Wednesday, October 30, 2019
Health and Science Essay Example | Topics and Well Written Essays - 6500 words
Health and Science - Essay Example of defense mechanism the person tries to repress any such undesirable feeling or thought or memory which causes any kind of mental turmoil to the person or which he wished not to have occurred ever. In this situation the person just wants to cut that portion of life away or just forget the situation. Hysterical amnesia is an example of this mechanism where a person performs or observes certain disturbing incident and then just forgets the incident and its surroundings. Repression is used in negative way when the person indulges in any harmful act and then forgets it. For example the person hurts or kills others at a certain state of mind or when finds others at a certain situation and then as soon as s/he is taken away from the situation or that particular state of mind s/he completely forgets the incident. Reaction formation is the kind of defense mechanism related to the fixation in consciousness of an idea or desire which is opposite to any unconscious fear. In this situation the person experiencing any conflict becomes obsessive with the situation either in positive or in negative manner. The person unconsciously tries to prove that s/he has completely accepted the situation which is opposite to her/his desire and in doing so s/he becomes over protective or solicitous to the situation. This may be expression of her/his internal guilt of not accepting the condition, e.g. an overprotective mother for her unwanted child. The negative reaction can be seen when this obsession affects the life of the child or others in a dangerous manner. Here the mother interferes too much in the life of the child and even hurts the child or anybody else who is trying to behave opposite to her obsession or notion. When a mother hurts the boyfriend of a girl child in order to keep him away from her daugh ter, it can serve as a negative reaction. Denial is the situation when a person consciously refuses to accept any painful incident. In this case the person tries to escape any
Monday, October 28, 2019
Confucius and Plato Essay Example for Free
Confucius and Plato Essay Editor Ken Wolf, at the beginning of the essay Confucius and Plato: A Few Really Good People, poses the question: ââ¬Å"What is the best way to create a strong society? â⬠(Wolf 25) It was surprising to a novice student of philosophy how similar the ideas of the ancient Chinese sage Confucius and famous Greek philosopher Plato were. Although, Confucius and Plato both made major contributions to the development of society, they showed both similarities and differences in these three subjects: ruling class, education, and faith in humanity. Confucius and Plato both believed virtue and intelligence were key components to creating a strong society. Confucius thought anyone who has been educated had the capability to develop into a ruler. Whereas Plato assumed anyone could be educated, but only a few, those in the ruling class had the ability to reason and thus were qualified to rule. In addition, Plato gave credence to the idea of being born into the ruling class, that the quality to reason was an inherited quality. Confucius and Plato were both strong believers that order was another main factor in a strong society. Although they both had laws to maintain the order, Plato had less faith in people in general to behave in a civilized manner. Both Confucius and Plato were in favor of education and were teachers themselves. Confuciusââ¬â¢s followers were the ones who wrote the Analects, which talked about how civilization depends on ââ¬Å"humanityâ⬠and ââ¬Å"proprietyâ⬠. Plato actually wrote The Republic which talked about his ideal ââ¬Å"philosopher-kingâ⬠. Plato established the Academy, which taught principles of ethics and government, for 900 years. Confucius attempted to teach the ruler to become a better person, but failed. The concepts put forth by Confucius and Plato begin to differ more when faith in humanity comes into play. Confucius and Plato both wanted to think there was good in everyone, but Confucius believed more in a ââ¬Å"â⬠¦society in which human relationshipsââ¬âespecially those within the familyââ¬âwere more important than laws. â⬠(Wolf 27) Plato concluded that the people needed to be controlled for there to be order. That control was maintained through the law. They both sought out peace and harmony, although Confucius focused more on the behavior of individuals and Plato was interested in universal truth even though it probably would not be accepted,. Plato felt that if a person tried to bring enlightenment to the masses ââ¬Å"â⬠¦they would probably try to kill to him for telling such tall tales, disrupting their lives and challenging their accustomed beliefs. â⬠(Wolf 31) Even today, most people would agree with Confucius and Plato about the importance of educating people in the development of a strong society. The idea of relationships as the basis of society may be summed up in: ââ¬Å"Do unto others as you would have them do unto you. â⬠This Golden Rule seems to be as important to Western society as it was to Chinese society. However, the idea of a better quality of citizen that is better suited to lead society smacks of elitism and would definitely not be accepted in modern democracies. However, that does not mean that the elite educated class from Harvard and Yale has not been overrepresented in American leadership. So perhaps we have a ruling elite, but not as overt as Plato would like. A final thought from the essay would be: a harmonious and orderly existence is important to all societies.
Saturday, October 26, 2019
What is Intelligence? Essay -- Biology Essays Research Papers
What is Intelligence? Intelligence can be defined in many different ways since there are a variety of individual differences. Intelligence to me is the ability to reason and respond quickly yet accurately in all aspects of life, such as physically, emotionally, and mentally. Anyone can define intelligence because it is an open-ended word that has much room for interpretation. Thus my paper is an attempt to find the meaning of human intelligence. There are a couple of scientists who have tried to come up with theories of what makes a human being intelligent. Jean Piaget, a Swiss child psychologist, is well known for his four stages of mental growth theory (1). In the sensorimotor stage, from birth to age 2, the child is concerned with gaining motor control and getting familiar with physical objects. Then from age 2 to 7, the child develops verbal skills, which is called the preoperational stage. In the concrete operational stage the child deals with abstract thinking from age 7 to 12. The final stage called the formal operational stage ends at age 15 and this is when the child learns to reason logically and systematically. (1) Piaget's theory provides a basis for human intelligence by categorizing the major stages in child development and how they contribute to intelligence. Each of these invariant stages has major cognitive skills that must be learned. Knowledge is not merely transmitted verbally but must be constructed and reconstructed by the learner (3). Thus this development involves a few basic steps. The first fundamental process of intellectual growth is the ability to assimilate the new events learned into the preexisting cognitive structures. The second fundamental process is the capability to change those ... ...ists approach in defining human intelligence. I believe that intelligence is the ability to utilize our entire brain, which will most definitely include Gardner's theory but more. Since we only use a small percentage of our brain, I imagine our brains have a lot more forms of intelligence than the ones Gardner proposes as well as more stages of child development than the ones Piaget proposes. As I mentioned before, intelligence is an open-ended word that may never have an agreed upon definition, but we all have our own definition. References: 1)Jean Piaget, Swiss Child Psychologist http://www.indiana.edu/%7Eintell/piaget.shtml 2)The Seven Human Intelligences http://www.homeschoolzone.com/hsz/leppert2.htm 3)Jean Piaget: Intellectual Development http://www.sk.com.br/sk-piage.html 4)Seven Intelligences http://www.ibiblio.org/edweb/edref.mi.th4.html
Thursday, October 24, 2019
The History of Ku Klux Klan :: essays research papers
It has been heard and talked about throughout history, that there was never such a thing as "The" Ku Klux Klan. There is traceable evidence of different movements and organizations that have used this name. The history of the K.K.K. corresponds with the history of race relations from our country. The Klan can be divided into five different eras: The Reconstruction, The End of the War (& Pulaski Six), The Klan Mobilization, The Reign of Terror, and The End of the First Era. Each stage was brought out by economic and social changes. Each stage also is at the same point in time as an escalation in racial standings. As it was started in 1865, the Ku Klux Klan has sent a sense of terror through peopleââ¬â¢s minds. A group of six white Southerners was the start of this organization. The history of violence of the K.K.K. is a result of the hatred and anger from the end of the Civil War. The reason for this hatred was because blacks had won their struggle for freedom of slavery. They fought to deny the civil rights for African Americans. They wanted the blacks to be forced into slavery once again. The K.K.K. tore apart reconstructing governments and established a reign of terror and violence throughout the whole war-torn South. The first era of the K.K.K. lasted about three or four years, than faded. The arose again after World War 1. The overall story starts with many generations of Americans learning hard lessons of life. These experiences led to fierce individualism, surprising inventiveness, and the thought that they could be whatever and go wherever they wanted to. Other things occurred alon g with these thoughts. "Frontier Justice" was an instant, private and violent method of settling differences without law officials. This was a large component to the motivation of the Ku Klux Klan. To some whites the freedom of slaves meant that their social and economic ways of life had been defeated. For some white Southerners, this was a nightmare that came true. The number of slaves living around the whites were seen as threats. Night patrols were a result of bloody slave revolts. These patrols consisted of white men that were empowered and authorized by law to look enforce a curfew for slaves, look for runaways and guard rural areas. This was done to prevent any black rebellions. These patrollers were given the right to whip any violators they caught.
Wednesday, October 23, 2019
The Refractive Index
The refractive index Aim: The aim of this experiment is to find the refractive index of a glass prism. In this experiment, the independent variable is the angle of incidence, and the dependent variable is the angle of refraction. Theory: Snellââ¬â¢s law relates the angle of incidence and refraction to the ratio of the velocity of the wave in the different media. The formula for Snellââ¬â¢s law is the following: Sin isinr = v1v2 = n Where i is the angle of incidence, r is the angle of refraction and v1 and v2 are the velocities of the wave in different media and n is the refractive index.Light refracts when it passes from one medium to another. The ratio of the velocity of light in the two media is called the refractive index. Materials and method: For this experiment we used a half glass circle attached on the center of a laminated paper with a drawn circle around it, a blue/violet laser with a wavelength 447nm and a wood block. First we started by placing the flat side of the half glass circle attached to the paper in front of the laser. Depending on the angle we wanted to find, we used the drawn circle on the paper to decide where to put the laser on the half side of the drawn circle.The angles of incidence we used were 10à °, 20à °, 30à °, 40à °, 50à ° and 60à °. First we measured the angle of incidence, where we placed the wood block perpendicular to the ray. To control the variables, the laser should have the same wavelength for all the angles to get the same refractive index and the ray should hit the center of the glass circle, so to check that the ray hits the center of the glass circle, we placed a wood block at the angle of reflection to see if the angle of reflection is the same as the angle of incidence, because we know that the angle of incidence is equal to the angle of reflection.Another thing which makes it easier to hit the center of the glass circle is by placing a paper on the flat side of the circle and see if the ray hits the ce nter of the circle and by placing the wood block perpendicular. Then we measured the angle of the refraction on the other half of the drawn circle, where we again placed the wood block perpendicular. We measured the angle of refraction by looking perpendicular down from the wood block, to see close where the ray hits the wood block, to see more precise where the angle of refraction is.We repeated this method for all the different angles of incidence and repeated every angle two times. D 2 1 2 You write ââ¬Å"to control the variablesâ⬠which variables? You should mention the wavelength and the hitting the center explicitly as variables to be controlled and why. Results: Angle of incidence à ± 0. 1à °| Angle of refraction1 à ± 0. 1à °| Angle of refraction2 à ± 0. 1à °| Angle of refraction3 à ± 0. 1à °| 10à °| 6. 9à °| 7. 1à °| 7. 0à °| 20à °| 13. 6à °| 13. 5à °| 13. 5à °| 30à °| 20. 0à °| 20. 1à °| 20. 0à °| 40à °| 25. 6à °| 25. 8à °| 25. 7à °| 50à °| 30 . 7à °| 30. à °| 30. 8à °| 60à °| 35. 9à °| 35. 9à °| 36. 0à °| Example: First we find the average and uncertainty for the angle of refraction: 7. 2- 6. 8 2 = à ± 0. 2à ° Angle of incidence à ± 0. 1à °| Average angle of refractionà ± 0. 2à °| 10à °| 7. 0à ° | 20à °| 13. 5à ° | 30à °| 20. 0à ° | 40à °| 25. 7à ° | 50à °| 30. 8à ° | 60à °| 35. 9à ° | The refractive index: We know that the formula is sinisinr = v1v2 = refractive index, so by applying the information we know to the formula, we can find the refractive index. Example: Uncertainty for refractive index: ( sin(10. 1)sin(6. 8) ââ¬â sin (9. )sin(7. 2) )/2 =0. 045 ? à ± 0. 05 sin(10à °) sin(7. 0à °) = 1. 42 à ± 0. 05 Angle of incidence à ± 0. 1à °| Angle of refraction à ± 0. 2à °| Refractive index| 10à ° | 7. 0à °| 1. 42 à ± 0. 05| 20à °| 13. 5à ° | 1. 47 à ± 0. 03| 30à °| 20. 0à ° | 1. 46 à ± 0. 02| 40à °| 25. 7à ° | 1. 48 à ± 0. 01| 50à °| 30. 8à ° | 1. 50à ± 0. 01| 60à °| 3 5. 9à ° | 1. 48 à ± 0. 01| Refractive index Intervals: Angle of incidence à ± 0. 1à °| Refractive index intervals| 10à ° | 1. 37 ââ¬â 1. 47| 20à °| 1. 44 ââ¬â 1. 50| 30à °| 1. 44 ââ¬â 1. 48| 40à °| 1. 47 ââ¬â 1. 49| 50à °| 1. 49 ââ¬â 1. 51| 60à °| 1. 47 ââ¬â 1. 49| DCP 2 2 2 Conclusion:From the table we can see that there is no interval, where at least one number from each interval is included. The consequences of the small angles are more serious than the bigger angles. Snellââ¬â¢s law states that no matter what the angle of incidence is, the refractive index would be the same. From the results I gained (disregarding the angle of incidence equals to 10à °), I can state that Snellââ¬â¢s law is confirmed in this case. Evaluation: The method has some weaknesses. The glass prism is not exactly in the center of the drawn circle, which is why the results are not quite correct.There might also be some misreading when reading the small angles, that has leaded to that the small angles of incidenceââ¬â¢s results are a bit uncommon and almost an outliers, but overall reading the angles could be one of the errors too. Suggestions: It would be better to glue the glass prism more precise in the center of the circle, so that the result would be more precise. Another thing to improve the method is by using a Vernier gauge to measure the size of small distances more accurate. CE 1 2 2 The one because the meaning of the red sentence is not clear! Very well, this is your best up to now. grade 7
Tuesday, October 22, 2019
Free Essays on Equality Of Education
An unequal level of achievement in schools is one of the most familiar aspects of the British education system. As rule schooling in Britain is a white middle class patriarchal institution and those who do not fit into those categories often find themselves underachieving, much of the time through no fault of their own. The group that this study will concentrate on is the ethnic minority population in Britain, and through the examination of materialist and cultural explanations will hopefully gain a further understanding of why many capable ethnic minority pupils do not reach their full potential in the British school system. One of the most popular arguments put forward for this is that the system fails the pupils and that there is inherent racism in the education system. Although this is certainly a factor, it is a simple one level explanation and the different layers involved in this explanation must be further examined before an adequate account is obtained. The case of ethnic minority underachievement in schools is a complex one as there are many overlapping inequalities with other groups, for example most ethnic minority children live in poor areas and face many of the same disadvantages as working class children such as poor resources within schools and a shortage of teachers. Therefore in this case it is very important to distinguish between equality of outcome, which has been concentrated on most in recent years, and equality of opportunity. If children in poor areas regardless of colour have overcrowded classrooms and fewer resources to learn with then it is almost inevitable that their quality of education will be poorer than those with better opportunities. Therefore in many cases it is not simply a case of ethnic minority pupils underachieving but working class pupils underachieving and comparison with white middle class children is unfair as it gives a skewed analysis which has no real relation to ethnic backgrou... Free Essays on Equality Of Education Free Essays on Equality Of Education An unequal level of achievement in schools is one of the most familiar aspects of the British education system. As rule schooling in Britain is a white middle class patriarchal institution and those who do not fit into those categories often find themselves underachieving, much of the time through no fault of their own. The group that this study will concentrate on is the ethnic minority population in Britain, and through the examination of materialist and cultural explanations will hopefully gain a further understanding of why many capable ethnic minority pupils do not reach their full potential in the British school system. One of the most popular arguments put forward for this is that the system fails the pupils and that there is inherent racism in the education system. Although this is certainly a factor, it is a simple one level explanation and the different layers involved in this explanation must be further examined before an adequate account is obtained. The case of ethnic minority underachievement in schools is a complex one as there are many overlapping inequalities with other groups, for example most ethnic minority children live in poor areas and face many of the same disadvantages as working class children such as poor resources within schools and a shortage of teachers. Therefore in this case it is very important to distinguish between equality of outcome, which has been concentrated on most in recent years, and equality of opportunity. If children in poor areas regardless of colour have overcrowded classrooms and fewer resources to learn with then it is almost inevitable that their quality of education will be poorer than those with better opportunities. Therefore in many cases it is not simply a case of ethnic minority pupils underachieving but working class pupils underachieving and comparison with white middle class children is unfair as it gives a skewed analysis which has no real relation to ethnic backgrou...
