Wednesday, July 31, 2019
Lack of Self Esteem
Self esteem is defined as regarding oneself as a worthwhile person or a positive evaluation of oneself. Let's examine African adolescents self-esteem based on the following facts; parental marital status, income, family structure and functioning. Is it possible that the above mentioned facts could affect a confidence that is supposed to come from oneself? I believe these facts greatly affect the self-esteem in African boys and girls in different but very significant ways. I choose this topic because it interested me and I'll be free to express my feelings, and I willl like to help those adolescents who are lacking self-esteem with these essay because I know how it feels. I must first start my essay with pointing out where the problem originates. Having grown up in a single parent, middle class income family and being the oldest of two children, I feel that I can now understand why I sometimes felt inadequate with myself. The unspoken pressure to make my mom proud and be a ââ¬Å"goodâ⬠big sister created this inadequacy. This study definitely helped me understand this pressure and proved that unlike my thought at the time, I was not the only teenager going through this enormous drop in self-esteem. I mentioned some major facts that surrounds lack of self-esteem, 1. the parental marital status,2. the income and 3. the family structure and 4. Family Functioning. these are the functioning perspectives. First, that the self-esteem of boys and girls (boys especially) would be highly affected by their parentsââ¬â¢ marital status. Second, that both genders would have higher quality of family functioning than single parent households. The third prediction concluded that the effects of marital status on self-esteem would be less if family income was statistically matched with other families. The last hypothesis predicted that family functioning had a greater effect on self-esteem than family structure. The sample consisted of 200 fifteen year old African children from western part Nigeria with 74 being girls and the remainder boys. Parents were only included in study to provide income and marital status information. Half of the parents were married, 38% were divorced and 12% were single mothers (no single fathers were used). The average household income was #57,500, 20% of the sample had an income less than 20,000 and 35% made over 35,000 a year. The tests that were used to measure the self-esteem and the family functioning measurement of the students were the Multi-Dimensional Self Esteem Inventory (MDSEI) and the Family Environment Scale (FES). The MDSEI is a 200 question test used to assess the individual aspects of self-esteem in each child. These aspects are feelings of competence, personal power, lovability, likeability, self-control, moral self-approval, and body functioning. The FES consists of 90 true or false type questions to determine the environment within the family and itââ¬â¢s functioning. This test has proven accurate many times with African families even though the norms were determined from 285 predominately middle and upper class European American families. Each child was given $10 to partake in the tests and took them whenever was convenient. The results showed that boys with parents who are divorced are mainly at risk of developing a low self-esteem. It also showed that family functioning was directly related to self-esteem in both boys and girls. I believe that this experiment was set up and conducted very well. The experimenters used a sample that was proven to be representative of the population they sought to test, and used testing methods that were tried and true. Testing conditions were not kept controlled but this probably had a minimal effect on the childrenââ¬â¢s responses. There were no noticeable errors in the experimentation other than the small sample used and its limited application one locale.
Tuesday, July 30, 2019
Essay of william Essay
Scepticism about technological determinism emerged alongside increased pessimism about techno-science in the mid-20th century, in particular around the use of nuclear energy in the production of nuclear weapons, Nazi human experimentation during World War II, and the problems of economic development in the third world. As a direct consequence, desire for greater control of the course of development of technology gave rise to disenchantment with the model of technological determinism in academia. Modern theorists of technology and society no longer consider technological determinism to be a very accurate view of the way in which we interact with technology, even though determinist assumptions and language fairly saturate the writings of many boosters of technology, the business pages of many popular magazines, and much reporting on technology. Instead, research in science and technology studies, social construction of technology and related fields have emphasised more nuanced views that resist easy causal formulations. They emphasise that ââ¬Å"The relationship between technology and society cannot be reduced to a simplistic cause-and-effect formula. It is, rather, an ââ¬Ëintertwining'â⬠, whereby technology does not determine but ââ¬Å"â⬠¦operates, and are operated upon in a complex social fieldâ⬠(Murphie and Potts). In his article ââ¬Å"Subversive Rationalization: Technology, Power and Democracy with Technology,â⬠Andrew Feenberg argues that technological determinism is not a very well founded concept by illustrating that two of the founding theses of determinism are easily questionable and in doing so calls for what he calls democratic rationalization (Feenberg 210ââ¬â212). Prominent opposition to technologically determinist thinking has emerged within work on the social construction of technology (SCOT). SCOT research, such as that of Mackenzie and Wajcman (1997) argues that the path of innovation and its social consequences are strongly, if not entirely shaped by society itself through the influence of culture, politics, economic arrangements, regulatory mechanisms and the like. In its strongest form, verging on social determinism, ââ¬Å"What matters is not the technology itself, but the social or economic system in which it is embeddedâ⬠(Langdon Winner). In his influential but contested (see Woolgar and Cooper, 1999) article ââ¬Å"Do Artifacts Have Politics?â⬠, Langdon Winner illustrates a form of technological determinism by elaborating instances in which artifacts can have politics. Although ââ¬Å"The deterministic model of technology is widely propagated in societyâ⬠(Sarah Miller), it has also been widely questioned by scholars. Lelia Green explains that, ââ¬Å"When technology was perceived as being outside society, it made sense to talk about technology as neutralâ⬠. Yet, this idea fails to take into account that culture is not fixed and society is dynamic. When ââ¬Å"Technology is implicated in social processes, there is nothing neutral about societyâ⬠(Lelia Green). This confirms one of the major problems with ââ¬Å"technological determinism and the resulting denial of human responsibility for change. There is a loss of human involvement that shape technology and societyâ⬠(Sarah Miller). Another conflicting idea is that of technological somnambulism, a term coined by Winner in his essay ââ¬Å"Technology as Forms of Lifeâ⬠. Winner wonders whether or not we are simply sleepwalking through our existence with little concern or knowledge as to how we truly interact with technology. In this view it is still possible for us to wake up and once again take control of the direction in which we are traveling (Winner 104). However, it requires society to adopt Ralph Schroederââ¬â¢s claim that, ââ¬Å"users donââ¬â¢t just passively consume technology, but actively transform itâ⬠. In opposition to technological determinism are those who subscribe to the belief of social determinism and postmodernism. Social determinists believe that social circumstances alone select which technologies are adopted, with the result that no technology can be considered ââ¬Å"inevitableâ⬠solely on its own merits. Technology and culture are not neutral and when knowledge comes into the equation, technology becomes implicated in social processes. The knowledge of how to create and enhance technology, and of how to use technology is socially bound knowledge. Postmodernists take another view, suggesting that what is right or wrong is dependent on circumstance. They believe technological change can have implications on the past, present and future.[6] While they believe technological change is influenced by changes in government policy, society and culture, they consider the notion of change to be a paradox, since change is constant. Media and cultural studies theorist Brian Winston, in response to technological determinism, developed a model for the emergence of new technologies which is centered on the Law of the suppression of radical potential. In two of his books ââ¬â Technologies of Seeing: Photography, Cinematography and Television (1997) and Media Technology and Society (1998) ââ¬â Winston applied this model to show how technologies evolve over time, and how their ââ¬Ëinventionââ¬â¢ is mediated and controlled by society and societal factors which suppress the radical potential of a given technology.
