Wednesday, July 31, 2019

Arsenal Holding PLC Essay

This composition is a SWOT analysis of the company Arsenal Holding PLC; whose main product is the Famous English football club ARSENAL FC which is based in Holloway, London and is one of the most successful clubs in English football with thirteen first division titles and ten FA cups and also a record of the longest uninterrupted period in the English top flight.( Wikipedia) What is SWOT? SWOT represents the output of a marketing audit analysis and is essentially the analysis of the environmental factors and the internal appraisal part of the marketing audit. It stands for Strengths, weakness, opportunities and threats. Assessment of this SWOT factors together with an evaluation of its implications is a key part of objective marketing planning.(G.Lanchester and L. Massingham (1996) It is also important to note that SWOT ANALYSIS should be ranked in other to emphasis the importance of each point. The company Arsenal holding plc is the parent company of Arsenal FC and operates as a non-quoted public limited company a variation from other clubs. Only 62,217 Arsenal shares have been issued and they aren’t traded on any public exchange apart from rather infrequently on Plus market ;a specialist market.A single share in Arsenal had a mid share price of  £10,250,which set the companies capitalisation value at approximately  £637.74m.(wikipedia). Its Business Most of its business activities evolve around the Arsenal FC brand which is globally known as a top football club which performs consistently at the highest level in England and Europe. Football being an internationally accepted sport with Europe being the center piece of this affection, it has been suggested that the English Premiership is arguably the most colourful and entertaining League in the world with a viewer following that could be estimated into hundreds of millions weekly and Arsenal would also arguably be elected as its most entertaining team with millions of fans world wide. This Financial wise interprets into a massive brand image and which would  brings cash flow from; image rights of its players and the club, income and earnings from trophy wins and participation in the league and European competitions, Sale of players, television rights, sales of club merchandise and collecting gate for home games. Strengths 1. A very strong globally known brand 2. Large global fan base 3. Large stadium 4. Lot of large corporations interest in brand 5. Location in England and London 6. A few big and expensive players 7. Great history 8. Interesting records and achievements 9. Loyal fans 10. Colourful football and brand colour 11. Effective management Weaknesses 1. Inability to win trophy 2. Inability to compete financially with the best in Europe 3. Inability to keep its best players 4. Inability to convince fans of interest in football success 5. To many inexperienced players in squad 6. Small football squad Opportunities 1. A lot of young potential talents in the squad 2. Recent penetration into Asian market 3. Emergence of FIFA fair play rule 4. Emergence of very defensive teams playing unattractive football 5. Growing English national’s membership in the squad 6. Increasing interest in the English premiership and the European champions league globally Threats 1. European crises 2. Emergence of clubs funded by oil barons 3. Increasing wage structures in the premiership 4. Increasing player valuation 5. Increasing cases of player disloyalty 6. Unhappy fans 7. Resurgence of Tottenham their London rivals 8. Chelsea’s champions league win Evaluation and analysis The SWOT analysis as seen above, appears to be highly invested in the activities of Arsenal FC, this is because the club is a business institution which has an annual financial statement and is run by its parent company Arsenal holdings, which makes the activities of the club and its environment worthy of note. The analysis evolves around the clubs past and present positions and performances; its strengths revolves around the brand and how established it is, pointing out the colourfulness of both the clubs chosen colours and style of football it represents. It also points at the size of its stadium which is regularly filled up and which amounts to large amount of tickets sold. Its weaknesses evolve around its current inability to win trophies and also current financial restrictions as opposed to its main competitors who have a lot more to spend Opportunities looks at its youth policy; a system where by they buy a player most times cheaply and groom him after a few years into an inter national star with the club as his stage. The result of this is that the player’s value increases immensely and with the current state of transfer developments, beyond proportion. It also looks at the fair play rule which if put into effect by UEFA,the body that governs football in Europe will stifle the current dominance of some of its competitors. The threats point at the current crisis in Europe as its most important highlight, as if there is no money there will no body to buy tickets or purchase the goods that the club brands. It also considers its competitors as a major threat, because of the seeming limitless wealth some of them posses. *Note Players leaving the club on the short term is not a danger as it brings about healthier balance sheets and bigger profits, as the players are sold for huge fees, but in the long term it affects the clubs image and reputation and cause an increase in fan disloyalty, so it should be seen as both a weakness and a threat. Conclusion From the SWOT you can conclude that the company has a high amount of strengths compared to the other categories, its weaknesses are quite a few but the man danger lies in its threats, with the key one of note being the crisis in Europe which is affecting all businesses in general, the other threats appear manageable when compared more of the same is advised to sustain the club. REFRENCE G.Lanchester and L. Massingham., Strategic Marketing planning and evaluation, (1996) www.wikepedia.com

Tuesday, July 30, 2019

Electromagnetic Radiation and Valence Electrons

Introductory Chemistry, 2e (Tro) Chapter 9 – Electrons in Atoms and the Periodic Table True/False Questions 1) When the elements are arranged in order of increasing number of protons, certain sets of properties recur periodically. 5) A particle of light is called a packet. 9) Ultraviolet light produces suntans and sunburns. 13) Electrons behave like particles and we can describe their exact paths. 17) The ground state is when an electron in an atom is excited into the lowest possible vacant orbital. 21) Bromine has 17 valence electrons. 5) The atomic radius of lithium is larger than the atomic radius of nitrogen. Multiple Choice Questions 29) The number of cycles of a wave that passes a stationary point in one second is called its A) wavelength B) frequency C) crest D) trough E) none of the above 33) Which color of the visible spectrum has photons with the most energy? A) red B) orange C) green D) violet E) yellow 37) Which form of electromagnetic radiation has the longest wav elength? A) Radio Waves B) Microwaves C) X-rays D) Gamma Rays E) Infrared Radiation 41) Which form of electromagnetic radiation has photons with the lowest energy?A) Radio Waves B) Microwaves C) X-rays D) Gamma Rays E) Infrared Radiation 45) Which statement below does NOT follow the Bohr Model? A) When energy is absorbed by atoms, the electrons are promoted to higher-energy orbits. B) When an atom emits light, electrons fall from a higher orbit into a lower orbit. C) The energy emitted from a relaxing electron can have any wavelength. D) Electrons exist in specific, quantized orbits. E) none of the above 49) How many subshells are there in the n = 4 principal shell?A) 1 B) 2 C) 3 D) 4 E) not enough information 53) Which one of the following is the correct orbital diagram for nitrogen? A) ^v ^v v v ^ B) ^v vv v ^ ^ C) ^v vv ^ ^ ^ D) ^v ^v ^ ^ ^ E) none of the above 57) How many electrons are unpaired in the orbitals of nitrogen? 61) How many core electrons are in a chlorine atom? A) 14 B) 5 C) 9 D) 3 E) none of the above A) 1 B) 17 C) 10 D) 7 E) none of the above 65) What do the alkali metals all have in common? A) They all undergo similar reactions. B) They all have similar physical properties. C) They all form +1 ions.D) They all have the same number of valence electrons. E) all of the above 69) The size of an atom generally increases A) down a group and from right to left across a period. B) up a group and from left to right across a period. C) down a group and from left to right across a period. D) up a group and from right to left across a period. E) up a group and diagonally across the Periodic Table. 73) Which of the following atoms is the smallest? A) Li B) Be C) B D) O E) Ne Answers 1t 5f 9t 13f 17f 21f 25t 29b 33d 37a 41a 45c 49d 53d 57d 61c 65e 69a