Monday, October 21, 2019
Mesohippus - Facts and Figures
Mesohippus - Facts and Figures Name: Mesohippus (Greek for middle horse); pronounced MAY-so-HIP-us Habitat: Woodlands of North America Historical Epoch: Late Eocene-Middle Oligocene (40-30 million years ago) Size and Weight: About four feet long and 75 pounds Diet: Twigs and fruit Distinguishing Characteristics: Small size; three-toed front feet; large brain relative to its size à About Mesohippus You can think of Mesohippus as Hyracotherium (the ancestral horse previously known as Eohippus) advanced a few million years: this prehistoric horse represented an intermediate stage between the smallish hooved mammals of the early Eocene epoch, about 50 million years ago, and the large plains grazers (like Hipparion and Hippidion) that dominated the Pliocene and Pleistocene epochs over 45 million years later. This horse is known by no less than twelve separate species, ranging from M. bairdi to M. westoni, which roamed the expanse of North America from the late Eocene to the middle Oligocene epochs. About the size of a deer, Mesohippus was distinguished by its three-toed front feet (earlier horses sported four toes on their front limbs) and the wide-set eyes set high atop its long, horse-like skull. Mesohippus was also equipped with slightly longer legs than its predecessors, and was endowed with what, for its time, was a relatively large brain, about the same size, proportionate to its bulk, as that of modern horses. Unlike later horses, however, Mesohippus fed not on grass, but on twigs and fruit, as can be inferred by the shape and arrangement of its teeth.
Sunday, October 20, 2019
A Complete List of John Grisham Books
A Complete List of John Grisham Books John Grisham is a master of legal thrillers; his novels have captured the attention of millions of readers, from adults to teens. In three decades he has written nearly one book per year and a number of those have been adapted into popular movies. From his debut novel A Time to Kill to the 2017à release of Camino Island, Grishams books are nothing short of captivating. Over the years, he branched out from legal stories as well. His complete list of published books includes stories about sports as well as non-fiction. Its a compelling body of literature and if youve missed one or two books, youll definitely want to catch up. Lawyer Turned Best-Selling Author John Grisham was working as a criminal defense attorney in Southaven, Mississippi when he wrote his first novel. A Time to Kill, based on an actual court case that dealt with racial issues in the South. It enjoyed modest success. He entered politics, serving in the state legislature on the Democratic ticket and began writing his second novel. It was not Grishams intent to leave law and politics to become a published author, but the runaway success of his second endeavor The Firm changed his mind. Grisham quickly became a prolific best-selling author. In addition to novels, he has published short stories, nonfiction, and young adult books.à Grisham Captures Mainstream Readers Fromà 1989-2000 Few new writers have exploded onto the literary scene like John Grisham. The Firm became the top-selling book of 1991 and was on The New York Times bestseller list for nearly 50 weeks. In 1993, it was made into the first of many movies based on Grishams novels. From The Pelican Brief through The Brethren, Grisham continued to produce legal thrillers at the rate of about one per year. He tapped into his experience as a lawyer to create characters who faced moral dilemmas and dangerous situations. During the first decade of his work, he produced several novels that were eventually made into major big-screen films. These include Pelican Brief in 1993; The Client in 1994; A Time to Kill in 1996; The Chamber in 1996; and The Rainmaker in 1997. 1989 - A Time to Kill1991 - The Firm1992 - The Pelican Brief1993 - The Client1994 - The Chamber1995 - The Rainmaker1996 - The Runaway Jury1997 - The Partner1998 - The Street Lawyer1999 - The Testament2000 - The Brethren Grisham Branches Out Fromà 2001-2010 As the best-selling author entered his second decade of writing, he stepped back from his legal thrillers to examine other genres. A Painted House is a small town mystery. Skipping Christmas is about a family that decides to skip Christmas. He also examined his interest in sports with Bleachers, which tells the story of a high school football star returning to his hometown after his coach dies. The theme continued in Playing for Pizza, a story about an American playing football in Italy. In 2010, Grisham introduced Theodore Boone: Kid Lawyer to middle school readers. This book about a kid lawyer successfully launched an entire series centered around the main character. It introduced the author to younger readers who are likely to become lifelong fans. Also in this decade, Grisham released Ford County, his first collection of short stories and The Innocent Man, his first nonfiction book about an innocent man on death row.à Not to turn his back on his dedicated fans, he rounded out this time with several legal thrillers as well. 2001 - A Painted House2001 - Skipping Christmas2002 - The Summons2003 - The King of Torts2003 - Bleachers2004 - The Last Juror2005 - The Broker2006 - The Innocent Man2007 - Playing for Pizza2008 - The Appeal2009 - The Associate2009 - Ford County (short stories)2010 - Theodore Boone: Kid Lawyer2010 - The Confession 2011 to Present: Grisham Revisits Past Successes Following the success of the first Theodore Boone book, Grisham followed up with five more books in the popular series. In Sycamore Row, a sequel to A Time to Kill, Grisham brought back protagonist Jake Brigance and key supporting characters Lucien Wilbanks and Harry Rex Vonner. He continued his policy of writing one legal thriller a year and threw in a couple of short stories and a baseball novel called Calico Joe for good measure.à Grishams 30th book was released in 2017 and titled Camino Island. Another intriguing crime novel, the story centers around stolen F Scott Fitzgerald manuscripts. Between a young, enthusiastic writer, the FBI, and a secret agency, the investigation tries to track down these handwritten documents on the black market. 2011 - Theodore Boone: The Abduction2011 - The Litigators2012 - Theodore Boone: The Accused2012 - Calico Joe2012 - The Racketeer2013 - Theodore Boone: The Activist2013 - Sycamore Row2014 - Gray Mountain2015 - Theodore Boone: The Fugitive2015 - Rogue Lawyer2016 - Partners (a Rogue Lawyer short story)2016 - Theodore Boone: The Scandal2016 - Witness to a Trial (a digital short story)2016 - The Whistler2017 - Camino Island
Saturday, October 19, 2019
Compensation and Benefits Paper Essay Example | Topics and Well Written Essays - 1000 words
Compensation and Benefits Paper - Essay Example For example, the same job might have different structures, meaning that the levels that the organization uses are diverse. In this case, the levels used by the organization determine the organization structure, since the different people report to different managers. In the example of software engineers in the Phoenix area, the type of job structures is best exemplified. In this case, there are three different job structures for the same occupation, each job structure attracting a different salary. The first job structure is Software engineer 1, which is the lowest level in the field. This job structure attracts an average salary of $58,001 (Salary.com, 2011), and from the job description, requires up to 2 years of experience in a similar position. An individual in this position is always under immediate supervision, and cannot exercise independent judgment in the job. The second job level is a software engineer 2, who makes an average salary of $73,539 (Salary.com, 2011), and is a l ittle higher than the software engineer 1. This job level requires between 2 and 4 years of experience, performs more tasks that the first job level. This employee reports to one manager, and is usually not under immediate supervision. ... The information described above can be used in the development of a pay structure in a simple way, since the factors that determine pay are already evident. The description of three job levels above indicates that two factors that determine the pay structure in an organization. The first factor is the experience that an individual possesses (Ranken, 2010). The educational level is usually constant, since an individual is expected to possess minimum qualifications before consideration for the job is done. In this case, the first level, which earns the lowest salary, possesses the least experience, and the third job level possesses the highest job experience. This indicates that the development of a pay structure should be dependent on the experience that an individual possesses. From the above information, it is also evident that the development of a pay structure is also dependent on the level of independence that an individual is accorded in an organization (RAnken, 2010). For examp le, a first level engineer is accorded the least level of independence, therefore, it is to be expected that the pay grade will be the lowest. Conversely, the third level engineer is accorded the highest level of independence; therefore, the pay grade is the highest. Benefits Benefit Description Value Reason for benefit Social Security Social security is a contributory program made by all employers to a government fund for the retirement, medical aid, and disability fund for employees. The employees are assured that they will get retirement benefits and medical care at the moment they retire. Required by law Disability Disability benefits are not mandatory since they are already covered by social security. This benefit is
Friday, October 18, 2019
New Product Development is the Key to Apple's Marketing Success Coursework
New Product Development is the Key to Apple's Marketing Success - Coursework Example The latest product introduced by Apple is the iPhone 4S. Apple announced the launch of iBooks 2 for iPad which would feature iBooks textbooks, iTunes U application for iPhone, iPad and for iPod touch (Apple Inc-a, 2012). Apple aims to bring the best experience for its customers through its product and services. The business strategy of Apple is to leverage the unique abilities of designing and developing the companyââ¬â¢s own operating system, software and hardware in order to provide its customers with superior products and innovative designs. The company believes in innovation which is the key strategy for the success of the company; as a result, Apple invests in its research and development in order to introduce new and innovative products. Apart from its R&D, the company also invests in its marketing and advertisement as a part of Apple strategy to stay ahead of its competitors. Apple strategy also includes expansion of its distribution network to reach more clients and provid e the potential customers with high quality of sales and post purchase experience (Apple Inc, 2011, p.1). New Product Development Any changes made to a product are termed as new product development. ... New product development is one of the key strategies of Apple; it is through new product that the company has been able to taste success being one of the leading companies globally. Apple launches new product in the markets to stay ahead of its competitors, to continue the product life cycle, to give the customers what they need, and to enhance the strategy. According to Steve Jobs, new product lines tend to give people the products which are needed by the consumers. The company expresses its vision with the help of its product, exciting the customers and making them proud of owing an Apple product. The life cycle of any product needs to be modified carefully. Apple introduces new product when its earlier products are entering the maturity phase of the PLC giving no or less chance to its competitors to stay ahead. Thus, with continuous innovation, Apple provides a huge competitive edge over its competitors and helps in maintaining its number one position. With its innovation strategy the company has introduced many new products and also planned to launch few more in the coming years or so. Apple has applied a strategy of continuously milking its cash cow and has done a fantastic job. Each of its products, ranging from the Mac, iPhone, and iPod has been fertile, speaking about leverage designs and supply chain. The main motive of milking its product is to stay competitive in the market. Apple product possesses elegant design which integrates software, hardware and its services. One of the closest competitors of Apple is Android which has come up with similar products and is doing quite well in the market. Therefore, Apple should constantly introduce new products with elegant design which is the USP of Apple for its consumers. Apple
Depression and Anxiety in PEG Feeding Dissertation - 1
Depression and Anxiety in PEG Feeding - Dissertation Example Expand a few linesâ⬠¦ TABLE OF CONTENTS TABLE OF CONTENTS 3 LIST OF FIGURES Abstract This dissertation is about the social and psychological impact, including anxiety and depressed moods, on people who are artificially fed via a tube based on percutaneous endoscopic gastrostomy (PEG). The analysis is based on a framework that highlights two sides of sickness, ââ¬Å"diseaseâ⬠underlying the placement of a feeding tube (biological malfunctions recorded as particular disease categories, e.g., cancer, neurological disorders, cardiac diseases, palsy) and the response to this by patients and their carers. This distinction between ââ¬Å"diseaseâ⬠and ââ¬Å"illnessâ⬠provides a view of the social and psychological complexities involved. These are often overlooked when artificial feeding is adopted. The dissertation proceeds via a description of the literature search on PEG. The primary tools used in this search is the topical search (e.g., ââ¬Å"socio-psychological imp acts of PEG feedingâ⬠) on the internet and the exploration of various databases, such as Cinahl, PubMed, Medline, Cochrane and Google Scholar. The literature used refers to reports of ââ¬Å"newâ⬠(i.e. past decade) findings. In a very few cases only, when outlining ââ¬Å"illness responsesâ⬠to ââ¬Å"diseaseâ⬠and the ensuing person-oriented framework, a few basic sources pre-dating 2000, are drawn upon. The accompanying review of relevant sources attempts to bring out the emphasis of ââ¬Å"diseaseâ⬠and the omission of efforts to develop a framework or model and conceptual tools to grasp the social and psychological implications of artificial feeding due to disability. Such a model can, however, be of great value to nursing care and operating practice. Such a framework is available to us via a number of qualitative studies and a ââ¬Å"narrative understanding of the illness experienceâ⬠. The usefulness of this body of literature will be examined in the ensuing discussion. In the conclusion I will stress the value of a qualitative, person-oriented perspective (the ââ¬Å"illness experienceâ⬠) for a humanistic medical and nursing practice. Introduction This dissertation is based on a lengthy review of available literature on the social and psychological impact, including anxiety and depressed moods, on people who are artificially fed via a tube based on percutaneous endoscopic gastrostomy (PEG) This review allows me to examine the emotional costs involved in PEG tube feeding, especially with regard to experiences and the coping with the emotional (anxiety, depressed mood) and social costs of tube feeding before, during and after the placement of a PEG tube. This dissertation takes the patientââ¬â¢s point of view and reviews two groups of literature in depth: one of the two is person-and qualitatively-oriented and proposes a meaning-centred, qualitative and humanistic method/perspective. At the same time, one realizes tha t patients are found in a larger health care context where medical and health care professionals operate. Their and the perspective of medicine must be understood as well. Byron Goodââ¬â¢s (2008) book on Medicine, Rationality and Experience provides a good introduction to their and the patientââ¬â¢s perspective. It is therefore meaningful to compare and contrast the views and perspectives of these professionals and the views that patients express, their way of coping with PEG tube feeding, their modes of reasoning, their various feeling-states (anxiety, depression) and the lives they live. I have chosen
Thursday, October 17, 2019
WiFi, VPNs & Encryption Assignment Example | Topics and Well Written Essays - 250 words - 1
WiFi, VPNs & Encryption - Assignment Example In this scenario, different restrictions are implemented on the system access mechanisms. As a result, it becomes very difficult for these security threats to pollute a system and spread to other systems and devices (Merrifield, 2015). In other words, the concept of least privileges is used by the system administrators to offer the smallest amount of system resources needed to complete important business tasks. This mechanism is implemented through a variety of methods such as user rights (for instance putting restrictions to usersââ¬â¢ rights, the way they access to the systems), resource permissions for instance implementing restrictions on CPU, network, memory and file system permissions. For instance, if a middleware system simply needs access to the network, the capability to write to a log, and read access to a database table, it refers to all the authorizations that should be approved. However, the middleware server should not be granted administrative privileges in any cas e under any circumstances (OWASP,
Human Resources Problems Assignment Example | Topics and Well Written Essays - 250 words
Human Resources Problems - Assignment Example Based on your text and supplemental readings, what are some of the potential problems associated with employee self-service? After sharing some problems facing self-service, how would you address those problems? What is your professional opinion related to management self-service, where managers have access to more employee information through HRIS systems?In a self-service system like ESS, many errors remain covered for a long time which negatively interferes with the quality process. Though employee satisfaction is increased by use of ESS, many ESS software used by companies have many disadvantages like costs associated with its maintenance, functionality issues, and poor performance. These problems can be rectified by using an ESS software which is specifically designed to meet an organizationââ¬â¢s needs.5-Does the web present problems for employee self-service applications? Find an article on this subject and provide a summary of the article, including the web address.Many we b self-service pitfalls have been reported. The web creates problems for ESS applications because every bit of employeesââ¬â¢ interaction with employers is automated. Technology is always better and lack of HR automation will seriously affect many organizations in terms of time of costs. Automation of HR functions has relieved the HR professionals from much of the burden because much of the tasks assigned to them by managers and employees can be now handled by themselves by use of ESS and manager self-service.
