Thursday, October 31, 2019

2009 Stimulus Bill Research Paper Example | Topics and Well Written Essays - 2500 words

2009 Stimulus Bill - Research Paper Example The day that President Obama signed the American Recovery and Reinvestment Act, he made a speech in Denver, which was city where he accepted the Democratic Party’s nomination for the presidency. President Obama addressed the mayors regarding the stimulus plan and he highlighted the important aspects of the plan similar to his speech that he gave in Denver. President Obama had a meeting with the Prime Minister of Canada and took the opportunity, during the press conference to discuss the benefits of the stimulus plan. When Congress authorized the $787 billion economic stimulus package, not one House Republican voted for the stimulus plan. House Minority Leader John Boehner indicated that the plan would only make larger bureaucracies and not create jobs. Bill overview The American Recovery and Reinvestment Bill was the first essential step by the government to produce and preserve three to four million jobs, start up the economy, and start transforming the economy for the 21st c entury with $787.2 billion in economic improvement tax cuts and directed priority investments (Summary of Economic Stimulus Bill, 2009). The American Recovery and Reinvestment Plan allows for unparalleled supervision, responsibility, and clearness to make certain that taxpayer dollars are invested successfully and efficiently (Summary of Economic Stimulus Bill, 2009). ... The American Recovery and Reinvestment Plan seeks to put individuals in employment to cut down America’s reliance on foreign oil by strengthening attempts aimed at increasing renewable energy manufacture and modernize public structures to make them more energy efficient.  (Summary of Economic Stimulus Bill, 2009). The plan will invest more than $30 billion to alter the country’s energy diffusion, delivery, and creation systems and investing $5 billion to weatherize middle class homes (Summary of Economic Stimulus Bill, 2009). The stimulus plan will invest $15 billion for science facilities, research, and instrumentation and $7.2 billion to expand broadband internet access in attempt to help companies compete in a global economy.  (Summary of Economic Stimulus Bill, 2009). The American Recovery and Reinvestment Plan will invest $27.5 billion for highway construction, $16.5 billion to renew federal and other public infrastructure, $18.8 billion for clean water, flood control, and environmental restoration, and $17.7 billion for transportation initiatives to cut down traffic congestion and gas use (Summary of Economic Stimulus Bill, 2009). To facilitate children to be taught in 21st century schoolrooms, the stimulus plan will invest $26 billion in school districts, $53.6 billion in state fiscal aid to avoid cutbacks to vital services, and $15.6 billion to enlarge the Pell grant (Summary of Economic Stimulus Bill, 2009). In an effort to keep jobs, money, and lives, the stimulus plan will invest $19 billion for health information technology to avert medical errors, supply enhanced care to patients and establish cost-saving efficiencies and $2 billion to offer preventative care and to assess the most efficient healthcare treatments (Summary of Economic

Tuesday, October 29, 2019

Dubai Essay Example for Free

Dubai Essay Harvard Business Review On Corporate Strategy Page 4 Google Books Result books. google. com/books? isbn=1578511429 C. K. Prahalad 1999 Business Economics (See the exhibit â€Å"The Triangle of Corporate Strategy. †) The resources that provide the basis for corporate advantage range along a continuum—from the highly Creating Corporate Advantage Harvard Business Review hbr. org/1998/05/creating-corporate-advantage/ar/1 Great corporate strategies come in the first instance from strength in each side of the triangle: high-quality rather than pedestrian resources, strong market Corporate Level Strategy: Theory and Applications Page 2 Google Books Result books. google. com/books? isbn=0203844521 Olivier Furrer 2010 Business Economics This framework can be represented graphically as the corporate strategy triangle (see Figure 1. 1). In this framework, the three sides of the triangle—resources, Business Strategy Blog: Newell Company: Corporate Strategy deepakbusinessstrategy. blogspot. com/ /newell-company-corporate-strateg Feb 20, 2011 – Use the Corporate Strategy Triangle to evaluate Newells corporate strategy. Do you think this corporate strategy is effective? Newells goal is to The Triangle of Corporate Strategy | Business Entrepreneurship yourbusiness. azcentral. com/triangle-corporate-strategy-16752. html Making the sum of the parts greater than the whole is not necessarily a magicians sleight of hand. The Triangle of Corporate Strategy is a management model [PDF]corporate strategy in turbulent environments IESE Business School www. iese. edu/research/pdfs/DI-0623-E. pdf by AA Caldart 2006 Cited by 6 Related articles The Corporate Strategy Triangle (Caldart and Ricart, 2004) is a dynamic . The data collection process was framed by the Corporate Strategy Triangle. [PPT]Chapter Note 1 www. csun. edu/~dn58412/IS655/chapter1. ppt Define and explain the Information Systems Strategy Triangle. Dells mission is to be the most successful computer company in the world at delivering the best Searches related to corporate strategy triangle corporate advantage what constitutes a good corporate strategy and why develop corporate strategy key elements of corporate strategy corporate level strategies examples creating corporate advantage list three directional strategies

