Saturday, November 30, 2019

Internet Privacy Essays (652 words) - Privacy, Digital Rights

Internet Privacy Internet Privacy Why should I worry about privacy and security? I'm not a criminal or a terrorist. I've got nothing to hide. These are things that most people think. They also believe the internet is much more secure and that their personal information is only available to them, whereas this is actually quite wrong. There are more reasons to want to protect your privacy than can be named. The important principal is that you have a right to privacy as long as that right is used within the bounds of the law. Seeking privacy should not make you feel guilty. Privacy should be expected, and demanded. The reasons might be as simple as preserving your right to express unpopular opinions without being subjected to persecution, or as serious as communicating sensitive business information, revealing credit card numbers, legal discussions with your accountant, or hiding your true identity from a secret government. Regardless of your reasons, privacy is your right. Contrary to what some governing bodies might want the public to believe, not all those concerned with security and privacy are hackers or terrorists. The internet provides one of the easiest communications tools ever afforded by mankind. It is quick, convenient, cheap....and as insecure as it is quick, convenient, and cheap. A message sent many months ago may remain on an ISP's server or as a backup, and can be easily retrieved by anyone who knows how to do so. This is information which you personally have deleted for a reason - not to be accessed by someone else after you have finished with it. There have been times where information has be retrieved up to 6 months after, and used in a court case as evidence. It can be quite simple for someone to intercept your messages or information if they want it. This may be just an administrator of your ISP or your office network. Or it might be a business competitor, legal foe, or government agency, with much more serious intentions. There are an abundant means available to protect online privacy. Some are large and complex while others are extremely simple. The important fact is that some methods are almost totally lacking in security while others are practically bulletproof. It is an all too common misconception that anonymity equals privacy. Anonymity and privacy may be related, but their significance is quite different. Do you wonder what other people know about you? Cookies are available on certain websites, and these small files are placed on your computer and record data which most often contains information that the user would rather be kept secure. Information including passwords, credit card numbers and where the user has been. There are hundreds of web-based email services that appear to offer anonymity. Few really do. These include names such as Hotmail, Yahoo, Excite and many more that could be listed. In each of these cases, the user is allowed to create a personal username that he uses for his messages. Unfortunately, through sign-up procedures and logging, it is amazingly simple to determine your ISP, and even your true identity, when you use these services. For the obvious reason, there is no point in wasting space dealing with those types of services. As the user, it is your responsibility to know that your internet anonymity is only as secure as the service's privacy policy. You should always familiarize yourself with the usage and privacy policies of any E-mail or internet service you consider using. Who wants to know what you're saying? It might be a nosey fellow employee, your employer, your ISP, a competitor, friend, or legal team. Regardless of who wants to, it is remarkably easy for someone else to read what you write. It is common sense to protect information that you don't want others to know, and people should ensure that they go to some lengths to do so. There are a large number of nonprofit organizations that specialize in protecting your rights to privacy. It is time well spent to visit these sites, as you can learn what the current laws are, what is being proposed, and what is being done to protect privacy.

Tuesday, November 26, 2019

Korean War Essays - Battles Of The Korean War, Korean War

Korean War Essays - Battles Of The Korean War, Korean War Korean War The Korean War (1950-1953) The Korean War was the first war in which the United Nations played a major role in. It was also part of the cold war between the US and Soviet Union. One of the deadliest war in history, it took many lives in such a short span of time of three years. Even after all these deaths, the conflict isn't completely resolved in Korea. There are still American troops stationed in South Korea, in case the Communists decide to take aggressive action. In WW II, Japan had gained control in Korea. At the end, when Japan was defeated by the Allies, the US and Soviet forces moved in Korea . Korea was divided to serve as the purpose to move the Japanese troops out. The line which was at the 38th parallel divided the country in about half. The Soviet forces were responsible for the north and the US for the south part of Korea. Later, this partition was made permanent. In 1947, the UN declared for elections to be held in all of Korea to decide one government for the country. However, North Korea refused to take part in the elections and didn't allow it. So on May 10, 1948, South Korea voted for a national assembly which set up the Republic of Korea. On September 9, North Korea set up the Democratic People's Republic of Korea. North and South Korea claimed the whole country and their troops fought several times between 1948-1950. The US removed it's troops from South Korea in 1949. It also said that Korea was outside of US defense line. N orth Korea saw it's chance for military action to take over South Korea. In June 1950, North Korea surprised South Korea with an attack. At the time, the North Korean Army had 135,000 soldiers, most of them veterans of WW II. It also had airplanes, tanks, and artillery that outnumbered South Korea by three to one. On the other hand, South Korea had 65,000 combat troops who had small arms and light artillery. On the day the war began, the UN Security Council issued a resolution demanding the Communist retreat back to the 38th parallel. The Soviet Union was a permanent member of the Security Council. However, it didn't go to the meeting because it had been boycotting the Council meetings. This was because the Council was denying the Communist Chinese government. If the Soviet Union had been there, it could have voted against the resolution or deliver a veto. North Korea chose to disregard the resolution. On June 27, North Korean troops reached South Korea's capital, Seoul. Seoul fell in four days. In the US, President Truman and the UN took action to stop N orth Korea from advancing. President Truman, going by his containment policy, sent US air and naval forces to help South Korea. The UN also asked its members to help South Korea. On June 30, Truman ordered the first ground troops to go to South Korea. General Douglas Macarthur was the commander of the ground forces. Congress supported Truman but didn't officially declare war on North Korea. Other troops from UN nations began soon after the US. Part of the US army on July 1, came from Japan to southernmost Korea at Pusan. Soon, these troops very moving close to south of Seoul. The first fight that took place between the US and North Korea was at Osan, south of Seoul. North Korea had already surpassed Seoul. On July 7, Truman named General MacArthur the commander of UN Commands. He had control over all of the forces in South Korea. By August 2, the North Korean army had advanced to the Pusan Perimeter. The Pusan Perimeter was on the southeast corner of South Korea. This was one of the many turning points in the war because the North Koreans lost nearly 58,000 people. The UN ground forces were led by General Walker who attacked the North Koreans with reserves. US planes helped out by destroying the enemy from above. On August 6, the North Koreans succeeded in crossing the river that stopped them from reaching Pusan. However, the UN forces counterattacked and pushed them back on August 25. North Korea tried

