Tuesday, December 24, 2019

The Causes of the American Revolution Essay - 1425 Words

The irregular and disorganized British rule of the American colonies in the previous years led to the outbreak of the Revolutionary War. Most Americans did not originally want to separate from mother England. They wanted to stay loyal to the crown. England’s unwillingness to compromise, mismanagement of the colonies, heavy taxation of the colonists that violated their rights, the distractions of foreign affairs and politics in England and the strict trading policies that England tried to enforce together made the revolution inevitable. The British were definitely expected to win the dispute because they significantly over powered the Colonists in most areas. They had more money, weapons, people, etc. However the American’s prevailed with†¦show more content†¦This tax was different from the rest because the other taxes were to regulate trade. Colonists reacted by riots, boycotts, the forming of the Stamp Act Congress, and Sam Adams organized the Son’s of Liberty. The Stamp Act was the first external tax. The colonists felt that they were being taxed without representation. In 1770 an extraordinary number of British troops were stationed in Boston. The Colonists didn’t understand why there were so many troops after the war. This added to the already existent tension. The colonists taunted the Red Coats and on March 5, 1770 the colonists threw snowballs resulting a hasty decision by the Red Coats to fire at the colonists. Five colonists were killed and nine were wounded. This night is known as the Boston Massacre. The Tea Act of 1773 was a tax on tea but, the British lowered the cost of tea significantly enough that even with the tax, British tea was cheaper than Dutch tea. Also to keep the price down, the British East India Co. got rid of the middleman in the colonies and opened up their own shops. If the colonists bought this tea, they would be accepting the fact that the British could tax without representation. On Dec. 16th 1773 the ships docked at the Boston ports. The Sons of Liberty dressed up as Indians and threw 324 chests of tea into the water. England responded to the Boston Tea Party by the Coercive Act of 1774. In the fall of 1774 the first continental congress meet in Philadelphia. 55 delegates madeShow MoreRelatedThe Revolution : The Cause Of The American Revolution1898 Words   |  8 Pages The American Revolution was the turning point for the colonies that made up the United States today. It was the war that freed the colonists from British control. But what actually caused the American Revolution? Well, there’s no simple answer to that question. In fact, most of the causes acted as if they were dominoes. These events can be categorized in four periods of time or setting. These groups are, Salutary neglect, Mercantilism, Boston, and Unity of protests. Salutary neglect was the ideaRead MoreCauses Of The American Revolution1202 Words   |  5 PagesThroughout history many revolutions took place, ranging from the unremarkable to a truly memorable, as the French revolution, the American Revolution, and the Bolshevik Revolution, but American revolution took place in 1775-1783. The r evolution was different from other revolution because of growing tensions between residents of Great Britain’s 13 North American colonies and the colonial government because American revolution was not like the others. This revolution was not like the others becauseRead MoreCauses Of The American Revolution738 Words   |  3 Pagesas the American Revolution, or the Revolutionary War. The American Revolution was a war between the colonists of America and Great Britain and they were fighting over the independence of America from Britain. This war lasted until 1781, when the British surrendered to the Americans, As a result, America is a fully independent country and it has stayed that way since that day. There were many causes of the war, The Stamp Act, the Boston Tea Party, and Lexington and Concord. The first cause of theRead MoreCauses Of The American Revolution913 Words   |  4 Pages While the american revolution was caused from taxes, it was also formed from the effects of a corrupt system of government. The effects of britains rule was a much bigger flame for the revolution then the taxes placed upon citizens. The american revolution was an event that will forever shape us as a country. It was a tough war filled with blood and brutal acts of violence, but it was also an awakening for the colonies that will later become the United States, it showed that while under a governmentRead MoreCauses Of The American Revolution880 Words   |  4 Pages The American Revolution is the most important time in all of American history. This brought the birth of a new country and the treasured constitution. In the beginning, colonists were proud to be British. In the years to come, there were small occurrences that bothered the colonists and led to the Revolution. Other countries contributed to the start of a crueller British control. The French and Indian War caused King George III to introduce expensive taxes (Pavao). These taxes came about becauseRead MoreCauses Of The American Revolution1335 Words   |  6 Pageswere multiple causes for the American Revolution, but the most important was the violation and deprivation of rights from the American People. The American people were faced with multiple acts and taxes that violated and took away their rights. Americans were continuously being taxed after the French and Indian War by acts like the sugar act, the stamp act, the Townshend acts,the tea act, and many more(Hedtke, et al., The Ame rican Saga). Despite all the taxes being placed on the Americans and the thingsRead MoreCauses of the American Revolution953 Words   |  4 PagesEmily Thou Mr. G./ Period 1 September 14, 2012 Causes of the American Revolution The American Revolution began in 1755 as an open conflict between the thirteen colonies and Great Britain. The Treaty of Paris had ended that war in 1783, giving the colonies their own independence. There are many factors contributing to the start of the Revolution, but the war began as the way The Great Britain treated the colonies versus the way the colonies felt they should be treated. For example, the FrenchRead MoreCauses Of The American Revolution886 Words   |  4 PagesThe American Revolution began on April 19, 1775. It was the war between Great Britain and its colonies located in the New World. The colonists, as many historians put it, were like children rebelling against the motherland; however, they had many valid reasons for this revolt, including their desire for freedom and independence. My World History textbook says freedom was falsely promised when the colonists had settled (Krull 868). The more direct causes of this widely known rebellion include taxesRead MoreCaus es Of The American Revolution1344 Words   |  6 PagesAmerican Revolution The causes of the American Revolution go back to the beginning of salutary neglect and the French and Indian War, as well as changes in the thinking of society. The effects of these events and other factors led to pressure within the colonies, ultimately resulting in rebellion. There were five factors to the nature of the American Revolution: The Environment, The Enlightenment, Self-Government, Economic Independence and Colonial Unity. The first factor that led to the AmericanRead MoreCauses Of The American Revolution813 Words   |  4 PagesCauses Before the American Revolution, any imports from England from us had to come in ships owned by the British. Also, we could only sell tobacco and sugar to England. The British took French territory in Canada, east of the Mississippi River, and Spanish Florida which led to the American Revolution. Due to the war, Britain went in debt so, the British government placed taxes on goods so they could make more money. But that’s not all that led to the American Revolution, both the us and the French

Monday, December 16, 2019

The Words Free Essays

Right after Engineer Oscar Pascua finished his electrical engineering course at FEATI University in 1985, he was hired as an employee of the National Electrification Administration (NEA). He was assigned to handle jobs in the various units of NEA until his promotion to Chief Planning Officer in 1994. His main function was to supervise the planning activities of his unit. We will write a custom essay sample on The Words or any similar topic only for you Order Now Three engineers and two other employees reported directly to him. His performance was rated very satisfactory. Engineer Pascua attended training sessions of various kinds including those for management. He finished his M. B. A. course in 1995. When the position of general manager of the Buena Vista Electric Cooperative, Inc. (BECI) became vacant in January 1996, he was nominated by NEA. He got the post in March 1996. Aware of the many problems basetting the cooperative, he immediately went to work. When Engineer Pascua called the key officers of the cooperative to a meeting, he was apprised of the following: 1. That he price of electricity charged to BECI’S customers is the fifth highest in the country. 2. That 25 percent of the electricity service provided by BECI is lost every month and cannot be accounted for; 3. Requisitions for supplies and materials are served after delays as long as three months. 4. Some employees of the cooperative do not report regularly for work; 5. The increasing amount of uncollected accounts. Three days after the meeting, he recommended to the board of the directors the following: 1. The dismissal from the service of employees not regularly reporting for work; 2. Salary increases of up to 20 percent for every employee on the payroll; 3. The hiring of eight additional employees; and 4. The formation of a team to investigate and recommend measures to minimize â€Å"system loss† All his recommendations were approved by the board, after which Engineer Pascua signed all the necessary memoranda to implement his programs. He made regular inspections of the activities of the various units of the cooperative. During the first week of March 1997, he convened the key officers for an evaluation of the past year’s activities. The following points were made clear to him: 1. No reduction in the price of electricity could be extended to BECI’s customer because no reduction in the overall cost of doing business was achieved. 2. Instead of reducing the 25 percent system loss, it even went up to 26 percent. 3. There was no improvement in the requisition of supplies and materials. Delays still reach three months. 4.  There is a new set of employees who do not report regularly for work. 5. The amount of uncollected accounts increased from Php3. 8 to Php4. 2 million. Engineer Pascua concluded that in spite of the granting of salary increases requested by the rank and file, no subsequent improvement in services was registered. He is now considering more drastic measures but he is not sure if it is right thing to do. In addition, he is also aware that there are some employees who are qualified and dedicated to their jobs. How to cite The Words, Papers

Saturday, December 7, 2019

Competitive Strategy of an Organization Free-Samples for Students

Questions: 1.What is Strategy?2.Whyis Business Model Innovation is Importanat for an Organization?3.Discuss about the Pankaj Ghemawat CAGE Framework. Answers: 1.Strategy is considered as the creation of a position that is unique and valuable and involves a specific set of activities. It requires organizations or individuals to make trade-offs while competing for choosing what is not required to be done. It also involves the creation of fitness among company activities (Grant 2016). Strategy is all about being different and deliberately choosing a diverse of activities for delivering an exclusive mix of value. Organizations use strategy to execute activities in a different way than their competitors. Strategy is the building of an exclusive and valuable position that involves a different range of activities. Strategic position of any organization is neither mutually exclusive nor do they overlap. For an organization to achieve sustainable competitive advantage they need to do more than just choose a unique position for themselves. For sustainable competitive advantage a business must carry out tradeoffs with other strategic positions (Freed man 2015). A business that is in dire need of a good strategy is Compaq. Once the worlds largest supplier of PCs in the 1990s, the company experienced a downfall in 2002 with short term debts and stock trading. The company got acquired by Hewlett Packard and was later discontinued as a brand name. The company acquired success in a very short time due to its differentiating strategy and competitive pricing. They happened to provide huge credibility and unmatched technological advancement. The company faced its downfall by the correlation between accelerated growth and shorter life spans, as companies having a moderate growth rate face the lowest amount of risk. The industry desired for improved technology. As traditional business hardware was becoming an obsolete segment, Compaq attempted differentiating by moving into software and other services. By attempting to dominate every segment of the computer industry Compaq distracted its executives from their main business of selling PCs. What Compaq should have done is to provide the responsibility to its leaders of aligning their strategies with the changing business environment. It executives should have tried to maintain a balance between maintenance of the existing business and the retuning of the same (ZDNet Editors 2017). 2.Business Model Innovation For every company in every industry, innovation is an extremely important process. In most of the cases, innovation only gets associated with new innovative products or technical advancements. However, innovations of business models are considerably more profitable. Business model innovations have been keystones in reshaping industries and redistribution of billion dollars of value (Massa and Tucci 2013). Analysis of some major innovations shows that very few of them are business-model related. Business model innovations are about primarily rethinking the business around a specific customer need and then realigning the processes, resources and profit formula with the help of the new value proposition. It is a difficult procedure for the decision makers, who have to leave their comfort zones. However, the outcomes come as a dramatic. Modifications in globalization, customer preferences and technological innovations are building windows of opportunities for the fresh business models. F or implementation of an innovative business model a description and discussion facilitating concept is necessary. It is provided with the responsibility of grasping and mediating the primary standard of a companys value creation (Amit and Zott 2012). A company that needs a business model innovation is Volkswagen, the second biggest carmaker in the world. They themselves admitted that they have been dishonest with their regulators and customers. They had software installed in their cars that provides false emission data of their diesel cars. Therefore, it is a perfect example of a situation where the values promised to the customers and the actual behaviour and conduct outright contradicts. Due to this Volkswagen had to face a perfect storm. They faced fines, criminal charges and legal actions from their customers. A third of the companys market share got wiped out. The worst thing that happened is that the deed carried out by Volkswagen totally contradicts their promise in their value proposition. Volkswagen should have carried out their promise of high moral conduct and responsibility towards its customers. Being a well established organization they should have been able to differentiate between right and wrong. The overall auto mobile industry has a bad track record of executing their promises in terms of emission and fuel consumption (Dans 2015). 3.Pankaj Ghemawat CAGE Framework Pankaj Ghemawats CAGE analysis can act as an excellent tool for companies and businesses equally who are looking for developing international expansion strategies. The CAGE framework recognizes the middle ground amongst two extremes of mass customization and one size fits all, which typifies majority of the product development efforts and global market strategies. The framework is extremely useful in easily assessing the potential risks, barriers and size in different international markets. It also assists in eliminating the guesswork involved in choosing the countries to penetrate and in which order it must be done. The CAGE framework helps identify the current products that are very easily transportable at the lowest possible cost and also helps develop new products which are exclusive to global ventures. The framework has four dimensions: Cultural, Administrative, Geographic and Economic. This framework can be utilized to compare the changes of succeeding in different countries in any given market. Organizations can make use of CAGE framework for choosing where to invest (Ghemawat 2013). An organization that required massive help in understanding the Cultural, Administrative, Geographic and Economic differences or distances while designing international strategies is Starbucks. Starbucks Israel failed dismally after two years of its establishment. The taste of Starbucks coffee did not go down well with the Israel customers, who preferred stronger coffees in tiny cups. Even after the management was informed they shrugged it off and did not attempt to localize the flavor. They also spread over five different locations with branches instead of setting up several branches in one location. As the caf opened and the actual sales turned out to be less than projected, the employees panicked and several were fired, which also affected motivation. Starbucks should have conducted a proper market research and modified their products according to the local preferences. Understanding of Israels culture, administration, geography and economy would have helped them create a business model that could have stopped their failure (Steinberg 2014). References Amit, R. and Zott, C., 2012. Creating value through business model innovation.MIT Sloan Management Review,53(3), p.41. Dans, E. 2015. Volkswagen And The Failure Of Corporate Social Responsibility. [online] Forbes.com. Available at: https://www.forbes.com/sites/enriquedans/2015/09/27/volkswagen-and-the-failure-of-corporate-social-responsibility/#204a343c4405 [Accessed 19 Apr. 2017]. Freedman, L., 2015.Strategy: a history. Oxford University Press. Ghemawat, P., 2013.Redefining global strategy: Crossing borders in a world where differences still matter. Harvard Business Press. Grant, R.M., 2016.Contemporary strategy analysis: Text and cases edition. John Wiley Sons. Massa, L. and Tucci, C.L., 2013. Business model innovation.The Oxford Handbook of Innovafion Management, pp.420-441. Steinberg, J. 2014. The grande coffee plan that failed. [online] The Times of Israel. Available at: https://www.timesofisrael.com/the-grande-coffee-plan-that-failed/ [Accessed 19 Apr. 2017]. ZDNet Editors, 2017. Worst tech mergers and acquisitions: HP and Compaq | ZDNet. [online] ZDNet. Available at: https://www.zdnet.com/article/worst-tech-mergers-and-acquisitions-hp-and-compaq/ [Accessed 19 Apr. 2017].

