Thursday, November 28, 2019

Life cycle analysis

Relevance of conducting a life cycle analysis from a business prospective Environmental awareness is on the rise, and industries and businesses are evaluating ways through which their activities impinge on the environment. In response to this awareness, businesses have provided green products and are using greener processes as well as environmental management tools in their production of goods and services. An example of such a tool is life cycle analysis, also referred to as life cycle assessment.Advertising We will write a custom essay sample on Life cycle analysis specifically for you for only $16.05 $11/page Learn More Conducting a life cycle analysis is one of the most important processes done today for the successful implementation of environmental sustainability. One of the uses of this process is identifying and categorizing decisive areas whereby the environmental performance of a product can be made better. Businesses will prefer life cycle ana lysis because of its unique characteristics unlike other environmental sustainability systems; for example, it covers all the environmental releases and processes beginning with raw material extraction as well as energy production used in the creation of products, in addition to the use of the products and their final disposal. It is therefore relevant when deciding between two alternatives, as it can help decision-makers make comparisons on the major impacts caused by goods, services or processes (Seliger, Khraisheh, Jawahir, 2011). As a cradle to grave process, life cycle analysis evaluates every stage of the life of a product. The process is also relevant for businesses because it makes it possible to estimate the cumulative environmental effects that result from all the stages involved in the product’s life cycle. These effects may not be included in other methods of analysis, for example effects of raw material extraction or effects son product disposal. This way, the a nalysis process enables businesses to have a comprehensive view of the various environmental aspects of the product as well as a more accurate image of the real environmental trade-offs involved (Cohen, 2010). The cradle to grave life cycle of a newspaper Raw material extraction and processing Newspapers, just like other types of papers, are made of connected fibers. These fibers are obtained from a variety of sources including plants, trees, or even cloth rags. For newspapers, sawmills provide the fiber. Strong paper is usually made from coniferous trees because the fibers found in the pulp of these trees make strong paper.Advertising Looking for essay on environmental studies? Let's see if we can help you! Get your first paper with 15% OFF Learn More The trees are referred to as softwood trees. The increasing demand for paper has however led to the use of almost every species of trees to extract logs. These trees undergo the logging process, which can be achieved usi ng sawmills (Ranchhod Marandi, 2012). Manufacturing The first step in manufacturing is making pulp. Various processes are used to convert logs to wood pulp. The mechanical process is a commonly used process; here, logs are crushed in big drums to remove bark. Subsequently, they are taken to grinders, that press them hard between big revolving slabs. The filtering process then follows. The chemical process can also be used to make pulp; here, wood chips are cooked from de-barked logs in a chemical solution found in digesters. At the digesters, the chips are boiled at a high-pressure solution of sodium sulfide and sodium hydroxide. It is at this stage that bleach or colorings are added. From this process, the pulp is taken to the paper plant (Ranchhod Marandi, 2012). The process of converting the pulp to paper begins at the beating process; here, the pulp is squeezed with machine beaters. Several filler materials are also added at this process, such as chalks, chemicals, clays or ev en titanium oxide. The final process involves taking the pulp to big automated machines that have moving conveyer belts. Here, water is drained off and the pulp is then taken to the press section, and over steam-heated cylinders for further drying. This paper is then wound on big reels and further processed using metal rollers c calendars that give it the desired finish (Ranchhod Marandi, 2012). Purchase, use, and disposal The newspaper printing process is responsible for the purchase and use of papers from the paper mill, for use by the printing press of newspapers. During newspaper printing, a lot of energy and raw materials are consumed, for example inks and printing plates. The printing press purchases paper from the paper mill. The disposal of newspaper is done through several ways. One is recycling, whereby the newspapers are taken back to the paper mill and, using chemical processes, are transformed anew. Land filling can also be used to dispose of the newspapers (Hesselbach Herrmann, 2011).Advertising We will write a custom essay sample on Life cycle analysis specifically for you for only $16.05 $11/page Learn More Waste management Waste management in the life cycle analysis of newspapers is done in various phases of the cycle. A thorough analysis of this process reveals that it is during the paper mill stage that the most emissions are produced. It is also in this stage that the most resources are consumed, largely because of its high-energy consumption. The landfilling process is also responsible for high emissions, considering the high methane emissions of the disposal process compared to other stages of the life cycle. Various waste management solutions are developed, and the following conclusions and recommendations can be established. The inclusion of the production stages of the waste management process, this can help in obtaining a realistic picture of the relevance of the individual life cycle phases on the gene ral impacts (Dahlbo et al, 2005). Paper is one of the biggest contributors of solid waste components. It is also a material that originates from a very important natural resource whose maintenance and sustainability is crucial, the forest. It is recommended that during the manufacture process, newspapers can be co-combusted or incinerated. These modern waste management processes have the capability to decrease using de-inked pulp. Otherwise, using virgin fiber-based pulp in the manufacture of newsprint is more effective. During the treatment and waster recovery stage, it is important to remember that landfilling of newspapers in their untreated state is environmentally worse compared to their energy recover (Hesselbach Herrmann, 2011). In its disposal management, the combustion of newspaper using solid recovered fuel, rather than coal can save significant amount of energy. References Cohen, N. (2010). Green Business: an A-Z Guide. New York: SAGE. Dahlbo, H., Koskela, S., Laukka, J. , Myllymaa, T., Jouttijà ¤rvi, T., Melanen, M. Tenhunen, J. (2005) Life cycle inventory analyses for five waste management options for discarded newspaper. Waste Management and Research 23:1-13. Hesselbach, J., Herrmann, C. (2011). Glocalized Solutions for Sustainability in Manufacturing:Proceedings of the 18th CIRP International Conference on Life Cycle Engineering, Technische Università ¤t Braunschweig, Braunschweig, Germany, May 2nd- 4th, 2011. London: Springer.Advertising Looking for essay on environmental studies? Let's see if we can help you! Get your first paper with 15% OFF Learn More Ranchhod, A., Marandi, E. (2012). CIM Coursebook 07/08 Strategic Marketing in Practice. London: Routledge. Seliger, G., Khraisheh, M. M., Jawahir, I. (2011). Advances in Sustainable Manufacturing. New York: Springer. This essay on Life cycle analysis was written and submitted by user Darren I. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

