Friday, November 29, 2019

The Problems of Terrorism in Modern World

Terrorism has no single definition. However, it can be termed as organized acts of terror, mainly unleashed through unlawful activities, and which is intended to create fear and intimidation to a particular individual, organisations or a state.Advertising We will write a custom research paper sample on The Problems of Terrorism in Modern World specifically for you for only $16.05 $11/page Learn More Terrorism is carried out with various motives, including political, religious and ideological motives. The acts of terrorism may target governments, non-governmental organizations or even individuals. Terrorism in governments involves attack of the government leaders, or other economic or social institutions. The acts can also involve attack of civilians. Terrorism is inspired by many reasons, which mainly include philosophical, racial, and ideological or religious believes. Other reasons may include desire for social solidarity and desire to seek attention a nd recognition from various institutions and governments. On the other hand, the use of force and intimidation by some governments and authorities to obtain political, social or economic benefits is also perceived as terrorism. There are many things that act to encourage terrorism attacks. One of them is vulnerability. This is a state of being exposed to acts of terrorism, or the likelihood of being a terror victim. One may be vulnerable to terrorism in many dimensions like physical vulnerabilities. Physical vulnerability can either be in terms of geographical location. One is likely to be more vulnerable to terrorists’ acts depending on the region or state where they live as posited in (Hulnick, 2004). Countries that are terrorists’ camp sites have high incidences of terrorists’ attacks. Many groups and organisations of terrorism cause direct and personal threats to many individuals. In many incidences, innocent civilians have lost their properties and lives fr om acts of terrorists. Physical location also determines one’s political, and also the belief system. If such systems are contrary to terrorists’ desires and wishes, then you are more likely to be vulnerable to their attacks. Various regions and states of the continents have different degrees of terrorism vulnerability. Some States and countries that are more powerful and influential either socially, economically or politically, are at times major targets of terrorists (Ginges, 1997). This is because terrorists seem to perceive that such countries and states may use their positions and wealth to fight back the terrorists’ acts and plans they propagate. The location vulnerability of terrorism can be reduced by being selective in terms of where one lives. Terrorists’ acts may also target various cities and streets. Therefore, selecting physical location in terms of operations and resident will reduce the chances and exposure to terrorism.Advertising Lo oking for research paper on government? Let's see if we can help you! Get your first paper with 15% OFF Learn More Physical vulnerability may also involve structural systems. These include buildings and other physical systems. High rise buildings with many floors are more likely to be attacked by terrorists than low rise buildings. Buildings that are used by governments, anti-terrorists organisations or agents are at high risks of attacks from terrorists’. Various governments’ agencies, corporations and ambassadors may be vulnerable to terrorism depending on such governments’ stands and reactions towards terrorism. The knowledge of terrorism will be helpful in reducing chances of attacks. If one understands the relation of a government with terrorists, he/she can make decisions that involve less risk exposure and therefore, this makes one less vulnerable as a target of terrorism. Resources distribution is also another physical cause for vulnerability wi th terrorism. Communities and societies that have less resources might feel segregated, which creates a need for such communities and societies to find means to create more resources and recognition. Lack of fair political or economic mechanism to distribute natural resources may also cause terrorists threats. This means that the class or group that is segregated may use terror to fight for equitable distribution of resources. Therefore, equitable distribution of resources and proper political and economic mechanisms will help in mitigating vulnerability to terrorism. In conclusion, hardening against vulnerability to terrorism has to involve knowledge about geographical location, structural systems and resources allocation and distribution. This knowledge will be vital in adjusting accordingly to terrorism threats, and taking decisions that reduce the risk of attacks from terrorists. References Ginges, J. (1997). Deterring the terrorist: A psychological evaluation of different Strat egies for deterring terrorism. Terrorism and Political Violence, 9, 170-185. Hulnick, A. (2004). Keeping Us Safe: Secret Intelligence and Homeland Security. This research paper on The Problems of Terrorism in Modern World was written and submitted by user Violet Hopper to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Monday, November 25, 2019