Saturday, November 30, 2019

Business studies Just desserts case study Essay Example

Business studies Just desserts case study Essay LTD has grown rapidly recently, and Martha Barnes, who runs the business, is reluctant to delegate authority meaning the workforce is growing but their are not any new managers. This will create a flat organizational structure with wide spans of control for each manager. Therefore there will be a large workload for each person. It says that some of the managers are overworked. If they wont delegate any authority they will need to recruit some new managers as overworked will not be motivated and their output will not be as high as it could be. Martha is inflexible about training her current staff. This is likely to denominate staff as they will be working with the company and not progressing. Denominated staff are likely to have a negative effect on the effectiveness of the workforce instead of a positive one and this could in turn affect the whole business if she does not motivate the staff the quality of their output could drop and that would in turn affect the businesses name as they emphasis that they are good quality. Another thing is that Just Desserts is cash position has gotten worse not improved and instead of improving their current staff they are just going to get new staff so the tiffs may start to worry about their job security. However this could be good because they can get new staff with skills that their staff currently dont have. If they employ the right people as they seem to be adamant to do, they may employ the right type Of person who will uplift the workforce and may be able to motivate staff To summaries then I think that recruiting is not the best option because it is likely to denominate staff also their cash position is getting worse not better the recruiting cost will is not worth it considering the fact that instead of better their staff. We will write a custom essay sample on Business studies Just desserts case study specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Business studies Just desserts case study specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Business studies Just desserts case study specifically for you FOR ONLY $16.38 $13.9/page Hire Writer

Tuesday, November 26, 2019

Erich Hartmann - World War II Ace - Luftwaffe

Erich Hartmann - World War II Ace - Luftwaffe Erich Hartmann - Early Life Career: Born April 19, 1922, Erich Hartmann was the son of Dr. Alfred and Elisabeth Hartmann. Though born in Weissach, Wà ¼rttemberg, Hartmann and his family moved to Changsha, China shortly thereafter due to the severe economic depression that struck Germany in the years after World War I. Residing in a house on the Xiang River, the Hartmanns lived a quiet life while Alfred established his medical practice. This existence came to an end in 1928 when the family was forced to flee back to Germany following the outbreak of the Chinese Civil War. Sent to school in Weil im Schà ¶nbuch, Erich later attended schools in Bà ¶blingen, Rottweil, and Korntal. Erich Hartmann - Learning to Fly: As a child, Hartmann was first exposed to flying by his mother who was one of Germanys first female glider pilots. Learning from Elisabeth, he received his glider pilots license in 1936. That same year, she opened a flying school Weil im Schà ¶nbuch with the support of the Nazi government. Though young, Hartmann served as one of the schools instructors. Three years later, he earned his pilots license and was permitted to fly powered aircraft. With the beginning of World War II, Hartmann entered the Luftwaffe. Commencing training on October 1, 1940, he initially received an assignment to the 10th Flying Regiment in Neukuhren. The following year saw him move through a series of flight and fighter schools. n March 1942, Hartmann arrived at Zerbst-Anhalt for training on the Messerschmitt Bf 109. On March 31, he violated regulations by performing aerobatics over the airfield. Sanctioned to confinement and fines, the incident taught him self-discipline. In a twist of fate, the confinement saved Hartmanns life when a comrade was killed flying a training mission in his aircraft. Graduating in August, he had built a reputation as a skilled marksman and was assigned to Fighter Supply Group, East in Upper Silesia. In October, Hartmann received new orders assigning him to Jagdgeschwader 52 in Maykop, Soviet Union. Arriving on the Eastern Front, he was placed in Major Hubertus von Bonins III./JG 52 and mentored by Oberfeldwebel Edmund Roßmann. Erich Hartmann - Becoming an Ace: Entering combat on October 14, Hartmann performed poorly and crashed his Bf 109 when it ran out of fuel. For this transgression, von Bonin made him work for three days with the ground crew. Resuming combat flying, Hartmann scored his first kill on November 5 when he downed an Ilyushin Il-2. He shot down an additional aircraft before the end of the year. Gaining in skill and learning from skilled compatriots such as Alfred Grislawski and Walter Krupinski, Hartmann became more successful in early 1943. By the end of April he had become an ace and his tally stood at 11. Repeatedly encouraged to get closer to enemy aircraft by Krupinski, Hartmann developed his philosophy of when he [the enemy] fills the entire windscreen you cant miss. Using this approach, Hartmann began rapidly increasing his tally as Soviet aircraft fell before his guns. In the fighting that occurred during the Battle of Kursk that summer, his total reached 50. By August 19, Hartmann had downed another 40 Soviet aircraft. On that date, Hartmann was aiding in supporting a flight of Ju 87 Stuka dive bombers when the Germans encountered a large formation of Soviet aircraft. In the resulting fight, Hartmanns aircraft was badly damaged by debris and he came down behind enemy lines. Quickly captured, he feigned internal injuries and was placed in a truck. Later in the day, during a Stuka attack, Hartmann jumped his guard and escaped. Moving west, he successfully reached German lines and returned to his unit. Erich Hartmann - The Black Devil: Resuming combat operations, Hartmann was awarded the Knights Cross on October 29 when his kill total numbered 148. This number increased to 159 by January 1 and the first two months of 1944 saw him shoot down another 50 Soviet planes. An aerial celebrity on the Eastern Front, Hartmann was known by his call sign Karaya 1 and the distinctive black tulip design that was painted around the engine cowling of his aircraft. Feared by the Russians, they gave the German pilot the sobriquet The Black Devil and avoided combat when his Bf 109 was spotted. In March 1944, Hartmann and several other aces were ordered to Hitlers Berghof in Berchtesgaden to receive awards. At this time, Hartmann was presented with the Oak Leaves to the Knights Cross. Returning to JG 52, Hartmann began engaging American aircraft in the skies over Romania. Clashing with a group of P-51 Mustangs on May 21 near Bucharest, he scored his first two American kills. Four more fell to his guns on June 1 near PloieÅŸti. Continuing to run up his tally, he reached 274 on August 17 to become the top-scorer of the war. On the 24th, Hartmann downed 11 aircraft to reach 301 victories. In the wake of this achievement, Reichsmarschall Hermann Gà ¶ring immediately grounded him rather than risk his death and a blow to Luftwaffe morale. Summoned to the Wolfs Lair in Rastenburg, Hartmann was given the Diamonds to his Knights Cross by Hitler as well as a ten-day leave. During this period, the Luftwaffes Inspector of Fighters, Adolf Galland, met with Hartmann and asked him to transfer to the Messerschmitt Me 262 jet program. Erich Hartmann - Final Actions: Though flattered, Hartmann declined this invitation as he preferred to stay with JG 52. Galland again approached him in March 1945 with the same offer and was again rebuffed. Slowly increasing his total through the winter and spring, Hartmann reached 350 on April 17. With the war winding down, he scored his 352nd and final victory on May 8. Finding two Soviet fighters performing aerobatics on the last day of the war, he attacked and downed one. He was prevented in claiming the other by the arrival of American P-51s. Returning to base, he directed his men to destroy their aircraft before moving west to surrender to the US 90th Infantry Division. Though he had surrendered to the Americans, the terms of the Yalta Conference dictated that units that had largely fought on the Eastern Front were to capitulate to the Soviets. As a result, Hartmann and his men were turned over to the Red Army. Erich Hartmann - Postwar: Entering Soviet custody, Hartmann was threatened and interrogated on several occasions as the Red Army attempted to compel him to join the newly formed East German Air Force. Resisting, he was charged with bogus war crimes which included killing civilians, bombing a bread factory, and destroying Soviet aircraft. Found guilty after a show trial, Hartmann was sentenced to twenty-five years of hard labor. Moved between work camps, he was finally released in 1955 with the aid of West German Chancellor Conrad Adenauer. Returning to Germany, he was among the last prisoners of war to be released by the Soviet Union. After recovering from his ordeal, he joined the West German Bundesluftwaffe. Given command of the services first all-jet squadron, Jagdgeschwader 71 Richthofen, Hartmann had the noses of their Canadair F-86 Sabres painted with his distinctive black tulip design. In the early 1960s, Hartmann vigorously opposed the Bundesluftwaffes purchase and adoption of the Lockheed F-104 Starfighter as he believed the aircraft to be unsafe. Overruled, his concerns proved true when over 100 German pilots were lost in F-104-related accidents. Increasingly unpopular with his superiors due to continued criticism of the aircraft, Hartmann was forced into early retirement in 1970 with the rank of colonel. Becoming a flight instructor in Bonn, Hartmann flew demonstration shows with Galland until 1974. Grounded in 1980 due to heart problems, he resumed flying three years later. Increasingly withdrawing from public life, Hartmann died on September 20, 1993 in Weil im Schà ¶nbuch. The highest scoring ace of all-time, Hartmann was never downed by enemy fire and never had a wingman killed. Selected Sources Aces of World War II: Erich HartmannLuftwaffe: Erich HartmannWorld War II: Erich Hartmann

Friday, November 22, 2019

How to Find Adult Education and Earn Your GED in Texas

How to Find Adult Education and Earn Your GED in Texas The Texas Education Agency, known as TEA, is responsible for adult education and high school equivalency testing in the state of Texas. According to the website: The high school equivalency assessment serves as the basis for the Texas Education Agency (TEA) to issue the Texas Certificate of High School Equivalency (TxCHSE). TEA is the only agency in Texas authorized to issue the Texas Certificate of High School Equivalency.   Tests may only be administered by authorized testing centers. Four Testing Options The state allows adult learners to take the High School Equivalencyhttp://tea.texas.gov/HSEP/ exam, the GED exam or, alternatively, to take the HiSET or TASC exam. Each exam is a little different, so its worth your while to take a look at all three. You may find that one or the other is a better match for your skills and knowledge. Its important to know that: All three tests may be taken in English, Spanish, or a combination  All three tests use a computer for at least part of the examAll three tests include sections on language arts, math, science, and social studies; the HiSET and TASC have additional sections as wellThere is a fee for taking the tests; the GED costs $145 while the other two cost about $125. You may be able to get help funding the cost of the testIf you have any type of documented disability that could make it difficult to take the test, you can ask for and receive accommodations Texas Virtual School Network TEA manages a virtual school network that provides Texas students with access to online courses. You can take these courses to prepare for high school equivalency tests, or take a test prep course. Test prep is offered free through online programs and through the Adult Education and Literacy Teachers program. Job Corps Also under Related Content on the Certificate of High School Equivalency Information page is a link to Job Corps. The link takes you to a map of Texas with job corps centers identified. Click on the homepage for information about how to take advantage of this opportunity. There is an eligibility quiz on the landing page, and the links on the top navigation bar are also helpful. Under FAQs, youll learn that Job Corps is a nationwide program that offers hands-on training in more than 100 career technical areas, including: Automotive and machine repairConstructionFinance and business servicesHealthcareHospitalityInformation technologyManufacturingRenewable resources You can also earn your GED through Job Corps and participate in college level courses. ESL courses are also available through Job Corps. Texas Workforce Commission Adult education and literacy help in Texas is also available from the Texas Workforce Commission. TWC provides help with learning the English language, math, reading, and writing with the goal of helping students acquire the skills they need to find a better job or enter college. Good luck!

Wednesday, November 20, 2019

Contract of Service or Contract of Employment Research Paper

Contract of Service or Contract of Employment - Research Paper Example In another recent case namely Express and Echo Publications Ltd v. Tanton (1999), the Court of Appeal held that if a person is not required to work personally, he was not an employee. In yet another case of 2001, MacFarlane v Glasgow City Council (2001), the Employment Appeals Tribunal distinguished the above Tanton case. The Glasgow City Council had engaged gymnast trainers at the various centres of the council. If a trainer was unable to take a class, she could substitute herself by another gymnast who was on the approved list of coaches maintained by the council. The substitutes were paid by the council and not the gymnast trainer. In Tanton case, the substitute could be from outside and he was paid by the individual and not the employer. Thus he was not expected to turn up for work and could send a substitute for a lesser price and make a profit out of it. He himself became the master. In an earlier case of O’Kelly v Trusthouse Forte Plc (1983), regular casuals were held t o be not employees since there was no mutuality of obligation and they were only kept as standby. Although the court of Appeal tried to give a finding that they were employees, since they had no business of their own, that the employer had effective control over the casual workers, that there were discipline and grievance procedures, that they should take permission to take off from rostered duties, the fact that they were self-employed, revealed that there was no mutuality of obligation i.e the workers did not have the right to claim work if not offered nor they were under obligation to accept work if offered with work.

