Thursday, October 31, 2019
Europes power is inevitably declining relative to other powers Essay
Europes power is inevitably declining relative to other powers - Essay Example The most applicable technique used to determine this phenomenon is to pose an overarching question, which enables the placement of Europe in an intelligible conceptual milieu: When does a super power cease to be â€Å"super†? This question obliges the re-interrogation of superiority, power and decides, as well as revalidation of historical perspectives, which underpin the current disquiet concerning the shifting international order. In Europe, concerns regarding its superiority, decline and power continue to be a staple component of popular and scholarly discourse, but they are rising in intensity because of current financial crisis experienced in Europe. Europe’s power is inevitably declining as the individual states, as well as their societies and production systems continue to decline. The military and economic criterion explores a nation or region’s capacity to fit the description of greatness or superiority. Military power has a notable economic basis since heavy defense spending has significant effects on a nation’s or region’s economy. Europe’s decline is perhaps most notable in international politics, and these effects emerged with stark clarity in the events concerning the Balkan crises, as well as the war in Iraq. In the case of the Iraq war, Europeans only watched helplessly as the senseless war, which they did not even desire, transpire and had to sustain a substantial share of the mammoth costs generated by the war. It is quite evident that Europe no longer carries any significant weight on the topic of international politics and is currently subject to the US’ hegemony (Rifkin 112). This reality became quite apparent at the end of the World War 2 and the Cold War. Notably, the hegemony of the US had a prominent rival in the USSR, which prevented Europe from feeling dominated by the US. US’ subtle domination of Europe gave Europeans the inaccurate sensation that they were making contributions to the realization of a joint project and defense of shared values. Today, the danger lies not in USSR domination but in terrorism, funded by fundamentalist Islamic groups whose networks extend throughout the world. Today, American hegemony does little to guarantee European security in light of this danger. It is evident that Europe could play a pivotal role in eradicating terrorism at grass root level, favoring economic development, unity and a democratic evolution Middle Eastern and North West African country with which Europe enjoys positive relations. This positive relationship is characterized by Europe’s geographical proximity, as well as close interdependence with nations in the region. However, Europe’s impotence prevents it from playing its role effectively in this area and other sensitive global regions (Manners 238). As a consequent, Europe finds itself more and more often, serving to make up the numbers that create international equilibrium while new actors such as India, China and Brazil enter the world and old actors such as Russia make an unmistakable comeback. Europe is rapidly exiting the scene as it continues to count for less than other powers in terms of strategic calculations regarding international events. On the other hand, Europe is inevitably declining on the economic front. This is notable in the declining trend experienced by the leading eurozone countries, which are currently showing, relative to their GDPs, relatively weak and negative growth trends. Unemployment rates in most European nations are current sky high. The countries’ production systems are inevitably becoming unable to fend off the
Tuesday, October 29, 2019
EXPENDITURE PLANNING AND CONTROL Essay Example | Topics and Well Written Essays - 1750 words
EXPENDITURE PLANNING AND CONTROL - Essay Example Conclusion......................................................................................13 Appendix A: Time and Cost Calculation................................................15 Appendix B: Preliminaries cost due to the Prolongation of the Works. 15 References 16 Bibliography 17 Expenditure Planning and Control – Assignment 1 I. Introduction I have been instructed by the main contractor (‘the Contractor’) to prepare a report in relation to a construction project which has experienced significant problems from the get go, which have resulted in delay and disruptions during the course of the Works. These delays and disruptions have inevitably affected the Contractor’s ability to complete the work in a timely fashion. This report provides an independent assessment of the surrounding particulars and contract documentation with a view to resolving the matter. I have specifically been instructed to include in the report the following points: an analysis of the delays; extension of time (‘EOT’); liquidated damages; valuation of work and claims for loss and / or expense. Generally speaking, I am instructed to provide my opinion in relation to the parties’ rights and obligations under the contract. The report begins by outlining in brief the ‘Background Facts’ and issues which arose (see section II). Section III of the report provides an ‘Analysis of the Issues’. Under this section, each problem is addressed in chronological order. The ‘Procedural Issues’ are set out at section IV. Section V addresses the ‘Methods of Quantification’. Finally, section VI is the Conclusion. II. Background Facts The contract was entered into by the parties for the construction of an extension to a cancer centre at a hospital in the north east (‘the project’). The project can be more specifically summarised as the construction of an extension and some refurbishment work t o the cancer unit. The standard form construction contract used for the works is the JCT Standard Building Contract with Quantities (SBC/Q) (‘JCT05’) with sectional completion. This form of contract is generally used where the works have been designed / detailed by or on behalf of the Employer. The contract documentation is comprised of the JCT05 contract, contract drawing and the bill of quantities. The Contract Sum for the Works was set at ?4,000,000 under a firm price contract; otherwise known as a fixed price contract. The Contractor was to be paid monthly with 3% of the Contract Sum being retained by the Employer until completion. The duration of the contract was 34 weeks with a start date scheduled for 1st February 2008. The Works were to be executed whilst the neighbouring hospital buildings were to be occupied. It was specifically mentioned in the Preliminaries, however, that the Works were to be carried out with ‘as little disruption as possible to the da y to day working of the hospital’. Albeit, contractors were advised to visit the site at the pre-tendering stage in order to assess the conditions which could potentially impede the execution of the Works (see the Preliminaries). Furthermore, there is only one site entrance, which is situated along a busy road and is also on a ‘blind corner’, which requires careful supervision at the time of site deliveries. The following issues arose on site soon after the works commenced: Relevant Issues i) A delay of six weeks resulted after site conditions were found to be of poor quality which demanded that the foundations be redesigned; ii) A further five
Sunday, October 27, 2019
Life Imprisonment The Best Method Politics Essay
Life Imprisonment The Best Method Politics Essay On January 11, 2011, a 22-year-old male in Tucson, Arizona shot through the head of an Arizona congressional representative, Gabrielle Giffords. Jared Lee Loughner was the identified shooter. During the course of his attempted assassination of Giffords, he killed six people and wounded others. Among those who have died was a nine-year old girl. As of today, Jared Loughners sentencing is still an ongoing process. The prosecutors and survivors angered by his cold-blooded actions, argue for a dead sentence, while others recommend a life sentence behind bars. However, Loughner tried as mentally ill, but the court later discovered that he was stable and competent. Loughner planned his assassination motives beforehand, which discards the fact and beliefs that he was unstable and mentally ill. Which method would be the more appropriate and suited punishment considering his crimes was committed in competence and self-control? In the Eighteenth Century, the establishment for the first laws of death penalty included the methods of execution: drowning, burning alive, hanging, beheading, boiling, crucifixion, impalement, and other heinous practice. The foremost common method of execution during the Tenth Century A.D. was hanging. In the 1700s, crimes that were punishable by death were theft, chopping down a tree, piracy, and other minor crimes considered as misdemeanor today. How does the death penalty differ from life imprisonment without parole in terms of morality? Death penalty has long been a controversial issue of judicial punishments. Nevertheless, as of today, thirty-five out of the fifty states in the United States have permitted the death penalty. On the other hand, over half of the countries around the world have abolished the death penalty. Why is euthanasia, a form of killing unlawful while capital punishment or execution regards as acceptable in a majority of the United States? Euthanasia and ca pital punishment both involves the killing of human lives in the hands of another human. It is arguable that killing a human being is unethical and immoral; however, the reason of killing is contradictory. Euthanasia is a term, in which involves assisting a merciful death of a terminally ill or suffering patient. The death penalty is the maximum consequence carried out upon an atrocious and prolific criminal. Death penalty is the execution of a criminal in hopes of terminating future and further crimes. Life imprisonment is the better method of punishment. The death penalty is nothing more than a form of revenge; it has little impact if any of crime deterrence, the process of execution is very expensive, and there is always a slight chance of wrongful executions. Is the death penalty a deterrent to crime? Only statistics can verify the truth. According to credible statistics, death penalty is not more of a deterrent than is life in prison. In fact, statistics have proved that over the years, states with the death penalty have greater homicide crime rates than states without the death penalty. In addition, the death penalty does not guarantee rehabilitation. There is no way of bringing an executed person back to life. The death penalty is a form of revenge and does not guarantee rehabilitation or change, while life in prison can. A criminal being sentenced to life in prison has a decent chance of changing or rehabilitating. Every criminal deserves a second chance. Every single person in this world had sinned at least once, so it would be absurd to kill a person simply from one crime. The death penalty only guarantees one less criminal off the streets. As for executions, death upon criminals is instant, while life behind bars is torturous. For all we know, executed criminals may be in candy land or heaven as a joyful apparition. A victims family can rest assure that a criminal given life in prison is living in misery for the rest of their life behind bars. A question to take into account is which do criminals fear more between life in prison and an instant death? A majority of criminals may actually request a death sentence rather than prison. Criminals are not concerned about their own well-being meaning that life or death to them is just a notion. Unfortunately, the techniques of execution are not as heinous as it was few hundreds of years ago; otherwise, the death penalty would be incredible crime deterrence. The thought of pain, torture, or humiliation can petrify and intimidate criminals. The cruelest method of execution was slow slicing, or ling chi, where the public ties the condemned and a thousand of their pieces of flesh is cut, including severed limbs, ending with their beheading. The Chinese in 900 CE invented this method, until its abolishment in 1905. Today, the death penalty is nothing more than a short experience of pain. The modern death penalty is not an effective method of crime deterrence because it is not torture nor is it humiliation, but simply revenge. Furthermore, the expenses upheld by the government in the cases of punishment are a concern. Most argue that the expenses of jailing prisoners are much greater than the processes of death penalty. They are wrong. Carrying out executions is much more expensive then sheltering inmates for the rest of their lives. In reality, the death penalty and executions costs much more than inhabiting criminals in prison. Why is that? The execution of a criminal is not the expensive part, but rather the process of long trials and appeals leading up to a decision of execution makes the death penalty an expensive method of punishment. It is important to provided additional prison guards for sentenced death row inmates, as well as situating death row inmates in an escape-proof and secured jail cell. This process alone, costs over $60,000 per year for each death row inmate. The drugs used for the death penalty costs $83.55 per execution. Although, the death penalty is has not been in active use, the se ntencing of death row inmates has. Possibly the most controversial reason against the death penalty is that the innocent may be wrongly executed. Over the past decade, there have been several cases of injustices. In the history of capital punishment, the innocent have been wrongfully executed, as well as wrongful imprisoned. There is a chance of imprisoning an innocent person to life in prison as well; however, the chance of repaying their dues and finding their innocence is superior to killing an innocent person. The idea of executing an innocent person is dreadful, let alone imprisoning them for life. How many innocent death row inmates have been executed or on the verge of execution? It would be awful to discover 17 death row inmates in the nation found innocent, but killed. Supporters of death penalty even suggested for quicker death penalty trials. Hastening the process of death penalty will only increase the chance of killing an innocent individual. The better method of punishment for criminals is life imprisonment without parole. The justice system is very dysfunctional when it comes to life imprisonment. Life imprisonment without parole simply means life behind bars until a natural death. Governors and prosecutors should not interfere by requesting or endorsing an early release from prison no matter what. This is the reason the judicial system is flawed. Life imprisonment may be cruel and unusual, but it perhaps, can deter crime. It may be more torturous than the death penalty, but the death penalty is crueler because it is ultimately the end of life. Life imprisonment is the better method of punishment. Appropriate and sincere administration of life imprisonment may be the ultimate crime deterrence, as well as a rehabilitation strategy.