Friday, November 22, 2019

Causes and Effects of Post Traumatic Stress Disorder

Posttraumatic Stress Disorder (PTSD) Posttraumatic stress disorder is an anxiety disorder caused by exposure to a trauma event. When the body feels that it is in danger, it responds to flying or fighting reactions designed to protect people from harm. When the body faces horror, functions such as memory, emotions, thinking, etc. are currently not important and are turned off. This allows the body to concentrate on adding stress hormones to increase heart rate, blood movement to the muscles and in the case of injury in combating infections and bleeding (National Alliance on Mental Health Website, 2014). Post traumatic stress disorder, that is exactly that. The first response to this disease would be the pressure for over-application and trauma experience. Kay Jankowsi (2010) said posttraumatic stress disorder (PTSD) can be traced back to ancient times. History Medical literature literature began with civil war, where PTSD-like disease was called Dakosta syndrome (Jankowsi 2010). Janko wsi (2010) argues that Posttraumatic Stress Disorder (PTSD) is a mental disorder that may occur after experiencing or witnessing a life-threatening event (gospelassemblyfree.com). Post-traumatic stress disorder post-traumatic stress disorder is a mental illness that people remember repetitiously or have a dream of a terrible experience (post traumatic stress disorder 710). The explanation of post traumatic stress disorder mainly focuses on the way in which psychological trauma experience is affected. When a person is facing an overwhelming trauma, the brain can not handle information or emotion correctly (Cohen Web). Post traumatic stress disorder changes the body's response to stress. Hundreds of different types of psychiatric disorders, fourth edition are posted in the mental disorder diagnosis and statistics handbook. (DSM - IV) One of them is called post - traumatic stress disorder (PTSD). According to this study post-traumatic injuries usually experienced and witnessed life-thr eatening events such as military attacks, natural disasters, terrorist attacks, serious accidents and rape, and other violent personal attacks It will occur later (Harvard Women 's Health Watch, 2005). Causes and Effects of Post Traumatic Stress Disorder Posttraumatic Stress Disorder (PTSD) Posttraumatic stress disorder is an anxiety disorder caused by exposure to a trauma event. When the body feels that it is in danger, it responds to flying or fighting reactions designed to protect people from harm. When the body faces horror, functions such as memory, emotions, thinking, etc. are currently not important and are turned off. This allows the body to concentrate on adding stress hormones to increase heart rate, blood movement to the muscles and in the case of injury in combating infections and bleeding (National Alliance on Mental Health Website, 2014). Post traumatic stress disorder, that is exactly that. The first response to this disease would be the pressure for over-application and trauma experience. Kay Jankowsi (2010) said posttraumatic stress disorder (PTSD) can be traced back to ancient times. History Medical literature literature began with civil war, where PTSD-like disease was called Dakosta syndrome (Jankowsi 2010). Janko wsi (2010) argues that Posttraumatic Stress Disorder (PTSD) is a mental disorder that may occur after experiencing or witnessing a life-threatening event (gospelassemblyfree.com). Post-traumatic stress disorder post-traumatic stress disorder is a mental illness that people remember repetitiously or have a dream of a terrible experience (post traumatic stress disorder 710). The explanation of post traumatic stress disorder mainly focuses on the way in which psychological trauma experience is affected. When a person is facing an overwhelming trauma, the brain can not handle information or emotion correctly (Cohen Web). Post traumatic stress disorder changes the body's response to stress. Hundreds of different types of psychiatric disorders, fourth edition are posted in the mental disorder diagnosis and statistics handbook. (DSM - IV) One of them is called post - traumatic stress disorder (PTSD). According to this study post-traumatic injuries usually experienced and witnessed life-thr eatening events such as military attacks, natural disasters, terrorist attacks, serious accidents and rape, and other violent personal attacks It will occur later (Harvard Women 's Health Watch, 2005).

