Thursday, November 28, 2019

Privacy and Homeland Security

Introduction Privacy of individuals is an issue of concern. This confidentiality is guaranteed under the Privacy Act of 1974, 5 USC 552a. Provisions of privacy of citizens guarantee every individual that his or her personal identification information should not be collected without legal authority.Advertising We will write a custom research paper sample on Privacy and Homeland Security specifically for you for only $16.05 $11/page Learn More However, the Department of Homeland Security (DHS) along with policies and technology, are violating people’s right to privacy. The information collected about an individual by the federal government and its authorities should only be done with legal authorization. The Department of Homeland Security has gone ahead to maintain this information in a way that allows its access by unauthorized persons, groups, or institutions. In the common law, any person who is aggrieved by one who illegally intrudes into his o r her privacy discloses any personal information, or does false publication about people’s names can initiate a lawsuit. No one should be compelled to give his or her private information unless under the authority of the law in case of investigations. The Department of Homeland Security is charged with the responsibility of providing mechanisms to ensure security to all Americans. However, the need to ensure intelligence makes the department endeavor to collect personal information in diverse ways. As various agencies of the DHS collect information, privacy Acts require the department to provide that there is authority, purpose, routine, and disclosure regulation. There have been controversies about the way Homeland Security officers collect information from citizens. Various quarters have risen complains that the department collects Personally Identifiable Information (PII) without legal authority. The department has also been accused of illegal disclosure of personal inform ation. Therefore, this research proves that if privacy is subverted, with the DHS practices continuing to be under the umbrella of safety, civil rights will continue to diminish until they are non-existent. To support this thesis statement, the report will rely highly on the Privacy Act of 1974, the US Constitution, the Patriot Act, the National Defense Authorization Act, department policies and memorandums, scholarly journals and law reviews, E-Government Act of 2002, and the Federal Records Act among others. The findings will be useful in enhancing the application of contract laws since they reveal the instances when Personally Identifiable Information (PII) can be collected, revealed, or shared.Advertising Looking for research paper on homeland security? Let's see if we can help you! Get your first paper with 15% OFF Learn More Research Questions This paper seeks to address the following questions: Why is the Department of Homeland Security violating citizens†™ constitutional rights in exchange for protection? Should the willingness to provide personally identifiable information (PII) be voluntary or mandatory by law? Hypothesis Based on the above research questions that have been raised on matters of privacy and homeland security, the paper hypothesizes that the United States citizens are willing to give up their right to privacy in the name of security. The willingness to provide personally identifiable information (PII) should be made voluntary by amending various US Acts on confidentiality. Review of Literature There is a wide range of theoretical and conceptual literature on the issue of privacy and homeland security. The security of the federation of the United States of America is the most critical issue on matters of national interest. The conceptual framework derives its force from the fourth amendment, which gives people the right to be free of any unwarranted search as Marc reveals1. Also, the fourteenth amendment gives th em the right to due process. According to Jacob, â€Å"the Harvard Law Review of 1890 provided the theoretical basis of the right  to privacy†2, which has been cited by many books and courts. Several former presidents of the United States of America have been assassinated in the past. Moreover, the September 2001 attack on the World Trade Center by terrorists caught the country off guard. Since the September 11 attack, the homeland security has intensified its security plans, as addressed in the National Defense Authorization Act.  According to William, the need to ensure the privacy of citizens resulted in the â€Å"formation of the privacy office in the Department of Homeland Security†3. Under the Privacy Act of 1974, the Department of Homeland Security is charged with the responsibility of protecting the privacy of all Americans. However, transparency in the Department of Homeland Security is also guaranteed under various Acts. William notes that transparency re gulates the adoption of different privacy rules in planning matters of security4. It also ensures that the technology adopted by various institutions, including the Department of Homeland Security, adheres to privacy regulations. The need for transparency recommends the Department of Homeland Security take fair information Practice principles (FIPPs) in its endeavor to ensure the privacy of citizens. The federal laws should also regulate the purpose for which personally identifiable information is to be obtained. Officers of the departments are restricted by the Privacy Act of 1974 from obtaining Personally Identifiable Information from citizens without the right authorization. However, the issue of security threats in the US has forced many Americans to give out much of their personal and/or private information in the name of securing themselves. This Act has tampered with their civil liberty. Civil liberty violations and privacy issues are emerging. One of the significant problems in matters of privacy is authorization. Paul and Daniel affirm that officers from the homeland security agencies that collect PII must have the right legal authority to carry out the duty5. Article 2 (10) of the Montana constitution directs that unauthorized persons cannot obtain personally identifiable information from any citizen in the United States.Advertising We will write a custom research paper sample on Privacy and Homeland Security specifically for you for only $16.05 $11/page Learn More Officers from various defense bureaus must be authorized to obtain private information. Not all officers are allowed to collect personally identifiable information. However, many of them from multiple agencies within the DHS misuse their powers to violate the privacy rights by fostering relationships with the business sector and local law enforcement, as well as, using technology to invade people’s personal lives. They do not obtain executive order befo re carrying out duties related to matters of privacy. The Privacy Act 5 USC 552a protects every citizen under investigation by the homeland security by ensuring that all information that such security officers may obtain from him or her is used only for the legally authorized purpose. Besides, homeland security is restricted by the same Act to get only the necessary and related information. Elizabeth asserts that the need to ensure security and intelligence information should not be a reason to push people into giving out all their details6. Homeland security regulations on how to obtain information are spelled out in the Privacy Act of 1974, for example, the Privacy Act 1974, 5 USC, 552a (e) (3). All investigative bodies and agencies that seek intelligence information from various individuals are required by law to provide such individuals with the Privacy Act Statement. Collection of PII from an individual without his or her consent and/or the provision of the Privacy Act Statemen t is considered illegal. In fact, even when the homeland security wants to collect information for other purposes other than for storage, the Privacy Act statement must be issued to the respondent. The need to obtain such documents like the Privacy Act Statement has made many security agencies associate the regulations with obstacles towards speedy and free access to intelligence information. According to Jacob, many quarters of homeland security argue that homeland security officers should be allowed to access personal information from any individual without warning or consent7. The debate behind this school of thought is that as the security officers prepare the documents and/or issue them to the alleged criminals, the criminals are able to escape or adjust the information, hence tampering with the justice process. Privacy Acts have, therefore, been associated with obstruction of intelligence in the federation.  Another essential aspect of matters of privacy and homeland securit y is the storage of PII by the authorities in the name of security. The privacy Act regulates the disclosure of personal information by homeland security to other individuals or organizations.Advertising Looking for research paper on homeland security? Let's see if we can help you! Get your first paper with 15% OFF Learn More According to William, personally identifiable information is supposed to be guarded in the best way possible to ensure that no unauthorized person is able to access it and that no wrong reasons, for instance, giving up some of the Americans’ rights in order to be safe and/or prevent another 9/118. Storage and routine management of information are also regulated by the Privacy Act. Not every person who works in homeland security can be trusted with private information. The persons on whom privacy information can be disclosed is also regulated by statutes such as Shine the Light Law (2005) SB 27 and CA Civil Code 1798.83). Such persons are adjusted based on whether they are within the homeland security department and/or the purpose for which they intend to use the information. The purpose of collecting personally identifiable information is also regulated by the Privacy Act of 1974. Authorization statements that are issued to various security officers are not issued without a c rucial purpose. Before authorization to obtain private information is issued by the homeland security, the Department of Homeland Security ensures that it can be able to cite factual leads that warrant investigation of a particular individual. The purpose for which personally identifiable information is obtained must also be made known to the Americans from whom the information is obtained. According to William, â€Å"Article 1, 1 CA SB 1386 of the California law provides that privacy is one of the inalienable rights†9. Therefore, information obtained must not be used for other purposes other than that which was disclosed to the person at the point of receiving it. The Act also regulates that PII information stored in the homeland security database should be deleted immediately after its use is over. However, one would wonder why the issue of security in the US should be used as a basis to lure Americans into unveiling that which they should keep sealed. Paul and Daniel affir m that proper disclosure of personally identifiable information should be carried out to avoid releasing it to unauthorized persons10. The ‘Shine the Light’ Law (2005) SB 27, CA Civil Code 1798.83 regulates the disclosure of any private information. Disclosure of personally identifiable information is another issue with privacy and homeland security. Should disclosure of PII be voluntary or mandatory? The Privacy Act of 1974 directs that private information should be obtained in a deliberate manner. However, the Act gives exceptions that disclosure can be mandatory. A duty to provide information is imposed by the federal statute. Elizabeth asserts that compulsory disclosure of information can also be warranted by an order from the executive11. In addition, the US Constitution and the Patriot Acts also warrant for mandatory disclosure of information by an individual. Moreover, persons who are