Monday, July 29, 2019
First exam Assignment Example | Topics and Well Written Essays - 1250 words
First exam - Assignment Example The options available to the organization is to obtain a lease for 36 months with the option to purchase at the end of the lease period, purchasing the motor vehicles by taking out a loan that is repayable over a 36 month (3 year) period or one that is repayable over a 60 month (5 year) period. The 2013 Odyssey LX There are three alternatives available to the organization if it seeks to purchase a 2013 Odyssey LX as one of the vehicles to be used in carrying out the work of the organization. These vehicles will be mainly assessed based on whether to lease or buy and the repayment period to be chosen in the case of the decision to purchase. The difference in total fixed cost is not very different in the case of the 5 year purchase option and the lease option which are $29,110 and $29,548 respectively and this would make the lease option more attractive in present value terms. The 3 year purchase option is approximately $1,250 less than the 5 year purchase option but the time value of money would determine which the better option. However, other considerations when purchasing a vehicle are its fuel economy and the cost of repairs and maintenance. ... If the total miles to be travelled are well within the 45,000 miles limited then this option may be the best when the present value of money is taken into consideration. Here, an appropriate cost of capital to be used in arriving at the present value of the expenditure over the period would become a further consideration. However, if the motor vehicle is to be purchased by the organization at the end of the lease period approximately half of the total costs to the company of $13,868 would be paid at the end of year 3 and so the present value would be much less than paying the amount over a three year period. Additionally, this option presents the organization with a further option at the end of the lease period to either buy the motor vehicle or lease a new motor vehicle. Therefore, if the organization believes that it is best to get a new vehicle for various reasons including a substantial fall in the value of the vehicle, it would not be saddled with the task of selling the vehicle . One of the drawbacks of this option is that the lessor may specify the type of insurance required and this may place additional and unnecessary burden on the organization. Option 2 ââ¬â Purchase the Odyssey using a loan repayable over 3 years Purchasing the Odyssey using a loan repayable over 3 years appears to be the lowest cost option based on the information in Table 1. However, this may not be the case if the present value of the expenditure over the 3 year period is considered. As mentioned an appropriate cost of capital would have to be used in determining this. In this case the payments for the motor vehicle are spread evenly over the 3 year period. One advantage of this option is that there will be no further charges for any additional miles travelled over 45,000 as in the
Sunday, July 28, 2019
Divorce and it's effects in a child's life Essay
Divorce and it's effects in a child's life - Essay Example In fact, by the years 1999, more than half of all the American children had celebrated their 18th birthday without one or both parents due to divorce cases that had taken place earlier in their lives. Essentially, divorce has far-reaching implications in a childââ¬â¢s life, especially if such a divorce takes place in the early childhood stage (Fagan). For this reason, this paper investigates the impact of divorce on the present and future life of a child, considering the escalating divorce cases in the United States of America and all over the world. For many years, the society has been silent on divorce although it has adversely affected many children either emotionally or psychologically. Indeed, divorce between married parents can also have an adverse effect of the social wellbeing of their child (DeBord). Actually, more children live with a single parent in America today that they were over a decade ago. It is majorly because divorce has been on the rise in the United States and this normally affects the children in a greater extent (Fagan). Long ago, divorce used to be a taboo topic that no one in America wanted to talk about but the contemporary society has made it the order of the day. It actually appears as a simple legal reversal of the marital status of a person and virtually everyone, including persons of high calibre, goes through it (Royal College of Psychiatrists). While many people think that getting a divorce will help solve their martial challenges, the opposite is true to the extent that they face even more challenges in the process. Nonetheless, divorce among parents who have sired children is the most traumatic, particularly to their children. This is particularly so considering that even the mighty within the society are not left behind as far as the filing of divorce cases is concerned (DeBord). Despite the fact
Saturday, July 27, 2019
Do Abrahamic Religions (Judaism, Christianity, and Islam) Cause War Research Paper
Do Abrahamic Religions (Judaism, Christianity, and Islam) Cause War - Research Paper Example However, there are differences in the beliefs and systems that Jews, Christians and Muslim accept as legitimate. Jews hold that the Abrahamic covenant was carried down onto Isaac (Abraham's second son) and then to Jacob (Isaac's second son) and then down to Jacob's (also known as Israel's) descendants. After years of the Israelite community growing, they merited to receive the Torah, a set of Laws given directly to the Israelites through Moses. The Jews hold the Torah (first five books of the Bible) to be authoritative and the generational interpretation of the Torah from the Prophets to the Rabbis as absolutes (Idel 7). Christianity on the other hand sprouted out of Judaism because the followers believed that Jesus Christ was the son of God and this was a position that most Jews rejected and never accepted. On the other hand, Christians also did not accept the generational interpretation of the Torah as Jews did but rather focused on the life of Jesus Christ as an ideal standard interpreted by the New Testament. Islam on the other hand came up as a result of revelations received by Mohammed, a descendant of Abraham through the line of his first son, Ishmael (Schmidt-Leukel 149). Although there are clear areas that Islam seems to build on Judaism and Christianity, Islam also maintains its distinct features and elements. Islam, Christianity and Judaism cuts across elements of spirituality, morality and nationalism (Oystein, 72). In terms of spirituality, all these Abrahamic Faiths profess some element of control over the supernatural and promises humanity a pleasant life after death. Additionally, these promises comes with some responsibilities that seek to make people live according to some standards and ideals prescribed by these religions. The Jewish have a set of traditions Halackha that must be adhered to at all times in a person's life. Christians have doctrines and principles of holiness that must be followed. Muslims also have the Sunnah which sums up the traditions and instructions a s revealed to Prophet Mohammed. The institutionalization of these principles and practices amongst a group of people professing each of these three Faiths leads to the nationalism aspect of the Abrahamic Faiths. This requires the establishment of the structures of a modern nation, including a military that would protect the interest of a religious state. Based on this, I identify three main issues of misunderstanding and misuse of the Abrahamic religions that led to wars and various forms of violence throughout history. These three matters include the rise of opportunistic leaders in the original kingdoms of the founders of these
Understanding the Economic Impact prior to Wells Fargo Foreclosures Essay
Understanding the Economic Impact prior to Wells Fargo Foreclosures - Essay Example As a result of the crisis, many institutions, including those that are not directly involved in lending collapsed while others merged to stabilize amidst the crisisIn 2007, United States was hit by financial crisis, which emanated from a crisis in the subprime real estate loans (commonly called subprime crisis). One of the financial institutions involved in mortgage lending that stood the crisis is Wells Fargo & company, although its rating dropped since 2007, in the light of the financial crisis. In response to the crisis, Wells Fargo & company and other companies increased foreclosure filings by 2008 to the highest record in historical. This paper provides an overview of the subprime lending industry and state the economy in Wisconsin just prior to subprime crisis and the Wells Fargo Foreclosures. Discussion Prior to 1980s, people in Wisconsin, US, had only two choices for obtaining a mortgage. According to Knapp (2010), one could obtain a home loan insured by either the Department of Veteran affairs or by the Federal Housing administration. Borrowers with good credits histories would typically obtain new loans from a bank, saving and loan or any other financial institution. Knapp (2010) elaborates that obtaining mortgage loans became much easier with the deregulation of the lending industries in the beginning of 1980. For instance, the monetary control act and the deregulation of the Depository institutions in 1980 removed the restrictions that imposed a ceiling on the interest rates charged on mortgage loans. One remarkable impact of the deregulation is that it led to the introduction of new mortgage loans, which included ââ¬Ëadjustable rate mortgages that were particularly favorable to mortgage borrowers who had their credit profiles impaired. However, according to Knapp (2010), these events did not lead to an explosive growth in the mortgage industry until the securitization of mortgage loans in the late 1990s. The securitization option encouraged the majority of the existing mortgage lenders to adopt a new business model which Knapp (2010) refers to as ââ¬Å"originate to distributeâ⬠business model. This new model required that the credit risk posed by the mortgages loans was not exclusively to be absorbed by the lending institutions. Rather, it was to be shared with other investors in the world who purchased the Mortgage-backed securities. Knapp (2010) further argues that by 2006, approximately one-fourth of all new mortgage loans in United States were made to subprime borrowers while the other ratio was securitized and sold to investors in the United States and around the world. The increased demand for high-yield mortgage-backed securities among investors, including institutions such as hedge funds institutions and large banks, led the lenders to ratchet up their marketing efforts. They then came up with new products, which were designed specifically for the sector of the mortgage market in order to persuade individuals who were deemed to be of high credit risks to obtain mortgage loans. Among the most popular of these products were the stated-incomeâ⬠and the ââ¬Å"interest-onlyâ⬠mortgages. The stated-income loan required an applicant to simply report his or her annual income during the application process of the loan (Knapp, 2010). The lender depended on the applicantââ¬â¢s self reported income in the determination of the size of loan that one could afford. According to Knapp (2010), many applicants for the Stated-income loans grossly overstated their annual income so that they could purchase a larger home than was economically feasible given their actual incomes. An individual who obtained the Interest-only mortgage loan was required to pay interests on his
Friday, July 26, 2019
The History of Oil and Gas in China Essay Example | Topics and Well Written Essays - 1250 words
The History of Oil and Gas in China - Essay Example China was the first country to discover the presence of oil accumulations in salt wells. The Chinese identified beforehand the significance and the possible use of oil and gas in boundless applications. Early on in history, about 500 B.C., consistent with some historical accounts about China, the old Chinese express about wells with the depth of 100 feet holding a significant volume of water and natural gas. Also, the Chinese were pioneers in conceptualizing the use of bamboos to serve as pipelines to draw natural gas and oil from wells. These recovered gas and oil were originally used for lighting (Business Reference Services, "History of Oil and Gas Industry"). In addition, the Chinese eventually ventured in searching and excavating wells with depths of over 2000 feet (American Petroleum Institute, "All about Petroleum - As Old as History").While China was the first country to venture in the exploration and excavation of oil and natural gas reserves, it was not the first country to take innovative approaches in developing petroleum products like kerosene, gasoline, etc. It commenced adopting a modernistic method in developing oil and gas products only during the 1950s. Even up to the present, China is comparatively fresher in modern oil and gas discovery and production compared to the US. Initially, China was an oil importer but later managed to become independent; and even became an exporter between 1965 and 1993; however, it went back to being an importer in 1993.
