Thursday, October 31, 2019

Article literature review Essay Example | Topics and Well Written Essays - 500 words

Article literature review - Essay Example To determine the degree of standardization of advertising practice in perfumes, apparel and cosmetics in five European countries, a research study, with the use of content analysis, was conducted by using several editions of Vogue magazine. Prior to the study, it has been recognized by Sommers and Kernan that standardization of advertisements is â€Å"possible when the product serves the same needs across culture such as beauty, love and fear† (Seitz & Johar, 1993). This is the reason why the products that will be included in the study are perfumes, cosmetics and apparel, which are all considered beauty products. The three brands of perfume covered by the study were Yves Saint Laurent â€Å"Y†, Paloma Picasso and Lancome Tresor. The apparels included were Guess, Chanel and Giorgio Armani. Helena Rubinstein, Guerlain and Lancome Definicils were the cosmetic brands included. The countries chosen for the study are Spain, Italy, France, Germany and UK because of its very di verse cultures. The different print advertisements of the said products were examined according to picture, size, color, general layout, caption and explanatory text (Seitz & Johar, 1993). The results of the study confirmed the hypothesis that perfume advertisements were more standardized than apparel or cosmetics (Seitz & Johar, 1993). Moreover, the study also corroborated that â€Å"apparel advertisements were more localized than perfume or cosmetics† (Seitz & Johar, 1993). The study made presents itself as a guide for European advertisers who must take into consideration the anticipated development that the different European countries will continue to merge into a single market; thus, a need to have a unified brand image (Seitz & Johar, 1993). Having standardized advertisements will benefit global companies as it would mean economies of scale in advertising expenditures. Advertisers however must

Tuesday, October 29, 2019

Motivations for Plastic Surgery Essay Example | Topics and Well Written Essays - 1250 words

Motivations for Plastic Surgery - Essay Example In her article, Balsamo (1992) note two widely pursued perceptions about plastic surgery where a section of critics perceive the practice as â€Å"technological colonization of women’s bodies† while there are those who think plastic surgery presents women with the opportunity to get â€Å"empowered† (226). Central to these two perspectives is the motivation behind the ever-increasing number of women who are willing to go under the knife in order to get what is considered a perfect body. Certainly, not all plastic surgeries are undertaken for cosmetic reasons given that there is also a large section of women who are forced by medical reasons such as breast cancer after mastectomy. One of the areas that have reported a rapid increase in the number of clients is breast surgery procedures. The number of women looking for cosmetic breast surgery has been on a dramatic rise since Timmie Jean Lindsey as the first woman underwent the procedure in 1962. Although the shape of preferred breast implants have been fluctuating depending on the societal trends of specific periods with the 1970s women preferring a teardrop shape while those of the 1990s went for the roundest breasts possible, the global number of those interested in the procedure has always been on the increase (Foster). It is estimated that in Seoul, South Korea’s capital, one out of five women had undergone a plastic surgery procedure (Conley). These figures have continued to increase even with reported health complications such as the Poly Implant Prothese (PIP) scare, which is in fact not the first one. Over the history of cosmetic surgery, there have been always been an alternative to procedures that were deemed as risky such as the 1992 US silicone scare which led to many women going for plastic surgery to prefer saline instead of silicone implants. The risks on physical health such as possible infections, chronic pains, numbness of affected areas, breakage, leakage as well as necrosis for those who go through such procedures have deterred potential clients.     

Sunday, October 27, 2019

Why Dunkin Donuts Closed In Faisalabad Marketing Essay

Why Dunkin Donuts Closed In Faisalabad Marketing Essay James Beard (1903-1985) The food industry is the complex, global collective of diverse business that together supply much of the food energy consumed by the world population. Processed food sales worldwide are approximately 3.2 trillion US dollars (2004). Only in US, consumers spend approximately US 1 trillion dollars. Nestlà © is the largest food and beverage company in the world. The food and its allied products industry is considered Pakistans largest industry. Trade sources estimate the sectors total value of production is over Rs 46 billion. Fast food is the term given to food that can be prepared and served very quickly. In 1867, Charles Feltman, a German butcher opened the first fast food diner in Brooklyn, New York city. Dunkin Donuts is the worlds largest coffee and backed goods chain, serving more than 3 million customers per day. It was founded in 1950 by Bill Rosenberg. The first Dunkin Donuts shop was opened in Quincy, Massachusetts, USA. In 1955 first Dunkin Donuts franchise was sold and ten years later (i.e. 1965) the first international branch was opened in Canada. At the end of 2008, Dunkin Donuts had a total of 8835 franchised restaurants including 2440 international shops in 31 countries. Dunkin Donuts has sales of over 4 million donuts a day and it had sales of 5.5 billion US dollars in the fiscal year 2008. Its international head office is located in Canton, Massachusetts. In 1998, First branch of Dunkin Donuts was opened in Karachi. In January 2004, Dunkin Donuts opened its branch in Faisalabad and it closed down in April 2005. Problem Statement / Research Question Why Dunkin Donuts closed down in Faisalabad Possible Reasons: The Closure of Dunkin Donuts Faisalabad Branch could have been due to one or more following reasons: Inadequate awareness among people of Faisalabad? Failed to develop taste? Difficult Accessibility? Supply Issues? Service Quality? Environment? High Pricing? Methodologies / Study We used to methods in our research process: In-depth telephonic interview Survey through questionnaire In-depth telephonic interview: We obtained the number of the required person from the Dunkin Donuts head office in Lahore. We conducted a telephonic conversation with Mr. Naveed Malik, who was the branch manager of Dunkin Donuts in Faisalabad at the time of closure and currently he is working as the Business Development Manager in Dunkin Donuts. Firstly we inquired him the problem s which contributed in the closure of the branch. He mentioned various reasons to it. According to him they faced supply problems as the kitchen was in Lahore and the stuff reached the branch after 2 and half hours of the daily opening which contributed towards the customer dissatisfaction. He mentioned that they used various tactics to create the awareness among the locals but they were failed in doing so. He also added that Dunkin Donuts did not match the Faisalabads taste culture and they also failed to develop the taste. He also blamed the local city government for their non-supportive behavior towards them as they refused to cut a t urn on the road which made the customers to reach the branch with difficulty. Then we asked him about their competitors in Faisalabad. He replied that there was no competition in Faisalabad as they deal primarily in cafà © and donuts which no other brand offered at that time locally. Then we asked him about their target customers. He told us that the target customers were mainly families Survey through Questionnaire: For the survey we had a sample size of 100 individuals which comprised of our friends, relatives and some strangers. We got the questionnaire (see appendix 1) filled at their homes where we were present in person. The reason behind selecting this target sample was they were easily accessible and were expected to provide their honest opinion as they share personal relationship with us. Our analysis of the questionnaire is as under: Note: For Pie Charts, See Appendix 2 Q 1. What is your Age group? 5 people were of the age less than 10 years, 15 belonged to the age group of 11-15 years, 30 people were aged between 16 and 20, 25 people belonged to the age group of 21-25 and 17 were from the age group of 26-30. Only 8 people were of the age of more than 30 years. Q 2. Do you Like Donuts? 70 people said that they like donuts and 30 people said that they are not fond of donuts. Q 3. Have you ever heard of Dunkin Donuts? 90 people said they had heard of Dunkin Donuts while 10 people had never heard about it. Q 4. Have you ever went to Dunkin Donuts, Faisalabad? Out of the 100 people who answered the questionnaire, 90 had gone to Dunkin Donuts Faisalabad while 10 had not. Q 5. What did you order? 60 people had ordered donuts, 50 had ordered sandwiches, 30 people had offered coffee/tea and 95 people ordered soft drinks. Q 6. How was your overall experience at Dunkin Donuts, Faisalabad? 20 people said that their experience in Dunkin Donuts was excellent, 50 said it was good, 15 said it was fair and 5 said that their experience was bad. Q 7. How will you rate Dunkin Donuts, Faisalabad from scale 1-10 with 10 being the highest (excellent taste)? Mostly people rated Dunkin Donuts between 5 and 8 on a scale of 10. Q 8. Did you go to any of the Dunkin Donuts branches outside Faisalabad? Only 36 people had gone to Dunkin Donuts outside Faisalabad. The other 64 had never been to any Dunkin Donuts branch outside Faisalabad. Q 9. Did you find any difference between the Dunkin Donuts, Faisalabad and the other branches outside Faisalabad which you visited? 6 people said they noticed a lot of difference between Dunkin Donuts branch in Faisalabad and a branch outside Faisalabad. 20 noticed a minor difference and 10 did not find any difference at all. Q 10. What Factor contributed for the difference between Dunkin Donuts, Faisalabad and the other branches? 2 people said that the factor that contributed to the difference between the branches was due to variance in service quality, 10 said it was food quality, 10 said it was environment, 3 said it was cleanliness while 1 person said it was variety of food. Q 11. Can Dunkin Donuts Compete with its competitors? 40 people said yes, 5 people said maybe and 45 people said no. Q 12. Why do you think Dunkin Donuts, Faisalabad closed down permanently? 10 people said the reason for the closure of the branch was bad service, 3 people said unhygienic conditions, 20 people said expensive, 7 people thought it was low food quality, 5 people said environment was not suitable, 5 people said bad location and 40 people said that Dunkin Donuts failed to develop taste of people living in Faisalabad. Limitations Many problems were faced during the preparation of this research project, which were handled amicably. Following were the limitations we have faced during the project In availability of internet Difficulty in finding suitable consultant Load shedding Transportation problem Faced difficulties in printing Conclusion When a customer comes to a restaurant he looks for a mix of services, quality, taste, satisfaction, accessibility and the value of money. If the particular restaurant fails to provide that mix, there are great chances of the restaurant to close down because the customer will become dissatisfied and he will not return to that place again. Same thing happened in the case of Dunkin Donuts Faisalabad, where they failed to provide the mix to their customers. Suggestions: To Enhance supplies To expand their customer base from families to masses. Takes appropriate steps regarding the awareness of the taste among the locals Make the outlet more accessible for the customers Price range should be vast so that it can absorb all income groups Appendix 1 Sample Questionnaire: Name: Contact No: Note: Please Circle the correct answer. You may choose more than one answer Q1) What is your Age group? Less than 10 11-15 16-20 21-25 25-30 30 or more Q2) Do you Like Donuts? Yes No Q3) Have you ever heard of Dunkin Donuts? Yes No If No then you dont need to go further Q4) Have you ever went to Dunkin Donuts, Faisalabad? Yes No If No then skip Q5-6 Q5) What did you order? Donut Sandwich Coffee / Tea Soft Drink Q6) How was your overall experience at Dunkin Donuts, Faisalabad? Excellent Good Fair Bad Q7) How will you rate Dunkin Donuts, Faisalabad from scale 1-10 with 10 being the highest (excellent taste)? _____ / 10 Q8) Did you go to any of the Dunkin Donuts branches outside Faisalabad? Yes No If yes then please specify: ________________ If No, then skip Question 9-10 Q9) Did you find any difference between the Dunkin Donuts, Faisalabad and the other branches outside Faisalabad which you visited? Yes, a lot of difference A minor difference Not at all If you answer is option c then skip Question 10 Q10) What Factor contributed for the difference between Dunkin Donuts, Faisalabad and the other branches? Service Food Quality Cleanliness Environment Variety Q11) Can Dunkin Donuts Compete with its competitors? Yes absolutely Maybe No Q12) Why do you think Dunkin Donuts, Faisalabad closed down permanently? Failed to develop the taste of people living in Faisalabad Bad service Unhygienic Conditions Expensive Low food quality Environment was not suitable Bad selection of location Other: Any suggestion you would like to give regarding Dunkin Donuts? Appendix 2 Pie Charts:

