Tuesday, December 31, 2019

On the Origin of Species - 1846 Words

In his On the Origin of Species, written in 1859, Charles Darwin clearly explained the gradual progression toward the speciation of organisms with his five main principles: variation, inheritance, competition, selection, and propagation. Darwin hesitated to publish his findings because he understood that his findings were based on the animal kingdom and on an evolutionary process that had to have spanned millennia. He specifically did not think that his discoveries were applicable to the evolution of human society. Contrary to Darwin’s preference, Herbert Spencer did exactly what Darwin hoped to avoid by publishing numerous works supporting his own, new thesis of â€Å"Social Darwinism,† which claimed that Darwin’s principles of evolution†¦show more content†¦He lived off of his family’s wealth and instead of working, he devoted himself wholly to his studies. In 1896, he published his most comprehensive work, The Synthetic Philosophy, a work encom passing many of his theories on society, evolution, morality, and psychology. Spencer died December 8, 1903 while working on his autobiography, which was then published in 1904. Through his anti-clerical and rejectionist upbringing, Spencer was raised to attach to a theory like Darwinian evolution. In his first published article on the development of Social Darwinism, entitled The Development Hypothesis, 1852, Spencer established his lack of faith and claimed that creationism was a â€Å"theory† which is â€Å"supported by no facts at all.† He further elaborated on the issue and asserted that there must be another mode by which the world was created. He even went as far as to write that, if he were to interrogate any leading geologist or physiologists they would â€Å"be forced to confess that the notion was put into his mind in childhood as part of a story which he now thinks is absurd.† Spencer believed that creationism was not a viable medium on which to bas e scientific thought, and as a result, he was forced to find another way to explain the creation of the world. For this reason, he was drawn to evolutionary Darwinism. Spencer however, could not just accept Darwinian evolution as fact. Rather, he expanded the theory of Darwinian evolution to meet his ownShow MoreRelatedThe Origin of Species1246 Words   |  5 Pagescould potentially debase society’s understanding of what was fact was published and it summarized a theory that humans have slowly evolved from a primitive form, commonly called the Theory of Evolution.(Kennedy Pg.572) The book titled On the Origin of Species by Means of Natural Selection, or the Preservation of Favoured Races in the Struggle for Life was written by an English naturalist and geologist, Charles Darwin, and it overcame the scientific rejection that earlier similar theories had facedRead MoreThe Origin Of The Primate Species1880 Words   |  8 PagesThesis Statement: One of the most fiercely debated issues in paleoanthropology points at the origins the primate species. The top two continents that have been very evident in our origins that can be traced to Africa and (Eur)Asia. African origin stresses the multiregional continuity theory it suggests a single origin for modern humans and gives an explanation to the Out-of-Africa model for the patter of our human evolution. The Multiregional Continuity Model states that after Homo erectus left AfricaRead MoreOn The Origin of Species by Charles Darwin915 Words   |  4 PagesHuman evolution has been of interest to people for quite some time. Even though in the publication of On The Origin of Species by Charles Darwin in 1859 human evolution was not specifically mentioned, only that light will be thrown on the origin of man and his history, Darwin did argue for the evolution of new species from older ones (1). Since then, interest in evolution, and especially human evolution, has been growing. An example of one of the first debates about human evolution is the debateRead MoreThe Origin Of Species By Charles Darwin1689 Words   |  7 Pagesmain book where we get out information about evolution is in Origin of Species’ by Charles Darwin. In his book, Darwin introduced the concept of evolution by natural selection. Natural selection is the process in which the organisms which are better suited for their environment. According to Darwin, there are four major points to natural selection. The first point is overproduction, indicating that more offspring survive, meaning the species would survive longer. Then, there s genetic variation. TheRead MoreOn the Origin of Species by Charles Darwin1148 Words   |  5 PagesOn November 24th, 1859, On the Origin of Species by Means of Natural Selection, or the Preservation of Favoured Races in the Struggle for Life by Charles Darwin (renamed On the Origin of Species 13 years later) was published in London, England. In it, Charles Darwin specified his observations and gave his insight on what he thought caused evolution. He called it natural selection. Before this, nearly everyone believed that a single God created every living organism that none of them had changedRead MoreThe Origin Of Species By Charles Darwin868 Words   |  4 PagesPersonify-attributing human character to something inanimate Polymorphic-different forms or types in organisms of the same species. Potent-something of great power or influence. Vigorous-healthy or strong. Volition-choosing or making a decision. B) 1. The text was written by Charles Darwin, who is renowned for his theory of evolution. Besides his book The Origin of Species, he also wrote Voyage of the Beagle and The Descent of Man to name a few. Credence should be given to Charles Darwin for hisRead MoreThe Origins Of Species By Charles Darwin983 Words   |  4 PagesAfter Charles Darwin published the Origins of Species, society began to turn away from religion and towards science to justify slavery and segregation by seeking out physiological and psychological differences between Blacks and Whites (Parks Heard, 2009). Physiologically, some Whites argued that black people were the missing link between apes and humans. Psychologically, others like Frances Galton proposed his theory of eminence, or the notion that certain abilities, many of them psychologicalRead MoreThe Origin Of Species By Charles Darwin898 Words   |  4 Pagesfamous works, and one of his most controversial works as well, was his book titled On the Origin o f Species by Means of Natural Selection or the Preservation of Favoured Races in the Struggle for Life. Darwin wrote the Origin of Species after an almost five-year voyage aboard the H.M.S. Beagle. While aboard the beagle, Darwin was presented with many facts that appeared to â€Å"shed some light on the origin of species†. Darwin has contributed in many ways to the world of science, specifically the historyRead MoreThe Origin Of Diversity Within Species1361 Words   |  6 Pagesevolution of different species can be known through comparing how closely their genes and body structures were. The more similar those characteristics are, the more closely related those species is. However there is a wide range of diversity between every single species and between every single individual. Diversification allows organisms to occupy different niches in the ecosystem. In this essay, the origin of diversity within species, the origin of diversity between the species, the significance of Read MoreEssay on The Origins Of Our Species1945 Words   |  8 Pagesfits into the ideas of human origin formulated by Frederick Engels more than 100 years ago. quot;There is a grandeur in this view of life, with its several powers, having been originally breathed into a few forms or into one; and that, whilst this planet has gone cycling on according to the fixed law of gravity, from so simple a beginning endless forms most beautiful and most wonderful have been, and are being, evolved.quot; (Charles Darwin, The Origin of the Species, pp. 459-60, Penguin 1985.)

Sunday, December 22, 2019

Compare and Contrast the ways in which Christina Rossetti...

Compare and Contrast the ways in which Christina Rossetti communicates her attitudes towards death in â€Å"Song† and â€Å"Remember† ________________________________________________________________ In both â€Å"Song† and â€Å"Remember†, Rossetti conveys her own attitudes towards death through writing about how others should treat her death and how she wants to be remembered, respectively. She addresses important ideas as well as using word choice and the metrical template to paint a clear picture of her perceptions of death. As a poet, Rossetti uses her choice and form of words as a way of conveying her initial feelings towards death. In â€Å"Song† the tone is immediately set by the ingenuous and candid first line, â€Å"When I am dead my dearest†. It†¦show more content†¦However, it could be interpreted that here, Rossetti is again playing with the idea of guilt, and that she puts on this apathy in order to leave her partner in limbo to whether to forget or remember her. Perhaps this is her ploy to make him feel the guilt of trying to control her and through doing so, he will realise his wrongs, and thus been controlled by her, which you could argue as being her object, as the ultimate form of revenge. Rossetti also addresses the idea of religion in both â€Å"Song† and â€Å"Remember† which broadens her portrayal of her attitudes towards death. In â€Å"Song†, as already discussed, Rossetti rejects convention in her pragmatic approach to death, but also consciously rebuffs the traditional religious views of the time. There is no sense of celestial bliss or heaven in her mention of what death will be like, with no mention of a desire for a ceremony. She deliberately talks of her partner being â€Å"the green grass above me†, which shows that she has no belief of her dead body ascending into a divine afterlife, but rather staying firmly buried under the ground. Rossetti thus rejects the Pre-Raphaelites’ Anglican moral influences by her subversive reference to the afterlife. She writes of how she will be â€Å"dreaming through the twilight†, and given our

Saturday, December 14, 2019

Shakespeare’s Romeo and Juliet Free Essays

â€Å"In time we hate that which we often fear† – William Shakespeare. Shakespeare understood what most do not: the true nature of hatred. Since most people do not realise that their hatred simply masks their fears, they   never confront the real problem. We will write a custom essay sample on Shakespeare’s Romeo and Juliet or any similar topic only for you Order Now Consequently, hate continues to ruin countries, cities and families. This notion of hatred is never more evident than in Shakespeare’s tragic play, Romeo and Juliet. In this play, the characters’ hatred masks their fear of being powerless and drives them to prove their superiority, but this only causes their destruction. First, characters identify with imaginary labels such as power and courage to mask their self-doubt and to feel belonging. For instance, Tybalt tries to prove his superiority over the Montagues by projecting himself as powerful and socially dominant. When he sees Romeo intruding on the Capulet feast, he insults him as a â€Å"slave† (1.5.54) that he should â€Å"†¦by the stock and honour of [his] kin / To strike him dead [he] holds it not a sin† (1.5.56-58). Tybalt belittles the Montagues as worthless slaves that he should punish and kill without guilt. Therefore, he will rid Verona of their filthiness and prove his social power. Likewise, Sampson pretends to be a courageous warrior to improve his reputation and social standing. To Gregory, Sampson can easily portray himself as â€Å"†¦a tyrant† (1.1.19) that after having â€Å"fought with the men, †¦ will be civil with the maids; / [and] cut off their heads† (1.1.20-21). In short, they use their illusions of power and courage to deceive others and themselves into welcoming and accepting them.However, when humiliated, their illusions are destroyed and their insecurities are threatened to be revealed which leaves them defenceless to exclusion. In fact, when Tybalt is stripped of his power and forced into submission, he runs away ashamed to hide his inferiority. After arguing with Capulet, Tybalt is forced to leave his own banquet which with his â€Å"patience perforce with wilful choler meeting† (1.5.88) makes his â€Å"†¦ flesh tremble† (1.5.89). Tybalt trembles with rage and shame due to his forced submission to Capulet which proves he has no true social power as he must obey orders not command them. Similarly, Sampson quickly shies away from a fight when confronted by the Montague servants to hide his cowardice. Sampson urges Gregory to fight as he â€Å"will [supposedly] back thee† (1.1.35) and to â€Å"take the law on [their] sides, let them begin† (1.1.35) although he proclaimed himself a merciless tyrant. When he is confronted with a fight, Sampson backs away and encourages Gregory to take the lead which proves he is just a narcissistic coward. In other words, when the inferiority and cowardice of characters are exposed, they scramble to hide their true identities.As expected, to regain their lost status, characters resort to aggression to distract others from their vulnerability. For example, Mercutio, feeling offended and disgraced, quickly belittles Tybalt to regain control of the situation and his social power. Angered by Romeo’s â€Å"†¦ calm, dishonourable, vile submission† (3.1.70), Mercutio disgraces Tybalt as a â€Å"rat-catcher† (3.1.72) and challenges him to a fight so â€Å"‘Alla stoccata’ carries it away† (3.1.71). Mercutio challenges Tybalt to a fight so that people will fear him, remember him as a strong, brave fighter and remember Tybalt as a ‘rat-catcher’. In the same manner, Romeo immediately challenges Tybalt to a duel to avenge Mercutio and justify that he caused his death. Romeo decides that someone needs to â€Å"keep [Mercutio] company: / Either thou or [Romeo], or both, must go with him† (3.1.124-125). Romeo, infuriated, allows his emotions to take control and seeks revenge to justify and compensate for his cowardly submission which caused Mercutio’s death. In other words, characters that lose their illusions of power and courage struggle to feel accepted due to their fear of rejection, so they violently and desperately defend themselves.Undoubtedly, they do not achieve their goal of self-redemption and only continue the cycle of hatred which creates a never-ending path of destruction. In fact, Mercutio’s violent attempt to gain social power blinds his reason and brings about his social and physical downfall. After being struck, Mercutio exclaims â€Å"I am hurt† (3.1.86) while his opponent-Tybalt- has â€Å"gone and hath nothing† (3.1.88). Mercutio’s attempt to prove himself powerful ends with his death not Tybalt’s. This proves that aggression is not the solution and only ensures self destruction. In contrast, Romeo’s mother-Lady Montague- pays the consequence of death for Romeo’s rash decisions. Before discovering his dead son, Montague declares: â€Å"†¦my wife is dead tonight / Grief of my son’s exile hath stopp’d her breath† (5.3.210-211). Romeo’s impulsive actions, which lead to his exile, causes his mother’s death which proves that when characters resort to violence, they not only unintentionally destroy themselves but take down others too. In other words, when characters project their self-hate unto others through aggression, they cause their own destruction and collateral damage. How to cite Shakespeare’s Romeo and Juliet, Papers