Thursday, July 25, 2019
Poetry Paper Assignment Research Example | Topics and Well Written Essays - 1000 words
Poetry Assignment - Research Paper Example The style of the poem is ubiquitous within Frostââ¬â¢s poetic works, with a formal rhythmic scheme, which is A B A A B, which also leads to the theme of the poem, which Frost has purposely left ambiguous, and teeming with symbolism (Stedman, p 114). The first two lines of the poem are very famous: ââ¬Å"Two roads diverged in a yellow wood, And sorry I could not travel bothâ⬠¦Ã¢â¬ (Frost, p 10) The first two lines enrapture the reader, making them wonder about which road did he take? Why did he take one over the other? If this is a poem about the road not taken, where is it going? Perhaps this ambiguity was purposeful, as it was not a road that the author took, but more about the road the individual did or did not take. It leaves the reader to wonder in himself about the choices that he has made, or is about to make. There are only two options when making a decision, ultimately yes or no. there are only two roads here, and only one can be traveled. Both of these roads lead to somewhere, but itââ¬â¢s the somewhere that leaves the heart and mind wondering forever if they chose the right or wrong road. Just like in life, when we are faced with a crucial decision, we try to look ahead, ââ¬Å"â⬠¦And looked down one as far as I could To where it bent in the undergrowth; Then took the other, as just as fairâ⬠¦Ã¢â¬ (Frost, p 10) but still unknowing of what lies ahead. This is something that no one can truly know, what lies ahead in our lives. We can only look so far ahead to see where our road bends in the undergrowth, leaving us questioning in ourselves which one to choose. ââ¬Å"And perhaps the better claim Because it was grassy and wanted wear, Though as for that the passing there Had worn them really about the sameâ⬠¦Ã¢â¬ (Frost, p 10) Here is given the feeling of taking about taiking a different approach, a different road than the one we usually take, the one we are perhaps too familiar with. They both appear the same, but it leave s a want in the heart to travel the grassy raod, almost as though the soft green grass is calling, calling us to take the softer perhaps higher road. Although, it still remains unkown, which is the better road because they were ââ¬Å"really about the sameâ⬠. In the third stanza, the author is feeling doubt, but also portraying that doubt into the reader. ââ¬Å"And both that morning equally lay In leaves no step had trodden black. Oh, I marked the first for another day! Yet knowing how way leads on to way I doubted if I should ever come back.â⬠(Frost, p 10) Again, the roads look similar to the eye, but the meaning is deep and relative to the individual. It is understood that he must make a decision on which road to take, as must we all. Frost is imparting a longing or perhaps a loss of what is right and wrong. One way is the right way, but one may be wrong. There is an acknowledgement from Frost, that we as humans will make a decision, and choose the road we want to trav el. Regardless of our choices, Frost recognizes that we will rarely if ever try to go back to the way we were, or where we were to take a different path. Even if we are on a road of destruction, it is rare for the person to back up and take the different road, the one less traveled. We are all trying to get somewhere from somewhere else, and we have to choose which road to travel each and every time. This is truly part of Frostââ¬â¢s magic in words. Finally, in the fourth stanza, Frost seems to have resigned himself to his decision on which
Wednesday, July 24, 2019
Greek Civil War Research Paper Example | Topics and Well Written Essays - 1000 words
Greek Civil War - Research Paper Example The Communist Party found this opportunity to grab power by creating National Liberation Front, called the EAM. The other group opposing the communist viewpoint belonged to the EDES. The EDES got support from the Britain as Britain was against the expansion of communism. Winston Churchill, the then Prime-Minister of Britain met with Joseph Stalin of Germany in 1944. In a political and diplomatic bargain it was decided between both the premiers that Germany would get a stronghold in Romania if Germany supported the United Kingdomââ¬â¢s hold in Greece. The Germans had been there in Greece since the World War II, started to recede back from Greece without providing any concrete assistance to communists to remain in power although communists were quite powerful politically and militarily at that time. It started a battle between the British forces and the EAM on December 2, 1944 resulting in a win for the nationalists and reduction of the communist stronghold on Greece (Leonard par. 1 ). The first stage of civil war started some months before the Germany forces were evacuating Greece in October 1944. Parties to the Civil War in Greece were two leading guerrilla forces, the communist-supported EAM-ELAS (National Liberation Frontââ¬âNational Popular Liberation Army) and the EDES (Greek Democratic National Army).The EAM-ELAS overpowered all opposing guerrilla and political enemies except the EDES in early 1944 and established its rule in the Greek mountains, which meant end of the rule of the Greek King and his government in exile. With the withdrawal of troops by Germany, the British government supported the communists and the royal Greek guerrillas to make a coalition government in Athens but was unable to dissolve the guerrilla forces, which resulted in a bitter civil war in Athens on December 3 (Encyclopedia Britannica, ââ¬Å"Greek Civil War,â⬠par. 2). One of the reasons of the war was that the communists were against the British proposal of disarming the ELAS, therefore, declared a general strike in Athens on December, 1944. It led to a conflict between the police and the ELAS. A ceasefire was announced when Winston Churchill came to Athens resulting in withdrawal of ELAS guerrillas from Athens. An accord was made on February 12, 1945 according to which ELAS was supposed to surrender its weapons in fourteen days (ThinkQuest par. 2). This fierce battle brought the EAM-ELAM in a winning position everywhere in Greece except Athens and Thessaloniki, where the British military controlled the deteriorating situation with great difficulty (Encyclopedia Britannica, ââ¬Å"Greek Civil War,â⬠par. 2). In February 1945, the communists announced the disseverment of their forces in a conference but did not participate in the general election in Greece in March 1946 resulting in a royalist majority (Encyclopedia Britannica, ââ¬Å"Greek Civil War,â⬠par. 3). The March 1946 elections were biased towards EDES to which the communists reacted by forming the Democratic Party of Greece (DA), and issued a statement that they would continue fighting until democratic forces prevail upon and rule Greece. Initially, Communists were leading ahead because of support from the neighboring Yugoslavia and communistsââ¬â¢ strong presence in the Northern Greece (Leonard par. 2). Other important political happening included plebiscite in September 1946 establishing the rule of the Greek King once again. Communists who had gone hidden earlier once again waged
Tuesday, July 23, 2019
Joel Patrick Courtney Essay Example | Topics and Well Written Essays - 1000 words
Joel Patrick Courtney - Essay Example One of four children of working class parents, Courtney grew up in Beaverton, Oregon, near Portland. According to his older sister Dina McBride, he had an ââ¬Å"idyllicâ⬠childhood (Tilkin 2009). By the time Courtney was eleven years old, he became involved with drugs and was sent to juvenile detention at 15. His sister also testified, during his trial for the Wilberger murder, that he had sexually assaulted her at least once. A cousin told investigators of four occasions when Courtney had attempted to sexually assault her when they were both teenagers. (He was between fourteen and nineteen years old, and she was twelve to seventeen years old.) The cousin never reported the attacks because she was afraid of him (Gazette Times, 2009). When Courtney was 19, he was convicted of sex abuse and attempted rape for attacking a teenager female friend while under the influence of alcohol and drugs. His sister reported that on the encouragement of his parents, he ââ¬Å"settled downâ⬠(Tilkin, 2009) to the point that he was able to receive counseling. He got married in the early 1990s and had three children. He lived with his family near Albuquerque, New Mexico until April 2004, when they moved in with his brother- and sister-in-law in Portland. Courtneyââ¬â¢s brother-in-law got him a job with his employer, a maintenance company. Courtney used a van owned by his employer to abduct Wilberger in Corvallis, Oregon, 85 miles south of Portland, at the end of May. In June, Courtneyââ¬â¢s wife left him and returned to New Mexico; he followed her and he was arrested for a domestic disturbance. He was never charged, so after his release, he reconciled with his wife and moved in with his family in Rio Rancho, New Mexico (Gazette Times, 2009). In November, he kidnapped and raped a 22-year old University of New Mexico student, but she escaped and was able to identify Courtney as her attacker. He pleaded guilty and in 2007, was sentenced to 18 years of prison. Eventua lly, police was able to link Courtney to the Wilberger case and in spite of the lack of the body of the alleged victim, charged him with 19 counts of aggregated murder, kidnapping, sexual abuse, rape, and sodomy. In exchange for providing information about the location of Wilbergerââ¬â¢s body, a plea bargain was made, and Courtney was sentenced to life in prison without the possibility of parole, sparing him from the death penalty. The deal also provided for Courtney to serve his sentence in his home state of New Mexico (Scrabner & Netter, 2009). Wilbergerââ¬â¢s disappearance in 2004 was covered in the national media and was one of the most highly publicized murder trials in Oregon history (Moran, 2009). Wilberger, a devout Mormon whose boyfriend was serving as a missionary in Venezuela at the time, had completed her first year at Brigham Young University She was visiting and working for her sister in Corvallis at the time of her abduction. On the morning of May 24, 2004, she was last seen cleaning lamp posts in the parking lot of the apartment building her sister and brother-in-law managed, located on the edge of Oregon State University campus. Earlier that same day, Courtney had attempted to abduct two other young college students, but failed because they were able to get away (Schrabner & Netter, 2009). According to a reporter from a local television station in Corvallis, Courtneyââ¬â¢
Monday, July 22, 2019
Sweet Desdemona Essay Example for Free
Sweet Desdemona Essay Iago strategically arouses Othelloââ¬â¢s jealousy by allowing Othello to come to the conclusion that Desdemona is carrying on an illicit affair with Cassio. Iago states in a barely audible voice, as though he didnt really mean to say anything, Ha! I like not that (3. 3. 35). Othello asks him what he said, and Iago brushes him off and replies that it was nothing. After Othello inquires whether it was Cassio they had just seen, Iago replies, Cassio, my lord! No, sure, I cannot think it, / That he would steal away so guilty-like, / Seeing you coming (3. 3. 38-40). In these statements, Iago is already laying the groundwork for his scheme. He has pretended to be reluctant to discuss Cassio with Othello, and he has not explicitly accused Cassio of anything, but he has depicted Cassio in a manner that would cause Othello to be suspicious. While Desdemona is speaking to Othello, Iago remains silent. However, when Desdemona leaves, Iago asks Othello if Cassio knew of Othelloââ¬â¢s affection for Desdemona during their courtship. Othello answers that yes, and then wants to know why Iago asked. Iago replies, But for a satisfaction of my thought; / No further harm (3. 3. 97-98). Iagos use of the words further harm reassures Othello that he was merely wondering, but does so in such a way that shows he has already had harmful thoughts. Iagoââ¬â¢s feigned reluctance to discuss the topic makes him seem more credible as he is not outright attacking or doubting Desdemonaââ¬â¢s character or loyalty. His seemingly harmless comments were made to incite Othelloââ¬â¢s suspicion. Throughout the act, Iagoââ¬â¢s continued reluctance only makes Othello more curios and paranoid. Iago seems credible because he pretends to have Othelloââ¬â¢s best interests at heart. He even warns Othello against jealously. Because Iago is an old friend, Othello believes him to be honest and trusts him. In order to convince Othello of Desdemonaââ¬â¢s disloyalty, Iago concocts a story about a dream. After claiming the only reason he is telling Othello is because he loves him, Iago says that when he was sleeping with Cassio, Cassio said in his sleep, Sweet Desdemona, / Let us be wary, let us hide our loves (3. 3. 419-420). When Othello doubts Iagoââ¬â¢s tale, Iago once again disarms Othello by pretending to share the same doubts. Iago finally convinces Othello by telling him that Cassio wiped his beard with Desdemonaââ¬â¢s handkerchief. Iagoââ¬â¢s statement convinced Othello because it was not a direct accusation. Iago did not directly attack Desdemona or Cassio. He merely lied and stated that he saw Cassio wipe his beard with Desdemonaââ¬â¢s handkerchief. Iago planted seeds of doubt with regards to the loyalties of Desdemona and Cassio by asking Othello seemingly innocent questions and pretending to be reluctant to discuss the matter. In reality, Iagoââ¬â¢s comments and questions prayed on Othelloââ¬â¢s insecurities and aroused his emotions to jealousy.
