Wednesday, October 30, 2019
Health and Science Essay Example | Topics and Well Written Essays - 6500 words
Health and Science - Essay Example of defense mechanism the person tries to repress any such undesirable feeling or thought or memory which causes any kind of mental turmoil to the person or which he wished not to have occurred ever. In this situation the person just wants to cut that portion of life away or just forget the situation. Hysterical amnesia is an example of this mechanism where a person performs or observes certain disturbing incident and then just forgets the incident and its surroundings. Repression is used in negative way when the person indulges in any harmful act and then forgets it. For example the person hurts or kills others at a certain state of mind or when finds others at a certain situation and then as soon as s/he is taken away from the situation or that particular state of mind s/he completely forgets the incident. Reaction formation is the kind of defense mechanism related to the fixation in consciousness of an idea or desire which is opposite to any unconscious fear. In this situation the person experiencing any conflict becomes obsessive with the situation either in positive or in negative manner. The person unconsciously tries to prove that s/he has completely accepted the situation which is opposite to her/his desire and in doing so s/he becomes over protective or solicitous to the situation. This may be expression of her/his internal guilt of not accepting the condition, e.g. an overprotective mother for her unwanted child. The negative reaction can be seen when this obsession affects the life of the child or others in a dangerous manner. Here the mother interferes too much in the life of the child and even hurts the child or anybody else who is trying to behave opposite to her obsession or notion. When a mother hurts the boyfriend of a girl child in order to keep him away from her daugh ter, it can serve as a negative reaction. Denial is the situation when a person consciously refuses to accept any painful incident. In this case the person tries to escape any
Monday, October 28, 2019
Confucius and Plato Essay Example for Free
Confucius and Plato Essay Editor Ken Wolf, at the beginning of the essay Confucius and Plato: A Few Really Good People, poses the question: â€Å"What is the best way to create a strong society? †(Wolf 25) It was surprising to a novice student of philosophy how similar the ideas of the ancient Chinese sage Confucius and famous Greek philosopher Plato were. Although, Confucius and Plato both made major contributions to the development of society, they showed both similarities and differences in these three subjects: ruling class, education, and faith in humanity. Confucius and Plato both believed virtue and intelligence were key components to creating a strong society. Confucius thought anyone who has been educated had the capability to develop into a ruler. Whereas Plato assumed anyone could be educated, but only a few, those in the ruling class had the ability to reason and thus were qualified to rule. In addition, Plato gave credence to the idea of being born into the ruling class, that the quality to reason was an inherited quality. Confucius and Plato were both strong believers that order was another main factor in a strong society. Although they both had laws to maintain the order, Plato had less faith in people in general to behave in a civilized manner. Both Confucius and Plato were in favor of education and were teachers themselves. Confucius’s followers were the ones who wrote the Analects, which talked about how civilization depends on â€Å"humanity†and â€Å"propriety†. Plato actually wrote The Republic which talked about his ideal â€Å"philosopher-king†. Plato established the Academy, which taught principles of ethics and government, for 900 years. Confucius attempted to teach the ruler to become a better person, but failed. The concepts put forth by Confucius and Plato begin to differ more when faith in humanity comes into play. Confucius and Plato both wanted to think there was good in everyone, but Confucius believed more in a â€Å"†¦society in which human relationshipsâ€â€especially those within the familyâ€â€were more important than laws. †(Wolf 27) Plato concluded that the people needed to be controlled for there to be order. That control was maintained through the law. They both sought out peace and harmony, although Confucius focused more on the behavior of individuals and Plato was interested in universal truth even though it probably would not be accepted,. Plato felt that if a person tried to bring enlightenment to the masses â€Å"†¦they would probably try to kill to him for telling such tall tales, disrupting their lives and challenging their accustomed beliefs. †(Wolf 31) Even today, most people would agree with Confucius and Plato about the importance of educating people in the development of a strong society. The idea of relationships as the basis of society may be summed up in: â€Å"Do unto others as you would have them do unto you. †This Golden Rule seems to be as important to Western society as it was to Chinese society. However, the idea of a better quality of citizen that is better suited to lead society smacks of elitism and would definitely not be accepted in modern democracies. However, that does not mean that the elite educated class from Harvard and Yale has not been overrepresented in American leadership. So perhaps we have a ruling elite, but not as overt as Plato would like. A final thought from the essay would be: a harmonious and orderly existence is important to all societies.
Saturday, October 26, 2019
What is Intelligence? Essay -- Biology Essays Research Papers
What is Intelligence? Intelligence can be defined in many different ways since there are a variety of individual differences. Intelligence to me is the ability to reason and respond quickly yet accurately in all aspects of life, such as physically, emotionally, and mentally. Anyone can define intelligence because it is an open-ended word that has much room for interpretation. Thus my paper is an attempt to find the meaning of human intelligence. There are a couple of scientists who have tried to come up with theories of what makes a human being intelligent. Jean Piaget, a Swiss child psychologist, is well known for his four stages of mental growth theory (1). In the sensorimotor stage, from birth to age 2, the child is concerned with gaining motor control and getting familiar with physical objects. Then from age 2 to 7, the child develops verbal skills, which is called the preoperational stage. In the concrete operational stage the child deals with abstract thinking from age 7 to 12. The final stage called the formal operational stage ends at age 15 and this is when the child learns to reason logically and systematically. (1) Piaget's theory provides a basis for human intelligence by categorizing the major stages in child development and how they contribute to intelligence. Each of these invariant stages has major cognitive skills that must be learned. Knowledge is not merely transmitted verbally but must be constructed and reconstructed by the learner (3). Thus this development involves a few basic steps. The first fundamental process of intellectual growth is the ability to assimilate the new events learned into the preexisting cognitive structures. The second fundamental process is the capability to change those ... ...ists approach in defining human intelligence. I believe that intelligence is the ability to utilize our entire brain, which will most definitely include Gardner's theory but more. Since we only use a small percentage of our brain, I imagine our brains have a lot more forms of intelligence than the ones Gardner proposes as well as more stages of child development than the ones Piaget proposes. As I mentioned before, intelligence is an open-ended word that may never have an agreed upon definition, but we all have our own definition. References: 1)Jean Piaget, Swiss Child Psychologist http://www.indiana.edu/%7Eintell/piaget.shtml 2)The Seven Human Intelligences http://www.homeschoolzone.com/hsz/leppert2.htm 3)Jean Piaget: Intellectual Development http://www.sk.com.br/sk-piage.html 4)Seven Intelligences http://www.ibiblio.org/edweb/edref.mi.th4.html
Thursday, October 24, 2019
The History of Ku Klux Klan :: essays research papers
It has been heard and talked about throughout history, that there was never such a thing as "The" Ku Klux Klan. There is traceable evidence of different movements and organizations that have used this name. The history of the K.K.K. corresponds with the history of race relations from our country. The Klan can be divided into five different eras: The Reconstruction, The End of the War (& Pulaski Six), The Klan Mobilization, The Reign of Terror, and The End of the First Era. Each stage was brought out by economic and social changes. Each stage also is at the same point in time as an escalation in racial standings. As it was started in 1865, the Ku Klux Klan has sent a sense of terror through people’s minds. A group of six white Southerners was the start of this organization. The history of violence of the K.K.K. is a result of the hatred and anger from the end of the Civil War. The reason for this hatred was because blacks had won their struggle for freedom of slavery. They fought to deny the civil rights for African Americans. They wanted the blacks to be forced into slavery once again. The K.K.K. tore apart reconstructing governments and established a reign of terror and violence throughout the whole war-torn South. The first era of the K.K.K. lasted about three or four years, than faded. The arose again after World War 1. The overall story starts with many generations of Americans learning hard lessons of life. These experiences led to fierce individualism, surprising inventiveness, and the thought that they could be whatever and go wherever they wanted to. Other things occurred alon g with these thoughts. "Frontier Justice" was an instant, private and violent method of settling differences without law officials. This was a large component to the motivation of the Ku Klux Klan. To some whites the freedom of slaves meant that their social and economic ways of life had been defeated. For some white Southerners, this was a nightmare that came true. The number of slaves living around the whites were seen as threats. Night patrols were a result of bloody slave revolts. These patrols consisted of white men that were empowered and authorized by law to look enforce a curfew for slaves, look for runaways and guard rural areas. This was done to prevent any black rebellions. These patrollers were given the right to whip any violators they caught.
Wednesday, October 23, 2019
The Refractive Index
The refractive index Aim: The aim of this experiment is to find the refractive index of a glass prism. In this experiment, the independent variable is the angle of incidence, and the dependent variable is the angle of refraction. Theory: Snell’s law relates the angle of incidence and refraction to the ratio of the velocity of the wave in the different media. The formula for Snell’s law is the following: Sin isinr = v1v2 = n Where i is the angle of incidence, r is the angle of refraction and v1 and v2 are the velocities of the wave in different media and n is the refractive index.Light refracts when it passes from one medium to another. The ratio of the velocity of light in the two media is called the refractive index. Materials and method: For this experiment we used a half glass circle attached on the center of a laminated paper with a drawn circle around it, a blue/violet laser with a wavelength 447nm and a wood block. First we started by placing the flat side of the half glass circle attached to the paper in front of the laser. Depending on the angle we wanted to find, we used the drawn circle on the paper to decide where to put the laser on the half side of the drawn circle.The angles of incidence we used were 10 °, 20 °, 30 °, 40 °, 50 ° and 60 °. First we measured the angle of incidence, where we placed the wood block perpendicular to the ray. To control the variables, the laser should have the same wavelength for all the angles to get the same refractive index and the ray should hit the center of the glass circle, so to check that the ray hits the center of the glass circle, we placed a wood block at the angle of reflection to see if the angle of reflection is the same as the angle of incidence, because we know that the angle of incidence is equal to the angle of reflection.Another thing which makes it easier to hit the center of the glass circle is by placing a paper on the flat side of the circle and see if the ray hits the ce nter of the circle and by placing the wood block perpendicular. Then we measured the angle of the refraction on the other half of the drawn circle, where we again placed the wood block perpendicular. We measured the angle of refraction by looking perpendicular down from the wood block, to see close where the ray hits the wood block, to see more precise where the angle of refraction is.We repeated this method for all the different angles of incidence and repeated every angle two times. D 2 1 2 You write â€Å"to control the variables†which variables? You should mention the wavelength and the hitting the center explicitly as variables to be controlled and why. Results: Angle of incidence  ± 0. 1 °| Angle of refraction1  ± 0. 1 °| Angle of refraction2  ± 0. 1 °| Angle of refraction3  ± 0. 1 °| 10 °| 6. 9 °| 7. 1 °| 7. 0 °| 20 °| 13. 6 °| 13. 5 °| 13. 5 °| 30 °| 20. 0 °| 20. 1 °| 20. 0 °| 40 °| 25. 6 °| 25. 8 °| 25. 7 °| 50 °| 30 . 7 °| 30.  °| 30. 8 °| 60 °| 35. 9 °| 35. 9 °| 36. 0 °| Example: First we find the average and uncertainty for the angle of refraction: 7. 2- 6. 8 2 =  ± 0. 2 ° Angle of incidence  ± 0. 1 °| Average angle of refraction ± 0. 2 °| 10 °| 7. 0 ° | 20 °| 13. 5 ° | 30 °| 20. 0 ° | 40 °| 25. 7 ° | 50 °| 30. 8 ° | 60 °| 35. 9 ° | The refractive index: We know that the formula is sinisinr = v1v2 = refractive index, so by applying the information we know to the formula, we can find the refractive index. Example: Uncertainty for refractive index: ( sin(10. 1)sin(6. 8) – sin (9. )sin(7. 2) )/2 =0. 045 ?  ± 0. 05 sin(10 °) sin(7. 0 °) = 1. 42  ± 0. 05 Angle of incidence  ± 0. 1 °| Angle of refraction  ± 0. 2 °| Refractive index| 10 ° | 7. 0 °| 1. 42  ± 0. 05| 20 °| 13. 5 ° | 1. 47  ± 0. 03| 30 °| 20. 0 ° | 1. 46  ± 0. 02| 40 °| 25. 7 ° | 1. 48  ± 0. 01| 50 °| 30. 8 ° | 1. 50 ± 0. 01| 60 °| 3 5. 9 ° | 1. 48  ± 0. 01| Refractive index Intervals: Angle of incidence  ± 0. 1 °| Refractive index intervals| 10 ° | 1. 37 – 1. 47| 20 °| 1. 44 – 1. 50| 30 °| 1. 44 – 1. 48| 40 °| 1. 47 – 1. 49| 50 °| 1. 49 – 1. 51| 60 °| 1. 47 – 1. 49| DCP 2 2 2 Conclusion:From the table we can see that there is no interval, where at least one number from each interval is included. The consequences of the small angles are more serious than the bigger angles. Snell’s law states that no matter what the angle of incidence is, the refractive index would be the same. From the results I gained (disregarding the angle of incidence equals to 10 °), I can state that Snell’s law is confirmed in this case. Evaluation: The method has some weaknesses. The glass prism is not exactly in the center of the drawn circle, which is why the results are not quite correct.There might also be some misreading when reading the small angles, that has leaded to that the small angles of incidence’s results are a bit uncommon and almost an outliers, but overall reading the angles could be one of the errors too. Suggestions: It would be better to glue the glass prism more precise in the center of the circle, so that the result would be more precise. Another thing to improve the method is by using a Vernier gauge to measure the size of small distances more accurate. CE 1 2 2 The one because the meaning of the red sentence is not clear! Very well, this is your best up to now. grade 7