Friday, October 25, 2019
Factors to Childlessness :: Reproduction, Sweden
Factors associated with the trends in childlessness: (1000 words ) Trends in marriage, trends in formation of familyâ€â€Drawing from the literature. Role of voluntary and involuntary factors (1000 words ) Is childlessness due to infertility or by circumstances or choice?- Drawing from the literature. The risk of childlessness is increased with the delay in the first birth. The reproduction span is also reduced and so is the number of children. Changes in educational level also leads to postpone ment of fertility.(Olah and Bernhardt 2008). High tolerance towards childless ness is found in the Post modern values dominant in Sweden propagate the importance of leisure and friends in life and children though considered important , are not needed for a fulfilling life (Olah and Bernhardt 2008). The tertiary educated women in Sweden is seen to have higher rates of childlessness than others(Olah and Bernhardt 2008 Sweden observed highest female labour force participation in Europe and was considered as the major reason for the fertility decline in 60s and 80s in Sweden along with the post modern values and contraception use which provided more control over childbearing to the women(Olah and Bernhardt 2008)) Contradictory to the above, Sweden , who is the forerunner in the second demographic transition, has observed the European highest and Sweden lowest fertility trends which have fluctuated greatly in 1960s and 70s (Olah and Bernhardt 2008).With the dominance of the post modern values in this increasingly secularised society, Sweden boasts of having one of the highest ideal family size in the European union and childlessness is relatively low (Olah and Bernhardt 2008). Sweden also has the highest amount of labour force participation in the entire Europe and the education among women is also as high as the men(Olah and Bernhardt 2008). There is an important role played by the family policies in Sweden in keeping the fertility level high, which are based on equality across social groups and gender (Olah and Bernhardt 2008). The eligibility to parental leave and other benefits is linked to the labour force attachments and thus the family policies play an important role in the changes in t he fertility rates(Ola and Bernhardt 2008). Some researchers attributes enhanced economic status and educational attainment have contributed in delays in marriage and childbearing and increases in divorce and single motherhood(Danziger and Ratner 2010) please refer more to source Claudia Goldin (2006) describes women’s enhanced engagement in the economy as the most remarkable change in the labour markets in the 20th century.
Thursday, October 24, 2019
8 Key Element for a Business Model
E-commerce: business. technology. society. E-commerce E commerce Business. Technology. Society gy y Kenneth C. Laudon Copyright  © 2011 Pearson Education, Ltd. Chapter 5 Business Models for E? commerce Copyright  © 2007Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 1-2 E-commerce Business Models Business model d l Set of planned activities designed to result in a Set of planned activities designed to result in a profit in a marketplace Business plan Describes a firm s business model Describes a firm’s business modelE commerce business model E? commerce business model Uses/leverages unique qualities of Internet and Web W b Slide 2-3 8 Key Elements of Business Model 1. 2. 3. 4. 5. 6. 7. 8. Value proposition Revenue model Market opportunity Market opportunity Competitive environment Competitive advantage Market strategy Market strategy Organizational De velopment Management team Slide 2-4 1. Value Proposition Why should the customer buy from you? h h ld h b f ? Successful e? ommerce value S f l l propositions: Personalization/customization Reduction of product search, price discovery costs Facilitation of transactions by managing product delivery Slide 2-5 2. Revenue Model How will the firm earn revenue, generate p profits, and produce a superior return on p p invested capital? Major types: Advertising revenue model g Subscription revenue model Transaction fee revenue model Transaction fee revenue model Sales revenue model Affiliate revenue model Slide 2-6 3. Market Opportunity What marketspace do you intend to h k d d serve and what is its size?Marketspace: Area of actual or potential commercial value in which companyà ‚ intends to operate in which company intends to operate Realistic market opportunity: Defined by revenue potential in each market niche in which company hopes to potential in each market niche in which company hopes to compete Market opportunity typically divided into M k t t it t i ll di id d i t smaller niches Slide 2-7 4. Competitive Environment Who else occupies your intended h l d d marketspace? p Other companies selling similar products in the same marketspace Includes both direct and indirect competitors Influenced by: Influenced by:Number and size of active competitors Each competitor s market share Each competitor’s market share Competitors’ profitability Competitors pricing Competitors’ pricing Slide 2-8 5. Competitive Advantage Achieved when firm: h d h f Produces superior pro duct  or Produces superior product or Can bring product to market at lower price than competitors th tit Important concepts: p p Asymmetries First? mover advantage Fi t d t Unfair competitive advantage Leverage Slide 2-9 6. Market Strategy How do you plan to promote your products or services to attract your products or services to attract your target audience?Details how a company intends to enter market and attract customers Best business concepts will fail if not properly marketed to potential customers k d i l Slide 2-10 7. Organizational Development What types of organizational structures within the firm are necessary to carry out within the firm are necessary to carry out the business plan? Describes how firm will organize work Typically divided into functiona l departments As company grows, hiring moves from generalists to As company grows hiring moves from generalists to specialists Slide 2-11 8.Management Team What kinds of experiences and background are important for the background are important for the company’s leaders to have? Employees are responsible for making the business model work Strong management team gives instant credibility to outside investors Strong management team may not be able to salvage a weak business model, but should be able to change the model and redefine the business as it becomes necessary Slide 2-12 Insight on Business Online Grocers: Finding and Executing the Right Model g g Class Discussion Slide 2-13 Categorizing E-commerce Business ModelsNo one correct way We categorize businessà ‚ models according to: We categorize business models according to: E? commerce sector (B2C, B2B, C2C) Type of e? commerce technology; i. e. m? commerce Type of e commerce technology; i e m commerce Similar business models appear in more than one sector Some companies use multiple business Some companies use multiple business models; e. g. eBay Slide 2-14 B2C Business Models: Portal Search plus an integrated package of content and services Revenue models: d l Advertising, referral fees, transaction fees, subscriptions g p Variations:Horizontal / General Vertical / Specialized (Vortal) Vertical / Specialized (Vortal) Pure Search Slide 2-15 Insight on Technology Can Bing Bong Google? Class Discussion Slide 2-16 B2C Models: E-tailer Online version of traditional retailer Revenue model: Sales Variations: Virtual merchant Virtual merchant Bricks? and? clicks Catalog merchant C t l h t Manufacturer? direct Low barriers to entry Slide 2-17 B2C Models: Content Provider Digital content on the Web News, music, video Revenue models: Revenue models: Subscription; pay per download (micropayment); advertising; affiliate referral fees Variations:Content owners Syndication S di i Web aggregators Slide 2-18 B2C Models: Transaction Broker Process online transactions for consumers Primary value propositionâ€â€saving time and money Revenue model: R d l Transaction fees Industries using this model: Financial services Travel services Job placement services Slide 2-19 B2C Models: Market Creator Create digital environment where buyers and sellers can meet and transact Examples: Priceline eBay y Revenue model: Transaction fees Revenue model: Transaction fee s Slide 2-20 B2C Models: Service Provider Online services e. g. Google: Google Maps, Gmail, etc. Value proposition Value propositionValuable, convenient, time? saving, low? cost alternatives to traditional service providers t diti l i id Revenue models: Revenue models: Sales of services, subscription fees, advertising, sales of marketing data marketing data Slide 2-21 B2C Models: Community Provider Provide online environment (social network) where people with similar interests can transact, share content, and , , communicate E. g. Facebook, MySpace, LinkedIn, Twitter Revenue models: R d l Typically hybrid, combining advertising, subscriptions, sales, transaction fees, affiliate fees Slide 2-22 B2B Business Models Net marketplaces E? istributor E procurement E? procurement Exchange Industry consortium Industry cons ortium Private industrial network Private industrial network Single firm Industry? wide Industry wide Slide 2-23 B2B Models: E-distributor Version of retail and wholesale store, , MRO goods and indirect goods Owned by one company seeking to serve many customers Revenue model: Sales of goods Example: Grainger. com Slide 2-24 B2B Models: E-procurement Creates digital markets where participants transact for indirect goods B2B service providers, application service providers (ASPs) B2B service providers application service providers (ASPs)Revenue model: Service fees, supply? chain management, fulfillment services Example: Ariba Slide 2-25 B2B Models: Exchanges Independently owned vertical digital p y g marketplace for direct inputs Revenue model: Transaction, commission fees Revenue model Transaction commission fees C eate po e u co pet t o bet ee Create powerful competition between suppliers