Wednesday, October 16, 2019
WiFi, VPNs & Encryption Assignment Example | Topics and Well Written Essays - 250 words - 1
WiFi, VPNs & Encryption - Assignment Example In this scenario, different restrictions are implemented on the system access mechanisms. As a result, it becomes very difficult for these security threats to pollute a system and spread to other systems and devices (Merrifield, 2015). In other words, the concept of least privileges is used by the system administrators to offer the smallest amount of system resources needed to complete important business tasks. This mechanism is implemented through a variety of methods such as user rights (for instance putting restrictions to usersââ¬â¢ rights, the way they access to the systems), resource permissions for instance implementing restrictions on CPU, network, memory and file system permissions. For instance, if a middleware system simply needs access to the network, the capability to write to a log, and read access to a database table, it refers to all the authorizations that should be approved. However, the middleware server should not be granted administrative privileges in any cas e under any circumstances (OWASP,
Tuesday, October 15, 2019
Reflection on the book 'The White Castle' Essay Example | Topics and Well Written Essays - 500 words
Reflection on the book 'The White Castle' - Essay Example Like in the story Hoja, a Muslim, made the western slave tell him about their life styles and he preferred these western styles over theirs. Pamuk portrays religion with great care in the book and shows how the two different thoughts of West and East can merge together. The Ottoman society follows the old traditions according to their religion and thus do not take any sanitary precautions when a plague hits Istanbul, however the Italian slave advises the Sultan to use such measures for the end of plague and the Sultan does eventually follow the Western way of removing the plague which proves to be successful. Pamuk in his story White Castle tells about the realities of life in the 17th century. It describes different events taking place in the Ottoman Empire. Cruelty is prevalent through out the plot of the story and can be clearly viewed in the characters. The Italian Scholar seems to be laid into a trap by the Eastern world but is saved by his own intellect. Similarly Pamuk is portraying the Eastern world with great uncertainty and cruelness. The pirates who capture the Italian scholar are cruel in nature and are supposedly going to kill the scholar. However the scholarââ¬â¢s intellect helps him to misguide the pirates into thinking that he is a doctor and this saves his life. But on the other hand the pirates do not free the scholar; they rather gift him as a slave to Hoja. The character of Hoja can also be viewed to be cruel as he absorbs all the information from the Italian scholar about his lifestyle and even then does not let him free. The cruel nature of Hoja can yet again be seen in his aim of designing a deadly weapon which would help his empire to conquer other states. And furthermore, when the weapon does not work as expected by him he steals the identity of the Italian scholar and runs away leaving him in the Ottoman
Health and Social Care Essay Example for Free
Health and Social Care Essay Government: (National)- Greenwich Council (Locally) World Heritage Site (Internally). The National Maritime Museum set target by the government to meet the needs and to attract different types of customer all over the world and also to provide better facilities such as providing wheel chair for disabled people. Sponsors: one of the sponsors is PO they want quality exhibits, which means they could have good publicity which lead to better public image. Researchers- Researchers produce different types of research from over the world and encourage the museum to improve on their exhibits. Suppliers: who supply food and other products and the supplier expect good pay at the right time. Owners of Exhibits: The owner of exhibits wants security on their collections of picture or etc and a good feedback from the museum. Customers: The customer wants good Customer Service, helpfulness staff and to provide better facilities for special needs. Staff: The staff should be motivated, which then will lead to good sales and profit. The staff will have an experience working with different types of customers. Friends ([emailprotected]): Friends of the National Maritime Museum actively support the largest Maritime Museum in the world. The friends mission is to support the work of the National Maritime Museum, the Royal Observatory and the Queens House by. In 1997/1998 the Maritime Museum had 50% of people visited the museum, but in 1998/1999 the Maritime Museum had 54%, which means the visitor number has increased by 4%. In 1999/00 the museum had 52% but by 2000/01 it has decreased by 3%. By 2001/02 the museum visitors has gone up by 10%. This table shows the predicted target market. The age group of 18-24, In 1997/98 they were 10% of Visitors and in 2001/02 it was 7% which means it has decreased by 3 % since 1997/1998. In 1997/98 they were 18% of visitors visited who are aged from 25-34 and in 2001/02 it was 19%, which means it has gone up by 1% since 1997/98. Although it was a change in 1998/99, because the number of visitors who are aged 25-34 has increased by 4% since1997/98. The age group 35-44, in 1997/98 it was 23% and in 2001/02 it was 23% which means they have been no change but in 1999/00 the percentage went up suddenly they have decrease since 2000/02. In 1997/98 it was 24% but in 1998/99 the percentage went down by 2%. From 1999/01 they have been no change of percentage of visitors arriving but in 2001/02 the percentage has decreased by 1% since 2000/01. The age group of 55-64, in 1997/98 it was 15% but the figure went down until 1999/00. However the figure went up in 2000/02. In 1997/98 it was 10% of visitors who are aged 65+ but the percentage stayed same until 1999. Although the percentage starts to rise slowly in 2000 by 2001 the percentage has gone up by 2%. This table shows the predicted income. In 1997/98 it was 37% visitors visited who were A/B Income earners, but by 2001/02 it has increased by 47%. The C1 Income earners visited the museum in 1997/98 was 46% and in 2001/02 it has decreased by 35%, but also the percentage did rise in 1999/00. In 1997/98 it was 12% who were C2 income earners, but in 2001/02 it has decreased by 9%, however the figure did rise in 1999/00. the D/E Income earners visited the museum in 1997/98 was 5% but in 2001/02 it has gone up by 9%, but there was steady change in 1998/2000. Overall it show that in 1997/98 it was most likely that C1 Income earners visited the Museum but by 2001/02 it has changed because A/B Income earners are likely to visit the museum * Predicted staffing needs This table shows the staffing levels. The visitors were very satisfied with the exhibition display in 1997/98 but the visitors were very satisfied in 2001/02 because it has gone up by 4%. There were only 2% of visitors not satisfied with the exhibition display in 1997/98 but it went down by 1%. In 1997/98, 50% of visitors were satisfied with the staff but in 2001/02 the percentage has increased by 14%. They were no satisfaction in 1997/98 or in 2001/02. This is an evaluation on customer service at Maritime Museum. I will be evaluating the service provided by the museum when I went for the visit. I enjoyed my trip to the Maritime Museum and it has helped with my assignment on customer service and also they provided information, which will help my coursework. The service provided by the National Maritime Museum was excellent and the staffs were motivated to their work. I had great greetings when I visited the museum and I was provided information on the exhibits, when I didnt know. E. g. when I visited one of the history section I didnt know about Nelson so the staff took his time to explain for us, so I thought that was good customer service. The lecture from the staff was good because they took their time on providing information, which I thought it was a good customer service. The purpose of this letter is to express to you my apologies for any inconvenience you may have experienced on the 27th of March 2006 due to standards of service you experienced in our restaurant. I have taken my time to investigate your case and the possible reason I could give you is that my staff didnt have record of your booking and so you had to wait for 45 minutes to be seated because the restaurant was full. We are terribly sorry if you were embarrassed by our service. During the 45 minutes the manager sat you at the bar and gave your party free drinks. As soon as the table were clear, the staff sat you down in two different tables and meanwhile we were preparing vegetarian food. I have come up with a solution to solve these problems. I will be talking to my staff about the record of booking. I will also have word with the waitress and provide better training on dealing with customers. I will make sure the systems work correctly. For the Disappointment service you had received by our restaurant we will provide you a free meal and better service from our restaurant. Once again I am terribly sorry for the service provided by our restaurant
Monday, October 14, 2019
Tektronix Inc Global Erp Implementation Management Essay
Tektronix Inc Global Erp Implementation Management Essay For Welti (1999), an ERP implemented in a complex international environment normally incorporates four major sequential stages (Planning, Realization, Preparation and Productive phases) that must go in parallel with a proper Change management, Risk Management, Project Control, Project Team Training and User Training. As the global implementation was done by waves with different characteristics, it can be seen that different project management strategies were adopted. In this part only the most characteristic features of the overall project are highlighted and these issues are limited to the information given by the case study (Planning and Realization stages). In the Planning stage, many issues can be mentioned. First, the selection of the ERP package was quite straightforward and relied mainly on Neun and Vanceà ´s judgment, experience and criterion; they decided to choose Oracle as a single vendor in order to avoid dealing with the complexity of multiple providers which, although it may cause future problems due to the dependency created to a single vendor, it was a practical decision for the implementation process. In this decision, they devoted neither too much time in costing nor resources in evaluating the alternative packages. Secondly, the steering committee clearly defined the model, guidelines and principles under which all the systems were adhered to. Also, it was defined the financial architecture that could meet the new business model: Order Management was different for each division (for customer purposes), but the rest of accounting elements were based on single definitions in order to provide worldwide control. Thirdly, th e Project Team structure offered advantages such as the cross-functional working style, which created a regional and divisional control. Then, the problems and tasks could be addressed from these two perspectives, but the disadvantage of this approach might be the conflicts of power during the implementation, as authority was given to divisional and/or regional leaders which could have created confusion to users and sub-teams. Fourth, it seems that within each wave they did not allocate carefully all the resources, people or time needed for being successful, which led to the time constraints as they devoted effort looking for skilled staff and consultants. Overall, the project was benefited from the partial feedbacks and success in each stage and in the long run the plan was framed within the general guidelines and schedule. Also, the planning stage can be said to be closer to reality as they used a mixture of emergent and statics tactics to face future events. The Implementation phase was done more or less within the plan, and it was divided mainly in regional and divisional deployments. The first stage, the implementation of the Financial and OMAR modules in the CPID was properly led by the person who best knew the IT infrastructure in USA: Gary Allen. As this division was in need of an urgent BPR and a new business model in order to improve their competitiveness, the early success of this implementation could get the buying of the next regions and divisions. However, this stage was no exempt of project management difficulties: Tektronix lacked of technical and functional skills with Oracle, and they struggled in finding the right consultants, with the resultant wasting of time. It can be mentioned that within this first part, USA was a good pilot for OMAR, as they could get an opportune feedback about business and technical issues; regarding the implementation of financial module in USA and Europe, they did not face major challenges, giv en that this module did not require BPR and also because the company highly relied on Oracle specialist Consultants (Aris Consulting). But the implementation of OMAR at MBD (second stage) met technical challenges despite of the help from Oracle consultants. The third stage, implementation at VND, was characterized by a constraint of human resources. These two last stages (two and three) went through problems from the business perspective, probably as a result of IT head divisions leading the implementations, with less involvement from the executive level. Later, once deployed the software in USA, Tektronix went to the European branches where the approach followed was more or less similar to that followed in USA: they chose the most used European distribution centre (Holland), and this pilot reduced the uncertainty and gained the buying from the rest of regional countries. Then, they decided the final roll out to some other European countries and the big-bang deployment that installe d all three divisional systems together. This strategy could lead to good results considering that European countries are culturally very different and it is really challenging to implement a vanilla version program. When introducing the ERP system into Asia, a similar plan was followed, which was wise given the language issues that could have represented a technical and cultural limitation if not addressed properly. America and Australia seemed to be easier waves in comparison with the rest of the project. Although the monitoring and feedback had a positive impact on the effectiveness of control (Mudimigh, 2001; Bancroft, et al., 1998) and the deadlines were timely met, it is clear that the weakest point of the implementation stage and partially of the planning stage was the poor Change Management, Project Team training and Risk Management (they are not mentioned in the case). For example, the complete absence of a proper Change Management project led to the resistance found when implementing OMAR at MBD. Also, the absence of attention from the managerial and business level in the allocation of the initial resources (staff, training, and consultants) led the waste of time when selecting consultants, when doing testing, incorporating technical changes, language customizations and new business processes. One of the good points of the project was the training given to Power users and Sub-Teams across the global enterprise. Overall, the conservative approach (waves of roll out and big-bang ) followed by Tektronix really helped in mitigating many of the characteristic risks for a global ERP implementation. 