Thursday, October 31, 2019
Comparative analysis of food retailers growth strategies in the UK Research Paper
Comparative analysis of food retailers growth strategies in the UK - Research Paper Example Traill (1998) asserts that the food retail sector is characterized by competitive and innovative retailers who have remain resilient despite economic downturns. There are high stable street independent retailers, but most of them struggle to survive due to the rapidly changing business environment and changes in consumer behaviour (Henry, 2011). There is evidence of high concentration of economic power by the industries in the food retail chain between the primary producers and consumers (Henry, 2011). The supermarket model in the UK is characterized by self-service shopping with various departments that handle the production and distribution of the food grocery items. The sector has made savings through elimination of the traditional wholesaler, and ensuring direct supply from the manufacturing industries to regional distribution centers, and finally to the superstores that are conveniently located near the customers (Department of Trade and Industry, 2004). The lower unit costs and high net margins associated with supermarkets have increased their market share and contributed to ââ¬Ëspiral growthââ¬â¢. Some of the features that are evident in the spiral growth of the leading supermarket retailers such as Tesco and Wal-Mart include the high costs of market entry due to the lower prices. For instance, Wal-Martââ¬â¢ s ââ¬ËEvery Day Low pricing modelââ¬â¢ ensures savings made in the supply chain activities are passed on to consumers through price reductions thus contributing to high sales volumes and significant market growth. Accordingly, the spiral growth is characterized by own labeling that return the highest contribution margins to the retailers. The retailersââ¬â¢ brands are capable of competing effectively with the manufacturerââ¬â¢s brands through packaging and shelf placement. The own labels do not only enhance the revenues, but also improve the retailer brand
Monday, October 28, 2019
Candela Corporation Case Essay Example for Free
Candela Corporation Case Essay In 2002, Candela Corporation statement of cash flows shows a net loss of income at $2,154,000. The reason for the loss is from accrual methods as non-cash expenses are added back. This method shows the company the true cash flows of the business. Some of the items that were added back in that had a significant affect is from loss of the discontinued operations and the interest firm the stock warrants. The categories that had significant subtractions were the foreign currency exchange rate difference and the respect of the deferred taxes. The results are the working capital that had resulted in a gross outflow of cash flow, which caused the cash outflow to show from the operating activities. There is a purchase of fixed assets in the investment activities, which caused an outflow of cash. In the financing activities, it looks as if the total outflows were trying to stay in control with acquiring a modest debt and share issue. However, because of the previous commitments that the business had, they were required to buy back stock and to continue to pay on the existing debt. However, when this happened it caused another outflow of cash, and the results are a negative balance with the operating, investing, and financing activities. With the company they had a previous cash balance and had the ability to survive with a severe damaging effect to the cash balance. The net profit in 2003 was 6,814,000 as shown on the statement. Adjustments were made in the non-cash items. A very important adjustment was in the loss from notional interest on stock warrants, discontinued operations, notional interest on stock warrants, and the foreign exchange rate difference accrued. This tax benefit of stock option and the respect of deferred taxes were two important subtractions. The analysis of the working capital is there was cash flow from the notes, deferred income, the sale of inventories, sale of other assets, and more control on payroll cost and tax refund. These cash outflows came from warranty cost, receivables, payment of payables, and restricted cash. This created a positive cash flow from the operating activities. The investing activities showed that there was one purchase in fixed assets category, which caused an outflow in the terms of investing. The financing activities show an increase for the shares sold, following a good amount of a payment in the long-term debt and the lines of credit. Therefore, with in inflow of the share issue becoming larger, this produced n inflow of cash. Not including the investing activities, the other two activities created a positive cash flow, therefore increasing the companyââ¬â¢s cash reserves. A net profit was shown on the statement in 2004 of $8,119,000. This adjusted non-cash items accurately were important add-ons were a new provision for loss on discontinued operations, the loss from discontinued operations, the foreign exchange rate difference, and deferred taxes. The subtraction that was considerable was in the respect of benefit on stock options. This is an indication that the business is showing advancement. The analysis of the working capital is for this year cash flows were from the notes, deferred income, warranty costs, a control on payroll cost, and taking some services on credit. The cash outflows were from the receivables (higher credit sales), restricted cash, purchase of inventory, and other current assets. Meanwhile the non-cash adjustment created a positive figure along with positive cash inflows from the working capital adjustments, created a positive cash flow from operations activities. The purchase of fixed asset of $685,000, lower from the former year, shows that the business purchased most of its fixed assets last year and this year the business needed less. Their financing activities only showed activity for the shares issued and it showed a positive inflow of cash. Besides the investing activities, the other two activities were showing positive, giving the company a positive net flow of cash and an increase in the businessââ¬â¢s cash reserves. The information that was not found on the income statement or the balance sheet is as listed: 1. The cash that was received from sales. 2. Any payments that were made to suppliers and/or employees. 3. The cash receipts or payments on behalf of royalty fees, etc. 4. Any interest and taxes have been paid. 5. The cash receipts for issue of shares. 6. The money receipt or payment for acquisition or disposal of fixed assets. 7. Any cash payments for debentures 8. The dividends paid or received. 9. Segregation of any non-cash items. 10. The ability to forecast future cash flows 11. Highlighting any of the business area that is need of management attention in the terms of cash flow.
Saturday, October 26, 2019
An Introduction To Sequences In Mathematics English Language Essay
An Introduction To Sequences In Mathematics English Language Essay This is an introduction to sequences. In mathematics, that is, discrete mathematics have learned about sequences, which is an ordered list of elements. The sequences is about arrangement of objects, people, tasks, grocery items, books, movies, or numbers, which has an order associated with it. Like a set, it contains members and the number of terms. This members is called elements or terms and the number of terms is also called the length of the sequences. Sequences having a natural numbers. There are all even numbers and odd numbers. This usually defined according to the formula: Sn = a, function of n = 1,2,3,a set A= {1,2,3,4} is a sequence. B = {1,1,2,2,3,3,} is though the numbers of repeating. There are specific sequences that have their own formulas and methods for finding the value of terms, such as arithmetic and geometric sequences. List of numbers, finite and infinite, that follow some rules are called sequences.P,Q,R,S is a sequences letters that differ from R,Q,P,S, as the ordering matters. Sequences can be finite or infinite. For this example is finite sequence. For example of infinite is such as the sequence of all odd positive integers (1,3,5,.). Finite sequences are sometimes known as strings or words, and infinite sequences as streams. The empty sequence ( ) is included in most notions of sequence, but may be excluded depending on the context. In this topic means sequences, there are covered about indexing, operation on sequences, sequences of integers, subsequences, increasing, decreasing, nonincreasing, nondecreasing, sigma notation, and pi notation. Besides that, in this topic also discuss about changing the index and limit in sum. Background A sequences was created by Leonardo Pisano Bigollo (1180-1250). Pisano means from Pisa and Fibonacci which means son of Bonacci. He known as by his nickname, Fibonacci. He was born in Pisa which is now part in Italy, the city with the famous Leaning Tower. He played important role in reviving ancient methematical skills, as well as making significant contributions of his own. He was known for a great interset in math. Because of the Fibonacci Series, He is most known. A series of numbers approaching nature reality. For example, 1, 1, 2, 2, 3, 5, 233, 300, 377, The sum of the 2 preceding numbers are from each succeding number. Fibonacci was a member of the Bonacci family and traveled all around the Mediterranean as a boy. He traveled with his father who held a diplomatic post. To excel in solving a wide variety of mathematical problems, His keen interest in mathematics and his exposure to other cultures allowed Fibonacci. Fibonacci is probably best known for discovering the Fibonacci sequence. Besides that, A sequences is also was created by Leonardo Fibonacci. He is the Italian mathematician. He also known as Leonardo of Pisa, documented the mathematical sequences often found in nature in 1202 in his book, Liber Abaci which means book of the abacusIn the sequences, each number is sum of two numbers, such as 1 + 1 = 2, 1 + 2 = 3, 2 + 2 = 4, and so on. That sequence can be found in the spirals on the skin of a pineapple, sunflowers, seashells, the DNA double helix and, yes, pine cones. Sequences is one such technique is a make use of Fibonacci sequences in futures. Fibonacci who was innate in 1170. He found which a settlement reoccurred in nature, as well as a settlement was subsequent from a mathematical judgment of a fibre of numbers a third series is a total of a dual prior to it. In 2000, A sequence of posters designed at the Issac Newton Institute for Mathematical Sciences which were displayed month by month in the trains of London Underground to celebrate world mathematical year 2000. The aim of the posters was to bring maths to life A sequence of posters designed at the Issac Newton Institute for Mathematical Sciences. The aim of the posters was to bring maths to life, illustrating the wide applications of modern mathematics in all branches of science includes physical, biological, technological and financial. Each poster gives relevant mathematical links and information about mathematical. Show more Result of the research A sequences is ordered list of elements that normally defined according to this formula, Sn = a function of n = 1,2,3,If S is a sequences {Sn | n = 1,2,3,},] S1 denotes the first elements, S2 denoted the second elements and so on. The indexing set of the sequences,n usually the indexing set is natural number,N or infinite subset of N. In operations on sequences, If s = { a,b,c,d,e,f } is a sequences, then -head of s = a -tail of s = {b,c,d,e,f} -tail of s = {a,b,c,d,e} -last s = f For Concatenation of sequences, If S1 = {a,b,c} and s2 = {d,e}. Hence, concatenation of s1 n s2 denoted as = {a,b,c,d,e} For this concatenation of sequences, punctuation mark , must be written between these alphabet. Increasing sequences and decreasing sequences are two important types of sequences. Their relatives are nonincreasing and nondecreasing. Sn Sn+1 is used when sequences of s is decreasing for all n for which n for which n and n+1 are in the domain of the sequences. A sequences is nonincreasing if Sn à ¢Ã¢â¬ °Ã ¥ Sn+1 for all n for which n and n+1 are in the domain of the sequences. A sequences is nondecreasing if Snà ¢Ã¢â¬ °Ã ¤ Sn+1 for all n for which n and n+1 are in the domain of the sequences. Example:- For increasing, Sn = 2^n 1. n= 1, 2, 3,.The first element of s are 1, 3, 5, 7,. For decreasing, Sn = 4-2^n, n = 1, 2, 3,The first few elements of s are 2, 0, -2, -4, . For nonincreasing, The sequences 100, 40, 40, 60, 60, 60, 30. For nondecreasing, the sequences of 1, 2, 3, 3, 4, 5, 5 The sequences 100, is increasing, decreasing, nonincreasing, nondecreasing