Tuesday, October 22, 2019
Free Essays on Equality Of Education
An unequal level of achievement in schools is one of the most familiar aspects of the British education system. As rule schooling in Britain is a white middle class patriarchal institution and those who do not fit into those categories often find themselves underachieving, much of the time through no fault of their own. The group that this study will concentrate on is the ethnic minority population in Britain, and through the examination of materialist and cultural explanations will hopefully gain a further understanding of why many capable ethnic minority pupils do not reach their full potential in the British school system. One of the most popular arguments put forward for this is that the system fails the pupils and that there is inherent racism in the education system. Although this is certainly a factor, it is a simple one level explanation and the different layers involved in this explanation must be further examined before an adequate account is obtained. The case of ethnic minority underachievement in schools is a complex one as there are many overlapping inequalities with other groups, for example most ethnic minority children live in poor areas and face many of the same disadvantages as working class children such as poor resources within schools and a shortage of teachers. Therefore in this case it is very important to distinguish between equality of outcome, which has been concentrated on most in recent years, and equality of opportunity. If children in poor areas regardless of colour have overcrowded classrooms and fewer resources to learn with then it is almost inevitable that their quality of education will be poorer than those with better opportunities. Therefore in many cases it is not simply a case of ethnic minority pupils underachieving but working class pupils underachieving and comparison with white middle class children is unfair as it gives a skewed analysis which has no real relation to ethnic backgrou... Free Essays on Equality Of Education Free Essays on Equality Of Education An unequal level of achievement in schools is one of the most familiar aspects of the British education system. As rule schooling in Britain is a white middle class patriarchal institution and those who do not fit into those categories often find themselves underachieving, much of the time through no fault of their own. The group that this study will concentrate on is the ethnic minority population in Britain, and through the examination of materialist and cultural explanations will hopefully gain a further understanding of why many capable ethnic minority pupils do not reach their full potential in the British school system. One of the most popular arguments put forward for this is that the system fails the pupils and that there is inherent racism in the education system. Although this is certainly a factor, it is a simple one level explanation and the different layers involved in this explanation must be further examined before an adequate account is obtained. The case of ethnic minority underachievement in schools is a complex one as there are many overlapping inequalities with other groups, for example most ethnic minority children live in poor areas and face many of the same disadvantages as working class children such as poor resources within schools and a shortage of teachers. Therefore in this case it is very important to distinguish between equality of outcome, which has been concentrated on most in recent years, and equality of opportunity. If children in poor areas regardless of colour have overcrowded classrooms and fewer resources to learn with then it is almost inevitable that their quality of education will be poorer than those with better opportunities. Therefore in many cases it is not simply a case of ethnic minority pupils underachieving but working class pupils underachieving and comparison with white middle class children is unfair as it gives a skewed analysis which has no real relation to ethnic backgrou...
Monday, October 21, 2019
Mesohippus - Facts and Figures
Mesohippus - Facts and Figures Name: Mesohippus (Greek for middle horse); pronounced MAY-so-HIP-us Habitat: Woodlands of North America Historical Epoch: Late Eocene-Middle Oligocene (40-30 million years ago) Size and Weight: About four feet long and 75 pounds Diet: Twigs and fruit Distinguishing Characteristics: Small size; three-toed front feet; large brain relative to its size  About Mesohippus You can think of Mesohippus as Hyracotherium (the ancestral horse previously known as Eohippus) advanced a few million years: this prehistoric horse represented an intermediate stage between the smallish hooved mammals of the early Eocene epoch, about 50 million years ago, and the large plains grazers (like Hipparion and Hippidion) that dominated the Pliocene and Pleistocene epochs over 45 million years later. This horse is known by no less than twelve separate species, ranging from M. bairdi to M. westoni, which roamed the expanse of North America from the late Eocene to the middle Oligocene epochs. About the size of a deer, Mesohippus was distinguished by its three-toed front feet (earlier horses sported four toes on their front limbs) and the wide-set eyes set high atop its long, horse-like skull. Mesohippus was also equipped with slightly longer legs than its predecessors, and was endowed with what, for its time, was a relatively large brain, about the same size, proportionate to its bulk, as that of modern horses. Unlike later horses, however, Mesohippus fed not on grass, but on twigs and fruit, as can be inferred by the shape and arrangement of its teeth.
Sunday, October 20, 2019
A Complete List of John Grisham Books
A Complete List of John Grisham Books John Grisham is a master of legal thrillers; his novels have captured the attention of millions of readers, from adults to teens. In three decades he has written nearly one book per year and a number of those have been adapted into popular movies. From his debut novel A Time to Kill to the 2017 release of Camino Island, Grishams books are nothing short of captivating. Over the years, he branched out from legal stories as well. His complete list of published books includes stories about sports as well as non-fiction. Its a compelling body of literature and if youve missed one or two books, youll definitely want to catch up. Lawyer Turned Best-Selling Author John Grisham was working as a criminal defense attorney in Southaven, Mississippi when he wrote his first novel. A Time to Kill, based on an actual court case that dealt with racial issues in the South. It enjoyed modest success. He entered politics, serving in the state legislature on the Democratic ticket and began writing his second novel. It was not Grishams intent to leave law and politics to become a published author, but the runaway success of his second endeavor The Firm changed his mind. Grisham quickly became a prolific best-selling author. In addition to novels, he has published short stories, nonfiction, and young adult books. Grisham Captures Mainstream Readers From 1989-2000 Few new writers have exploded onto the literary scene like John Grisham. The Firm became the top-selling book of 1991 and was on The New York Times bestseller list for nearly 50 weeks. In 1993, it was made into the first of many movies based on Grishams novels. From The Pelican Brief through The Brethren, Grisham continued to produce legal thrillers at the rate of about one per year. He tapped into his experience as a lawyer to create characters who faced moral dilemmas and dangerous situations. During the first decade of his work, he produced several novels that were eventually made into major big-screen films. These include Pelican Brief in 1993; The Client in 1994; A Time to Kill in 1996; The Chamber in 1996; and The Rainmaker in 1997. 1989 - A Time to Kill1991 - The Firm1992 - The Pelican Brief1993 - The Client1994 - The Chamber1995 - The Rainmaker1996 - The Runaway Jury1997 - The Partner1998 - The Street Lawyer1999 - The Testament2000 - The Brethren Grisham Branches Out From 2001-2010 As the best-selling author entered his second decade of writing, he stepped back from his legal thrillers to examine other genres. A Painted House is a small town mystery. Skipping Christmas is about a family that decides to skip Christmas. He also examined his interest in sports with Bleachers, which tells the story of a high school football star returning to his hometown after his coach dies. The theme continued in Playing for Pizza, a story about an American playing football in Italy. In 2010, Grisham introduced Theodore Boone: Kid Lawyer to middle school readers. This book about a kid lawyer successfully launched an entire series centered around the main character. It introduced the author to younger readers who are likely to become lifelong fans. Also in this decade, Grisham released Ford County, his first collection of short stories and The Innocent Man, his first nonfiction book about an innocent man on death row. Not to turn his back on his dedicated fans, he rounded out this time with several legal thrillers as well. 2001 - A Painted House2001 - Skipping Christmas2002 - The Summons2003 - The King of Torts2003 - Bleachers2004 - The Last Juror2005 - The Broker2006 - The Innocent Man2007 - Playing for Pizza2008 - The Appeal2009 - The Associate2009 - Ford County (short stories)2010 - Theodore Boone: Kid Lawyer2010 - The Confession 2011 to Present: Grisham Revisits Past Successes Following the success of the first Theodore Boone book, Grisham followed up with five more books in the popular series. In Sycamore Row, a sequel to A Time to Kill, Grisham brought back protagonist Jake Brigance and key supporting characters Lucien Wilbanks and Harry Rex Vonner. He continued his policy of writing one legal thriller a year and threw in a couple of short stories and a baseball novel called Calico Joe for good measure. Grishams 30th book was released in 2017 and titled Camino Island. Another intriguing crime novel, the story centers around stolen F Scott Fitzgerald manuscripts. Between a young, enthusiastic writer, the FBI, and a secret agency, the investigation tries to track down these handwritten documents on the black market. 2011 - Theodore Boone: The Abduction2011 - The Litigators2012 - Theodore Boone: The Accused2012 - Calico Joe2012 - The Racketeer2013 - Theodore Boone: The Activist2013 - Sycamore Row2014 - Gray Mountain2015 - Theodore Boone: The Fugitive2015 - Rogue Lawyer2016 - Partners (a Rogue Lawyer short story)2016 - Theodore Boone: The Scandal2016 - Witness to a Trial (a digital short story)2016 - The Whistler2017 - Camino Island
Saturday, October 19, 2019
Compensation and Benefits Paper Essay Example | Topics and Well Written Essays - 1000 words
Compensation and Benefits Paper - Essay Example For example, the same job might have different structures, meaning that the levels that the organization uses are diverse. In this case, the levels used by the organization determine the organization structure, since the different people report to different managers. In the example of software engineers in the Phoenix area, the type of job structures is best exemplified. In this case, there are three different job structures for the same occupation, each job structure attracting a different salary. The first job structure is Software engineer 1, which is the lowest level in the field. This job structure attracts an average salary of $58,001 (Salary.com, 2011), and from the job description, requires up to 2 years of experience in a similar position. An individual in this position is always under immediate supervision, and cannot exercise independent judgment in the job. The second job level is a software engineer 2, who makes an average salary of $73,539 (Salary.com, 2011), and is a l ittle higher than the software engineer 1. This job level requires between 2 and 4 years of experience, performs more tasks that the first job level. This employee reports to one manager, and is usually not under immediate supervision. ... The information described above can be used in the development of a pay structure in a simple way, since the factors that determine pay are already evident. The description of three job levels above indicates that two factors that determine the pay structure in an organization. The first factor is the experience that an individual possesses (Ranken, 2010). The educational level is usually constant, since an individual is expected to possess minimum qualifications before consideration for the job is done. In this case, the first level, which earns the lowest salary, possesses the least experience, and the third job level possesses the highest job experience. This indicates that the development of a pay structure should be dependent on the experience that an individual possesses. From the above information, it is also evident that the development of a pay structure is also dependent on the level of independence that an individual is accorded in an organization (RAnken, 2010). For examp le, a first level engineer is accorded the least level of independence, therefore, it is to be expected that the pay grade will be the lowest. Conversely, the third level engineer is accorded the highest level of independence; therefore, the pay grade is the highest. Benefits Benefit Description Value Reason for benefit Social Security Social security is a contributory program made by all employers to a government fund for the retirement, medical aid, and disability fund for employees. The employees are assured that they will get retirement benefits and medical care at the moment they retire. Required by law Disability Disability benefits are not mandatory since they are already covered by social security. This benefit is
Friday, October 18, 2019
New Product Development is the Key to Apple's Marketing Success Coursework
