Wednesday, December 25, 2019

Birthcontrol and the Work Of Margaret Sanger Essay

Birthcontrol and the Work Of Margaret Sanger Works Cited Missing A free race cannot be born and no woman can call herself free who does not own and control her body. No woman can call herself free until she can choose consciously whether she will or will not be a mother(Sanger A 35). Margaret Sanger (1870-1966)said this in one of her many controversial papers. The name of Margaret Sanger and the issue of birth control have virtually become synonymous. Birth control and the work of Sanger have done a great deal to change the role of woman in society, relationships between men and woman, and the family. The development and spread of knowledge of birth control gave women sexual freedom for the first time, gave them an individual†¦show more content†¦This in turn had prompted an arms race. There for many countries felt children were an important part of building a stronger military. National pride to all countries was important. European countries were competing for space and power do to what Germany called The War of the Cradle(Birth Control in America). This meant the German government had begun instilling national pride and building its nationalism from the ground up. This was at the brink of World War One. However, it was not only for nationalism that the impoverished were encouraged to reproduce. It was because children meant inexpensive labor for the new industrial factories that were springing up all over urban America and the world. There was also the ethical argument against birth control that seems to be mostly tainted with male pride. It appeared to some people to be ...increasing isolation and mobility of the individual family (Birth Control in America). It allowed people to control the size of their family thus controlling their life style as well. Fewer children meant less work more money and more time for women. With Margaret Sanger’s work, and birth control the family was reshaped in size from seven or eight children to what is more common today, which is two to three children. Birth control has always been present in society even if it was just a matter of Backyard abortions, with coat hangers. TheseShow MoreRelatedMargaret Sanger s Life And Life1272 Words   |  6 Pages Margaret Sanger was born in Corning, New York on September 14, 1879 [3] as Margaret Louise Higgins. [1] Her father, Michael Higgins, originally studied phrenology and other medical practices, but eventually moved to being a stone cutter. Her mother, Anne Higgins, was born in Ireland, and her family moved to Canada during the Potato Famine. In 1869 Michael married Anne and she went through 18 pregnancies, only 11 of which lived. [3] Margaret was the sixth child in this long line and spent her

Tuesday, December 17, 2019

Should Euthanasia Be Legalized - 864 Words

In the world, there are a number of people suffering from intractable diseases. There are patients with terminal cancer that the cells had spread to all over the body and leukemia-stricken patients who sustain their lives by agonizing anticancer treatments. Although they keep living relying on medical treatment or ventilators, their qualities of life are extremely low and even sustaining their own lives is harsher than killing themselves. In the past, there have been practices of mercy killing for incurable animals. If the animals seem impossible to recover their health, a veterinarian is able to help them reach to death. Though there are some people disagreeing with animal mercy killing, most of people agree on it and it is legal. However, when it comes to human, there is a furious controversy over euthanasia. Because there is a sharp conflict on the issue, some countries accept mercy killing lawful while others do not. The main arguments about the issue are whether the deliberate intervention on one’s life to the end is morally right or wrong. Some say euthanasia should be legalized because it is the only way to relieve harsh pain and meet ‘real happiness’ for the patients who are not expected to maintain their lives more. They also argue that people should respect the patients’ right to die as we respect humans’ right to live. In addition, they assert that huge cost paid to sustain incurable patient’s life also makes the lives of patient’s family membersShow MoreRelatedShould Euthanasia Be Legalized?1360 Words   |  6 PagesAbout 55% of terminally ill patients die in atrocious pain. Euthanasia is a practice that hasn’t been legalized in many places, and is usually performed by lethal injection. In the United States euthanasia is only legalized in Oregon, Washington, Montana, and certain areas of Texas. Some citizens feel that euthanasia should be legalized because they should have the sole right to their life. Others feel that God is the one that has the authority over a p erson’s life. There have been many cases whereRead MoreShould Euthanasia Be Legalized?971 Words   |  4 Pages Legalization of euthanasia in China Youyou Zhuang English Language Center, University of Victoria Youyou Zhuang, a student in English language center of University of Victoria. zhuangyoyo@gmail.com Legalization of euthanasia in China The hospital is a place where to cure the sickness and to save the patients. Have you ever thought a kind of â€Å"killing† could happen in the hospital? It is the â€Å"mercy killing†, also called euthanasia. Till now, euthanasia is legal in Netherlands, BelgiumRead MoreShould Euthanasia Be Legalized?1413 Words   |  6 Pagesstatement: euthanasia should be legalized. There exist numerous topics that are controversial within the criminal justice system. Euthanasia, the practice of intentionally ending a life in order to relive pain and suffering, is one that has been around for a long time. Many people believe that it should continue being illegal due to certain moral values. However, some people argue that euthanasia should be decriminalized because people should have the right to die when they want to. Euthanasia hasRead MoreShould Euthanasia Be Legalized?907 Words   |  4 Pagesactive euthanasia, which is a highly contentious issue in the United States. Voluntary active euthanasia is currently illegal in the United States. However, I believe that patients with terminal illnesses experiencing a lot of pain and misery should have the right to die the way they choose, with dignity, instead of being subjected to agony. People should be able to choose voluntary active euthanasia, if ever need be, which is why I believe that despite current policy, voluntary active euthanasia shouldRead MoreShould Euthanasia Be Legalized?1050 Words   |  5 Pagesend quickly, but knew it was not going to happen. If euthanasia and/or assisted suicide was legalized, perhaps his wish could have been true. Unfortunately, euthanasia is only legal in the states of Oregon and Washington at the current time. Euthanasia is considered immoral and wrong for contradicting a doctor’s job. However, it save s families the horrible sight of their loved ones dying, safeguards being up to protect any abuse towards euthanasia, and ultimate choice of being euthanized is upon theRead MoreShould Euthanasia Be Legalized?1272 Words   |  6 Pagesthe natural body is able to heal itself and grow. Not only is it human nature to survive and prosper, it is also instinct to be frightened of death and suffering. Euthanasia has been a topic of debate ever since the Roman and Greek physicians have started to poison terminally ill patients with their consent. Today’s definition of euthanasia is â€Å"the act or practice of killing or permitting the death of hopelessly sick or injured individuals (as persons or domestic animals) in a relatively painless wayRead MoreShould Euthanasia Be Legalized?1220 Words   |  5 Pagesincurable patients, it is rarely known that Euthanasia, a termination of one’s life with his/her self-willingness, is a release of permanent pain. On the other hand, it is committed by the doctors. Among Voluntary, non-voluntary and involuntary Euthanasia, only is Voluntary Euthanasia being universally concerned by human beings. Various fascinating facts, Australia has already approved this act and many people from other countries have also committed Euthanasia. Regarding this topic, people have beenRead MoreShould Euthanasia Be Legalized?1210 Words   |  5 Pagesconcerns is dying with dignity and not left to suffer a long and drawn out death. Euthanasia, also known as mercy killing, is a sensitive and very controversial subject. Several people believe, doctors should not participate in any action that ends a person’s life due to the Hippocratic Oath stating that doctors are obligated to save lives. Although, euthanasia is considered to be immoral and even murder, it should be legalized when a person’s quality of life, due to an incurable illness, is gradually goingRead MoreShould Euthanasia Be Legalized?1490 Words   |  6 Pagesj ust like you are in pain. What would you do? Euthanasia is and act where a person assist the death of other person and relieves him/her from pain. It is also called as mercy killing. It is controversial because, some may thing it is immoral and some may think it is against their religious values. But, the fact is, the person who suffers with pain knows the pain better than anybody. It is the person’s decision to make. Euthanasia should be legalized with the involvements of legal documents basedRead MoreShould Euthanasia Be Legalized?1970 Words   |  8 Pagespaper I’m going to prove to you why I think Euthanasia should be legalized. Euthanasia refers to taking a deliberate action with the express intention of ending a life to relieve suffering. Some interpret Euthanasia as the practice of ending a life in a painless manner. There are two forms of Euthanasia. Passive Euthanasia is when a patient gets an injection to put them to sleep and they never wake up. It’s a very fast and painless death. Active Euthanasia is when a patient does not get the medicine