Saturday, October 26, 2019

Importance of Smartphone Security in Business Environment

Importance of Smartphone Security in Business Environment 1.0 Introduction The purpose of this document is to expose a business problem from a technological viewpoint. The subject of the business problem I have selected is smartphone security. This subject will be analysed and critically evaluated, then expanded upon further to reflect the range of possible solutions and raise awareness of the risk and need of smartphone security. 1.1 Aims and objectives Aims Create an authoritative document with recommendations to raise awareness and inform businesses for the need of greater mobile security within the business environment. Use insight to establish a research gap. Main objectives Assess smart mobile devices currently used. Analyse security advantages and disadvantages of smart mobile devices. Establish what risks smart mobile devices are exposed to. Evaluate impact of risk exposed by unsecure mobile devices to businesses. Examine mobile security currently available. Investigate responsibility Evaluate current business policies and procedures for mobile devices and how these can be enforced. Construct smartphone security guide with recommendations for businesses. 1.2 Problem statement The problem is information and financial loss due to information theft or inaccessibility from malicious software, and the detrimental impact this has upon the business. A recent report from Gartner (reference report) indicates that sales of smartphones have grown exponentially and businesses are reaping the benefits gained from smartphones, however their use also creates security risks and opportunities for cybercriminals. There are many types of information that can be stored on smartphones for example, personally identifiable information in the form of identity credentials, email, SMS and MMS messages, GPS coordinates, passwords, company documents and connectivity access information to company servers as just some of the examples. Information security has gained significant value within the business domain over the past decade however this value remains subjective (why subjective? And value pertaining to what?). Users have been made aware of the risks posed by malicious software whilst using their personal computer on the internet, now assistive technology like smart mobile devices are becoming increasingly more powerful, functional and ubiquitous. Where personal computers have at least some security software in place as standard, smartphones commonly have no security software installed as a standard and are susceptible to (Malware, Viruses, trojans,etc-examples please ;)) the exact same threats as to personal computers. Businesses, professionals and personal users now have a greater awareness for the need of personal computer security. This has been provided by media coverage, enterprise training or through personal experience. When using a personal computer or laptop for example, it is common to find a firewall and antivirus software installed showing that internet safety has now become a social normalcy. â€Å"†¦Smartphones are more powerful than supercomputers were a few years ago, and we are putting them in the hands of people whove never had anything like it before. Google CEO Eric Schmidt As Schmidt states smartphones are pervasive devices, workers typically need training on these devices as they are multifunctional and unless people are aware of the threats these devices pose the consequences can be detrimental on the business. Todays organisations rely heavily upon information technology in order to allow their business to function (Khosrowpour, 2001). This is fundamentally due to how intricate information technology systems are embedded into organisations. Smartphones provide businesses with many new opportunities (sweeping statement-what opportunities and is this your opinion/referencing?) however these opportunities provided by smartphones exist not just for business and personal users as the opportunity extends to cybercriminals too. Malware is one of the most common sources of security failures within businesses currently (sweeping statement-most common according to who?), they have the same capabilities as personal computers and are used within business environments in the same manner, however they are typically unsecure and rely solely upon the standard out-of-the-box security features with no antivirus or firewall present. There are many different mobile operating systems for smart mobile devices requiring different security applications. The operating systems and the risks associated will be carefully analysed. The intentions of this paper are to investigate what impacts smart mobile devices can have on businesses, why these problems affect the organisation, and how they are overcome. Finally, insight will be gathered and recommendations made so that businesses can use to foresee and prevent future unnecessary costs and risk. 2.0 Literature review The focus of the subject proposed for this project is a very real-world business and information technology problem. Smartphone security is a recognisable potential problem for both individuals and businesses as most smartphone users including businesses and educational establishments do not have any specific policies in place to safeguard from smartphone security related issues. Because smartphone security is still in its infancy, it will be a challenge to source accurate and relevant information from authoritative sources such as ‘Emerald without resorting to web based research. However, the more this project advances smartphone security in the media is becoming omnipresent. For the project a survey will be proposed in order to gain knowledge for understanding how aware users are for the need of smartphone security. This survey will target as many participants as possible in order to gather appropriate primary evidence. Interviews will be conducted with professionals in the field of smartphones and security such as police personnel, security advisors and mobile phone shop staff to ascertain levels of security training, public security literature and knowledge. Authoritative information sources will be used to gain technical information directly from manufactures, websites and retail outlets such as Apple, Android, Research In Motion, Nokia and Microsoft for documentation on smartphones and smartphone platforms. Only technical information will be used from these sources as it is in manufacturers interests to sell their products Analysis of the survey will be done using statistical analysis tools including IBMs ‘SPSS, ‘SPSS Text Analysis software and more modern statistical analysis web-based techniques such as MarketSight. MarketSight is a hosted research data reporting environment accessible by the internet and only available through the internet browser Microsoft explorer whereas SPSS is software directly installed onto a computer. ‘Malware: the new legal risk the paper written by Verine Etsebeth in 2007 has invaluable source material for this project. Acquired from Emerald Insight, it is very suitable to this project as it highlights the threat of malware and risks posed to businesses. It is well written and authoritative however Emerald specified it was unique as no such document has been published previously. The majority of sources used by Etsebeth are from Harley, D; Slade, R and Gattiker, U. Etsebeth references Viruses Revealed (McGraw-Hill, New York, NY 2001) This source is recognised and trusted within the industry as a whole and is considered to be authoritative and well-documented on its own merit. This paper focuses on the legal and professional implications of malware on companies in South Africa Etsebeths home town. This paper is very suitable for this project as it is a very well written and authoritative document, the majority of sources used by Etsebeth are from Harley, D., Slade, R. and Gattiker, U. (2001) Viruses Revealed, McGraw-Hill, New York, NY. The source used by Etsebeth ‘Viruses Revealed as a well-documented authoritative document published by McGraw-Hill, a recognized trusted source. Etsebeth is a senior lecturer in the Faculty of law specialising in the areas of law and information security. Although Etsebeths paper ‘Malware: the new legal risk is highly suitable in terms of qualitative information, it lacks suitable geographic law for the scope of my project. I will use the information provided by Etsebeth for Malware, as this information is not geographically bound, and analyse the legal implications after comparing them to UK law. Etsebth highlights that companies are reluctant to report cybercrimes as it has negative implications on the companys reputation this correlates to my hypothesis. ‘Understanding the spreading patterns of mobile phone viruses by Pu Wang, Marta Gonzalez, Cesar Hidalgo and Albert-laszlo Barabasi is a technical journal based on mobile phone virus modelling and the understanding of spreading patterns. The journal was published in 2009 and investigates various mobile platforms relating to my assignment however the document is a highly technical report based on the mathematics of virus spreading patterns, I find this report to be highly enlightening however due to the technical awareness of the target reader of my assignment I believe this report to be too technical and out of scope. Authoritative information directly from manufactures websites and retail outlets will be used including Apple, Android, Research In Motion, Nokia and Microsoft for documentation on smartphones and smartphone platforms as this will allow me to access accurate and current reliable information directly. Secondary information sources will be avoided where possible such as blogs and review websites for direct smartphone technical information as these types of resources may facilitate in providing inaccurate facts. Local mobile phone retail outlets such as Orange, Vodaphone, Phones4u, The Carphone Warehouse, O2 and T-Mobile will provide me with valuable information on device security awareness. I will enquire on staff security training and in-house company security literature currently available to public and business consumers as this will affect the average smartphone users security awareness. After investigation smartphone security I established that some research in this area had been done already by Goode Intelligence a UK company based in London. ‘Goode Intelligence is a company that provide strategic research and analysis that specialises in information security. Founded in 2007, Goode Intelligence has provided clients globally with statistical information from evidence accumulated from surveys in the field of information security. Goode Intelligence is viewed as an authoritative market leader of information security consumer information. 