Thursday, October 31, 2019

A REVIEW OF PROVIDING EMPLOYEES BENEFITS IN SAMSUNG IN SOUTH KOREA Essay

A REVIEW OF PROVIDING EMPLOYEES BENEFITS IN SAMSUNG IN SOUTH KOREA - Essay Example Korean based firm that is headquartered in Suwon. Having been established in 1969 when it was referred to as Samsung Electric Industries, the company has embarked on product diversification an aspect that has made it to enjoy a competitive position in the electronic industry. Soon after it was established, the company embarked on acquiring other firms within the same industry with an objective of expanding its capital bases as well as putting in place effective marketing strategies. Some of the notable firms that Samsung acquired were Korea Semiconductor and Korea Telecommunication in 1974 and 1980 respectively. Investing in technology especially between 1995 and 2008 made the company to acquire a significant market share an aspect that made the company to effectively face off its key competitor Sony. In order to effectively meet the needs of its global market, the company diverted from consumer brands to enter in the filed of memory. This made it to be a key supplier of the NAND mem ory and A7 processors to the Apple Company. Recently, Samsung has indicated an expansive growth that has made it not only to incur high profits but also it has created a strong positive consumer product relationship. From the introduction and adoption of 5G technology to the launching of Galaxy S series, Samsung registered a profit of US $9.4 billion in the third quarter of 3013. In order to ensure that its operations are effectively varied out in the local and global market, Samsung maintains a workforce of 470,000 employees. Thus the need to keep them motivated as a way of enlacing the company profitability. 1.2 Research title, research question and research objectives A review of providing employees benefits in Samsung in South Korea Research question What is the impact of providing employees benefits in Samsung? Research objectives Analyzing the impact of employees benefit program on Samsung performance Outline the employees, benefits program Reviewing the implementation of prov iding employees benefits in Samsung Company What are the benefits of providing employees for the company? 1.3 Research rationale This research will use the studies done by various individuals who have done extensive coverage of the benefits offered by the Samsung Company in its effort to improve the productivity of its employees. 2 Literature review 2.1 Introduction Being an international company with an objective of expanding its customer bases and acquiring a wide market segment, Samsung has a strong linkage with its employees. Ranging from technical managers to the sales representative, the company has established a number of employee’s benefits that are aimed at motivating them thus improving their productivity. Through the establishment of Samsung’s welfare system, the company provides not only financial support to the employees, but also it provides health, leisure and education facilities to the employees. The establishment of an integrated benefit scheme, Samsu ng has maintained a strong workforce that has made it to put at bay it key competitors including Nokia and Apple. The part below reviews studies done by various people on the impact of providing employees benefits in Samsung. 2.2 High compensation In his studies on compensation and negotiation, Chingos (1985) support an increment of salaries not only as a way of compensating them but also as

Tuesday, October 29, 2019

Gerontological Project Research Paper Example | Topics and Well Written Essays - 250 words

Gerontological Project - Research Paper Example Tertiary prevention goal involves creating realistic short and long-term goals for healthy weight loss with the active participation from the patient. For this patient, pain is an issue that will prevent her from engaging in any exercise regimen and thus it has to be dealt with first. Chronic pain occurs in 25 to 86% of the elderly population and leads to â€Å"falls, deconditioning, malnutrition, gait disturbances, and overall slow rehabilitation† (Herr, 2002). Managing pain is a multi-dimensional process that involves pharmacological and non-pharmacological management (Herr, 2002). According to Messier et. al (2004), a combination of exercise and weight loss resulted in improved physical activity and reduced pain in overweight elderly with knee osteoarthritis. The exercise program that this patient can safely participate in could involve exercise three days per week, which consists of â€Å"an aerobic phase (15 minutes), a resistance-training phase (15 minutes), a second ae robic phase (15 minutes), and a cool-down phase (15 minutes)† (Messier et. al, 2004). Motivation and a desire to change are key components in the initiation of and continuity in an exercise program.

Sunday, October 27, 2019

Film Studies Essays Film or Book

Film Studies Essays Film or Book Which is better the film or the book? The debate over the superiority of literature over film or vice versa seems to rear its head every time a major piece of literary work is adapted. Even unbridled success stories such as Peter Jackson’s Lord of the Rings trilogy have dissident voices unhappy with his changes and omissions. However changes and omissions are absolutely necessary when adapting hundreds of pages of prose into a couple of hours of film. This essay will look at how narrative is adapted and retold in two films; Mrs Dalloway (Marleen Gorris, 1997) and The Color Purple. (Steven Spielberg, 1985) Mrs Dalloway is not a conventionally narrated novel. Over the course of a day it follows the eponymous protagonist through her preparations to host a party and how the unexpected arrival of am old suitor makes her reminisce about her youth.   At the same time we see how Mrs Dalloway and her associates lives intersect with that of a shell-shocked solider. What is produced is a type of mosaic narrative, which is then left for the reader to interpret and discern meaning. In the beginning of the film as she walks about London on her way to collect the flowers for her party we are allowed to view moments of her youth in flashback. These flashbacks are generally triggered by something in the present. For example a meeting with Hugh reminds her of how Peter Walsh ‘never to this day forgiven her for liking him.’ (Woolf, p 8) These are transitioned in and out of aurally, as she hears voices of people she knew in her head and the visual waits a beat before transitioning back as well. This replicates the mosaic narrative style of the book. There is however one major difference between the beginning of the book and the beginning of the film. The character of Septimus (Rupert Graves) is much more quickly established as a major character within the film. In the book he is introduced as a car backfires and he is shocked rigid by it although no immediate reason is given why. Over the course of the novel we learn more about his experiences at war and the lasting effect upon him. Mrs Dalloway and Septimus never meet in the novel, yet we are led to discern they are connected thematically through the mosaic narrative. The Film version of Mrs Dalloway opens with a brief sequence of Septimus (Rupert Graves) in the trenches of world war one.   The shot is thick with smoke and is filmed in slow motion to give the sense of a dream sequence although the title Italy 1918 suggests that this is a flashback. The camera slowly zooms into Septimus face singling him out as the protagonist of this sequence. We see his reaction to a friend being blown up by an explosion and as he sinks into despair the smoke fills the screen fading it to white and softening focus. This soft white backdrop then becomes the drapes in the bedroom of Mrs. Dalloway (Vanessa Redgrave).  Ã‚      These two environments could not be more different; however the transition is not jarring or unsettling; we are taken from the horror trenches into the gentile and elegant world of a Whitehall socialite with the greatest of ease. The transition leaves the viewer with the impression that the two people’s lives are somehow connected, but perhaps is not as subtle and gently persuasive as the book. The Color Purple tells the story of a young black woman in the Deep South. It is about the oppression and abuse she suffers in a racist sexist world and the bonds of friendship she finds with other women. The climactic emotional moment of the novel is the sequence ion which Celia tells her husband that she is leaving him and moving to Memphis. The dialogue form the scene in the film is taken almost word for word from the book. It is a moment of great personal emancipation for Celia, and a moment of fantastic performance from the unusually restrained Whoopi Goldberg. She has been abused and sub-serviant all her life and she finally has enough sense of self worth to speak up load and powerfully. â€Å"You’re a lowdown dog is what’s wrong, I say. It’s time to leave you and enter into the creation.† (Walker, p180) First of all the scene is set in Mr.____’s (Danny Glover) House as opposed to Harpo’s (Willard Pugh) in the book; this is significant because it has been Celia’s prison for several years; a place where she has been continuously abused. This adds extra dramatic tension to the scene and focuses it on Celia. However this does to some extent detract from the arcs of the other characters such as Squeak (Rea Dawn Chong) and Sofia. (Oprah Winfrey) In the novel there are continuous references to Squeak being Harpo’s mistress and mother of his child. This is less prominent in the film and as such leaves Squeaks departure with much less dramatic weight. Also the film omits the visit of Eleanor Jane and reference to Sofia’s probation. In the novel Sofia is denied her emancipation by the legalities she is still embroiled with, the film instead reinstates Sofia as a dominant force at the dinner table. What is clear from this scene is that although as the stories protagonist Celia’s narrative arc has remained intact, omissions have had to have been made on behalf of other characters within the novel due to the narrative constraints of time. Film can strive to imitate the stylistic form of literature successfully as in the case of Mrs Dalloway or unsuccessfully as in the case of The Bonfire of the Vanities (De Palma, 1990) In certain cases such as The Godfather (Coppola 1972) and Jaws (Spielberg 1975) the film adaptation can surpass the source material. Although argument other which form is better may be mere sound and fury; direct comparison of the two different narrative forms can lead to a better understanding of narration itself. Bibliography Bordwell and Thompson. (2001) Film Art: An Introduction, New York: McGraw Hill. Kawin, B (1992) How Movies Work, London: University of California press. Thompson, K (1999) Storytelling in the New Hollywood: Understanding classical Narrative Technique. London: Harvard Walker, A (2004) The Color Prurple, London: Pheonix. Woolf, V (1996) Mrs Dalloway, London: Penguin popular classics. Filmography Bonfire of the Vanities (Dir Brian De Palma, 1990, US) Color Purple, The (Dir Steven Spielberg, 1985 US) Godfather, The (Dir Francis Ford Coppola, 1972, US) Jaws (Dir Steven Spielberg, 1975, US) Lord of the Rings: The Two Towers, The (Dir Peter Jackson, 2002, US, New Zealand, Germany) Mrs. Dalloway (Dir Marleen Gorris, 1997, UK)

Friday, October 25, 2019

The Way it Was :: essays research papers

Washington Post: Research Points to a Key Alzheimer’s Risk factor Key Terms: Amino Acids: An organic molecule with a hydrogen atom, amino group, an acid group, an â€Å"R† group which are all covalently bonded to a hydrogen atom. Genes: Unit of information about a heritable trait passed from parents to their offspring. Hypothesis: possible explanation, of a phenomenon, one that has potential to be proved false by experimental tests. Statins: cholesterol lowering drugs. Text References: Chapter 16: Recombinant DNA and Genetic Engineering- pg. 741-743 on vitamins and the essential amino acids. Summary: Researchers believe that homocysteine, an amino acid in the blood, is the cause for an increased number of deaths from Alzheimer’s disease. Chances of getting this disease are believed to almost be doubled due to high content of the amino acid in the blood. Scientists believe now that they can determine people who are at greater risk and also be able correct the problem. The answer, scientists believe, is to simply lower the high amounts of homocysteine in the blood by taking certain vitamin supplements.   Ã‚  Ã‚  Ã‚  Ã‚  New research by scientists have led us to the conclusion that the higher amounts of homocysteine in the blood the greater chance of getting Alzheimer’s disease. In the late 1980’s , scientists studied 1,100 participants all with the average age of 75, to see what amount of homocysteine was present in their blood. Approximately eight years later, 10% of those tested had developed dementia, most of its attribute to Alzheimer’s. The 30% which had the highest content of homocysteine in their blood had twice the risk of developing the disease.   Ã‚  Ã‚  Ã‚  Ã‚  The data found by scientists has lead them to believe homocysteine is the cause for elevated occurrences of Alzheimers disease. Scientists believe that homocysteine accounts for 15% of the populations risk of developing Alzheimer’s disease. Obviously if the 15% of those cases were prevented that would mean a much fewer amount of cases of Alzheimer’s disease from occurring.   Ã‚  Ã‚  Ã‚  Ã‚  Willaim Jagust a neurologist from the University of California at Davis tends to disagree with the results. Dr. Jagust states, â€Å"If we lower homocysteine levels, will we lower the risk of Alzheimer’s disease?† He questions homocysteine because he says there are many other factors which play a role involving dementia and Alzheimer’s disease.