Monday, December 9, 2019

Management Information Security Education -Myassignmenthelp.Com

Question: Discuss About The Management Information Security Education? Answer: Introduction The Caduceus Partners Pty Ltd, Australia, also recognized as Caduceus, has specialized in supplying the infrastructural services to the medical services. It has comprised of the Strategic IS/IT division, the ream responsible to oversee the IT infrastructure. Moreover, it has been looking actively for the latest technologies and applications bringing value to the organization. The internet security management at Caduceus has been the set of procedures and policies to manage the sensitive data of the organization systematically. The aim has been to minimize the risk and assure the business continuity through limiting the effect of the security breach proactively. The report has identified the key components of the risks, threat and vulnerabilities along with effect on Caduceus. It has determined the future scopes of risk management and the security risk mitigation procedures. The study has provided the solution for the risks and produced an effective risk analysis. Usage of Salient Features of an Established Risk Mitigation Framework: The risk management framework for the IS/IT Risk Management Project is needed to be developed to eradicate the risks related to the development or inclusion of the technologies. The framework is intended to deal with the variation of risks from the nominal values designed inherent by any manufacturing process. For mitigating the risks the processes and products should be characterized clearly (Shamala, Ahmad and Mariana 2013). The simulations are helpful tools for modeling the behavior of the process and the product. The outcomes of the numerical simulations help in recognizing the optimal design and conditions. Despite all this, the presented uncertainties in the product and the process parameters, the effect on the capability and performance could use in manufacturing the related products. This are evaluated and the related risks for the basic parameters are to be decreased or mitigated completely by the framework. In this report the ISO/IEC 27001 is chosen for controlling the selection addressing the multiple risks. It has been the internationally identified excellent framework that could help Caduceus to protect and manage the data resources such that stay secure and safe (Safa, Von and Furnell 2016). This has been helping to continually review and the refine the method done by this, not for the present and also for the future. In this way the ISO/IEC 27001 could protect the business of Caduceus along with their reputation and adding value. As documented, the framework was created with the intention to deliver the model to establish, implement, operate, monitor, review, maintain and develop the ISIT management system (Safa et al. 2015). It has been using the risk-based top down approach. I have been technologically neutral in nature. The specification has been defining the following planning process. Defining the security policy. Defining the scope of ISMS. Conducting the risk assessment. Managing of the identified risks. Selecting the control objectives and controls for implementation. Preparing the statement of applicability (Ogutcu, Testik and Chouseinoglou 2016). The above specification has been including the details to documentation, management, roles, continual improvement and internal audits, preventive and corrective actions. The standard has needed the cooperation. This has been among every sections of Caduceus. The standard has not been mandating the particular controls on information security. However it has been providing the controlling of checklists considered in the codes of practice of ISO/IEC 27002:2005. The later one has been describing the comprehensive set of the controls of information security aims. This has been setting the generally accepted of the good practice of the security controls. The ISMS has been the system of documents, processes, technology and individuals that has been helping to monitor, manage, improve and audit of the information security of Caduceus. It has been helping to control the security practices at a place cost-effectively and consistently (Cheng et al. 2013). The ISO 27001-compliant ISMS have been depending on the risk assessments regularly (Carter and Zheng 2015). Thus it has been helpful to recognize and the control the security threats as the risk appetite and the tolerance of Caduceus. Identification and Analysis of the Threats and Vulnerabilities within Caduceus The Technical Threats Threats Description Inadequate procedure The foreseeable events have not been supported by the accurate and the complete training and documentation. Improper operation The equipment operating beyond the capacity of the constraints of the manufacturer (Siponen, Mahmood and Pahnila 2014). Improper Hardware The prescribed hardware has been configured during is configured other than the proposed manner while installing. Improper software configuration The suggested software configured other than the prescribed way while installing. Unauthorized logical access Retrieving the use of the system where no access in authorized (Fenz et al. 2014). Malfeasance Having the system usage more than what has been authorized. Exceeding licensing or unsanctioned use Using the authorized system resources for the unauthorized reasons. Over or under classification The labeling of the resources at improper level of sensitivity for Caduceus. Malicious software It purposes is to deteriorate the performance if the system, destroying or modifying the data, subvert the security in any way. The operational threats Threats Description Cyber risk and the data security The cyber criminals have not been discriminating between the companies on the basis of location and size (Peltier 2016). Regulation The regulatory change is not consistent for last few years. This has been the top-most risk for any company. Along with the changes come the elevated operational risks. It needs to be managed appropriately for IS/IT Management. Outsourcing It has been cheaper but with various downsides. Here one of the key risks is the reputational risk. This also includes the continuity of services, quality, service delivery and others. Other primary risk here is the huge disruption to the services (Soomro, Shah and Ahmed 2016). Organizational change There has been huge evolution seen in many new systems and technologies. This is being implemented denoting it to be at the top of the innovation. Hence changing the technology for Caduceus has been demanding the change management and the redesigning controls and processes in the other spaces. It has been the central of the operational risks, the systems and processes, staying at the top of the changes in that area. Managerial risks The managerial risks have been another critical aspect of the strategic management at Caduceus. For improving the competitive performance and advantage the managers require to take the risks. However it has been in the uncertain environment. The formal economic assumptions of risks have been suggesting that it has been the excepted values regarding the two strategies. They have been similar but however one has been more uncertain in nature. The managers need to choose the strategy more definite results for the IS/IT Risk Management Project (Whitman and Mattord 2013). On the basis of those assumptions the agency theory has been assuming that the top managers must be monitored or compensated for achieving the better outcomes for Caduceus. Data Collection and Analysis There is the necessity of well-chosen and well implementation of chosen data for any type of evaluation. Impact evaluation is an approach that should go beyond assessing the size of the effects that means average impact in manner to identify for whom and in what manner the policy and the program has been successful (Oliveira, Thomas and Esadanal 2014). Main objectives regarding the impact analysis can be stated as the collection of the data and methods for the analysis should be chosen specifically in manner to match the specific evaluations with respond to the KEQs (Key Evaluation Questions) and the available resources. Other objective can be stated as there should be use of proper existing data and the gaps that have been created should be filled with new data (Van 2016). The collection and analysis of data should be chosen in a manner that both will be complement of strengths and weaknesses of each other in the IS/IT Risk Management. Planning Data Collection and Analysis There are various phases in this approach that includes the following: The start should be made with the whole planning for the evaluation that includes this consists of various questions that have been stated in the table 1. A well-developed theory of change can be described as the essential tool in the process of impact analysis for Caduceus that can be helpful in describing the policy or program understandings (webb et al. 2014). This will depict a casual model that can be helpful in linking the activities and inputs with the desired outcomes, outputs, and impacts. Maximum usage of existing data can be stated as the next approach for the data collection planning considering the data that has been already existing. Considering the term indicators, the aim of the evaluation should be on drawing different types of indicators such as outputs, inputs, impacts, outcomes in manner to reflect the key result in the programs of theory of change. Identifying and addressing important data gaps, which focuses on reviewing the information those are available in manner to consider whether the qualitative or quantitative analysis is capable of answering the key questions that has been stated in the table (Durn 2015). Data Collection Option Objectives that should be included Examples Retrieving existing data and documents Official stats Program records Formal implementation plan, policy documents, including the report Reviewing the documents related to the planning program a little earlier before the meeting The socio-economic, political, and health profile of the state (Cardenas, Manafhata and Rajan 2013). Collection of data from the groups or individuals Surveys or Questionnaires using web, mail face-to face or any other communication means. Interviews that includes groups, individual, key informant, projective techniques, focus group discussions Methods such as dotmocracy, hierarchical card sorting, projective techniques Interview with the program and program managers. Key informant interviews from relevant departments with the representatives. Observation Non-structured or structured Non-participant or participant Non-participatory or participatory Saved notes, videos or photos. Interaction with participants while observing the program activities. Physical measurement Geographical information Biophysical measurements Location of highly HIV infected individuals Infant weight (lIfinedo 2014) Quantitative and Qualitative Approaches in Impact Evaluation Questions Prompts Impact Evaluation identification and design Whether it has been identified or not that what is about to evaluate? Are the objectives and aims clear for the statement of evaluation? Whether the theory of change has been established or not Is there possibility of articulating the main effects and hypotheses that are about to be tested within the impact evaluation? Whether the research strategy clear or not? Is overall strategy definable in manner to meet the aims of the impact analysis (Feng et al. 2014)? Is there need of collecting additional in manner to inform the desk review this could be happened by restricting the number of key information interview? Whether there is any convincing argument for various features of the research strategy? Whether there is the availability of well-defended sampling or any case selection methodology? Is it clear or not about the fact that what should be generalized and what can be generalized to the population from where the data has been collected? Is it clear about the fact of the limitations of the design for drawing the wider inference? Whether it can be defined the impact evaluation is within the budget or not? IS it considered or not on which research could be helpful in generating the impact analysis with much efficiency (Lee 2014)? Consideration should be raised on whether the design is over resourced or over overdesigned for the purpose Data Collection and analysis Consideration has been made on the combining methods that could better impact the valuation or not? Sequencing information Through qualitative study for generating working hypotheses that can be evaluated further. Through conducting contextual study as a non-contextual survey, or a sub-sample of a large survey. Through qualitative research for assessing the importance of the average is at the local level. Through qualitative research for explaining trends or relationship, or patterns Through qualitative research for triangulating the survey results (Taha et al. 2014) Through qualitative research for enriching the analysis of trends or relationship, or patterns using the survey. Integrating methodologies Using qualitative analysis for the following: survey for selecting qualitative investigation sample Highlighting the priority issues Identifying knowledge gaps Identifying categories for the responses from survey For constructing indicators of non-material impacts. Using insights from qualitative and quantitative studies help to define population sub-group sampling frames (Kriaa et al. 2015) Merging findings Through analytical framework that can be helpful in interpreting quantitative and qualitative data Whether the identification of qualitative methods have been done or not? Change observation Through the scoring module of survey for the qualitative perception Measuring the observable change in behavior Community score card Change analysis Through contextual methods that includes ethnography, participatory research methods, interviews, theatre,focus group discussions, video analysis, andobservationand documentary. Contextual research has been considered or not The primarily extractive and transformative has been considered or not? Whether the approach of quantifying and measuring non-material (qualitative) impacts have been considered or not? Perception scoring, observable change and a mix of perception scoring and observable have been considered or not (Silva et al 2014)? Threats, risk and vulnerabilities assessment Sl.No Vulnerabilities in IS security management Likelihood Impact Priority Description Preventive measures R. 1 Dust/ Airborne particles M H M Dust and airborne particles travelling in the environment could alter the function of IT technologies and could result in inaccurate results or failure of information security management Physical security of the IT infrastructure should be given very high priority in manner to protect the infrastructure and related devices. R. 2 Earthquake VL VH H This are very less likely events however, might affect very seriously to the information security system of the organization (Malhotra 2015). The IT infrastructure should be established regarding the facts related to such natural calamities. R. 3 Failure of network components M H M Network components might cause failure or disruption due to many factors such as technical fault, bad weather and many others that might affect the exchange of information between two devices connected to the same network. Mainly, internet is the network that has been adopting by various industries and Caduceus should also implement high bandwidth internet connection. R. 4 Natural