Network Security Plan Essay Example for Free
Network Security Plan Essay INTRODUCTION (Purpose and Intent) The Corporation Tech IT Network Security Plan establishes guidelines for IT practices used on a day to day basis to provide a secure and robust computing environment. These practices are used in order to protect the mission, operation, and reputation of Corporation Tech System and its information systems. These system security policies, standards, and procedures that have been established for the Corporation Tech System, are intended to comply with the regulations and policies set down by the State of Florida, Corporation Tech, and the Federal Information Security Management Act (FISMA). SCOPE These standards and procedures apply to all information systems and resources under the control of Corporation Tech, including all computers connecting to the Corporation Tech network and all Corporation Tech System employees, contractors, and any other individuals who use and/or administer those systems and computers, particularly those involved with information system management. STANDARD PROVISIONS Corporation Tech IT will manage risk by identifying, evaluating, controlling, and mitigating vulnerabilities that are a potential threat to the data and information systems under its control. User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibitedà from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or Internet computing resources. In the interest of maintaining account security, passwords will be changed on a regular schedule or anytime the integrity of the account is in question. Corporation Tech IT network or computing resources may not be used for personal commercial purposes, for personal profit or to violate the laws and regulations of the United States or any other nation, or the laws and regulations of any state, city, province or other local jurisdiction in any material way. Use of Corporation Tech resources for any illegal activity may result in loss of network access privileges, official reprimand, suspension or dismissal. Corporation Tech will cooperate with any legitimate law enforcement agency or inquiry in the investigation and prosecution of any alleged wrongful activity. Corporation Techââ¬â¢s network or Internet facilities may not be used to disable or overload any computer system or network, or to circumvent any system intended to protect the privacy or security of another user. Corporation Tech owned networking and communications equipment, may only be moved by Network and Computing Support staff, or authorized agents. Reconfiguration of network hardware or software, except by designated individuals within IT, is strictly prohibited. Prior to connecting any server, network communication or monitoring device to the Corporation Tech Network, approval must be obtained from Data Center Communications. Attachment of any the following devices to the Corporation Tech network, other than those provided or approved by Network and Computing Support, is strictly prohibited: a. DHCP servers. b. DNS servers. c. NAT routers. d. Network Gateways. e. Packet capturing or network monitoring devices. f. Any device that disrupts or negatively impacts network operations. STATEMENT OF PROCEDURES The procedures for conducting a risk assessment and for the control and mitigation of risks to the Corporation Tech Information Systems include: NETWORK CONTROL Corporation Tech IT has software and systems in place that have the ability to monitor and record network, Internet and computer system usage. This includes monitoring and security systems that are capable of recording network traffic, including traffic to World Wide Web sites, chat rooms, newsgroups and e-mail messages, file servers, telnet sessions and file transfers into and out of our internal networks. This capability is necessary in order to maintain the health of Corporation Tech network operations and diagnose network related problems. Corporation Tech IT reserves the right to perform network monitoring at any time. The information collected may be used by technicians and management to assess network utilization and trends, and may also be provided to upper management or other authorities as evidence as part of any investigation of alleged policy violations. Corporation Tech IT reserves the right to perform periodic port scans, segment sweeps, and vulnerability scans on all network segments. Network operations, functions, and resources, which are not required as part of the normal and approved job duties or projects at Corporation Tech, may be bandwidth limited or blocked by network control devices in order to protect the integrity and availability of the overall system. Corporation Tech IT may suspend network access to any location or system that disrupts normal network operations or systems that violate Corporation Tech policy. In this event, an attempt will be made to contact the responsible individual to resolve the problem. DHCP SERVICES Corporation Tech IT provides centralized and redundant DHCP and DNS services for Corporation Tech. Due to the nature of these services, and because of the potential disruption of service and possible security breaches resulting from incorrect setup of additional systems, attachment of unauthorized DHCP or DNS servers is prohibited. The following guidelines must be followed when requesting or using any DHCP or DNS services: â⬠¢ Systems requiring an IP address must support DHCP and be capable of obtaining DHCP address information from one of the centrally administered University DHCP servers. â⬠¢ Using DHCP, devices requesting an IP address will be assigned a dynamic pool address from the subnet to which the device is attached. Devices with dynamically assigned IP addresses may have their address change. â⬠¢ Static IP addresses needed for server class machines or specialized clients must beà requested from the Data Center Communications Team via a Help Desk ticket. DNS SERVICES User workstations, which have been assigned a dynamic pool IP address, will have an associated DNS name assigned by the network. Any DNS name or domain name that is to be associated with Corporation Tech network, must be requested from and/or registered through Web Services. DNS names ending in corptech.com are made available upon request for Corporation Tech approved services. Requests for assignment of DNS names must be for valid Corporation Tech related purposes. DNS names for domains other than corptech.com, and which are to be hosted by Corporation Tech systems, must be requested from Web Services. Any charges for initial or ongoing registration of the requested name are the responsibility of the requestor. DNS names, not in the corptech.com domain, will be handled on a case by case basis. Corporation Tech IT will work with any user requesting a domain name to identify an appropriate and available name, however Corporation Tech IT has final approval for all DNS name assignments. WIRELESS NETWORK SERVICES Because wireless networks can be used to provide access to the same resources and services as wired network systems, the same basic procedures that are used in a wired network environment can also be applied in a wireless network environment. However, due to the nature of wireless networks, additional security and control mechanisms are needed in order to maintain the security, operation and inter-operability of both traditional and wireless systems. Wireless routers are not allowed on the Corporation Tech network unless they have been approved by Corporation Tech IT. Access to the Corporation Tech Wireless network is limited to individuals who have a Corporation Tech account except in locations where the guest network is available. The Corporation Tech Guest Network is segregated from the internal servers and resources used by authenticated users to keep the network secure. The Corporation Tech Guest Network is only available in approved areas, and require a request to be expanded into any other areas. Users of the Corporation Tech Guest Network are required to provide a valid cell phone number in order to authenticate. Destruction and Disposal of Information and Devices Restricted information must be disposed of in such manner as to ensure it cannot be retrieved and recovered by unauthorized persons. When donating, selling, transferring, surplusing or disposing of computers or removable media (such as DVDs), the proper procedures to make data unreadable on those media will be taken. Acceptable procedures are listed on ISSP-009, ââ¬Å"Medial Disposal.â⬠NETWORK ACCESS Anyone who uses the Corporation Tech computing environment must have appropriate status (e.g. management, employee, staff, or authorized third party) and must be properly authenticated when required. Access will be provided to vendors and or other Corporation Tech partners through the sponsored VIP account process, as described on http://www.corptech.com/it/services/vip.aspx. VIP accounts are reviewed and renewed on six month intervals to see if access is still needed. When an employee leaves the organization accounts will be disabled once TERM status is updated, and individual departments must approve re-activation of account access. USER COMPUTING DEVICES Users are responsible for the security and integrity of Corporation Tech information stored on their workstation, which includes controlling physical and network access to the equipment. Users may not run or otherwise configure software or hardware that may allow access by unauthorized users. Anti-virus software must be installed on all workstations that connect to the Corporation Tech Network. Corporation Tech Computers may not be used to copy, distribute, share, download, or upload any copyrighted material without the permission of the copyright owner. PHYSICAL ACCESS Access to Corporation Tech IT Data Center should be restricted to those responsible for operation and maintenance. Access by non-IT personnel is not permitted unless they are escorted by an authorized IT staff member. Computer installations should provide reasonable security measures to protect the computer system against natural disasters, accidents, loss or fluctuation of electrical power, and sabotage. Networking and computing hardware are placed in secure and appropriately cooled areas for dataà integrity and security NETWORK HARDWARE Network hardware are housed behind a locked door to protect physical access to switches and other network hardware. Access is only allowed though card access or with a checked out key. All switches and network hardware are password protected at a minimum via a local account setup on the device itself, these passwords are changed periodically as administrators leave the organization. Subnets allowed to authenticate with switch management will be restricted, to create tighter control of backend administration. Exec level access Timeouts implemented on Console and VTY lines, so that any idle sessions are terminated automatically. All switches are time synced using NTP, so that incidents can be tracked and correlated to the proper timeframe. SERVER ENVIRONMENTS All servers are subject to a security audit and evaluation before they are placed into production. Administrative access to servers must be password protected and use two-factor authentication whenever possible. Servers should be physically located in an access-controlled environment. All internal servers deployed at Corporation Tech must be owned by an operational group that is responsible for system administration. Servers must be registered with the IT department. At a minimum, the following information is required to positively identify the point of contact: a. Server owner contact(s) and location. b. Hardware and Operating System/Version c. Main functions and applications d. MAC address (If not a virtual server) Services and applications that will not be used must be disabled where practical. Access to services should be logged and/or protected through access-control methods to the extent possible. The most recent security patches must be installed on the system as soon as practical. Do not use administrator or root access when a non-privileged account can be used. Privileged access must be performed over secure channels, (e.g., encrypted network connections using SSH or IPSec). EXCEPTIONS All requests for exceptions to these standards and procedures will be handled by request, and will follow these guidelines: â⬠¢ Must be submitted in writing to and approved by the CIO or with the proper authority. â⬠¢ Will be reviewed on a case by case basis. NETWORK SECURITY Corporation Tech network design is built around three principles, Defense-in-Depth, Compartmentalization of Information and Principle of Least Privilege. Our first step was to look at what we are protecting, which is ultimately our business and clients data and information. To ensure a sound architecture we started the design of our network with scalability in mind. It is important that our design is flexible enough to meet future needs. The threats we know about and face today may