Wednesday, October 30, 2019

Health and Science Essay Example | Topics and Well Written Essays - 6500 words

Health and Science - Essay Example of defense mechanism the person tries to repress any such undesirable feeling or thought or memory which causes any kind of mental turmoil to the person or which he wished not to have occurred ever. In this situation the person just wants to cut that portion of life away or just forget the situation. Hysterical amnesia is an example of this mechanism where a person performs or observes certain disturbing incident and then just forgets the incident and its surroundings. Repression is used in negative way when the person indulges in any harmful act and then forgets it. For example the person hurts or kills others at a certain state of mind or when finds others at a certain situation and then as soon as s/he is taken away from the situation or that particular state of mind s/he completely forgets the incident. Reaction formation is the kind of defense mechanism related to the fixation in consciousness of an idea or desire which is opposite to any unconscious fear. In this situation the person experiencing any conflict becomes obsessive with the situation either in positive or in negative manner. The person unconsciously tries to prove that s/he has completely accepted the situation which is opposite to her/his desire and in doing so s/he becomes over protective or solicitous to the situation. This may be expression of her/his internal guilt of not accepting the condition, e.g. an overprotective mother for her unwanted child. The negative reaction can be seen when this obsession affects the life of the child or others in a dangerous manner. Here the mother interferes too much in the life of the child and even hurts the child or anybody else who is trying to behave opposite to her obsession or notion. When a mother hurts the boyfriend of a girl child in order to keep him away from her daugh ter, it can serve as a negative reaction. Denial is the situation when a person consciously refuses to accept any painful incident. In this case the person tries to escape any

Monday, October 28, 2019

Confucius and Plato Essay Example for Free

Confucius and Plato Essay Editor Ken Wolf, at the beginning of the essay Confucius and Plato: A Few Really Good People, poses the question: â€Å"What is the best way to create a strong society? † (Wolf 25) It was surprising to a novice student of philosophy how similar the ideas of the ancient Chinese sage Confucius and famous Greek philosopher Plato were. Although, Confucius and Plato both made major contributions to the development of society, they showed both similarities and differences in these three subjects: ruling class, education, and faith in humanity. Confucius and Plato both believed virtue and intelligence were key components to creating a strong society. Confucius thought anyone who has been educated had the capability to develop into a ruler. Whereas Plato assumed anyone could be educated, but only a few, those in the ruling class had the ability to reason and thus were qualified to rule. In addition, Plato gave credence to the idea of being born into the ruling class, that the quality to reason was an inherited quality. Confucius and Plato were both strong believers that order was another main factor in a strong society. Although they both had laws to maintain the order, Plato had less faith in people in general to behave in a civilized manner. Both Confucius and Plato were in favor of education and were teachers themselves. Confucius’s followers were the ones who wrote the Analects, which talked about how civilization depends on â€Å"humanity† and â€Å"propriety†. Plato actually wrote The Republic which talked about his ideal â€Å"philosopher-king†. Plato established the Academy, which taught principles of ethics and government, for 900 years. Confucius attempted to teach the ruler to become a better person, but failed. The concepts put forth by Confucius and Plato begin to differ more when faith in humanity comes into play. Confucius and Plato both wanted to think there was good in everyone, but Confucius believed more in a â€Å"†¦society in which human relationships—especially those within the family—were more important than laws. † (Wolf 27) Plato concluded that the people needed to be controlled for there to be order. That control was maintained through the law. They both sought out peace and harmony, although Confucius focused more on the behavior of individuals and Plato was interested in universal truth even though it probably would not be accepted,. Plato felt that if a person tried to bring enlightenment to the masses â€Å"†¦they would probably try to kill to him for telling such tall tales, disrupting their lives and challenging their accustomed beliefs. † (Wolf 31) Even today, most people would agree with Confucius and Plato about the importance of educating people in the development of a strong society. The idea of relationships as the basis of society may be summed up in: â€Å"Do unto others as you would have them do unto you. † This Golden Rule seems to be as important to Western society as it was to Chinese society. However, the idea of a better quality of citizen that is better suited to lead society smacks of elitism and would definitely not be accepted in modern democracies. However, that does not mean that the elite educated class from Harvard and Yale has not been overrepresented in American leadership. So perhaps we have a ruling elite, but not as overt as Plato would like. A final thought from the essay would be: a harmonious and orderly existence is important to all societies.

Saturday, October 26, 2019

What is Intelligence? Essay -- Biology Essays Research Papers

What is Intelligence? Intelligence can be defined in many different ways since there are a variety of individual differences. Intelligence to me is the ability to reason and respond quickly yet accurately in all aspects of life, such as physically, emotionally, and mentally. Anyone can define intelligence because it is an open-ended word that has much room for interpretation. Thus my paper is an attempt to find the meaning of human intelligence. There are a couple of scientists who have tried to come up with theories of what makes a human being intelligent. Jean Piaget, a Swiss child psychologist, is well known for his four stages of mental growth theory (1). In the sensorimotor stage, from birth to age 2, the child is concerned with gaining motor control and getting familiar with physical objects. Then from age 2 to 7, the child develops verbal skills, which is called the preoperational stage. In the concrete operational stage the child deals with abstract thinking from age 7 to 12. The final stage called the formal operational stage ends at age 15 and this is when the child learns to reason logically and systematically. (1) Piaget's theory provides a basis for human intelligence by categorizing the major stages in child development and how they contribute to intelligence. Each of these invariant stages has major cognitive skills that must be learned. Knowledge is not merely transmitted verbally but must be constructed and reconstructed by the learner (3). Thus this development involves a few basic steps. The first fundamental process of intellectual growth is the ability to assimilate the new events learned into the preexisting cognitive structures. The second fundamental process is the capability to change those ... ...ists approach in defining human intelligence. I believe that intelligence is the ability to utilize our entire brain, which will most definitely include Gardner's theory but more. Since we only use a small percentage of our brain, I imagine our brains have a lot more forms of intelligence than the ones Gardner proposes as well as more stages of child development than the ones Piaget proposes. As I mentioned before, intelligence is an open-ended word that may never have an agreed upon definition, but we all have our own definition. References: 1)Jean Piaget, Swiss Child Psychologist http://www.indiana.edu/%7Eintell/piaget.shtml 2)The Seven Human Intelligences http://www.homeschoolzone.com/hsz/leppert2.htm 3)Jean Piaget: Intellectual Development http://www.sk.com.br/sk-piage.html 4)Seven Intelligences http://www.ibiblio.org/edweb/edref.mi.th4.html

Thursday, October 24, 2019

The History of Ku Klux Klan :: essays research papers

It has been heard and talked about throughout history, that there was never such a thing as "The" Ku Klux Klan. There is traceable evidence of different movements and organizations that have used this name. The history of the K.K.K. corresponds with the history of race relations from our country. The Klan can be divided into five different eras: The Reconstruction, The End of the War (& Pulaski Six), The Klan Mobilization, The Reign of Terror, and The End of the First Era. Each stage was brought out by economic and social changes. Each stage also is at the same point in time as an escalation in racial standings. As it was started in 1865, the Ku Klux Klan has sent a sense of terror through people’s minds. A group of six white Southerners was the start of this organization. The history of violence of the K.K.K. is a result of the hatred and anger from the end of the Civil War. The reason for this hatred was because blacks had won their struggle for freedom of slavery. They fought to deny the civil rights for African Americans. They wanted the blacks to be forced into slavery once again. The K.K.K. tore apart reconstructing governments and established a reign of terror and violence throughout the whole war-torn South. The first era of the K.K.K. lasted about three or four years, than faded. The arose again after World War 1. The overall story starts with many generations of Americans learning hard lessons of life. These experiences led to fierce individualism, surprising inventiveness, and the thought that they could be whatever and go wherever they wanted to. Other things occurred alon g with these thoughts. "Frontier Justice" was an instant, private and violent method of settling differences without law officials. This was a large component to the motivation of the Ku Klux Klan. To some whites the freedom of slaves meant that their social and economic ways of life had been defeated. For some white Southerners, this was a nightmare that came true. The number of slaves living around the whites were seen as threats. Night patrols were a result of bloody slave revolts. These patrols consisted of white men that were empowered and authorized by law to look enforce a curfew for slaves, look for runaways and guard rural areas. This was done to prevent any black rebellions. These patrollers were given the right to whip any violators they caught.

Wednesday, October 23, 2019

The Refractive Index

The refractive index Aim: The aim of this experiment is to find the refractive index of a glass prism. In this experiment, the independent variable is the angle of incidence, and the dependent variable is the angle of refraction. Theory: Snell’s law relates the angle of incidence and refraction to the ratio of the velocity of the wave in the different media. The formula for Snell’s law is the following: Sin isinr = v1v2 = n Where i is the angle of incidence, r is the angle of refraction and v1 and v2 are the velocities of the wave in different media and n is the refractive index.Light refracts when it passes from one medium to another. The ratio of the velocity of light in the two media is called the refractive index. Materials and method: For this experiment we used a half glass circle attached on the center of a laminated paper with a drawn circle around it, a blue/violet laser with a wavelength 447nm and a wood block. First we started by placing the flat side of the half glass circle attached to the paper in front of the laser. Depending on the angle we wanted to find, we used the drawn circle on the paper to decide where to put the laser on the half side of the drawn circle.The angles of incidence we used were 10 °, 20 °, 30 °, 40 °, 50 ° and 60 °. First we measured the angle of incidence, where we placed the wood block perpendicular to the ray. To control the variables, the laser should have the same wavelength for all the angles to get the same refractive index and the ray should hit the center of the glass circle, so to check that the ray hits the center of the glass circle, we placed a wood block at the angle of reflection to see if the angle of reflection is the same as the angle of incidence, because we know that the angle of incidence is equal to the angle of reflection.Another thing which makes it easier to hit the center of the glass circle is by placing a paper on the flat side of the circle and see if the ray hits the ce nter of the circle and by placing the wood block perpendicular. Then we measured the angle of the refraction on the other half of the drawn circle, where we again placed the wood block perpendicular. We measured the angle of refraction by looking perpendicular down from the wood block, to see close where the ray hits the wood block, to see more precise where the angle of refraction is.We repeated this method for all the different angles of incidence and repeated every angle two times. D 2 1 2 You write â€Å"to control the variables† which variables? You should mention the wavelength and the hitting the center explicitly as variables to be controlled and why. Results: Angle of incidence  ± 0. 1 °| Angle of refraction1  ± 0. 1 °| Angle of refraction2  ± 0. 1 °| Angle of refraction3  ± 0. 1 °| 10 °| 6. 9 °| 7. 1 °| 7. 0 °| 20 °| 13. 6 °| 13. 5 °| 13. 5 °| 30 °| 20. 0 °| 20. 1 °| 20. 0 °| 40 °| 25. 6 °| 25. 8 °| 25. 7 °| 50 °| 30 . 7 °| 30.  °| 30. 8 °| 60 °| 35. 9 °| 35. 9 °| 36. 0 °| Example: First we find the average and uncertainty for the angle of refraction: 7. 2- 6. 8 2 =  ± 0. 2 ° Angle of incidence  ± 0. 1 °| Average angle of refraction ± 0. 2 °| 10 °| 7. 0 ° | 20 °| 13. 5 ° | 30 °| 20. 0 ° | 40 °| 25. 7 ° | 50 °| 30. 8 ° | 60 °| 35. 9 ° | The refractive index: We know that the formula is sinisinr = v1v2 = refractive index, so by applying the information we know to the formula, we can find the refractive index. Example: Uncertainty for refractive index: ( sin(10. 1)sin(6. 8) – sin (9. )sin(7. 2) )/2 =0. 045 ?  ± 0. 05 sin(10 °) sin(7. 0 °) = 1. 42  ± 0. 05 Angle of incidence  ± 0. 1 °| Angle of refraction  ± 0. 2 °| Refractive index| 10 ° | 7. 0 °| 1. 42  ± 0. 05| 20 °| 13. 5 ° | 1. 47  ± 0. 03| 30 °| 20. 0 ° | 1. 46  ± 0. 02| 40 °| 25. 7 ° | 1. 48  ± 0. 01| 50 °| 30. 8 ° | 1. 50 ± 0. 01| 60 °| 3 5. 9 ° | 1. 48  ± 0. 01| Refractive index Intervals: Angle of incidence  ± 0. 1 °| Refractive index intervals| 10 ° | 1. 37 – 1. 47| 20 °| 1. 44 – 1. 50| 30 °| 1. 44 – 1. 48| 40 °| 1. 47 – 1. 49| 50 °| 1. 49 – 1. 51| 60 °| 1. 47 – 1. 49| DCP 2 2 2 Conclusion:From the table we can see that there is no interval, where at least one number from each interval is included. The consequences of the small angles are more serious than the bigger angles. Snell’s law states that no matter what the angle of incidence is, the refractive index would be the same. From the results I gained (disregarding the angle of incidence equals to 10 °), I can state that Snell’s law is confirmed in this case. Evaluation: The method has some weaknesses. The glass prism is not exactly in the center of the drawn circle, which is why the results are not quite correct.There might also be some misreading when reading the small angles, that has leaded to that the small angles of incidence’s results are a bit uncommon and almost an outliers, but overall reading the angles could be one of the errors too. Suggestions: It would be better to glue the glass prism more precise in the center of the circle, so that the result would be more precise. Another thing to improve the method is by using a Vernier gauge to measure the size of small distances more accurate. CE 1 2 2 The one because the meaning of the red sentence is not clear! Very well, this is your best up to now. grade 7