disasters L VH M Natural calamities are not most likely to happen but it also includes terrorist attack and many others that are capable of completely destroying the IT/IS management system of any organization (Feng, Wang and Li 2014). Caduceus should always be prepared for such unwanted situation and should establish the infrastructure regarding these issues, threats and vulnerabilities. R .5 Maintenance error H H M Not regularly maintain the IT components that are contributing in managing the information related to the operation activities of the organization could raise various issues related to the information security management There should be proper and regular audit for the errors that might affect the system and should maintain the update for the hardware and software of Caduceus. R. 6 Malicious Coding H VH H This is mainly done intentionally for revenge purpose or for money. This is one the major issues in the field of IT and getting multiplied by every minute this lead to the privacy and security of the individuals related to the organization. The operating system should be original and updated with the newest version; proper anti-virus should be used in all the systems including updated firewalls and anti-malwares. R. 7 Identity theft M M M This is not just the digital identity however it also includes the credentials that could be stolen by an unauthorized user that could give him or her access to the whole data that has been saved into the system (Latif et al 2014). There should be different level security for the staffs based on their position. R. 8 Misuse of Resources M VH H Resources might be used by the employees in different manner such activities that might affect the policies of the organization or many other legal aspects related to the crime for IS/IT Risk Management . There should be a large compensation for the employees violating the laws and regulations that has been established by the organization. R. 9 Malicious Insider VL H H This is a type of threat to the information that generally arises due to some formal employees those have the credentials that could give them access to the organizational network and could alter the data and information that had been saved into the database. After the retirement, resignation or distinction of any employee the passwords and other related information should be changed and agreement should also be made before employing them about not disclosing the data of the organization. R. 10 Unauthorized access M VH H There are various actions that could be put into the category of unauthorized access such as data breaches, identity theft, malicious virus attack and many more that technically states the access of the data by an individual who is not authorized to access the data that has been saved in that network (Baskerville, Spagnoletti and Kim 2014). Proper care should be given for the IS/IT Risk Management while sharing the credentials and rest precautions should be taken in increasing the information security for the data and encryption or tokenization can also be a better option for such cases. R. 11 Repudiation VH H M It focuses on the digital signature which is attached to the electronic message when an user sends it and is not a full-proof system The system should be non-repudiation. R. 12 Software failure H VH H There are chances of failures of software such as crashing, glitches and bugs that could result alter outputs (Lee 2014) There should be proper update available for the software. R. 13 Device lost or theft M VH H This could lead to the heavy lost for the organizations that allows employees to bring their own device for the official purpose and the data and information could be exposed to an unauthorized user (Silva et al. 2014) Physical security should be given priority in manner to leave behind such issues. A training program could be helpful R. 15 Social engineering attack M M H This can be described as a trick to hamper the data that has been saved into the system R. 16 No backup or loss of backup L H VH Caduceus is already aware with the importance of backup but loss of backup could affect the proper functioning of the business and could even cause privacy and security issues if placed in the wrong hands (Band et al. 2015). There should be more than one backup. Appointing third party for the management of data can also be helpful for the IS/IT Risk Management. R. 17 Legal Risks H M VH The policy of the organization should be incompatible with the policies of government The manager should properly go through the policies and laws as stated in the above report before modifying the IT infrastructure R. 18 Physical security H H M Physical security should always be the priority while implementing IT infrastructure into the existing system of the organization as these could lead to the information security issues (Albakri et al. 2014). Proper fencing and using biometric for the location where database and servers are located. R. 19 Fluctuation power supply L H H These could also lead to various issues including the crashing of whole systems Power supply should be maintained all the time Risk severity matrix Probability Very High R. 11 High R. 17 R. 5 R. 18 R. 6 R. 12 Medium R. 7 R. 15 R. 1 R. 3 R. 8 R. 10 R. 13 Low R. 16 R. 19 R. 4 Very Low R. 9 R. 2 Severity Very Low Low Medium High Very High Legal and Regulatory Requirements There are various steps in accomplishing proper regulation within the system of the Caduceus that can be listed as follows: Regulatory institution: This is the very first step in implementing the regulation within the existing system of Caduceus IS/IT Risk Management Project, which states that the regulatory actions and decisions emanate from the governmental entity that might be the parliamentary body, ministry body or any other government representative (Coffee, Sale and Henderson 2015). The institution will exist within the larger environment of the society including the social, political, and economic constraints and pressures and will have its own unique organizational characteristics. Regulatory policy: The second step, which states that the environmental and organizational characteristics of Caduceus that are contributing to the regulatory institution will be the general ones, irrespective of the procedures, practices, or rules those have been specially directed at thee regulatory behavior and decision making for the IS/IT Risk Management. It includes the consultation and transparency rules for example: regulatory impact analysis, cost-benefit analysis, impacts on small businesses or local governments, or paperwork burden analysis. The regulatory policy is also capable of including various other rules that could contribute in the structure regulatory decision making for Caduceus. For example, regulatory budgets, pay-as-you-go or one-in-one-out mandates, or requirements for legislative authorisation of certain regulations initiated at a ministry oragency level could be considered here for Caduceus. Regulation: Regarding the regulation under evaluation the ROI (regulation of interest), there will different regulations the might affect and exist the behaviour of the organization and the individuals connected with the organization (Laudon and laudon 2016). Implementation: The regulations conceivably have the capability to quickly affect the adoption within the organization. If the regulations have been planner in targeting the law; they could be implemented and enforced into the law before the government takes any steps towards this approach of IS/IT Risk Management. Behavioural change: This will be the first consideration about how the individuals related to the organization are being affected due to the implementation of these regulations. In general behavioural change might occur as intend for example there are the chances that the speed limits or breakers might cause the driver to drive slowly. There are the possibilities of various types of influences on the behaviour that might lie beyond the regulations and their implementations at Caduceus. Intermediate outcomes: Outcomes in this case can be represented as the effects of regulations in the real world. These are the outcomes that casual relation to the ultimate outcomes. This also explains about typical intermediate outcomes that could raise concerns about other outcomes that include costs and various other side effects in IS/IT Risk Management. Ultimate outcomes: UOC (Ultimate outcomes of concern) refers to the reduction or solution of the primary problems those had been animated the regulation. It might reflect to the public health, safety,environmental quality, domestic security, or economic competition, to pick several commonexamples of problems that justify government regulation. For few cases this could cover more than one outcome of concern that could justify the regulations. Although the outcomes may be of ultimate concern, this does not mean that they are of absolute concern. As already noted,few if any regulatory problems call for solutions to be made at any cost. Thus, in addition to a regulations impact on its ultimate outcome of concern, it could ultimately lead to other outcomes as well for Caduceus Conclusion Based on the above report it can be concluded that Caduceus could use this risk management report for enhancing the performance of both of its sections and manage the information security for the data and information that are being saved into the system. Risk mitigation framework has been proposed in this report that could be helpful in assessing the risks related to the IT or IS within the organizational existing system. Thereafter, emphasis has been given on the impact analysis that could be the best approach for paving the path of a strong secured IT structure within the organization in manner to manage the information and operational activities related to the Caduceus. After that a risk assessment has been provided related to the threats, vulnerabilities and other issues that might affect the information security issues within the organization. In this assessment the vulnerabilities have been provided with their impact and probability of happening and based on that a risk severit y matrix has also been proposed in this report. This matrix could be helpful in prioritizing the risks and based on that the precautions could be taken or a manager could decide which risk should be mitigated at the very first for the IS/IT Risk Management Project. This report presents a concise thorough research on the IT/IS risk management in manner to enhance the security within the organizational information covering many aspects related to the regulation and policies that might affect the implementation of IT infrastructure within the Caduceus. References: Albakri, S.H., Shanmugam, B., Samy, G.N., Idris, N.B. and Ahmed, A., 2014. Security risk assessment framework for cloud computing environments.Security and Communication Networks, 7(11), pp.2114-2124 Band, I., Engelsman, W., Feltus, B.C., Paredes, S.G. and Diligens, D., 2015.Modeling Enterprise Risk Management and Security with the ArchiMate. Baskerville, R., Spagnoletti, P. and Kim, J., 2014. Incident-centered information security: Managing a strategic balance between prevention and response. Information Management, 51(1), pp.138-151. Cardenas, A.A., Manadhata, P.K. and Rajan, S.P., 2013. Big data analytics for security.IEEE Security Privacy, 11(6), pp.74-76. Carter, W.A. and Zheng, D.E., 2015. The Evolution of Cybersecurity Requirements for the US Financial Industry.Center for Strategic and International Studies. Cheng, L., Li, Y., Li, W., Holm, E. and Zhai, Q., 2013. Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers Security, 39, pp.447-459. Coffee Jr, J.C., Sale, H. and Henderson, M.T., 2015. Securities regulation: Cases and materials. Dunn, W.N., 2015. Public policy analysis.Routledge. Feng, N., Wang, H.J. and Li, M., 2014. A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis. Information sciences, 256, pp.57-73. Feng, N., Wang, H.J. and Li, M., 2014. A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis. Information sciences, 256, pp.57-73. Fenz, S., Heurix, J., Neubauer, T. and Pechstein, F., 2014.Current challenges in information security risk management.Information Management Computer Security, 22(5), pp.410-430. Ifinedo, P., 2014. Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition. Information Management, 51(1), pp.69-79. Kriaa, S., Pietre-Cambacedes, L., Bouissou, M. and Halgand, Y., 2015.A survey of approaches combining safety and security for industrial control systems.Reliability Engineering System Safety, 139, pp.156-178. Latif, R., Abbas, H., Assar, S. and Ali, Q., 2014. Cloud computing risk assessment: a systematic literature review. In Future Information Technology (pp. 285-295). Springer, Berlin, Heidelberg. Laudon, K.C. and Laudon, J.P., 2016. Management information system.Pearson Education India. Lee, M.C., 2014. Information security risk analysis methods and research trends: AHP and fuzzy comprehensive method. International Journal of Computer Science Information Technology, 6(1), p.29. Lee, M.C., 2014. Information security risk analysis methods and research trends: AHP and fuzzy comprehensive method. International Journal of Computer Science Information Technology, 6(1), p.29. Malhotra, Y., 2015. Cybersecurity Cyber-Finance Risk Management: Strategies, Tactics, Operations, , Intelligence: Enterprise Risk Management to Model Risk Management: Understanding Vulnerabilities, Threats, Risk Mitigation (Presentation Slides). ?t, G., Testik, .M. and Chouseinoglou, O., 2016. Analysis of personal information security behavior and awareness.Computers Security, 56, pp.83-93. Oliveira, T., Thomas, M. and Espadanal, M., 2014.Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors.Information Management, 51(5), pp.497-510. Peltier, T.R., 2016.Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Safa, N.S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N.A. and Herawan, T., 2015.Information security conscious care behaviour formation in organizations.Computers Security, 53, pp.65-78. Safa, N.S., Von Solms, R. and Furnell, S., 2016.Information security policy compliance model in organizations.computers security, 56, pp.70-82. Shamala, P., Ahmad, R. and Yusoff, M., 2013.A conceptual framework of info structure for information security risk assessment (ISRA).Journal of Information Security and Applications, 18(1), pp.45-52. Silva, M.M., de Gusmo, A.P.H., Poleto, T., e Silva, L.C. and Costa, A.P.C.S., 2014.A multidimensional approach to information security risk management using FMEA and fuzzy theory.International Journal of Information Management, 34(6), pp.733-740. Silva, M.M., de Gusmo, A.P.H., Poleto, T., e Silva, L.C. and Costa, A.P.C.S., 2014.A multidimensional approach to information security risk management using FMEA and fuzzy theory.International Journal of Information Management, 34(6), pp.733-740. Siponen, M., Mahmood, M.A. and Pahnila, S., 2014. Employees adherence to information security policies: An exploratory field study. Information management, 51(2), pp.217-224. Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), pp.215-225. Taha, A., Trapero, R., Luna, J. and Suri, N., 2014, September.Ahp-based quantitative approach for assessing and comparing cloud security. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on (pp. 284-291). IEEE. VAN HEMELRIJCK, A.D.I.N.D.A., 2016. GOVERNANCE IN MYANMAR.Evaluation. Webb, J., Ahmad, A., Maynard, S.B. and Shanks, G., 2014. A situation awareness model for information security risk management.Computers security, 44, pp.1-15. Whitman, M. and Mattord, H., 2013.Management of information security.Nelson Education.