since there is no value of i for which both i and i+1 are indexes. A subsequences of a sequences s is a sequences t that consists of certain elements of s retained in the original order they had in s. Example: let s = { Sn = n | n = 1,2,3,} 1,2,3,4,5,6,7,8, let t = { t=2n | n = 2,4,6,} 4, 8, 12, Hence, t is a subsequences of s. Two important operations on numerical sequences are adding and multiplying terms. Sigma notation, sum_{i=1}^{100}i. is about sum and summation. Summation is the operation of combining a sequence of numbers using addition. Hence, there are become a sum or total. Example: sum_{i=1}^ni = frac{n^2+n}2 For capital sigma notation, sum_{i=m}^n x_i = x_m + x_{m+1} + x_{m+2} +dots+ x_{n-1} + x_n. Example: sum_{k=2}^6 k^2 = 2^2+3^2+4^2+5^2+6^2 = 90 Pi is a product symbol for product of sequences of terms. This is alsoncaaled multiplication between all natural numbers. Pi notation, prod_{i=m}^n x_i = x_m cdot x_{m+1} cdot x_{m+2} cdot ,,cdots,, cdot x_{n-1} cdot x_n. Example: prod_{i=2}^6 left(1 + {1over i}right) = left(1 + {1over 2}right) cdot left(1 + {1over 3}right) cdot left(1 + {1over 4}right) cdot left(1 + {1over 5}right) cdot left(1 + {1over 6}right) = {7over 2}. Changing the index and limits in a sum. The formula to change the index and limit to the sum is, à ¢Ãâ ââ¬Ë_(1=0)^nà ¢-ââ¬â¢Ã £Ã¢â ¬-ir^à £Ã¢â ¬-n-1 Limit of Sequence The notation of limit of a sequence is very natural. The fundamental concept of which the whole of analysis ultimately rests is that of the limit of the sequence. By considering some examples can make the position clear. Consider the sequence In this sequence, no number is zero. But we can see that the closer to zero the number of, the larger the number of n is. This state of relation can express by saying that as the number of tends to 0, the n increases, or that the sequence can converges to 0, or that they possess the limit to 0. The points crowd closer n closer to the point 0 as n increases; this means that the numbers are represented as points on a line. This situation is similar in the case of the sequence Here, too, as n increases, the numbers tends to 0; the only difference is that the numbers are sometimes less than and sometimes greater the limit 0; as we say, they oscillate about the limit. The convergence of the sequence to 0 is usually expressed by the equation or occasionally by the abbreviation . We consider the sequence where the integral index n takes all the value 1, 2, 3 à ¢Ã¢â ¬Ã ¦Ã ¢Ã¢â ¬Ã ¦. . We can see at once that as n increases, the number will approach closer and closer to the number 1 if we write, in the sense that if we mark off any interval about the point 1 all the numbers following a certain must fall in that interval. We write The sequence behaves in a similar way. This sequence also tends to a limit as n increases, to the limit 1, in symbols, . We see this most readily if we write . Here, we need to show that as n increases the number tends to 0. For all values of n greater than 2 we have and. Hence, for the remainder we have , from which at once that tend to 0 as n increases. It is also gives an estimate of the amount by which the number (for can differ maximum from the limit 1; this certainly cant exceed . The example only considered illustrates the fact to naturally expect that for large values of n the terms with the highest indices in the numerator and denominator of the fraction for predominate and that they determine the limit. Applications 1)Fibonacci number Nowadays or in era science of technology, We will find a Fibonacci number using C++ programming. The following sequences are considered: 1, 1, 2, 3, 5, 8, 13, 21, 34,.Two numbers of the sequence, a_1 and a_2 , the nth number a_n, n >=3.a_n = a_(n-1) + a_(n-2).Thus, a_3 = a_1 + a_2 = 1 + 1 = 2,a_4 = a_2 + a_3, and so on. Such a sequence is called a Fibonacci sequence. In the preceding sequence, a_2 = 1, and a_1 = 1, However any first two numbers, using this process. Nth number a_n, n >= 3 of the sequnces can be determined. The number has been determined this way is called the nth Fibonacci number. a_2 = 6 and a_1 = 3. Then, a_3 = a_2 + a_1 = 6 + 3 = 9, a_4 = a_3 + a_2 = 9 + 16 = 15. 2) Draft snake This game is most famous a long time ago. But now, a new generation still playing this game at free time. This game is closely with sequences which is about the numbers or all natural number but in this game, only positive number that have in this checker. However, it still in a sequences. Firstly, a player must play a dice to get a number so that he or she can move one place to another place to get a winner. These place to pleace is refer to the number. Each number that get from a dice will moves our position until he or she become a winner. Conclusion As we know, a sequences is about a series of numbers. A series of numbers in sequences, which is all natural number includes positive and negative integers, could be a finite sequence from some data source or an infinite sequence from a discrete dynamical system. All of the students, which is the students from the programming course learn about this topic in discrete mathematic as a minor subject in their course. Majoriti of the students said that this topic very interesting to learn and easy to score to get a highest marks in examination, test and others. Although this topic was considered very interesting to learn and easy to get a highest marks, but in this topis is also have a part that difficult to score and bored to learn. A difficult part was identified is the formula that used in this sequences. For example, one of the subtopic in a sequences is when to changing the index and limits in a sum, à ¢Ãâ ââ¬Ë_(1=0)^nà ¢-ââ¬â¢Ã £Ã¢â ¬-ir^n-1à £Ã¢â ¬-. This formula is difficult to remembered among of the students. It is not only difficult to remembered, but a student is also difficult to remembered a way to calculate this problem where a question want a student change the index and limits in a sum. So, to solve these problem, another way must be created so that a student can solve these problem easier. May be a formula is fixed means it cannot be changed. Nowadays, a lot of ways was created by among of students to solve these problem. So another ideas must found themselves so that it easier to remembered. As a conclusion here, the subtopics in a sequences has interesting to learn and not interesting to learn. Besides that, it has easy to remembered and not easy to remembered. Here, does not all of topic are easy. This condition mest be identified so that a problem can be solved immediately and corretly among the students.
Thursday, October 24, 2019
Throwing Away your Money Essay -- Environment, Trash Collection
Section One Residents may be throwing away more than trash when the city run garbage trucks collect their rubbish. Government run solid waste collection costs approximately twenty-five percent more than when a private contract company is utilized. (Teel 1993) The concept of privatizations of solid waste collection services is nothing new. This change from using government employees and government owned trucks and landfills to contracting with a private company for solid waste collection is a trend that is getting more attention lately. The move to privatization is usually driven by the desire for cost savings. (Hyres, 2010) There is much debate over the quality of public versus private contracts of municipal services. The other branch of this debate is the cost benefits to taxpayers. One of these municipal services is solid waste collection. Waste services can be broken down into three areas, all of which are available to be contracted out to private companies. The stages are collection of solid waste from households and businesses, recycling (collection and processing), and disposal of non-recyclable products at landfills. (Wright & Nebel, 2002) There are costs incurred for each stage especially at the landfill. From the collection, to the sorting, to final disposal all of this ends up being a costly process for the taxpayer. In this economic climate, many cities are facing budget shortfalls and waste collection is getting close attention. Medina County is no exception, Medina is looking for ways to save, and more efficiently use taxpayerââ¬â¢s money. One viable option is to privatize garba ge collection. The policy for solid waste management in Medina County needs to be amended from being a flow-control system manag... ...it. There will be resistance with privatization, but it is still worthwhile. It is an option that needs to be thoroughly considered. To minimize resistance and job loss, it can be requested for a company to hire some city workers in the contract. (Hyres, 2010) The benefits of privatization are undeniable. Privatization manages liabilities, improves efficiency, cuts costs, and improves accountability. (Raphaelson, 1998) Between the economic conditions, and local governments being faced with many projects that need taxpayerââ¬â¢s dollars, it is a good time to push for privatization of garbage collection and landfills. It is a very difficult decision for an elected official to make, but todayââ¬â¢s economy is giving them the ââ¬Å"political coverâ⬠to make the move towards privatization, and if it is done properly, it is a win-win decision for all involved. (Segal, 2000)
Wednesday, October 23, 2019
The Nature of the Beast: An Analysis of the Genre of Science Fiction
All modes of inquiry correlate with each other due to their tendency to coalesce in their emphasis on questions, which raise issues on autonomy, justice, and politics. The differences of literary theories, for example, merely spring from their construal of the relationship between the exercise of power and the text. Structuralism views the relation in terms of the relationship of the formal elements in a linguistic system. Marxism assesses the relationship in terms of the role of such relations in the existence of social structures.The same method is used by Psychoanalysis, with the emphasis on the conscious and unconscious mind. Deconstruction, on the other hand, perceives the textsââ¬â¢ role in destabilizing oppositional modes of power. Despite of these differences amongst discursive procedures, it does not overshadow the fact that these theories give emphasis on their analysis of the political and institutional structures within society. A concrete example of this can be seen i n the opposing theories of constructivism and essentialism.Despite their adherence to competing narratives of oppression and resistance [constructivism places emphasis on multiple identities thereby opposing essentialismââ¬â¢s stance on singular categorization] both theories show interest on the subjectââ¬â¢s position within society and how this position can affect the development of his identity. In fact, if one isolates the discussion of identity and narratives of oppression in both discourses, one will notice that the ultimate commitment of the theories they adhere to gives emphasis on the idea of political justice.Politics within these discourses is seen as a collective action of resistance, which aims for change in the hopes of attending to the problems evident in the formation of identity and agency. It is important to note that literature as a repository of human experience has always been influenced by politics. Exercise of power within society is associated with and d ependent on the mass production of certain kinds of literature, which allows the cultural qualification of ideas.The relation between literature and politics can also be seen in literary theoryââ¬â¢s assessment of the formation of consciousness and unconsciousness, which is related to the maintenance, and transformation of the predominant modes of power made possible by literary output (Eagleton 210). It is also dependent upon the ahistorical positioning of the literary text, since this allows the continuous creation of meaning for a particular text. This mode of relationship invokes the aesthetic character of literature. Literature as a form of discourse enables the perception of aesthetics as a process of communicating while remaking a work.The aesthetic act becomes the incarnation of meaning rather than a demonstration of truth. This is possible since in the process of reading a text, the subject -which can be both the reader and the author- produces another text which is the same as the earlier text yet entirely different from it. Perceived within the dialogic process, the interconnectedness of completion and fragmentation can be understood by recognizing that it is in fact the fragmentation of the text, which allows the completion of the text itself.Within this perspective, the aesthetic act becomes political through the social interaction necessitated by the creation