Friday, October 25, 2019

Search for Innocence in American Modernism Essay -- Literature Essays

Search for Innocence in American Modernism      Ã‚   American Literature from its very beginning has been centered around a theme of innocence. The Puritans wrote about abandoning the corruption of Europe to find innocence in a new world. The Romantics saw innocence and power in nature and often wrote of escaping from civilization to return to nature. After the Civil War, however, the innocence of the nation is challenged. The Realists focused on the loss of innocence and in Naturalist works innocence is mostly gone. During these periods of American Literature it seems almost as if a hole was being dug, a sort of emptying of innocence, and after World War I the Modernists called this hole the wasteland Many Modernist works focus on society lost in the wasteland, but they hint at a way out. The path out of the wasteland is through a return to innocence. This is evident in the Modernist works of The wasteland by T. S. Eliot, "Directive" by Robert Frost, "Babylon Revisited" by F. Scott Fitzgerald, and "Hills Like White Elephants" by Earnest Hemingway as will be shown in an analysis of the inhabitants of the wasteland and their search for innocence, the role of children and pregnancy in the wasteland, and the symbolism of water and rebirth.    But before I go on, I believe that I should first clarify what I mean by "a return to innocence." First, there is some confusion between innocence and ignorance. They are often used interchangeably. Because a person is innocent, it does not mean that he or she is unaware of reality. Innocence is almost like a different type of view. A child and an adult may interpret a single thing entirely differently, but this does not mean that the adult knows more about that thing. Innocence is open ... ...ed society and only through the return of innocence can there be hope of anything better.    Works Cited Eliot, T.S. The wasteland. In The Heath Anthology of American Literature, Volume II. Edited by Paul Lauter et al. Lexington, MA: D.C. Heath and Company, 1991: 1447-1463.    Fitzgerald, F. Scott. "Babylon Revisited." In The Heath Anthology of American Literature, Volume II. Edited by Paul Lauter et al. Lexington, MA: D.C. Heath and Company, 1991: 1471-1485.    Frost, Robert. "Directive." In The Heath Anthology of American Literature, Volume II. Edited by Paul Lauter et al. Lexington, MA: D.C. Heath and Company, 1991: 1208-1209.    Hemingway, Ernest. "Hills Like White Elephants." In The Heath Anthology of American Literature, Volume II. Edited by Paul Lauter et al. Lexington, MA: D.C. Heath and Company, 1991: 1471-1485.      

Thursday, October 24, 2019

Chapter 4 questions Essay

1. How do relative ethics compare to universal ethical standards? Should ethics ever be relative? Provide a rationale for your response. Ethics are a set of beliefs about right and wrong, good and bad. Universal ethical standards are norms that apply to all people across a broad spectrum. These six core values being trustworthiness, respect, responsibility, fairness, caring, and citizenship. Ethics should never be relative because their ethical standards shift depending on the situation and how it relates to them. This kind of two-face thinking is dangerous because it can help people rationalize bigger and bigger ethical deviations. 2. What is an ethical dilemma? Give 3 examples of ethical dilemmas that workers or managers might face in a business setting. An ethical dilemma is a decision that involves a conflict of values; every potential course of action has some significant negative consequences. Some examples of ethical dilemmas could be: Noticing an employee stealing from the company, Employees bending the rules of the company, or a supervisor demanding that you do something illegal. 3. Compare the role of the individual and the role of the organization in ethical decision making. How can business promote an ethical climate? As an individual you will have factors that come into play as you face ethical dilemmas. Your personal needs, your family, your culture, your religion, and your personality traits like self-esteem, self-confidence, independence, and sense of humor all play a significant role. As an organization the CEOs, and managers must communicate their personal commitment to high ethical standards and consistently drive the message down to employees through their actions. Business can promote an ethical climate by setting the best example for the employees. Communication will help promote an ethical climate, as well as enforcing consequences for violations of the ethics policy. 4. When might the need for social responsibility conflict with the need to maximize profits? When the needs conflict, how should a firm decide which  path to pursue? Social responsibility is the obligation of a business to contribute to society. A company’s goal is to make profits and without company profits other contributions are impossible. A company can choose to make no contribution, a responsive contribution, or a proactive contribution depending on the businesses values, mission, resources, management philosophy, and ultimately its position on social responsibility. 5. Do you believe that employers should respond to employee needs for work-life balance? Why or why not? What are the trade-offs? Yes, employers should respond to employee needs for work life balance. It creates a workplace environment that respects the dignity and value of each employee. It ensures that hard work, commitment, and talent pay off. It moves beyond minimal safety requirements to establish proactive protections. The best employees respond to the ongoing employee search for balance between work and personal life. The employees will work harder for the company and keep longer term jobs. People will appreciate the extra mile the company goes for its employees, giving you more highly qualified applicants to choose from. 6. What are the 4 consumer rights originally outlined by President Kennedy in the early 1960s? How would you rank those rights in terms of importance? Why? The four consumer rights are: The right to be safe, the right to be informed, the right to choose, and the right to be heard. I rank these in importance as follows: 1- The right to be safe (I don’t want to be hurt or lose my life due to faulty products.) 2- The right to choose (I want to be able to choose where and when I purchase products to best suit the needs of my family.) 3- The right to be informed (It is important to me that I know the companies I deal with are legit and ethical, as well as what goes into the products I buy.) 4- The right to be heard (I think it is important to be able to express your complaints to a company and that they learn from customer experiences.) 7. Define the concept of planned obsolescence. Is this strategy ethically unsound? Why or Why not? Planned obsolescence is the strategy of deliberately designing products to fail in order to shorten the time between purchases. This strategy is ethically unsound because it thins the consumer wallets and abuses consumers trust. Consumers are willing to pay more to buy products from a socially responsible company. 8. What is the difference between corporate philanthropy and corporate responsibility to The community? Which do you think is better? Why? Corporate philanthropy is all the donations a business has made to nonprofit groups including money, products, and employee time. As where corporate responsibility is business contributions to the community through the actions of the business itself rather than donations of money and time. I think corporate responsibility is better because the company is taking action itself to contribute to the community, rather than just throwing money at the problem. It shows more heart, and more effort, and more dedication to the community. 9. Define sustainable development. What are 3 examples of successful companies that have pursued sustainable development programs? Sustainable development is doing business to meet the needs of the current generation, without harming the ability of future generations to meet their needs. McDonalds (recycling cooking oil and cardboard), Dell (going fully carbon neutral), and Pepsi (cutting emissions from fertilizer) are three examples of successful companies that have pursued sustainable development programs. 10. How can domestic companies that outsource manufacturing to foreign factories ensure that their vendors adhere to ethical standards? Companies can bring together their own values with the laws of both the United States, and their host countries. Most socially responsible companies establish codes of conduct for their vendors setting clear policies for human rights, wages, safety, and environmental impact. Codes of conduct work best with monitoring, enforcement, and the commitment to finding solutions that work for all parties involved.