Monday, December 2, 2019

The Effects of the Industrial Revolution Essay Example

The Effects of the Industrial Revolution Essay T The Industrial Revolution began in the eighteenth century marking the transformation of economic power and productivity. Not only was there concentration on agriculture, as their main source of an economy, and started to concern themselves with commerce, trade, and exploration of new technologies. Working toward great financial success to make a profit. Even though the machinery was new the main power source was human labor. Production took place in homes and small workshops. The primary labor force was drawn specifically to the young, as the industrial revolution began in semi-normal locations. The effects of the Industrial revolution were harsh on children, and it made people feel like all they were good for was work, during this economic crisis the economic conditions were harsh. During urban domesticity conditions children were less of an economic benefit and more of an economic burden. The families and the children that had to live threw this period did not see any economic or personal gain. Many children lost their families due to an insufficient economy poverty rates in. Families were forced to make irrational decision, giving up their children to go out and work at an early childhood. We will write a custom essay sample on The Effects of the Industrial Revolution specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on The Effects of the Industrial Revolution specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on The Effects of the Industrial Revolution specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Children were used as cheap labor to earn their keep and received little to no pay. Children that were orphans were often used and treated worse than other children. With long and tough workdays that consisted of twelve to fourteen hours. Before labor laws were put into place countless accidents occurred. Many companies thought that using children were the best source of workers. Children were used as cheap labor to earn their keep. With their small bodies they were able to move around the chimneys and clean them well. The machines burned lots of fuel to operate which caused an increase of pollution. The soot was constantly in their clothes and hair and it was a way of living for them. Not knowing that they were breathing this soot would cause short and long term health problems in the future. Some short-term effects consist of irritation to the eyes, nose and throat, and upper respiratory infections such as bronchitis and pneumonia. Other symptoms can include headaches, nausea, and allergic reactions. Long-term health effects can contain chronic respiratory disease, lung cancer, heart disease, and even damage to the brain, nerves, liver, or kidneys. They worked and slept in poor conditions. The children paid their way through work. Education at this time was secondary and working was traditional and customary. Some of the children’s’ parents were concerned about them growing up without getting a decent education. The Authors facts tell how the children were treated during the industrial revolution. Blake states that at a young age children were being sold out of their families and used as very cheap labor services. It was during a time of industrial management. All the kids had were their dreams of a better economy, so they could go play freely, like children should. All they had were their dreams of a better tomorrow as long as they keep the faith and believe. He also stated in the poem that they were kept shaved and was continuously covered in soot from head to toe. For the owners of these companies and others investing in the industry hiring children was a plus and helped them save money. By hiring children to work these machines cut production times in half with the newer technology. Some thought this was teaching children the importance of work. The Industrial Revolution also ushered in a golden age for America. This would be considered the golden age until to government became involved and put labor laws for children into place. These laws limited the amount of hours children of certain ages could work. Children ranging from ages nine- thirteen were only allowed to work eight hours a day. Fourteen threw eighteen could work no more than twelve hours a day. Children under nine were not allowed to work at all. Education started to become more important than working and regulations were also placed on it. Children were required to attend school for no less than two hours during the day. Not just the employers thought that hiring children were a good idea. Parents would also have their children working to help contribute to the well-being of the family. Many people did not see a difference in children working in these factories verses for many years children worked on family farms and in family cottage industries. Many people don’t see having their children working on family farms or doing chores around the house as child labor, but as in lesions that will last you for the rest of you life. Others also think that it will teach the child to value and appreciate working. Stew stated â€Å"Now that I have my own children, I realize that assigning household tasks to their children and enforcing completion was actually pretty hard for my parents. We often gave them grief about doing our chores, argued, complained quit early and tried all manner of ways to avoid our duties. I am certain that in most cases, it would have been easier for my parents to just do the job for us. Now, I am so thankful that my parents taught us to work. The ability to work is the  first step to financial freedom and independence. When I get together with my brothers and sisters we often compare notes about how kind our employers have been to us most of the time. Over the years, there have been few complaints about our work in terms of effort, faithfulness, diligence and perseverance. In today’s society child labor and laws still exist. Child labor is not mostly conducted in other countries instead of the United States unlike in the industrial revolution. The term commonly used is called sweat shops. Sweatshops are a working environment considered to be unacceptably difficult or dangerous — especially by developed countries with high st andards of living. In many third world countries child labor is an own going problem. Countries such as Africa, China, Philippines, India, and Pakistan still condone the use of child labor. Just like in the industrial revolution theses sweatshops were put into place to lower their costs and increase profits. The environments in these sweatshops are very harmful and dangerous. Major corporations such as Nike, Sean John, Tommy Hilfiger, Walt Disney Company, and The Gap have had allegations or charges brought against them for having sweatshops. Articles appear in The New York Times with title such as The Factories of Lost Children, No Winners in Child Labor, and Technology; Technology’s Toxic Trash Is Sent to poor Nations. With headlines like these shows that child labor is exist and is a problem. The child labor laws in the United States have countless statutes and rules regulating the employment of a minor. Any child that is under the age of 18 in a variety of occupations is affected by the law. In many states that average age that a child can enter the work field is sixteen. Anyone under the age of sixteen has to obtain a work permit. Anyone who is under the age of eighteen on school nights can not work after eleven o’clock. Some see it as entering your child in talent shows, beauty pageants, and even having them on reality T. V. as a form of child labor. To create a synopsis of the views of child labor is a difference in teaching your child or others children skills that may last them for a life verses using them for your personal gain or profit. The United States may say that after the industrial revolution child labor has decreased or doesn’t exist in our country. Furthermore, they are right. It has been disguised into other forms, and placed somewhere else were these laws are not present, and the economic gain is enormous for the company and the country. They and we have to look at the bigger picture it is morally wrong, the environment is unhealthy and dangerous, and we are robbing the child of its innocents and being able to enjoy childhood in general. References 1854, By. Industrial Revolution — History. com Articles, Video, Pictures and Facts. History. com — History Made Every Day — American World History. Web. 30 Nov. 2010. . Bell, By The. Jon Kate Plus 8-Child Labor Laws? | Discussion Debate | Parents Connect. Parents Connect | Parenting Tips, Parent Advice Kids Recipes. Web. 30 Nov. 2010. Industrial Revolution. Welcome to Nettlesworth Primary School. Web. 30 Nov. 2010. . Stew, By. Sometimes a Little Child Labor Is Good for Kids. Gather Little by Little Personal Finance with a Christian Perspective. Web. 30 Nov. 2010. . Tonelson, By Alan. Sweatshop. Wikipedia, the Free Encyclopedia. Web. 30 Nov. 2010. . http://www. nytimes. com/2006/03/25/opinion/25weber. html? _r=2ref=third_world_and_developing_countries http://www. nytimes. com/2004/04/08/opinion/l-no-winners-in-child-labor-121240. html? ref=third_world_and_developing_countries

Tuesday, November 26, 2019

buy custom US Education System essay

buy custom US Education System essay The most urgent need in reforming and amplifying the American education system lies in enriching and standardizing the curriculum. Other requirements in education reform could include introduction of charter schools to compete with ordinary private schools, reconstituting the US teacher workforce will also help in ensuring that qualified and well-motivated teachers can join the ranks. Nevertheless, the curriculum remains the most prominent and urgent education reform agenda in the US. The states education partisans, legislatures both national and state-based, education experts and the federal officials governing education portfolios must join hands in developing a standardized curriculum that emphasizes on developing the innovativeness, genius and creativity of each child in line with the information age. A good curriculum should feature a content scope and sequence that makes dynamic integration of new knowledge with that already available in books as part of the formal course work. This calls for the private sectors and public sector to join hands and pick the best brains that runs the economy and the government, in developing curriculums teaching materials in resonance with the challenges facing America today. This will also call for increased accessibility of software applications and commercial textbooks as part of the pedagogy used by teachers in teaching the curriculum, discipline must also form a core part of the system since how well students are behaved is directly proportional to how well they perform (U.S. Department of Education). To do this, student feedback must continually be included in policy formulation. Buy custom US Education System essay

Saturday, November 23, 2019

How a Behavior Intervention Plan Improves Bad Behavior

How a Behavior Intervention Plan Improves Bad Behavior A BIP, or Behavior Intervention Plan, is an improvement plan that lays out how an Individual Education Plan (IEP) team will better difficult behavior that is inhibiting a childs academic success. If a child cant focus, doesnt complete work, disrupts the classroom or is constantly in trouble, not only does the teacher have a problem, the child has a problem. A Behavior Intervention Plan is a document that describes just how the IEP team will help the child improve his or her behavior. When a BIP Becomes a Requirement A BIP is a required part of an IEP if the behavior box is checked off in the Special Considerations section where it asks whether communication, vision, hearing, behavior and/or mobility affects academic achievement. If a childs behavior disrupts the classroom and significantly interrupts his or her education, then a BIP is very much in order. Furthermore, a BIP is generally preceded by an FBA or Functional Behavior Analysis. The Functional Behavior Analysis is based on the Behaviorist Anagram, ABC: Antecedent, Behavior, and Consequence. It requires the observer to first pay attention to the environment in which the behavior occurs, as well as the occurrences that happen just before the behavior. How Behavior Analysis Gets Involved Behavior Analysis includes the antecedent, a well defined, measurable definition of the behavior, as well as a standard for how it will be measured, such as duration, frequency, and latency. It also involves the consequence, or outcome, and how that consequence reinforces the student.   Usually, a special education teacher, a behavior analyst, or a school psychologist will perform an FBA. Using that information, the teacher will write a document that describes target behaviors, replacement behaviors, or behavioral goals. The document will also include the procedure for changing or extinguishing the target behaviors, measures for success, and the people who will be responsible for instituting and following through on the BIP. The BIP Content A BIP should include the following information: Proactive Manipulation of the Antecedent.Teachers should consider whether they can structure the students learning environment in a way that will eliminate the antecedent. Making changes in the environment that will eliminate or decrease the things that may trigger a behavior permits the teacher to spend lots of time reinforcing the replacement behavior.Targeted Behaviors.Also known as the Behavior of Interest, a BIP should narrow the behaviors of interest to a few that may be interrelated, typically three or four or at the most.Reinforcement Plan.This plan provides a description of the proactive means of supporting replacement or appropriate behavior. A replacement behavior for calling out would be to raise their hand and a means of reinforcing or rewarding that activity would be part of the BIP.  Protocol for Addressing Dangerous or Unacceptable Behavior.This protocol may be called different things in a teachers district or state form, but it should address how to respond to dang erous behavior. Unacceptable should be defined, as it isnt to promote punishment when the teacher, bus driver, or paraprofessional is angry at a student. The purpose of the BIP is to keep adults away from reactive and counterproductive behaviors of their own, like screaming at the child or punishment.