New Product Development is the Key to Apple's Marketing Success - Coursework Example The latest product introduced by Apple is the iPhone 4S. Apple announced the launch of iBooks 2 for iPad which would feature iBooks textbooks, iTunes U application for iPhone, iPad and for iPod touch (Apple Inc-a, 2012). Apple aims to bring the best experience for its customers through its product and services. The business strategy of Apple is to leverage the unique abilities of designing and developing the company’s own operating system, software and hardware in order to provide its customers with superior products and innovative designs. The company believes in innovation which is the key strategy for the success of the company; as a result, Apple invests in its research and development in order to introduce new and innovative products. Apart from its R&D, the company also invests in its marketing and advertisement as a part of Apple strategy to stay ahead of its competitors. Apple strategy also includes expansion of its distribution network to reach more clients and provid e the potential customers with high quality of sales and post purchase experience (Apple Inc, 2011, p.1). New Product Development Any changes made to a product are termed as new product development. ... New product development is one of the key strategies of Apple; it is through new product that the company has been able to taste success being one of the leading companies globally. Apple launches new product in the markets to stay ahead of its competitors, to continue the product life cycle, to give the customers what they need, and to enhance the strategy. According to Steve Jobs, new product lines tend to give people the products which are needed by the consumers. The company expresses its vision with the help of its product, exciting the customers and making them proud of owing an Apple product. The life cycle of any product needs to be modified carefully. Apple introduces new product when its earlier products are entering the maturity phase of the PLC giving no or less chance to its competitors to stay ahead. Thus, with continuous innovation, Apple provides a huge competitive edge over its competitors and helps in maintaining its number one position. With its innovation strategy the company has introduced many new products and also planned to launch few more in the coming years or so. Apple has applied a strategy of continuously milking its cash cow and has done a fantastic job. Each of its products, ranging from the Mac, iPhone, and iPod has been fertile, speaking about leverage designs and supply chain. The main motive of milking its product is to stay competitive in the market. Apple product possesses elegant design which integrates software, hardware and its services. One of the closest competitors of Apple is Android which has come up with similar products and is doing quite well in the market. Therefore, Apple should constantly introduce new products with elegant design which is the USP of Apple for its consumers. Apple
Depression and Anxiety in PEG Feeding Dissertation - 1
Depression and Anxiety in PEG Feeding - Dissertation Example Expand a few lines†¦ TABLE OF CONTENTS TABLE OF CONTENTS 3 LIST OF FIGURES Abstract This dissertation is about the social and psychological impact, including anxiety and depressed moods, on people who are artificially fed via a tube based on percutaneous endoscopic gastrostomy (PEG). The analysis is based on a framework that highlights two sides of sickness, â€Å"disease†underlying the placement of a feeding tube (biological malfunctions recorded as particular disease categories, e.g., cancer, neurological disorders, cardiac diseases, palsy) and the response to this by patients and their carers. This distinction between â€Å"disease†and â€Å"illness†provides a view of the social and psychological complexities involved. These are often overlooked when artificial feeding is adopted. The dissertation proceeds via a description of the literature search on PEG. The primary tools used in this search is the topical search (e.g., â€Å"socio-psychological imp acts of PEG feeding†) on the internet and the exploration of various databases, such as Cinahl, PubMed, Medline, Cochrane and Google Scholar. The literature used refers to reports of â€Å"new†(i.e. past decade) findings. In a very few cases only, when outlining â€Å"illness responses†to â€Å"disease†and the ensuing person-oriented framework, a few basic sources pre-dating 2000, are drawn upon. The accompanying review of relevant sources attempts to bring out the emphasis of â€Å"disease†and the omission of efforts to develop a framework or model and conceptual tools to grasp the social and psychological implications of artificial feeding due to disability. Such a model can, however, be of great value to nursing care and operating practice. Such a framework is available to us via a number of qualitative studies and a â€Å"narrative understanding of the illness experience†. The usefulness of this body of literature will be examined in the ensuing discussion. In the conclusion I will stress the value of a qualitative, person-oriented perspective (the â€Å"illness experience†) for a humanistic medical and nursing practice. Introduction This dissertation is based on a lengthy review of available literature on the social and psychological impact, including anxiety and depressed moods, on people who are artificially fed via a tube based on percutaneous endoscopic gastrostomy (PEG) This review allows me to examine the emotional costs involved in PEG tube feeding, especially with regard to experiences and the coping with the emotional (anxiety, depressed mood) and social costs of tube feeding before, during and after the placement of a PEG tube. This dissertation takes the patient’s point of view and reviews two groups of literature in depth: one of the two is person-and qualitatively-oriented and proposes a meaning-centred, qualitative and humanistic method/perspective. At the same time, one realizes tha t patients are found in a larger health care context where medical and health care professionals operate. Their and the perspective of medicine must be understood as well. Byron Good’s (2008) book on Medicine, Rationality and Experience provides a good introduction to their and the patient’s perspective. It is therefore meaningful to compare and contrast the views and perspectives of these professionals and the views that patients express, their way of coping with PEG tube feeding, their modes of reasoning, their various feeling-states (anxiety, depression) and the lives they live. I have chosen
Thursday, October 17, 2019
WiFi, VPNs & Encryption Assignment Example | Topics and Well Written Essays - 250 words - 1
WiFi, VPNs & Encryption - Assignment Example In this scenario, different restrictions are implemented on the system access mechanisms. As a result, it becomes very difficult for these security threats to pollute a system and spread to other systems and devices (Merrifield, 2015). In other words, the concept of least privileges is used by the system administrators to offer the smallest amount of system resources needed to complete important business tasks. This mechanism is implemented through a variety of methods such as user rights (for instance putting restrictions to users’ rights, the way they access to the systems), resource permissions for instance implementing restrictions on CPU, network, memory and file system permissions. For instance, if a middleware system simply needs access to the network, the capability to write to a log, and read access to a database table, it refers to all the authorizations that should be approved. However, the middleware server should not be granted administrative privileges in any cas e under any circumstances (OWASP,
Human Resources Problems Assignment Example | Topics and Well Written Essays - 250 words
Human Resources Problems - Assignment Example Based on your text and supplemental readings, what are some of the potential problems associated with employee self-service? After sharing some problems facing self-service, how would you address those problems? What is your professional opinion related to management self-service, where managers have access to more employee information through HRIS systems?In a self-service system like ESS, many errors remain covered for a long time which negatively interferes with the quality process. Though employee satisfaction is increased by use of ESS, many ESS software used by companies have many disadvantages like costs associated with its maintenance, functionality issues, and poor performance. These problems can be rectified by using an ESS software which is specifically designed to meet an organization’s needs.5-Does the web present problems for employee self-service applications? Find an article on this subject and provide a summary of the article, including the web address.Many we b self-service pitfalls have been reported. The web creates problems for ESS applications because every bit of employees’ interaction with employers is automated. Technology is always better and lack of HR automation will seriously affect many organizations in terms of time of costs. Automation of HR functions has relieved the HR professionals from much of the burden because much of the tasks assigned to them by managers and employees can be now handled by themselves by use of ESS and manager self-service.
Wednesday, October 16, 2019
WiFi, VPNs & Encryption Assignment Example | Topics and Well Written Essays - 250 words - 1
WiFi, VPNs & Encryption - Assignment Example In this scenario, different restrictions are implemented on the system access mechanisms. As a result, it becomes very difficult for these security threats to pollute a system and spread to other systems and devices (Merrifield, 2015). In other words, the concept of least privileges is used by the system administrators to offer the smallest amount of system resources needed to complete important business tasks. This mechanism is implemented through a variety of methods such as user rights (for instance putting restrictions to users’ rights, the way they access to the systems), resource permissions for instance implementing restrictions on CPU, network, memory and file system permissions. For instance, if a middleware system simply needs access to the network, the capability to write to a log, and read access to a database table, it refers to all the authorizations that should be approved. However, the middleware server should not be granted administrative privileges in any cas e under any circumstances (OWASP,
Tuesday, October 15, 2019
Reflection on the book 'The White Castle' Essay Example | Topics and Well Written Essays - 500 words
Reflection on the book 'The White Castle' - Essay Example Like in the story Hoja, a Muslim, made the western slave tell him about their life styles and he preferred these western styles over theirs. Pamuk portrays religion with great care in the book and shows how the two different thoughts of West and East can merge together. The Ottoman society follows the old traditions according to their religion and thus do not take any sanitary precautions when a plague hits Istanbul, however the Italian slave advises the Sultan to use such measures for the end of plague and the Sultan does eventually follow the Western way of removing the plague which proves to be successful. Pamuk in his story White Castle tells about the realities of life in the 17th century. It describes different events taking place in the Ottoman Empire. Cruelty is prevalent through out the plot of the story and can be clearly viewed in the characters. The Italian Scholar seems to be laid into a trap by the Eastern world but is saved by his own intellect. Similarly Pamuk is portraying the Eastern world with great uncertainty and cruelness. The pirates who capture the Italian scholar are cruel in nature and are supposedly going to kill the scholar. However the scholar’s intellect helps him to misguide the pirates into thinking that he is a doctor and this saves his life. But on the other hand the pirates do not free the scholar; they rather gift him as a slave to Hoja. The character of Hoja can also be viewed to be cruel as he absorbs all the information from the Italian scholar about his lifestyle and even then does not let him free. The cruel nature of Hoja can yet again be seen in his aim of designing a deadly weapon which would help his empire to conquer other states. And furthermore, when the weapon does not work as expected by him he steals the identity of the Italian scholar and runs away leaving him in the Ottoman
Health and Social Care Essay Example for Free
Health and Social Care Essay Government: (National)- Greenwich Council (Locally) World Heritage Site (Internally). The National Maritime Museum set target by the government to meet the needs and to attract different types of customer all over the world and also to provide better facilities such as providing wheel chair for disabled people. Sponsors: one of the sponsors is PO they want quality exhibits, which means they could have good publicity which lead to better public image. Researchers- Researchers produce different types of research from over the world and encourage the museum to improve on their exhibits. Suppliers: who supply food and other products and the supplier expect good pay at the right time. Owners of Exhibits: The owner of exhibits wants security on their collections of picture or etc and a good feedback from the museum. Customers: The customer wants good Customer Service, helpfulness staff and to provide better facilities for special needs. Staff: The staff should be motivated, which then will lead to good sales and profit. The staff will have an experience working with different types of customers. Friends ([emailprotected]): Friends of the National Maritime Museum actively support the largest Maritime Museum in the world. The friends mission is to support the work of the National Maritime Museum, the Royal Observatory and the Queens House by. In 1997/1998 the Maritime Museum had 50% of people visited the museum, but in 1998/1999 the Maritime Museum had 54%, which means the visitor number has increased by 4%. In 1999/00 the museum had 52% but by 2000/01 it has decreased by 3%. By 2001/02 the museum visitors has gone up by 10%. This table shows the predicted target market. The age group of 18-24, In 1997/98 they were 10% of Visitors and in 2001/02 it was 7% which means it has decreased by 3 % since 1997/1998. In 1997/98 they were 18% of visitors visited who are aged from 25-34 and in 2001/02 it was 19%, which means it has gone up by 1% since 1997/98. Although it was a change in 1998/99, because the number of visitors who are aged 25-34 has increased by 4% since1997/98. The age group 35-44, in 1997/98 it was 23% and in 2001/02 it was 23% which means they have been no change but in 1999/00 the percentage went up suddenly they have decrease since 2000/02. In 1997/98 it was 24% but in 1998/99 the percentage went down by 2%. From 