and continual recreation of an artistic work. Literature, in this sense, becomes the locus of a condensed and social evaluation. Intersubjectivity precedes subjectivity wherein the production and repression of meaning is seen as a socio-ideological process rather than an individual process. In this scheme, the text is allowed the character of fluidity. No permanent theoretical stipulation and ethical meaning can be attached to it since to do so is tantamount to denying the ahistorical character of the text.This character is invoked since in the end when one considers a text, what is given importance is not necessarily the historical reading of the text but the various readings made available by the literary theories and ethical standpoints that one may attach to the text. Within this process, there is an emphasis on the reassessment and creation of new standpoints since the interpretation of the text involves the consideration of both the act of writing and reading the text.The re-conceptualization of a literary text through reading enables the individual to undergo a process of analyzing the truth connected with the discourse in which the text is situated, while at the same time reassessing its connection to his self. Due to this, assessing a text becomes a personal and political act wherein the common adage ââ¬Å"the personal is politicalâ⬠can be phrased into an equally influential counter notion that ââ¬Å"the political is personalâ⬠. It is important to note that there is a big difference between these two adages.To say that the ââ¬Å"personal is po liticalâ⬠is only tantamount to equating political importance to personal experiences whereas to say that the ââ¬Å"political is personalâ⬠involves following an ideology and political theory in making decisions in everyday life. The function of the verbâ⬠isâ⬠in both adages is not that of identification. This process, wherein the reading of a text becomes a vehicle for self-realization and self-transformation is emphasized within the literary genre of science fiction. The Genre of Science FictionGenres, as systems of classification, are means of strategic control. Within the field of literature, it is believed that the continuous division of literary works into different genres leads not only to the classification of the work and the text but also to the imposition of values and ideals to those people who read the works belonging to a specific genre. Through genre categories like ââ¬ËRomanceââ¬â¢, ââ¬ËHorrorââ¬â¢, or ââ¬ËMysteryââ¬â¢, those i n control of the modes of production control both the reader and the author of the work.By promising the readers a familiar set of meanings and controlling the demand for the production and formation of those meanings, those who are in control of the modes of production direct the construction of narratives. Within this context, it is possible for the stories that are produced within society to be a part of a broader form of social classification. Due to this, there is the construction of a particular set of meanings, which can only be understood within specific systems of classification. Genres in this sense become instruments of control.This is evident if one considers that genres ââ¬Å"encode rules that constrain theâ⬠¦production and reception of meaningsâ⬠¦communicated through a large number of meta-textsâ⬠(Hodge 27). These meta-texts become the basis for the production of knowledge. All knowledge is positioned as knowledge in itself and knowledge produced from an d within body. As soon as both forms of knowledge are connected to a knowing subject, the subject becomes ensnared to the poststructuralist dictum of the unity and independence of the self, which leads to the formation of the narratives of the self.Narratives then display the imprint of culture and its institutions on the individualââ¬â¢s sense of identity. Since self and language are mutually implicated in an interdependent system of symbolic behavior, the language that one uses for the creation of literary narratives dictates the creation of identities. The modern era thereby places the individual in a kind of political double bind as it coerces the individual to conform to normalizing and disciplinary forms of narrative construction evident in the ââ¬Å"domestication of literatureâ⬠(Suvin 373). Science fiction, however, as a genre eludes the monopolizing character of other genres.As a genre, it is at the intersection of various fields. It draws on the elements of popula r culture, science, and all types of social relations (James and Mendlesohn 1). This is evident if one considers that it employs a methodology and an approach, which enables the specification of a new set of values through the depiction of a radical form of reality. In this sense, science fiction is less of a genre if one is to conceive of a genre as specifying a particular textââ¬â¢s subject matter and approach to themes. As opposed to the other literary genres, science fiction cannot be expected to employ a specific set of elements and tropes.It may however be depicted as a form of ongoing discussion since the texts within the genre may be perceived as mutually referential due to their characteristic opposition towards a naturalistic and empiricistic conception of reality. Science fiction as a genre is thereby defined by its critical stance towards the normative depictions of reality. However, to state that this is the defining characteristic of the genre provides problems for the genre itself. This is evident if one considers that it leaves the genre open to other forms of literary texts with the aforementioned characteristics such as fantasy and myth.Contrary to this, science fiction stands in opposition to the aforementioned forms of literature. Science fiction is neither totalizing nor deterministic as it presents a predetermined conception of the conception and end of reality [myth]. Furthermore, it is neither based upon a conceptual scheme that posits the impossible as ordinary [fantasy]. James and Mendlesohn state, ââ¬Å"the sense of wonder is the emotional heart of science fictionâ⬠(3). David Nye refers to this as the appreciation of the sublime evident in science fiction texts.Such a description further echoes Frederick Pohlââ¬â¢s description of science fiction as ââ¬Å"a way of thinking about thingsâ⬠(qtd in Malzberg 38). Generally, this ââ¬Å"way of thinking about thingsâ⬠may beâ⬠¦ All of these will show that the spo ntaneous and habitual orientation of attention is inimical to the maintenance of reality. Therefore, scientific fiction provides a reorientation of attention and a kind of ontological conversion, which affects the aesthetic, ethical, and political perceptions of the reality. This reorientation also affects the ontology of the world.
Tuesday, October 22, 2019
Lyndon jhonson essays
Lyndon jhonson essays Lyndon Baines Johnson was born on Aug. 27, 1908, on a farm near Stonewall Texas. On Nov. 22, 1963, Johnson took the oath of office as the 36th president of the United States after John F. Kennedy had been shot in Dallas. With a background in government and also in the Baptist church, Johnson was deeply involved in civil rights and that will be shown in his first term after he was promoted to presidency by the assassination of the a president and in his second term second after he was elected as president of the United States after receiving 61% of the nations votes, which is over 16 million votes. . On November 25, while on trip to Texas, John F. Kennedy was assassinated by an unknown gunman, Johnson was immediately put into office. In his State of the Union Address shortly after, he announced a slash in the National Budget. He called for more spending on education, health care and job training. But, he then stated that there would be less spending on military even though with situation in Southeast Asia .A major event in Johnson's first year as president was the Congressional passage of one of the largest civil rights bills in the nation's history. The bill had been show to Congress in June 1963 during the large civil rights demonstrations being healed during the time. It was originally Kennedys bill, but Johnson firmly stood behind it. The bill passed the House of Representatives in February, but Southern opponents tried to stop its passage into the Senate. But, the bill then passed the Senate, 73 to 27. In July President Johnson signed it into law. Johnson ran for his second term. Johnson ran for Presidency and won by a landslide. His opponent was Goldwater. Johnson won by the biggest landslide in the nations history. He won in every state except for Goldwaters state, Arizona, and five states in the Deep South. During his time in office Johnson made his plan called the Great Society. Th ...
Monday, October 21, 2019
Free Essays on Discussion Essay
Discussion Essay In this essay, I will discuss Neil Postmanââ¬â¢s essay ââ¬Å"Future Shlockâ⬠and I will explore whether or not I believe the Internet is another technological advance with which we are trivializing culture or whether or not the Internet is reversing the tide of show business news with serious public discussion. I will start off by discussing Postmanââ¬â¢s essay: ââ¬Å"Future Shlockâ⬠. He begins by talking about the fragility of human intelligence and how easy it is to suppress. Postman goes on to discuss how Germany was considered the most intelligent country in the world in the 1920s. Germany then went on to ââ¬Å"transform into a cesspool of barbaric irrationalityâ⬠and many of its most intelligent inhabitants were forced to flee the country. Postman offers this example of the fragility of human intelligence only because it is very closely related to the United States today. Although he believes that American scholars will never be forced to flee, he goes on to say, ââ¬Å"A culture does not have to force scholars to flee to render them impotentâ⬠. (Mercury Reader, 41) In this essay Postman offers two movies that he believes embody the main lines of his argument: The Gods Must be Crazy and The Producers. In The Gods Must be Crazy, an empty Coca-Cola bottle is tossed from the window of a small plane passing overhead. The bottle lands in a tribal village in Africa. The people begin to love the bottle more than they love themselves, and are saved only when the leader of the tribe, convinced that the gods must be crazy, returns the bottle to the gods by throwing it off the top of a mountain. The Producers is a movie that is about a producer that wants his play to be a huge disaster so he will make a huge profit off of the people that invested in the play. The plan backfires when the play is a huge success and the producer ends up in jail. ââ¬Å"Although the film was made years before a movie actor became President of t... Free Essays on Discussion Essay Free Essays on Discussion Essay Discussion Essay In this essay, I will discuss Neil Postmanââ¬â¢s essay ââ¬Å"Future Shlockâ⬠and I will explore whether or not I believe the Internet is another technological advance with which we are trivializing culture or whether or not the Internet is reversing the tide of show business news with serious public discussion. I will start off by discussing Postmanââ¬â¢s essay: ââ¬Å"Future Shlockâ⬠. He begins by talking about the fragility of human intelligence and how easy it is to suppress. Postman goes on to discuss how Germany was considered the most intelligent country in the world in the 1920s. Germany then went on to ââ¬Å"transform into a cesspool of barbaric irrationalityâ⬠and many of its most intelligent inhabitants were forced to flee the country. Postman offers this example of the fragility of human intelligence only because it is very closely related to the United States today. Although he believes that American scholars will never be forced to flee, he goes on to say, ââ¬Å"A culture does not have to force scholars to flee to render them impotentâ⬠. (Mercury Reader, 41) In this essay Postman offers two movies that he believes embody the main lines of his argument: The Gods Must be Crazy and The Producers. In The Gods Must be Crazy, an empty Coca-Cola bottle is tossed from the window of a small plane passing overhead. The bottle lands in a tribal village in Africa. The people begin to love the bottle more than they love themselves, and are saved only when the leader of the tribe, convinced that the gods must be crazy, returns the bottle to the gods by throwing it off the top of a mountain. The Producers is a movie that is about a producer that wants his play to be a huge disaster so he will make a huge profit off of the people that invested in the play. The plan backfires when the play is a huge success and the producer ends up in jail. ââ¬Å"Although the film was made years before a movie actor became President of t...