not be the ones we face tomorrow. While developing security requirements for our IT system resources, we will determine if they are mission-critical or data-sensitive resources. This will allow us to determine where data confidentiality and integrity are the most important requirements, or where the priority is continuity of operation (availability). DEFENSE-IN-DEPTH Network safeguards offer the first protection barrier of IT system resources against threats originating outside the network. These threats can be in the form of intruders or malicious code. Our network design offers layered protections. What this means is the security layers complement each other; what one misses the other catches. This will be accomplished by locating security defenses in different places throughout our IT system, as well as not using two of the same types of safeguards. Although this may increase the complexity of our security system and can potentially make management and maintenance more difficult and costly, we believe the safety of the IT system resources should be based on the protection. With defense-in-depth in mind, the first layer of our network security plan starts with our network perimeter security. The principle network security defenses are firewalls, intrusion detection and prevention systems (IPS/IDS), VPN protections and content inspection systems like anti-virus, anti-malware, anti-spam and URL filtering. The traditional first line of defense against attacks is typically the firewall, which is configured to allow/deny traffic byà source/destination IP, port or protocol. Itââ¬â¢s very straight forward, either traffic is allowed or itââ¬â¢s blocked. With the advent of Next Generation firewalls, which can include application control, identity awareness and other capabilities such as IPS, web filtering, and advanced malware detection, all of these features can be controlled by one device. COMPARTMENTALIZATION OF INFORMATION Corporation Tech will have IT system resources with different sensitivity levels or different risk tolerance levels and threat susceptibilities. These resources should be located in different security zones. The idea is to hide the data or information and make it available only to those systems where it is necessary for conducting system tasks. Examples of this are: â⬠¢ E-mail, Web and DNS servers are located in the DMZ behind the perimeter firewall. â⬠¢ Databases servers such as SQL servers are located in the Database Zone, within the internal firewall/IPS. â⬠¢ Intranet servers, file servers and user workstations are in the LAN zone within the internal firewall. â⬠¢ The Internet is located in the Internet zone behind the perimeter firewall. Principle of Least Privilege Corporation Tech administrators and users will have minimal privileges necessary for proper functioning within the organization. This rule applies also to data and services made available for external users. An extension to this rule is the ââ¬Å"Need-To-Knowâ⬠principle which says that users and administrators of Corporation Tech IT system have access to only the information relevant to their role and duties performed. Other points of security that we will address in our network services availability is the single point of failure principle, the separation of duty and job rotation rules. The network paths between users and mission-critical IT system resources, all the links, devices (networking and security) as well as the servers will be deployed in redundant configurations. The goal of the separation of duty and job rotation rule is to limit an employeeââ¬â¢s ability to neglect and break the IT systemââ¬â¢s security policy. Separation of duty dictates that important tasks/functions should be performed by two or more employees. Job rotation states that there should be rotation of employees in important positions. NETWORK HARDENING For each layer of security, we will ensure they are running the most up-to-date software and operating systems, and that the devices are configured properly. SECURITY ZONES Intrusion Prevention (IPS) devices are responsible for detecting and blocking penetrations and attacks conducted by intruders and malicious malware applications. We recommend an IPS be installed in the network path between potential threat sources and sensitive IT system resources. Attacks through encrypted SSL sessions are a potential vulnerability so we recommend decrypting the sessions prior to it reaching the IPS device in order to inspect unencrypted packets. The IPS will be properly optimized and monitored to catch attackers that have slipped past the first defense (firewall/router). Internal networks will not have direct access to the Internet so a Trojan sent to a userââ¬â¢s workstation through a phishing attack would not allow the intruder to connect to the external network. Internet services are available for internal users only through company email and HTTP Proxy servers. ENABLE SECURE NETWORK ACCESS We will install a VPN that is configured to allow encrypted communication to our network from the outside. Utilizing two-factor authentication, ensuring the integrity of the users making the request. This is external-facing to our network and allows users to tunnel into our LAN from the outside once the appropriate measures are taken to secure access. SEGMENTED DMZ There will be a front-end firewall for the external traffic and a back-end firewall for the internal traffic. Firewall rules will be optimized and tightened on all publicly available systems to allow traffic to only the necessary ports and services living within the DMZ. Firewall rules have been created to only allow the source IP addresses and port to the specific servers and proxies have been added in the network from which administrators are allowed access to the systems. Systems within different VLANs (with a layer 3 switches) have been configured to help isolate and respond to incidents if a server in the DMZ is compromised. Authentication on the LAN is required before access to the DMZ is even attempted. This prevents allowing complete control over these systems at any given time. DEVICEà INTEGRITY All hardware and software will be purchased only from the manufacturer or from resellers who are authorized and certified by the equipment manufacturer. Unused physical interfaces on network devices will be shut down. Access lists that allow only those protocols, ports and IP addresses that are required by network users and services are implemented. Everything else is denied. Network device configuration file are protected from unauthorized disclosure. Steps have been taken to avoid plaintext passwords in the configuration files. This has been accomplished by using encryption and/or a salted hash with iteration to protect the confidentiality of passwords in configuration files. Change passwords/keys immediately if the network device configuration file is transmitted in the clear (or is otherwise exposed) while containing non-encrypted passwords/keys. Secure protocols will be used when transmitting network device configuration files. All unneeded services on network devices must be sh ut down. Log files will be reviewed regularly to gain an in depth understanding of normal network behavior. Any irregularity will be reported and investigated. SECURE MANAGEMENT Only secure protocol standards (SSHv2; IKEv2/IPsec; TLS v1.0+) will be used when performing remote management of network devices. Default usernames and/or passwords will not be used. The network infrastructure security policy should define password length and complexity requirements. Review the network infrastructure security policy. This policy identifies who is allowed to log in to network infrastructure devices and who is allowed to configure network devices, and defines a plan for updating network device firmware at scheduled intervals. PORT VULNERABILITES Port 25 ââ¬â Is used for SMTP (Simple Mail Transfer Protocol). It uses both tcp and udp protocols. This port used for e-mail routing between mail servers and is susceptible to many known Trojanââ¬â¢s. We are keeping this port in a closed state. Port 80 ââ¬â Is used for web traffic Hyper Text Transfer Protocol (HTTP). It uses both tcp and udp protocols. Port 80 udp is also used by someà games, like Alien vs Predator. Code Red and Nimda worms also propagate via TCP port 80 (HTTP). Also, a number of trojans/backdoors use these ports. We are keeping this port in a closed state. Port 139 ââ¬â Is used for NetBIOS. NetBIOS is a protocol used for File and Print Sharing under all current versions of Windows. By default, when File and Print Sharing is enabled it binds to everything, including TCP/IP (The Internet Protocol), rather than just the local network, meaning your shared resources are available over the entire Internet for reading and deletion, unless configured proper ly. Any machine with NetBIOS enabled and not configured properly should be considered at risk. The best protection is to turn off File and Print Sharing, or block ports 135-139 completely. We will leave this port in an open state but will turn off file and print sharing capabilities. Port 1900 ââ¬â Is used for SSDP, UPnP. UPnP discovery/SSDP, is a service that runs by default on WinXP, and creates an immediately exploitable security vulnerability for any network-connected system. It is vulnerable to denial of service and buffer overflow attacks. Microsoft SSDP Enables discovery of UPnP devices. We are keeping this port in a closed state. Port 2869 ââ¬â Is IANA registered for: ICSLAP. It uses both tcp and udp protocols and is used for Microsoft Internet Connection Firewall (ICF), Internet Connection Sharing (ICS), SSDP Discover Service, Microsoft Universal Plug and Play (UPnP), and Microsoft Event Notification. We will leave this port in an open state. Port 5357 ââ¬â Is used by Microsoft Network Discovery, and should be filtered for public networks. It uses both tcp and udp protocols. It is also IANA registered for: Web Services for Devices (WSD) a network plug-and-play experience that is similar to installing a USB device. WSD allows network-connected IP-based devices to advertise their functionality and offer these services to clients by using the Web Services protocol. WSD communicates over HTTP (TCP port 5357), HTTPS (TCP port 5358), and multicast to UDP port 3702. We will close this port and redirect traffic to HTTPS (TCP port 5358). Port 6839 ââ¬â This port is not associated with any particular services and should be closed unless it is associated and used. Port 7435 ââ¬â This port is not associated with any particular services and should be closed unless it is associated and used. Ports 9100, 9101 and 9102 ââ¬â These TCP ports are is used for printing. Port numbers 9101 and 9102 are for parallel ports 2 and 3 on the three-port HP Jetdirect external printà servers. It is used for network-connected print devices. These ports should remain open to allow print services. There are no listed vulnerabilities associated with these ports. Port 9220 This port is for raw scanning to peripherals with IEEE 1284.4 specifications. On three port HP Jetdirects, the scan ports are 9290, 9291, and 9292. It is used for network-connected print devices. This port should remain open to allow print services. There are no listed vulnerabilities associated with this port. Port 9500 ââ¬â TCP Port 9500 may use a defined protocol to communicate depending on the application. In our case we are using port 9500 to access the ISM Server. The ISM Server is used for exchanging backup and recovery information between storage devices. This port should remain open while services are in use. There are no listed vulnerabilities associated with this port. Port 62078 This port is used by iPhone while syncing. The Port used by UPnP for multimedia files sharing, also used for synchronizing iTunes files between devices. Port 62078 has a known vulnerability in that a service named lockdownd sits and listens on the iPhone on port 62078. By connecting to this port and speaking the correct protocol, itââ¬â¢s possible to spawn a number of different services on an iPhone or iPad. This port should be blocked or closed when service is not required on the device. References BEST: Network Security Policy and Procedures. (n.d.). Retrieved from http://www.ct.gov/best/cwp/view.asp?a=1245q=253996 Example Security Plan. (2014, November 17). Retrieved from http://www.binomial.com/security_plan/example_security_plan_template.php Hardening Network Infrastructure Security Recommendations for System Accreditors. (n.d.). Retrieved from https://www.nsa.gov/ia/_files/factsheets/Hardening_Network_Infrastructure_FS.pdf Network Security Policy: Best Practices White Paper Cisco. (2005, October 4). Retrieved from http://www.cisco.com/c/en/us/support/docs/availability/high-availability/13601-secpol.html Paquet, C. (2013, February 5). Security Policies Network Security Concepts and Policies. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1998559seqNum=3 SANS Information Security Resources | Information Security Policy Templates |.
