Sunday, October 6, 2019
Smoking English Essay Example | Topics and Well Written Essays - 750 words
Smoking Is a Dangerous Precedent - Essay Example This paper tells that harshness aside, smoking brings to an end the basis of life and what more sinful can an aspect of life be if it kills people? If people understand that they are falling into a hole and they keep on saying all sorts of things about it, it would seem imaginable (Hove, 2011). But when they know less about it and do absolutely nothing, one can expect naivety on their part. The peer pressure is just too much for a person to take. It brings people to a single platform from where they can go all wrong. Someone must stop them to bring sanity within their domains. The young ones are therefore straying for a multitude of reasons. Smoking is playing havoc with their lives and they are just not pushed. This is because they do not care much about what is taking place within their fore. The safe alternatives that the young ones can perhaps adopt comprise of the substitutes that they shall find to keep them busy at all times. The urge basically makes their life difficult and i t would be safe to state that this urge has to be controlled and kept at a safe distance. It will solve half the problems that smokers have within their folds. The smokers need to be sure that they are following the right path when they are controlling their urge and this can only come about when they know what they are doing. Indulgence in smoking has meant that their parents have been concerned for a number of reasons. They want to know why their children are adopting this habit where even most of the parents themselves are addicted to smoking in the first place (Stein, 2011). It has been seen that parents discourage their wards no matter they smoke or not. This is a positive development that has come to the fore with the changing times and there has been reason enough to believe such a premise since parents do not want to put their childrenââ¬â¢s lives at risk. Within the understanding that smoking can bring about for the general masses, what is most significant is how well sm oking has been able to manifest its negativities amongst the target audience that it is spoken about. This has been understood in the wake of the different ailments and diseases which have been highlighted time and again. Teenagers and young adults perhaps forget the fact that their comprehension levels are limited and they are unable to decipher the true meaning and representation of smoking in the clearest sense possible. They are less educated and have little know-how of what is deemed as right and what is seen as wrong within the correct frame of things (Guha, 2011). The role of the parents is an important one because they must keep a check as to where their young ones are going and what kind of friends they are hanging out with. Their stern check over their children is quintessential because this would ensure that they stay on the right track no matter how bad their respective companies are. In the end, it would be safe to state that smoking is a dangerous precedent that has be en set within the present day generation. This is so sad because smoking was a problem, remains an issue and will be a serious concern in the days to come. For starters, peer pressure is something that should be paid attention towards.Ã
Friday, October 4, 2019
MediaSpark Case Study Example | Topics and Well Written Essays - 500 words
MediaSpark - Case Study Example The estimated target market left the company with no choice, but to choose America and Canada due to the large number of elementary schools. The major problem on the marketing strategy to be used in selling and distributing the product was the main concern. Georghiou felt that it was going to be difficult to convince the educators about the product without trial; they needed to see and try the product before making decisions. The market price of the product was; however, going to vary depending on the country and the user. Further to this, they identified various distribution channels that would handle the distribution and advertising duties (Lionais et al. 24). Although the product sell was successful, the solutions came with various advantages and disadvantages. The use of educational catalogue enabled selling several products to the educational institutions through online catalogues and publications; however, they would not sell Go Venture Entrepreneur in North America through any other channel because he had reached the teachers he had wished to reach. The use of software distribution as an indirect distribution channel was going to give the product a high profile than the text books and catalogues; however, the software distribution channel was highly fragmented with no companies operating in both the U.S. and Canada market. The choice of MarkED was disadvantaged because it lacked a sales force that would complement the catalogue. Furthermore, Georghiou was not sure if it was going to reach the teachers. On the other hand, IBM was technology-based and was already making distributions to schools (Lionais et al. 26). They then made an ag reement on a distribution that would last two years. He also had the choice of using an in-house distribution channel. He was going to hire sales representatives in the two countries to conduct sales, email campaigns, CD demos, public speaking, direct mails, seminars, and catalogue sales. Here, he would make a much
Thursday, October 3, 2019
Deinstitutionalizing the Mentally lll, Blessing or Curse Essay Example for Free