required by various statutes to disclose information are liable for punishment by law if they fail to provide such information. Persons who refuse to offer information that is much required by homeland security are denied some of the privileges and benefits guaranteed by the US constitution. I  t is out of such clauses in the Privacy Act that the human rights organizations and human rights activists in America have raised protests. The claim is that obtaining information from any individual through forceful means contravenes the bill of rights. Elizabeth asserts that proper use of the privacy statutes will be of importance to the contract law12. It will be possible to prevent intrusion of solitude and misuse of powers to intrude into Americans’ private details in the name of heightening their security. Article 2 (10) of the Montana constitution guarantees the right to personal privacy. Privacy laws will ensure that no agency will be allowed to force its way to another in terms of electronics or even physically. It will also be illegal for homeland sec urity to disclose a private fact. Currently, there have been arguments around disclosure of truthful facts about a person. Methodology The research will adopt a descriptive survey method. The study will rely on first-hand data that will be collected through direct interviews on a representative sample of security officers, legal officers, and citizens. An example of 100 security officers from the Department of Homeland Security (DHS), 50 judicial officers practicing in various states of the United States, and 100 citizens of the United States will be used. 250 people will be taken as a good representative sample from the whole population involved in matters of privacy and homeland security. The interviews will be conducted by issuing a questionnaire with both closed and open-ended questions. The resultant data will then be coded and presented in the form of tables and analyzed in graphs. Data Presentation Table 1.0 Ways in which Homeland Security interferes with privacy in America Stakeholders in privacy and homeland security/Factor of privacy Security officers (out of 100) Percentage Legal officers (out of 50) Percentage Citizens (out of 100) Percentage Unauthorized access to PII 54 54% 40 80% 88 88% Unexplained Purpose of PII 88 88% 46 92% 90 90% Illegal disclosure of PII 40 40% 24 48% 30 30% Mandatory provision of PII 60 60% 45 90% 88% 88% Graph 1.0 Table 1.0 Ways in which Homeland Security interferes with privacy in America Analysis Table 1.0 indicates various ways in which homeland security interferes with privacy in the name of securing the Americans’ life. From table 1.0, security officers rated access to personally identifiable information without legal authorization at 54%, 80% by licensed practitioners, and 88% by ordinary citizens. The indication is that security officers who thought that the privacy of individuals was interfered with were the least while most of the citizens believed that unauthorized way of obtaining PII prof oundly interfered with their privacy. In the same way, 80% of legal practitioners were for the same idea. A staggering 88% of the citizens who are the primary victims of a violation of privacy thought that the police threatened their security without authorization in the name of securing them. The implication is that homeland security officers do not obtain legal authority in most cases before intruding into individuals’ privacy by collecting personally identifiable information. Graph 1.0 also shows that homeland security violates privacy laws by carrying out unexplained purpose searches. Both table 1.0 and figure 1.0 indicate that 88% of the homeland security officers, 92% of the legal officers, and 90% of the ordinary citizens responded that security officers did not explain the purpose of the personally identifiable information that they obtained from the citizens. An average of 90% of the population sample that the research adopted believed that homeland security violated the Privacy Act of 1974 by obtaining Personally Identifiable Information without explaining its purpose to the suspects. All respondents rated violation of privacy through unexplained investigations above average. Graph 1.0 further shows that 88% of security officers who carry out the investigations did not find importance in explaining the reason for inquiries to the suspect as William reveals13. Therefore, they violated the terms of the Privacy Act. A higher 90% of the ordinary citizens affirmed that homeland security officers violated their right to privacy through unexplained searches where they were required to provide personally identifiable information. From graph 1.0, the highest score of 92% was obtained from legal practitioners who responded that they had witnessed violation of privacy laws from officers who did not explain the purpose of investigation to the victims. able 1.0 also indicates that 40% of homeland security officers, 48% of legal officers, and 30% of the ord inary citizens believed that privacy rights in America were being violated by homeland security by disclosure of personally identifiable information. Graph 1.0 shows that all the ratings of privacy violation by homeland security through exposure were below average. In fact, the ordinary civilians rated it at a staggering 30%, with security officers rating it as low as 40% while lawyers rated it at 48%. The average rating of violation of privacy through disclosure was at 39%. We can interpret that violation of privacy rights through disclosure of PII was below average in America. From table 1.0, it is clear that 60% of the homeland security officers responded that privacy rights of American might have been violated in cases of mandatory provision of PII. 90% of the legal practitioners thought that the privacy of individuals was violated through the fundamental ways of obtaining PII. 88% of the civilians also responded that violation of privacy was enhanced through effective methods o f obtaining personally identifiable information. An average of 79% of the population believed that the mandatory provision of PII was one of the prominent ways of violating privacy in America. It is therefore clear from graph 1.0 that the privacy rights of American citizens are being violated through the mandatory provision of PII, which is provided for in the 1974 Privacy Act. The claim is that the violation is legal since it is provided for by the Privacy Act itself. It is therefore recommended that the Act be amended to abolish mandatory provision of PII, failure to which civilians will be punished by law. Table 2.0 Exchanging privacy with protection Opinion/stakeholder Yes Percentage No Percentage Indifferent Percentage Security officers (out of 100) 4 4% 92 92% 4 4% Legal officers (out of 50) 40 40% 50 50% 10 10% Ordinary citizens (out of 100) 20 20% 76 76% 4 4% Graph 2.0 Privacy and security: not interchangeable Table 2.0 and graph 2.0 verify the claims of whether security matters should be used as a basis of tampering with people’s privacy. From graph 2.0, we see that 4% of security officers, 40% of legal officers, and 20% of civilians (an average of 51%) believed that privacy should not be exchanged with security. Intimacy does not hinder the security apparatus from obtaining intelligence information. Therefore, Americans should not give out their details in exchange for security. This may be attributed to the fact that unless the security apparatus obtains authorization to obtain PII, they should not investigate a suspect. The time taken to get approval does not interfere with the quality of evidence that the intelligence can gather, hence refuting the claim that lack of some private details obstructs security intelligence. Approval by an average of 51% of the population can be interpreted that privacy laws do not obstruct the process of obtaining intelligence security information. Therefore, officers should not just abuse their ma ndates by interfering with the privacy of people by seeking unnecessary personal details. Moreover, graph 2.0 shows that 92% of security officers, 50% of legal practitioners, and 76% of civilians were opposed to the idea of obstruction of security by privacy laws. An average of 43% of the population did not believe that privacy hinders security. We can deduce that there was no considerable obstruction of security by privacy laws since the rating under this question was below average. Another 4% of security officers, 10% of legal officers, and 4% of civilians were indifferent of the issue of privacy and homeland security. This was an average of 5% of the population. Conclusion The research was set to investigate the issue of privacy and homeland security. The research hypothesized that the DHS uses and/or abuses policies and technology to invade peoples’ private lives and personal privacy. Through primary research, the researchers realized that there was considerable truth in this hypothesis since the above average population in America affirmed this idea. As such, the willingness to provide personally identifiable information (PII) should be made voluntary by the amendment of various Acts on privacy. The research also upheld the hypothesis since the analysis of data indicated that the current Privacy Act of 1974 allowed violation of privacy under the disguise of mandatory provision of information. The fact that an officer had authorization allowed him or her to use punishment and deprivation of rights and privileges to obtain PII from a civilian. The research, therefore, concludes that the Act should be amended to embrace full privacy under the first amendment and the 19th amendment of the American law, which positions privacy as an inalienable human right. References Elizabeth Uzelae, Reviving the Privacy Protection Act of 1980, 107 Northwestern University L. Rev. 1437 (2013). Jacob Strahilevitz, Toward A Positive Theory of Privacy Law, 126 Harvard L. Rev. 2010 (2013). Marc Blitz, The Fourth Amendment Future of Public Surveillance: Remote Recording and other searches in Public Space, 21 American University L. Rev. 63 (2013). Paul Schwartz, and Daniel Solove, The PII Problem: Privacy and A New Concept of Personally Identifiable Information, 86 New York University L. Rev. 1814 (2011). William Mitchell, National Security: Part I: Five Questions on National Security Law: Responses to the Five Questions, 38 Wm. Mitchell L. Rev. 1564 (2012). William Prosser, Privacy, 48 California L. Rev. 383 (1960). Footnotes 1 Marc Blitz, The Fourth Amendment Future of Public Surveillance: Remote Recording and other searches in Public Space, 21 American University L. Rev. 63 (2013) 2 Jacob Strahilevitz, Toward A Positive Theory of Privacy Law, 126 Harvard L. Rev. 2010 (2013), 2010 3 William Prosser, Privacy, 48 California L. Rev. 383 (1960), 383 4 Ibid, 383 5 Paul Schwartz, and Daniel Solove, The PII Problem: Privacy and A New Concept of Personally I dentifiable Information, 86 New York University L. Rev. 1814 (2011), 1814 6 Elizabeth Uzelae, Reviving the Privacy Protection Act of 1980, 107 Northwestern University L. Rev. 1437 (2013), 1437 7 Jacob Strahilevitz, Toward A Positive Theory of Privacy Law, 126 Harvard L. Rev. 2010 (2013), 2010 8 William Prosser, Privacy, 48 California L. Rev. 383 (1960), 383 9 William Prosser, Privacy, 48 California L. Rev. 383 (1960), 383 10 Paul Schwartz, and Daniel Solove, The PII Problem: Privacy and A New Concept of Personally Identifiable Information, 86 New York University L. Rev. 1814 (2011), 1814 11 Elizabeth Uzelae, Reviving the Privacy Protection Act of 1980, 107 Northwestern University L. Rev. 1437 (2013) 12 Elizabeth Uzelae, Reviving the Privacy Protection Act of 1980, 107 Northwestern University L. Rev. 1437 (2013), 1437 13 William Mitchell, National Security: Part I: Five Questions on National Security Law: Responses to the Five Questions, 38 Wm. Mitchell L. Rev. 1564 (2012) This research paper on Privacy and Homeland Security was written and submitted by user GhostRider to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

