment technique. According to this concept, high quality products are restricted to a small number of brands and categories, to be purchased in bulk and sold at competitive prices. Every business activity of the company is undertaken with the motive of creating savings. Discounts are usually seen to be passed on to the consumers through the end selling prices (Barney, 1991). The current project aims to analyse the corporate and business strategies of Aldi in the U.K and accordingly understand the viability of firm’s

Tuesday, October 15, 2019

The Evolution of Six Sigma Research Paper Example | Topics and Well Written Essays - 1250 words

The Evolution of Six Sigma - Research Paper Example However, it means a quality measure that attempts for perfection by eliminating defects in any process (Terry, 2010). As different organizations interpret Six Sigma differently, its definition varies from organization to organization. These variations do not harm the main crux of the approach. At Motorola, Six Sigma is a â€Å"Metric, Methodology and a Management System while according to Six Sigma, it can be defined as three levels of â€Å"Metric, Methodology and Philosophy† (Terry, 2010). The main objective of this approach is â€Å"variation reduction and process improvement through the implementation of measurement-based strategy| (Montgomery & Woodall, 2008) by using Six Sigma improvement projects. Six Sigma’s statistical representation describes the performance of a process quantitatively. For a process to achieve Six Sigma, it should not have more than â€Å"3.4 defects per million opportunities; it has two sub methodologies namely DMAIC and DMADV that helps in achieving its objective† (Montgomery & Woodall, 2008). Six Sigma is an old concept that occupies an essential part in the history of management. The concept since its introduction has developed and improved over the years. This methodology’s evolution is an integral part of what it is today. Its evolution consists of different stages based on the phases of time and developments made in it. To understand the complete evolution process of Six Sigma, it is important to understand each stage. The different stages of evolution are: In the early 1970s, numerous US companies faced extensive loss of business and markets. These losses resulted in motivation for the use of statistical methods to improve quality and business procedure in general. The adoption and use of statistical methods helped US industries to regain their competitiveness in regards of quality. This all resulted in the emergence of numerous management systems

The resistance in a piece of wire Essay Example for Free

The resistance in a piece of wire Essay Also if the atoms in the material are more closely packed then the electrons will have more frequent collisions and the resistance will increase. I will use Nichrome only. 4 Density of wire- In a higher density wire there will be a higher resistance because there will be more fixed ions and more collisions. 5 Temperature of wire- If the wire is heated up the atoms in the wire will start to vibrate because of their increase in energy. This causes more collisions between the electrons and the atoms as the atoms are moving into the path of the electrons. This increase in collisions means that there will be an increase in resistance. 6 Shape of wire- the wire will be straight and taped to a meter rule, the shape of the wire may increase the resistance. 7 Voltage of 2 volts- I will have to keep a constant voltage because if the voltage changes then the resistance will change. The equation for resistance = voltage / current. If voltage increases, resistance increases. Apparatus The apparatus I will need to perform this experiment will be: 1 Power pack (2volts) 2 Ammeter 3 Voltmeter 4 6 wires 5 2 crocodile clips 6 Meter rule 7 Masking tape 8 Board marker Circuit diagram Method I have chosen to take a range of 10 lengths. I have chosen a range of 10 as to plot an accurate graph I will need at least 10 points to mark on the graph. The lengths that I have chosen are as follows: 10cm, 20cm, 30cm, 40 cm, 50cm, 60cm, 70cm, 80cm, 90cm and 100cm. I have chosen these lengths because the meter ruler can easily measure them and enough results to make a firm conclusion. To change the length of the Nichrome wire during the experiment I will tape down 1 meter of Nichrome 32 swg wire to a meter rule. I will then connect the 2 crocodile clips different distances apart using the measurements on the meter rule. The wire will be attached at X in the circuit. In my experiment I will find the current in the circuit using an ammeter and I will find the voltage in the wire using a voltmeter. I will take these two readings so I can then calculate the resistance using the equation resistance = voltage / current. I want to make my experiment as accurate as possible so I want to produce repeat readings so that I can find an average resistance. I will be using a variable resistor in my experiment to produce these repeat readings. I will draw 4 equally spaced points on the variable resistor with a board marker. To get my repeat readings I will move the variable resistor to these 4 points and get four readings for each length. After I have found the average resistance for each length of wire I will produce a graph showing the average resistance against the length of the wire. I will draw on my graph a line of best fit and then from this I will be able to see if my prediction was correct and if the resistance does increase when the length of wire increases. 1. Set up a circuit as shown above. Set the power pack at a constant voltage of 2 volts. 2. At X in the circuit the wire will be placed. I will first connect the crocodile clips 100cm apart. Then turn the voltmeter and ammeter on and ensure the variable resistor is set at the first point. 3. Now turn on the power pack and record the first results shown on the ammeter and voltmeter. I must take the first results because the results may change due to overheating if the power pack is left on. Now turn off the power pack. 4. To take my repeat reading of 100cm I will then move the slider on the variable resistor to the second marked point. I will now turn on the power pack and record the first result shown on the ammeter and voltmeter. 5. I will continue taking my repeat readings and moving the variable resistor along and recording the results for 100cm. 6. I will then change the length of wire to 90cm by moving the crocodile clips and i will set the variable resistor at the first point. Then I will turn on the power pack and record the first set of results. I will take 4 repeat readings for each length of Nichrome wire. 7. I will record 4 repeat readings for each length of Nichrome wire until I have results for all 10 lengths. Results table Length (cm) Repeat number Voltage (volts) Current (amps) Resistance (? ) Average 17. 82 I have put in bold any anomalous results. Analysing and considering evidence Conclusion From my graph I can tell that my prediction was correct. As the length increases the resistance increases, a piece of 20cm wire has a resistance of 3.8 ? and a piece of 30cm wire has a resistance of 5. 6 ?. This is because a longer piece of wire has a higher resistance because in a longer piece of wire there are more collisions between the electrons and the metal ions. In every successful collision energy is lost from the electron to the wire ions. The result is that the voltage of the wire increases. Because the equation for resistance is resistance = voltage / current, the resistance then increases. From my line of best I can also tell that as the length doubles the resistance always almost doubles too. A piece of 20cm wire has a resistance of 3.8 ? and a piece of 40cm wire has a resistance of 7. 4 ?. Double 3. 8 ? is 7. 6 ? this is almost double but not quite probably because my experiment was not quite accurate. A piece of wire 30cm long had a resistance of 5. 6 ? and a piece of wire 60cm long has a resistance of 11. 1 ?. This is also almost double, double 5. 6 ? is 11. 2 ?. The resistance doubles as the length doubles because there can be double the amount of successful collisions so double the amount of energy is lost causing the voltage to double and so the resistance doubles. Key Electron Metal ion Predicted results Length (cm)Predicted resistance ( ? ) Actual resistance ( ? ) Difference ( ? ) 1All of my results were quite close to my predicted results but as the length increases my predicted resistances become less accurate. This could have been for several reasons that are mentioned in my evaluation but probably as my experiment went on the wire overheated so my results became less accurate. Evaluating My method of collecting my results worked quite well. I gained the results I expected from my experiment. The quality of my evidence was good. My line of best fit went through almost all of my points on my graph and was quite similar to my predicted line of best. I did have some anomalous results. When I experimented with 10cm of Nichrome wire my fourth repeat readings was quite different to the other readings. It had a resistance 0. 87 ? that was the lowest repeat readings for 10cm. The second lowest was 1. 80 ? , this is quite a lot more than the anomalous result. When investigating which 30cm of Nichrome wire I had another anomalous result that was 6. 48 ? , the third repeat reading. This was the biggest repeat reading. The second largest was only 5. 89 ?. This could have been because:   I left the power pack on too long. This causes the wire to overheat.   When I was measuring the lengths of the Nichrome wire my measurements might have been slightly inaccurate. The rulers used might not have been exact and it was difficult to get an accurate reading of length by eye as the wire was not completely straight. Also the ruler may have been of different thicknesses throughout the length. This would have contributed as a slight error in my results.   The ammeter and voltmeter could have been slightly faulty and not given me correct, accurate readings. I connected the wire into the circuit using crocodile clips. These were quite loose and so this could have made my results less accurate. If I improved my method I could either attach the wires with tape but this may affect my results so instead I could solder the Nichrome wire into my circuit. It was difficult to adjust the variable resistor slider accurately only by eye. If I did the investigation again I could try to and adjust the variable resistor accurately I will use an advanced digital variable resistor.   I also found it difficult to measure exact lengths against the meter rule because the crocodile clips didnt clip on to the wire very securely. If I did the investigation again I could pre cut all the lengths of wire before the experiment instead of just connecting the crocodile clips at different distances apart on the meter rule. To further my investigation I could use the same method but increase the range of lengths. I could use lengths of up to 3 meters. I could take readings from lengths at smaller intervals; I could take reading every 5cm instead of every 10cm as I did. I could also take more repeat readings to get a even more accurate average. Show preview only The above preview is unformatted text This student written piece of work is one of many that can be found in our GCSE Electricity and Magnetism section.