Free sample - Enforcing internet security in organizations. translation missing

Enforcing internet security in organizations. Enforcing internet security in organizationsThe position of organizational internet security in the current growth of computing is gaining the presence of many companies as internet is expanding globe. Software companies are coming up with new security measures which can be implemented to counter the current needs of secure information and data transfer. Commoditized security measures have been around for long and therefore the need for enhanced internet security measures which offer high levels of security cannot be overlooked. Internet security technologies that offer competitive advantage to organizations are considered sometimes hard to implement. However critics emphasize that they are made to separate organizations from others in terms of accessibility, the major focus should be to retain secure information transfer. As new technologies emerge in the market, their adoption has been slow, but they offer an upper hand. Both physical and logical access remains vulnerable to hackers. This should prompt the need to redefine security technologies which will ensure secure operation and reduce the level of vulnerability to organizations data.   Organizations security is an area that is conceivably the most elementary and nevertheless the most critical of all the technologies and disciplines for the business or organizations sensation. An organization without concrete enterprise security processes and rules exposes it to considerable threats. This should therefore open up their minds that network security is an arms race and therefore attacks and prevention measures should be put in place that are not one sided. Evans (2003) stated that â€Å"while hackers try to exploit vulnerabilities, software companies and enterprise security specialists continue to close the gaps and find new solutions and approaches to secure enterprise operations and data† (p. 31). The role of internet security in the current growth of computing has been gaining the presence of many stakeholders including organizations and learning institutions around the globe. While governments have made it possible to use the internet for commercial and personal purposes its record in the realm of privacy and security is not unblemished. Internet security can be enforced through various ways to ensure a considerable level of security in organizations. Information security program for the organization should consist of various policies and procedures, security education, security management and a range of internet security mechanisms (Chen, 2005). The organizations internet security policy document should be of great and critical importance to the organizations internet security program. The internet security policy should be a sub policy of the whole organizations information security policy and therefore it should be determined during the requirements definition phase (Chen, 2005). Organizations should consider many diverse factors identified as influential for internet security policy. Chen (2005) says that â€Å"human issues dominate internet security enforcement which include freedom of internet use, privacy, trust, monitoring, surveillance, censorship, right to be kept informed, accountability, sanctions, ownership and ethics† (17). This implies that human issues should take center stage during the process which all other factors were viewed while establishing various sub policies of the internet security policy in the organization. The term internet security should imply that the organization has taken all the necessary measures of security have been ensured or adopted. Vacca on the other hand says that internet security should be about the information security and integrity of both private and organizational end user’s systems, networks and other terminal devices accessing the internet through the publicly available service providers (2007). Enforcing internet security should bring to our understanding that the organization has enforced the following types of internet security which include: system architecture level, virtual private networks, use of trusted links, and use of multiple firewalls, intrusion detection mechanisms, and encryption. Vacca says that the organization should use encryption as a primary means for providing confidentiality services for information sent over the internet (2007). Encryption should therefore be used to protect any electronic traffic such as mail messages or the contents of a file being downloaded (Vacca, 2007). Another measure that should be taken by the organization in connecting to the internet is to involve a number of system architectural decisions that will impact overall system security of the organization (Vacca, 2007). System level architecture uses virtual private network and trusted links so as to control access from unauthorized people. Trusted links in the organization are used to connect geographically separate networks. The publication by Science and Technology Committee (2007) noted that internet security in institution should not involve installation of the appropriate technology alone but also further sensitize the members of the organization on internet security. This should be in line with changing attitudes and behavior towards the internet through education and training. The organization should also ensure that security remains up to date (Science and Technology Committee, 2007). Besides the above measures which imply that the institution has fully enforced internet security there should also be the use of strong passwords and antivirus software’s. Strong passwords ensure that after computers boot only authorized users can access the internet to avoid security breaches. They should thus be used to prevent an unauthorized person form hacking to the computers while still online. Well configured firewalls and strong password should be used to enforce accepted level of internet security. The organization should use antivirus programs which prevent malicious malware or virus from interfering with data stored in these computers. The antivirus programs will protect other attacks from hackers who may want to gain access to data stored in computers in the organization. Cheswick, Bellovin and Rubin say that there should be careful control of network access and the files obtained from foreign sources greatly reduces the risk of infection (2003). Antivirus programs prevent human propagated viruses where people forward messages to other individuals promoting them to give their login details. On the other hand Maiwald (2003) says that the implementation of internet security in the organization should include mechanisms such as firewalls and virtual private networks coupled with changes to network architectures within the institution. The organization should place an access control device between the internet and the organizations internal network. This means that without such protection all internal systems will exposed to unlimited attacks (Maiwald, 2003). Internet security enforcement should ensure that the organization’s staffs will be well trained on matters concerning internet security. Maiwald continue to say that internet security enforcement should come with the implementation of security mechanisms and ensure that they observe responsibility for the security of the organization (2003. As part of enforcing internet security the organization should actively raise security awareness as an important part of any good security program (Maiwald, 2003). Some of the steps toward attaining internet security will include determining the key information that must be communicated to the employees of the organization (Maiwald, 2003). In this context Maiwald says that employees should pay particular attention to password requirement, badges, use policies and anything else that directly affects your employees will work (2003). Internet security enforced should imply that the institution has provided its employees with detailed knowledge about protecting organizations information resources. Maiwald thus says that both the students and employees should be aware why the organization needs to protect its information resources (2003). This also indicates that the organization’s security department should have plans to conduct audits of policy compliance. Maiwald (2003) established that â€Å"such audits should focus on system configurations, backup policy compliance or on the protection of information in physical form† (198). In order to enforce the required level of internet security, there should be a need for well resourced formal organizational internet security infrastructure, featuring an internet security management program (Chen, 2005). The institution should adopt a multifaceted approach to controlling the employee contribution to internet security concerns including the development for very secure internet connectivity to institution. The institution should pay a close attention to the important human issues associated with internet security and usage (Chen, 2005). Besides this the organization should make its employees accountable for their actions through appropriate policies, awareness activities, monitoring and sanctions (Chen, 2005). Internet security should thus start with the use of appropriate security technologies. Organizations should look forward to truly secure critical business operations today and therefore companies need to adopt competitive security technologies. This means that security professionals should understand, implement, and operate effectively enhanced security technologies to ensure business continuity in these organizations. The level of vulnerability to organizations increases as the world advances in technology adoption. In this context it is important to ascertain that the need for competitive security technologies is at hand in many organizations. In conclusion, it is important to note that with the looming threat of internet security in the global environment, the challenge now should be to develop internet security solutions which will afford corporations the high level to protection needed to withstand prolonged and diverse attacks (Chen, 2005). Therefore only solutions based on strong comprehensive, holistic internet security management and policy should be implemented in organizations (Chen, 2005).   These measures should ensure that the institution’s information and data is secure despite its internet connectivity. As new technologies continue to evolve in computing the level of threat also increases and therefore this means that the organization should stay updated on its internet security approach.      References Connolly, K. (2003). Law of internet security and privacy 3rd ed.   Los Angeles, CA: Aspen Publishers Online. Chen, W. (2005). Statistical methods in computer security. Boca Raton, FL: CRC Press.Cheswick, W, Bellovin, S Rubin, A (2003). Firewalls and Internet security: repelling the wily hacker. Upper Saddle River, NJ: Addison-Wesley. Evans, N. D (2003). Business innovation and disruptive technology: harnessing the power of breakthrough technology for competitive advantage Boston, MA: FT Press. Great Britain: Parliament: House of Lords: Science and Technology Committee (2007). Personal internet security: 5th report of session 2006-07, Vol. 2: Evidence. Glen Burnie, MD: The Stationery Office. Maiwald, E (2003). Network security: a beginner's guide 2nd ed. New York, NY: McGraw-Hill Professional.Vacca, J (2007). Practical Internet security. Chicago, IL: Springer.

Friday, November 22, 2019

Critically discuss the key issues involved in studying children and Essay

Critically discuss the key issues involved in studying children and young people - Essay Example This paper takes a keen look at the way education brings a renewed confidence and adaptability within the ranks of the young people and the children in meticulous. Young people and children are always studied from a number of angles and perspectives. This is because they are hard to understand at the best of times. There is so much going on within their lives that it is difficult to comprehend all of this. It is a matter of fact that the children who attend schools are better off than the ones who study within the four walls of their homes. The reasons could be manifolds for the same however what is important is to ascertain what forces these children to remain within their homes and not go to schools at all (Guha, 2008). The reasons are immensely different from one another. These could include their parents’ financial conditions, their lack of access to proper schooling regimes, absence of any schools whatsoever or non-granting of admission to schools to name a few. The kids start learning from a very young age and it is understandable that no parent would want his child to lag far behind the other children in the society or city for that matter. The school ensures that the kids learn the basics of schooling right from the very beginning and they are taught the most basic of activities, habits and manners right from the start (Guichard, 2011). This also guarantees that the parents are lessened of their responsibilities, though to a small extent since they have to look after the chores of their homes as well. It is a fact that the schools act as significant role-playing instruments within the growth and developmental regimes of the young people and children. The manner in which the difference is brought to the fore is another pertinent consideration, and one that has a lot of bearing on the way these students conduct themselves within the global dynamics. On the part of the child who is being looked after and taught at the school, it is made sure that he starts interacting with the young ones of his age and friends are created all this while, which when seen in the proper perspectives, is something of a healthy exercise (Strong, 1998). The school makes sure that the young ones get to learn easily and in a quick manner without any such hiccups happening at a very young age. At school, he is provided mentoring as well as training on different subjects while at home, there are serious issues as regards to a student’s timely coaching and getting acquainted with the educational norms (Cotugna, 2005). Mentoring helps in understanding what the psyche of the student is and how he will cope up with pressure in the form of projects, assignments and exams. The same is however a missing link within the home schooling domains. Young people and children need help from different quarters of the society and more specifically from the domains of their own parents and guardians. This is because they have little knowledge about the world that they live in, and need guidance from all and sundry (Jenkinson, 1995). Children need to be given the support and confidence from their elders so that they can develop into better human beings in the future. It is for their own good if they comprehend the true essence of life and