Thursday, October 24, 2019

Ethical Decision Making Essay

Webbster ´s Dictionary makes the following definitions Ethic , system of moral standards ,  Ethical , conforming to moral and to professional standards of conducts Ethics , study of standards of conduct and moral judgment . The system of morals of a particular person , religion , group . Kelman and Hamilton , 1989 , The authors state , that Ethical/Moral Issue , is present where a person’s actions , when freely and in conscious choice or decision is made, may harm or benefit or have consequences for others Ethical/Moral Agents , is a person who makes a moral decision , even though she or he may not recognize that moral issues are at stake . Ethical/ Moral Decision , decision that is both legal and morally acceptable to a larger community . Successful Managers Handbook , PDI , S Gebelein , LStevens , pg 318 , 320 , 321 Ethical Organization An ethical organization is one that adheres to ethical rules and principles in all its actions , whether the actions are internal or external , written or spoken , at high level or low . Ethical organizations often have a written code of conduct , but more generally have well-grounded and widely understood principles and values that guide even the smallest decision or action Leadership Challenge , Jim Kouzes and Barry Posner , Ch 2 According to the authors, the four characteristics that are more important to the group surrounding a leader , are : Honesty , Progressive , Inspiring and Competent . The research based on several thousand of interviews in 1987 and 1995 Honesty in both researches was selected as the number one characteristic that leader must have in order for people to trust and follow him , it speaks about being reliable , ethic and loyal to his principles . People will look for those conducts and evaluate also congruence in what they say and what they do Successful Managers Handbook , PDI , S Gebelein , LStevens , pg , 579 , 580 Effective Leaders know what they stand for and follow their own values and ethics. They are willing to endure difficulty , take risks , and make themselves uncomfortable in order to live their values There are many decisions models and Ethical decision model , but one easy way to provoke the Ethical/Moral revision of our actions in Periodically review your decisions and actions to ensure that they are consistent with your values As you make a decision , consider whether you would be comfortable appearing on national TV to justify it or comfortable explaining the decision to your children and family Make your rationale and position clear to others When refusing a request , clearly explain to those involved why you cannot support them Seek advice and counsel of others . they may see the situation in a different way , identify more options and provide important insight Don’t overlook the people aspect of making tough decisions . be prepared to deal with other peoples reaction and to direct people to resources that will help them to deal with the impact of the decision Will my actions stand the test of time ? a year from now , will I be glad I ignored the problem or took the action I did ? There are other models to follow , like Laura Nash and from the Josephson Institute of Ethics The Twelve Questions Model Laura Nash, an ethics researcher, created the Twelve Questions Model as a simple approach to ethical decision making. Nash, L. (1981). Ethics without the sermon. Howard Business Review, 59 79–90, accessed February 24, 2012, http://www.cs.bgsu.edu/maner/heuristics/1981Nash.htm In her model, she suggests asking yourself questions to determine if you are making the right ethical decision. This model asks people to reframe their perspective on ethical decision making, which can be helpful in looking at ethical choices from all angles. Her model consists of the following questions :Nash, L. (1981). Ethics without the sermon. Howard Business Review, 59 79–90, accessed February 24,  2012, http://www.cs.bgsu.edu/maner/heuristics/1981Nash.htm 1 Have you defined the problem accurately? 2 How would you define the problem if you stood on the other side of the fence? 3 How did this situation occur in the first place? 4 To whom and what do you give your loyalties as a person and as a member of the company? 5 What is your intention in making this decision? 6 How does this intention compare with the likely results? 7 Whom could your decision or action injure? 8 Can you engage the affected parties in a discussion of the problem before you make your decision? 9 Are you confident that your position will be as valid over a long period of time as it seems now? 10 Could you disclose without qualms your decision or action to your boss, your family, or society as a whole? 11 What is the symbolic potential of your action if understood? If miss understood? 12 Under what conditions would you allow exceptions to your stand? As you can see in this model, first an analysis of the problem itself is important. Determining your true intention when making this decision is an important factor in making ethical decisions. In other words, what do you hope to accomplish and who can it hurt or harm? The ability to talk with affected parties upfront is telling. If you were unwilling to talk with the affected parties, there is a chance (because you want it kept secret) that it could be the wrong ethical decision. Also, looking at your ,actions from other people’s perspectives is a core of this model . Some of the possible approaches to ethical decision making. No one model is perfect, so understanding all of the possibilities and combining them is the best way to look at ethical decision making. Josephson Institute of Ethics’ Model Josephson Institute of Ethics uses a model that focuses on six steps to ethical decision making. The steps consist of stop and think, clarify goals, determine facts, develop options, consider consequences, choose, and monitor/modify. . Figure 5.4 â€Å"An Example of Josephson’s Model when Dealing with the Ethical Situation of Downloading Music from Share Websites.† gives an example of the ethical decision-making process using Josephson’s model.  Figure 5.4 An Example of Josephson’s Model when Dealing with the Ethical Situation of Downloading Music from Share Websites. My Opinion Ethics is not about rules is about Transparency, Trust, and Honesty You will know that you are being unethical, doing wrong or abusing when : You are consciously breaking rules , laws and codes . Written or not Persons , communities or places are being harmed or affected by environmental , economic , security conditions You will not openly talk about decisions you or your company are taking , with family , friends or colleagues You spend more time minimizing the economical , cultural , group impact of your decisions than maximizing the benefits of the decision ETHICAL DECISION MAKING SITUATIONS Situation 1 : Facilitating Decisions in the Middle East On one side you have a very open position from the government , accepting the help of friends and relatives from the Minister to grant the contracts . Even when your company has not yet established a code of conduct , has formed a committee to consider one . The government of your country passed an ethical business practice act , that although vague , implies this kind of payment to be a violation . More important , ALL the executive group above you do not want to become involved . Therefor , I would NOT proceed with the bid , I would write a letter to my supervisor , expressing the implications of the bribe if our government finds out about the $200 k and also , I would meet with the Minister expressing the company policy , offering to work along in other projects or with technical support , ETHICAL DECISION MAKING SITUATIONS Situation 3 :The Southeast Asian Advertising Campaign You are new in the position . It is the advertising agency that is presenting for approval ,the plan to introduce a new tire . The new tire is better is better than some local products , the tire is than competitors and has been successfully tested . Senior Management is expecting a favorable reception .  The company has an ethical business act and a code of conduct I would push the advertising company to focus on the real advantages of the tire and express the benefit of buying an extraordinary tire that will cost less than the competitors . The test conditions of heat and humidity are technical , so I would express them in â€Å"small letters† as a disclosure in the advertisement . I would review the tire comparisons and advertising plans in my country of origin and in other parts of the world for this same tire . Also review past presentations where the Senior Management was involved and supportive .