2.- IDENTIFYING TEKTRONIXà ´S PROJECT RISKS In terms of risk, it can be said that Tektronix had tolerance for risk (Hirsch and Ezingeard, 2008) as managers were willing to accept variations during the project in order to obtain high returns (time and efficiency).This attitude towards risk might have an explanation: by using the Willcocks and Griffiths (1994) framework, we can see that due to some key managersà ´ previous experience with ERP technology, considering the project as a large one and regarding project structure as medium or low, then the risk can be classified as Low or Medium. Then, it can be said that leaders of the implementation drove the project without a highly structured plan because their knowledge about ERP implementations gave them enough confidence to improvise tactics in order to obtain successful results. Keil et. al (1998) proposed a risk categorization framework that can be used here to classify the risks that Tektronix faced. Furthermore, this model gives the opportunity of clearly locate those events that could have happened and that could be prevented if addressing the events on time. Complementing this framework, specific risk factors (Sumner M., 2000) for enterprise-wide ERP projects are included within the four quadrants. Quadrant 1: Customer Mandate In this quadrant there are risks associated with the commitment obtained or lack of buying from senior management, users and other stakeholders. The first concern noticed in the case studied was that the project clearly had the financial support from the Board of Directors; and also the CFO and CIO were willing to introduce changes and improvements for the company, all which reduced the risks related with funding or assistance needed during the implementation. Secondly, the commitment from the company HQ and divisions was quickly gained because the high rate company growth and Tektronixà ´s inability to cope with the market pressures had created a sense of dissatisfaction among managers and top employees who found in this project the opportunity to improve. Thirdly, there was a highly motivated champion of the project (Carl Neun) who was supported in his idea by the CIO and CPIDà ´s president. Furthermore, some other leaders were designated across the different regions and business units in order to expand the championà ´s directives. Fourth, the management structure of the project was built upon a number of key roles with business and technical expertise; this structure consisted of a central project leader (CFO with unlimited authority from the CEO) and strong business divisional or regional leaders supporting the championà ´s authority. The clear roles allocated at different levels reduced the efforts done along the top-down structure, but the lack of involvement of the CEO and other senior managers in Change management can be considered a risky attitude which ended up in occasional resistance from some users. Lastly, it seems that end-usersà ´ expectations were not considered at all: firstly, because the CFO relied mainly on his experience and intuition and did not spend time in doing a proper project analysis; second, the vanilla approach proposed by Neun implied adapting usersà ´ operations and routines to software and not vice versa. An instance of this weakness arose when doing BPR at MBD, where there was usersà ´ resistance and time was wasted explaining to users the reasons behind the new processes. Quadrant 2: Scope and Requirements In general, there were no major misunderstandings in requirements or disruptive changes in requirements: the scope was clearly defined as global, the elements implemented were limited to the Financial and OMAR systems, and the company followed the best practices embedded in the system and recommended by the vendor. Furthermore, as a vanilla implementation approach was deployed as a global solution, only in cases of extreme need modifications took place, which clearly reduced the risks involved when doing local or national customizations (Sheu, et al., 2004). Quadrant 3: Execution In this Quadrant, it can be assessed risk factors and many of the traditional pitfalls associated with poor project management. The pitfalls can fall into the business or technical field. As examples of first mistakes done by Tektronix, it can be mentioned an inadequate change management, project management and risk control: They never did any feasibility analysis and risk analysis before embarking in this huge project, and this neglect prevented them from seeing the reality in some subsidiaries. As a consequence, customization of the ERP for business processes-that were unique for some competitive local branches- had to be made; also, Multilanguage settings were programmed at last minute. The lack of skills in project management resulted in assigning this responsibility to inexperienced consultants, with the corresponding wasted money and delays when choosing a new consultancy firm. Tektronix also faced resistance that was not expected; for instance, when doing the implementation at the VND division, they found difficulties that only could be overcome by increasing the working pressure and the level of resources (order entry people, item maintenance people). With reg ard to the transfer of knowledge, the company relied mainly on a combination of large and small consulting firms (particularly with Aris Consulting) as well as independent consultants, but it is not clear whether a correct program for transfer of skills was in place. The Change Control team actually worked as a communication or monitoring team and no Change management team or program was ever mentioned. Regarding the technical realization, there are some points to highlight. First, the risk of Oracle versions being obsolete before the roll out completes was diminished with the concept of waves; and each time a new version was released the company used updated versions of the software. However, in CPID, Tektronix wrongly decided to install a beta version of the software which resulted in much time of debugging, instead of waiting for the final version that was later released or for a more tested version. Secondly, the lack of technical expertise made the firm to rely mainly on external consultants as Tektronixà ´s employees did not have proper training in the technical area. Furthermore, this lack of expertise resulted in much time and resources wasted, such as the excessive training and testing done in the MBD division when implementing OMAR. Thirdly, there was also the risk of integration with the manufacturing legacy system that was kept in place; and even when an interface was i nstalled between the two systems, there might be a possibility of future failure. Finally, in spite of the fact that the implementation included building a data ware housing functionality, it seems there were no plans or considerations of the high risks involved in data migration. If the new software did not work properly with the existing infrastructure or database, the only outcome would be adding the software to the collection of obsolete legacy systems. Quadrant 4: Environment Tektronix never considered the risks associated with changes in scope/objectives due to changes in the senior management hierarchy or political problems within the firm itself. Hopefully, the project did not miss their key team or management members and it could finally reach the end with a constant objective. It helped the fact that the global objectives were met in less than 3 years, a period of time relatively short that avoided the risks associated with managers moving and changing plans or directives. With regard to internal problems, it was not considered that potential conflicts between the business units or departments could erode the performance of the plan. However, the leadership and corporate culture seems to have helped subsidiaries to strictly follow the HQ guidelines, which in turn streamlined the implementation process. 3.-CRITICAL SUCCESS FACTORS AND GLOBAL CHALLENGES For Tektronix, some of the following critical factors and challenges (Plant and Willcocks, 2007; Sheu, et al., 2004; Hoffman, T., 2007; Bingi, et al., 1999) permitted to reach a fairly successful implementation: Communicating and persuading project goals to constituents from different cultures (Hoffman, T., 2007) The vision and project goals were adequately communicated and reached thanks to two factors: The strong leadership of Carl Neun, who was given the whole support from the CEO, and the steering committee whose main activity was to develop and ensure that enterprise-wide implementation guidelines and principles were followed. Also, the presidents of each division were key contributors because they made tough decisions in order to meet the deadlines imposed and reduce the cultural problems. Change, Customization and Business Process Reengineering (Plant and Willcocks, 2007) The implementation approach followed by Tektronix was probably the best risk management initiative itself because the global deployment was done in a logical order to reduce disruptive changes and to increase the learning and feedback. Also, the vanilla model suggested as the standard for the entire organisation helped in diminish the level of customization, although some minor changes were necessarily made. The implementation of the financial model did not require BPR, but the OMAR module was modified and customized in order to support both the corporate functionalities and the best practices embedded within the system. Then, BPR was done to the extent of preserving the competitive and core capabilities of the regional business units. Internal Technical Personnel/Resource/Labor Skills (Sheu, et al., 2004) Although Tektronix did not have trained personnel in project management or in technical knowledge, they opted for buying consultantà ´s know-how, which could give them the capabilities to go forward with the implementation. At some points they were able to find enough human resources to back critical stages. Overall, the company did not have economical limitations for easily obtain the adequate staff and for keeping the plan within the deadlines. Selection of ERP Vendors (Bingi, et al., 1999) Global ERP rollout requires that the software is designed to work in different countries and that the ERP vendor has the same package version available in the countries or regions where the system is being implemented (Bingi, et al., 1999).In the Tektronix case, Neun and Vance both had already experience with ERP solutions offered by Oracle, and this let them move quickly and take a justified fast selection of the ERP vendor. 4.-LESSONS LEARNED AND RECOMMENDATIONS 1.-The first learning from this global ERP implementation is the deployment strategy used: a snowball approach (Ogundipe, O., 2010) in which the project is broken into manageable chunks, beginning with appropriate locations in order to cope with business or technological challenges, running parallel implementations and then doing the big-bang stage at the end, when there is enough confidence (more learning and feedback). At the same time it can be said that an emergent strategy (Nandhakumar, et al., 2005) was used for every wave introduced. Perhaps the same methodology can be used in the future for IT infrastructure projects or any other disruptive project. 2.-It is clear that the ERP brought many benefits, but Tektronix can still leverage IT as a strategic advantage. They could incorporate Procurement, HR, SCM modules and CRM packages in order to make a customer-centric organization. 3.-In the final part, there is no evidence of estimation of ROI or real financial analysis that can show the tangible financial benefits of the investment. Of course, it is mentioned improvements in terms of time or efficiency, but it would have been essential to have an initial budget beforehand, especially considering that the company was toward the financial recovery. 4.-Tektronix faced many difficulties because of the lack of Oracle in-house specialists, so they had to rely on external consultants (Aris Consulting); however, it seems that the transfer of knowledge was not properly organized. In a next project, there must be a plan that can ensure that employees and users can gain the best learning experience from the Consultants. It is vital that in-house staff can get the skills, otherwise even when the ERP implementation is successful, the performance and use can be poor if there is not trained staff. For a future implementation, if there is lack of trained staff, Tektronix can also consider the option of IT outsourcing, which is a solutions that have worked perfectly for some other big companies. 5.-In order to obtain the best benefits from the IT incorporated capabilities and make them sustainable in the medium and long term, the company should have followed the Strategic Alignment Model presented in Cooper, et al. (2001) which was adapted from Henderson and Venkatram (1993). By following this model, Tektronix can benefit from holistic technical and organizational changes that are properly aligned to the firmà ´s business strategies.
Sunday, October 13, 2019
Free College Admissions Essays: Try, try again! :: College Admissions Essays
Try, try again! Bedraggled, disheartened and blanketed with mud, I sat on the sidewalk blubbering while the tears dripped down my knee. As I watched the salty droplets trickle down my dingy leg and meld with the crimson driblets oozing from my ragged shins, I felt a certain overwhelming feeling of helplessness, of defeat. After a comfortable amount of time was spent wallowing in self-pity, my relentless attitude proficiently mustered the nerve to get back on my very first bicycle and give it another try. I was on my way to conquer one of my first acquaintances with adversity. " Excellence and success is not achieved in perfection but in knowing you tried your best." This is definitely the most powerful virtue that I've cultivated throughout the years. From learning to walk to learning to drive and all the obstacles that I faced in between I was always able to employ this adage and trust that belief in it would get me through whatever challenge I faced. As an innocent, radiant slip of a girl I embark ed on my first steps of life. I fell, and fell again until my bottom was bruised, I'm sure. Nonetheless, I never gave up, and was up and running around in no time! I was ready for bigger and better things. Before long it was time for school. This, by far, has been the most challenging endeavor midst the years. No matter what I always gave it my all and managed to remain a high honors student throughout a majority of my academic career until I was faced with an even larger task...high school. With problems developing in the family I became incredibly withdrawn and unfortunately, indifferent. By my junior year I was feeling so overwhelmed that, in essence, I surrendered to failure. I barely had the ambition to go to school let alone do well in my classes. I was accepting defeat and very low grades at that. Then, one day, a teacher said something to me that evoked thought, a second look at my situation. While staying after school, my English teacher said, "Jessica, you're a very intell igent girl, and you have the ability to achieve much higher grades, but you aren't trying which is sad because there are kids that try so hard and can't earn the grades that you're so capable of.