Friday, December 6, 2019

Palgrave Encyclopedia of Strategic Management

Question: Discuss about the Palgrave Encyclopedia of Strategic Management. Answer: Introduction: The current study focuses upon the factors pertaining to Breyers ice cream that shall facilitate in determining the market entry strategy in the consumer goods market in Thailand. Leih Teece (2014) mentioned that in case of launching a product into a new market, it pertinent to note the probable attributes of the product that can counter the features of competing products. Discussion: The core functions pertaining to Breyers ice cream is to facilitate consumption of a food product. Shaw (2015) advocated that in case of market entry strategy, it is relevant to note that despite having sound attributes many product fails to capitalise upon the uniqueness that their products tend to have. In the context of tangible attributes pertaining to product of Breyers, the primary attributes relates to the contents that ice creams generally tend to have such as presence of homogeneous fats, creams and flavoring along with proper packaging that ensures that the product is kept in an appropriate manner. In this context, the products offered by Breyers tend to differ from that of its competitors owing to its packaging and contents (Breyers 2016). In terms of augmented features that can differentiate Breyers products the management at Breyers requires to launch its flavors selectively as well as introducing ice creams with certain localised flavors that complements Thai cuisine. The potentiality concerning increase of market share by Breyers in the ice cream segment of Thailands fast moving consumer goods (FMCG) is considerable. Moreover, in the context of potentiality, it can be construed that Brayers can introduce additional set of flavors or launch set of ice cream cones and or ice cream bars. Conclusion: Thereby, it can be inferred that the product shall be able to create its consumer base through creating individual attributes pertaining to its products that are hard to replicate. Moreover, the consumers will be able to receive additional set of products under Breyers brand and thereby the prospective consumer base of the brand can be enhanced by it through the potential and augmented product. References: Breyers. (2016). Breyers Ice Cream and Frozen Dairy Desserts. [online] Available at: https://www.breyers.com/ [Accessed 6 Dec. 2016]. Leih, S., Teece, D. (2014). Market Entry Strategies.Leih, S. Teece, D.(2014), Market entry strategies, In D. Teece and M. Augier (eds). Palgrave Encyclopedia of Strategic Management, London. UK: Palgrave Macmillan. Shaw, K. (2015). Foreign Market Entry Strategies.China-USA Business Review, 395. Xu, H., Taute, H. A., Dishman, P., Guo, J. (2015). Examining Causal Relationships among International Experience, Perceived Environmental Uncertainty, Market Entry Mode, and International Performance.International Marketing in the Fast Changing World (Advances in International Marketing, Volume 26) Emerald Group Publishing Limited,26, 135-156.

Friday, November 29, 2019

3 Parallel-Structure Problems

3 Parallel-Structure Problems 3 Parallel-Structure Problems 3 Parallel-Structure Problems By Mark Nichol Each of the following sentences has an organizational flaw. A discussion of each is followed by a suggested revision. 1. People who are successful at careers in fashion design are hardworking, detail oriented, and love apparel. Each of the three qualities of successful fashion designers must be preceded by a verb, or they all must share one- or the first two must be connected by a conjunction in order to share one. Here, hardworking is supported by are and apparel follows love, but â€Å"detail oriented† is orphaned. The sentence must be restructured so that â€Å"detail oriented† shares are with hardworking: â€Å"People who are successful at careers in fashion design are hard working and detail oriented and love apparel.† (â€Å"People who are successful at careers in fashion design are hard working, are detail oriented, and love apparel† is also correct, but the first two qualities are closely related as terms that refer to aptitudes as opposed to the attitudinal quality of an interest in attire, so sharing of a conjunction seems more appropriate.) 2. Gluten has been blamed for everything from weight gain, bloating to mood issues such as depression. A list of factors must be organized as a list or a spectrum, but this sentence, although it is constructed to express a range of several factors, mixes the approaches. For consistency, the factors should be separated by prepositions only, without punctuation: â€Å"Gluten has been blamed for everything from weight gain to bloating to mood issues such as depression.† 3. Site users can be matched by location, gender, age, sexual orientation, and they’re encouraged to post a photo and personal description. The independent clause that follows the conjunction and is not part of the list in the preceding independent clause, which requires and before the final item in that list: â€Å"Site users can be matched by location, gender, age, and sexual orientation, and they’re encouraged to post a photo and personal description.† Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Style category, check our popular posts, or choose a related post below:Grammar Test 1English Grammar 101: Verb MoodPredicate Complements