Monday, October 14, 2019

Types of Cyber Crime and Strategies for Prevention

Types of Cyber Crime and Strategies for Prevention Crimes In cyber Age And Its Response By Indian Judiciary Table of abbrevaitions AIR All India Reporter AP Andhra Pradesh Art. Article Bom. Bombay ed. Edition Ltd. Limited. P. page number Pat. Patna SCC Supreme Court Cases SCR Supreme Court Reporter Sec. Section Crimes In cyber Age And Its Response By Indian Judiciary Introduction The advent of the third millennium has brought in an era of information society. The new era is the result of rapid changes brought about by the new technology and the cyber world. Obviously the information society offers vast scope and opportunities to human beings to identify information, to evaluate information, and to exchange information for the benefits of the citizens the world over. The in formation technology provides for a new environment, new work culture, new business links and trading networks. It allows information and knowledge based work to be located anywhere. It is virtually transforming and revolutionizing the world. The information technology is a double-edged sword, consistently presenting us with benefits and disadvantages. The increasing opportunities for productivities, efficiency and worldwide communications brought additional users in droves[1]. Today, the internet is a utility, analogous to the electric company and ‘.com has become a household expression. The reliability and availability of the internet are critical operational considerations. Activities that threaten these attributes like spamming, spoofing, etc, have grave impacts on its user community. Any illegal act, for which knowledge of computer technology is essential for its perpetration, investigation, or prosecution, is known as cyber crime. Among the various problems emerging out of the internet are the menace of hackers, cyber terrorism, spamming, Trojan horse attacks, denial of service attacks, pornography, cyber stalking etc. Through this paper the researcher will try to study the problem of cyber stalking, cyber defamation, various types of data theft and the laws relating to it. An effort will also be made to recommend some suggestions to fight these dangerous problems, with the response of Indian judiciary to it. Cyber staking Cyber stalking, has been defined as the use of electronic communication including, pagers, cell phones, emails and the internet, to bully, threaten, harass, and intimidate a victim. Moreover, it can also be defined as nothing less than emotional terrorism.[2] Cyber stalking can take many forms. However, Ellison (1999) suggests, cyber stalking can be classified by the type of electronic communication used to stalk the victim and the extent to which the communication is private or public. Ellison (1999) has classified cyber stalking as either ‘direct or ‘indirect. For example, ‘direct cyber stalking includes the use of pagers, cell phones and the email to send messages of hate, obscenities and threats, to intimidate a victim. Direct cyber stalking has been reported to be the most common form of cyber stalking with a close resemblance to offline stalking (Wallace, 2000). Why people do it? Generally, to be defined as stalking the behaviour must be unwanted and intrusive. Another important point is that the stalker must also have an intense preoccupation with the victim. The range of behaviour involved in stalking can be broadly grouped in three categories. Firstly, there is following, which includes frequenting workplaces and homes, maintaining surveillance, and engineering â€Å"coincidences.† Secondly, there is communicating—by phone, letters, cards, graffiti, gifts, and, Increasingly, electronic mail and the internet (â€Å"cyber stalking†).Often the stalker will order goods and services on the victims behalf. Finally comes aggression or violence, in which stalkers threaten their victims, harass their families, damage their property, make false accusations about them, and cause sexual or physical injury. Sexual attractions and motives are other very important reasons for cyberstalking. In USA, the federal law enforcement agencies have encountered numerous instances in which adult paedophiles have made contact with minors through online chat rooms, established a relationship with the child, and later made contact for the purpose of engaging in criminal sexual activities.[3] Nature of cyber staking The nature of cyber stalking is ascertains by the medium which is used for its execution. According to †¦ cyber stalking had been classified into four kinds[4] a) E-mail stalking b) Chat stalking c) Bulletin board systems d) Computer stalking. Email stalking Electronic mail is an electronic postal service that allows individuals to send and receives information in matter of seconds. This sophisticated use of telephone lines allows communication between two people who may or may not know each other but can ‘speak to each other using a computer. In general Email is an insecure method of transmitting information or messages. Everyone who receives an email from a person has access to that persons email id. With some online services as AOL, a persons screen name is also an email address. In addition, when a person posts an item on a newsgroup, that pesons email id may be available to anyone who reads that item. It is unsurprising, then, that email is a favoured medium for cyber stalkers. Technologically sophisticated email harassers send ‘mail bombs, filling a persons inbox with hundreds or even thousands of unwanted mails in the hope of making the account useless. Others send electronic viruses that can infect the victims files.[5] Chat stalking A chat room is a connection provided by online services and available on the internet that allows people to communicate in real time via computer text and modem. Cyber stalkers can use chat rooms to slander and endanger their victims. In such cases the Cyber stalking takes on a public rather than a private dimension. As live chat has become more popular amongst users of the internet with tools such as internet relay chat (IRC), it has also become more popular as a medium through which stalkers can identify and pursue their prey. When a person enters a chat room, his screen name joins the list of names of others in the group. Depending on the nature of the chat software, that person can address others in the room and vise versa as a part of the group discussing from a smaller group in a private chat room or send private, one to one instant messages to others anytime.[6] During ‘chat, participants type instant messages directly to the computer screens of other participants. When a person posts a message to a public news group this is available for anyone to view copy and store. In addition, a persons name, email address and information about the service provider are easily available for inspection as a part of the message itself. Thus, on the internet, public messages can be accessed by anyone anytime- even years after the message were originally written. In IRC, the harasser may chose to interrupt a persons chat electronically or otherwise target a chat system, making it impossible for someone to carry on a conversation with anyone else. The Cyberstalker can engage in live chat harassment or abuse of the victim( otherwise known as ‘flaming) or he/she may leave improper message o the message board or in chat rooms for or about the victim. Bulletin board systems A bulletin board system (BBS) is a local computer that can be called directly with a modem[7]. Usually they are privately operated and offer various services depending on the owner and the users. A bulletin board allows leaving messages in group forums to be read at a later time. Often a BBS is not connected to a network of other computers, but increasingly BBSs are offering internet access and co Cyber stalkers area using bulletin boards to harass their victims.