Wednesday, October 23, 2019

College Speech Artifact Essay

I. Introduction: A. Quote: â€Å"Take a risk, be a rebel, ignore the conventional wisdom, take a stand and make a change, if something is wrong say it and say it loud, you have no idea what a difference you can make. Today you have earned your degree. Congratulations to class of 2013 † B. These were the bittersweet words I heard as I moved my tassel from the right to left. My name is Taylor Carson and I am a Gaucho! C. Some of you may not know what that means to be a Gaucho and when I am finished I think you will have a better understanding. June 13th 2013 marked a day in my life that I would never forget; it was not just an ending to an amazing chapter, but also just the beginning. II. Body: A. Background information 1. The UCSB/Isla Vista bubble is one of the weirdest places in America and to think I had the privilege of living there for four years. UCSB is its own little paradise and in that paradise I had to figure out how to balance my academic life with my social life. 2. As you can see this graduation cap represents all the hard work that I have done to earn my degree and all the embellishments represent all the fun memories I have had, the exciting people I have met, and the memorable experiences I spent in Santa Barbara. B. In this speech I hope share with you my experiences at UCSB and my transformation I underwent in working towards earning my degree from starting off as the a) Freaked out freshman b) Becoming the scholastic sophomore c) To having the mentality of â€Å"Wow, I go to an awesome school like this, this is a joke† junior d) And finally into a smooth sailing senior ready to embark on a new venture. 1. Looking at my first year in college I was that very confused stereotypical freshman who was walking on the bike paths because I didn’t  realize that pedestrians no longer had the right away in, bicyclists do. Finding it nerve racking when trying to figure out what classes are just right to take, as well as trying to navigate around a campus that may have well been like a foreign country to me. I was always freaking out and felt pressure from everyone around me who seemed to know exactly what they wanted to do while I was still undeclared and had no plan. I defiantly went through many trials and tribulations but my freshman experiences and memories are priceless. 2. During my sophomore year I really over-committed myself†¦ a lot. If any of my professors could hear this, I’m sure that they would agree. I was taking 5 courses each quarter, doing lab research, switching my major multiple times and trying to maintain a job all at the same time. There are a few nights that I can recall where I would sleep in our 24 hour study lab just so I can wake up the next morning to study and avoid all the distractions. Unfortunately, I did not end up with the all A’s in some of the core classes that count now as I apply to grad schools. I personally can recount many nights I contemplated dropping out. Hell, if Jobs, Gates and Zuckerburg did it why couldn’t I? Something about staying in a place that evokes progress and meaning meant that I would have to work hard to earn this privilege of graduation so I spent my that whole summer taking a year of bio along with organic chemistry all so that I could graduate on time. 3. As junior year rolled around I realized I was at half way mark to graduation. All the work I did my sophomore year really paid off. I was more confident then ever. For once I had direction and a declared major that I loved; Biopsychology. I couldn’t believe I went to such an amazing school where it is summer all year long, and my backyard was literality the ocean. I was fortunate to live under one roof with 12 of my best girl friends where beachside activities were an everyday necessity. I enjoyed many late-night Freebirds run, the fun cab rides down town, the embarrassing karaoke performances at OTT and country line dancing at Creekside. I was embracing the everyday t-shirt, shorts and flip-flop kinda weather, the brezzy walks along the beach in between classes, constant learning and as a result newfound wisdom. 4. Finally senior year was here and there is nothing I could ask for in exchange for the things I have both learned and been through here at UCSB. Throughout my four years I found new perspectives, new friends, new ideas and new places to explore. III. Conclusion: A. And there I was on June 13th 2013, graduation day. I did it! I survived four amazing years at UCSB and undoubtedly changed and became better through my collegiate experience. My graduation cap is important to me for it represents my transformation from who I was to who I am today. My mistakes and successes are equally a part of who I have become. I have learned not to settle and do what makes me happy; and that way I will never regret following my dreams. B. So I will say to all of you, as the chancellor said to my graduation class â€Å"treat your life serendipitously. Stop taking the path that you feel has been assigned to you, and create you own journey from here on out.†

Tuesday, October 22, 2019

Auditors Report Essays

Auditors Report Essays Auditors Report Essay Auditors Report Essay PSA 700 (Redrafted) Illustration 1: Circumstances include the following: Audit of a complete set of financial statements. The financial statements are prepared for a general purpose by management of the entity in accordance with PFRS. The terms of the audit engagement reflect description managementâ„ ¢s responsibility for the financial statements in PSA 210 (Redrafted). In addition to the audit of the financial statements, the auditor has other reporting responsibilities required under local law. INDEPENDENT AUDITORâ„ ¢S REPORT [Appropriate Addressee] Report on the Financial Statements We have audited the accompanying financial statements of ABC Company, which comprise the balance sheet as at December 31, 20X1, and the income statement, statement of changes in equity and cash flow statement for the year then ended, and a summary of significant accounting policies and other explanatory information. Managementâ„ ¢s Responsibility for the Financial Statements Management is responsible for the preparation and fair presentation of these financial statements in accordance with Philippine Financial Reporting Standards; this includes the design, implementation and maintenance of internal control relevant to the preparation and fair presentation of financial statements that are free from material misstatement, whether due to fraud or error. Auditorâ„ ¢s Responsibility Our responsibility is to express an opinion on these financial statements based on our audit. We conducted our audit in accordance with Philippine Standards on Auditing. Those standards require that we comply with ethical requirements and plan and perform the audit to obtain reasonable assurance about whether the financial statements are free from material misstatement. An audit involves performing procedures to obtain audit evidence about the amounts and disclosures in the financial statements. The procedures selected depend on the auditorâ„ ¢s judgment, including the assessment of the risks of material misstatement of the financial statements, whether due to fraud or error. In making those risk assessments, the auditor considers internal control relevant to the entityâ„ ¢s preparation and fair presentation of the financial statements in order to design audit procedures that are appropriate in the circumstances, but not for the purpose of expressing an opinion on the effectiveness of the entityâ„ ¢s internal control. An audit also includes evaluating the appropriateness of accounting policies used and the reasonableness of accounting estimates made by management, as well as evaluating the overall presentation of the financial statements. We believe that the audit evidence we have obtained is sufficient and appropriate to provide a basis for our audit opinion. Opinion In our opinion, the financial statements present fairly, in all material respects, the financial position of ABC Company as at December 31, 20X1, and (of) its financial performance and its cash flows for the year then ended in accordance with Philippine Financial Reporting Standards. Report on Other Legal and Regulatory Requirements [Form and content of this section of the auditorâ„ ¢s report will vary depending on the nature of the auditorâ„ ¢s other reporting responsibilities.] [Auditorâ„ ¢s signature] [Date of the auditorâ„ ¢s report] [Auditorâ„ ¢s address]

Monday, October 21, 2019

Evaluate the impact of the New Deal on women, blacks, and In essays

Evaluate the impact of the New Deal on women, blacks, and In essays The New Deal changed the lives of many United States citizens during the course of history. The people that it mainly impacted were women, blacks, and Indians. These groups developed what seemed like centuries worth of work for regular white men over these few years. Influential people emerged that would have otherwise remained in the shadows. Women were continually seeing new rights pop up, but few women were taken the provided chance to grasp them. First Lady, Eleanor Roosevelt was one of the many women to take a stand during this time. Along with Molly Dewson they developed a group of women called The Network in order to place reform-minded women into cabinet and government jobs, expressing all of their rights as United States citizens. Frances Perkins became the first women elected to a Cabinet post as Secretary of Labor and encouraged other women to aspire to be like herself. Eleanor Roosevelt also helped encourage people by creating a daily newspaper article which she named My Day, which also showed women that making a difference, for example she was interested in civil rights, was worth it. She was willing to stick up for what she believed in, quitting the Daughters of the American Revolution, also known as DAR, to allow an African American women to sing in public. (Blacks) African Americans politically became Democratic, and began to leave the Republican party that only a few years earlier helped to relieve them from their horrible state of slavery. They were excluded from acts such as the National Recovery Administration, and the Tennessee Valley Authority, and some segregation began to increase. The blacks on average made half as much with unemployment rates that double that of whites. Many blacks believed that the small piece that they were getting was worth it. They had many new programs created to aide in their education and training for occupations, giving...

Saturday, October 19, 2019

Biopoem

Who would like to see himself as a personal trainer, his son more than once a week, a raise on his paycheck Resident of a rented house in a rundown neighborhood Doe (Section 1) After reading the bio-poem, describe John Doe without just copying the words from his poem. 100 words minimum. John is a broken man. He does not have any self-confidence. He seems to want good things out of life although he is not willing to work for it. He seems to quite whenever anything gets hard instead of fighting for what he wants he gives up too quickly. I believe that he loves his son very much ad he settles for whatever whoever wants. He isn’t fighting for more time with his son although that is what he wants. He seems to be stuck in a job that he really does not want to be in and he seems too scared to go after what he really wants out of life. (Section 2) In units 9 amp; 10 you learned that your future is up to you, and how to build your own self image. Using the ideas you learned in these units, what advice would you give to John and why? 100 word minimum. My advice for John would be to go back to school and get his personal training degree. Work very hard to accomplish his goals and dreams for a better job ad future. He needs to go to the court system and file for more visitation time with his son. He has as good as chance as anyone to fulfill his dreams and aspirations for his future. John seems to be a very good person who has a good heart and will do anything he can to help anyone I need. The reason I would give John this advice is because I some ways I am a lot like him with the wanting a better job and wanting to better myself for my child. After he gets his schooling over with he can get a better job and it would be very likely he could buy a house instead of having to rent I a bad neighborhood. (Section 3) Now that you have described John, you will write a bio-poem about you. Below is the bio-poem format for your reference. Your first name 4 words that describe you Son or daughter of†¦. Who loves†¦(3 things) Who feels†¦(3 things) Who needs†¦(3 things) Who gives†¦(3 things) Who fears†¦(3 things) Who would like to see†¦(3 things) Resident of†¦ Your last name Write your bio-poem below following the format given above. Hollie Hard working, kind, dependable, mother Daughter of a single mother and absent father Who loves her daughter, husband, animals Who feels loved, happy, tired Who needs a better job, more pay, and more time Who gives help to others, lots of love, understanding Who fears not being good enough, losing my family, failure of any kind Who would like to see world peace, less hunger in the world, a better economy Resident of a small rented farm house that needs a lot of work Allen (Section 4) After completing your bio-poem, read it over. Then reflect on what you are learning in Thought Patterns for a Successful Career. Now write some advice to yourself below. 100 word minimum I am learning that there really is more to me than I have ever realized. I am a good person and I actually care about others more than one should in my line of work. I have the tendency to get attached to the residents that I take care of more than you should. I am just as good as the next person. I am worthy as anyone else to have a better life all I have to do is go after it. As long as I apply myself to the best of my ability and work for it. I can do anything I set my mind to. I am going to show my daughter that no matter where you come from I this life if you want something bad enough and you go after it with your whole heart and put all you got in it you can accomplish anything. It really doesn’t matter if your childhood was grand or if you have had to fight for anything and everything you have always gotten anything is possible if you believe in yourself and apply yourself.