Tuesday, November 19, 2019

Preschool Literature Program Research Paper Example | Topics and Well Written Essays - 1250 words

Preschool Literature Program - Research Paper Example My effort in this regard would be to introduce literature-based instructional program to promote a combination of learning techniques including behavioural, cognitive and constructivist approaches. Selecting literature titles Developing literature-based instruction primarily involves selecting age appropriate literature material for children (Assessing Children’s Literature, 2003). When selecting a title it is important to consider how far children of that particular age group could connect to it. The title needs to make sense to them so that they can understand its meaning. It has to be kept short and simple and tell about the main subject of the story. As children of this age are not aware of abstract concepts, it is wise to have titles that describe concrete objects that children see around them, love to have and that would appeal to their imagination. A teacher could select a title depending on what she/he wants to teach them. So that children start learning values of life through literature and start associating with them from an early age. In this respect it has to be seen that the titles do not harp at any stereotypical ideas, prejudices and biases (Assessing Children’s Literature, 2003) as the main purpose of having literature-based learning is to inculcate liberal values in children. Selection of media When it comes to literature-based instruction for preschool children it is best to opt for an interactive media. Interactive media in this case would mean instructor-led teaching mode. For so small children the teacher would be the best medium for facilitating learning. The teacher or the instructor plays the pivotal role in building up an interactive learning environment either through reading storybooks or providing with audio-visual treat of a story. So whatever media she/he chooses, it is her/his interpretation of the text that the children will eventually pick up. Vygotsky (1985) claims that reading aloud makes way for an interactive p rocess between the adult and the child that helps the child comprehend the meaning of the text. Therefore the teacher has to ensure proper interaction in the class whether it is reading storybooks or audio-visual story-telling. Developmental goals in introducing literature based instruction Language development For preschool children the first step of learning is language learning. Language is best learnt in a given context. Literature provides the context for learning language. When the teacher reads out a story in a class and enacts it too where necessary, the children are introduced to a sea of new words used in a particular context. They not only learn a new word but its specific usage too. Had the word been taught independently, its significance would have been lost on the child. In this way the child’s vocabulary increases and also his ability to comprehend meaning in a given situation (Clay, 1976). Intellectual development Literature helps in developing critical thinki ng and heuristic skill. After reading out a poem or a story, or showing them a visual representation, the teacher should ask open questions about what the children saw or heard and through probing questions encourages the child to think about other alternatives. The teacher’s focus is to develop the child’s intellectual capacity. Personality development The process of interaction involves in forming and

Saturday, November 16, 2019

An Inspector Calls & play Essay Example for Free

An Inspector Calls play Essay Written by J. B. Priestley in 1945, An Inspector Calls is a play that follows the story of the Birling Family and their dealings with a woman, Eva Smith. The Birlings are a wealthy family and are happily celebrating an engagement when their evening is rudely interrupted by a police Inspector investigating the death of a working class girl. Throughout the course of the evening, the Inspector deftly uncovers their dirty little secrets and each of their involvements in the girls death. The play is set in an industrial town in the Midlands called Brumley. During 1912 in the Edwardian era, when the play was set, life was hard for the poor and even harder for women. There was very little help available for people and only the very desperate were given aid and even then they were sometimes not given enough. The local workhouse was available for the sick, old or handicapped but this was an unpleasant place. Women in 1912 were treated as inferior and they could not often do what men could; they were not allowed to vote, they were unlikely to go to university and get decent job and they were expected to give up their jobs once they were married. They did not have the same rights as men. The play starts with a long set of stage directions from which we learn a lot about the Birling family. They are wealthy as they employ a maid. It is also suggests that they are strongly ruled by their social duties and roles because it is said that Mrs Birling is socially superior to Mr Birling suggesting that society plays a big role in the familys life. This is further suggested by the fact that the men wear tails and white ties to a family dinner signifying that the family are very proper and must be formal at all times even in an informal setting. Even though it is quite formal, they are quite happy and cheerful as they have been celebrating a special occasion. The atmosphere is shown by the lighting which should be pink and intimate hinting at a happy care-free family feel. However, when the Inspector comes in, the lighting should be harsher as the entrance of the Inspector destroys the family atmosphere and creates a harsh atmosphere.

Thursday, November 14, 2019

How Personal, Organizational, and Cultural Values Affect Decision Making :: Gandhian Movement Socialization Society Essays

How Personal, Organizational, and Cultural Values Affect Decision Making Self-limiting Conflict: The Gandhian Style I have mentioned two basic categories of conflict regulation scholarship. In the preceding section we concerned ourselves with the first, specialists engaged in third-party intervention research and experimentation-intermediaries, negotiation, conciliation, communication control and modification. The second involves the study of ways of waging conflict that tend both to keep it within bounds and to limit its intensity or at least the possibility of violence-nonviolent social movements, nonviolent resistance on the part of individuals and groups, nonviolent alternative national defense strategies. Let us look at conflict processes that are self-regulating in nature, i.e., that have built-in devices to keep the conflict within acceptable bounds and to inhibit violent extremism and unbridled escalation. Socialization is an important determinant of the style and effectiveness of conflict regulation in any society. If Tolley (1973) is correct in placing the formative period for attitudinal and behavioral patterns concerning peace/war issues and conflict regulation styles at ages 4-12, then learning creative approaches to conflict regulation through family, school, mass media, and other primary learning environments is essential. There are a few sources dealing with this problem (Nesbitt, 1973; Abrams and Schmidt, 1972). There are societies and groups within societies that socialize their members in effective conflict regulation. Bourdieu (1962) describes Berber Kabyles of North Africa as a society held together by a process of balanced and strictly controlled conflict Self-Limiting Conflict in which members are socialized to avoid violence: Elise Boulding (1974) observes that there are certain types of family environments and child-rearing practices that tend to produce persons with nonviolent proclivities and creative response patterns to conflict. Ultimately the socialization process, political socialization in particular, is probably the most important conflict regulation device. We should soon learn some interesting things about the impact of a decade of involvement in an unpopular war on the attitudinal and behavioral patterns of America's youth. Etzioni's self-encapsulation concept is very useful here. It is a process in which certain conflicts are increasingly limited by their own nature and by the nature of the host system, so that the "range of expression of the conflict is curbed." Certain modes of conflict and weapons are excluded by mutual, sometimes tacit, consent, and the conflict becomes ritualized-the game is played by the rules, so to speak. Dahrendorf's analysis of the institutionalization of labor/management conflict over the past half century is an excellent illustration of self encapsulation.

Monday, November 11, 2019

Ketamine Pain Mechanism

Pain is communicated from the brain to other parts of the body by the CNS (Central Nervous System) and nerve endings. (Mayer, Mao, Holt, Price, 7731-7736) The ligand-gated ion channels, also referred to as LGICs, or ionotropic receptors, are a group of intrinsic transmembrane ion channels that are opened in response to binding of a chemical messenger. (Collingridge, Singer, 290-296) (Dickenson, 307-309) (Dickenson, Chapman, Green, 633-638)The ion channel is regulated by a neurotransmitter ligand that is very selective to one or more ions like potassium, sodium, calcium, and chloride. (Kandel, Schwartz, Jessell, 178-180)   Such receptors located at synapses converting the chemical signal to an electric signal in the post-synaptic cell. (Connolly, Wafford, 529-534)   The NMDA receptor (N-methyl-D-aspartate) is such an ionotropic receptor for glutamate. (Dingledine, Borges, Bowie, Traynelis, 7-61) (Lodge, Johnson, 81-86) (Meller, 435-436)   By X-ray crystallography, the NMDA recep tors have an heterodimer subunits, which are involved in the binding of agonists and antagonists like Ketamine. (Hirota, Lambert, 441-444)This channel complex contributes to excitatory synaptic transmission at sites throughout the brain and the spinal cord, and is modulated by a number of endogenous and exogenous compounds. (Rabben, Skljelbred, Oye, 1060-1066)   NMDA receptors play a key role in a wide range of physiologic and pathologic processes. (Hoffman, Coppejans, Vercauteren, Adriemsen, 240-242) (Klepstadt, Maurset, Moberg, Oye, 513-518) (Coderre, Katz, Vaccarino, Melzack, 259-285) Ketamine is primarily a non-competitive antagonist, which opens in response to binding of glutamate. This NMDA receptor mediates the reduction of pain effects of ketamine at low doses. (Lofwall, Griffiths, Mintzer, 439-449)Evidence for this is reinforced by the fact that naxolone, an opioid antagonist, does not reverse the analgesia. Studies also seem to indicate that ketamine is ‘use depend ent' meaning it only initiates its blocking action once a glutamate binds to the NMDA receptor. (Sorensen, Bengtsson, Ahlner, Henriksson, Ekselius et al., 1615-1621)   At high level doses, ketamine has also been found to bind to opioid mu receptors and sigma receptors. Thus, loss of consciousness that occurs may be partially due to binding at the opioid mu and sigma receptors. (Lonnqvist, Norton, 617-621)(Menigaux, Fletcher, Dupont, Guignard, Guirimand, et al. 129-135) (Koppert, Sittl, Scheuber, Alsheimer, Schmelz, 152-159) (Bushell, Endoh, Simen, Ren, Bindokas, 55-64)Works CitedMayer DJ, Mao J, Holt J, Price DD. Cellular Mechanisms of Neuropathic Pain, Morphin Tolerance, and their Interactions. Proc. Natl Acac. Sci. USA. 1999, 96(14): 7731-7736.Collingridge G, Singer W. Excitatory Amino Acid Receptors and Synaptic Plasticity. Trends Pharmacol Sci. 1990 11: 290-296.Dickenson AH. A cure for wind-up: NMDA receptor antagonists as potential analgesics. Trends Pharmacol Sci 1990 11: 30 7-309Dickenson AH, Chapman V and Green GM. The pharmacology of excitatory and inhibitory amino acid-mediated events in the transmission and modulation of pain in the spinal cord. Gen Pharmacol 1997 28: 633-638Kandel ER, Schwartz JH, Jessell TM. Principles of Neural Science, 4th ed. McGraw-Hill: New York, (2000), pp.178-180Connolly CN, Wafford KA. The Cys-Loop Superfamily of Ligand-Gated Ion Channels – the Impact of Receptor Structure on Function. Biochemical Society Transactions (2004) Vol. 32: 529-534.Dingledine R, Borges K, Bowie D, Taynelis SF. The Glutamate Receptors Ion Channels. Pharmacology Reviews, 1999 51(1): 7-61Lodge D and Johnson KM. Non-Competitive Excitatory Amino Acid Antagonists. Trends Pharmacol Sci 1990 11: 81-86Meller ST. Ketamine: Relief from Chronic Pain through Actions at the NMDA Receptor? Pain   1996 68: 435-436Hirota K, Lambert DG. Ketamine: Its Mechanism (s) of Action and its Unusual Clinical Uses. Br. J. Anesth. 1996, 77(4):441-444.Rabben T, Skjel bred P, Oye I. Prolonged Analgesic Effects of Ketamine, an N-Methyl-D-Aspartate Receptor Inhibitor, in Patients with Chronic Pain. The Journal of Pharmacology and Experimental Pharmaceutics. 1999, 289(2):1060-1066.Hoffmann V, Coppejans H, Vercauteren M and Adriaemsen H Successful Treatment of Postherpetic Neuralgia with Oral Ketamine. 1994 Clin J Pain 10: 240-242Klepstad P, Maurset A, Moberg ER and Oye I Evidence for a Role for NMDA Receptors in Pain Perception. Eur J Pharmacol   1990 187: 513-518Coderre TJ, Katz J, Vaccarino AL and Melzack R.   Contribution of Central Neuroplasticity to Pathological Pain: A Review of Clinical and Experimental Evidence. 1993 Pain 52: 259-285.Lofwall MR, Griffiths RR, Mintzer MZ. Cognitive and Subjective Acute Dose Effects of Intramuscular Ketamine in Healthy Adults. Ex. Clin. Psychopharmacol. (2006), 14(4):439-449Sorensen J, Bengtsson A, Ahlner J, Henriksson KG, Ekselius L and Bengtsson M.   Fibromyalgia. Are there different mechanisms in the processing of pain? A double Blind Crossover Comparison of analgesic Drugs. 1997 J Rheumatol 24: 1615-1621Lonnqvist PA, Norton NS. Pediatric Day-Case Anesthesia and Pain Control.   Curr. Opin. Anaest. (2006), 19(6): 617-621.Menigaux C, Fletcher D, Dupont X, Guignard B, Guirimand F, Chauvin M. The Benefits of Intraoperative Small-Dose Ketamine on Postoperative Pain after Anterior Cruciate Ligament Repair. Anesth. Analg. 2000 90(1): 129-135Koppert W, Sittl R, Scheuber K,Alsheimer M, Schmeltz M, Schuttler J. Differential Modulation of Remifentanil-Induced Analgesia and Post-Infusion Hyperalgesia by S-Ketamine and Clonidine in Humans. Anesthesiology. 2003, 99(1): 152-159.Bushell T, Endoh T, Simen AA, Ren D, Bindokas VP, Miller RJ. Molecular Components of Tolerance to Opiates In Single Hippocampal Neurons. Mol. Pharmacol. 2002, 61(1): 55-64.

Saturday, November 9, 2019

Apple’s iphone – Not “made in America”

1) What is meant by globalization of human capital? Is this inevitable as firms increase their global operations? Globalization of human capital implies that people are moved out of their native country for employment in various fields. Since there are many companies around the globe and have branches in other countries, qualified people get an opportunity to move out and work. It is inevitable since globalization is established and the companies use the skills, labor, talent and knowledge as a part of globalization of human capital.2) How does this case illustrate the threats and opportunities facing global companies in developing their strategies? The main threat is when president Obama asked Steve job about reduction of job opportunities in United states and giving job in other countries, which made a feel of threat in their own country. And also many suicides at Foxconn lead a negative impression on Apple. The opportunities faced by them are high profit of $ 321 per i phone. It s hows the profit of a global company.3) Comment on Apple executives assertion that the company's only obligation is making the best product possible. â€Å"we do not have have any obligation o solve America's problems† I think it is really harsh to say these words. Everyone should have some obligation towards their country. But this is business and as an executive he is right he should always think about the growth and quality of the product. And should make maximum profit from low cost. So I think he is right.4) Who are the stakeholders in this situation and what, if any, obligations do they have? The main stakeholders are Apple company, Foxconn, and the government. All of these have obligations. Since Apple is a brand company and all expect best from them it is their obligation to be faithful and best quality provider to the consumers and also to the workers who work 24 hours for them. It is same for Foxconn too. They should be concern about the workers they should get the a dequate pay and rest. Also, government  should safe guard the people of each country from any type of pressure.5) How much extra are you prepared to pay for an iphone if assembled in the United states? I think I will not pay even a single penny extra to buy an iphone since they have a profit of $321 now itself. That is too much profit. I recommend they should decrease the rate of the phone. Some other product made in USA is not that expensive so the iphone should also be a little lower than now. After all, it is a phone although it has many application also it is not expensive enough to make it.6) How much extra are you prepared to pay for an iphone if assembled in China but under better conditions and pay? What kind of trade -off would you make? I have the same opinion as I said for United states. Better conditions and pay rights of workers and it does not mean the price should be increased since the already have a good profit. And it is the right thing to provide better conditio ns and better pay. We can also think about globalization of human capital to United states.7) To what extend do you think the negative media coverage has affected Apple's recent decision to ask the FLA to do an assessment and the subsequent decision by Foxconn to raise some salaries? What do you think will happen now?Since everyone knows about the case I think they will be more careful and take a favorable decision so as to protect the workers. It is sure that the negative media coverage has affected Apple's image very badly and so they asked for a FLA assessment. Foxconn on other hand was squeezing the workers to do more work with little pay and the suicide which occurred made made them into trouble and they increased the wages to save their face and I think they have to be very careful in future by providing good environment to work with a descent pay.