2.3 How this project fits in with the literature review I had chosen the subject then chosen the literature review method, thus tailoring the literature review to fit the requirements of the project. The Survey will allow me access information on how smartphone users actually use their device, how important they view the information stored on the device and users perception of the need for security 3.0 Research methods 3.1 Hypothesis ‘Businesses are not aware that they are at risk of information and financial loss or theft due to malware infections on smartphone devices. Information Technology consultants have recognised the gap in security for mobile devices, however it was soon realised that the physical security of the device was not the real issue, as the need for smartphone security awareness within businesses was a far greater concern. Experience establishes that the best form of security is the awareness for the need of security and why by the individuals who use the technology. Smartphone malware is not seen as of great importance to IT professionals, business managers or general consumers. A majority of smartphone users use their devices for both business and personal use and a large share of smartphone users will be using their personal smartphone for work related activities. The assumption is based that most individuals would know what information they deemed as confidential, more specifically, what information would they not like others to access to include such things as calendar, contacts, photos, emails and files. IT professionals should be the most aware group of smartphone malware risk, as their experience and technological awareness should allow them to be more technologically security aware. Antivirus used on personal computers is well known to hinder system performance and conflict with some applications and other software, The hypothesis is that antivirus products will consume more system resources then current smartphones can afford to offer and require more power from the device ultimately reducing the battery life and impacting negatively on overall system performance, rendering the device unusable by the average user. The perception of products such as the iPhone are viewed as secure out-of-the-box along with Blackberry smartphones as they are mostly touted by mobile phone shop staff as business orientated secure devices. 3.2 Methodology The project will be implemented using a triangulated, positivistic methodological approach. The particular technique chosen this will provide a balanced view of the subject area. It will incorporate both quantitative and qualitative primary research methods as reffered to by Bryman as multi-strategy research (Bryman, 2006). The scope of this project will mostly be Quantitative based research as indicted in Fig 1 below. Bryman advises that quantitative data can be gathered by way of a survey and qualitative research collected from journals and interviews. The Initial research will be conducted using primary research in the form of a cross-sectional survey questionnaire with closed questioning, interviews with professionals in the field of smartphone related security such as police personnel, security advisors and mobile phone shop staff will also be conducted to gain knowledge of their awareness of smartphone security and what advice they provide. The survey will be available to respondents in paper form where needed however the survey respondents targeted will mostly be from the internet so it is required that the survey be electronically hosted. The web-based survey distribution method selected is ‘Survey Monkey. The main motivations for selecting ‘Survey Monkey are reputation, administration features, ease of access and user layout familiarity. The survey will be designed to be concise and simple to maximise the amount of respondents in order to gain quality information. The target survey population will represent business managers, IT professionals as well as individuals who use their smartphone for personal use to establish users who admit to using their smartphone for both business and personal as opposed to personal use only. This is suggested by Baxter as an important step in defining who should be included and excluded from participating in the survey (Baxter, L. Babbie, E, 2004). The users have been targeted as the project will establish not only the perception of smartphone security but also what smartphone policies and procedures are currently in place and how aware users are of these. Research indicates that an ideal resource for the proposed target users is through a popular internet based technological social news website named ‘Reddit. ‘Reddit has a daily turnover of over 850.000 unique users (Alexa, 2010). According to Alexa the average ‘Redditors are male between the age of 18 to 44, are well educated and browses ‘Reddit either from work or home, suggesting that the majority of ‘Redditors are working professionals in the technology field.This suggest that the average ‘Reddit user is technologically aware (Alexa, 2010), suggesting that ‘Reddit would suit the proposed target survey participant. The proposed project will be delivered using an analytical in-depth research structure. This project structure has been selected as it will primarily be research based on the current business problem as previously stated. The intentions are to analyse the problem, understand how aware people are of the issue and propose possible solutions, One method of analysis proposed is the conceptual method, as described by Beaney as a way of breaking down or analysing concepts into their constituent parts in order to gain knowledge (Beaney 2003). I have interpreted this to mean the compartmentalisation and analysis of data. Critical and creative thinking skills such as Edward.De Bono six thinking hats will be used to examine the problem domain. A review will be given on how the systems work and compare them to how they should work. I will then analyse the solution domain by examining which options are available to improve the system security along with optimal recommendation and the benefits this would provide. ‘SPSS is a well-established statistical analysis application first released in 1968. Randomised questions, Marketsight. Survey design 4.0 Results 4.1 Presentation and description of results Who took part? The survey was conducted to establish the awareness of information security and the need for smartphone security. Users were openly invited from technological backgrounds to partake in the survey and assured of anonymity. A total of 758 people responded to the online survey from a possible 854,998 potential participants (Fig. 2). The survey itself was open for one month during February and March 2011. The results indicated in Figure 2 that a majority share of survey participants, with 82 per cent being male and 18 per cent female confirms my survey target gender. When asked, both genders averaged at age 26 (Fig. 3) as denoted in Figure 3, again confirming my target survey demographic groups. When asked 53 per cent of respondents reported they had used their smartphone solely for personal use, opposed to 45 per cent of partakers that reported they used their smartphone for both business and personal use, with 2 per cent reporting to use a smartphone solely for business use only as shown in Fig. 4 combining a total of 47 per cent. 25 per cent of respondents had only been using smartphones for the past six months, 17 per cent were aware they had been using them for at least a year and a majority percentage of 59 per cent had been using smartphones for more than one year seen in Figure 5. Only 12 per cent of respondents opted to use the ‘pay as you go payment facilities as opposed to the greater majority of 88 per cent that have contracts shown in Figure 6 below. 87 per cent of participants reported that they did not use any form of smartphone security software such as antivirus as opposed to 13 per cent that did as highlighted in Figure 7. SMARTPHONE In answer to the question â€Å"What type of smartphone do you currently use?† 34 per cent of respondents said they used an Apple IPhone, 58 per cent reported to use Android smartphones, 13 per cent used Blackberries and 6 per cent of respondents had Symbian smartphones (Fig. 8). 87 per cent of respondents had used calendar functions, 94 per cent of respondents used email, 86 per cent of used games, 87 per cent of respondents used GPS features, 74 per cent of respondents used instant messaging, 52 per cent of respondents used internet banking facilities, 66 per cent of respondents used multimedia messaging service (MMS), 94 per cent of respondents used the short messaging service (SMS) feature and 78 per cent (Fig. 9) of respondents admitted to using social networking sites on their smartphone. 93 per cent of survey partakers used 3G for mobile data communication, 59 per cent of respondents used ‘Bluetooth technology, only 4 per cent of had used infrared line of sight technology, however 75 per cent of respondents admitted to connecting via universal serial bus (USB) and 94 per cent of participators had used wireless for mobile data communication shown in Figure 10. Total of 757 participators answered this question and 1 partaker chose to skip the question. From a total of 758 respondents, 63 per cent (476) valued the physical smartphone above the 37 per cent (282) whom valued the information more. Figure 12 shows 62 per cent of survey participants reported that they did not pay attention to licence agreements and permissions when installing applications on their smartphones 34 per cent reported they did read the licence agreements and permissions. 4 per cent of respondents believed that this question was not applicable to them for their smartphone use. The awareness for the need of personal computer security is apparent as 81 per cent of responders were aware for the need of security software for personal computers as opposed to the 19 per cent who were not aware. 