Friday, October 18, 2019

The Ebola Virus Research Paper Example | Topics and Well Written Essays - 750 words

The Ebola Virus - Research Paper Example The Ebola virus, Sudan and Zaire subtype in particular, were first discovered in an equatorial province west of Sudan and the nearby region of Democratic Republic of Congo formerly Zaire in 1976. The discovery was made after serious epidemics were reported in the village of Yambuku located in the northern region of the Democratic Republic of Congo and Nzara village in the Southern Sudan. The Reston virus was discovered in the western pacific in 1989 during an outbreak of simian hemorrhagic fever virus (SHFV), while the Cote d’Ivoire species of virus were discovered in 1994 in a Tai forest in the country of Cote d’Ivoire (Peter, 2009). Some of the early symptoms characterized by the Ebola virus include: headache, sudden onset of fever, intense weakness, muscle pain and sore throat. Vomiting, diarrhea, rash, impaired kidney and liver function often follows at an advanced stage of the disease, and in some cases both external and internal bleeding have been reported. Resear ch findings have shown low counts of white blood cells and platelets and platelets, as well as elevated liver enzymes (Ryabchikova, 2004). The Ebola Virus is said to be transmitted by direct contact with body fluids of infected individuals or blood, secretions. Transmission of Ebola has been linked to burial ceremonies where mourners have had direct contact with the body of the deceased person who suffered from this virus. The cause of infections of Ebola virus in humans has resulted from the human handling of infected non-human primates such as the chimpanzees, gorillas and consumption of forest antelopes either dead or alive or both. These cases have been reported and documented in the Cote d’Ivoire and the Democratic republic of Congo. The transmission of the Reston species, however, is because of handling the cynomolgus monkey (Bausch, 2011). Health care workers have not been left behind in the infection chain, and they have largely been infected in the line of duty. This is through treating the Ebola patients at a close contact, without following standard infection control precautions, and inadequate nursing procedures has always been the case in most African countries. The incubation period for the disease is put at a minimum of two days and maximum of 21 days (Ryabchikova, 2004). The natural reservoir of the Ebola Virus is still unknown to humans, despite the extensive studies directed to its course. All that is known is that it seems to reside in the rainy forests of the African continent and the western pacific, and although non-human primates have been the source of infections for human, they are believed to have been directly infected by the natural reservoir or some transmission chain in the natural reservoir. Some of the virulent factors that have led to Ebola infections in humans are linked to direct contact with chimpanzees, monkeys, guinea pigs, gorillas and porcupines in the rainy forests of Africa. However, there have been speculations that bats have played a role in maintaining the Ebola virus in the tropical forest since they caught the infection and did not die from it. This case forms one of the many hypotheses developed to explain the origin of the Ebola virus (Peter, 2009). Ebola virus test are extremely biohazard risk and are only conducted under maximum biological containment conditions. Diagnosis of the Ebola can be done under specialized laboratories where

Organizational analysis YOUR EXPERIENCE Coursework

Organizational analysis YOUR EXPERIENCE - Coursework Example As seen in the work of Niebrà ³j & KosiÅ„ska (2003) present day must be focused on the patient as opposed to the nurses. This refers to the general well-being of the patient. The nurse leader I worked with was the team leader and ensured that we all worked as a team regardless of the situation at hand. This ensured that the patients accessed quality healthcare at the required time. The authors also continue to argue that team work can simply be realized if there is a leader present to propagate the same (Niebrà ³j & KosiÅ„ska, 2003). This leads to efficient nursing especially if the leadership style is of good quality. The nurse leader I worked with was a good communicator and made sure that we were always conversant with our roles whilst on duty at all times. Since the patient is the main reason behind the existence of medical care, it is important that the nurse leader facilitates easy access of medical care at all times by the patients. This relates to the autonomy princip le proposed by Niebrà ³j & KosiÅ„ska (2003). Question2-Briefly describe the types of leadership/management experiences or events that you observed or in which you participated. Relate your observations to your leader’s management position and leadership styles. Provide rationale to support your responses. The types of leadership/management experiences or events that I observed from the nurse leader include her desire to lead our team and come up with strategies for attaining the team’s visions. This relates to the work of Frankel  (2008) who relates these factors to effective leadership. At many instances, the nurse leader was quick to solve problems that arose from the team members. This, she did, so as to cultivate group dynamics within the group through problem solving. The leader was also very inspirational especially when our team lacked the morale to move forward especially in the case of targets set. Her passion and love for her job motivated us

History and Political Science Coursework Example | Topics and Well Written Essays - 750 words - 1

History and Political Science - Coursework Example Both a stop and an arrest are considered â€Å"seizures regulated by the Fourth Amendment† and â€Å"must be justified by reasonable suspicion of criminal activity on the part of the detainee† before they can be enacted (Harr, Hess, and Orthmann 233). Furthermore, the intensity and scope of a seizure determines the transformation of a stop to an arrest (Harr, Hess, and Orthmann 233). A stop is considered a temporary detention, while an arrest is more of a long-term detention. ... On the contrary, Terry recognized that it may be the essence of good police work to adopt an immediate response. (Harr, Hess, and Orthmann 235) A reasonable suspicion for a stop or a probable cause for an arrest depends on the â€Å"totality of the circumstances† (Harr, Hess, and Orthmann 235). While â€Å"an anonymous tip, with nothing else, has been held to lack sufficient reliability to establish the reasonable suspicion for a...stop† (Harr, Hess, and Orthmann 235), other circumstances, such as â€Å"flight from police† may be a â€Å"relevant factor overall† (Harr, Hess, and Orthmann 235). This should be held in view of â€Å"the totality of the circumstances† (Harr, Hess, and Orthmann 235). One good example given is when a person suddenly fled at the sight of the police in a high-criminal area. While it may automatically indicate any wrongdoing of the part of the person who fled, the overall circumstances provide the police reasonable suspicion . When evidences are found on the person, then there will be a probable cause for an arrest (Harr, Hess, and Orthmann 236-7). How much force can be used by an officer when executing an arrest? How is it determined? => During seizures such as an arrest or a stop, â€Å"Terry allows officers to take all necessary steps to protect themselves if the circumstances reasonably warrant such measures† (Harr, Hess, and Orthmann 238). If the situation requires such actions, the police officer may 1) â€Å"draw their weapons,† 2) â€Å"have a reasonable number of backup officers,† and; 3) â€Å"handcuff individuals or place them in the back of a squad car† (Harr, Hess, and Orthmann 238). However, sometimes, even just a â€Å"frisk [is enough] protective action† during seizures (Harr, Hess, and

Thursday, October 17, 2019

Discussion Question Essay Example | Topics and Well Written Essays - 250 words - 23

Discussion Question - Essay Example Compare and contrast the flow of litigation in criminal cases and civil proceedings. Include a discussion of the introduction of each type of case in the process, the participants, and the role of the court in each. A civil case involves a situation where an individual or a particular entity states that another entity has failed to reach the legal responsibilities they ought to carry out. The duties in such a case are established under the constitutional law. It is thus the role of the courts to see to it that these people receive quality treatment and consequently either lead to annulment of the agreement or resolution of the dispute. In criminal cases, the person is charged in a legal process referred to as an indictment. On behalf of the American citizens, the government takes up the responsibility of prosecuting the particular person or group (Herring 35). The attorney’s office has the responsibility of prosecuting these state

Business Ethics in the Footwear, Clothing, and Textile Industries Essay

Business Ethics in the Footwear, Clothing, and Textile Industries - Essay Example   Business ethics and conduct have been a major talking point in the TCF industry, especially with regards to the fairness of its dealings, processes, stakeholder treatment, and competition policies. The principle of fairness seeks to ensure that TCF organizations engage in; fair and free ethical competition deals with all stakeholders in a way that can describe as being equitable and fair and is non-discriminatory during the process of contracting and hiring (Braithwaite & Drahos, 2010: p401). This principle has been a problematic one within the TCF industry. The workforce is 80% female on minimum wage that averages $38 every month. This industry has the lowest costs of labor globally, and the workers’ unions are intimidated with violence in order to stay quiet on industry standard violations (Sajhau, 2013: p34). The industry needs to create a more friendly culture for workers, enforcing freedom of association sans victimization, pro-labor legislation, balance the gender in equality gap, and fire and building inspection codes. This can be achieved with the help of global retailers.   Issues related to diligence and loyalty is an important concern with regards to business ethics in the TCF industry. The industry would be required to act as a fiduciary for investors and the company by carrying out the organization’s operations in a loyal and diligent manner expected of trustees (Braithwaite & Drahos, 2010: p402). Corporate ethics are reflective of the business’ philosophy, and one of its objectives is the determination of the company’s fundamental purposes.

Wednesday, October 16, 2019

History and Political Science Coursework Example | Topics and Well Written Essays - 750 words - 1

History and Political Science - Coursework Example Both a stop and an arrest are considered â€Å"seizures regulated by the Fourth Amendment† and â€Å"must be justified by reasonable suspicion of criminal activity on the part of the detainee† before they can be enacted (Harr, Hess, and Orthmann 233). Furthermore, the intensity and scope of a seizure determines the transformation of a stop to an arrest (Harr, Hess, and Orthmann 233). A stop is considered a temporary detention, while an arrest is more of a long-term detention. ... On the contrary, Terry recognized that it may be the essence of good police work to adopt an immediate response. (Harr, Hess, and Orthmann 235) A reasonable suspicion for a stop or a probable cause for an arrest depends on the â€Å"totality of the circumstances† (Harr, Hess, and Orthmann 235). While â€Å"an anonymous tip, with nothing else, has been held to lack sufficient reliability to establish the reasonable suspicion for a...stop† (Harr, Hess, and Orthmann 235), other circumstances, such as â€Å"flight from police† may be a â€Å"relevant factor overall† (Harr, Hess, and Orthmann 235). This should be held in view of â€Å"the totality of the circumstances† (Harr, Hess, and Orthmann 235). One good example given is when a person suddenly fled at the sight of the police in a high-criminal area. While it may automatically indicate any wrongdoing of the part of the person who fled, the overall circumstances provide the police reasonable suspicion . When evidences are found on the person, then there will be a probable cause for an arrest (Harr, Hess, and Orthmann 236-7). How much force can be used by an officer when executing an arrest? How is it determined? => During seizures such as an arrest or a stop, â€Å"Terry allows officers to take all necessary steps to protect themselves if the circumstances reasonably warrant such measures† (Harr, Hess, and Orthmann 238). If the situation requires such actions, the police officer may 1) â€Å"draw their weapons,† 2) â€Å"have a reasonable number of backup officers,† and; 3) â€Å"handcuff individuals or place them in the back of a squad car† (Harr, Hess, and Orthmann 238). However, sometimes, even just a â€Å"frisk [is enough] protective action† during seizures (Harr, Hess, and

Business Ethics in the Footwear, Clothing, and Textile Industries Essay

Business Ethics in the Footwear, Clothing, and Textile Industries - Essay Example   Business ethics and conduct have been a major talking point in the TCF industry, especially with regards to the fairness of its dealings, processes, stakeholder treatment, and competition policies. The principle of fairness seeks to ensure that TCF organizations engage in; fair and free ethical competition deals with all stakeholders in a way that can describe as being equitable and fair and is non-discriminatory during the process of contracting and hiring (Braithwaite & Drahos, 2010: p401). This principle has been a problematic one within the TCF industry. The workforce is 80% female on minimum wage that averages $38 every month. This industry has the lowest costs of labor globally, and the workers’ unions are intimidated with violence in order to stay quiet on industry standard violations (Sajhau, 2013: p34). The industry needs to create a more friendly culture for workers, enforcing freedom of association sans victimization, pro-labor legislation, balance the gender in equality gap, and fire and building inspection codes. This can be achieved with the help of global retailers.   Issues related to diligence and loyalty is an important concern with regards to business ethics in the TCF industry. The industry would be required to act as a fiduciary for investors and the company by carrying out the organization’s operations in a loyal and diligent manner expected of trustees (Braithwaite & Drahos, 2010: p402). Corporate ethics are reflective of the business’ philosophy, and one of its objectives is the determination of the company’s fundamental purposes.