Tend to force suppliers into powerful price T d f li i f l i competition; number of exchanges has dropped dramatically d dd ll Slide 2-26 B2B Models: Industry Consortia Industry? wned vertical digital marketplace open to select suppliers More successful than exchanges More successful than exchanges Sponsored by powerful industry players Strengthen traditional purchasing behavior Revenue model: Transaction, commission fees R d l T ti i i f Example: Exostar Example: Exostar Slide 2-27 Private Industrial Networks Designed to coordinate flow of communication among firms engaged in business together fi di b i h Electronic data interchange (EDI) Single firm networks Most common form M t f Example: Wal? Mart’s network  for suppliersIndustry? wide networks Often evolve out of industry associations Often evolve out of industry associations Example: Agentrics Slide 2-28 Other E-commerce Business Models Consumer? to? consumer (C2C) eBay, Craigslist Peer? to? peer (P2P) Peer to peer (P2P) The Pirate Bay, Cloudmark M? commerce: Technology platform continues to evolve Technology platform continues to evolve iPhone, smartphones energizing interest in m? commerce pp apps Slide 2-29 Insight on Society Where R U? Not Here! Class Discussion Slide 2-30 E-commerce Enablers: Gold Rush ModelE? commerce infrastructure companies p have profited the most: Hardware, software, networking, security E? commerce software systems, payment systems Media solutions, performance enhancement CRM software CRM software Databases Hosting services, etc. Slide 2-31 How Internet & Web Change Busi ness E? commerce changes industry structure g y by changing: Basis of competition among rivals Barriers to entry y Threat of new substitute products Strength of suppliers Bargaining power of buyers Bargaining power of buyers Slide 2-32 Industry Value ChainsSet of activities performed by suppliers, manufacturers, transporters, distributors, and f di ib d retailers that transform raw inputs into final products and services Internet reduces cost of information and Internet reduces cost of information and other transactional costs Leads to greater operational efficiencies, lowering cost, prices, adding value for lowering cost prices adding value for customers Slide 2-33 E-commerce & Industry Value Chains Figure 5. 4 Slide 2-34 Firm Value Chains Activities that a firm engages in to create inal products from raw inputs Each step adds value Effect of Internet: Eff fI Increases operational efficiency p y Enables product differentiation Enables precise coordination of steps in chain E bl i di ti f t i h i Slide 2-35 E-commerce & Firm Value Chains Figure 5. 5 Slide 2-36 Firm Value Webs Networked business ecosystem Uses Internet technology to coordinate the value chains of business partners l h i fb i Coordinates a firm’s suppliers with its own C di t fi ’ li ith it production needs using an Internet? based supply chain management systemSlide 2-37 Internet-Enabled Value Web bl d l b Figure 5. 6 Slide 2-38 Business Strategy Plan for achieving superior long? term returns on the capital invested in a business firm business firm Four Generic Strategies 1. Di fferentiation 2. Cost 3. Scope 4. 4 Focus Slide 2-39 Chapter 6 E-commerce Marketing Copyright  © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 6-40 Netflix N fli Strengthens and Defends Its Brand Class Discussion Slide 6-41 Consumers Online: Internet Audience & Consumer Behavior Around 70% (82 million) U. S. ouseholds have Around 70% (82 million) U S households have Internet access in 2010 Growth rate has slowed Intensity and scope of use both increasing d f b h Some demographic groups have much higher Some demographic groups have much higher percentages of online usage than others Gender, age, ethnicity, community type, income, education Slide 6-42 Consumers Online: Internet Audience & Consumer Behavior Broadband audience vs. dial? up audience Purchasing behavior affected by neighborhood Lifestyle and sociological impa cts Use of Internet by children, teens Use of Internet as substitute for other social activitiesMedia choices Traditional media competes with Internet for attention Traditional media competes with Internet for attention Slide 6-43 Consumer Behavior Models Study of consumer behavior Social science Attempts to explain what consumers purchase Attempts to explain what consumers purchase and where, when, how much and why they buy Consumer behavior models Predict wide range of consumer decisions Predict wide range of consumer decisions Based on background demographic factors and other intervening, more immediate variables h i i i di i bl Slide 6-44 General Model of Consumer Behavior Figure 6. Slide 6-45 Background Demographic Factors Culture: Broadest impact Subculture (ethnicity, age, lifestyle, geography) S b lt ( th i it lif t l h ) Social Reference groups Direct  reference groups g p Indirect reference groups Opinion leaders (viral influencers) Lifestyle groups f l Psychological Psychological profiles Slide 6-46 Online Purchasing Decision Psychographic research Combines demographic and psychological data Combines demographic and psychological data Divides market into groups based on social class, lifestyle, and/or personality characteristics and/or personality characteristicsFive stages in the consumer decision process: 1. 2. 3. 4. 5. Awareness of need Search for more information Evaluation of alternatives Actual purchase decision Actual purchase decision Post? purchase contact with firm Slide 6-47 Consumer D i i C Decision Process & P Supporting Communications Figure 6. 3 Slide 6-48 Model of Online Consumer Behavior Decision process similar for online and offline behavior General online behavior model Consumer skills Product characteristics Attitudes toward online purchasing Perceptions about control over Web environment p Web site featuresClickstream behavior: Transaction log for Clickstream behavior: Transaction log for consumer from search engine to purchase Slide 6-49 Model of Online Consumer Behavior Figure 6. 4 Slide 6-50 Model of Online Consumer Behavior Clickstream factors include: Number of days since last visit Number of days since last visit Speed of clickstream behavior Number of products viewed during last visit b f d i dd i l ii Number of pages viewed Supplying personal information Number of days since last purchase Number of past purchasesClickstream marketing Clickstream marketing Slide 6-51 Shoppers: B rowsers & Buyers Shoppers: 87% of Internet users 72% buyers 72% buyers 16% browsers (purchase offline) One? third offline retail purchases influenced by O thi d ffli t il h i fl db online activities Online traffic also influenced by offline brands and shopping pp g E? commerce and traditional commerce are coupled: part of a continuum of consuming behavior part of a continuum of consuming behavior Slide 6-52 Online Shoppers & Buyers Figure 6. 5 Slide 6-53What Consumers Shop & Buy Online Big ticket items ($500 plus) Travel, computer hardware, consumer electronics Expanding Consumers more confident in purchasing costlier items Small ticket items ($100 or less) ($ ) Apparel, books, office supplies, software, etc. Sold by first movers on Web Sold by first movers on Web Physically small i tems High margin items Broad selection of products available Slide 6-54 What Consumers Buy Online Figure 6. 6 Slide 6-55 Intentional Acts: How Shoppers Find Vendors Online pp Search engines (59%) S h i (59%) Coupon Web sites (29%) Coupon Web sites (29%) Comparison shopping sites (27%) E? ail newsletters (25%) Online shoppers are highly intentional, looking for specific products, companies, services Slide 6-56 Table 6. 6 Slide 6-57 Trust, Utility, Opportunism in Online Markets Two most important factors shaping decision Two most important factors shaping decision to purchase online: Utility: U ili Better prices, convenience, speed Trust: Asymmetry of information can lead to opportunistic behavior by sellers Sellers can develop trust by building strong reputations for honesty, fairness, delivery Slide 6-58 Basic Marketing Concepts MarketingStrategies and actions to establish relationship Strategies and actions to establish relationship with consumer and encourage purchases of p products and services Addresses competitive situation of industries and firms Seeks to create unique, highly differentiated products or services that are produced or supplied by one trusted firm Unmatchable feature set Avoidance of becoming commodity Slide 6-59 Feature Sets Three levels of product or service 1. Core product e. g. cell phone g p 2. Actual product Characteristics that deliver core benefits Ch t i ti th t d li b fit e. g. wide screen that connects to Internet 3. Augmented productAdditional benefits Basis for building the product’s brand e. g. product warranty Slide 6-60 Featu re Set Figure 6. 7 Slide 6-61 Products, Brands & Branding Process Brand: Expectations consumers have when consuming, or thinking about consuming, a specific product Most important expectations: Quality, reliability, Most important expectations: Quality reliability consistency, trust, affection, loyalty, reputation Branding: Process of brand creation Branding: Process of brand creation Closed loop marketing Brand strategy Brand equity Brand eq it Slide 6-62 Marketing A ti iti M k ti Activities: From Products to Brands Figure 6. 8Slide 6-63 STP: Segmenting, Targeting, Positioning Major ways used to segment, target customers 1. 2. 3. 4. 5. 