Westnile Disease essays

Westnile Disease essays About the Virus, the Disease, and Its Spread West Nile virus is spread by the bite of an infected mosquito, and can infect people, horses, many types of birds, and some other animals. Most people who become infected with West Nile virus will have either no symptoms or only mild ones. However, on rare occasions, West Nile virus infection can result in severe and sometimes fatal illnesses. There is no evidence to suggest that West Nile virus can be spread from person to person or from animal to person. Overview of West Nile Virus Updated Q: What are West Nile virus, West Nile fever, and West Nile encephalitis? A.West Nile Virus is a flavivirus commonly found in Africa, West Asia, and the Middle East. It is closely related to St. Louis encephalitis virus found in the United States. The virus can infect humans, birds, mosquitoes, horses and some other mammals. West Nile fever is a case of mild disease in people, characterized by flu-like symptoms. West Nile fever typically lasts only a few days and does not appear to cause any long-term health effects. More severe disease due to a person being infected with this virus can be West Nile encephalitis, West Nile meningitis or West Nile meningoencephalitis. Encephalitis refers to an inflammation of the brain, meningitis is an inflammation of the membrane around the brain and the spinal cord, and meningoencephalitis refers to inflammation of the brain and the membrane surrounding it. Q. Where did West Nile virus come from? A. West Nile virus has been commonly found in humans and birds and other vertebrates in Africa, Eastern Europe, West Asia, and the Middle East, but until 1999 had not previously been documented in the Western Hemisphere. It is not known from where the U.S. virus originated, but it is most closely related genetically to strains found in the Middle East. Q. Historically, where has West Nile encephalit...