Deinstitutionalizing the Mentally lll, Blessing or Curse Essay The deinstitutionalization of the mentally ill was originally and idealistically portrayed as a liberating, humane policy alternative to the restrictive care in large state supported hospitals. It was supposed to help these individuals regain freedom and empower themselves through responsible choices and actions. Due to many funding issues, stiff opposition from communities, and ill-equipped patients, who are unable to live independently, this idealized program, has not always been a blessing for the communities or the patients. In the early 1960s, President John F. Kennedy signed into law a bill that began the movement known as deinstitutionalization. The purpose of the new law was to put an end to the tendency to warehouse people with mental illnesses, as well as those with developmental disabilities, including the mentally and physically handicapped. The idea was to move the less severely mentally ill from those large institutions into the community, where local treatment centers would be established to provide them with medical, psychiatric, and social support they need to be able to live and function. see more:smartphones boon or bane Some believe that deinstitutionalization has been and continues to be successful. Perhaps one of the brightest spots of the effects of deinstitutionalization is that the mentally ill have gained a greatly increased measure of liberty (Curtis, 2008). Some persons, despite their illnesses, have realized a certain degree of normalization in their daily activities. Some live independently, and some are productively employed, achievements that were relatively rare in the days before deinstitutionalization. For these people, deinstitutionalization must be regarded as a positive development (Warner, 1995). Deinstitutionalization, which has now become a synonym for neglect, was supposed to be about creating a new system of services and supports that would allow people with mental illness and mental retardation to thrive in their communities outside of hospital settings during all of the times when they did not need hospital services (Sheth, 2009). An estimated 4. 5 million Americans today suffer from the severest forms of brain disorder, schizophrenia and manic-depressive illness and out of 4. million 1. 8 million, or 40 percent are not receiving any treatment on any given day, resulting in homelessness, incarceration, and violence; one of the reasons for this condition is a failure of the deinstitutionalization policy (Fact Sheet, Treatment Advocacy Centre).? The U. S. Department of Justice estimates that over a quarter of a million mentally ill individuals are currently incarcerated in the U. S. state and federal prison system constituting between eight and 17 percent of the entire prison population (Martin, 2011). The deinstitutionalization policy, which has been improperly implemented, is acting like a misguided missile, causing the helpless and defenseless inmates of the mental hospitals to beg and roam on roads and footpaths; to take refuge in shelter homes and beggarââ¬â¢s homes; to starve on streets and eat from garbage bins; they are jeered in society and physically, verbally and sexually assaulted in alleys; they languish in jails and suffers in prisons; They shiver in cold and simmer in heat; they sleep on a bed of earth with a blanket of sky. We have shifted problems of mental hospitals to the streets, jails and shelter homes. While making backyards of our mental hospitals beautiful, we have made our streets ugly. The process of deinstitutionalization has turned deadly. There seems to be some truth in a saying that deinstitutionalization caused people to die with their rights on (Sheth, 2009). The deinstitutionalization movement of the mentally ill had a noble aim, but failed to achieve it. The solution is complicated but it is not however, unattainable. Train the police officers and emergency responders on how to identify the mentally ill patients and direct them into available treatment facilities. The government can also fund jail and prison programs that screen, evaluate and treat mentally ill inmates. Establish mental health courts, more mental hospitals with adequate staffing, start more day care centers, and have more adequate affordable housing. These solutions, of course, all require funding from a government with spending that is already out of control and on the brink of bankruptcy. But the truth is, by helping the seriously mentally ill, we help ourselves.
Internet Threats and Security for Protection
Internet Threats and Security for Protection Introduction Technology is still under development in Saudi Arabia and has not reached the advance level as its reached in UK and USA. Therefore Internet Security is still a main as well as a major issues to most businesses and organisations in Saudi Arabia. Media hype surrounding the topic of Internet security can scare the general public, as the novice users. The continual talk of the latest virus alerts, which have corrupted thousands and stories of teenagers hacking into networks and stealing numerous informations such as personal details, credit card details other details which relates to different institution, is enough to put anyone off the idea using their personal details over the Net. All this media hype needs to be addressed to see if it is just that, or is there a ground for all this sensationalism. The chances to actually undergo extensive research and establish leads and ideas that I have not come across before about Internet Security, it is a major challenge for me and I feel that by conducting this research it will broaden my knowledge about Internet Security and also make people understand the aspects of Internet Security which they havent come across before. Abstract This dissertation looks at the question: ââ¬ËIs The Internet Secure?. Where secure is defined as ââ¬Ësecure enough to trade or pass information via the Internet. With the constant media hype of Internet Security, it felt that this title to be one of interest and appealed. Therefore, research include, determining what types of organisations are present on the net, and categorising them into several groups. Studying past literature to determine all possible threats on the Internet and then to discuss possible solutions to these threats. As society is in the information revolution, in which the Internet is the main channel for distribution, this area of research is related to each and every one of us. Internet trading is a common practice amongst the new age. However, this is a subject that needs to be