Thursday, November 7, 2019

Concepts of Budget and Cash flow analysis

Concepts of Budget and Cash flow analysis Liability A liability are any claims against the assets of a business or financial organization, they are the obligations that the business has for or against the external stakeholders of the business which may be the shareholders, creditors to the business, suppliers and even the lenders (Swart, 2004). Advertising We will write a custom essay sample on Concepts of Budget and Cash flow analysis specifically for you for only $16.05 $11/page Learn More A liability can also be defined as the legal obligations of an individual person or an organization and the obligation is derived from current or past actions of the person or organization that binds them to the external party legally. Liabilities therefore demands from compulsory transfer of assets or the demanded services at a future defined dates. Liabilities are majorly divided in to two that is current and long term liabilities (Tyson, 2009). Current Liability This is the future obligation that is payable w ithin a duration of less than one financial period i.e. one year. They include: accounts or trade payables, accrued rent and short term loans (Swart, 2004). Pizza Piazza’s current liabilities include:- the monthly rent of the leased restaurant $3000 per month, 2 short term loans of $1500.00 credit card balance and $350 vendor balance. Long-term liability This on the other hand are legal obligations or claims that are payable in the long run which may even range up to a period of from one year to ten years. They include:- owners equity which is the companies obligation to its owners and long term loans (Custard, 1996). Pizza Piazza’s long term liability includes:- the long term bank loan of $50000 Assets These are the economic resources that are owned by any form of business entity. They are generally of the use of value addition to the entity through the creation of more resources. They do this also by adding to the net worth of the entity that owns them (Hysell, 2007 ). They can be classified variedly as either current or fixed, liquid or illiquid or tangible and intangible assets. Assets include cash and receivables, Land and buildings and also equipment.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Current Assets They are also called short-term assets and they can be converted into cash or an exchange done against them within one financial period that is a year. These types of assets are highly liquid and change form often from one to the other. They include cash and cash equivalents, receivables, prepayments and short-term investments (Swart, 2004). Pizza Piazzas Current Assets are as follows: the inventory that it maintains to produce Pizza as well as start-up cash. Fixed Assets These on the other hand are called capital or long-term assets. They include all forms of property, plant and equipment that are owned by the entity. They are illiquid and therefore don’t change form that easily (Custard, 1996). It’s the long-term assets that are used to run the day to day operations of a business to create more wealth to the owners. Fixed asset include:- land, buildings, machinery and even vehicles. Pizza Piazzas fixed assets entails among others; the kitchen equipment and the three delivery vehicles. The cash flow of Pizza Piazza would contain cash from the sales of pizza and other menu items as the operating activities. Cash outflows would result from monthly expenditure like rent, insurance and community expenditure, fuel for the vehicles and loan payments. Reference List Custard, E. T. (1996). The complete book of colleges. Princeton: Princeton Books. Hysell, S. G. (2007). American reference books annual. Houston: Adventures Works Press.Advertising We will write a custom essay sample on Concepts of Budget and Cash flow analysis specifically for you for only $16.05 $11/page Learn More Swart, N. (2004). Personal Financial Management. New York: New York Book Stores. Tyson, E. (2009). Personal Finance for Dummies. Chicago: Chcago Printing Press.

Monday, November 4, 2019

Animal Farm Essay Example for Free (#9)

Animal Farm Essay Animal Farm by George Orwell is an allegory written in 1943. It was also made into a TV film version in 1999 directed by John Stephenson, produced by Greg Smith and Robert Halmi and distributed by Hallmark Films. Animal Farm is a deceitfully simple story about a group of farm animals who are tired of living in a dystopia caused by humans. They rebel and create their own way of life, only to find themselves back in a dystopia caused by animals. The film follows the plot line of the novel closely but changes some major details. While the film and the novel Animal Farm are basically one in the same and have similar plot lines, the film had less detail, while the novel was thoroughly detailed. The differences between the film and the novel were points of view, exposition and major plots. Orwell tells the story of Animal Farm through a third person, omniscient point of view. The narrator is never involved in the action of the story, but knows everything. This point of view allows readers to see into the minds of the characters and understand their motivations. The film is told by a narrator, a character in the novel, Jessie. It explains the film in a way that she sees everything occurring. It also stops most of the dialogue between the animals and they don’t really talk like they do in the novel. Another difference between the novel and film is the exposition, which gives background information on the plot. In the novel, some of the events that occur in Animal Farm’s exposition play important roles later on in the novel. In the novels exposition, Orwell describes many of the animals that are important to the novel. In the films exposition, very little time is spent on developing the characters of the important animals. Also, the song Beasts of England is not sung in the exposition, unlike the novel, this song plays a very pivotal role later on in the novel. In the film, they don’t know the characters very well and the animals don’t really sing it, they hum it. This takes away from the mood of the song. The movie is merely an adaptation of the novel into film, so almost all the events that take place in the novel will take place in the film. Another difference between the novel and film is the major plot differences. The novel and film follow the same plot line but there are some major differences. In the novel, Old Major died about 3 days after his speech from natural causes. While in the film, Mr. Jones shoots Old Major minutes after his speech, while they’re reciting the Beasts of England song. In the novel, all of the animals could speak while in the film it was arrated by Jessie which cut the dialogue of most of the animals. The end of the film and novel differ greatly. In the novel, the animals are sadly dominated by Napolean. But in the film they somehow overthrow his power and finally bond together for another attempt at a utopia. The film covered major ideas but missed some details, characters, and small stuff that made the novel so interesting. It’s quite apparent that there are many significant differences between Animal Farm the novel and the film. There are a number of differences between the use of point of view, the exposition, and the major plots. Animal Farm is a simple story about a group of farm animals who overthrew their human dictators and their animal counterpart who dictated them also. The novel was very detailed and had many characters which made it very interesting. While the film had less details, and characters which made it a little dull, and boring. These are my comparisons of the film and novel called Animal Farm. Animal Farm. (2017, Feb 02). We have essays on the following topics that may be of interest to you

Saturday, November 2, 2019

The Mobile Phone Market in China Essay Example | Topics and Well Written Essays - 4000 words

The Mobile Phone Market in China - Essay Example At the same time, there is a heavy reliance on group affiliation and group membership in China that continues to feed growing consumption demand ratios for mobile phone products as a means to stay connected with other Chinese family members and peer acquaintances. There is also a growing demand for mobile services in the business environment for executives and generic employees alike, representing a whole different market segment other than just the middle class Chinese buyer. Therefore, there are multiple market segments that are available for targeting which will require the creation of an integrated marketing campaign for business and generic consumer markets. China, however, is a saturated market for mobile phone marketers, with such competition as Nokia, Motorola, Toshiba, Panasonic and other local Chinese manufacturers under partnership with NEC and other Chinese service providers (Myers & Yuan, 2008; Wang, 2005). This must be taken under consideration prior to market entry as unit volumes of competitor mobile phones have exceeded 134 million in 2008 (Fu, 2007). Subscribership to mobile services of varying variety has reached 480 million in China by 2008, a 20 million unit increase since 2007 (Fu). Thus, in order to be competitive in this market, the business must develop a marketing strategy that targets key demographics using a marketing strategy that is differentiated from competition and caters to local market needs. In 2006, Mitsubishi was forced to exit the Chinese mobile market due to a lack of acceptable market presence and failure to adopt marketing strategy to fit the local Chinese consumer (Myers & Yuan, 2008). Toshiba also was forced out of the market in 2006 after a joint venture with Nanjing Patina Wang Zhi Corporation was unable to meet market demand (Myers & Yuan). These are important factors to consider that have opportunities for new market entry and also to illustrate the importance of consumer influence in the Chinese mobile market. De spite the saturated presence of competition, research has identified much significant potential for revenue growth in China if the business develops an appropriate integrated strategy that targets multiple buying groups. The goal is to maintain an image of local market fluency that fits the psychographic profile of Chinese consumers related to their lifestyle, preferences, and social tendencies. This report provides research data on the Chinese consumer, the mobile market, competitive practices, and describes opportunities for short-run and long-run revenue growth in this difficult NIC market with ample consumer market availability. To succeed in China, the business must be flexible, innovative, and also invest considerable capital into promotion and advertising. 2. Background analysis on China The Chinese market currently maintains a 34.5 percent growth in mobile phone usership, with an increase of 20 million year to year in subscribership to mobile services (Fu, 2007). Growth in m obile phone usage has occurred by new industrial developments, new job opportunities, and also the balance of payments equilibrium that exists in China associated with import and export volumes and capital expenditures. The Chinese government maintains a significant trade surplus with other countries, but is able to offset this through capital outflows into foreign investment (Warren & Keegan, 2009). China has been

Thursday, October 31, 2019

Europes power is inevitably declining relative to other powers Essay

Europes power is inevitably declining relative to other powers - Essay Example The most applicable technique used to determine this phenomenon is to pose an overarching question, which enables the placement of Europe in an intelligible conceptual milieu: When does a super power cease to be â€Å"super†? This question obliges the re-interrogation of superiority, power and decides, as well as revalidation of historical perspectives, which underpin the current disquiet concerning the shifting international order. In Europe, concerns regarding its superiority, decline and power continue to be a staple component of popular and scholarly discourse, but they are rising in intensity because of current financial crisis experienced in Europe. Europe’s power is inevitably declining as the individual states, as well as their societies and production systems continue to decline. The military and economic criterion explores a nation or region’s capacity to fit the description of greatness or superiority. Military power has a notable economic basis since heavy defense spending has significant effects on a nation’s or region’s economy. Europe’s decline is perhaps most notable in international politics, and these effects emerged with stark clarity in the events concerning the Balkan crises, as well as the war in Iraq. In the case of the Iraq war, Europeans only watched helplessly as the senseless war, which they did not even desire, transpire and had to sustain a substantial share of the mammoth costs generated by the war. It is quite evident that Europe no longer carries any significant weight on the topic of international politics and is currently subject to the US’ hegemony (Rifkin 112). This reality became quite apparent at the end of the World War 2 and the Cold War. Notably, the hegemony of the US had a prominent rival in the USSR, which prevented Europe from feeling dominated by the US. US’ subtle domination of Europe gave Europeans the inaccurate sensation that they were making contributions to the realization of a joint project and defense of shared values. Today, the danger lies not in USSR domination but in terrorism, funded by fundamentalist Islamic groups whose networks extend throughout the world. Today, American hegemony does little to guarantee European security in light of this danger. It is evident that Europe could play a pivotal role in eradicating terrorism at grass root level, favoring economic development, unity and a democratic evolution Middle Eastern and North West African country with which Europe enjoys positive relations. This positive relationship is characterized by Europe’s geographical proximity, as well as close interdependence with nations in the region. However, Europe’s impotence prevents it from playing its role effectively in this area and other sensitive global regions (Manners 238). As a consequent, Europe finds itself more and more often, serving to make up the numbers that create international equilibrium while new actors such as India, China and Brazil enter the world and old actors such as Russia make an unmistakable comeback. Europe is rapidly exiting the scene as it continues to count for less than other powers in terms of strategic calculations regarding international events. On the other hand, Europe is inevitably declining on the economic front. This is notable in the declining trend experienced by the leading eurozone countries, which are currently showing, relative to their GDPs, relatively weak and negative growth trends. Unemployment rates in most European nations are current sky high. The countries’ production systems are inevitably becoming unable to fend off the

Tuesday, October 29, 2019

EXPENDITURE PLANNING AND CONTROL Essay Example | Topics and Well Written Essays - 1750 words

EXPENDITURE PLANNING AND CONTROL - Essay Example Conclusion......................................................................................13 Appendix A: Time and Cost Calculation................................................15 Appendix B: Preliminaries cost due to the Prolongation of the Works. 15 References 16 Bibliography 17 Expenditure Planning and Control – Assignment 1 I. Introduction I have been instructed by the main contractor (‘the Contractor’) to prepare a report in relation to a construction project which has experienced significant problems from the get go, which have resulted in delay and disruptions during the course of the Works. These delays and disruptions have inevitably affected the Contractor’s ability to complete the work in a timely fashion. This report provides an independent assessment of the surrounding particulars and contract documentation with a view to resolving the matter. I have specifically been instructed to include in the report the following points: an analysis of the delays; extension of time (‘EOT’); liquidated damages; valuation of work and claims for loss and / or expense. Generally speaking, I am instructed to provide my opinion in relation to the parties’ rights and obligations under the contract. The report begins by outlining in brief the ‘Background Facts’ and issues which arose (see section II). Section III of the report provides an ‘Analysis of the Issues’. Under this section, each problem is addressed in chronological order. The ‘Procedural Issues’ are set out at section IV. Section V addresses the ‘Methods of Quantification’. Finally, section VI is the Conclusion. II. Background Facts The contract was entered into by the parties for the construction of an extension to a cancer centre at a hospital in the north east (‘the project’). The project can be more specifically summarised as the construction of an extension and some refurbishment work t o the cancer unit. The standard form construction contract used for the works is the JCT Standard Building Contract with Quantities (SBC/Q) (‘JCT05’) with sectional completion. This form of contract is generally used where the works have been designed / detailed by or on behalf of the Employer. The contract documentation is comprised of the JCT05 contract, contract drawing and the bill of quantities. The Contract Sum for the Works was set at ?4,000,000 under a firm price contract; otherwise known as a fixed price contract. The Contractor was to be paid monthly with 3% of the Contract Sum being retained by the Employer until completion. The duration of the contract was 34 weeks with a start date scheduled for 1st February 2008. The Works were to be executed whilst the neighbouring hospital buildings were to be occupied. It was specifically mentioned in the Preliminaries, however, that the Works were to be carried out with ‘as little disruption as possible to the da y to day working of the hospital’. Albeit, contractors were advised to visit the site at the pre-tendering stage in order to assess the conditions which could potentially impede the execution of the Works (see the Preliminaries). Furthermore, there is only one site entrance, which is situated along a busy road and is also on a ‘blind corner’, which requires careful supervision at the time of site deliveries. The following issues arose on site soon after the works commenced: Relevant Issues i) A delay of six weeks resulted after site conditions were found to be of poor quality which demanded that the foundations be redesigned; ii) A further five