Thursday, November 21, 2019

The Impacts Of Mobile Applications On The Hospitality Industry Essay

The Impacts Of Mobile Applications On The Hospitality Industry - Essay Example In other words, communication was made easier and repeated walks became a thing of the past. In a similar way, the receptionists had an easy time recording the number of guests going in and out of the respective premises (Engel, 2013). Mobile phones have as well improved communication efficiency. It is easier for a client to directly call the management to raise complaints and book appointments than with the old way of using letters (Engel, 2013). Also, almost all hospitality organizations have pages on social media and/ websites where potential clients can post comments and ask questions while sitting at their respective homes (Withiam, 2013). In the meantime, it is now possible, in many hospitality firms, to buy tickets online while sitting at home. Obviously, such clients are happy about how easy such and similar processes become and any hospitality organization that runs its operations using the manual ways of the past is considered as lagging behind times (Barnes, 2004; Hotel Ne ws Resource, 2013). Reducing operational costs Mobile technologies have gone an extra mile in reducing operational costs. Advertising costs, for instance, have been greatly cut short by the presence of social media. It is hard to find any meaningful hospitality organization without Facebook, Twitter and website to name a few (Hotel News Resource, 2013). Such social media platforms assist in reaching great numbers of potential clients from diverse background and or around the globe (Withiam, 2013). ... Mobile phones have as well improved communication efficiency. It is easier for a client to directly call the management to raise complaints and book appointments than with the old way of using letters (Engel, 2013). Also, almost all hospitality organizations have pages on social media and/ websites where potential clients can post comments and ask questions while sitting at their respective homes (Withiam, 2013). In the meantime, it is now possible, in many hospitality firms, to buy tickets online while sitting at home. Obviously, such clients are happy about how easy such and similar processes become and any hospitality organization that runs its operations using the manual ways of the past is considered as lagging behind times (Barnes, 2004; Hotel News Resource, 2013). Reducing operational costs Mobile technologies have gone an extra mile in reducing operational costs. Advertising costs, for instance, have been greatly cut short by the presence of social media. It is hard to find a ny meaningful hospitality organization without Facebook, Twitter and website to name a few (Hotel News Resource, 2013). Such social media platforms assist in reaching great numbers of potential clients from diverse background and or round the globe (Withiam, 2013). All the clients need is to know that there exists a company page or website from where he or she can learn more about the company, ask questions and post comments. All operations involving organizational performance analysis are made easy what with the use of social media commentaries, retweets and likes on Facebook (Engel, 2013). Travel costs are also greatly reduced. Aforementioned, rather than managers moving long distances just to inform other workers about

Tuesday, November 19, 2019

HSC PharmacologyTerm Project Assignment Example | Topics and Well Written Essays - 1000 words

HSC PharmacologyTerm Project - Assignment Example The treatment has been somehow demanding due to the fact that P. falciparum develops resistance to any new medicine discovered to treat malaria. Due to this several pharmacological agents have been set in different times to cure malaria. Other plasmodium species that cause malaria are P. vivax, P. Ovale and P. malariae. Chloroquine also known as 4-aminoquinoline has been used to treat malaria caused by falciparum species in the malaria prone areas until this parasite developed a resistant to it. Chloroquine is a weak base that concentrates after mixing with the lysosome of the parasite, probably through parasite-specific drug concentrating mechanism. It’s a weak base and its concentration increases in the lysosome of the parasite probably through parasite –specific drug concentrating mechanism. After infection the parasite digests the hemoglobin forming ferriprotoporphorin IX known as haem which is very toxic to the parasite. However the parasite contains plasmodialhaem polymerase that converts haem to a red pigment associated with malaria referred to as haemozoin, harmless to the parasite. Chloroquine inhibits this enzyme and thus accumulation of haem destroys the parasite by membranolytic action. Moreover chloroquine intercalates in the parasites DNA and also causes fragmentation of its RNA. Chloroquine can be used for clinical cure where it lowers the effect of fever and destroys all the parasites in the blood in 24 hours as well as control method. Chloroquine is only a fundamental treatment for P. falciparum infection and not for P.vivax or P. ovale since the latter contain hypnozoites in the exo-erythrocytic phase that lead to clinical setback attack. However progaunil is combined with it to prevent these relapse in chemoprophylaxis. Due to the resistant nature of P.falciparum maloprim is combined. Apart from

Sunday, November 17, 2019

Learning Theories Essay Example for Free

Learning Theories Essay Lev Vygotsky, born in the U. S. S. R. in 1896, is responsible for the social development theory of learning. He proposed that social interaction profoundly influences cognitive development. Vygotsky’s key point is his belief that biological and cultural development do not occur in isolation. Vygotsky approached development differently from Piaget. Piaget believed that cognitive development consists of four main periods of cognitive growth: sensory motor, preoperational, concrete operations, and formal operations. Piaget’s theory suggests that development has an endpoint in goal. Vygotsky, in contrast, believed that development is a process that should be analyzed, instead of a product to be obtained. Marcy P. Driscoll stated (as cited in Riddle, 1999) that â€Å"Vygotsky believes the development process that begins at birth and continues until death is too complex to be defined by stages†. The major theme of Vygotsky’s theoretical framework is that social interaction plays a fundamental role in the development of cognition. Vygoysky states: â€Å"Every function in the child’s cultural development appears twice: first, on the social level, and later, on the individual level; first between people (interpsychological) and then inside the child (intrapsychological) (Funderstanding, 2001). This applies equally to voluntary attention, to logical memory, and to formation of concepts. All the higher functions originate as actual relationships between individuals. A second aspect of Vygotsky’s theory is the idea that the potential for cognitive development is limited to a certain time span that he calls the â€Å"zone of proximal development† (ZPD). Vygotsky believed that this life long process of development was dependent on social interaction and that social learning actually leads to cognitive development (Kearsley, 1998). Vygotsky describes it as â€Å"the distance between the actual development level as determined by independent problem solving and the level of potential development as determined through Learning Theories 3 problem solving under adult guidance or in collaboration with more capable peers† (Funderstanding, 2001). In other words, a student can perform a task under adult guidance or with peer collaboration that could not be achieved alone. The Zone of Proximal Development bridges the gap between what is known and what can be known. Vygotsky claimed that learning occurred in this zone. Therefore, Vygotsky focused on the connections between people and the cultural context in which they act and interact in shared experiences. According to Vygotsky, humans use tools that develop from a culture, such as speech and writing, to mediate their social environments. Initially, Children develop these tools to serve solely as social functions, ways to communicate needs. Vygotsky believed that the internalization of these tools led to higher thinking skills (Riddle, 1999). When Piaget observed young children participating in egocentric speech in their preoperational stage, he believed it was a phase that disappeared once the child reached the stage of concrete operations. Driscoll states (as cited in Riddle, 1999) â€Å"in contrast, Vygotsky viewed this egocentric speech as a transition from social speech to internalized thought†. Thus, Vygotsky believed that thought and language could not exist without each other. Vygotsky’s theory was an attempt to explain consciousness as the end product of socialization. For example, in the learning of language, our first vocal noises with friends or adults are for the purpose of communication, but once mastered they become internalized and allow â€Å"inner speech†. Traditionally, schools have not promoted environments in which the students play an active role in their education and in the education of their friends. Vygotsky’s theory, however, requires the teacher and students to play untraditional roles as they collaborate with each other. Instead of a teacher dictating the lessons to students and later evaluate them, a teacher should collaborate with her students in order to create meaningful ways that students can make their own evaluation. Learning then becomes a reciprocal experience for the students and the teacher. Learning Theories 4. The physical classroom, based on Vygotsky’s theory, would provide clustered desks or tables and work space for peer instruction, collaboration, and small group instruction. Like the environment, the instructional design of material would be structured to promote and encourage student interaction and collaboration. Thus, the classroom becomes a community of learning. Because Vygotsky asserts that cognitive change occurs within the Zone of Proximal development, instruction would be designed to reach a developmental level that is just above the student’s current developmental level. Vygotsky proclaims, â€Å"learning which is oriented toward developmental levels that have already been reached is ineffective from the view point of the child’s overall development. It does not aim for a new stage of the developmental process, but rather lags behind this process† (Social Development, 1996). Appropriation is necessary for cognitive development within the zone of proximal development. Individuals participating in peer collaboration or guided teacher instruction must share the same focus in order to access the zone. Samuel J. Hausfather states (as cited in Riddle, 1999), â€Å"joint attention and shared problem solving is needed to create a process of cognitive, social, and emotional interchange†. Furthermore, it is essential that the partners be on different developmental levels. In addition, the partner that is on the higher level needs to be aware of his partner’s lower level. If this does not occur, or if one partner continually dominates, the interaction is less successful. Scaffolding and reciprocal teaching are effective strategies to access the zone. Scaffolding requires the teacher to provide students the opportunity to extend the current skills and knowledge. Hausfather reports (as cited in Riddle, 1999) â€Å"the teacher must engage students’ interests, simplify tasks so they are manageable, and motivate students to pursue the instructional goal. In addition, the teacher must look for discrepancies between students’ efforts and the solution, control for frustration and risk, and model an idealized version of the act†. Learning Theories 5 Reciprocal teaching allows for the creation of a dialogue between students and teachers. This two-way communication becomes an instructional strategy by encouraging students to go beyond answering and discussing questions. A study (as cited in Riddle, 1999) demonstrated the Vygotskian approach with reciprocal teaching methods in their successful program to teach reading strategies. The teacher and students alternated turns leading small group discussions on reading. After modeling four reading strategies, students began to assume the teaching role. Results of this study showed significant gains over other instructional strategies. Cognitively Guided Instruction is another strategy to implement Vygotsky’s theory. This strategy involves the teacher and students exploring math problems and then sharing their different problem solving strategies in an open dialogue (Riddle, 1999). Vygotsky’s social development theory challenges traditional teaching methods. Historically, schools have been organized around recitation teaching. According to Hausfather, (as cited in Riddle, 1999) â€Å"the teacher disseminates knowledge to be memorized by the students, who in turn, recite the information back to the teacher†. However, the studies described above offer empirical evidence that learning, based on the social development theory, facilitates cognitive development over other instructional strategies (Riddle, 1999). School structure does not reflect the rapid changes that society is experiencing. Opportunities for social interaction have greatly increased with the introduction and integration of computer technology. Therefore, the social context for learning is transforming as well. Learning relationships can now be formed from distances through cyberspace, whereas collaboration and peer instruction was once only possible in shared physical space (Bacalarski, 1994). Computer technology is a cultural tool that students can use to mediate and internalize their learning. According to Kathryn Crawford (as cited in Riddle, 1999) â€Å"recent research suggest changing the Learning Theories 6 learning contexts with technology is a powerful learning activity†. If schools continue to resist structural change, students will not be as prepared as they should be for the world. Lev Vygotsky lived during the Russian Revolution, a time of great change in his culture. His theory was that biological and cognitive development does not happen apart from each other. These two developments sustain and grow from each other. This is when learning takes place. Because of this theory, his environment of change was a great influence in his own cognitive processes. Learning Theories 7 References Bacalarski, M. C. , (1994). Vygotsky’s Developmental Theories and the Adulthood of Computer Mediated Communication: a Comparison and an Illumination. Retrieved November 7, 2003 from http://psych. hanover. edu/vygotsky/bacalar. html. Funderstanding, (2001). Vygotsky and Social Cognition. Retrieved November 7, 2003 from http://www. funderstanding. com/vygotsky. cfm. Kearsley, G. , (1998). Social Development (Vygotsky). Retrieved November 9, 2003 from http://members. aol. com/daidpeal/vygotsky. html. Riddle, E. M. , (1999). Lev Vygotsky’s Social Development Theory. Retrieved November 7, 2003 from www. kihd. gmu. edu/immersion/knowledgebase/theorists/constructivism/vygotsky.