6. Behavioral B h i l Demographic Psychographic h hi Technical Contextual Search Within segment, product is positioned and branded as a unique, high? value product, especially suited to q g p p y ne eds of segment customers Slide 6-64 Are Brands Rational? For consumers, a qualified yes: Brands introduce market efficiency by reducing search and decision? making costs For business firms, a definite yes: A major source of revenue Lower customer acquisition cost Increased customer retention Successful brand constitutes a long? asting (though not necessarily permanent) unfair competitive advantage Slide 6-65 Can Brands Survive Internet? Brands & Price Dispersion p Early postulation: Law of One Price ; end of brands Early postulation: â€Å"Law of One Price†; end of brands Instead: Consumers still pay premium prices for differentiated products E? commerce firms rely heavily on brands to attract customers and charge premium prices Substantial price dispersion Large differences in price sensitivity for same product Large differences in price sensitivity for same product â€Å"Library effect†Slide 6-66Revolution in Internet Marketing Technology Three broad impacts: Scope of marketing communications broadened Richness of marketing communications increased g Information intensity of marketplace expanded Internet marketing technologies: Internet marketing technologies: Web transaction logs Cookies and Web bugs Cookies and Web bugs Databases, data warehouses, data mining Advertising networks Customer relationship management systems Slide 6-67 Web Transaction LogsBuilt into Web server software Record user activity at Web site y Webtrends: Leading log analysis tool Provides much marketing data, especially  Provides much marketing data especially combined with: Registratio n forms R i i f Shopping cart database Answers questions such as: What are major patterns of interest and purchase? After home page, where do users go first? Second? Slide 6-68 Cookies & Web Bugs Cookies: Small text file Web sites place on visitor’s PC every time they visit, as specific pages are accessed Provide Web marketers with very quick means of identifying customer and understanding prior behavior Flash cookiesWeb bugs: Tiny (1 pixel) graphics embedded in e mail and Web sites Tiny (1 pixel) graphics embedded in e? mail and Web sites Used to automatically transmit information about user and page being viewed to monitoring server page being viewed to monitoring server Slide 6-69 Insight on Society g y Every Move You Make, Every Click You Make, Weâ₠¬â„¢ll Be Tracking You , g Class Discussion Slide 6-70 Databases Database:  Stores records and attributes Database management system (DBMS): Software used to create, maintain, and access databasesSQL (Structured Query Language): Industry? standard database query and manipulation language used in y q y p g g a relational database Relational database: Represents data as two? dimensional tables with records organized in rows and attributes in columns; data within different tables can be flexibly related as long as the tables share a common data element flexibly related as long as the tables share a common data element Slide 6-71 Relational Database View of E-commerce Customers Figure 6. 12 Slide 6-72 Data Warehouses & Data Mining Data warehouse:Collects firm s transactional and custom er data in single Collects firm’s transactional and customer data in single location for offline analysis by marketers and site managers Data mining: Analytical techniques to find patterns in data, model Analytical techniques to find patterns in data model behavior of customers, develop customer profiles Query? driven data mining Query driven data mining Model? driven data mining Rule? based data mining l b dd Collaborative filtering Slide 6-73 Data Mining & Personalization Figure 6. 13 Slide 6-74 Insight on TechnologyThe Long T il Big Hits and Big Misses Th L Tail: Bi Hi d Bi Mi Class Discussion Slide 6-75 Customer Relationship Management ( (CRM) Systems ) y Record all contact that customer has with firm Generates customer profile available to everyone in firm with need to â€Å"know the customer†fi ith d t â€Å"k th t †Customer profiles can contain: ustomer profiles can contain: Map of the customer’s relationship with the firm Product and usage summary data Demographic and psychographic data Profitability measures Contact history Contact history Marketing and sales information Slide 6-76Customer Relationship Management System Figure 6. 14 Slide 6-77 Market Entry Strategies Figure 6. 15 Slide 6-78 Establishing Customer Relationship Advertising Networks Banner advertisements Ad server selects appropriate banner ad based on Ad server selects appropriate banner ad based on cookies, Web bugs, backend user profile databases Permission marketing Permission marketing Affiliate marketing g Slide 6-79 How Advertising Network Works e. g. , DoubleClick Figure 6. 16 Slide 6-80 Establishing Customer Relationship (cont’d) Viral marketingGett ing customers to pass along company’s marketing message to friends, family, and colleagues Blog marketing Using blogs to market goods through commentary and U i bl k d h h d advertising Social network marketing, social shopping Mobile marketing Mobile marketing Slide 6-81 Insight on Business Social Network Marketing: Let’s Buy Together Class Discussion Slide 6-82 Establishing Customer Relationship (cont’d) Wisdom of crowds (Surowiecki, 2004) ( , ) Large aggregates produce better estimates and judgments Examples: E l Prediction markets Folksonomies Social tagging Social taggingBrand leveraging Slide 6-83 Customer Retention: Strengthening Customer Relationship p Mass marketing Mass marketing Direct marketing Micromarketing Micromarketing Personalized, one? to? one marketing  Segmenting market on precise a nd timely understanding of Segmenting market on precise and timely understanding of individual’s needs Targeting specific marketing messages to these individuals Positioning product vis? a? vis competitors to be truly unique Personalization Can increase consumers sense of control, freedom Can also result in unwanted offers or reduced anonymity Slide 6-84Mass Market-Personalization Continuum Figure 6. 17 Slide 6-85 Other Customer Retention Marketing Technics Customization Customer co? production Transactive content: Combine traditional content with dynamic information tailored to each user’s profile Customer service FAQs Q Real? time customer service chat systems Automated response systems Automated response systems Slide 6-86 Net Pricing Strategies Pricing Integral part of marketing strategy I t l t f k ti t t Traditionally based on: Fixed cost Variable costs Demand curve Price discrimination Price discriminationSelling products to different people and groups based on willingness to pay Slide 6-87 Net Pricing Strategies (cont’d) Free and freemium Can be used to build market awareness Versioning Creating multiple versions of product and selling essentially same product to different market segments at different prices at different prices Bundling Offers consumers two or more goods for one price Off t d f i Dynamic pricing: Auctions Yield management Slide 6-88 Channel Management Strategies Channels: Different methods by which goods can be distributed and soldChannel conflict: When new venue for selling products or services threatens gp or destroy s existing sales venues E. g. online airline/travel services and  traditional offline travel agencies Some manufacturers are using partnership gp p model to avoid channel conflict Slide 6-89 Chapter 7: E-commerce Marketing Communications Chapter 7 E-commerce Advertising Copyright  © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 7-90 Video Ads: Shoot, Click, Buy Class Discussion Slide 7-91 Marketing Communications Two main purposes:Sales – promotional sales communications Branding – b di B di branding communications i i Online marketing communications Online marketing communications Takes many forms Online ads, e? mail, public relations, Web sites Slide 7-92 Online Advertising li d i i $25 billion, 15% of all advertising Advantages: Internet is where audience is moving g Ad targeting Greater opp ortunities for interactivity Greater opportunities for interactivity Disadvantages: Cost versus benefit How to adequately measure results Supply of good venues to display ads Slide 7-93 Online Advertising from 2002-2014 Figure 7. Slide 7-94 Forms of Online Advertisements Display ads Rich media Video ads Search engine advertising Social network, blog, and game advertising Social network blog and game advertising Sponsorships Referrals (affiliate relationship marketing) E? mail marketing g Online catalogs Slide 7-95 Display Ads Banner ads Rectangular box linking to advertiser’s Web site IAB guidelines e. g. Full banner is 468 x 60 pixels, 13K e g Full banner is 468 x 60 pixels 13K Pop? up ads Appear without user calling for them Provoke negative consumer sentiment g Twice as effective as normal banner ads Pop? nder ads: Open beneath browser window Pop under ads: Open beneath browser window Slide 7-96 Rich Media Ads Use Flash, DHTML, Java, JavaScript About 7% of all online advertising expenditures Tend to be more about branding d b b b di Boost brand awareness by 10% Boost brand awareness by 10% IAB standards limit length Interstitials Superstitials Slide 7-97 Video Ads Fastest growing form of online advertisement IAB standards Linear video ad Non? linear video ad In? banner video ad In? text video ad Ad placement Advertising networks Advertising exchanges Banner swappingSlide 7-98 Search Engine Advertising h i d i i Almost 50% of online ad spending in 2010 Types: Paid inclusion or rank Paid inclusion or rank Inclusion in search results Sponsored link areas p Keyword advertising e. g. Google AdWords e g Google AdWords Network keyword advertising (context advertising) d ii ) e. g. Google AdSense Slide 7-99 Search Engine Advertising (cont’d) Nearly ideal targeted marketing Nearly ideal targeted marketing Issues: Disclosure of paid inclusion and placement practices Click fraud Ad nonsense Slide 7-100 Mobile Advertising Half of U. S.Internet users access Internet Half of U. S. Internet users access Internet with mobile devices Currently small market, but fastest growing platform (35%) growing platform (35%) Google and Apple in race to develop Google and Apple in race to develop mobile advertising platform AdMob, iAd Slide 7-101 Sponsorships & Referrals Sponsorships Paid effort to tie advertiser s name to Paid effort to tie advertiser’s name to particular information, event, venue in a way that reinforces brand in positive yet not overtly that reinforces brand in positive yet not overtly commercial manner ReferralsAffiliate relationship marketing p g Permits firm to put logo or banner ad on another firm’s Web site from which users of th fi ’ W b it f hi h f that site can click through to affiliate’s site Slide 7-102 E-mail Marketing & Spam Explosion Direct e? mail marketing Low cost, primary cost is purchasing addresses Spam: Unsolicited commercial e? mail Spam: Unsolicited commercial e mail Approx. 