Thursday, November 21, 2019

Malcolm X Essay Example | Topics and Well Written Essays - 750 words - 2

Malcolm X - Essay Example Malcolm writes: "My two other images of my father are two outside the home: he never pastured in any regular church of his own" (p. 7). Similar to his father, Malcolm created his own religion based on century-old traditions and values, morals and ideals. Malcolm's sister, Ella Collins, explained that Malcolm X was present at chapter meetings almost from birth. Political ideas and rebellious issues expressed in the meetings, formed personality of Malcolm and his life perception. Also, Malcolm admits that: "the image of him [father] that made me proudest was his crusading and militant campaigning with the words of Marcus Garvey (p. 8). Further, Malcolm became a militant leaders fighting for pride and self-determination of black people. Malcolm's childhood was filled with the emerging urban culture of Black America. Malcolm's rooting in the U.S. working class was incomplete. Riding the rails as a porter and later established in Harlem, the cultural capital of the Black world, Malcolm X developed a deep, if only partly conscious, sense of the peoplehood of the African American. Malcolm admits that: "it was only me that he sometimes tool with him to the Garvey UNIA meetings which he held quietly in different people's homes" (p. 8). Similar to his father, Malcolm supposed that no Black man at this time could be easily and unequivocally rooted in the working class. Malcolm's family and father was unusual in that it made the transition from the southern rural countryside to the northern urban city intact and started out as the nuclear family of the American Dream. During these years, Malcolm's father played both in the family and in the UNIA a strong leadership role. The "New Negro" concept embodied a new view of the role of Blacks in social change. It represented a further development of themes first seen in the Negro movement at the turn of the century. Malcolm's father was following a model of Black liberation popularized at this time. All these features have a great influence on Malcolm and his life aspirations. His father supposed that: "freedom, independence and self-respect could never be achieved by Negro in America" (p. 4). Further, Malcolm opposed this view fighting for racial equality and identity politics. To some extent, the full power of Malcolm's intellect was held in check due to the magnetism of his father's personality and the very special and personal role that he played in Malcolm's life. Political figure of his father had immense power and prestige, and obviously one that Malcolm X did not subject to his otherwise methodical scrutiny. It is possible to say that Malcolm used Black national ideas of his father and transform them into a separate national movement, but later expelled that nationalism from the NOI to protect its theology from internal criticism and to deflect an activist thrust which would lead to repression. For Malcolm, he embodied wisdom represented as a keeper of Negro's traditions and values. "I reflected many, many times to myself upon how the American Negro has been entirely brainwashed from ever seeing or thinking of himself, as he should, as a part of the nonwhite peoples of the world" (p. 56). These ideas helped Malcolm to create a framework for the reformulation of Black nationalism in a more internationalist and revolutionary manner and thus facilitated the linking of the Civil Rights movement with the