Tuesday, October 15, 2019

OSI Model Essay Example for Free

OSI Model Essay This research paper provides information on using ASP for ERP hosting. The paper is divided into four major areas. The first area defines and briefly describes the term of The Enterprise Resource Planning (ERP) system. The second area defines and briefly describes the term of Application Service Provider (ASP). The third area provides information on how ERP can be used through ASP. This area mentions architecture, implementation, and benefits from using ERP through an ASP. The last area shows an example of an organization that has successfully implemented ERP system through ASP. Introduction Everyone has a door in their house which is usually locked. You cannot open the door without the right key. Have you ever seen a sign in a store that says â€Å"employees only†? In these two cases, the locked door and the sign on the door are like protection for your space, and it also shows who is allowed to go through the door and who is not. That is kind of what a firewall is. This paper will show you what a firewall really is in the computer domain, how it works and the different types of firewalls that exist. Definition As defined on the internet, â€Å"a firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system. It is also a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all computer traffic between different security domains based upon a set of rules and other criteria†. It is just like a wall which is usually made out of water, cement and other constituents that can stop somebody from going onto the other side or a better analogy would be a net that can let water through as an authorized item and is able to stop everything else such as fish and other sea animals. History of firewalls The term â€Å"firewall† originally meant a wall to confine a fire or potential fire within a building. The firewall technology itself emerged in 1980 while the internet was still a new technology; and as the internet technology internet was growing, the firewall technology started growing along with it. Why a firewall? Think of this. Did your dad ever tell you where he kept all his money? May be he did, and you probably heard him saying or talking about a bank account too. He knows that his money is safe when it is in the bank and he can get to it anytime he wants and money cannot be taken out of his account unless he has authorized the transfers. The same way, a computer system needs protection so that the important data it contains will not be destroyed by an unauthorized person and also ensures that it will work properly. But, to really understand the importance of the firewalls, you should first know the main functions surrounding your computer. In other words, what can you use your computer for? You can use your computer to save important files in its memory(which is a kind of an electronic space where you can store data) or communicate with someone else through the internet or create documents. With all the tools gathered, your computer should be able to function properly and do all those tasks for you. Unfortunately, there are some people out there that for one reason or another, are trying every day to steal the data on your computer or make it work improperly. And, this is the reason you need a firewall; the same reason the security guard stands in from of the bank to protect the bank against robbery. Types of Firewall Firewalls can be categorized into three basic types. Packet filters Application Gateways / Proxy Stateful Inspection Packet filters This type of firewall will perform its action by inspecting everything from the internet before it gets into your computer. Now, in your house, think of packet filter firewall as a security guard. Your dad or your mom have their rules and always tell you what to do; you have to do your home work, you have to go to bed at 9pm, you have to eat vegetables or else, no dessert for you, and so on. However, they love you so much that they hire a security guard to protect you 24/7, and he will never go anywhere. Your parents also ask a security guard not to let anyone get into the house without their permission. To do so, a security guard is given a list of people who can and cannot enter the house, this list called Access Control Lists (ACLs). Application Gateways / Proxy You parents realize that one security guard is not enough, and they want to ensure that the house is a safe place for you. Your parents call the security guard company and hire more security guards. The company suggests your parents choose its best system available called Application Gateways, also called Proxy. Your parent accepted the offer; a big gate with the security room is built in front of your house in no time. Everyone who wants to get into the house will have to go through this security room and has his Identification (ID) checked. This ID can verify who he is, where he comes from, and what business he has at your house. If an ID is valid, a person will be searched to see if he carries weapons. By doing so, you can now be sure that you are safer than ever before. Stateful Inspection There is another type of body guard called Stateful Inspection. Not only will he follow Access Control Lists (ACLs) as mentioned before, but he also takes a picture of visitors to keep on record. The next time this visitor comes, he will be recognized by the picture on his file. . How the Firewall works? The major job of a firewall is to keep anything in your computer secured. It works like a traffic light. If you are driving a car or riding a bike, you start to slow down at traffic lights and come to a complete stop if the light is red. Red lights mean you are not allowed to cross, and if it is green then you are good to go. Firewalls stand in the middle between the system and the internet. It stops or alerts you if you have anyone trying to invade your personal computer space. A firewall is like a security guard standing in front of a bar checking for IDs because you have to be twenty-one years-old in order to get into the bar. A firewall stands between two networks, and the network is just like a bar. Outside a bar is a place where everybody can sit or stand regardless of how old they are. Similarly, outside the network is where all the traffic flows, bad or good. However, inside the bar are the customers who are of legal age. Compare this to your personal computer network that is not for everyone; it is only for the traffic that you want to be in your computer. The traffic has to meet certain criteria so that firewalls can allow them into your computer. Those who meet the criteria are let in by the firewall and those who do not meet the criteria are kept out. If bad traffic is enters your computer illegally, it rings a bell to let you know that something has entered inside without your knowledge. Firewall layers A firewall is working on the third of the seven layers of OSI Model. It is a network layer. This is where the traffic passes into the network. OSI stand for Open System Interconnection and it is defined as a networking structure which is responsible for implementation of the traffic within the seven layers. To clarify the function of the seven layers in the OSI Model, let us replace OSI with a house that has seven rooms: three small bedrooms for kids, a family room, a room for the family library, and two bathrooms, one for a shower and other for a toilet. These rooms each have a different use. For example, someone living in that house cannot use the shower room for a toilet. He/she has to go to the toilet room because the shower room is designed for showers only. Each of these bedrooms has its own duty too. The same thing is true of the seven layers of the OSI model. Each layer has its own duty to perform. The master room is for mom and dad to sleep. Kids are not allowed to sleep in mom and dad`s room because the function of that room is only for dad and mom to sleep. OSI layer seven`s function is to give the last computer’s user a service; an example would be giving an email account to a certain user. Conclusion In conclusion, we will say that the firewall technology is widely used in the world of technology today. Firewalls appear sometimes as one component or as a combination of components that are really sophisticated in order to meet the requirements and to protect the user against the continuing threats from the internet world.