addressed to see whether all this ââ¬ËMedia Hype is just that, or is their just grounds for concern. With the number of users on the Internet growing daily, and businesses becoming completely dependant on technology, serious issues of vulnerability need to be looked at. To ensure that no gaps appear in the security aspects of Internet, which will in turn trap the new users. Conclusions where made by in viewed and researched based companies. This research aims to provide the reader with a deeper understanding of Internet Security. The Internet is a medium that will be a part of future generations, and it is paramount that it is managed correctly and to ensure it does not have devastating consequences for those involved in its operation. The research carried out draws the conclusion, that the Internet is not a secure for trading, and that a regulatory body is required or a more structured policing. Therefore more actions from organisations are needed as well as from the government. Future research can concentrate on data recovery methods, application methods and interviewing in more depth and on a longer scale. Acknowledgement Chapter Outline Chapter1: The introductory of this chapter starts with the definition of I.T security. It follows on with what the aims and objectives are and the methodology followed during the fact finding exercise. The chapter outlines the scope and the limitations of the project. Chapter 2: This chapter describes how the internet was formed and how it has developed. Finally it highlights the key developments of the internet throughout its early life cycle, and the growth of its user base. Chapter 3: Defines the types of businesses that trade on the net categorising them into several divisions, which are further explained in the appendix. This chapter also talks about on-line banking and how to purchase over the Internet. Chapter 4: Starts by discussing the potential threats of viruses, how they work and how they spread. It also discusses what different authors believe to be the main threats of the Internet. It also talks about all the potential threats and briefly defines each one. Chapter 5: Discusses the potential answers to the security issues, broadly discussing all of the security applications available. The chapter introduces computer security as well as the different application. Chapter 6: The fact finding stage highlights the responses gained from the organisations, which were interviewed. The findings were incorporated into graphs to illustrate the answer. Chapter 7: To conclude this study, the author discusses what the project aims were, how the findings were achieved and why came to this conclusion. A SWOT analysis was also carried out to assist the conclusion. Appendix: Any information that did not fit in the thesis, which the author felt important, is included in the appendices. There are also other documents and information, which has been referenced in the dissertation in the appendices. I.T security as defined in this dissertation is the practices, procedures, applications and services which ensure a security breach or loss of use of a computer system does not occur. Security provides protection for IT system resources from human action. The security products, services and procedures used will aim to protect any hardware or data in the system. 1 Introduction Media hype surrounding the topic of Internet security can scare the general public, as the novice users. The continual talk of the latest virus alerts, which have corrupted thousands and stories of teenagers hacking into networks and stealing numerous informations such as personal details, credit card details other details which relates to different institution, is enough to put anyone off the idea using their personal details over the Net. All this media hype needs to be addressed to see if it is just that, or is there a ground for all this sensationalism. 1.1Human Action Human-inspired security breaches are defined as accidental or deliberate, passive or active attacks, which result in the loss or damage of I.T system hardware, software or data. This can come in many guises, as the following shows: Viruses where a program is placed on a system with the intention of corrupting its processing. The theft of data. Hacking deliberately gaining unauthorised access to a computer system. The invasion of privacy, through the unauthorised disclosure of data and breaches of data protection legislation. Sabotage interfering with the processing of a system, such as the placing of a ââ¬Ëclone machine. 1.2The Key areas of I.T Security I.T security involves a number of key areas. The most important of these are introduced under the following headings. 1.2.1 E-Commerce E-Commerce (Electronic Commerce) enables measures to secure web merchants sites from external hacking and intrusion, with the aim to develop secure online transactions. E-Commerce requires the means to engage in electronic transactions without the fear that credit card details and bank details could get into the wrong hands. These involve, for example, the use of secure payment servers and secure software servers. 1.2.2 Network Security The aim of network security is to create a secure environment in which the users can send classified information and business applications solely to those people that they wish to receive them, preventing others from accessing the data. This is an issue of increasing concern, given the growing importance of networks to companies. This aspect of security tends to resolve around using network management and security software tools, and developing network security policies. 