90% of all e? mail Efforts to control spam: Technology (filtering software) Government regulation (CAN? SPAM and state laws) Voluntary self? regulation by industries (DMA ) y g y Volunteer efforts Slide 7-103Percentage of E-mail That Is Spam Figure 7. 6 Slide 7-104 Online Catalogs Equivalent of paper? based catalogs Graphics? intense; use increasing with increase in broadband use in broadband use Two types: 1. 2. 2 Full? page spreads, e. g. Landsend. com Grid displays, e. g. Amazon Grid displays e g Amazon In general, online and offline catalogs complement each other Slide 7-105 Social Marketing â€Å"Many? to? many† model Uses digitally enabled networks to spread ads Blog advertising Blog advertising Online ads related to content of blogs Social network advertising: Social network advertising:Ads on MySpace, Facebook, YouTube, etc. Game advertising: G d ti i Downloadable â€Å"advergames†Placing brand? name products within games Slide 7-106 Insight on Society g y Marketing to Children of the Web in the Age of Social Networks g Class Discussion Slide 7-107 Behavioral Targeting Interest? based advertising Data aggregators develop profiles Data aggregators develop profiles Search engine queries Online browsing history O li b i hi Offline data (income, education, etc. ) d Information sold to 3rd party advertisers, who deliver ads based on profile Ad exchanges Privacy concerns acy co ce s Consumer resistance Slide 7-108Mixing Off-line & Online Marketing Communications g Most successful marketing campaigns M t f l k ti i incorporate both online and offline tactics Offline marketing Drive traffic to Web sites Drive traffic to Web sites Increase awareness and build brand equity Consumer behavior increasingly multi? channel 60% consumers research online before buying offline % y g Slide 7-109 Insight on Business g Are the Very Rich Different From You and Me? Class Discussion Sl ide 7-110 Online Marketing Metrics: Lexicon Measuring audience size or market share Impressions I i Click? through rate (CTR) View? hrough rate (VTR) Vi th h t (VTR) Hits Page views P i Stickiness (duration) Unique visitors Loyalty Reach Recency Slide 7-111 Online Marketing Metrics (cont’d) Conversion of visitor Conversion of visitor to customer Acquisition rate q Conversion rate Browse? to? buy? ratio View? to? cart ratio Vi t t ti Cart conversion rate Checkout conversion rate Checkout conversion rate Abandonment rate Retention rate Attrition rate E mail metrics E? mail metrics Open rate Delivery rate Delivery rate Click? through rate (e mail) (e? mail) Bounce? back rate Slide 7-112 Online Consumer Purchasing ModelFigure 7. 8 Slide 7-113 How Well Does Online Adv. Work? Ultimately measured by ROI on ad campaign Highest click? through rates: Searc h engine ads, Permission e mail campaigns Permission e? mail campaigns Rich media, video interaction rates high Online channels compare favorably with traditional Most powerful marketing campaigns use multiple Most powerful marketing campaigns use multiple channels, including online, catalog, TV, radio, newspapers, stores newspapers, stores Slide 7-114 Comparative Returns on Investment Figure 7. 9 Slide 7-115 Costs of Online Advertising Pricing modelsBarter Cost per thousand (CPM) Cost per click (CPC) Cost per action (CPA) Cost per action (CPA) Online revenues only Sales can be directly correlated Sales can be directly correlated Both  online/offline revenues Offline purchases cannot always be directly related to online Offli h t l b di tl l t dt li campaign In general, online marketing more  expensive on CPM In general online marketing more expensive on CPM basis, but more effective Slide 7-116 Web Site Activity Analysis b i i i l i Figure 7. 10 Slide 7-117 Insight on Technology It’s 10 P. M. Do You Know Who Is On Your Web Site? Class Discussion Slide 7-118Web Site †¦ as Marketing Communications Tool g Web site as extended online advertisement W b i d d li d i Domain name: An important role Domain name: An important role Search engine optimization: Search engine optimization: Search engines registration Keywords in Web site description K d i W b it d i ti Metatag and page title keywords Links to other sites k h Slide 7-119 Web Site Functionality b i i li Main factors in effectiveness of interface Utility Ease of use Top factors in credibility of Web sites: Top factors in credibility of Web sites: Design look Info rmation design/structure g / Information focusOrganization is important for first time users, but Organization is important for first? time users but declines in importance Information content becomes major factor attracting Information content becomes major factor attracting further visits Slide 7-120 Factors in Credibility of Web Sites Figure 7. 11 Slide 7-121 Table 7. 9 Slide 7-122 Chapter 8: Ethical, Social, and Political Issues in E-commerce E commerce Chapter 8 Ethics, Law, E-commerce Copyright  © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 8-123 Ethical, Social, Political Issues in E-commerceInternet, like other technologies, can: Internet like other technologies can: Enable new crimes Affect environment Threaten social values Costs and benefits must be carefully considered, especially when there are no id d i ll h h g g clear? c ut legal or cultural guidelines Slide 8-124 Model for Organizing Issues Issues raised by Internet and e? commerce can be viewed at individual, social, and political levels social and political levels Four major categories of issues: Four major categories of issues: Information rights Property rights Property rights Governance Public safety and welfare Slide 8-125Moral Dimensions of Internet Society M l Di i f I S i Figure 8. 1 Slide 8-126 Basic Ethical Concepts i hi l Ethics Study of principles used to determine right and wrong courses of action Responsibility p y Accountability Liability Laws permitting individuals to recover damages Due process Laws are known, understood Laws are known understood Ability to appeal to higher authorities to ensure laws applied correctly Slide 8-127 Analyzing Ethical Dilemmas l i hi l il Process for analyzing ethical dilemmas: 1. 2. 3. 3 4. 5. Identify and clearly describe the facts Define the conflict or dilemma and identify the y higher? rder values involved Identify the stakeholders Identify the stakeholders Identify the options that you can reasonably take t k Identify the potential consequences of your options Slide 8-128 Candidate Ethical Principles Golden Rule Universalism Slippery Slope Collective Utilitarian Principle Risk Aversion Ri k A i No Free Lunch The New York Times Test The Social Contract Rule Slide 8-129 Privacy & Information Rights Privacy: Moral right of individuals to be left alone, free from surveillance or interference from other individuals or organizations Information privacy p y Subset of privacy Includes:The claim th at certain information should not be collected at all The claim of individuals to control the use of whatever h l i f i di id l l h f h information is collected about them Slide 8-130 Privacy & Information Rights (cont. ) Major ethical issue related to e? commerce and privacy: d i Under what conditions should we invade the privacy of others? Major social issue: j Development of â€Å"expectations of privacy† and privacy norms privacy norms Major political issue: Development of statutes that govern relations D l t f t t t th t l ti between recordkeepers and individuals Slide 8-131 Information Collected at E-commerce SitesData collected includes Personally identifiable information (PII) Anonymous information Anonymous information Types of data collected yp Name, a ddress, phone, e? mail, social security Bank and credit accounts, gender, age, occupation, B k d di d i education Preference data, transaction data, clickstream data, browser type Slide 8-132 Social Networks & Privacy Social networks Encourage sharing personal details Pose unique challenge to maintaining privacy Facebook s Beacon program Facebook’s Beacon program Facebook s Terms of Service change Facebook’s Terms of Service change Slide 8-133 Profiling & Behavioral Targeting ProfilingCreation of digital images that characterize online individual and group behavior Anonymous profiles A fil Personal profiles Personal profiles Advertising networks Track consumer and browsing behavior on Web T k db i b h i W b Dynamically adjust what user sees on screen Build and refresh profiles of consumers Google’s AdWords program Slide 8-134 Profiling & Behavioral Targeting (cont’d) Deep packet inspection Business perspective: Web profiling serves consumers and businesses Increases effectiveness of advertising, subsidizing free content Enables sensing of demand for new products and services Critics perspective:Undermines expectation of anonymity and privacy Consumers show significant opposition to unregulated collection of personal information Enables weblining Slide 8-135 Internet & Government Invasions of Privacy Various laws strengthen ability of law enforcement agencies to monitor Internet users without i i I ih knowledge and sometimes without judicial oversight CALEA, PATRIOT Act, Cyber Security Enhancement Act, Homeland Security Act Government agencies are largest users of private sector commercial data brokers sector commercial data brokers Retention by ISPs of user data a concern Slide 8-136Legal Protections In U. S. , privacy rights explicitly granted or derived from Constitution Constitution First Amendment  – freedom of speech and association Fourth Amendment  – unreasonable search and seizure F th A d t bl h d i Fourteenth Amendment  – due process Specific statutes and regulations (federal and Specific statutes and regulations (federal and state) Common law Slide 8-137 Informed Consent U. S. firms can gather and redistribute transaction information without individual’s i i f i ih i di id l’ informed consent Illegal in Europe Informed