Tuesday, October 22, 2019

Free Essays on Equality Of Education

An unequal level of achievement in schools is one of the most familiar aspects of the British education system. As rule schooling in Britain is a white middle class patriarchal institution and those who do not fit into those categories often find themselves underachieving, much of the time through no fault of their own. The group that this study will concentrate on is the ethnic minority population in Britain, and through the examination of materialist and cultural explanations will hopefully gain a further understanding of why many capable ethnic minority pupils do not reach their full potential in the British school system. One of the most popular arguments put forward for this is that the system fails the pupils and that there is inherent racism in the education system. Although this is certainly a factor, it is a simple one level explanation and the different layers involved in this explanation must be further examined before an adequate account is obtained. The case of ethnic minority underachievement in schools is a complex one as there are many overlapping inequalities with other groups, for example most ethnic minority children live in poor areas and face many of the same disadvantages as working class children such as poor resources within schools and a shortage of teachers. Therefore in this case it is very important to distinguish between equality of outcome, which has been concentrated on most in recent years, and equality of opportunity. If children in poor areas regardless of colour have overcrowded classrooms and fewer resources to learn with then it is almost inevitable that their quality of education will be poorer than those with better opportunities. Therefore in many cases it is not simply a case of ethnic minority pupils underachieving but working class pupils underachieving and comparison with white middle class children is unfair as it gives a skewed analysis which has no real relation to ethnic backgrou... Free Essays on Equality Of Education Free Essays on Equality Of Education An unequal level of achievement in schools is one of the most familiar aspects of the British education system. As rule schooling in Britain is a white middle class patriarchal institution and those who do not fit into those categories often find themselves underachieving, much of the time through no fault of their own. The group that this study will concentrate on is the ethnic minority population in Britain, and through the examination of materialist and cultural explanations will hopefully gain a further understanding of why many capable ethnic minority pupils do not reach their full potential in the British school system. One of the most popular arguments put forward for this is that the system fails the pupils and that there is inherent racism in the education system. Although this is certainly a factor, it is a simple one level explanation and the different layers involved in this explanation must be further examined before an adequate account is obtained. The case of ethnic minority underachievement in schools is a complex one as there are many overlapping inequalities with other groups, for example most ethnic minority children live in poor areas and face many of the same disadvantages as working class children such as poor resources within schools and a shortage of teachers. Therefore in this case it is very important to distinguish between equality of outcome, which has been concentrated on most in recent years, and equality of opportunity. If children in poor areas regardless of colour have overcrowded classrooms and fewer resources to learn with then it is almost inevitable that their quality of education will be poorer than those with better opportunities. Therefore in many cases it is not simply a case of ethnic minority pupils underachieving but working class pupils underachieving and comparison with white middle class children is unfair as it gives a skewed analysis which has no real relation to ethnic backgrou...

Monday, October 21, 2019

Mesohippus - Facts and Figures

Mesohippus - Facts and Figures Name: Mesohippus (Greek for middle horse); pronounced MAY-so-HIP-us Habitat: Woodlands of North America Historical Epoch: Late Eocene-Middle Oligocene (40-30 million years ago) Size and Weight: About four feet long and 75 pounds Diet: Twigs and fruit Distinguishing Characteristics: Small size; three-toed front feet; large brain relative to its size    About Mesohippus You can think of Mesohippus as Hyracotherium (the ancestral horse previously known as Eohippus) advanced a few million years: this prehistoric horse represented an intermediate stage between the smallish hooved mammals of the early Eocene epoch, about 50 million years ago, and the large plains grazers (like Hipparion and Hippidion) that dominated the Pliocene and Pleistocene epochs over 45 million years later. This horse is known by no less than twelve separate species, ranging from M. bairdi to M. westoni, which roamed the expanse of North America from the late Eocene to the middle Oligocene epochs. About the size of a deer, Mesohippus was distinguished by its three-toed front feet (earlier horses sported four toes on their front limbs) and the wide-set eyes set high atop its long, horse-like skull. Mesohippus was also equipped with slightly longer legs than its predecessors, and was endowed with what, for its time, was a relatively large brain, about the same size, proportionate to its bulk, as that of modern horses. Unlike later horses, however, Mesohippus fed not on grass, but on twigs and fruit, as can be inferred by the shape and arrangement of its teeth.

Sunday, October 20, 2019

A Complete List of John Grisham Books

A Complete List of John Grisham Books John Grisham is a master of legal thrillers; his novels have captured the attention of millions of readers, from adults to teens. In three decades he has written nearly one book per year and a number of those have been adapted into popular movies. From his debut novel A Time to Kill to the 2017  release of Camino Island, Grishams books are nothing short of captivating. Over the years, he branched out from legal stories as well. His complete list of published books includes stories about sports as well as non-fiction. Its a compelling body of literature and if youve missed one or two books, youll definitely want to catch up. Lawyer Turned Best-Selling Author John Grisham was working as a criminal defense attorney in Southaven, Mississippi when he wrote his first novel. A Time to Kill, based on an actual court case that dealt with racial issues in the South. It enjoyed modest success. He entered politics, serving in the state legislature on the Democratic ticket and began writing his second novel. It was not Grishams intent to leave law and politics to become a published author, but the runaway success of his second endeavor The Firm changed his mind. Grisham quickly became a prolific best-selling author. In addition to novels, he has published short stories, nonfiction, and young adult books.   Grisham Captures Mainstream Readers From  1989-2000 Few new writers have exploded onto the literary scene like John Grisham. The Firm became the top-selling book of 1991 and was on The New York Times bestseller list for nearly 50 weeks. In 1993, it was made into the first of many movies based on Grishams novels. From The Pelican Brief through The Brethren, Grisham continued to produce legal thrillers at the rate of about one per year. He tapped into his experience as a lawyer to create characters who faced moral dilemmas and dangerous situations. During the first decade of his work, he produced several novels that were eventually made into major big-screen films. These include Pelican Brief in 1993; The Client in 1994; A Time to Kill in 1996; The Chamber in 1996; and The Rainmaker in 1997. 1989 - A Time to Kill1991 - The Firm1992 - The Pelican Brief1993 - The Client1994 - The Chamber1995 - The Rainmaker1996 - The Runaway Jury1997 - The Partner1998 - The Street Lawyer1999 - The Testament2000 - The Brethren Grisham Branches Out From  2001-2010 As the best-selling author entered his second decade of writing, he stepped back from his legal thrillers to examine other genres. A Painted House is a small town mystery. Skipping Christmas is about a family that decides to skip Christmas. He also examined his interest in sports with Bleachers, which tells the story of a high school football star returning to his hometown after his coach dies. The theme continued in Playing for Pizza, a story about an American playing football in Italy. In 2010, Grisham introduced Theodore Boone: Kid Lawyer to middle school readers. This book about a kid lawyer successfully launched an entire series centered around the main character. It introduced the author to younger readers who are likely to become lifelong fans. Also in this decade, Grisham released Ford County, his first collection of short stories and The Innocent Man, his first nonfiction book about an innocent man on death row.  Not to turn his back on his dedicated fans, he rounded out this time with several legal thrillers as well. 2001 - A Painted House2001 - Skipping Christmas2002 - The Summons2003 - The King of Torts2003 - Bleachers2004 - The Last Juror2005 - The Broker2006 - The Innocent Man2007 - Playing for Pizza2008 - The Appeal2009 - The Associate2009 - Ford County (short stories)2010 - Theodore Boone: Kid Lawyer2010 - The Confession 2011 to Present: Grisham Revisits Past Successes Following the success of the first Theodore Boone book, Grisham followed up with five more books in the popular series. In Sycamore Row, a sequel to A Time to Kill, Grisham brought back protagonist Jake Brigance and key supporting characters Lucien Wilbanks and Harry Rex Vonner. He continued his policy of writing one legal thriller a year and threw in a couple of short stories and a baseball novel called Calico Joe for good measure.   Grishams 30th book was released in 2017 and titled Camino Island. Another intriguing crime novel, the story centers around stolen F Scott Fitzgerald manuscripts. Between a young, enthusiastic writer, the FBI, and a secret agency, the investigation tries to track down these handwritten documents on the black market. 2011 - Theodore Boone: The Abduction2011 - The Litigators2012 - Theodore Boone: The Accused2012 - Calico Joe2012 - The Racketeer2013 - Theodore Boone: The Activist2013 - Sycamore Row2014 - Gray Mountain2015 - Theodore Boone: The Fugitive2015 - Rogue Lawyer2016 - Partners (a Rogue Lawyer short story)2016 - Theodore Boone: The Scandal2016 - Witness to a Trial (a digital short story)2016 - The Whistler2017 - Camino Island

Saturday, October 19, 2019

Compensation and Benefits Paper Essay Example | Topics and Well Written Essays - 1000 words

Compensation and Benefits Paper - Essay Example For example, the same job might have different structures, meaning that the levels that the organization uses are diverse. In this case, the levels used by the organization determine the organization structure, since the different people report to different managers. In the example of software engineers in the Phoenix area, the type of job structures is best exemplified. In this case, there are three different job structures for the same occupation, each job structure attracting a different salary. The first job structure is Software engineer 1, which is the lowest level in the field. This job structure attracts an average salary of $58,001 (Salary.com, 2011), and from the job description, requires up to 2 years of experience in a similar position. An individual in this position is always under immediate supervision, and cannot exercise independent judgment in the job. The second job level is a software engineer 2, who makes an average salary of $73,539 (Salary.com, 2011), and is a l ittle higher than the software engineer 1. This job level requires between 2 and 4 years of experience, performs more tasks that the first job level. This employee reports to one manager, and is usually not under immediate supervision. ... The information described above can be used in the development of a pay structure in a simple way, since the factors that determine pay are already evident. The description of three job levels above indicates that two factors that determine the pay structure in an organization. The first factor is the experience that an individual possesses (Ranken, 2010). The educational level is usually constant, since an individual is expected to possess minimum qualifications before consideration for the job is done. In this case, the first level, which earns the lowest salary, possesses the least experience, and the third job level possesses the highest job experience. This indicates that the development of a pay structure should be dependent on the experience that an individual possesses. From the above information, it is also evident that the development of a pay structure is also dependent on the level of independence that an individual is accorded in an organization (RAnken, 2010). For examp le, a first level engineer is accorded the least level of independence, therefore, it is to be expected that the pay grade will be the lowest. Conversely, the third level engineer is accorded the highest level of independence; therefore, the pay grade is the highest. Benefits Benefit Description Value Reason for benefit Social Security Social security is a contributory program made by all employers to a government fund for the retirement, medical aid, and disability fund for employees. The employees are assured that they will get retirement benefits and medical care at the moment they retire. Required by law Disability Disability benefits are not mandatory since they are already covered by social security. This benefit is

Friday, October 18, 2019

New Product Development is the Key to Apple's Marketing Success Coursework

New Product Development is the Key to Apple's Marketing Success - Coursework Example The latest product introduced by Apple is the iPhone 4S. Apple announced the launch of iBooks 2 for iPad which would feature iBooks textbooks, iTunes U application for iPhone, iPad and for iPod touch (Apple Inc-a, 2012). Apple aims to bring the best experience for its customers through its product and services. The business strategy of Apple is to leverage the unique abilities of designing and developing the company’s own operating system, software and hardware in order to provide its customers with superior products and innovative designs. The company believes in innovation which is the key strategy for the success of the company; as a result, Apple invests in its research and development in order to introduce new and innovative products. Apart from its R&D, the company also invests in its marketing and advertisement as a part of Apple strategy to stay ahead of its competitors. Apple strategy also includes expansion of its distribution network to reach more clients and provid e the potential customers with high quality of sales and post purchase experience (Apple Inc, 2011, p.1). New Product Development Any changes made to a product are termed as new product development. ... New product development is one of the key strategies of Apple; it is through new product that the company has been able to taste success being one of the leading companies globally. Apple launches new product in the markets to stay ahead of its competitors, to continue the product life cycle, to give the customers what they need, and to enhance the strategy. According to Steve Jobs, new product lines tend to give people the products which are needed by the consumers. The company expresses its vision with the help of its product, exciting the customers and making them proud of owing an Apple product. The life cycle of any product needs to be modified carefully. Apple introduces new product when its earlier products are entering the maturity phase of the PLC giving no or less chance to its competitors to stay ahead. Thus, with continuous innovation, Apple provides a huge competitive edge over its competitors and helps in maintaining its number one position. With its innovation strategy the company has introduced many new products and also planned to launch few more in the coming years or so. Apple has applied a strategy of continuously milking its cash cow and has done a fantastic job. Each of its products, ranging from the Mac, iPhone, and iPod has been fertile, speaking about leverage designs and supply chain. The main motive of milking its product is to stay competitive in the market. Apple product possesses elegant design which integrates software, hardware and its services. One of the closest competitors of Apple is Android which has come up with similar products and is doing quite well in the market. Therefore, Apple should constantly introduce new products with elegant design which is the USP of Apple for its consumers. Apple