1.2.3 Virus Protection To prevent computer viruses from infecting I.T systems, companies use anti-virus software and alert systems. The requirements for information security as well as the type of products and services used to have undergone a major transformation since 1995. The need for security has widened, where traditionally it was confined mainly to governments, protecting classified data, financial institutions and protecting messages with monetary value, today most medium-sized to large organisations require information security. The growth of computer networks, group working and mobile working, and the subsequent need to communicate with contacts outside the organisation, has made I.T systems more open to external forces and more vulnerable to internal action. Today, security is demanded to handle communications through the internet, intranet, extranet and Virtual Private Networks (VPNs). All of these technologies use common, standardised networking protocols and such networks are exposed to greater security threats than before. In a modern computer network, employees share information with each other, and companies share information with their suppliers, partners and customers. This calls for a more sophisticated security system, which is more comprehensive and flexible than the products and services used in the past, and which can be deployed to a large number of users in a consistent, manageable and secure fashion. 1.3 Aims and Objectives Introduce and provide an overview of the development of the Internet. How it was started and how it works. Identify the diverse nature of businesses that trade on the Internet, their roles and their functions. Identify and disseminate the literature available on threats inherent in the use of the Internet including viruses and secure transmission of data. Identify and discuss the appropriate solutions for any potential threats for internet security. Evaluate and conclude the arguments, to discuss potential ways of enforcing a suitable security policy for web-based companies. 1.4 Methodology Information for this study was gathered from journals, books, Internet sources and certain company documentation pertaining to Internet security. The best form of methodology for this type of research would be to use Quantitative and Qualitative analysis as well as the use of secondary sources, as mentioned. Quantitative research was used to gain rich information, basically finding out the ââ¬Ëexperts opinions from the relevant areas of expertise, for the research. The qualitative research consisted of a questionnaire with open ended and some closed questions. The main aim of this questionnaire was to elaborate on the authors literature review, basically agreeing or disagreeing with the literature presented on this study. For the quantitative aspect of the research a short structured questionnaire was designed, this consisted of closed questions, which would give a statistical look to the fact-findings chapter. This questionnaire was distributed in Preston and Jeddah (Kingdom of Saudi Arabia). Closed question questionnaires were used to obtain the awareness of the issues presented, to gain views, beliefs and attitude to these. The questionnaires were designed to ensure easy reading, therefore overcoming any confusion on the respondents behalf. Questions were explained to ensure comple te reliability in their responses 1.5Limitations and scope of Dissertation As Internet Security is a very large topic, this author has limited his research to the following: Types of businesses on the web, categorising them in several areas. Discussing threats that past authors identified. Discussing possible solutions to these threats that past authors identified. Carrying out a first hand fact-finding excersing to either agree with the literature or disagree. Setting out the key differences. Summarising the thesis and presenting the findings. 2What is the Internet and how it started The revolution in computer networking has made it possible for personal computers able to communicate with each other. This chapter is about the Internet and basically a history of its beginning. It provides a comprehensive view of literature regarding factors that promote e-commerce and aid the new era of online banking. The scale of the Internet is awesome and therefore more and more people are connecting to the net. Statistics continues to grow on a daily basis at an alarming rate. People from all walks of life, not just the scientist, teachers and computer experts use the Internet. 2.1Origins of the Internet The Internet has its roots in a network set up by the United States Department of defence in the early 1970s (Ellsworth 1994). This network (ARPANET) was a collection of four computers. By 1996 the Internet was a collection of over 50,000 networks. The methods they slowly developed included a ââ¬ËProtocol (which is a computer language) allowing dissimilar computer systems to communicate, and a method that routed data through multiple communication paths using groups of data with their own destination addresses built in packets. Prior to this technology, even with machines that were compatible, the used had physically carry magnetic tapes and insert them into another machine in order to transfer data from one computer to another. With the new technology, a computer simply has to put its data into envelope called an Internet Protocol (IP) packet, and ââ¬Ëaddress the packet correctly to send a message on the network. The philosophy was that every computer on the network could talk to any other computer. 2.2NSF Developments In the late 1980s the National Science Foundation (NSF), started expanding its own NSFNET using the technology developed by ARPANET.â⬠(Krol 192). Five supercomputer centres at major universities were created, and connections were used for e-mail, and for transferring data and information between sites. This created a communications problem, they needed a way to connect their centres together and to allow the clients of these access. ââ¬Å"In response, the NSF built its own network based on ARPANET Internet Protocol (IP) technology. ââ¬Å"(Eraase 1994) it connected these centres with telephone lines. Since the telephone lines were paid for the mile, it was obvious that each university could not be connected to a supercomputing centre, due to financial constraints. They instead created regional chains of networks, with each university being connected to its neighbours, at the top of this chain there was a connection to the super computer. Eventually any computer was able to communicate with any other computer by forwarding the conversation through its neighbours. 