Wednesday, November 20, 2019

Theoretical Perspective on Secure Attachment Essay

Theoretical Perspective on Secure Attachment - Essay Example He claims that the infant's primary or original bond is with its mother, which then become the basis for all the forthcoming loves he will be feeling. He also claims that infants only have the desire in his mother's arms simply because the infant has already established that his mother will satisfy and provide for his needs without delay. However, Freud's more significant theory to the development of infant attachment is his drive reduction theory. He used the basic biological drives that are innate in human as the basis for this theory. He explains this by stating that when an infant is driven, an example of which is when he cries, he will then experience pleasure by receiving food resulting to the restoration of balance. (Freud, 1964) Another theory was introduced by Erik Erikson, called the Psycho-Social Theory also known as the Pschodynamic Theory. He was the first to propose that there are different stages of human development that lasts throughout the entire life span. His idea s were a huge influence that led to the study of personality development His theory also accounts for the term "identity crisis." He introduced eight stages to human development and later on added a ninth stage in his book entitled â€Å"Life Cycle Completed.† The first two stages pertain to the infant attachment theory, which he called the stage of hope and the stage of will. He claims that on the hope stage, between 0 to 12 months, an infant is trying to make a choice between trust versus mistrust as he tries to weigh whether his primary caregiver is reliable or not. The will stage on the other hand, is the stage of autonomy versus shame and doubt. He claims the will stage as the stage wherein the infant's need to explore the world, which may or may not be hindered by a caregiver's utter neglectfulness or over-protectiveness. (Cole, 2009) Though Freud instigated the infant attachment concept, John Bowlby was known as the father of the attachment theory after making the firs t and commonly known view on attachment theory. Bowlby believes that there are a number of innate control systems pertaining to behavior are a necessity for surviving as well as procreation. He also believes that attachment begins at infancy, continuing on throughout life. According to Blowby, an infant initially establishes a strong attachment with its primary caregiver and will become the infant's base of exploration. It is innate behavior for an infant to want to explore new things, however, when a child reaches away to explore and then faced with danger or feels scared, its secure protection base will be with the primary caregiver. Bowlby dedicated an extensive research to the concept of infant attachment, which he described as a "lasting psychological connectedness between human beings" (Bowlby, 1988). He also shared the psychoanalytic view that early experiences in childhood are important influences affecting development and behavior which may be seen later in life. Based on h is theory, our early attachment styles are established in childhood through the relationships between infants and primary caregivers. In addition to this, Bowlby was also of the belief that attachment had an evolutionary factor wherein it aids in survival stating that "the propensity to make strong emotional bonds to particular individuals is a basic component of human nature" (Bowlby, 1988). Bowlby also categorized different characteristics of attachments and are as follows: Safe Haven: When the child feels

Monday, November 18, 2019

Response to Coments on DQ1 J1 and DQ2 KS Essay Example | Topics and Well Written Essays - 250 words

Response to Coments on DQ1 J1 and DQ2 KS - Essay Example The three types of inventory in a manufacturing operation are raw material, work in process inventory, and finished goods inventory (Garrison & Noreen). Inventory is a current asset, but this asset is not as liquid as other current assets. The most liquid current asset is cash. The multi-step income statement provides more details than the single step income statement. DQ2 I like your response and agree with you in your response because the way inventory is handled affects the profitability of a company. In the auto industry the Big Three in order to compete with international competition began to outsource part of the inventory work. Instead of producing auto parts themselves the companies the companies are outsourcing by purchasing the parts from foreign distributors. Techniques such as just in time inventory enabled managers to minimize the amount of inventory companies have in their plants. Having too much inventory is bad due to the opportunity costs associated with holding the inventory. A cost of opportunity can be defined as the alternative use that was forgone when making a decision (Varian). For example a person that decided to give up their job to become a hot dog vendor has the opportunity cost of the salary that he will stop making to sell hot dogs. Work Cited Page Garrison, R., Noreen, E. 2003. Managerial Accounting (10th ed.). Boston: McGraw Hill Irwin. Varian, H. 2003.