Depression and Anxiety in PEG Feeding Dissertation - 1

Depression and Anxiety in PEG Feeding - Dissertation Example Expand a few lines†¦ TABLE OF CONTENTS TABLE OF CONTENTS 3 LIST OF FIGURES Abstract This dissertation is about the social and psychological impact, including anxiety and depressed moods, on people who are artificially fed via a tube based on percutaneous endoscopic gastrostomy (PEG). The analysis is based on a framework that highlights two sides of sickness, â€Å"disease† underlying the placement of a feeding tube (biological malfunctions recorded as particular disease categories, e.g., cancer, neurological disorders, cardiac diseases, palsy) and the response to this by patients and their carers. This distinction between â€Å"disease† and â€Å"illness† provides a view of the social and psychological complexities involved. These are often overlooked when artificial feeding is adopted. The dissertation proceeds via a description of the literature search on PEG. The primary tools used in this search is the topical search (e.g., â€Å"socio-psychological imp acts of PEG feeding†) on the internet and the exploration of various databases, such as Cinahl, PubMed, Medline, Cochrane and Google Scholar. The literature used refers to reports of â€Å"new† (i.e. past decade) findings. In a very few cases only, when outlining â€Å"illness responses† to â€Å"disease† and the ensuing person-oriented framework, a few basic sources pre-dating 2000, are drawn upon. The accompanying review of relevant sources attempts to bring out the emphasis of â€Å"disease† and the omission of efforts to develop a framework or model and conceptual tools to grasp the social and psychological implications of artificial feeding due to disability. Such a model can, however, be of great value to nursing care and operating practice. Such a framework is available to us via a number of qualitative studies and a â€Å"narrative understanding of the illness experience†. The usefulness of this body of literature will be examined in the ensuing discussion. In the conclusion I will stress the value of a qualitative, person-oriented perspective (the â€Å"illness experience†) for a humanistic medical and nursing practice. Introduction This dissertation is based on a lengthy review of available literature on the social and psychological impact, including anxiety and depressed moods, on people who are artificially fed via a tube based on percutaneous endoscopic gastrostomy (PEG) This review allows me to examine the emotional costs involved in PEG tube feeding, especially with regard to experiences and the coping with the emotional (anxiety, depressed mood) and social costs of tube feeding before, during and after the placement of a PEG tube. This dissertation takes the patient’s point of view and reviews two groups of literature in depth: one of the two is person-and qualitatively-oriented and proposes a meaning-centred, qualitative and humanistic method/perspective. At the same time, one realizes tha t patients are found in a larger health care context where medical and health care professionals operate. Their and the perspective of medicine must be understood as well. Byron Good’s (2008) book on Medicine, Rationality and Experience provides a good introduction to their and the patient’s perspective. It is therefore meaningful to compare and contrast the views and perspectives of these professionals and the views that patients express, their way of coping with PEG tube feeding, their modes of reasoning, their various feeling-states (anxiety, depression) and the lives they live. I have chosen

Thursday, October 17, 2019

WiFi, VPNs & Encryption Assignment Example | Topics and Well Written Essays - 250 words - 1

WiFi, VPNs & Encryption - Assignment Example In this scenario, different restrictions are implemented on the system access mechanisms. As a result, it becomes very difficult for these security threats to pollute a system and spread to other systems and devices (Merrifield, 2015). In other words, the concept of least privileges is used by the system administrators to offer the smallest amount of system resources needed to complete important business tasks. This mechanism is implemented through a variety of methods such as user rights (for instance putting restrictions to users’ rights, the way they access to the systems), resource permissions for instance implementing restrictions on CPU, network, memory and file system permissions. For instance, if a middleware system simply needs access to the network, the capability to write to a log, and read access to a database table, it refers to all the authorizations that should be approved. However, the middleware server should not be granted administrative privileges in any cas e under any circumstances (OWASP,

Human Resources Problems Assignment Example | Topics and Well Written Essays - 250 words

Human Resources Problems - Assignment Example Based on your text and supplemental readings, what are some of the potential problems associated with employee self-service? After sharing some problems facing self-service, how would you address those problems? What is your professional opinion related to management self-service, where managers have access to more employee information through HRIS systems?In a self-service system like ESS, many errors remain covered for a long time which negatively interferes with the quality process. Though employee satisfaction is increased by use of ESS, many ESS software used by companies have many disadvantages like costs associated with its maintenance, functionality issues, and poor performance. These problems can be rectified by using an ESS software which is specifically designed to meet an organization’s needs.5-Does the web present problems for employee self-service applications? Find an article on this subject and provide a summary of the article, including the web address.Many we b self-service pitfalls have been reported. The web creates problems for ESS applications because every bit of employees’ interaction with employers is automated. Technology is always better and lack of HR automation will seriously affect many organizations in terms of time of costs. Automation of HR functions has relieved the HR professionals from much of the burden because much of the tasks assigned to them by managers and employees can be now handled by themselves by use of ESS and manager self-service.

Wednesday, October 16, 2019

WiFi, VPNs & Encryption Assignment Example | Topics and Well Written Essays - 250 words - 1

WiFi, VPNs & Encryption - Assignment Example In this scenario, different restrictions are implemented on the system access mechanisms. As a result, it becomes very difficult for these security threats to pollute a system and spread to other systems and devices (Merrifield, 2015). In other words, the concept of least privileges is used by the system administrators to offer the smallest amount of system resources needed to complete important business tasks. This mechanism is implemented through a variety of methods such as user rights (for instance putting restrictions to users’ rights, the way they access to the systems), resource permissions for instance implementing restrictions on CPU, network, memory and file system permissions. For instance, if a middleware system simply needs access to the network, the capability to write to a log, and read access to a database table, it refers to all the authorizations that should be approved. However, the middleware server should not be granted administrative privileges in any cas e under any circumstances (OWASP,

Tuesday, October 15, 2019

Reflection on the book 'The White Castle' Essay Example | Topics and Well Written Essays - 500 words

Reflection on the book 'The White Castle' - Essay Example Like in the story Hoja, a Muslim, made the western slave tell him about their life styles and he preferred these western styles over theirs. Pamuk portrays religion with great care in the book and shows how the two different thoughts of West and East can merge together. The Ottoman society follows the old traditions according to their religion and thus do not take any sanitary precautions when a plague hits Istanbul, however the Italian slave advises the Sultan to use such measures for the end of plague and the Sultan does eventually follow the Western way of removing the plague which proves to be successful. Pamuk in his story White Castle tells about the realities of life in the 17th century. It describes different events taking place in the Ottoman Empire. Cruelty is prevalent through out the plot of the story and can be clearly viewed in the characters. The Italian Scholar seems to be laid into a trap by the Eastern world but is saved by his own intellect. Similarly Pamuk is portraying the Eastern world with great uncertainty and cruelness. The pirates who capture the Italian scholar are cruel in nature and are supposedly going to kill the scholar. However the scholar’s intellect helps him to misguide the pirates into thinking that he is a doctor and this saves his life. But on the other hand the pirates do not free the scholar; they rather gift him as a slave to Hoja. The character of Hoja can also be viewed to be cruel as he absorbs all the information from the Italian scholar about his lifestyle and even then does not let him free. The cruel nature of Hoja can yet again be seen in his aim of designing a deadly weapon which would help his empire to conquer other states. And furthermore, when the weapon does not work as expected by him he steals the identity of the Italian scholar and runs away leaving him in the Ottoman

Health and Social Care Essay Example for Free

Health and Social Care Essay Government: (National)- Greenwich Council (Locally) World Heritage Site (Internally). The National Maritime Museum set target by the government to meet the needs and to attract different types of customer all over the world and also to provide better facilities such as providing wheel chair for disabled people. Sponsors: one of the sponsors is PO they want quality exhibits, which means they could have good publicity which lead to better public image. Researchers- Researchers produce different types of research from over the world and encourage the museum to improve on their exhibits. Suppliers: who supply food and other products and the supplier expect good pay at the right time. Owners of Exhibits: The owner of exhibits wants security on their collections of picture or etc and a good feedback from the museum. Customers: The customer wants good Customer Service, helpfulness staff and to provide better facilities for special needs. Staff: The staff should be motivated, which then will lead to good sales and profit. The staff will have an experience working with different types of customers. Friends ([emailprotected]): Friends of the National Maritime Museum actively support the largest Maritime Museum in the world. The friends mission is to support the work of the National Maritime Museum, the Royal Observatory and the Queens House by. In 1997/1998 the Maritime Museum had 50% of people visited the museum, but in 1998/1999 the Maritime Museum had 54%, which means the visitor number has increased by 4%. In 1999/00 the museum had 52% but by 2000/01 it has decreased by 3%. By 2001/02 the museum visitors has gone up by 10%. This table shows the predicted target market. The age group of 18-24, In 1997/98 they were 10% of Visitors and in 2001/02 it was 7% which means it has decreased by 3 % since 1997/1998. In 1997/98 they were 18% of visitors visited who are aged from 25-34 and in 2001/02 it was 19%, which means it has gone up by 1% since 1997/98. Although it was a change in 1998/99, because the number of visitors who are aged 25-34 has increased by 4% since1997/98. The age group 35-44, in 1997/98 it was 23% and in 2001/02 it was 23% which means they have been no change but in 1999/00 the percentage went up suddenly they have decrease since 2000/02. In 1997/98 it was 24% but in 1998/99 the percentage went down by 2%. From 1999/01 they have been no change of percentage of visitors arriving but in 2001/02 the percentage has decreased by 1% since 2000/01. The age group of 55-64, in 1997/98 it was 15% but the figure went down until 1999/00. However the figure went up in 2000/02. In 1997/98 it was 10% of visitors who are aged 65+ but the percentage stayed same until 1999. Although the percentage starts to rise slowly in 2000 by 2001 the percentage has gone up by 2%. This table shows the predicted income. In 1997/98 it was 37% visitors visited who were A/B Income earners, but by 2001/02 it has increased by 47%. The C1 Income earners visited the museum in 1997/98 was 46% and in 2001/02 it has decreased by 35%, but also the percentage did rise in 1999/00. In 1997/98 it was 12% who were C2 income earners, but in 2001/02 it has decreased by 9%, however the figure did rise in 1999/00. the D/E Income earners visited the museum in 1997/98 was 5% but in 2001/02 it has gone up by 9%, but there was steady change in 1998/2000. Overall it show that in 1997/98 it was most likely that C1 Income earners visited the Museum but by 2001/02 it has changed because A/B Income earners are likely to visit the museum * Predicted staffing needs This table shows the staffing levels. The visitors were very satisfied with the exhibition display in 1997/98 but the visitors were very satisfied in 2001/02 because it has gone up by 4%. There were only 2% of visitors not satisfied with the exhibition display in 1997/98 but it went down by 1%. In 1997/98, 50% of visitors were satisfied with the staff but in 2001/02 the percentage has increased by 14%. They were no satisfaction in 1997/98 or in 2001/02. This is an evaluation on customer service at Maritime Museum. I will be evaluating the service provided by the museum when I went for the visit. I enjoyed my trip to the Maritime Museum and it has helped with my assignment on customer service and also they provided information, which will help my coursework. The service provided by the National Maritime Museum was excellent and the staffs were motivated to their work. I had great greetings when I visited the museum and I was provided information on the exhibits, when I didnt know. E. g. when I visited one of the history section I didnt know about Nelson so the staff took his time to explain for us, so I thought that was good customer service. The lecture from the staff was good because they took their time on providing information, which I thought it was a good customer service. The purpose of this letter is to express to you my apologies for any inconvenience you may have experienced on the 27th of March 2006 due to standards of service you experienced in our restaurant. I have taken my time to investigate your case and the possible reason I could give you is that my staff didnt have record of your booking and so you had to wait for 45 minutes to be seated because the restaurant was full. We are terribly sorry if you were embarrassed by our service. During the 45 minutes the manager sat you at the bar and gave your party free drinks. As soon as the table were clear, the staff sat you down in two different tables and meanwhile we were preparing vegetarian food. I have come up with a solution to solve these problems. I will be talking to my staff about the record of booking. I will also have word with the waitress and provide better training on dealing with customers. I will make sure the systems work correctly. For the Disappointment service you had received by our restaurant we will provide you a free meal and better service from our restaurant. Once again I am terribly sorry for the service provided by our restaurant