2.3Internet Created The NSF agreed to commercial exploitation and on-line service sprang up. ââ¬Å"CompuServe, the first of these, started in 1970 and fifteen years later claimed 3.2 million users in 20 countries. It was part owned by commercial relationships with the German group Bertelsmann and the French group Hachetteâ⬠(Winston 1998). Prodigy belonged to IBM and Sears claimed 1.4 million users. His ââ¬ËWorld Wide Web was open for business in 1992. Meanwhile a commercial Internet Exchange had been established in 1991. Large multinational corporations have been on the Internet for years, although their access has been limited to research and engineering departments. In 1992, many of the restrictions on commercial use began to change. In fact, there are already more commercial sites on the Internet than educational and research sites combined, according to statistic, commercial addresses now comprise of 51% of the network domains. The Internet is made up of over 25,000 networks that can transfer data via many routes. However, it is near enough impossible to pin down any exact numbers concerning its size due to the fact its growth is unparalleled by any other industry. Ghosh 1998 states that the Internet has been adopted faster than any other technological development. 2.4The use of the Internet Between 1993 and 1998, more than 100 million users of the Internet were estimated, and the number of sites of the WWW has grown from 130 to 4.3 million sites. As of June 1999, the Internet users population has been placed at around 170 million people. It has been forecasted that the number users will reach 350 million by 2005 worldwide. In simple terms, the Internet allows millions of people all over the world to communicate and to share. ââ¬Å"The Internet is the first global forum and the first global libraryâ⬠(Hahn and Stout 1994). Commercial businesses are the fastest growing segment of the Internet, you can gather information communicate and actually transact business on the Internet. Here are a few reasons why businesses are using the internet: E-mail is a low cost method for maintaining communication at all levels. Messages can be exchanged in minutes. E-mail is a domain for sharing information and is said to be one of the most important productivity packages around. The Internet allows businesses to be in touch with different branches and work teams at other locations. This creating a virtual community in which people are able to communicate on a daily basis. Using the Internet many organisations are able to bring a global edge to home grown businesses. For many companies, the use of the Internet creates a level playing field; smaller businesses can create an image on the network to compete with larger businesses. ââ¬Å"Many corporations use the Internet to keep a check on the rate of emerging and new technologies, and the market response to these technologiesâ⬠(Ellsworth 1994). The public information and discussion groups available on the Internet provide insight and feedback that is hard to get in any other manner. Here people from all levels of industry, exchange information on marketing research and technological developments. Having the most up-to-date information about your markets and your products allows you to keep or increase your competitive edge. In a business where the concept of getting closer to the customer prime, the internet is becoming increasingly important as well. Internet sales, where customers are sought and served on-line through Gophers and variety of virtual storefronts, are also becoming more popular. Customers can be and are sought before the sale and supported after sale. Companies are able to do actual product sales transactions on the Internet. In addition, in some cases it is possible to deliver the product via the Internet, as with software and information. Many companies have been using the Internet for the transmission of data. The major financial institutions in the world use the Internet extensively for exchanging information and files. Corporate users are now responsible for the transfer of the largest portion of data. 2.5The World Wide Web ââ¬Å"The WWW is the newest information resources to the Internetâ⬠(Krol 1992). It is based on technology called Hypertext Mark-up Language (HTML). Hypertext is a method of presenting information where selected words in the text can be expanded at any time to provide other information about the word. These words are actually links to other documents, which may be text, picture or sound format. The presentation of information on the web is much friendlier that traditional methods and the interface provides for a user -friendly environment. ââ¬Å"The combined with the ability to use any of the Internets tools within the web has been a catalyst for the rush to get on the Internetâ⬠(Ellsworth 1994). The WWW can be defined as a global, interactive, dynamic, cross platform, distributed, graphical, hypertext information system that runs over the Internet and is available globally (Lemay 2000 Online). In the early 1990s the advent of the World Wide Web on the Internet represented the tuning point for electronic ecommerce by providing an easy to use technology solution to the problem of information publishing and dissemination. The web made electronic commerce a cheaper way of conducting business and enable more diverse business activities. The WWW infrastructure is built around the following:- Web sites: A web site is a collection of web pages maintained by a college, university, government, agency, company or individual. Web age: A web page is document on the web. Web pages can include text, pictures, sound and videos. Web server: A web server is a computer connected to the Internet that makes web pages available to the world. The Wold Wide Web is a dynamic structure, and due to the popularity of this new phenomenon it is expanding rapidly. The reason for it being so popular is the fact that information can be made available to anyone anywhere in the world in a matter of minutes (Kalakota, Whinston. 