Sunday, October 20, 2019
A Brief History of the African Nation of Tunisia
A Brief History of the African Nation of Tunisia Modern Tunisians are the descendants of indigenous Berbers and of people from numerous civilizations that have invaded, migrated to, and been assimilated into the population over the millennia. Recorded history in Tunisia begins with the arrival of Phoenicians, who founded Carthage and other North African settlements in the 8th century B.C. Carthage became a major sea power, clashing with Rome for control of the Mediterranean until it was defeated and captured by the Romans in 146 B.C. Muslim Conquest The Romans ruled and settled in North Africa until the 5th century, when the Roman Empire fell and Tunisia was invaded by European tribes, including the Vandals. The Muslim conquest in the 7th century transformed Tunisia and the make-up of its population, with subsequent waves of migration from around the Arab and Ottoman world, including significant numbers of Spanish Muslims and Jews at the end of the 15th century. From Arab Center to French Protectorate Tunisia became a center of Arab culture and learning and was assimilated into the Turkish Ottoman Empire in the 16th century. It was a French protectorate from 1881 until independence in 1956, and retains close political, economic, and cultural ties with France. Independence for Tunisia Tunisias independence from France in 1956 ended the protectorate established in 1881. President Habib Ali Bourguiba, who had been the leader of the independence movement, declared Tunisia a republic in 1957, ending the nominal rule of the Ottoman Beys. In June 1959, Tunisia adopted a constitution modeled on the French system, which established the basic outline of the highly centralized presidential system that continues today. The military was given a defined defensive role, which excluded participation in politics. A Strong and Healthy Beginning Starting from independence, President Bourguiba placed strong emphasis on economic and social development, especially education, the status of women, and the creation of jobs, policies that continued under Zine El Abidine Ben Alis administration. The result was strong social progress ââ¬â high literacy and school attendance rates, low population growth rates, and relatively low poverty rates ââ¬â and generally steady economic growth. These pragmatic policies have contributed to social and political stability. Bourguiba,à President for Life Progress toward full democracy has been slow. Over the years, President Bourguiba stood unopposed for re-election several times and was named President for Life in 1974 by a constitutional amendment. At the time of independence, the Neo-Destourian Party (later the Parti Socialiste Destourien, PSD or Socialist Destourian Party)- enjoying broad support because of its role at the forefront of the independence movement- became the sole legal party. Opposition parties were banned until 1981. Democratic change Under Ben Aliââ¬â¹ When President Ben Ali came to power in 1987, he promised greater democratic openness and respect for human rights, signing a national pact with opposition parties. He oversaw constitutional and legal changes, including abolishing the concept of President for life, the establishment of presidential term limits, and provision for greater opposition party participation in political life. But the ruling party renamed the Rassemblement Constitutionel Dà ©mocratique (RCD or Democratic Constitutional Rally), dominated the political scene due to its historic popularity and the advantage it enjoyed as the ruling party. Survival of a Strong Political Party Ben Ali ran for re-election unopposed in 1989 and 1994. In the multiparty era, he won 99.44% of the vote in 1999 and 94.49% of the vote in 2004. In both elections he faced weak opponents. The RCD won all seats in the Chamber of Deputies in 1989, and won all of the directly elected seats in the 1994, 1999, and 2004 elections. However, constitutional amendments provided for the distribution of additional seats to the opposition parties by 1999 and 2004. Effectively Becoming President for Life A May 2002 referendum approved constitutional changes proposed by Ben Ali that allowed him to run for a fourth term in 2004 (and a fifth, his final, because of age, in 2009), and provided judicial immunity during and after his presidency. The referendum also created a second parliamentary chamber, and provided for other changes. SourcePublic Domain material, US Department of Stateà Background Notes.
Saturday, October 19, 2019
Macroeconomic Analysis Essay Example | Topics and Well Written Essays - 500 words
Macroeconomic Analysis - Essay Example In the short run there would be relatively high rates of unemployment due to reduced money supply in an economy (Piros, 2013). Borrowing of funds will be quiet expensive as the rates of interest would be hiked to discourage the general public from holding more funds as the population remains relatively low decreasing the demand. Since the central bank offering more interest at present, the general public will have desire to invest in the feds proposal and limit other wants as it would be profitable to hold the government securities than to hold money (Mariathasan, 2010). The population in the nation is relatively low with little income at their disposal and with an increasing levels of unemployment, an increase in supply to any public commodity will not yield profits rather losses. Even if the feds invests the money for the improvement of the society, in the short run the economy will have to bear with increasing rates of inflation due to the reduced circulation of money Due to the economic changes above, I would advise my uncle not to invest in the shops and houses as it would be relatively expensive as the rates of construction will be relatively high due to the high interest rates (Mariathasan, 2010) Furthermore, the demand for the commodities will be highly reduced due to the decrease of money that circulates in the economy leaving consumers with relatively small amounts to spend on utilities like new housing. Housing construction are investment that is majorly determined by the population of the country. A small population will make the venture unattractive while taking a much longer time to recover its cost which will only results in holding capital that would have been otherwise invested elsewhere like in the government securities which would bring instant income in the present and the future. The economy will also
Friday, October 18, 2019
Marriott International Essay Example | Topics and Well Written Essays - 750 words
Marriott International - Essay Example It should be noted that the company tries to occupy different positions on the mind of each customer through its different product lines. After looking at its different positioning strategy, this paper will identify the strategic issues or risks faced by the organization. Lastly, it will also offer recommendations based on the conducted analysis. Marriott International offers an extensive array of accommodation products and services. The company's products range from affordable to luxurious lodging. It can be deduced that the company provides customers with the most basic accommodation packages at lower prices while it also excels in offering the luxury of value added services and fulfilling even the unfulfilled wishes of their guests. Marriott International's portfolio is composed of 16 brands: Marriott's Hotels and Resorts; JW Marriott Hotels and Resort; Renaissance Hotels and Resorts; Courtyard; Residence Inn; Fairfield Inn; Marriott Conference; TownePlace Suites; SpringHill Suites; Marriott Vacation Club International; Horizons; Ritz-Carlton Hotel Company; Ritz-Carlton Club; Marriott Execustay; Marriott Executive Apartment; and Grand Residences (Mariott International 2006). These various brands are marketed using different marketing mixes. However, it can be seen that Marriott International generally uses five major strategies-cost leadership, differentiation, focused cost leadership, focused differentiation, and integrated cost leadership and differentiation. It should be noted that Marriott pursue cost leadership in its Fairfield Inn brand which provides "consistent quality lodging at an affordable price." Differentiation is applied to its luxury brand Ritz Carlton and JW Marriott. It should be noted these hotels offer plain accommodation services but "experiences." Focused differentiation is applied to Marriott Vacation Club, ExecuStay, and Renaissance which accommodates a narrow segment of the market by offering highly differentiated service. The company employs focused cost leadership through its SpringHill Suites. Much of its product line banks on integrated cost leadership and differentiation like Courtyard and TownePlace Suites. The sales trend of Marriott International proves that both corporate and business unit strategies of the firm are working for its benefit. Right now, the company boasts of recording approximately $20 billion. Even though Marriott occupies different places in the mind of its customers, the company was able to strengthen its competitive position through its aggressive marketing efforts. The company was able to avoid confusion by strategically designing marketing mixes which clearly delineates one brand from the other. This was done by differentiating the products, promotion, and price strategies for each brand. What is notable though is Marriott's strong commitment in extending excellent service to its guests. The company often differentiates its products not only on the unique lodging designs and features but also on the service extended by its staff. Marriott banks on its capacity of knowing the needs and wants of its clientele. The company's aggressive effort of instilling unique f eatures to its products in its entire portfolio really paid off. 3.0 Recommendation Since
How diverse is the pentateuch and what difference does it make Essay
How diverse is the pentateuch and what difference does it make - Essay Example In the Pentateuch, the Israelites were appointed as the chosen people of God and the beneficiary of the Ark of Covenant and laid down the foundation of the coming of the Messiah in the presence of Jesus Christ. II. Passages in the Bible that suggests Moses authorship of the Pentateuch There are several passages in the Pentateuch and the Bible that led to the initial conclusion that indeed Moses wrote the entire body of the Pentateuch. ... .'" Mark 7:10à "For instance, Moses gave you this law from God..." Mark 12:24à "...haven't you ever read about this in the writings of Moses, in the story of the burning bush..." Luke 24:44à "...I told you that everything written about me by Moses and the prophets and in the Psalms must all come true." John 1:17à "For the law was given through Moses..." John 5:46à "But if you had believed Moses, you would have believed me because he wrote about me. And since you don't believe what he wrote, how will you believe what I say?" John 7:23à "...do it, so as not to break the law of Moses..." Acts 26:22à "...I teach nothing except what the prophets and Moses said would happen..." Romans 10:5à "For Moses wrote..." III. Was the Pentateuch a work of a single author (by Moses) or an anthology of diverse material? It is easy to conclude that the first five books of the Bible were written by Moses given the above Biblical passages suggestion that Moses wrote the entire Pentateuch. Also, the Books were attributed to him not to mention that he was a central figure to it. A close examination on the Pentateuch by scholars beginning in the eighteenth century however led them to conclude that the Pentateuch is not written by a single author, or by Moses alone as the traditional thinking suggests, but rather an anthology of diverse materials. Evidences that Pentateuch is not written by a single author When critical literary analysis was applied to the Pentateuch, it was found that the five books contained numerous duplications, broad diversity of writing style and even contrasting view points. The discovery of the duplication of the texts in the body of Pentateuch led scholars to study that the first five books had its own history of composition (Campbell and Oââ¬â¢Brian 3-4). The
Thursday, October 17, 2019
Field Report on Hopwood Motorway Service Area . Sustainability Coursework - 1
Field Report on Hopwood Motorway Service Area . Sustainability - Coursework Example I noted that the peak flow and the concentration of pollutants in both water and sediments collected from the management train at Hopwood have recorded a downward trend (Motorway Services Online, 2013: 1). The sediments were received into the watercourse (Booth, et al., 2012: 244). Booth et al. (2012: 244) say that the Hopwood motorway service contains SUDS trains that administer vehicle parking, amenity and petroleum supply areas, as well as access road network, ponds and filter strips. During the fieldwork, I noticed that the motorway service also has swales, porous paving and swamplands (Booth, et al., 2012: 244). Conclusively, having conducted the field survey, the Service area must always be monitored to control the chemicals emitted from the pond. In an event that the wetlands are not well monitored, the wildlife may have access to contaminated water from the service
Return of Hong Kong to China Assignment Example | Topics and Well Written Essays - 750 words - 26
Return of Hong Kong to China - Assignment Example Because of this, generous reforms were implemented that proved to be economically successful. Later, younger leaders copied his economic model that earned the criticism of hardcore communists. First, the cities become overpopulated by rural migrants which becomes a housing problem. Household registration is a big concern since the government is trying to control the influx of migrants through the hukou system. Most of the migrants are considered as temporary migrants who would return to their villages one day. Thereââ¬â¢s also the problem of discrimination since people in the city look down on these migrants. Migrants are often blamed for crimes or any misdemeanor in a community which shows how ethnocentric urban dwellers are in China. First of all, it is hard to control the environmental pollution because this is the price for Chinaââ¬â¢s success. As the country consumes more natural resources to manufacture more goods, it has also to chew out tons of pollution. Health concerns are just one matter as children get sick from different industrial waste. Algal red tide problems along the coastline is another environmental disaster that would be hard to correct. Another issue is Basically, north and south China differ in many ways, namely: geography, climate, and even culture. The northern part of China is mainly characterized by flat plains and grasslands which is suitable for growing wheat. On the other hand, the southern part has mountains and valleys which are conducive to planting rice. Also, irrigation is not a problem in southern China due to the rainy weather. The Yangtze river plays an important role in rice cultivation in southern China. The origins of Japanââ¬â¢s economic success began during the Meiji period when the leaders during that period accepted the concept of free market economy.Ã