Sunday, October 27, 2019

Life Imprisonment The Best Method Politics Essay

Life Imprisonment The Best Method Politics Essay On January 11, 2011, a 22-year-old male in Tucson, Arizona shot through the head of an Arizona congressional representative, Gabrielle Giffords. Jared Lee Loughner was the identified shooter. During the course of his attempted assassination of Giffords, he killed six people and wounded others. Among those who have died was a nine-year old girl. As of today, Jared Loughners sentencing is still an ongoing process. The prosecutors and survivors angered by his cold-blooded actions, argue for a dead sentence, while others recommend a life sentence behind bars. However, Loughner tried as mentally ill, but the court later discovered that he was stable and competent. Loughner planned his assassination motives beforehand, which discards the fact and beliefs that he was unstable and mentally ill. Which method would be the more appropriate and suited punishment considering his crimes was committed in competence and self-control? In the Eighteenth Century, the establishment for the first laws of death penalty included the methods of execution: drowning, burning alive, hanging, beheading, boiling, crucifixion, impalement, and other heinous practice. The foremost common method of execution during the Tenth Century A.D. was hanging. In the 1700s, crimes that were punishable by death were theft, chopping down a tree, piracy, and other minor crimes considered as misdemeanor today. How does the death penalty differ from life imprisonment without parole in terms of morality? Death penalty has long been a controversial issue of judicial punishments. Nevertheless, as of today, thirty-five out of the fifty states in the United States have permitted the death penalty. On the other hand, over half of the countries around the world have abolished the death penalty. Why is euthanasia, a form of killing unlawful while capital punishment or execution regards as acceptable in a majority of the United States? Euthanasia and ca pital punishment both involves the killing of human lives in the hands of another human. It is arguable that killing a human being is unethical and immoral; however, the reason of killing is contradictory. Euthanasia is a term, in which involves assisting a merciful death of a terminally ill or suffering patient. The death penalty is the maximum consequence carried out upon an atrocious and prolific criminal. Death penalty is the execution of a criminal in hopes of terminating future and further crimes. Life imprisonment is the better method of punishment. The death penalty is nothing more than a form of revenge; it has little impact if any of crime deterrence, the process of execution is very expensive, and there is always a slight chance of wrongful executions. Is the death penalty a deterrent to crime? Only statistics can verify the truth. According to credible statistics, death penalty is not more of a deterrent than is life in prison. In fact, statistics have proved that over the years, states with the death penalty have greater homicide crime rates than states without the death penalty. In addition, the death penalty does not guarantee rehabilitation. There is no way of bringing an executed person back to life. The death penalty is a form of revenge and does not guarantee rehabilitation or change, while life in prison can. A criminal being sentenced to life in prison has a decent chance of changing or rehabilitating. Every criminal deserves a second chance. Every single person in this world had sinned at least once, so it would be absurd to kill a person simply from one crime. The death penalty only guarantees one less criminal off the streets. As for executions, death upon criminals is instant, while life behind bars is torturous. For all we know, executed criminals may be in candy land or heaven as a joyful apparition. A victims family can rest assure that a criminal given life in prison is living in misery for the rest of their life behind bars. A question to take into account is which do criminals fear more between life in prison and an instant death? A majority of criminals may actually request a death sentence rather than prison. Criminals are not concerned about their own well-being meaning that life or death to them is just a notion. Unfortunately, the techniques of execution are not as heinous as it was few hundreds of years ago; otherwise, the death penalty would be incredible crime deterrence. The thought of pain, torture, or humiliation can petrify and intimidate criminals. The cruelest method of execution was slow slicing, or ling chi, where the public ties the condemned and a thousand of their pieces of flesh is cut, including severed limbs, ending with their beheading. The Chinese in 900 CE invented this method, until its abolishment in 1905. Today, the death penalty is nothing more than a short experience of pain. The modern death penalty is not an effective method of crime deterrence because it is not torture nor is it humiliation, but simply revenge. Furthermore, the expenses upheld by the government in the cases of punishment are a concern. Most argue that the expenses of jailing prisoners are much greater than the processes of death penalty. They are wrong. Carrying out executions is much more expensive then sheltering inmates for the rest of their lives. In reality, the death penalty and executions costs much more than inhabiting criminals in prison. Why is that? The execution of a criminal is not the expensive part, but rather the process of long trials and appeals leading up to a decision of execution makes the death penalty an expensive method of punishment. It is important to provided additional prison guards for sentenced death row inmates, as well as situating death row inmates in an escape-proof and secured jail cell. This process alone, costs over $60,000 per year for each death row inmate. The drugs used for the death penalty costs $83.55 per execution. Although, the death penalty is has not been in active use, the se ntencing of death row inmates has. Possibly the most controversial reason against the death penalty is that the innocent may be wrongly executed. Over the past decade, there have been several cases of injustices. In the history of capital punishment, the innocent have been wrongfully executed, as well as wrongful imprisoned. There is a chance of imprisoning an innocent person to life in prison as well; however, the chance of repaying their dues and finding their innocence is superior to killing an innocent person. The idea of executing an innocent person is dreadful, let alone imprisoning them for life. How many innocent death row inmates have been executed or on the verge of execution? It would be awful to discover 17 death row inmates in the nation found innocent, but killed. Supporters of death penalty even suggested for quicker death penalty trials. Hastening the process of death penalty will only increase the chance of killing an innocent individual. The better method of punishment for criminals is life imprisonment without parole. The justice system is very dysfunctional when it comes to life imprisonment. Life imprisonment without parole simply means life behind bars until a natural death. Governors and prosecutors should not interfere by requesting or endorsing an early release from prison no matter what. This is the reason the judicial system is flawed. Life imprisonment may be cruel and unusual, but it perhaps, can deter crime. It may be more torturous than the death penalty, but the death penalty is crueler because it is ultimately the end of life. Life imprisonment is the better method of punishment. Appropriate and sincere administration of life imprisonment may be the ultimate crime deterrence, as well as a rehabilitation strategy.

Friday, October 25, 2019

Factors to Childlessness :: Reproduction, Sweden

Factors associated with the trends in childlessness: (1000 words ) Trends in marriage, trends in formation of family—Drawing from the literature. Role of voluntary and involuntary factors (1000 words ) Is childlessness due to infertility or by circumstances or choice?- Drawing from the literature. The risk of childlessness is increased with the delay in the first birth. The reproduction span is also reduced and so is the number of children. Changes in educational level also leads to postpone ment of fertility.(Olah and Bernhardt 2008). High tolerance towards childless ness is found in the Post modern values dominant in Sweden propagate the importance of leisure and friends in life and children though considered important , are not needed for a fulfilling life (Olah and Bernhardt 2008). The tertiary educated women in Sweden is seen to have higher rates of childlessness than others(Olah and Bernhardt 2008 Sweden observed highest female labour force participation in Europe and was considered as the major reason for the fertility decline in 60s and 80s in Sweden along with the post modern values and contraception use which provided more control over childbearing to the women(Olah and Bernhardt 2008)) Contradictory to the above, Sweden , who is the forerunner in the second demographic transition, has observed the European highest and Sweden lowest fertility trends which have fluctuated greatly in 1960s and 70s (Olah and Bernhardt 2008).With the dominance of the post modern values in this increasingly secularised society, Sweden boasts of having one of the highest ideal family size in the European union and childlessness is relatively low (Olah and Bernhardt 2008). Sweden also has the highest amount of labour force participation in the entire Europe and the education among women is also as high as the men(Olah and Bernhardt 2008). There is an important role played by the family policies in Sweden in keeping the fertility level high, which are based on equality across social groups and gender (Olah and Bernhardt 2008). The eligibility to parental leave and other benefits is linked to the labour force attachments and thus the family policies play an important role in the changes in t he fertility rates(Ola and Bernhardt 2008). Some researchers attributes enhanced economic status and educational attainment have contributed in delays in marriage and childbearing and increases in divorce and single motherhood(Danziger and Ratner 2010) please refer more to source Claudia Goldin (2006) describes women’s enhanced engagement in the economy as the most remarkable change in the labour markets in the 20th century.