1999/01 they have been no change of percentage of visitors arriving but in 2001/02 the percentage has decreased by 1% since 2000/01. The age group of 55-64, in 1997/98 it was 15% but the figure went down until 1999/00. However the figure went up in 2000/02. In 1997/98 it was 10% of visitors who are aged 65+ but the percentage stayed same until 1999. Although the percentage starts to rise slowly in 2000 by 2001 the percentage has gone up by 2%. This table shows the predicted income. In 1997/98 it was 37% visitors visited who were A/B Income earners, but by 2001/02 it has increased by 47%. The C1 Income earners visited the museum in 1997/98 was 46% and in 2001/02 it has decreased by 35%, but also the percentage did rise in 1999/00. In 1997/98 it was 12% who were C2 income earners, but in 2001/02 it has decreased by 9%, however the figure did rise in 1999/00. the D/E Income earners visited the museum in 1997/98 was 5% but in 2001/02 it has gone up by 9%, but there was steady change in 1998/2000. Overall it show that in 1997/98 it was most likely that C1 Income earners visited the Museum but by 2001/02 it has changed because A/B Income earners are likely to visit the museum * Predicted staffing needs This table shows the staffing levels. The visitors were very satisfied with the exhibition display in 1997/98 but the visitors were very satisfied in 2001/02 because it has gone up by 4%. There were only 2% of visitors not satisfied with the exhibition display in 1997/98 but it went down by 1%. In 1997/98, 50% of visitors were satisfied with the staff but in 2001/02 the percentage has increased by 14%. They were no satisfaction in 1997/98 or in 2001/02. This is an evaluation on customer service at Maritime Museum. I will be evaluating the service provided by the museum when I went for the visit. I enjoyed my trip to the Maritime Museum and it has helped with my assignment on customer service and also they provided information, which will help my coursework. The service provided by the National Maritime Museum was excellent and the staffs were motivated to their work. I had great greetings when I visited the museum and I was provided information on the exhibits, when I didnt know. E. g. when I visited one of the history section I didnt know about Nelson so the staff took his time to explain for us, so I thought that was good customer service. The lecture from the staff was good because they took their time on providing information, which I thought it was a good customer service. The purpose of this letter is to express to you my apologies for any inconvenience you may have experienced on the 27th of March 2006 due to standards of service you experienced in our restaurant. I have taken my time to investigate your case and the possible reason I could give you is that my staff didnt have record of your booking and so you had to wait for 45 minutes to be seated because the restaurant was full. We are terribly sorry if you were embarrassed by our service. During the 45 minutes the manager sat you at the bar and gave your party free drinks. As soon as the table were clear, the staff sat you down in two different tables and meanwhile we were preparing vegetarian food. I have come up with a solution to solve these problems. I will be talking to my staff about the record of booking. I will also have word with the waitress and provide better training on dealing with customers. I will make sure the systems work correctly. For the Disappointment service you had received by our restaurant we will provide you a free meal and better service from our restaurant. Once again I am terribly sorry for the service provided by our restaurant
Monday, October 14, 2019
Tektronix Inc Global Erp Implementation Management Essay
Tektronix Inc Global Erp Implementation Management Essay For Welti (1999), an ERP implemented in a complex international environment normally incorporates four major sequential stages (Planning, Realization, Preparation and Productive phases) that must go in parallel with a proper Change management, Risk Management, Project Control, Project Team Training and User Training. As the global implementation was done by waves with different characteristics, it can be seen that different project management strategies were adopted. In this part only the most characteristic features of the overall project are highlighted and these issues are limited to the information given by the case study (Planning and Realization stages). In the Planning stage, many issues can be mentioned. First, the selection of the ERP package was quite straightforward and relied mainly on Neun and Vance ´s judgment, experience and criterion; they decided to choose Oracle as a single vendor in order to avoid dealing with the complexity of multiple providers which, although it may cause future problems due to the dependency created to a single vendor, it was a practical decision for the implementation process. In this decision, they devoted neither too much time in costing nor resources in evaluating the alternative packages. Secondly, the steering committee clearly defined the model, guidelines and principles under which all the systems were adhered to. Also, it was defined the financial architecture that could meet the new business model: Order Management was different for each division (for customer purposes), but the rest of accounting elements were based on single definitions in order to provide worldwide control. Thirdly, th e Project Team structure offered advantages such as the cross-functional working style, which created a regional and divisional control. Then, the problems and tasks could be addressed from these two perspectives, but the disadvantage of this approach might be the conflicts of power during the implementation, as authority was given to divisional and/or regional leaders which could have created confusion to users and sub-teams. Fourth, it seems that within each wave they did not allocate carefully all the resources, people or time needed for being successful, which led to the time constraints as they devoted effort looking for skilled staff and consultants. Overall, the project was benefited from the partial feedbacks and success in each stage and in the long run the plan was framed within the general guidelines and schedule. Also, the planning stage can be said to be closer to reality as they used a mixture of emergent and statics tactics to face future events. The Implementation phase was done more or less within the plan, and it was divided mainly in regional and divisional deployments. The first stage, the implementation of the Financial and OMAR modules in the CPID was properly led by the person who best knew the IT infrastructure in USA: Gary Allen. As this division was in need of an urgent BPR and a new business model in order to improve their competitiveness, the early success of this implementation could get the buying of the next regions and divisions. However, this stage was no exempt of project management difficulties: Tektronix lacked of technical and functional skills with Oracle, and they struggled in finding the right consultants, with the resultant wasting of time. It can be mentioned that within this first part, USA was a good pilot for OMAR, as they could get an opportune feedback about business and technical issues; regarding the implementation of financial module in USA and Europe, they did not face major challenges, giv en that this module did not require BPR and also because the company highly relied on Oracle specialist Consultants (Aris Consulting). But the implementation of OMAR at MBD (second stage) met technical challenges despite of the help from Oracle consultants. The third stage, implementation at VND, was characterized by a constraint of human resources. These two last stages (two and three) went through problems from the business perspective, probably as a result of IT head divisions leading the implementations, with less involvement from the executive level. Later, once deployed the software in USA, Tektronix went to the European branches where the approach followed was more or less similar to that followed in USA: they chose the most used European distribution centre (Holland), and this pilot reduced the uncertainty and gained the buying from the rest of regional countries. Then, they decided the final roll out to some other European countries and the big-bang deployment that installe d all three divisional systems together. This strategy could lead to good results considering that European countries are culturally very different and it is really challenging to implement a vanilla version program. When introducing the ERP system into Asia, a similar plan was followed, which was wise given the language issues that could have represented a technical and cultural limitation if not addressed properly. America and Australia seemed to be easier waves in comparison with the rest of the project. Although the monitoring and feedback had a positive impact on the effectiveness of control (Mudimigh, 2001; Bancroft, et al., 1998) and the deadlines were timely met, it is clear that the weakest point of the implementation stage and partially of the planning stage was the poor Change Management, Project Team training and Risk Management (they are not mentioned in the case). For example, the complete absence of a proper Change Management project led to the resistance found when implementing OMAR at MBD. Also, the absence of attention from the managerial and business level in the allocation of the initial resources (staff, training, and consultants) led the waste of time when selecting consultants, when doing testing, incorporating technical changes, language customizations and new business processes. One of the good points of the project was the training given to Power users and Sub-Teams across the global enterprise. Overall, the conservative approach (waves of roll out and big-bang ) followed by Tektronix really helped in mitigating many of the characteristic risks for a global ERP implementation. 2.- IDENTIFYING TEKTRONIX ´S PROJECT RISKS In terms of risk, it can be said that Tektronix had tolerance for risk (Hirsch and Ezingeard, 2008) as managers were willing to accept variations during the project in order to obtain high returns (time and efficiency).This attitude towards risk might have an explanation: by using the Willcocks and Griffiths (1994) framework, we can see that due to some key managers ´ previous experience with ERP technology, considering the project as a large one and regarding project structure as medium or low, then the risk can be classified as Low or Medium. Then, it can be said that leaders of the implementation drove the project without a highly structured plan because their knowledge about ERP implementations gave them enough confidence to improvise tactics in order to obtain successful results. Keil et. al (1998) proposed a risk categorization framework that can be used here to classify the risks that Tektronix faced. Furthermore, this model gives the opportunity of clearly locate those events that could have happened and that could be prevented if addressing the events on time. Complementing this framework, specific risk factors (Sumner M., 2000) for enterprise-wide ERP projects are included within the four quadrants. Quadrant 1: Customer Mandate In this quadrant there are risks associated with the commitment obtained or lack of buying from senior management, users and other stakeholders. The first concern noticed in the case studied was that the project clearly had the financial support from the Board of Directors; and also the CFO and CIO were willing to introduce changes and improvements for the company, all which reduced the risks related with funding or assistance needed during the implementation. Secondly, the commitment from the company HQ and divisions was quickly gained because the high rate company growth and Tektronix ´s inability to cope with the market pressures had created a sense of dissatisfaction among managers and top employees who found in this project the opportunity to improve. Thirdly, there was a highly motivated champion of the project (Carl Neun) who was supported in his idea by the CIO and CPID ´s president. Furthermore, some other leaders were designated across the different regions and business units in order to expand the champion ´s directives. Fourth, the management structure of the project was built upon a number of key roles with business and technical expertise; this structure consisted of a central project leader (CFO with unlimited authority from the CEO) and strong business divisional or regional leaders supporting the champion ´s authority. The clear roles allocated at different levels reduced the efforts done along the top-down structure, but the lack of involvement of the CEO and other senior managers in Change management can be considered a risky attitude which ended up in occasional resistance from some users. Lastly, it seems that end-users ´ expectations were not considered at all: firstly, because the CFO relied mainly on his experience and intuition and did not spend time in doing a proper project analysis; second, the vanilla approach proposed by Neun implied adapting users ´ operations and routines to software and not vice versa. An instance of this weakness arose when doing BPR at MBD, where there was users ´ resistance and time was wasted explaining to users the reasons behind the new processes. Quadrant 2: Scope and Requirements In general, there were no major misunderstandings in requirements or disruptive changes in requirements: the scope was clearly defined as global, the elements implemented were limited to the Financial and OMAR systems, and the company followed the best practices embedded in the system and recommended by the vendor. Furthermore, as a vanilla implementation approach was deployed as a global solution, only in cases of extreme need modifications took place, which clearly reduced the risks involved when doing local or national customizations (Sheu, et al., 2004). Quadrant 3: Execution In this Quadrant, it can be assessed risk factors and many of the traditional pitfalls associated with poor project management. The pitfalls can fall into the business or technical field. As examples of first mistakes done by Tektronix, it can be mentioned an inadequate change management, project management and risk control: They never did any feasibility analysis and risk analysis before embarking in this huge project, and this neglect prevented them from seeing the reality in some subsidiaries. As a consequence, customization of the ERP for business processes-that were unique for some competitive local branches- had to be made; also, Multilanguage settings were programmed at last minute. The lack of skills in project management resulted in assigning this responsibility to inexperienced consultants, with the corresponding wasted money and delays when choosing a new consultancy firm. Tektronix also faced resistance that was not