consent: Opt? in Opt out Opt? out Many U. S. ? commerce firm s merely publish information p practices as part of privacy policy without providing for p p yp y p g any form of informed consent Slide 8-138 FTC’s Fair Information Practices Principles Federal Trade Commission: Federal Trade Commission: Conducts research and recommends legislation to Congress Fair Information Practice Principles (1998): Fair Information Practice Principles (1998): Notice/Awareness (Core) Choice/Consent (Core) Choice/Consent (Core) Access/Participation Security Enforcement Guidelines, not laws Guidelines not laws Slide 8-139 FTC’s Fair Information Practice PrinciplesNotice/Awareness i / Sites must disclose information practices before collecting data. Includes Sit t di l i f ti ti b f ll ti d t I l d identification of collector, uses of data, other recipients of data, nature of collection (ac tive/inactive), voluntary or required, consequences of refusal, and steps taken to protect confidentiality, integrity, and quality of the data Choice/Consent There must be a choice regime in place allowing consumers to choose how their information will be used for secondary purposes other than supporting the transaction, including internal use and transfer to third parties.Opt? in/Opt? out must be available. Consumers should be able to review and contest the accuracy and completeness of data collected about them in a timely, inexpensive process. Access/Participation ccess/ a c pa o Security y Enforcement Data collectors must take reasonable steps to assure that consumer information is accurate and secure from unauthorized use. There must be in place a mechanism to enforce FIP principles. This can involve self? regulation, legislation giving consumers legal remedies for violations, or federal statutes and regulation. di f i l ti f d l t t t d l ti Slide 8-140FTC Recommendations: Online Profiling Principle p Notice Recommendation Complete transparency to user by providing disclosure and choice options on the host Web site. â€Å"Robust† notice for PII (time/place of collection; before collection begins). Clear and conspicuous notice for non PII. before collection begins). Clear and conspicuous notice for non? PII. Opt? in for PII, opt? out for non? PII. No conversion of non? PII to PII without consent. Opt? out from any or all network advertisers from a single page consent Opt out from any or all network advertisers from a single page provided by the host Web site.Reasonable provisions to allow inspection and correction. Reasonable efforts to secure information from loss, misuse, or improper access. Done by independent third parties, such as seal programs and accounting Done by independent third parties such as seal programs and accounting firms. medical topics, sexual behavior or sexual orientation, or use Social Security medical topics sexual behavior or sexual orientation or use Social Security numbers for profiling. Slide 8-141 Choice Access Security EnforcementRestricted Collection Advertising networks will not collect information about sensitive financial or European Data Protection Directive Privacy protection much stronger inà ‚ Europe than U. S. European approach: Comprehensive and regulatory in nature p g y European Commission’s Directive on Data Protection (1998): (1998): Standardizes and broadens privacy protection in European Union countries Department of Commerce safe harbor program: For U. S. firms that wish to comply with Directive Slide 8-142 Private Industry Self-RegulationSafe harbor programs: Private policy mechanism to meet objectives of Pi t li h i t t bj ti f government regulations without government involvement e. g. Privacy seal programs e g Privacy seal programs Industry associations include: Online Privacy Alliance (OPA) Network Advertising Initiative (NAI) CLEAR Ad Notice Technical Specifications Privacy advocacy groups Emerging privacy protection business Slide 8-143 Insight on Business Chief Privacy Officers hi f i ffi Class Discussion Slide 8-144 Technological Solutions Spyware, pop? p blockers Cookie managers k Anonymous remailers, surfing Anonymous remailers surfing Platform for Privacy Preferences (P3P): Comprehensive technological privacy protection standard Works through user s Web browser Works through user’s Web browser Communicates a Web site’s privacy policy Compares site policy to user’s preferences or to other standards such as FTC’s FIP guidelines or EU’s Data Protection Directive Slide 8-145 How P3P Works k Figure 8. 2(A) Slide 8-146 Insight on Technology The Privacy T Th P i Tug of War: fW Advertisers Vs. Consumers Class Discussion Slide 8-147 Intellectual Property Rights Intellectual property:Encompasses all tangible and intangible products of human  mind Major ethical issue: j How should we treat property that belongs to others? Major social issue: Major social issue: Is there continued value in protecting intellectual property in the Internet age? Major political issue: How can Internet and e? commerce be regulated or governed to g g protect intellectual property? Slide 8-148 Intellectual Property Protection Three main types of protection: Copyright Patent Trademark law Trademark law Goal of intellectual property law: Balance two competing interests  public and B l t ti i t t bli d privateMaintaining this balance of interests is always M i t i i thi b l fi t t i l challenged by the invention of new technologies Slide 8-149 Copyright Protects original forms of expression (but not ideas) from being copied by others for a  ideas) from being copied by others for a period of time Look and feel copyright infringement lawsuits Fair use doctrine Fair use doctrine Digital Millennium Copyright Act, 1998 First major effort to adjust copyright laws to Internet age Implements WIPO treaty that makes it illegal to make, distribute, or use devices that circumvent technology? ased protections of copyrighted materials Slide 8-150 Patents Grant owner 20? year monopoly on ideas behind an invention Machines Man? made products p Compositions of matter Processing methods Invention must be new, non? obvious, novel Encourages inventors g Promotes dissemination of new techniques through licensing Stifles competition by raising barriers to entry Slide 8-151 E-co mmerce Patents 1998 State Street Bank & Trust v. Signature Financial Group Business method patents Led to explosion in application for e? commerce â€Å"business L dt l i i li ti f â€Å"b i methods† patentsMost European patent laws do not recognize M tE t tl d t i business methods unless based on technology Examples Amazon’s One? click purchasing DoubleClick’s dynamic delivery of online advertising Slide 8-152 Trademarks d k Identify, distinguish goods and indicate their source Purpose p Ensure  consumer gets what is paid for/expected to receive Protect owner against piracy and misappropriation Infringement Market confusion Bad faith Dilution Behavior that weakens connection between trademark and product Slide 8-153 Trademarks & Internet CybersquattingAnticy bersquatting Consumer Protection Act (ACPA) Cyberpiracy Typosquatting Metatagging M i Keywording y g Deep linking Framing Slide 8-154 Governance Primary questions Who will control Internet and e? commerce? What elements will be controlled and how? What elements will be controlled and how? Stages of governance and e? commerce g g Government Control Period (1970–1994) Privatization (1995–1998) Privatization (1995 1998) Self? Regulation (1995–present) Government Regulation (1998–present) Slide 8-155 Who Governs E-commerce & Internet? Mixed mode environmentSelf? regulation, through variety of Internet policy and technical bodies, co exists with limited and technical bodies co? exists with limited government regulation ICANN : Domain Name System Internet could be easily controlled, I t t ld b il t ll d m onitored, and regulated from a central location Slide 8-156 Taxation E? commerce taxation illustrates complexity of governance and jurisdiction issues governance and jurisdiction issues U. S. sales taxed by states and local government MOTO retailing E? commerce benefits from tax â€Å"subsidy†yOctober 2007: Congress extends tax moratorium for an additional seven years an additional seven years Unlikely that comprehensive, integrated rational approach to taxation issue will be determined for approach to taxation issue will be determined for some time to come Slide 8-157 Net Neutrality Currently, all Internet traffic treated equally – all activities charged the same rate, no ll i i i h d h preferential assignment of bandwidth Backbone providers would like to charge differentiated prices and ration bandwidth 2010, U. S. ppeals court ruled that FCC had no authority to regulate Internet providers Slide 8-158 Public Safety & Welfare Protection of children and strong g sentiments against pornography Passing legislation that will survive court P i l i l ti th t ill i t challenges has proved difficult Efforts to control gambling and restrict sales of drugs and cigarettes sales of drugs and cigarettes Currently mostly regulated by state law Unlawful Internet Gambling Enforcement Act Slide 8-159 Insight on Society Internet Drug Bazaar Class Discussion Slide 8-160
Wednesday, October 23, 2019
Analysis of the Standard Enthalpy of Combustion for Alcohols Essay