Sunday, July 21, 2019
Marketing strategy at ASDA
Marketing strategy at ASDA This chapter includes the conclusions drawn from the analysis that contributes towards fulfilling the purpose of this project. Also find out the key analysis from the various chapters of research. At the end of this chapter give the outlined the limitation of research and recommends some point that Asda can provide its better services and increase profits. Chapter 1 give the brief introduction of research topic. The purpose of the study is how technology is used as a marketing strategy to increase sales and better operation of specific retail store and taken case study of Asda. The researcher has started with concept of technology and describes how effectively changes coming in retail industry through technology. also show effect of the adoption of new technology on the whole retail industry. It shows how the internet technology useful to do online business. The chapter outline the rational behind the study and how retail stores can use technology to gain competitive advantages again their competitor. It also highlighted the problem behind study, technology helps the organisation but technology is very expensive tools and must be deal with professional way to take advantages from it. The researcher has outlined the structure of whole study in chapter. Chapter2 is about the literature review; in this chapter researcher talk about Asda used its technology advancement in different field to satisfy their customer needs and requirement. New technology has helped to quicken and improved business in this global market. The nature of human are always changing they want better products and technology has helped company to satisfy their customers needs and wants.UK grocery market is very competitive and Asda has been ahead of this competition. The researcher also talks about the different types of technology used by Asda to gain competitive advantage in various fields. Asda uses scanning machine and RFID technology in their stores, which is helped to keep up to date data and also providing the security to its customers. The literature review outlines Asda uses various technologies like ISDN (Integrated Services Digital Network) and security system like Asynchronous Transfer Mode (ATM).they also uses Net Framework technology for safe and sec ure transaction over internet. Asda provide top class online services and has gain competitive advantage over its rivals, online service also comfortable shopping, because customer order products directly to their homes without visiting the busy high streets. The researcher has pointed out the importance of Marketing Mix which is basic of any business, thats four Ps are very useful to gain competition advantage and Asda has been very successive to adopted the four Ps according to their customer needs and requirements. In this chapter also discuss that Asda give the priority to provide the best services to their customers. According to kotler (2003) you should happy to all business partners, customers, suppliers and distributors for earning and long time business and Asda has been do this very successfully. Asda provide loyalty schemes to attract the customers and customers gain benefits on their purchases. Its adaptive websites has a 24hours online service which solves the customers problem online. Asda has well trained staffs for customers to serve better. The chapter also shows Asda focus on customer retention instead of the new customer acquisition, its depend on making long term relation and always try to maintain it. Asda are using database technology to keep up to date records of customers who visit its stores and serve better for next time. According to Kotler(2003) pointed out that e-marketing is more skilful for database marketing and customer relationship. The chapter also focus on how logistic technology has helped retail sector and discuss Asda invested money for high class logistic technology and well planned supply chain management systems. This helped to Asda for goods transportation in time. In addition some people criticism phase by Asda to used RFID microchip to scan products used at their stores but it has helped to provide better security at their supermarkets. Chapter 3 gives the overview of the United Kingdom Country, The retail sector of UK and the company of Asda. The study of this chapter shows the important fact of company, retail sector and country. It also pointed out the technology used by Asda. Its also show how Asda increase the market share in the industry. In short this chapter gives the general information of the country, the retail industry and the Asda Company. Chapter 4 is about the Research Methodology. In this chapter researcher pointed out the aim of the research, the approach of the research to collect data methods, the research design, data collection methods, different sampling methods and the analysis of the data. The aim of study is too know how technology helped to improve the operation of Asda and achieve their business objectives; the research design is detail plan of conducting the market research object and requires needed information to make structure for solve different marketing research problems, and it includes descriptive, empirical and exploratory research. Research has generated primary data through the questionnaire, The UK local public has filled the questionnaire and researcher used of this collected data to analyse the findings. The researcher collected secondary data from the different books, journal articles, news and websites. It was both types of qualitative and quantitative data. In this chapter researcher poi nted out the sampling methods and also suggested and recommend things to Asda so it can do improvement in its services. In this study, non probability judgemental sampling method used by researcher. Questionnaire set was distributed among the Asda customers. The researcher also pointed out the limitation of study. Chapter5 is about the finding and analysis, the researcher has analysed the collected data with the use of different graphs and charts. The researcher found out from the questionnaire which completed by people that pointed out they were happy and satisfied with the overall services and facilities provided by Asda to them, the main problem for concern was the online payment method they were worried about that their personal information might be misused and thefts might occur in their bank accounts. The other fact which came out from finding was that people were not happy about the Asda website as it was complicated and it was difficult to locate the exact goods that customer needed, but people were more happy about the charges of delivery which are less compare to other retail stores. So overall result of questionnaire was very positive and customers were happy with the services provided by Asda to them but have to improve their services in certain fields. Research aims and objectives The activities concerned with Marketing Research starting with the objectives to carry out the research and this research proved that technology used by ASDA reach these objectives and outline given below To study how technology has helped retail sectors to give better customer service and maintain customer loyalty. To observe that if the use of better logistics technology improved ASDA sales. Has online services provided by ASDA helped people shop more easily. To show that how important is marketing mix in retail sector. Research questions are as follows How online technology has improved the way business is done in the retail sector? How technology helps in better customer service and satisfaction in retail industry? How logistics technology has helped ASDA retail market to gain competitive advantage against its competitor? 2.5 Logistics Technology and E-scm at ASADAAAA Logistics technology plays a key role in the successful management of the retail business. Logistics services are a channel of the supply chain with the value of time and place utility. The internet integrates business information between supply chain partners. Logistics Technology and supply chain is managing the flow of products, their transformation in to finished products to the final buyer. The main functions are production, transportation, inventory procurement, customer satisfaction. Logistics Management plays a key role in the retail sector like ASDA have their business in different areas and supply of products and services must be efficiently carried out, there are require good relation with the suppliers of the products. /* ASADAAAA has developed the ASADAAAA Information Exchange (TIE) in association with GE Information Services (GEIS) it is an extranet solution that allows ASADAAAA and it suppliers to collaboratively exchange trading information. Information such as Electronic Point Of Sale EPOS) data, track sales and internet telephone mail (Chaffey,2007).The huge competition between the supermarkets giants like ASADAAAA and Sainsbury led to the growing importance of the Logistics Technology and Supply Chain Management. /* UK major food retailers are giving more concentration on technological development and innovation. Radio-frequency identification (RFID) is the automatic identification technology that uses radio waves to automatically tracking and identifies objects. In RFID technology uses tag for logistics purposes, this tags are bound with individual products in warehouses. They can be used as scanners with the range under 6 metres (ibid).after the used of rfid in the uk retail industry they have advantages of better tracking and forecasting ,greater efficiency and speed in stock operations. (Jones et al,2005). /*RFID technology used by ASADAAAA came into huge criticism and had to acquire permission from the European Union Legislation to use it.(ibid).People felt that if affected their privacy as the chip scanned through the individual personal bag. on 07/11/09.ASADAAAA knew the importance of satisfying the customers due to the increasing number of business that was done through its website, ASADAAAA felt the need for better after sale delivery services and made a contract with TNT Logistics UK for delivery services for its ASADAAAA Direct stores.TNT logistics has software system that include HDi home delivery system, Red Praines Dlx warehouse management system, Paragon route planning and Pen Pod for collecting electronic signatures, which makes business processes efficient and easy to have customer satisfaction(www.shippingline.biz)retrieved 07/11/09. */ E-SCM. It is apparent that supply chain management involves a firms suppliers and customers, as well as the processes used to transfer a product or service from an order in inventory to delivery. An E-SCM must also integrate technology, especially the internet, in an effort to speed communication and information flow throughout the supply chain. The internet has allowed collaboration among supply chain partners to become automated, providing access to real-time information and fostering a communication-based network for businesses to operate throughout its supply chain. ////// Figure : The IT Technologies adopted in a retail Supply chain. Nowadays Retail sectors are adopting the new application of the It technologies in supply chain management. From the figure we can see that POS (Point of Sales) is used for the retail store to sell products to customers.EDI (Electronic Data Interchange) are mainly used for the data exchange between the SC participants. RFID (Radio Frequency Identification) widely used for data capture in warehouses; and DM (Data Mining) is used in the back office for data collection of customers. The figure show the used of IT technologies in the retail sector in supply chain management and their functionalities and features. Electronic data interchange(EDI) EDI can be define as computer to computer data transmission of standardised business transitions (Walton and Marucheck, 1997), EDI is widely used to collect highly precise and very efficient information through internet and its useful to increase their orders and transaction process. Accordingly Bamfield (1994) EDI can be use for enhanced companys planning and control to a lower inventories with timely data or information. EDI is play very important roles in retail organisation because it is useful for fast business transaction ,EdI replace old traditional methods like exchanging documents such as different purchases orders, order confirmations, payment of goods, invoices. EDI also reduces other cost like postage and paper based work(Ferguson et al., 1990, Murphy and Daley, 1999).By using the EDI ,organisation like Asda has improved their business ,in sense of shorted lead time,quickly reduce stock out and improve demand forecasting of products(Vijayasarathy and Tyler, 1997). Furthermore, EDI is also beneficial in supply chain. It has one additional feature which are useful for integration and coordination ( Hill and Scudder, 2002) through frequency and automatic transfer of information to supplier and distributers which is improving information accuracy and communication between them(Murphy and Daley, 1999).This improved communication provides timely information of transaction status to customers which improves customer service of Organisation (Angeles, et al., 1998).Accordingly Ellram et al.