Saturday, November 16, 2019

Attitude and behavior towards internet shopping

Attitude and behavior towards internet shopping Studies on factors determining consumer attitude and behavior towards Internet shopping: Most of the studies conducted in the recent years in field of online shopping behavior and attitude have been focusing on the factors influencing the online shopping attitudes and behavior. But, different researchers have diverse opinions and focus, while studying the impact of these factors on the online consumer buying behavior and attitudes. For example, there is a segment of researchers who have tried to explain the consumer attitude and intentions for online shopping by taking theories like Theory of Reasoned Action, Technology acceptance model or Theory of Planned Behaviour as a basis and have tried to extend them further by adding more web specific factors to them(Cheung, Zhu, Kwong, Gloria, and Limayem, 2003), whereas there has been another segment who have derived relationships between various factors and customer satisfaction with reference to the Internet shopping experience in the form of dependent and independent variables. Further, there have been researchers who have f urther organized and compiled the previous researches done in this field so as to pave way for future researches. These researchers have also contributed in terms of designing structured frameworks for online consumer attitude, intention and buying behavior. Web experience The literature review done by Constantinides (2004) helps in identifying the web experience components and their role as the first step in shaping the online consumers behavior. He has added web experience as a controllable element in his model depicting factors that influence the online buying behavior. He has further explained web experience factor by classifying it in three sub-categories which are the building blocks of the web experience. These three sub-categories are Functionality factors (usability and Interactivity), Psychological factors (trust) and Content factors (aesthetics and Marketing Mix). The following figure as adopted from his article presents a brief description of the number of references in support of each of these factors: Source: Constantinides, E.(2004). Influencing the online consumers behavior: the web experience. Journal of Internet Research. Vol 14 No.2, pp. 114, figure 2. Literature review Li and Zhang (2002, p.508) have defined online buying behavior or Internet shopping/buying behavior as the process of purchasing products or services via the Internet; which according to Liang and Lai (2000), is similar to the traditional five steps process of consumer buying behavior (as cited by Li and Zhang, 2002). They have also defined online shopping attitude as the psychological state of the consumers in terms of Internet shopping (2002). Li and Zhang (2002) have analysed 35 empirical studies on online shopping attitudes and behavior conducted during the period of January 1998 to February 2002 and have finally identified 10 inter-related factors for which the reviewed studies have significant empirical evidences. These 10 factors have further been classified into five independent factors (viz. external environment, demographics, personal characteristics, vendor/service/product characteristics, and website quality) and five dependent factors (viz. attitude towards online shoppi ng, intention to shop online, decision making, online purchasing, and consumer satisfaction.) Another exhaustive literature review in this field has been by Cheung et al. (2003). They have examined a total of 351 articles in the area of online consumer behavior from 1994 to April 2002. They have attempted to link together the concepts of intention, adoption and continuance and form a base model- a Model of Intention, Adoption and Continuance (MIAC) for the development of an online consumer behavior framework. Further, the various factors as mentioned by various researchers in their study have been categorized under five major domain areas viz. individual/consumer characteristics, product/service characteristics, medium characteristics, and online merchant and intermediary characteristics. According to them, online purchase intention and adoption has been extensively studied and there are lots of empirical evidences available, but research on continuance or consumer online repurchase is in its infancy. The following figure describes the MIAC model as suggested by Cheung et al. Framework of online consumer behavior Source: Cheung, C.M.K., Zhu, L., Kwong, T., Chan, G.W.W. Limayem, M.(2003). Online Consumer Behavior: A Review and Agenda for Future Research. Proceedings of the 16th Bled eCommerce Conference, eTransformation. 194-218 A recent study conducted by Kuczmarski and James (April 2008) further contribute to the available body of literature by adding that consumers prefer online stores to actual stores due to potential reasons like convenience, cost and selection. Trust as a factor Studies also indicate that trust remains a crucial factor in e-commerce and in influencing the purchase decision of online shoppers. Consumers prefer to shop from trusted websites. Researches reveal that trust is a factor which also helps in forming long-term customer relationships (Dwyer, Schurr Oh, 1987; Gefen Straub, 2003; Kim, Xu Koh, 2004). Some researchers like Lee (2002), Liebermann and Stashevsky (2002), McKnight et al.(2002), Suh and Han(2002) and Liang and Lai(2002) have even argued that a new step has been added to the online buying process and that is the step of building trust or confidence (as cited by Constantinides, 2004). The available literature explains that trust facilitates e-commerce and online transactions, but at the same time the consumers lack of trust in online vendors continues to remain a hindrance in the growth of e-commerce. (Ba Pavlou, 2002; Gefen and Straub, 2003; Gefen, Karahanna Straub, 2003; Kim, Xu Koh, 2004; Lim, Sia, Lee Benbasat, 2006; P avlou Gefen, 2004). Gefen(2002) and Kim, Xu Koh (2004) have stated that a key challenge to e-commerce is that creating trust typically requires multiple interactions and superior service over a period of time(as cited by Lowry et al., 2008). Brand has also been established as one of the factors influencing the customer trust for a website (Bart, Shankar, Sultan Urban, 2005; Yoon, 2002). Ward and Lee(2000) conducted a research to examine whether consumers use brands as sources of information when shopping on Internet and they concluded that branding can facilitate consumers acceptance of e-commerce. Lowry, Vance, Moody, Beckman Read (2008) have studied the impact of branding alliances and web-site quality on the consumer trust of e-commerce websites. They explored the usage of branding alliances and website quality by the less familiar websites to enhance the consumer trust and suggested that branding and web-site quality can significantly increase the initial consumer trust in the e-commerce websites. Ballantine(2005) has studied the effects of interactivity and the amount of product information provided by an online shopping environment on consumer satisfaction. A web-based experiment was conducted where respondents were exposed to a simulated online retail store. Findings indicate that these two factors had a significant effect on the consumer satisfaction. Tangibility also remains an important factor in influencing the purchase process of Internet shoppers. Melian-Alzola and Padron-Robaina(2006) have analysed the role and importance of the tangible elements of purchase processes in business to consumer(B2C) e-commerce, and the impact on overall perceived quality and the customers attitudes. Their research concluded that that four attributes navigation, signposting, tools and explanation explain the tangible dimension in electronic commerce. They revealed that design was an important factor of overall perceived quality and the willingness to recommend the purchase experience to others. Security of transactions is another factor that remains as a matter of concern for e-commerce consumers. According to a study conducted by American Banker in 2007, one-third of Canadians refused to shop online due to fear of identity theft. Web assurance services help in building up the trust and confidence of such consumers. In an experimental study undertaken by Mauldin and Arunachalam (2002), the impact of web assurance services and retailer disclosures on purchase intent was studied. They have defined web assurance as the measures taken to reduce information risks and increase online purchasing by improving the reliability of certain information on the website. Their findings indicate that web assurance. In this research they considered TRUSTe, WebTrust and VISA web assurance services for the study. Their findings indicate that there were no significant differences in intent to purchase among the three assurance providers. Mauldin and Arunachalam have also studied the impact of product and retailer familiarity on the buying behavior of online consumers in the above mentioned study and they suggest that web assurance is insignificant when product familiarity is higher, or in other words, where product familiarity is lower, intent to purchase is higher with web assurance. Retailer familiarity is not fou nd to be significant in any of the conditions. Further, their study also reveals that retailer disclosures are sufficient to impact buying intention of online consumers; the web assurance services studied in the above study did not provide any additional assurance beyond the retailer disclosures. They have further emphasized that comfort with the Internet, general intent to buy online, and website design played significant role in influencing purchase intention. Although security is a major concern of online buyers, their study indicates that information risk generally did not significantly influence purchase intention, which explains why web assurance is generally not significant in their study. Bruce, Katherine and Murphy (2008) have further explored the prior studies on web assurance models to provide detailed explanation on current reporting requirements, differences among web assurance services and perceptions of consumers regarding these services. The study concludes that consumers give importance to web assurance services, but younger consumers place greater value on these services rather than older consumers. Technology Acceptance Model as a basis for research on Literature review In an attempt to design a structured framework for the effects of different factors on consumer attitude towards Internet shopping and their intentions to shop online, Monsuwe, Dellaert and Ruyter (2004) have reviewed the various researches conducted in the field. They have used Technology Acceptance Model (TAM) as a base and suggested a framework based on previous research on consumer adoption of new technologies and services. The Technology Acceptance Model (Davis, 1989) has served as a basis for various researches conducted in the Information systems field. In order to support the selection of TAM as a basis for their research work, Monsuwe et.al, 2004 have cited Chen et al.