Wednesday, October 23, 2019

Cyber war Vs Cyber terrorism Essay

In this time and era, we have witnessed the emergence of electronic resources as the most important development of the modern day communication system. Technologies such as cellular phones, home computers, the internet and websites have added another dimension to the way we live our lives today. This presentation seeks to address and analyse the negative and positive aspects in view of the introduction of computers and telecommunications techniques as follows: Firstly, it raises awareness with regard to the new age of crimes, termed as cyber crimes. The paper focuses, in particular, on the difference between the two common types of cyber crimes, cyber war and cyber terrorism. Secondly, the paper examines the limitations and impact of having graduates through e-learning. Thirdly and lastly, the paper discusses on whether computer practitioners should be required to have a practicing license as it is with other professionals such as doctors, lawyers and teachers. 1. (a) Difference Between Cyber War and Cyber Terrorism The end result of both cyber war and cyber terrorism is the same, to damage critical infrastructures and computer systems. The major difference being  that cyber war is launched by governments whereas cyber terrorism is launched by individuals or a group of individuals. Cyber war, often done in conjunction with traditional military attacks, is an organised attack by one nation against another nation’s information and communication systems with an aim of gaining an advantage over the enemy by disrupting their ability to fight back. Cyber war attacks often targets an enemies systems such as command and control systems, intelligence collection and distribution, information processing and distribution, tactical communication, troop and weapons positioning and so on. For instance, when the United States of America invaded Iraq, they disrupted the country’s communication and defence systems, crippling their ability to find and take down US aircrafts. On the other hand, cybe r terrorism is when individuals or terrorist groups use computers, computer networks and the internet against persons or property to intimidate or coerce government, civilians, society in order to reach political, religious or ideological agenda. The things that are targeted are power plant systems, telephone systems, transportation systems, water or oil pipelines, financial institutions and so on. ([online] Available at: community.mis.temple.edu/mis2901001†¦[Accessed 5 April 2014]) Cyber terrorism takes many forms. One of the more popular is to threaten a large bank. The terrorist hacks into the bank’s system and then leave an encrypted message for senior directors demanding for a sum of money. If the bank does not cooperate, the terrorist threatens to use anything from logic bombs to electromagnetic pulses and high-emission guns to destroy the bank’s files. Most banks would rather pay the money than have the public know how vulnerable they are for fear of loss of business. ([online] Available at: csciwww.etsu.edu/../cases.htm [Accessed 6 April 2014]) One practical example is where banks in Zambia have lost an estimated US$4 million to cybercrime through Automated Teller Machines (ATMs) withdrawals. This was reported in the local Post newspaper dated 14 June 2013. This was after the state police discovered a scam in which three foreign criminals had recruited and trained Zambians in cyber-crime. ([online] Available at: www.postzambia.com/post-read †¦article [Accessed 6 April 2014]) Cyber terrorism can also include terrorists getting secret data from defence files, network with other terrorists, or raise and manage funds for terrorism by hacking. (b) Limitations and Impact of Having Graduates   Through E-learning E-learning has become an increasingly popular learning approach in higher educational institutions due to the rapid growth of internet technologies. Many foreign renowned universities offer all types of programmes ranging from Bachelor, Master and PhD programmes, to Short Courses. Essentially, emerging evidence suggests that having graduates through e-learning has substantial beneficial impact on social and economic development of our societies today and includes the following. It has enhanced skills development to would be graduates and their countries to cope with the demands of the 21st century where rapid change and globalisation is taking place. For instance, graduates have acquired an improved ability to conduct independent research, think critically to solve problems through the use of e-technology to communicate and collaborate. It has lead to an increased student turnover because of its flexibility and cost effectiveness and hence has broadened educati onal opportunity for many, especially financially disadvantaged students and those with disabilities. This has resulted in an increased human resource base and enhanced economic progress from direct job creation in the technology industry as well as from developing a better educated work force, much needed in developing countries such as Zambia. Online access promises a new access route for millions of students. This new approach of learning facilitates different students at different continents to attend the same classes almost at the same time. It has brought about improved learning methods and teachers have a more positive attitude towards their work and are able to provide personalized learning. On the other hand, although e-learning has brought about many benefits for students and organizations alike, it also has its limitations. In order to perform the tasks required by system, an e-learning environment requires basic state of the art equipment and minimum level of computer skills. Thus, a student that does not have the minimum computer knowledge, or have access to these equipment is disadvantaged and will not succeed in an e-learning program. Certain subjects, such as sports and public speaking, require physical exertion and practice. Thus, they cannot be applied in an e-learning environment. Needless to say, it can be a useful companion to traditional education for teaching backgroun d and technical information. A successful e-learning program requires students that are well organised, self motivated and have  good time management skills. In other words, an e-learning program is directly related to the amount of effort applied. Successful e-learning students are able to study independently and incorporate study time into their busy lives. Students that lack discipline and are not good at time management are disadvantaged and will not succeed. E-learning requires good reading and writing skills. Most activities and communications are written, and thus, the ability to efficiently interpret instructions is a critical skill to a successful e-learning program. Students that are not comfortable with the ability to express themselves through writing will not succeed in e-learning. 2. Are computer practitioners similar enough to other professionals that they should be required to have a License too? Licensing is not currently required for computer practitioners but is being considered by several professional computing organizations and is believed, in principle, as necessary as the certification and licensing of doctors, lawyers, teachers, hairdressers and other professionals. The question of licensing professional s in general is a very controversial and political question. Licensing generally means that to practice a certain profession requires a government licensee, usually administered through a professional organization. The general theory of licensing professional is that it is supposed to help the general public outside the professional to be assured that someone else is capable of doing certain jobs. For instance,  one of the top e-learning institutions, the University of Liverpool in conjunction with Laureate Online Education offer 41 distance learning courses from a wide area of disciplines. The notion that degrees through e-learning are perceived not to be as rewarding or valuable as full-time traditional degree has been proved not to be the case. In fact, in the late 1990s, the Quality Assurance Agency for Higher Education of the British Government measured academic excellence in more than 100 universities, including the Open University. Surprisingly, the Open University was ranked in the top ten of British Universities in terms of academic excellence. The only underlying difference between a traditional degree and e-learning degree is the manner in which information is conveyed. The traditional setup has been based on a face to face communication where students and lecturers are brought together at the same time and the same place in classes,  laboratories and recreation centers for the purpose of learning, whereas in e-learning systems use technology to separate the learner from the teacher, and the learner from the learning group while maintaining the integrity of the learning process. Follow up statistics placing the Open University in the top 10 with Oxford and Cambridge have been repeated for several years and cannot be statistically be explained as a mere coincidence. ([online] Available at: http.//www.webbasedtraining.com/ [Accessed 3 March 2014]) The main focus of this presentation is to gain insights into critical issues confronting two major stakeholders in the new era of WBT, the student and faculty. The question at hand requires objective views on the advantages and disadvantages of WBT from a student’s point of view as well as advantages of WBT from the college’s point of view. It further requires identifying ways that studying from a website is better than studying from written text as well as discuss in details the social and economical benefits and limitations of E-technology in Zambia. Systems Development Life Cycle The second part of this presentation discusses a linier Systems Development Life Cycle (SDLC) which is a technique used to assist developers effectively develop information systems. ‘Gaining competitive advantage and improving information delivery will urge an organization to restructure its activities. The information system has to be developed to suite the business scenario and objectives. It needs to be carefully planned and activities well thought of.’ (Ndhlovu, 2009). Thus, in an effort to answer the question at hand a description of the stages involved in a SDLC using annotated diagram shall be discussed. In addition, the discussion shall also include a description of techniques which can be used to investigate the existing system of an organization identifying the advantages and disadvantages of each and also give an alternative to SDLC for developing systems. Having said that, details of the mentioned topics in question is as follows. a) Web-Based Training Advantages and Disadvantages of WBT: Student’s Point of View Advantages Utilisation of the World Wide Web is a current and extensive source of  information and relatively easy to use. Some of the advantages from a student’s point of view include the following. There is unlimited source of information on the internet as compared to textbooks and class lectures as it provides a variety and quality of learning materials. Encountering a new experience of sourcing information on the web increases a motivation to learn among students. For example, the web allows browsing from one link to another on a particular subject or topic Access to meaningful resources foster critical thinking skills and allows the student to see new ways of interpreting and evaluating information. For instance, gathering view points and knowledge from various internet sites cause students to debate previously held values and ideas which they may have had misconceptions. Gain of competence with technology by learning to navigate and use the web successfully, apply computer skill s, use of conferencing tools such as e-mail and listservs. Integration of technology with content-related work provided a more meaningful interaction with the subject matter. For example, students reflected on the lack of relevance in acquiring computer skills in isolation noting that when combined with content, those applications become a tool to improve learning in their field of study. Technological aspects of course assignments encourage cooperative dialogue rather than isolation. For example, e-mail and listservs are used regularly providing a valuable resource for support and collaboration among classmates for help in completing assignments, support with technological frustration and to share acquired skills or content resources. In addition, e-mail communication with instructors gives a student individual attention that is not apparent in a traditional coursework setup. E-mail utilization has many assets that face-to-face classroom contact lacks. For example, student need not wait for class time in order to get or clarify a piece of information. The student who would normally shy away and not ask a question in class or participate in a class discus sion are more comfortable using e-mail as a medium of communication and thus is not left out on the much needed information. For the student, online course allows them to integrate work, family and school more efficiently as it eliminates travel time to and from class for commuters. Disadvantages The positive aspects of WBT are countered with some frustrations that are  experienced by some students. These include the following. Student lack of computer skills, internet server being down, difficulty in accessing computer, use of obsolete computers and lack of technical and instructional support are some of the frustrations that a student may encounter. Required assignments are time consuming as mastering computer application tools and learning to navigate the web efficiently take up most of the time. Advantages of WBT: College’s Point of View Higher education is evolving, consumer needs are shifting, and competition for students is increasing. Consequently, institutions must be driven to some extent by the needs and demands of the consumer. To satisfy the unique needs of growing numbers of nontraditional students and to make graduate degrees more attractive and feasible, the availability of online courses and distance learning opportunities is essential. Most of the faculties consider technology applications in university courses as the wave of the future citing their main reason for wanting its continuity as mainly being the benefits they believe their students receive. Moreover, in this time and era, a faculty member who does not use technology is often considered out of date and out of touch with skills that are needed for the coming millennium. Faculty respondents consistently identified convenience and improved learning as advantages for students enrolled in Web-based instruction. Other advantages identified by facul ty are as follows. Students gain knowledge on how to use numerous technology-based applications such as e-mail, PowerPoint, listservs, graphics programs, and HTML, many of which are considered essential skills for today’s workforce. Students also gain comfort with the medium, anxiety levels are reduced, and they are more willing to explore the potential of technology applications. Students tend to become independent learners, are more motivated to explore related topics on their own, and develop critical thinking skills. The quality of completed assignments is often better than in the traditional classroom because students have more time for reflection and better access to resources. More information can be included in a course with the potential for students to expand on the information received by providing links to related sites. Many students will click on a link more readily than obtaining a print resource identified in a bibliography. Students learning how to access the extensive  resources available on the WWW, online databases, and other technology-based resources. Student convenience. For example, online classes provide students with 24-hour access, eliminate the need to travel or find parking, and eliminate scheduling conflicts with jobs or family. These advantages may particularly benefit graduate students and nontraditional students. Connecting s tudents with technology allows the student to become part of a global community. Information and ideas can be exchanged with other students and experts throughout the world using e-mail and listserv discussions. Collaboration and communication among students are fostered, as well as communication between instructor and student. Online Studying Vs. Written Text Studying Among the several ways that studying from a website is better than studying from written text three distinct ways include the following. Text books become outdated almost immediately after publication and cannot be updated until the next publication which may take several years down the line. Information on the website can be updated daily and printing errors are corrected immediately. Written text is limited to the information on the page whereas educational websites can link to an infinite number of other educational sites to give supplemental detail in as much as possible on a particular subject or topic. Textbooks are limited to the points of view of their authors whereas the website allows multiple view points, which is essential for critical thinking especially if the author is too vague about a particular topic. ([online] Available at: English.varsavskyfoundation.org/education [Accessed 7 March 2014]) b) Social and Economical Benefits and Limitations of E-technology in Zambia Zambia is one of a number of countries in the Southern African region that have sought to include e-technology in its national development plans. E-technology is believed to contribute to improving development outcomes in two main ways: E-technology-based knowledge and products contribute directly to wealth creation. The use of e-technology contributes indirectly to national development through its impact in social and economic sectors such as agriculture, health and education, and by empowering individuals to take advantage of new opportunities. For example,  AfriConnect, in partnership with the Zambian Ministry of Education, have been piloting a project aimed at bringing web-based e-learning to schools in different parts of the country. The objective is to move from the traditional chalk-and-talk pedagogy to enquiry-based learning, while at the same time bringing the option of lifelong learning to people who have already left school. Individuals also benefit from the availability and use of e-technology in a number of ways. For example, by substituting phone calls for travel, which saves time and money, and by using e-technology to obtain information on prices, for their own produce and for purchases. In these various ways, e-technology can have a significant impact on a country’s ability to achieve the Millennium Development Goals (MDGs). There are, however, also constraints on the potential impact of e-technology in many developing countries. These constraints include inadequate technical infrastructure, limited human skills to use available networks and services, the relatively high cost of communications equipment, and poor policy and regulatory environments. These factors reduce the scope for countries and communities to realise the potential of e-technology for development. Question 2 Solution (a) Model of the Systems Development Life Cycle highlighting the maintenance PhaseThe systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application. In general, an SDLC methodology follows the following steps: 1. Planning Stage The existing system is evaluated. Deficiencies are identified. This can be done by interviewing users of the system and consulting with support personnel. 2. Analysis Stage The new system requirements are defined. In particular, the deficiencies in the existing system must be addressed with specific proposals for improvement. 3. Design Stage The proposed system is designed. Plans are laid out concerning the physical  construction, hardware, operating systems, programming, communications, and security issues. The new system is developed. The new components and programs must be obtained and installed. Users of the system must be trained in its use, and all aspects of performance must be tested. If necessary, adjustments must be made at this stage. 4. Implementation Stage The system is put into use. This can be done in various ways. The new system can be phased in, according to application or location, and the old system gradually replaced. In some cases, it may be more cost-effective to shut down the old system and implement the new system all at once. 5. Maintenance Stage Once the new system is up and running for a while, it should be exhaustively evaluated. Maintenance must be kept up rigorously at all times. Users of the system should be kept up-to-date concerning the latest modifications and procedures. (b) The systems development life cycle (SDLC), also referred to as the application development life-cycle, is a term used in systems engineering, information systems and software engineering to describe a process for planning, creating, testing, and deploying an information system.[1] The systems development life-cycle concept applies to a range of hardware and software configurations, as a system can be composed of hardware only, software only, or a combination of both.[2] The waterfall model is a sequential design process, often used in software development processes, in which progress is seen as flowing steadily downwards (like a waterfall) through the phases of Conception, Initiation, Analysis, Design, Construction, Testing, Production/Implementation, and Maintenance. What is systems development life cycle (SDLC)? (SDLC is also an abbreviation for Synchronous Data Link Control.) The systems development life cycle (SDLC) is a conceptual model used in project  management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application. Various SDLC methodologies have been developed to guide the processes involved, including the waterfall model (which was the original SDLC method); rapid application development (RAD); joint application development (JAD); the fountain model; the spiral model; build and fix; and synchronize-and-stabilize. Frequently, several models are combined into some sort of hybrid methodology. Documentation is crucial regardless of the type of model chosen or devised for any application, and is usually done in parallel with the development process. Some methods work better for specific types of projects, but in the final analysis, the most important factor for the success of a project may be how closely the particular plan was followed. In general, an SDLC methodology follows the following steps: 6. The existing system is evaluated. Deficiencies are identified. This can be done by interviewing users of the system and consulting with support personnel. 7. The new system requirements are defined. In particular, the deficiencies in the existing system must be addressed with specific proposals for improvement. 8. The proposed system is designed. Plans are laid out concerning the physical construction, hardware, operating systems, programming, communications, and security issues. 9. The new system is developed. The new components and programs must be obtained and installed. Users of the system must be trained in its use, and all aspects of performance must be tested. If necessary, adjustments must be made at this stage. 10. The system is put into use. This can be done in various ways. The new system can phased in, according to application or location, and the old system gradually replaced. In some cases, it may be more c ost-effective to shut down the old system and implement the new system all at once. 11. Once the new system is up and running for a while, it should be exhaustively evaluated. Maintenance must be kept up rigorously at all times. Users of the system should be kept up-to-date concerning the latest modifications and procedures.