94 per cent participants have connected their smartphone to a personal computer (PC), 6 per cent stated they had not ever connected to a PC. All 758 respondents answered this question. Figure (XXX) shows that survey respondents considered smartphone security as ‘beneficial but not essential as the majority answer with 64 per cent , 21 per cent (159) didnt not consider there to be a need currently for smartphone security software as opposed to 15 per cent (114) whom considered smartphone security software as absolutely essential. 95 per cent of respondents were aware of ‘Adware, 27 per cent had known about ‘Badware, 25 per cent of respondents were aware of ‘Crimeware, 69 per cent had previous knowledge of ‘Rootkits, ‘Trojans 95 per cent,, ‘Spyware 95 per cent, ‘and ‘Worm 90 per cent were the most commonly aware terms of malware from the malicious software list, the majority being ‘Virus with 97 per cent of respondents being aware of this type of malware. 731 respondents answered this question. 96 per cent of respondents stated that they owned the smartphone, only 4 per cent of respondents had employer owned smartphones. All partakers responded to this question. Out of the 758 respondents, 15 per cent were aware of policies within their place of business, with the majority of respondents 41 per cent unaware of any workplace policies or procedures particularly orientated toward smartphones. 44 per cent responded that the question was not applicable to them. All participants answered this question. It is interesting to find that only 15 per cent stated they were aware of specific workplace policies and procedures specifically for mobile phones and 40 per cent were aware there were no mobile phone policies and procedures. A majority of 92 per cent (699) had not been advised of any security methods to protect them or their information from fraud, theft or malicious software. 8 per cent (59) respondents agreed they had received adequate security advice. 4.2 Discussion and interpretation of survey results Analysing the results of the survey shows the majority of smartphone users to be Android users peaking in the 20 to 24 age bracket, this would indicate that an IT professionals choice of smartphone is Android as indicated in Figure 3 below. Smartphone survey contributors within the 20 to 24 age group were then further examined to indicate what purpose is intended when using the devices, examining the results shows clearly that a majority of survey respondents reported they viewed their smartphone use as personal use, however disturbingly over half the users in the same age group admitted to using their smartphone for both personal use and business use as shown in Figure 4. Female respondents preferred the features provided by iPhones however also as opposed to male smartphone users who clearly preferred the Android platform over all others as seen in Figure (XXX). Examining users perception for the need of smartphone security against those users whom did or did not have antivirus shows that the awareness for the need of security correlates to users whom did indeed have smartphone security measures in place with nearly half of users who responded ‘Absolutely essential to the question ‘How necessary do you see the need for smartphone security software as shown in Figure (XXX). However the overall amount of smartphone users with antivirus or other security is disturbingly low given the malware threats currently available. The results also show us that a large majority of IT professionals do view smartphone security as beneficial however not essential. Android users are the most security aware demographic as demonstrated in Figure (XXX) above. This indicates that users are not aware of the threats posed by malware and view the need for smartphone system performance greater than the need for security. Business users have been defined as respondents who confirmed they used their smartphone for business only and users who reported they used their smartphone devices for both business and personal use. Smartphones have many features of value to employees as shown in Figure (XXX) Below, Email, Calendar, GPS and SMS features were shown to be the most used features all of which are viewed to aid employee productivity. However features such as games and social networking which negatively affect employee productivity were also shown to be frequently used, suggesting that smartphones can have negative effects on employee productivity. Figure (XXX) also shows us that over half of business users reported to use internet banking facilities from their smartphones. After finding out what smartphone features business users were most interested in I studied how aware business users were of security permissions and licence agreements prompts when installing new applications on their smartphones. The pie chart below is a representation of business user survey respondents awareness of how essential smartphone application installation security prompts are in regards to new application installations. Figure (XXX) shows us that 60 per cent of all business users admitted that they did not pay attention to licence agreements and permission prompts when installing new applications. The distinction between smartphones and personal computers is becoming increasingly marginal. Personal computers for example do not have built in billing systems and unless connected to the internet are static devices accessible via a local area network or through direct contact. Smartphones have an integral billing system are completely mobile and have multiple connectivity methods. When business user survey partakers were asked if they used any security applications such as antivirus, an overwhelming majority responded that they did not use any security products. This confirms part of my hypothesis that business users do not perceive smartphone security as a real threat. Discovering that the majority of business users used internet banking facilities for either personal banking or business banking and 9 out of 10 business smartphones had no security products installed it was elementary to understand if business users were aware of smartphone malware threats. The line graph in Figure (XXX) indicates that over 90 per cent of business users are aware of malware threats such as Adware, Spyware, Trojans, Viruss and Worms however business users were all least aware of malware threats such as Crimeware as indicated in Figure (XXX) Survey respondents who reported they used their smartphone for personal use only were excluded from the following analysis.7 out of 10 business users confirmed they were not aware of any specific smartphone security policies at work (Figure (XXX) The awareness of security for iPhone smartphones is low as users perception of Apple and Mac OS is that it is impervious to malware infection. Research shows that iPhone users have the least amount of antivirus installed on devices. As discussed earlier, users are completely reliant on Apple to vet all applications for malicious code, whereas Android and Symbian applications are open source so users may inspect the contents for malware. secure smartphone model, least security aware group Android users are the most security aware demographic group as the typical android user is conscious that malicious software exists and the android community are able to vet applications themselves. Android users were also the highest security aware group with the highest percentage of antivirus products per smartphone. Virtual environments, least secure smartphone perception Blackberry smartphones were the most secure devices in regards to email, network connectivity however it was found that application signatures can be purchased by anyone for a small fee thus rendering the security of the device minimal. Very secure aspects, not as secure overall Symbian smartphones are found to be the most current common target for malware developers. Low security Windows phone 7 is the newest platform on the smartphone market and only time will tell how secure the device is. Awareness and concern 5.0 Smartphones Private and confidential data from lost or stolen mobile devices such as laptops, USB pen drives and computer storage drives has gained negative exposure within the media recently however one of the largest growing threats to corporate information comes from unsecure smartphones. To understand this statement it is important to appreciate the history of the smartphone to recognise why smartphones pose such a threat in todays business environment. A mobile phone is a portable electronic device used to make and receive telephone calls. The mobile phone was first revealed by Dr Martin Cooper from the company Motorola in 1973, it was not until ten years after Dr Coopers demonstration that Motorola released its flagship mobile phone the ‘DynaTAC, this was the worlds first commercially viable mobile phone (Motorola, 2009). Originally these devices were commercially targeted at businesses and upper class individuals as the cost of the device was very high and the actual usage was severely restricted, due to the technology limitations at this time of battery weight (Motorola, 2009) and because the battery duration was limited to last a maximum of 30 minutes thus making the device impractical and available only to businesses and professional consumers. ‘According to Moores Law, the number of transistors on a chip roughly doubles every two years. (Intel, 2005) As Moore stated over thirty five years ago, due to the advancement of processors, battery technologies and overall reduced power consumption, mobile phones have become lighter, smaller, more powerful and longer lasting (Intel, 2005). Due to these fundamental technological advancements mobile phones have been able to incorporate additional existing technologies such as camera units, sensors, speakers and often take advantage of JAVA based applications and features, thus coining the term ‘Feature phone. Feature phones are more advanced technologically than mobile phones however now Smartphones currently reside in the top tier of mobile communication technology. The term ‘smartphone is ambiguous and many experts fail to agree on a suitable definition. Most smartphone features are not exclusive to a particular category, this project does not intend to make that definition, however for the scope of this project I have listed combined definitions and compared current smartphone f