Classical Management Theorists Frederick Taylor and Henri Fayol

Management approaches Andrew Vasylenko Scientific advisor – Senior teacher Hvan A. V. Poltava University of Economics and Trade Management in all business areas and organizational activities are the acts of getting people together to accomplish desired goals and objectives efficiently and effectively. Management comprises planning, organizing, staffing, leading or directing, and controlling an organization (a group of one or more people or entities) or effort for the purpose of accomplishing a goal. Resourcing encompasses the deployment and manipulation of human resources, financial resources, technological resources, and natural resources.Because organizations can be viewed as systems, management can also be defined as human action, including design, to facilitate the production of useful outcomes from a system. There are 6 management approaches, such as: The classical approach The human resource approach The quantitative approach The process approach The contingency approach The system approach 1. Frederick Taylor and Henri Fayol were both theorists of the classical management movement. The classical approach was the framework to what management is all about. Therefore it can be said that they laid the foundation for many theorists.Frederick Taylor was an important theorist of the early 20th century and he made many important contributions to management. He proposed the principles of scientific management which he believed would improve industrial efficiency. He believed management could be formulated as a discipline. Taylor’s principles of scientific management focused on cooperation between management and the workers as well as improving the technical skills of the workers. His approach is often referred to scientific management, Taylorism or Taylor’s principles. Fayol’s uggested that there were five main roles of managers, these being planning, organising, commanding, coordinating and controlling. 2. The Human Resources Manageme nt function includes a variety of activities, and key among them is deciding what staffing needs you have and whether to use independent contractors or hire employees to fill these needs, recruiting and training the best employees, ensuring they are high performers, dealing with performance issues, and ensuring your personnel and management practices conform to various regulations.Activities also include managing your approach to employee benefits and compensation, employee records and personnel policies. 3. Quantitative Management (also known as Operations Research) offers a systematic and scientific approach to problem solving and decision making in complex environments and situations of uncertainty and conflict. The discipline is characterised by a search for an optimal (best) answer for a problem by using quantitative (numerical) models. The use of mathematical models enables a decision maker to bett er understand the problems facing him/her and provides a tool for making inform ed and reasoned judgements.It can be applied in many areas: manufacturing, businesses management, banking, environmental planning, mining, housing and engineering projects, management consultancy – in fact, in every situation where numerical data are available and management or decision making takes place. 4. The process approach is a management strategy. When managers use a process approach, it means that they manage the processes that make up their organization, the interaction between these processes, and the inputs and outputs that glue these processes together. There are 12 typrs of processes: 1.Quality Management Process 2. Resource Management Process 3. Training and Awareness Process 4. Product Purchasing Process 5. Design and Development Process 6. Production Management Process 7. Service Provision Process 8. Product Management Process 9. Customer Relationship Management Process 10. Internal Quality Management Audit Process 11. Monitoring and Measuring Process 12. Man agement Review Process 5. The contingency approach believes that it is impossible to select one way of managing that works best in all situations like promoted by Taylor.Their approach is to identify the conditions of a task (scientific management school), managerial job (administrative management school) and person (human relations school) as parts of a complete management situation and attempt to integrate them all into a solution which is most appropriate for a specific circumstance. Contingency refers to the immediate (contingent or touching) circumstances. The manager has to systematically try to identify which technique or approach will be the best solution for a problem which exists in a particular circumstance or context.An example of this is the never ending problem of increasing productivity. The different experts would offer the following solutions: Behavioral scientist: create a climate which is psychologically motivating; Classical management approach: create a new ince ntive scheme; Contingency approach: both ideas are viable and it depends on the possible fit of each solution with the goals, structure and resources of the organization. 6. Applying the principle of system approach to management typically leads to: – Structuring a system to achieve the organization's objectives in the most effective and efficient way. Understanding the interdependencies between the processes of the system. – Structured approaches that harmonize and integrate processes. – Providing a better understanding of the roles and responsibilities necessary for achieving common objectives and thereby reducing cross-functional barriers. – Understanding organizational capabilities and establishing resource constraints prior to action. – Targeting and defining how specific activities within a system should operate. – Continually improving the system through measurement and evaluation.

Monday, July 29, 2019

Overly Pushy Leaders in an Organization Essay Example | Topics and Well Written Essays - 1250 words

Overly Pushy Leaders in an Organization - Essay Example This was mostly due to the factors like intimacy, affection and above all respect that have helped the acceptability of pushy behavior of managers. But at the same time the very pushy manages have also acted as a retarder in highly efficiently functioning environment. This was mostly due to the disappointment in the minds of supervisors and disillusionment among the workers. The performance gained through over pushy managers is observed to be unsustainable. The results generated in these circumstances were always due to the high work pressure and hence, unless the pressure is maintained the expected outputs couldn't be attained at a later time. The research studies undertaken earlier have clearly demonstrated the perception of the employees under the pushy leaders in organization. The present day challenge is to ensure a highly productive team of employees in the organizational system. Though different strategies have been tested and is often concluded that the personal attributes of managers or leaders of the group are very vital to meet the objectives within the allocated resources. The impact of pushy mangers is found to be very significant in these type of situations. Hence, further research is required to understand the implications of pushy type managers on long term performance of the organization. Though the well established management principles states that entire works need to be specified in detail and need to be well specified to distinct units of operation to enable the organizations to function as a 'well oiled machine' (Plsek and Wilson, 2001). In most of the working environments any better strategies for change have been followed by stiff resistance by the employees. Even in the case of highly skilled group of work force and professional, like health care sector, the employees were not inclined for such detailing of operations assuming it not very significant in improving the function. Another initiative that was tried is using the dynamic management of internal information systems (Nonaka et al, 2000). These approaches though undertaken with maximum care and efficiency were unable to bring out the desired results from the delivery perspective. Though the top management could be informed of the strengths and weakness in the system as a result of these better initiativ es, the systems were often found to be ill-equipped for the corresponding reverse flow of information which was required for improving the operational efficiency of the entire workforce of the organization. Grey areas demanding attentionCreation of better value culture by the top level managers for the enhanced productivity and innovation in organizations was also tried in the past (Michael et al, 2004). All these methods have relied on the activities of the managers towards the objectives rather than the results expected from the activities. Thus for the organizations to be more competitive and successfully pushy managers in organizations are inevitable (Pacella, 2009). In order to bring in a huge transformation in the organizational performance , it is recommended that the top management team need to have the ability to develop, model and exchange the vision for the organization, provide grater support to innovativeness besides having flexibility that allow the employees to take

Sunday, July 28, 2019

The different definitions of success Assignment

The different definitions of success - Assignment Example This was explicitly described by an observation of American society in 1955: To be poor in a status society meant that a mans life was hard, but at least it was not shameful; if he made the best of a bad bargain, that was all that was expected. But in the fluid, mobile world of American society, a poor man was supposed to rise; not to do so was a sign of weakness, if not a badge of immorality ( Lynn, 1955). Lynn’s description of how American society valued success in the 50s is no more different on how society value success nowadays. Hollywood stars are considered successful once they have garnered several awards despite the fact that some films do not even imbibe ethics or morality at all. Success is viewed by the secular world as an accomplishment in any field, no matter what means was employed to hit the target or reach the goal. However, success should not be viewed by its ends alone. Success is like cooking your favorite dish, certain ingredients are needed to create a dish. The following stories of people who succeeded would reveal to us later why success is similar to the simple but skillful art of cooking. Today in the United States, there is an African American president. After so many years of oppression, and fighting, it is a very great achievement for any American to see. Overcoming the racial barriers, and all other obstacles, Barack Obama was sworn in as the 44th President of the United States. Coming from a humble background, the son of a Kenyan immigrant, and an American mother from Kansas, Obama worked hard since a young age to achieve what he thought and knew could be his full potential. 4 p.m, Ayo got back from school daily. His dad, an extremely rich Nigerian senator, and Harvard graduate did not live with him, instead, he lived with his mother a stay at home mom. Ayo’s parents never got married, he lived with his

Saturday, July 27, 2019

Philosophy Essay Example | Topics and Well Written Essays - 1250 words - 4

Philosophy - Essay Example For this argument to proceed Aquinas’s idea is that human beings have to think of something as an effects of God and in the fourth way of argument, this thing is the best effect of God The understanding of the Aquinas’s arguments for the existence of god therefore begins with the analysis of his gradation criteria. He talks about good, better, and best. He finds some things to be â€Å"better†, true, and noble while others are less good, true or noble respectively (Elders, 114). In this way of argument, it is difficult to integrate his arguments especially when it comes to this kind of comparison. Many philosophers and researchers have questioned his arguments asking questions. For example if comparing two or more things, then you say that A is better than B, is Aquinas trying to assert that there is something better compared to the two and many others whose perfection cannot be challenged? This forms the basis for criticisms of the Aquinas fourth argument. The c hallenge here is to prove that there is actually something that is perfect beyond improvement. However as observed by Soccio (228), it would be misleading to argue that given a number of things with different degrees of goodness, there is one among those things that would not be possible to make any changes with regard to improving it. In other words, he asserts that there is no point believing Aquinas’s idea that there is something perfect beyond improvement. It therefore forms the weaker point of the Aquinas arguments since he believes that if we have to group different things together, yes we will have some of the best things, however, it would still be possible to improve that thing with regard to the degree of goodness. It is also possible to improve better to become better than the best. Another critic of Aquinas’s fourth way of argument is that he describes God in a sequence of being best among a group but denies later in the proceeding metaphors that he cannot group him in a group of the same kinds. In the next lines, he states that he does not think of God as the best or a group of things that can be graded together with respect to intelligent (Soccio, 230). The question therefore is; how can you compare things as good, better and best or truer, nobler, etc if in the first place you can’t group them together or they are not similar? In this way, it does not explain or describe the truth about the existence of God in this fourth way of argument because it is not clear. While Aquinas describes the effects, it is also important to note that we can only compare things with similar characteristics but God has no characteristics similar to any as he explains. However other philosophers have argued that this use of parallel texts is not misleading but it is misinterpreted by the individual’s readers of the Aquinas texts. According to Wippel (469), the perfections mentioned by the Aquinas are the transcendental perfections. In this context the interpretation of things like the â€Å"more† or less do not necessarily mean that the arguments are based on the things that are perceived by the senses and known by the intellect. In this point of view, the true of the text does not refer to the logical truth of intellect but to the ontological truth of things. With this regard, it is