Wednesday, November 20, 2019

Data Communication assignment - 4G Essay Example | Topics and Well Written Essays - 1000 words

Data Communication assignment - 4G - Essay Example It all started with 1st generation mobile communications that were focused on analogue means of communication, this was followed by 2nd generation which resulted in a total shift of medium from analogue to digital(Palanivelu & Nakkeeran 2009). Ever since the introduction of digital sources of communication there has been no looking back, and the current standings are at 3rd, 4th generation and beyond. Furtherance and change being natural phenomena, mobile communications have seen a revolution in the manner in which they are operate today. State of the art technology exists in the field of mobile communication that has made the once impossible, possible. 4G is a generic term that represents a family of number of standards that are around in use. The family encompasses all those elements that are beyond 3G, namely Wimax, L.T.E, Wimax 2.0, HSDPA, Advanced L.T.E and all other standards that fulfill the demands and specifications being presented by International Telecommunication Union (W ang, Kondi & Luthra 2009). 4G standards provide data rates nearly ten times higher 3G (Aktas & Ismail 2004) with focus on resolving the last mile issues once for all by reaching to even the most remote of areas across the globe. The most prevalent of 4G family is Wimax. It has been around for 6 to 7 years now and has made inroads into the market on commercial scale. More promise is being shown by L.T.E which is termed as the true representation of 4th generation technologies that will set the platform for coming generations in telecommunication world. The journey towards 4th generation technologies started with Wimax in early 21st century. Wimax is an acronym for World Wide Interoperability Microwave Access. It is another name for ubiquitous internet connection, be it on the go or under the roof. Work was in place for last few years and it was first introduced on commercial scale for public use in South Korea. Many more countries have joined the caravan and have implemented 4G on co mmercial scale. The recently published requirements for a true 4G system specified by I.T.U, demand more than Wimax and L.T.E initial versions offered, Wimax 2.0 and L.T.E Advanced fulfill the requirements being stated by I.T.U as the just members of 4th generation(Cox 2012). Wimax has made rapid progress in last few years and has a cluster scattered in various parts of the world already. Few of the companies that have implemented Wimax include Sprint, Etisalat, and Nexter to name a few. T-Mobile is aiming at L.T.E implementation on fully commercial scale in coming days. 802.16d vs. 802.16e: Improvements have been made in the Wimax technology periodically, the initially launched version was 802.16d which provided limited or no mobility. In order to capture large scale market and attract customers to itself, a new version 802.16e was introduced later in 2005 which provided ease of movement and had focus on mobility Features of Wimax: Wimax provides large number of features compared t o its predecessors and few of them are: OFDMA (Orthogonal Frequency Division Multiplexing Access): An interface aimed to overcome the short comings of OFDM, provides the feature of entertaining multiple users at the same time and brings about more stability and reliability in the network. The use of Fast Fourier Transform (F.F.T) by the incumbent allows increased number of bits being transformed from one source to another (spectral efficiency) .802.16d made use of OFDM while the later version (802.16e)

Tuesday, November 19, 2019

LP6- Juvenile Justice Assignment Example | Topics and Well Written Essays - 750 words

LP6- Juvenile Justice - Assignment Example However, some adverse effects may vary depending on the quantity consumed, the rate of body metabolism, and individual mood. Some of the most commonly abused drugs include marijuana, cocaine, heroin and alcohol (Bruce and Tracey 2-6). Marijuana is dry shredded leaves ranging from brown to green mixture of flowers stem and leaves of a plant termed as cannabis sativa. This type of drug in its resinous form is called hashish. Marijuana contains a chemical component known as tetrahydrocannabinol (THC), this chemical subjects the body it into euphoric state (feeling high). According to center of diseases and control (CDC), marijuana contains over 70% cancer causing substances compared to cigarettes and persistence use often lead to inflammation on the respiratory system. Several studies have also indicated that this drug causes abnormalities of the brain giving a leeway to diseases such as psychosis. In male, marijuana changes the structure of the formation of sperm cell and this may lead to infertility and it interferes with the menstrual cycle in women. The drug also causes abnormal cell division leading to premature births and is one of the leading causes of leukemia amongst newborn children. In conclusion, cannabi s increases the rate of heartbeat, interferes with the physical coordination and causes dizziness (Diane and Samantha 100). Cocaine falls amongst the addictive stimulant drugs generated from a coca plant mostly grown in South America. This drug in its processed form is known as crack. Cocaine drug is inhaled through the nostril or can be directly injected into the blood stream in form of solution. This drug increases the rate of heartbeat, nausea and enhances abnormal breathing patterns (Diane and Samantha 100). Even though cocaine is mainly associated with short term effects, its abusers often suffer from damaged nose cartilage thus leading to paranoia and abnormal breathing