Monday, October 14, 2019

Tektronix Inc Global Erp Implementation Management Essay

Tektronix Inc Global Erp Implementation Management Essay For Welti (1999), an ERP implemented in a complex international environment normally incorporates four major sequential stages (Planning, Realization, Preparation and Productive phases) that must go in parallel with a proper Change management, Risk Management, Project Control, Project Team Training and User Training. As the global implementation was done by waves with different characteristics, it can be seen that different project management strategies were adopted. In this part only the most characteristic features of the overall project are highlighted and these issues are limited to the information given by the case study (Planning and Realization stages). In the Planning stage, many issues can be mentioned. First, the selection of the ERP package was quite straightforward and relied mainly on Neun and Vance ´s judgment, experience and criterion; they decided to choose Oracle as a single vendor in order to avoid dealing with the complexity of multiple providers which, although it may cause future problems due to the dependency created to a single vendor, it was a practical decision for the implementation process. In this decision, they devoted neither too much time in costing nor resources in evaluating the alternative packages. Secondly, the steering committee clearly defined the model, guidelines and principles under which all the systems were adhered to. Also, it was defined the financial architecture that could meet the new business model: Order Management was different for each division (for customer purposes), but the rest of accounting elements were based on single definitions in order to provide worldwide control. Thirdly, th e Project Team structure offered advantages such as the cross-functional working style, which created a regional and divisional control. Then, the problems and tasks could be addressed from these two perspectives, but the disadvantage of this approach might be the conflicts of power during the implementation, as authority was given to divisional and/or regional leaders which could have created confusion to users and sub-teams. Fourth, it seems that within each wave they did not allocate carefully all the resources, people or time needed for being successful, which led to the time constraints as they devoted effort looking for skilled staff and consultants. Overall, the project was benefited from the partial feedbacks and success in each stage and in the long run the plan was framed within the general guidelines and schedule. Also, the planning stage can be said to be closer to reality as they used a mixture of emergent and statics tactics to face future events. The Implementation phase was done more or less within the plan, and it was divided mainly in regional and divisional deployments. The first stage, the implementation of the Financial and OMAR modules in the CPID was properly led by the person who best knew the IT infrastructure in USA: Gary Allen. As this division was in need of an urgent BPR and a new business model in order to improve their competitiveness, the early success of this implementation could get the buying of the next regions and divisions. However, this stage was no exempt of project management difficulties: Tektronix lacked of technical and functional skills with Oracle, and they struggled in finding the right consultants, with the resultant wasting of time. It can be mentioned that within this first part, USA was a good pilot for OMAR, as they could get an opportune feedback about business and technical issues; regarding the implementation of financial module in USA and Europe, they did not face major challenges, giv en that this module did not require BPR and also because the company highly relied on Oracle specialist Consultants (Aris Consulting). But the implementation of OMAR at MBD (second stage) met technical challenges despite of the help from Oracle consultants. The third stage, implementation at VND, was characterized by a constraint of human resources. These two last stages (two and three) went through problems from the business perspective, probably as a result of IT head divisions leading the implementations, with less involvement from the executive level. Later, once deployed the software in USA, Tektronix went to the European branches where the approach followed was more or less similar to that followed in USA: they chose the most used European distribution centre (Holland), and this pilot reduced the uncertainty and gained the buying from the rest of regional countries. Then, they decided the final roll out to some other European countries and the big-bang deployment that installe d all three divisional systems together. This strategy could lead to good results considering that European countries are culturally very different and it is really challenging to implement a vanilla version program. When introducing the ERP system into Asia, a similar plan was followed, which was wise given the language issues that could have represented a technical and cultural limitation if not addressed properly. America and Australia seemed to be easier waves in comparison with the rest of the project. Although the monitoring and feedback had a positive impact on the effectiveness of control (Mudimigh, 2001; Bancroft, et al., 1998) and the deadlines were timely met, it is clear that the weakest point of the implementation stage and partially of the planning stage was the poor Change Management, Project Team training and Risk Management (they are not mentioned in the case). For example, the complete absence of a proper Change Management project led to the resistance found when implementing OMAR at MBD. Also, the absence of attention from the managerial and business level in the allocation of the initial resources (staff, training, and consultants) led the waste of time when selecting consultants, when doing testing, incorporating technical changes, language customizations and new business processes. One of the good points of the project was the training given to Power users and Sub-Teams across the global enterprise. Overall, the conservative approach (waves of roll out and big-bang ) followed by Tektronix really helped in mitigating many of the characteristic risks for a global ERP implementation. 2.- IDENTIFYING TEKTRONIX ´S PROJECT RISKS In terms of risk, it can be said that Tektronix had tolerance for risk (Hirsch and Ezingeard, 2008) as managers were willing to accept variations during the project in order to obtain high returns (time and efficiency).This attitude towards risk might have an explanation: by using the Willcocks and Griffiths (1994) framework, we can see that due to some key managers ´ previous experience with ERP technology, considering the project as a large one and regarding project structure as medium or low, then the risk can be classified as Low or Medium. Then, it can be said that leaders of the implementation drove the project without a highly structured plan because their knowledge about ERP implementations gave them enough confidence to improvise tactics in order to obtain successful results. Keil et. al (1998) proposed a risk categorization framework that can be used here to classify the risks that Tektronix faced. Furthermore, this model gives the opportunity of clearly locate those events that could have happened and that could be prevented if addressing the events on time. Complementing this framework, specific risk factors (Sumner M., 2000) for enterprise-wide ERP projects are included within the four quadrants. Quadrant 1: Customer Mandate In this quadrant there are risks associated with the commitment obtained or lack of buying from senior management, users and other stakeholders. The first concern noticed in the case studied was that the project clearly had the financial support from the Board of Directors; and also the CFO and CIO were willing to introduce changes and improvements for the company, all which reduced the risks related with funding or assistance needed during the implementation. Secondly, the commitment from the company HQ and divisions was quickly gained because the high rate company growth and Tektronix ´s inability to cope with the market pressures had created a sense of dissatisfaction among managers and top employees who found in this project the opportunity to improve. Thirdly, there was a highly motivated champion of the project (Carl Neun) who was supported in his idea by the CIO and CPID ´s president. Furthermore, some other leaders were designated across the different regions and business units in order to expand the champion ´s directives. Fourth, the management structure of the project was built upon a number of key roles with business and technical expertise; this structure consisted of a central project leader (CFO with unlimited authority from the CEO) and strong business divisional or regional leaders supporting the champion ´s authority. The clear roles allocated at different levels reduced the efforts done along the top-down structure, but the lack of involvement of the CEO and other senior managers in Change management can be considered a risky attitude which ended up in occasional resistance from some users. Lastly, it seems that end-users ´ expectations were not considered at all: firstly, because the CFO relied mainly on his experience and intuition and did not spend time in doing a proper project analysis; second, the vanilla approach proposed by Neun implied adapting users ´ operations and routines to software and not vice versa. An instance of this weakness arose when doing BPR at MBD, where there was users ´ resistance and time was wasted explaining to users the reasons behind the new processes. Quadrant 2: Scope and Requirements In general, there were no major misunderstandings in requirements or disruptive changes in requirements: the scope was clearly defined as global, the elements implemented were limited to the Financial and OMAR systems, and the company followed the best practices embedded in the system and recommended by the vendor. Furthermore, as a vanilla implementation approach was deployed as a global solution, only in cases of extreme need modifications took place, which clearly reduced the risks involved when doing local or national customizations (Sheu, et al., 2004). Quadrant 3: Execution In this Quadrant, it can be assessed risk factors and many of the traditional pitfalls associated with poor project management. The pitfalls can fall into the business or technical field. As examples of first mistakes done by Tektronix, it can be mentioned an inadequate change management, project management and risk control: They never did any feasibility analysis and risk analysis before embarking in this huge project, and this neglect prevented them from seeing the reality in some subsidiaries. As a consequence, customization of the ERP for business processes-that were unique for some competitive local branches- had to be made; also, Multilanguage settings were programmed at last minute. The lack of skills in project management resulted in assigning this responsibility to inexperienced consultants, with the corresponding wasted money and delays when choosing a new consultancy firm. Tektronix also faced resistance that was not expected; for instance, when doing the implementation at the VND division, they found difficulties that only could be overcome by increasing the working pressure and the level of resources (order entry people, item maintenance people). With reg ard to the transfer of knowledge, the company relied mainly on a combination of large and small consulting firms (particularly with Aris Consulting) as well as independent consultants, but it is not clear whether a correct program for transfer of skills was in place. The Change Control team actually worked as a communication or monitoring team and no Change management team or program was ever mentioned. Regarding the technical realization, there are some points to highlight. First, the risk of Oracle versions being obsolete before the roll out completes was diminished with the concept of waves; and each time a new version was released the company used updated versions of the software. However, in CPID, Tektronix wrongly decided to install a beta version of the software which resulted in much time of debugging, instead of waiting for the final version that was later released or for a more tested version. Secondly, the lack of technical expertise made the firm to rely mainly on external consultants as Tektronix ´s employees did not have proper training in the technical area. Furthermore, this lack of expertise resulted in much time and resources wasted, such as the excessive training and testing done in the MBD division when implementing OMAR. Thirdly, there was also the risk of integration with the manufacturing legacy system that was kept in place; and even when an interface was i nstalled between the two systems, there might be a possibility of future failure. Finally, in spite of the fact that the implementation included building a data ware housing functionality, it seems there were no plans or considerations of the high risks involved in data migration. If the new software did not work properly with the existing infrastructure or database, the only outcome would be adding the software to the collection of obsolete legacy systems. Quadrant 4: Environment Tektronix never considered the risks associated with changes in scope/objectives due to changes in the senior management hierarchy or political problems within the firm itself. Hopefully, the project did not miss their key team or management members and it could finally reach the end with a constant objective. It helped the fact that the global objectives were met in less than 3 years, a period of time relatively short that avoided the risks associated with managers moving and changing plans or directives. With regard to internal problems, it was not considered that potential conflicts between the business units or departments could erode the performance of the plan. However, the leadership and corporate culture seems to have helped subsidiaries to strictly follow the HQ guidelines, which in turn streamlined the implementation process. 3.-CRITICAL SUCCESS FACTORS AND GLOBAL CHALLENGES For Tektronix, some of the following critical factors and challenges (Plant and Willcocks, 2007; Sheu, et al., 2004; Hoffman, T., 2007; Bingi, et al., 1999) permitted to reach a fairly successful implementation: Communicating and persuading project goals to constituents from different cultures (Hoffman, T., 2007) The vision and project goals were adequately communicated and reached thanks to two factors: The strong leadership of Carl Neun, who was given the whole support from the CEO, and the steering committee whose main activity was to develop and ensure that enterprise-wide implementation guidelines and principles were followed. Also, the presidents of each division were key contributors because they made tough decisions in order to meet the deadlines imposed and reduce the cultural problems. Change, Customization and Business Process Reengineering (Plant and Willcocks, 2007) The implementation approach followed by Tektronix was probably the best risk management initiative itself because the global deployment was done in a logical order to reduce disruptive changes and to increase the learning and feedback. Also, the vanilla model suggested as the standard for the entire organisation helped in diminish the level of customization, although some minor changes were necessarily made. The implementation of the financial model did not require BPR, but the OMAR module was modified and customized in order to support both the corporate functionalities and the best practices embedded within the system. Then, BPR was done to the extent of preserving the competitive and core capabilities of the regional business units. Internal Technical Personnel/Resource/Labor Skills (Sheu, et al., 2004) Although Tektronix did not have trained personnel in project management or in technical knowledge, they opted for buying consultant ´s know-how, which could give them the capabilities to go forward with the implementation. At some points they were able to find enough human resources to back critical stages. Overall, the company did not have economical limitations for easily obtain the adequate staff and for keeping the plan within the deadlines. Selection of ERP Vendors (Bingi, et al., 1999) Global ERP rollout requires that the software is designed to work in different countries and that the ERP vendor has the same package version available in the countries or regions where the system is being implemented (Bingi, et al., 1999).In the Tektronix case, Neun and Vance both had already experience with ERP solutions offered by Oracle, and this let them move quickly and take a justified fast selection of the ERP vendor. 4.-LESSONS LEARNED AND RECOMMENDATIONS 1.-The first learning from this global ERP implementation is the deployment strategy used: a snowball approach (Ogundipe, O., 2010) in which the project is broken into manageable chunks, beginning with appropriate locations in order to cope with business or technological challenges, running parallel implementations and then doing the big-bang stage at the end, when there is enough confidence (more learning and feedback). At the same time it can be said that an emergent strategy (Nandhakumar, et al., 2005) was used for every wave introduced. Perhaps the same methodology can be used in the future for IT infrastructure projects or any other disruptive project. 2.-It is clear that the ERP brought many benefits, but Tektronix can still leverage IT as a strategic advantage. They could incorporate Procurement, HR, SCM modules and CRM packages in order to make a customer-centric organization. 3.-In the final part, there is no evidence of estimation of ROI or real financial analysis that can show the tangible financial benefits of the investment. Of course, it is mentioned improvements in terms of time or efficiency, but it would have been essential to have an initial budget beforehand, especially considering that the company was toward the financial recovery. 4.-Tektronix faced many difficulties because of the lack of Oracle in-house specialists, so they had to rely on external consultants (Aris Consulting); however, it seems that the transfer of knowledge was not properly organized. In a next project, there must be a plan that can ensure that employees and users can gain the best learning experience from the Consultants. It is vital that in-house staff can get the skills, otherwise even when the ERP implementation is successful, the performance and use can be poor if there is not trained staff. For a future implementation, if there is lack of trained staff, Tektronix can also consider the option of IT outsourcing, which is a solutions that have worked perfectly for some other big companies. 5.-In order to obtain the best benefits from the IT incorporated capabilities and make them sustainable in the medium and long term, the company should have followed the Strategic Alignment Model presented in Cooper, et al. (2001) which was adapted from Henderson and Venkatram (1993). By following this model, Tektronix can benefit from holistic technical and organizational changes that are properly aligned to the firm ´s business strategies.