expected; for instance, when doing the implementation at the VND division, they found difficulties that only could be overcome by increasing the working pressure and the level of resources (order entry people, item maintenance people). With reg ard to the transfer of knowledge, the company relied mainly on a combination of large and small consulting firms (particularly with Aris Consulting) as well as independent consultants, but it is not clear whether a correct program for transfer of skills was in place. The Change Control team actually worked as a communication or monitoring team and no Change management team or program was ever mentioned. Regarding the technical realization, there are some points to highlight. First, the risk of Oracle versions being obsolete before the roll out completes was diminished with the concept of waves; and each time a new version was released the company used updated versions of the software. However, in CPID, Tektronix wrongly decided to install a beta version of the software which resulted in much time of debugging, instead of waiting for the final version that was later released or for a more tested version. Secondly, the lack of technical expertise made the firm to rely mainly on external consultants as Tektronix ´s employees did not have proper training in the technical area. Furthermore, this lack of expertise resulted in much time and resources wasted, such as the excessive training and testing done in the MBD division when implementing OMAR. Thirdly, there was also the risk of integration with the manufacturing legacy system that was kept in place; and even when an interface was i nstalled between the two systems, there might be a possibility of future failure. Finally, in spite of the fact that the implementation included building a data ware housing functionality, it seems there were no plans or considerations of the high risks involved in data migration. If the new software did not work properly with the existing infrastructure or database, the only outcome would be adding the software to the collection of obsolete legacy systems. Quadrant 4: Environment Tektronix never considered the risks associated with changes in scope/objectives due to changes in the senior management hierarchy or political problems within the firm itself. Hopefully, the project did not miss their key team or management members and it could finally reach the end with a constant objective. It helped the fact that the global objectives were met in less than 3 years, a period of time relatively short that avoided the risks associated with managers moving and changing plans or directives. With regard to internal problems, it was not considered that potential conflicts between the business units or departments could erode the performance of the plan. However, the leadership and corporate culture seems to have helped subsidiaries to strictly follow the HQ guidelines, which in turn streamlined the implementation process. 3.-CRITICAL SUCCESS FACTORS AND GLOBAL CHALLENGES For Tektronix, some of the following critical factors and challenges (Plant and Willcocks, 2007; Sheu, et al., 2004; Hoffman, T., 2007; Bingi, et al., 1999) permitted to reach a fairly successful implementation: Communicating and persuading project goals to constituents from different cultures (Hoffman, T., 2007) The vision and project goals were adequately communicated and reached thanks to two factors: The strong leadership of Carl Neun, who was given the whole support from the CEO, and the steering committee whose main activity was to develop and ensure that enterprise-wide implementation guidelines and principles were followed. Also, the presidents of each division were key contributors because they made tough decisions in order to meet the deadlines imposed and reduce the cultural problems. Change, Customization and Business Process Reengineering (Plant and Willcocks, 2007) The implementation approach followed by Tektronix was probably the best risk management initiative itself because the global deployment was done in a logical order to reduce disruptive changes and to increase the learning and feedback. Also, the vanilla model suggested as the standard for the entire organisation helped in diminish the level of customization, although some minor changes were necessarily made. The implementation of the financial model did not require BPR, but the OMAR module was modified and customized in order to support both the corporate functionalities and the best practices embedded within the system. Then, BPR was done to the extent of preserving the competitive and core capabilities of the regional business units. Internal Technical Personnel/Resource/Labor Skills (Sheu, et al., 2004) Although Tektronix did not have trained personnel in project management or in technical knowledge, they opted for buying consultant ´s know-how, which could give them the capabilities to go forward with the implementation. At some points they were able to find enough human resources to back critical stages. Overall, the company did not have economical limitations for easily obtain the adequate staff and for keeping the plan within the deadlines. Selection of ERP Vendors (Bingi, et al., 1999) Global ERP rollout requires that the software is designed to work in different countries and that the ERP vendor has the same package version available in the countries or regions where the system is being implemented (Bingi, et al., 1999).In the Tektronix case, Neun and Vance both had already experience with ERP solutions offered by Oracle, and this let them move quickly and take a justified fast selection of the ERP vendor. 4.-LESSONS LEARNED AND RECOMMENDATIONS 1.-The first learning from this global ERP implementation is the deployment strategy used: a snowball approach (Ogundipe, O., 2010) in which the project is broken into manageable chunks, beginning with appropriate locations in order to cope with business or technological challenges, running parallel implementations and then doing the big-bang stage at the end, when there is enough confidence (more learning and feedback). At the same time it can be said that an emergent strategy (Nandhakumar, et al., 2005) was used for every wave introduced. Perhaps the same methodology can be used in the future for IT infrastructure projects or any other disruptive project. 2.-It is clear that the ERP brought many benefits, but Tektronix can still leverage IT as a strategic advantage. They could incorporate Procurement, HR, SCM modules and CRM packages in order to make a customer-centric organization. 3.-In the final part, there is no evidence of estimation of ROI or real financial analysis that can show the tangible financial benefits of the investment. Of course, it is mentioned improvements in terms of time or efficiency, but it would have been essential to have an initial budget beforehand, especially considering that the company was toward the financial recovery. 4.-Tektronix faced many difficulties because of the lack of Oracle in-house specialists, so they had to rely on external consultants (Aris Consulting); however, it seems that the transfer of knowledge was not properly organized. In a next project, there must be a plan that can ensure that employees and users can gain the best learning experience from the Consultants. It is vital that in-house staff can get the skills, otherwise even when the ERP implementation is successful, the performance and use can be poor if there is not trained staff. For a future implementation, if there is lack of trained staff, Tektronix can also consider the option of IT outsourcing, which is a solutions that have worked perfectly for some other big companies. 5.-In order to obtain the best benefits from the IT incorporated capabilities and make them sustainable in the medium and long term, the company should have followed the Strategic Alignment Model presented in Cooper, et al. (2001) which was adapted from Henderson and Venkatram (1993). By following this model, Tektronix can benefit from holistic technical and organizational changes that are properly aligned to the firm ´s business strategies.
Sunday, October 13, 2019
Free College Admissions Essays: Try, try again! :: College Admissions Essays
Try, try again! Bedraggled, disheartened and blanketed with mud, I sat on the sidewalk blubbering while the tears dripped down my knee. As I watched the salty droplets trickle down my dingy leg and meld with the crimson driblets oozing from my ragged shins, I felt a certain overwhelming feeling of helplessness, of defeat. After a comfortable amount of time was spent wallowing in self-pity, my relentless attitude proficiently mustered the nerve to get back on my very first bicycle and give it another try. I was on my way to conquer one of my first acquaintances with adversity. " Excellence and success is not achieved in perfection but in knowing you tried your best." This is definitely the most powerful virtue that I've cultivated throughout the years. From learning to walk to learning to drive and all the obstacles that I faced in between I was always able to employ this adage and trust that belief in it would get me through whatever challenge I faced. As an innocent, radiant slip of a girl I embark ed on my first steps of life. I fell, and fell again until my bottom was bruised, I'm sure. Nonetheless, I never gave up, and was up and running around in no time! I was ready for bigger and better things. Before long it was time for school. This, by far, has been the most challenging endeavor midst the years. No matter what I always gave it my all and managed to remain a high honors student throughout a majority of my academic career until I was faced with an even larger task...high school. With problems developing in the family I became incredibly withdrawn and unfortunately, indifferent. By my junior year I was feeling so overwhelmed that, in essence, I surrendered to failure. I barely had the ambition to go to school let alone do well in my classes. I was accepting defeat and very low grades at that. Then, one day, a teacher said something to me that evoked thought, a second look at my situation. While staying after school, my English teacher said, "Jessica, you're a very intell igent girl, and you have the ability to achieve much higher grades, but you aren't trying which is sad because there are kids that try so hard and can't earn the grades that you're so capable of.
Friday, October 11, 2019
Social Interaction and Technology Essay example -- Sociology
Cellphones, television, and computers are just three of the most popular ways that we communicate in today. They have made a substantial impact on the United States simply by being readily available and easy to use. People are often discussing how technology has impacted us. Many believe that technology is actually hindering society rather than helping it. Then there are those who doubt technology has made our social interactions better. Certainly, this is true; without the advances in technology, our level of social interaction in education, businesses, and relationships would diminish. Education is important, so it would only make sense that technology would have a huge part in it. When children are born, they are placed into a world that is driven by technology. Parents are now using iPads and cellphones to allow their children to get a head start on learning. Now, by the time children are of age to attend school, they are exceedingly prepared to incorporate technology in their education. With this being said, educational institutions must help students get ready to work in a society that encompasses an extensive amount of technology. According to Sean McCollum, â€Å"a handful of school districts†¦are adapting their use to serve the curriculum.†Many schools are now using whiteboards, laptops, tablets, Smartphones and other devices in almost every classroom. Technology enhances learning, boosts confidence, and eliminates geographical limitations. Technology enriches learning by being able to come in different forms and do different things. "For lessons traditionally done with a paper and pencil, we now were able to do them in color, with animation, and with more depth and complexity"(McCollum). Teachers are now able to help stu... ...al interactions with each other. Works Cited Carr, Nicholas G. "IT Doesn't Matter." Harvard Business Review 81.5 (2003): 41-49. Business Source Complete. Web. 1 Apr. 2012. Levin, Barbara. "On-Demand Workforce-Communications Technologies Help Organizations Meet Critical Business Goals." Employment Relations Today (Wiley) 35.2 (2008): 43-50. Business Source Complete. Web. 25 Mar. 2012. McCollum, Sean. "Getting Past the 'Digital Divide'." Education Digest 77.2 (2011): 52. MasterFILE Complete. Web. 25 Mar. 2012. Social Interaction and Technology. n.d. Intelecom. Video. Web. 11 March 2012. Vanden Abeele, Mariek and Keith Roe "New Life, Old Friends: A Cross-Cultural Comparison of Communication Technology Use in Freshmen's Social Life." Conference Papers International Communication Association (2009): 1-36. Communication & Mass Media. Web. 25 Mar. 2012.
8 Key Element for a Business Model