Friday, October 25, 2019

Angels, an objective view :: essays research papers

A poll that was published in TIME magazine showed that 69 percent of people believe in Angels, 46 percent of which believe they have a personal guardian angel. Descriptions of these angels include a wide range of appearances. Some are only lights or a hovering golden halo; while others describe their angel as human, half human, or even animal! Angels are said to descend upon those who are in need of salvation (from evil or hell), or who need direction in life, in pain or suffering physically or emotionally, or to those who need simple things such as directions or a winning lottery ticket. Angelic encounters are sometimes life-changing, but always leave the experience spiritually/physically/emotionally revived, comforted, and less negative. "Rocky" situations in one's life are handled easier and with less stress. "Angel contactees" usually describe an instance when things are so bad that they go to a solitary place alone (a bedroom, etc...). An angel then appears. Heavenly music and/or joyful music is heard, a warm, tingly light is felt, sometimes invisible arms are felt embracing the person in distress. Communication is usually telepathic, not always in words but emotion (like a transfer of positive energy). There are numerous other angel stories which involve deceased loved ones visiting those they left behind to reassure the grieving of their well being after death. Or someone will get a vivid image or sudden thought of a close friend or family member minutes before learning about their death. Other stories include lights from familiar sources "forming" into angels (or angelic shapes), a halo suddenly hovering over one's head, or even a mysterious person who saves one's life or helps them out in any way. The "angel" then disappears before being thanked, giving the bewildered a conclusion that they were "touched by an angel". Sometimes angels are not seen but felt. For example, someone may be approaching unseen danger when they are suddenly yanked or pushed out of harm's way by an unseen force. An old wives tale says that when you hear your name called, and you look around to find yourself alone, your guardian angel just saved you from danger or temptation. Angels or angelic-like beings are mentioned in many other religions including several middle-eastern religions, often as animal spirit guides in native American or pagan cultures. However, the majority of angels are reported by people of Catholic or Christian (Protestant) faiths.