Sunday, October 13, 2019

Free College Admissions Essays: Try, try again! :: College Admissions Essays

Try, try again! Bedraggled, disheartened and blanketed with mud, I sat on the sidewalk blubbering while the tears dripped down my knee. As I watched the salty droplets trickle down my dingy leg and meld with the crimson driblets oozing from my ragged shins, I felt a certain overwhelming feeling of helplessness, of defeat. After a comfortable amount of time was spent wallowing in self-pity, my relentless attitude proficiently mustered the nerve to get back on my very first bicycle and give it another try. I was on my way to conquer one of my first acquaintances with adversity. " Excellence and success is not achieved in perfection but in knowing you tried your best." This is definitely the most powerful virtue that I've cultivated throughout the years. From learning to walk to learning to drive and all the obstacles that I faced in between I was always able to employ this adage and trust that belief in it would get me through whatever challenge I faced. As an innocent, radiant slip of a girl I embark ed on my first steps of life. I fell, and fell again until my bottom was bruised, I'm sure. Nonetheless, I never gave up, and was up and running around in no time! I was ready for bigger and better things. Before long it was time for school. This, by far, has been the most challenging endeavor midst the years. No matter what I always gave it my all and managed to remain a high honors student throughout a majority of my academic career until I was faced with an even larger task...high school. With problems developing in the family I became incredibly withdrawn and unfortunately, indifferent. By my junior year I was feeling so overwhelmed that, in essence, I surrendered to failure. I barely had the ambition to go to school let alone do well in my classes. I was accepting defeat and very low grades at that. Then, one day, a teacher said something to me that evoked thought, a second look at my situation. While staying after school, my English teacher said, "Jessica, you're a very intell igent girl, and you have the ability to achieve much higher grades, but you aren't trying which is sad because there are kids that try so hard and can't earn the grades that you're so capable of.

Friday, October 11, 2019

Social Interaction and Technology Essay example -- Sociology

Cellphones, television, and computers are just three of the most popular ways that we communicate in today. They have made a substantial impact on the United States simply by being readily available and easy to use. People are often discussing how technology has impacted us. Many believe that technology is actually hindering society rather than helping it. Then there are those who doubt technology has made our social interactions better. Certainly, this is true; without the advances in technology, our level of social interaction in education, businesses, and relationships would diminish. Education is important, so it would only make sense that technology would have a huge part in it. When children are born, they are placed into a world that is driven by technology. Parents are now using iPads and cellphones to allow their children to get a head start on learning. Now, by the time children are of age to attend school, they are exceedingly prepared to incorporate technology in their education. With this being said, educational institutions must help students get ready to work in a society that encompasses an extensive amount of technology. According to Sean McCollum, â€Å"a handful of school districts†¦are adapting their use to serve the curriculum.† Many schools are now using whiteboards, laptops, tablets, Smartphones and other devices in almost every classroom. Technology enhances learning, boosts confidence, and eliminates geographical limitations. Technology enriches learning by being able to come in different forms and do different things. "For lessons traditionally done with a paper and pencil, we now were able to do them in color, with animation, and with more depth and complexity"(McCollum). Teachers are now able to help stu... ...al interactions with each other. Works Cited Carr, Nicholas G. "IT Doesn't Matter." Harvard Business Review 81.5 (2003): 41-49. Business Source Complete. Web. 1 Apr. 2012. Levin, Barbara. "On-Demand Workforce-Communications Technologies Help Organizations Meet Critical Business Goals." Employment Relations Today (Wiley) 35.2 (2008): 43-50. Business Source Complete. Web. 25 Mar. 2012. McCollum, Sean. "Getting Past the 'Digital Divide'." Education Digest 77.2 (2011): 52. MasterFILE Complete. Web. 25 Mar. 2012. Social Interaction and Technology. n.d. Intelecom. Video. Web. 11 March 2012. Vanden Abeele, Mariek and Keith Roe "New Life, Old Friends: A Cross-Cultural Comparison of Communication Technology Use in Freshmen's Social Life." Conference Papers International Communication Association (2009): 1-36. Communication & Mass Media. Web. 25 Mar. 2012.