Wednesday, November 20, 2019

Zara Essay Example | Topics and Well Written Essays - 1500 words - 1

Zara - Essay Example Several leading organizations are trying to implement business expansion strategy in order to develop a potential global client base and achieve significant market share growth. Zara has a strong global presence. The brand implemented a unique operation management strategy in the business processes which is totally different than other retailers selling similar types of apparels. Zara is known as a vertically integrated retailer. The organization has high control on each and every step in supply chain, manufacturing, designing and distribution of the products. The company has set up its own production factory in major areas around the globe (Jones and Robinson, 2012, p.29). It helped the organization to control each and every business operation process individually. Effective integration and close look at each and every business process help the organization to maintain a strong control on production and distributions. It is discussed earlier that the organization adopted different o peration strategy in business process unlike to the similar retailers or organizations. Zara adopted just-in-time approach in the business model in order to enhance the supply chain, inventory management, and logistics management and distribution management process. The manufacturing units are located in several parts in the world. It is true that the warehouses of Zara are located in Spain. 50 % of products are manufactured in Spain. The rest of the products are manufactured throughout the world. It is a significant example of effective operation process (Slack, Chambers and Johnston, 2010, p.97). It is true that, several leading organizations used to outsource products and services from the parent country. It increases the outsourcing cost and supply chain cost. Glocal manufacturing and distribution process helped Zara to cut down the outsourcing cost. Now-a-days, Zara is significantly trying to expand its business practices due to favourable external environmental factors. In add ition to this, strong global brand name is influencing Zara to implement global expansion strategy. Manufacturing factories in different places and strong vertical integration in business model are helping Zara to adopt and implement global expansion strategy quite successfully. Question 2 Zara, being one of the leading global apparel retain chain is facing several operation management issues in its global expansion strategy. It is discussed earlier that the organization adopted vertical integration strategy in the business model. In addition to this, the organization implemented just-in-time approach in the supply chain and distribution management process. Zara believes in lowest inventor management. Zara never goes for mass production and huge inventory. According to the management of Inditex group, large inventory can affect the product quality and brand image of the organization (Johnston, Clark and Shulver, 2012, p.76). The percentage of annual sales of Zara is lower that other potential competitors due to this reason. In addition to this, Zara used to avoid developing inventories in its supply chain part from the resources and raw materials to the end users. The brand designs and manufactures almost 10,000 new models in every year and distributes it to all the retailers twice per week. This system actually increases the inventory management cost. The organization believes that large inventory and limited logistics activity can reduce the exclusivity of the products as the organization tries to provide quality and exclusive products to the target customers. The organization faced

Sunday, November 17, 2019

Case study Essay Example | Topics and Well Written Essays - 750 words - 25

Case study - Essay Example It is also proposed that the company should run a customer reward system that will reward loyal members who have retained their membership till they are adults and loyal customers through discounts and giveaways and competitions. Since scouting is entirely an adventure experience, Scouts Canada should focus on trying to increase membership not only among boys but also girls, women and men too who are stressed and need to learn essential life skills. Because of the changing nature of the contemporary people, it is proposed that Scouts Canada should come up with new badge programs such as mountain biking, street sports, healthy eating and other issues that affect the country. The target membership of Scouts Canada is anticipated to increase by 30% with an increase in adult membership by 30%. This will allow the marketing team to know the success of the recommendations and offer feedback on which areas the company can improve on. Scouts Canada is a scouting organization in Canada known for its merit badges. The organization offers programs to the young people between the age of 5 and 25. The organization has the highest membership in Canada making it the largest youth organization in the country (Scouts Canada, 2014). The organization realized that its image was a bit worn because of the decline in membership and volunteer support. Because of the numerous cases of image tarnishing, Scouts Canada have to come up with a marketing strategy in order to reposition itself. Since Scouts Canadian membership goes at a high price of $205 for beaver to venture scouts and $180 for the first child, it is recommended that the membership price be discounted to $160 and $100 charged for the second and third child from a single parent. A reduction of the prices will encourage more parents to get involved in their child’s life and increase