Friday, July 26, 2019

Management Planning Essay Example | Topics and Well Written Essays - 2000 words

Management Planning - Essay Example In words by Nash (2006) planning of management systems ensures there is a perfect flow of ideas and strategies throughout a specific period of time and of the required consistency. The same sentiments are reiterated by Humby, Hunt & Philips (2006) who argues that consistency in the management team creates the whole difference in terms of excellence and success in an organization. Management planning involves all the factors and department in an organization. All departments in an organization have different objectives and goals set to them for achievement. For a good management team, all these objectives should be achieved within the specified timeline and by the required standards. In creating a good management planning systems, department heads should be included in the planning structure. In support of this suggestion, Vanessa (2010) argues that management planning involves more of incorporation of the whole organization rather than the top management team. The author further argu es that employees should also be considered when formulating a management plan. The brief of the paper will be an inclusion of the factors that affect managerial performance. Additionally, solutions and suggestions to solve these factors will be provided. For a clear perspective, the paper will analyze the managerial performance of TESCO PLC Company. ... In its operation, the companies sell at least 40, 000 products in its stores. From its sales, their brand accounts for a total of 50% of the sales (Datamonitor, 2004). This fact has been made possible by the fact that the organization has been in the market for a significant period to gain a large competitive advantage and consumer support. The total accounted for customers of the organization add up 3.4 million people (Datamonitor, 2004). Apart from the external environment success, the internal arrangement of the organization is outstanding. The organization has a well formulated and compact managerial team headed by the chairman of the executive board. Beneath the chairman there are numerous executive positions that are aimed at subdividing the managerial responsibilities across the whole organization. The organization has seven executive board members in managerial positions and seven non executive board members in the other managerial positions. An inclusion to the management te am is the company secretary who falls under the senior management team (Datamonitor, 2004). Explain how interpersonal relationships and communication skills affect managerial performance In any organization communication and relationships form the basis of the success of an organization. In words by Jordan (2008) interpersonal relationships in an organization shape the organizational culture. The author further argues that communication in an organization is a great determinant of the organizational culture in an organization. The effect of these two factors on the managerial performance is based on the specific requirements of the employees. For instance, the management team is provided with the obligation of providing instructions and

Thursday, July 25, 2019

The library research essay Example | Topics and Well Written Essays - 1000 words - 1

The library research - Essay Example Considering the ages that play video games, teenagers are worst affected in terms of time taken, and research has shown that most of the teenagers take about average of 4-5 hours a day; thus, in most cases, the parents dislike video games since they are considered the facilitating factor for laziness on children. Video games are addictive just like drugs do, it makes those addicted especially the teenagers to abscond most of the important activities in the day, without guidance, it can destructive but can be beneficial to the players if considered carefully. There is a significant contribution of spatial reasoning in education, and there is a connection between those children that are good in spatial reasoning and there performance in IQ tests. In this regard, those children who have good spatial skills do excel in geometry and demonstrates good mental manipulation and navigation skills. In terms of gender, girls are considered not to easily adapt to spatial reasoning growth compared to boys, improvement of spatial reasoning is enhanced by playing video games, in this case, the skills required to play the game that also involves manipulation and anticipation of the objects, which eventually improves the skills of spatial reasoning (Anderson, Douglas, and Katherine 45). Furthermore, there is a special skill acquired through critical thinking, with critical thinking, one is able to master concepts rather than just memorize those concepts. Critical thinking is very important in making insights in technical subjects like engineering, math, science, and even humanities, in the playing of the video games, there are novels of problems that are presented to the person playing the game and needs a split of a second to solve (Anderson, Douglas, and Katherine 49). In this case, the gamers will have to learn how to think quickly and in several ways within a short time, the same speedy solution to a problem by provision of many options is transferred to other real life situ ation and the teenagers that play such video games have high chances of sharpening the critical thinking. In addition, the fact that video games are designed to be more realistic and the concern that it might increase violent activities is not true, as most of the video games today have been used to pass specific knowledge and have dominated teaching in institution. Simulation using video games are today used in surgery schools and can pass important information to the teenager who wants to acquire specific skills like surgery. There is also a sense of rehabilitation that comes with video game playing, for instance, there is a 13-year-old boy who suffered Erb’s palsy noticed remarkable improvement on how to control his arms after video games play (Bissell 32). Additionally, there is a false stereotype that is given to those who play video games, they are described as those who are antisocial and cannot lose an eye off the screen, this position is not true because the contempo rary video games are designed in a way that it helps in solving problem and complete tasks. There is the sense of building social skills especially those who are introverted; they get a solace from the video games that provide a stress free way for social interaction

Wednesday, July 24, 2019

What kinds of consent are there Can any of them explain our obligation Essay

What kinds of consent are there Can any of them explain our obligation to obey the state's commands - Essay Example dominion of a prince, which one might leave, every individual has given a tacit consent to his authority, and promised him obedience; it may be answered, that such an implied consent can only have place, where a man imagines, that the matter depends on his choice.† (Hirschhorn 2004), further demonstrates consent and notes, â€Å"Failure to follow ethical principles in the informed consent process can result in serious legal action through tort law (civil wrongdoing) and even criminal law, the lack of informed consent constitutes assault and battery.† Related to political theory, there are three main types of consent that will be explored. They are express, tactic and hypothetical. Although there are other forms in political theory, these are three main to be explored as they are the primary cause for debate within the spectrum. Express consent can be defined as total agreement with an order, demand or request. An example of this would be if someone was asked to meet at a location and they agreed. Another example would be if a state law required that all drivers wore their seatbelt and every driver of that state did while driving. Complying, agreeing and deciding to comply with a request, is express consent. In democratic nations, this is easier to define as the people elect officials to represent them in their best interest. If they do not, then the elected official is not re-elected. People in democratic nations also have the ability to live where they chose and states have individual laws that are not applicable beyond their bounds. (Allsop 2011) states, â€Å"The reasons to obey the law may be either prudential or moral. Prudential reasons are related to self-interest. This theory states members of society conform to the law out of fear of punishment or being socially outcast for being labeled a criminal.† Although people will inherently have express consent for many laws in that state, they may not understand or be aware of all laws they are subject to

Answer the three discussion questions Assignment - 1

Answer the three discussion questions - Assignment Example Despite the rising level of crime, there are several impediment that block efforts to reduce crime. First, poverty is a significant force that curtails efforts to reduce crime. in some third world countries, poverty motivates citizens into engaging in crime. Second, corruption is another ill that allows criminals to roam in the open as they bribe police enforcement agencies from arresting them. Lastly, poor reforms and infrastructure are reasons that have contributed to lack of adequate measures to combat crime in many third world countries. Increased crime rates have significant political impact in third world countries. With high crime rates, governments have to build more prisons, increase sentencing structures and execute police reforms (Clear, Cole & Reisig, 2010). These efforts are critical in containing rising crime, but it also draws significant amount of taxpayers’ money. Increased crime is therefore, a force that has a severe political implication in third world countries. Virtual private networks offer organizations with security over public infrastructures that are unsecure. In a virtual private network, organizations use tunneling and security procedures to protect user data from hackers during transport. When organization uses the internet as a medium of connecting their systems, they face security risks such as eavesdropping (Whitman, & Mattord, 2012). However, a virtual private network use unsecured network to provide organizations with encryption that protects their data from hackers. An implementation of VPN, secures data transfers between remote locations. Organization networks play a significant role, but lack of security policies can lead to network breaches. In most cases, some organizations lack appropriate policies that govern how users utilize network infrastructure. As the e-Activity outlines, lack of proper regulations on the use of network infrastructure allowed the attack on the network. In the future, the use of network

Tuesday, July 23, 2019

Corporate Social Responsibility Report Essay Example | Topics and Well Written Essays - 1750 words

Corporate Social Responsibility Report - Essay Example The effectiveness of the classical model of self-regulation is of particular concern in this paper. The Classical Model of corporate responsibility argues that general interests of society can be met by different organizations, each of which plays a distinct role in the system (Okpara, & Idowu, 2013). The basic role of corporate bodies should, therefore, revolve around economic issues rather than social development. Rahim and Alam (2014) noted that the primary objective of the business entity should be to make the highest amount of profit, which practically propels executives to act in the best interest of their company shareholders, provided their actions are within the law. The basis of this concept is methodological individualism (Crane, & Matten, 2010). The belief implies that the entity is the most important asset in the system. Habisch (2005) noted that such parties pursue ways in which they can best meet their own interests and act logically to increase self-satisfaction. The classical theory requires that if a corporate body â€Å"X† has $10, 000 and it is badly in need of raw materials that would cost half the money to make a product for a period of one month, it would exchange $5,000 for the material. This implies that there are no grounds for the company to spend the entire money on the raw materials when half of the amount would meet the current demand. Such strategy makes the company and its shareholders happy, considering that they would easily access the remainder of the money and benefit from the profits made through the reasoned expenditure. According to Blowfield and Murray (2014), the invisible hand of parties working together in an environment where each party stands to gain mutually satisfying exchanges creates the platform for the most sustainable economic system. As such, the classical theory requires that a corporate body that is keen on fulfilling its utilitarian institutional obligations to society