[8] Online have been known to known to post insulting messages on electronic bulletin boards signed with email addresses of the person being harassed. The Cyber stalker can also post statements about the victims or start rumours which spread through the BBS. In addition a Cyber stalker can ‘dupe another internet users into harassing or threatening a victim by posting a controversial or enticing message on the board under the name , phone numbers or email address of the victim, resulting in subsequent responses being sent to the victim.[9] Computer stalking With computer stalking, cyber stalker exploits the internet and the windows operating system in order to assume control over the computer of the targeted victim. An individual ‘windows based computer connected to the internet can be identified, allowing the online stalker to exercise control over the computer of the victim. A cyber stalker can communicate directly with his or her target as soon as the target computer connects to the internet. The stalker can also assume control over the victims computer and the only defensive option for the victim is to disconnect and relinquish his or her current internet address.[10] An example of this kind of cyber stalking was the case of a woman who received a message stating ‘ Im going to get you. The cyber stalker then opened the womans CD-ROM drive in order to prove that he had control over her computer. cyberstalking trends and statistics offenders Previous studies that have investigated stalking offenders by and large, have focused on the offline stalking offender Regardless for the offenders group such as ‘simple, ‘love or ‘erotomanic statistics reports, male offenders to account for the majority of offline stalking offenders. Working to Halt Online Abuse (2000) statistics also support the gender ratio of offenders claiming, 68% of online harassers/cyber stalkers are male. Furthermore, common social and psychological factors have been found within offline stalking offender population. For example, social factors such as the diversity in socio-economic backgrounds and either underemployment or unemployment have been found significant factors in offline stalking offenders[11]. In a research done on young stalkers between 9 and 18 years of age little difference was found between young and adult offline stalking offenders. For example, the majority of offenders were male, had some form of previous relationship with the victim and experienced social isolation.[12] Victims Currently, there are limited studies on the victims of cyber stalking. Although, anyone has the potential to become a victim of offline stalking or cyber stalking, several factors can increase the statistical likelihood of becoming a victim. Studies[13] that have investigated offenders of offline stalking, have found some common factors within the selection of victims. For example, contrary to public belief, a large proportion of stalking victims are regular people rather than the rich and famous. Goode claimed[14], up to 80% of offline stalking victims are from average socio-economic backgrounds. In addition, the statistical likelihood of becoming a victim increases with gender. Working to Halt Online Abuse (2000) reports, 87% of online harassment/cyber stalking victims are female. However, victim gender statistics may not represent true victims, as females are more likely to report being a victim of online harassment/cyber stalking than males. Although studies have shown that the majority of victims are female of average socio-economic status, studies have also shown that offline stalking is primarily a crime against young people, with most victims between the age of 18 and 29.[15] Stalking as a crime against young people may account for the high prevalence of cyber stalking victims within universities. For example, the University of Cincinnati study showed, 25% of college women had been cyber stalked.[16]. Nevertheless, previous relationships have been shown to increase the likelihood of being stalked offline. For example, it was reported, 65% offline victims had a previous relationship with the stalker[17]. Although studies of offline stalking claim the majority of victims have had a previous relationship with the stalker Working to Halt Online Abuse Statistics[18] fails to support a previous relationship as a significant risk factor, for online harassment/cyber stalking. For example, 53% of victims had no prior relationship with the offender. Therefore, the risk factor of a prior relationship with the stalker may not be as an important factor in cyber stalking, as it is in offline stalking. Psychological effects of cyberstalking Currently, there are few studies on the psychological impact on victims. However, Westrup[19]studied the psychological effects of 232 female offline stalking victims. He found out that the majority of victims had symptoms of PTSD, depression, anxiety and experienced panic attacks. Additionally, it was found that 20% of victims increased alcohol consumption and 74% of victims suffered sleep disturbances[20]. Nevertheless, social and psychological effects of offline stalking cannot be separated as social effects can impact on psychological effects and psychological effects can impact on the social effects. Although the majority of studies have focused on the offline stalking victims, there is no evidence to suggest that cyber stalking is any less of an experience than offline stalking (Minister for Justice and Customs, 2000), As shown, there are many common themes between offline stalking and cyber stalking. For example, offenders are most likely to be male and offline stalking or cyber stalking is the response to a failed (offline/online) relationship. Additionally, young females account for the majority of victims. Furthermore, victims experience significant social and psychological effects from offline stalking or cyber stalking.[21] Legal responses to cyberstalking Cyber stalking is are a relatively new phenomenon and many countries are only now beginning to address the problem. India has also witnessed cases of cyber stalking, cyber harassment and cyber defamation. However, as there is no specific law or provision under the IT Act, a number of these cases are either not registered or are registered under the existing provisions of Indian Penal Code—which are ineffective and do not cover the said cyber crimes.[22] Since its promulgation, the IT Act 2000 has undergone some changes. One big change is the recognition of electronic documents as evidence in a court of law. Market players believe this will go a long way in giving encouragement to electronic fund transfers and promoting electronic commerce in the country. However, all hope is not lost as the cyber crime cell is conducting training programmes for its forces. It also has plans to organize special courses for corporate to combat cyber crime and use the IT Act effectively. Cyber defamation Defamation can be understood as the intentional infringement of another persons right to his good name. It is the wrongful and intentional publication of words or behavior concerning another person, which has the effect of injuring that persons status, good name, or reputation in society. It is not defamatory to make a critical statement that does not have a tendency to cause damage, even if the statement turns out to be untrue[23]. In this case a claim for malicious falsehood[24] may be raised. Another key feature of the Internet is that users do not have to reveal their identity in order to send e-mail or post messages on bulletin boards. Users are able to communicate and make such postings anonymously or under assumed names. This feature, coupled with the ability to access the internet in privacy and seclusion of ones own home or office and