Friday, November 15, 2019

Risks in Social Networking Sites

Risks in Social Networking Sites A social network is a map of the relationships between individuals, ranging from casual acquaintance to close familial bonds. Virtual communities are built around affinity and similarity. Social networking sites allow people to gather online around shared interests or causes, like finding people who live nearby or who are in the same age range. It is also one of the most popular Internet activities among teenagers. Friends are everything to a teen. New technologies in the last few years have provided opportunities for teens to make cyber friends in addition to their real world friends. These sites allow teens to design their own personalized page on the Internet, much like an interactive scrapbook, that can include their favorite music clips, their choice of background designs or wallpaper, photos, favorite quotes and any other information about themselves and anyone else that they wish to include. The websites combine many Internet features into one: personal profiles, blogs (web logs like an online diary or journal), places for photos and videos, the latest news in pop culture about music groups or hot new products, opinion polls, user groups, and more. Some of the most popular social networking sites for teens include MySpace, Facebook, and Bebo. Social networking websites have potential for both negative and positive consequences. These are public websites. Which means people of all ages, interests, and backgrounds have access to them. Due to the information sharing nature of these sites, teens face on critical and dangerous problems caused by using their personal information from others. There are many positives things about these websites when used appropriately. Creation of a personal web page can be a very creative outlet for a teen. Frequent entries into an online blog can give teens practice in writing and expressing their thoughts and opinions, which would improve their communication and language skills. Through using technology, teens are learning how to play with and use large amounts of data and information. Teens are also learning skills needed to build a website and use other technologies. Some other positive facts of the social networking websites are that people who share the same interests interact. They make these site a meeting point. They share school research documents and develop artistic talents and experiments with other forms of content creation. While most of this online interaction is just for fun, there are dangers for teens. While todays teens may be more digitally savvy than their parents, their lack of maturity and life experience can quickly get them into trouble with these new social venues. On the other hand, abusing of the social networking websites occurs harassment, tormenting, or sexual advances. Some criminals locate person with only his/her last name and town. To protect the teens from these online predators we need to look into the reasons why like these sites. Why are teens so attracted to social networking websites? 1. Consider the world in which todays teens have grown up. The media has made very public the personal lives of well known people from entertainment, sports, and political circles. Celebrities live out their lives in the limelight. Other examples are TV reality shows many of which are popular with teens. As mentioned earlier, friends are everything to a teen. As todays teens are growing up, they view the Internet as a place to hang out just as real world places are. Using the Internet to connect to friends they know in person and to make new friends is a natural step its just another way to communicate. Todays teens are a self-publicizing generation. It is natural for them to put information out there. A normal developmental task for teens is figuring out their identity. For example, it is typical for teens to try on different identities through their clothing and hairstyle choices. Designing a webpage complete with favorite symbols, quotes, and pictures can also be viewed as a way to try on an identity, test an image, and get feedback from others. 2. These sites expose teens to the world. They enable teens to access people living anywhere in the country or in foreign countries, as well as their peers from school. Its a place where they can create and showcase who they are and also keep tabs on all of their friends. Unless under a hidden view or setting, profile pages are open for all to see. But teens love social networking sites because its their space. There is a sense of empowerment attached to controlling a piece of their own world and this is typically a world where parents are not present. Privacy and Security Issues in Social Networking There are very serious privacy and safety issues with regard to social networking sites. Anyone worried by privacy issues on social networking sites should ask themselves the question: is the next generation even going to be bothered by online security? A survey in the U.K. has discovered that 25% of teenagers have either hacked or attempted to hack their mates Facebook accountsdespite four out of five of them admitting that they knew they were doing wrong. Most of the 1,150 under-19-year-olds, who were questioned anonymously, said that they tried to crack their friends passwords for fun. Some 21% said that they hoped to cause disruption (as Facebooks founder Mark Zuckerberg allegedly did at Harvard). A successful hack, however, was harder to manage than the kids had envisaged, with 82% saying they hadnt succeeded. As regards Facebook and privacy issues, theres been a fair amount of keyboard pounding. The problem, its implied, is with Zuckerbergs company ethos as he strives to eke as many dollars as possible out of the site. However, perhaps there is some meat in the argument that kids are less bothered about what actually constitutes a persons right to keep his private stuff just that. Tufin Technologies, the firm that commissioned the study, claims that it demonstrates that kids needed educating about what is and isnt acceptable with online privacy. Playing around with computers and trying to understand