(2002), Moon and Kim(2001) and Lederar et al.(2000) who suggest that although this model is specifically designed to understand the adoption of a new computer based technology in the job/workplace, it has also proven to be suitable as theoretical foundation for adoption of e-commerce as well. The Technology Ac ceptance Model (TAM) suggests the usefulness, ease of use and the later addition of enjoyment (Davis et al., 1992) as the determinants of consumers attitude towards adopting a new technology. This attitude, further, has a strong and positive effect on consumers intentions to actually use the new technology or system (Bobbitt and Dabholkar, 2001; Davis, 1993). While redefining the three constructs in context of online shopping Monsuwe et.al.(2004, p.107) have referred to usefulness as the consumers perceptions that using the Internet as a shopping medium enhances the outcome of their shopping experience. Similarly, they have redefined ease of use as the consumers perception that the process leading to online shopping will require minimum effort and will be easy. Further, according to them, the enjoyment construct refers to the fun and playfulness of the Internet shopping experience. While usefulness has a weak direct link to attitude, it shows a strong direct link towards intention t o shop online (Davis et al., 1989). It is also linked with ease of use to determine consumers attitude towards online shopping. Hence, ease of use has a direct as well as indirect effect on consumers intention to shop online. Using TAM as a basis for the study, the framework proposed by Monsuwe, Dellaert and Ruyter(2004) not only includes the functional/utilitarian and hedonic dimensions like ease of use, usefulness, and enjoyment which affect the consumers attitude and intention towards Internet shopping, but they have also included some of the exogenous factors recommended by various researchers in the framework such as consumer traits(Burke, 2002; Dhabolkar and Bagozzi, 2002; Brown et al., 2001; Eastin and LaRose, 2000), situational factors(Wolfinbarger and Gilly,2001; Avery, 1996), product characteristics(Grewal et al., 2002; Elliot and Fowell, 2000), previous online shopping experiences(Shim et al., 2001; Eastlick and Lotz, 1999) and trust in online shopping(Yoon, 2002; Lee and Turban, 2001) Monsuwe et.al. in their research, have mentioned about the various researches done in order to extend the TAM by suggesting additional factors. For example, Venkatesh (2000), who has proposed integrating factors like control, intrinsic motivation, and emotion into the existing Technology Acceptance Model which are considered to be strong determinants for ease of use construct of TAM. Dabholkar and Bagozzi (2002) have given an attitudinal model of technology based self-service by suggesting two exogenous factors like consumer traits and situational influences. Further, they have cited OCass and Fenech (2002) who have added seven key consumer characteristics namely opinion leadership, buying impulsiveness, satisfaction with websites, web shopping compatibility, shopping orientation, Internet self-efficacy, and web-security to the model. Further, they have substantiated their model by citing the classification given by Hirschman and Holbrook (1982) who have categorised Internet shoppers in two categories; one is of the problem solvers and other category is of those seeking for fun, fantasy, arousal, sensory stimulation, and enjoyment. Monsuwe et al. suggest that this classification also supports the basic three constructs of TAM which affect the consumers attitude towards Internet shopping as ease of use and usefulness reflect the utilitarian aspect and enjoyment is in sync with the hedonic aspect of the model. The above explanation given by Monsuwe et al. is similar to the categorization of the shopping orientations by Bellenger, Robertson and Greenberg(1977) as convenience versus recreational orientation (as cited by Kim, LaRose, 2004) Various researches have been conducted to identify the underlying dimensions for the basic constructs of the TAM model. These latent dimensions can be further used to understand how these constructs get influenced by various exogenous factors. For example, Mathwick et al. (2001) have added two interesting latent dimensions to the usefulness construct Consumer Return on Investment(CROI), and service excellence. Monsuwe, Dellaert and Ruyter (2004) have defined CROI as a perceived return on cognitive, behavioural or financial investment made by the consumer. Whereas, service excellence evaluates the delivered promises against the performance. If both these dimensions are satisfied, then consumers will judge the Internet shopping performance positively (Mathwick et al., 2002) which adds to the perceived usefulness. Zeithamal et al. (2002) have stated that site characteristics such as search functions, download speed and navigation also acts as a determinant in shaping ease of use constru ct of the TAM model. But, Monsuwe et al. (2004, p.109) have a different opinion regarding this dimension. They have stated that these site characteristics merely influence the ease of use of a particular web site or online store, and not the Internet as a shopping medium in generalà ¢Ã¢â€š ¬Ã‚ ¦ Online Shopping orientations Kim and LaRose (2004) have defined shopping orientation as a shoppers attitude toward shopping activity that may vary with the situation rather than an invariant personality trait of the shopper. They have cited the categorization given by Bellenger, Robertson and Greenberg (1977) which classifies shoppers on the basis of their shopping orientation into convenience versus recreation oriented. Kim and LaRose (2004) also posit that shoppers may possess multiple orientations depending upon the expected outcome of a shopping experience and may demonstrate a regulated/utilitarian or an unregulated/recreational shopping orientation depending upon the environmental stimuli. Their study also shows that these two shopping orientations are not mutually exclusive and interactive web features may draw shoppers with convenience orientation into unregulated buying. Li, Kuo and Rusell(2006) have also studied the impact of shopping orientations on online consumer behavior alongwith other factors like demographics, channel knowledge and perceived channel utilities. Primary data was collected by a research company using an online survey of 999 U.S. Internet users. They have classified Internet users as frequent, occasional and non-buyers. Findings indicated that frequent web buyers have a higher degree of perceived channel utility for the purpose of communication, distribution and accessibility. Similarly channel knowledge also has a positive effect on the Internet buying and it also has a reciprocal influence on the perceived channel utilities. Their study also indicates that frequent web buyers value convenience more than experience(touch and feel of the product) whereas those who are non-web buyers have a higher degree of experience orientation. Recreation and economy orientation are found to be similar for the three types of Internet buyers. Th e study of the demographic factors revealed that male are more frequent web buyers than women, better-educated consumers shop more frequently online and consumers with higher income are more likely to be in frequent web buyer category. Age was not significant as far as frequency of web buying was concerned. Note: Most of the researchers feel that the classical consumer behavioral theories used for can only act as a starting point for understanding the online consumer behavior. There is no structured framework for explaining the online consumer behavior; the studies are mostly fragmented. Researchers have suggested different factors and frameworks, but there is a lack of a cohesive theoretical base to the online consumer behavior. Ba, S.L., and Pavlou, P.A. Evidence of the effect of trust building technology in electronic markets: Price premiums and buyer behavior. MIS Quarterly, 26, 3 (2002), 243-268. Gefen, D., and Straub, D.W. Consumer trust in B2C e-commerce and the importance of social presence: experiments in e-products and e-services. Omega: The International Journal of Management Science, 32, 6 (2004), 407-424. Gefen, D.; Karahanna, E.; and Straub, D.W. Trust and TAM in online shopping: An integrated model. MIS Quarterly, 27, 1 (2003), 51-90. Kim, H.-W.; Xu, Y.; and Koh, J. A comparison of online trust building factors between potential customers and repeat customers. Journal of the AIS, 5, 10 (2004), 392-420. Lim, K.H.; Sia, C.L.; Lee, M.K.O.; and Benbasat, I. Do I trust you online, and if so, will I buy? An empirical study of two trust-building strategies. Journal of Management Information Systems, 23, 2 (Fall 2006), 233-266. Pavlou, P.A., and Fygenson, M. Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior. MIS Quarterly, 30, 1 (2006), 115-143. Dwyer, F.R.; Schurr, P.H.; and Oh, S. Developing buyer-seller relationships. Journal of Marketing, 51, 2 (1987), 11-27. Everard, A.P., and Galletta, D.F. How presentation flaws affect perceived site quality, trust, and intention to purchase from an online store. Journal of Management Information Systems, 22, 3 (Winter 2005-6), 56-95 Kuczmarski, James (2008, Apr). JOURNAL-IST: Freedom of Choice. Fast Company, Issue 124, 43-43, 1/2p Runyan, B., Smith, K.T., Smith, L. M.(2008, Mar). Implications of Web assurance services on e-commerce. Accounting Forum (Elsevier), Vol. 32 Issue 1, 46-61 Gefen, D. Customer loyalty in e-commerce. Journal of the AIS, 3, 1 (2002), 27-51. Bart, Y.; Shankar, V.; Sultan, F.; and Urban, G.L. Are the drivers and role of online trust the same for all Web sites and consumers? A large-scale exploratory empirical study. Journal of Marketing, 69, 4 (2005), 133-152. Yoon, S.-J. The antecedents and consequences of trust in online-purchase decisions. Journal of Interactive Marketing, 16, 2 (2002), 47-63. Lowry, P.B., Vance, A., Moody, G., Beckman, B. Read, A. (2008). Explaining and Predicting the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites. Journal of Management Information Systems / Spring 2008, Vol. 24, No. 4, pp. 199-224. American Banker(2007, 17 Dec), Vol. 172 Issue 241, p17-17, 1/9p Monsuwe, T.P., Dellaert, B.G.C. Ruyter, K.D.(2004). What drives consumers to shop online? A literature review. International Journal of Service Industry Management.Vol.15 No.1, pp.102-121 Ward,M.R. Lee, M. J.(2000). Internet shopping, consumer search and product branding. Journal of Product and Brand Management, Vol.9 No.1, pp.6-20 Ballantine, P.W.(2005). Effects of interactivity and product information on consumer satisfaction in an online retail setting. International Journal of Retail Distribution Management, Vol.33 No.1, pp.461-471 Melià ¡n-Alzola, L. Padrà ³n-Robaina, V. (2006). Tangibility as a quality factor in electronic commerce B2C. Managing Service Quality. Vol.16 No.3,pp.320-338 Li,N. Zhang, P.(2002). Consumer Online shopping attitudes and behaviour: An assessment of research. Proceedings of the Eighth Americas Conference on Information Systems. 508-517 Constantinides, E.(2004). Influencing the online consumers behavior: the web experience. Internet Research. Vol 14 No.2, pp. 111-126 Cheung, C.M.K., Zhu, L., Kwong, T., Chan, G.W.W. Limayem, M.(2003). Online Consumer Behavior: A Review and Agenda for Future Research. Proceedings of the 16th Bled eCommerce Conference, eTransformation. 194-218 Li, H., Kuo, C. Rusell, M.G.(2006, Jun). The Impact of Perceived Channel Utilities, Shopping Orientations, and Demographics on the Consumers Online Buying Behaviour. Journal of Computer-Mediated Communication. 5(2). Retrieved July, 1, 2009, from http://www3.interscience.wiley.com/cgi-bin/fulltext/120837782/HTMLSTART Mauldin, E. Arunachalam, V. (2002). An Experimental Examination of Alternative Forms of Web Assurance for Business-to-Consumer e-Commerce. Journal of Information Systems. 16. 33-54 Abstract: Customers in an Internet shopping environment actually play dual roles. One is the role as a customer in a shopping place, and the other is the role as a user of information technology. In both cases, the level of satisfaction is of great concern. In this vein, a way of measuring the satisfaction level that takes both roles into account is needed. However, in past research indexes for consumer satisfaction and indexes for user information satisfaction have been developed separately in the fields of marketing and management information systems. Because of this lack of interaction between the two streams of research, an index for electronic commerce consumers that has its base in the dual roles has not been developed and tested. In this research, an instrument for measuring electronic commerce consumer satisfaction was proposed and validated using a sample of over 400 customers. The relationship between the index and consumers purchasing intention was also examined. Title: Development of electronic commerce user-consumer satisfaction index (ECUSI) for Internet shopping Author(s): Namjae Cho, Sanghyuk Park Journal: Industrial Management Data Systems Year: 2001 Volume: 101 Issue: 8 Page: 400 406 ISSN: 0263-5577 DOI: 10.1108/EUM0000000006170 Publisher: MCB UP Ltd Abstract: Purpose The purpose of this study is to investigate the effects of consumers shopping orientation on their satisfaction level with the product search and purchase behavior using multi-channels. Design/methodology/approach A total of 181 students in a large US mid-western university provided usable responses to the survey. Exploratory factor analysis and multiple regression analyses were employed to examine the research questions. Findings The results showed that more than three quarters of the respondents shopped via the internet and catalogs, and about 95 percent shopped at non-local retailers. About 60 percent reported that they never shopped from TV shopping channels. Confident/fashion-conscious shopping orientation and catalog/internet shopping orientation were found to be key predictors of customer satisfaction level with information search via multi-channels. Both confident/fashion-conscious consumers and mall shopping-oriented shoppers were more satisfied with store-based retail channels for apparel purchases, whereas non-local store-oriented shoppers and catalog/internet-oriented shoppers were more satisfied with non-store-based retail channels for their apparel purchases. Research limitations/implications The sample of this study was biased by gender and age. For the apparel retail industry, this paper offers practical knowledge about the relationships between shopping orientation and consumer search and purchase behavior in a multi-channel retailing context. Originality/value No study has utilized the shopping orientation framework to explain consumer behavior in a multi-channel environment. This study provides understanding of consumer product information search behavior on four dimensions (price, promotion, style/trends, and merchandise availability) via multi-channels. Title: The effects of shopping orientations on consumers satisfaction with product search and purchases in a multi-channel environment Author(s): Hyun-Hwa Lee, Jihyun Kim Journal: Journal of Fashion Marketing and Management Year: 2008 Volume: 12 Issue: 2 Page: 193 216 ISSN: 1361-2026 DOI: 10.1108/13612020810874881 Publisher: Emerald Group Publishing Limited Article Information: Title: Attitude toward internet web sites, online information search, and channel choices for purchasing Author(s): Yoo-Kyoung Seock, Marjorie Norton Journal: Journal of Fashion Marketing and Management Year: 2007 Volume: 11 Issue: 4 Page: 571 586 ISSN: 1361-2026 DOI: 10.1108/13612020710824616 Publisher: Emerald Group Publishing Limited Document Access: Existing customers: Please login above. You do not have rights to view the article Purchase this document: Price payable: GBP  £13.00 plus handling charge of GBP  £1.50 and VAT where applicable. Purchase Request this document: Print or e-mail a document request to your librarian. Request Reprints permissions: Request Abstract: Purpose This study aims to examine the influence of attitudes toward particular clothing web sites, specifically favorite ones, on information search at those web sites and on the choice to purchase items from those web sites and from non-internet channels after finding the items at the web sites. Design/methodology/approach Using survey data from 414 US college students who had online shopping experience and favorite clothing web sites that they especially like to visit, hypothesized relationships among attitude toward internet web sites, online information search and channel choices for purchasing were tested using path analysis. Findings Results showed that participants attitudes toward their favorite clothing web sites had a direct, positive effect on their intentions to search for information at those web sites as well as intentions to purchase clothing items from those web sites after finding the items there. Additionally, operating through information-search intentions at the web sites, participants attitudes toward those web sites had an indirect, positive effect on their intentions to purchase clothing items from non-internet channels after finding the items at the web sites. Research limitations/implications Results cannot be generalized to the larger population of young consumers and to other consumer groups. Future research should include other population groups. Practical implications This research provides insights into how college students attitudes toward internet web sites affect their information search at the web sites and their channel choices for purchasing. Our results suggest potential benefits of multi-channel retailing for online clothing retailers targeting US college students and the importance of building effective web sites to elicit those consumers positive attitudes toward the web sites. Originality/value This study is the first to investigate young adult online shoppers attitude towards internet web sites and their information search and channel choices for purchasing. Keywords: Consumer behaviour, Information retrieval, Internet shopping, Purchasing, United States of America Article Type: Research paper Article URL: http://www.emeraldinsight.com/10.1108/13612020710824616 Article Information: Title: Do determinants of online shopping differ for personal shoppers and professional shoppers? Author(s): Amit Bhatnagar Journal: EuroMed Journal of Business Year: 2007 Volume: 2 Issue: 1 Page: 87 102 ISSN: 1450-2194 DOI: 10.1108/14502190710749974 Publisher: Emerald Group Publishing Limited Document Access: Existing customers: Please login above. You do not have rights to view the article Purchase this document: Price payable: GBP  £13.00 plus handling charge of GBP  £1.50 and VAT where applicable. Pu