Thursday, November 14, 2019

religious studies :: essays research papers

AO1- What is meant by the term, â€Å"rite of passage†? Choose one Christian denomination. Describe the main rites of passage in that denomination.   Ã‚  Ã‚  Ã‚  Ã‚  I am going to describe the Roman Catholic churches main rites of passage. There are four important rites, they are; baptism, confirmation, marriage and funerals. A rite is a religious ceremony. If the rite marks a certain stage of someone’s life it is called a rite of passage. Christians believe god gives them powers to do his will, this is called god’s grace.   Ã‚  Ã‚  Ã‚  Ã‚  The first rite I will describe is baptism. When a person is baptised it is believed that it is their welcome into the Christian church. Holy water is either put onto the person’s forehead or they are totally covered in water. This is a rite of passage because it is believed to be a very special as god is accepting them into the church. Infant baptisms in the Roman Catholic church take place during mass so the whole congregation of the church can welcome the child into the Christian faith. The priest takes the service. Three promises must be made but as the child is too young to say them parents or godparents say them on the child’s behalf. The promises are:  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  To turn to Christ  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  To repent sin  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  To renounce evil They also agree to raise the child in a Christian house and faith and say that they believe in the Trinity. The sign of a cross is made on the child’s forehead by the priest while he says; â€Å"I sign you with the cross, the sign of Christ. Do not be ashamed to confess the faith of Christ crucified.† As the priest says the child’s name and; â€Å"I baptise you in the name of the Father, and of the Son and of the Holy Spirit†, he pours water onto the child’s forehead. A lighted candle is usually given to the parents as a sign and reminder that the child is now in the light of god, and not the darkness of sin. After this ceremony the child is part of the Christian family. The child is anointed with oil called chrism, it is to show the child has important work to do in god’s service. Also a white garment is worn to show the light of Christ. The water is a sign of purifying the child.   Ã‚  Ã‚  Ã‚  Ã‚   The second of the rites is confirmation. It is when someone confirms their belief in god and Christ and when someone who has been baptised is old enough to make the promises made for them at their baptism themselves.

Tuesday, November 12, 2019

Advertising in Schools Essay

Although this semester our class has discussed the different types of advertising in the marketplace, one technique that was not discussed is that of advertising in schools. This idea is a growing technique that if conducted the right way, could perhaps benefit not only corporate organizations, but also schools and students. However, there are many critics, along with parents that feel advertising in schools is a horrible idea and could only lead to harm. Many advertisers view children as a profitable three-in-one market. That is, 1) As buyers themselves 2) As influencers of their parents purchases, and 3) As a future adult customer. See more: Recruitment and selection process essay Every year, children have an estimated $15 billion of their own money, of which they spend $11 billion of it on products such as toys, clothes, candy and snacks. Children also influence at least $160 billion in parental purchases. Generally speaking, today’s children have more money to spend than ever before. Companies know this and find that advertising to the ‘youth of the nation’ can be beneficial and lead to future dedicated customers. Because of the increase in children’s spending power in recent decades, advertisers have closely targeted children as consumers. New advertising strategies aimed at children have been steadily growing and expanding. The toy-related program, or program length commercial (which is just like a infomercial) is developed to sell toys, and stirred public attention and debates. Along with this form of advertising, 900-number telephone services were accused of being aimed at children. In the 1980’s, children got their own TV networks, radio networks, magazines, newspapers, kids’ clothing brands, and other high-price items such as video games and other high-tech products. Other new advertising strategies include kids’ clubs, store displays directed at children, direct mailing to children, and sponsored school activities. At first glance, selling corporate sponsorship rights to pay for school activities looks like a win-win situation. Needy schools get resources they need. Companies get new marketing opportunities that can build brand loyalty. After all, advertising in schools is nothing new. Districts have long used ads from local businesses to help pay the costs of school newspapers, yearbooks, and athletic programs. Even here at CBU our athletic department sells ads for ‘Sports Media Guides’ to local institutions as well as national organizations. A growing number of companies are offering schools money for a chance to market their products directly to students. As budgets shrink, schools must find ways to get extra funding. Many schools are doing away with fund-raising and have begun to look at corporate dollars to fund just about everything. Signing contracts with these companies seems like an easy way to get the money they need. Schools need funding for in-school activities and equipment, and, in order to reduce the number of children going home to empty houses, they need to fund many after-school activities. Product advertisements can be found almost everywhere in schools. They are most frequently found in stadiums, gymnasiums, school cafeterias, hallways, and on textbook covers. Some schools across the nation are even putting advertisements on school buses. So what types of advertising are out there in our schools? There are different categories that ads can fall into. The following categories can represent most the advertising techniques used in our schools today and give a description of how they work. Types of Advertising 1) In-school advertisements In-school ads are forms of advertising that can be found on billboards, on school buses, on scoreboards, in school hallways, in soft drink machines, or on sports uniforms. This type of advertising is also found in product coupons and in give-aways that are given to students. 2) â€Å"Exclusive rights† contracts A company gives money to schools that carry ONLY their products. Extra money can also be given if a schools’ sales exceed a certain amount(quota). 3) Corporate-sponsored educational materials and programs Sponsored educational materials include free or low-cost items which can be used for instruction. Examples of these may include; multimedia teaching kits, videotapes, software, books, posters, activity sheets, and workbooks. While some of these materials may be ad-free, others may contain advertising for the producer of the item, or they may contain biased information aimed at swaying students towards a company’s product or service. 4) Corporate-sponsored contests and incentive programs This is where students compete for prizes by selling, buying or collecting labels for a certain product. These contests and incentive programs bring brand names into the schools along with the promise of such rewards as free pizzas, cash, points towards buying educational equipment, or trips and other prizes. 5) Ads in classroom materials and programs Ads in classroom materials include any commercial messages in magazines or video programming used in school. A perfect example of this type of advertising is â€Å"Channel One†. Channel One is a 12-minute daily news show for students in grades 6 through 12 that includes two minutes of age-appropriate ads for products like jeans and soft drinks. In exchange for airing the program each day at the same time for three years, Channel One gives schools a satellite dish, a cable hookup, a television monitor for each classroom, and an agreement to service the equipment for the three years. While some state school systems had originally said ‘No’ to Channel One, the company reports to be present in some 350,000 classrooms. So what types of guidelines are set to insure that in-school advertising is done correctly and does not become overly exploited? Those who support the call for guidelines include educational groups such as the Association for Supervision and Curriculum Development, The National Parent Teacher Association, and the National Education Association. The Society of Consumer Affairs Professionals in Business(SOCAP) and Consumers International are two consumer interest groups that have formulated guidelines for sponsored materials. These guidelines suggest that†¦ † †¦ education materials should be accurate, objective, clearly written, nondiscriminatory, and noncommercial. † (Karpatkin & Holmes) In dealing with the issues of in-school commercialism, Karpatkin & Holmes suggest a three-pronged approach that includes: * Reviewing all sponsored materials and activities and holding them to the same standards as other similar items by using the SOCAP guidelines. * Pursuing noncommercial partnerships with businesses and rejecting the notion that it is ethical to bring advertising into the schools to provide materials or funds. * Begin the teaching of media literacy in elementary school, to educate children to be critical readers of advertising, propaganda, and other media messages. Groups that support advertising in schools have very strong arguments to back their case. It seems that there is a large area for investment in advertising in schools. It also appears that if handled correctly, advertising techniques in schools can lead to the raising of an overall helpful, efficient way to ‘fundraise’. Although advertising in schools may bring needed increases in funds, it is not without controversy. Many people are opposed to advertising in schools. They feel that children are being exploited for profit because big companies feel students are a captive, impressionable audience. Is there any way to balance the true goals and purposes of advertising in schools? Perhaps the best way is to have each school decide what amount and types of advertising in their schools is acceptable. And although advertising in schools seems to be a great way of obtaining funds for school activities, every school board should definitely be sure they know what they are getting into before signing any contracts with big time corporations. In-school Advertising Grace Farrell Promotional Strategy Dr. Peyton 12/02/02 Bibliography Chaika, Gloria. Education World. 1998 Education World. Consumers Union Education Services(CUES). 1990. Selling America’s Kids: Commercial Pressures on Kids of the 90’s. Yonkers, N. Y. Karpatkin, Rhoda, H. and Anita Holmes. 1995. Making schools ad-free zones. Educational Leadership 53(Sep, 1):72-76. McNeal, James U. 1990. Kids as customers. New York: Lexington Books. McNeal, James U. â€Å"Planning Priorities for Marketing to Children†. The Journal of Business Strategy. 1991. Advertising in Schools Essay Although this semester our class has discussed the different types of advertising in the marketplace, one technique that was not discussed is that of advertising in schools. This idea is a growing technique that if conducted the right way, could perhaps benefit not only corporate organizations, but also schools and students. However, there are many critics, along with parents that feel advertising in schools is a horrible idea and could only lead to harm. Many advertisers view children as a profitable three-in-one market. That is, 1) As buyers themselves 2) As influencers of their parents purchases, and 3) As a future adult customer. Every year, children have an estimated $15 billion of their own money, of which they spend $11 billion of it on products such as toys, clothes, candy and snacks. Children also influence at least $160 billion in parental purchases. Generally speaking, today’s children have more money to spend than ever before. Companies know this and find that advertising to the ‘youth of the nation’ can be beneficial and lead to future dedicated customers. Because of the increase in children’s spending power in recent decades, advertisers have closely targeted children as consumers. New advertising strategies aimed at children have been steadily growing and expanding. The toy-related program, or program length commercial (which is just like a infomercial) is developed to sell toys, and stirred public attention and debates. Along with this form of advertising, 900-number telephone services were accused of being aimed at children. In the 1980’s, children got their own TV networks, radio networks, magazines, newspapers, kids’ clothing brands, and other high-price items such as video games and other high-tech products. Other new advertising strategies include kids’ clubs, store displays directed at children, direct mailing to children, and sponsored school activities. At first glance, selling corporate sponsorship rights to pay for school activities looks like a win-win situation. Needy schools get resources they need. Companies get new marketing opportunities that can build brand loyalty. After all, advertising in schools is nothing new. Districts have long used ads from local businesses to help pay the costs of school newspapers, yearbooks, and athletic programs. Even here at CBU our athletic department sells ads for ‘Sports Media Guides’ to local institutions as well as national organizations. A growing number of companies are offering schools money for a chance to market their products directly to students. As budgets shrink, schools must find ways to get extra funding. Many schools are doing away with fund-raising and have begun to look at corporate dollars to fund just about everything. Signing contracts with these companies seems like an easy way to get the money they need. Schools need funding for in-school activities and equipment, and, in order to reduce the number of children going home to empty houses, they need to fund many after-school activities. Product advertisements can be found almost everywhere in schools. They are most frequently found in stadiums, gymnasiums, school cafeterias, hallways, and on textbook covers. Some schools across the nation are even putting advertisements on school buses. So what types of advertising are out there in our schools? There are different categories that ads can fall into. The following categories can represent most the advertising techniques used in our schools today and give a description of how they work. Types of Advertising 1) In-school advertisements In-school ads are forms of advertising that can be found on billboards, on school buses, on scoreboards, in school hallways, in soft drink machines, or on sports uniforms. This type of advertising is also found in product  coupons and in give-aways that are given to students. 2) â€Å"Exclusive rights† contracts A company gives money to schools that carry ONLY their products. Extra money can also be given if a schools’ sales exceed a certain amount(quota). 3) Corporate-sponsored educational materials and programs Sponsored educational materials include free or low-cost items which can be used for instruction. Examples of these may include; multimedia teaching kits, videotapes, software, books, posters, activity sheets, and workbooks. While some of these materials may be ad-free, others may contain advertising for the producer of the item, or they may contain biased information aimed at swaying students towards a company’s product or service. 4) Corporate-sponsored contests and incentive programs This is where students compete for prizes by selling, buying or collecting labels for a certain product. These contests and incentive programs bring brand names into the schools along with the promise of such rewards as free pizzas, cash, points towards buying educational equipment, or trips and other prizes. 5) Ads in classroom materials and programs Ads in classroom materials include any commercial messages in magazines or video programming used in school. A perfect example of this type of advertising is â€Å"Channel One†. Channel One is a 12-minute daily news show for students in grades 6 through 12 that includes two minutes of age-appropriate ads for products like jeans and soft drinks. In exchange for airing the program each day at the same time for three years, Channel One gives schools a satellite dish, a cable hookup, a television monitor for each classroom, and an agreement to service the equipment for  the three years. While some state school systems had originally said ‘No’ to Channel One, the company reports to be present in some 350,000 classrooms. So what types of guidelines are set to insure that in-school advertising is done correctly and does not become overly exploited? Those who support the call for guidelines include educational groups such as the Association for Supervision and Curriculum Development, The National Parent Teacher Association, and the National Education Association. The Society of Consumer Affairs Professionals in Business(SOCAP) and Consumers International are two consumer interest groups that have formulated guidelines for sponsored materials. These guidelines suggest that†¦ † †¦ education materials should be accurate, objective, clearly written, nondiscriminatory, and noncommercial.† (Karpatkin & Holmes) In dealing with the issues of in-school commercialism, Karpatkin & Holmes suggest a three-pronged approach that includes: * Reviewing all sponsored materials and activities and holding them to the same standards as other similar items by using the SOCAP guidelines. * Pursuing noncommercial partnerships with businesses and rejecting the notion that it is ethical to bring advertising into the schools to provide materials or funds. * Begin the teaching of media literacy in elementary school, to educate children to be critical readers of advertising, propaganda, and other media messages. Groups that support advertising in schools have very strong arguments to back their case. It seems that there is a large area for investment in advertising in schools. It also appears that if handled correctly, advertising techniques in schools can lead to the raising of an overall  helpful, efficient way to ‘fundraise’. Although advertising in schools may bring needed increases in funds, it is not without controversy. Many people are opposed to advertising in schools. They feel that children are being exploited for profit because big companies feel students are a captive, impressionable audience. Is there any way to balance the true goals and purposes of advertising in schools? Perhaps the best way is to have each school decide what amount and types of advertising in their schools is acceptable. And although advertising in schools seems to be a great way of obtaining funds for school activities, every school board should definitely be sure they know what they are getting into before signing any contracts with big time corporations. Bibliography Chaika, Gloria. Education World. 1998 Education World. Consumers Union Education Services(CUES). 1990. Selling America’s Kids: Commercial Pressures on Kids of the 90’s. Yonkers, N.Y. Karpatkin, Rhoda, H. and Anita Holmes. 1995. Making schools ad-free zones. Educational Leadership 53(Sep, 1):72-76. McNeal, James U. 1990. Kids as customers. New York: Lexington Books. McNeal, James U. â€Å"Planning Priorities for Marketing to Children†. The Journal of Business Strategy. 1991.