Monday, July 22, 2019

Intergenerational Family Violence Essay Example for Free

Intergenerational Family Violence Essay The family violence has taken a new toll in the current times. The family violence has become very common indeed and the number of offenders in these crimes has increased far beyond the reach. The cases originate on daily basis and the statistics show that most of the times victims are females who are physically and mental abused in different ways. In these scenarios it has been observed that these events cause much more damage to the children who watch these events often. The child abuse on the other hand has also become debatable as the cases increase. The intergenerational family violence might not have been studied before but it has always been available to study whenever there is an event of family violence. The human nature is based on social learning theory. It is the human tendency to watch the behaviors and then try to implement in their personalities (Murrell et al, 2007). Behaviorists have put forward the theory that the social learning theory is applicable only when if it triggers a change in the behavior of the observer whereas the theorists say that the learning process is an ever going process and it is not incomplete if it doesn’t cause any change in the behavior (Kernsmith, 2006). Whatever the theorists and behaviorists state about the social learning theory, it is evident that the observations of these events cause damage to the future lives of those who watch these family violence events. Postmodern thinking supports these claims, stating that individuals â€Å"create the social reality for their behavior according to how they interpret norms in particular milieus† (Markward, 1997). Child abuse has different effects on the victims. Some children after these events become reserve and some become violent. Even also watching the abusing of their mothers in front of them creates a negative notion in their minds about the realities of life (Pollak, 2004). This is the learning process as described by the theorists. The observations made by child make a deep impact on the mind intentionally or unintentionally. Sometimes the action doesn’t come right after the observation. It is dependent about the mental strength of the individual on how much extreme extent he has to formalize his mind towards these events. But surely the mind is working as the interpretation process continues from time to time (Kernsmith, 2006). In order to cause change the mind works in such a way to determine how much impact such event has made. For example, continuous abusing observations might make the child to become violent at times, even if he is not violent the aggregation of emotions might be taking place in his mind which makes him to get reserved to the situations from time to time. A time comes when the mentality of the child becomes harnessed by the violent activities and he also starts to become violent at times (Corvo, 2006). Thus the change has been triggered in the behavior of the child after looking at these abusing events continuously. This makes the situation awful not only for the child because by this way they cause different violent activities and the victims may increase in numbers depending upon the strength of activities (Pollak, 2004). The violent psychology taken forward by the children has been creating lot of issues. The US population is filled with those who have tensions grown up in their households due to different financial and emotionally problems (Kernsmith, 2006). These usually end up fighting and one of them getting beaten. The children also come down in the impact of these fighting resulting in long term future damage to their lives. The behaviorists say that the children have a tendency to attract to those thing quickly which make a deep impact on their mind and heart. They are emotionally immature at early stages and an action like abusing them or their parents can increase their interest towards these activities (Murrell et al, 2007). It has also been observed that the continuous family violence has been exhibited by those who have gone through this violence before in their lives when they were young (Corvo, 2006). Thus an event like this happening in their early lives provides them the luxury to be like them in the future as they commit family violence by abusing their children and their spouses. Many researchers have observed a relation between the events happening in an early age of a young one when he experienced violence and those offences which he committed when he was adult. This phenomenon is now known as intergenerational transmission of violence and aggression. Researchers believe that the pattern of social learning theory makes its mark by providing the model to the child as he also sees the positive results due to this violence (Kernsmith, 2006). Most often the result of abusing her mother by her father results in the victory of the father due to his aggressive attitude and then therefore inherits these positive results to implement them in his behavior. Learning theories, such as socialization, social learning, and elements of feminist theory, asserts that behaviors are learned throughout our lives through our interactions with others. This is how the socialization then gets affected by the family violence as it is then exhibited outside the homes (Corvo, 2006). The social learning theory is based on the study of behaviors. With change in behaviors the extremism of these violent acts can be configured by the child as he observes all these events. When we critically evaluate the works of the researchers we come to know that there theories are practical and are very close to reality. That is, formally it was believed that the social learning theory doesn’t have any impact on the child’s behaviors and how he interprets different things and scenarios differently. These theories are nevertheless were thought to be just taught in the classrooms without any practical implementations to be viewed. But certain examples with results have provided the evidence that each and every action is based on some behavior and behavioral change in the children. Alan Sears has been the follower of the social learning theory and he stated the change to be inevitable in each case. It, however, depends upon the current and future scenarios when the person feels the extreme need to behave in a particular order. According to Hume Lock’s theory of empiricism the child mind is a blank slate after he is born. He just starts to observe things when his mind becomes little bit old. But still the child doesn’t have any ability to differentiate between the things quickly. He first acknowledges difference between things and then tries to remember them. The object of family violence plays its part when the child starts to learn these behaviors and try to compare them with others in contexts of their results. This learning process binds these actions in his mind and produce intimidation. The intimidation is considered as the urge of something to do. This urge is the force that drives the child to implement those actions which he had learnt over time and time. Now when this intimidation gets extreme, the action follows (Pollak, 2004). The strength of the action will be less at first but the result might be satisfying for him thus providing him the strength to commit this again. These continuous steps will make the child habitual of these things and the interpretation of things and difference between good and bad become ineligible in the mental stature of the child. The intimidation process is then followed by reinforcement. The reinforcement is the final phase of the social learning theory where the mind of the person has become mature enough to stand by his rules and principles and actions which he first observed and then followed over the course of his. The string of these events has made the mind to do violent as a good act and the maturity of the man accepts these actions as inevitable to bring about a change in others as well. In order to clearly view the reasons of these violent activities we have to go through a number of research steps through the prison record checks and the information provided by various NGOs. This information depicts the facts that the family violence is caused by difference in mental statures of the two who are involved. The gender differences, the act of domination by male on his spouse, the financial and emotionally tensions and the mentality of the person of his childhood when he would have experienced such event and would have thought that it will be better off to get aggressive and make people agree by force rather than negotiations, thus providing a lot easier battleground to them to conquer (Pollak, 2004). The intergenerational transmission of family violence has made the problems to arise in whole of the America. There are very common cases of these events taking place on common basis. People get hurt physically without any reasons and the innocent children who grow up by being abused or watching get people abused try to implement these behaviors afterwards. In order to remove these kinds of violent activities it is imperative that the laws should be made more severe for those who are adult and also they have to provide a facility where they can control their aggression and should be treated for the change in behaviors. The children which have been affected by these events should be taken in for great care as to change their pattern of thinking process which could benefit them in their future lives. References Murrell, Amy R. Christoff, Karen A. Henning, Kris R. (2007). Characteristics of Domestic Violence Offenders: Associations with Childhood Exposure to Violence. Springer Science + Business Media. Corvo, Kenneth. (2006). Violence, Separation, and Loss in the Families of Origin of Domestically Violent Men. Kernsmith, Poco. (2006). Gender Differences in the Impact of Family of Origin Violence on Perpetrators of Domestic Violence. Pollak, Robert A. (2004). An Intergenerational Model of Violence. Springer Verlag.