the interactive, responsive nature of communications on the Internet, has resulted in users being far less inhibited about the contents of their messages resulting in cyber space becoming excessively prone to defamation. What is defamatory? As to what is defamatory; Permiter v. Coupland[25] and Youssoupoff v. Metro Goldwyn Mayer Pictures Ltd[26] lay down that it is a publication without justification or lawful excuse, which is calculated to (meaning â€Å"likely to†) injure the reputation of another by exposing him to â€Å"hatred, contempt, or ridicule†[27] and make the claimant â€Å"shunned and avoided†. Then in Sim v. Stretch[28] the definition was widened to include the test whether the words tend to lower the plaintiff in the estimation of the right-thinking members of society in general. A persons good name can only be damaged if maligning statements are made to someone other than that person; that is, the defamatory statement must be disclosed to a third person, thereby satisfying the requirement of publication. Thus the law of defamation places a heavy burden on the defendant. All that a plaintiff has to prove, in a defamation action, is the publication of defamatory matter. The onus then lies on the defendant to prove innocence. In essence, the law on defamation attempts to create a workable balance between two equally important human rights: The right to an unimpaired reputation and the right to freedom of expression. In a cyber society, both these interests are increasingly important. Protection of reputation is arguably even more important in a highly technological society, since one may not even encounter an individual or organization other than through the medium of the Internet. Jurisdiction It is a fact that the tried and true real world legal principles do not apply in the digital generation. Even seemingly ubiquitous, time honoured principles must be examined, including whether a court has the power to exercise jurisdiction over a defendant because of the defendants ties to or use of the Internet or Internet related technologies. This jurisdictional rethinking requires us to address the concept that involves the right of the sovereign to exert its power and control over people or entities that use the Internet One of the complexities of the Internet is the fact that Internet communications are very different than telephone communications. The telephone communication system is based on circuit-switching technology, where a dedicated line is allocated for transmission of the entire message between the parties to the communication. A dedicated line, on the other hand, does not accomplish Internet communications. A message sent from an Internet user in India may travel via one or more other countries before reaching a recipient who is also sitting at a computer in India. Therefore, the lack of a physically tangible location and the reality that any Internet communication may travel through multiple jurisdictions creates a variety of complex jurisdictional problems[29]. Position in india Cases of cyber defamation do not fit neatly in the accepted categories of crimes. They represent harm of greater magnitude than the traditional crimes and of a nature different from them. Unlike the traditional crimes, they are not in the shape of positive aggressions or invasions[30]. They may not result in direct or immediate injury; nevertheless, they create a danger, which the law must seek to minimize. Hence, if legislation applicable to such offences, as a matter of policy, departs from legislation applicable to ordinary crimes, in respect of the traditional requirements as to mens rea and the other substantive matters, as well as on points of procedure, the departure would be justified[31] An effort is still wanted to formulate an international law on the use of Internet to curb this imminent danger of cyber crimes and to achieve a crime free cyber space. Defamation laws should be sufficiently flexible to apply to all media. The difficulty is that the defamation laws world over were principally framed at a time when most defamatory publications were either spoken or the product of unsophisticated printing. We do need a stronger legal enforcement regime in India to combat the increasing cyber crimes or in other words, efficacy in dispensation of justice will be instrumental in curtailing such activities. The position in Indian law is not very clear and amendments should be brought to Section 67 of the Information Technology Act, 2000[32] and also to Section 499 of the Indian Penal Code[33], by expressly bring within their ambit offences such as defamation in cyber space, which is certainly a socio-economic offence. Internet Banking Fraud The concept of internet banking was introduced to facilitate the depositors to have access to their financial undertakings globally. But every good thing has its own demerits; the introduction of this system was coupled by a number of fraud incidents in which the money of depositors was embezzled by the net swindlers popularly known as hackers.[34] Digital Extortion For any company doing business on the Internet, its the sound of doom: a computer voice warning of an inbound attack. Call it a cyber-shakedown: A hacker threatens to shut down a companys Web page, unless the business pays up.[35] Digital Extortion can be defined as, â€Å"Illegally penetrating through the system of an enterprise and then compelling it to pay substantial amounts in lieu of their secret data or to save their system from being wiped out by the hackers.† In a recent incident, Security researchers at Websense were trying to learn why a clients files were scrambled when they found a note demanding $200 for the electronic key to the files. The money was to be sent to an online payment service. The data was recovered without paying the ransom, but experts are worried that more sophisticated attacks could be more serious.[36] Credit Card Frauds Credit Card popularly known as plastic money has came up as a panacea for the troubles of carrying huge amount of money in the pocket. The credit card embodies two essential aspects of the basic banking functions: the transmission of payments and the granting of credit. But again the usage of this technology has brought in new forms of crimes with the fraudsters employing entirely new technologies to manipulate this technology for their illegal economic gains because unlike paper money, it was not anonymous and the usage of credit card can be traced. The Indian Legal Response to Data Theft Related Cyber Crimes In the past few years, India has emerged as a leader in information technology. Also, there has been an explosion of the BPO industry in India, an industry which is based primarily on IT[37], an industry where there is a huge risk of data theft since the business primarily is based on huge amounts of sensitive data of the customers. The numbers of computer literates have also grown at a rapid pace. The prices of computers and other peripherals have slashed drastically. Dial-up and Broadband connections, both are found and are easily accessed at cheap rates. All this has resulted in making the middle-class in India computer literate as well. Hence, as a result of all these developments, the Indian Parliament enacted the Information Technology Act, 2000. The researchers will discuss some of the remedies provided for in brief and has also provided certain suggestions as to where the act can be amended. 1) Penalty for Tampering with Computer Files As discussed already, Industrial espionage may also include tampering with the computer files to slow down the system or corrupt databases. Section 65 of the Act defines this sort of offence and prescribes an imprisonment of 3 years or fine extending to two lakh rupees. 