Sunday, November 10, 2019

Brand Audit Essay

The sole objective of this brand report is to know about the brand potency of Mobilink in the Pakistani market in comparison to other competing service providers. The other objective is to put a spotlight on the different cellular companies operating in Pakistan and the perception of the users about them. TARGET AUDIENCE: As far as the Mobilink is concerned, it has no specific target audience because it is catering the requirement of all the users through its different packages. Cell phone is a requirement of every one so it also  of several segments whether it is youth, ladies or corporate sector. Brand Positioning  makes sense to launch multiple products to cater to the requirements RESEARCH METHODOLOGY: INTRODUCTION: The purpose of the research methodology is to carry out different methods of research to accomplish the set research objectives pertinent to the brand tracking. For that purpose, a set of questions have been made to inquire and analyze the responses of the  respondents. RESEARCH METHODOLOGY: The research methodology used in this brand tracking is qualitative as well as quantitative in which we have not only used a questionnaire to know the responses of the respondents of the sample group but also open ended questions asked from a set of respondents at mobilink franchises to get a more flexible response from the respondents. Secondary research methods are also used to get the information regarding the competitors and Mobilink to get to know the market structure and the standing of the cellular companies in it. Triangulation  and secondary research to find the parity in results. SAMPLING DESIGN: The target population belongs to every segment and class of life because cell phone users belong to every class of population and we method is used to cross check the results from qualitative, quantitative  cannot discriminate the target market based on SECs. Subsequently, the sample selection is random and random sampling method is used for sample selection to get the feedback of the users from all the classes. The sample size used for the questioning consists of 250 respondents. RESEARCH INSTRUMENTS: The instrument used for the research in this brand tracking activity is primarily a multipurpose questionnaire which comprises of open and close ended questions not only to help in the quantitative research but also in the qualitative research as well. It consist questions pertaining to the brand associations, brand recall, brand image, projective responses and brand values. The reliability of the instrument is measured through the triangulation method by comparing the results of all three research methods. PROCEDURES: The data collection is through the questionnaire from a sample group of 250 respondents. The screening of the information acquired from  entry. All the information from the responses is entered as per the frequency of respondents against the questions. These respondents is done manually using MS Excel as a tool for data. The objective of this brand audit report is to measure the brand potency of Mobilink in line with the competing brands. The specific issues faced by the brand in terms of market conditions, saturation in the cellular market and the overall recession in the economy will also be taken into account while studying the brand. Also, what subproducts fall in the generalized master brand i.e. Mobilink and to which segments these sub-brands are catering to.  When speaking of the target audience for Mobilink, we should keep in mind that in the world of today, cell phone is no longer a luxury as was the case in 90s but now, it has become a necessity for everyone. So when we speak of cell phone target market, we speak of all the socioeconomic classes from A to E. The brand audit is limited to Karachi only because of limited time and resources. But, in order to get a  are covered with a dynamic sample population to get diverse views about the brands so as to get a better and augmented underst anding of the market perceptions about the brands. The approach used for brand audit is mainly the survey through set questionnaire and secondary research methods regarding their inputs on brand imagery & usage, brand recall, brand perception, brand loyalty and brand awareness. BRAND BRAND (SELF ANALYSIS): Pakistan Mobile Communications Limited, better known as Mobilink GSM, is a telecommunication service provider in Pakistan. The company is Pakistan’s leading cellular operator with a subscriber base of 31.5m and market share of 31% in October 2010. Mobilink’s Head office is located at Mobilink House, 1-A Kohistan Road, F-8 Markaz Islamabad. Mobilink’s corporate postpaid package is sold under the brand name â€Å"Indigo† and prepaid by the name of â€Å"Jazz†. Mobilink started operations in 1994 as the first GSM cellular Mobile service in Pakistan by MOTOROLA Inc., later it was sold to Orascom, an Egypt-based group is diversifying its service portfolio by setting up new businesses and also expanding through acquisitions. Recently, they started offering DSL broadband through a wholly owned subsidiary, Link.Net. Additionally, the company has also launched its wireless broadband   service through WiMax based technology under the label of ‘Mobilink Infinity’. Technology is backed by Alcatel, and company is using a ZYXEL Customer Premises equipment. BCG GROWTH-SHARE MATRIX Companies that are large enough to be organized into strategic business units face the challenge of allocating resources among those units. In the early 1970’s the Boston Consulting Group developed a model for managing a portfolio of different business units. The BCG growth-share matrix displays the various business units on a graph of the market growth rate vs. market share relative to competitors. OF  SBUSCLASSIFICATION These packages are low growth, high share products. These established and successful SBUs need less investment to hold their market share. They produce a lot of cash to support the other SBUs that need investment. These packages are low share in high growth markets. They require a lot of cash to hold  their share. Management needs to think hard about question marks it should  try to build into stars or should be phased out.  It is low growth, low share product. It may generate enough cash to maintain itself but do not promise to be large source of cash. PRICING STRATEGY OF MOBILINK: Mobilink was offering Jazz connection for about 3000 rupees 5 years passage of time now Mobilink is offering Jazz connections for about 100 rupees. In 2002 Ufone which is one of the leading competitor of Jazz introduced its prepay connection for about 2500 rupees. In 2005 Telenor came into existence in Pakistani market and offered its connections for about 500 rupees. Then in 2005 Warid also entered the market offering its connections for 250 rupees. In this way price war   ago. Its market oriented statement is â€Å"Aur Sunao† But through the started between these telecom brands in the market. Previously it was Jazz’s oligopoly as they offered their prices. In 2005 Jazz offered a Cellphone plus connection and prepaid card implementing a productbundle pricing strategy for creating more attention and attraction. The major shift in the pricing strategy came in when they started 30.second operations using the promotional pricing strategy. In the early days Jazz was offering its sim-cards for a high-price using captiveproduct pricing strategy as its SIM-card is a main product that must be used along with the cell phone. Initially Jazz’s call rates and SMS charges were also reduced using discount and allowance strategy and initially directing towards promotional strategy as the competition between cellular brands in the market grew faster. Recently Jazz introduced its offerings of 0.99 per minute call rates in their â€Å"happy hour package† which represents their operations with the  promotional as well as psychological pricing of their services. Through its happy hour package they are also operating with promotional strategy as they are engaged in continuous promotion through their offerings. INDUSTRY REVIEWS In the era of globalization and information society, the fundamental role of telecommunication technologies cannot be underestimated. Although tremendous growth has taken place in the Pakistan telecom sector but most of it can be attributed to the cellular growth. Fixed line is still awaiting a takeoff. Similarly Value Added Services have grown introduced in the telecom sector some very positive impact have been observed on the growth of the sector in a short span of time which is expected to continue to grow for at least next five years if the daring investors influx continue as in the last 3 years. Our Industry already has LL (Local Loop), WLL (Wireless Local Loop), LDI (Long distance and but are still a drop in the bucket. Now that the competition has been   International), and ISP (Internet Service Provider) players and WiMax; 3G cellular systems are expected be a part of this Industry soon. The Pakistan market has reached 100 million subscribers landmark with cellular mobile tele density of over 60% (PTA press release Sep 2010).The growth slowed down in 2009 but has picked up again gradually. At 2006 year end the total subscribers were 48.2 million. In June 2007 the total mobile users reached over 63 million. Based on numbers published at PTA website for 2007, the total number of million, a teledensity of nearly 49%. In 2007 the average growth rate was about 2.5 million new subscribers each month! After second half of 2007 it seemed as if the growth had slowed down but overall it was fine. One remarkable achievement was by Zong (formerly Paketl) which  launched  very  successful. Telecommunication Co. Ltd (PTCL), is now under the control of Etisalat group of UAE. It has 20% of subscriber share and added the most lines (2.4 million) from 2006-07. Warid, owned by the Abu Dhabi group of the United Arab Emirates and sister of Wateen group is number 4 with 17.0% market of subscribers. Recently it sold 30% share to SingTel. Norway’s Telenor, a recent entrant with about a billion US dollar investment in Pakistan has been doing well, based on its recent earning report. It has about 24% of the market