Wednesday, October 23, 2019

A Wall Street Journal Article Related to Macroeconomics

The chosen article from Wall Street Journal newspaper which is related to macroeconomics is â€Å"M&A Milestone: $101 Billion Deal For ABN Amro Group Set to Dismember 183-Year-Old Bank; Will Buyers Regret It? † by Jason Singer and Carrick Mollenkamp in October 2007. As a brief summary of the article, the largest banking transaction is expected to settle at present, consequential of the unattachment of one of Europe's leading depositories. The impact of the transaction extends ahead of its $101 billion charge and the termination of 183-year-old ABN Amro Holding NV of the Netherlands (Singer & Mollenkamp, 2007).Conditional on how the customers fee, it may possibly turn out to be either an indication of the enthusiasm exuberance observed in the current unions and possessions growth or as several assets bankers anticipate as a guide for dealing with disintegration of great corporations. A three- system association headed by Royal Bank of Scotland Group PLC is projected these days to gain adequate assistance from ABN Amro shareholders to complete the agreement. ABN Amro is determined to come apart officially into three portions, with one part intended for every purchaser.A lesser proposal from Barclays Group PLC ended on the recent past, and the public who are accustomed with the circumstances stated that it dropped short. In a memorandum to workers, ABN Amro Chief Executive Rijkman Groenink declared that the acquisition by the RBS-directed group might go out of business in October. The credit risk involved in Barclays bank is treated as the possibility that a reserve loaner will not succeed to meet its responsibilities compliant with the settled conditions (George, 2002).By setting up a suitable credit risk background, it is meant that the approach should consist of a declaration of the bank’s determination to grant credit on category, economic part, geographical place, legal tender, maturity and projected turnover. The approach may as well comprise m onetary objectives of credit attribute, revenues and progress. The actual procedures of the banks can be seen in running credit risks in every item and involving the latest items to sufficient measures before being presented and accepted by the board of administrators.The implications as to how the topic of concern relates to macroeconomic theory are the following. Since multinational companies are involved in the article and they engage in creating transactions to one another, the article involves imports and exports in the process. Foreign trade is at hand. There are international economic policies where charges on import and exports are present, which is in the article are transactions. The role of fiscal policy is also involved wherein there is an imposition of levies which inevitably affects income.The dues decrease disposable income, consumption of purchasers, demand for good, and national output. Quotas of firms from the different banks from various countries can also be visi ble, with inflation rate and Consumer Price Index (CPI) change. In the national income accounts, there is an interaction between the business firms such as the banks and the households or the general public. With this kind of interaction of business firms with households, services are traded. The expenditure approach is in consumption expenditure while the factors of production and factor payments are included in the resource market using the income approach.With the topic of aggregate demand and output of the transacting firms in different countries, the business cycle in macroeconomics becomes apparent with the regular pattern of contraction (recession) and expansion (recovery) is around a trend path of output or growth. The trend path entails if the factors of production or resources are fully employed. The banks measures to distinguish circumstances by which, in contemplating bids, it is apt to categorize a cluster of obligors as linked counterparties and, accordingly, as a sole obligor.This takes account of combining exposures to sets of records revealing monetary interdependence, where they are under general possession or with strong associations. This has a connection with the concept of assets market with the LM equilibrium schedule. It is composed of real assets such as properties and financial assets such as money and bonds. As worldwide issues come at hand, dwindling administration bond markets and mounting commercial bond release of banks are promoting better study into educated management on threat or return proportions.Due to budget constraint, wherein demand equals financial wealth, a lot of banks partake in credit consortia and some organizations set unnecessary dependence on the loan stake study completed by the chief sponsor or on outside business credit evaluation. Each consortium members executes their individual conscientiousness, as well as sovereign loan risk assessment and consortium stipulations analysis before binding to the group. Ev ery bank like Barclays investigates the risk and reimbursement on consortium credits in the similar way as precisely sourced credits.Rapid market adjustments are also occurring by which money market makes easier production. A principle for the credit risk administration affirms that banks must work in positive and distinct credit endowment standards. This principle involves an apparent suggestion of the bank’s direct market. In view of latent bids, the various banks identify the need of creating stipulations for known and probable deficits and maintaining enough capital to take in the unpredicted deficiencies.It also considers these factors into bid endowment choices, in addition to the general portfolio risk administration procedure. Reference: Jason Singer and Carrick Mollenkamp (2007). M&A Milestone: $101 Billion Deal For ABN Amro Group Set to Dismember 183-Year-Old Bank; Will Buyers Regret It? Wall Street Journal newspaper, October 5, 2007, Page A1. Retrieved October 5, 2 007, from http://online. wsj. com/article/SB119154087347749578. html? mod=todays_europe_nonsu _money_and_investing.