Friday, October 11, 2019
Social Interaction and Technology Essay example -- Sociology
Cellphones, television, and computers are just three of the most popular ways that we communicate in today. They have made a substantial impact on the United States simply by being readily available and easy to use. People are often discussing how technology has impacted us. Many believe that technology is actually hindering society rather than helping it. Then there are those who doubt technology has made our social interactions better. Certainly, this is true; without the advances in technology, our level of social interaction in education, businesses, and relationships would diminish. Education is important, so it would only make sense that technology would have a huge part in it. When children are born, they are placed into a world that is driven by technology. Parents are now using iPads and cellphones to allow their children to get a head start on learning. Now, by the time children are of age to attend school, they are exceedingly prepared to incorporate technology in their education. With this being said, educational institutions must help students get ready to work in a society that encompasses an extensive amount of technology. According to Sean McCollum, ââ¬Å"a handful of school districtsâ⬠¦are adapting their use to serve the curriculum.â⬠Many schools are now using whiteboards, laptops, tablets, Smartphones and other devices in almost every classroom. Technology enhances learning, boosts confidence, and eliminates geographical limitations. Technology enriches learning by being able to come in different forms and do different things. "For lessons traditionally done with a paper and pencil, we now were able to do them in color, with animation, and with more depth and complexity"(McCollum). Teachers are now able to help stu... ...al interactions with each other. Works Cited Carr, Nicholas G. "IT Doesn't Matter." Harvard Business Review 81.5 (2003): 41-49. Business Source Complete. Web. 1 Apr. 2012. Levin, Barbara. "On-Demand Workforce-Communications Technologies Help Organizations Meet Critical Business Goals." Employment Relations Today (Wiley) 35.2 (2008): 43-50. Business Source Complete. Web. 25 Mar. 2012. McCollum, Sean. "Getting Past the 'Digital Divide'." Education Digest 77.2 (2011): 52. MasterFILE Complete. Web. 25 Mar. 2012. Social Interaction and Technology. n.d. Intelecom. Video. Web. 11 March 2012. Vanden Abeele, Mariek and Keith Roe "New Life, Old Friends: A Cross-Cultural Comparison of Communication Technology Use in Freshmen's Social Life." Conference Papers International Communication Association (2009): 1-36. Communication & Mass Media. Web. 25 Mar. 2012.
8 Key Element for a Business Model
E-commerce: business. technology. society. E-commerce E commerce Business. Technology. Society gy y Kennethà C. Laudon Copyright à © 2011 Pearson Education, Ltd. Chapter 5 Businessà Modelsà forà E? commerce Copyright à © 2007Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 1-2 E-commerce Business Models Businessà model d l Setà ofà plannedà activitiesà designedà toà resultà inà aà Set of planned activities designed to result in a profità inà aà marketplace Businessà plan Describesà aà firm sà businessà model Describes a firmââ¬â¢s business modelE commerceà businessà model E? commerce business model Uses/leveragesà uniqueà qualitiesà ofà Internetà andà Web W b Slide 2-3 8 Key Elements of Business Model 1. 2. 3. 4. 5. 6. 7. 8. Valueà proposition Revenueà model Marketà opportunity Market opportunity Competitiveà environment Competitiveà advantage Marketà strategy Market strategy Organizationalà De velopment Managementà team Slide 2-4 1. Value Proposition Whyà shouldà theà customerà buyà fromà you? h h ld h b f ? Successfulà e? ommerceà valueà S f l l propositions: Personalization/customization Reductionà ofà productà search,à priceà discoveryà costs Facilitationà ofà transactionsà byà managingà productà delivery Slide 2-5 2. Revenue Model Howà willà theà firmà earnà revenue,à generateà p profits,à andà produceà aà superiorà returnà onà p p investedà capital? Majorà types: Advertisingà revenueà model g Subscriptionà revenueà model Transactionà feeà revenueà model Transaction fee revenue model Salesà revenueà model Affiliateà revenueà model Slide 2-6 3. Market Opportunity Whatà marketspaceà doà youà intendà toà h k d d serveà andà whatà isà itsà size?Marketspace:à Areaà ofà actualà orà potentialà commercialà valueà inà whichà companyà intendsà toà operate in which company intends to operate Realisticà marketà opportunity:à Definedà byà revenueà potentialà inà eachà marketà nicheà inà whichà companyà hopesà toà potential in each market niche in which company hopes to compete Marketà opportunityà typicallyà dividedà intoà M k t t it t i ll di id d i t smallerà niches Slide 2-7 4. Competitive Environment Whoà elseà occupiesà yourà intendedà h l d d marketspace? p Otherà companiesà sellingà similarà productsà inà theà sameà marketspace Includesà bothà directà andà indirectà competitors Influencedà by: Influenced by:Numberà andà sizeà ofà activeà competitors Eachà competitor sà marketà share Each competitorââ¬â¢s market share Competitorsââ¬â¢Ã profitability Competitors pricing Competitorsââ¬â¢Ã pricing Slide 2-8 5. Competitive Advantage Achievedà whenà firm: h d h f Producesà superiorà pro ductà à or Produces superior product or Canà bringà productà toà marketà atà lowerà priceà thanà competitors th tit Importantà concepts: p p Asymmetries First? moverà advantage Fi t d t Unfairà competitiveà advantage Leverage Slide 2-9 6. Market Strategy Howà doà youà planà toà promoteà yourà productsà orà servicesà toà attractà yourà products or services to attract your targetà audience?Detailsà howà aà companyà intendsà toà enterà market andà attractà customers Bestà businessà conceptsà willà failà ifà notà properlyà marketedà toà potentialà customers k d i l Slide 2-10 7. Organizational Development Whatà typesà ofà organizationalà structuresà withinà theà firmà areà necessaryà toà carryà outà within the firm are necessary to carry out theà businessà plan? Describesà howà firmà willà organizeà work Typicallyà dividedà intoà functiona là departments Asà companyà grows,à hiringà movesà fromà generalistsà toà As company grows hiring moves from generalists to specialists Slide 2-11 8.Management Team Whatà kindsà ofà experiencesà andà backgroundà areà importantà forà theà background are important for the companyââ¬â¢sà leadersà toà have? Employeesà areà responsibleà forà makingà theà businessà modelà work Strongà managementà teamà givesà instantà credibilityà toà outsideà investors Strongà managementà teamà mayà notà beà ableà toà salvageà aà weakà businessà model,à butà shouldà beà ableà toà changeà theà modelà andà redefineà theà businessà asà ità becomesà necessary Slide 2-12 Insight on Business Online Grocers: Finding and Executing the Right Model g g Class Discussion Slide 2-13 Categorizing E-commerce Business ModelsNoà oneà correctà way Weà categorizeà businessà modelsà accordingà to: We categorize business models according to: E? commerceà sectorà (B2C,à B2B,à C2C) Typeà ofà e? commerceà technology;à i. e. m? commerce Type of e commerce technology; i e m commerce Similarà businessà modelsà appearà inà moreà thanà oneà sector Someà companiesà useà multipleà businessà Some companies use multiple business models;à e. g. eBay Slide 2-14 B2C Business Models: Portal Searchà plusà anà integratedà packageà ofà contentà andà services Revenueà models:à d l Advertising,à referralà fees,à transactionà fees,à subscriptions g p Variations:Horizontalà /à General Verticalà /à Specializedà (Vortal) Vertical / Specialized (Vortal) Pureà Search Slide 2-15 Insight on Technology Can Bing Bong Google? Class Discussion Slide 2-16 B2C Models: E-tailer Onlineà versionà ofà traditionalà retailer Revenueà model:à Sales Variations: Virtualà merchant Virtual merchant Bricks? and? clicks Catalogà merchant C t l h t Manufacturer? direct Lowà barriersà toà entry Slide 2-17 B2C Models: Content Provider Digitalà contentà onà theà Web News,à music,à video Revenueà models:à Revenue models: Subscription;à payà perà downloadà (micropayment);à advertising;à affiliateà referralà fees Variations:Contentà owners Syndication S di i Webà aggregators Slide 2-18 B2C Models: Transaction Broker Processà onlineà transactionsà forà consumers Primaryà valueà propositionââ¬âsavingà timeà andà money Revenueà model:à R d l Transactionà fees Industriesà usingà thisà model: Financialà services Travelà services Jobà placementà services Slide 2-19 B2C Models: Market Creator Createà digitalà environmentà whereà buyersà andà sellersà canà meetà andà transact Examples:à Priceline eBay y Revenueà model:à Transactionà fees Revenue model: Transaction fee s Slide 2-20 B2C Models: Service Provider Onlineà services e. g. Google:à Googleà Maps,à Gmail,à etc. Valueà propositionà Value propositionValuable,à convenient,à time? saving,à low? costà alternativesà toà traditionalà serviceà providers t diti l i id Revenueà models: Revenue models: Salesà ofà services,à subscriptionà fees,à advertising,à salesà ofà marketingà data marketing data Slide 2-21 B2C Models: Community Provider Provideà onlineà environmentà (socialà network)à whereà peopleà withà similarà interestsà canà transact,à shareà content,à andà , , communicateà E. g. Facebook,à MySpace,à LinkedIn,à Twitter Revenueà models: R d l Typicallyà hybrid,à combiningà advertising, subscriptions,à sales,à transactionà fees,à affiliateà fees Slide 2-22 B2B Business Models Netà marketplaces E? istributor E procurement E? procurement Exchange Industryà consortium Industry cons ortium Privateà industrialà network Private industrial network Singleà firm Industry? wide Industry wide Slide 2-23 B2B Models: E-distributor Versionà ofà retailà andà wholesaleà store,à , MROà goodsà andà indirectà goods Ownedà byà oneà companyà seekingà toà serveà manyà customers Revenueà model:à Salesà ofà goods Example:à Grainger. com Slide 2-24 B2B Models: E-procurement Createsà digitalà marketsà whereà participantsà transactà forà indirectà goods B2Bà serviceà providers,à applicationà serviceà providersà (ASPs) B2B service providers application service providers (ASPs)Revenueà model: Serviceà fees,à supply? chainà management,à fulfillmentà services Example:à Ariba Slide 2-25 B2B Models: Exchanges Independentlyà ownedà verticalà digitalà p y g marketplaceà forà directà inputs Revenueà model:à Transaction,à commissionà fees Revenue model Transaction commission fees C eate po e u co pet t o bet ee Createà powerfulà competitionà betweenà suppliers Tendà toà forceà suppliersà intoà powerfulà priceà T d f li i f l i competition;à numberà ofà exchangesà hasà droppedà dramatically d dd ll Slide 2-26 B2B Models: Industry Consortia Industry? wnedà verticalà digitalà marketplaceà openà toà selectà suppliers Moreà successfulà thanà exchanges More successful than exchanges Sponsoredà byà powerfulà industryà players Strengthenà traditionalà purchasingà behavior Revenueà model:à Transaction,à commissionà fees R d l T ti i i f Example:à Exostar Example: Exostar Slide 2-27 Private Industrial Networks Designedà toà coordinateà flowà ofà communicationà amongà firmsà engagedà inà businessà together fi di b i h Electronicà dataà interchangeà (EDI) Singleà firmà networks Mostà commonà formà M t f Example:à Wal? Martââ¬â¢sà network à forà suppliersIndustry? wideà networks Oftenà evolveà outà ofà industryà associationsà Often evolve out of industry associations Example:à Agentrics Slide 2-28 Other E-commerce Business Models Consumer? to? consumerà (C2C) eBay,à Craigslist Peer? to? peerà (P2P) Peer to peer (P2P) Theà Pirateà Bay,à Cloudmark M? commerce: Technologyà platformà continuesà toà evolve Technology platform continues to evolve iPhone,à smartphonesà energizingà interestà inà m? commerceà pp apps Slide 2-29 Insight on Society Where R U? Not Here! Class Discussion Slide 2-30 E-commerce Enablers: Gold Rush ModelE? commerceà infrastructureà companiesà p haveà profitedà theà most: Hardware,à software,à networking,à security E? commerceà softwareà systems,à paymentà systems Mediaà solutions,à performanceà enhancement CRMà software CRM software Databases Hostingà services,à etc. Slide 2-31 How Internet & Web Change Busi ness E? commerceà changesà industryà structureà g y byà changing: Basisà ofà competitionà amongà rivals Barriersà toà entry y Threatà ofà newà substituteà products Strengthà ofà suppliers Bargainingà powerà ofà buyers Bargaining power of buyers Slide 2-32 Industry Value ChainsSetà ofà activitiesà performedà byà suppliers,à manufacturers,à transporters,à distributors,à andà f di ib d retailersà thatà transformà rawà inputsà intoà finalà productsà andà servicesà Internetà reducesà costà ofà informationà andà Internet reduces cost of information and otherà transactionalà costs Leadsà toà greaterà operationalà efficiencies,à loweringà cost,à prices,à addingà valueà forà lowering cost prices adding value for customers Slide 2-33 E-commerce & Industry Value Chains Figureà 5. 4 Slide 2-34 Firm Value Chains Activitiesà thatà aà firmà engagesà inà toà create inalà productsà fromà rawà inputs Eachà stepà addsà value Effectà ofà Internet: Eff fI Increasesà operationalà efficiency p y Enablesà productà differentiation Enablesà preciseà coordinationà ofà stepsà inà chain E bl i di ti f t i h i Slide 2-35 E-commerce & Firm Value Chains Figureà 5. 