(1999) supplier and retailers must work together to implement compatible systems in order to realise the benifits of EDI Data Mining Data mining is a way to observing large volumes of data collected in databases. firstly ,company using computer collect the all business data like retail sales, banking data/records and manufacturing data reports (Lee and Siau, 2001).then after all collected data goes to warehouses where the make database and analyser analyse the data and explore the total business situations. DM is also useful to analyse the different effect of 4Ps Price, place, promotion, Production and market share. DM is also useful to recognise that which customers group will be highly responsive to market promotion campaign. Asda also used this technology in strategic and tactical decision such as making competitive strategies ,to find out market opportunities, launch new products in markets, customer acquisition, retention and that all are useful to cost reduction. DM technique is useful for SC applicants to make intelligent marketing strategy on market targeting, segmentation, positioning and differentiation (Forcht and Cochran, 1999).By analyse point of sale data and other research data of database, the Marketing manager can able to segmentation of customer market, evaluate market segment and select particular target market segment by using DM knowledge in retail industry. The application of DM techniques is beneficial for efficient retail supply chain management, warehouse management and distribution system. The information about previous order, supplier performance and previous price are utilized by procurement unit for judging and selecting suppliers.DM techniques also useful for analyse the warehouse stock in manner to goods type, goods location and its management. DM technique is integrated existing software and hardware which provide existing information resources. RFID: It is useful for Real time data collection. RFID is give the information of products to the manager, how much stocks are available in store and how much sold to customers. According to Attaran (2007), Organisations should consider RFID if they want to increase their revenue growth, lower cost, reduce inventory, better utilise fixed assets and gain favour over its rivals. RFID is used for provides both time based and content based information. As a result retailer can get the precise, relevant and absolute information of products and their customers (Jones et al., 2005(a)).which will useful to improve their customer services. By the use of RFID , organisation has fast and reliable information transmission so reduce the manually inventory costs and increased accuracy and efficient of transport. Which automatically make the better warehouse management and reduced other operation cost (Jones et al., 2005(b)). RFID is also improved the quickly response to product request of customers. So, we can say that RFID bring wide range of benefits to retail sector supply chain, After the RFID technology introduced in the retail sector that Revolutionizing retail Supply Chain and developed the longer term strategic based on decisions which show to be a valuable component of RFID adoption . So we can say that in other words UK major food retailers are giving more concentration on technological development and innovation. Radio-frequency identification (RFID) is the automatic identification technology that uses radio waves to automatically tracking and identifies objects. In RFID technology uses tag for logistics purposes, this tags are bound with individual products in warehouses. They can be used as scanners with the range under 6 metres (ibid).after the used of rfid in the uk retail industry they have advantages of better tracking and forecasting ,greater efficiency and speed in stock operations. (Jones et al,2005). RFID has some limitations. Parker (2003) states that, Caspian a US shoppers rights group has called for worldwide boycott of Gillette for its use of RFID technology. Because they thought it was going to interfere customers personal life. The customers personal transactional data being held in the RFID tag after the POS may be misused, accessed unauthorised or disclosed, which is a potential challenge in adopting RFID. Logistics technology is expensive so industry must use it perfectly for gain benefit against their competitors. If the elements of logistics not controlled effectively than its remarkably expansive.(FernieSparks, 1988).The products or stock also expensive and if damage might become out date or might not sell. Distribution centre and ware house are costly to maintain and operate, also use for transportation vehicles are expensive and require maintenance. Companies always want to get their goods to the market fastest, try to minimize the their inventory costs and the most mileage from their services and delivery fleets are the one that succeed and most super market are connecting their logistics process with buyers and supplier.(Aghazadeh, 2004) ASDA has large scale purchasing power and established well planned supply chain management and logistics system, so it can control it suppliers and distribution, it has latest information system and associated with leading software solution providing companies and deliveries of products has helped it get advantage over its rivals. the trained staff of asda use this logistics technology to serve the consumer better and make them to satisfy. The competitive nature of the UK retail sector has organized supply chain and logistics management very important and the vast investment put into in by company like ASDA emphasizes its importance.
Saturday, July 20, 2019
Superman vs. Christ Essay -- essays research papers
ââ¬Å"Faster than a speeding bullet, stronger than a locomotive, jumps tall buildings in a single bound.â⬠Superman is known throughout the world for being the savior of a city called Metropolis. In every comic book, movie, or action figure ever presented to the public, Superman is a handsome, strong man who can defeat all odds at all times. The movie Superman was a success, showing how the superhero saved lives and yet lived a humble life. As one watches the movie, though, he might notice the many similarities between the plot of the movie and the story of Christââ¬â¢s coming. Superman, savior of the city Metropolis, mirrors the Savior of the world, Jesus Christ. Throughout the movie Superman, the names and the actions of the characters were similar to those of the Holy Bible. Two of the major name references to the biblical version deal with Superman (Kah-lel) and his father, Jor-el. In the Greek language, the name Jor-el means ââ¬Å"God,â⬠while the name Kah-lel means ââ¬Å"Little God.â⬠Another instance where the name game is played is in the case of Supermanââ¬â¢s parents, Martha and John. It does not seem as if there is any other way to make these names be closer to Mary and Joseph, who are the parents of Christ. Zod and Ursula are two other characters present in the movie whose names may not be similar to those in the Bible, but represent the devil and all that is considered evil. These are some of the examples of how the use of names plays an important role in linking Superman the movie to th...
Friday, July 19, 2019
The Machiavellian Element in Shakespeares Julius Caesar Essay
Machiavelli's Moral and social philosophy, as expressed in the prince, and the way this is related to in the political philosophy, style, and actions of Julius Caesar of Shakespeare's play For the reason that philosophy including all other branches of knowledge, from head to toe, is meant for the welfare and wellbeing of mankind thus the sacred branch of knowledge such as philosophy is all about discovering and investigating the hidden for the further wellbeing of mankind instead of putting the same human beings into the hands of totally inhuman structure based on Machiavelli's moral and social philosophy. I would rather call Machiavelli's moral and social philosophy as mere tactics of treating human being worse than live-stock. If people are still firm on calling Machiavelliââ¬â¢s recommended tactics as philosophy then, better to say, at the end of the day we will end up with egg on our face. Frankly speaking, a rather illogical viewpoint as given by Machiavelli can not be called as philosophy at any cost. Historically, Machiavelli was an Italian political theorist whose book The Prince (1513) describes the achievement and maintenance of power by a determined ruler indifferent to moral considerations. Niccolo Machiavelli (1469-1527), Italian author and statesman, is one of the outstanding figures of the Renaissance, b. Florence. Machiavelli's best-known work, Il principe [the prince] (1532), describes the means by which a prince may gain and maintain his power. His ââ¬Å"idealâ⬠prince (seemingly modeled on Cesare Borgia) is an amoral and calculating tyrant who would be able to establish a unified Italian state. The last chapter of the work pleads for the eventual liberation of Italy from foreign rule. Interpretations of The Prince... ... Machiavelli, Niccolà ³. 1560; facs. 1969. The Arte of Warre. Trans. Peter Whitehorne. Amsterdam and New York: Da Capo. Shakespeare's Machiavelli, August 5, 2003, http://web.uvic.ca/shakespeare/Library/SLT/ideas/machiavelli2.html "About Machiavelli" Section, August 5, 2003, http://www.niccolo-machiavelli.com/about.html Machiavels, August 5, 2003 http://www.shakespeare.com/queries/display.php?id=3355 "The Qualities of the Prince" by Ron King, August 5, 2003, http://www.geometry.net/detail/philosophers/machiavelli_nicolo.html Julius Caesar by William Shakespeare, Review by Edward Tanguay November 15, 1996 http://userpage.fu-berlin.de/~tanguay/book50.htm Niccolo Machiavelli, August 5, 2003, http://www.smuc.ac.uk/English/en251/en251_5.htm Concerning Liberality And Meanness, August 5, 2003, http://www.geocities.com/vitomonti2002/juliuscaesar4.html
The Plague :: The Black Death
The Black Death caused a widespread death rate over the eastern and western parts of Europe during the fourteenth century. Not only did the Black Death take a devastating toll on human life, it also played an important role in shaping European life in years to come. à à à à à The Black Death came in three forms, the bubonic, pneumonic, and septicemic. Each form killed people in itââ¬â¢s own vicious way. All forms were caused by a bacterium called Yersinia pestis. The most commonly seen form was the bubonic plague. The death rate was thirty to seventy five percent. The symptoms were inflamed lymph nodes, armpits, neck and groin. The victims were subjected to headache, nausea, aching joints, and fever of 101- 105 degrees, vomiting, and a general feeling of illness (The Black Death). Symptoms usually took one to seven days to appear. à à à à à The second most common form of the Black Death was the pneumonic plague; the victims often died before they could reach other places. The pneumonic plague mainly attacked the lungs. Symptoms included slimy sputum tinted with blood. (Sputum is saliva mixed with mucus exerted from the respiratory system.) The death rate was ninety to ninety five percent. Symptoms took one to seven days to appear. à à à à à The rarest form of the Black Death was the septicemic plague. The death rate was close to one hundred percent. The symptoms were high fever, and skin turning deep shades of purple, due to respiratory failure. Victims usually died the first day the symptoms appeared. à à à à à The disease was spread through an infectious fever caused by the Yersinia pestis, passed on by the rat flea. The infection spread to anyone that had contact with the diseased. The infected found themselves pierced by a pain throughout their whole body. Soon after they developed on their thighs or the upper arms a lump the size of a walnut which some people called them ââ¬Å"burn boils.â⬠This then pierced them until the patient violently began vomiting blood. The vomiting of blood persisted without stopping for three days, which didnââ¬â¢t give the victims any time to heal their wounds. Swellings continued to expand until they eventually exploded, with death following immediately after. The whole process from transmission to death usually lasted three or four days. The plague was deathly terrifying to have and to witness, the terrible pain and the bizarre appearance both made the plague especially terrifying. People could not only get infected through the transmission of the disease but by talking to the sick touching them or any of their things.