Wednesday, November 13, 2019

The Character Achilles in Homers The Iliad Essay -- Iliad essays

The Character Achilles in Homer's The Iliad "The first book of The Iliad, appropriately titled the "Rage of Achilles," sets the scene for the remainder of the epic" (selu.edu/Academics/Depts/WritingCenter/The_Growth_of_Achilles.htm). "This rage is invoked by pride, a theme of pivotal importance for the Greeks. Pride is the source of the conflict between Achilles and Agamemnon in Book 1. The incident that provoked Achilles rage took place in the tenth and final year of the Achaean attack on Troy. The king is angered by what he sees as a challenge to his authority. He is furious at Calchas for indicting Agamemnon as the cause of the plague. Rather than graciously admit his mistake, the king becomes monstrous and demands compensation for what should not have been his in the first place. He knows what he must do for the sake of the army, but he demands recognition of his privileged status as king" (gradesaver.com/ClassicNotes/Titles/iliad/summ1.htm). "Agamemnon seizes Achilles' prize, the beautiful Briseis, to sooth his own wounded pride" (selu.edu/Academics/Depts/WritingCenter/The_Growth_of_Achilles.htm). "Achilles, in turn, demands recognition of his status as the greatest warrior among the Achaeans. The loss of Briseis is not humiliating because he has any kind of romantic attachment to her. It is humiliating because she was a prize given to Achilles by Agamemnon for valor"(gradesaver.com/ClassicNotes/Titles/iliad/summ1.htm). "When Agamemnon takes her away as is technically his right to do, although it clearly violates rules of respect and honorable conduct he dishonors Achilles horribly and devalues Achilles' contributions as a warrior" (Approaches of Teaching Homer's Iliad, p37). 'Even though Achilles is correct to sugges... ... 51 Copyright (c) 2003 Fagles, Robert The Iliad Penguin Classics June 2001 Rouse, W.H. D. Homer The Iliad The Story of Achilles published by the New York American Library New York and Toronto First Published 1938 Lawall, Sarah The Norton Anthology World Masterpieces Seventh Edition Volume 1 W.W. Norton and Company, Inc. Copyright 1984 Myrsiades, Kostas Approaches to Teaching Homer's Iliad and Odyssey The Modern Language Association of America New York Fourth Printing 1993 http://www.selu.edu/Academics/Depts/WritingCenter/The_Growth_of_Achilles.htm http://classics.allinfoabout.com/articles/homer.htm http://www.thinkquest.org/library/site_sum.html?tname=23057&url=23057/iliad4.htl http://astro.temple.edu/~rguay/iliad3.pdf www.gutenberg.net/1/0/7/1/10716/10716-h/10716-h.html www.uweb.ucsb.edu/~bmaatuk/achilles.html

Monday, November 11, 2019

Can You Imagine a World Without a Superpower?

Coined by Dutch-American geo-strategist Nicholas Spykman in 1943, the political term ‘superpower’ is used to refer to a country with the ability to influence events or project power on a global scale. ’ It is difficult, if not impossible to envisage a world without a superpower. There are a number of reasons to support this assumption. We begin with the first and most blaring- It is simply difficult to imagine a world without a superpower because history itself has shown that there has yet to come a time when one or more powers do not rise above its counterparts in terms of economic and/or political factors to the extent that they are able to impact various issues on a global level. From the ancient civilizations such as the Persian, Roman, Mongol, Portuguese and Spanish empires to the Russia during the Cold War and the USSR today, we have yet to observe a period of time when the world has observed an equitable balance of power. It can be argued that just because it has not happened yet, does not mean it will not happen one day. This is a firm basis for a counter-argument, however, it must be understood that in the foreseeable future, with more and more powers working towards this ‘superpower’ status (examples include China, Brazil, India and Russia), a world without superpowers is merely a sanguine, idealistic idea. Another issue that would make a world without a superpower a seemingly utopian concept is the difficulty of administrating such a world. Indeed, if no policing power (such as the USA) had the ability to influence global issues, the world would lack a clear sense of direction. Indeed, major decisions would probably be taken by a representative, multilateral body such as the UN (without a system of permanent seats). In such a scenario, it would be quite difficult to please all the parties involved and a conflict of interest would be inevitable. In a setup such as today, whereby the United States largely acts as the dominant political enigma, at least decisions are made and issues addressed. For example, in 1991, when the USSR was finally removed from its position as the dominant power of Eastern Europe, its surrounding sphere of influence fell into a spiral of economic and political despair. One can only imagine the repercussions if this happened on global level. According to Professor Niall Ferguson at New York University’s Stern School of Business ‘power, like nature, abhors a vacuum. In the history of world politics, it seems, someone is always the hegemon, or bidding to become it. ’ This idea proposed by professor Ferguson, is based on the theory that inherently, every country would like power. It is this elusive pull of power and all that it brings with it that would make a world without a superpower merely a product of idealism.

Saturday, November 9, 2019

Essay on Jack Welch General Electrics Revolutionary

Essay on Jack Welch General Electrics Revolutionary Essay on Jack Welch: General Electrics Revolutionary Essay on Jack Welch: General Electrics RevolutionaryWhile analyzing the text â€Å"Jack Welch: General Electrics Revolutionary†, I found that Welch made to thrive one of the largest and most complex companies in the world. He managed to do that as a CEOof General Electric (GE). In this paper work I am giving the characterization of this case and Jack Welch’s management innovations. That is the goal of my paper. At the end I conclude my work with summarizing all aspects previously stated.Jack Welch was able to make difficult changes within GE due to his personal values and believes. According to his words, his character was made by his parents, who taught him to be independent, active and strong. That were his parents, especially mother, who draw a line of certain moral believes for him. Welch’s classmates remember him to be very demanding and that he trounced people by trying harder. Hockey-playing years in college had an influence on his management skills as wel l. The constructive conflict was often used by Jack Welch as a method by which he made his managers to defend their views.Jack Welch took office in April 1981 and claimed that he will make General Electric the most profitable, highly diversified company on earth. That was a difficult task, because of numerous factors. A high level of competition and serious decline of economy in the U.S. had a pretty bad influence on General Electric. In spite of all that factors, Jack Welch was determined to reform all business strategy in order to make GE number onecompany in every business branch. In order to achieve these goals, Welch made the â€Å"three circle concept†.All businesses within GEwere divided into core, high technology, or service areas. The fifteen businesses that dominated their markets could be placed in a circle and other ones had to be divested. Welch developed directions for every circle of his business. Healso marched under the standard of destaffing. Ithelped reduce unnecessary bureaucracy.Jack Welch understood that removing unnecessary bureaucracy also requires cultural changes within the company. He wanted that all employees were thinking external. They were ought to compare their work results with the work results of their competitors, which are out there in the world.Welchwas confident that good business leader should always listen to his employees. It is important to have certain vision, but it is even more important to be reachable for the employees. True leader is obliged to communicate with his people and he should always tell them the truth. Jack Welchstated that the effectiveness of the company depends on self-confidence of its managers. Insecure managers create complexity.Welch decided to compensate the capital changings within the company to his employees.He also wanted to give more recognition to individual contributors. That was the right thing to do from moral and ethical perspectives.In 1989 Jack Welch implemented such importan t activity for managers as Work-Out. During Work-Out managers were able to solve different problems, list all their complaints, debate all the solutions and give their presentations at the final day. Work-Out helps to redefining the relationship between boss and subordinate; it also forces people to communicate with each other and that is very important in such a diversified company as GE.Another one remarkable innovation of the GE was implementing Best Practices of other companies. Basically, Welch took all effective management ideas from other companies and implemented it to GE, with the consent of previously mentioned companies.There also has been made several changes in order to make GE boundary-less company.In conclusion I would like to state that Jack Welch truly made a revolution within General Electric. He managed to transform it into a highly effective company and a perfect working place for free, creative and open people. At the same time Welch preserved dignity and corpor ate ethics within competitive market.