Monday, November 25, 2019

Information Retrieval Methods

Information Retrieval Methods Introduction The people attic trust is a complex storage and retrieval project featuring widely varying forms of media spanning several decades’ worth of information embedded in different forms of technological media.Advertising We will write a custom report sample on Information Retrieval Methods specifically for you for only $16.05 $11/page Learn More Some of them feature single modes of data storage while some contain many forms of media. Some of it is text, while a lot of it falls under the multimedia category. The challenge of organising it into retrievable formats and subsequently availing the information to a wide audience through an Information Retrieval mechanism is daunting. Fortunately, several tools already exist to tackle this kind of challenge. The primary goal of the project is to document the existence of the media, to describe them adequately and to make their future retrieval possible. This report focuses on the retrieval issues of t he project. It presents the range of options available for organising the retrieval system and, evaluates them, and finally recommends the most appropriate configuration for the system. Different types of IR systems Components of an Information Retrieval (IR) system An Information Retrieval system has four basic components. They are a database, a search mechanism, a language, and an interface to provide interaction between the user and the system. According to Chu (2005, p.15), databases â€Å"comprise information represented and organised in a certain manner†. In other words, a database is an organised storage system that allows for the searching of items in it using preset criteria. The search mechanism is the system that allows for the searching of the database for the retrieval of the information stored in it. The degrees of complexity of query methods applied vary depending on the technical capacity of the user accessing the database. The third component of an Informatio n Retrieval system is language, which can be either the â€Å"natural language or a controlled vocabulary† (Chu, 2005, p.16). Chu (2005, p.16) notes that, â€Å"information relies on language, spoken or written, when being processed, transferred, or communicated†. The final component of an Information Retrieval system is the user interface. This is the point of interaction between the user and the system. Its user friendliness will determine in many cases the propensity of users to apply it. More than anything else, it determines the usefulness and eventual success of an Information Retrieval system. Categorisation of items in attic Items in the attic are of various forms, which fall into four categories. There are text-based items, image based media, streamed media applications and multimedia applications. Text-based items use words as the basic mode of information storage. Text based media in this collection include poems, manuscripts for performance art, and newspap er clippings. Image based applications rely on picture elements to store information.Advertising Looking for report on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More Each picture element, called a pixel, has a different identity describing its color and its intensity, which when collectively combined with other pixels, describes a given image. Image based applications in the collection include, photographic materials held in CD-ROMs and hard drives, and 35mm film negatives. Others are paintings and old maps. These will require digitisation if they will be retrieved from a computerized Information Retrieval system. Streamed media applications are those that have a time component, necessary for the correct interpretation of the data. Distorting the timeline distorts the information in them. Streamed media applications available in the collection include the audio recordings like the music and sound clips in .wav and .mp3 format. Speech and music on audio cassettes and vinyl records also exist in the collection. These forms will require digitisation if they are to be made available to a wide audience. Finally, multimedia applications use a combination of media to present information. In the collection, multimedia applications include video in digital format, and on tape, and the reels of film. Text Based Retrieval Systems A text-based retrieval system will aid the retrieval of the text-based media in the collection. Some of the media rely on analogue technologies, which complicate storage in the media storage available to the public, who are intended beneficiaries of the project. The text-based materials found in the collection will require digitisation. The key advantage of text-based retrieval is that the technology is mature, and hence enjoys a great degree of format standardisation. It presents fewer compatibility problems between different types of software. Where this problem arises, numerous options f or conversion exist to allow retrieval in a desired format. Its weakness lays in its use of letters and words as the basic data storage and retrieval unit. So far, many of the retrieval methods available for text retrieval do not take into account the semantic elements of a query. They rely on word match, and hence most search systems may not return relevant content based on their meaning, but will return content that closely matches the phrase used as search query. Advanced systems allow for contextual search, which employ thesauri to identify words with closely related meanings, thereby improving the semantic elements of a search. Advertising We will write a custom report sample on Information Retrieval Methods specifically for you for only $16.05 $11/page Learn More Figure 1: Multimedia information retrieval system architecture Multimedia Retrieval Systems On the other hand, multimedia retrieval systems use different means of identifying information that match a search query. A multimedia Information Retrieval system will comfortably handle search queries for image-based applications and for streamed media applications. Multimedia search queries employ elements usable for each of the image-based applications and streamed media applications. Multimedia Information Retrieval is still relatively young. It has many compatibility problems owing to the different formats used for presentation of media type of the same nature. For instance in the collection, there are .wav and .mp3 files, which are all audio formats. The reason for this is that there is greater functionality derived from each type of new format. The newer formats regularly lack backward compatibility. They main constraints that drive the use of different formats include maximisation of storage space, or preservation of media quality. However, the design of many media players for streamed media applications and for image-based applications takes into account these constrain ts. They regularly include capacity to handle different media types and a format inter-conversion facility. The crux remains having the latest version of a media player, which will be able to present the latest file formats. Requirements for an IR system Comparison of Requirements for Text Based IR Systems and Multimedia IR Systems Retrieval systems require a means to identify the information source, which a search mechanism can latch on to in order to identify the media from a database. This is about as far as the similarity between the two types of retrieval systems go. Text based Information Retrieval system rely on matching the text in the files to the search query in the database to identify a document, while multimedia Information Retrieval systems rely on a range of elements to identify relevant media carrying the required information. This includes text elements such as an assigned name for the media in the database. It is possible to search for a film from a database using the film name, on condition that the name is on the file carrying the film. Other locators for multimedia files include duration of media and file format of the media. These are useful in narrowing down a search query. Main Solutions Available to Designers of IR System The availability of searchable information from the attic trust is dependent on the digitisation of all records currently in the collection, and to some degree, the standardisation of formats to ease retrieval. There will be need to either type or by using scanning software, to digitise the text-based items in the collection. Typing will allow for a greater degree of freedom in the presentation of the information because it will make formatting possible to achieve the best possible output for users. It will however lead to a loss of authenticity since the items are antiques, and their appeal remains in appearing in their original format. For users seeking information for semantic purposes, reformatted presentation wil l meet their needs best because of better presentation.Advertising Looking for report on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More Those who are seeking the information for sentimental purposes will best appreciate the original presentation. To retain the original look, a digitised image of the text will provide the best option. The quickest way to achieve this is through scanning without text recognition. This will actually transform the material into an ‘image’ presenting text, and not pictures. The implication is that text retrieval methods will not apply. Preservation of the rest of the information will also require digitisation. The most crucial factor is the format to use in the process. Conversion technologies from tape to digital data exist for both audio and video tapes. The storage of physical artifacts like the sculptures for mass presentation will require the taking digital pictures for storage in the database. Another option is the presentation of three-dimensional representations through animation of the photos, or making short films of the objects, which adds the possibility of addin g sound clips. Animation allows for greater user interaction while filming allows for the addition of details through voice, enriching the experience. Again, the format to apply depends on the nature of user. For the arts lover, an animated clip over which he can exercise control over the image to get desired views will be suitable. For the inquisitive semantic user, a video clip with a sound clip giving background information on the artifact will be ideal. As Jalal (2001, p.6) observes, â€Å"Speech can introduce, give summary, stimulate, and tell†. Audio data presents the fewest presentation challenges since the auditory experience does not vary much between users. Provided the data presentation takes on a widely accessible format, there should be no major technical challenges. Different Methods of Representation There are two key types of Information Retrieval systems. Belkin (n.d.) identifies them as, â€Å"retrospective or ad-hoc† and, the second type, â€Å"Info rmation filtering or routing†. Retrospective systems fulfill one time information needs which taper off after meeting the need. These include information from e-books, news articles, online magazines, or information websites. Information filtering includes those accessed regularly because they have high utility levels. These include websites with changing information such as weather patterns, stock prices and maps services. There are some key issues to consider when setting up the database based on the methods available for representation. The issue of what language to use across the database is critical. Two ways of approaching language exist. One of them is to use natural language of the users, which forms the basis for the search queries, while the second approach is to use a controlled vocabulary. If the trust adopts natural language for the Information Retrieval system, then users will have an easier time interacting with the database since they do not have to learn the c ontrolled vocabulary of the database. They will however be faced with ambiguity and irrelevance problems. If the trust adopts a controlled vocabulary, users will first have to learn the language after which they will have better results for their search queries. Tedd et al. (2005 p.39) stresses that, â€Å"it is necessary for users to have the requisite skills to obtain relevant information quickly and effectively†. There will be need to use indexing across the database. This involves assigning words or specific phrases to each item in the database. The trust may use descriptors of free indexing depending on whether the language adopted is the natural language of the users, or a controlled vocabulary. Categorisation will involve developing categories for all the items in the collection. Chu (2005) proposes that useful categories must be â€Å"exhaustive† (p.29) and â€Å"mutually exclusive† (p. 29). This means that all items in the collection must have an assign ed category and that no two categories should have an area of overlap. Techniques for summarisation improve the query function for text-based applications. It involves providing a user with brief information relating to a body of text. The techniques include the use of abstracts, summaries, or extracts. Abstracts provide the readers with a broad view of the text and can act as a substitute for the text. It only lacks in detail. A summary assumes that the reader will read the whole document so it excludes portions such as background, the methodology, and purpose. An extract on the other hand is an actual piece of the document, cut out to provide a snapshot of an actual portion of the document. Each of these methods has their advantages and their challenges and applies in different circumstances. Querying refers to the interrogation of a database using a language. Nordbotten (2008) says, â€Å"Query language will always provide specification of the selection criteria for the desired information for the remaining processes† in the information retrieval process. The key aspect for designing a query system is to determine the degree of semantic querying necessary for ideal user experience. Challenges include the management of synonyms, which might require processing of the query, hence reducing speed of the system, and increasing the design and management costs. A simplified query system that matches input to metadata and similar phrases provides large volumes of output giving the user a more difficult time in sifting through the data, which may compromise user experience. Use of metadata, can potentially improve search results as it expands the possible ways of accessing a document. Implications of Using IR systems The most appropriate system for the project will include two sections. One of them is preservation of the physical artifacts that contain the information that requires preservation in a museum. The second section is the development of a digital l ibrary or digital museum that will enable users from different parts of the world interested in the trust’s activities to interact with the materials. Arms (2001, p.4) points out that, â€Å"a digital library brings the information to the user’s desk, either at work or at home†. The most appropriate Information Retrieval system will be one that uses natural language, since the trust targets a worldwide audience, as opposed to a limited vocabulary system. Keywords in the process assist in refining queries. The trust should also prefer to use methods of storage that will present the artifacts in their natural condition since this is the main appeal in viewing artifacts. Later on, the trust may consider storage methods applicable to semantic users who are seeking meaning, especially for educational purposes out of the information. In particular, the trust needs to digitise its entire collection. This involves conversion of audio files to multiple digital formats.mp 3 format will be useful if the objective is to conserve storage space. It is also widely playable on most media players. Figure 2: Accessing a Digital library (Techweb, n.d). Discretion will be required for text-based media. Some of them will require preservation in digital format by scanning with text recognition, to allow formatting. This will apply to manuscripts and poems. Others may be stored as images though scanning without text recognition. These include the newspaper clippings and poems. Digital photographs of physical artifacts such as sculptures will aid the development of animated collections. This is easier to handle compared to multimedia items. The multimedia items in the collection will require widely varying file formats for effective retrieval. The option of developing a unique media player for the trust requires consideration. This will solve the compatibility problems in the interim because it will use a single format and will potentially reduce administration c osts. Reference List Arms, W. Y., 2000. Digital Libraries. USA: MIT Press. Belkin, J. N., n.d. User Modeling in Information Retrieval. New Jersey: Rutgers University. Web. Chu, H., 2003. Information Retrieval and Presentation in the Digital Age. NewJersey: Information Today, Inc. Jalal S.K., 2001. â€Å"Multimedia Database: content and structure†. Workshop on Multimedia and Internet Technologies. Documentation Research and Training Centre, Bangalore. Web. Kang, K., 1999. Development of a Multimedia Information Retrieval Architecture with Integrated Image Information Retrieval Technique, digital image, Multimedia Technical lab, Korea Telecom. Web. Nordbotten, J. C. 2008. Multimedia Information Retrieval Systems. Web. Techweb. n.d. Accessing a digital library. Digital image, R.V. College of Engineering. Web. Tedd L.A., Large A., Large J.A., 2005. Digital Libraries: principles and practice in a global environment. Mà ¼nchen: K.G.Saur Verlag GmbH.

Thursday, November 21, 2019

Mallard Island Case Study Example | Topics and Well Written Essays - 500 words

Mallard Island - Case Study Example The basis of the complaint stems from 1501 Teal Drive that has been entirely for the renters. The residents tracked many people going in and out of their neighbor’s house since the beginning of summer. The issue coming from this complaint is noise. The residents have complained of endless noise whole day. It is as if the residents are neighbouring the playground or a motel pool. This solution for rental issue is implementing restricting rentals in neighborhood. The restrictions need to be weekly rental on the residential areas (Johnson, 2014). To solve the issue, the members of the commission need to come up with a substantive recommendation that will be forwarded to the Town Council and the mayor. The best solution for the residents of this area is to set up rental restrictions for the residential streets but not the entire Ocean City. This will change the zoning in the entire neighborhood. Increasingly, there are 3875 residential zoning in Mallard Island. For the last 2 years, there have been issues of rental properties raised. A destination serving as a guidepost for Mallard Island is the case of ocean city. The residents are characterized as people who run their errand in the ocean city. According to the zoning code, a rental home should not house 4 unrelated people. The current issue is that some of the homes are housing a multi-family housing. The office has no means of confirming people who are unrelated or not. This is because there are few enforcement officers. The solution for this is recruiting more enforcement officers (Shane, 2014). The ocean city has also addressed property issues such as overcrowding, noise sanitation, building code violation, and overcrowding with the committee of Property Review and Enforcement Strategies for Safe-housing. The committee is represented from the finance department,

Wednesday, November 20, 2019

Homework Assignment Example | Topics and Well Written Essays - 250 words - 10

Homework - Assignment Example This means that there should be a balance between the cost and benefit of pollution control. If the business is asked to pay more than the benefits it has obtained, this request will become ineffecient for the business and the business will close. 2. Adverse selection is a term used to refer to the outcomes of the decisions that are based on varying information. This outcome is caused because the information available to the purchasers and sellers is not same. Moral hazard is term used to describe a situation when an individual takes an action knowing that it will not negatively impact him but will negatively impact others and the individual himself experiences profitability out of this decision. Moral hazards are experienced by the insurance sector of the health industry, although difference in information exists in different parts of the health industry, but it impacts the insurance sector in the worst possible manner (Taylor 484). Due to asymmetry of information, insurance fail to realize the real risk they are taking in insuring an individual. Adverse selection effects health insurance companies because the best plans offered by the companies are usually purchased by those whoa re terminally ill and such plans cost more m oney to insurance

Monday, November 18, 2019

Personal Selling and Customer Focus Essay Example | Topics and Well Written Essays - 750 words