Germany and Germans Essay Example | Topics and Well Written Essays - 750 words
Germany and Germans - Essay Example A major contributing factor to his rise was the use of printing press which was introduced in this time period. He published pamphlets like Christian Liberty, On the Freedom of a Christian Man and the Babylonian Captivity of the Church. However, his most famous publication was the ââ¬Å"95 Thesesâ⬠, published in 1517. The publication was against the abuse of papal authorities and use of indulgences to bail out of jail free. His publications spread quickly through Europe and in 1521 he was summoned to appear in front of an assembly of Holy Roman Empire known as ââ¬Å"Diet of Wormsâ⬠. He was declared an outlaw and hid till 1522. He continued his teachings and two year long Peasant War was based on his ideas and theories about the Catholic system. It was the first of the revolt that lead to the revolution in Christianity and the rise of Protestantism. Luther continued teaching and served as Dean in the University of Wittenberg till his death in 1546. David Cole interviewed Dr. Franciszek Piper in 1992 to raise questions about the Holocaust story which is the death of Jews by Adolf Hitler during his period as Chancellor of Germany till 1945. David Cole visited one of the biggest camps of the World War II at Auschwitz to find evidence of the gas chambers and alleged homicidal gassings. He filmed his visit of the camp in an hour long video and interviewed tour guides, supervisor and Dr. Franciszek who was the senior curator to confirm his findings that point towards the idea that the Holocaust was a made up story. David Cole presented evidence and logic that conveys the message that the Gas Chambers at Auschwitz were constructed after the war. The main chamber was examined and signs of structural changes were shown along with the tour guide and supervisor presenting different views as to the presence of ââ¬Å"Holesâ⬠in the chamber; supposedly these were used for delivery
Wednesday, October 16, 2019
Greenhouse Gases and Climate Change Article Example | Topics and Well Written Essays - 750 words
Greenhouse Gases and Climate Change - Article Example Oil-burning automobiles and other forms of transportation vehicles are the primary source of air pollution, creating about 60% of the CO2 in the air (California Air Resources Board).à In addition to CO2, these vehicles also emit carbon monoxides (CO), hydrocarbons (HC) and nitrogen oxides (NOx), all of which contribute to global warming (Energy Information Administration).à All of these chemicals function as filters that trap the heat energy from the sun within the planet's atmosphere and cause the earth's temperature to rise on a global scale. But it isn't just the air that is affected by greenhouse gases causing climate change - the oceans are affected as well, contributing to changes in our weather patterns. The ocean acts as a natural filter for CO2 and other naturally-occurring atmospheric gases. Unfortunately, the naturally occurring levels have long been outweighed by human activity, overwhelming the natural system's balance and ability to process.à The oceans, which have been the earthââ¬â¢s natural filter, are now being forced to continually absorb higher concentrations of greenhouse gases than they naturally can handle (Miller).à As the water warms with the rising air temperatures and with its own collection of greenhouse gases, it becomes less capable of absorbing greenhouse gases, leaving them in even higher quantities in the air.à These warmer waters also have the effect of helping the ice caps melt, leading to rising water levels and warmer seas.à Additionally, increased air and water temperatures will increase.... All of these chemicals function as filters that trap the heat energy from the sun within the planet's atmosphere and cause the earth's temperature to rise on a global scale. But it isn't just the air that is affected by greenhouse gases causing climate change - the oceans are affected as well, contributing to changes in our weather patterns. The ocean acts as a natural filter for CO2 and other naturally-occurring atmospheric gases. Unfortunately, the naturally occurring levels have long been outweighed by human activity, overwhelming the natural system's balance and ability to process. The oceans, which have been the earthââ¬â¢s natural filter, are now being forced to continually absorb higher concentrations of greenhouse gases than they naturally can handle (Miller). As the water warms with the rising air temperatures and with its own collection of greenhouse gases, it becomes less capable of absorbing greenhouse gases, leaving them in even higher quantities in the air. These war mer waters also have the effect of helping the ice caps melt, leading to rising water levels and warmer seas. Additionally, increased air and water temperatures will increase the atmospheric water vapor through evaporation. This means the resulting precipitation will be proportionately higher and in different places than it has been in recorded history. Cloud compositions will change which will further amplify the greenhouse effect (Miller). This also leads to greater numbers of violent hurricanes and tropical storms. While rising sea levels may not seem all that bad, the effects of more powerful tidal forces and encroaching water can be devastating. ââ¬Å"The tide comes and goes like clockwork, but if we continue to watch and
Tuesday, October 15, 2019
Germany and Germans Essay Example | Topics and Well Written Essays - 750 words
Germany and Germans - Essay Example A major contributing factor to his rise was the use of printing press which was introduced in this time period. He published pamphlets like Christian Liberty, On the Freedom of a Christian Man and the Babylonian Captivity of the Church. However, his most famous publication was the ââ¬Å"95 Thesesâ⬠, published in 1517. The publication was against the abuse of papal authorities and use of indulgences to bail out of jail free. His publications spread quickly through Europe and in 1521 he was summoned to appear in front of an assembly of Holy Roman Empire known as ââ¬Å"Diet of Wormsâ⬠. He was declared an outlaw and hid till 1522. He continued his teachings and two year long Peasant War was based on his ideas and theories about the Catholic system. It was the first of the revolt that lead to the revolution in Christianity and the rise of Protestantism. Luther continued teaching and served as Dean in the University of Wittenberg till his death in 1546. David Cole interviewed Dr. Franciszek Piper in 1992 to raise questions about the Holocaust story which is the death of Jews by Adolf Hitler during his period as Chancellor of Germany till 1945. David Cole visited one of the biggest camps of the World War II at Auschwitz to find evidence of the gas chambers and alleged homicidal gassings. He filmed his visit of the camp in an hour long video and interviewed tour guides, supervisor and Dr. Franciszek who was the senior curator to confirm his findings that point towards the idea that the Holocaust was a made up story. David Cole presented evidence and logic that conveys the message that the Gas Chambers at Auschwitz were constructed after the war. The main chamber was examined and signs of structural changes were shown along with the tour guide and supervisor presenting different views as to the presence of ââ¬Å"Holesâ⬠in the chamber; supposedly these were used for delivery
Plymouth and Massachusetts Bay Colonies Essay Example for Free
Plymouth and Massachusetts Bay Colonies Essay The Reformation was the driving force behind English Catholic dissenters, many of which would eventually form the base of groups heading for new lands to find religious freedom. These people would come to be called Puritans and their goal was to purify the Church of England. They wanted to do away with the ââ¬Å"offensiveâ⬠features such as Church hierarchy and traditional rituals of Catholic worship in order to promote a relationship between the individual and his relationship with God. Through English rulers King Henry the VIII to Elisabeth I to King James, the Puritans never really found a strong foothold for their practices. When King Jamesââ¬â¢ son, Charles I came into power, a ruler that was strongly anti-Puritan and enforced conformity to the Church of England, Puritans began making plans to escape the persecution in England for the new world where they hoped to build new colonies to practice their faiths. Two of these groups, one to land at Plymouth and another to arrive at Massachusetts Bay, were prime examples of Puritans seeking to find a new life outside of England (or more specifically, the Church of England. Not surprisingly, religious beliefs are one area where both colonies share a few similarities, but exhibit greater differences. Both groups left England because of their dissatisfaction in the Church; however Plymouthââ¬â¢s inhabitants held a more extreme mindset than the Massachusetts Bay colonists. After a stint in Holland, where they first tried to live in accordance with their beliefs, they went on to America and came to be known as Separatists, due to their belief that the Church of England was hopelessly corrupt and they wanted no part of it. The Separatists sought to withdraw entirely from the Church, where they could start new, better protect their childrenââ¬â¢s relationships with God, and preserve their community the way they saw fit. Bradford, governor of Plymouth, and author of ââ¬Å"History of Plymouth Plantationâ⬠writes about the religious turmoil and division of beliefs he experienced: ââ¬Å"The one side labored to have the right worship of God discipline of Christ established in the Church, according to simplicity of gospel, without the mixture of mens inventionsâ⬠. Bradford continues on for many pages, describing the persecution reformers experienced and how strongly he felt that the men involved with protecting the ways of the Church of England were being influenced by the devil. Massachusetts Bay colonists, on the other hand, still believed the Church of England had hope for reformation and they set out to provide an example in the new world to show what that reformation could look like. In this ââ¬Å"idealâ⬠community, colonists would form separate congregations (groups who worship together) and devote themselves to Puritan doctrines. Guided by ministers and members of the elect, they would live in harmony and glorify God. John Winthrop, the Governor of Massachusetts bay, speaks of this desire througout his written account; ââ¬Å"â⬠¦They (a fishing ship) brought us news of the Scots entering into England, and the calling of a parliament, and the hope of a thorough reformation, etc, whereupon some among us began to think of returning back to Englandâ⬠(Winthrop 19) His statement, although seemingly offhand, shows a continued interest in reforming the Church of England and his colony being the living proof of how that change can happen. Both Massachusetts Bay and Plymouth showed similarities and differences in more secular ways, also. Plymouth was a profoundly smaller community, starting with only 102 individuals made up of working class families. They were not wealthy, and hardly had the funding for an expedition to America, so they made an arrangement with the Virginia Company. They made a joint stock company, where English investors would provide the capital and the colonists would provide the labor for the next 7 years. Similarly, Massachusetts Bay also was involved with joint stock company ââ¬â the Massachusetts Bay Company, where they too were granted a charter to settle in the new world and the company chose John Winthrop as governor. Massachusetts Bay Company was located in the colony, unlike Plymouth, where the Virginia Company was located in England. Massachusetts Bay colonists were larger in number when they settled, approximately 1200 immigrants came within months of each other, and they were generally wealthier and more educated than the Plymouth colonists. As we would expect, both colonies encountered Indians as they were trying to survive in their new surroundings, and these encounters were uneasy. Plymouth colony was in terrible shape, in the first winter they lost half their company and were weakened, sick, and starving. The colonists were able to forge a treaty with the Indians, after a few small skirmishes, and were eventually assisted by the native population. Squanto, an English speaking Wampanoag indian, served as a guide on how to survive and sustain by planting corn and fishing. Bradford writes ââ¬Å"â⬠¦they (as many were able) began to plant ther corne, in which servise Squanto stood them in great stead, showing them both y manner how to set it, and after how to dress and tend it. â⬠(Bradford 100). The colonists existed in relative peace with the Indians, likely also because they were such a small community and posed little threat. Massachusetts Bay, on the other hand, was a much larger group and had difficulty keeping the peace with local Indians. At first, they didnââ¬â¢t encounter many, due in part to an epidemic that had nearly wiped out the local Indian population. Eventually, however, as Massachusetts Bay began to grow and become more established, they needed to expand their territory. This expansion caused more tension between Indians and the Puritans, eventually leading to warfare. William Bradford described the destruction by fire of the Pequots major village, in which at least 300 Indians were burned to death: Those that escaped from the fire were slain with the sword; some hewed to pieces, others run threw with their rapiers. It was a fearful sight to see them thus frying in the fier, and the streams of blood quenching the same. Both colonies shared similar characteristics and experienced similar distresses. They each dealt with various ailments, hunger, death, tensions with Indian relations and landownership, but with all their shared experiences they were still very different groups. Plymouth, smaller and less educated, funded by the Virginia Company located in England, tried to separate themselves from the Church of England altogether. They survived with the help of Indians, but never really thrived and eventually were absorbed by the much larger Massachusetts Bay colony. Massachusetts Bay was created and inhabited by individuals with overall greater wealth and knowledge, supported by the locally based Massachusetts Bay Company. They set out to be an example of how England, religiously, should behave. As they expanded, they fought with the local Indian population, eventually driving them out of the lands the growing English population needed to settle.