1997 p.145). What types of businesses are trading on the web Business is changing. The way we do business is changing. The electronic commerce revolution is upon us, and perhaps represents the greatest single change to the way in which business operates. Companies of all sizes are now working together to establish their position and create opportunities in this world. The Internet phenomenon has result in a major shift in the way organisations do business, and how they intend to proceed in the future. Many organisations now realise that without an e-commerce strategy they will not survive. This realisation has affected, and will continue to affect business relationship of all sizes. E-Commerce E-Commerce (Electronic Commerce) is the buying and selling of goods and services on the Internet, especially the World Wide Web. In practice, this term and a newer term, e-business are often used interchangeably. For online retail selling, the term e tailing is sometimes used. E-Commerce can be divided into: E-tailing or ââ¬Å"Virtual Storefrontsâ⬠on web sites with online catalogues, sometimes gathered into a ââ¬Å"Virtual mallâ⬠. The gathering and use of demographic data through web contacts. Electronic Data Interchange (EDI), the business to -business exchange of data. E-mail and fax and their use as media for reaching prospects and establish customers (for example, with newsletters). Business-to-Business buying and selling. The security of business transactions. Electronic messaging technologies streamline business processes by reducing paperwork and increasing automation. (Kalakota, Whinston. 1997 p.54). E-Commerce today, is a very wide area of study due to its phenomenon growth and thus, can be described as an umbrella concept, which will continue to grow. Therefore incorporating a variety of disciplines and can be described as following path of a hierarchical structure. Recent technology has increased the capacity of e-commerce transactions, resulting in noticeable paradigms in a number of daily transactions. There are unforeseen benefits not only to businesses, but also consumers, the government and even on a global trade level. The technology that is responsible for taking e-commerce to a global stage is the Internet. There are also other factors that have affected the growth of e-commerce, for example, the availability of hardware at affordable costs, as well as the increased power and ease of use of operating systems and software. With the prices of computer hardware and network equipment falling, e-commerce is seen as one of the strategic investments in line with marketing goals of most business, to stay competitive, improve productivity and to deliver quality services. Commonly, e-commerce is associated with the buying a selling of information, products and services via computer networks. It is also known as the paperless exchange of electronic information, whether it is by electronic data interchange (EDI), electronic funds transfer or other similar technologies methods. Overview of E-Commerce E-Commerce, evolved as early as the days of Alexandra Bell, followed by the launch of terrestrial television and radio communications. However recent developments in technology have increased the efficiency in commerce and have placed e-commerce under the spotlight. During the mid 20th century, the channels through e-commerce took place were telephone networks, the television and the radio. In their infancy they impressed businesses and consumers, so did EDI in the early 1970s and now at present the Internet has bought back the same feelings. Below is an illustration of a generic framework for electronic commerce (Kalakota, Whinston.1997) The figure 1 below is an illustration of the e-commerce overview. Electronic Commerce B2A B2C C2A B2B The Internet Telephone Fax The Internet Telephone Fax Cable Satellite, and Digital TV Telephone Fax The Internet including EDI, marketing, purchasing and e-mail Collaborative Work Groups EDI via Internet Telecomm uniting Electronic Funds Transfer E-Mail Video Conferencing Telephone Fax Figure 1 Types of E-commerce E-commerce covers five main categories that are listed below: Business to Business (B2B) Business within Business (BWB) Business to Administration (B2A) Consumer to Administration (C2A) Business to Consumer (B2C) These are discussed in detail in Appendix 3 titled Types of Web Traders. The introduction of e-commerce has facilitated consumer to business transactions, customers learn about products through electronic purchasing. From a consumer perspective electronic commerce facilitates for the following: Social Interaction. Electronic Commerce enables consumers to communicate with each other through electronic mail, video conferencing and news groups. Personal Finance Agreement. Use electronic means to manage personal finance and management using the online banking tools Purchasing Products and Information. Allows consumer to find online information about exiting and new products and services. (Kalakota, Whinston. 1997 p.139) The explosion in Internet traffic has created other problems. Mostly worryingly, there are continuing fears that many companies offering financial services online are not providing a secure environment to clients and customers. Purchasing on the Web The Internet and the World Wide Web have dramatically changed the way consumers seek and use information online. Whether they are shopping for Information or shopping for goods and services on-line, todays consumers must learn how to manage the resources (Kelley, B Weibke, J. 2003). Most attention on e-commerce has focused on business-to-business transactions and analysts say the surging electronic business-to-business market is about to explode. On-line purchasing systems promise to streamline operations, save time and cut the costs of businesses drowning in order processing. Most buying over the Internet focuses on indirect materials, also known as non-production goods or maintenance, repair and operations. Typically, such applications let any employee order through managed