Personal Selling and Customer Focus - Essay Example Of all these methods forestalling and boomerang methods are the most effective methods of encountering objections. Forestalling can be termed as the best method of dealing with objections. Salespeople should understand that no product is perfect. There are bound to be certain vulnerable areas or features of their product or services. These features have immense chances of being materially different from other competitive products in the market or getting misunderstood by a section of the target audience. There may be many disadvantages attached to a product one is trying to sell like high prices, limited features, lack of service representative in the immediate area, absence of cash discount etc. No matter what the drawbacks are, through the forestall method of objection the salespeople raise the objections before giving the buyer the chance to raise them. For e.g. if the price of a product is high. Before letting the buyer to raise the issue during the sales presentation the salesperson should forestall the objection in the following way: " Though you might feel that the price of this product i s higher than the competitors' product you would have to appreciate the fact that no competitor gives the after sales service as good as we do. Also, the latest technologies have been used to design this product which ensures that it would last longer than any other product in the market." Hence if the salespeople are able to forestall the objection convincingly the buyers are surely going to changer their thoughts without articulating the objection that was in their minds. Boomerang method is also very effective. In the words of Weitz et.al " By using the boomerang method of responding to objections, the salesperson turns the objection into a reason for acting now." (1992, p. 290) Though this method appears very pushy, it can be effectively applied to all personality types. In today's fast pace world every body is short of time and might totally want to ignore the salespeople who are eager to seek an appointment or sell their products. The most common answer to sales call is that " Sorry I don't have enough time now. Perhaps we can talk about it later." Through boomerang technique the salesperson can make use of the time constraint of the buyer in the following way: " I know you have a very busy schedule and that is why this product is most suitable to you because it has the capacity of saving a lot of your time everyday which you can devote in other meaningful activities or in chores that you are longing to do but are not able to do due to lack of ti me." Time and money are the two main constraints of the buyer and through the boomerang method the salesperson can sell the product by making him realize the "benefit of investing these resources." (Weitz et.al., 1992, p. 291) Part 2 To resolve the issue in question the 7 Problem Resolution and Recovery Procedures is the best option. The General Manager should deal with the customer in the following manner: Listen: Listening is the most important thing to do when a customer is complaining about something. Even if the General Manager knows about the entire incident she should listen to the customer attentively. This skill would help in resolving the conflict amicably. Its often found that just by listening attentively to a complaining customer his anger or dissatisfaction

Saturday, November 16, 2019

Starbucks Leadership Styles

Starbucks Leadership Styles Introduction: Starbucks started in 1971 when three friends started coffee business, and their main objective was to sell coffee beans and equipment. Howard Schultz joined the company in 1982 and turned it into becoming an international brand. Schultz’s main goal and vision as CEO was to make people realize that buying a cup of coffee in Starbucks is lifetime experience. Under Schultz leadership Starbucks has achieved number of milestones. Schultz received an International Humanitarian Award in 1996 from Care for his vision and leadership developing in an innovative partnership between Starbucks and Care to support people in coffee originating countries. Schultz view of leadership: Howard Schultz’s statement â€Å"If they had faith in me and my motives they wouldn’t need a union† reflects his powerful communication skills as a leader. He knows how to build emotional connection with the staff. The heart of leadership is trust. Without trust you cannot lead. Exemplary leaders are devoted to building relationships based on mutual respect and caring. Watson (1983). The mark of a successful leader is his ability to forecast the business trends and stay ahead of his competitors (Luthans 1998). That means leadership involves skills and abilities that are useful whether one is in the executive position or frontline. However union signifies group of a workforce in certain businesses who form a link between an employer and unionized employees in which terms and condition of employment are determined. It also helps to improve the conditions at workplace and negotiate with employers on issues of wages, medical reimbursement or sickness. When employees and employers are not able to come to one decision then trade union negotiate with employer to reach to an agreement and the union members must follow that (Booth, 1995). In February 2007 Schultz says in one of letter to Starbucks employees â€Å"My focus is on you ‘the partners who have made Starbucks such a trusted presence around the world. And my focus is on preserving the trust that we have built with our customers and each other over the years. I want you to know that you can be proud of the company we all work for and that you can continue to trust the foundation it’s built upon† Schultz had trust in his employees as he had build up strong relationship with them in Starbucks by understand their desires. Schultz leadership has developed a good teamwork and integration of the individual and groups and goal. Schultzs leadership approach makes staff feel like partners. That is why frontline staff in the stores are so welcoming and passionate. He gave his employees protection, dignity, empowerment and a good working environment. That is why Schultz says that Starbucks doesn’t need a union because he is doing everything for the employees what usually a union does. Approaches to Leadership: There are many ways of looking at leadership and many interpretations of its meaning. Leadership might be based on function of personality or, it can be seen as a behavioura3 category (Vecchio, 2000) . It may also be viewed in terms of the role of the leaders and their ability to achieve effective performance from others. The relationship between leaders and management is that management is more usually viewed as getting work done though other people to achieve organizational objectives (Worsfold, 1989), where as leaders are more concerned with the attention to communicating with motivating, encouraging and involving people (Hunt, 1986). There are so many theories and models of leadership like Traits approach, the functional approach, Leadership as behavioral category, Style approach, Contingency models, and Transformational Leadership. Here I would like to discuss Transformational leadership with regard to leadership approach and style in Starbucks. In recent years increasing business competitiveness and the need for the most effective use of human resources are needed. The transformational leadership’s view focuses on idealized influence, inspirational motivation, intellectual stimulation and individual consideration (Bass, 1985). According to Bass transformational leaders motivates followers to do more than what they are expected and the extent of transformation is measured in terms of leader’s effects on followers. It emphasizes on generating a vision for the organization, creating a feeling of justice, loyalty and trust. Idealized Influence: symbolizes the capability of building confidence in the leader and values the leader by his followers. As Starbucks is an employee-focused company, Schultz has taken a great care in recruiting partners and promotes the existing partners. Schultz made himself as example for the employees to follow him. Inspirational Motivation: is the behaviour of the leader, respect and admiration of followers. Leadership in Starbucks has ensured that high wages, benefits, stock plans and positive working environment are one of the reasons to maintain motivation among the staff. Intellectual Stimulation: leaders who solicit new and novel approaches for performance to work, creative problem solutions. Schultz invested in training and development of the employees. Starbucks appreciated feedback from the employees and they felt empowered and encouraged. Starbucks’ one of the most thriving innovations came from the employees â€Å"Frappuccino† a popular cold coffee. Individual Consideration: true leaders are those who listen to their followers and give special consideration to their needs and wants. Starbucks leadership provided parent group day care for their children, health insurance and work life balance. Leadership Styles: In order to get the best results from the employees, leaders need to encourage and be co-operative to the employees (Bonnington,1988) .According to Adair (2003) Leadership style is the way in which the functions of leadership are carried out . Three main classification of leadership style are autocratic style, democratic style and laissez-faire (genuine )style (Belbin,1993). Here I would like to discuss democratic style of leadership with regard to leadership style in Starbucks. In democratic style, the functions of leadership are shared with the members of the group. The group members have a greater say in decision making (Useem, 2001). Starbucks leadership team is among the best when it comes to global market. Schultz looked for employees who are team player and have passion to work for Starbucks. Schultz took care of employees and treated them with respect. He has created a unique culture in Starbucks in which entrepreneurship and empowerment, quality and service define values of leadership. Schultz gave more power to employees in decision making and also flexibility to choose their own working hours. He honoured the feedback from the employees in Starbucks therefore I can say that Schultz had democratic style of leadership in Starbucks Conclusion: I would summarize by saying that Starbucks is the most flourishing coffee shop in the world and with Schultz leadership and vision Starbucks still continue expand. Starbucks take great care in recruitment and selection and trains them intensively. Schultz believes that it is important for Starbucks respect all the employees and motives them. Starbucks enjoys the democratic style of leadership. References: Adair, J (2003). The Inspirational Leader : How to Motivate, Encourage and Achieve Success, Kogan Bass, B.M. (1985) , B.M. Leadership and Performance Beyond Expectations, Free Press . Belbin, R.M (1993). Team Roles at Work, Butterworth Heinemann. Bonnington C, (1988) ‘Leading to the Top: The Successful Management of People’, Office and Information Management International, pp8-9. Booth, A.L (1995). The Economics of The Trade Union, Cambridge University Press. Druker, P.F (1998) .The Practice of Management, Heinemann Professional Fullan,M (2001). Leading in a Culture of Change, Jossey-Bass Hunt J W, Managing People at Work, Second edition, McGraw-Hill. Luthans.F. (1998) Organizational Behavior, Boston, MA. McGraw-Hill Useem, M. ‘How to Groom Leaders of the Future’ in Pickford, J.(ed) Financial Times Mastering Management, p.297 Vecchio, R. P. Organizational Behavior: Core Concepts, Fourth edition, Dryden Press. Watson C M, ‘ Leadership (1983), Management and the Seven Keys’, Business. Whitehead, M (2002). ‘ Everyone’s a Leader Now’, Supply Mnangement Worsfold, P. (1989). Leadership in the Hospitality Industry’ in Cassee E and Reuland (eds), International Journal of Hospitality Zaleznik, A (1977). Managers and leaders: Are they Different? Harvard Business Review Horizons. http://www.docstoc.com http://www.businessweek.com Q4. ‘Motivated and committed human resources were the key to successes. What strategies has Starbucks used in order to gain the motivation and commitment of its employees? With reference to appropriate theories and models, provide a reasoned discussion of how the company can ensure the levels of motivation and commitment that it needs to succeed in the future? Starbucks has more than 3,300 locations all over the world and serves coffee to its coffee lovers every day. It has the history of tremendous growth and success. In addition to the sales of coffee and coffee beans, the company enjoys the remarkable repute as a progressive employer. Starbucks is known for its friendly policies and motivational programs. The employees who are constantly in contact with the customers are the frontline staff. Hence Starbucks motivates, trains and rewards employees turning them into a committed and motivated workforce. The foundation of the company’s mission statement are five guiding principals and one of these principal is to provide great work and treat each other with respect and dignity. Strategies of motivation: According to the case study, motivated and committed human resources are the key to success in Starbucks. Howard Shultz believes that success of Starbucks is not coffee but employees and feels honoured about the value about the Starbucks employees. That is why it is essential to have intensive training policy for the better performance in the company (Michelli,2006). Starbucks offers an interactive structure that encourages employees to commit themselves into their job so they can motivate partners to satisfy themselves and also achieve a new level of performance. Starbucks use strategies to motivate employees and in order to gain the commitment. Starbuck’s motivational strategies programs for its employees are: Selecting the right people Investment in training and development Work life balance Employee ownership Feedback system Non capitalization job tittles Flexibility Mission review program Parameters of success in Starbucks: Due to Starbucks motivational strategies Starbucks continues to expand geographically. Starbucks has more than 15,000 stores all over the world (www.starbucks.com). Starbucks employees are highly trained and have good customer service skills. Starbucks is ranked as the 16th â€Å"Best company to work for† in America by Fortune magazine. Starbucks has low turnover of employees as their need were taken care of and they are motive and committed towards work. Starbucks has changed a concept of coffee into ‘Starbucks Experience’ It has resulted the customers to come back approximately 18 times a month. Theoretical Framework: There are several motivation theories that have helped organizations to figure out how employees can be motivated. Motivation is â€Å"the internal process that activates, guide and maintain behaviour† (Baron, 1991). Robertson and Smith (1985) agree that ‘motivation is psychological concept related to the strength and direction of human behaviour. According to research, motivations theories can offer guidance to anyone with an interest in motivational issues. These do not give a definite answer to all the motivation questions but it provides a framework. There are many variables such as moods, financial circumstances etc that work together to create a situation and a person concerned to fully understand why variables result in particular behaviours Gorman (2003). Vroom expectancy theory: The expectancy theory of Victor Vroom deals with motivation and management. Vroom’s theory is based on idea that employee effort will lead to performance and performance will lead to rewards. Rewards may be either positive or negative. Employees will be highly motivated if the reward is positive and negative rewards lead to less motivated employees (Vroom, 1964). According to research motivation develops commitment among employees. Developing a stronger commitment and the motivation allows you to be well recognizing in the market and gain market share. According to Starbucks case study Starbucks hire right people by having right people. Starbucks implement intensive training program for each employee before starting their job. Starbucks recognizes the efforts made by the employees in order to get high performance. To gain high performance rewards are offered by Starbucks to their employees in open forum such as Warm Regards, the Mug Award and the â€Å"Spirit of Starbucks Award†. Other benefits like training and development, flexible timings partner connection, equality etc are offered in order to motivate and gain commitment. Rewards develop motivation and Starbucks offers rewards and benefits to motivate their employees. Sustaining motivation and commitment: To sustain the level of motivation and commitment in future, Starbucks treats its employees well. Starbucks offers opportunity to all full and part time employees to receive stock option, healthcare benefits, sick pay and bean stock etc. Starbucks continues with building programmes that address to personal life and needs of its partner. Starbucks carries out regular surveys of its partners to measure their needs and take action with suitable work life solution. Starbucks transforms the behaviours and opinion of overall coffee consumer. Starbucks is not only of the fastest growing company but it is also an excellent business model with high profit performance and low turnover. According to the case study, it is obvious that motivation is the key factor of Starbucks’ strategy. A good relationship between Starbucks’ employees maintains a high quality performance. Starbucks have great responsibility towards their staff. Their decisions affects directly or indirectly on employees desire and interests and overall ability to love what they do for living. Employees would have many reasons to stay with Starbucks if the staff are motivated. To ensure the levels of motivation and commitment that Starbucks needs to succeed in the future, the company should introduce more benefits and training programs to motivate employees. Long term service recognition awards should be offered which would increase performance and commitment. Variations i n benefits to employees can give opportunity to Starbucks employees to stay motivated and committed such as giving them an opportunity to win a holiday if one has been employee of the month for 3 months. References: Baron R.A. (1991) ‘Motivation in work settings: reflections on the core of organizational research ‘. Motivation and Emotion. Vol.15, No.1.pp1-8 Gorman P. (2003). Motivation and Emotion, Rutledge, New York. Kanfer R. (1998) ‘Motivation’. In Nicholson N. (ed.) Encyclopaedic Dictionary of Organizational Behaviour. Oxford, Blackwell Publishers Ltd. Kanfer R. (1990) ‘Motivation theory and industrial and organizational psychology’. In Dunnette M.D. AND Hough L.M. (EDS) Handbook of Industrial and Organisational Psychology. Palo Alto, Ca, Consulting Psychologists. Michelli, J (2006) the Starbucks experience McGraw-Hill Smith, K.L (1990). The future of leaders in Extension. Journal of Extension. Vroom, V.H. (1964). Work and motivation. New York: Wiley. Weiner B. (1992) Human Motivation. Metaphors, theories and research. California, Sage Publications. http://brandautopsy.typepad.com