E-commerce: business. technology. society. E-commerce E commerce Business. Technology. Society gy y Kenneth C. Laudon Copyright  © 2011 Pearson Education, Ltd. Chapter 5 Business Models for E? commerce Copyright  © 2007Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 1-2 E-commerce Business Models Business model d l Set of planned activities designed to result in a Set of planned activities designed to result in a profit in a marketplace Business plan Describes a firm s business model Describes a firm’s business modelE commerce business model E? commerce business model Uses/leverages unique qualities of Internet and Web W b Slide 2-3 8 Key Elements of Business Model 1. 2. 3. 4. 5. 6. 7. 8. Value proposition Revenue model Market opportunity Market opportunity Competitive environment Competitive advantage Market strategy Market strategy Organizational De velopment Management team Slide 2-4 1. Value Proposition Why should the customer buy from you? h h ld h b f ? Successful e? ommerce value S f l l propositions: Personalization/customization Reduction of product search, price discovery costs Facilitation of transactions by managing product delivery Slide 2-5 2. Revenue Model How will the firm earn revenue, generate p profits, and produce a superior return on p p invested capital? Major types: Advertising revenue model g Subscription revenue model Transaction fee revenue model Transaction fee revenue model Sales revenue model Affiliate revenue model Slide 2-6 3. Market Opportunity What marketspace do you intend to h k d d serve and what is its size?Marketspace: Area of actual or potential commercial value in which companyà ‚ intends to operate in which company intends to operate Realistic market opportunity: Defined by revenue potential in each market niche in which company hopes to potential in each market niche in which company hopes to compete Market opportunity typically divided into M k t t it t i ll di id d i t smaller niches Slide 2-7 4. Competitive Environment Who else occupies your intended h l d d marketspace? p Other companies selling similar products in the same marketspace Includes both direct and indirect competitors Influenced by: Influenced by:Number and size of active competitors Each competitor s market share Each competitor’s market share Competitors’ profitability Competitors pricing Competitors’ pricing Slide 2-8 5. Competitive Advantage Achieved when firm: h d h f Produces superior pro duct  or Produces superior product or Can bring product to market at lower price than competitors th tit Important concepts: p p Asymmetries First? mover advantage Fi t d t Unfair competitive advantage Leverage Slide 2-9 6. Market Strategy How do you plan to promote your products or services to attract your products or services to attract your target audience?Details how a company intends to enter market and attract customers Best business concepts will fail if not properly marketed to potential customers k d i l Slide 2-10 7. Organizational Development What types of organizational structures within the firm are necessary to carry out within the firm are necessary to carry out the business plan? Describes how firm will organize work Typically divided into functiona l departments As company grows, hiring moves from generalists to As company grows hiring moves from generalists to specialists Slide 2-11 8.Management Team What kinds of experiences and background are important for the background are important for the company’s leaders to have? Employees are responsible for making the business model work Strong management team gives instant credibility to outside investors Strong management team may not be able to salvage a weak business model, but should be able to change the model and redefine the business as it becomes necessary Slide 2-12 Insight on Business Online Grocers: Finding and Executing the Right Model g g Class Discussion Slide 2-13 Categorizing E-commerce Business ModelsNo one correct way We categorize businessà ‚ models according to: We categorize business models according to: E? commerce sector (B2C, B2B, C2C) Type of e? commerce technology; i. e. m? commerce Type of e commerce technology; i e m commerce Similar business models appear in more than one sector Some companies use multiple business Some companies use multiple business models; e. g. eBay Slide 2-14 B2C Business Models: Portal Search plus an integrated package of content and services Revenue models: d l Advertising, referral fees, transaction fees, subscriptions g p Variations:Horizontal / General Vertical / Specialized (Vortal) Vertical / Specialized (Vortal) Pure Search Slide 2-15 Insight on Technology Can Bing Bong Google? Class Discussion Slide 2-16 B2C Models: E-tailer Online version of traditional retailer Revenue model: Sales Variations: Virtual merchant Virtual merchant Bricks? and? clicks Catalog merchant C t l h t Manufacturer? direct Low barriers to entry Slide 2-17 B2C Models: Content Provider Digital content on the Web News, music, video Revenue models: Revenue models: Subscription; pay per download (micropayment); advertising; affiliate referral fees Variations:Content owners Syndication S di i Web aggregators Slide 2-18 B2C Models: Transaction Broker Process online transactions for consumers Primary value propositionâ€â€saving time and money Revenue model: R d l Transaction fees Industries using this model: Financial services Travel services Job placement services Slide 2-19 B2C Models: Market Creator Create digital environment where buyers and sellers can meet and transact Examples: Priceline eBay y Revenue model: Transaction fees Revenue model: Transaction fee s Slide 2-20 B2C Models: Service Provider Online services e. g. Google: Google Maps, Gmail, etc. Value proposition Value propositionValuable, convenient, time? saving, low? cost alternatives to traditional service providers t diti l i id Revenue models: Revenue models: Sales of services, subscription fees, advertising, sales of marketing data marketing data Slide 2-21 B2C Models: Community Provider Provide online environment (social network) where people with similar interests can transact, share content, and , , communicate E. g. Facebook, MySpace, LinkedIn, Twitter Revenue models: R d l Typically hybrid, combining advertising, subscriptions, sales, transaction fees, affiliate fees Slide 2-22 B2B Business Models Net marketplaces E? istributor E procurement E? procurement Exchange Industry consortium Industry cons ortium Private industrial network Private industrial network Single firm Industry? wide Industry wide Slide 2-23 B2B Models: E-distributor Version of retail and wholesale store, , MRO goods and indirect goods Owned by one company seeking to serve many customers Revenue model: Sales of goods Example: Grainger. com Slide 2-24 B2B Models: E-procurement Creates digital markets where participants transact for indirect goods B2B service providers, application service providers (ASPs) B2B service providers application service providers (ASPs)Revenue model: Service fees, supply? chain management, fulfillment services Example: Ariba Slide 2-25 B2B Models: Exchanges Independently owned vertical digital p y g marketplace for direct inputs Revenue model: Transaction, commission fees Revenue model Transaction commission fees C eate po e u co pet t o bet ee Create powerful competition between suppliers Tend to force suppliers into powerful price T d f li i f l i competition; number of exchanges has dropped dramatically d dd ll Slide 2-26 B2B Models: Industry Consortia Industry? wned vertical digital marketplace open to select suppliers More successful than exchanges More successful than exchanges Sponsored by powerful industry players Strengthen traditional purchasing behavior Revenue model: Transaction, commission fees R d l T ti i i f Example: Exostar Example: Exostar Slide 2-27 Private Industrial Networks Designed to coordinate flow of communication among firms engaged in business together fi di b i h Electronic data interchange (EDI) Single firm networks Most common form M t f Example: Wal? Mart’s network  for suppliersIndustry? wide networks Often evolve out of industry associations Often evolve out of industry associations Example: Agentrics Slide 2-28 Other E-commerce Business Models Consumer? to? consumer (C2C) eBay, Craigslist Peer? to? peer (P2P) Peer to peer (P2P) The Pirate Bay, Cloudmark M? commerce: Technology platform continues to evolve Technology platform continues to evolve iPhone, smartphones energizing interest in m? commerce pp apps Slide 2-29 Insight on Society Where R U? Not Here! Class Discussion Slide 2-30 E-commerce Enablers: Gold Rush ModelE? commerce infrastructure companies p have profited the most: Hardware, software, networking, security E? commerce software systems, payment systems Media solutions, performance enhancement CRM software CRM software Databases Hosting services, etc. Slide 2-31 How Internet & Web Change Busi ness E? commerce changes industry structure g y by changing: Basis of competition among rivals Barriers to entry y Threat of new substitute products Strength of suppliers Bargaining power of buyers Bargaining power of buyers Slide 2-32 Industry Value ChainsSet of activities performed by suppliers, manufacturers, transporters, distributors, and f di ib d retailers that transform raw inputs into final products and services Internet reduces cost of information and Internet reduces cost of information and other transactional costs Leads to greater operational efficiencies, lowering cost, prices, adding value for lowering cost prices adding value for customers Slide 2-33 E-commerce & Industry Value Chains Figure 5. 4 Slide 2-34 Firm Value Chains Activities that a firm engages in to create inal products from raw inputs Each step adds value Effect of Internet: Eff fI Increases operational efficiency p y Enables product differentiation Enables precise coordination of steps in chain E bl i di ti f t i h i Slide 2-35 E-commerce & Firm Value Chains Figure 5. 5 Slide 2-36 Firm Value Webs Networked business ecosystem Uses Internet technology to coordinate the value chains of business partners l h i fb i Coordinates a firm’s suppliers with its own C di t fi ’ li ith it production needs using an Internet? based supply chain management systemSlide 2-37 Internet-Enabled Value Web bl d l b Figure 5. 6 Slide 2-38 Business Strategy Plan for achieving superior long? term returns on the capital invested in a business firm business firm Four Generic Strategies 1. Di fferentiation 2. Cost 3. Scope 4. 4 Focus Slide 2-39 Chapter 6 E-commerce Marketing Copyright  © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 6-40 Netflix N fli Strengthens and Defends Its Brand Class Discussion Slide 6-41 Consumers Online: Internet Audience & Consumer Behavior Around 70% (82 million) U. S. ouseholds have Around 70% (82 million) U S households have Internet access in 2010 Growth rate has slowed Intensity and scope of use both increasing d f b h Some demographic groups have much higher Some demographic groups have much higher percentages of online usage than others Gender, age, ethnicity, community type, income, education Slide 6-42 Consumers Online: Internet Audience & Consumer Behavior Broadband audience vs. dial? up audience Purchasing behavior affected by neighborhood Lifestyle and sociological impa cts Use of Internet by children, teens Use of Internet as substitute for other social activitiesMedia choices Traditional media competes with Internet for attention Traditional media competes with Internet for attention Slide 6-43 Consumer Behavior Models Study of consumer behavior Social science Attempts to explain what consumers purchase Attempts to explain what consumers purchase and where, when, how much and why they buy Consumer behavior models Predict wide range of consumer decisions Predict wide range of consumer decisions Based on background demographic factors and other intervening, more immediate variables h i i i di i bl Slide 6-44 General Model of Consumer Behavior Figure 6. Slide 6-45 Background Demographic Factors Culture: Broadest impact Subculture (ethnicity, age, lifestyle, geography) S b lt ( th i it lif t l h ) Social Reference groups Direct  reference groups g p Indirect reference groups Opinion leaders (viral influencers) Lifestyle groups f l Psychological Psychological profiles Slide 6-46 Online Purchasing Decision Psychographic research Combines demographic and psychological data Combines demographic and psychological data Divides market into groups based on social class, lifestyle, and/or personality characteristics and/or personality characteristicsFive stages in the consumer decision process: 1. 2. 3. 4. 5. Awareness of need Search for more information Evaluation of alternatives Actual purchase decision Actual purchase decision Post? purchase contact with firm Slide 6-47 Consumer D i i C Decision Process & P Supporting Communications Figure 6. 3 Slide 6-48 Model of Online Consumer Behavior Decision process similar for online and offline behavior General online behavior model Consumer skills Product characteristics Attitudes toward online purchasing Perceptions about control over Web environment p Web site featuresClickstream behavior: Transaction log for Clickstream behavior: Transaction log for consumer from search engine to purchase Slide 6-49 Model of Online Consumer Behavior Figure 6. 4 Slide 6-50 Model of Online Consumer Behavior Clickstream factors include: Number of days since last visit Number of days since last visit Speed of clickstream behavior Number of products viewed during last visit b f d i dd i l ii Number of pages viewed Supplying personal information Number of days since last purchase Number of past purchasesClickstream marketing Clickstream marketing Slide 6-51 Shoppers: B rowsers & Buyers Shoppers: 87% of Internet users 72% buyers 72% buyers 16% browsers (purchase offline) One? third offline retail purchases influenced by O thi d ffli t il h i fl db online activities Online traffic also influenced by offline brands and shopping pp g E? commerce and traditional commerce are coupled: part of a continuum of consuming behavior part of a continuum of consuming behavior Slide 6-52 Online Shoppers & Buyers Figure 6. 5 Slide 6-53What Consumers Shop & Buy Online Big ticket items ($500 plus) Travel, computer hardware, consumer electronics Expanding Consumers more confident in purchasing costlier items Small ticket items ($100 or less) ($ ) Apparel, books, office supplies, software, etc. Sold by first movers on Web Sold by first movers on Web Physically small i tems High margin items Broad selection of products available Slide 6-54 What Consumers Buy Online Figure 6. 6 Slide 6-55 Intentional Acts: How Shoppers Find Vendors Online pp Search engines (59%) S h i (59%) Coupon Web sites (29%) Coupon Web sites (29%) Comparison shopping sites (27%) E? ail newsletters (25%) Online shoppers are highly intentional, looking for specific products, companies, services Slide 6-56 Table 6. 6 Slide 6-57 Trust, Utility, Opportunism in Online Markets Two most important factors shaping decision Two most important factors shaping decision to purchase online: Utility: U ili Better prices, convenience, speed Trust: Asymmetry of information can lead to opportunistic behavior by sellers Sellers can develop trust by building strong reputations for honesty, fairness, delivery Slide 6-58 Basic Marketing Concepts MarketingStrategies and actions to establish relationship Strategies and actions to establish relationship with consumer and encourage purchases of p products and services Addresses competitive situation of industries and firms Seeks to create unique, highly differentiated products or services that are produced or supplied by one trusted firm Unmatchable feature set Avoidance of becoming commodity Slide 6-59 Feature Sets Three levels of product or service 1. Core product e. g. cell phone g p 2. Actual product Characteristics that deliver core benefits Ch t i ti th t d li b fit e. g. wide screen that connects to Internet 3. Augmented productAdditional benefits Basis for building the product’s brand e. g. product warranty Slide 6-60 Featu re Set Figure 6. 7 Slide 6-61 Products, Brands & Branding Process Brand: Expectations consumers have when consuming, or thinking about consuming, a specific product Most important expectations: Quality, reliability, Most important expectations: Quality reliability consistency, trust, affection, loyalty, reputation Branding: Process of brand creation Branding: Process of brand creation Closed loop marketing Brand strategy Brand equity Brand eq it Slide 6-62 Marketing A ti iti M k ti Activities: From Products to Brands Figure 6. 8Slide 6-63 STP: Segmenting, Targeting, Positioning Major ways used to segment, target customers 1. 2. 3. 4. 5. 