Thursday, October 24, 2019

8 Key Element for a Business Model

E-commerce: business. technology. society. E-commerce E commerce Business. Technology. Society gy y Kenneth  C. Laudon Copyright  © 2011 Pearson Education, Ltd. Chapter 5 Business  Models  for  E? commerce Copyright  © 2007Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 1-2 E-commerce Business Models Business  model d l Set  of  planned  activities  designed  to  result  in  a   Set of planned activities designed to result in a profit  in  a  marketplace Business  plan Describes  a  firm s  business  model Describes a firm’s business modelE commerce  business  model E? commerce business model Uses/leverages  unique  qualities  of  Internet  and   Web W b Slide 2-3 8 Key Elements of Business Model 1. 2. 3. 4. 5. 6. 7. 8. Value  proposition Revenue  model Market  opportunity Market opportunity Competitive  environment Competitive  advantage Market  strategy Market strategy Organizational  De velopment Management  team Slide 2-4 1. Value Proposition Why  should  the  customer  buy  from  you? h h ld h b f ? Successful  e? ommerce  value   S f l l propositions: Personalization/customization Reduction  of  product  search,  price  discovery  costs Facilitation  of  transactions  by  managing  product   delivery Slide 2-5 2. Revenue Model How  will  the  firm  earn  revenue,  generate   p profits,  and  produce  a  superior  return  on   p p invested  capital? Major  types: Advertising  revenue  model g Subscription  revenue  model Transaction  fee  revenue  model Transaction fee revenue model Sales  revenue  model Affiliate  revenue  model Slide 2-6 3. Market Opportunity What  marketspace  do  you  intend  to   h k d d serve  and  what  is  its  size?Marketspace:  Area  of  actual  or  potential  commercial  value   in  which  companyà ‚  intends  to  operate in which company intends to operate Realistic  market  opportunity:  Defined  by  revenue   potential  in  each  market  niche  in  which  company  hopes  to   potential in each market niche in which company hopes to compete Market  opportunity  typically  divided  into   M k t t it t i ll di id d i t smaller  niches Slide 2-7 4. Competitive Environment Who  else  occupies  your  intended   h l d d marketspace? p Other  companies  selling  similar  products  in  the  same   marketspace Includes  both  direct  and  indirect  competitors Influenced  by: Influenced by:Number  and  size  of  active  competitors Each  competitor s  market  share Each competitor’s market share Competitors’  profitability Competitors pricing Competitors’  pricing Slide 2-8 5. Competitive Advantage Achieved  when  firm: h d h f Produces  superior  pro duct  Ã‚  or Produces superior product or Can  bring  product  to  market  at  lower  price   than  competitors th tit Important  concepts: p p Asymmetries First? mover  advantage Fi t d t Unfair  competitive  advantage Leverage Slide 2-9 6. Market Strategy How  do  you  plan  to  promote  your   products  or  services  to  attract  your   products or services to attract your target  audience?Details  how  a  company  intends  to  enter  market and  attract  customers Best  business  concepts  will  fail  if  not  properly   marketed  to  potential  customers k d i l Slide 2-10 7. Organizational Development What  types  of  organizational  structures   within  the  firm  are  necessary  to  carry  out   within the firm are necessary to carry out the  business  plan? Describes  how  firm  will  organize  work Typically  divided  into  functiona l  departments As  company  grows,  hiring  moves  from  generalists  to   As company grows hiring moves from generalists to specialists Slide 2-11 8.Management Team What  kinds  of  experiences  and   background  are  important  for  the   background are important for the company’s  leaders  to  have? Employees  are  responsible  for  making  the  business  model   work Strong  management  team  gives  instant  credibility  to   outside  investors Strong  management  team  may  not  be  able  to  salvage  a   weak  business  model,  but  should  be  able  to  change  the   model  and  redefine  the  business  as  it  becomes  necessary Slide 2-12 Insight on Business Online Grocers: Finding and Executing the Right Model g g Class Discussion Slide 2-13 Categorizing E-commerce Business ModelsNo  one  correct  way We  categorize  businessà ‚  models  according  to: We categorize business models according to: E? commerce  sector  (B2C,  B2B,  C2C) Type  of  e? commerce  technology;  i. e. m? commerce Type of e commerce technology; i e m commerce Similar  business  models  appear  in  more  than   one  sector Some  companies  use  multiple  business   Some companies use multiple business models;  e. g. eBay Slide 2-14 B2C Business Models: Portal Search  plus  an  integrated  package  of  content   and  services Revenue  models:   d l Advertising,  referral  fees,  transaction  fees,  subscriptions g p Variations:Horizontal  /  General Vertical  /  Specialized  (Vortal) Vertical / Specialized (Vortal) Pure  Search Slide 2-15 Insight on Technology Can Bing Bong Google? Class Discussion Slide 2-16 B2C Models: E-tailer Online  version  of  traditional  retailer Revenue  model:  Sales Variations: Virtual  merchant Virtual merchant Bricks? and? clicks Catalog  merchant C t l h t Manufacturer? direct Low  barriers  to  entry Slide 2-17 B2C Models: Content Provider Digital  content  on  the  Web News,  music,  video Revenue  models:   Revenue models: Subscription;  pay  per  download  (micropayment);   advertising;  affiliate  referral  fees Variations:Content  owners Syndication S di i Web  aggregators Slide 2-18 B2C Models: Transaction Broker Process  online  transactions  for  consumers Primary  value  proposition—saving  time  and  money Revenue  model:   R d l Transaction  fees Industries  using  this  model: Financial  services Travel  services Job  placement  services Slide 2-19 B2C Models: Market Creator Create  digital  environment  where  buyers   and  sellers  can  meet  and  transact Examples:   Priceline eBay y Revenue  model:  Transaction  fees Revenue model: Transaction fee s Slide 2-20 B2C Models: Service Provider Online  services e. g. Google:  Google  Maps,  Gmail,  etc. Value  proposition   Value propositionValuable,  convenient,  time? saving,  low? cost  alternatives  to   traditional  service  providers t diti l i id Revenue  models: Revenue models: Sales  of  services,  subscription  fees,  advertising,  sales  of   marketing  data marketing data Slide 2-21 B2C Models: Community Provider Provide  online  environment  (social   network)  where  people  with  similar   interests  can  transact,  share  content,  and   , , communicate   E. g. Facebook,  MySpace,  LinkedIn,  Twitter Revenue  models: R d l Typically  hybrid,  combining  advertising, subscriptions,  sales,  transaction  fees,  affiliate  fees Slide 2-22 B2B Business Models Net  marketplaces E? istributor E procurement E? procurement Exchange Industry  consortium Industry cons ortium Private  industrial  network Private industrial network Single  firm Industry? wide Industry wide Slide 2-23 B2B Models: E-distributor Version  of  retail  and  wholesale  store,   , MRO  goods  and  indirect  goods Owned  by  one  company  seeking  to  serve   many  customers Revenue  model:  Sales  of  goods Example:  Grainger. com Slide 2-24 B2B Models: E-procurement Creates  digital  markets  where   participants  transact  for  indirect  goods B2B  service  providers,  application  service  providers  (ASPs) B2B service providers application service providers (ASPs)Revenue  model: Service  fees,  supply? chain  management,  fulfillment   services Example:  Ariba Slide 2-25 B2B Models: Exchanges Independently  owned  vertical  digital   p y g marketplace  for  direct  inputs Revenue  model:  Transaction,  commission  fees Revenue model Transaction commission fees C eate po e u co pet t o bet ee Create  powerful  competition  between   suppliers Tend  to  force  suppliers  into  powerful  price   T d f li i f l i competition;  number  of  exchanges  has   dropped  dramatically d dd ll Slide 2-26 B2B Models: Industry Consortia Industry? wned  vertical  digital  marketplace   open  to  select  suppliers More  successful  than  exchanges More successful than exchanges Sponsored  by  powerful  industry  players Strengthen  traditional  purchasing  behavior Revenue  model:  Transaction,  commission  fees R d l T ti i i f Example:  Exostar Example: Exostar Slide 2-27 Private Industrial Networks Designed  to  coordinate  flow  of  communication   among  firms  engaged  in  business  together fi di b i h Electronic  data  interchange  (EDI) Single  firm  networks Most  common  form   M t f Example:  Wal? Mart’s  network   for  suppliersIndustry? wide  networks Often  evolve  out  of  industry  associations   Often evolve out of industry associations Example:  Agentrics Slide 2-28 Other E-commerce Business Models Consumer? to? consumer  (C2C) eBay,  Craigslist Peer? to? peer  (P2P) Peer to peer (P2P) The  Pirate  Bay,  Cloudmark M? commerce: Technology  platform  continues  to  evolve Technology platform continues to evolve iPhone,  smartphones  energizing  interest  in  m? commerce   pp apps Slide 2-29 Insight on Society Where R U? Not Here! Class Discussion Slide 2-30 E-commerce Enablers: Gold Rush ModelE? commerce  infrastructure  companies   p have  profited  the  most: Hardware,  software,  networking,  security E? commerce  software  systems,  payment  systems Media  solutions,  performance  enhancement CRM  software CRM software Databases Hosting  services,  etc. Slide 2-31 How Internet & Web Change Busi ness E? commerce  changes  industry  structure   g y by  changing: Basis  of  competition  among  rivals Barriers  to  entry y Threat  of  new  substitute  products Strength  of  suppliers Bargaining  power  of  buyers Bargaining power of buyers Slide 2-32 Industry Value ChainsSet  of  activities  performed  by  suppliers,   manufacturers,  transporters,  distributors,  and   f di ib d retailers  that  transform  raw  inputs  into  final   products  and  services   Internet  reduces  cost  of  information  and   Internet reduces cost of information and other  transactional  costs Leads  to  greater  operational  efficiencies,   lowering  cost,  prices,  adding  value  for   lowering cost prices adding value for customers Slide 2-33 E-commerce & Industry Value Chains Figure  5. 4 Slide 2-34 Firm Value Chains Activities  that  a  firm  engages  in  to   create inal  products  from  raw  inputs Each  step  adds  value Effect  of  Internet: Eff fI Increases  operational  efficiency p y Enables  product  differentiation Enables  precise  coordination  of  steps  in  chain E bl i di ti f t i h i Slide 2-35 E-commerce & Firm Value Chains Figure  5. 5 Slide 2-36 Firm Value Webs Networked  business  ecosystem   Uses  Internet  technology  to  coordinate  the   value  chains  of  business  partners l h i fb i Coordinates  a  firm’s  suppliers  with  its  own   C di t fi ’ li ith it production  needs  using  an  Internet? based   supply  chain  management  systemSlide 2-37 Internet-Enabled Value Web bl d l b Figure  5. 6 Slide 2-38 Business Strategy Plan  for  achieving  superior  long? term   returns  on  the  capital  invested  in  a   business  firm   business firm Four  Generic  Strategies 1. Di fferentiation   2. Cost 3. Scope 4. 4 Focus Slide 2-39 Chapter 6 E-commerce Marketing Copyright  © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 6-40 Netflix N fli Strengthens and Defends Its Brand Class Discussion Slide 6-41 Consumers Online: Internet Audience & Consumer Behavior Around  70%  (82  million)  U. S. ouseholds  have   Around 70% (82 million) U S households have Internet  access  in  2010 Growth  rate  has  slowed Intensity  and  scope  of  use  both  increasing d f b h Some  demographic  groups  have  much  higher   Some demographic groups have much higher percentages  of  online  usage  than  others   Gender,  age,  ethnicity,  community  type,  income,  education Slide 6-42 Consumers Online: Internet Audience & Consumer Behavior Broadband  audience  vs. dial? up  audience Purchasing  behavior  affected  by   neighborhood Lifestyle  and  sociological  impa cts Use  of  Internet  by  children,  teens Use  of  Internet  as  substitute  for  other  social  activitiesMedia  choices Traditional  media  competes  with  Internet  for  attention Traditional media competes with Internet for attention Slide 6-43 Consumer Behavior Models Study  of  consumer  behavior Social  science   Attempts  to  explain  what  consumers  purchase   Attempts to explain what consumers purchase and  where,  when,  how  much  and  why  they  buy Consumer  behavior  models Predict  wide  range  of  consumer  decisions Predict wide range of consumer decisions Based  on  background  demographic  factors  and   other  intervening,  more  immediate  variables   h i i i di i bl Slide 6-44 General Model of Consumer Behavior Figure  6. Slide 6-45 Background Demographic Factors Culture:  Broadest  impact Subculture  (ethnicity,  age,  lifestyle,  geography) S b lt ( th i it lif t l h ) Social Reference  groups Direct  Ã‚  reference  groups g p Indirect  reference  groups Opinion  leaders  (viral  influencers) Lifestyle  groups   f l Psychological Psychological  profiles Slide 6-46 Online Purchasing Decision Psychographic  research Combines  demographic  and  psychological  data Combines demographic and psychological data Divides  market  into  groups  based  on  social  class,  lifestyle,   and/or  personality  characteristics and/or personality characteristicsFive  stages  in  the  consumer  decision  process: 1. 2. 3. 4. 5. Awareness  of  need Search  for  more  information Evaluation  of  alternatives Actual  purchase  decision Actual purchase decision Post? purchase  contact  with  firm Slide 6-47 Consumer D i i C Decision Process & P Supporting Communications Figure  6. 3 Slide 6-48 Model of Online Consumer Behavior Decision   process  similar  for  online  and  offline   behavior General  online  behavior  model Consumer  skills Product  characteristics Attitudes  toward  online  purchasing Perceptions  about  control  over  Web  environment p Web  site  featuresClickstream  behavior:  Transaction  log  for   Clickstream behavior: Transaction log for consumer  from  search  engine  to  purchase Slide 6-49 Model of Online Consumer Behavior Figure  6. 4 Slide 6-50 Model of Online Consumer Behavior Clickstream  factors  include: Number  of  days  since  last  visit Number of days since last visit Speed  of  clickstream  behavior Number  of  products  viewed  during  last  visit b f d i dd i l ii Number  of  pages  viewed Supplying  personal  information Number  of  days  since  last  purchase Number  of  past  purchasesClickstream  marketing Clickstream marketing Slide 6-51 Shoppers: B rowsers & Buyers Shoppers:  87%  of  Internet  users 72%  buyers 72% buyers 16%  browsers  (purchase  offline) One? third  offline  retail  purchases  influenced  by   O thi d ffli t il h i fl db online  activities Online  traffic  also  influenced  by  offline  brands  and   shopping pp g E? commerce  and  traditional  commerce  are  coupled: part  of  a  continuum  of  consuming  behavior part of a continuum of consuming behavior Slide 6-52 Online Shoppers & Buyers Figure  6. 5 Slide 6-53What Consumers Shop & Buy Online Big  ticket  items  ($500  plus) Travel,  computer  hardware,  consumer  electronics Expanding   Consumers  more  confident  in  purchasing  costlier  items Small  ticket  items  ($100  or  less) ($ ) Apparel,  books,  office  supplies,  software,  etc. Sold  by  first  movers  on  Web Sold by first movers on Web Physically  small  i tems High  margin  items   Broad  selection  of  products  available Slide 6-54 What Consumers Buy Online Figure  6. 6 Slide 6-55 Intentional Acts: How Shoppers Find Vendors Online pp Search  engines  (59%) S h i (59%) Coupon  Web  sites  (29%) Coupon Web sites (29%) Comparison  shopping  sites  (27%) E? ail  newsletters  (25%) Online  shoppers  are  highly  intentional,   looking  for  specific  products,  companies,   services Slide 6-56 Table  6. 6 Slide 6-57 Trust, Utility, Opportunism in Online Markets Two  most  important  factors  shaping  decision   Two most important factors shaping decision to  purchase  online: Utility:   U ili Better  prices,  convenience,  speed Trust: Asymmetry  of  information  can  lead  to  opportunistic   behavior  by  sellers Sellers  can  develop  trust  by  building  strong  reputations   for  honesty,  fairness,  delivery   Slide 6-58 Basic Marketing Concepts MarketingStrategies  and  actions  to  establish  relationship   Strategies and actions to establish relationship with  consumer  and  encourage  purchases  of   p products  and  services Addresses  competitive  situation  of  industries  and   firms Seeks  to  create  unique,  highly  differentiated   products  or  services  that  are  produced  or  supplied   by  one  trusted  firm Unmatchable  feature  set Avoidance  of  becoming  commodity Slide 6-59 Feature Sets Three  levels  of  product  or  service 1. Core  product e. g. cell  phone g p 2. Actual  product Characteristics  that  deliver  core  benefits Ch t i ti th t d li b fit e. g. wide  screen  that  connects  to  Internet 3. Augmented  productAdditional  benefits Basis  for  building  the  product’s  brand e. g. product  warranty Slide 6-60 Featu re Set Figure  6. 