2) Penalty for Hacking This also relates to data theft and industrial espionage. Hacking is where a person hacks into a computer resource and in any way destroys, deletes or alters any information is to be punished with an imprisonment of up to three years or a fine extending up to two lakh rupees. For this the requirement of mens rea, i.e. metal element is required. 3) Penalty for Damage of Computer, Computer System, etc. This is the section which can be said to deal directly with data spying. Section 43 says that whosoever without the permission of the owner accesses any computer ,downloads, copies or extracts any data, computer data base or such information is liable to pay compensation not exceeding rupees one crore. It takes care of all the possibilities arising out of such situations. In this case the condition of mens rea is not required, i.e. this section imposes a strict liability on every unauthorized access. 4) Penalty for breach of Confidentiality and Privacy Now, this section seeks to bring to the book people who secure access to any electronic record etc. and without the consent of the person concerned disclose the information to a third party. Shortcomings of the Act: * No steps to combat Internet Piracy- There is absolutely no legislation to combat the menace of piracy which has India firmly in its iron grip .As discussed by the researchers above India is one of the countries where there is rampant violation of copyrights. Pirates sell copyrighted material openly, on the streets, yet nothing can be done about it. * Power of Police To Search Limited to Public Places-Police officers can search public places and arrest any person having committed a cyber crime but it is seldom that such crime takes place in the open. Hence, the police have been limited in its powers by the act. * Issue of Privacy and Surveillance-There is no legislation that protects the citizens from having their physical features being examined and the details stored without their consent. When biometric systems gain currency in India the old argument of Privacy v. Security will have to be waged as it has been waged in the US. As we have seen, there are various aspects of data theft, not only the conventional one, though that remains one of the most well-known ways of data-theft, i.e. data spying .In todays world there is no one way of defining data. Data can still be in the form of a spreadsheet and also you can call information about a person including his physical features, which if they fall into the wrong hands can cause identity theft and can be used in various other ways to commit crime. The companies should monitor their employees, before hiring their employees and after hiring them. Employees should be given incentives and good salaries so that they resist the temptation to give away information to rival companies. Since it is a capitalistic system, competition will always remain, and companies will sink to unfair competition. Hence, unfair practices will always exist, and to minimize those companies should take all precautions necessary. As far as the laws concerning internet piracies go, not only in India, but the entire world needs better and more stringent laws that protect the copyright of intellectual property and stop the rampant copyright violation that has engulfed the whole world. Copyright laws need to be strengthened or else creativity will suffer since the artistes or investors will have no incentive. The music, film and publishing industry have all suffered heavily, to the tune of billions. India, also, needs more legislation, and most importantly of all, it needs to find ways to implement the existing laws, for example giving the police powers to search private places in case of suspicion of cyber crime. The definition of hacking needs to be modified and narrowed, since in the existing legislation the definition includes too many unnecessary acts. A lot of work regarding the use of biometric technology has to be done. The problem which the US face now (as has been discussed above) is the problem which is going to arise now, in India. Though biometric technology is definitely the way to go in view of the increased risk of terrorist attacks all around the globe, but there are serious issues of, not only violation of privacy, but also that of data theft, not only by criminals, but by the state itself Challenges of information technology to existing legal regime The impact of Internet on the existing legal regime can be well appreciated by the fact that the US Congress had introduced more than 50 bills pertaining to Internet and e- commerce, in the first three months of 1999 alone.[38] The issues, which need to be addressed urgently, are security of transactions, privacy, property, protection of children against an easy access to inappropriate content, jurisdiction, and validity of contracts, Procedural rules of evidence and other host of issues. Constitutional issues The issues raised by the advent of the Internet relevant to the constitutional lawyers are freedom of speech and privacy. The questions regarding the freedom of speech, which need to be answered, are: 1. Is publication, of information on the Internet equivalent to the speech and expression made by an ascertained person in real space within the political boundaries? 2. If it amounts to speech and expression should it be then regulated? 3. If it is to be regulated, should it enjoy the freedom available to press and thus subject to restrictions of article 19(2) or be treated as broadcast media, which is subject to governmental regulations? 4. Should we consider Internet a different media unparallel with the traditionally known and have to come up with different legal regime? In the developed world, a record bank is created in which individuals record image is stored. This record image is based on the information collected from different sources pertaining to an individual who remains unaware of the method, process and sources of record image[39].This record image has far reaching implications for an individual who may apply for insurance, medical care, credit and employment benefits.[40] The government also maintains electronic files, which contain sensitive information. This information is shared among the government agencies, private organisations and between the government and private sector, which in fact is facilitated by the technology itself. There is a possibility that the data collected from different sources to prepare a profile is outdated, inaccurate or out rightly false. Translating information to make it computer readable further compounds the problem. This increases the possibility of inaccuracies. Thus the objection is not that the inform ation has been collected with the knowledge of the concerned person, but the objection lies in the fact that an inaccurate information has been collected which will be repeatedly used to evaluate character, reputation, employment chances and credit worthiness of an individual who was not given chance to go through the information before it is finally stored, nor does he know the source where from the information has been collected. The Supreme Court of India has found article 21 flexible enough to encompass right to privacy within its fold. In Peoples Union for Civil Liberties v. Union of India[41] the apex court held the right to privacy a fundamental right. The apex court reminded that this right has its genesis in international instruments more particularly in articles 17[42]and 12[43] of the international Covenant on Civil and Political Rights, 1948, respectively to which India is a signatory and has to respect these instruments as they in no way infringe the domestic laws.[44] There are no two opinions about the fact that the Internet is going to be on central stage in future where an individual cannot be even in a take it or leave it situation. Its pervasiveness, speed and efficiency will provide little scope t