Sunday, July 21, 2019

Online Course Registration And Management System

Online Course Registration And Management System Currently the Microsoft IT Academy in Multimedia University Melaka using the website that hosted in MMU server to provide information regarding the course offered as well as the registration method to enroll on the specific course. As the course registration is still done manually, below is the summary of the problem on the manual method: User : It consumes time as user is not enabling to book the seat if they have not submitted the form manually together with official receipt to the instructor. The user can pay the registration trough many ways, such as Online Banking, but they still have to submit the official receipt taken from Multimedia University finance division. Administrator/Instructor : Administrators have to wait until the number of registrant fulfills the minimum requirement of the course to open class. All registration related must be done manually, as no online system available yet. Financial report must be also done manually in order to keep track of the financial progress of the courses. Project Objective The project objective will be focused on developing an online course registration to ensure the effectiveness of the flow of registration. Moreover the system will offer a complete management system that integrated with the online course registration to help the stakeholder for maintaining the flow process of the course. The registration process can be done online without the need of paperwork anymore. It is also help the student to get more information about the course process while they enrolled. The administrator will get easier way to determine the seat of the courses, keep track of the registration module, and generate report for the year to help them determine the development of the courses. The cores of objectives of the project are followings: To study existing course registration system in Microsoft IT academy of Multimedia University. Analyzing current course registration system, by interviewing the stakeholder of the system. To propose an online course registration and management system. To identify the user requirement for online course registration and management system. To develop an online course registration and management system. To evaluate the online course registration system that been develop. Project Scope The studies will develop an Online Course Registration, specifically for the Microsoft IT Academy in Multimedia University. With this system, it will affect the stakeholder of the Microsoft IT Academy Multimedia University Melaka Campus such as: Administrator /Instructor The Administrator for the system will be divided to several privileges on how they can use the system. Administrator for example, have all the privileges such as adding instructor, adding courses, update information, adding downloadable material, registration module, etc., but Instructor only have several privileges on what they can do and not do in the Online course registration and management system. Student/User Student will get a more accessible way in order to register and booked the seat for the courses. They also can get updates from administrator keep track on the progress of the course. Significance of Project This final year project for intelligence online course registration will not only provide basic feature to the user as well as administrator, but will be also completed with these features: Online Chat Helpdesk Support System The Helpdesk Support System will allow the user to interact with the administrator in case if they have certain question to be asked regarding the course or the registration flow. Security Security of the website is one of the main concerns to be improved as the registration is moving from traditional to online based. The reason is because user will send their confidential data to the system. Some user might use the same login ID or password, and without proper security, the data might be accessed by third party, or the user session is hijacked while sending the data. The security improvement will also provide log to the administrator in case there are some abnormality in the system after some user log in. As the security improved, we are giving the user a better understanding why they should trust our system. Limitation of Project In this project there are 2 objectives to achieve which are developing online course registration and management system for the Microsoft IT Academy Multimedia University Melaka. This project will focused on how to make the registration flow as simple as possible and also automated in the flow process. However there are limitations which is not be covered in this project. Even though the registration for the user will be done online, some flow of the process will be still done manually, such as submitting the official receipt of MMU to instructor. This is because of Multimedia University policy that not allows administrator to access the student financial report. Yet the system itself will allow user to upload the proof of payment trough online registration. Structure of Report This report consists of 5 main chapters. The first chapter, Chapter 1 which is Introduction presents overview of the project, the problem statement of the study state the problem occur on the current system, the project scope, objectives of the study that explain about the project main goals that need to be achieved, and structure of the report as well as the limitations of the project. Chapter 2 which is Literature Review state explains about materials used to study for the proposed system later, literature review also briefly explain some previously system that use same the technology in registration system. Chapter 3 is Methodology; and this chapter explains about the methods and tools that will be used to develop the system. It also gives some explanations why the methods and tools are chosen in the project. Chapter 4 which is the Proposed Solution and Implementation Plan or Design, this chapter presents the plans on how the system developed as well as the design of the system. This chapter mainly consists of diagrams to describe the design of the proposed system and some little explanation about the proposed system. Chapter 5 is conclusion; this chapter will summarize the conclusion of the objective stated. Chapter Summary In this Final year project the main objective is to propose and develop an online registration and management system that will facilitate the user as well as the administrator in order to keep the flow of registration more compact and efficient. This chapter explains the scope of the project which will affect the Microsoft IT Academy in Multimedia University Melaka stakeholder. Moreover in this chapter also describes about the problem that the current system where most of the flows still done manually. Chapter 2 Literature Review Online course registration and management system has become a necessity in order to create simple and accessible way to support today system. The internet has dramatically changed the role of Internet today (Cassidy 2002:1). Internet is the tool or vehicle for many applications, as well as to maintain registration for government, companies, and many events. This is happen as result of the simplicity of internet access in many part of the world. 2.1. Online Course Registration Johnson and Manning (2010) stated that the two biggest differences between registering online and mailing in your paperwork are time and technology. It can take time when users have to fill in the form, and then submit it in some other places. Instead of taking time, technology has helped us to make the registration procedure into the next level. You can find more information about the courses you want to take and in the same time fill up the form, pay the fees, etc. The staff that receives registration information most probably will process the information in same system, so by using online course registration and management system, we can save time. 2.1.1. Online Course Registration and Management System An Online course registration and Management System is systems that maintained the registration flow for the user and provide extensive capability for the administrator to maintain the content, report, and ability to add, update, or delete the content of a system. Currently there are many applications that have the ability to manage registration online. Some of them are very simple, and more complicated that use current technology. Almost all web based programming language support the capability to make online registration, such as PHP or .NET provide many option to build intelligence course registration and management system. A good system must be able to provide sufficient information and services needed by user as well as delivering extensive report to the administrator (Anggarwal.2003:233). 2.1.2. Existing Online Course Registration and Management System Most of the Online Course Registration and Management System are mostly used in educational institution and professional courses. This is to avoid time consuming of managing numerous users and prevent error from manual method. Based on that, people tend to use Online Course Registration and Management System. There is some Online Course Registration and management System that researched and improves, such as: Wylie Course Registration The C-Registration System will replace the existing mainframe course registration system at Wylie College. The new system will interface with the existing Billing System and Course Catalog Database System as shown in the context diagram below (see Figure 2.1). The C-Registration System will consist of a client component and server component as illustrated in Figure 2.2. The server component resides on the Wylie College UNIX Server. The server component must interface with the Billing and Course Catalog Database Systems on the College DEC VAX Main Frame. This interface is supported by an existing Open SQL Interface. The client component resides on a personal computer. The College PCs will be setup with the client component installed. Any non-college PCs must download the client software from the UNIX Server via the Internet. Once the client component is installed on the PC, the user may access the C-Registration System from the PC through the College LAN or Internet. A valid ID number and password must be entered in order for access to be granted. Figure 2.1 C-registration System Context Diagram Figure 2.2 C-Registration system overview The C-Registration system has many capabilities which will be explained the following table: Table 2.1 C-Registration capabilities Costumer benefit Supporting features Up-to-date course information The system accesses the Course Catalog Database for up-to-date information on all courses offered at Wylie College. For each course, the Students and Professors may review the course description, Prerequisites, assigned teachers, class locations, and class times. Up-to-date registration information All course registrations are immediately logged in the Registration Database to provide up-to-date information on full or cancelled courses. Easy and timely access to course grades Students can view their grades in any course simply by providing their user ID and password. Students may access the registration system from any College PC or from their home PC via the internet. Professors enter all student marks directly into the Registration Database from their PCs. Access from any College PC Students may access the registration system from any College PC or from their home PC via the internet. Installation of the client component of the C- Registration System on a PC is an easy to follow process using the internet Easy and convenient access from your PC at home Students may access the registration system from any College PC or from their home PC via the internet. Secure and confidential A valid user ID and password is required to gain access to the C-Registration System. Student report card information is protected from unauthorized access. Instant feedback on full or cancelled courses All course registrations are immediately logged in the Registration Database to provide up-to-date information on full or cancelled courses. Online Course Registration System for the Faculty of Engineering in University of Peradeniya In the system developed by the University of Peradeniva, there are some necessity in online registration course that should be included in the system, such as: Authentications and Authorizations of users; Administrators should be able to decide time period for the registration (before the start of the semester) and time period for the add/drop period (at the beginning of the semester); Administrators should be able to enter required data into the system such as courses, students, advisers and examination results; Advisers are allowed to view filled registration form of each student and accept/ reject the registration; Students should be able to view current courses and previous results, to register or add/drop new semester courses; Users should be able to change their passwords and personal information; and In the absence of a relevant adviser, the head of the department should be able to accept the online registration forms. All users have their own usernames and passwords to access the system and they have the ability to change their passwords. They will be given separate entry levels to access the system. Figure 2.2 depicts the use-case diagram of the system. Administrators are the staff officer at the Office who is responsible for course registration. They have the authority on deciding time durations, entering required details and finalizing registrations. Figure 2.3 use case of the online Registration in University peradeniya Advisors are all the department heads and lecturers who are assigned as advisers for students. They are capable of viewing courses, student details and results and accepting or rejecting registration forms. Student category contains everyone who has registered for a degree programme in the faculty. They are allowed to view available courses, their details and results, and to complete their registration forms and add/drop forms. The system that being used will be detailed explained in the table below: Table 2.2 system used in Online Course Registration of university peradinya Technology Usage Dream Weaver GUI Design CSS Additional Features in GUI Design ASP.net Programming Design Ajax Client Script Development SQL Server 2000 Database Design IIS Web Server to host the system Crystal Report 9.0 Generate reports. As the system works, it has not only reduced the burden of all parties involved in the course registration process, but also improved the process by reducing errors. Secure Online Application The real test of a secure Web Application occurs when it comes time for users to log in and access your site (Burnett,Mark.2004). Login screen is look simple. User just provide the username and password, the system will authenticate it to access the system. Authentication establishes a users identity. Once this identity is proved valid, the user is authorized (or nor authorized) to access various features of the Web application. 