Aim: To investigate the standard enthalpy change of combustion for 5 consecutive alcohols in the alcohol homologous series, methanol, ethanol, propan-1-ol, butan-1-ol and pentan-1-ol, by using a calorimetric method to calculate the heat gained by the 100cm3 water in the experiment, and thus the heat lost by the alcohol lamp at standard temperature and pressure (298 K and 101.3 kPa). Background Knowledge: Alcohols are organic compounds containing Oxygen, Hydrogen and Carbon. The alcohols are a homologous series containing the functional –OH group. As we move down the homologous series of alcohols, the number of Carbon atoms increase. Each alcohol molecule differs by –CH2; a single Carbon atom and two Hydrogen atoms. Combustion is the oxidation of carbon compounds by oxygen in air to form CO2 and H2O. Combustion produces heat as well as carbon dioxide and water. The enthalpy change of combustion is the enthalpy change that occurs when 1 mole of a fuel is burned completely in oxygen. When alcohol undergoes complete combustion it produces carbon dioxide and water as products, and energy is released. The standard enthalpy of combustion of an alcohol (à ¢H °comb) is the enthalpy change when one mole of an alcohol completely reacts with oxygen under standard thermodynamic conditions (temperature of 25 °C and pressure of 101.3 kPa). The standard enthalpy change of combustion of alcohols varies depending on their molecular size. The greater the number of carbons, the higher the standard enthalpy of combustion, as there is the presence of more bonds. The larger the alcohol molecule, the more bonds will be broken and formed, and therefore more heat will be produced. Using experiments, the standard enthalpy of combustion of an alcohol can be found, buy first finding the heat released during the reaction using the equation Heat=mass of water Ãâ€"specific heat capacity of water Ãâ€"rise in temperature of water Note: The specific heat capacity of water is 4.18 Jg-1 °C-1. and then finding the number of moles of alcohol burnt, and dividing the heat by this number. Equipment: 1. 250 cm3 Conical flask 2. 100 cm3  ± 0.08 cm3 pipette 3. Loggerpro thermometer 4. 5 x different consecutive alcohol spirit burners (eg. methanol, ethanol, propanol, butanol and pentanol) 5. Stand 6. 2 x clamps 7. Scales 8. 1500 cm3 distilled water 9. Heat proof mat 10. Matches Method: 1. Connect the temperature sensor to the datalogger. Connect the datalogger to the computer. Ensure the datalogging software is loaded and set to record the temperature of the sensor. Set the sampling rate to 1 sample per second for 210 seconds. 2. Using the pipette, pipette 100 cm3 distilled water into the conical flask. 3. Set up the stand, and clamp the conical flask 25 cm from the table. Also clamp the temperature probe 30 cm from the table, so that it is submerged in the distilled water but not in contact with the conical flask walls. 4. Weigh the alcohol lamp (including its cap) using the scales and record the mass. 5. Place alcohol lamp directly under the conical flask on a heat proof mat. 6. Click ‘collect’ on datalogger to start recording the temperature. After 30 seconds, light the alcohol lamp. 7. When the datalogger reaches 210 seconds immediately extinguish the flame by replacing the cap. ‘Store the latest run’ in loggerpro. 8. Re-weigh the alcohol lamp (including cap) as soon as possible after extinguishing the lamp. 9. Repeat steps 2 – 8 with the same alcohol to obtain trail 2, and trial 3 results. 10. Repeat steps 2 – 9 for 4 other consecutive alcohols. 11. Calculate the average change in mass of each alcohol and calculate the change in temperature of water for each trial. 12. Calculate energy absorbed by this using q=mcà ¢T then calculate à ¢H °comb=qn 13. Plot the graph of à ¢H °combversus number of carbons in alcohol. Apparatus: temperature probe datalogger device 5 cm 25 cm alcohol lamp loggerpro collector on computer heatproof mat 100 cm3 distilled water conical flask clamp clamp Variables: 1. Independent The alcohol used to heat water will be changed, however all alcohols will be primary. The range of alcohols will be 5 consecutive alcohols from the homologous series; methanol, ethanol, propan-1-ol, butan-1-ol, pentan-1-ol. 1. Dependent The change in temperature of the 100cm3 distilled water when heated by an alcohol lamp. 1. Measure the initial temperature and final temperature using loggerpro. The change in temperature can be calculated by: ÃŽâ€T=T(final)-T(initial) 1. Controlled Finding the à ¢H using à ¢H °comb=qn Controlled Variables How is it controlled? Effect on experiment if uncontrolled Type of liquid Using only distilled water for all trials throughout the experiment. Different liquids could result in a difference in the strength of attractive forces between particles, meaning a different specific heat capacity which would affect the calculation of energy gain to water using the equation q=mcà ¢T, and thus an incorrect enthalpy change value. Volume of liquid used Measure 100cm3 of distilled water by using 100 cm3  ± 0.08 cm3 graduated pipette for each trial. If the volume was not exactly 100 cm3 it would directly affect the mass of the water which will affect the q=mcà ¢T value and thus the à ¢H value. Material glassware Use the same brand and materials of a conical flask for all trials. Different materials have different conductivity and may absorb more heat from the alcohol lamp, affecting the overall heat absorbed by the distilled water. Using the same material and brand of conical flask ensures that this is the same for each experiment. Temperature of surroundings For standard enthalpy of combustion, the temperature must be 25 °C however in a classroom this is hard to control, so for each experiment the temperature will stay constant at 19 °C. If the surrounding temperature was to be changing, the distilled water could be losing more, or gaining more heat energy from the surroundings, directly affecting the temperature change and therefore, q=mcà ¢T and the à ¢H value. Distance between the conical flask and alcohol lamp A clamp will be set at a distance of 25 cm from the table, and this the flask will sit at the same height each trial. If the distance changes, the heat lost to the surroundings varies and the heat that reaches the bottom of the calorimeter also varies. This will lead to a difference in rise in temperature of water (à ¢T), and therefore an incorrect calculation for q=mcà ¢T and à ¢H value. Pressure of surroundings For standard enthalpy of combustion the pressure must be 1 atm, however in a classroom this is hard to obtain, so all experiments will be done in a room with the same pressure. Might influence the vapour pressure point, which will affect the q=mcà ¢T value, and thus the à ¢H. Duration of heating The water will be headed for 180 seconds. This ensures that all experiments have the same time to heat the water which directly effects the change in temperature and thus the q=mcà ¢T calculation and the à ¢H value. References: http://gandhijkt.org/blog/wp-content/uploads/2011/03/chemistry-sample-lab-report.pdf http://www.ausetute.com.au/heatcomb.html http://www.s-cool.co.uk/a-level/chemistry/chemical-energetics/revise-it/enthalpy-changes
Tuesday, October 22, 2019
love Essays
love Essays love Essay love Essay Biology 5Laboratory ExercisesandExam ReviewsLab 1Scientific Method and Laboratory ProtocolLab Manual Exercise 1Page 1Please read pages 1-14 and Appendix A, and study the attached handout before attending lab.Please complete the following Activities:Activity 1Pp. 2-4Activity 2Pp. 5-6Activity 3Pp. 7-8Review Questionsp. 13-14, Nos. 1-10Be sure to clean any equipment as well as your work area. Return all materials to their proper place. The Metric SystemLength Meter (m) is the standard metric unit Approximately 39 inches (little over a yard)Mass (weight) Gram (g) is the standard metric unit Approximately 1/28 ounceVolume Liter (l) is the standard metric unit Slightly larger than a quartPrefixes applied to standard units commonly used in biology:Kilo (k) 1000 or 103Centi (c) 1/100 or 0.01 or 10-2Milli (m) 1/1000 or 0.001 or 10-3 Micro (u) 1/1,000,000 or 0.000001 or 10-6Nano (n) 1/1,000,000,000 or 0.000000001 or 10-9 Lab 2The MicroscopeLab Manual Exercise 2Page 15Please read pages 16-24 before attending lab.Please complete the following procedures/exercises:Activity 1Pp. 17-19Activity 2P. 19Clean only when necessary. A piece of dry lens paper works fine.Activity 3Pp. 19-21Activity 4P. 21Activity 5Pp. 21-22Activity 6P. 22 (For Part 2, view the oval-shaped specimen on the slide (not the square-shaped specimen).Activity 7Pp. 23-24Review QuestionsP. 25, Nos. 1-7As always, be sure to clean and dry any equipment as well as your work area. Return all materials to their proper place.Lab 3Cell BiologyLab Manual Exercise 3 Page 27Please read pages 28-32 before attending labPlease complete the following procedures/exercises:Examine model of typical animal cell on display.Using illustration on page 28 as
Monday, October 21, 2019
don giovanni essays
don giovanni essays Don Giovanni is centered around the main character, Don Giovanni, and his effects on the people surrounding him. Don Giovanni is a self-proclaimed lover who cannot resist in seducing women regardless of their availability. Some of the major themes of Don Giovanni are revenge and deception. Revenge is one the more obvious themes of Don Giovanni and is emphasized by the characters, Don Ottavio, Donna Anna, and the Commendatore. This issue of revenge comes about after the masked Don Giovanni slays the Commendatore, Donna Annas beloved father. Donna Anna makes Don Ottavio, her future husband, vow to avenge the death of her father by killing Don Giovanni. She does not know the exact identity of Don Giovanni but after meeting him later, she realizes that he is the one. This encounter increases Donna Anna and Don Ottavios motivation to avenge the Commendatores death. Ottavio had almost succeeded in killing Giovanni during the peasants wedding feast but he managed to escape Ottavio and his sword. Ironically, the character that ends up fulfilling Annas wish is the Commendatore who comes back to life in the form of statue. He dismisses Don Giovanni into the fiery pits of hell where he will forever experience the effects of his sins. The character that fuels the theme of deception in Don Giovanni is Don Giovanni himself. He deceives everyone- from Masetto to his own servant, Leporello. Giovanni throws a wedding celebration for Masetto and Zerlina not because he is happy for the couple but because he wants to seduce Zerlina. Giovanni attempts to build Masettos trust in him so that he will not suspect him of trying to win the affections of Zerlina. After Donna Elvira tries to tell Ottavio and Anna that Giovanni is someone who cannot be trusted, Giovanni tries to convince them that Elvira is insane in efforts to destroy her credibility. Giovanni wants to seduce yet another woman, this time the...