Sunday, October 13, 2019

Growing Up in I Stand Here Ironing Essay -- American Literature Tillie

Growing up The oppression of women by society has never been a secret. Many times it has been documented in works of literature, and one classical example of this occurrence is "I Stand Here Ironing" by Tillie Olsen. This story illustrates the consequences of oppression in women's lives. The story leads the reader on an exploratory journey to witness the neglect by Emily's extremely guilty mother. This is described by the children's cry when they are left with strangers, lacking attention and love due to the fact she is a single parent at a time where this was not commonly accepted in the community, causing a lot of emotional distress. The mother's pain and torment is apparent from the very beginning of the story. Her realization that she could have been a better mother, had it not been for the circumstances and life events which occurred following Emily's birth, such as the father who dealt with his parental responsibility by leaving - "Her father left me before she was a year old. I had to work her first six years when there was work, or I sent her home and to his relatives" (Olsen, 373). The mother does, however, continually "shift" back and forth, as the metaphor of "ironing" implies, to invoke pity from the reader and explain that there were other people, and factors which played a significant role in Emily's upbringing. Purposely organized in a non chronological way, it illustrates the shifting, which is the passing back and forth of Emily emotionally (allowing the nursery, school teacher, and hospital staff play the primary care giver) and physically (the baby-sitter, the father's family, etc) distress. Emily's mother seems to be constantly blaming her troubles and circumstances for the less than adequate ... ...one or more of the five senses of the reader. In this short story, the author uses literal language to call up a mental picture in the reader's mind. In the last line of Emily's story her mother says, "Only help Emily to know... that she is more than this dress on the ironing board, helpless before the iron" (Olsen, 373). The image, ironing a dress, compares to actually raising a child. The dress represents the child, the iron is the child's parents and society, and the ironing board is their expectations. The theme this image conveys is that children grow up to become individuals as a result of their interaction with their parents and society, their experiences, and their own insight, not simply being "ironed" in to society's preconceived model. Work Cited Olsen, Tillie. "I Stand Here Ironing." The Story and It’s Writer. Ed. Ann Charters. Boston: Bedford, 1999.

Saturday, October 12, 2019

Assessment of Mathematical Understanding Especially as it Relates to CMP :: Education Educational Papers

Assessment of Mathematical Understanding Especially as it Relates to CMP Introduction Assessment has become a very â€Å"hot† topic in education circles lately. Or at least, it is talked about more often and with more passion. Teachers are being judged on their students’ performance, based on assessment scores. It is the assessment by which we are judged. The reauthorization of ESEA and the ‘No Child Left Behind’ act shows the public’s (or is it the politician’s?) faith in standardized tests as a school improvement instrument. But I also know that the once-a-year test can not provide continuous information about student achievement. The traditional assessments of computation exercises, short answer questions, and word problems will not suffice any more. Typically, standardized tests measure factual knowledge, not conceptual understanding. I believe that conceptual understanding is not only what students know, but what they can do with what they know. Assessments are varied from teacher to teacher, district to district, and state to state. I did an informal survey with some of my colleagues, asking them their reasons for assessing students, and the results varied greatly. I am interested in assessment and alternative assessments in order to help further my students’ understanding of mathematical concepts. I strongly believe that the purpose of assessment to inform my instruction, which in turn will further my students understanding. Background According to the National Council of Teachers of Mathematics Principles and Standards 2000 Assessment Principle, â€Å"assessment should support the learning of important mathematics and furnish useful information to both teachers and students.† Assessment should be designed to â€Å"maximize student learning† and â€Å"support the learning of important mathematics and furnish useful information to both teachers and students.† The National Education Association suggests that assessment is a â€Å"continuous flow of evidence that can only be provided by classroom assessment.† (NEA, 2003) Balanced assessments can actually promote student learning and achievement. â€Å"To maximize student success, assessment must be seen as an instructional tool for use while learning is occurring, and as an accountability tool to determine if learning has occurred.† (NEA, 2003) The 1995 NCTM Standards acknowledged that assessment should: 1. Reflect the mathematics that students show they know and what they are able to do. 2. Enhance mathematics learning. 3. Promote equity. 4. Be an open process. 5. Promote valid inference. 6. Be a coherent process. The Assessment Model from NCTM (2000) includes four phases of the assessment process includes planning, gathering, interpreting, and using data. The table below shows how each phase influences the next.

Friday, October 11, 2019

Ebay’s Strategy in China: Alliance or Acquisition Essay

In December 2006, eBay Inc., a US company that offered e-commerce, e-payments and internet communication services globally, announced its plan to form a joint venture with China-based online portal and wireless operator, TOM Online, in which eBay would have 49% ownership.1 The move reflected the increasing difficulties foreign internet companies were facing in their attempts to snatch a share of the Chinese market amid fierce competition and a changing market environment. eBay first set foot in China in 2002 by acquiring 33% interest in EachNet—a domestic online auction company, followed by a full acquisition in 2003.2,3 In 2005, eBay acquired Skype4 to expand into the online communication sector. While Skype was a wholly owned subsidiary of eBay globally, it operated indirectly in China via a joint venture with TOM Online. Due to this existing relationship between the two companies,5 TOM Online seemed to be a natural choice of partner for eBay’s subsequent decision with regards to its online marketplace business. Recognising TOM Online’s local knowledge and political connections, eBay believed that a joint venture would benefit its failing business in China and help the company further develop its Chinese market.6 Some analysts questioned whether political connections alone were the answer and suggested that eBay focus on its product and service offerings.7 1 Vara, V. and Chao, L. (20 December 2006) â€Å"EBay’s China retreat highlights a tough market†, Wall Street Journal. eBay (Date Unknown) â€Å"eBay and EachNet Team Up in China†, Press Release, http://investor.ebay.com/releasedetail.cfm?ReleaseID=74802 (accessed 27 April 2007). 3 After the full acquisition in 2003, eBay operated under the name of eBay EachNet. 4 Skype is a peer-to-peer software program that allows people to make free calls over the internet to anyone who also subscribes to this service. Skype provided peer-to-peer internet telephony service—ie, instant messaging and online telephone service. In 2005, eBay acquired 49% stake in Skype China, with TOM Online owning the rest. Source: Schwankert, S. (20 December 2006) â€Å"EBay to replace Chinese auction site with JV†, ITworld.com, http://www.itworld.com/Tech/2403/061220ebay/ (accessed 27 April 2007). 6 Bradsher, K. (22 December 2006) â€Å"With TOM Online, eBay gains Chinese clout†, International Herald Tribute. 7 Rein, S. (24 December 2006) â€Å"TOM Online Must Focus on Products: Connections Don’t Ensure Success†, SeekingAlpha, http://china.seekingalpha.com/article/22946 (accessed 20 June 2007). 2 Isabella Chan prepared this case under the supervision of Prof. Zhigang Tao and Dr Jiangyong Lu for class discussion. This case is not intended to show effective or ineffective handling of decision or business processes. This research was partially supported by a grant from the University Grants Committee of the Hong Kong Special Administrative Region, China (Project No. AoE/H-05/99).