Essay on Mrs. T Blackshear

Essay on Mrs. T Blackshear Essay on Mrs. T Blackshear Foundations of Psychology Tabitha L. Blackshear PSY/300 August 7, 2013 Linda Wilson Foundations of Psychology The world of psychology is vast and expanding every day. The search to find answers to why people act the way they do, is a never ending search. Trying to understand others is human nature and is something we do unconsciously, most of the time. Starting first with the major schools of thought in psychology is the best place to begin. There are many factors that are studied in psychology along with biological perspectives. Functionalism, structuralism, behaviorism, and psychoanalysis are schools of thought in psychology and the basis for future findings and beliefs. The two earliest schools of thought in psychology are structuralism and functionalism. Structuralism, developed by Edward Titchener, attempted to use introspection to uncover the basic elements of consciousness and the way they combine with one another into ideas (Kowalski & Westen, 2011). Introspection was the main tool used in structuralism. Functionalism looked for explanations of psychological processes in their role, or function, in helping the individual adapt to the environment (Kowalski & Westen, 2011). Some criticize Functionalism because you cannot do a controlled experiment to test it since the main theory is that people’s mental state is adaptive to their environment. Two other schools of thought are behaviorism and psychoanalysis. Behaviorism is the school of thought that external actions should be studied instead of the mental state. In this school of thought behavior is dependent on things that can be observed to be happening not what is being thought of in the mind. Psychoanalysis, founded by Sigmund Freud, is a combination of theories and techniques. Childhood experiences are a big factor attributed to our adult behaviors in psychoanalysis. Human behavior

Thursday, November 21, 2019

Sex, leisure and commodity Essay Example | Topics and Well Written Essays - 1250 words