Tuesday, October 22, 2019

Ancient Mayan Architecture - Temples and Palaces

Ancient Mayan Architecture - Temples and Palaces The Maya were an advanced society that flourished in Mesoamerica long before the arrival of the Spanish in the sixteenth century. They were skilled architects, building great cities of stone that remain even a thousand years after their civilization fell into decline. The Maya built pyramids, temples, palaces, walls, residences and more. They often decorated their buildings with intricate stone carvings, stucco statues, and paint. Today, Maya architecture is important, as it is one of the few aspects of Maya life that is still available for study. Maya City-States Unlike the Aztecs in Mexico or the Inca in Peru, the Maya were never a unified empire ruled by a single ruler from a single place. Rather, they were a series of smaller city-states who ruled the immediate vicinity but had little to do with other cities if they were far enough away. These city-states traded with and warred upon one another frequently, so cultural exchange, including architecture, was common. Some of the more important Maya city-states were Tikal, Dos Pilas, Calakmul, Caracol, Copn, Quirigu, Palenque, Chichà ©n Itz and Uxmal (there were many others). Although every Maya city is different, they tended to share certain characteristics, such as general layout.​ Layout of Maya Cities Maya tended to lay their cities out in plaza groups: clusters of buildings around a central plaza. This was true of the impressive buildings in the city center (temples, palaces, etc) as well as smaller residential areas. These plazas are rarely neat and orderly and to some, it may seem as if the Maya built anywhere they pleased. This is because they Maya built on the irregularly-shaped higher ground to avoid floods and dampness associated with their tropical forest home. In the center of the cities were the important public buildings such as temples, palaces, and the ball court. Residential areas radiated out from the city center, growing sparser the further they got from the center. Raised stone walkways linked the residential areas with each other and the center. Later Maya cities were built on higher hills for defense and had high walls surrounding most of the city or at least the centers. Maya Homes The Maya kings lived in stone palaces in the city center near the temples, but the common Maya lived in small houses outside the city center. Like the city center, the homes tended to be bunched together in clusters: some researchers believe that extended families lived together in one area. Their modest homes are thought to be much like the homes of their descendants in the region today: simple structures constructed mostly of wooden poles and thatch. The Maya tended to build up a mound or base and then build upon it: as the wood and thatch wore away or rotted they would tear it down and build again on the same foundation. Because the common Maya were often forced to build on lower ground than the palaces and temples in the city center, many of these mounds have been lost to flooding or encroaching wilderness. The City Center The Maya built great temples, palaces, and pyramids in their city centers. These were often mighty stone structures, over which wooden buildings and thatched roofs were often built. The city center was the physical and spiritual heart of the city. Important rituals were done there, in the temples, palaces, and ball courts. Maya Temples Like many Maya buildings, Maya temples were built of stone, with platforms on the top where wooden and thatch structures could be built. Temples tended to be pyramids, with steep stone steps leading to the top, where important ceremonies and sacrifices took place. Many temples are graced by elaborate stone carvings and glyphs. The most magnificent example is the famous Hieroglyphic Stairway at Copn. Temples were often built with astronomy in mind: certain temples are aligned to the movements of Venus, the sun or the moon. In the Lost World Complex at Tikal, for example, there is a pyramid which faces three other temples. If youre standing on the pyramid, the other temples are aligned with the rising sun on equinoxes and solstices. Important rituals took place at these times. Maya Palaces The Palaces were large, multi-storied buildings which were home to the king and royal family. They tended to be made of stone with wooden structures on top. Roofs were made of thatch. Some Maya palaces are spacious, including courtyards, different structures that were possibly homes, patios, towers, etc. The palace at Palenque is a good example. Some of the palaces are quite large, leading researchers to suspect that they also acted as a sort of administrative center, where Maya bureaucrats regulated tribute, trade, agriculture, etc. This was also the place where the king and noblemen would interact not only with the common people but also with diplomatic visitors. Feasts, dances, and other community social events could also have taken place there. Ball Courts The ceremonial ball game was an important part of Maya life. Common and noble people alike played for fun and recreation, but some games had important religious and spiritual significance. Sometimes, after important battles in which important prisoners were taken (such as enemy noblemen or even their Ahau, or King) these prisoners would be forced to play a game against the victors. The game represented a re-enactment of the battle, and afterward, the losers (which were naturally the enemy nobles and soldiers) were ceremonially executed. Ball courts, which were rectangular with sloped walls on either side, were prominently placed in Maya cities. Some of the more important cities had several courts. Ball courts were sometimes used for other ceremonies and events. Surviving Maya Architecture Although they were not on a par with the legendary Inca stonemasons of the Andes, Maya architects built structures which have withstood centuries of abuse. Mighty temples and palaces at places like Palenque, Tikal, and Chichen Itza survived centuries of abandonment, followed by excavation and now thousands of tourists walking and climbing all over them. Before they were protected, many ruin sites were scavenged by locals looking for stones for their homes, churches or businesses. That the Maya structures have survived so well is a testament to the skill of their builders. The Maya temples and palaces that have withstood the test of time often contain stone carvings depicting battles, wars, kings, dynastic successions and more. The Maya were literate and had a written language and books, of which only a few survive. The carved glyphs on temples and palaces are therefore important because there is so little remaining of the original Maya culture. Source McKillop, Heather. The Ancient Maya: New Perspectives. New York: Norton, 2004.

Monday, October 21, 2019

American Dream essays

American Dream essays What exactly is the American dream? Most people have never really thought about this before even though deep down inside they have an idea of what their personal dream is. Ever since the first settlers arrived in Jamestown to set up a new colony in this vast new world, it stood as a place of freedom that was not available anywhere else in the world. People flocked here in search of a new, better life. Over the course of history, however, this dream has changed in many ways. Through interviewing people from different generations, this change in the American dream becomes evident. Helen was born in 1922 into a poor family that lived on a farm. She was put to work on the farm during her early childhood. When I was growing up, children were expected to do their share of the work. I worked some days from sunrise to sunset with my father on the farm along with my brothers and sisters (Bell). Though she had wanted to graduate, Helen only went to school through the eighth grade before she had to drop out in order to help her sick sister. She had dreams of growing up and becoming a music teacher, however she ended up working in a pants plant for 45 years of her adult life. According to her, the perfect life consisted of being ...a good, godly woman with a loving husband and a roof over our heads (Bell). To her, money was not as important as it is to many people in todays society. She found contentment in other things besides wealth, as she lived a happy life with her caring husband and, eventually, became the mother of a family of eight kids. Eddie was born in 1948. With the exception of not having a father, he had a fairly normal childhood until the age of 14 when he moved out to live on his own. Growing up, I always thought of the perfect life as having a loving family, lots of money, a nice house, and a nice car (Edwards, E). He stayed in school and eventually ...

Sunday, October 20, 2019

An Analysis Of Criminal Justice And Policing Policy †Free Samples

The world has been witnessing rising calls for criminal justice reforms in the recent days owing to the extraordinarily huge levels of incarceration witnessed across the world. While the policy (criminal justice and policing policy) has been applied in addressing different types of criminal justice issues, this paper intends to focus on the application of criminal justice and policing policy in the control of drugs and gambling. The two vices have had negative consequences to the society and up today it seems there are not established policies to deal with them effectively. In the discussion, the paper will explore the right criminal justices approaches as well the policing policies that can be adopted to the end the menace contributed by the two anti-social aspects. Wayne (2013, p. 203) wonders why policymakers and regulatory authorities define some activities and human behaviors as being criminal, thus subjecting them to legal sanctions while exempting other similar forms of activities and human behaviors from the definition of a crime. In a seemingly quick response, Baradar and Frank (2012, p. 539) offer an answer by stating that what makes an activity or human behavior constitute a criminal activity is the nature of harm that such an activity or human behavior causes. At this point, the reason for a pause is, is gambling a criminal activity? What harm does it cause? Obviously, there are quite a number of harms in the public domain that can be either directly or indirectly associated with the gambling activity. While gambling is an addiction and not necessarily a crime, it is its association with the elevated rates of the crime of illicit drugs that makes it hard to separate the two. In fact, it is gambling that supersedes illicit drug dealing in most of the cases (Reiner, 2012, p. 117). Most gamblers start as law-abiding citizens for the first few years (or months), but upon the exhaustion of their resources, at a time in which they have generated into problem gamblers, they turn to the crime of drugs. A study conducted by Naughton (2011, p. 43) concluded that income-generating criminal activities were statistically related to the pathological gambling witnessed in the world, with drug ranking the highest. In this study, the researchers compared the different convictions of crimes in the United Kingdom with a relatively corresponding pattern of a random sample drawn from gamblers across the United Kingdom.   Besides, another study conducted in Vietnam prisons among 35 women also proved a strong relation between gambling as a social problem in the casinos in Melbourne and the illicit drugs in the area. However, Beck (2015, p. 196) argues that a clear role that gambling plays in contributing to the sale and use of drugs may only be brought out in the light of the knowledge of the other kinds of addictions (noting that gambling is an addiction) and their associated patterns of crimes. Based, on the two researches, this paper attests that gambling causes harm to the society. The author, Carol (2012, p. 124), notes that drug and gambling have been described to constitute the problem of ‘law and order.' But one wonders what the description of ‘the problem of law and order' really means. Different authorities, scholars, and analysts offer differing explanations on the roots of drugs and gambling as a social problem and Bushway, and Emily (2013, p. 318) attributes the difference in the explanations to the fact that all problems rest on theories. As such, it depends on the approach that one uses to describe or analyze the social problem. For instance, economists base their argument on the rationality and self-interest of the crime where they argue that such an individual will cease pursuing crime should the cost of the crime surpass the benefit. On the other hand, sociologists argue that the social environment in which the individuals who turn out to be the victims operates places them in an arguably structurally strained and disorganized setting; which pressures them to pursue the criminal activity. Policy analysts, in high contrast to the two explanations above, advocate that the inequity in the construction and application of laws brew the criminals. Despite all these explanations, there arise situations in which no specific explanation fits in describing the situation. For instance, a closer analysis of gambling shows that individuals who generate ‘clean wealth’ through legally recognized methods serve as gambling greatest victims. Do they turn to the drug after exhausting their resources? Some don’t (Beckett and Alexes, 2011, p. 512).   A more challenging situation arises due to the fact that, owing to the difference in the theoretical approaches to drug and crime as a social problem, there exist key areas of departure in the policy recommendations that each approach generates. Going by the description above; economists advocate for a punitive and a deterring remedy while sociologists favor the expansion of the legitimate opportunities in the economy and equity to solve the problem. In contrast, political analysts encourage a societal reorganization such that wealth is equitably distributed and justice system moves from responding to class power to limiting harm (Braga et al., 2014, p.   650). All the policy recommendations are not, however, with key limitations due to the assumptions that each approach considers. The drug crime and gambling as a social problem being as a result of the inequity in the society is mistaken when considering the fact that wealthy individuals do gamble. The key question at this point would be what the best policy approach to drug and gambling is a social problem? Dansky (2016, p. 64) argues that a suitable approach should act as a double-edged sword; one side aimed at punishment and deterrence and the other aimed at rehabilitation and reintegration. No single side of the ‘sword' would prove effective as it has been witnessed by the two different media publication with one advocating for the use of prisons to deter/stop crime and the other arguing that tough crime laws and punishment serve to fail (Boylan and Naci, 2013, p. 579). With each article basing their argument on well-reasoned arguments, it becomes hard to choose the suitable approach hence the need to blend the two given the fact that a punitive approach through prisons ‘brews more crime' and a rehabilitative approach reduces deterrence. Although gambling has been associated with several social-related problems, the crime of illicit drugs serves as the most prominent. Besides, while no policy approach to a social problem serves as a ‘ready-to-drink solution’ it’s inarguably true that the policy intervention that would go the greatest deal to solving the dilemma would be the most suitable. This calls for the intervention of the criminal justice system and society at large to establish policies that are capable controlling and precenting the gambling activities. Bacchi, Carol. 2014. Analysing Policy. What’s the problem represented to be? Pearson Australia Baradaran, Shima and Frank, McIntyre. 2012. â€Å"Predicting Violence.† Texas Law Review 90 (1): 497-570. Beck, Allen. 2015. â€Å"Use of Restrictive Housing in U.S. Prisons and Jails, 2011-12.† U.S. Department of Justice, Bureau of Justice Statistics. Beckett, Katherine and Alexes, Harris. 2011. â€Å"On cash and conviction: Monetary sanctions as misguided policy.† Criminology & Public Policy 10(3): 509-537. Boylan, Richard T., and Naci Mocan. 2013. "Intended and Unintended Consequences of Prison Reform." The Journal of Law and Economics 30(3): 558-586. Braga, Anthony, Andrew Papachristos and David Hureau. 2014. â€Å"The Effects of Hot Spots Policing on Crime: An Updated Systematic Review and Meta-Analysis.† Justice Quarterly 31(4): 633-663. Bushway, Shawn D., and Emily G. Owens. 2013. "Framing Punishment: Incarceration, Recommended Sentences, and Recidivism." Journal of Law & Economics 56(2): 301-331. Dansky, Kara. 2016. â€Å"Local Democratic Oversight of Police Militarization.† Harvard Law Review 10: 59-75. Naughton, M., 2011. ‘How the Presumption of Innocence Renders the Innocent Vulnerable to Wrongful Convictions‘Irish Journal of Legal Studies, 2(1): 40-54. Reiner, Morgan. (eds), 2012. The Oxford Handbook of Criminology (5th Edition) Oxford: Clarendon Press. Wayne Morrison, in Hale, C., et al., (eds), 2013. ‘What is Crime? Contrasting definitions and Perspectives’, Criminology, Oxford: OUP.