7 Slide 6-61 Products, Brands & Branding Process Brand: Expectations  consumers  have  when  consuming,  or   thinking  about  consuming,  a  specific  product Most  important  expectations:  Quality,  reliability,   Most important expectations: Quality reliability consistency,  trust,  affection,  loyalty,  reputation Branding:  Process  of  brand  creation Branding: Process of brand creation Closed  loop  marketing Brand  strategy Brand  equity Brand eq it Slide 6-62 Marketing A ti iti M k ti Activities: From Products to Brands Figure  6. 8Slide 6-63 STP: Segmenting, Targeting, Positioning Major  ways  used  to  segment,  target  customers 1. 2. 3. 4. 5. 6. Behavioral B h i l Demographic Psychographic h hi Technical Contextual Search Within  segment,  product  is  positioned and  branded  as   a  unique,  high? value  product,  especially  suited  to   q g p p y ne eds  of  segment  customers Slide 6-64 Are Brands Rational? For  consumers,  a  qualified  yes: Brands  introduce  market  efficiency  by  reducing  search  and   decision? making  costs For  business  firms,  a  definite  yes: A  major  source  of  revenue Lower  customer  acquisition  cost Increased  customer  retention Successful  brand  constitutes  a  long? asting  (though  not   necessarily  permanent)  unfair  competitive  advantage Slide 6-65 Can Brands Survive Internet? Brands & Price Dispersion p Early  postulation:   Law  of  One  Price ;  end  of  brands Early postulation: â€Å"Law of One Price†; end of brands Instead: Consumers  still  pay  premium  prices  for  differentiated   products E? commerce  firms  rely  heavily  on  brands  to  attract   customers  and  charge  premium  prices Substantial  price  dispersion Large  differences  in  price  sensitivity  for  same  product Large differences in price sensitivity for same product â€Å"Library  effect† Slide 6-66Revolution in Internet Marketing Technology Three  broad  impacts: Scope  of  marketing  communications  broadened   Richness  of  marketing  communications  increased g Information  intensity  of  marketplace  expanded Internet  marketing  technologies: Internet marketing technologies: Web  transaction  logs Cookies  and  Web  bugs Cookies and Web bugs Databases,  data  warehouses,  data  mining Advertising  networks Customer  relationship  management  systems Slide 6-67 Web Transaction LogsBuilt  into  Web  server  software Record  user  activity  at  Web  site y Webtrends:  Leading  log  analysis  tool Provides  much  marketing  data,  especially  Ã‚   Provides much marketing data especially combined  with: Registratio n  forms R i i f Shopping  cart  database Answers  questions  such  as: What  are  major  patterns  of  interest  and  purchase? After  home  page,  where  do  users  go  first? Second? Slide 6-68 Cookies & Web Bugs Cookies: Small  text  file  Web  sites  place  on  visitor’s  PC  every  time   they  visit,  as  specific  pages  are  accessed Provide  Web  marketers  with  very  quick  means  of   identifying  customer  and  understanding  prior  behavior Flash  cookiesWeb  bugs: Tiny  (1  pixel)  graphics  embedded  in  e mail  and  Web  sites Tiny (1 pixel) graphics embedded in e? mail and Web sites Used  to  automatically  transmit  information  about  user  and   page being viewed to monitoring server page  being  viewed  to  monitoring  server Slide 6-69 Insight on Society g y Every Move You Make, Every Click You Make, Weâ₠¬â„¢ll Be Tracking You , g Class Discussion Slide 6-70 Databases Database:  Ã‚  Stores  records  and  attributes Database  management  system  (DBMS):   Software  used  to  create,  maintain,  and  access  databasesSQL  (Structured  Query  Language): Industry? standard  database  query  and  manipulation  language  used  in   y q y p g g a  relational  database Relational  database: Represents  data  as  two? dimensional  tables  with  records  organized  in   rows  and  attributes  in  columns;  data  within  different  tables  can  be   flexibly  related  as  long  as  the  tables  share  a  common  data  element flexibly related as long as the tables share a common data element Slide 6-71 Relational Database View of E-commerce Customers Figure  6. 12 Slide 6-72 Data Warehouses & Data Mining Data  warehouse:Collects  firm s  transactional  and  custom er  data  in  single   Collects firm’s transactional and customer data in single location  for  offline  analysis  by  marketers  and  site   managers Data  mining: Analytical  techniques  to  find  patterns  in  data,  model   Analytical techniques to find patterns in data model behavior  of  customers,  develop  customer  profiles Query? driven  data  mining Query driven data mining Model? driven  data  mining Rule? based  data  mining l b dd Collaborative  filtering Slide 6-73 Data Mining & Personalization Figure  6. 13 Slide 6-74 Insight on TechnologyThe Long T il Big Hits and Big Misses Th L Tail: Bi Hi d Bi Mi Class Discussion Slide 6-75 Customer Relationship Management ( (CRM) Systems ) y Record  all  contact  that  customer  has  with  firm Generates  customer  profile  available  to  everyone  in firm  with  need  to  Ã¢â‚¬Å"know  the  customer† fi ith d t â€Å"k th t † Customer profiles can contain: ustomer  profiles  can  contain: Map  of  the  customer’s  relationship  with  the  firm Product  and  usage  summary  data Demographic  and  psychographic  data Profitability  measures Contact  history   Contact history Marketing  and  sales  information Slide 6-76Customer Relationship Management System Figure  6. 14 Slide 6-77 Market Entry Strategies Figure  6. 15 Slide 6-78 Establishing Customer Relationship Advertising  Networks Banner  advertisements Ad  server  selects  appropriate  banner  ad  based  on   Ad server selects appropriate banner ad based on cookies,  Web  bugs,  backend  user  profile   databases Permission  marketing Permission marketing Affiliate  marketing g Slide 6-79 How Advertising Network Works e. g. , DoubleClick Figure  6. 16 Slide 6-80 Establishing Customer Relationship (cont’d) Viral  marketingGett ing  customers  to  pass  along  company’s  marketing   message  to  friends,  family,  and  colleagues Blog  marketing Using  blogs  to  market  goods  through  commentary  and   U i bl k d h h d advertising Social  network  marketing,  social  shopping   Mobile  marketing Mobile marketing Slide 6-81 Insight on Business Social Network Marketing: Let’s Buy Together Class Discussion Slide 6-82 Establishing Customer Relationship (cont’d) Wisdom  of  crowds  (Surowiecki,  2004) ( , ) Large  aggregates  produce  better  estimates  and  judgments Examples:   E l Prediction  markets Folksonomies Social  tagging Social taggingBrand  leveraging Slide 6-83 Customer Retention: Strengthening Customer Relationship p Mass  marketing Mass marketing Direct  marketing Micromarketing   Micromarketing Personalized,  one? to? one  marketing  Ã‚   Segmenting  market  on  precise  a nd  timely  understanding  of   Segmenting market on precise and timely understanding of individual’s  needs Targeting  specific  marketing  messages  to  these  individuals Positioning  product  vis? a? vis  competitors  to  be  truly  unique Personalization Can  increase  consumers  sense  of  control,  freedom Can  also  result  in  unwanted  offers  or  reduced  anonymity Slide 6-84Mass Market-Personalization Continuum Figure  6. 17 Slide 6-85 Other Customer Retention Marketing Technics Customization Customer  co? production Transactive  content:   Combine  traditional  content  with  dynamic  information   tailored  to  each  user’s  profile Customer  service FAQs Q Real? time  customer  service  chat  systems Automated  response  systems Automated response systems Slide 6-86 Net Pricing Strategies Pricing Integral  part  of  marketing  strategy I t l t f k ti t t Traditionally  based  on:   Fixed  cost   Variable  costs   Demand  curve Price  discrimination Price discriminationSelling  products  to  different  people  and  groups   based  on  willingness  to  pay Slide 6-87 Net Pricing Strategies (cont’d) Free  and  freemium Can  be  used  to  build  market  awareness Versioning Creating  multiple  versions  of  product  and  selling   essentially  same  product  to  different  market  segments   at  different  prices at different prices Bundling Offers  consumers  two  or  more  goods  for  one  price Off t d f i Dynamic  pricing: Auctions Yield  management Slide 6-88 Channel Management Strategies Channels: Different  methods  by  which  goods  can  be  distributed  and   soldChannel  conflict: When  new  venue  for  selling  products  or  services  threatens   gp or  destroy s  existing  sales  venues E. g. online  airline/travel  services  and  Ã‚  traditional  offline   travel  agencies Some  manufacturers  are  using  partnership   gp p model  to  avoid  channel  conflict   Slide 6-89 Chapter 7: E-commerce Marketing Communications Chapter 7 E-commerce Advertising Copyright  © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 7-90 Video Ads: Shoot, Click, Buy Class Discussion Slide 7-91 Marketing Communications Two  main  purposes:Sales  Ã¢â‚¬â€œ promotional  sales  communications   Branding  Ã¢â‚¬â€œ b di B di branding  communications i i Online  marketing  communications Online marketing communications Takes  many  forms Online  ads,  e? mail,  public  relations,  Web   sites Slide 7-92 Online Advertising li d i i $25  billion,  15%  of  all  advertising Advantages: Internet  is  where  audience  is  moving g Ad  targeting Greater  opp ortunities  for  interactivity Greater opportunities for interactivity Disadvantages: Cost  versus  benefit How  to  adequately  measure  results Supply  of  good  venues  to  display  ads Slide 7-93 Online Advertising from 2002-2014 Figure  7. Slide 7-94 Forms of Online Advertisements Display  ads Rich  media Video  ads Search  engine  advertising Social  network,  blog,  and  game  advertising Social network blog and game advertising Sponsorships Referrals  (affiliate  relationship  marketing) E? mail  marketing g Online  catalogs Slide 7-95 Display Ads Banner  ads Rectangular  box  linking  to  advertiser’s  Web  site IAB  guidelines e. g. Full  banner  is  468  x  60  pixels,  13K e g Full banner is 468 x 60 pixels 13K Pop? up  ads Appear  without  user  calling  for  them Provoke  negative  consumer  sentiment g Twice  as  effective  as  normal  banner  ads Pop? nder  ads:  Open  beneath  browser  window Pop under ads: Open beneath browser window Slide 7-96 Rich Media Ads Use  Flash,  DHTML,  Java,  JavaScript About  7%  of  all  online  advertising  expenditures Tend  to  be  more  about  branding d b b b di Boost  brand  awareness  by  10% Boost brand awareness by 10% IAB  standards  limit  length Interstitials Superstitials Slide 7-97 Video Ads Fastest  growing  form  of  online  advertisement IAB  standards Linear  video  ad Non? linear  video  ad In? banner  video  ad In? text  video  ad Ad placement Advertising  networks Advertising  exchanges Banner  swappingSlide 7-98 Search Engine Advertising h i d i i Almost  50%  of  online  ad  spending  in  2010 Types: Paid  inclusion  or  rank Paid inclusion or rank Inclusion  in  search  results Sponsored  link  areas p Keyword  advertising e. g. Google  AdWords e g Google AdWords Network  keyword  advertising  (context   advertising) d ii ) e. g. Google  AdSense Slide 7-99 Search Engine Advertising (cont’d) Nearly  ideal  targeted  marketing Nearly ideal targeted marketing Issues:   Disclosure  of  paid  inclusion  and  placement   practices Click  fraud   Ad  nonsense   Slide 7-100 Mobile Advertising Half  of  U. S.Internet  users  access  Internet   Half of U. S. Internet users access Internet with  mobile  devices Currently  small  market,  but  fastest   growing  platform  (35%) growing platform (35%) Google  and  Apple  in  race  to  develop   Google and Apple in race to develop mobile  advertising  platform AdMob,  iAd Slide 7-101 Sponsorships & Referrals Sponsorships Paid  effort  to  tie  advertiser s  name  to   Paid effort to tie advertiser’s name to particular  information,  event,  venue  in  a  way   that  reinforces  brand  in  positive  yet  not  overtly   that reinforces brand in positive yet not overtly commercial  manner ReferralsAffiliate  relationship  marketing p g Permits  firm  to  put  logo  or  banner  ad  on   another  firm’s  Web  site  from  which  users  of   th fi ’ W b it f hi h f that  site  can  click  through  to  affiliate’s  site Slide 7-102 E-mail Marketing & Spam Explosion Direct  e? mail  marketing   Low  cost,  primary  cost  is  purchasing  addresses Spam:  Unsolicited  commercial  e? mail Spam: Unsolicited commercial e mail Approx. 90%  of  all  e? mail Efforts  to  control  spam: Technology  (filtering  software)   Government  regulation  (CAN? SPAM  and  state  laws) Voluntary  self? regulation  by  industries  (DMA  ) y g y Volunteer  efforts Slide 7-103Percentage of E-mail That Is Spam Figure 7. 6 Slide 7-104 Online Catalogs Equivalent  of  paper? based  catalogs Graphics? intense;  use  increasing  with  increase   in  broadband  use in broadband use Two  types: 1. 2. 2 Full? page  spreads,  e. g. Landsend. com Grid  displays,  e. g. Amazon Grid displays e g Amazon In  general,  online  and  offline  catalogs   complement  each  other Slide 7-105 Social Marketing â€Å"Many? to? many†Ã‚  model Uses  digitally  enabled  networks  to  spread  ads Blog  advertising   Blog advertising Online  ads  related  to  content  of  blogs Social  network  advertising:   Social network advertising:Ads  on  MySpace,  Facebook,  YouTube,  etc. Game  advertising:   G d ti i Downloadable  Ã¢â‚¬Å"advergames† Placing  brand? name  products  within  games Slide 7-106 Insight on Society g y Marketing to Children of the Web in the Age of Social Networks g Class Discussion Slide 7-107 Behavioral Targeting Interest? based  advertising Data  aggregators  develop  profiles Data aggregators develop profiles Search  engine  queries Online  browsing  history O li b i hi Offline  data  (income,  education,  etc. ) d Information  sold  to  3rd party  advertisers,  who  deliver   ads  based  on  profile Ad  exchanges Privacy  concerns acy co ce s Consumer  resistance Slide 7-108Mixing Off-line & Online Marketing Communications g Most  successful  marketing  campaigns   M t f l k ti i incorporate  both  online  and  offline  tactics Offline  marketing Drive  traffic  to  Web  sites Drive traffic to Web sites Increase  awareness  and  build  brand  equity Consumer  behavior  increasingly  multi? channel 60%  consumers  research  online  before  buying  offline % y g Slide 7-109 Insight on Business g Are the Very Rich Different From You and Me? Class Discussion Sl ide 7-110 Online Marketing Metrics: Lexicon Measuring  audience  size  or  market  share Impressions I i Click? through  rate  (CTR) View? hrough  rate  (VTR) Vi th h t (VTR) Hits Page  views P i Stickiness  (duration) Unique  visitors Loyalty Reach Recency Slide 7-111 Online Marketing Metrics (cont’d) Conversion  of  visitor   Conversion of visitor to  customer Acquisition  rate q Conversion  rate Browse? to? buy? ratio View? to? cart  ratio Vi t t ti Cart  conversion  rate Checkout  conversion  rate   Checkout conversion rate Abandonment  rate Retention  rate Attrition  rate E mail  metrics E? mail metrics Open  rate Delivery  rate Delivery rate Click? through  rate   (e mail) (e? mail) Bounce? back  rate Slide 7-112 Online Consumer Purchasing ModelFigure  7. 8 Slide 7-113 How Well Does Online Adv. Work? Ultimately  measured  by  ROI  on  ad  campaign Highest  click? through  rates:  Searc h  engine  ads,   Permission  e mail  campaigns Permission e? mail campaigns Rich  media,  video  interaction  rates  high Online  channels  compare  favorably  with  traditional Most  powerful  marketing  campaigns  use  multiple   Most powerful marketing campaigns use multiple channels,  including  online,  catalog,  TV,  radio,   newspapers,  stores newspapers, stores Slide 7-114 Comparative Returns on Investment Figure  7. 9 Slide 7-115 Costs of Online Advertising Pricing  modelsBarter Cost  per  thousand  (CPM) Cost  per  click  (CPC)   Cost  per  action  (CPA)   Cost per action (CPA) Online  revenues  only Sales  can  be  directly  correlated Sales can be directly correlated Both  Ã‚  online/offline  revenues Offline  purchases  cannot  always  be  directly  related  to  online   Offli h t l b di tl l t dt li campaign In  general,  online  marketing  more   expensive  on  CPM   In general online marketing more expensive on CPM basis,  but  more  effective Slide 7-116 Web Site Activity Analysis b i i i l i Figure  7. 