Saturday, October 19, 2019
Arnolds Works and Hidden Radicalism In Them
Arnold's Works and Hidden Radicalism In Them Matthew Arnold was born in 1822 in Laleham-on-Thames in Middlesex County, England. Due to some temporary childhood leg braces, (Machann, 1) and a competitiveness within the large family of nine (Culler xxi) young Matthew earned the nickname Crabby. His disposition was described as active, but since his athletic pursuits were somewhat hindered by this correction of a bent leg (Machann 1), intellectual pursuits became more accessible to him. This may have led him to a literary career, but both his parents were literary (his mother wrote occasional verse and kept a journal, Machann 1) and scholarly, also, and this may have been what helped to accomplish the same aim. His father, Thomas Arnold, was a celebrated educator and headmaster of Rugby School, to which Matthew matriculated. He later attended Oxford, and, after a personal secretary-ship to Lord Lansdowne (Machann, 19) he was appointed Inspector of Schools. He spent most of his adult life traveling around England and sometimes the continent observing and reporting on the state of public schools, and his prose on education and social issues continues to be examined today (Machann xi). He also held the Chair of Poetry at Oxford for ten years, and wrote extensive literary criticism (Culler, xxii). Arnold is probably best known today for this passage of his honeymoon-written (Machann, 31) Dover Beach, the only poem of Arnolds which may be called very famous. This is the last stanza of the poem. Ah, love, let us be true To one another! For the world, which seems To lie before us like a land of dreams, So various, so beautiful, so new, Hath really neither joy, nor love, nor light, Nor certitude, nor peace, nor help for pain; And we are here a on a darkling plain Swept with confused alarms of struggle and flight, Where ignorant armies clash by night. (Strand and Boland, 185-186) This poem, a love poem doubtless, in the end directs us to a love beyond all earthly love, and a rejection of the world as a place of illusions. Religion was the central idea of Arnolds life, but he thought that poetry was an excellent, and, in fact, vital part of the new society, which he thought absolutely necessary to understanding the spiritual component of life. He wrote in his The Study of Poetry, But for poetry the idea is everything; the rest is a world of illusion, of divine illusion. Poetry attaches its emotion to the idea; the idea is the fact. The strongest part of our religion to-day is its unconscious poetry. (463), and We should conceive of [poetry] as capable of higher uses, and called to higher destinies, than those which in general men have assigned to it hitherto. More and more mankind will discover that we have to turn to poetry to interpret life for us, to console us, and to sustain us. (464). So this poet, who was actually not primarily a professional poet for a large part of his life, but instead accomplished all of his great poetic feats during his time off from his employment inspecting schools (Britannica article), argued that poetry was of paramount importance to everyone, and necessary for spiritual health. What kind of poetry would a man like this write? He naturally excelled at lyric and elegy (Schmidt 486,) but he really thought the truly impersonal epics the classic virtues of unity, impersonality, universality, and architectonic power and upon the value of the classical masterpieces (Britannica article) were the highest form and the best model of poetry. He wrote some long dramatic and narrative poems, such as Empedocles on Etna Sohrab and Rustum, and Tristram and Iseult, with classical and legendary themes. He had a classical education at Rugby and Oxford, but distanced himself from the classics (though he thought of them as being the bastion of sanity (Schm idt 486,) but he was also the first Poetry chair at Oxford to deliver his lectures in English instead of Latin (Culler, xxii)). He gave a lecture On Translating Homer, but in it refused to translate it himself, and instead provided criticism on the latest two translations. He was very religious, but also was critical of the established religions of his Victorian time, and wrote most of what now passes with us for religion and philosophy will be replaced by poetry (Harmon, 464,) which must have been a somewhat shocking claim in his time coming from a man employed in more than one capacity to mold young minds. He was a product of his time, but had deep personal reservations about the state of his world. His poetry has been criticized, even his greatest poems, as being an allegory of the state of his own mind. (Culler, xvii). His talents appear to have lain in the personal poems the lyric and the elegy, such as Dover Beach, but his ambitions perhaps lay in what he considered a higher form of poetry the epic. Empedocles on Etna, for example, doesnt have the immediacy and the musicality of Dover Beach or even his famous (at the time) sonnet Shakespeare: Others abide our question. Thou art free. We ask and ask Thou smilest and art still, Out-topping knowledge. For the loftiest hill, Who to the stars uncrown his majesty, Planting his steadfast footsteps in the sea, Making the heaven of heavens his dwelling-place, Spares but the cloudy border of his base To the foild searching of mortality; And thou, who didst the stars and sunbeams know, Self-schoold, self-scannd, self-honourd, self-secure, Didst tread on earth unguessd at. Better so! All pains the immortal spirit must endure, All weakness which impairs, all griefs which bow, Find their sole speech in that victorious brow. (Culler 26) This poem has the fourteen lines of a sonnet, and the final rhyming couplet, but has additional stanza breaks that Shakespeares sonnets did not. Perhaps in this kind of laudatory poetry (perhaps imitating the original form of classical elegies, which were replete with flatteries) Arnold didnt think he was worthy to directly imitate his subjects sonnet form. This example of Arnolds poetry shows his mastery of language even awkward constructions like Self-schoold, self-scannd, self-honord, self-secure trip off the tongue and make sense without seeming simplistic. He uses some of Shakespeares language (didst, thou,) but doesnt make this sound like a piece of Elizabethan poetry, either. He brings the reader to think about what in Shakespeare he or she might have read that is out-topping knowledge. The comparison in the second stanza is definitely classical in origin (perhaps the Colossus of Rhodes, or the battles of the Titans and the gods in Greek mythology), showing Shakespeare metaph orically large enough to stand on earth and live in heaven. We humans on earth can only contemplate his lower parts, his base (Machann says that it is an image of Shakespeare as a lofty mountain, 15.) It is a good way of capturing the wonder and mystery of great art. We ask and ask, as Arnold says, be we dont fully understand a masterpiece or how its creator made it. Also, its just self-conscious enough to show Arnolds modesty about his own talent. He doesnt put himself in the class with Shakespeare, or with Homer or writers of the other classical epics. He hasnt quite reconciled himself, I think, to the idea that the future of poetry lay in the personal, which was a kind of poetry he himself was able to write very well. Arnolds poetry, especially his lyrics and elegies, are often interesting and thought-provoking. His mastery of English is complete, and his diction shows his full Latin and Greek education, with the deep understanding of the origin of Latinate English words. But he does not shy away from good Anglo-Saxon words, either, like Shakespeare does not, and is fully able to use both high-flown language (such as in Empedocles on Etna, These rumblings are not Typhos groans, I know!/These angry smoke-bursts/Are not the passionate breath/Of the mountain-crushd, tortured, intractable Titan king, Culler 65) and very simple, lovely images, such as stars and sunbeams know. His elegy Memorial Verses to Wordsworth is considered one of the best elegies in English. (Schmidt, 485) Arnold was a product of his time the old Victorian world of religion and classical education but he also anticipated the new modern focus on self-choice and the value placed on the personal. He was a poetic talent with a flair for thoughtful poems, with the ability to create beautiful and lasting images. Works cited: Machann, C. Matthew Arnold: A Literary Life, New York: St Martins Press, 1998 Arnold, Matthew. Encyclopedia Britannica. 2006. Encyclopedia Britannica Online. 8 Oct. 2006 http://www.britannica.com/eb/article-9009580. Culler, A. D., Ed., Poetry and Criticism of Matthew Arnold, Boston: Houghton Mifflin Company, 1961. Strand, M., and Boland, E., Eds., The Making of a Poem, New York: W.W. Norton and Company, 2000 Harmon, W. Ed., Classic Writings on Poetry, New York: Columbia University Press, 2003. Schmidt, M. The Lives of the Poets, New York: Alfred A. Knopf, 1999
Friday, October 18, 2019
Cultural Studies Essay Example | Topics and Well Written Essays - 750 words
Cultural Studies - Essay Example 84). The preceding quote very explicitly identifies several forms of essentialism, those being biological, social and cognitive essentialism, and holds as universal to all women. In other words, gender is not just an inherently biological characteristic but it is equally so a matter of cognitive perception and social attribute. Grosz’s definition or understanding of feminism emerges from within her understanding of essentialism and its correlation to gender. Equality feminism is somewhat at odds with the essentialist representations of the female gender. As Genovese (1996) explains, this feminist ideology highlights the similarities between men and women, irrespective of biological differences, and argues gender equality on the basis of the similarities. This stance may be interpreted as a negation of essentialism, insofar as it only concedes to biological differences but does not acknowledge the inherent importance of social and cognitive essentialism. In direct comparison to equality feminism, feminism of difference emphasizes the differences between the genders. As Ebert (1993) explains, difference feminism argues that the sexes are fundamentally different but that differences, whether cognitive or social, do not negate the equality of the sexes, or make one more equal than the other. This feminist ideology is reflective of essentialism. In the final analysis, and speaking from a subjective viewpoint, essentialism is an inescapable reality. The sexes are not just different because of biology but because of cognitive and societal perceptions. Equality feminism, insofar as it fails to acknowledge the aforementioned, is weak. Its weakness is rooted in its assumption that equality is only applicable to those, or that, which are alike. Difference feminism, on the other hand, draws its strength from its recognition of essentialism and its understanding of the fact that equality does not have
GMO the Necessary Evil Essay Example | Topics and Well Written Essays - 250 words - 1
GMO the Necessary Evil - Essay Example There have been many mixed reactions due to GM foods because of the rampant debate surrounding GMO technology. Today, the process of genetic modification is rapidly advancing throughout the planet. In 2004, 8.25 million farmers in 17 nations grew the crops (Ahmed 30). The production and marketing of GM foods are due to the superficial benefits they hold either to the producer or to consumption of these genetic foods. When it was first introduced, GM seeds developers needed their products to be accepted by producers and focus on innovations that have direct benefits to the farmers and the food industry at large. For example, the International Rice Research Institute located in the Philippines manufactured the GM golden rice to help people in South East Asia that were lacking food. Research has shown that GMO presents significant threats because of inconclusive research on their safety and their effects on the environment. However, I believe GMO is a necessary evil that the human race must contend with because it faces an imminent food crisis. GMO is the necessary evil that will solve the world food problem (Specter 34). GMO foods are unavoidable, and we cannot live without them. The World Health Organization (WHO), the Food, Drug Administration, and other scientific bodies in the world have strongly advocated for the use of GM foods, since they do not predispose the human health to any harm. Additionally, research shows that the risks to human health that may be brought about by the consumption of GM foods are the same as those that are produced by the consumption of non-GM foods. Moreover, GM foods are safe to use as they tested for food safety and passed the safety assessment. Some people believe that GM foods should be eliminated due to the risks they have like the health issues. It is a fact that people have eaten some of the GM foods unknowingly, but no complains of serious concerns (Ahmed 18). By 2040, the world’s population is predicted to increase
Subscribe to:
Posts (Atom)