Monday, October 14, 2019

Rapid growth of technology

Rapid growth of technology EXECUTIVE SUMMARY In the current season, the rapid growth of technology, communication and especially the large volume of information have led many companies and organizations to use IT systems for the management and the safety of information. The main objective of this project is to implement a complete security assessment of the private hospital  «Elpis ». The firms which effectively allocate their resources for the better understanding of the risks they face, can more easily avoid unexpected situations and release resources in other directions and profitable activities (i.e. new investments), that otherwise would have potentially rejected as very dangerous. Therefore, the adoption of procedures that focus on Risk Analysis and Management can substantially help firms to prevent or control risky situations. Once, firms have identified an efficient way to measure the relationship between their risk and rewards they could significantly improve their current operations or find new profitable activities. This project investigates the risks related to the security of the hospital  «Elpis ». Specifically, it focuses on the hospital organization, the sources of operational risks and provides detail description of available technologies that can ensure the management and control of these risks. The hospital is located in Athens having two other subsidiaries called  «Mitera » in Chalkida. We know that the private hospitals interchange important medical information concerning their patients. The central IT department is established in Athens dealing with various services such as the patient registration data, patient diagnoses, management of medical information, other data saving, etc. On the other hand, the IT department in  «Mitera » hospital is obsolete with limited ability to send and receive large volume of data. Therefore, this project aims to investigate all the required procedures that can ensure the integrity and confidentiality of medical information transmission betw een the hospitals and the incessant operation of the IT services.  «Elpis » hospital is constituted by five departments: the Administrative Department, the Human Recourses Department, and Finance Department, the Secretariat-motion of Patient Department and the IT Department, while  «Mitera » hospital is organized into two departments, the Secretariat-motion of Patient Department and the IT Department. We analyse the IT department of  «Elpis » hospital which employs the head of the IT department, a network administrator, a medical software administrator, a database administrator and an information security administrator. Our analysis reveals some rules and practices that can ensure the information safety in the private hospital. Also, we have recognized significant sources of risk come from the outside environment and individuals that work in the hospital. The results of this report can be used in the improvement of medical information safety and the minimization of the possible risks. Next, we present the potential technological solutions that the hospital can adopt at a total financial cost of EURO 5000. They include the Intrusion Detection System (IDS), Antivirus, Spyware, Adware and firewall, Implementation of RAID 5, automatic fire detection mechanisms, emergency generator UPS, automatic Air conditioning control, User policy and Password policy. DETAILED ANALYSIS Description of the companys IT infrastructure In this section, we present organizational structure of  «Elpis » and  «Mitera » hospitals as well as their software part of their network. We continuous our analysis using the CRAMM methodology in order to uncover the threats and weaknesses of the IT departments. Finally, we present possible solutions that can face all these risks relevant with the operation of the IT department. The private hospital  «Elpis » is located in Athens at a building consist of 3 floors. In the first floor we find the hospitals administration and a computer room with the IT equipment. In the second floor is the pathological and chirurgical clinic, the secretariat of the clinics and the medical library. The third floor accommodates the cardiologic clinic, the secretariat of the clinic and the room of telemedicine. All the offices for each roof are connected to the same LAN. The organisational structure of private hospital  «Elpis » is constituted by five departments: The Administrative Department: has the total administrative responsibility of hospital. It applies the strategic decisions and rules which are taken through the administrative council. It aims in the appropriate allocation of responsibilities to employees and to provide the maximum good working environment. It has the responsibility for complaints and the implementation of regulation. The Human Recourses Department: Arrange for any matter relating to the official status of the hospital staff, as well as for the monitoring, organizing and control the personnel of all services of the hospital. The Finance Department: the care for the study of the economic needs of the hospital, and its contribution to preparing the budget of the hospital, making the expenditure, the liquidation of personnel acceptances and remaining compensations, procurement, management and storage of supplies and materials that needed to operate the hospital, the training of balance-sheet and assessment, the responsibility for the safeguarding of hospital fortune and the observation of economic statistical elements. The Secretariat-motion of Patient Department: arrange for any matter relating to the organization of secretarial support according with the decisions of management and other services at the hospital. It arranges the publication of tickets for admission of the sick, and compliance with waiting list admission. Also, it keeps detailed statistics of nursing movement and it grants certificates in the patients, afterwards the submission of relative application. The IT Department: has the responsibility for the organisation and operation of computerisation, processing and maintenance of computerized statistical data, providing and distribution of information in the services of hospital, in the Ministry of Health, Welfare and Social Welfare and in other relevant bodies and each other relevant work. It is responsible to research new technologies with aim to save money and increase productivity of the hospital. It provide technical support and training in the employees of hospital for each technology program that using. Also it is responsible for the security of IT programs and IT hardware. The IT infrastructure of hospital  «Elpis » consists of servers which running the medical application or others services and the ability to store all data, the network equipment (switches-Ethernet) which is used for connecting the computer room-servers and the personal computers of hospital staff and the firewall that is configured from the network administrator and monitor data traffic from the hospital on the Internet with specific criteria. In figure 1 presents the topology of the system. Hardware of Hospital Elpis: A Router (1 piece): The Router is a device which connects the workstation on the network of the hospital. The Router connects the local network of the hospital with the internet, using a leased line of 4 Mbps. Firewall (1 piece): The Firewall is a device or software that prevents access to or from a private network for which it was authorized. The Firewalls can also be applied to hardware and software, or a combination of both. It used to deter unauthorized Internet users from accessing private networks. Also firewall controls the movement of data for the region that is responsible. Switch (4 pieces): a hardware device and used to connect different components in the same network. The switches cutting useless Internet traffic and allow you an affordable high-performance network. The switch is can be used for splitting the physical LAN in two small LANs. In network of hospital this switch splits the physical LAN in two small LANs. A central switch is connected with three other switches which connect the workstations. While another switch connects the servers. Database Server (1 peace): Database Server is a device that used by one or more machines as their database. By using a database server users of the hospital have the ability to manage and organize medical data Web Server (1 peace): O web server is a computer, allowing other computers to access files that manage, using the HTTP protocol (Hyper Text Transfer Protocol). Please note that the basic web server administrator has the ultimate control of the server, unlike a simple user The Hospital uses Apache Server. Mail Server (1 peace): mail agent receives the e-mail from local users (incoming), and offered to surrender on outbound users. A computer dedicated to running such applications is also called a mail server. The transfer of medical results from the Mitera hospital to the hospital Elpis made via e-mails. Backup Server (1 peace): A Backup Server is a way to save your important medical files into one single compressed file. The best part of Backup Server is its affordable and you can transfer the compressed file onto another computer or hard drive. In addition, backup server has the possibility to administrate the tape backup machine. Tape Backup Machine (1 peace): Backup Machine provides the easiest way to backup your critical folders and files allowing access to local and network directories. The disk should be replaced at regular intervals and stored in a sheltered place. Workstastion PC (50): Each office holds, one or more desktop pc only for internal services access and development. Software of Hospital Elpis: Microsoft Exchange Server 2003 Windows XP Professional ORACLE 8 The  «Mitera » hospital has a Secretariat-motion of Patient Department, the Pathological clinic and the IT department. The medical information (patients data, patient diagnoses, etc.) is exchanged between hospitals with web-hosting or email. The communication as achieved with an ADSL 4 Mbps. The technical characteristics (see figure 2) of  «Mitera » hospital are the same with  «Elpis » hospital. Hardware of  «Mitera » Hospital: A Router (1 piece), Firewall (1 piece) Switch (4 pieces) Mail Server (1 peace) Web Server (1 peace) Storage Devices (1): are used to store the medical data. The storage devices are one of the most important components of the computer system. Workstation Pc (5) Staff Members of the group will undertake to conduct the risk analysis in Chalkis hospital. They should be trained in project risk analysis in order to fulfill their goal. Specifically, the team has the following members: Director Management: He has the overall responsibility for the project in order to succeed. He is responsible for proper organization of the team and ultimately responsible for assessing the risk analysis. Chief: He is responsible for organizing team members. Has the responsibility to evaluate the job each team member. He is responsible for implementing the risk management program. Manager system and informations: they have the responsible for the integrity and availability of systems and information Security Department: they have the responsible for security programs and to identify risks and their eliminate with using the risk analysis Security Practitioners: they have the responsible for the evaluation of security requirements for each IT systems. Risk Analysis In the previous section we described the organizational and informational structure of  «Elpis » and  «Mitera » hospitals. Now, we are describing the assets that are classified into three categories: a) software assets, b) hardware assets and c) data assets. A system can be characterized as reliable and safe when it is: a) confidential: provide access only to authorized persons. They have access to important information (medical information, personal patient data), b) availability: the service that the IT facilities provide should be incessant, c) integrity: the system should be ready at any time to provide reliably any information. Also, the information should not change by unauthorized persons. Data assets The hospital manages important medical information. Thus, the access to the internal network should not be free and the communication between the hospitals should be characterized by safety and reliability. The data assets of private hospital  «Elpis » can contain the following: Patient Records: patient personal data (patient medical history) Personnel Records: staff personal data Financial Records: financial data concerning both hospitals Statistics records: statistical data related to the number of surgeries, patient entrances, deaths, etc. In this project, we perform a risk analysis and management for two data assets, the patient files and the statistical data. Hardware assets In this category, it is classified the physical assets like the equipment facilities, buildings. We focus our analysis on hardware assets. Specifically, the hardware assets of  «Elpis » hospital can be the followings: Application server: It is the most important part of the system. The medical application is installed on the application server where the medical data processing is implemented. Moreover, other staff and financial application are installed on the application server. Database server: It makes possible to the different software to ask for information, update and delete data. Backup server: It provide access to different saved data in the system relevant to medical data, patient personal data, staff data, and other general hospital data Mail server: It facilitates the interchange of mails between the  «Elpis » hospital and the hospital in Chalkida. Also, we perform a risk analysis and management for the most important hardware assets: application server and database server. Software assets This category of applications contains software that the staff of hospital uses for data processing. The software assets of private hospital  «Elpis » can be divided into: Staff Software: They are applications that manage data of hospital staff. They permit new records, delete of records and modifications. Patient folders Software: These applications manage data relevant to the patients (personal data patient medical history). Data Statistical analysis Software: They are applications that process statistical data and help in the creation of annual reports DETERMINATION OF COUNTERMEASURES In the above section was realised the analysis for the threats and the vulnerabilities for each assets (figure 3) . In this section we analyze the countermeasures which should be taken for each threat. In addition, we proposed solutions and technical relatively with the physical and hardware section as well as the architectures and security policies. The countermeasures will be supposed in such degree in order that the hospital working in an error-tolerant. Each employee will have the appropriate privileges in system, in relation to the work which he performs. The password policy should be changed. Users must renew the password once a month and use string passwords. For devices that contain important medical information that password should be changed once a week and the rights of the user accounts to be examined by managers every two weeks. As a reference the user policy should describe the rules that will prevent the user from illegal operations (even if accidental) aiming at the confidentiality of data. The company should implement a backup policy in order to store important medical information (patient file) and data which associated with the company (any company, personal information). The backups are major because theres a danger of losing important data from the disaster of equipment or external threats or by human error (deliberate or accidental). The backup will be made every day and in time that the workload of the hospital is small. Also it should be created a monthly backup that will be stored in a separate location, in case where the initial copies have been destroyed by a natural disaster or damage of equipment or human error. The storage of data will be realised with technical of Raid 5 because the price of the disc is significantly reduced and the costs of implementation Raid 5 is now within most organisms budgets. A measure that must be taken is the installation of an emergency generator UPS which will ensure continuous operation of IT equipment even if creates problems at the central UPS. Also an emergency generator UPS should be connected with the cooling system of the computer room. In the computer room there is a simple cooling system which may not ensure the proper operation of IT systems. The most effective measure is the installation of an completed cooling system which will have automatic air conditioning control with aim to minimize the risk of a sudden increase in temperature. The confidentiality and the data integrity is an important part of the hospital. The installation of IDS device provides control of the network and intrusion detection that can come from either inside or outside of hospital and detect violations of security policies. An IDS has the ability to produce reports on the above events. In addition, a measure that must be taken is the installation of completed fire protection equipment in all spaces of the hospital (patient rooms, offices, computer room). The fire system will have the ability to detect smoke or fire and more generally the change in the temperature also in case of emergency the possibility of telephone connection with the local fire station and the police. The education and training of hospital members in safety, confidentiality and organisation issues should are realised each 2 months. Thus, hospital members acquire feeling of personal responsibility and dexterities. Finally, it should be installed Software applications which will protect the network of hospital from malicious programs. The installation of Antivirus Spyware program will take place in server with a view to automatically install and update the antivirus programs on each workstation. CONCLUSION The main objective of this report was to evaluate safety in private hospital Elpis with the method of risk analysis. The hospital has implemented some measures for the correct and safe operation of hardware and software but these measures do not cover many of the threats. The most important areas that should provide the hospital are the confidentiality, integrity and availability of data. These areas should be applied to a greater degree in the user policy and the security policy. Also, it should be implemented specific technologies which ensure in the hospital proper functioning. Access to sensitive patient information and medical research should be protected specifically by unauthorized persons. Finally, it suggested equipment to help in case of emergency.