8 Key Element for a Business Model

E-commerce: business. technology. society. E-commerce E commerce Business. Technology. Society gy y Kenneth  C. Laudon Copyright  © 2011 Pearson Education, Ltd. Chapter 5 Business  Models  for  E? commerce Copyright  © 2007Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 1-2 E-commerce Business Models Business  model d l Set  of  planned  activities  designed  to  result  in  a   Set of planned activities designed to result in a profit  in  a  marketplace Business  plan Describes  a  firm s  business  model Describes a firm’s business modelE commerce  business  model E? commerce business model Uses/leverages  unique  qualities  of  Internet  and   Web W b Slide 2-3 8 Key Elements of Business Model 1. 2. 3. 4. 5. 6. 7. 8. Value  proposition Revenue  model Market  opportunity Market opportunity Competitive  environment Competitive  advantage Market  strategy Market strategy Organizational  De velopment Management  team Slide 2-4 1. Value Proposition Why  should  the  customer  buy  from  you? h h ld h b f ? Successful  e? ommerce  value   S f l l propositions: Personalization/customization Reduction  of  product  search,  price  discovery  costs Facilitation  of  transactions  by  managing  product   delivery Slide 2-5 2. Revenue Model How  will  the  firm  earn  revenue,  generate   p profits,  and  produce  a  superior  return  on   p p invested  capital? Major  types: Advertising  revenue  model g Subscription  revenue  model Transaction  fee  revenue  model Transaction fee revenue model Sales  revenue  model Affiliate  revenue  model Slide 2-6 3. Market Opportunity What  marketspace  do  you  intend  to   h k d d serve  and  what  is  its  size?Marketspace:  Area  of  actual  or  potential  commercial  value   in  which  companyà ‚  intends  to  operate in which company intends to operate Realistic  market  opportunity:  Defined  by  revenue   potential  in  each  market  niche  in  which  company  hopes  to   potential in each market niche in which company hopes to compete Market  opportunity  typically  divided  into   M k t t it t i ll di id d i t smaller  niches Slide 2-7 4. Competitive Environment Who  else  occupies  your  intended   h l d d marketspace? p Other  companies  selling  similar  products  in  the  same   marketspace Includes  both  direct  and  indirect  competitors Influenced  by: Influenced by:Number  and  size  of  active  competitors Each  competitor s  market  share Each competitor’s market share Competitors’  profitability Competitors pricing Competitors’  pricing Slide 2-8 5. Competitive Advantage Achieved  when  firm: h d h f Produces  superior  pro duct  Ã‚  or Produces superior product or Can  bring  product  to  market  at  lower  price   than  competitors th tit Important  concepts: p p Asymmetries First? mover  advantage Fi t d t Unfair  competitive  advantage Leverage Slide 2-9 6. Market Strategy How  do  you  plan  to  promote  your   products  or  services  to  attract  your   products or services to attract your target  audience?Details  how  a  company  intends  to  enter  market and  attract  customers Best  business  concepts  will  fail  if  not  properly   marketed  to  potential  customers k d i l Slide 2-10 7. Organizational Development What  types  of  organizational  structures   within  the  firm  are  necessary  to  carry  out   within the firm are necessary to carry out the  business  plan? Describes  how  firm  will  organize  work Typically  divided  into  functiona l  departments As  company  grows,  hiring  moves  from  generalists  to   As company grows hiring moves from generalists to specialists Slide 2-11 8.Management Team What  kinds  of  experiences  and   background  are  important  for  the   background are important for the company’s  leaders  to  have? Employees  are  responsible  for  making  the  business  model   work Strong  management  team  gives  instant  credibility  to   outside  investors Strong  management  team  may  not  be  able  to  salvage  a   weak  business  model,  but  should  be  able  to  change  the   model  and  redefine  the  business  as  it  becomes  necessary Slide 2-12 Insight on Business Online Grocers: Finding and Executing the Right Model g g Class Discussion Slide 2-13 Categorizing E-commerce Business ModelsNo  one  correct  way We  categorize  businessà ‚  models  according  to: We categorize business models according to: E? commerce  sector  (B2C,  B2B,  C2C) Type  of  e? commerce  technology;  i. e. m? commerce Type of e commerce technology; i e m commerce Similar  business  models  appear  in  more  than   one  sector Some  companies  use  multiple  business   Some companies use multiple business models;  e. g. eBay Slide 2-14 B2C Business Models: Portal Search  plus  an  integrated  package  of  content   and  services Revenue  models:   d l Advertising,  referral  fees,  transaction  fees,  subscriptions g p Variations:Horizontal  /  General Vertical  /  Specialized  (Vortal) Vertical / Specialized (Vortal) Pure  Search Slide 2-15 Insight on Technology Can Bing Bong Google? Class Discussion Slide 2-16 B2C Models: E-tailer Online  version  of  traditional  retailer Revenue  model:  Sales Variations: Virtual  merchant Virtual merchant Bricks? and? clicks Catalog  merchant C t l h t Manufacturer? direct Low  barriers  to  entry Slide 2-17 B2C Models: Content Provider Digital  content  on  the  Web News,  music,  video Revenue  models:   Revenue models: Subscription;  pay  per  download  (micropayment);   advertising;  affiliate  referral  fees Variations:Content  owners Syndication S di i Web  aggregators Slide 2-18 B2C Models: Transaction Broker Process  online  transactions  for  consumers Primary  value  proposition—saving  time  and  money Revenue  model:   R d l Transaction  fees Industries  using  this  model: Financial  services Travel  services Job  placement  services Slide 2-19 B2C Models: Market Creator Create  digital  environment  where  buyers   and  sellers  can  meet  and  transact Examples:   Priceline eBay y Revenue  model:  Transaction  fees Revenue model: Transaction fee s Slide 2-20 B2C Models: Service Provider Online  services e. g. Google:  Google  Maps,  Gmail,  etc. Value  proposition   Value propositionValuable,  convenient,  time? saving,  low? cost  alternatives  to   traditional  service  providers t diti l i id Revenue  models: Revenue models: Sales  of  services,  subscription  fees,  advertising,  sales  of   marketing  data marketing data Slide 2-21 B2C Models: Community Provider Provide  online  environment  (social   network)  where  people  with  similar   interests  can  transact,  share  content,  and   , , communicate   E. g. Facebook,  MySpace,  LinkedIn,  Twitter Revenue  models: R d l Typically  hybrid,  combining  advertising, subscriptions,  sales,  transaction  fees,  affiliate  fees Slide 2-22 B2B Business Models Net  marketplaces E? istributor E procurement E? procurement Exchange Industry  consortium Industry cons ortium Private  industrial  network Private industrial network Single  firm Industry? wide Industry wide Slide 2-23 B2B Models: E-distributor Version  of  retail  and  wholesale  store,   , MRO  goods  and  indirect  goods Owned  by  one  company  seeking  to  serve   many  customers Revenue  model:  Sales  of  goods Example:  Grainger. com Slide 2-24 B2B Models: E-procurement Creates  digital  markets  where   participants  transact  for  indirect  goods B2B  service  providers,  application  service  providers  (ASPs) B2B service providers application service providers (ASPs)Revenue  model: Service  fees,  supply? chain  management,  fulfillment   services Example:  Ariba Slide 2-25 B2B Models: Exchanges Independently  owned  vertical  digital   p y g marketplace  for  direct  inputs Revenue  model:  Transaction,  commission  fees Revenue model Transaction commission fees C eate po e u co pet t o bet ee Create  powerful  competition  between   suppliers Tend  to  force  suppliers  into  powerful  price   T d f li i f l i competition;  number  of  exchanges  has   dropped  dramatically d dd ll Slide 2-26 B2B Models: Industry Consortia Industry? wned  vertical  digital  marketplace   open  to  select  suppliers More  successful  than  exchanges More successful than exchanges Sponsored  by  powerful  industry  players Strengthen  traditional  purchasing  behavior Revenue  model:  Transaction,  commission  fees R d l T ti i i f Example:  Exostar Example: Exostar Slide 2-27 Private Industrial Networks Designed  to  coordinate  flow  of  communication   among  firms  engaged  in  business  together fi di b i h Electronic  data  interchange  (EDI) Single  firm  networks Most  common  form   M t f Example:  Wal? Mart’s  network   for  suppliersIndustry? wide  networks Often  evolve  out  of  industry  associations   Often evolve out of industry associations Example:  Agentrics Slide 2-28 Other E-commerce Business Models Consumer? to? consumer  (C2C) eBay,  Craigslist Peer? to? peer  (P2P) Peer to peer (P2P) The  Pirate  Bay,  Cloudmark M? commerce: Technology  platform  continues  to  evolve Technology platform continues to evolve iPhone,  smartphones  energizing  interest  in  m? commerce   pp apps Slide 2-29 Insight on Society Where R U? Not Here! Class Discussion Slide 2-30 E-commerce Enablers: Gold Rush ModelE? commerce  infrastructure  companies   p have  profited  the  most: Hardware,  software,  networking,  security E? commerce  software  systems,  payment  systems Media  solutions,  performance  enhancement CRM  software CRM software Databases Hosting  services,  etc. Slide 2-31 How Internet & Web Change Busi ness E? commerce  changes  industry  structure   g y by  changing: Basis  of  competition  among  rivals Barriers  to  entry y Threat  of  new  substitute  products Strength  of  suppliers Bargaining  power  of  buyers Bargaining power of buyers Slide 2-32 Industry Value ChainsSet  of  activities  performed  by  suppliers,   manufacturers,  transporters,  distributors,  and   f di ib d retailers  that  transform  raw  inputs  into  final   products  and  services   Internet  reduces  cost  of  information  and   Internet reduces cost of information and other  transactional  costs Leads  to  greater  operational  efficiencies,   lowering  cost,  prices,  adding  value  for   lowering cost prices adding value for customers Slide 2-33 E-commerce & Industry Value Chains Figure  5. 4 Slide 2-34 Firm Value Chains Activities  that  a  firm  engages  in  to   create inal  products  from  raw  inputs Each  step  adds  value Effect  of  Internet: Eff fI Increases  operational  efficiency p y Enables  product  differentiation Enables  precise  coordination  of  steps  in  chain E bl i di ti f t i h i Slide 2-35 E-commerce & Firm Value Chains Figure  5. 5 Slide 2-36 Firm Value Webs Networked  business  ecosystem   Uses  Internet  technology  to  coordinate  the   value  chains  of  business  partners l h i fb i Coordinates  a  firm’s  suppliers  with  its  own   C di t fi ’ li ith it production  needs  using  an  Internet? based   supply  chain  management  systemSlide 2-37 Internet-Enabled Value Web bl d l b Figure  5. 6 Slide 2-38 Business Strategy Plan  for  achieving  superior  long? term   returns  on  the  capital  invested  in  a   business  firm   business firm Four  Generic  Strategies 1. Di fferentiation   2. Cost 3. Scope 4. 4 Focus Slide 2-39 Chapter 6 E-commerce Marketing Copyright  © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 6-40 Netflix N fli Strengthens and Defends Its Brand Class Discussion Slide 6-41 Consumers Online: Internet Audience & Consumer Behavior Around  70%  (82  million)  U. S. ouseholds  have   Around 70% (82 million) U S households have Internet  access  in  2010 Growth  rate  has  slowed Intensity  and  scope  of  use  both  increasing d f b h Some  demographic  groups  have  much  higher   Some demographic groups have much higher percentages  of  online  usage  than  others   Gender,  age,  ethnicity,  community  type,  income,  education Slide 6-42 Consumers Online: Internet Audience & Consumer Behavior Broadband  audience  vs. dial? up  audience Purchasing  behavior  affected  by   neighborhood Lifestyle  and  sociological  impa cts Use  of  Internet  by  children,  teens Use  of  Internet  as  substitute  for  other  social  activitiesMedia  choices Traditional  media  competes  with  Internet  for  attention Traditional media competes with Internet for attention Slide 6-43 Consumer Behavior Models Study  of  consumer  behavior Social  science   Attempts  to  explain  what  consumers  purchase   Attempts to explain what consumers purchase and  where,  when,  how  much  and  why  they  buy Consumer  behavior  models Predict  wide  range  of  consumer  decisions Predict wide range of consumer decisions Based  on  background  demographic  factors  and   other  intervening,  more  immediate  variables   h i i i di i bl Slide 6-44 General Model of Consumer Behavior Figure  6. Slide 6-45 Background Demographic Factors Culture:  Broadest  impact Subculture  (ethnicity,  age,  lifestyle,  geography) S b lt ( th i it lif t l h ) Social Reference  groups Direct  Ã‚  reference  groups g p Indirect  reference  groups Opinion  leaders  (viral  influencers) Lifestyle  groups   f l Psychological Psychological  profiles Slide 6-46 Online Purchasing Decision Psychographic  research Combines  demographic  and  psychological  data Combines demographic and psychological data Divides  market  into  groups  based  on  social  class,  lifestyle,   and/or  personality  characteristics and/or personality characteristicsFive  stages  in  the  consumer  decision  process: 1. 2. 3. 4. 5. Awareness  of  need Search  for  more  information Evaluation  of  alternatives Actual  purchase  decision Actual purchase decision Post? purchase  contact  with  firm Slide 6-47 Consumer D i i C Decision Process & P Supporting Communications Figure  6. 3 Slide 6-48 Model of Online Consumer Behavior Decision   process  similar  for  online  and  offline   behavior General  online  behavior  model Consumer  skills Product  characteristics Attitudes  toward  online  purchasing Perceptions  about  control  over  Web  environment p Web  site  featuresClickstream  behavior:  Transaction  log  for   Clickstream behavior: Transaction log for consumer  from  search  engine  to  purchase Slide 6-49 Model of Online Consumer Behavior Figure  6. 4 Slide 6-50 Model of Online Consumer Behavior Clickstream  factors  include: Number  of  days  since  last  visit Number of days since last visit Speed  of  clickstream  behavior Number  of  products  viewed  during  last  visit b f d i dd i l ii Number  of  pages  viewed Supplying  personal  information Number  of  days  since  last  purchase Number  of  past  purchasesClickstream  marketing Clickstream marketing Slide 6-51 Shoppers: B rowsers & Buyers Shoppers:  87%  of  Internet  users 72%  buyers 72% buyers 16%  browsers  (purchase  offline) One? third  offline  retail  purchases  influenced  by   O thi d ffli t il h i fl db online  activities Online  traffic  also  influenced  by  offline  brands  and   shopping pp g E? commerce  and  traditional  commerce  are  coupled: part  of  a  continuum  of  consuming  behavior part of a continuum of consuming behavior Slide 6-52 Online Shoppers & Buyers Figure  6. 5 Slide 6-53What Consumers Shop & Buy Online Big  ticket  items  ($500  plus) Travel,  computer  hardware,  consumer  electronics Expanding   Consumers  more  confident  in  purchasing  costlier  items Small  ticket  items  ($100  or  less) ($ ) Apparel,  books,  office  supplies,  software,  etc. Sold  by  first  movers  on  Web Sold by first movers on Web Physically  small  i tems High  margin  items   Broad  selection  of  products  available Slide 6-54 What Consumers Buy Online Figure  6. 6 Slide 6-55 Intentional Acts: How Shoppers Find Vendors Online pp Search  engines  (59%) S h i (59%) Coupon  Web  sites  (29%) Coupon Web sites (29%) Comparison  shopping  sites  (27%) E? ail  newsletters  (25%) Online  shoppers  are  highly  intentional,   looking  for  specific  products,  companies,   services Slide 6-56 Table  6. 6 Slide 6-57 Trust, Utility, Opportunism in Online Markets Two  most  important  factors  shaping  decision   Two most important factors shaping decision to  purchase  online: Utility:   U ili Better  prices,  convenience,  speed Trust: Asymmetry  of  information  can  lead  to  opportunistic   behavior  by  sellers Sellers  can  develop  trust  by  building  strong  reputations   for  honesty,  fairness,  delivery   Slide 6-58 Basic Marketing Concepts MarketingStrategies  and  actions  to  establish  relationship   Strategies and actions to establish relationship with  consumer  and  encourage  purchases  of   p products  and  services Addresses  competitive  situation  of  industries  and   firms Seeks  to  create  unique,  highly  differentiated   products  or  services  that  are  produced  or  supplied   by  one  trusted  firm Unmatchable  feature  set Avoidance  of  becoming  commodity Slide 6-59 Feature Sets Three  levels  of  product  or  service 1. Core  product e. g. cell  phone g p 2. Actual  product Characteristics  that  deliver  core  benefits Ch t i ti th t d li b fit e. g. wide  screen  that  connects  to  Internet 3. Augmented  productAdditional  benefits Basis  for  building  the  product’s  brand e. g. product  warranty Slide 6-60 Featu re Set Figure  6. 