5 Slide 2-36 Firm Value Webs Networkedà businessà ecosystemà Usesà Internetà technologyà toà coordinateà theà valueà chainsà ofà businessà partners l h i fb i Coordinatesà aà firmââ¬â¢sà suppliersà withà itsà ownà C di t fi ââ¬â¢ li ith it productionà needsà usingà anà Internet? basedà supplyà chainà managementà systemSlide 2-37 Internet-Enabled Value Web bl d l b Figureà 5. 6 Slide 2-38 Business Strategy Planà forà achievingà superiorà long? termà returnsà onà theà capitalà investedà inà aà businessà firmà business firm Fourà Genericà Strategies 1. Di fferentiationà 2. Cost 3. Scope 4. 4 Focus Slide 2-39 Chapter 6 E-commerce Marketing Copyright à © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 6-40 Netflix N fli Strengthens and Defends Its Brand Class Discussion Slide 6-41 Consumers Online: Internet Audience & Consumer Behavior Aroundà 70%à (82à million)à U. S. ouseholdsà haveà Around 70% (82 million) U S households have Internetà accessà inà 2010 Growthà rateà hasà slowed Intensityà andà scopeà ofà useà bothà increasing d f b h Someà demographicà groupsà haveà muchà higherà Some demographic groups have much higher percentagesà ofà onlineà usageà thanà othersà Gender,à age,à ethnicity,à communityà type,à income,à education Slide 6-42 Consumers Online: Internet Audience & Consumer Behavior Broadbandà audienceà vs. dial? upà audience Purchasingà behaviorà affectedà byà neighborhood Lifestyleà andà sociologicalà impa cts Useà ofà Internetà byà children,à teens Useà ofà Internetà asà substituteà forà otherà socialà activitiesMediaà choices Traditionalà mediaà competesà withà Internetà forà attention Traditional media competes with Internet for attention Slide 6-43 Consumer Behavior Models Studyà ofà consumerà behavior Socialà scienceà Attemptsà toà explainà whatà consumersà purchaseà Attempts to explain what consumers purchase andà where,à when,à howà muchà andà whyà theyà buy Consumerà behaviorà models Predictà wideà rangeà ofà consumerà decisions Predict wide range of consumer decisions Basedà onà backgroundà demographicà factorsà andà otherà intervening,à moreà immediateà variablesà h i i i di i bl Slide 6-44 General Model of Consumer Behavior Figureà 6. Slide 6-45 Background Demographic Factors Culture:à Broadestà impact Subcultureà (ethnicity,à age,à lifestyle,à geography) S b lt ( th i it lif t l h ) Social Referenceà groups Directà à referenceà groups g p Indirectà referenceà groups Opinionà leadersà (viralà influencers) Lifestyleà groupsà f l Psychological Psychologicalà profiles Slide 6-46 Online Purchasing Decision Psychographicà research Combinesà demographicà andà psychologicalà data Combines demographic and psychological data Dividesà marketà intoà groupsà basedà onà socialà class,à lifestyle,à and/orà personalityà characteristics and/or personality characteristicsFiveà stagesà inà theà consumerà decisionà process: 1. 2. 3. 4. 5. Awarenessà ofà need Searchà forà moreà information Evaluationà ofà alternatives Actualà purchaseà decision Actual purchase decision Post? purchaseà contactà withà firm Slide 6-47 Consumer D i i C Decision Process & P Supporting Communications Figureà 6. 3 Slide 6-48 Model of Online Consumer Behavior Decisionà processà similarà forà onlineà andà offlineà behavior Generalà onlineà behaviorà model Consumerà skills Productà characteristics Attitudesà towardà onlineà purchasing Perceptionsà aboutà controlà overà Webà environment p Webà siteà featuresClickstreamà behavior:à Transactionà logà forà Clickstream behavior: Transaction log for consumerà fromà searchà engineà toà purchase Slide 6-49 Model of Online Consumer Behavior Figureà 6. 4 Slide 6-50 Model of Online Consumer Behavior Clickstreamà factorsà include: Numberà ofà daysà sinceà lastà visit Number of days since last visit Speedà ofà clickstreamà behavior Numberà ofà productsà viewedà duringà lastà visit b f d i dd i l ii Numberà ofà pagesà viewed Supplyingà personalà information Numberà ofà daysà sinceà lastà purchase Numberà ofà pastà purchasesClickstreamà marketing Clickstream marketing Slide 6-51 Shoppers: B rowsers & Buyers Shoppers:à 87%à ofà Internetà users 72%à buyers 72% buyers 16%à browsersà (purchaseà offline) One? thirdà offlineà retailà purchasesà influencedà byà O thi d ffli t il h i fl db onlineà activities Onlineà trafficà alsoà influencedà byà offlineà brandsà andà shopping pp g E? commerceà andà traditionalà commerceà areà coupled: partà ofà aà continuumà ofà consumingà behavior part of a continuum of consuming behavior Slide 6-52 Online Shoppers & Buyers Figureà 6. 5 Slide 6-53What Consumers Shop & Buy Online Bigà ticketà itemsà ($500à plus) Travel,à computerà hardware,à consumerà electronics Expandingà Consumersà moreà confidentà inà purchasingà costlierà items Smallà ticketà itemsà ($100à orà less) ($ ) Apparel,à books,à officeà supplies,à software,à etc. Soldà byà firstà moversà onà Web Sold by first movers on Web Physicallyà smallà i tems Highà marginà itemsà Broadà selectionà ofà productsà available Slide 6-54 What Consumers Buy Online Figureà 6. 6 Slide 6-55 Intentional Acts: How Shoppers Find Vendors Online pp Searchà enginesà (59%) S h i (59%) Couponà Webà sitesà (29%) Coupon Web sites (29%) Comparisonà shoppingà sitesà (27%) E? ailà newslettersà (25%) Onlineà shoppersà areà highlyà intentional,à lookingà forà specificà products,à companies,à services Slide 6-56 Tableà 6. 6 Slide 6-57 Trust, Utility, Opportunism in Online Markets Twoà mostà importantà factorsà shapingà decisionà Two most important factors shaping decision toà purchaseà online: Utility:à U ili Betterà prices,à convenience,à speed Trust: Asymmetryà ofà informationà canà leadà toà opportunisticà behaviorà byà sellers Sellersà canà developà trustà byà buildingà strongà reputationsà forà honesty,à fairness,à deliveryà Slide 6-58 Basic Marketing Concepts MarketingStrategiesà andà actionsà toà establishà relationshipà Strategies and actions to establish relationship withà consumerà andà encourageà purchasesà ofà p productsà andà services Addressesà competitiveà situationà ofà industriesà andà firms Seeksà toà createà unique,à highlyà differentiatedà productsà orà servicesà thatà areà producedà orà suppliedà byà oneà trustedà firm Unmatchableà featureà set Avoidanceà ofà becomingà commodity Slide 6-59 Feature Sets Threeà levelsà ofà productà orà service 1. Coreà product e. g. cellà phone g p 2. Actualà product Characteristicsà thatà deliverà coreà benefits Ch t i ti th t d li b fit e. g. wideà screenà thatà connectsà toà Internet 3. Augmentedà productAdditionalà benefits Basisà forà buildingà theà productââ¬â¢sà brand e. g. productà warranty Slide 6-60 Featu re Set Figureà 6. 7 Slide 6-61 Products, Brands & Branding Process Brand: Expectationsà consumersà haveà whenà consuming,à orà thinkingà aboutà consuming,à aà specificà product Mostà importantà expectations:à Quality,à reliability,à Most important expectations: Quality reliability consistency,à trust,à affection,à loyalty,à reputation Branding:à Processà ofà brandà creation Branding: Process of brand creation Closedà loopà marketing Brandà strategy Brandà equity Brand eq it Slide 6-62 Marketing A ti iti M k ti Activities: From Products to Brands Figureà 6. 8Slide 6-63 STP: Segmenting, Targeting, Positioning Majorà waysà usedà toà segment,à targetà customers 1. 2. 3. 4. 5. 6. Behavioral B h i l Demographic Psychographic h hi Technical Contextual Search Withinà segment,à productà isà positioned andà brandedà asà aà unique,à high? valueà product,à especiallyà suitedà toà q g p p y ne edsà ofà segmentà customers Slide 6-64 Are Brands Rational? Forà consumers,à aà qualifiedà yes: Brandsà introduceà marketà efficiencyà byà reducingà searchà andà decision? makingà costs Forà businessà firms,à aà definiteà yes: Aà majorà sourceà ofà revenue Lowerà customerà acquisitionà cost Increasedà customerà retention Successfulà brandà constitutesà aà long? astingà (thoughà notà necessarilyà permanent)à unfairà competitiveà advantage Slide 6-65 Can Brands Survive Internet? Brands & Price Dispersion p Earlyà postulation:à Lawà ofà Oneà Price ;à endà ofà brands Early postulation: ââ¬Å"Law of One Priceâ⬠; end of brands Instead: Consumersà stillà payà premiumà pricesà forà differentiatedà products E? commerceà firmsà relyà heavilyà onà brandsà toà attractà customersà andà chargeà premiumà prices Substantialà priceà dispersion Largeà differencesà inà priceà sensitivityà forà sameà product Large differences in price sensitivity for same product ââ¬Å"Libraryà effectâ⬠Slide 6-66Revolution in Internet Marketing Technology Threeà broadà impacts: Scopeà ofà marketingà communicationsà broadenedà Richnessà ofà marketingà communicationsà increased g Informationà intensityà ofà marketplaceà expanded Internetà marketingà technologies: Internet marketing technologies: Webà transactionà logs Cookiesà andà Webà bugs Cookies and Web bugs Databases,à dataà warehouses,à dataà mining Advertisingà networks Customerà relationshipà managementà systems Slide 6-67 Web Transaction LogsBuiltà intoà Webà serverà software Recordà userà activityà atà Webà site y Webtrends:à Leadingà logà analysisà tool Providesà muchà marketingà data,à especiallyà à Provides much marketing data especially combinedà with: Registratio nà forms R i i f Shoppingà cartà database Answersà questionsà suchà as: Whatà areà majorà patternsà ofà interestà andà purchase? Afterà homeà page,à whereà doà usersà goà first? Second? Slide 6-68 Cookies & Web Bugs Cookies: Smallà textà fileà Webà sitesà placeà onà visitorââ¬â¢sà PCà everyà timeà theyà visit,à asà specificà pagesà areà accessed Provideà Webà marketersà withà veryà quickà meansà ofà identifyingà customerà andà understandingà priorà behavior Flashà cookiesWebà bugs: Tinyà (1à pixel)à graphicsà embeddedà inà e mailà andà Webà sites Tiny (1 pixel) graphics embedded in e? mail and Web sites Usedà toà automaticallyà transmità informationà aboutà userà andà page being viewed to monitoring server pageà beingà viewedà toà monitoringà server Slide 6-69 Insight on Society g y Every Move You Make, Every Click You Make, Weâ⠬â¢ll Be Tracking You , g Class Discussion Slide 6-70 Databases Database:à à Storesà recordsà andà attributes Databaseà managementà systemà (DBMS):à Softwareà usedà toà create,à maintain,à andà accessà databasesSQLà (Structuredà Queryà Language): Industry? standardà databaseà queryà andà manipulationà languageà usedà inà y q y p g g aà relationalà database Relationalà database: Representsà dataà asà two? dimensionalà tablesà withà recordsà organizedà inà rowsà andà attributesà inà columns;à dataà withinà differentà tablesà canà beà flexiblyà relatedà asà longà asà theà tablesà shareà aà commonà dataà element flexibly related as long as the tables share a common data element Slide 6-71 Relational Database View of E-commerce Customers Figureà 6. 12 Slide 6-72 Data Warehouses & Data Mining Dataà warehouse:Collectsà firm sà transactionalà andà custom erà dataà inà singleà Collects firmââ¬â¢s transactional and customer data in single locationà forà offlineà analysisà byà marketersà andà siteà managers Dataà mining: Analyticalà techniquesà toà findà patternsà inà data,à modelà Analytical techniques to find patterns in data model behaviorà ofà customers,à developà customerà profiles Query? drivenà dataà mining Query driven data mining Model? drivenà dataà mining Rule? basedà dataà mining l b dd Collaborativeà filtering Slide 6-73 Data Mining & Personalization Figureà 6. 13 Slide 6-74 Insight on TechnologyThe Long T il Big Hits and Big Misses Th L Tail: Bi Hi d Bi Mi Class Discussion Slide 6-75 Customer Relationship Management ( (CRM) Systems ) y Recordà allà contactà thatà customerà hasà withà firm Generatesà customerà profileà availableà toà everyoneà in firmà withà needà toà ââ¬Å"knowà theà customerâ⬠fi ith d t ââ¬Å"k th t â⬠Customer profiles can contain: ustomerà profilesà canà contain: Mapà ofà theà customerââ¬â¢sà relationshipà withà theà firm Productà andà usageà summaryà data Demographicà andà psychographicà data Profitabilityà measures Contactà historyà Contact history Marketingà andà salesà information Slide 6-76Customer Relationship Management System Figureà 6. 14 Slide 6-77 Market Entry Strategies Figureà 6. 15 Slide 6-78 Establishing Customer Relationship Advertisingà Networks Bannerà advertisements Adà serverà selectsà appropriateà bannerà adà basedà onà Ad server selects appropriate banner ad based on cookies,à Webà bugs,à backendà userà profileà databases Permissionà marketing Permission marketing Affiliateà marketing g Slide 6-79 How Advertising Network Works e. g. , DoubleClick Figureà 6. 