2.2.1 User authentication Threats The primary threats with user authentication are: Account hijacking This involves taking over the account of a legitimate user, sometimes denying the rightful user access to his or her account. Man-in-the-middle Intercepting Web traffic in such a way that the attacker is able to read and modify data in transit between two systems. Phishing A type of man-in-the-middle attack in which the attacker lures a legitimate user to enter a password through a fake e-mail or Web form designed to look like that of a legitimate Web site. Unauthorized access Gaining access to restricted content or data without the consent of the content owner. Information leakage Revealing or failing to protect information that an attacker can use to compromise a system. Privilege escalation Allowing an attacker to gain the access privileges of a higher-level account. Sniffing Using a network-monitoring utility to intercept passwords or other sensitive information that traverses a network. Because the login form plays such an important role in authenticating users, it is important to protect the form itself from flaws. A poorly written login form is vulnerable to password sniffing, information leakage, and phishing. Furthermore, the form itself may be vulnerable to flaws such as SQL injection and cross-site scripting. 2.2.2. Secure Authentication In ASP.NET the IIS provides four standard methods for authentication: Basic authentication Digest authentication Integrated Windows authentication Client certificate mapping Basic Authentication Basic authentication works by prompting a Web site visitor for a username and password. This method is widely used because most browsers and Web servers support it. The benefits are: It works through proxy servers. It is compatible with nearly every Internet browser. It allows users to access resources that are not located on the IIS server. Basic authentication also has some drawbacks: Information is sent over the network as cleartext. The information is encoded with base64 encoding, but it is sent in an unencrypted format. Any password sent using basic authentication can easily be decoded. By default, users must have the Log On Locally right to use basic authentication. Basic authentication is vulnerable to replay attacks. Because basic authentication does not encrypt user credentials, it is important that traffic always be sent over an encrypted SSL session. A user authenticating with basic authentication must provide a valid username and password. The user account can be a local account or a domain account. By default, the IIS server will look locally or in Active Directory for the user account. If the user account is in a domain other than the local domain, the user must specify the domain name during logon. The syntax for this process is domain nameusername, where domain name is the name of the users domain. Basic authentication can also be configured to use user principal names (UPNs) when you use accounts stored in Active Directory. To prevent exposing user credentials to others on the network, it is essential that you always use SSL with basic authentication. Note that basic authentication causes the browser to send user credentials to every page on the same site or within the same realm, not just the login page. If you dont use SSL on every page, user credentials will be visible on the network. One way to prevent these credentials from being sent on unprotected content is to use a unique realm for protected and unprotected content. Digest Authentication Digest authentication has many similarities to basic authentication, but it overcomes some of the problems. Digest authentication does not send usernames or passwords over the network. It is more secure than basic authentication, but it requires more planning to make it work. Some of the similarities with basic authentication are: Users must have the Log On Locally right. Both methods work through firewalls. Like all authentication methods, digest authentication does have some drawbacks: Users can only access resources on the IIS server. Their credentials cant be passed to another computer. The IIS server must be a member of a domain. All user accounts must store passwords using reversible encryption. The method works only with Internet Explorer 5.0 or higher. Digest authentication is vulnerable to replay attacks, to a limited extent. Digest authentication is secure due to the way it passes authentication information over the network. Usernames and passwords are never sent. Instead, IIS uses a message digest (or hash) to verify the users credentials. In order for digest authentication to work, all user accounts must be stored using reversible encryption in Active Directory, which may be a potential risk. After this setting is enabled for a user account, the users password must be changed to create the plaintext copy. Digest authentication does provide more security, but for most Web sites, the limitations of this method outweigh the benefits. One interesting peculiarity with IIS is that when you send authentication headers to a client, it will send the basic authentication header before the digest one. Many Internet browsers use the first header they encounter and therefore opt for the weaker basic authentication. Integrated Windows Authentication Integrated Windows authentication is also a secure solution because usernames and passwords arent transmitted across the network. This method is convenient because, if a user is already logged on to the domain and if the user has the correct permissions for the site, the user isnt prompted for his or her username and password. Instead, IIS attempts to use the users cached credentials for authentication. The cached credentials are hashed and sent to the IIS server for authentication. If the cached credentials do not have the correct permissions, the user is prompted to enter a different username and password. Depending on the client and server configuration, integrated Windows authentication uses either the Windows NT LAN Manager (NTLM) or Kerberos for authentication. You cannot directly choose which one is used; IIS will automatically choose a method based on the server and client configuration. The Web browser and the IIS server negotiate which one to use through the negotiate authentication header. Both Kerberos and NTLM have their own advantages and disadvantages. Kerberos is faster and more secure than NTLM. Unlike NTLM, which authenticates only the client, Kerberos authenticates both the client and the server. This helps prevent spoofing. Kerberos also allows users to access remote network resources not located on the IIS server. NTLM restricts users to the information located on the IIS server only. Kerberos is the preferred authentication method for an intranet Web server. However, the following requirements must be met for Kerberos to be used instead of NTLM: Both the client and server must be running Windows 2000 or later. The client must be using Internet Explorer 5 or later. The client and server must be in either the same domain as the IIS server or in a trusted domain. Integrated Windows authentication has a few limitations: It works only with Internet Explorer 3.01 or later. It does not work through a firewall. The client will use the firewalls IP address in the Integrated Windows hash, which will cause the authentication request to fail. Client Certificate Mapping Client certificate mapping is the process of mapping a certificate to a user account. Certificates can be mapped by Active Directory or by IIS. Both of these methods require Secure Sockets Layer (SSL). There are three types of certificate mappings: One-to-one mapping Many-to-one mapping UPN mapping Certificate mapping is the process of linking a certificate to a specific user account. Normally, if we wanted to give a user authenticated access to the intranet; we would either create a user account or allow the user to log in using his domain account. Creating duplicate accounts is time-consuming, yet if users use their domain accounts, there is the concern that their domain passwords could become compromised. To provide better security and reduce the administrative workload, we could choose to issue each user a certificate. Certificates can be used to verify a users integrity. It is actually more efficient to use a certificate than a user account because certificates can be examined without having to connect to a database. It is generally safer to distribute certificates than user accounts. Furthermore, it is much easier to guess or crack someones password than it is to forge a certificate. Chapter Summary This chapter discusses the material research as well as basic understanding of the online course registration and management system. The material provided is to help and understand the project, and how the system can improves the registration and management system. Chapter 3 Methodology 3.1. System Methodology It is important to understand that an information system has a life cycle, just as living system or a new product has. System analysis and design constitute the key stage of system development life cycle (ISRD Group, 2007). System Development Life Cycle has several phases which are planning, analysis, design, implementation, and maintenance. Figure 3.1 System Development Life Cycle 3.1.1. Planning Planning is the first phase in the System Development Life Cycle, in this phase the necessity of the system has to be identified (Hoffer, et al., 2005). The objective, scope and the main reason to develop the system has been explained in previous chapter. 3.1.2. Analysis The second phase is the analysis phase, which during this phase an analysis on the system requirement is being held (Hoffer, et al., 2005). The output of this phase is a description of the recommended solution by determining the problems and requirements. In this phase information regarding of the project is gathered, the information gathered then can be studied to help the understanding about the project. In this project analysis phase determine what method used to build the system later on. In this phase, we interview the stakeholder of Microsoft IT Academy Multimedia University (see appendix for detail) In analysis phase, we determine: Detailed evaluation of current system Data Collection User Requirement 3.1.2.1 Current System Evaluation Figure 3.2 System flow of the system Figure 3.2 show the current system flow of the MSITA. The flow show that some part still done manually, such as filling form and registration (student have to download form from website, pay the course fees to MMU finance, and submit the official receipt to the instructor). The website that being used now is using ASP.NET as programming language, but there is no online registration capabilities. The website is used for content management system only. All the registrant will be input manually by the instructor. 3.1.2.2. Data Collection To ensure that we understand the flow of the current system, we need to identify the stakeholder of the system, such as: Table 3.1 Stakeholder No Stakeholder Name Stakeholder type Roles 1 Instructor Instructor of Courses Provide Course material, provide place/lab for the course exercises , manage registration for user 2 MMU Finance division Registration Payment Submission Receive Payment from Costumer, Issue Official Receipt for registration 3 Student User/Costumer Register for the course, submit receipt for registration, participate in course as scheduled, take certification exam From the stakeholder above, we already identify that the most influence entity are the User and Instructor of the course. We will then identify the problem on the current website. Function of Microsoft IT Academy Website As main website for student for : Check latest/available course offered by MSITA team. Check schedule for the course Check registration procedure (Download Registration Form) Download notes/material for the course (only for registered user) Technical Detail of Microsoft IT Academy Website Technology Used : ASP.NET Other Items considered Course material is given trough the class Registration of the course still done manually (student have to download form from website, pay the course fees to MMU finance, and submit the official receipt to the instructor). The reason why the registration still done manually : Sometimes there are changes in registration procedure (e.g. minimum requirement for the number of the student to open the courses, some courses is added/removed). Need the proof of payment to confirm student registration. Figure 3.3 MSITA website details 3.1.2.3 User Requirement As the main concern of the development in MSITA website, we need to make the registration process and also maintenance of the website online; these are the requirement of the proposed solution: Table 3.2 User requirement User Side Administrator Side User can register in the MSITA website as website member as option before they register to the course Administrator panel Student registered as website member need to fill course to take in future/next trimester in order to keep track the estimated number of course offered. Add/Remove course Student can fill the registration form trough MSITA website. Automatic Email to all student registered Student can upload scanned proof of payment trough registration form Registration module for administrator Student can fill option to take exam after course registration in order to get exam voucher Financial Report of the year 3.1.3 Design Design Phase required us to determine the logical and physical design of the system. We need to determine the system features and all other necessary requirement for the system. Later on in the next phase of the project we will transform the logical design into fully working system. 3.1.4 Implementation The fourth phase is implementation. In this phase the physical design of the system will be programmed into a working system (Hoffer, et al., 2005). In implementation coding, testing, and installation will be included. In coding, the system will be programmed to a working system. After it programmed the system will be tested to find errors and bugs in the system. Lastly, during installation the system will be installed and ready to use. In the phase 1 of the project implementation of the system is not going to be built. The implementation phase will be held during the second phase of the p