Wednesday, November 13, 2019

Agenda 21 - Earth Summit :: essays research papers

Agenda 21, also referred to as Earth Summit, is an all-inclusive plan of action that is to be completed globally, nationally and locally by organizations of the United Nations System, governments, and major environmental groups in every area in which humans impact the environment. Agenda 21, the Rio Declaration on Environment and Development, and the Statement of principles for the Sustainable Management of Forests were all adopted by more than 178 governments at the United Nations Conference on Environment and Development that was held in Rio de Janeiro, Brazil June 13-14, 1992. The Commission on Sustainable Development was created in December 1992 to ensure successful follow-up of UNCED and to monitor and report on execution of the agreements at all levels. All 178 governments agreed that a special session of the United Nations General Assembly would be called in 1997 to review the progress of Agenda 21 after a 5-year introduction period. The full implementation of Agenda 21 was reaffirmed at the World Summit on Sustainable Development (WSSD) held in Johannesburg, South Africa from August 26 - September 4, 2002. Agenda 21 is not just about making improvements in â€Å"nature†. It also includes plans of action regarding poverty, hunger, ill health, illiteracy, as well as the continuing deterioration of the ecosystems. The success of Agenda 21 is contingent upon integration of environmental and developmental concerns and greater attention to them. It is also dependant upon the fulfillment of basic needs, improved living standards for all, and better protected and managed ecosystems. Only if this is accomplished can we be assured a safer, more prosperous future. No nation can achieve this alone, however; if all nations work together to construct a global partnership for sustainable development, we can achieve the goals set forth in Agenda 21 Agenda 21 concentrates on the urgent problems of today and also aspires to prepare the world for the challenges of the next century. It reflects a global agreement and political commitment at the highest level on development and environment teamwork. Its successful completion is first and foremost the responsibility of Governments. National strategies, plans, policies and processes are essential in accomplishing this. International cooperation should support and supplement such national efforts. In this context, the United Nations system has a key role to play. Other international, regional and sub regional organizations are also called upon to contribute to this effort. The broadest public participation and the active involvement of the non-governmental organizations and other groups should also be encouraged.

Monday, November 11, 2019

Respect vs. Disrespect

Respect Vs Disrespect By Osita Onyebuchi Respect vs. Disrespect Have you ever met someone who was rude to you and didn't hold you with much regard? How did you feel? Did you feel angry? What do you think respect is? How is respect earned? Respect is an important way of being kind and good to other people. We live in a society that respect is earned not given. With respect there is also an opposite side of disrespect. The definition of respect is to consider worthy of high regard. There are different forms of respect, the word respect is defined as the condition of being esteemed or honored.Disrespect, on the other hand, is defined as a lack of respect. Respect has great importance in everyday life; everyone wants to be respected. Even those who do not give respect expect to be respected by others. We may also learn that how our lives go depends every bit as much on whether we respect ourselves. The value of self-respect may be something we can take for granted, or we may discover how very important it is when our self-respect is threatened, or we lose it and have to work to regain it, or we have to struggle to develop or maintain it in a hostile environment.Some people find that finally being able to respect them is what matters most   Ã‚  It is acknowledged widely that there are many different kinds of respect. Respect may come in different forms, but it will still be perceived as respect. Respect in your family household is very important for a child and any other individual. For example, a child may choose to obey their parent because their parent is very strict and the child doesn’t want to get on their bad side. This form of respect could also be perceived as fear because the child is worried about how the parent will react if they choose to misbehave. Read also Twitter Case StudyThe child would also respect their parent in a way that if they were to request something, the parents will grant the favor. Another example is a police officer respecting the rights of a man they just arrested. This form of respect is leaning towards unalienable rights. The police officer have to give you the respect that you deserve even when you are the one wrong in the situation. The respect goes a long way in our legal system because it’s the foundation on how criminals should be treated. Everybody akes mistakes especially criminals so you should always resect them even if you don’t approve of what they did. We are not in the place to judge anybody regardless of what they did. Everyone’s rights are respected regardless of merit. Another example is a child respecting and looking up to a celebrity. The child is in awe and therefore respects the celebrity. Besides those three examples, there is also religion. In different religions a nd culture comes major respect. The gestures you make with one culture is different with other cultures and religions.The culture of the people of China and Africa demand respect. For example, taking off your shoes before you enter into a house is very big in China but not as big in the United States. Another example would be calling your elders â€Å"aunt† or â€Å"uncle†. In Africa that is major respect, you can’t walk into somebody house and don’t greet them by saying â€Å"aunt or uncle†, Religious tolerance does not mean one cannot express his own beliefs. It does mean that seeking to undermine or attack the religious faith and beliefs of another has always been a short road to  trouble.It doesn’t matter if you dont worship the sam GOD the person next to you, just have respect for their religious beliefs. Cultures and religions are very important to people, so therefore respecting them is also very important. The last example is respe ct in the workplace. When you are at work there are so many rules you have to follow when it comes to respecting your co-workers. For example, there’s is a various amount of beautiful women at your workplace and you tend to gain interest in the person other than business relationship. I would advise not to do it due to the fact that it may come off as a form of disrespect.When it comes to building a relationship in the workplace it just doesn’t work out so try to stay away from that. Aside from respect, there is also disrespect. From being slapped by someone to being publically humiliated, disrespect is alive and well in today’s society. Just like respect, disrespect also comes in different forms. Verbal disrespect is a form of disrespect seen virtually everywhere. Raising your voice to an adult in public, using harsh words towards one another are some examples of verbal disrespect. Verbal disrespect does not always appear to be disrespect.For example, cutting s omeone off while they are speaking and lying and manipulation. When you cut somebody off when they are speaking that shows the person that you are not listening to them and don’t care about what they have to say. Many people are being verbally disrespected but do not notice it because it is not always as harsh as other forms of disrespect. Another form of disrespect is technological disrespect. Many people are disrespected and humiliated on social networks such Facebook, Twitter, and etc. But it doesn’t stop there, emailing texting, and even when talking on the phone can lead to technological disrespect.There is a lot of disrespect on the internet such as Facebook, both male and female can comment on somebody picture and say something sexual that the person would take offensive in disrespect. On twitter people can tweet something sexual and the only reason people are doing it because of fear so they hide behind a computer. Aside from technological disrespect is an even bigger issue of disrespect, physical disrespect. We’ve all heard about violence, not just in relationships but violence in general. Some examples of physical disrespect is violence in a relationship, physically hurting your children or family, or physically harming yourself.Physical disrespect is probably one of the worst forms of disrespect because it not only affects you physically but also emotionally and cognitively. One example of Physical disrespect is the bus driver incident that was over the news. A man should never put his hands on a female regardless of any circumstance. Physical abuse leaves scars that will not go away. In a relationship if you are getting physically disrespected, you should not be in the relationship than, no relationship is worth getting hit all the time. There are many variables when it comes to respect and disrespect.If you always respect a person it is likely that they will disrespect you. In this society that we live in treat others the way that you want to be treated. Respect goes a long way in life. Respect is to consider somebody that is high worthy. Everybody should be high worthy to you , just go by the guidelines provided below and you will be a respected person and also know how important it is to respect somebody else. Work Cite Page Koppelman, A. (2010). How Shall I Praise Thee? Brian Leiter on Respect for Religion. San Diego Law Review, 47(4), 961-986. Colker, J. (2012). THE DANGER OF DISRESPECT. Smart Business Chicago, 9(11), 10.