10 Slide 7-117 Insight on Technology It’s 10 P. M. Do You Know Who Is On Your Web Site? Class Discussion Slide 7-118Web Site †¦ as Marketing Communications Tool g Web  site  as  extended  online  advertisement W b i d d li d i Domain  name:  An  important  role   Domain name: An important role Search  engine  optimization:   Search engine optimization: Search  engines  registration Keywords  in  Web  site  description K d i W b it d i ti Metatag  and  page  title  keywords Links  to  other  sites k h Slide 7-119 Web Site Functionality b i i li Main  factors  in  effectiveness  of  interface Utility Ease  of  use Top  factors  in  credibility  of  Web  sites: Top factors in credibility of Web sites: Design  look Info rmation  design/structure g / Information  focusOrganization  is  important  for  first time  users,  but   Organization is important for first? time users but declines  in  importance Information content becomes major factor attracting Information  content  becomes  major  factor  attracting   further  visits Slide 7-120 Factors in Credibility of Web Sites Figure  7. 11 Slide 7-121 Table  7. 9 Slide 7-122 Chapter 8: Ethical, Social, and Political Issues in E-commerce E commerce Chapter 8 Ethics, Law, E-commerce Copyright  © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 8-123 Ethical, Social, Political Issues in E-commerceInternet,  like  other  technologies,  can: Internet like other technologies can: Enable  new  crimes Affect  environment Threaten  social  values Costs  and  benefits  must  be  carefully   considered,  especially  when  there  are  no   id d i ll h h g g clear? c ut  legal  or  cultural  guidelines Slide 8-124 Model for Organizing Issues Issues  raised  by  Internet  and  e? commerce  can  be  viewed  at  individual,   social,  and  political  levels social and political levels Four  major  categories  of  issues: Four major categories of issues: Information  rights Property  rights Property rights Governance Public  safety  and  welfare Slide 8-125Moral Dimensions of Internet Society M l Di i f I S i Figure  8. 1 Slide 8-126 Basic Ethical Concepts i hi l Ethics Study  of  principles  used  to  determine  right  and  wrong  courses  of   action Responsibility p y Accountability Liability Laws  permitting  individuals  to  recover  damages Due  process Laws  are  known,  understood Laws are known understood Ability  to  appeal  to  higher  authorities  to  ensure  laws  applied  correctly Slide 8-127 Analyzing Ethical Dilemmas l i hi l il Process  for  analyzing  ethical  dilemmas: 1. 2. 3. 3 4. 5. Identify  and  clearly  describe  the  facts Define  the  conflict  or  dilemma  and  identify  the   y higher? rder  values  involved Identify  the  stakeholders Identify the stakeholders Identify  the  options  that  you  can  reasonably   take t k Identify  the  potential  consequences  of  your   options Slide 8-128 Candidate Ethical Principles Golden  Rule Universalism Slippery  Slope Collective  Utilitarian  Principle Risk  Aversion Ri k A i No  Free  Lunch The  New  York  Times  Test The  Social  Contract  Rule Slide 8-129 Privacy & Information Rights Privacy: Moral  right  of  individuals  to  be  left  alone,  free   from  surveillance  or  interference  from  other   individuals  or  organizations Information  privacy p y Subset  of  privacy Includes:The  claim  th at  certain  information  should  not  be   collected  at  all The  claim  of  individuals  to  control  the  use  of  whatever   h l i f i di id l l h f h information  is  collected  about  them Slide 8-130 Privacy & Information Rights (cont. ) Major  ethical  issue  related  to  e? commerce   and  privacy:   d i Under  what  conditions  should  we  invade  the   privacy  of  others? Major  social  issue:   j Development  of  Ã¢â‚¬Å"expectations  of  privacy†Ã‚  and   privacy  norms privacy norms Major  political  issue: Development  of  statutes  that  govern  relations   D l t f t t t th t l ti between  recordkeepers  and  individuals Slide 8-131 Information Collected at E-commerce SitesData  collected  includes Personally  identifiable  information  (PII) Anonymous  information Anonymous information Types  of  data  collected yp Name,  a ddress,  phone,  e? mail,  social  security Bank  and  credit  accounts,  gender,  age,  occupation,   B k d di d i education Preference  data,  transaction  data,  clickstream  data,   browser  type Slide 8-132 Social Networks & Privacy Social  networks Encourage  sharing  personal  details Pose  unique  challenge  to  maintaining   privacy Facebook s  Beacon  program Facebook’s Beacon program Facebook s  Terms  of  Service  change Facebook’s Terms of Service change Slide 8-133 Profiling & Behavioral Targeting ProfilingCreation  of  digital  images  that  characterize  online  individual  and   group  behavior Anonymous  profiles A fil Personal  profiles Personal profiles Advertising  networks Track  consumer  and  browsing  behavior  on  Web T k db i b h i W b Dynamically  adjust  what  user  sees  on  screen Build  and  refresh  profiles  of  consumers Google’s AdWords program Slide 8-134 Profiling & Behavioral Targeting (cont’d) Deep  packet  inspection Business  perspective: Web  profiling  serves  consumers  and  businesses Increases  effectiveness  of  advertising,  subsidizing  free   content Enables  sensing  of  demand  for  new  products  and  services Critics  perspective:Undermines  expectation  of  anonymity  and  privacy Consumers  show  significant  opposition  to  unregulated   collection  of  personal  information Enables  weblining Slide 8-135 Internet & Government Invasions of Privacy Various  laws  strengthen  ability  of  law  enforcement   agencies  to  monitor  Internet  users  without   i i I ih knowledge  and  sometimes  without  judicial  oversight CALEA,  PATRIOT  Act,  Cyber  Security  Enhancement  Act,   Homeland  Security  Act Government  agencies  are  largest  users  of  private   sector  commercial  data  brokers sector commercial data brokers Retention  by  ISPs  of  user  data  a  concern Slide 8-136Legal Protections In  U. S. ,  privacy  rights  explicitly  granted  or   derived  from Constitution   Constitution First  Amendment  Ã‚  Ã¢â‚¬â€œ freedom  of  speech  and  association Fourth  Amendment  Ã‚  Ã¢â‚¬â€œ unreasonable  search  and  seizure F th A d t bl h d i Fourteenth  Amendment  Ã‚  Ã¢â‚¬â€œ due  process Specific  statutes  and  regulations  (federal  and   Specific statutes and regulations (federal and state) Common  law Slide 8-137 Informed Consent U. S. firms  can  gather  and  redistribute   transaction  information  without  individual’s   i i f i ih i di id l’ informed  consent Illegal  in  Europe Informed  consent: Opt? in   Opt out Opt? out Many  U. S. ? commerce  firm s  merely  publish  information   p practices  as  part  of  privacy  policy  without  providing  for   p p yp y p g any  form  of  informed  consent Slide 8-138 FTC’s Fair Information Practices Principles Federal  Trade  Commission: Federal Trade Commission: Conducts  research  and  recommends  legislation  to  Congress Fair  Information  Practice  Principles  (1998): Fair Information Practice Principles (1998): Notice/Awareness  (Core) Choice/Consent  (Core) Choice/Consent (Core) Access/Participation Security Enforcement Guidelines,  not  laws Guidelines not laws Slide 8-139 FTC’s Fair Information Practice PrinciplesNotice/Awareness i / Sites  must  disclose  information  practices  before  collecting  data. Includes Sit t di l i f ti ti b f ll ti d t I l d identification  of  collector,  uses  of  data,  other  recipients  of  data,  nature  of   collection  (ac tive/inactive),  voluntary  or  required,  consequences  of  refusal,  and   steps  taken  to  protect  confidentiality,  integrity,  and  quality  of  the  data Choice/Consent There  must  be  a  choice  regime  in  place  allowing  consumers  to  choose  how   their  information  will  be  used  for  secondary  purposes  other  than  supporting   the  transaction,  including  internal  use  and  transfer  to  third  parties.Opt? in/Opt? out  must  be  available. Consumers  should  be  able  to  review  and  contest  the  accuracy  and   completeness  of  data  collected  about  them  in  a  timely,  inexpensive  process. Access/Participation ccess/ a c pa o Security y Enforcement Data  collectors  must  take  reasonable  steps  to  assure  that  consumer   information  is  accurate  and  secure  from   unauthorized  use. There  must  be  in  place  a  mechanism  to  enforce  FIP principles. This  can  involve  self? regulation,  legislation  giving  consumers  legal   remedies  for  violations,  or  federal  statutes  and  regulation. di f i l ti f d l t t t d l ti Slide 8-140FTC Recommendations: Online Profiling Principle p Notice Recommendation Complete  transparency  to  user  by  providing  disclosure  and  choice  options   on  the  host  Web  site. â€Å"Robust†Ã‚  notice  for  PII  (time/place  of  collection;   before  collection  begins). Clear  and  conspicuous  notice  for  non PII. before  collection  begins). Clear  and  conspicuous  notice  for  non? PII. Opt? in  for  PII,  opt? out  for  non? PII. No  conversion  of  non? PII  to  PII  without   consent. Opt? out  from  any  or  all  network  advertisers  from  a  single  page   consent Opt out from any or all network advertisers from a single page provided  by  the  host  Web  site.Reasonable  provisions  to  allow  inspection  and  correction. Reasonable  efforts  to  secure  information  from  loss,  misuse,  or  improper   access. Done  by  independent  third  parties,  such  as  seal  programs  and  accounting   Done by independent third parties such as seal programs and accounting firms. medical  topics,  sexual  behavior  or  sexual  orientation,  or  use  Social  Security   medical topics sexual behavior or sexual orientation or use Social Security numbers  for  profiling. Slide 8-141 Choice Access Security EnforcementRestricted  Collection Advertising  networks  will  not  collect  information  about  sensitive  financial  or European Data Protection Directive Privacy  protection  much  stronger  inà ‚  Europe  than  U. S. European  approach:   Comprehensive  and  regulatory  in  nature p g y European  Commission’s  Directive  on  Data  Protection   (1998):   (1998): Standardizes  and  broadens  privacy  protection  in  European  Union   countries Department  of  Commerce  safe  harbor  program: For  U. S. firms  that  wish  to  comply  with  Directive Slide 8-142 Private Industry Self-RegulationSafe  harbor  programs: Private  policy  mechanism  to  meet  objectives  of   Pi t li h i t t bj ti f government  regulations  without  government  involvement e. g. Privacy  seal  programs e g Privacy seal programs Industry  associations  include: Online  Privacy  Alliance  (OPA) Network  Advertising  Initiative  (NAI) CLEAR  Ad  Notice  Technical  Specifications Privacy  advocacy  groups Emerging  privacy  protection  business Slide 8-143 Insight on Business Chief Privacy Officers hi f i ffi Class Discussion Slide 8-144 Technological Solutions Spyware,  pop? p  blockers Cookie  managers k Anonymous  remailers,  surfing Anonymous remailers surfing Platform  for  Privacy  Preferences  (P3P):   Comprehensive  technological  privacy  protection  standard Works  through  user s  Web  browser Works through user’s Web browser Communicates  a  Web  site’s  privacy  policy Compares  site  policy  to  user’s  preferences  or  to  other  standards   such  as  FTC’s  FIP  guidelines  or  EU’s  Data  Protection  Directive Slide 8-145 How P3P Works k Figure  8. 2(A) Slide 8-146 Insight on Technology The Privacy T Th P i Tug of War: fW Advertisers Vs. Consumers Class Discussion Slide 8-147 Intellectual Property Rights Intellectual  property:Encompasses  all  tangible  and  intangible  products  of  human   mind Major  ethical  issue: j How  should  we  treat  property  that  belongs  to  others? Major  social  issue: Major social issue: Is  there  continued  value  in  protecting  intellectual  property  in  the   Internet  age? Major  political  issue: How  can  Internet  and  e? commerce  be  regulated  or  governed  to   g g protect  intellectual  property? Slide 8-148 Intellectual Property Protection Three  main  types  of  protection: Copyright Patent Trademark  law Trademark law Goal  of  intellectual  property  law: Balance  two  competing  interests  Ã¢â‚¬â€ public  and   B l t ti i t t bli d privateMaintaining  this  balance  of  interests  is  always   M i t i i thi b l fi t t i l challenged  by  the  invention  of  new   technologies Slide 8-149 Copyright Protects  original  forms  of  expression  (but  not   ideas)  from   being  copied  by  others  for  a  Ã‚   ideas) from being copied by others for a period  of  time Look  and  feel  copyright  infringement  lawsuits Fair  use  doctrine Fair use doctrine Digital  Millennium  Copyright  Act,  1998 First  major  effort  to  adjust  copyright  laws  to  Internet  age Implements  WIPO  treaty  that  makes  it  illegal  to  make,   distribute,  or  use  devices  that  circumvent  technology? ased  protections  of  copyrighted  materials Slide 8-150 Patents Grant  owner  20? year  monopoly  on  ideas  behind  an   invention Machines Man? made  products p Compositions  of  matter Processing  methods Invention  must  be  new,  non? obvious,  novel Encourages  inventors g Promotes  dissemination  of  new  techniques  through   licensing Stifles  competition  by  raising  barriers  to  entry Slide 8-151 E-co mmerce Patents 1998  State  Street  Bank  &  Trust  v. Signature  Financial   Group Business  method  patents Led  to  explosion  in  application  for  e? commerce  Ã¢â‚¬Å"business   L dt l i i li ti f â€Å"b i methods†Ã‚  patentsMost  European  patent  laws  do  not  recognize   M tE t tl d t i business  methods  unless  based  on  technology Examples Amazon’s  One? click  purchasing DoubleClick’s  dynamic  delivery  of  online  advertising Slide 8-152 Trademarks d k Identify,  distinguish  goods  and  indicate  their   source Purpose p Ensure  Ã‚  consumer  gets  what  is  paid  for/expected  to  receive Protect  owner  against  piracy  and  misappropriation Infringement Market  confusion Bad  faith Dilution Behavior  that  weakens  connection  between  trademark   and  product Slide 8-153 Trademarks & Internet CybersquattingAnticy bersquatting  Consumer  Protection  Act  (ACPA) Cyberpiracy Typosquatting Metatagging M i Keywording y g Deep  linking Framing Slide 8-154 Governance Primary  questions Who  will  control  Internet  and  e? commerce? What  elements  will  be  controlled  and  how? What elements will be controlled and how? Stages  of  governance  and  e? commerce g g Government  Control  Period  (1970–1994) Privatization  (1995–1998) Privatization (1995 1998) Self? Regulation  (1995–present) Government  Regulation  (1998–present) Slide 8-155 Who Governs E-commerce & Internet? Mixed  mode  environmentSelf? regulation,  through  variety  of  Internet  policy   and  technical  bodies,  co exists  with  limited   and technical bodies co? exists with limited government  regulation ICANN  :  Domain  Name  System Internet  could  be  easily  controlled,   I t t ld b il t ll d m onitored,  and  regulated  from  a  central   location Slide 8-156 Taxation E? commerce  taxation  illustrates  complexity  of   governance  and  jurisdiction  issues governance and jurisdiction issues U. S. sales  taxed  by  states  and  local  government MOTO  retailing E? commerce  benefits  from  tax  Ã¢â‚¬Å"subsidy† yOctober  2007:  Congress  extends  tax  moratorium  for   an  additional  seven  years an additional seven years Unlikely  that  comprehensive,  integrated  rational   approach  to  taxation  issue  will  be  determined  for   approach to taxation issue will be determined for some  time  to  come Slide 8-157 Net Neutrality Currently,  all  Internet  traffic  treated  equally  Ã¢â‚¬â€œ all  activities  charged  the  same  rate,  no   ll i i i h d h preferential  assignment  of  bandwidth Backbone  providers  would  like  to  charge   differentiated  prices  and  ration  bandwidth 2010,  U. S. ppeals  court  ruled  that  FCC  had  no   authority  to  regulate  Internet  providers Slide 8-158 Public Safety & Welfare Protection  of  children  and  strong   g sentiments  against  pornography Passing  legislation  that  will  survive  court   P i l i l ti th t ill i t challenges  has  proved  difficult Efforts  to  control  gambling  and  restrict   sales  of  drugs  and  cigarettes sales of drugs and cigarettes Currently  mostly  regulated  by  state  law Unlawful  Internet  Gambling  Enforcement  Act Slide 8-159 Insight on Society Internet Drug Bazaar Class Discussion Slide 8-160