6. Behavioral B h i l Demographic Psychographic h hi Technical Contextual Search Within segment, product is positioned and branded as a unique, high? value product, especially suited to q g p p y ne eds of segment customers Slide 6-64 Are Brands Rational? For consumers, a qualified yes: Brands introduce market efficiency by reducing search and decision? making costs For business firms, a definite yes: A major source of revenue Lower customer acquisition cost Increased customer retention Successful brand constitutes a long? asting (though not necessarily permanent) unfair competitive advantage Slide 6-65 Can Brands Survive Internet? Brands & Price Dispersion p Early postulation: Law of One Price ; end of brands Early postulation: â€Å"Law of One Price†; end of brands Instead: Consumers still pay premium prices for differentiated products E? commerce firms rely heavily on brands to attract customers and charge premium prices Substantial price dispersion Large differences in price sensitivity for same product Large differences in price sensitivity for same product â€Å"Library effect†Slide 6-66Revolution in Internet Marketing Technology Three broad impacts: Scope of marketing communications broadened Richness of marketing communications increased g Information intensity of marketplace expanded Internet marketing technologies: Internet marketing technologies: Web transaction logs Cookies and Web bugs Cookies and Web bugs Databases, data warehouses, data mining Advertising networks Customer relationship management systems Slide 6-67 Web Transaction LogsBuilt into Web server software Record user activity at Web site y Webtrends: Leading log analysis tool Provides much marketing data, especially  Provides much marketing data especially combined with: Registratio n forms R i i f Shopping cart database Answers questions such as: What are major patterns of interest and purchase? After home page, where do users go first? Second? Slide 6-68 Cookies & Web Bugs Cookies: Small text file Web sites place on visitor’s PC every time they visit, as specific pages are accessed Provide Web marketers with very quick means of identifying customer and understanding prior behavior Flash cookiesWeb bugs: Tiny (1 pixel) graphics embedded in e mail and Web sites Tiny (1 pixel) graphics embedded in e? mail and Web sites Used to automatically transmit information about user and page being viewed to monitoring server page being viewed to monitoring server Slide 6-69 Insight on Society g y Every Move You Make, Every Click You Make, Weâ₠¬â„¢ll Be Tracking You , g Class Discussion Slide 6-70 Databases Database:  Stores records and attributes Database management system (DBMS): Software used to create, maintain, and access databasesSQL (Structured Query Language): Industry? standard database query and manipulation language used in y q y p g g a relational database Relational database: Represents data as two? dimensional tables with records organized in rows and attributes in columns; data within different tables can be flexibly related as long as the tables share a common data element flexibly related as long as the tables share a common data element Slide 6-71 Relational Database View of E-commerce Customers Figure 6. 12 Slide 6-72 Data Warehouses & Data Mining Data warehouse:Collects firm s transactional and custom er data in single Collects firm’s transactional and customer data in single location for offline analysis by marketers and site managers Data mining: Analytical techniques to find patterns in data, model Analytical techniques to find patterns in data model behavior of customers, develop customer profiles Query? driven data mining Query driven data mining Model? driven data mining Rule? based data mining l b dd Collaborative filtering Slide 6-73 Data Mining & Personalization Figure 6. 13 Slide 6-74 Insight on TechnologyThe Long T il Big Hits and Big Misses Th L Tail: Bi Hi d Bi Mi Class Discussion Slide 6-75 Customer Relationship Management ( (CRM) Systems ) y Record all contact that customer has with firm Generates customer profile available to everyone in firm with need to â€Å"know the customer†fi ith d t â€Å"k th t †Customer profiles can contain: ustomer profiles can contain: Map of the customer’s relationship with the firm Product and usage summary data Demographic and psychographic data Profitability measures Contact history Contact history Marketing and sales information Slide 6-76Customer Relationship Management System Figure 6. 14 Slide 6-77 Market Entry Strategies Figure 6. 15 Slide 6-78 Establishing Customer Relationship Advertising Networks Banner advertisements Ad server selects appropriate banner ad based on Ad server selects appropriate banner ad based on cookies, Web bugs, backend user profile databases Permission marketing Permission marketing Affiliate marketing g Slide 6-79 How Advertising Network Works e. g. , DoubleClick Figure 6. 16 Slide 6-80 Establishing Customer Relationship (cont’d) Viral marketingGett ing customers to pass along company’s marketing message to friends, family, and colleagues Blog marketing Using blogs to market goods through commentary and U i bl k d h h d advertising Social network marketing, social shopping Mobile marketing Mobile marketing Slide 6-81 Insight on Business Social Network Marketing: Let’s Buy Together Class Discussion Slide 6-82 Establishing Customer Relationship (cont’d) Wisdom of crowds (Surowiecki, 2004) ( , ) Large aggregates produce better estimates and judgments Examples: E l Prediction markets Folksonomies Social tagging Social taggingBrand leveraging Slide 6-83 Customer Retention: Strengthening Customer Relationship p Mass marketing Mass marketing Direct marketing Micromarketing Micromarketing Personalized, one? to? one marketing  Segmenting market on precise a nd timely understanding of Segmenting market on precise and timely understanding of individual’s needs Targeting specific marketing messages to these individuals Positioning product vis? a? vis competitors to be truly unique Personalization Can increase consumers sense of control, freedom Can also result in unwanted offers or reduced anonymity Slide 6-84Mass Market-Personalization Continuum Figure 6. 17 Slide 6-85 Other Customer Retention Marketing Technics Customization Customer co? production Transactive content: Combine traditional content with dynamic information tailored to each user’s profile Customer service FAQs Q Real? time customer service chat systems Automated response systems Automated response systems Slide 6-86 Net Pricing Strategies Pricing Integral part of marketing strategy I t l t f k ti t t Traditionally based on: Fixed cost Variable costs Demand curve Price discrimination Price discriminationSelling products to different people and groups based on willingness to pay Slide 6-87 Net Pricing Strategies (cont’d) Free and freemium Can be used to build market awareness Versioning Creating multiple versions of product and selling essentially same product to different market segments at different prices at different prices Bundling Offers consumers two or more goods for one price Off t d f i Dynamic pricing: Auctions Yield management Slide 6-88 Channel Management Strategies Channels: Different methods by which goods can be distributed and soldChannel conflict: When new venue for selling products or services threatens gp or destroy s existing sales venues E. g. online airline/travel services and  traditional offline travel agencies Some manufacturers are using partnership gp p model to avoid channel conflict Slide 6-89 Chapter 7: E-commerce Marketing Communications Chapter 7 E-commerce Advertising Copyright  © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 7-90 Video Ads: Shoot, Click, Buy Class Discussion Slide 7-91 Marketing Communications Two main purposes:Sales – promotional sales communications Branding – b di B di branding communications i i Online marketing communications Online marketing communications Takes many forms Online ads, e? mail, public relations, Web sites Slide 7-92 Online Advertising li d i i $25 billion, 15% of all advertising Advantages: Internet is where audience is moving g Ad targeting Greater opp ortunities for interactivity Greater opportunities for interactivity Disadvantages: Cost versus benefit How to adequately measure results Supply of good venues to display ads Slide 7-93 Online Advertising from 2002-2014 Figure 7. Slide 7-94 Forms of Online Advertisements Display ads Rich media Video ads Search engine advertising Social network, blog, and game advertising Social network blog and game advertising Sponsorships Referrals (affiliate relationship marketing) E? mail marketing g Online catalogs Slide 7-95 Display Ads Banner ads Rectangular box linking to advertiser’s Web site IAB guidelines e. g. Full banner is 468 x 60 pixels, 13K e g Full banner is 468 x 60 pixels 13K Pop? up ads Appear without user calling for them Provoke negative consumer sentiment g Twice as effective as normal banner ads Pop? nder ads: Open beneath browser window Pop under ads: Open beneath browser window Slide 7-96 Rich Media Ads Use Flash, DHTML, Java, JavaScript About 7% of all online advertising expenditures Tend to be more about branding d b b b di Boost brand awareness by 10% Boost brand awareness by 10% IAB standards limit length Interstitials Superstitials Slide 7-97 Video Ads Fastest growing form of online advertisement IAB standards Linear video ad Non? linear video ad In? banner video ad In? text video ad Ad placement Advertising networks Advertising exchanges Banner swappingSlide 7-98 Search Engine Advertising h i d i i Almost 50% of online ad spending in 2010 Types: Paid inclusion or rank Paid inclusion or rank Inclusion in search results Sponsored link areas p Keyword advertising e. g. Google AdWords e g Google AdWords Network keyword advertising (context advertising) d ii ) e. g. Google AdSense Slide 7-99 Search Engine Advertising (cont’d) Nearly ideal targeted marketing Nearly ideal targeted marketing Issues: Disclosure of paid inclusion and placement practices Click fraud Ad nonsense Slide 7-100 Mobile Advertising Half of U. S.Internet users access Internet Half of U. S. Internet users access Internet with mobile devices Currently small market, but fastest growing platform (35%) growing platform (35%) Google and Apple in race to develop Google and Apple in race to develop mobile advertising platform AdMob, iAd Slide 7-101 Sponsorships & Referrals Sponsorships Paid effort to tie advertiser s name to Paid effort to tie advertiser’s name to particular information, event, venue in a way that reinforces brand in positive yet not overtly that reinforces brand in positive yet not overtly commercial manner ReferralsAffiliate relationship marketing p g Permits firm to put logo or banner ad on another firm’s Web site from which users of th fi ’ W b it f hi h f that site can click through to affiliate’s site Slide 7-102 E-mail Marketing & Spam Explosion Direct e? mail marketing Low cost, primary cost is purchasing addresses Spam: Unsolicited commercial e? mail Spam: Unsolicited commercial e mail Approx. 90% of all e? mail Efforts to control spam: Technology (filtering software) Government regulation (CAN? SPAM and state laws) Voluntary self? regulation by industries (DMA ) y g y Volunteer efforts Slide 7-103Percentage of E-mail That Is Spam Figure 7. 6 Slide 7-104 Online Catalogs Equivalent of paper? based catalogs Graphics? intense; use increasing with increase in broadband use in broadband use Two types: 1. 2. 2 Full? page spreads, e. g. Landsend. com Grid displays, e. g. Amazon Grid displays e g Amazon In general, online and offline catalogs complement each other Slide 7-105 Social Marketing â€Å"Many? to? many† model Uses digitally enabled networks to spread ads Blog advertising Blog advertising Online ads related to content of blogs Social network advertising: Social network advertising:Ads on MySpace, Facebook, YouTube, etc. Game advertising: G d ti i Downloadable â€Å"advergames†Placing brand? name products within games Slide 7-106 Insight on Society g y Marketing to Children of the Web in the Age of Social Networks g Class Discussion Slide 7-107 Behavioral Targeting Interest? based advertising Data aggregators develop profiles Data aggregators develop profiles Search engine queries Online browsing history O li b i hi Offline data (income, education, etc. ) d Information sold to 3rd party advertisers, who deliver ads based on profile Ad exchanges Privacy concerns acy co ce s Consumer resistance Slide 7-108Mixing Off-line & Online Marketing Communications g Most successful marketing campaigns M t f l k ti i incorporate both online and offline tactics Offline marketing Drive traffic to Web sites Drive traffic to Web sites Increase awareness and build brand equity Consumer behavior increasingly multi? channel 60% consumers research online before buying offline % y g Slide 7-109 Insight on Business g Are the Very Rich Different From You and Me? Class Discussion Sl ide 7-110 Online Marketing Metrics: Lexicon Measuring audience size or market share Impressions I i Click? through rate (CTR) View? hrough rate (VTR) Vi th h t (VTR) Hits Page views P i Stickiness (duration) Unique visitors Loyalty Reach Recency Slide 7-111 Online Marketing Metrics (cont’d) Conversion of visitor Conversion of visitor to customer Acquisition rate q Conversion rate Browse? to? buy? ratio View? to? cart ratio Vi t t ti Cart conversion rate Checkout conversion rate Checkout conversion rate Abandonment rate Retention rate Attrition rate E mail metrics E? mail metrics Open rate Delivery rate Delivery rate Click? through rate (e mail) (e? mail) Bounce? back rate Slide 7-112 Online Consumer Purchasing ModelFigure 7. 8 Slide 7-113 How Well Does Online Adv. Work? Ultimately measured by ROI on ad campaign Highest click? through rates: Searc h engine ads, Permission e mail campaigns Permission e? mail campaigns Rich media, video interaction rates high Online channels compare favorably with traditional Most powerful marketing campaigns use multiple Most powerful marketing campaigns use multiple channels, including online, catalog, TV, radio, newspapers, stores newspapers, stores Slide 7-114 Comparative Returns on Investment Figure 7. 9 Slide 7-115 Costs of Online Advertising Pricing modelsBarter Cost per thousand (CPM) Cost per click (CPC) Cost per action (CPA) Cost per action (CPA) Online revenues only Sales can be directly correlated Sales can be directly correlated Both  online/offline revenues Offline purchases cannot always be directly related to online Offli h t l b di tl l t dt li campaign In general, online marketing more  expensive on CPM In general online marketing more expensive on CPM basis, but more effective Slide 7-116 Web Site Activity Analysis b i i i l i Figure 7. 