Friday, November 8, 2019

When American History Began essays

When American History Began essays I believe American history began in Philadelphia on July 4th 1776. It was here that colonists led by Thomas Jefferson, Benjamin Franklin and James Madison signed the Declaration of Independence. Up to this time it could be argued that what had taken place was part of British colonial history and not American history. This document formally ended the colonists British citizenship. Previous to this date these men considered themselves British subjects who owed their loyalty to the laws and crown of England. They made this choice based on the principles of justice, equality, and the right for all people to be free. This revolutionary act was unique in the history of the world at that time. Based on the vision and leadership of these men, this document was one of the foundations upon which this country was born, and what I consider to be the beginning of American history. ...

Wednesday, November 6, 2019

Big Bang essays

Big Bang essays Every since scientists came up with an idea of how the universe started and was created, through the Big Bang, there has always been discussion and questioning on what the universe was, before it was created. Was there nothing because there was no time and no God, or was there something we havent discovered yet. Over the past decades, several scientists have theorized on life before the Big Bang, and have come up with these theories: Brane Theory, String Theory, and Inflation theory/Eternal Inflation. Although these theories tell of how the Big Bang started, it does not really explain the universe before the time before the Big Bang era, and how everything needed to start the Big Bang was placed/formed in that before the universe place. Many theories are a revision of an old theory, such as the case with the Brane theory and the String Theory. The String Theory and the Brane Theory both do not explain how matter got there to create the Big Bang. The String Theory says that the universe consists of tiny loops of strings that can form matter. According to this theory, the Big Bang may be a transition from a previously shrinking universe that has reached it smallest size and has begun to expand again. This may be true, but it does not tell us how these strings came to place and how the shrinking universe got there. The Brane Theory is a modification, where membranes which can create matter float around in a five dimension megaverse, and if they collide, it could start the Big Bang. The Inflation theory and the Eternal Inflation are related, in that the Eternal Inflation explains how the Inflation theory would work. The Inflation theory suggests that in the universe there are Inflation bubbles which give rise to universes, and these bubbles are stretched to create universes. It suggests that this can occur several times within the same universe, therefore creating a never endin ...

Monday, November 4, 2019

The century of a detective Essay Example | Topics and Well Written Essays - 1000 words

The century of a detective - Essay Example Some of the covered works in the book are Alphonese Bertillon, Scotland Yard, Doctor Crippen, Bernard Spilsbury and valentine day massacre among others. On the work by Alphonese Bertillon, the book looks at his contribution to Anthropometry. His contribution served as a great step in forensic science. The criminals could be identified by mug shot which is still used today in crime scene photography. The book is a great help in studying and applying forensic science. The book then gives details on how discovery of fingerprinting led to reduction of use in Bertillon work. Before the discovery of Bertillon system, the system used by Scotland Yard was chaotic. Use of finger prints in crime identification later overtook use anthropometry in forensics due to accuracy. One of the approaches that make the book resourceful is use of history to explain the development of forensic science. Another area that the book looks at is forensic medicine dealing with how a body decomposes toxicology and ballistics. One of the most compelling disciplines of forensic science that I found interesting was anthropometry. This was a discovery made by Bertillon who was an assistant clerk in the criminal records office of the Paris police department. His work mostly involved transferring criminal background data from various sources into standard forms. One of the problems that were in the system was that the arrestee physical descriptions were too vague. The offenders could use means of contorting their faces in an attempt to hide the identity. This is when he started to think of using measurement to classify a criminal. According to the book, no two human beings are alike physically in their measurements traits. The skeletal development even in identical twins differs to some degree. This leads to the success of Anthropometry. The idea by Bertillon was based on the fact that the skeletal structure of a living person is fixed from the age of twenty up to death. Personnel who deals with a nthropometry is well trained in biological variability, racial morphology and human osteology. The Anthropometric characteristics of an individual are related to sex, shape and form. Using this science of identification, the forensic expert is able to have a concise identity of the offender. The system allows the forensic expert to differentiate the degree of similarity or difference between the offenders. In some instances, anthropometry is used in identifying unknown variables. This occurs when examining the skeletal remains of a person. The forensic expert can estimate the age, sex, body build and ethnicity of a dead person based on the remains. Some of these details help in investigating the cause of death as deformities and fractures can also be accounted among others. One of the fields that have been closely associated with anthropometry is archeological science. This is due to the analysis that is done on the human body skeletal system. One of the most important knowledge tha t a forensic scientist must have is good skeletal biology. This helps in skeletal reconstruction in post mortem examination. Using the details collected from the examination and reconstruction, it becomes possible to know the cause of death. The field of anthropometry can be divided into to somatometry and osteometry. Somatometry deals with measurements taken from a living body and cadaver which include head to face. This is a vital tool in anthropometry as it is used in morphological variation. The branch is used in determining the age among the individuals. Osteometry includes measurements from the skeleton and its parts. Forensic scientists use this method in taking the measurements of the skeletal bones which includes the skull. This is the method has been successfully used in determini

Saturday, November 2, 2019

Trade Law Essay Example | Topics and Well Written Essays - 1500 words

Trade Law - Essay Example Benny was asked by Carlos to make all shipping arrangements; though it is the buyer’s obligation to make such arrangements under FOB contract. ‘Under an FOB sale, the buyer is responsible for making the arrangements for shipping the goods to their destination’. Thus, it had to be Carlos’ obligation to make all shipping arrangements with him being the buyer of the goods. Moreover, according to the FOB contract law, the seller is not under a duty to ship the goods until he has received shipment instructions from the buyer; thus Benny was not obliged to arrange any shipment without Carlos giving him the necessary instructions. It should be added, that this is the Buyer’s responsibility to arrange the shipment of goods to the port of destination. . The two cases were destroyed during loading at the port; it is necessary to find out who is responsible for these losses. According to s 20 of the Sale of Goods 1979, risk passes with property and in FOB sales risk passes along with property upon shipment – that is, when the goods pass the ship’s rail.

Thursday, October 31, 2019

2009 Stimulus Bill Research Paper Example | Topics and Well Written Essays - 2500 words

2009 Stimulus Bill - Research Paper Example The day that President Obama signed the American Recovery and Reinvestment Act, he made a speech in Denver, which was city where he accepted the Democratic Party’s nomination for the presidency. President Obama addressed the mayors regarding the stimulus plan and he highlighted the important aspects of the plan similar to his speech that he gave in Denver. President Obama had a meeting with the Prime Minister of Canada and took the opportunity, during the press conference to discuss the benefits of the stimulus plan. When Congress authorized the $787 billion economic stimulus package, not one House Republican voted for the stimulus plan. House Minority Leader John Boehner indicated that the plan would only make larger bureaucracies and not create jobs. Bill overview The American Recovery and Reinvestment Bill was the first essential step by the government to produce and preserve three to four million jobs, start up the economy, and start transforming the economy for the 21st c entury with $787.2 billion in economic improvement tax cuts and directed priority investments (Summary of Economic Stimulus Bill, 2009). The American Recovery and Reinvestment Plan allows for unparalleled supervision, responsibility, and clearness to make certain that taxpayer dollars are invested successfully and efficiently (Summary of Economic Stimulus Bill, 2009). ... The American Recovery and Reinvestment Plan seeks to put individuals in employment to cut down America’s reliance on foreign oil by strengthening attempts aimed at increasing renewable energy manufacture and modernize public structures to make them more energy efficient.  (Summary of Economic Stimulus Bill, 2009). The plan will invest more than $30 billion to alter the country’s energy diffusion, delivery, and creation systems and investing $5 billion to weatherize middle class homes (Summary of Economic Stimulus Bill, 2009). The stimulus plan will invest $15 billion for science facilities, research, and instrumentation and $7.2 billion to expand broadband internet access in attempt to help companies compete in a global economy.  (Summary of Economic Stimulus Bill, 2009). The American Recovery and Reinvestment Plan will invest $27.5 billion for highway construction, $16.5 billion to renew federal and other public infrastructure, $18.8 billion for clean water, flood control, and environmental restoration, and $17.7 billion for transportation initiatives to cut down traffic congestion and gas use (Summary of Economic Stimulus Bill, 2009). To facilitate children to be taught in 21st century schoolrooms, the stimulus plan will invest $26 billion in school districts, $53.6 billion in state fiscal aid to avoid cutbacks to vital services, and $15.6 billion to enlarge the Pell grant (Summary of Economic Stimulus Bill, 2009). In an effort to keep jobs, money, and lives, the stimulus plan will invest $19 billion for health information technology to avert medical errors, supply enhanced care to patients and establish cost-saving efficiencies and $2 billion to offer preventative care and to assess the most efficient healthcare treatments (Summary of Economic

Tuesday, October 29, 2019

Dubai Essay Example for Free

Dubai Essay Harvard Business Review On Corporate Strategy Page 4 Google Books Result books. google. com/books? isbn=1578511429 C. K. Prahalad 1999 Business Economics (See the exhibit â€Å"The Triangle of Corporate Strategy. †) The resources that provide the basis for corporate advantage range along a continuum—from the highly Creating Corporate Advantage Harvard Business Review hbr. org/1998/05/creating-corporate-advantage/ar/1 Great corporate strategies come in the first instance from strength in each side of the triangle: high-quality rather than pedestrian resources, strong market Corporate Level Strategy: Theory and Applications Page 2 Google Books Result books. google. com/books? isbn=0203844521 Olivier Furrer 2010 Business Economics This framework can be represented graphically as the corporate strategy triangle (see Figure 1. 1). In this framework, the three sides of the triangle—resources, Business Strategy Blog: Newell Company: Corporate Strategy deepakbusinessstrategy. blogspot. com/ /newell-company-corporate-strateg Feb 20, 2011 – Use the Corporate Strategy Triangle to evaluate Newells corporate strategy. Do you think this corporate strategy is effective? Newells goal is to The Triangle of Corporate Strategy | Business Entrepreneurship yourbusiness. azcentral. com/triangle-corporate-strategy-16752. html Making the sum of the parts greater than the whole is not necessarily a magicians sleight of hand. The Triangle of Corporate Strategy is a management model [PDF]corporate strategy in turbulent environments IESE Business School www. iese. edu/research/pdfs/DI-0623-E. pdf by AA Caldart 2006 Cited by 6 Related articles The Corporate Strategy Triangle (Caldart and Ricart, 2004) is a dynamic . The data collection process was framed by the Corporate Strategy Triangle. [PPT]Chapter Note 1 www. csun. edu/~dn58412/IS655/chapter1. ppt Define and explain the Information Systems Strategy Triangle. Dells mission is to be the most successful computer company in the world at delivering the best Searches related to corporate strategy triangle corporate advantage what constitutes a good corporate strategy and why develop corporate strategy key elements of corporate strategy corporate level strategies examples creating corporate advantage list three directional strategies