16 Slide 6-80 Establishing Customer Relationship (contââ¬â¢d) Viralà marketingGett ingà customersà toà passà alongà companyââ¬â¢sà marketingà messageà toà friends,à family,à andà colleagues Blogà marketing Usingà blogsà toà marketà goodsà throughà commentaryà andà U i bl k d h h d advertising Socialà networkà marketing,à socialà shoppingà Mobileà marketing Mobile marketing Slide 6-81 Insight on Business Social Network Marketing: Letââ¬â¢s Buy Together Class Discussion Slide 6-82 Establishing Customer Relationship (contââ¬â¢d) Wisdomà ofà crowdsà (Surowiecki,à 2004) ( , ) Largeà aggregatesà produceà betterà estimatesà andà judgments Examples:à E l Predictionà markets Folksonomies Socialà tagging Social taggingBrandà leveraging Slide 6-83 Customer Retention: Strengthening Customer Relationship p Massà marketing Mass marketing Directà marketing Micromarketingà Micromarketing Personalized,à one? to? oneà marketingà à Segmentingà marketà onà preciseà a ndà timelyà understandingà ofà Segmenting market on precise and timely understanding of individualââ¬â¢sà needs Targetingà specificà marketingà messagesà toà theseà individuals Positioningà productà vis? a? visà competitorsà toà beà trulyà unique Personalization Canà increaseà consumersà senseà ofà control,à freedom Canà alsoà resultà inà unwantedà offersà orà reducedà anonymity Slide 6-84Mass Market-Personalization Continuum Figureà 6. 17 Slide 6-85 Other Customer Retention Marketing Technics Customization Customerà co? production Transactiveà content:à Combineà traditionalà contentà withà dynamicà informationà tailoredà toà eachà userââ¬â¢sà profile Customerà service FAQs Q Real? timeà customerà serviceà chatà systems Automatedà responseà systems Automated response systems Slide 6-86 Net Pricing Strategies Pricing Integralà partà ofà marketingà strategy I t l t f k ti t t Traditionallyà basedà on:à Fixedà costà Variableà costsà Demandà curve Priceà discrimination Price discriminationSellingà productsà toà differentà peopleà andà groupsà basedà onà willingnessà toà pay Slide 6-87 Net Pricing Strategies (contââ¬â¢d) Freeà andà freemium Canà beà usedà toà buildà marketà awareness Versioning Creatingà multipleà versionsà ofà productà andà sellingà essentiallyà sameà productà toà differentà marketà segmentsà atà differentà prices at different prices Bundling Offersà consumersà twoà orà moreà goodsà forà oneà price Off t d f i Dynamicà pricing: Auctions Yieldà management Slide 6-88 Channel Management Strategies Channels: Differentà methodsà byà whichà goodsà canà beà distributedà andà soldChannelà conflict: Whenà newà venueà forà sellingà productsà orà servicesà threatensà gp orà destroy sà existingà salesà venues E. g. onlineà airline/travelà servicesà andà à traditionalà offlineà travelà agencies Someà manufacturersà areà usingà partnershipà gp p modelà toà avoidà channelà conflictà Slide 6-89 Chapter 7: E-commerce Marketing Communications Chapter 7 E-commerce Advertising Copyright à © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 7-90 Video Ads: Shoot, Click, Buy Class Discussion Slide 7-91 Marketing Communications Twoà mainà purposes:Salesà ââ¬â promotionalà salesà communicationsà Brandingà ââ¬â b di B di brandingà communications i i Onlineà marketingà communications Online marketing communications Takesà manyà forms Onlineà ads,à e? mail,à publicà relations,à Webà sites Slide 7-92 Online Advertising li d i i $25à billion,à 15%à ofà allà advertising Advantages: Internetà isà whereà audienceà isà moving g Adà targeting Greaterà opp ortunitiesà forà interactivity Greater opportunities for interactivity Disadvantages: Costà versusà benefit Howà toà adequatelyà measureà results Supplyà ofà goodà venuesà toà displayà ads Slide 7-93 Online Advertising from 2002-2014 Figureà 7. Slide 7-94 Forms of Online Advertisements Displayà ads Richà media Videoà ads Searchà engineà advertising Socialà network,à blog,à andà gameà advertising Social network blog and game advertising Sponsorships Referralsà (affiliateà relationshipà marketing) E? mailà marketing g Onlineà catalogs Slide 7-95 Display Ads Bannerà ads Rectangularà boxà linkingà toà advertiserââ¬â¢sà Webà site IABà guidelines e. g. Fullà bannerà isà 468à xà 60à pixels,à 13K e g Full banner is 468 x 60 pixels 13K Pop? upà ads Appearà withoutà userà callingà forà them Provokeà negativeà consumerà sentiment g Twiceà asà effectiveà asà normalà bannerà ads Pop? nderà ads:à Openà beneathà browserà window Pop under ads: Open beneath browser window Slide 7-96 Rich Media Ads Useà Flash,à DHTML,à Java,à JavaScript Aboutà 7%à ofà allà onlineà advertisingà expenditures Tendà toà beà moreà aboutà branding d b b b di Boostà brandà awarenessà byà 10% Boost brand awareness by 10% IABà standardsà limità length Interstitials Superstitials Slide 7-97 Video Ads Fastestà growingà formà ofà onlineà advertisement IABà standards Linearà videoà ad Non? linearà videoà ad In? bannerà videoà ad In? textà videoà ad Ad placement Advertisingà networks Advertisingà exchanges Bannerà swappingSlide 7-98 Search Engine Advertising h i d i i Almostà 50%à ofà onlineà adà spendingà inà 2010 Types: Paidà inclusionà orà rank Paid inclusion or rank Inclusionà inà searchà results Sponsoredà linkà areas p Keywordà advertising e. g. Googleà AdWords e g Google AdWords Networkà keywordà advertisingà (contextà advertising) d ii ) e. g. Googleà AdSense Slide 7-99 Search Engine Advertising (contââ¬â¢d) Nearlyà idealà targetedà marketing Nearly ideal targeted marketing Issues:à Disclosureà ofà paidà inclusionà andà placementà practices Clickà fraudà Adà nonsenseà Slide 7-100 Mobile Advertising Halfà ofà U. S.Internetà usersà accessà Internetà Half of U. S. Internet users access Internet withà mobileà devices Currentlyà smallà market,à butà fastestà growingà platformà (35%) growing platform (35%) Googleà andà Appleà inà raceà toà developà Google and Apple in race to develop mobileà advertisingà platform AdMob,à iAd Slide 7-101 Sponsorships & Referrals Sponsorships Paidà effortà toà tieà advertiser sà nameà toà Paid effort to tie advertiserââ¬â¢s name to particularà information,à event,à venueà inà aà wayà thatà reinforcesà brandà inà positiveà yetà notà overtlyà that reinforces brand in positive yet not overtly commercialà manner ReferralsAffiliateà relationshipà marketing p g Permitsà firmà toà putà logoà orà bannerà adà onà anotherà firmââ¬â¢sà Webà siteà fromà whichà usersà ofà th fi ââ¬â¢ W b it f hi h f thatà siteà canà clickà throughà toà affiliateââ¬â¢sà site Slide 7-102 E-mail Marketing & Spam Explosion Directà e? mailà marketingà Lowà cost,à primaryà costà isà purchasingà addresses Spam:à Unsolicitedà commercialà e? mail Spam: Unsolicited commercial e mail Approx. 90%à ofà allà e? mail Effortsà toà controlà spam: Technologyà (filteringà software)à Governmentà regulationà (CAN? SPAMà andà stateà laws) Voluntaryà self? regulationà byà industriesà (DMAà ) y g y Volunteerà efforts Slide 7-103Percentage of E-mail That Is Spam Figure 7. 6 Slide 7-104 Online Catalogs Equivalentà ofà paper? basedà catalogs Graphics? intense;à useà increasingà withà increaseà inà broadbandà use in broadband use Twoà types: 1. 2. 2 Full? pageà spreads,à e. g. Landsend. com Gridà displays,à e. g. Amazon Grid displays e g Amazon Inà general,à onlineà andà offlineà catalogsà complementà eachà other Slide 7-105 Social Marketing ââ¬Å"Many? to? manyâ⬠à model Usesà digitallyà enabledà networksà toà spreadà ads Blogà advertisingà Blog advertising Onlineà adsà relatedà toà contentà ofà blogs Socialà networkà advertising:à Social network advertising:Adsà onà MySpace,à Facebook,à YouTube,à etc. Gameà advertising:à G d ti i Downloadableà ââ¬Å"advergamesâ⬠Placingà brand? nameà productsà withinà games Slide 7-106 Insight on Society g y Marketing to Children of the Web in the Age of Social Networks g Class Discussion Slide 7-107 Behavioral Targeting Interest? basedà advertising Dataà aggregatorsà developà profiles Data aggregators develop profiles Searchà engineà queries Onlineà browsingà history O li b i hi Offlineà dataà (income,à education,à etc. ) d Informationà soldà toà 3rd partyà advertisers,à whoà deliverà adsà basedà onà profile Adà exchanges Privacyà concerns acy co ce s Consumerà resistance Slide 7-108Mixing Off-line & Online Marketing Communications g Mostà successfulà marketingà campaignsà M t f l k ti i incorporateà bothà onlineà andà offlineà tactics Offlineà marketing Driveà trafficà toà Webà sites Drive traffic to Web sites Increaseà awarenessà andà buildà brandà equity Consumerà behaviorà increasinglyà multi? channel 60%à consumersà researchà onlineà beforeà buyingà offline % y g Slide 7-109 Insight on Business g Are the Very Rich Different From You and Me? Class Discussion Sl ide 7-110 Online Marketing Metrics: Lexicon Measuringà audienceà sizeà orà marketà share Impressions I i Click? throughà rateà (CTR) View? hroughà rateà (VTR) Vi th h t (VTR) Hits Pageà views P i Stickinessà (duration) Uniqueà visitors Loyalty Reach Recency Slide 7-111 Online Marketing Metrics (contââ¬â¢d) Conversionà ofà visitorà Conversion of visitor toà customer Acquisitionà rate q Conversionà rate Browse? to? buy? ratio View? to? cartà ratio Vi t t ti Cartà conversionà rate Checkoutà conversionà rateà Checkout conversion rate Abandonmentà rate Retentionà rate Attritionà rate E mailà metrics E? mail metrics Openà rate Deliveryà rate Delivery rate Click? throughà rateà (e mail) (e? mail) Bounce? backà rate Slide 7-112 Online Consumer Purchasing ModelFigureà 7. 8 Slide 7-113 How Well Does Online Adv. Work? Ultimatelyà measuredà byà ROIà onà adà campaign Highestà click? throughà rates:à Searc hà engineà ads,à Permissionà e mailà campaigns Permission e? mail campaigns Richà media,à videoà interactionà ratesà high Onlineà channelsà compareà favorablyà withà traditional Mostà powerfulà marketingà campaignsà useà multipleà Most powerful marketing campaigns use multiple channels,à includingà online,à catalog,à TV,à radio,à newspapers,à stores newspapers, stores Slide 7-114 Comparative Returns on Investment Figureà 7. 9 Slide 7-115 Costs of Online Advertising Pricingà modelsBarter Costà perà thousandà (CPM) Costà perà clickà (CPC)à Costà perà actionà (CPA)à Cost per action (CPA) Onlineà revenuesà only Salesà canà beà directlyà correlated Sales can be directly correlated Bothà à online/offlineà revenues Offlineà purchasesà cannotà alwaysà beà directlyà relatedà toà onlineà Offli h t l b di tl l t dt li campaign Inà general,à onlineà marketingà more à expensiveà onà CPMà In general online marketing more expensive on CPM basis,à butà moreà effective Slide 7-116 Web Site Activity Analysis b i i i l i Figureà 7. 10 Slide 7-117 Insight on Technology Itââ¬â¢s 10 P. M. Do You Know Who Is On Your Web Site? Class Discussion Slide 7-118Web Site â⬠¦ as Marketing Communications Tool g Webà siteà asà extendedà onlineà advertisement W b i d d li d i Domainà name:à Anà importantà roleà Domain name: An important role Searchà engineà optimization:à Search engine optimization: Searchà enginesà registration Keywordsà inà Webà siteà description K d i W b it d i ti Metatagà andà pageà titleà keywords Linksà toà otherà sites k h Slide 7-119 Web Site Functionality b i i li Mainà factorsà inà effectivenessà ofà interface Utility Easeà ofà use Topà factorsà inà credibilityà ofà Webà sites: Top factors in credibility of Web sites: Designà look Info rmationà design/structure g / Informationà focusOrganizationà isà importantà forà first timeà users,à butà Organization is important for first? time users but declinesà inà importance Information content becomes major factor attracting Informationà contentà becomesà majorà factorà attractingà furtherà visits Slide 7-120 Factors in Credibility of Web Sites Figureà 7. 11 Slide 7-121 Tableà 7. 9 Slide 7-122 Chapter 8: Ethical, Social, and Political Issues in E-commerce E commerce Chapter 8 Ethics, Law, E-commerce Copyright à © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 8-123 Ethical, Social, Political Issues in E-commerceInternet,à likeà otherà technologies,à can: Internet like other technologies can: Enableà newà crimes Affectà environment Threatenà socialà values Costsà andà benefitsà mustà beà carefullyà considered,à especiallyà whenà thereà areà noà id d i ll h h g g clear? c utà legalà orà culturalà guidelines Slide 8-124 Model for Organizing Issues Issuesà raisedà byà Internetà andà e? commerceà canà beà viewedà atà individual,à social,à andà politicalà levels social and political levels Fourà majorà categoriesà ofà issues: Four major categories of issues: Informationà rights Propertyà rights Property rights Governance Publicà safetyà andà welfare Slide 8-125Moral Dimensions of Internet Society M l Di i f I S i Figureà 8. 1 Slide 8-126 Basic Ethical Concepts i hi l Ethics Studyà ofà principlesà usedà toà determineà rightà andà wrongà coursesà ofà action Responsibility p y Accountability Liability Lawsà permittingà individualsà toà recoverà damages Dueà process Lawsà areà known,à understood Laws are known understood Abilityà toà appealà toà higherà authoritiesà toà ensureà lawsà appliedà correctly Slide 8-127 Analyzing Ethical Dilemmas l i hi l il Processà forà analyzingà ethicalà dilemmas: 1. 2. 3. 3 4. 