Saturday, November 16, 2019

Cultural evolution Essay Example for Free

Cultural evolution Essay In his article â€Å"Where Do Social Relations Come From? †, Michael Grossetti discusses the ways that human relationships are studied by sociologists, citing that often the methodology begins by starting with the relationship ad working backward to define it (Grossetti,p. 289). The most lasting relationships are the ones that come from organizations, he concludes, especially those related to family and friends. When we related this conclusion back to cultural evolution theory, we can argue that the lasting relationships of this generation because at this point in time most relationships are forged out of organizations or via our families. However, we can clearly argue that once this may not have been true as people had longer term relationships with people in their neighborhoods and those with whom they had a physical proximity. Grossetti argues that neighborhoods do not provide a basis for lasting relationships as they do not necessarily share life values or interests which draw people together (p. 292). When discussing this assertion in relation to cultural evolution, we can argue that in the recent past, neighborhoods did share a commonality that is now missing – immigrants would tend to settle in neighborhoods, neighborhoods would be divided by racial or religious lines, or at the most tangential neighborhoods would be reflective of a certain socio-economic status. Now, according to Grossetti’s study, relationships have evolved to the point that people develop relationships based primarily on organizations which they belong to –church groups, work groups, or interest organizations. When this is combined with the use of social networks, it can be observed that people are then creating a new means to segregate themselves via their interests. People have developed a new means to identify people with like interests and create new association groups. The interesting aspect of this evolving form of meeting may be that it creates relationships among people who in previous generations may never even have met. Because social networking allows people with common interests to meet without the traditional introduction of a mutual friend, they may completely change the way relationship develop in the future, dovetailing nicely with the theory of cultural evolution.

Thursday, November 14, 2019

Stereotypes about Homelessness in America in Dumpster Diving by Lars Ei

Stereotypes about Homelessness in America in Dumpster Diving by Lars Eighner Lars Eighner's short essay, "Dumpster Diving," reveals the stereotypes about homelessness in America. In order to confirm these known stereotypes about American culture, Eighner includes autobiographical accounts of the economically inferior class, as well as revealing his elitist rules that governs the life of a homeless person. According to Eighner, homeless people fall into the following categories, 'can scroungers', 'Dumpster divers', and 'scavengers.' (Eighner, 1993). In addition, Eighner's blatant demonstration of his superiority to the people he scavenges from reveals his true character of snobbery. Although Eighner reveals that his chosen lifestyle was to live on another's refuge, he kept in accordance with his acts of superiority and snobbishness by excluding himself from the term "Dumpster Diving." Instead, he preferred to be called a "scavenger because of its frankness in the term." (Eighner, 1993). Furthermore, Eighner, explains that there are rules to abide by when successfully "scavenging" through dumpsters, "using the senses†¦knowing the dumpsters of a given area†¦. [and] Why was this discarded?" It is the explanation of the three guidelines Eighner asserts to be superior to 'can scroungers' (Homeless people who rummage through the dumpsters for money). The author further elaborates his snobbishness by revealing that he has tried the heinous lifestyle of "can scroungers," and deduced that only a few dollars could be obtained. Moreover, Eighner states, "one can extract the necessities of life from the dumpsters directly with far less effort than would be requir ed to accumulate the equivalent of cans." (Eighner, 1993). The author stereoty... ...ghner, 1993). It is the authors belief that consumers are aware of their consumption, as well as realize how wasteful they are with food in general For the students who do not fit into Eighner's wasteful category, he presents a grouping of frugal consumers who, "carefully wrap up even the smallest leftover[s] and shove it into the back of the refrigerator for six months or so before discarding it" (Eighner, 1993). Through the essay, "Dumpster Diving," Eighner impresses his superiority by illustrating disinterested people and their lack to complete certain tasks the author is skillful at. His disdain and impudence of students†¦ Eighner's autobiographical essay not only shows the degradation homeless people indure, but his personal snobbery of those around him Works Cited Eighner, Lars. Dumpster Diving. http://www1.broward.edu/~nplakcy/docs/dumpster_diving.htm