Sunday, October 13, 2019

Orlistat :: Obesity Science Pills Papers

Orlistat In today's world, people are turning more and more to the use of Pharmaceuticals to solve their problems or to improve their health. Drugs are beingused to treat everything from hair loss to impotency. There is a new pill being developed todayto treat the problems that people face due to obesity. Orlistat, which goes by the brand name Xenical, was invented and developed by Hoffman-La Roche Inc. Headquartered in Nutley, NJ, Hoffman-La Roche is an affiliate of the company known as Roche of Basel, Switzerland. This company wants to remind us that obesity is not just a cosmetic concern anymore but is associated with a risk for other life-threatening diseases. Many people are realizing this fact now and wish to do something about their weight problems before it becomes too late. The new pill is being advertised on television, magazines, newspapers, anthe Internet as a wonder drug that helps people take off the pounds and keep them off. Heart Information groupsalso claim that the drug reduces obesity-related risk factors, such as heartdisease, stroke, high blood pressure, cholesterol levels, and insulin levels. Orlistat claims to be a replacement for the diet drug Fen-phen, which was linked to heart valve damage. One man who took part in the longest and largest study ever done with this drug says, "In my adult life, I've always been 20 to 40 pounds overweight. It has always been a problem for me." He was able to drop 21 pounds and keep them off for two years by using orlistat along with maintaining a healthy diet. One can find numerous testimonies such as this one in magazines or on the world wide web. But just how effective is this drug and is it safe for those who use it? The appeal of orlistat to people who wish to use it is that is a new and safe approach to managing obesity. The safety of the drug is its most attractive feature because it is not absorbed into the body. Instead of reducing appetite as most diet drugs do, orlistat works as a lipase inhibitor, which means that it blocks intestinal absorption of fat by locking onto the enzyme in the gut that allows fat to pass across the intestinal wall. Only the fat is blocked, allowing proteins and carbohydrates to be absorbed.

Saturday, October 12, 2019

The Instability of Female Quixote Essay -- Don Quixote Essays

The Instability of Female Quixote  Ã‚  Ã‚        Ã‚  Ã‚   In â€Å"The Female Quixote,† the whimsical nature of fiction is not just a barrier to social acceptance, but an absurdity. Following popular notions of the time, fiction is presented as a diversion and an indulgence that cannot be reconciled with reality and threatens the reader’s perception of actual experience. The theme is common, as is evident through the basis of this novel, Cervantes’s â€Å"Don Quixote,† and other works such as â€Å"Northanger Abbey† by Jane Austen. The story is a series of examples of what not to do, acting as both a cautionary tale and conduct guide. But there is a fundamental instability in the work resulting from the opposition of the moral and the means in which it is presented. The intention of the work is to depict the error of confusing fiction for reality, yet does this through fiction. The reader is expected to believe in the validity of the story’s moral, which is not to believe in stories. A work that denies its own foundation cannot function, and this remains true for â€Å"The Female Quixote.†Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   But this contradiction can only exist if there is clearly an instructive message within it. In this novel, there is no question of the negative influence of romances, only how ridiculous it makes the main character, Arabella, seem. And just how irrational is she? For the vast majority of the plot, she believes she is living inside a classical romance novel rather than 18th century Britain. She mistakes the true intentions of almost every character she meets, transposing their equivalent in courtship stories such as Cassandra, Cleopatra, Artamenes, and Clelia onto their actual selves. Because she has no aesthetic distance from romance novels and sees the motivat... ...other level of â€Å"The Female Quixote,† contradict. When the purpose rejects the basis on which it is built, the entire structure must collapse. Therefore, as entertaining as the work may be, it essentially fails through denying its own existence.             Works Cited Lennox, Charlotte. Ed. Margaret Dalziel. â€Å"The Female Quixote or The Adventures of     Ã‚  Ã‚  Ã‚   Arabella.† Oxford University Press: Oxford, 1989.   Merleau-Ponty, M. Trans. Colin Smith. â€Å"Phenomenology of Perception.† Routledge & Kegan     Ã‚  Ã‚  Ã‚   Paul: London, 1962.   Sawicki, Marianne. The Internet Encyclopedia of Philosophy. â€Å"Edmund Husserl (1859-1938).†Ã‚     Ã‚  Ã‚  Ã‚   1996. Stewart, David and Algis Mickunas. â€Å"Exploring Phenomenology: A Guide to the Field and its     Ã‚  Ã‚  Ã‚   Literature.† American Library Association: Chicago, 1974.   

Friday, October 11, 2019

Common Practices in Religion Essay

What is Religion? The term religion comes from the Latin word ‘religare’ which means to bind. In the world today, there are different forms of religious groups and followings that have unique beliefs and practices depending on their history. It is estimated that there are thousands of religions in the world, including the mainstream religious groups and others that are not known. One of the common characteristics of religious groups is that they all believe in the existence of a supreme being. However, there are those who don’t believe in religion. For such people, religion only assumes the existence of a supreme being while there is no substantive evidence to support the said belief. According to Norris & Inglehart, through the practice of atheism, atheists believe that religion is just a fallacy that might have developed in the past and passed on from generation to generation through the various teachings in culture (2011). For enthusiasts, the reason people are afraid to question religious teachings is because of the fear of repercussions that are likely to occur due to such disbelief. Under this context, religion was assumed to be a creation of scholarly studies in the past with philosophers trying to establish how religion came into being. The major question is what religion is all about and what entails the aspects of it. For most people, there is a thin line between culture and religion. This explains why different cultures have their specific religion and beliefs. However, there are various contentious issues that have never been solved over the years. One thing that would totally shift the paradigm and, in extension, the balance of nature, is if it turned out that no supreme beings the religions are based upon exist. Such a situation would totally erode the gains made in the religious world today and also lead to mass confusion among the staunch religious followers. However, some of the religious beliefs are so strong  that they cannot be influenced by any emerging trend regarding their faith. â€Å"Most of the common definition of religion excludes some fundamental facts about religion and offering an adequate explanation of what religion is† (Hood et al., 2009). From a general perspective, religion is commonly defined as the belief in God. This belief, however, is considered as vague as it excludes some of the ideas that characterize some religious followings such as atheism. If religion was to be solely defined as the belief in God, what would the other religious groups that either believe in a different supreme being and those of atheism be referred to as? This tendency of generalization is what often causes some misconception that is associated with how religion is defined. Then what is the worldview of religion and how is it defined in different places around the world? There are arguments that religion is not hard to define, but rather it is the people themselves who often create the confusion regarding its definition. According to Heelas (2005), one of the greatest challenges is how to define religion without excluding any religious beliefs or followings in the word today. However, there is a conventional way of defining religion which incorporates the primary fundamentals of religion. The following are the fundamentals of religion; The belief in a supernatural being. A clear distinction of what is regarded as the moral way of doing things in accordance with the different religious beliefs and practices. Various rituals that are commonly attributed to the religious groups from different parts of the world. Religious groups have various rituals that characterize the specific religion and establish a code of conduct in which members are supposed to operate. A specific way of communicating with God is done through prayers. However, distinct religious groups have a specific way of praying and other practices that accompany prayers. Different religious feelings that are often experienced whenever the practice is taking place. In some religious groups, members engage in incarnations and a sense of adoration. In other groups, however, there is always the aspect of guilt and repentance during religious sermons. From this approach, the worldview related to religion and what religion entails becomes clear. In most cases, it is believed that religion and religious groups in extensions are very different. This explains why there is no single approach as to what entails  religious practices. However, there is a common characteristic of religion that can be used to generalize the practice from a worldview perspective. In the world today, religion continues to shape the life of the people, whereby the religious followings and teachings provide a guideline on how people are supposed to live and interact with each other and with God. The mainstream religious groups attract millions of followers, which is an indication of just how strong religious faith is. In addition, there are thousands of religious followings that are not captured in the mainstream studies of religion but continue to exist with their distinct religious practices. Religion can, therefore, be universally defined as a compilation of religious systems that share a common belief and focus on the unique characteristics of the members of religious faith. References Heelas, P., Woodhead, L., Seel, B., Tusting, K., & Szerszynski, B. (2005). The Spiritual Revolution: Why Religion is Giving Way to Spirituality. Blackwell. Hood Jr, R. W., Hill, P. C., & Spilka, B. (2009). Psychology of religion: An empirical approach. Guilford Press. Norris, P., & Inglehart, R. (2011). Sacred and secular: Religion and politics worldwide. Cambridge University Press.

Thursday, October 10, 2019

Gendering Biology and Sociology Essay

Can we define gender both biologically and sociologically? That question is at the forefront of the continuing debate between cultural and scientific researchers. The issue stems from a fundamental difference in how to explain gender definitions in an era of fluid identities and particularized conceptions of the body. This brief essay will outline the path this debate has taken in an attempt to see where it will take us in the future. Biologists and sociologists see the world in different ways. Biologists tend to believe that the natural world should form the basis of our understanding about life while sociologists believe that culture is the primary driving force that creates our collective knowledge. In this way, a gap has been created between two competing theories about what and how gender should be defined. For example, sociologists critique the biological basis of gender because they speculate that cultural practices influence what type of biology to undertake. Physical appearance, chromosomal sequencing, personal psychology, social norms, and many other factors are at work when we ask questions that transcend sexual difference and enter the realm of gender identity definitions. In the realm of sports, we have seen how outdated scientific gender testing has proven to be unreliable in determining what counts as a male or female. As chairman of the International Olympic Committee medical commission Arne Ljungqvist notes, â€Å"Sometimes, fingers are pointed at particular female athletes, and in order to protect them, we have to be able to investigate it and clarify. † (Thomas). In order to traverse this widening gap, sociologists and biologists need a common language and framework if we hope to come to a deeper understanding of gender and how it will influence our lives. Works Cited Thomas, Katie. (2008). A Lab Is Set to Test the Gender of Some Olympic Athletes. July 30, 2008. The New York Times. Retrieved January 9, 2009 from http://www. nytimes. com/2008/07/30/sports/olympics/30gender. html