Friday, October 18, 2019

The Difference between two Socialism Countries China and North Korea Essay

The Difference between two Socialism Countries China and North Korea - Essay Example This is different from the capitalist system of economy where goods and services are manufactured to generate profit and accumulation of profit, rather than based on their value and usage. They both advocate that the means of production be owned by people, either through government agencies or directly. Socialism also believes that income and wealth should be equally shared among the people. A socialist economy provides collective ownership, either through worker cooperative or through a state-controlled agency or might be owned by the society as a whole. It discourages private ownership. Goods and services are manufactured for their usefulness with the objective of eliminating the need for a demand based market for goods to be sold at a profit (Lee, Hy-Sang, et al. pg 77). The significant part of the Chinese economy is still government controlled, however, the number of government programs have reduced significantly. For example, universal health care is being discontinued. Foreign policy of China continues to be pro-socialist, but essentially, it has become a free market economy. In essence, it no longer remains an economy that is pure socialist. North Korea is the world’s most totalitarian state and it is a prominent socialist t economy. Just like Cuba, North Korea has an economy that is almost entirely controlled by the state. In North Korea there is no stock exchange either. Around mid-1975, North Korea was more productive and better educated than China (going by international trade per capita). However, the country has unpleasant misfortune of being the only developed and educated society in history of man to have faced mass famine – and at the time of peace at that. Interestingly, North Korea’s problem of has not been resolved. If the socialism economy that is tightly controlled in the country could have been a success, the country would probably not have worsened to this level. Mao had declared in October 1949, the People’s

Minnesota Multiphasic Personality Inventory - MMPI Essay

Minnesota Multiphasic Personality Inventory - MMPI - Essay Example The MMPI has assessed in a variety of areas, such as: Criminal justice and corrections; evaluation of disorders; screen candidates for high safety positions; assess medical patients; evaluate participants in substance abuse programs; support college students and counseling; marriage and family counseling; and, screen international adoption parent. The MMPI is not sold and has been replaced by the MMPI-2 (Wikipedia, 2007). Scale 2 Depression, it identifies poor morale, the lack of hope in the future, and general dissatisfaction with ones own life. The high scores are identified as clinical depression and the low scores as unhappiness with life. Scale 5 Masculinity-Femininity was originally used to detect homosexuals but was not accurate. It is used to measure traditional masculine or feminine roles prior to 1960 and it is related to intelligence, education, and socioeconomic status. Scales 8 Schizophrenia assesses bizarre thought processes and peculiar perceptions, social alienation, poor familial relationships, difficulties in concentration and impulse control, lack of deep interests, disturbing questions of self-worth, and sexual difficulties. Hunt (2000) wanted to test that low iron status or other nutritional deficiencies are associated with symptoms of depression in premenopausal women of child bearing age. The author associated the blood indices of iron status to scores on the MMPI and responses to a mood adjective checklist. This took place during the women ´s menstrual cycle. There were 365 women who seemed healthy participants from Grand Forks, North Dakota. They found that the frequency of the elevated MMPI Depression scores did not relate to the frequency of low hemoglobin, transferrin saturation, or ferritin. The results did not support the hypothesis of low iron status contributing to symptoms of depression in women. According to Butcher et al. (ND) both the MMPI and

American prison system Essay Example | Topics and Well Written Essays - 1000 words

American prison system - Essay Example The American colonies had similar correctional system, largely, with the exception of colonial administrators using more corporal punishment in America, than followed by their counter parts in the motherland. This resulted in more death penalties, during that period. However, William Penn had a different viewpoint, as he adopted â€Å"The Great Law† in Pennsylvania in 1682, which restricted the use of torture as a punishment method, while it allowed felons paying for restitution of property to their victims. While Walnut Street prison became the first penitentiary, Pennsylvania passed legislation, in 1776, which made way for reforming and rehabilitation of offenders, instead of using torture or execution. However, reformist methods like silence and labor could not help much, as prison authorities were forced to accommodate more than one prisoner in a cell, necessitated by the overcrowding of prisons. The same reason kept many prisoners without work in jails.(Criminal Justice i n Action: The Core, Prisons and Jails, pp313) Great Penitentiary Rivalry After gaining from the experience of Pennsylvania prison system, many American states tried to implement the concept of silence and labor, while interpreting the same in their own peculiar ways. In the process, the Pennsylvania Penitentiary and New York prison systems engaged in some sort of debate, over the correct and result-oriented method of prison administration. This gave birth to two known separate systems. The Pennsylvania Penitentiary system was entirely based on the â€Å"separate confinement† concept, as the prison had cells for inmates, built in such a manner that no prisoner could come under the influence of other inmate, during the confinement. While the New York system followed the Pennsylvania model of separate confinement, the authorities witnessed rise in sickness, insanity and suicide among inmates. Therefore the system was abandoned in 1822, as Elam Lynds adopted the â€Å"congregate system†, during his tenure as warden at Auburn. (Criminal Justice in Action: The Core, Prisons and Jails, pp314-5) Rivalry has influenced American thinking about prison system As America saw progressive movement in criminal justice, it started from the adoption of the â€Å"new penology†. This concept was put into practice at New York’s Elmira State Prison, in 1876, which introduced three-grade system for punishment, as well as, rewarding inmates displaying food behavior with early release. The theories adopted by Elmira model were incorporated during first few decades of twentieth century. Working on more reforms, progressive elements in the correctional system operations adopted â€Å"medical model† for prisoners, which made way for offering medical therapies to inmates for correcting their â€Å"ills†. However, most of the prison administrators did not agree to this level of rehabilitation in their systems. Further, many tough measures, for deal ing with incurable criminals, were incorporated; as criminologists and politicians tried to counter the menace of sharp rise in crime, during 1970s. Accordingly, four types of prisons were formulated; depending on the required security level, starting from minimum security to super-maximum security. (Criminal Justice in Action: The Core, Prisons and Jails, reassertion of punishment, pp313 & 331) Comparison between publicly funded and privately funded prisons Privatization, as applicable to goods and service sector may not be completely compatible to the prison system, any where in the world. However, for discussions on privatization, the prison system can come under the purview of

Thursday, October 17, 2019

Project paper Research Example | Topics and Well Written Essays - 1750 words

Project - Research Paper Example External requirements for funding persist to cause susceptibility of the financial system. Self-confidence in the financial system amongst overseas stakeholders remains huge, which implies a BOP deficit is improbable. Payment threats among the banking industry are anticipated to become unimportant, while financial support problems as well as exchange exposure is preventing Turkish companies’ creditworthiness (Duman, 2011). This paper is going to do a risk assessment of Turkey, carry out a budget analysis and finally draw a proposal that will be submitted to the  state executives of the host nation. The political climates of Turkey have in history been a cause of fiscal and social nervousness in the state. Armed forces coups with feeble coalition regimes have added to reckless financial guiding principles which have resulted in great inflation along with sharp rise and falls between recoveries and recessions in the financial structure (Duman, 2011). The voting during 2002 was a defining moment with the success of the fair Islamic people and publicly conventional AK lobby group. Electoral achievement offered the State an authorization to execute numerous essential political as well as financial restructurings that have brought the nation near to the European Union. Temporarily, Turkish nation plays a gradually more distinct political function in the Asia continent as well as N. Africa (Duman, 2011). There has been tension involving the AK group as well as secular in addition to armed forces divisions since the ballot vote of 2002. Numerous contentious trials in opposition to the armed forces, company executives, reporters and inhabitants signify divisions inside Turkish culture and have resulted in the sovereignty of the lawful structure into question. In the side of Turkeys history, better resident control against the forces is intensifying the state’s political

The Role of the Deity in the Hebrew Bible or the development of Satan Essay

The Role of the Deity in the Hebrew Bible or the development of Satan in the Hebrew Bible - Essay Example This is far from the beastly and prophetic visions of Satan that come later in the additional Christian texts, for example in Revelations, in which Satan is effectively demonized or polarized, to represent the extreme side of evil, versus the extreme side of good. Satan in the Old Testament is more simple and straightforward, and also has a more direct relationship with God. There are cues about Satan in Genesis and other Old Testament books. â€Å"In Genesis, God not only promises consequences for disobedience but that a battle will be fought-at great cost to God-to set all free from the destructive power of evil and human sin† (Weissenmuler, 2002). However, in terms of explicit mention of Satan by name, to represent an alternate side of God, the book of Job is the book of focus. In the Old Testament or Hebrew Bible, there is not really much explicit mention of Satan before the book of Job. As mentioned above, of course, in Genesis, there is the portrayal of evil, and the representation of evil through the snake which tempts Eve with the apple, but even here the snake is not explicitly identified as Satan. It is a more symbolic meaning. And, although there are occasional uses of â€Å"satan† as a verb or noun to mean terrorize or enemy, respectively in the Old Testament before the book of Job, Job is the first book in which the reader is introduced to Satan as a personage with a direct relationship to God. The reader sees that Job is a man who â€Å"feared God, and eschewed evil† (KJV,Job,1,1), who has been given a bountiful and prosperous life by his God. Satan is introduced early in the book through a series of tests by which God is to measure Job’s faith by taking away the abundance that he has given him; Satan acts as an agent of God in carrying out the disruption of Job’s plenty and the corruption of his body. In this way, the reader can see that, rightfully so in a book