Monday, November 11, 2019

Management Information System to Organisations Essay

â€Å"Management information system is essential for creating competitive firms, managing global corporations, and providing useful products and services to customers.† (Laudon, 2002,P1) It provides information figure of reports and displays to managers. For example, sales managers may use their computer workstations to get sales results of their products and to access weekly sales analysis reports, and then evaluate sales made by each salesperson. â€Å"Management information systems arose in the 1970s to focus on computer-based information systems aimed at managers.† (Laudon, 2002, P15). Because of the growths of the Internet, globalisations of trade, and the rise of information economies, have to improve the role of information systems in business and management. And then it needs pays attention to organisation management information that issues raised by sociology, economics, environment and psychology. â€Å"An organization is a stable, formal social structure that takes resources from the environment and processes them to produce outputs.† (Laudon, 2002,P87) This essay will be evaluating the contribution of Management Information System to Organisations. Like as What relationship between information and manager’s job; computer network’s importance for management information development; different types of management information systems to use differences and how it is impact and limitation of information systems. Firstly, before organisation Management Information need to understand it that have four factors determine the usefulness of information a manager: quality, timeliness, completeness, and relevance (Gareth, 2000,P613) â€Å"Accuracy and reliability determine the quality of information.† (Gareth, 2000,P613) tell us higher quality of information need have greater accuracy and reliability. The greater accuracy and reliability’s information will bring correct decision for manager. For example, accounting informstions, † information as accuracy refers to the extent to which information effectively represents a situation as it really is, the accuracy of each source of data used varied widely.†((Volking, 1993, P8) The source where accuracy posed the greatest problem was the marketing database.So I think usefulness informations need have accuracy and  reliability, accuracy and reliability determine the quality of information. â€Å"Information that is timely is available when it is needed for managerial action, not after the decision has been made† (Gareth, 2000,P614) In today’s speedily changing world and technology ‘s developing, lead to information changing frequently. Real-time Information is reflecting current conditions. (Gareth, 2000,P614) For example, productions’ price changing frequently in marketing because manager wants to make profit in competition’s marketing. So manager should be pay attention to information’s changing. Catch Real-time information is very importance. Look at timeliness in accounting â€Å"Timeliness: accounting information should be made available to external decision-makers before it loses its capacity to influence decisions.† (Dyckman, 1992, P44) Like the news of the world, old financial information never carries the same impact fresh information carries. Otherwise lack of timeliness reduces relevance. â€Å"Information that is complete gives managers all the information they need to exercise control, achieve coordination, or make an effective decision.† (Gareth, 2000,P615) information’s completive will provided good help to manager to decision. When you set up a new business, look at complete information is importance. Such as, how is this productions sold, how long can make profit and how much capital need put in this company at first time. Also information in accounting system also need pay attenation to information’s completetive. â€Å"Information that is relevant is useful and suits a manager’s particular needs and circumstances† (Gareth, 2000,P615) It can make a difference in a user’s decision. Relevance refers to the capacity of accounting information to make different to external decision-makers who use financial reports. They use accounting information with either or both of two viewpoints in mind: Forecasting what the economic future is likely to hold. Confirming the accuracy of past forecasts. Stated more technically, relevant accounting information help users to make predictions about future events, to confirm or correct prior expectations, and to evaluate current conditions. (Dyckman, 1992, P43) In my opinion, relevant is most importance, because if the data are not relevant to the task at hand, manager will be make mistake by these wrong information, and west time in wrong decisions. And then will bring some problem for this company’ s operation. Information decision, control and coordination Secondly, information technology’s development is importance for management information development. Because the growths of the Internet, globalisations of trade, and the rise of information economies, it have to improve the role of information systems in business and management. Software is the detailed instructions that control the operation of a computer system. Without software, computer hardware could not perform the tasks we associate with computers. The functions of software are to (1) manage the computer resources of the organisation (2) provide tools for human beings to take advantage of these resources, and (3) act as an intermediary between organisations and stored information. Selecting suitable software for the organisation is a key management decision. (Laudon, 2002,P172) Thirdly, different types of management information systems to use differences: a transaction-processing system is a system designed to handle large volumes of routine, recurring transactions. (Gareth, 2000,P625) For example, managers use transaction- processing system to record sale of items and path inventory levels, employee record keeping, and payroll. â€Å"A management information system that gathers, organize, and summarizes comprehensive data in a from that managers can use in their nonroutine coordinating, controlling, and decision-making task.(Gareth, 2000,P626) Operational Systems are concerned with transaction handling and the  day-to-day operation of the organisation, usually for a particular department within the organisation. Data are entered and stored in a file format, and are updated regularly during routine processing. Example, Producing invoices and monthly reports for operational-level managers, and fortnightly payroll cheques. The major disadvantage of this system is that they are inflexible and so not able to be adapted easily to do new tasks, or expected tasks earlier than usual. They also do not support any decision-making advice ability for tactical and strategic-level managers. Most companies today have gone beyond this system. (Long, 1994,P365-397) Decision support systems give direct computer support to managers during the decision-making process. For example advertising managers may use an electronic database packs up to do what, if analysis as they test the impact of other advertising budgets on the forecasted sales of new products. (O’Brien, 1997,P31) A Decision Support System is an interactive information system that rely on integrated user-friendly hardware and software designed to assist mangers make decisions related to the efficient and profitable running of the business. Expert systems can provide expert advice for operational chores like equipment diagnostics, or managerial decisions such as loan portfolio management. (O’Brien, 1997,P32) Expert systems have been developed for subjects such as medical diagnosis, oil exploration, financial planning, taxation return preparation, chemical analysis, surgery, weather prediction, computer repair, nuclear power plant operation, newspaper layout, interpreting government regulation, and troubleshooting computer systems configurations (eg. MS Help). (Long, 1994,P365-397) Finally, management information systems also have some limitations and some technology impact its development. The advance in management information system and technology are having important effects on managers and organisations. (Gareth, 2000,P629) One of the most important of these  involves the subjectivity of the scoring technique. Clearly establishing the extent to which a data attribute is inherent in any one data source is highly judgemental. Likewise, establishing weightings for each attribute is also a highly subjective process. These tasks are therefore very much subject to the perception of the individuals who carry them out. This problem could be partly overcome by increasing the objectivity with which such estimates are made. Conclusion, Management information system is an information system that managers’ plan and design to provide themselves with the specific information they need. (Gareth, 2000,P615)This essay has Evaluated the contribution of Management Information System to Organisations. Including about Like as What factors determine the usefulness of information a manager; computer network’s importance for management information development; different types of management information systems to use differences and how it is impact and limitation of information systems. From this essay, we can know MIS have some advantages for our used, however this tool is not perfect, also have limitations for it. So Managing a good company , need understand it first. Reference: Gareth R.Jones, Charles W.L. Hill & Jennifer M.George, 2000, Contemporary management, The McGraw-Hill Companies, America. Kenneth C. Laudon & Jane P. Laudon, 2002, Management Information Systems, Upper Saddle River, New Jersey 07458,America. Galliers.R., 1992, Information System Research: issues,methods,and practical guidelines, Blackwell Scientific Publications,UK. Dyckman, T., & Dukes, R., 1992, Intermediate Accounting, IRWIN, America. O’Brien, J., 1997, Introduction to information, IRWIN, America. Stair.,R, & Reynolds, G., 2001, Principles of Information Systems, Course Technology, Australia. Mitchell, Volking, Yan E. Management Decision. Analysing the quality of management information: A suggested framework, London,1993. Vol. 31, Iss. 8; pg. 12, 8 pgs. Larry Long, Computers and Information Systems, 4th Ed., 1994, Prentice Hall, ISBN: 0-13-497884-6, chapter. 12, pages 365 – 397 Krumwiede, Kip. Cost Management Update. Survey reveals factors affecting, Montvale: Apr 1996. p. 1 (2 pages) URL: http://gateway.proquest.com/openurl?ctx_ver=z39.88-2003&res_id=xri:pqd&rft_val_fmt=ori:fmt:kev:mtx:journal&genre=article&rft_id=xri:pqd:did=000000009475160&svc_dat=xri:pqil:fmt=text&req_dat=xri:pqil:pq_clntid=20901 Grover Dunn, Debra K Walker, Steve Hannaford. Air Force Journal of Logistics. Information technology, Gunter AFS: Spring 2003. Vol. 27, Iss. 1; p. 14. URL: http://gateway.proquest.com/openurl?ctx_ver=z39.88-2003&res_id=xri:pqd&rft_val_fmt=ori:fmt:kev:mtx:journal&genre=article&rft_id=xri:pqd:did=000000382958551&svc_dat=xri:pqil:fmt=text&req_dat=xri:pqil:pq_clntid=20901 Steven A Morris, Thomas E Marshall, R Kelly Rainer Jr. Information Resources Management Journal. Impact of user satisfaction and trust on virtual team members, Hershey: Apr-Jun 2002. Vol. 15, Iss. 2; p. 22 (9 pages)