access rights, non-production supplies and service from an on-line catalogue using on a web server. They simplify the process of buying day-to-day items such as office equipments, PCs and other electrical goods to run the company. According to a recent study carried out by Forrester Research (2000) has suggested that the on-line commerce will raise form à £657 billion in 2002 and reach the figure of à £6.8 trillion in 2004. The statistics suggested that more customers are shopping day by day and revenue is increasing for on-line shoppers. The view is supported by Swazey (1999) who believes that the on-line shoppers spend more time on-line shopping than normal high streets shoppers and the amount of money spent rises with the amount of time spent on-line. The view point of Swazey (1999) is similar to Ghosh (1998) as he states that the ââ¬Å"On-line shoppers tend to get carried away within the comfort of their own h omeâ⬠. However the above viewpoint have contrast in bearing to an article (Computer Fraud Security, Sept 2000, p.2) that seemed to suggest that although it may seems like everyone is on-line, but its not true. Internet Banking Internet Banking is no longer a novelty. Banks have long ceased being worried about trading via the web, and instead have embraced the newest delivery channel with enthusiasm. All clearing banks, including the connected building societies, now offer Internet based banking services and all will have an online current account in place. Some, including Barclays, Woolwich, Abbey National and HSBC have developed other channels of delivery including digital TV and mobile phone banking service. All e-banks promise busy current account users speed and convenience. There are no counter queues in cyberspace and e-banks are open 24 hours a day, seven days a week. On-line banking customers can check their balances, view recent transactions, transfers funds, set-up standing orders and direct debits and also option to pay bills on line. In the past, the banking industry was chiefly concerned with asset quality and capitalisation, if the bank was performing well along these dimensions than the banks would be profitable. Today performing well on asset quality and capitalisation is not enough. (Kalakota, Whinston.1997 p.30) The Internet is a medium that provides a new dimension and introduces much opportunity especially for banks; the main advantages are outlined as follows: Enable innovation Cost savings Increased customer base Enable mass customisation Marketing and communication Developments of non core business In a report issued by the BE Agency (2000), it states that the experts believe that the slump in high street banking due to deregulation can be revived by this new medium e-commerce, offering the potential of reviving or at least halting the decline, by raising customer service standards, increasing the choice of retail financial products, reducing the charges and giving customers a more convenient way to manage their money. It is agreed with Patterson (2000) that the banks will have to go online, his reasons being as to why banks have to adopt this new medium is ââ¬Å"in short answer to win over new customersâ⬠it is easier to leave it at that, but also the factors he has also said that it will also promote this new medium are lower cost of account servicing, cross selling opportunities, customer relations and because they have to. Customers can now deal with their accounts personally at any time from anywhere in the word for any reason. Customers can also have the same facility to compare and contrast the products and services of a multitude of banks and choose one that meets their requirements. Knowing how safe is it to use the website an
Wednesday, October 2, 2019
A Seperate Peace, by John Knowles :: essays research papers
A Separate Peace was written by active author John Knowles from his real experiences and personal struggles. Knowles attended Phillips Exeter Academy, an exclusive New Hampshire prep school, for two summer sessions in 1943 and 1944. This book vaguely outlines his experiences at Exeter with himself as the main character but under the name of Gene Forrester. Knowles' novel tells the somber story of a young man's struggle to escape from himself and his world; to achieve a special and separate peace. The primary setting of A Separate Peace is at the Devon School. The exact location of this school is not known in terms of a state, but it is identified as being in the South, sitting between a freshwater and a saltwater stream. The bulk of the story takes place in the years of 1942 through 1944 at the same time as World War II, but the beginning and end of the book consist of Gene looking back on his years at the Devon School 15 years after he had attended it. A Separate Peace considers two conflicts: man against man and man against himself. Early in the story Gene believes that his problems lie within his best friend Phineas (Finny), but later he realizes that his conflict is internal. Misplaced jealousy, fear, love and hate fight for control of Gene's actions. When the dark side of him wins for a brief moment and he pushes Finny out of a tree it ends his man against man conflict and makes Gene realize that Finny's intention has never been to sabotage him. He had only wanted to have a close and meaningful relationship with his best friend, but their relationship was forever scarred by Gene's betrayal. Gene also learns that people destruct themselves all of the time for no reason, believing that others are enemies when they actually are not.. This can be observed in the last lines of the book when Gene states, "All of them, all except Phineas, constructed at infinite cost to themselves these Maginot Lines against this enemy they thoug ht they saw across the frontier, this enemy who never attacked that way -if he ever attacked at all; if he was indeed the enemy." The climax of the story occurs when Gene and Finny finally have a two-sited discussion about the incident at the tree. This tear-filled conversation makes each boy realize how much they actually care for each other.