share. Telenor stock is listed in the Oslo stock market (TEL) and in US (TELNY.PK). CMPak (Zong brand), formerly Paktel, was the latest target of foreign acquisition. After it got acquired by China Mobile it was rebranded as Zong and launched one of the most successful and aggressive  campaigns. Within a matter of few months, Zong has achieved a 8 %  market share. CONSUMER ANALYSIS The Pakistani mobile users are more price-conscious but in cellular sector they also don’t compromise on the quality of voice. So, By taking the advantage of this consciousness of the users mobile operators re enhancing product offering in the form of low rate packages  and  network  expansion  by  installing  boaster. Mobile sector comes under verity seeking buying behavior by the buyer because it occurs under the conditions of low consumer involvement and significant brand difference. In this market, consumer has low involvement they perceive the brand benefits on the basis ultimate objective is to communicate to other at for off place. Buying is initiated by â€Å"communication purpose†. Everybody can enter in to buying process by need of communication. In the regard of this communication media vehicles play an important role in getting their service preferred by the users. These days there is a rush of packages   price, voice quality and coverage. The reason for this is that their   out in the market from the mobile service providers, targeting different market segments and offering all kinds of discounts depending on who you call or when you call. Off-peak timings have always been used by service providers to create interest and to lure customers. So, customer seeks indifference among services provided by these cellular operators and switch according to their desire. Factors that influencing on customer switch age to other operator of mobile network are, Price: Users use services of the operator to communication so on of the factor influencing the customer switch age is price. A person in this segment seeks the prices most important factor and operator of service are also offering verity of packages to make the customer attract. Where the price of any product is low people change their taste and divert towards that low price product. Quality: After the price people prefer quality of voice second because they are paying for the voice if the voice is not clear to them which they are paying for they defiantly they switch to other operators. Coverage: After the quality of voice second available factor for  customer switch age is coverage. Users perceive that the operator’s services are available to them where they visit. If they find signal problem they may switch to more coverage operator in the sectors Promotion: With promoting services that has factor too for consumer switch age. Fierce promotion leads an image in the mind of the consumers that company offers many servers and â€Å"a customer focus company†. MARKET Pakistan currently has one of the largest allies of young people in its history, with approximately 25 million people between the ages of 15 and 24. Target market group of cellular sector ranges from 15 to 64 percent which according to demographic profile of Pakistan consist of 56.9% (male 48,214,298; female 46,062,933) of total population. As in the Buying behavior we have studied that Female and male both contribute into making decision for the purchasing of the brand. So the both genders would be in target market. In spite of this professionals are also Mobilink target audience. The Employment Status categorizes majority (45%) as employees followed by own account workers (42%).  About one in ten workers (11%) are reported as unpaid family workers and one & a half percent as employers. As far changes in the comparative periods, unpaid family workers fall by some fractions, employees indicate some increase while own account workers and employers remain on the same level. In the buying and sales of  rise of urban consumerism, global corporate such as Unilever, P & G, GlaxoSmithline and many small & medium enterprise and local  national companies emerges both manufacture and sell their products Mobilink brand also depends on these customers too. Along with the   in Pakistan. In manufacturing and natural resources, Shell and BP are present in addition to the Pakistani state oil company. Honda, Nissan and  Suzuki are among international automotive manufacturers with plants in Pakistan. Mobilink fulfill needs of these local MNC’s local national and SME’s firms by providing them special service package Brand Inventory COMPETITOR’S ANALYSIS COMPETITIVE COMPARISON MATRIX Bring innovation and VAS and data services to increase revenue Market Growth and industry expansion Threats †¢ Recession in economy. †¢ Rapid change in consumer demand. †¢ Inconsistent and adhoc decisions from regulatory authorities. †¢ Political Instability, Security issues. †¢ Adverse shifts in trade policies of government. †¢ High taxation rate of activation tax is causing a slowdown in consumer growth especially all in rural areas. †¢ Price competition †¢ Larger competitors network coverage †¢ Strong advertisement and media presence of competitors †¢ Entrance of new competitors like Zong. †¢ Presence and the acceptability of competitor brand like Telenor and Ufone Strengths: †¢ Leveraging brand equity from international corporate â€Å"Abu Dhabi Group† †¢ Having modern network capabilities in respect of infrastructure. †¢ Financial strength of share holder and their telecom expertise ‘Warid international† †¢ Large Post paid based generating high ARPU †¢ State of the art IP based contact center and leading data center †¢ It has technical partnering involving â€Å"SingTel†, â€Å"Nokia† and â€Å"Wateen†. Weaknesses: †¢ Need to expand network coverage. †¢ Need to increase brand awareness and improved market positioning †¢ Lack of proactive churn management and stimulate programs to address inactive subscriber Page 20 of 28 Brand Positioning COMPETITORS SWOT MATRIX Low promotional packages activities The product line is too narrow. Strengths: †¢ Subsidiary of PTCL. †¢ Stream line benefit. †¢ Knowledge about country culture. †¢ Experience Variety of †¢ Value Added Service †¢ Broad market coverage. Weaknesses: †¢ Stagnant Profitability †¢ Low market share as compare to competitor (Mobilink). †¢ Overly Dependent on PTCL Strengths: Superior infrastructure & technology in PAKISTAN Have a very strong financial. They have the ability and resources to hire skilled engineers. Large number of Subscriber Weaknesses: Low market share as compare to competitor (mobilink) Limited coverage due to newly introduce in the market Signal problem due to limited network Strengths: World biggest network A product of China Mobile Company. Page 21 of 28 Brand Positioning Leverage financial resource from CMC Experienced administration Weaknesses: †¢ Low market share as compare to competitor †¢ They are unable to improve the network means that they are not using their resources. †¢ There is the diversion of customers towards other brands due to connectivity issue BRAND INVENTORY BRAND ELEMENTS: Brand elements consist of brand name, color, Urls, symbols slogans, sound and jingles through which one brand is differentiated from other brands. Brand Name: Mobilink Urls : http://www.mobilinkgsm.com Logos and Symbols: Slogans: Apna Hai Purple and Whitish Purple CORE BRAND VALUE Page 22 of 28 Brand Positioning Colors: Quality: Mobilink Telecom has an uncompromising commitment to quality in this regard. that is why they spare no efforts in pursuing the best in network‚ services‚ product offerings. Innovation: For years‚ people complained of the same things on mobiles. At coverage‚ they are constantly look to make the communication experience different by doing things in a better way. They already introduced 3G supportable system for being see the need of this in the near future. For seeing the growing trend of SMS usage Mobilink has introduces SMSC-less messaging infrastructure that controls the traffic of SMS and makes sure the delivery of messages without involving pending issues. Customer-Friendliness: They enjoy working and succeeding together by building close relationships. While they have a sense of purpose in their operations‚ they also have a strong culture that demonstrates to customers that â€Å"Reshaping communciation†. Mobilink considers the needs of customers first. Coverage: Mobilink has widest network coverage all over Pakistan. One can find the network if they go to northern areas or remote city of Pakistan Mobilink message are communicated through using all channels of media including building an identity for the corporation and brand, advertising campaigns, sponsorships, media relations (newspaper coverage, press releases, press conference before launching etc), point of sale material preparation (brochures, tariffs, flyers etc), website. Message delivered on electronic media through jingle and using celebrity endorsement. First ever add that comes in the electronic media is symbolize with rain season that bring hope and refreshment and new joy. Now a day it bran message come man through ball to boys who are playing Cricket symbolize that Mobilink is customer oriented and helping the customer in even small mattes. MARKETING PROGRAM Media: Mobilink has always tried to deliver truthful and interesting advertising to its viewers. Through these ads they are trying to convey the message that Mobilink is solely meant for the people’s benefit and convenience. They advertise through Channels like Geo Super Geo, hum TV and through News channels, PTV, ARY and, News 1 TV, Dunya News etc. Print media: Mobilink has designed attractive brochures for their customers. These brochures contain all the necessary information about their package deals and tariffs. Hence, making it easier for the people to know about the general prices and services offered. Sponsorship: Mobilink advertise through sponsorship in Golf matches, Mobilink agreement with PCB and Mobilink and Citi card launch. Also it got sponsorship with Pizza Hut. BRAND ASSOCIATIONS: These are the desired associations which Mobilink wants to create in the mind of customers. Brand Positioning Mobilink Voice Quality Premium Brand Network Coverage