Sex, leisure and commodity - Essay Example enough that it stands parallel with time and social revolution.’ Guess advertising, in its crucial role to tap the mainstream of commerce, knows exactly the heart of what more than meets the reality, as essentially flowing and easy to engage public’s good opinion in view and feel of inevitable trend, wherein buying attitude is thereafter induced, following a ‘natural desire to possess’ at depth. Hence, the key to the best consequence may convincingly be placing nature on the very spot and everything else just magnifies into it and makes certain so, the shape of a profitable commodity. human nature, openly confessed to be a conventionally tolerated idea of ‘sexy and fabulous clothing.’ Breaking through the initial layer or impression, however, a more profound aspect of human nature, of lust and sex, every so often implicit by norm, is revealed. At first encounter, the picture makes a viewer critical of the correct statement of fashion (based primarily on the mutual notion about the brand) eyeing details on how pleasant or striking coordinates ought to accumulate in harmony with reference to each model’s garment pieces and accessories. Altogether, the quiet story is such that the trousers, or the fashion core at the lower half bears attraction to be perceived at the upper half. One may undeniably infer that while each pronounced object flashes from its place with intensity, the more enticing element takes form from beyond the attention to social confidence as the obvious matter. In the middle of consciousness, overall gestures provoke, first holding still then snapping into a moment fluid with so much passion, that the observation evolves ‘fetish’ from ‘plain’, setting the viewer to read the message on an imagining dimension where further reflection of the label’s means proceeds libidinously. It is conspicuous that the

Wednesday, November 20, 2019

Macroeconomics College Essay Example | Topics and Well Written Essays - 2000 words

Macroeconomics College - Essay Example 1. Exchange arrangements with no separate legal tender - These are countries that belong to a currency union where there is a common legal tender that are used by all the members. An example of this is the Eurodollar of the European Union. 2. Currency board arrangements - a kind of exchange rate regime implemented by the government based on an explicit legislative commitment in exchanging its local currency for a specific foreign currency with corresponding restrictions that ensures the compliance of its legal obligation. 3. Conventional fixed peg arrangements - a country's exchange rate regime that pegs its currency within margins of less that 1 percent as compared with another currency; a cooperative arrangement; or a basket of currencies, "where the basket is formed from the currencies of major trading or financial partners and weights reflect the geographical distribution of trade, services, or capital flows." 4. Pegged exchange rates within horizontal bands - The currency's value "is maintained within certain margins of fluctuation of more than 1 percent around a fixed central rate or the margin between the maximum and minimum value of the exchange rate exceeds 2 percent." 5. ... 6. Exchange rates within crawling bands - The currency is maintained within certain fluctuation margins of at least 1 percent around a central rate-or the margin between the maximum and minimum value of the exchange rate exceeds 2 percent-and the central rate or margins are adjusted periodically at a fixed rate or in response to changes in selective quantitative indicators. 7. Managed floating with no predetermined path for the exchange rate - influence of the monetary authority to the exchange rate is done herein without having a specific exchange rate path or target. 8. Independently floating - Under this the market is the one that determines the exchange rate. The central bank intervenes in the foreign exchange market with the aim to moderate the rate of change and to prevent "undue fluctuations in the exchange rate," rather than imposing a level for it (De Facto Classification of Exchange Rate Regimes and Monetary Policy Framework). It is the responsibility of a nation's central bank to choose the appropriate exchange rate regime for its own country. Economic managers, particularly central bank heads, in a country use this as a tool to maintain economic stability. The importance of having the appropriate and fitting exchange rate regime for a specific country is to protect the country from its susceptibility to create economic problems because of its monetary authority's power. Each type of exchange-rate regimes manifests diverse characteristics and produces different results. Reclassifying the existing de facto exchange rate regimes enumerated above will result into the fusion of the eight regimes into three: floating, fixed and pegged exchange rate. For Hanke

Monday, November 18, 2019

Create a Security Policy Essay Example | Topics and Well Written Essays - 500 words

Create a Security Policy - Essay Example Keeping of the customers’ information and records will be the major responsibility of the workers. The security and loan application will cover a number of portions in the company. This are; The physical control of the customers in the company will be solved by the introduction of the electronic cards for withdrawal and access purposes. In doing so, security will be enhanced by controlling the members from having access to the wrong places at the company. If a member will be caught violating the rule of accessing unauthorized areas, he or she will be dealt with in relation to the rule of non compliance. If any of the electronic cards is lost, stolen or contain wrong key, it will be deactivated immediately by the database management system. This will be followed by the issuing of a new card replaced with the lost card and all the information be recorded down for security purposes. The company is supposed to collect all the important information from a customer in the application of the online application of loans. Some of the important information to be collected is financial statement of the customer, the current loan state of the customer, the credit report of the customer and the property owned information of the customers. All this should be well documented and be recorded in the financial files of the customers. The information recorded in the financial file should be kept off from fire, theft, flood and lightning. For the proper maintenance and retrieval of the company’s vital information, the database must be backed up periodically incase of data loss. Access of the customers’ accounts should be well managed and be maintained. This will be done by creating protective ways that are very sensitive. The passwords should be unique mixed with other valuables along with the encryption. Users will be assigned with a confidential