7 Slide 6-61 Products, Brands & Branding Process Brand: Expectations  consumers  have  when  consuming,  or   thinking  about  consuming,  a  specific  product Most  important  expectations:  Quality,  reliability,   Most important expectations: Quality reliability consistency,  trust,  affection,  loyalty,  reputation Branding:  Process  of  brand  creation Branding: Process of brand creation Closed  loop  marketing Brand  strategy Brand  equity Brand eq it Slide 6-62 Marketing A ti iti M k ti Activities: From Products to Brands Figure  6. 8Slide 6-63 STP: Segmenting, Targeting, Positioning Major  ways  used  to  segment,  target  customers 1. 2. 3. 4. 5. 6. Behavioral B h i l Demographic Psychographic h hi Technical Contextual Search Within  segment,  product  is  positioned and  branded  as   a  unique,  high? value  product,  especially  suited  to   q g p p y ne eds  of  segment  customers Slide 6-64 Are Brands Rational? For  consumers,  a  qualified  yes: Brands  introduce  market  efficiency  by  reducing  search  and   decision? making  costs For  business  firms,  a  definite  yes: A  major  source  of  revenue Lower  customer  acquisition  cost Increased  customer  retention Successful  brand  constitutes  a  long? asting  (though  not   necessarily  permanent)  unfair  competitive  advantage Slide 6-65 Can Brands Survive Internet? Brands & Price Dispersion p Early  postulation:   Law  of  One  Price ;  end  of  brands Early postulation: â€Å"Law of One Price†; end of brands Instead: Consumers  still  pay  premium  prices  for  differentiated   products E? commerce  firms  rely  heavily  on  brands  to  attract   customers  and  charge  premium  prices Substantial  price  dispersion Large  differences  in  price  sensitivity  for  same  product Large differences in price sensitivity for same product â€Å"Library  effect† Slide 6-66Revolution in Internet Marketing Technology Three  broad  impacts: Scope  of  marketing  communications  broadened   Richness  of  marketing  communications  increased g Information  intensity  of  marketplace  expanded Internet  marketing  technologies: Internet marketing technologies: Web  transaction  logs Cookies  and  Web  bugs Cookies and Web bugs Databases,  data  warehouses,  data  mining Advertising  networks Customer  relationship  management  systems Slide 6-67 Web Transaction LogsBuilt  into  Web  server  software Record  user  activity  at  Web  site y Webtrends:  Leading  log  analysis  tool Provides  much  marketing  data,  especially  Ã‚   Provides much marketing data especially combined  with: Registratio n  forms R i i f Shopping  cart  database Answers  questions  such  as: What  are  major  patterns  of  interest  and  purchase? After  home  page,  where  do  users  go  first? Second? Slide 6-68 Cookies & Web Bugs Cookies: Small  text  file  Web  sites  place  on  visitor’s  PC  every  time   they  visit,  as  specific  pages  are  accessed Provide  Web  marketers  with  very  quick  means  of   identifying  customer  and  understanding  prior  behavior Flash  cookiesWeb  bugs: Tiny  (1  pixel)  graphics  embedded  in  e mail  and  Web  sites Tiny (1 pixel) graphics embedded in e? mail and Web sites Used  to  automatically  transmit  information  about  user  and   page being viewed to monitoring server page  being  viewed  to  monitoring  server Slide 6-69 Insight on Society g y Every Move You Make, Every Click You Make, Weâ₠¬â„¢ll Be Tracking You , g Class Discussion Slide 6-70 Databases Database:  Ã‚  Stores  records  and  attributes Database  management  system  (DBMS):   Software  used  to  create,  maintain,  and  access  databasesSQL  (Structured  Query  Language): Industry? standard  database  query  and  manipulation  language  used  in   y q y p g g a  relational  database Relational  database: Represents  data  as  two? dimensional  tables  with  records  organized  in   rows  and  attributes  in  columns;  data  within  different  tables  can  be   flexibly  related  as  long  as  the  tables  share  a  common  data  element flexibly related as long as the tables share a common data element Slide 6-71 Relational Database View of E-commerce Customers Figure  6. 12 Slide 6-72 Data Warehouses & Data Mining Data  warehouse:Collects  firm s  transactional  and  custom er  data  in  single   Collects firm’s transactional and customer data in single location  for  offline  analysis  by  marketers  and  site   managers Data  mining: Analytical  techniques  to  find  patterns  in  data,  model   Analytical techniques to find patterns in data model behavior  of  customers,  develop  customer  profiles Query? driven  data  mining Query driven data mining Model? driven  data  mining Rule? based  data  mining l b dd Collaborative  filtering Slide 6-73 Data Mining & Personalization Figure  6. 13 Slide 6-74 Insight on TechnologyThe Long T il Big Hits and Big Misses Th L Tail: Bi Hi d Bi Mi Class Discussion Slide 6-75 Customer Relationship Management ( (CRM) Systems ) y Record  all  contact  that  customer  has  with  firm Generates  customer  profile  available  to  everyone  in firm  with  need  to  Ã¢â‚¬Å"know  the  customer† fi ith d t â€Å"k th t † Customer profiles can contain: ustomer  profiles  can  contain: Map  of  the  customer’s  relationship  with  the  firm Product  and  usage  summary  data Demographic  and  psychographic  data Profitability  measures Contact  history   Contact history Marketing  and  sales  information Slide 6-76Customer Relationship Management System Figure  6. 14 Slide 6-77 Market Entry Strategies Figure  6. 15 Slide 6-78 Establishing Customer Relationship Advertising  Networks Banner  advertisements Ad  server  selects  appropriate  banner  ad  based  on   Ad server selects appropriate banner ad based on cookies,  Web  bugs,  backend  user  profile   databases Permission  marketing Permission marketing Affiliate  marketing g Slide 6-79 How Advertising Network Works e. g. , DoubleClick Figure  6. 16 Slide 6-80 Establishing Customer Relationship (cont’d) Viral  marketingGett ing  customers  to  pass  along  company’s  marketing   message  to  friends,  family,  and  colleagues Blog  marketing Using  blogs  to  market  goods  through  commentary  and   U i bl k d h h d advertising Social  network  marketing,  social  shopping   Mobile  marketing Mobile marketing Slide 6-81 Insight on Business Social Network Marketing: Let’s Buy Together Class Discussion Slide 6-82 Establishing Customer Relationship (cont’d) Wisdom  of  crowds  (Surowiecki,  2004) ( , ) Large  aggregates  produce  better  estimates  and  judgments Examples:   E l Prediction  markets Folksonomies Social  tagging Social taggingBrand  leveraging Slide 6-83 Customer Retention: Strengthening Customer Relationship p Mass  marketing Mass marketing Direct  marketing Micromarketing   Micromarketing Personalized,  one? to? one  marketing  Ã‚   Segmenting  market  on  precise  a nd  timely  understanding  of   Segmenting market on precise and timely understanding of individual’s  needs Targeting  specific  marketing  messages  to  these  individuals Positioning  product  vis? a? vis  competitors  to  be  truly  unique Personalization Can  increase  consumers  sense  of  control,  freedom Can  also  result  in  unwanted  offers  or  reduced  anonymity Slide 6-84Mass Market-Personalization Continuum Figure  6. 17 Slide 6-85 Other Customer Retention Marketing Technics Customization Customer  co? production Transactive  content:   Combine  traditional  content  with  dynamic  information   tailored  to  each  user’s  profile Customer  service FAQs Q Real? time  customer  service  chat  systems Automated  response  systems Automated response systems Slide 6-86 Net Pricing Strategies Pricing Integral  part  of  marketing  strategy I t l t f k ti t t Traditionally  based  on:   Fixed  cost   Variable  costs   Demand  curve Price  discrimination Price discriminationSelling  products  to  different  people  and  groups   based  on  willingness  to  pay Slide 6-87 Net Pricing Strategies (cont’d) Free  and  freemium Can  be  used  to  build  market  awareness Versioning Creating  multiple  versions  of  product  and  selling   essentially  same  product  to  different  market  segments   at  different  prices at different prices Bundling Offers  consumers  two  or  more  goods  for  one  price Off t d f i Dynamic  pricing: Auctions Yield  management Slide 6-88 Channel Management Strategies Channels: Different  methods  by  which  goods  can  be  distributed  and   soldChannel  conflict: When  new  venue  for  selling  products  or  services  threatens   gp or  destroy s  existing  sales  venues E. g. online  airline/travel  services  and  Ã‚  traditional  offline   travel  agencies Some  manufacturers  are  using  partnership   gp p model  to  avoid  channel  conflict   Slide 6-89 Chapter 7: E-commerce Marketing Communications Chapter 7 E-commerce Advertising Copyright  © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 7-90 Video Ads: Shoot, Click, Buy Class Discussion Slide 7-91 Marketing Communications Two  main  purposes:Sales  Ã¢â‚¬â€œ promotional  sales  communications   Branding  Ã¢â‚¬â€œ b di B di branding  communications i i Online  marketing  communications Online marketing communications Takes  many  forms Online  ads,  e? mail,  public  relations,  Web   sites Slide 7-92 Online Advertising li d i i $25  billion,  15%  of  all  advertising Advantages: Internet  is  where  audience  is  moving g Ad  targeting Greater  opp ortunities  for  interactivity Greater opportunities for interactivity Disadvantages: Cost  versus  benefit How  to  adequately  measure  results Supply  of  good  venues  to  display  ads Slide 7-93 Online Advertising from 2002-2014 Figure  7. Slide 7-94 Forms of Online Advertisements Display  ads Rich  media Video  ads Search  engine  advertising Social  network,  blog,  and  game  advertising Social network blog and game advertising Sponsorships Referrals  (affiliate  relationship  marketing) E? mail  marketing g Online  catalogs Slide 7-95 Display Ads Banner  ads Rectangular  box  linking  to  advertiser’s  Web  site IAB  guidelines e. g. Full  banner  is  468  x  60  pixels,  13K e g Full banner is 468 x 60 pixels 13K Pop? up  ads Appear  without  user  calling  for  them Provoke  negative  consumer  sentiment g Twice  as  effective  as  normal  banner  ads Pop? nder  ads:  Open  beneath  browser  window Pop under ads: Open beneath browser window Slide 7-96 Rich Media Ads Use  Flash,  DHTML,  Java,  JavaScript About  7%  of  all  online  advertising  expenditures Tend  to  be  more  about  branding d b b b di Boost  brand  awareness  by  10% Boost brand awareness by 10% IAB  standards  limit  length Interstitials Superstitials Slide 7-97 Video Ads Fastest  growing  form  of  online  advertisement IAB  standards Linear  video  ad Non? linear  video  ad In? banner  video  ad In? text  video  ad Ad placement Advertising  networks Advertising  exchanges Banner  swappingSlide 7-98 Search Engine Advertising h i d i i Almost  50%  of  online  ad  spending  in  2010 Types: Paid  inclusion  or  rank Paid inclusion or rank Inclusion  in  search  results Sponsored  link  areas p Keyword  advertising e. g. Google  AdWords e g Google AdWords Network  keyword  advertising  (context   advertising) d ii ) e. g. Google  AdSense Slide 7-99 Search Engine Advertising (cont’d) Nearly  ideal  targeted  marketing Nearly ideal targeted marketing Issues:   Disclosure  of  paid  inclusion  and  placement   practices Click  fraud   Ad  nonsense   Slide 7-100 Mobile Advertising Half  of  U. S.Internet  users  access  Internet   Half of U. S. Internet users access Internet with  mobile  devices Currently  small  market,  but  fastest   growing  platform  (35%) growing platform (35%) Google  and  Apple  in  race  to  develop   Google and Apple in race to develop mobile  advertising  platform AdMob,  iAd Slide 7-101 Sponsorships & Referrals Sponsorships Paid  effort  to  tie  advertiser s  name  to   Paid effort to tie advertiser’s name to particular  information,  event,  venue  in  a  way   that  reinforces  brand  in  positive  yet  not  overtly   that reinforces brand in positive yet not overtly commercial  manner ReferralsAffiliate  relationship  marketing p g Permits  firm  to  put  logo  or  banner  ad  on   another  firm’s  Web  site  from  which  users  of   th fi ’ W b it f hi h f that  site  can  click  through  to  affiliate’s  site Slide 7-102 E-mail Marketing & Spam Explosion Direct  e? mail  marketing   Low  cost,  primary  cost  is  purchasing  addresses Spam:  Unsolicited  commercial  e? mail Spam: Unsolicited commercial e mail Approx. 90%  of  all  e? mail Efforts  to  control  spam: Technology  (filtering  software)   Government  regulation  (CAN? SPAM  and  state  laws) Voluntary  self? regulation  by  industries  (DMA  ) y g y Volunteer  efforts Slide 7-103Percentage of E-mail That Is Spam Figure 7. 6 Slide 7-104 Online Catalogs Equivalent  of  paper? based  catalogs Graphics? intense;  use  increasing  with  increase   in  broadband  use in broadband use Two  types: 1. 2. 2 Full? page  spreads,  e. g. Landsend. com Grid  displays,  e. g. Amazon Grid displays e g Amazon In  general,  online  and  offline  catalogs   complement  each  other Slide 7-105 Social Marketing â€Å"Many? to? many†Ã‚  model Uses  digitally  enabled  networks  to  spread  ads Blog  advertising   Blog advertising Online  ads  related  to  content  of  blogs Social  network  advertising:   Social network advertising:Ads  on  MySpace,  Facebook,  YouTube,  etc. Game  advertising:   G d ti i Downloadable  Ã¢â‚¬Å"advergames† Placing  brand? name  products  within  games Slide 7-106 Insight on Society g y Marketing to Children of the Web in the Age of Social Networks g Class Discussion Slide 7-107 Behavioral Targeting Interest? based  advertising Data  aggregators  develop  profiles Data aggregators develop profiles Search  engine  queries Online  browsing  history O li b i hi Offline  data  (income,  education,  etc. ) d Information  sold  to  3rd party  advertisers,  who  deliver   ads  based  on  profile Ad  exchanges Privacy  concerns acy co ce s Consumer  resistance Slide 7-108Mixing Off-line & Online Marketing Communications g Most  successful  marketing  campaigns   M t f l k ti i incorporate  both  online  and  offline  tactics Offline  marketing Drive  traffic  to  Web  sites Drive traffic to Web sites Increase  awareness  and  build  brand  equity Consumer  behavior  increasingly  multi? channel 60%  consumers  research  online  before  buying  offline % y g Slide 7-109 Insight on Business g Are the Very Rich Different From You and Me? Class Discussion Sl ide 7-110 Online Marketing Metrics: Lexicon Measuring  audience  size  or  market  share Impressions I i Click? through  rate  (CTR) View? hrough  rate  (VTR) Vi th h t (VTR) Hits Page  views P i Stickiness  (duration) Unique  visitors Loyalty Reach Recency Slide 7-111 Online Marketing Metrics (cont’d) Conversion  of  visitor   Conversion of visitor to  customer Acquisition  rate q Conversion  rate Browse? to? buy? ratio View? to? cart  ratio Vi t t ti Cart  conversion  rate Checkout  conversion  rate   Checkout conversion rate Abandonment  rate Retention  rate Attrition  rate E mail  metrics E? mail metrics Open  rate Delivery  rate Delivery rate Click? through  rate   (e mail) (e? mail) Bounce? back  rate Slide 7-112 Online Consumer Purchasing ModelFigure  7. 8 Slide 7-113 How Well Does Online Adv. Work? Ultimately  measured  by  ROI  on  ad  campaign Highest  click? through  rates:  Searc h  engine  ads,   Permission  e mail  campaigns Permission e? mail campaigns Rich  media,  video  interaction  rates  high Online  channels  compare  favorably  with  traditional Most  powerful  marketing  campaigns  use  multiple   Most powerful marketing campaigns use multiple channels,  including  online,  catalog,  TV,  radio,   newspapers,  stores newspapers, stores Slide 7-114 Comparative Returns on Investment Figure  7. 9 Slide 7-115 Costs of Online Advertising Pricing  modelsBarter Cost  per  thousand  (CPM) Cost  per  click  (CPC)   Cost  per  action  (CPA)   Cost per action (CPA) Online  revenues  only Sales  can  be  directly  correlated Sales can be directly correlated Both  Ã‚  online/offline  revenues Offline  purchases  cannot  always  be  directly  related  to  online   Offli h t l b di tl l t dt li campaign In  general,  online  marketing  more   expensive  on  CPM   In general online marketing more expensive on CPM basis,  but  more  effective Slide 7-116 Web Site Activity Analysis b i i i l i Figure  7. 