Monday, October 14, 2019
The Hewlett Packard Economic Analysis Business Essay
The Hewlett Packard Economic Analysis Business Essay Hewlett-Packard is the worlds largest technology company. Based in Palo Alto, California, HP maintains segments that cross sectors such computing hardware (printers, personal computers, servers, and storage), software, cloud computing services, IT infrastructure, and connectivity products. HP offers its products to over 1 billion customers in over 170 countries. HP has roughly 332,000 employees worldwide. The company ranked No. 10 in the Fortune 500 rankings, and its revenue for 2012 was approximately $120.4 billion (Hewlett-Packard Development Company, L.P., 2011).à Hewlett-Packard was one of the first technology based businesses in Silicon Valley. HP was founded by Stanford graduates David Packard and William Hewlett. They began the company, in 1939, in a garage next to Packards home in Palo Alto, Calif. As the company grew, the founders based the organizational structure on an informal, non-hierarchical culture (Hewlett-Packard Development Company, L.P., 2011). In order to foster and environment of innovation, they allowed engineers to access tools and parts after hours. Hewlett-Packard Company (HP) is a provides numerous products, technologies, software, solutions and services to private consumers, businesses of all sizes, including the Government, health and education sectors. Its operations are organized into seven divisions including the Personal Systems Group, Services, the Imaging and Printing Group, Enterprise Servers, Storage and Networking, HP Software, HP Financial Services and Corporate Investments. HPs offers products for personal computing, customer services, infrastructure technology, business process outsourcing, application development and support services, and imaging and printing products. Since HP extends across numerous IT markets, it has numerous competitors in each Market. For instance, in the personal computing market Apple and IBM offer very similar products and would be considered direct challengers. In the printing sector, direct competitors are Epson, Cannon, and Lexmark. In the server sector, again IBM is direct competition along with Dell. Overall, HP had a 3.3% market share in the IT market. That number is based on industry wide revenue figures for 2012. HPs 2012 revenue was $123 billion out of roughly $3.79 trillion spent within the industry worldwide (Hewlett-Packard Development Company, L.P., 2011). In comparison, the No.1 vendor was Apple Inc. with revenues of $149 billion and a 3.9% market share. (Hewlett-Packard Development Company, L.P., 2011) (Hernandez, 2012) (Hingley, 2012) According to the course text, the concept ofà elasticity involves the percentage change in one variable associated with a given percentage change in another variable (Hirschey, 2009, p. 170). Elasticity relates to the principles of supply and demand. When something changes in a market, elasticity conveys how much other elements will change. For instance, price elasticity conveys the amount of impact a change in price will have on consumer willingness to buy that item. If prices rise, the law of demand dictates that the quantity demanded will decrease. Price elasticity of demand points out how much the quantity demanded decreases. Elastic demand means that the consumers of that good or service are highly sensitive to changes in price (Tuck, 2013). Typically, a good or service which is not a necessity or has multiple substitutes has elastic demand. Inelastic demand has the converse meaning and indicates that consumers are not highly sensitive to price changes. Price elasticity of a product is calculated as the percent change in the quantity demanded of a good divided by the percent change in the price for that good (Tuck, 2013). A result greater than one means that the product is elastic and that demand is highly sensitive to changes in price. Elasticity less than one means that a product is inelastic and price change will have a minimal impact on the quantity demanded. HP is a technology and hardware company. Any consumer that has been to an electronics store knows that there are a tremendous amount of hardware and software options available. There are numerous competitors that offer similar printers, computers, servers, and software packages. In addition, the technology market is rapidly evolving and new products are being consistently released onto the market. This drives short life cycles for products and rapid obsolescence. Though, technologies have become a necessity worldwide, consumers are extremely price sensitive due to the high number of alternative products available. These factors drive a high level of elasticity in the technology sector, which impacts many of HPs products. Regression analysis is statistical technique that describes the way in which variables are related to one another (Hirschey, 2009, p. 85). This type of analysis is commonly used to identify demand, cost, and profit relations. For the purposes of this assignment, the regression analysis can be used to demonstrate the relationship between total sales, employment rates, and personal income levels. Sales Levels (Revenues Fiscal Year 2012) Unemployment Rate Personal Income (Monthly) Oct-11 $32,122,000.00 8.5 $3,044.00 Jul-12 $29,669,000.00 8.2 $3,088.00 Oct-12 $29,959,000.00 7.9 $3,088.00 (Bureau of Labor and Statistics, U.S. Department Of Labor, 2010) In order to accomplish this, the equation: Sales Levels (Y) = a + b1*Personal Income + b2*Unemployment Rate + e y = 230100 + -966.671 + -62.3412 Based on the analysis that has been done to this point, it appears as though software revenue grew 14% year over year with a 27.2% operating margin. Software revenue was driven by 9% license growth, 9% support growth, and 48% growth in services. HP Financial Services revenue grew 1% year over the year. However, there was a decline in other aspects of the business as the personal systems, printing, and enterprise server and storage, as revenues declined in each of these areas. The technology market and these statistics indicate that HP should continue to develop its software and financial services divisions. These aspects of the HP organization have demonstrated growth and the company should continue to move toward expanding in these sectors. Despite declining revenues, HP is still a leader in the hardware market as well. The company may want to leverage the software division and work toward integrating more of the licensed software into the hardware products. For example, the HP server and storage division could incorporate HP software bundles, used to drive the technology, at a reduced price. This would make the hardware more lucrative to enterprises and personal consumers. Instead of purchasing software and services from a competitor, a more cost effective, all-in-one solution could be bundled by HP. Apple Inc. has become a dominant competitor in the technology market. They have accomplished this with an emphasis on design, not hardware. HP should also make an effort to replicate the Apple model to a certain extent. They need to place resources into the design and innovation of new products. The technology market demonstrates a high level of price elasticity. So, HP needs to push towards well designed products that provide unique and cutting edge tools for users. Any edge that the company can gain without increasing prices will ultimately improve their bottom line.
Sunday, October 13, 2019
Parenting in Haydn Middletons The Lie of The Land :: Haydn Middleton The Lie of The Land
Parenting in Haydn Middleton's The Lie of The Land There are many different ways to read The Lie of The Land, by Haydn Middleton. The subjects that can be approached in LOL are many, as is the different ways in which these subjects can be approached. We will look at this novel from a parental standpoint and look into the book and see the different aspects of parenting that Middleton incorporated into this novel. There are two main parental figures in this novel, David Nennius's wife, Melissa, and his mother, Mary. There were many themes that kept showing up with these two mothers. Middleton created two mother figures that landed in the same position, being a single parent, though through very different circumstances. Both mothers also had to move from a situation to protect their children. Neither of the boys knew their father, and both fathers were of questionable morals, one father being a rapist while the other father was a murderer. The themes mentioned above all flow together into one after reading The Lie of The Land. It is difficult to separate them because of how well Middleton sewed this story together, even though it is a story within a story. Therefore, the first two points of the women being single mothers and then moving to protect their children must go together. It is fascinating that Middleton chose to make both of these women single mothers. He created conflicts that forced both women to move their children to a safe place. Mary of course was almost forced into being a single parent because she chose to submit to the intruder rather than fight him, but it was her choice to submit. Mary could have fought him, but then there would have been no Nennius and therefore no story. Mary knew she had to move to protect her child as well as herself Being put into the time period of 20730 years ago, a child out of wedlock would have ostracized her and her son, so she did move out of necessity. Melissa made her choice to be a single mother by not seeing Nennius's side of what happened in the restroom (p. 192-194). As a person, let alone a parent, I feel most people could understand and even appreciate the reaction that Nennius had. I was applauding his reaction. Melissa was not so pleased, so chose to make herself a single parent for some time.