Friday, November 15, 2019

How eukaryotic organisms came into existence

How eukaryotic organisms came into existence Living systems (LST) are self-organising systems that interact with the environment. Flows of information, energy and matter maintain these systems in order and balance. Miller (1978) defines LST as a set of related definitions, assumptions, and propositions which deal with reality as an integrated hierarchy of organizations of matter and energy. LST is as an excellent and powerful tool in aiding an individual to understand and interpret reality, especially its living part. However when it comes to intervention, design and change, the LST gives little or no guidance concerning what to do and what actions and approaches to select. So although the LST provides extensive amount of knowledge in regards to life and living systems nevertheless it mentions nothing to do with that knowledge. Multicellular organisms are thought to have evolved at least 1.7 billion years ago; organisms consisted of many or more than one cell which have interdependent cells (differentiated cells) that perform s pecialised functions in an organism. Examples of multicellular organisms are humans, plants and animals which can be seen by the naked eye. Cells are separated into two main classes primarily by whether they contain a nucleus. Prokaryotic cells (bacteria) lack a nuclear envelope whereas eukaryotic cells have a nucleus in which genetic material is split from the cytoplasm. In general prokaryotic cells are smaller and simpler than eukaryotic cells. In addition to the absence of a nucleus prokaryotic genomes are less complex and they do not contain organelles in its cytoplasm or cytoskeleton. In spite of all these differences, the same basic molecular mechanisms manage the lives of both prokaryotes and eukaryotes which indicate that all present-day cells have descended or evolved over time. The endosymbiotic theory explains and provides evidence of cell evolution which claims that bacteria cells evolved to animal and plant cells by phagocytosis through a process called endosymbiosis. [endo=inside; sym=together; bio=life]. Symbiosis describes the close relationship between two or more organisms of different species, where they are not always benefiting each member. The relationship of algae and fungi in lichens and of bacteria living in the intestines or on the skin of animals are forms of symbiosis. Some scientists believe that many multicellular organisms evolved from symbiotic relationships between unicellular ones and that the DNA-containing organelles within certain eukaryotic cells (such as mitochondria and chloroplasts) are the product of symbiotic relationships in which the participants became interdependent. A significant step in the breakthrough of the evolution of eukaryotic cells was the knowledge gained of membrane-enclosed sub-cellular organelles, allowing the progress of the complexity characteristic of these cells. The organelles are thought to have been acquired as a result of the relationship of prokaryotic cells eukaryotes. Studies show that the theory of endosymbiosis shows evidence that origin of mitochondria and chloroplasts which are organelles of eukaryotic cells are thought to have evolved from bacteria living in larger cells. Both chloroplast and mitochondria are similar to bacteria in size and like bacteria they reproduce by a process called binary fission. The American microbiologist Lynn Margulis formulated the endosymbiosis theory that mitochondria and chloroplasts evolved from prokaryotic bacteria. Although now an acknowledged theory and biologist, she and her theory were rejected by many biologists for a number of years, her breakthrough came due to her persistence, and vast amounts of research and data gathered by her and many other biologists over the last 30 years. The discovery of mitochondria having similarities in structures played a key role in making her theory widely accepted by the science world. According to her hypothesis these mitochondria and chloroplasts originated as separate prokaryotic organisms that were taken inside the cell as endosymbionts. Mitochondria evolved from aerobic bacteria (proteobacteria) and chloroplasts from photosynthetic bacteria (cyanobacteria). The contraction of aerobic bacteria would have provided an anaerobic cell with the ability to carry out oxidative metabolism. The acquisition of photosynthetic bacteria would have provided the nutritional freedom given by the ability to perform photosynthesis. The Endosymbiotic theory proposes that mitochondria and chloroplasts were once prokaryotic cells, living inside larger host cells. The prokaryotes were known to have been ingested in the larger cell but somehow escaping digestion. It is not known for the reason why they were ingested and interned but purely for advantageous reasons to the host cells which ingested them. The endosymbionts provided crucial nutrients to the host cell by chloroplasts and the mitochondria helping to have exploit oxygen from extracting energy. The endosymbionts were protected with in a safe environment inside the host cell which they lived for many millions of years. Charles Darwin (1809-1882) theory of natural selection which we know today from the famous quote of Survival of the fittest supports the endosymbiosis theory. Early eukaryotic cells gained an advantage over their neighbours, once mitochondria (high energy source), were ingested in larger host cells. Mitochondria and their hosts increasingly were relying more and more on each other to survive. Eventually, neither could succeed alone but as a force united they produced millions of descendents, establishing a whole new domain of life. Both organelles are surrounded by two or more membranes where the innermost of the membranes show differences in composition from other membranes of the cell. The composition is like that of a prokaryotes cell membrane, while the outer membrane may have formed from food vacuoles as the host cell devoured the prokaryote. The inner membrane of these mitochondria and chloroplasts contains enzymes and transport systems, showing more similarities to that of prokaryotes. The inner membrane of mitochondria has a larger surface area which arose due to the inner layer being folded into what is called cristae. This is turn means that there is more area for the respiratory reaction occur in the organelle. Mitochondria can be found in they cytoplasm of eukaryotic cells similar to shape and size to chloroplasts. The primary function of mitochondria is the production of ATP which is an energy source vital for the proper functioning and survival of the organelle. The outer membrane is a relatively simple phospholipid bilayer, ions, nutrients; ATP, ADP, etc. can pass through with ease. The matrix is where diffusion happens, this is a very slow process due to the folds of the cristae, the matrix is close to the inner membrane, resulting in the diffusion rate to the inner membrane complexes and transport proteins within a short time. Chloroplasts are only found in plants, with a similar function to that of mitochondria, where they both provide energy in the cell. There appearance is that of flattened discs, using a process called photosynthesis to extract carbon dioxide from the surrounding and converting and releasing as oxygen to form glucose, which is stored a starch a food source. Chloroplasts are complex organelles which differ to those of mitochondria, as chloroplasts have there a double membrane called the chloroplast envelope and membranes of thylakoids inside. Chlorophyll is vital and is found in thylakoids membranes in the chloroplast, it is a coloured pigment which converts light energy for photosynthesis. Thylakoids are fluid-filled sacs stacked up in the chloroplast to form structures called grana. Grana which are flat thin pieces of thylakoids membrane are linked together by lamellae. Mitochondria and chloroplasts both have their own DNA molecules. Their DNAs are not duplicates of nuclear DNA but their DNA is exclusive and vital to the mitochondrion or the chloroplast. Genes are carried by mitochondrial DNA; these genes are replicated each time the organelle divides, and the genes they encode are transcribed within the organelle and translated on the organelle ribosomes. Thus mitochondria and chloroplasts contain there own genetic systems, which are distinct and dissimilar to the genetic material of nucleus. Unlike the DNA in the nucleus, mitochondrial and chloroplast DNAs are exposed and circular similar to that of a prokaryotic cells DNA. Genes of the nucleus can not duplicate these. Each organelle has its own ribosomes; these ribosomes are different to those found in the cytoplasm of a cell. The proteins coded for by the mitochondrial genes are produced by mitochondrial ribosomes, and those coded for by the chloroplast genes are produced by chloroplast ribosomes. These ribosomes are more closely related to those of bacteria that those encoded by the nuclear genomes of eukaryotes. Bacteria show more similarities to these organelles as size is also a similarity. To conclude on the question on discuss how eukaryotic organisms came into existence, I believe that the evidence and information regarding the theory of endosymbiosis is reliable but not 100% valid as there are many counter arguments to Lynn Marguliss theory. Numerous studies of DNA show that in fact mitochondria and chloroplasts do not show many similarities that of prokaryotes. For instance neither mitochondria nor chloroplasts can survive in oxygen or outside of the cell indicating that the cell would have lost many vital genes on the way. However both mitochondria and chloroplast are similar in size to prokaryotes, they lack a normal nucleus found in eukaryotic cells but have circular DNA which lacks histones similar to that of eukaryotic cells. Also symbiosis supports the fact that the host cells became dependant on the organelles which it ingested and the lack of DNA within the nucleus and the organelles having their own DNA explains that they would have been independent cells. Both organelles reproduce by division in a process called binary fission, prokaryotic cells also reproduce the same way. On the other hand there are many questions still to be answered. How did the cell manage to reproduce in such a tight space and inside another cell? How did the DNA of the ingested cell pass into the hosts DNA, as the DNA should have been blocked as the host would have responded by degrading the foreign DNA and detect it as a virus. However this can be counter argued against as similarities in structure of both organelles can prokaryotic cells can be explained by their functions and processes and not through their structures. In photosynthesis both chloroplast and cyanobacteria convert carbon dioxide and water with light energy into glucose and oxygen. Nevertheless there is more evidence to sustain the endosymbiotic hypothesis; the evidence outweighs the questions and arguments against. Lynn Margulis theory of endosymbiosis is widely used and accepted by the scientists and science world of today and the more valid and important ideas of the origin and evolution of the cell are of creationists. Finally I agree with the argument that some eukaryotic cells have derived and evolved from prokaryotes and the theory of endosymbiosis seems valid and vital in the way we understand evolution of the cell today. (http://www.newciv.org/ISSS_Primer/asem14ep.html). (http://www.thefreedictionary.com/symbiosis) (http://dictionary.sensagent.com/multicellular+organism/en-en/) http://evolution.berkeley.edu/evolibrary/article/_0_0/endosymbiosis_06 http://www.ruf.rice.edu/~bioslabs/studies/mitochondria/mitorigin.html http://users.rcn.com/jkimball.ma.ultranet/BiologyPages/E/Endosymbiosis.html http://evolution.berkeley.edu/evolibrary/home.php