5. Identifyà andà clearlyà describeà theà facts Defineà theà conflictà orà dilemmaà andà identifyà theà y higher? rderà valuesà involved Identifyà theà stakeholders Identify the stakeholders Identifyà theà optionsà thatà youà canà reasonablyà take t k Identifyà theà potentialà consequencesà ofà yourà options Slide 8-128 Candidate Ethical Principles Goldenà Rule Universalism Slipperyà Slope Collectiveà Utilitarianà Principle Riskà Aversion Ri k A i Noà Freeà Lunch Theà Newà Yorkà Timesà Test Theà Socialà Contractà Rule Slide 8-129 Privacy & Information Rights Privacy: Moralà rightà ofà individualsà toà beà leftà alone,à freeà fromà surveillanceà orà interferenceà fromà otherà individualsà orà organizations Informationà privacy p y Subsetà ofà privacy Includes:Theà claimà th atà certainà informationà shouldà notà beà collectedà atà all Theà claimà ofà individualsà toà controlà theà useà ofà whateverà h l i f i di id l l h f h informationà isà collectedà aboutà them Slide 8-130 Privacy & Information Rights (cont. ) Majorà ethicalà issueà relatedà toà e? commerceà andà privacy:à d i Underà whatà conditionsà shouldà weà invadeà theà privacyà ofà others? Majorà socialà issue:à j Developmentà ofà ââ¬Å"expectationsà ofà privacyâ⬠à andà privacyà norms privacy norms Majorà politicalà issue: Developmentà ofà statutesà thatà governà relationsà D l t f t t t th t l ti betweenà recordkeepersà andà individuals Slide 8-131 Information Collected at E-commerce SitesDataà collectedà includes Personallyà identifiableà informationà (PII) Anonymousà information Anonymous information Typesà ofà dataà collected yp Name,à a ddress,à phone,à e? mail,à socialà security Bankà andà credità accounts,à gender,à age,à occupation,à B k d di d i education Preferenceà data,à transactionà data,à clickstreamà data,à browserà type Slide 8-132 Social Networks & Privacy Socialà networks Encourageà sharingà personalà details Poseà uniqueà challengeà toà maintainingà privacy Facebook sà Beaconà program Facebookââ¬â¢s Beacon program Facebook sà Termsà ofà Serviceà change Facebookââ¬â¢s Terms of Service change Slide 8-133 Profiling & Behavioral Targeting ProfilingCreationà ofà digitalà imagesà thatà characterizeà onlineà individualà andà groupà behavior Anonymousà profiles A fil Personalà profiles Personal profiles Advertisingà networks Trackà consumerà andà browsingà behaviorà onà Web T k db i b h i W b Dynamicallyà adjustà whatà userà seesà onà screen Buildà andà refreshà profilesà ofà consumers Googleââ¬â¢s AdWords program Slide 8-134 Profiling & Behavioral Targeting (contââ¬â¢d) Deepà packetà inspection Businessà perspective: Webà profilingà servesà consumersà andà businesses Increasesà effectivenessà ofà advertising,à subsidizingà freeà content Enablesà sensingà ofà demandà forà newà productsà andà services Criticsà perspective:Underminesà expectationà ofà anonymityà andà privacy Consumersà showà significantà oppositionà toà unregulatedà collectionà ofà personalà information Enablesà weblining Slide 8-135 Internet & Government Invasions of Privacy Variousà lawsà strengthenà abilityà ofà lawà enforcementà agenciesà toà monitorà Internetà usersà withoutà i i I ih knowledgeà andà sometimesà withoutà judicialà oversight CALEA,à PATRIOTà Act,à Cyberà Securityà Enhancementà Act,à Homelandà Securityà Act Governmentà agenciesà areà largestà usersà ofà privateà sectorà commercialà dataà brokers sector commercial data brokers Retentionà byà ISPsà ofà userà dataà aà concern Slide 8-136Legal Protections Inà U. S. ,à privacyà rightsà explicitlyà grantedà orà derivedà from Constitutionà Constitution Firstà Amendmentà à ââ¬â freedomà ofà speechà andà association Fourthà Amendmentà à ââ¬â unreasonableà searchà andà seizure F th A d t bl h d i Fourteenthà Amendmentà à ââ¬â dueà process Specificà statutesà andà regulationsà (federalà andà Specific statutes and regulations (federal and state) Commonà law Slide 8-137 Informed Consent U. S. firmsà canà gatherà andà redistributeà transactionà informationà withoutà individualââ¬â¢sà i i f i ih i di id lââ¬â¢ informedà consent Illegalà inà Europe Informedà consent: Opt? inà Opt out Opt? out Manyà U. S. ? commerceà firm sà merelyà publishà informationà p practicesà asà partà ofà privacyà policyà withoutà providingà forà p p yp y p g anyà formà ofà informedà consent Slide 8-138 FTCââ¬â¢s Fair Information Practices Principles Federalà Tradeà Commission: Federal Trade Commission: Conductsà researchà andà recommendsà legislationà toà Congress Fairà Informationà Practiceà Principlesà (1998): Fair Information Practice Principles (1998): Notice/Awarenessà (Core) Choice/Consentà (Core) Choice/Consent (Core) Access/Participation Security Enforcement Guidelines,à notà laws Guidelines not laws Slide 8-139 FTCââ¬â¢s Fair Information Practice PrinciplesNotice/Awareness i / Sitesà mustà discloseà informationà practicesà beforeà collectingà data. Includes Sit t di l i f ti ti b f ll ti d t I l d identificationà ofà collector,à usesà ofà data,à otherà recipientsà ofà data,à natureà ofà collectionà (ac tive/inactive),à voluntaryà orà required,à consequencesà ofà refusal,à andà stepsà takenà toà protectà confidentiality,à integrity,à andà qualityà ofà theà data Choice/Consent Thereà mustà beà aà choiceà regimeà inà placeà allowingà consumersà toà chooseà howà theirà informationà willà beà usedà forà secondaryà purposesà otherà thanà supportingà theà transaction,à includingà internalà useà andà transferà toà thirdà parties.Opt? in/Opt? outà mustà beà available. Consumersà shouldà beà ableà toà reviewà andà contestà theà accuracyà andà completenessà ofà dataà collectedà aboutà themà inà aà timely,à inexpensiveà process. Access/Participation ccess/ a c pa o Security y Enforcement Dataà collectorsà mustà takeà reasonableà stepsà toà assureà thatà consumerà informationà isà accurateà andà secureà fromà unauthorizedà use. Thereà mustà beà inà placeà aà mechanismà toà enforceà FIP principles. Thisà canà involveà self? regulation,à legislationà givingà consumersà legalà remediesà forà violations,à orà federalà statutesà andà regulation. di f i l ti f d l t t t d l ti Slide 8-140FTC Recommendations: Online Profiling Principle p Notice Recommendation Completeà transparencyà toà userà byà providingà disclosureà andà choiceà optionsà onà theà hostà Webà site. ââ¬Å"Robustâ⬠à noticeà forà PIIà (time/placeà ofà collection;à beforeà collectionà begins). Clearà andà conspicuousà noticeà forà non PII. beforeà collectionà begins). Clearà andà conspicuousà noticeà forà non? PII. Opt? inà forà PII,à opt? outà forà non? PII. Noà conversionà ofà non? PIIà toà PIIà withoutà consent. Opt? outà fromà anyà orà allà networkà advertisersà fromà aà singleà pageà consent Opt out from any or all network advertisers from a single page providedà byà theà hostà Webà site.Reasonableà provisionsà toà allowà inspectionà andà correction. Reasonableà effortsà toà secureà informationà fromà loss,à misuse,à orà improperà access. Doneà byà independentà thirdà parties,à suchà asà sealà programsà andà accountingà Done by independent third parties such as seal programs and accounting firms. medicalà topics,à sexualà behaviorà orà sexualà orientation,à orà useà Socialà Securityà medical topics sexual behavior or sexual orientation or use Social Security numbersà forà profiling. Slide 8-141 Choice Access Security EnforcementRestrictedà Collection Advertisingà networksà willà notà collectà informationà aboutà sensitiveà financialà or European Data Protection Directive Privacyà protectionà muchà strongerà inà Europeà thanà U. S. Europeanà approach:à Comprehensiveà andà regulatoryà inà nature p g y Europeanà Commissionââ¬â¢sà Directiveà onà Dataà Protectionà (1998):à (1998): Standardizesà andà broadensà privacyà protectionà inà Europeanà Unionà countries Departmentà ofà Commerceà safeà harborà program: Forà U. S. firmsà thatà wishà toà complyà withà Directive Slide 8-142 Private Industry Self-RegulationSafeà harborà programs: Privateà policyà mechanismà toà meetà objectivesà ofà Pi t li h i t t bj ti f governmentà regulationsà withoutà governmentà involvement e. g. Privacyà sealà programs e g Privacy seal programs Industryà associationsà include: Onlineà Privacyà Allianceà (OPA) Networkà Advertisingà Initiativeà (NAI) CLEARà Adà Noticeà Technicalà Specifications Privacyà advocacyà groups Emergingà privacyà protectionà business Slide 8-143 Insight on Business Chief Privacy Officers hi f i ffi Class Discussion Slide 8-144 Technological Solutions Spyware,à pop? pà blockers Cookieà managers k Anonymousà remailers,à surfing Anonymous remailers surfing Platformà forà Privacyà Preferencesà (P3P):à Comprehensiveà technologicalà privacyà protectionà standard Worksà throughà user sà Webà browser Works through userââ¬â¢s Web browser Communicatesà aà Webà siteââ¬â¢sà privacyà policy Comparesà siteà policyà toà userââ¬â¢sà preferencesà orà toà otherà standardsà suchà asà FTCââ¬â¢sà FIPà guidelinesà orà EUââ¬â¢sà Dataà Protectionà Directive Slide 8-145 How P3P Works k Figureà 8. 2(A) Slide 8-146 Insight on Technology The Privacy T Th P i Tug of War: fW Advertisers Vs. Consumers Class Discussion Slide 8-147 Intellectual Property Rights Intellectualà property:Encompassesà allà tangibleà andà intangibleà productsà ofà human à mind Majorà ethicalà issue: j Howà shouldà weà treatà propertyà thatà belongsà toà others? Majorà socialà issue: Major social issue: Isà thereà continuedà valueà inà protectingà intellectualà propertyà inà theà Internetà age? Majorà politicalà issue: Howà canà Internetà andà e? commerceà beà regulatedà orà governedà toà g g protectà intellectualà property? Slide 8-148 Intellectual Property Protection Threeà mainà typesà ofà protection: Copyright Patent Trademarkà law Trademark law Goalà ofà intellectualà propertyà law: Balanceà twoà competingà interestsà ââ¬â publicà andà B l t ti i t t bli d privateMaintainingà thisà balanceà ofà interestsà isà alwaysà M i t i i thi b l fi t t i l challengedà byà theà inventionà ofà newà technologies Slide 8-149 Copyright Protectsà originalà formsà ofà expressionà (butà notà ideas)à fromà beingà copiedà byà othersà forà aà à ideas) from being copied by others for a periodà ofà time Lookà andà feelà copyrightà infringementà lawsuits Fairà useà doctrine Fair use doctrine Digitalà Millenniumà Copyrightà Act,à 1998 Firstà majorà effortà toà adjustà copyrightà lawsà toà Internetà age Implementsà WIPOà treatyà thatà makesà ità illegalà toà make,à distribute,à orà useà devicesà thatà circumventà technology? asedà protectionsà ofà copyrightedà materials Slide 8-150 Patents Grantà ownerà 20? yearà monopolyà onà ideasà behindà anà invention Machines Man? madeà products p Compositionsà ofà matter Processingà methods Inventionà mustà beà new,à non? obvious,à novel Encouragesà inventors g Promotesà disseminationà ofà newà techniquesà throughà licensing Stiflesà competitionà byà raisingà barriersà toà entry Slide 8-151 E-co mmerce Patents 1998à Stateà Streetà Bankà &à Trustà v. Signatureà Financialà Group Businessà methodà patents Ledà toà explosionà inà applicationà forà e? commerceà ââ¬Å"businessà L dt l i i li ti f ââ¬Å"b i methodsâ⬠à patentsMostà Europeanà patentà lawsà doà notà recognizeà M tE t tl d t i businessà methodsà unlessà basedà onà technology Examples Amazonââ¬â¢sà One? clickà purchasing DoubleClickââ¬â¢sà dynamicà deliveryà ofà onlineà advertising Slide 8-152 Trademarks d k Identify,à distinguishà goodsà andà indicateà theirà source Purpose p Ensureà à consumerà getsà whatà isà paidà for/expectedà toà receive Protectà ownerà againstà piracyà andà misappropriation Infringement Marketà confusion Badà faith Dilution Behaviorà thatà weakensà connectionà betweenà trademarkà andà product Slide 8-153 Trademarks & Internet CybersquattingAnticy bersquattingà Consumerà Protectionà Actà (ACPA) Cyberpiracy Typosquatting Metatagging M i Keywording y g Deepà linking Framing Slide 8-154 Governance Primaryà questions Whoà willà controlà Internetà andà e? commerce? Whatà elementsà willà beà controlledà andà how? What elements will be controlled and how? Stagesà ofà governanceà andà e? commerce g g Governmentà Controlà Periodà (1970ââ¬â1994) Privatizationà (1995ââ¬â1998) Privatization (1995 1998) Self? Regulationà (1995ââ¬âpresent) Governmentà Regulationà (1998ââ¬âpresent) Slide 8-155 Who Governs E-commerce & Internet? Mixedà modeà environmentSelf? regulation,à throughà varietyà ofà Internetà policyà andà technicalà bodies,à co existsà withà limitedà and technical bodies co? exists with limited governmentà regulation ICANNà :à Domainà Nameà System Internetà couldà beà easilyà controlled,à I t t ld b il t ll d m onitored,à andà regulatedà fromà aà centralà location Slide 8-156 Taxation E? commerceà taxationà illustratesà complexityà ofà governanceà andà jurisdictionà issues governance and jurisdiction issues U. S. salesà taxedà byà statesà andà localà government MOTOà retailing E? commerceà benefitsà fromà taxà ââ¬Å"subsidyâ⬠yOctoberà 2007:à Congressà extendsà taxà moratoriumà forà anà additionalà sevenà years an additional seven years Unlikelyà thatà comprehensive,à integratedà rationalà approachà toà taxationà issueà willà beà determinedà forà approach to taxation issue will be determined for someà timeà toà come Slide 8-157 Net Neutrality Currently,à allà Internetà trafficà treatedà equallyà ââ¬â allà activitiesà chargedà theà sameà rate,à noà ll i i i h d h preferentialà assignmentà ofà bandwidth Backboneà providersà wouldà likeà toà chargeà differentiatedà pricesà andà rationà bandwidth 2010,à U. S. ppealsà courtà ruledà thatà FCCà hadà noà authorityà toà regulateà Internetà providers Slide 8-158 Public Safety & Welfare Protectionà ofà childrenà andà strongà g sentimentsà againstà pornography Passingà legislationà thatà willà surviveà courtà P i l i l ti th t ill i t challengesà hasà provedà difficult Effortsà toà controlà gamblingà andà restrictà salesà ofà drugsà andà cigarettes sales of drugs and cigarettes Currentlyà mostlyà regulatedà byà stateà law Unlawfulà Internetà Gamblingà Enforcementà Act Slide 8-159 Insight on Society Internet Drug Bazaar Class Discussion Slide 8-160
Subscribe to:
Posts (Atom)