Study of Nikon Corporation

Study of Nikon Corporation The Nikon has gone global and divides the globe to six regions of its operation which are the Americas, Europe, Asia, Oceania, Middle East, and Africa. The products have also been grouped in to imaging products (Digital/film cameras, lenses and accessories), precision equipment (IC/LCD steppers and scanners), sport optics (Binoculars, telescopes and laser rangefinders), instrument products (Microscopes and measuring instruments), and ophthalmic lenses (Single vision and progressive addition lenses) (Nikon, 2010). It has a capital of  ¥ 65,475 million as of March 31 2010, where the consolidated net sales were  ¥ 785,498 million as of March 31 2010 while unconsolidated net sales as of March 31 2010 were  ¥ 572,972 million (Nikon, 2010). The numbers of employees in the corporation are approximately 26,125 as of March 31 2010 where the number is not inclusive of employees in subsidiary and associated companies. The company also has five main plants that include the Ohi plant, Yokohama Plant, Sagamihara Plant, Kumagaya Plant, and Mito Plant (Reynolds, p.23). The company has developed products of quality throughout the years where the core technology center, the research and development center and the production technology center are responsible for quality and innovation. Its imaging products (72.5%) contribute to a huge proportion of the sales followed by precision equipment (19.1%), instruments (5.7%) and others (2.7%) respectively (Nikon, 2010). The Nikon philosophy is Trustworthiness and Creativity that presents the unchanging principles that the company are dedicated to. The aspirations include Meeting needs and exceeding expectations where the company does not just stop at meeting the customer needs but also providing the customer with new products of value that exceed expectations; aiming at sustained growth through continuous development of all products; maximizing on the understanding and knowledge on light to produce products that transform and lead the markets currently and in future; and maintaining high integrity so as to contribute to the prosperity of the society (Nikon, 2010). The commitments of Nikon are being firstly being pro active i.e. Be broad-minded and well-informed in order to act quickly and resolutely Second seeking new knowledge i.e. Pioneer new potential through self-study and insatiable curiosity thirdly is effective communication i.e. Harmonize diverse skills by thinking out of the box and communicating effectively with others and last but not least displaying integrity i.e. Work with diligence and sincerity as a responsible individual (Nikon, 2010). The goal is Transforming imagination into creativity (Nikon, 2010). This paper critically examines the Nikon Corporation its history products, markets, goals and philosophy. It continues to scrutinize the company by performing a Strength Weakness Opportunities Threats Analysis which is crucial in matching the companys resources and capacity to the competition it faces in its operating environment; and a 4 P Product Services Pricing Promotion and Placement Mix analysis. It elaborates the position the corporation stands in the market and current and future opportunities that the company has in terms of growth and sustainability. Strength Weakness Opportunities Threats Analysis Nikon has been well placed in the markets in the markets and this gives the company a competitive advantage (Armstrong, p.34). This involves an environmental scan where the internal and external analysis is carried out. The Strengths The patent rights of the brand are high Nikon boasts of a global established brand that sells globally and is demanded by so many customers. The Nikon products are renowned throughout the world and thus give the company a strong basis to establish itself over it competitors and any new entrant in to the markets (Tarcy Et al p.47). This is seen as strength in that the brands are preferred by customers thus more sales are made and hence more revenues to the company. When the patent right is high the company has a lot of goodwill with the company and thus becomes the favorite and hence controls a larger share in the market. High technology in the production of products; Nikon has a reliable brand that is based on high level technological supremacy and resource and development. This has been established by the company since its inception where the products developed suit the market and become leaders in the market because of their level of technology (Nikon, 2010). The company has continued to phase out the products that are out of technology and introduced competitive products in the market that make life convenient and more comfortable. The company has invested a lot in resource and development and alliance, and industrial knowledge so as to keep on producing basic technological products that control the market. The Nikons starring technology is developed in the optics, image processing, materials, precision measurement and manufacturing, software and system technologies. The technology has continued to be unique and superior which offers better performance and functionality. Such technology include Super-Resolution in Non-Linear Optical Lithography, High-Precision Thin films, Ultra-Precision Molds, Image Processing Algorithms, Lead-Free Electronics Technology, Nano Particle Coating, Carbon Nanotubes (CNTs), Computer Aided Engineering (CAE), Vibration-Reduction (VR) and Predictive Focus Tracking System (Nikon, 2010). Quality has also been a strong point for Nikon in that the products produced have always been regarded for their high quality in the market. This makes Nikon products have a competitive advantage over its competitors. The diversification of the products that the company has is also a very strong strategy to remain in business (Tarcy Et al. p.52). This is the case because the company does not rely on a single product to get its revenues thus diversify the risks in the markets. The company has diversified to produce products like microscopes, measurement instruments, binoculars, cameras, and steppers that it has continued to dominate the market and contribute to the companys revenue. Nikon continues to boast of a very wide distribution network. The global dominance in the five regions which are the Americas, Europe, Asia, Oceania, Middle East, and Africa gives it a competitive advantage over those with ineffective distribution mechanisms (Nikon, 2010). Even in each region there is specialty in the products that are more preferred by the customers hence more sales. There is also presence of subsidiaries and affiliate companies that make the products available to the customers easily and in time. The effective distribution network enables the company to study the dynamics of the market in time and respond quickly before the markets are dominated by other competitors. The global presence is strength due to balancing of the currencies where the company can absorb shock from depreciation of currencies in areas that they are operating in (Tarcy Et al. p.71). The global presence can also be important in that when products are not moving in one region they can be transferred to other regions that require the products and thus promote business. Nikon has global and regional presence that enables the company to study the dynamics of each region and apply the best strategy. It is also possible to shift the products to other markets when they are bought at a slower rate in other regions thus save on production. Nikon has also invested a huge amount of finances in its business; the capital of  ¥ 65,475 million invested by the company is a way to lock out investors that cannot raise such an amount hence helps it in dominating the markets. The Nikon D1H camera is known for its solid build where the handling and the ergonomics is very efficient with a strong and fast autofocus. It is also weatherproof and is very fast since it as the 5 fps. It also produces large images that are approximately 40 jpeg fine (Nikon, 2010). Weakness Nikon has a poor marketing strategy where promotion of products has been low and the products have not been known to many consumers. The marketing systems have been reluctant and not aggressive enough to make the products known in all regions. The production of the Nikon scan scanner software that was faulty was a major weakness to detest its products in the market. The Nikon Scan has remained redundant in the number of images it determines in that it only determines 99 images and stops working (Nikon, 2010). For images above 100 the scanner must be restarted to continue its function. This is a very crucial part in that the customer can judge the products quality through one product and lead to rejection of the rest. The scanner software did not also have proper calibration procedures even after the purchase of an IT-8 Target. The Nikon NiMh camera batteries are not user friendly also they are heavy and big while they are sold expensively at shops (Nikon, 2010). They are also bad since they need recharge or be replaced once the camera is put in use for a shorter time than other cameras. There is a global phobia where people detest products from Japan and China and see then as counterfeits or of low quality. Products from these countries may have low sales due to such phenomenon and the company must be able to fight this negative attitude of the products it produces. Opportunities The digital world has numerous chances that have not been exploited the customers are yet to be fulfilled (Bà ¶hm, p.23). Customers still yearn for better digital products as they are produced. Any company that deals in technology has opportunities to control the market share through unique products or products that are user friendly and technologically advanced. In cameras manufacturing better products gives the company a chance to remain competitive. In view of the fact that Nikon has invested heavily in resource and development then it stands a chance to better opportunities. Trade is being liberalized in many regions and thus there are possibilities of governments loosening regulations of operations. This will be instrumental in allowing further development of the company to such countries where it is not yet penetrated (Ferrell, Hartline, p.35). Nikon has the capability to expand its production processes to other countries where there is distribution is done from exports. This will be easier and cheaper to reduce costs of production since the products are will be produced locally hence extra costs are eliminated (Bà ¶hm, p.48). Nikon may prefer mergers with companies like Sony so as to be much effective and build an empire that will control a large market share. a vertical merger will be more effective where the companies do not loose their identity but merge as a necessity to better their business objectives. Threats Nikon faces stiff competition from other globally renowned companies such as Sony, Olympus, Panasonic, Fujifilm, Canon, Kodak, Casio, and Pentax that all deal with the similar products. Such companies pose a threat of controlling the market share that Nikon holds. There is also the threat that the customers may shift their taste and prefer other companys products due to better marketing techniques applied by the other companies. New regulations may appear in different regions that may affect the companys operations in view of the fact that they may be unfavorable or strict. These regulations may include trade regulations that may be a barrier to efficient trade. In the Middle East peace has not been brokered by the warring parties and this political stand off will be a threat to business in the region. 4P strategy The Product Services, Pricing, Promotion, and Placement (Distribution) analysis of Nikon Corporation will be effective in establishing the companys position in the market and the opportunities that may be available for sustainable growth (Ferrell, Hartline, p.39). This gives a customer oriented approach that ensures that the business ventures into the market in a way that it will meet all the customers demands and expectations. The 4P marketing strategy is also known as the SIVA strategy which is translated as the Solution (product), Information (Promotion), Value (Price), and Access (Place) (Ferrell, Hartline, p.39). Product Nikon deals with a range of products that are aimed at maximizing customer satisfaction. The products include imaging products such as the Digital/film cameras, lenses and accessories; precision equipment such as IC/LCD steppers and scanners; sport optics such as the Binoculars, telescopes and laser rangefinders; instrument products such as the Microscopes and measuring instruments; and ophthalmic lenses such as the Single vision and progressive addition lenses. The imaging products are specifically the digital SLR Cameras, Digital compact cameras, speed-lights, software, film scanners, film SLR cameras, and Nikkor lenses. The microscopes include the biological, digital, industrial, stereoscopic and multi-purpose zoom. The precision equipment includes the IC stepper and scanner and the LCD stepper and scanners in different series (Nikon, 2010). The packaging is attractive with different colors and the Nikon brand name on them with each product packed with a user manual so as to enable the user steps of operation. The packaging is also ensured to shock proof to protect the products from any falling or mishandling. A return form is also placed in the packaging that bears the name and address of the company. The company logo is also encrypted in all products. It bears the words handle with care that cautions any person handling them that they are delicate and prone to damage. The customers are also assured of a warranty for every product they buy that is from authorized distributors. Pricing Each product has a specific price and the prices vary in every region and according to the specifications. The price for Digital SLR Cameras is $7,999.95; NIKKOR 50mm f/1.4 is $469.95, AF-S Teleconverter TC-20E III is $499.95; AF DC-NIKKOR 105mm f/2D is $1,199.95, and COOLPIX S640 is $219.95 (Nikon, 2010). The LS-9000 Nikon scanner is sold at $2799.99; while SB-400 Speed-light unit is sold at $149.99; SB-600 Speed-light unit is sold at $249.99; and SB-900 Speed-light unit is sold at $349.99 (Nikon, 2010). Compared to the competitors prices Nikons prices are averagely similar in the markets thus leaving the customer to choose the best product that suits them. Promotion This includes the Advertising, Professional Selling, Sales Promotion, and Publicity of the products by the company (Ferrell, Hartline, p.57). Nikon Corporation in June 2003 dissolved the Nikon sales promotion Co. ltd in view of the fact that it was not affecting its mandates to the corporation. Its mandate was shifted to Nikon Corporation business units that would effectively carryout the marketing and advertising. Nikon has also implemented the CSR strategy that includes several promotional strategies which include the education and awareness, surveying and monitoring, preventions of violations, and a consultative reporting system. The education strategy seeks to educate the employees in the corporation to create a favorable workplace environment through this promotion strategy the employees are able to promote the company to the public. The company also conducts awareness surveys that help gauge the products place in the market this helps promotion in laying the right procedure to advertise the products that have low sales. Nikon also promotes the products through print and advertising. It also holds photo exhibitions like the Photokina that helps in showcasing all the recent products by the company. Photo shootouts are also organized where customers are able to try out the new products and know their operations, availability and prices. Billboards are also used to advertise the products so as to reach the customer more efficiently. Taxi branding where taxis are branded with the company logo and products to promote the products is done globally. Nikon has also been involved in supporting sports such as formula one and advertised during the events (Nikon, 2010). Placement (distribution) Nikon is present globally with all its products being traded world over. The market has been segmented into regions that enable ease of distribution of the products to the customers. There are six regions which are the Americas, Europe, Asia, Oceania, Middle East, and Africa (Nikon, 2010). In each region there are authorized distributors of the products where they are then further sub-divided into sub divisions that help penetrate the market effective and reach the customers in time. Conclusion The general life cycle of the products from Nikon starts from the receiving of raw materials, then to the material, component and product manufacture, then to transport, where it is then used by the customer after which it is then recycled or disposed. Nikon has developed a competitive advantage over other companies and has definitely benefited from the effective marketing strategy it has. Work Cited: Armstrong, Michael. Management Processes and Functions, London: CIPD, 1996 Bà ¶hm, Anja. The SWOT Analysis. Boston: GRIN Verlag, 2009 Tarcy, Brian,. Bradford, Robert and Duncan, Peter. Simplified Strategic Planning: A No-Nonsense Guide For Busy People Who Want Results Fast!. New York: Chandler House Press, 2000 Ferrell, Olive C. Hartline, Michael D. Marketing Strategy. Ed.4, New York: Cengage Learning, 2008 Nikon. Nikon Corp, 2010. http://www.nikon.com/ November 27, 2010 Nikon. Product Assessment, Nikon Corp, 2010. http://www.nikon.com/ November 27, 2010 Reynolds, Clyde. Nikon F Book. New York: Focal Press, 1977