Wednesday, November 13, 2019

Bosnia-Herzegovina genocide :: essays research papers

Bosnia-Herzegovina genocide Genocide, the systematic and planned extermination of an entire national, racial, political, or ethnic group. From 1992-1995 that was happening in Bosnia-Herzegovina. In the Republic of Bosnia-Herzegovina, conflict between the three main ethnic groups, the Serbs, Croats, and Muslims, resulted in genocide committed by the Serbs against the Muslims in Bosnia. Bosnia is one of several small countries that emerged from the break-up of Yugoslavia, a multicultural country created after World War I by the Western Allies. Yugoslavia was composed of ethnic and religious groups that had been historical rivals, even bitter enemies, including the Serbs (Orthodox Christians), Croats (Catholics) and ethnic Albanians (Muslims). During World War II, Yugoslavia was invaded by Nazi Germany and was partitioned. A fierce resistance movement sprang up led by Josip Tito. Following Germany's defeat, Tito reunified Yugoslavia under the slogan "Brotherhood and Unity," merging together Slovenia, Croatia, Bosnia, Serbia, Montenegro, Macedonia, along with two self-governing provinces, Kosovo and Vojvodina. Tito, a Communist, was a strong leader who maintained ties with the Soviet Union and the United States during the Cold War, playing one superpower against the other while obtaining financial assistance and other aid from both. After his death in 1980 and without his strong leadership, Yugoslavia quickly plunged into political and economic chaos. A new leader arose by the late 1980s, a Serbian named Slobodan Milosevic, a former Communist who had turned to nationalism and religious hatred to gain power. He began by inflaming long-standing tensions between Serbs and Muslims in the independent provence of Kosovo. Orthodox Christian Serbs in Kosovo were in the minority and claimed they were being mistreated by the Albanian Muslim majority. Serbian-backed political unrest in Kosovo eventually led to its loss of independence and domination by Milosevic. In June 1991, Slovenia and Croatia both declared their independence from Yugoslavia soon resulting in civil war. The national army of Yugoslavia, now made up of Serbs controlled by Milosevic, stormed into Slovenia but failed to subdue the separatists there and withdrew after only ten days of fighting. Milosevic quickly lost interest in Slovenia, a country with almost no Serbs. Instead, he turned his attention to Croatia, a Catholic country where Orthodox Serbs made up 12 percent of the population. During World War II, Croatia had been a pro-Nazi state led by Ante Pavelic and his fascist Ustasha Party. Serbs living in Croatia as well as Jews had been the targets of widespread Ustasha massacres.

Sunday, November 10, 2019

The Nature and Nurture Controversy

Briefly summarize the approaches to the nature and nurture controversy. Provide two examples of nature and two examples of nurture and explain their influence on your own development. Evaluate the impact of each and explain which you believe had more of an impact and why. Your initial post must be at least 300 words in length. Respond to at least two of your classmates' posts with critical thought. Classmate responses must be at least 100 words in length and posted by Day 7. Nature vs.. Nurture is a controversy suggesting that our development is either from tauter or nurture.Nature being biological reasons such as DNA or it being hereditary. While Nurture is brought on by our environment family, and or experiences. It is difficult to say one plays a bigger role in my upbringing than the other. For example I have my father's big brown eyes but my views are entirely different than his. I look like my mother and have a similar personality but don't think it is because of my genes we are alike. Then we have how nurture Impacted my development. I became pregnant at age 16 and was normal since where I lived at the mime- Los Angles was not foreign to It.Growing up In a big city such as Los Angles you tend to grow up faster and more prone to hang out with the wrong crowds. I grew up with my two siblings a brother and an older sister who are very different although we were raised In the same environment. My older sister finished high school on time and had her first child at age 22. My younger brother also finished high school on time and decided to continue onto college. As for myself I married at age 16 and was not able to finish high school with my class.Although both play a huge role on my personality I believe that nurture had a bigger effect In my personal life. Nature can also play a role In a person's life such as a disability that was Inherited but my opinion can be easily overcome by nurture by Ignoring your disability or living a certain way. Either way both nature and nurture play an Important role In ones life regardless of which one has a bigger Impact. The Nature and Nurture Controversy By Familiars it is because of my genes we are alike.Then we have how nurture impacted my time- Los Angles was not foreign to it. Growing up in a big city such as Los Angles although we were raised in the same environment. My older sister finished high huge role on my personality I believe that nurture had a bigger effect in my personal life. Nature can also play a role in a person's life such as a disability that was inherited but my opinion can be easily overcome by nurture by ignoring your important role in ones life regardless of which one has a bigger impact.

Friday, November 8, 2019

persian war essays

persian war essays A long time ago Croesus the king of Lydia took over the Greek colonies on the east coast of Asia Minor (Turkey). Croesus was a kind and fair ruler so the Greeks did not really mind. But around 546 BC King Croesus and his empire was overthrown by Cyrus the Great About fifty years later Asia Minor revolted against Persia. The rebellion was assisted by Athens. The rebellion was successful. After the rebellion had stopped Darius I took complete control over Asia Minor. Darius sent tyrants to rule over all Greek city states except Athens and Sparta refused to accept the tyrants. After Darius took rule the Ionian city states rebelled another time. Darius took this as a personal insult and sent troops in to destroy Athens. Athens beat the Persians whose army was almost three times the size of the Athenian army at the famous Battle of Marathon. The battle was fought on the Plains of Marathon outside of Athens. Darius' successor Xerxes I brought together the largest army of ancient history. In 480 BC Xerxes led his troops to the narrow passes of Thermopylae. In this battle several thousand soldiers led by the Spartan leader Leonidas I fought against the Spartans. A Greek traitor told the Persians a way to get around the Greek forces and enter the pass through their flank. The Persians did so and annihilated the Greek forces from the rear. There was nothing left between the Persians and Athens so the Persians plundered and destroyed the abandoned city. The next battle that took place was when the Persian fleet tried to pursue the Greek fleet at the Battle of Salamis. The Persians did not stand a chance in that battle and lost. All the Persian forces left in Greece were defeated a year later at the Battle of Plataea and Greece won ...