Wednesday, October 16, 2019

Adebat about can any one be an entrepreneur including with the Essay

Adebat about can any one be an entrepreneur including with the strength about it and proving them also weaknesses and prove it - Essay Example 3) The acceptance of failure or risk. From the economist’s point of view, an entrepreneur is an individual who brings together labor, resources, materials and other valuable assets into a combined form that brings out a value that is greater than before. An entrepreneur can also be defined as person who introduces innovations, changes, and some form of new order. The psychologist says that such individuals are driven certain internal forces of the urge to attain or obtain something, to accomplish, to experiment, or just to escape the authority of other individuals. To a business person, an entrepreneur will be treated as a threat or an aggressive competitor. Again to the same business person, an entrepreneur can be a benefiting factor as one can become a business ally, customer, supplier or creator of wealth to others. An entrepreneur can also be seen as a person who is finding better ways to reduce waste, utilize resources or produce jobs to those who are jobless. Entrepreneurship is also seen as a dynamical process of producing an increment of wealth (Casson, 2008). This wealth is frequently created by the people who take an assumption to some significant risks in terms of time, equity. However, these definitions will tend to view the entrepreneur from different perspectives, but they have similar notions about organizing, newness, wealth, creating, novelty and the risk taking. Each definition is sometimes restrictive because entrepreneurs are found in all professions such as education, law, research, engineering, social work, medicine, distribution and government. Entrepreneurship is a means of creating new things with some added value by devoting the required effort and resources. At the same time assuming psychic, social risks, financial and acceptance of the results of the monetary rewards and the personal independence and satisfaction. The definition of the entrepreneur stresses four

The Role of the Deity in the Hebrew Bible or the development of Satan Essay

The Role of the Deity in the Hebrew Bible or the development of Satan in the Hebrew Bible - Essay Example This is far from the beastly and prophetic visions of Satan that come later in the additional Christian texts, for example in Revelations, in which Satan is effectively demonized or polarized, to represent the extreme side of evil, versus the extreme side of good. Satan in the Old Testament is more simple and straightforward, and also has a more direct relationship with God. There are cues about Satan in Genesis and other Old Testament books. â€Å"In Genesis, God not only promises consequences for disobedience but that a battle will be fought-at great cost to God-to set all free from the destructive power of evil and human sin† (Weissenmuler, 2002). However, in terms of explicit mention of Satan by name, to represent an alternate side of God, the book of Job is the book of focus. In the Old Testament or Hebrew Bible, there is not really much explicit mention of Satan before the book of Job. As mentioned above, of course, in Genesis, there is the portrayal of evil, and the representation of evil through the snake which tempts Eve with the apple, but even here the snake is not explicitly identified as Satan. It is a more symbolic meaning. And, although there are occasional uses of â€Å"satan† as a verb or noun to mean terrorize or enemy, respectively in the Old Testament before the book of Job, Job is the first book in which the reader is introduced to Satan as a personage with a direct relationship to God. The reader sees that Job is a man who â€Å"feared God, and eschewed evil† (KJV,Job,1,1), who has been given a bountiful and prosperous life by his God. Satan is introduced early in the book through a series of tests by which God is to measure Job’s faith by taking away the abundance that he has given him; Satan acts as an agent of God in carrying out the disruption of Job’s plenty and the corruption of his body. In this way, the reader can see that, rightfully so in a book

Tuesday, October 15, 2019

Cia Research Paper Essay Example for Free

Cia Research Paper Essay Account of the work of the CIA, discussing in some detail the nature of the relationship between the intelligence-gatherer and the policy-maker. Since the 1970s the CIA has provided intelligence to Congress as well as to the executive, so that it now finds itself in a remarkable position, involuntarily poised nearly equidistant between them. It has not however abused this freedom of action, probably unique among world intelligence agencies, so as to cook intelligence. CIA deputy director. Robert M. Gates, a career intelligence officer, is Deputy Director of Central Intelligence. He served on the National Security Council staff from the spring of 1974 until December 1979. Tweet Close Style: MLA APA Chicago More Sharing Services Over the years, public views of the Central Intelligence Agency and its role in American foreign policy have been shaped primarily by movies, television, novels, newspapers, books by journalists, headlines growing out of congressional inquiries, exposes by former intelligence officers, and essays by experts who either have never served in American intelligence, or have served and still not understood its role. The CIA is said to be an invisible government, yet it is the most visible, most externally scrutinized and most publicized intelligence service in the world. While the CIA sometimes is able to refute publicly allegations and criticism, usually it must remain silent. The result is a contradictory melange of images of the CIA and very little understanding of its real role in American government. Because of a general lack of understanding of the CIA’s role, a significant controversy such as the Iran-contra affair periodically brings to the surface broad questions of the proper relationship between the intelligence service and policymakers. It raises questions of whether the CIA slants or cooks its intelligence analysis to support covert actions or policy, and of the degree to which policymakers (or their staffs) selectively use—and abuse—intelligence to persuade superiors, Congress or the public. Beyond this, recent developments, such as the massive daily flow of intelligence information to Congress, have complicated the CIA’s relationships with the rest of the executive branch in ways not at all understood by most observers—including those most directly involved. These questions and issues merit scrutiny. II The CIA’s role in the foreign policy process is threefold. First, the CIA is responsible for the collection and analysis of intelligence and its distribution to policymakers—principally to the president, the National Security Council (NSC) and the Departments of State and Defense; although in recent years many other departments and agencies have become major users of intelligence as well. This is a well-known area, and I will address it only summarily About CIA The Central Intelligence Agency was created in 1947 with the signing of the National Security Act by President Harry S. Truman. The act also created a Director of Central Intelligence (DCI) to serve as head of the United States intelligence community; act as the principal adviser to the President for intelligence matters related to the national security; and serve as head of the Central Intelligence Agency. The Intelligence Reform and Terrorism Prevention Act of 2004 amended the National Security Act to provide for a Director of National Intelligence who would assume some of the roles formerly fulfilled by the DCI, with a separate Director of the Central Intelligence Agency. The Director of the Central Intelligence Agency serves as the head of the Central Intelligence Agency and reports to the Director of National Intelligence. The CIA directors responsibilities include: †¢Collecting intelligence through human sources and by other appropriate means, except that he shall have no police, subpoena, or law enforcement powers or internal security functions; †¢Correlating and evaluating ntelligence related to the national security and providing appropriate dissemination of such intelligence; Providing overall direction for and coordination of the collection of national intelligence outside the United States through human sources by elements of the Intelligence Community authorized to undertake such collection and, in coordination with other departments, agencies, or elements of the United States Government which are authorized to undertake such collection, ensuring that the most effective use is made of resources and that appropriate account is taken of the risks to the United States and those involved in such collection; and †¢Performing such other functions and duties related to intelligence affecting the national security as the President or the Director of National Intelligence may direct. The function of the Central Intelligence Agency is to assist the Director of the Central Intelligence Agency in carrying out the responsibilities outlined above. To accomplish its mission, the CIA engages in research, development, and deployment of high-leverage technology for intelligence purposes. As a separate agency, CIA serves as an independent source of analysis on topics of concern and also works closely with the other organizations in the Intelligence Community to ensure that the intelligence consumer—whether Washington policymaker or battlefield commander—receives the best intelligence possible. As changing global realities have reordered the national security agenda, CIA has met these challenges by: †¢Creating special, multidisciplinary centers to address such high-priority issues such as nonproliferation, counterterrorism, counterintelligence, international organized crime and narcotics trafficking, environment, and arms control intelligence. †¢Forging stronger partnerships between the several intelligence collection disciplines and all-source analysis. †¢Taking an active part in Intelligence Community analytical efforts and producing all-source analysis on the full range of topics that affect national security. †¢Contributing to the effectiveness of the overall Intelligence Community by managing services of common concern in imagery nalysis and open-source collection and participating in partnerships with other intelligence agencies in the areas of research and development and technical collection. By emphasizing adaptability in its approach to intelli gence collection, the CIA can tailor its support to key intelligence consumers and help them meet their needs as they face the issues of the post-Cold War World. Posted: Dec 19, 2006 02:07 PM Last Updated: Jan 10, 2013 08:09 AM Last Reviewed: Dec 30, 2011 12:36 PM History of the CIA The United States has carried out intelligence activities since the days of George Washington, but only since World War II have they been coordinated on a government-wide basis. President Franklin D. Roosevelt appointed New York lawyer and war hero, William J. Donovan, to become first the Coordinator of Information, and then, after the US entered World War II, head of the Office of Strategic Services (OSS) in 1942. The OSS – the forerunner to the CIA – had a mandate to collect and analyze strategic information. After World War II, however, the OSS was abolished along with many other war agencies and its functions were transferred to the State and War Departments. It did not take long before President Truman recognized the need for a postwar, centralized intelligence organization. To make a fully functional intelligence office, Truman signed the National Security Act of 1947 establishing the CIA. The National Security Act charged the CIA with coordinating the nation’s intelligence activities and correlating, evaluating and disseminating intelligence affecting national security. On December 17, 2004, President George W. Bush signed the Intelligence Reform and Terrorism Prevention Act which restructured the Intelligence Community by abolishing the position of Director of Central Intelligence (DCI) and Deputy Director of Central Intelligence (DDCI) and creating the position the Director of the Central Intelligence Agency (D/CIA).