Saturday, October 12, 2019
Dell Case Study Essay -- Business and Management Studies
Dell Case study. In this report we are going to analyse the business environment of the computer industry in the form of a PESTE which stands for Political, Economical, Social-Cultural, Technological and Environmental. We feel that it is important to analyse the environment of a business as it will help the business to identify the Opportunities and Threats surrounding it. Using the case study of Dell we have identified the following opportunities and threats of the computer industry. Political There are a number of political issues, that large organisations such as Dell must consider when expanding or operating in different countries. Obviously government in the western world have different ideals to the countries in other regions. Rules and regulations in different countries would reflect their different ideals; so in order for companies to be successful, they must have a good understanding about how different governments operate. As stated in the case, patents and trademarks are prevalent in the computer industry, so it is important for organisations to develop good relations with different governments. Other elements that must be considered include: Currency exchange rates, taxation and employment law, labour conditions and political stabilities. Organisations should also understand different governmentsââ¬â¢ attitudes towards monopolies and competition. Economical Opportunities: 1) The computer industry is predicted to continue to grow in volume over the years. It is expected to grow between 15-20% over the next 3-5 years. This is influenced by the development of the internet and the global expansion opportunities. 2) The foreign markets like Asia and china were previously not accessible due to their political and economical environment. However the situation has changed eliminating barriers thus is now readily accessible; this is a big opportunity for the computer industry to grow in these regions. Threats: 1) Economical changes around the world can affect the computer industry. The biggest threat to the industry is the instability of the world market, for example Dell opened a new manufacturing facility in Brazil and the changes in the South American economical conditions could thus affect the company. 2) The currency fluctuation in different regions can affec... ...mation Ltd (2003) ââ¬Å"European IT chiefs plan more investment in 2004 (analysts' views)â⬠Computer Weekly, 9th of September - Ziff Davis Media Inc (2003) ââ¬Å"HP Promotes PC Recyclingâ⬠eWeek, 6th of February - Reed Business Information Ltd (2003) ââ¬Å"Suppliers introduce price incentives to get users to invest in the latest PC hardwareâ⬠Computer Weekly, 14th October - Simon Quicke (2003) ââ¬Å"Suppliers' views; Top supply executives predict market upturnâ⬠Computer Weekly, 9th September, Reed Business Information Ltd - Adam Lashinsky (2000) ââ¬Å"The Wired Investor: Once the drivers of the great bull market, PC makers have seen their stocks battered and bruised. The question is: Do they still deserve a place in your portfolioâ⬠Fortune, 18th December - Ben Elgin (2003) ââ¬Å"Hitting the Delete on Compaqâ⬠Business Week, 14th of April, The McGraw-Hill Companies - Ziff Davis Media Inc (2003) ââ¬Å"Dell Entering Consumer Electronics Marketâ⬠eWeek, 25th of September - Andrew Park; Faith Keenan; Cliff Edwards (2002) ââ¬Å"Whose Lunch will Dell Eat Next? Now, it's moving into printers, storage, and handheldsâ⬠Business Week, 12th of August, The McGraw-Hill Companies
Friday, October 11, 2019
Does the government do enough to punish cyber-attacks & criminals?
1.0 Introduction Cyber-attacks have become a significant problem for information systems (IS) worldwide. When referring to information systems, the term cyber-attack is used for denoting a malicious action that aims to result to specific benefit, usually financial, and which is developed through online routes as available in the Internet (Vacca, 2009). In the UK, the expansion of cyber-crime has been quite rapid the last few years leading to severe financial losses for the victims, individuals and businesses (Cabinet Office, 2011). The graph in Figure 1 shows the cost of the various types of cyber ââ¬â crime to the UK economy. This paper explores the effectiveness of measures taken by the UK government in regard to the punishment of cyber-crime, aiming to show whether the current initiatives for the UK government for punishing the cyber-crime are sufficient or not. The paper also explains the key characteristics and the value of information systems (IS) security so that the potential of the UK go vernment to secure safety from cyber-crimes is evaluated. I will argue that the UK government does not enough to punish cyber-attacks and criminals. Moreover, the introduction by the government of stricter punishment for cyber-attacks has not resulted to the limitation of this type of crime, as explained below. Figure 1 ââ¬â Cost of different types of cyber ââ¬â crime to the UK economy (Cabinet Office, 2011, p.2) 2.0 Security of IS ââ¬â characteristics and importance Security, as a term, can be related to different fields. In the context of information technology, the term security is used for describing ââ¬Ëa power systemââ¬â¢s degree of risk in its ability to survive imminent disturbances without interruption of customer serviceââ¬â¢ (Cuzzocrea et al., 2013, p.244). As for the term ââ¬ËIT securityââ¬â¢, this term refers to three values/ characteristics of an IT system, such as: ââ¬Ëconfidentiality, integrity and availabilityââ¬â¢ (Katsikas, 2016, p.28). According to Mehdi (2014), the term IS security denotes ââ¬Ëthe protection of IS against unauthorized accessââ¬â¢ (p.4310). It is explained that a secure IS can ensure that its data will not be modified or lost (Mehdi, 2014). Also, such system is able to detect early any security threat activating appropriate protection mechanisms (Merkow, 2010). At organizational level, IS security is ensured by using an IS security policy, i.e. a set of rules referring to the securit y standards that would apply in all IS of the organisation involved (Kim and Solomon, 2016). However, the demands of such policy can be many, a fact which is justified if considering the several types of IS threats (Cabinet Office, 2011; Figure 1). Organisations often need to hire an Information System Security Officer (ISSO) for ensuring IS security (Kovachich, 2016). 3.0 The punishment of cyber-attacks and criminals ââ¬â government initiatives and effects3.1 Laws and policies focusing on IS security In the UK, the first law addressing cyber ââ¬â crimes appeared in 1990 and aimed to cover the gaps of existing legislation in regard to the protection of IT systems from cyber-attacks (Emm, 2009). This was the 1990 Computer Misuse Act. The introduction in the UK of a legislative text focusing on cyber-attacks has been highly related to a cyber-attack incident: the unauthorized access, by two cyber-attackers, to BTââ¬â¢s Prestel service in 1984 (Emm, 2009). When dealing with the above case, the court used the 1981 Forgery and Counterfeiting Act, due to the lack of a legislative text focusing on computer-related crimes (Emm, 2009). In May of 2015, the Serious Crime Act 2015 came into action (Eversheds-Sutherland, 2015). The articles 41 up to 44 of the above law introduced stricter punishment for cyber-crimes. More specifically, in the context of the 1990 Computer Misuse Act the imprisonment for serious cyber-crimes could not exceed the 10 years. With the 2015 Act, the imprisonment for cyber-crimes has been significantly increased, reaching the 14 years and even, the life sentence in cases of cyber-crimes threatening national security (Eversheds-Sutherland, 2015). This, stricter, punishment for cyber-crimes could discourage cyber-criminals but only if the enforcement of the law was appropriately supported, so that all cases of cyber-crimes are brought before the courts (White, 2016). The National Cyber Security Strategy (CSS) of 2011 has been an effort of the British government to control cyber-crime (Shefford, 2015). The Computer Emergency Response Team (CERT) is a national team that was established in 2014 for helping towards the achievement of the objectives of CSS (Cabinet Office, 2014, p.13). The CERT team provides to organisations in the private and the public sector critical information for the protection from cyber-attacks (Cabinet Office, 2014). Additionally, in the context of CSS, educational initiatives focusing on cyber security are developed by institutions across the UK; these initiatives are funded by the government and aim to achieve two targets: First, to increase the awareness of the public in regard to cyber security. Second, to help individuals to acquire skills which are necessary for supporting cyber security and for facing cyber-attacks (Cabinet Office, 2014; Figure 2). The Cyber Security Challenge (CSC) is a programme developed by the UK g overnment for helping young people to understand the risks from using their cyber skills in the wrong way; the programme includes competitions and other schemes that can motivate young people to use their cyber skills in a proactive way and not for the commitment of cyber ââ¬â crimes (National Crime Agency, 2017). Figure 1 ââ¬â Initiatives/ measures of the National CSS for facing cyber-crime (Cabinet Office, 2014, p.22)3.2 Cyber-attack incidents in governmental and non-governmental organisationsThe number of cyber-attacks against governmental and non-governmental organisations in the UK is continuously increased (White, 2016). From January to October of 2016, 75 cyber-attacks have been reported against banks in the UK, while in 2014 these attacks were just five (White, 2016). In 2013, three individuals in Britain were convicted to jail, from 6 months up to 22 months, for unauthorised access of sensitive private data stored in ââ¬ËPayPal, Visa and Mastercardââ¬â¢ (McTague, 2014). The above punishment was considered as too soft compared to the seriousness of the crime. In 2014, the government decided to initiate the modification of existing punishment for cyber-crimes, so that future perpetrators are discouraged from committing a cyber-crime (McTague, 2014). Pultarova (2016) argued tha t banks in the UK face cyber-attacks quite regularly but they avoid reporting the specific incidents trying to protect their market image. In November of 2016, Chancellor P. Hammond noted that critical infrastructure units of the UK, such as airports and gas facilities, are threatened by ââ¬Ëcyber-attacking techniques developed by other countriesââ¬â¢ (BBC News, 2016). It was noted that the protection from such attacks would be a priority for the UK in order for the countryââ¬â¢s security, at national level, to be ensured (BBC News, 2016). In 2011 the general police officer in the e-crime department of Scotland-Yard argued that the punishment of cyber ââ¬â crimes in the UK is too soft if considering the actual damage that these crimes cause (BBC News, 2011). It was explained that the annual damage on the UK economy from cyber-crimes reaches the ?27bn (BBC News, 2011). In 2016, the National Crime Agency of the UK published a report for showing the status of cyber-crimes, in terms of occurrence/ rate of appearance. According to the above report, the cyber ââ¬â crime represents a major part of criminal activity in the UK, reaching the 36% among all crimes developed in the UK. At the same time, the crimes related to computer misuse reached the 17% among the countryââ¬â¢s total crimes (National Crime Agency, 