Thursday, October 10, 2019

Freakonomics Crime and Abortion Essay

Mohammed 2 egalized abortion would have been 50% more likely than average to live in poverty. † This statistic that researchers discovered reinforced the belief that if a woman did not want to have a child because of personal reasons or because she was not ready and if there was an abortion ban, the child would most likely grow up in a poor household and have a higher risk of engaging in criminal activity once they reached adulthood. It is reasoned that because abortion was legalized twenty years before, an entire generation of children with a higher risk of becoming criminals were not born and that’s why the crime rate dropped. The fallacy that is apparent when attempting to explain a crime drop with an abortion increase is that the two are simply correlated and not necessarily causal. The authors refute that claim by providing evidence that there is a link between abortion and crime. â€Å"Sure enough, the states with the highest abortion rates in the 1970s experienced the greatest crime drops in the 1990s, while states with lower abortion rates experienced smaller crime drops† (4). The evidence regarding state data is pretty compelling especially when put in the framework of post-Roe v. Wade and the generational gap that follows the Supreme Court decision. Although there seems to be a link between abortion and the crime rate, it all comes down to how a person’s own beliefs will influence them to interpret the data. Conclusions can be drawn to support different viewpoints and once the moral implications of abortion are taken into consideration, then it no longer becomes a logical argument. Works Cited Levitt, Steven D. Stephen J. Dubner. Freakonomics. New York, Harper Collins, 2005.

Wednesday, October 9, 2019

Concussions in Sports and Return to Play Guidlines Essay

Concussions in Sports and Return to Play Guidlines - Essay Example He hit his head on the turf, lost consciousness and when he regained consciousness, he remembered nothing of the incident. On the same day, in another game, Troy Aikman, one of the starting quarterbacks had to leave the game when he was kneed in the head. His condition was also termed as a concussion. Two players getting hit in the head on the same day is a rare occurrence because mild head trauma is limited to 2% and 10% for any athlete and this calls for some attention to incidence of concussion in various sports. The word 'Concussion' induces horrible images of permanent brain damage. But there is a) low probability of an athlete being hit in the head and 2) the return and full recovery are often rapid. However there have been more complicated cases where effects of concussions lasted a very long time. (e.g., Barth et al., 1983; Rimel, Giordani, Barth, Boll, & Jane, 1981). A growing body of literature, thought not vast yet, focuses on the occurrence and effects of concussion in various contact sports including boxing, football, and soccer. It was found that while professional athletes can serve as good cases studies for various related researches, they usually do not report every injury making it difficult to gather accurate data on the incidence of injuries in sports. Athletes underreport for fear of sabotaging their chances of playing in coming games. (Gerberich, Priest, Boen, Staub, & Maxwell, 1983). What is a Concussion or Mild Trauma The study of concussion in sports is relatively new considering that literature available is barely 15-20 years old. Attention is being paid to the process by which concussion cases mild head injury and the subsequent post concussive symptoms that result. Concussion or mild head injury refers to blow to the head which may or may not be followed by loss of consciousness but causing an alteration in awareness. Though no serious lesions are noticed on brain in the case of concussions, some contusions may be found on the frontal and temporal lobes. The white matter in the brain is affected and some shearing might be caused to neuronal axons (Duckett & Duckett, 1993). Acute and chronic alterations in neurochemical functions are also reported following a head injury (Dixon, Taft, & Hayes, 1993). The problem with CT and MRI scans is that while they can detect serious signs of severe injury such as swelling or bleeding, they may fail to notice lesions caused by concussion. Glasgow Coma Scale (GCS) is used to measure and categorize injury. With a score of 13 or above for example, injury is considered mild. However while this scale along with other factors just as length of unconsciousness and length of stay in the hospital are used to categorize concussion and resulting head injury, there is still a serious lack of consensus

Tuesday, October 8, 2019

Marketing Essay Example | Topics and Well Written Essays - 750 words - 6

Marketing - Essay Example This paper will look at the Federal Reserve Bank’s organizational structure and its roles in governing monetary policy. The structure of the Federal Reserve Bank consists of Member banks, Reserve Banks, the Federal Open Market Committee, Board of Governors, and the congress and the President. Member Banks Member Banks refer to private banks, for example, Bank of America, which has the stock in any of the twelve local Reserve Banks. Every countrywide chattered bank must own stock in the Federal Reserve. In addition, state chartered banks or financial institutions may decide to own stock or not if they satisfy a number of conditions. The stock held by these banks cannot be traded or sold like ordinary stock and constituent banks get fixed amount of dividend every year on this stock (Arthur 417). Moreover, constituent banks have the dispensation of selecting a number of the officials in the board of their regional Reserve Banks. Reserve Banks   The operating arm of the Federal Reserve Bank is made up of twelve regional Reserve Banks. These regional Reserve Banks have the responsibility of regulating and supervising constituent banks. In addition, the regional Reserve Banks are charged with the responsibility of handing out coins and currency to affiliate banks (Arthur 418). Every Reserve Bank is made up of nine board of directors. ... The five individuals are New York’s Reserve Bank chairman and heads of any four Reserve Banks (Arthur 418). Officials from Reserve Banks operate on a rotary process, and only the official from the Reserve Bank of New York serves on a permanent basis. Board of Governors   The Board of Governors constitutes seven officials who are picked by the American President and approved by the American Senate. The Board of Governors also comprises a chairperson and a vice chairperson. Every official in the Board of Governors holds his position for up to fourteen years. Also, these officials cannot be reappointed after the expiry of their terms. The fourteen year term serves as a precaution for the Federal Reserve Bank to conduct its functions without any political interference (Arthur 419). The president picks two officials from the board, one of the officials become the Chairperson and the other becomes the vice chairperson. The two ranks last for four year duration. US Congress and the President   The president makes appointments and the Senate approve the Board of Governors members. Nevertheless, the Federal Reserve Bank functions on its finances. This safeguards it from the influence of the administration during the making of the budget every year. Congress can hold the Federal Reserve Bank accountable for its activities. In addition, Congress can control both the Federal Reserve Bank’s responsibilities and activities by law (Arthur 420). This means Congress can change the activities of the Federal Reserve Banks by enforcing new laws. The Federal Reserve Bank also has roles associated with governing monetary policy. The Board of Governors has the responsibility of establishing