Saturday, November 9, 2019

Marketing Concept Summary

Summary Definition of Marketing Marketing is not manipulating consumers to get them to buy products they do not want and it is not just selling and advertising. Marketing is a group of activities designed to expedite transactions by creating, distributing, pricing, and promoting goods, services, and ideas. Marketing facilitates the exchange, the act of giving up one thing in return for something else. The central focus of marketing is to satisfy needs. Example) People is willing to exchange their â€Å"something of value-money or credit-for soft drinks, football tickets, or new shoes because you consider those product more valuable or more important than holding on to your cash or credit potential. Functions of Marketing Marketing includes many varied and interrelated activities; buying, selling transporting, storing, grading, financing, marketing research, and risk taking. (Example) Fresh oranges are only available for a few months annually, but consumers demand juice throughout th e entire year.Seller must arrange for cold storage of orange juice concentrate so that they can maintain a steady supply all of the time. Creating Value with Marketing Marketing creates value, which is an important element of managing long-term customer relationships and implementing the marketing concept. Value is a customer’s subjective assessment of benefits relative to costs in determining the worth of a product. (Customer Value = Customer Benefits – Customer Costs) Also you can read this summary –  Protecting Freedom of Expression on the CampusThe Marketing conceptThe marketing concept is the idea that an organization should try to satisfy customers’ needs through coordinated activities that also allow it to achieve its goals. If a company does not implement the marketing concept by providing products that consumers need and want while achieving its own objectives, it will not survive. (Example) McDonald’s faces increasing pressure to provide more healthful fast-food choices. To keep pace with the customers’ needs, it has eliminated supersized fries and soft drinks and put nutritional information on its food packaging. It also switched to trans-fat-free cooking oils.Although customer satisfaction is the goal of the marketing concept, a business must also achieve its own objectives, such as boosting productivity, reducing costs, or achieving a percentage of a specific market. If it does not, it will not survive. (Ex ample) Dell sold computer for $50 and give customers a lifetime guarantee, which would be great for customers but not so great for Dell. To implement the marketing concept, a firm must have good information about what consumers want, adopt a consumer orientation, and coordinate its efforts through the entire organization. Developing a Marketing StrategyA marketing strategy is a plan of action for creating a marketing mix (product, price, distribution, promotion) for a specific target market (a specific group of consumers on whose needs and wants a company focuses its marketing efforts). Some firms use a total-market approach, designating everyone as the target market. Most firms divide the total market into segments of people who have relatively similar product needs. A company using a concentration approach develops one marketing stratagem for a single market segment, whereas a multi-segment approach aims marketing efforts at wo or more segments, developing a different marketing st ratagem for each. (Example of a total-market approach) Salt, sugar, and many agricultural products (Example of market segmentation) Woman, Hispanic, and minority population Key Points and Terms Marketing A group of activities designed to expedite transactions by creating, distributing, pricing, and promoting goods, services, and ideas. Exchange The act of giving up one thing (money, credit, labor, goods) in return for something else (goods, services, or ideas) ValueA customer’s subjective assessment of benefits relative to costs in determining the worth of a product. (Customer Value = Customer Benefits – Customer Costs) Marketing Concept The idea that an organization should try to satisfy customers’ needs through coordinated activities that also allow it to achieve its own goals. Marketing Orientation An approach requiring organizations to gather information about customer needs, share that information throughout the firm, and use that information to help build long-term relationships with customers.Marketing Strategy A plan of action for developing, pricing, distributing, and promoting products that meet the needs of specific customers. Market A group of people who have a need, purchasing power, and the desire and authority to spend money on goods, services, and ideas. Target Market A specific group of consumes on whose needs and wants a company focuses its marketing efforts. Total-Market Approach An approach whereby a form tries to appeal to everyone and assumes that all buyers have similar needs. Market SegmentationA strategy whereby a firm divides the total market into groups of people who have relatively similar product needs. Market Segment A collection of individuals, groups, or organizations who share one or more characteristics and thus have relatively similar product needs and desires. Concentration Approach A market segmentation approach whereby a company develops one marketing strategy for a single market segment. Multi-segment Approach A market segmentation approach whereby the marketer aims its efforts at two or more segments, developing a marketing strategy for each.