10 Slide 7-117 Insight on Technology It’s 10 P. M. Do You Know Who Is On Your Web Site? Class Discussion Slide 7-118Web Site †¦ as Marketing Communications Tool g Web site as extended online advertisement W b i d d li d i Domain name: An important role Domain name: An important role Search engine optimization: Search engine optimization: Search engines registration Keywords in Web site description K d i W b it d i ti Metatag and page title keywords Links to other sites k h Slide 7-119 Web Site Functionality b i i li Main factors in effectiveness of interface Utility Ease of use Top factors in credibility of Web sites: Top factors in credibility of Web sites: Design look Info rmation design/structure g / Information focusOrganization is important for first time users, but Organization is important for first? time users but declines in importance Information content becomes major factor attracting Information content becomes major factor attracting further visits Slide 7-120 Factors in Credibility of Web Sites Figure 7. 11 Slide 7-121 Table 7. 9 Slide 7-122 Chapter 8: Ethical, Social, and Political Issues in E-commerce E commerce Chapter 8 Ethics, Law, E-commerce Copyright  © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 8-123 Ethical, Social, Political Issues in E-commerceInternet, like other technologies, can: Internet like other technologies can: Enable new crimes Affect environment Threaten social values Costs and benefits must be carefully considered, especially when there are no id d i ll h h g g clear? c ut legal or cultural guidelines Slide 8-124 Model for Organizing Issues Issues raised by Internet and e? commerce can be viewed at individual, social, and political levels social and political levels Four major categories of issues: Four major categories of issues: Information rights Property rights Property rights Governance Public safety and welfare Slide 8-125Moral Dimensions of Internet Society M l Di i f I S i Figure 8. 1 Slide 8-126 Basic Ethical Concepts i hi l Ethics Study of principles used to determine right and wrong courses of action Responsibility p y Accountability Liability Laws permitting individuals to recover damages Due process Laws are known, understood Laws are known understood Ability to appeal to higher authorities to ensure laws applied correctly Slide 8-127 Analyzing Ethical Dilemmas l i hi l il Process for analyzing ethical dilemmas: 1. 2. 3. 3 4. 5. Identify and clearly describe the facts Define the conflict or dilemma and identify the y higher? rder values involved Identify the stakeholders Identify the stakeholders Identify the options that you can reasonably take t k Identify the potential consequences of your options Slide 8-128 Candidate Ethical Principles Golden Rule Universalism Slippery Slope Collective Utilitarian Principle Risk Aversion Ri k A i No Free Lunch The New York Times Test The Social Contract Rule Slide 8-129 Privacy & Information Rights Privacy: Moral right of individuals to be left alone, free from surveillance or interference from other individuals or organizations Information privacy p y Subset of privacy Includes:The claim th at certain information should not be collected at all The claim of individuals to control the use of whatever h l i f i di id l l h f h information is collected about them Slide 8-130 Privacy & Information Rights (cont. ) Major ethical issue related to e? commerce and privacy: d i Under what conditions should we invade the privacy of others? Major social issue: j Development of â€Å"expectations of privacy† and privacy norms privacy norms Major political issue: Development of statutes that govern relations D l t f t t t th t l ti between recordkeepers and individuals Slide 8-131 Information Collected at E-commerce SitesData collected includes Personally identifiable information (PII) Anonymous information Anonymous information Types of data collected yp Name, a ddress, phone, e? mail, social security Bank and credit accounts, gender, age, occupation, B k d di d i education Preference data, transaction data, clickstream data, browser type Slide 8-132 Social Networks & Privacy Social networks Encourage sharing personal details Pose unique challenge to maintaining privacy Facebook s Beacon program Facebook’s Beacon program Facebook s Terms of Service change Facebook’s Terms of Service change Slide 8-133 Profiling & Behavioral Targeting ProfilingCreation of digital images that characterize online individual and group behavior Anonymous profiles A fil Personal profiles Personal profiles Advertising networks Track consumer and browsing behavior on Web T k db i b h i W b Dynamically adjust what user sees on screen Build and refresh profiles of consumers Google’s AdWords program Slide 8-134 Profiling & Behavioral Targeting (cont’d) Deep packet inspection Business perspective: Web profiling serves consumers and businesses Increases effectiveness of advertising, subsidizing free content Enables sensing of demand for new products and services Critics perspective:Undermines expectation of anonymity and privacy Consumers show significant opposition to unregulated collection of personal information Enables weblining Slide 8-135 Internet & Government Invasions of Privacy Various laws strengthen ability of law enforcement agencies to monitor Internet users without i i I ih knowledge and sometimes without judicial oversight CALEA, PATRIOT Act, Cyber Security Enhancement Act, Homeland Security Act Government agencies are largest users of private sector commercial data brokers sector commercial data brokers Retention by ISPs of user data a concern Slide 8-136Legal Protections In U. S. , privacy rights explicitly granted or derived from Constitution Constitution First Amendment  – freedom of speech and association Fourth Amendment  – unreasonable search and seizure F th A d t bl h d i Fourteenth Amendment  – due process Specific statutes and regulations (federal and Specific statutes and regulations (federal and state) Common law Slide 8-137 Informed Consent U. S. firms can gather and redistribute transaction information without individual’s i i f i ih i di id l’ informed consent Illegal in Europe Informed consent: Opt? in Opt out Opt? out Many U. S. ? commerce firm s merely publish information p practices as part of privacy policy without providing for p p yp y p g any form of informed consent Slide 8-138 FTC’s Fair Information Practices Principles Federal Trade Commission: Federal Trade Commission: Conducts research and recommends legislation to Congress Fair Information Practice Principles (1998): Fair Information Practice Principles (1998): Notice/Awareness (Core) Choice/Consent (Core) Choice/Consent (Core) Access/Participation Security Enforcement Guidelines, not laws Guidelines not laws Slide 8-139 FTC’s Fair Information Practice PrinciplesNotice/Awareness i / Sites must disclose information practices before collecting data. Includes Sit t di l i f ti ti b f ll ti d t I l d identification of collector, uses of data, other recipients of data, nature of collection (ac tive/inactive), voluntary or required, consequences of refusal, and steps taken to protect confidentiality, integrity, and quality of the data Choice/Consent There must be a choice regime in place allowing consumers to choose how their information will be used for secondary purposes other than supporting the transaction, including internal use and transfer to third parties.Opt? in/Opt? out must be available. Consumers should be able to review and contest the accuracy and completeness of data collected about them in a timely, inexpensive process. Access/Participation ccess/ a c pa o Security y Enforcement Data collectors must take reasonable steps to assure that consumer information is accurate and secure from unauthorized use. There must be in place a mechanism to enforce FIP principles. This can involve self? regulation, legislation giving consumers legal remedies for violations, or federal statutes and regulation. di f i l ti f d l t t t d l ti Slide 8-140FTC Recommendations: Online Profiling Principle p Notice Recommendation Complete transparency to user by providing disclosure and choice options on the host Web site. â€Å"Robust† notice for PII (time/place of collection; before collection begins). Clear and conspicuous notice for non PII. before collection begins). Clear and conspicuous notice for non? PII. Opt? in for PII, opt? out for non? PII. No conversion of non? PII to PII without consent. Opt? out from any or all network advertisers from a single page consent Opt out from any or all network advertisers from a single page provided by the host Web site.Reasonable provisions to allow inspection and correction. Reasonable efforts to secure information from loss, misuse, or improper access. Done by independent third parties, such as seal programs and accounting Done by independent third parties such as seal programs and accounting firms. medical topics, sexual behavior or sexual orientation, or use Social Security medical topics sexual behavior or sexual orientation or use Social Security numbers for profiling. Slide 8-141 Choice Access Security EnforcementRestricted Collection Advertising networks will not collect information about sensitive financial or European Data Protection Directive Privacy protection much stronger inà ‚ Europe than U. S. European approach: Comprehensive and regulatory in nature p g y European Commission’s Directive on Data Protection (1998): (1998): Standardizes and broadens privacy protection in European Union countries Department of Commerce safe harbor program: For U. S. firms that wish to comply with Directive Slide 8-142 Private Industry Self-RegulationSafe harbor programs: Private policy mechanism to meet objectives of Pi t li h i t t bj ti f government regulations without government involvement e. g. Privacy seal programs e g Privacy seal programs Industry associations include: Online Privacy Alliance (OPA) Network Advertising Initiative (NAI) CLEAR Ad Notice Technical Specifications Privacy advocacy groups Emerging privacy protection business Slide 8-143 Insight on Business Chief Privacy Officers hi f i ffi Class Discussion Slide 8-144 Technological Solutions Spyware, pop? p blockers Cookie managers k Anonymous remailers, surfing Anonymous remailers surfing Platform for Privacy Preferences (P3P): Comprehensive technological privacy protection standard Works through user s Web browser Works through user’s Web browser Communicates a Web site’s privacy policy Compares site policy to user’s preferences or to other standards such as FTC’s FIP guidelines or EU’s Data Protection Directive Slide 8-145 How P3P Works k Figure 8. 2(A) Slide 8-146 Insight on Technology The Privacy T Th P i Tug of War: fW Advertisers Vs. Consumers Class Discussion Slide 8-147 Intellectual Property Rights Intellectual property:Encompasses all tangible and intangible products of human  mind Major ethical issue: j How should we treat property that belongs to others? Major social issue: Major social issue: Is there continued value in protecting intellectual property in the Internet age? Major political issue: How can Internet and e? commerce be regulated or governed to g g protect intellectual property? Slide 8-148 Intellectual Property Protection Three main types of protection: Copyright Patent Trademark law Trademark law Goal of intellectual property law: Balance two competing interests  public and B l t ti i t t bli d privateMaintaining this balance of interests is always M i t i i thi b l fi t t i l challenged by the invention of new technologies Slide 8-149 Copyright Protects original forms of expression (but not ideas) from being copied by others for a  ideas) from being copied by others for a period of time Look and feel copyright infringement lawsuits Fair use doctrine Fair use doctrine Digital Millennium Copyright Act, 1998 First major effort to adjust copyright laws to Internet age Implements WIPO treaty that makes it illegal to make, distribute, or use devices that circumvent technology? ased protections of copyrighted materials Slide 8-150 Patents Grant owner 20? year monopoly on ideas behind an invention Machines Man? made products p Compositions of matter Processing methods Invention must be new, non? obvious, novel Encourages inventors g Promotes dissemination of new techniques through licensing Stifles competition by raising barriers to entry Slide 8-151 E-co mmerce Patents 1998 State Street Bank & Trust v. Signature Financial Group Business method patents Led to explosion in application for e? commerce â€Å"business L dt l i i li ti f â€Å"b i methods† patentsMost European patent laws do not recognize M tE t tl d t i business methods unless based on technology Examples Amazon’s One? click purchasing DoubleClick’s dynamic delivery of online advertising Slide 8-152 Trademarks d k Identify, distinguish goods and indicate their source Purpose p Ensure  consumer gets what is paid for/expected to receive Protect owner against piracy and misappropriation Infringement Market confusion Bad faith Dilution Behavior that weakens connection between trademark and product Slide 8-153 Trademarks & Internet CybersquattingAnticy bersquatting Consumer Protection Act (ACPA) Cyberpiracy Typosquatting Metatagging M i Keywording y g Deep linking Framing Slide 8-154 Governance Primary questions Who will control Internet and e? commerce? What elements will be controlled and how? What elements will be controlled and how? Stages of governance and e? commerce g g Government Control Period (1970–1994) Privatization (1995–1998) Privatization (1995 1998) Self? Regulation (1995–present) Government Regulation (1998–present) Slide 8-155 Who Governs E-commerce & Internet? Mixed mode environmentSelf? regulation, through variety of Internet policy and technical bodies, co exists with limited and technical bodies co? exists with limited government regulation ICANN : Domain Name System Internet could be easily controlled, I t t ld b il t ll d m onitored, and regulated from a central location Slide 8-156 Taxation E? commerce taxation illustrates complexity of governance and jurisdiction issues governance and jurisdiction issues U. S. sales taxed by states and local government MOTO retailing E? commerce benefits from tax â€Å"subsidy†yOctober 2007: Congress extends tax moratorium for an additional seven years an additional seven years Unlikely that comprehensive, integrated rational approach to taxation issue will be determined for approach to taxation issue will be determined for some time to come Slide 8-157 Net Neutrality Currently, all Internet traffic treated equally – all activities charged the same rate, no ll i i i h d h preferential assignment of bandwidth Backbone providers would like to charge differentiated prices and ration bandwidth 2010, U. S. ppeals court ruled that FCC had no authority to regulate Internet providers Slide 8-158 Public Safety & Welfare Protection of children and strong g sentiments against pornography Passing legislation that will survive court P i l i l ti th t ill i t challenges has proved difficult Efforts to control gambling and restrict sales of drugs and cigarettes sales of drugs and cigarettes Currently mostly regulated by state law Unlawful Internet Gambling Enforcement Act Slide 8-159 Insight on Society Internet Drug Bazaar Class Discussion Slide 8-160
Subscribe to:
Posts (Atom)