Wednesday, November 6, 2019

Background and Impact of The Civil Rights Act of 1964

Background and Impact of The Civil Rights Act of 1964 The fight against racial injustice did not end after the passage of the  Civil Rights Act of 1964, but the law did allow activists to meet their major goals. The legislation came to be after President Lyndon B. Johnson asked Congress to pass a comprehensive civil rights bill. President John F. Kennedy had proposed such a bill in June of 1963, mere months before his death, and Johnson used Kennedys memory to convince Americans that the time had come to address the problem of segregation. Background of the Civil Rights Act After the end of Reconstruction, white Southerners regained political power and set about reordering race relations. Sharecropping became the compromise that ruled the Southern economy, and a number of African-Americans moved to Southern cities, leaving farm life behind. As the black population in Southern cities grew, whites began passing restrictive segregation laws, demarcating urban spaces along racial lines. This new racial order eventually nicknamed the Jim Crow era did not go unchallenged. One notable court case that resulted from the new laws ended up before the Supreme Court in 1896, Plessy v. Ferguson. Homer Plessy was a 30-year-old shoemaker in June of 1892 when he decided to take on Louisianas Separate Car Act, delineating separate train cars for white and black passengers. Plessys act was a deliberate decision to challenge the legality of the new law. Plessy was racially mixedseven-eighths whiteand his very presence on the whites-only car threw into question the one-drop rule, the strict black-or-white definition of race of the late 19th-century U.S. When Plessys case went before the Supreme Court, the justices decided that Louisianas Separate Car Act was constitutional by a vote of 7 to 1. As long as separate facilities for blacks and whites were equal separate but equal Jim Crow laws did not violate the Constitution. Up until 1954, the U.S. civil rights movement challenged Jim Crow laws in the courts based on facilities not being equal, but that strategy changed with Brown v. Board of Education of Topeka (1954) when Thurgood Marshall argued that separate facilities were inherently unequal. And then came the Montgomery Bus Boycott in 1955, the sit-ins of 1960 and the Freedom Rides of 1961. As more and more African-American activists risked their lives to expose the harshness of Southern racial law and order in the wake of the Brown decision, the federal government, including the president, could no longer ignore segregation. The Civil Rights Act Five days after Kennedys assassination, Johnson announced his intention to push through a civil rights bill: We have talked long enough in this country about equal rights. We have talked for 100 years or more. It is time now to write the next chapter, and to write it in the books of law. Using his personal power in the Congress to get the needed votes, Johnson secured its passage and signed it into law in July 1964. The first paragraph of the act states as its purpose To enforce the constitutional right to vote, to confer jurisdiction upon the district courts of the United States to provide injunctive relief against discrimination in public accommodations, to authorize the Attorney General to institute suits to protect constitutional rights in public facilities and public education, to extend the Commission on Civil Rights, to prevent discrimination in federally assisted programs, to establish a Commission on Equal Employment Opportunity, and for other purposes. The bill prohibited racial discrimination in public and outlawed discrimination in places of employment. To this end, the act created the Equal Employment Opportunity Commission to investigate complaints of discrimination. The act ended the piecemeal strategy of integration by ending Jim Crow once and for all. The Impact of the Law The Civil Rights Act of 1964 did not end the civil rights movement, of course. White Southerners still used legal and extralegal means to deprive black Southerners of their constitutional rights. And in the North, de facto segregation meant that often African-Americans lived in the worst urban neighborhoods and had to attend the worst urban schools.  But because the act took a forceful stand  for civil rights, it ushered in a new era in which Americans could seek legal redress for civil rights violations. The act not only led the way for the Voting Rights Act of 1965 but also paved the way for programs like affirmative action.

Monday, November 4, 2019

Business and Society Case Study Example | Topics and Well Written Essays - 2500 words

Business and Society - Case Study Example From this study it is clear that Warhead cables were used in missiles and to prove its quality, it underwent a series of tests. It was tested using an elevated heat test where it was bent at a ninety degree angle and placed in an oven at approximately 105 degrees for seven hours. If the seal did not delaminate, then the cables passed the test. Then Stanton could prepare a detailed report of the test results. In the previous week, a large order came by with a short time period.   On Friday, Stanton tested the batch of cables and two out of the ten tested had a problem. He immediately reported this to Harry who directed him to wait and see if the source inspector could note the problem. Stanton did not like this directive at all as he thought of all innocent civilians out there who would suffer form this unethical behavior. These cables were used in missiles fuses and Stanton was worried sick of a problem arising if these cables were to be used. What if a missile was to fire itself a nd harm innocent civilians? He thought of anyone in the parent corporation that he could contact but to no avail.According to the discussion  Bryson corporation should act ethically due to the dangers they would be exposing civilians into if they failed to act ethically. Considering the warhead cables are used to manufacture switches used in missiles unethical behavior could cost innocent lives in the case of such missiles firing themselves.

Saturday, November 2, 2019

Choose a particular strategy and evaluate it in light of the future Essay

Choose a particular strategy and evaluate it in light of the future aims of Biocote Ltd - Essay Example Market penetration strategies are most effective when a company seeks to expand its product market. The Biocote’s Ltd current market has its limitation and venturing into other markets will benefit the company immensely. This paper will discuss in detail how Biocote Ltd can implement market penetration strategies and evaluate the strategy. Biocote Ltd can rely on price penetration as one of the most effective approaches used by other businesses that pursuing market penetration. Price penetration requires the company to lower the prices of its products, a factor that is likely to attract new customers in the new market. Adopting a cost production approach will allow Biocote Ltd to lower its prices and have a competitive advantage over its competitors. In other cases, modifying the product may justify the price reduction to increase sales later. Lowering prices has often proved to be an effective strategy for companies that need to penetrate into new markets. The executive and marketing team of Biocote Ltd should give this aspect a proper consideration. A second effective approach to implementing a market penetration strategy is through increased promotions. Notably, promotions have the capacity to create brand awareness and motivate customers in a new market to try out the products. Increased brand recognition and awareness translate into increased sales. Therefore, promotions can help Biocote Ltd to establish a strong customer base in the new market. The company should introduce promotions such as trade discounts and other offers when it moves into a new market. However, there is a salient need for Biocote Ltd to be more aware of the dynamics defining the new markets, as well as the customer preferences and dynamics. Such knowledge will help the company design the most effective promotion. Biocote Ltd can register increased sales in both the healthcare