Saturday, July 20, 2019

Compare and contrast Lamb to the Slaughter and The Speckled Band. :: English Literature

Compare and contrast Lamb to the Slaughter and The Speckled Band. To what extent are they typical of murder mystery stories? In my opinion a typical murder mystery is one where it keeps you reading in anticipation wanting to know who has committed the well planed out murder, the whole way through. Until the end where the clever detective (who is usually quite an old man, dressed in a smart tweed suit) goes through one by one all of the suspects telling them exactly why they could have committed the murder, but then why they didn't. He then confronts the real murderer who is normally the one everyone least suspects. This all takes place in a large country manor where lots of people would have been busying round but for the murderer, conveniently there are never any witnesses to the crime. The murder is most often well planed out, with a devious reason behind it. The two stories are both very different and mainly the only similarities are that they are both about murders that are done by people that are close family to the victims they murder in there own homes.7 The settings in both of them are very different; in lamb to the slaughter the setting is in a normal home in a small village, where normal family life goes on. To begin with everything is going fine and things are going on the same, as they would do every other day. The husband has just got home from work and his wife asks him how his day has been 'Hullo darling' she says and then gets him a drink. The fact it is just like every other day shows in the relaxed atmosphere, which is described as 'a blissful time of day' The atmosphere also seams to be warm and cosy as she was 'luxuriating in his company' Where as in the Speckled Band the setting is really as you would expected a murder mystery setting to be. This shows as at the start there is an air of panic as Watson and Holmes have been 'knocked up' as 'a young lady had arrived in a considerable state of excitement' The murder setting is also typical as it is in a large country manor, owned by the well-known Surry Family of the Roylotts of Stoke Moran. But unlike an average murder mystery there wouldn't be an awful lot of people around to be suspects, as only the two stepdaughters and their father were in the house. Although there wasn't a lot of atmosphere after the opening part of the story, as there is just a woman telling Compare and contrast Lamb to the Slaughter and The Speckled Band. :: English Literature Compare and contrast Lamb to the Slaughter and The Speckled Band. To what extent are they typical of murder mystery stories? In my opinion a typical murder mystery is one where it keeps you reading in anticipation wanting to know who has committed the well planed out murder, the whole way through. Until the end where the clever detective (who is usually quite an old man, dressed in a smart tweed suit) goes through one by one all of the suspects telling them exactly why they could have committed the murder, but then why they didn't. He then confronts the real murderer who is normally the one everyone least suspects. This all takes place in a large country manor where lots of people would have been busying round but for the murderer, conveniently there are never any witnesses to the crime. The murder is most often well planed out, with a devious reason behind it. The two stories are both very different and mainly the only similarities are that they are both about murders that are done by people that are close family to the victims they murder in there own homes.7 The settings in both of them are very different; in lamb to the slaughter the setting is in a normal home in a small village, where normal family life goes on. To begin with everything is going fine and things are going on the same, as they would do every other day. The husband has just got home from work and his wife asks him how his day has been 'Hullo darling' she says and then gets him a drink. The fact it is just like every other day shows in the relaxed atmosphere, which is described as 'a blissful time of day' The atmosphere also seams to be warm and cosy as she was 'luxuriating in his company' Where as in the Speckled Band the setting is really as you would expected a murder mystery setting to be. This shows as at the start there is an air of panic as Watson and Holmes have been 'knocked up' as 'a young lady had arrived in a considerable state of excitement' The murder setting is also typical as it is in a large country manor, owned by the well-known Surry Family of the Roylotts of Stoke Moran. But unlike an average murder mystery there wouldn't be an awful lot of people around to be suspects, as only the two stepdaughters and their father were in the house. Although there wasn't a lot of atmosphere after the opening part of the story, as there is just a woman telling

Friday, July 19, 2019

condoms Essay -- essays research papers

Why people do not use condoms Many men and women prefer unprotected intercourse or using another contraceptive method rather than using a condom. Among currently married women of reproductive age, only 5 percent use condoms for contraception worldwide, and only 3 percent in less developed regions of the world, according to United Nations estimates of contraceptive use. In this chapter we a re going to analyze or try to explain why some people don’t use condoms. In order to do this, we used some theory of the book ‘Social Psychology’ (7th edition) by David G. Meyers. Also we used much information that we got from the internet. In the above mentioned book, they explained that each construes the human skin as a special boundary that separates one set of casual forces from another. On the sunny side of the epidermis are the external or situational forces that press inward upon the person, and on the meaty side are the internal or personal forces that exert pressure outward. Sometimes these forces press in conjunction, sometimes in opposition, and their dynamic interplay manifest itself as observable behavior. In the figure below you can see a figure which explains Harold Kelly’s theory of attribution. Through the figure above, you can conclude yourself whether the following reasons are internal or external attribution. In addition we divided the causes in two parts. The first one is the reasons of the people in the developed countries and the second part is about the reason of the people in the developing countries. Developed Countries The most frequent reasons people in the developed countries give for not using a condom relate to the following issues: lack of sensation or interrupted sexual pleasure; psychological and social factors, including couple communication and assumptions that condoms are for use in extramarital relationships and with prostitutes; lack of availability of condoms, including policies that prohibit condom distribution to youth; and lack of confidence in the reliability of condoms themselves. To make condoms more acceptable and more widely used, all of these issues should be addressed. Factors affecting the acceptability of condoms can be thought of as a series of concentric circles that interact with each other -- from the individual at the center to the couple, the health-care system, the community and the entire world. An ... ...ong young people. Fearing that it will promote sexual activity out-of-wedlock, many service providers and pharmacists do not make condoms easily accessible to youth. Adolescents may hesitate to obtain condoms available at clinics because service providers act judgmentally towards them. Young women may be especially timid because it is considered inappropriate for them to seek condoms. Limited distribution systems complicate access, especially in rural areas. Government outlets may be relatively few and widely dispersed or private-sector sources may favor wealthier urban areas, resulting in uneven availability within a country. In 2000, donors provided less than one billion of the estimated eight billion condoms required in developing countries and Eastern Europe to greatly expand access for those in need. Many developing country governments are providing and promoting condoms as part of their HIV prevention strategies, but for the poorest countries, assistance from the wealthier developed countries remains the main source of condoms. In other countries, sustainable prevention efforts that include promotion and provision of condoms are hurt by inadequate government commitment.