10 Slide 7-117 Insight on Technology It’s 10 P. M. Do You Know Who Is On Your Web Site? Class Discussion Slide 7-118Web Site †¦ as Marketing Communications Tool g Web  site  as  extended  online  advertisement W b i d d li d i Domain  name:  An  important  role   Domain name: An important role Search  engine  optimization:   Search engine optimization: Search  engines  registration Keywords  in  Web  site  description K d i W b it d i ti Metatag  and  page  title  keywords Links  to  other  sites k h Slide 7-119 Web Site Functionality b i i li Main  factors  in  effectiveness  of  interface Utility Ease  of  use Top  factors  in  credibility  of  Web  sites: Top factors in credibility of Web sites: Design  look Info rmation  design/structure g / Information  focusOrganization  is  important  for  first time  users,  but   Organization is important for first? time users but declines  in  importance Information content becomes major factor attracting Information  content  becomes  major  factor  attracting   further  visits Slide 7-120 Factors in Credibility of Web Sites Figure  7. 11 Slide 7-121 Table  7. 9 Slide 7-122 Chapter 8: Ethical, Social, and Political Issues in E-commerce E commerce Chapter 8 Ethics, Law, E-commerce Copyright  © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 8-123 Ethical, Social, Political Issues in E-commerceInternet,  like  other  technologies,  can: Internet like other technologies can: Enable  new  crimes Affect  environment Threaten  social  values Costs  and  benefits  must  be  carefully   considered,  especially  when  there  are  no   id d i ll h h g g clear? c ut  legal  or  cultural  guidelines Slide 8-124 Model for Organizing Issues Issues  raised  by  Internet  and  e? commerce  can  be  viewed  at  individual,   social,  and  political  levels social and political levels Four  major  categories  of  issues: Four major categories of issues: Information  rights Property  rights Property rights Governance Public  safety  and  welfare Slide 8-125Moral Dimensions of Internet Society M l Di i f I S i Figure  8. 1 Slide 8-126 Basic Ethical Concepts i hi l Ethics Study  of  principles  used  to  determine  right  and  wrong  courses  of   action Responsibility p y Accountability Liability Laws  permitting  individuals  to  recover  damages Due  process Laws  are  known,  understood Laws are known understood Ability  to  appeal  to  higher  authorities  to  ensure  laws  applied  correctly Slide 8-127 Analyzing Ethical Dilemmas l i hi l il Process  for  analyzing  ethical  dilemmas: 1. 2. 3. 3 4. 5. Identify  and  clearly  describe  the  facts Define  the  conflict  or  dilemma  and  identify  the   y higher? rder  values  involved Identify  the  stakeholders Identify the stakeholders Identify  the  options  that  you  can  reasonably   take t k Identify  the  potential  consequences  of  your   options Slide 8-128 Candidate Ethical Principles Golden  Rule Universalism Slippery  Slope Collective  Utilitarian  Principle Risk  Aversion Ri k A i No  Free  Lunch The  New  York  Times  Test The  Social  Contract  Rule Slide 8-129 Privacy & Information Rights Privacy: Moral  right  of  individuals  to  be  left  alone,  free   from  surveillance  or  interference  from  other   individuals  or  organizations Information  privacy p y Subset  of  privacy Includes:The  claim  th at  certain  information  should  not  be   collected  at  all The  claim  of  individuals  to  control  the  use  of  whatever   h l i f i di id l l h f h information  is  collected  about  them Slide 8-130 Privacy & Information Rights (cont. ) Major  ethical  issue  related  to  e? commerce   and  privacy:   d i Under  what  conditions  should  we  invade  the   privacy  of  others? Major  social  issue:   j Development  of  Ã¢â‚¬Å"expectations  of  privacy†Ã‚  and   privacy  norms privacy norms Major  political  issue: Development  of  statutes  that  govern  relations   D l t f t t t th t l ti between  recordkeepers  and  individuals Slide 8-131 Information Collected at E-commerce SitesData  collected  includes Personally  identifiable  information  (PII) Anonymous  information Anonymous information Types  of  data  collected yp Name,  a ddress,  phone,  e? mail,  social  security Bank  and  credit  accounts,  gender,  age,  occupation,   B k d di d i education Preference  data,  transaction  data,  clickstream  data,   browser  type Slide 8-132 Social Networks & Privacy Social  networks Encourage  sharing  personal  details Pose  unique  challenge  to  maintaining   privacy Facebook s  Beacon  program Facebook’s Beacon program Facebook s  Terms  of  Service  change Facebook’s Terms of Service change Slide 8-133 Profiling & Behavioral Targeting ProfilingCreation  of  digital  images  that  characterize  online  individual  and   group  behavior Anonymous  profiles A fil Personal  profiles Personal profiles Advertising  networks Track  consumer  and  browsing  behavior  on  Web T k db i b h i W b Dynamically  adjust  what  user  sees  on  screen Build  and  refresh  profiles  of  consumers Google’s AdWords program Slide 8-134 Profiling & Behavioral Targeting (cont’d) Deep  packet  inspection Business  perspective: Web  profiling  serves  consumers  and  businesses Increases  effectiveness  of  advertising,  subsidizing  free   content Enables  sensing  of  demand  for  new  products  and  services Critics  perspective:Undermines  expectation  of  anonymity  and  privacy Consumers  show  significant  opposition  to  unregulated   collection  of  personal  information Enables  weblining Slide 8-135 Internet & Government Invasions of Privacy Various  laws  strengthen  ability  of  law  enforcement   agencies  to  monitor  Internet  users  without   i i I ih knowledge  and  sometimes  without  judicial  oversight CALEA,  PATRIOT  Act,  Cyber  Security  Enhancement  Act,   Homeland  Security  Act Government  agencies  are  largest  users  of  private   sector  commercial  data  brokers sector commercial data brokers Retention  by  ISPs  of  user  data  a  concern Slide 8-136Legal Protections In  U. S. ,  privacy  rights  explicitly  granted  or   derived  from Constitution   Constitution First  Amendment  Ã‚  Ã¢â‚¬â€œ freedom  of  speech  and  association Fourth  Amendment  Ã‚  Ã¢â‚¬â€œ unreasonable  search  and  seizure F th A d t bl h d i Fourteenth  Amendment  Ã‚  Ã¢â‚¬â€œ due  process Specific  statutes  and  regulations  (federal  and   Specific statutes and regulations (federal and state) Common  law Slide 8-137 Informed Consent U. S. firms  can  gather  and  redistribute   transaction  information  without  individual’s   i i f i ih i di id l’ informed  consent Illegal  in  Europe Informed  consent: Opt? in   Opt out Opt? out Many  U. S. ? commerce  firm s  merely  publish  information   p practices  as  part  of  privacy  policy  without  providing  for   p p yp y p g any  form  of  informed  consent Slide 8-138 FTC’s Fair Information Practices Principles Federal  Trade  Commission: Federal Trade Commission: Conducts  research  and  recommends  legislation  to  Congress Fair  Information  Practice  Principles  (1998): Fair Information Practice Principles (1998): Notice/Awareness  (Core) Choice/Consent  (Core) Choice/Consent (Core) Access/Participation Security Enforcement Guidelines,  not  laws Guidelines not laws Slide 8-139 FTC’s Fair Information Practice PrinciplesNotice/Awareness i / Sites  must  disclose  information  practices  before  collecting  data. Includes Sit t di l i f ti ti b f ll ti d t I l d identification  of  collector,  uses  of  data,  other  recipients  of  data,  nature  of   collection  (ac tive/inactive),  voluntary  or  required,  consequences  of  refusal,  and   steps  taken  to  protect  confidentiality,  integrity,  and  quality  of  the  data Choice/Consent There  must  be  a  choice  regime  in  place  allowing  consumers  to  choose  how   their  information  will  be  used  for  secondary  purposes  other  than  supporting   the  transaction,  including  internal  use  and  transfer  to  third  parties.Opt? in/Opt? out  must  be  available. Consumers  should  be  able  to  review  and  contest  the  accuracy  and   completeness  of  data  collected  about  them  in  a  timely,  inexpensive  process. Access/Participation ccess/ a c pa o Security y Enforcement Data  collectors  must  take  reasonable  steps  to  assure  that  consumer   information  is  accurate  and  secure  from   unauthorized  use. There  must  be  in  place  a  mechanism  to  enforce  FIP principles. This  can  involve  self? regulation,  legislation  giving  consumers  legal   remedies  for  violations,  or  federal  statutes  and  regulation. di f i l ti f d l t t t d l ti Slide 8-140FTC Recommendations: Online Profiling Principle p Notice Recommendation Complete  transparency  to  user  by  providing  disclosure  and  choice  options   on  the  host  Web  site. â€Å"Robust†Ã‚  notice  for  PII  (time/place  of  collection;   before  collection  begins). Clear  and  conspicuous  notice  for  non PII. before  collection  begins). Clear  and  conspicuous  notice  for  non? PII. Opt? in  for  PII,  opt? out  for  non? PII. No  conversion  of  non? PII  to  PII  without   consent. Opt? out  from  any  or  all  network  advertisers  from  a  single  page   consent Opt out from any or all network advertisers from a single page provided  by  the  host  Web  site.Reasonable  provisions  to  allow  inspection  and  correction. Reasonable  efforts  to  secure  information  from  loss,  misuse,  or  improper   access. Done  by  independent  third  parties,  such  as  seal  programs  and  accounting   Done by independent third parties such as seal programs and accounting firms. medical  topics,  sexual  behavior  or  sexual  orientation,  or  use  Social  Security   medical topics sexual behavior or sexual orientation or use Social Security numbers  for  profiling. Slide 8-141 Choice Access Security EnforcementRestricted  Collection Advertising  networks  will  not  collect  information  about  sensitive  financial  or European Data Protection Directive Privacy  protection  much  stronger  inà ‚  Europe  than  U. S. European  approach:   Comprehensive  and  regulatory  in  nature p g y European  Commission’s  Directive  on  Data  Protection   (1998):   (1998): Standardizes  and  broadens  privacy  protection  in  European  Union   countries Department  of  Commerce  safe  harbor  program: For  U. S. firms  that  wish  to  comply  with  Directive Slide 8-142 Private Industry Self-RegulationSafe  harbor  programs: Private  policy  mechanism  to  meet  objectives  of   Pi t li h i t t bj ti f government  regulations  without  government  involvement e. g. Privacy  seal  programs e g Privacy seal programs Industry  associations  include: Online  Privacy  Alliance  (OPA) Network  Advertising  Initiative  (NAI) CLEAR  Ad  Notice  Technical  Specifications Privacy  advocacy  groups Emerging  privacy  protection  business Slide 8-143 Insight on Business Chief Privacy Officers hi f i ffi Class Discussion Slide 8-144 Technological Solutions Spyware,  pop? p  blockers Cookie  managers k Anonymous  remailers,  surfing Anonymous remailers surfing Platform  for  Privacy  Preferences  (P3P):   Comprehensive  technological  privacy  protection  standard Works  through  user s  Web  browser Works through user’s Web browser Communicates  a  Web  site’s  privacy  policy Compares  site  policy  to  user’s  preferences  or  to  other  standards   such  as  FTC’s  FIP  guidelines  or  EU’s  Data  Protection  Directive Slide 8-145 How P3P Works k Figure  8. 2(A) Slide 8-146 Insight on Technology The Privacy T Th P i Tug of War: fW Advertisers Vs. Consumers Class Discussion Slide 8-147 Intellectual Property Rights Intellectual  property:Encompasses  all  tangible  and  intangible  products  of  human   mind Major  ethical  issue: j How  should  we  treat  property  that  belongs  to  others? Major  social  issue: Major social issue: Is  there  continued  value  in  protecting  intellectual  property  in  the   Internet  age? Major  political  issue: How  can  Internet  and  e? commerce  be  regulated  or  governed  to   g g protect  intellectual  property? Slide 8-148 Intellectual Property Protection Three  main  types  of  protection: Copyright Patent Trademark  law Trademark law Goal  of  intellectual  property  law: Balance  two  competing  interests  Ã¢â‚¬â€ public  and   B l t ti i t t bli d privateMaintaining  this  balance  of  interests  is  always   M i t i i thi b l fi t t i l challenged  by  the  invention  of  new   technologies Slide 8-149 Copyright Protects  original  forms  of  expression  (but  not   ideas)  from   being  copied  by  others  for  a  Ã‚   ideas) from being copied by others for a period  of  time Look  and  feel  copyright  infringement  lawsuits Fair  use  doctrine Fair use doctrine Digital  Millennium  Copyright  Act,  1998 First  major  effort  to  adjust  copyright  laws  to  Internet  age Implements  WIPO  treaty  that  makes  it  illegal  to  make,   distribute,  or  use  devices  that  circumvent  technology? ased  protections  of  copyrighted  materials Slide 8-150 Patents Grant  owner  20? year  monopoly  on  ideas  behind  an   invention Machines Man? made  products p Compositions  of  matter Processing  methods Invention  must  be  new,  non? obvious,  novel Encourages  inventors g Promotes  dissemination  of  new  techniques  through   licensing Stifles  competition  by  raising  barriers  to  entry Slide 8-151 E-co mmerce Patents 1998  State  Street  Bank  &  Trust  v. Signature  Financial   Group Business  method  patents Led  to  explosion  in  application  for  e? commerce  Ã¢â‚¬Å"business   L dt l i i li ti f â€Å"b i methods†Ã‚  patentsMost  European  patent  laws  do  not  recognize   M tE t tl d t i business  methods  unless  based  on  technology Examples Amazon’s  One? click  purchasing DoubleClick’s  dynamic  delivery  of  online  advertising Slide 8-152 Trademarks d k Identify,  distinguish  goods  and  indicate  their   source Purpose p Ensure  Ã‚  consumer  gets  what  is  paid  for/expected  to  receive Protect  owner  against  piracy  and  misappropriation Infringement Market  confusion Bad  faith Dilution Behavior  that  weakens  connection  between  trademark   and  product Slide 8-153 Trademarks & Internet CybersquattingAnticy bersquatting  Consumer  Protection  Act  (ACPA) Cyberpiracy Typosquatting Metatagging M i Keywording y g Deep  linking Framing Slide 8-154 Governance Primary  questions Who  will  control  Internet  and  e? commerce? What  elements  will  be  controlled  and  how? What elements will be controlled and how? Stages  of  governance  and  e? commerce g g Government  Control  Period  (1970–1994) Privatization  (1995–1998) Privatization (1995 1998) Self? Regulation  (1995–present) Government  Regulation  (1998–present) Slide 8-155 Who Governs E-commerce & Internet? Mixed  mode  environmentSelf? regulation,  through  variety  of  Internet  policy   and  technical  bodies,  co exists  with  limited   and technical bodies co? exists with limited government  regulation ICANN  :  Domain  Name  System Internet  could  be  easily  controlled,   I t t ld b il t ll d m onitored,  and  regulated  from  a  central   location Slide 8-156 Taxation E? commerce  taxation  illustrates  complexity  of   governance  and  jurisdiction  issues governance and jurisdiction issues U. S. sales  taxed  by  states  and  local  government MOTO  retailing E? commerce  benefits  from  tax  Ã¢â‚¬Å"subsidy† yOctober  2007:  Congress  extends  tax  moratorium  for   an  additional  seven  years an additional seven years Unlikely  that  comprehensive,  integrated  rational   approach  to  taxation  issue  will  be  determined  for   approach to taxation issue will be determined for some  time  to  come Slide 8-157 Net Neutrality Currently,  all  Internet  traffic  treated  equally  Ã¢â‚¬â€œ all  activities  charged  the  same  rate,  no   ll i i i h d h preferential  assignment  of  bandwidth Backbone  providers  would  like  to  charge   differentiated  prices  and  ration  bandwidth 2010,  U. S. ppeals  court  ruled  that  FCC  had  no   authority  to  regulate  Internet  providers Slide 8-158 Public Safety & Welfare Protection  of  children  and  strong   g sentiments  against  pornography Passing  legislation  that  will  survive  court   P i l i l ti th t ill i t challenges  has  proved  difficult Efforts  to  control  gambling  and  restrict   sales  of  drugs  and  cigarettes sales of drugs and cigarettes Currently  mostly  regulated  by  state  law Unlawful  Internet  Gambling  Enforcement  Act Slide 8-159 Insight on Society Internet Drug Bazaar Class Discussion Slide 8-160