Cloudstreet by Tim Winton :: essays research papers
In Cloudstreet, the mysterious figure of the Blackfella appears at key points, mostly to Quick. In each occurrence he appears to represent a different meaning or purpose, but there is an overall symbolic representation, and that is of spirituality. Although he appears to be in physical presence, as in where he talks to Quick, the Blackfella has an overwhelming spiritual presence. This is not represented just through aboriginal symbolism ââ¬â there are also many biblical references when the Blackfella appears. On page 61 the Blackfella flees from Cloudstreet once he reaches the centre of the house. This portrays a sense of spirituality in the air due to the ancestral deaths that had occurred there. In an imaginary scene on page 178, Fish sees a lack man flying around and over him. This image represents somewhat an impression of the spiritualistic freedom the Blackfella has. On page 208, Quick picks up the Blackfella who has take the role of a hitchhiker. He leads Quick back home to Cloudstreet, but Quick refuses to go back. During the drive to Cloudstreet, a biblical reference is made to the Blackfella. From his bag, he pulls out bread and a wine-like drink, much like the bible story, and this supply appears not to deplete. Quick suspects nothing at all. By page 217, Quick begins to think about who this black man is. Quick had been pulling in hundreds of fish in an almost incomprehensible situation, where he would be catching strings of fish attached to each other. As he is rowing he sees a black figure that appears to be walking on water. As he moves closer he recognises the black figure as the familiar Blackfella. This, again, can be perceived as a biblical reference. Page 326 has a short appearance of the Blackfella to Fish, who sees him across the street from Cloudstreet. As a truck goes by, the Blackfella disappears ââ¬Å"in the dust as it leavesâ⬠. This simply gives a supernatural feel to the Blackfellaââ¬â¢s presence. Earlier when Quick had given the Blackfella a lift to Cloudstreet, it had appeared that the Blackfella was attempting to guide Quick home. This subtle message was later presented much stronger on page 362 where the Blackfella tells Quick straight up to ââ¬Å"Go home â⬠¦ This is not your homeâ⬠. Again on page 368 the Blackfella sends Quick home. When Quick turns to face him again, instead of one, there are hundreds of Blackfellas.
Tuesday, October 1, 2019
Pressures of Frito Lay
essuresWhat are the sources of pressure on firms such as FL to reduce their environmental footprint? Many industries in the UK and abroad have similar pressures from groups and environmentalists which cause severe problems to the companyââ¬â¢s credibility and causes issues to customers knowing the fact that the company is facing problems. In the United Kingdom itself there are groups that pressure companies with environmental factors they are: For Environment: Campaign for Better Transport Campaign to Protect Rural England Campaign for the Protection of Rural Wales Climate Camp GreenpeaceFriends of the Earth (England, Wales and Northern Ireland) Friends of the Earth Scotland Forum for the Future Surfers against Sewage Rowers against Thames Sewage (RATS) Waste Watch Rights Of Way Alliance Neath (Rowan) Women's Environmental Network For Food: Campaign for Real Ale (CAMRA) aFood Commission Sustain the alliance for better food and farming. The pressures are due to the customers also. Some of them insist that the bags for chips should be eco-friendly while other applauds Frito-Lay for its green efforts. Because of this, Frito-Lays sales have dipped as they introduced the eco-friendlyFrito-Lay was threatened to be sued by a news service company and The Centre for Science in the public interest (CSPI) after Frito-Lay switched the name on its olestra-laden snack line. This came into picture when FDA withdrew a requirement that companies warn customers of Olestra possible side effects. Centre for Science in the Public interest speculated that Frito Lay was trying to set apart its low-fat chips from the previous olestra warnings. After the warnings Frito-Lay made a settlement with CSPI in which Frito-Lay agreed to post Olestra Logo more transparent and also by adding the phrase ââ¬Å"Made with Olestraâ⬠more flagrantly.Executive director of CSPI, Michael F. Jacobson said in a press statement about the settlement that Frito lay agreed to these modest changes, whi ch are sufficient to avoid a lawsuit and will help consumers who know to avoid Olestra to do so. But this was not without a flipside, even with the Olestra logo the complete fault is not stated in the bag. The possibility of side effect with use of olestra will not be mentioned in the packaging instead it will acknowledge Olean as a low-fat property on the chip line. An Environmental Footprint is an extent to the amount of bio productive land and sea required to sustain a personââ¬â¢s lifestyle.It includes the land required to cultivate their food, dispose of their waste and absorb their carbon emission. Another pressure came from four associations which include Green Peace, Organic Consumers Association, friends of the earth and other associations claim that 15 American largest food corporations are using GE based ingredients in their products and was asked to ban this ingredient from their products. After this acquisition Frito-Lay announced that 95% of their corns for corn pro ducts are GE free. http://www. organicconsumers. org/ge/gepotatoban. cfm
Subscribe to:
Posts (Atom)