2016). The above figures and facts indicate the inability of the UK government to control cyber-crime. The introduction in 2015 of stricter punishment for cyber-crimes has been an important initiative by the UK government for controlling cyber-crime. However, this initiative should be combined with other measures, at national and at community level. In a speech in mid-February of 2017, Chancellor P. Hammond noted that in the previous three months a total of 188 severe cyber-attacks had been reported; these attacks aimed to cause severe damage to governmental services, infrastructure and businesses (Cole, 2017). A similar issue has been raised by Lord West of Spithead who noted in 2010 that in 2009 the UK had to face ââ¬Ë300 significant attacksââ¬â¢ on the IS of the government (Doward, 2010). According to Lord West, this problem had become quite serious, denoting that the UK had been targeted by cyber criminals worldwide, as these attacks seemed to be supported by foreign governments, as Lord West noted (Doward, 2010). The above arguments verify the existence of gaps in the existing national framework for the protection from cyber-attacks, as this framework constitutes the national legislation and national policy for the control of cyber ââ¬â crime. The facts presented above further verify the inability of the UKââ¬â ¢s policy to reduce the occurrence of cyber-crime. Guitton (2012) developed an experiment, using data related to cyber-attacks that occurred between 2003 and 2010 in businesses located in three European countries: Germany, UK and France. It was revealed that the relationship between attribution and deterrence is strong only in cases of individuals of individuals who are aware of the existing legislation for cyber-crime and who can realise the actual effects of their actions. These individuals represented the 1/3 of the cases reviewed by Guitton (2012). In opposition, it was found that most individuals involved in cyber-crimes are not fully aware of the relevant legislation and they tend to ignore the effects of their actions. For these individuals, the control theory which emphasises on the power of attribution, as held by the state, to ensure deterrence is not applied, as Guitton (2012) argued. In the context of the above study, the potential of the British government to control cyber-crime is limited. This fact, even it would be ac cepted, could not affect the view on the governmentââ¬â¢s efforts to confront cyber-crime. The update of the terms of punishment of cyber-crimes just in 2015 and the lack of effective control mechanisms for identifying and reporting cyber ââ¬â attacks verify the failure of the government to ensure the punishment of cyber-attacks and criminals. 4.0 Conclusion and Recommendations It is concluded that the UK government does not make enough to punish cyber-attacks and criminals. First, a significant delay has been identified in the introduction of appropriate/ fair penalties. Indeed, the introduction of strict punishment for cyber-crimes took place just in 2015, as explained above. The facts and views presented in this paper lead to the assumption that for many years, the government has avoided confronting cyber-attacks as a criminal activity, a fact that led to the radical increase of cyber-attacks against IS systems in governmental services and in financial institutions. At the same time, IS security has several aspects, meaning that eliminating cyber ââ¬â crime is rather impossible. The soft punishment framework for cyber-crimes, as used in the past, has led to the severe deterioration of the problem across the UK. The increase of effectiveness of current legislation, as from May 2015, on cyber-attacks could be achieved through certain practices, such a s: First, events and seminars would be organized at community level for informing individuals on the characteristics of cyber-attacks and the available measures for protection; these seminars would also provide guidelines to entrepreneurs in regard to the value of IS security policy, as part of business strategy. Second, incentives would be provided to entrepreneurs for pursuing the certification of their business according to the information security management standards, such as the ISO/IEC 27000 standards. Third, an independent authority would be established for controlling the performance of governmental and non-governmental organisations in regard to IS safety. Finally, the investment on IS security in governmental and non-governmental organisations would be increased. Security frameworks, such as the ââ¬ËIntrusion Detection Systemââ¬â¢ (IDS), could be employed in these organisations for ensuring IS security in IS systems that manage and store high volume of private data (Stair and Reynolds, 2015, p.460). 5.0 Personal reflections This project has been related to a critical issue: the findings in regard to the studyââ¬â¢s subject have been contradictory. More specifically, the UK government has tried to confront cyber-attacks through legislation and relevant policies but the punishment for these crimes has been characterised as soft, at least up to 2015, while the number of cyber-attacks in the UK is continuously increased. Under these terms, I had to face a dilemma: how should the performance of the UK government in facing cyber-crime would be evaluatedBy referring to the initiatives taken or by emphasising on the actual results of these initiativesReflection has helped me to face the above problem. Indeed, reflection can help the researcher to have ââ¬Ëan objective sense of thingsââ¬â¢ (Gillett et al., 2013, 85). Moreover, using reflection I tried to estimate the balance between the positive and negative aspects of governmentââ¬â¢s efforts to punish cyber-crime and to understand which aspect of t he governmentââ¬â¢s strategy against cyber-crime is more related to the research question: this paper aims to explain whether the government has done enough on the punishment of cyber-crime. Through reflection, I understood that the occurrence of cyber-attacks in the UK should be preferred as the criterion for answering the research question. Ventola and Mauranen (1996) explained that reflection can help the researcher to identify the research findings that are closer to the research question, a fact that allows the researcher to use the right material for answering the research question. Additionally, I used reflection during the development of the study for managing time and for tracking research gaps, which have been covered after the completion of the project. The above tasks have been supported by a research diary (Day, 2013), in the form of notes, where daily progress in regard to research and writing was reported. Thus, the use of reflection while developing this project h elped me to control risks, in regard to the projectââ¬â¢s structure and content, and to manage time more effectively, covering all aspects of the research question. 6.0 References BBC News (2016) UK must retaliate against cyber-attacks says chancellor. Available from: http://www.bbc.com/news/technology-37821867 [Accessed 15 March 2017]. BBC News (2011) Cyber criminals ââ¬Ëshould get tough sentencesââ¬â¢ say police. Available from: http://www.bbc.com/news/uk-15680466 [Accessed 15 March 2017]. Cabinet Office (2011) The cost of cabinet crime. Available from: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60943/the-cost-of-cyber-crime-full-report.pdf [Accessed 15 March 2017]. Cabinet Office (2014) The UK Cyber Security Strategy. Report on Progress and Forward Plans. Available from: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/386093/The_UK_Cyber_Security_Strategy_Report_on_Progress_and_Forward_Plans_-_De___.pdf [Accessed 15 March 2017]. Cole, H. (2017) UK Government and businesses are hit by two ââ¬Ëseriousââ¬â¢ cyber-attacks a day. The Sun. Available from: https://www.thesun.co.uk/news/2857508/uk-government-and-businesses-are-hit-by-two-serious-cyber-attacks-a-day/ [Accessed 15 March 2017]. Cuzzocrea, A., Kittl, C., Simos, D., Weippl, E. and Xu, L. (2013) Availability, Reliability, and Security in Information Systems and HCI: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013, Proceedings. New York: Springer. Day, T. (2013) Success in Academic Writing. Oxford: Palgrave Macmillan Doward, J. (2010) Britain fends off flood of foreign cyber-attacks. The Guardian. Available from: https://www.theguardian.com/technology/2010/mar/07/britain-fends-off-cyber-attacks [Accessed 15 March 2017]. Emm, D. (2009) Cybercrime and the law: a review of UK computer crime legislation. SecureList. Available from: https://securelist.com/analysis/publications/36253/cybercrime-and-the-law-a-review-of-uk-computer-crime-legislation/ [Accessed 15 March 2017]. Eversheds-Sutherland (2015) Will the Serious Crime Act 2015 toughen the UKââ¬â¢s cybercrime regimeAvailable from: http://www.eversheds-sutherland.com/global/en/what/articles/index.page?ArticleID=en/tmt/Serious_Crime_Act_2015_May2015 [Accessed 15 March 2017]. Gillett, A., Hammond, A. and Martala, M. (2013) Inside Track to Successful Academic Writing. Essex: Pearson Education. Guitton, C. (2012) Criminals and Cyber Attacks: The Missing Link between Attribution and Deterrence. International Journal of Cyber Criminology, 6(2), pp.1030-1043. Katsikas, S. (2016) Information Systems Security: Facing the information society of the 21st century. New York: Springer. Kim, D. and Solomon, M. (2016) Fundamentals of Information Systems Security. Sudbury: Jones & Bartlett Publishers. Kovachich, G. (2016) The Information Systems Security Officerââ¬â¢s Guide: Establishing and Managing a Cyber Security Program. Oxford: Butterworth-Heinemann. McTague, T. (2014) Computer hackers face life in prison under new Government crackdown on cyber terrorism. Mail Online. Available from: http://www.dailymail.co.uk/news/article-2649452/Computer-hackers-face-life-prison-new-Government-crackdown-cyber-terrorism.html [Accessed 15 March 2017]. Mehdi, K. (2014) Encyclopedia of Information Science and Technology. Hershey: IGI Global. Merkow, M. (2010) Security Policies and Implementation Issues. Sudbury: Jones & Bartlett Publishers. National Crime Agency (2017) Cyber ââ¬â crime: preventing young people from being involved. Available from: http://www.nationalcrimeagency.gov.uk/crime-threats/cyber-crime/cyber-crime-preventing-young-people-from-getting-involved [Accessed 15 March 2017]. National Crime Agency (2016) Cyber ââ¬â Crime Assessment 2016. Available from: http://www.nationalcrimeagency.gov.uk/publications/709-cyber-crime-assessment-2016/file [Accessed 15 March 2017]. Pultarova, T. (2016) UK banks under constant cyber-attack but donââ¬â¢t report incidents. Engineering & Technology. Available from: https://eandt.theiet.org/content/articles/2016/10/uk-banks-under-constant-cyber-attack-but-dont-report-incidents/ [Accessed 15 March 2017]. Shefford, M. (2015) What is the UK government doing about cybersecurityDatonomy. Available from: http://datonomy.eu/2015/04/01/what-is-the-uk-government-doing-about-cybersecurity/ [Accessed 15 March 2017]. Stair, R. and Reynolds, G. (2015) Fundamentals of Information Systems. 8th ed. Belmont: Cengage Learning. Vacca, J. (2009) Computer and Information Security Handbook. Burlington: Morgan Kaufmann. Ventola, E. and Mauranen, A. (1996) Academic Writing: Intercultural and textual issues. John Benjamins Publishing. White, L. (2016) British banks keep cyber-attacks under wraps to protect image. Reuters. Available from: http://uk.reuters.com/article/us-britain-banks-cyber-idUKKBN12E0NQ [Accessed 15 March 2017].
Subscribe to:
Comments (Atom)