Thursday, November 7, 2019

How to Amend the Constitutionâ€About the Process

How to Amend the Constitution- About the Process Amending the Constitution was never meant to be simple. Although thousands of amendments have been discussed since the original document was approved in 1788, there are now only 27 amendments in the Constitution. Though its framers knew the Constitution would have to be amended, they also knew it should never be amended frivolously or haphazardly. Clearly, their process for amending the Constitution has succeeded in meeting that goal. Constitutional amendments are intended to improve, correct, or otherwise revise the original document. The framers knew it would be impossible for the Constitution they were writing to address every situation that might come along in the future. Ratified in December 1791, the first 10 amendments- The Bill of Rights- list and vow to protect certain rights and freedoms granted to the American people and speak to the demands of the Anti-Federalists among the Founding Fathers by limiting the power of the national government. Ratified 201 years later, in May 1992, the most recent amendment- the 27th Amendment- prohibited members of Congress from raising their own salaries.   The Two Methods for Amending the Constitution Article V of the Constitution itself establishes the two ways in which it may be amended: The Congress, whenever two thirds of both Houses shall deem it necessary, shall propose Amendments to this Constitution, or, on the Application of the Legislatures of two thirds of the several States, shall call a Convention for proposing Amendments, which, in either Case, shall be valid to all Intents and Purposes, as Part of this Constitution, when ratified by the Legislatures of three fourths of the several States, or by Conventions in three fourths thereof, as the one or the other Mode of Ratification may be proposed by the Congress; Provided that no Amendment which may be made prior to the Year One thousand eight hundred and eight shall in any Manner affect the first and fourth Clauses in the Ninth Section of the first Article; and that no State, without its Consent, shall be deprived of its equal Suffrage in the Senate. In simple terms, Article V prescribes that amendments may be proposed either by the U.S. Congress or by a constitutional convention when and if demanded by two-thirds of the legislatures of the states. Method 1: Congress Proposes an Amendment An amendment to the Constitution may be proposed by any member of the House of Representatives or the Senate and will be considered under the standard legislative process in the form of a joint resolution.  In addition, as ensured by the First Amendment, all American citizens are free to petition Congress or their state legislatures to amend the Constitution. To be approved, the amending resolution must be passed by a two-thirds supermajority vote in both the House and the Senate. Given no official role in the amendment process by Article V, the President of the United States is not required to sign or otherwise approve the amending resolution. Presidents, however, typically express their opinion of proposed amendments and may attempt to persuade Congress to vote for or against them. States Ratify the Amendment If approved by Congress, the proposed amendment is sent to the governors of all 50 states for their approval, called â€Å"ratification.† Congress will have specified one of two ways by which the states should consider ratification: The governor submits the amendment to the state legislature for its consideration; orThe governor convenes a state ratifying convention. If the amendment is ratified by three-fourths (currently 38) of the state legislatures or ratifying conventions, it becomes part of the Constitution. Resurrecting ERA? Clearly, this method of amending the Constitution can be lengthy and time-consuming.  However, the U.S. Supreme Court has stated that ratification must be completed within â€Å"some reasonable time after the proposal.† Beginning with the 18th Amendment granting women the right to vote, it has been customary for Congress to set a maximum time period for ratification. This is why many have felt the Equal Rights Amendment is dead, even though it now needs only one more state to ratify it to achieve the required 38 states. The ERA amendment was passed by Congress in 1972; 35 had ratified it by its extended deadline of 1985. However, in 2017 and 2018, two more states ratified it, concerned about the constitutionality of setting those deadlines. If Virginia would ratify it in 2019, people expected a battle to ensue in Congress over whether to accept the late ratifications. Method 2: The States Demand a Constitutional Convention Under the second method of amending the Constitution prescribed by Article V, if two-thirds (currently 34) of the state legislatures vote to demand it, Congress is required to convene a full constitutional convention. Just as in the Constitutional Convention of 1787, delegates from every state would attend this so-called â€Å"Article V Convention† for the purpose of proposing one or more amendments. Though this more momentous method has never been used, the number of states voting to demand a constitutional amending convention has come close to the required two-thirds on several occasions. Indeed, the mere threat of being forced to surrender its control of the constitutional amendment process to the states has often prompted Congress to preemptively propose amendments itself. Although not specifically mentioned in the document, there are five unofficial yet legal ways of changing the Constitution  used more often- and sometimes even more controversially- than the Article V amendment process. These include legislation, presidential actions, federal court rulings, actions of the political parties, and simple custom. Can Amendments Be Repealed? Any existing constitutional amendment can be repealed but only by the ratification of another amendment. Because repealing amendments must be proposed and ratified by one of the same two methods of regular amendments, they are very rare. In the history of the United States, only one constitutional amendment has been repealed. In 1933, the 21st Amendment repealed the 18th Amendment- better known as â€Å"prohibition†- banning the manufacture and sale of alcohol in the United States. Though neither has ever come close to happening, two other amendments have been the subject of repeal discussion over the years: the 16th Amendment establishing the federal income tax and the 22nd Amendment limiting the president to serving only two terms. Most recently, the 2nd Amendment has come under critical scrutiny. In his editorial appearing in the New York Times on March 27, 2018, former Supreme Court Justice John Paul Stevens controversially called for the repeal of the Bill of Rights amendment, which guarantees â€Å"the right of the people to keep and bear Arms, shall not be infringed.† He argues that it would give more power to peoples desire to stop gun violence than the National Rifle Association. Sources The Constitutional Amendment Process. The U.S. National Archives and Records Administration. November 17, 2015.Huckabee, David C. .Ratification of Amendments to the U.S. Constitution  Congressional Research Service reports. Washington D.C.: Congressional Research Service, The Library of Congress.Neale, Thomas H. .The Article V Convention to Propose Constitutional Amendments: Contemporary Issues for Congress  Congressional Research Service.