Monday, October 14, 2019

A Strategic Analysis Of Tesco

A Strategic Analysis Of Tesco This report is set out in order to evaluate the marketing strategy adopted by Tesco along with how they gain a competitive position internationally through globalisation. Under the findings of this report the approach which will be evaluated will be related to Porters competitive positioning. This will be used to show how Tesco gain a competitive advantage over their rivals such as Asda using the generic strategy. The five force framework will also be investigated to anaylse the competition it faces and finally how Tesco segments there market, identifying the gaps available to develop. In order to write this report a collection of different sources were used. These sources included books, journal articles, media articles, websites, Tescos annual reports and information from Tescos website. The information gained from these sources helped to discover how Tesco manages to gain the competitive advantage in their industry. It has also helped to focus the importance of successful competitive positioning with models from Porter to establish the position in the minds of the consumer. 1.0 Introduction This report includes a theoretical model which will reflect the practice of Tesco in relation to strategic analysis. It will look at the competitive positioning approach and the models/concepts used by Porter to gain a competitive advantage over Tescos rivals. By doing this it will show what other companies in the industry would need to do in order to take over the competitive advantage that Tesco have. Strategy is based on the long term of a business and is the direction and scope of the organisation. It aims to achieve advantage in a changing environment through its configuration of resources and competences (Johnson et al, 2008). There are generally three different levels of strategies associated with organisations. The top level is known as the corporate level strategy which is alarmed with the overall purpose and extent of the organisation. The second is the business level strategy which looks at particular markets and how to compete successfully in them and the third level is the operational strategies which look at how the organisation delivers successfully (Johnson et al, 2008). 2.0 Findings 2.1 History of Tesco Tesco began when Jack Cohen first opened a market stall in the East end of London in 1919 and since then began trading in 1924. This shows that Tesco has been serving customers in the UK for the best part of a century. Today, they class themselves as much more of a weekly shop as they have introduced new services, products and ways to shop all driven by their Every Little Helps philosophy (Tesco, 2008). In the last decade Tesco has grown their business to become the worlds third largest grocery retailer by determining an excellent level of service wherever they operate. They have a strategy for growth which is based in five parts. These include core UK business, non food, international, retail services and the community (Tesco, 2008). Tescos market share is still growing just short of 7% although that is not as fast as it was. This is because at present the economy is in a recession and so customers are changing their habits (Leahy, 2008). According to the Institute of Grocery Distribution (IGD), the UK food industry group predicts that Tesco will grow at a faster rate than Carrefour in the coming four years. Tescos growth will be spurred by international expansion in markets such as China, the US and India (Hall, 2008). This means that Tesco who are currently the UKs biggest retailer will leapfrog Carrefour by 2012 to become the second largest retailer in the world after Wal ­Mart (Hall, 2008). Within the UK, Tesco employ over 280,000 employees and have over 2,100 stores. Tesco stores have four different formats (See Appendix 1). These are the express stores which sell a range of up to 7000 products with the first express store opening in 1994. The metro store first opened in 1992 bringing the convenience of Tesco to town and city centre locations. The Tesco superstores began in 1970s and in recent years these stores have been introduced to a number of new non ­food ranges such as DVDs and books. Finally the Extra stores have been operating from 1997 and offer the widest range of food and non ­food lines. These products range from electrical equipment to homewares, clothing, health and beauty and seasonal items such as garden furniture. Along with food and non ­food products in different stores, Tesco also offers retailing services (See appendix 2). Tesco Personal Finance (TPF) has the choice of 26 products within their successful market. These range from their savings accounts and credit cards to car and travel insurances. Tescos strategy for growth (see appendix 3) has been well established and consistent which has allowed them to expand into new markets. The rationale for the strategy is to broaden the scope of the business to enable it to deliver strong sustainable long term growth (Tesco Strategy, 2008). 2.2 Competitive Positioning Competitive positioning emphasizes the importance of the environment and provides useful tools for analysing the business in the context of its industry (Campbell et al, 2002 p.298) Competitive positioning is the degree of difference in choice of product or service against the competitor (Lynch, 2003). The competitive positioning approach used by Porter, argues that the position of an organisation is successful if it places itself towards the environment (Campbell, 2002). Positioning within any organisation is achieved through the minds of the consumer and this is what enables businesses to gain a competitive advantage over their rivals (Darling, 2001). A strategic fit is used between an organisation and the environment which again is a way to gain competitive advantage. This is based on Porters Generic Strategy Framework (See appendix 4) (Campbell et al, 2002). 2.3 Identification and application of the models, concepts and theories used in competitive positioning within Tesco 2.3.1 Porters Five Forces The five forces framework (see appendix 5) was developed by Porter and is used in most industries to analyse competition, as it is of value to most organisations providing a useful starting point for strategic analysis (Campbell et al, 2002). Porter suggests that it is the structural characteristics of an industry (the five forces) that determine the relative success or failure of a firm (Jenkins Ambrosini, 2002 p.124). The five forces framework is complex in that different industries could be emerging, maturing or declining and Porter is able to recognise that his competitive strategies would need to vary accordingly (Jenkins Ambrosini, 2002). He believes that competition in an industry is rooted in its underlying economic structure (Jenkins Ambrosini, 2002 p. 29). Johnson et al, 2008 define the five forces as:â‚ ¬Ã‚    ·Ã¢â€š ¬Ã‚   The threat of entry into an industryâ‚ ¬Ã‚    ·Ã¢â€š ¬Ã‚   The threat of substitutes in the industrys products or servicesâ‚ ¬Ã‚    ·Ã¢â€š ¬Ã‚   The power of buyers of the industrys products or servicesâ‚ ¬Ã‚    ·Ã¢â€š ¬Ã‚   The power of suppliers into the industryâ‚ ¬Ã‚    ·Ã¢â€š ¬Ã‚   The extent of rivalry between competitors in the industry For more information on the five forces see table one. A criticism of the five force framework is that Porter implies all competitors within an industry are equal. However, this is not always true as it could be the size of the industry which is causing the threat. Also the macro ­ environment must be regularly reviewed due to the continuous movement as the five forces cannot be applied in isolation (Campbell et al, 2002). 2.3.2 Application of Porters Five Force Framework in Tesco Porters five force framework is used within Tesco in order to examine the external factors impacting upon their company. In relation to the threat of entry into an industry, Tesco along with rivals such as Asda, Sainsburys and other supermarkets put up extensive barriers to entry within their industry (Research Papers, 2007). An example of what Tesco accomplish within the market of certain products means that a new supermarket would not be able to find a cheap, reliable supplier. This would mean that Tesco has the advantage of buying in bulk giving them economies of scale (321 Books, 2007). The power of the buyer in Tesco can force down the price of products, as if buyers want products they know they can get cheaper in another supermarket it is more than likely that the buyer will move to the other supermarket. This means that supermarkets have a disciplined approach to setting the price of their products. Supermarkets destroying each other over profits are prevented due to the discipline used within Tesco (Research Papers, 2007). Tesco uses the power of the supplier to their own advantage. However, the price of products are demanded by the supplier otherwise the retailer will not be delivered the goods to sell (Research Papers, 2007). This would create poor customer service and a bad relationship with the suppliers. With Tesco being a larger supermarket, it has an advantage over smaller shopkeepers as they can dictate the price they are prepared to pay the supplier, as if they do not agree to this they will lose business in the long run (321 Books, 2007). Tesco has a very high competitive rivalry in food retail with competitors such as Asda, Sainsburys, Morrisons and Waitrose. All these competitors compete on price, products and promotions periodically (321 Books, 2007). The five force analysis is also complemented with another technique know as a SWOT analysis which is used to create synergy. A SWOT analysis of Tesco can be found in appendix 6. In order to gain new sales opportunities the major retailers in the UK such as Tesco must expand their product categories which is causing intense rivalry between the UK supermarkets (Hackney Birtwistle, 2006). There is also rivalry with competitors over the operation of online facilities, although Tesco has been proven to be the most successful in implementing their strategy. Due to this it means Tesco can sustain a competitive advantage. Sustaining a competitive advantage can be gained in three different ways which is shown in appendix 7 (Hackney Birtwistle, 2006). 2.3.3 Porters Generic Strategy Porters generic strategy framework is used to gain a competitive advantage and is the oldest approach based on an outside ­in approach. It is known as this as it examines the environment and then decides how to achieve a strategically desirable position (Campbell et al, 2002). However due to the recession the economy is in at present, the question relating to Porters generic strategy is it possible that Tesco can afford to look into the environment? (McNeilly, 2008) Generic strategies are used to attain above average performances within an industry in order to gain a competitive advantage. The generic strategies contain cost leadership, differentiation, cost focus and differentiation focus and can be found in appendix 4 (De Wit Meyer, 2004). Porter has argued that businesses should not get stuck in the middle so must choose either a differentiation or cost leadership strategy (Campbell et al, 2002). Competitive advantage within the broad segments of an industry include the cost leadership and differentiation strategies whereas the narrow segments of an industry aim to gain a cost advantage and include cost focus and differentiation focus. However, different industries will vary widely meaning the generic strategies must relate to that particular industry (De Wit Meyer, 2004). The Tesco generic strategy which is used will have to be cost leadership unless they can successfully differentiate their line of clothing so that they can begin to charge a premium price (Johnson et al, 2007). A critique of Porters generic strategies by Bowman is that he believes competitive advantage should be more effective within an organisation than its competitors in order to provide customers with want they want or need. Due to this criticism Bowman developed the strategy clock (see appendix 8) (Johnson et al, 2008). Positioning and competitive advantage can be gained using the strategy clock as it makes managers aware of how changing requirements of their markets and choices can be made (Johnson et al, 2008). In relation to the strategy clock developed by Bowman, Tesco adopts the hybrid strategy as it accepts elements of both cost leadership and differentiation (Campbell et al, 2002). A hybrid strategy seeks simultaneously to achieve differentiation and a price lower than that of competitors (Johnson et al, 2008, p.230). However, it could be argued that the price of products used by Tesco should not need to be lowered if differentiation can be achieved. The reason behind this is, Tesco should be able to obtain their prices at least equal to competitors such as Asda and Morrisons if not higher due to them being market leader (Johnson et al, 2008) Johnson et al, 2008 believe that Hybrid strategies can be advantageous for a number of reasons as detailed below: v Tesco is achieving a high standard of market share in the UK. This is due to the grater volumes being achieved over their competitors, meaning their margins could still be superior due to the low ­cost base they have. v Hybrid strategies can be used as an entry strategy in the market where there are established competitors. Tesco adopts this strategy when developing their global strategy. It allows them to target competitors and enter the market in different geographical areas with superior products at low prices. This enables them to get established and gain customer loyalty. 