Tuesday, October 22, 2019

Delivering Added Value

Delivering Added Value Introduction Purpose Contemporary businesses are currently faced with a new marketing principle: creating added value for customers.Advertising We will write a custom report sample on Delivering Added Value specifically for you for only $16.05 $11/page Learn More Creating added value, however, is compounded with diverse challenges in its definition, with some theories claiming that creating value does not only entail providing customers with services that are within their expectation, but providing them services that are beyond their expectations(Craven 2002, p. 57). But how can a firm successfully create value for its customers? This report will focus on the case study, â€Å"Southwest Airlines† to give an informed review of added value by critically analyzing two business strategies adopted to create value for the customers: servicescape and service innovation. Servicescape model is critical for creating added value because physical appearance is th e first experience that customers are exposed to, while service innovation is critical because any company wishing to prosper must keep its business operation in line with the dynamic technological changes. Definition of Value Creation Added value is a term that is related with customers’ feelings after they take a step of purchasing a product or a service. Thus, creating value for customers can be defined as assessing the benefit the customers get after they deduct their expense from purchasing a product or service (Craven 2002, p. 59). It is, indeed, true that many customers expect more than a service or a product from the firm, as a vast majority of them depict the need for mental and emotional relationship with the companies, because they think that this creates value for them (Christopher Ballantyne 2002, p. 83). An overview of the Company Southwest Airlines is a service industry that aims at offering its customers with distinctive air transport services. The company st arted in 1971, with an aim of providing its customers with air transport at a lower cost (Southwest Airlines Co. n.d.).Advertising Looking for report on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Eventually, the company adopted a strategy that seeks to provide its diverse customers with added value by making sure that the services exceed the price paid by the customer as well as what the customer expects to pay for the services. The company believes that creating value is one of the crucial activities the firm would take to attain a competitive edge. Even though the company started with purchasing products that were diesel powered, it has managed to replace its components and equipments with modern equipment, which are environmentally friendly, at a reduced cost (Southwest Airlines Co. n.d). More so, it has managed to come up with more innovative products in the new airport lounges and the business class pr oducts. The company has also managed to come up with a number of trained personnel who take care of the children while their parents are in the â€Å"business class.† This new experience within the industry creates an added value for the customers. The value creation in the Southwest Airlines has been attributed to effective value creation models. This report will critically analyze two value creation models that have been adopted by Southwest Airlines, namely, service innovation model and servicescape model, with a view of establishing the viability of the models in creating value for the customers. Through a number of recommendations, the report will shed light on how the company can improve its value creation for its customers. Analysis and Findings Value Creation through Servicescape Model Sevicecsape model involves recognizing the rationale behind considering physical attributes of a service industry as a key marketing point (Grà ¶nroos 2007, p.176). This plays a critic al role in enhancing first impression for the customers, and hence the overall brand image of the company. In the Southwest Airlines, the customers have many opportunities of getting in touch with the company’s environment as they await their flights. Thus, servicescape is a critical model that is able to assess added value for the customers of the Southwest Airlines.Advertising We will write a custom report sample on Delivering Added Value specifically for you for only $16.05 $11/page Learn More Using the servicescape framework, one is able to concur that the physical attributes of the airplanes and the exterior attributes of the airport are critical in value creation (Looy Dierdonck 2001, p. 183). And in a bid to explain the rationale of considering physical factors as critical in value creation, the model groups these factors into three categories: ambient condition, size and symbols category, and the spatial layout category. This model aims at a ssessing whether these environmental factors add value to the customers by evoking positive impression. Value Creation in the Southwest Airlines through Servicescape Model The Southwest Airline takes advantage of its attractive airplanes in the â€Å"business class† to provide added value for its customers. Using the ambient condition, the customers are provided with added value by preventing them from pointless noise, which emanate from the aircrafts as well as the outside environment (Southwest Airlines Co. n.d). The soundproof components facilitate this, while noise from one passenger to the other is eradicated by the use of earphones provided to each passenger. The strategy provides sanity in the â€Å"business class,† making sure that the customers are not adversely affected by adverse environmental factors within the setting. More over, this strategy does not only endeavor to make sure that sound pollution is minimized, but it provides an avenue for ensuring that the plane gets enough oxygen at all times. Sight is another critical component that has been put out into consideration in a bid to create added value for customers. This has been achieved by making sure that the airplanes receive enough amount of light, taking into account different periods within the â€Å"business class.† For case in point, during the business hours, the customers are provided with different lighting from the sleeping hours (Southwest Airlines Co. n.d.). The sound absorbers, which facilitate control of noise, are kept out of the customers’ sight.Advertising Looking for report on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Attractive design is also put into consideration in the â€Å"business class.† The interior layout is designed in such a way that it offers sufficient dà ©cor, given that this class provides services to businesspersons. Thus, customer value is created through maximizing the space in a manner that facilitates efficient placing of briefcases, and thus enhancing their business discussions. The company takes into account that providing best product /service among the alternatives should be based on what is best for the guests: using guests’ emotions, and not the emotions of the decision makers (Dibb et al. 2005, p. 57). In this regard, the company uses signs and symbols that have a connotation with the customers’ emotions, thus facilitating an increase in services. This idea stems from the fact that increasing customer value entails making sure that they are more inclined to purchasing emotional products as opposed to the non-emotional products (Falkowski Grochows ka 2009). With regard to staff, the Southwest Airlines exude confidence that the company is able to create added value for customer by not only improving the internal environmental factors of the Airplanes’ â€Å"business class,† but also managing the attitudes affecting the customers with regard to environmental factors (McColl-Kennedy 2003, p. 67). In this regard, the company has created social relations and collaborated with other companies’ practices that are in line with the Servicescape strategy. And it is for this reason that the Southwest Airlines has taken the initiative of benchmarking its uniform with industries that provide designers’ clothing, which catch the eye of the customers. Additionally, the company has already come up with a differentiation strategy that defines the dress code for the â€Å"business class,† which facilitate a business culture within the â€Å"business class,† and this add value to customers through impro ved cohesion between them (Bowie Buttle 2008, p. 34). Critical Analysis of Servicescape Model Using â€Å"3 Performance Dimension† Using three-performance dimension, which include the customers/ employees’ relationship, the market performance, and the financial performance, the Southwest Airlines has increased its financial performance by creating value through comfort and luxury. This has been achieved by coming up with a viable strategy that provides the â€Å"business class† customers with what they need emotionally: physical evidence (Lovelock Wirz 