Wednesday, November 6, 2019

Brands and Marketing Communications

Brands and Marketing Communications Introduction Although the telecommunications industry is growing, it is also fiercely competitive. Before competition ruled the market, telecommunications service providers paid very little attention to customers needs. Today, however, customers have become more educated and more demanding as well.Advertising We will write a custom essay sample on Brands and Marketing Communications specifically for you for only $16.05 $11/page Learn More In a global economy increasingly characterized by service industries shaped by technology, customers are impatient for services customized to their individual needs and expect them to be offered at lower prices with each new rollout. Customer centered marketing, once a differentiation tactic for the telecommunications providers, has become a survival strategy (Strouse 2004, p. 4). Due to the fierce competition that is prevalent in today’s telecommunications industry, many firms in the industry are forced to spend a l ot of time planning how best to market products and services. This paper examines some of the strategies that have been used by competing firms to increase visibility and grow profits. Specifically, the paper will focus on how marketing communications can help to support and maintain brands. Integrated Marketing Communications Integrated Marketing Communications (IMC) is a marketing approach in which a firm brings different marketing modes together in a unified operation. Although the implementation of IMC may be quite demanding, this is nothing when compared to the expected returns. Generally, IMC helps to successfully move customers through the various stages of their buying process and increases profits through increased effectiveness. By using IMC effectively, it is possible for a firm to maintain its brand, consolidate its image, and bond a customer for life. The use of a unified message often leads to a greater impact than separate messages.Advertising Looking for essa y on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More At another level, research suggests that images shared across advertising and direct mail campaigns boost advertising awareness and, simultaneously, increase response to the mailshot (Smith et al. 1999). IMC can also boost sales by stretching messages across both communication tools and business functions to create more awareness for customers to become aroused and, ultimately, buy a product or a service on a repeat basis. Carefully linked messages help buyers by providing them with timely reminders, relevant information and, where necessary, special offers which move them more comfortably through the stages of their buying process, reducing the misery of choice in a complex and busy world. Using IMC also increases the reliability of any marketing strategy and helps to clear any doubts in the mind of the consumer regarding the firm’s brand. Little effort is the refore spent by the consumer when making brand comparisons. When IMC is used, there is also the possibility of saving costs since some aspects of the marketing communication may be shared by different modes. The firm can also reduce extra charges by using a single agent. But even with several agencies, time can also be saved in meetings, whether strategic, tactical or just briefings, which bring all the disciplines together. As well as fusing bright minds into synergistic sparks, multi disciplinary meetings reduce repetition which in turn reduces workloads and subsequent stress levels. Lastly, the internal benefits of integrated marketing communications should not be forgotten. Integration can continue beyond communications to all the other elements of the marketing mix decisions such as product decisions, price decisions, and place decisions, so that the customer is presented with a complete, comprehensive and consistent pattern. In turn, the marketing mix decisions will be better integrated with the other business functions (Smith et al. 1999).Advertising We will write a custom essay sample on Brands and Marketing Communications specifically for you for only $16.05 $11/page Learn More Disintegrated communications, on the other hand, send disjointed messages which dilute message impact and sometimes confuse, frustrate and arguably arouse anxiety in some customers. In contrast, integrated communications present a reasoned sense of order. Customer relations are also reinforced by the use of regular images and messages that are relevant and useful. Situational Analysis A situational analysis is usually carried out to gain an understanding of the operational environment. Activities may include undertaking strengths, weaknesses, opportunities, and threats (SWOT), Political, Economic, Social, Technological, Environmental, and Legal (PESTEL) analysis or Porter’s five forces model of competitive structure. SWOT Analysis SWOT analysis for a firm in the telecommunications industry may include a number of strengths, weaknesses, opportunities, and threats. The SWOT analysis is best represented by figure 1. Figure 1: SWOT Matrix (Sahaf 2008, p. 31) It is obvious that for any firm to make the best use of its capabilities and market position it would attempt to maximize its strengths and opportunities and minimize its weaknesses and threats, SWOT analysis as demonstrated by figure 1 can offer four conceptually distinct alternate segments to the firm. These alternative segments are: Maximize-maximize (SO), Minimize-maximize (WO), Maximize-minimize (ST), and Minimize-minimize (WT) PESTEL Analysis This covers an analysis of current and potential influences from political pressures. Changes in laws and regulations as well as a country’s political conditions must also be examined thoroughly. Economically, it is also important to consider both local and global issues such as declines. Socially, a firm may need to a nalyze how different changes in the society will affect the market condition.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Technologically, it is necessary to consider how the emergence of new technology in the industry will affect the firm’s performance. Legal issues are concerned with the effect of both national and world legislation. Finally, an environmental analysis will focus on local, national, and world environmental issues. This is demonstrated by figure 2. Figure 2: The environment facing the marketing manager (Sahaf 2008, p. 35) The external environment that consists of forces from economic, technological, legal-political, competitive, and socio-cultural has far reaching implications on the working and performance of the organization. The study of the environment is thus a prerequisite for the success of any strategy. Porter’s Five Forces Model of Competitive Structure This is a useful framework for analyzing the nature and identity of competition in a given industry (Sahaf 2008, p. 62). To determine the state of the competition in a market, Porter argued that managers need to identify the structure of the market in terms of five basic competitive forces. These forces are shown in figure 2. Figure 3: Porter’s Five Forces of Competition (Sahaf 2008, p. 63) These forces not only have a greater impact on the profit potential, but also on the relative market power of competitors in an industry. The study of these forces would help a marketer to determine the attractiveness of the industry and the prospects for earning a return on his investment. Consumer Analysis Under consumer analysis, the marketing managers should be concerned with issues of segmentation, targeting, positioning and analysis of the existing competition. As can be seen from figure 2, the marketing microenvironment is composed of forces close to the company that affect its ability to serve customers, including company strengths and weaknesses, as well as company suppliers, and competitors. The macro environment is composed of the larger political, legal, economic, socio-cultural, and technological forces that influence the microenvironment. To manage the growth and prosperity of a firm in a dynamic marketing environment, managers need to study such elements within the environment that can influence a firm’s response to the environmental opportunities and threats (Peattie Peters 1978). Since such forces have a direct influence, or an effect on the marketing efforts, managers need to assess the forces in order to match their firm’s and marketing environment. Environmental study enables the managers to identify, evaluate and respond to the environmental forces that may influence their marketing decisions. Marketing Objectives and Marketing Communications Objectives In coming up with marketing objectives and marketing communications objectives, it is necessary for the marketing manager to consider relevant factual data that was obtained during the situation analysis stage. He or she should interpret their meaning and consequences for the firm’s product line in terms of opportunities that were identified. Goals should then be set in terms of what the firm wants to achieve during the current planning period. When coming up with the goals, it is important for the marketing manager to ensure that they are specific, measurable, realistic, achievable, and time bound. The marketing manager needs to generate assumptions and projections about future conditions and trends with regard to the economy, technology, and socio-cultural and political aspects such as legislation and taxes (Dalgic 1998, p. 53). It is imperative for the marketing communications objectives to consider how the communications mix can be used to strengthen the firm’s brand and market position. The Marketing Mix The marketing mix is a blend of the four variables or strategy elements to fit the needs and preferences of a specific target market. Each strategy is a variable in the mix. A specific combination of these variables determines the success of the ma rketing efforts. The mix also consists of everything the firm can do to increase the demand for its products. The 4Ps are product, price, place, and promotion and are briefly explained as follows. Product Product refers to anything that is capable of or can be offered to satisfy a need or want. It is essential for the firm to have a clear description of the product in a social marketing campaign at different levels. Price Price refers to the amount the customer has to pay in order to acquire a product or service. It is often aimed at minimizing costs by maximizing incentives to reward desired behavior or to discourage undesirable behaviors. By offering prices that are competitive, the firm will be able to retain its customers for a very long time and attract new ones. Place Generally, place refers to the point of sale. Strategies related to the system or channel management need to be provided to ensure that they will be as convenient and pleasant as possible for the customer to enga ge in the targeted behavior and access related products and services. Promotion Promotion refers to all the activities undertaken to make the product or service known to and preferred among the user and trade. Information on product benefits and features, fair price and easy accessibility require effective and efficient communications to bring goods and services to the target audience and inspire action. Marketers should resort to these tools to create, communicate, and deliver values for their targeted behaviors. Although the 4Ps can be thought of as being independent, they are not isolated and are used as determinants to influence the dependent variables; the behaviors of the target market. It is the synergy of the 4Ps that makes a truly social marketing campaign possible. Implementation A plan for monitoring and evaluating a social marketing campaign is needed before the final budget and implementation plans are made. It needs to be referred back to the goals established for the campaign. Monitoring is a measurement conducted sometime after the launch of a new campaign, but before its completion. It is conducted to determine if midcourse corrections are needed to ensure that marketing goals are realized. Recommendations and Conclusion To survive in the present business environment that is often characterized by very stiff competition, it pays to spend time and plan effectively how the firm’s goods and services will reach the consumers. There is need for the firm to carry out a thorough situational analysis as well as a consumer analysis. SWOT and PESTEL analysis are two approaches that may be used to assess the firm’s capability and to understand the operating environment. The marketing managers may also make use of Porter’s five forces model of competitive structure to understand the environment. By gaining a good understanding of the operating environment and the existing competition, the firm will be in a better position to devise a plan that will help it realize its objectives. Eventually, the firm will be able to maintain its brand and strengthen its position in the market. Reference List Dalgic, T 1998, ‘Dissemination of Market Orientation in Europe: A Conceptual and Historical Evaluation’, International Marketing Review, 15 (1): 45 – 60. Peattie, K Peters, L 1997, ‘The Marketing Mix in the Third of Computing’, Marketing Intelligence Planning, 15 (3): 142 – 50. Sahaf, MA 2008, Strategic Marketing: Making Decisions for Strategic Advantage, PHI Learning Pvt. Limited, New Delhi. Smith, PR, Pulford, A, Berry, C, Smith, PR. 1999, Strategic Marketing Communications: New Ways to Build and Integrate Communications with Disk, Kogan Page Publishers, London. Strouse, KG 2004, Customer-Centered Telecommunications Services Marketing, Artech House, Norwood, MA.