Saturday, October 26, 2019

Importance of Smartphone Security in Business Environment

Importance of Smartphone Security in Business Environment 1.0 Introduction The purpose of this document is to expose a business problem from a technological viewpoint. The subject of the business problem I have selected is smartphone security. This subject will be analysed and critically evaluated, then expanded upon further to reflect the range of possible solutions and raise awareness of the risk and need of smartphone security. 1.1 Aims and objectives Aims Create an authoritative document with recommendations to raise awareness and inform businesses for the need of greater mobile security within the business environment. Use insight to establish a research gap. Main objectives Assess smart mobile devices currently used. Analyse security advantages and disadvantages of smart mobile devices. Establish what risks smart mobile devices are exposed to. Evaluate impact of risk exposed by unsecure mobile devices to businesses. Examine mobile security currently available. Investigate responsibility Evaluate current business policies and procedures for mobile devices and how these can be enforced. Construct smartphone security guide with recommendations for businesses. 1.2 Problem statement The problem is information and financial loss due to information theft or inaccessibility from malicious software, and the detrimental impact this has upon the business. A recent report from Gartner (reference report) indicates that sales of smartphones have grown exponentially and businesses are reaping the benefits gained from smartphones, however their use also creates security risks and opportunities for cybercriminals. There are many types of information that can be stored on smartphones for example, personally identifiable information in the form of identity credentials, email, SMS and MMS messages, GPS coordinates, passwords, company documents and connectivity access information to company servers as just some of the examples. Information security has gained significant value within the business domain over the past decade however this value remains subjective (why subjective? And value pertaining to what?). Users have been made aware of the risks posed by malicious software whilst using their personal computer on the internet, now assistive technology like smart mobile devices are becoming increasingly more powerful, functional and ubiquitous. Where personal computers have at least some security software in place as standard, smartphones commonly have no security software installed as a standard and are susceptible to (Malware, Viruses, trojans,etc-examples please ;)) the exact same threats as to personal computers. Businesses, professionals and personal users now have a greater awareness for the need of personal computer security. This has been provided by media coverage, enterprise training or through personal experience. When using a personal computer or laptop for example, it is common to find a firewall and antivirus software installed showing that internet safety has now become a social normalcy. â€Å"†¦Smartphones are more powerful than supercomputers were a few years ago, and we are putting them in the hands of people whove never had anything like it before. Google CEO Eric Schmidt As Schmidt states smartphones are pervasive devices, workers typically need training on these devices as they are multifunctional and unless people are aware of the threats these devices pose the consequences can be detrimental on the business. Todays organisations rely heavily upon information technology in order to allow their business to function (Khosrowpour, 2001). This is fundamentally due to how intricate information technology systems are embedded into organisations. Smartphones provide businesses with many new opportunities (sweeping statement-what opportunities and is this your opinion/referencing?) however these opportunities provided by smartphones exist not just for business and personal users as the opportunity extends to cybercriminals too. Malware is one of the most common sources of security failures within businesses currently (sweeping statement-most common according to who?), they have the same capabilities as personal computers and are used within business environments in the same manner, however they are typically unsecure and rely solely upon the standard out-of-the-box security features with no antivirus or firewall present. There are many different mobile operating systems for smart mobile devices requiring different security applications. The operating systems and the risks associated will be carefully analysed. The intentions of this paper are to investigate what impacts smart mobile devices can have on businesses, why these problems affect the organisation, and how they are overcome. Finally, insight will be gathered and recommendations made so that businesses can use to foresee and prevent future unnecessary costs and risk. 2.0 Literature review The focus of the subject proposed for this project is a very real-world business and information technology problem. Smartphone security is a recognisable potential problem for both individuals and businesses as most smartphone users including businesses and educational establishments do not have any specific policies in place to safeguard from smartphone security related issues. Because smartphone security is still in its infancy, it will be a challenge to source accurate and relevant information from authoritative sources such as ‘Emerald without resorting to web based research. However, the more this project advances smartphone security in the media is becoming omnipresent. For the project a survey will be proposed in order to gain knowledge for understanding how aware users are for the need of smartphone security. This survey will target as many participants as possible in order to gather appropriate primary evidence. Interviews will be conducted with professionals in the field of smartphones and security such as police personnel, security advisors and mobile phone shop staff to ascertain levels of security training, public security literature and knowledge. Authoritative information sources will be used to gain technical information directly from manufactures, websites and retail outlets such as Apple, Android, Research In Motion, Nokia and Microsoft for documentation on smartphones and smartphone platforms. Only technical information will be used from these sources as it is in manufacturers interests to sell their products Analysis of the survey will be done using statistical analysis tools including IBMs ‘SPSS, ‘SPSS Text Analysis software and more modern statistical analysis web-based techniques such as MarketSight. MarketSight is a hosted research data reporting environment accessible by the internet and only available through the internet browser Microsoft explorer whereas SPSS is software directly installed onto a computer. ‘Malware: the new legal risk the paper written by Verine Etsebeth in 2007 has invaluable source material for this project. Acquired from Emerald Insight, it is very suitable to this project as it highlights the threat of malware and risks posed to businesses. It is well written and authoritative however Emerald specified it was unique as no such document has been published previously. The majority of sources used by Etsebeth are from Harley, D; Slade, R and Gattiker, U. Etsebeth references Viruses Revealed (McGraw-Hill, New York, NY 2001) This source is recognised and trusted within the industry as a whole and is considered to be authoritative and well-documented on its own merit. This paper focuses on the legal and professional implications of malware on companies in South Africa Etsebeths home town. This paper is very suitable for this project as it is a very well written and authoritative document, the majority of sources used by Etsebeth are from Harley, D., Slade, R. and Gattiker, U. (2001) Viruses Revealed, McGraw-Hill, New York, NY. The source used by Etsebeth ‘Viruses Revealed as a well-documented authoritative document published by McGraw-Hill, a recognized trusted source. Etsebeth is a senior lecturer in the Faculty of law specialising in the areas of law and information security. Although Etsebeths paper ‘Malware: the new legal risk is highly suitable in terms of qualitative information, it lacks suitable geographic law for the scope of my project. I will use the information provided by Etsebeth for Malware, as this information is not geographically bound, and analyse the legal implications after comparing them to UK law. Etsebth highlights that companies are reluctant to report cybercrimes as it has negative implications on the companys reputation this correlates to my hypothesis. ‘Understanding the spreading patterns of mobile phone viruses by Pu Wang, Marta Gonzalez, Cesar Hidalgo and Albert-laszlo Barabasi is a technical journal based on mobile phone virus modelling and the understanding of spreading patterns. The journal was published in 2009 and investigates various mobile platforms relating to my assignment however the document is a highly technical report based on the mathematics of virus spreading patterns, I find this report to be highly enlightening however due to the technical awareness of the target reader of my assignment I believe this report to be too technical and out of scope. Authoritative information directly from manufactures websites and retail outlets will be used including Apple, Android, Research In Motion, Nokia and Microsoft for documentation on smartphones and smartphone platforms as this will allow me to access accurate and current reliable information directly. Secondary information sources will be avoided where possible such as blogs and review websites for direct smartphone technical information as these types of resources may facilitate in providing inaccurate facts. Local mobile phone retail outlets such as Orange, Vodaphone, Phones4u, The Carphone Warehouse, O2 and T-Mobile will provide me with valuable information on device security awareness. I will enquire on staff security training and in-house company security literature currently available to public and business consumers as this will affect the average smartphone users security awareness. After investigation smartphone security I established that some research in this area had been done already by Goode Intelligence a UK company based in London. ‘Goode Intelligence is a company that provide strategic research and analysis that specialises in information security. Founded in 2007, Goode Intelligence has provided clients globally with statistical information from evidence accumulated from surveys in the field of information security. Goode Intelligence is viewed as an authoritative market leader of information security consumer information. 2.3 How this project fits in with the literature review I had chosen the subject then chosen the literature review method, thus tailoring the literature review to fit the requirements of the project. The Survey will allow me access information on how smartphone users actually use their device, how important they view the information stored on the device and users perception of the need for security 3.0 Research methods 3.1 Hypothesis ‘Businesses are not aware that they are at risk of information and financial loss or theft due to malware infections on smartphone devices. Information Technology consultants have recognised the gap in security for mobile devices, however it was soon realised that the physical security of the device was not the real issue, as the need for smartphone security awareness within businesses was a far greater concern. Experience establishes that the best form of security is the awareness for the need of security and why by the individuals who use the technology. Smartphone malware is not seen as of great importance to IT professionals, business managers or general consumers. A majority of smartphone users use their devices for both business and personal use and a large share of smartphone users will be using their personal smartphone for work related activities. The assumption is based that most individuals would know what information they deemed as confidential, more specifically, what information would they not like others to access to include such things as calendar, contacts, photos, emails and files. IT professionals should be the most aware group of smartphone malware risk, as their experience and technological awareness should allow them to be more technologically security aware. Antivirus used on personal computers is well known to hinder system performance and conflict with some applications and other software, The hypothesis is that antivirus products will consume more system resources then current smartphones can afford to offer and require more power from the device ultimately reducing the battery life and impacting negatively on overall system performance, rendering the device unusable by the average user. The perception of products such as the iPhone are viewed as secure out-of-the-box along with Blackberry smartphones as they are mostly touted by mobile phone shop staff as business orientated secure devices. 3.2 Methodology The project will be implemented using a triangulated, positivistic methodological approach. The particular technique chosen this will provide a balanced view of the subject area. It will incorporate both quantitative and qualitative primary research methods as reffered to by Bryman as multi-strategy research (Bryman, 2006). The scope of this project will mostly be Quantitative based research as indicted in Fig 1 below. Bryman advises that quantitative data can be gathered by way of a survey and qualitative research collected from journals and interviews. The Initial research will be conducted using primary research in the form of a cross-sectional survey questionnaire with closed questioning, interviews with professionals in the field of smartphone related security such as police personnel, security advisors and mobile phone shop staff will also be conducted to gain knowledge of their awareness of smartphone security and what advice they provide. The survey will be available to respondents in paper form where needed however the survey respondents targeted will mostly be from the internet so it is required that the survey be electronically hosted. The web-based survey distribution method selected is ‘Survey Monkey. The main motivations for selecting ‘Survey Monkey are reputation, administration features, ease of access and user layout familiarity. The survey will be designed to be concise and simple to maximise the amount of respondents in order to gain quality information. The target survey population will represent business managers, IT professionals as well as individuals who use their smartphone for personal use to establish users who admit to using their smartphone for both business and personal as opposed to personal use only. This is suggested by Baxter as an important step in defining who should be included and excluded from participating in the survey (Baxter, L. Babbie, E, 2004). The users have been targeted as the project will establish not only the perception of smartphone security but also what smartphone policies and procedures are currently in place and how aware users are of these. Research indicates that an ideal resource for the proposed target users is through a popular internet based technological social news website named ‘Reddit. ‘Reddit has a daily turnover of over 850.000 unique users (Alexa, 2010). According to Alexa the average ‘Redditors are male between