Monday, November 4, 2019

Should the police use deceit in interrogations Essay

Should the police use deceit in interrogations - Essay Example endment provides a person with the right not to confess anything against one’s own will, there are bunches of strong psychological techniques that help police to extract the confessions they need from their suspects, making a suspect confused in whether his confession is his own or has come against his actual will (Najdowski & Bonventre 26). Hence, police workers often use multiple tricks and deceptive methods during interrogations of their suspects. The use of deceit during interrogations may be implemented in multiple forms. Policemen often speculate with false evidences and assert that they have something on the suspect, for instance, that they’ve found fingerprints of personal stuff of the suspect on the crime scene, or that they’ve got some witnesses who saw the suspect making the crime, when in fact they’ve got nothing on the person. Such kind of method of interrogation is not only unethical but may lead to a case going in the wrong path of investiga tion. First of all, application of tricks and different deceptive psychological techniques during the interrogation process can make a suspect to confess in a crime one hasn’t done. Some studies on the matter mark out two kinds of false confessions result from a suspect’s entanglement in the current state of affairs of a case. The â€Å"coerced-compliant† (Conti 22) confession is the confession when a suspect is stressed and terrified by the police’s psychological oppression and agrees to confess in order to get rid of the stress he’s got into. Thus a person might be aware of the fact that he hasn’t done anything wrong but thinking of the police having something on him makes one desperate, so he starts considering confession, as it may probably shorten his sentence. Moreover, police often offers some deals of protection in court, so the suspect decides that if anyway he’s going to be sentenced, then why not to get at least a smaller sentenc e. The second type of false confessions is called

Saturday, November 2, 2019

Usage Of Cloud Computing In IT-Sphere Essay Example | Topics and Well Written Essays - 750 words

Usage Of Cloud Computing In IT-Sphere - Essay Example To understand the concerns, insights and popularity of cloud computing by both private and public sectors, not only currently but also on the future perspective, IT Professionals conduct statistics and conclude suggestions and likely future predictions to comprehend their observations and understandings for current and future implementation of cloud computing and what IT assessment makers need to consider. With the growth in applications and infrastructure that support and collaborates with cloud computing, the growth trend in its acceptance, use and promotion are likely to give rise to a whole new dimension in Information Technology’s system delivery (Sosinsky, 2011). E-mail, web conferencing etc. are the most common collaboration services which use cloud services. Currently, 92% of large enterprises use a minimum of one cloud service while on average each enterprise has 6 applications usage to the cloud. IaaS and PaaS in the cloud are increasing as 42% of future implementations of clouds indicate 6 more applications. This owes to the immense current and future usage with development in infrastructure and virtualization as a source of cloud acceptance and popular use. The economic perspective of efficiency in work, support, better productivity and low-cost initiative of cloud tends IT decision makers to make a close observation of cloud services. Since the promising new environment of technology has to offer more, the IT professionals are attracted to cloud services implementation. However, reputable service provider and  Service Level Agreements (SLAs)-which are always not clear, raise security and protection issues. I.T Professionals fear the risk of being cheated, the information getting lost or the privacy of the consumer at risk. These risks keep development of platform low.