Monday, November 4, 2019

Scenario Analysis Essay Example | Topics and Well Written Essays - 500 words - 1

Scenario Analysis - Essay Example main point that he intends to bring out with these laws is that even though a person reacts to situations using his conscience, that person might do better if he has certain principals within which he abides by. As a policeman at a friend’s party I observe a group of people who are friends to my friend snorting cocaine, it is a legal obligation to arrest the people and take them into custody, but this is an old friend and I would not like to spoil our relationship The moral problem in this scenario is the usage of cocaine. This illegal and highly addictive drug has a tendency to affect the judgment of those who use it. It is wrong to use cocaine. The law does not allow the usage of this drug because of its adverse effects on users. There is a dilemma that comes out as a result on whether to act on conscience or by principles, which in this case are the regulations of the government. According to the government, I am supposed to arrest the people who are using the drug. If I were to react on my conscience, I would explain to them the situation in which they are putting me in. I would advise them not to do that again and join a rehabilitation facility. I would warn them that if this happens again, they would leave me no choice but to arrest them. According to Fuller, I would react on the instinct that tells me to defend my position as a police officer, according to his rules stated above there are rules that states a should take them in. If I d id not honor that rule, I would be failing the police department. Therefore, the main stand here would be to arrest the friends of my old friend and take them in. it might not be the morally right decision, but according to the rules, it is the right thing to do. I am in a situation where a friend has offered me a gift basket with some money. I am a community officer and people may take this as a bribe, I can chose to either refuse the token or take it. There is no rule deterring me from taking a gift from a friend. After

Friday, November 1, 2019

Philisophy Essay Example | Topics and Well Written Essays - 500 words

Philisophy - Essay Example It is only by wondering about the difficulties and complexities involved in assessing things, men started to define principles that reduced the complexities as they progressed towards knowing the details. The major reasons for his concern included the fact that the world is changing everyday with new inventions and discoveries and one thing which may be a fact today may be changed tomorrow. Hence, Descartes was very concerned on the certainty aspect of things and principles that are confounded every day. The statement introduced the world to the ideas of psychology and to the subject of metaphysics. It allowed philosophical thinkers to realize that one’s existence is known only if he is able understand the consciousness of thinking and this thought allowed them to explore into new areas. Descartes was the first to state that the physical body of a human being is a completely different context when compared with the immaterial mind. Yet, he believed that only by the interaction of these two subjects the human entity exists. (Clarke, 1982) According to him, that a mere existence of a human being is only known when he doubts, when he thinks or, when he performs any other activities, mentally. So without that activity, he believes there is no ‘he’ or ‘I’ to represent and hence he says those words. (Clarke, 1982) The proof given by him can be subdivided into three parts. Firstly, he believes that a human feels to exist only when he thinks and, what he believes to be clear and distinct are true to him. Secondly, all these cannot arise from nothing. Finally, things which are considered perfectly done in a natural way cannot arise from something that is less perfect and hence only God could have created them. (Clarke, 1982) The correspondence theory suggests that a statement can be declared as truth if it holds good when considered in relation with the world. The