2.4 Identification of market segmentation A market segment is a group of customers who have similar needs that are different from customer needs in other parts of the market (Johnson et al, 2008, p.77). The advantages of market segmentation are shown in appendix 9. Typical bases for segmentation of markets are: v Demographic variables which include difference of age, stages of the family life cycle, gender, income, occupation, education, race and religion. v Geographic variables such as difference by country, region, type of housing/neighbourhood v Psychographic variables which exploit the lifestyle, personality or intelligence differences between people v Behavioural variables such as attitudes to brand loyalty, frequency of use, consumption occasion (Campbell et al, 2002, p.95). Tesco appeal to all customers as the products they sell attracts customers from low incomes to those who are more affluent (McNeilly, 2008). Their product choice is increasing in diversity which ranges from healthy living products, free from products, special healthy kids snacks, organic products and fair ­trade products (Tesco, 2008). This means they segment successfully which is shown in their profits (McNeilly, 2008). For Tesco customer segmentation see appendix 10. Due to segmentation, Tesco have recently identified a few gaps in the market which has enabled them to react to these particular markets before competitors notice them. The first gap they identified was the music download service which will have a major impact on Apples position as it will allow people to legally purchase and download (Beaumont Warman, 2008). Tesco digital is there new venture and plans to play Apple at its own game (Beaumont Warman, 2008). Another area were Tesco has identified a gap in the market is with cheese. The Dairy Farmers of Britain (DFB) have added a range of four different cheeses to their portfolio which they have launched in 650 Tesco stores. These are known as the 1st grade range and include mild, mature, Ploughmans vintage and red Leicester. These cheeses are aimed at a gap in the market between everyday brands and niche offerings (The Grocer, 2008). 2.5 Globalisation According to Lasserre, 2007 Globalisation is the phenomenon of the transition of industries whose competitive structure changes progressively from multinational to global. Industries such as telecommunications, processed food, personal care and retail are in the process of globalisation. It is also associated with consistency of products and practices alongside a high level of co ­ordination and integration of activities in Tesco value chain (Lasserre, 2007). See appendix 11 for this. According to Inkpen Ramaswamy, 2006 p.14 global companies must understand customers from the perspective of both domestic and international standards and must have the ability to learn in multiple locations far from the home base. The models which will be analysed to explain the basis of global strategy are Porters global generic strategies, Yips driver framework and Porters Diamond theory. 2.5.1 Porters global generic strategy When looking at globalisation, Porter adapts his generic strategy framework to global conditions. This model suggests five strategy alternatives what a business can use when operating internationally as shown in appendix 12. These five alternatives are positioned either with the extent to which the business is globalised or by the scope of the competitors within the industry (Campbell et al, 2002). In relation to Porters global strategy he considers that competitive advantage results from the global scope of an organisations activities and the effectiveness with which it coordinates them (Campbell et al, 2002, p.268). He also argues that configuration of value ­adding activities and coordination of value ­adding activities is what global competitive advantage depends upon (Campbell et al, 2002). Tesco has demonstrated that their value ­adding activities of allowing customers to shop for all of their needs under the one roof, has enabled them to gain a global competitive advantage effectively. 2.5.2 Yips Globalisation driver framework Yips Globalisation driver framework develops the concept of total global strategy and is much more useful than Porters global generic strategy framework as it evaluates both the overall degree of globalisation within an industry along with demonstrating the features of an industry which are more or less global naturally (Campbell et al, 2002). Yip also believes that his framework helps identify areas of an industry which are global and aspects of the industry which differ locally. Managers of businesses which are global should create their global strategy on the basis of the analysis made for the globalisation drivers (Campbell et al, 2002). 2.5.3 Porters Diamond Theory Sustainable competitive advantage is needed in any business international strategy. When entering into a foreign market/country a business will be at a disadvantage so must have competitive advantages in order to overcome this issue (Johnson et al, 2008). This can be done as Tesco has been successful in many different markets such as Europe, Asia and the US. For a list of countries which Tesco operate in and the year they first opened in that particular country see Table 2. Porters Diamond theory explains how some businesses such as Tesco have a sustained competitive advantage in their industry when their competitors have not been as successful (Johnson et al, 2008) Tesco have more than ten years experience overseas due to their international strategy which contains six elements. These are to be flexible, act local, maintain focus, use multi ­ formats, develop capability and build brands. This is the reason behind how they are able to sustain a competitive advantage and are the third largest supermarket worldwide (Tesco, 2008). Appendix 14 shows the determinants of national advantages using Porters Diamond theory. 3.0 Conclusion Recommendations From the findings of this report, there is evidence to suggest that Porters strategies are relevant in todays grocery industry in relation to competitive positioning. These strategies which Porter uses relate to all types of industries and they help businesses to gain a competitive advantage as in the case of Tesco. By having these strategies in place it has allowed Tesco to gain this competitive advantage in the UK and overseas making them the third largest grocery retailer in the world. These strategies have been used successfully for over twenty years and will continue to be successful in the future. At present the economy is in a recession, meaning that people are spending less and changing their behaviour and habits when it comes to shopping. However, Tesco try to assure their customers that they are about value so there is no need for them to shop anywhere else. Growth is what Tesco believe in and even though the economy is in a recession they have planned and prepared long ­term to expand and invest in the UK and internationally which will create up to 30,000 jobs. In recent recessions Tesco continued to invest which they believe is one of the best things they have done and will continue to invest during this economic recession. Ref erence s Johnson et al (2008). Exploring Corporate Strategy, eight edition, Essex, Pearson Education Limited Tesco (2008). Tesco PLC [Internet] Available from: http://www.tescoplc.com/ Leahy, T. (2008). Tesco Interim Results, 2008 ­2009: Full Interview [Internet] Available from: http://www.tescoplc.com/plc/ir/pres_results/results/r2008/sirterry_interview090 8/ Hall, J (2008). Tesco to be world number two by 2012 [Internet] Available from: http://www.telegraph.co.uk/finance/newsbysector/epic/tsco/3691672/tesco ­to ­ be ­wor Campbell et al, (2002). Business Strategy: An introduction, Second Edition, Oxford, Elsevier Butterworth ­Heinemenn Lynch, R (2003). Corporate Strategy, third edition, Essex, Pearson Education Limited Darling, J. (2001). Successful competitive positioning: the key for entry into the European consumer market, European Business Review, 13, (4), pp.209 ­ 220 Jenkins Ambrosini (2002). Strategic Management: A multi ­perspective approach, Hampshire, Palgrave Research Papers (2007). Porters Five Forces on Tesco. [Internet] Available from: http://www.oppapers.com/essays/Porters ­5 ­Forces ­Tesco/108949 321 Books (2007). Porters Five Forces at Tesco PLC. [Internet] Available from: http://www.321books.co.uk/catalog/tesco/porters ­five ­forces.htm Hackney Birtwistle (2006). The UK grocery business: towards a sustainable model for virtual markets, International Journal of Retail Distribution Management, 34, (4/5), pp.354 ­368 McNeilly, A (2008). Globalisation and the multinational Lecture Notes [24.11.08] De Wit Meyer (2004). Strategy process, content, context, third edition, London, Thomson Beaumont Warman (2008). Can Tesco topple iTunes? [Internet] Available from: http://www.telegraph.co.uk/scienceandtechnology/3357071/can ­tesco ­ topple ­itunes The Grocer (2008). DFB 1st Grade targets gap in cheese market [Internet] Available from: http://www.thegrocer.co.uk/articles.aspx?page=articlesID=195740 Lassere, P (2007). Global Strategic Management, second edition, Hampshire, Palgrave Inkpen Ramaswamy (2006). Global Strategy, New York, Oxford University Press Inc Morris, T (2004). Tesco: a case study in supermarket excellence, New Zealand, Corolis Research Business Teacher (2008). Tesco Swot Analysis, [Internet] Available from: http://www.businessteacher.org.uk/business ­resources/swot ­analysis ­ database/tesco ­swot ­analysis/ Bib liog rap hic Ref erencing Beaumont Warman (2008). Can Tesco topple iTunes? [Internet] Available from: http://www.telegraph.co.uk/scienceandtechnology/3357071/can ­tesco ­ topple ­itunes Business Teacher (2008). Tesco Swot Analysis, [Internet] Available from: http://www.businessteacher.org.uk/business ­resources/swot ­analysis ­ database/tesco ­swot ­analysis/ Campbell et al, (2002). Business Strategy: An introduction, Second Edition, Oxford, Elsevier Butterworth ­Heinemenn Darling, J. (2001). Successful competitive positioning: the key for entry into the European consumer market, European Business Review, 13, (4), pp.209 ­ 220 De Wit Meyer (2004). Strategy process, content, context, third edition, London, Thomson Hackney Birtwistle (2006). The UK grocery business: towards a sustainable model for virtual markets, International Journal of Retail Distribution Management, 34, (4/5), pp.354 ­368 Hall, J (2008). Tesco to be world number two by 2012 [Internet] Available from: http://www.telegraph.co.uk/finance/newsbysector/epic/tsco/3691672/tesco ­to ­ be ­wor Inkpen Ramaswamy (2006). Global Strategy, New York, Oxford University Press Inc Jenkins Ambrosini (2002). Strategic Management: A multi ­perspective approach, Hampshire, Palgrave Johnson et al (2008). Exploring Corporate Strategy, eight edition, Essex, Pearson Education Limited Lassere, P (2007). Global Strategic Management, second edition, Hampshire, Palgrave Leahy, T. (2008). Tesco Interim Results, 2008 ­2009: Full Interview [Internet] Available from: http://www.tescoplc.com/plc/ir/pres_results/results/r2008/sirterry_interview090 8/ Lynch, R (2003). Corporate Strategy, third edition, Essex, Pearson Education Limited McNeilly, A (2008). Globalisation and the multinational Lecture Notes [24.11.08] Morris, T (2004). Tesco: a case study in supermarket excellence, New Zealand, Corolis Research Research Papers (2007). Porters Five Forces on Tesco. [Internet] Available from: http://www.oppapers.com/essays/Porters ­5 ­Forces ­Tesco/108949 Tesco (2008). Tesco PLC [Internet] Available from: http://www.tescoplc.com/ The Grocer (2008). DFB 1st Grade targets gap in cheese market [Internet] Available from: http://www.thegrocer.co.uk/articles.aspx?page=articlesID=195740 321 Books (2007). Porters Five Forces at Tesco PLC. [Internet] Available from: http://www.321books.co.uk/catalog/tesco/porters ­five ­forces.htm Appendix 4 Competitive Advantage Differentiation Broad Cost Leadership Differentiation Asda Waitrose Tesco Competitive Scope Sainsburys Cost Focus Differentiation Focus MS Delicatessens Narrow The Generic Strategy Framework. De Wit Meyer, 2004 p. 262 Appendix 5 The Five Forces Framework Potential entrants Suppliers Threat of entry Competitive Rivalry Bargaining Power Bargaining Power Buyers Threat of substitutes Substitutes Johnson et al, 2008 p.60 Appendix 6 SWOT analysis of Tesco Strengths: à ¢Ã¢â€š ¬Ã‚ ¢ Tesco within the global market place won retailer of the year award 2008. this can drive advantage towards future growth and sustainability à ¢Ã¢â€š ¬Ã‚ ¢ Although global retail sales are declining, Tesco Group have gained sales of 13% in the UK and 26% growth internationally à ¢Ã¢â€š ¬Ã‚ ¢ As Tesco look to expand they have reserved funds of credit available Weaknesses: à ¢Ã¢â€š ¬Ã‚ ¢ Reduced profit margins can be the case of Tescos position as a price leader in the UK à ¢Ã¢â€š ¬Ã‚ ¢ Tesco Finance profit levels were caused through bad debt, credit card arrears and household insurance claims. à ¢Ã¢â€š ¬Ã‚ ¢ Due to current economy at present, Tesco will suffer due to the cost of living and lower disposable income Opportunities: à ¢Ã¢â€š ¬Ã‚ ¢ Statistics show that economies of scale can be gained through buying power, which is why Tesco are the third largest global grocer à ¢Ã¢â€š ¬Ã‚ ¢ Due to the acquisition in Asia there is opportunity for further growth internationally à ¢Ã¢â€š ¬Ã‚ ¢ Further growth and development will be made with Technology Threats: à ¢Ã¢â€š ¬Ã‚ ¢ The credit crunch has affected the UK and American markets so Tesco will focus on lower priced products à ¢Ã¢â€š ¬Ã‚ ¢ Wal ­Mart who are world leaders put persistent threats of takeover on Tesco à ¢Ã¢â€š ¬Ã‚ ¢ Products areas may need to be evaluated due to changes in consumer buying à ¢Ã¢â€š ¬Ã‚ ¢ profit margins may be affected by the rise in raw materials Business Teacher (2008). Tesco Swot Analysis, [Internet] Available from: http://www.businessteacher.org.uk/business ­resources/swot ­analysis ­ database/tesco ­swot ­analysis/ Appendix 7 Sustaining competitive advantage Price ­Based strategies à ¢Ã¢â€š ¬Ã‚ ¢ Accept reduced margin à ¢Ã¢â€š ¬Ã‚ ¢ Win a price war à ¢Ã¢â€š ¬Ã‚ ¢ Reduce Costs à ¢Ã¢â€š ¬Ã‚ ¢ Focus on specific segments Differentiation à ¢Ã¢â€š ¬Ã‚ ¢ Create difficulties of imitation à ¢Ã¢â€š ¬Ã‚ ¢ Achieve imperfect mobility (of resources/competences) à ¢Ã¢â€š ¬Ã‚ ¢ Reinvest margin Sustaining Competitive Advantage Lock ­in à ¢Ã¢â€š ¬Ã‚ ¢ Achieve size/market dominance à ¢Ã¢â€š ¬Ã‚ ¢ First ­mover advantage à ¢Ã¢â€š ¬Ã‚ ¢ Reinforcement à ¢Ã¢â€š ¬Ã‚ ¢ Rigorous enforcement Johnson et al, 2008. p. 225 Appendix 8 The Strategy Clock: Competitive strategy options High Perceived product/service benefits Low Price 2. Hybrid 3. Differentiation 4. Focused Differentiation 5. 6. 1. No Frills 7. Strategies destined 8. for ultimate failure Low Low High Price Needs/risks 1. No frills Likely to be segment specific 2. Low Price Risk of price war and low margins; need to be cost leader 3. Hybrid Low cost base and reinvestment in low price and differentiation 4. Differentiation a) Without price premium Perceived added value by user, yielding market share benefits b) With price premium Perceive added value sufficient to bear price premium 5. Focused differentiation Perceived added value to a particular segment, warranting price premium 6. Increased price Higher margins if competitors do not follow; risk of losing market share 7. Increased price/ low value Only feasible in monopoly situation 8. Low value/ standard price Loss of market share Appendix 9 Target market selection Differentiation Market Segmentation Tailored marketing mix Opportunities and threats Jobber, 2004 p, 275 Appendix Firm Infrastructure Support Activities Human Resource M