2007, p. 231). And more so, the knowledge obtained from the customers helps them build a long-term relationship with the employees. However, while all the above are valid environmental factors that continue to create added value for customers, the notion of considering physical attractiveness as prime factor in creating value for the customers fall short of its expectation in as far as marketing performance is c oncerned. This stems from the fact that the strategy does not provide an avenue for measuring added value by comparing its environmental features against its competitors in order to assess its comparative strength. If this prospect is put in place, the Southwest Airlines will not only provide high quality environmental features with low pricing strategy, but also adopt a pricing strategy that the customers are willing to pay for, as creating added value for customers can also be achieved through premium pricing of luxurious environmental features. Service Innovation In the recent past, service innovation has been considered as one of the indispensable functions while creating value for customers. As such, the strategy is able to introduce customers with services that are beyond their expectation. Service innovation, however, cannot be achieved if the firm lacks a proper implementation of Customer Relationship Management (CRM). According to Kotler, Bowen, and Makens (2010, p. 413), t he success rate of innovation in a vast majority of firms has been on a downward trend, especially in the hospitality industry. Thus, assessing service innovation for the Southwest Airlines entails taking into account its three key elements: customer focused, which tries to go beyond the customers’ expectations; processed focused, which tries to increase efficiency as well as productivity of the firm; and continuous improvement, which is a continuous process of providing innovative services to the customers(Lovelock Wirz 2007, p. 237 ). Creating Added value for the Southwest Airlines through Service Innovation It is imperative to mention that the Southwest Airlines operates its business operations by taking into account the dynamic technological trends happening across the globe (Southwest Airlines Co. n.d). Based on findings on incorporating technology with the firm’s services, the Southwest Airlines has already launched a website with a good customer interface, whic h can be accessed quickly and easily. The product categories are clear, the product names are clear, and the site offers a good search for the services provided by the firm (Southwest Airlines Co. n.d). Value creation through this strategy is enhanced by providing the customers with an opportunity to air their views, opinions, and comments concerning the services, as this acts as a customer service center (Knox et al. 2003, p. 123). Communicating through email and interactive social websites ,such as the Facebook and Twitter, create added value as it enhances interactivity between the company and its customers through comments and feedbacks of their comments (Bowie Buttle 2008, p. 34). More so, the customers in the â€Å"business class† are entitled to free wireless internet, audiovisuals, and are provided with catering services that involve high-class technology (Southwest Airlines Co. n.d). For case in point, the food and beverage services take into account the time taken by customers from ordering their food and/ or beverage to the time of service provision. Thus, the company has adopted a technique that limits this time. The customers are thus able to order foodstuffs using computer, which also makes sure that the nutritional value of the food is clearly displayed, thus providing customer value with respect to efficiency and knowledge. Critical Analysis of Service Innovation using ‘Key Elements of Service Innovation† Enhancing customer interaction through the social media depicts that the company is ‘customer focused’ and upholds ‘continuous improvement’ areas. Through this casual relationship, the company creates added value in terms of loyalty. ‘Continuous improvement’ is derived from the fact that websites call for a continuous upgrading in order to provide the customers with updated information. Providing the customers with services that are ordered via internet depicts that the company is â₠¬Å"process focused,† and this creates added value in terms of convenience and time management. Recommendations Physical Evidence Even though the Southwest Airline is able to create added value through the already adopted strategies, I would recommend it to allocate more space on waiting areas, as it has allocated more space for the flight services, leaving the clients with inadequate waiting facilities, including the lounges. Although this is based on grounds that the surface area for the income-generating areas should supersede the waiting areas, it is paramount for the company to create added value by increasing the number of equipments and facilities within the waiting area to avoid views characterized with congestion. Additionally, the waiting areas should display certificates of merit in order to create added value for customers with regard to trust and quality (Bruhn Georgi 2006, p. 144). Service Innovation The services within the â€Å"business class† can be imp roved by making an effort of averting the technological terminologies and giving way to business terminologies. This stems from the fact that adopting business terminologies is paramount since the first step of service innovation entails communicating with the customers using clear terms that would help them communicate with the company in an effective manner (Bowie Buttle 2008, p. 43). This strategy can be achieved by adopting universal language standard, including choice of language during the point of sale systems. More so, creating value for customer at the service innovation entails striving to provide the customers with diverse services that are of the same service category all at once (Kotler, Bowen, Makens 2010, p. 421). This can be facilitated by collecting customers’ information with regard to demand on services, as well as gathering personalized information such as information on the last call from a particular customer. Conclusion Creating value for customers ca nnot be defined without assessing the benefit customers get after they deduct their expenses. The process can be achieved through adopting a viable framework(s) that is in line with the business operations. Using the servicescape model, the Southwest Airline has managed to create value for its customers though a number of dimensions, including the ambient condition, signs and symbols, and engaging the staff as well as the customers in the process. Thus, the Southwest Airlines has been in a position of providing its customers with increased excitement, exclusive environment, as well as high quality values. The service innovation, on the other hand, has facilitated added value creation through innovative products that are in line with the current technological trends. In turn, this has created room for exclusive services, including wireless internet connection in the â€Å"business class,† which has helped to provide the customer with services, which are beyond their expectatio ns. Thus, the service innovation creates room for fun, luxurious experience, trust, and relaxation. And despite the challenges faced by the company, it is, indeed, true that it has managed to create added value for its customer through service innovation models as well as the servicescape model, a value that is beyond their customers’ expectation. List of References Bowie, D. Buttle, F 2008, Customer Relationship Management: Concepts and Tools, Elsevier/Butterworth-Heinemann, Oxford. Bruhn, M. Georgi, D. 2006, Services Marketing – Managing the Service Value Chain, Prentice Hall, Essex UK. Christopher, M., Payne, A., Ballantyne, D. 2002, Relationship Marketing: Creating Stakeholder Value, Elsevier Butterworth-Heinemann, Oxford. Craven, R. 2002, Customer is King: How to Exceed their Expectations, Virgin, London. Dibb, S., Simkin, L., Pride, W., Ferrell, O. 2005. Marketing: Concepts and Strategies (5ed.), Houghton Mifflin Company, Boston. Grà ¶nroos, C. 2007, Service Management and Marketing: A Customer Relationship Management Approach (3rd ed.), Wiley publishers, Chichester. Knox, S., Maklan, S., Payne, A., Peppard, J., Ryals, L. 2003. Customer Relationship Management: Perspectives from the Market Place, Elsevier Butterworth-Heinemann, Oxford. Kotler, P., Bowen, J., Makens, J. 2010, Marketing for Hospitality and Tourism (5th ed.), Prentice-Hall International, London. Looy, B. Dierdonck, R. 2001, Services management: an integrated approach (2nd ed.), Prentice Hall, London. Lovelock, C. Wirz J. 2007, Services marketing: people, technology, strategy, Prentice Hall. London. McColl-Kennedy, J. 2003, Services Marketing: A Managerial Approach, Wiley, Milton, Qsld. Southwest Airlines Co. n.d., We make it easier. Web.