Wednesday, October 9, 2019

Business Research for Social Media Marketing help

Social media marketing is gaining a lot of popularity in every industry lately. A large number of organizations are using this platform to introduce and promote their products, conduct consumer behavior analysis and generate effective feedback in order to constantly improve their products and services. Social media allows the organizations to target a wider customer base than any other marketing platform due to its wide usage. Even though social media is becoming a very popular platform for marketing, its impact on consumer behavior has yet not been completely identified. The number of people using social media is increasing every day, but how many people are actually using social media to actually gain product knowledge before buying it yet unknown. Therefore, the basic objective of this project is to conduct research on the impact of social media marketing on the purchasing behavior of the consumers. The research proposal sets a project objective, summarizes the literature review o n the topic of social media marketing, identifies the research questions, defines the research methodology and provides the conclusion. The aim of the project is to get a clear insight into the effect that social media marketing has on consumers and other relevant issues (Li, 2007).   The objective of this project is to identify the gaps in the literature review of social media marketing. Even though in-depth research and studies have been conducted by a number of researchers regarding the usage of social media for marketing purposes, its actual impact on the buying pattern of consumers is yet not identified accurately. While marketing is one of the basic factors in expanding the profitability of any association, it is critical to ensure that the right channels are used to capture the buyers. While the current situations and extensions for the advertisers to use the online networking for affecting the objective clients have been given, what stays missing is the variable that the handy usage of these ideas has not been contemplated in subtle elements. What's more, it can be seen that most of the writing are composed with the advertisers' perspective. Therefore, the conduct of the customer is enormously accepted as latent. The viewpoints of the purchasers are requir ed to be contemplated and investigated more to infer an adjusted conclusion. It can, consequently, be said that the necessity of more extensive viewpoint rises while concentrate the effect of online networking showcasing on customer conduct (Huang & Boh, 2011).   Fuchs (2013) describes that the web-based social networking is a stage where the content of the web is modified and shared by the clients at any given time. The mind boggling parts of the online networking have been clarified in this given writing which explains on the positive and negative parts of the web-based social networking stage. The prerequisite of data in regards to the media has been set up with contextual investigations on Facebook, Google, WikiLeaks and Wikipedia. Therefore, the power of the media scene in this new stage is clarified. One might say that the different parts of the online networking has been clarified with suitable contextual analysis. Be that as it may, the viability of the same on the conduct of the standard clients is clarified in a constrained way (Fuchs, 2013).   Then again, another part of the web-based social networking as a showcasing device has been clarified too. It can be found in the review embraced by Hays et al. (2013) that the online networking is one of the intense devices which can ensure that any business can achieve a more extensive number of target clients with usage of restricted assets. The noticeable quality of these stages as the appropriate components of a goal promoting association has been expounded too. The goal showcasing associations of the main 10 most went by nations are contemplated with the assistance of semi organized meetings. It can see from the review that the use of the online networking among the DMOs is as yet not that pertinent. Nonetheless, different trial systems are directed which can be powerful in guaranteeing that the valuable business methodologies are actualized to witness significant development for the business (Hays & Page, 2013). Tuten and Solomon (2014) depict that with a specific end goal to ensure that the online networking showcasing can procure the set targets and ready to achieve any business towards impressive objectives, it is essential that the appropriate utilization of procedures are finished. It is fundamental that the most fitting technique is chosen for any given organization and it is connected such that it suits the business. What's more, it has been illustrated in the review that how the esse4ntial hypotheses of promoting can be essentially connected in the viable circle and how the most helpful business results are obtained appropriately (Kjellnas, 2014). In any case, it has been clarified by the creators that catching the consideration of the clients is insufficient to guarantee the control of client conduct. It is essential that the consideration is changed over into intrigue. In this manner, the prerequisite of connecting with into the correct correspondence channel can said to be a powerful way. The acknowledgment of the shopper towards an item is critical to ensure that the association can get the standard notoriety in the market. Subsequently, understanding their prerequisites and viewpoints has been perceived by the creators too. In this manner, the vitality of systems to impact the customer acquiring conduct has been perceived and explained by the creators.   While web-based social networking is considered as a noteworthy instrument in showcasing nowadays, the insightful energy of the buyers with respect to the same has been clarified by Solomon (2014). It has been seen by the creator that so as to ensure that the shopper conduct is influenced by the online networking advertising, it is vital that proper estimations should be possible. The general sentiment any shopper with respect to a specific situation of promoting in any commercial center is required to be considered. Thus, the idea of the customer's slant toward Marketing (CSM) has been recorded by the creator as a strong device to decide if they are persuaded enough to buy a specific item or administration which is being promoted on the online stage (Solomon, 2014).   The research questions in this report revolve around social media marketing and its impact on consumer behavior. The questions have been divided in two categories namely, primary research question and secondary research question. The primary question will be the main focus of the research proposal and the secondary question will consist of other relevant questions related to the topic. The main aim of the research is to analyse the impact of online social media networks on the buying behavior of the customers. In order to investigate and collect data for conducting the research, proper methods of data collection need to be used. It is easy to collect general information, but collecting information that is relevant to the purpose of analysis can be be difficult.. There research type can be broadly categorized into two approaches; inductive and deductive.. A deductive research can be used to anticipate the trends in future on the basis of the theories that already exist. In case of inductive research, the theories are developed on the basis of data and empirical findings. The study to be conducted in this report is inclined on inductive research that would   help to gather descriptive data and assist in obtaing empirical results. Inductive research can be used to obtain the answers for both primary and secondary question by anylzing the responses of consumers about the way they use of social media and its relevant impact on their shopping style..   The method used to carry the anlalysis in this study is qualitative research method   instead of the quantitative research method. The reason behind choosing this method is that the aim of the study to find how effective social media is when it comes to the buying behavior of the consumers, hence we need to focus more on qualitative data than on numbers. The qualitative focuses on the observations and content analysis of the data collected rather than the volume and number of data. The qualitative research tends to be more flexible and adjustable as compared to quantitative research. There are a number of different sources from which the data for the purpose of study can be gathered. The collected data can be used for various purposes, depending on the type of the information collected, hence it is very important to get the information from the right place keeping in mind the aim of the study. Primary data collection is a cost intensive process as it involves collecting the most fresh version of information mostly from people directly. Whereas secondary data is collected from various existing facts and information. For conducting analysis in this report, the method of telephonic interviews and personal interviews has been used to get a first hand version of data. After the data was collected using interviews, the impact of social media was analyzed on the purchasing power of the buyer. The majority of the people that were interviewed said that they used social media pages of a particular company to get to know about the current promotional offers and discounts that are being offered by the company. They also revealed that even if they were not planning to visit a particular store, social media offers would push them to at least go have a look. Most of these visitors ended up buying something from the store during their visit. This clearly shows that organizations that have a social media presence can easily lure the social media users into buying something for them. This however doesn’t necessarily mean profit maximization, but it definitely increases the customer base of the organization.   Consumers also used social media to find out information about organization for instance, in case of retail stores, the consumers can find about the opening and closing times of the store, the product range offered by the store, the nearest located store and other features that may assist in making the customer choose to shop in a particular store. Certain stores also offer a virtual tour online that helps the consumers to get a hypothetical visit to the store. This shows that social media surely has an impact on the buying pattern of the consumers. The secondary question in this research proposal was to find out the reasons why social media has an effect on the buying behavior of the consumers. To be more specific, Facebook has been considered as a social media platform and the interviews were conducted to find out why Facebook presence of any organization was having an impact on its customers. The first reason that was identified was that Facebook has the maximum number of users that any other social media site possesses. Additionally, people tend to spend a large amount of time on Facebook. Since the application is available on the mobile phones too, people are practically connected to Facebook all the time (Lee, 2016). A lot of respondents confessed that they do not watch tv everyday, don’t read the newspaper every day but use Facebook everyday without fail. 6 out of 10 respondents said that they use Facebook and Google to find out information about the products they want to buy. The consumers also use the comments an d feedback of other users to find out the popularity of the products among masses. This gave the users a reality check about the efficiency of the products before even buying them. The users on social media sites are genuine and reliable, who also get into discussions about a particular product or service offered by different organizations. People share their experiences and help each other with alternative options that might be unknown to someone. So, wide coverage and human interaction are the two major causes behind the effect of social media having an impact on the consumer behavior (Chaffey, 2017).   To conclude, it can be said, social media’s gaining popularity is surely having an impact on the buying behavior of consumers these days. People are not only using social media to find out about new products and services, but are also using this medium to find out about the quality of these products and services even before getting their hands on them. Social media can be used by organizations in two ways; firstly to catch the attention of consumers and secondly to use consumer feedback to improve their products. Every organization which has an active social media presence tends to become more popular among the general public in comparison to organizations with no or inactive social media presence. Since, the technology is advancing every day, the importance of social media in affecting the consumer behavior is anticipated to keep getting stronger. Chaffey, D., 2017. Global social media research summary 2017, Available at: https://www.smartinsights.com/social-media-marketing/social-media-strategy/new-global-social-media-research/ Fuchs, C., 2013. Social Media and Capitalism: In Producing the Internet. Critical, Available at: https://fuchs.uti.at/wp-content/SocialMediaCapitalism.pdf Hays, S. & Page, H., 2013. Social media as a destination marketing tool: its use by national tourism organisations. Current Issues in Tourism, 16(3). Huang, J. & Boh, W., 2011. From A Social Influence Perspective: The Impact Of Social Media On Movie Sales, Available at: https://aisel.aisnet.org/pacis2011/79/ Kjellnas, M., 2014. Social media as a marketing tool versus strategic alliance  ­ a comparison, Available at: https://www.diva-portal.se/smash/get/diva2:825909/FULLTEXT01.pdf Lee, K., 2016. Why You Should Share to Social Media in the Afternoon + More of the Latest Social Media Research, Available at: https://blog.bufferapp.com/new-social-media-research Li, C., 2007. How Consumers Use Social Networks, Available at: https://www.eranium.at/blog/upload/consumers_socialmedia.pdf Solomon, 2014. Social media marketing, Available at: https://www.docsity.com/it/social-media-marketing-t-l-tuten-e-m-r-solomon-2014/830881/