Thursday, July 18, 2019
Qrb/501 Week 6 Deliverable Essay
Week Six News Article Summaries Post Lehman Brothers Stock Market Crash Discussion In 2006, Brothers David and Tom Gardner started a community database to help consumers choose stocks. Developing the concept of longer-term investments over extended periods, versus the forecast method based on timing and risk. Motley Fool, the name chosen for the firm, asked staff to interview the firmââ¬â¢s top 18 investors to discuss lessons learned from the demise of Lehmanââ¬â¢s Brother Stock at the five-year anniversary mark. Seth Jayson has learned to invest a little bit each month into the best companies and has stopped looking for quick fixes. Morgan Housel, discusses his lessons: cash= options, and debt= loss of options. Another point is to consider purchasing more when the stock crashes and to view risk as a gift. The forecast profession is deceptive, and to recognize that the market has recovered in four years. David Gardner predicted the fall of Lehman Brothers six months prior to the fall, which reinforced his methods of helping investors, succeed in the market. LouAnn Lofton recommends separating emotion form investing, to think long term and purchase stocks at lower rates during the crash. Alyce Lomax indicates her fears that people have not learned from the crash and that history has a habit of repeating itself. Alex Dumortier, who is CFA, explains his perspective of considering the unimaginable as possible and to prepare for uncertain measures. Jim Mueller recommends his tool for success has b een to keep a journal. Stating his process is to analyze motivations and trends before choosing to purchase stock. Charley Travers firmly reinforces investing in companies with cash rich balance sheets and strong free cash flows. Matt DiLallo took a time out from the market post-crash and looked for longevity instead of timing, stating ââ¬Å"timing in the stock market is a foolââ¬â¢s errandâ⬠(Motley Fool Staff, 2012, n.p.). Chuck Saletta shares his process of choosing based on a solid balance sheet. Isaac Pino believes that Main Street has learned and suffered post-crash but not Wall Street, claiming that banks are still carrying too much debt and leverage. Patrick Morris supports what he learned during college studying finance, that ââ¬Å"stocks are priced to be the present values of future cash flows,â⬠and supports rate of return for stocks yielding more than savings (Motley Fool Staff, 2012, n.p.). Frank Thomas believes in planning and building a buying list whil e maintaining enough cash to support daily living costs. John Divine stresses the need to remain calm and keep the long-term goals in the big picture. Joe Tenebruso viewed the crash as an opportunity to move capital into strong companies and developed a new strategy he named Tier 1. Jake Keator learned that investing takes time and to be patient. Anders Bylund recommends the approach of keeping 10% of retirement liquid. John Reeves expresses that in a down market good companies like ââ¬Å"Starbucks and Apple,â⬠are misrepresented in the stock market but will bounce back in time (Motley Fool Staff, 2012, n.p.). In conclusion, the firm of Motley Fool explains skills learned to excel in the stock market: reinforcing long-term goals with companies in good financial shape, and consider purchasing those companiesââ¬â¢ stocks during down markets to maximize return. 2008 Crisis Still Hangs Over Credit-Rating Firms This article has some direct links to business math principles because it addresses some concerns from the 2008 financial crisis. In 2008, some financial guru(s) compared it to the great depression, revamping the name to the ââ¬Å"great recessionâ⬠(Krantz, 2013, n.p.). During this time many major corporations, financial mainly, went into some sort of bankruptcy and got a bail out from the government. In this article the author addresses how some credit rating agencies were excusing poor credit ratings and banks allowing approval of risky mortgages when they should not have. In 2008 the agenciesââ¬â¢ ratings played a critical role in the marketing of risky mortgage-backed securities, such as collateralized debt obligations. Investment banks had also bundled collections of individual mortgages, which alone can be hard to trade, into baskets that could be bought and sold like any bonds. These financial instruments were sold to investors but to sell them, the investment banks relied on the receipt of stellar ratings from the agencies to tempt investors starved for return. The author questions whether or not these companies have learned from their mistakes to avoid making the same mistakes again. This article links to this weekââ¬â¢s objectives of applying business principles to make finance and operational business decisions because, in these aforementioned instances, credit rating agencies did not do that. They did not follow the basic math principles of business and instead took a road that surpassed logic and went more into greed. By applying the business math principles these agencies would have known that the risk was too great and would not have approved such deals because of the severity of the risks. Obama to Use Lehman Anniversary to Cite Progress * In this article, the author discusses President Obamaââ¬â¢s progress on the economy. He is using the fall of the Lehman Brothers to show how much progress he has made in the economy. He is using certain math principles to try to help America get out of the financial crisis. He is trying to create a budget system but is clashing with Congress on the decisions he is making. President Obama argues that a better capitalized and regulated financial sector will give more credit. This will in turn help fuel the economy. According to the article, the federal government has paid back the debt that the accrued during bailouts of 2008. According to the Pew Research Center poll, the public is not convinced that the economy is fixed. The unemployment rate is at 7.3%, which is high. The article states this high rate is because some people have left the workforce and stopped trying to join it again. Sen. Elizabeth Warren, a Massachusetts democra t stated, ââ¬Å"We should not accept a financial system that allows the biggest banks to emerge from a crisis in record-setting shape while ordinary Americans continue to struggleâ⬠(Kuhnhenn, 2013, n.p.). Obama wants to continue with his budget and use part of the $700 billion that has been allocated to help bail out other companies. The public accepted this a general success. The end of the article states that the federal government will bring in more revenue this year but still has $700 billion budget deficit. There is a spending problem, and it must be addressed. As a business it has to have an income through goods, sales, etc. to succeed. This needs to exceed the liabilities and expense. In the end, this is not what is happening. * The DOW has a Good Week The Dayton Daily News reported that the DOW Jones industrial average had one of its best weekââ¬â¢s this year, rising 75 points (0.5%). The speculation for this positive performance included reports showing both inflation remaining stable and consumers purchasing more. Another helpful act came from Intelââ¬â¢s stock rising 66 cents (3%). Analysts found that reports varied on how the economy performed: some showed that although Americans purchased more items like cars and electronics, major clothing retailers cut profit projections for the remainder of the year because of lower sales. Wholesale prices, however, did not grow much, lending evidence that inflation is relatively stable. Investors stated that trading will likely change drastically after the Federal Reserveââ¬â¢s policy meeting on September 17-18, citing that they will decide plans for the bond purchasing program and how much they will cut back spending on those bonds. This article relates to the course objective quite directly. This weekââ¬â¢s learning objective ties this course together, taking business math principles and using them to make operational decisions. The DOW Jones shows businesses how they stand against competitors and reveal areas for potential investment. Many corporations have investment advisors watching the stock market and advising when and what to buy or sell. Business leaders watching and analyzing the DOW Jones not only reveals insight into how individual businesses perform but also shows them the prices in certain markets. This is a useful tool for investors to know where to put their money, buying stocks when prices in one market are low and selling stocks in another market where prices have peaked. Your Money: Keeping retirement on track takes focus The main focus of this article was how the financial crisis five years ago has made it harder for people wanting to retire. People today when they want to retire have to take into consideration that in order to retire today there must be a savings in place. According to a retirement survey done by PNC Perspectives people that originally planned to retire between the ages of 60 to 62 will have to work longer than originally expected (Tompor, 2013). According to the survey, ââ¬Å"About 43% of those who are not yet retired and still working said they have a pension; but about 64% of those who are retired have a pensionâ⬠(Tompor, 2013). This article also shows interviews done with Thomas Palka and Connie DeMetsenare. Thomas is a self-employed business man that does not currently have a pension plan. Thomas at the age of 52 has no plans on retiring any time soon. He knows he has to continue to work in order to have income coming in. Connie is 48 and current is investing in a 401(k) plan through her employer. He and her spouse paid cash for their current house they live in to eliminate being stuck paying a mortgage they may not be able to afford once they retire. Connie plans to retire at the age of 67. Based on this article many aspects can stop a person from retiring. Those aspects include not having a pension or 401(K) plan in place, financial crisis that can affect retirement funds, and having too much debt. To live comfortably a person must have a savings plan in place and eliminate their current debt. Reference AP, A. (2013, September 14). Dow has good week. Dayton Daily News. Retrieved from http://www.daytondailynews.com/news/business/dow-has-good-week/nZwx2/ Krantz, M. (2013, September 13). 2008 crisis still hangs over credit-rating firms. USA Today. Retrieved from http://www.usatoday.com/story/money/business/2013/09/13/credit-rating-agencies-2008-financial-crisis-lehman/2759025/ Kuhnhenn, J. (2013, September 14). Obama to use Lehman anniversary to cite progress. USA Today. Retrieved from http://www.usatoday.com/story/money/business/2013/09/14/obama-lehman-anniversary/2813687/ Motley Fool Staff, (2013, September 12). Five Years After Lehman: Investing Lessons from the Financial Crisis. Retrieved from http://www.fool.com/investing/general/2013/9/12/5-years-after-lehman-investing-lessons-from-the-fi.aspx?source=ihpsitth0000003&lidx=1
Subscribe to:
Posts (Atom)