Monday, October 7, 2019

Current Pop Culture Essay Example | Topics and Well Written Essays - 750 words

Current Pop Culture - Essay Example The current pop culture exercises its control over the thought of the people by generating the aspect of â€Å"opinion† through mass media. That is to say it becomes an artistic expression of the people, thus creating solidarity, as Kidd (2007) explains (Fedorak 3). To enhance the role played by pop culture in the lives of the people, I would undertake the examples from television and film fraternity. The television series The Sex and the City and the film The Hunger Games, both adapted from the book series, not only explain the blatant influence created by the pop culture, but also cover the wide genre of pop culture, namely literature and technology, in order to generate a striking effect on the mass consumption. The Sex and the City (1988-2004) is generally applauded for showing the prevalent theme of individualism and the society that rules our lives. It features single women as strong, honest, independent and happy, who are striving to find their individual identity in th e facets of societal foundations. The show is regarded as a post feminist exploration of single women living in New York City. It is a show about women and their friendships, their sex lives and their experiences. It is perhaps because of the issues like identity, the relation between an individual and society, and the underlying theme of sexual sovereignty that The Sex and the City can be used as the foremost example in explaining the workings of the pop culture. The protagonist Carrie Bradshaw is a sex columnist for the fictional paper The New York Star; it is through the lens of her columns that each episode is shaped. This characterization is quite important for the consumer. He meets an individual who is not only a strong, independent woman with a critical point of view, but also a sex columnist discussing sex lives of women, thus claiming sexual sovereignty. Her honesty and imperfection highlight the general thought of the public that make them identify with her. Other female characters, Miranda, a cynical attorney, asserts her independence as a woman reconciling with her motherhood and her marriage; Charlotte, a hopeless romantic lives in a world of fairy tales but eventually realizes the stark distinction between fantasy and reality; and Samantha, the self-proclaimed sex- loving, hyper sexualized old woman dealing with her state of menopause, different yet embodiment of feminism, gives a glimpse of different shades of a modern woman. They are reflection of an era where women were exercising control over their lives without the male interference. They highlight the concept of choice where an independent woman is free from the bounds of motherhood and marriage, where parents are never seen and the family mentioned is of female friendship, thus highlighting the notion of pop culture as an indicator of shared value. The Hunger Games (2012) is the most recent example of human identity being shaped by the interplay of media and individual choice in construct ing personality. It showcases the tenuous division between reality and fabrication through a violent competition in which children and teens are

Sunday, October 6, 2019

Occupational Health and Safety (Hazards in the workplace) Essay

Occupational Health and Safety (Hazards in the workplace) - Essay Example This essay talks about the people employed in mining industries that have to take great precaution of their occupational health and safety. Often, there are many hazards, ranging from cuts, bruises, limbs and legs breakages among others in the work place that the workers report on daily basis. Many manufacturing industries are under pressure to carry out all the safety precautions, which would help their worker and, save them from the unexpected injuries. Notably, a lot of companies have adhered to the rules and have considerably minimised the injuries to their workers. In this report, I am going to outline the occupational health and safety in BPH Mining Company in Australia, with specific attention to hazardous machinery. Particularly, I have chosen hazardous machinery since mining employs heave and very dangerous machines that, often, terminate the lives of the workers. Sometimes, the workers sustain serious injuries, which make them bed ridden for a long time. Mining Companies sp end a lot of money in treating the workers from the injuries that they sustain during the work. Considering the case of BHP mining, a careful study revealed that the hazardous machinery contributes to most of the bruises and cuts that the workers sustain. Usually, the workers take certain risky moves that jeopardise their lives. Indeed, some of them do not take the ethical workplace culture as an important aspect of the organizational performance. The report also shows that the cultural factors are critical in driving the organisation to success. ... Finally it ends with a conclusion. Introduction In reality, the people employed in mining industries have to take great precaution of their occupational health and safety. Often, there are many hazards, ranging from cuts, bruises, limbs and legs breakages among others in the work place that the workers report on daily basis (Angle, 2004, p. 45). Many manufacturing industries are under pressure to carry out all the safety precautions, which would help their worker and, save them from the unexpected injuries. Notably, a lot of companies have adhered to the rules and have considerably minimised the injuries to their workers. In this report, I am going to outline the occupational health and safety in BPH Mining Company in Australia, with specific attention to hazardous machinery. Particularly, I have chosen hazardous machinery since mining employs heave and very dangerous machines that, often, terminate the lives of the workers. Sometimes, the workers sustain serious injuries, which make them bed ridden for a long time (Barry, 2008, p. 66). Mining Companies spend a lot of money in treating the workers from the injuries that they sustain during the work. Considering the case of BHP mining, a careful study revealed that the hazardous machinery contributes to most of the bruises and cuts that the workers sustain. Usually, the workers take certain risky moves that jeopardise their lives. Indeed, some of them do not take the ethical workplace culture as an important aspect of the organizational performance. The report also shows that the cultural factors are critical in driving the organisation to success (Erickson, 1996, p. 124).

Saturday, October 5, 2019

International Marketing Assignment Example | Topics and Well Written Essays - 4000 words

International Marketing - Assignment Example Communicating in the local language helps customers to receive the products and services positively. Doing business internationally involves changing the promotional or branding materials to suit their values and attitude. Analysis of the values and attitudes secures a comfortable working environment (Cateora, Gilly and Graham 398). Employees in the United States take weekly vacations while France employees take monthly vacations. Understanding this concept of culture is vital for international marketers considering various multinationals have had problems in the past. For instance, China banned commercials by Nike televisions for animating the kung fu master since it insulted the Chinese national dignity (Cateora, Gilly and Graham 389). The technology level available in the country of business aids the international marketers in handling promotions. It involves the analysis of transport and infrastructure of the location of interest (Cateora, Gilly and Graham 390). Education varies across cultural backgrounds thus; marketing internationally requires a synopsis of the educational background of their target market. In conclusion, analyzing the background aids the multinationals to have favorable response from their target market. I agree with you on the importance of culture in the marketing environment. It is important for marketers to treat their customers with dignity. Asian cultures value their cultural concepts and the example of McDonalds in Japan shows this. It is true that the general population of a country constitutes to the cultural background, but analyzing the regional cultures is also important in international marketing. The factors you mentioned such as political, economical, and technological apply in securing different countries. The value of these concepts dictates the penetration pace of multinationals. Stability in international marketing works better if the