the age of 18 to 44, are well educated and browses ‘Reddit either from work or home, suggesting that the majority of ‘Redditors are working professionals in the technology field.This suggest that the average ‘Reddit user is technologically aware (Alexa, 2010), suggesting that ‘Reddit would suit the proposed target survey participant. The proposed project will be delivered using an analytical in-depth research structure. This project structure has been selected as it will primarily be research based on the current business problem as previously stated. The intentions are to analyse the problem, understand how aware people are of the issue and propose possible solutions, One method of analysis proposed is the conceptual method, as described by Beaney as a way of breaking down or analysing concepts into their constituent parts in order to gain knowledge (Beaney 2003). I have interpreted this to mean the compartmentalisation and analysis of data. Critical and creative thinking skills such as Edward.De Bono six thinking hats will be used to examine the problem domain. A review will be given on how the systems work and compare them to how they should work. I will then analyse the solution domain by examining which options are available to improve the system security along with optimal recommendation and the benefits this would provide. ‘SPSS is a well-established statistical analysis application first released in 1968. Randomised questions, Marketsight. Survey design 4.0 Results 4.1 Presentation and description of results Who took part? The survey was conducted to establish the awareness of information security and the need for smartphone security. Users were openly invited from technological backgrounds to partake in the survey and assured of anonymity. A total of 758 people responded to the online survey from a possible 854,998 potential participants (Fig. 2). The survey itself was open for one month during February and March 2011. The results indicated in Figure 2 that a majority share of survey participants, with 82 per cent being male and 18 per cent female confirms my survey target gender. When asked, both genders averaged at age 26 (Fig. 3) as denoted in Figure 3, again confirming my target survey demographic groups. When asked 53 per cent of respondents reported they had used their smartphone solely for personal use, opposed to 45 per cent of partakers that reported they used their smartphone for both business and personal use, with 2 per cent reporting to use a smartphone solely for business use only as shown in Fig. 4 combining a total of 47 per cent. 25 per cent of respondents had only been using smartphones for the past six months, 17 per cent were aware they had been using them for at least a year and a majority percentage of 59 per cent had been using smartphones for more than one year seen in Figure 5. Only 12 per cent of respondents opted to use the ‘pay as you go payment facilities as opposed to the greater majority of 88 per cent that have contracts shown in Figure 6 below. 87 per cent of participants reported that they did not use any form of smartphone security software such as antivirus as opposed to 13 per cent that did as highlighted in Figure 7. SMARTPHONE In answer to the question â€Å"What type of smartphone do you currently use?† 34 per cent of respondents said they used an Apple IPhone, 58 per cent reported to use Android smartphones, 13 per cent used Blackberries and 6 per cent of respondents had Symbian smartphones (Fig. 8). 87 per cent of respondents had used calendar functions, 94 per cent of respondents used email, 86 per cent of used games, 87 per cent of respondents used GPS features, 74 per cent of respondents used instant messaging, 52 per cent of respondents used internet banking facilities, 66 per cent of respondents used multimedia messaging service (MMS), 94 per cent of respondents used the short messaging service (SMS) feature and 78 per cent (Fig. 9) of respondents admitted to using social networking sites on their smartphone. 93 per cent of survey partakers used 3G for mobile data communication, 59 per cent of respondents used ‘Bluetooth technology, only 4 per cent of had used infrared line of sight technology, however 75 per cent of respondents admitted to connecting via universal serial bus (USB) and 94 per cent of participators had used wireless for mobile data communication shown in Figure 10. Total of 757 participators answered this question and 1 partaker chose to skip the question. From a total of 758 respondents, 63 per cent (476) valued the physical smartphone above the 37 per cent (282) whom valued the information more. Figure 12 shows 62 per cent of survey participants reported that they did not pay attention to licence agreements and permissions when installing applications on their smartphones 34 per cent reported they did read the licence agreements and permissions. 4 per cent of respondents believed that this question was not applicable to them for their smartphone use. The awareness for the need of personal computer security is apparent as 81 per cent of responders were aware for the need of security software for personal computers as opposed to the 19 per cent who were not aware. 94 per cent participants have connected their smartphone to a personal computer (PC), 6 per cent stated they had not ever connected to a PC. All 758 respondents answered this question. Figure (XXX) shows that survey respondents considered smartphone security as ‘beneficial but not essential as the majority answer with 64 per cent , 21 per cent (159) didnt not consider there to be a need currently for smartphone security software as opposed to 15 per cent (114) whom considered smartphone security software as absolutely essential. 95 per cent of respondents were aware of ‘Adware, 27 per cent had known about ‘Badware, 25 per cent of respondents were aware of ‘Crimeware, 69 per cent had previous knowledge of ‘Rootkits, ‘Trojans 95 per cent,, ‘Spyware 95 per cent, ‘and ‘Worm 90 per cent were the most commonly aware terms of malware from the malicious software list, the majority being ‘Virus with 97 per cent of respondents being aware of this type of malware. 731 respondents answered this question. 96 per cent of respondents stated that they owned the smartphone, only 4 per cent of respondents had employer owned smartphones. All partakers responded to this question. Out of the 758 respondents, 15 per cent were aware of policies within their place of business, with the majority of respondents 41 per cent unaware of any workplace policies or procedures particularly orientated toward smartphones. 44 per cent responded that the question was not applicable to them. All participants answered this question. It is interesting to find that only 15 per cent stated they were aware of specific workplace policies and procedures specifically for mobile phones and 40 per cent were aware there were no mobile phone policies and procedures. A majority of 92 per cent (699) had not been advised of any security methods to protect them or their information from fraud, theft or malicious software. 8 per cent (59) respondents agreed they had received adequate security advice. 4.2 Discussion and interpretation of survey results Analysing the results of the survey shows the majority of smartphone users to be Android users peaking in the 20 to 24 age bracket, this would indicate that an IT professionals choice of smartphone is Android as indicated in Figure 3 below. Smartphone survey contributors within the 20 to 24 age group were then further examined to indicate what purpose is intended when using the devices, examining the results shows clearly that a majority of survey respondents reported they viewed their smartphone use as personal use, however disturbingly over half the users in the same age group admitted to using their smartphone for both personal use and business use as shown in Figure 4. Female respondents preferred the features provided by iPhones however also as opposed to male smartphone users who clearly preferred the Android platform over all others as seen in Figure (XXX). Examining users perception for the need of smartphone security against those users whom did or did not have antivirus shows that the awareness for the need of security correlates to users whom did indeed have smartphone security measures in place with nearly half of users who responded ‘Absolutely essential to the question ‘How necessary do you see the need for smartphone security software as shown in Figure (XXX). However the overall amount of smartphone users with antivirus or other security is disturbingly low given the malware threats currently available. The results also show us that a large majority of IT professionals do view smartphone security as beneficial however not essential. Android users are the most security aware demographic as demonstrated in Figure (XXX) above. This indicates that users are not aware of the threats posed by malware and view the need for smartphone system performance greater than the need for security. Business users have been defined as respondents who confirmed they used their smartphone for business only and users who reported they used their smartphone devices for both business and personal use. Smartphones have many features of value to employees as shown in Figure (XXX) Below, Email, Calendar, GPS and SMS features were shown to be the most used features all of which are viewed to aid employee productivity. However features such as games and social networking which negatively affect employee productivity were also shown to be frequently used, suggesting that smartphones can have negative effects on employee productivity. Figure (XXX) also shows us that over half of business users reported to use internet banking facilities from their smartphones. After finding out what smartphone features business users were most interested in I studied how aware business users were of security permissions and licence agreements prompts when installing new applications on their smartphones. The pie chart below is a representation of business user survey respondents awareness of how essential smartphone application installation security prompts are in regards to new application installations. Figure (XXX) shows us that 60 per cent of all business users admitted that they did not pay attention to licence agreements and permission prompts when installing new applications. The distinction between smartphones and personal computers is becoming increasingly marginal. Personal computers for example do not have built in billing systems and unless connected to the internet are static devices accessible via a local area network or through direct contact. Smartphones have an integral billing system are completely mobile and have multiple connectivity methods. When business user survey partakers were asked if they used any security applications such as antivirus, an overwhelming majority responded that they did not use any security products. This confirms part of my hypothesis that business users do not perceive smartphone security as a real threat. Discovering that the majority of business users used internet banking facilities for either personal banking or business banking and 9 out of 10 business smartphones had no security products installed it was elementary to understand if business users were aware of smartphone malware threats. The line graph in Figure (XXX) indicates that over 90 per cent of business users are aware of malware threats such as Adware, Spyware, Trojans, Viruss and Worms however business users were all least aware of malware threats such as Crimeware as indicated in Figure (XXX) Survey respondents who reported they used their smartphone for personal use only were excluded from the following analysis.7 out of 10 business users confirmed they were not aware of any specific smartphone security policies at work (Figure (XXX) The awareness of security for iPhone smartphones is low as users perception of Apple and Mac OS is that it is impervious to malware infection. Research shows that iPhone users have the least amount of antivirus installed on devices. As discussed earlier, users are completely reliant on Apple to vet all applications for malicious code, whereas Android and Symbian applications are open source so users may inspect the contents for malware. secure smartphone model, least security aware group Android users are the most security aware demographic group as the typical android user is conscious that malicious software exists and the android community are able to vet applications themselves. Android users were also the highest security aware group with the highest percentage of antivirus products per smartphone. Virtual environments, least secure smartphone perception Blackberry smartphones were the most secure devices in regards to email, network connectivity however it was found that application signatures can be purchased by anyone for a small fee thus rendering the security of the device minimal. Very secure aspects, not as secure overall Symbian smartphones are found to be the most current common target for malware developers. Low security Windows phone 7 is the newest platform on the smartphone market and only time will tell how secure the device is. Awareness and concern 5.0 Smartphones Private and confidential data from lost or stolen mobile devices such as laptops, USB pen drives and computer storage drives has gained negative exposure within the media recently however one of the largest growing threats to corporate information comes from unsecure smartphones. To understand this statement it is important to appreciate the history of the smartphone to recognise why smartphones pose such a threat in todays business environment. A mobile phone is a portable electronic device used to make and receive telephone calls. The mobile phone was first revealed by Dr Martin Cooper from the company Motorola in 1973, it was not until ten years after Dr Coopers demonstration that Motorola released its flagship mobile phone the ‘DynaTAC, this was the worlds first commercially viable mobile phone (Motorola, 2009). Originally these devices were commercially targeted at businesses and upper class individuals as the cost of the device was very high and the actual usage was severely restricted, due to the technology limitations at this time of battery weight (Motorola, 2009) and because the battery duration was limited to last a maximum of 30 minutes thus making the device impractical and available only to businesses and professional consumers. ‘According to Moores Law, the number of transistors on a chip roughly doubles every two years. (Intel, 2005) As Moore stated over thirty five years ago, due to the advancement of processors, battery technologies and overall reduced power consumption, mobile phones have become lighter, smaller, more powerful and longer lasting (Intel, 2005). Due to these fundamental technological advancements mobile phones have been able to incorporate additional existing technologies such as camera units, sensors, speakers and often take advantage of JAVA based applications and features, thus coining the term ‘Feature phone. Feature phones are more advanced technologically than mobile phones however now Smartphones currently reside in the top tier of mobile communication technology. The term ‘smartphone is ambiguous and many experts fail to agree on a suitable definition. Most smartphone features are not exclusive to a particular category, this project does not intend to make that definition, however for the scope of this project I have listed combined definitions and compared current smartphone f