the system can be leveraged for good and bad purposes, said Reuven Harrison, one of the co-founders of Tufin. Theres a fine line at which point it becomes something bad. Children dont always understand where that line is. Risks associated to the use of social network services identified up to now include the following: The notion of oblivion does not exist on the Internet. Once stored it stays there forever. Data, once published, may stay there forever, even when the data has been deleted them from the original site, there may be copies with third parties. Additionally, some service providers refuse to speedily comply with user requests to have data, and especially complete profiles, deleted. The misleading nature of the community. If users are not openly informed about how their profile information is shared and what they can do to control how it is shared, they may by the misled into thoughtlessly sharing their personal data they would not otherwise. The very name of some of these sites like MySpace creates the illusion on the web. Free of charge may in fact not be for free. Many social networking providers make money by selling user data such as email to service providers for marketing purposes, e.g. for (targeted) marketing. Traffic data collection by social network service providers, some providers have an ability to collect and record every single move by a user. Some details like IP address are given to third parties for advertising. Note that in many jurisdictions these data will also have to be disclosed to law enforcement or secret services upon request, including maybe also foreign entities under existing rules on international cooperation. For many of the social networking site user data are only the thing they have to make profit. So they use it to maximize their profits. Giving away more personal information than we think. For example, photos and, social graph functionalities popular with many social network services do reveal data about the relationships between different users. Misuse of profile data by third parties: This is probably the most important threat potential for personal. Depending on available privacy settings profile information, including pictures are made available to the entire user community. And very little protection is present against copying any kind of data from profiles. Law enforcement agencies and secret services are other entities. Possible hijacking of profiles by unauthorized third parties. Use of an insecure infrastructure. The introduction of interoperability standards and application programming interfaces to make different social network services technically interoperable entails additional new risks. Social issues Cyber-Bullying by Teenagers Should society be concerned? Many teens argue that rating is harmless fun. Fun it probably is, but whether it is harmless only time will tell. Teachers, lecturers and professors could find themselves unknowingly the subject of ribaldry, criticism, victimization or worse. Potential exists for slander and defamatory suggestions, if ratings are accompanied by gossip. Social Networking and Harassment The internet has had a reputation for being a platform for online bullying. Sometimes cyber-bullying has involved student to student situations. Sometimes harassment issues in the workplace have found their way online and teens have been targeted by online predators. Teenagers have found themselves giving statements to the law about bullying allegations, now this could affect teachers too. Online Bullying Health Issues for Teachers Stressed teachers, who are sometimes trying to give of their best in difficult circumstances, could be subjected to additional emotional and psychological trauma. Teenagers can be cruel in their humor and comments could be misleading, inaccurate, or derogatory, with scope for invention and exaggeration. Some would not realize that an online campaign of uncomplimentary performance ratings, ridicule or even threats might have negative consequences for teachers well-being. Laws Pertaining to Social Networking Sites The two most important statutes to consider when discussing the legal liabilities and obligations of the social networking sites are Section 512(c) of the Digital Millenium Copyright Act and Section 230 of the Communications Decency Act. Section 512 Section 512(c) removes liability for copyright infringement from websites that allow users to post content, as long as the site has a mechanism in place whereby the copyright owner can request the removal of infringing content. The site must also not receive a financial benefit directly attributable to the infringing activity. Section 230 Section 230 of the Communications Decency Act immunizes website from any liability resulting from the publication of information provided by another. This usually arises in the context of defamation, but several courts have expanded it to cover other sorts of claims as well. Thus, if a user posts defamatory or otherwise illegal content, Section 230 shields the social network provider from any liability arising out of the publication. Websites that, in whole or in part, create or develop contested information, on the other hand, are deemed content providers that do not benefit from the protections of Section 230. For example, MySpace.com attempts to restrict the ability to view underage profiles by preventing older users from accessing them. In effect, the web site filters the content based on answers provided during registration to ensure that only minors of certain ages can view other profiles from that age group. This would almost certainly qualify as meta-information under the Roommates.com decision, and would bump MySpace out from under the protection of Section 230. State Laws In addition to these federal statutes, several states have enacted or proposed laws that would create requirements for social networking sites, particularly in regards to monitoring the presence and activities of sexual predators using the sites. For an example, the North Carolina state senate recently passed a bill requiring that parents and guardians register with a social networking site and verify their ages before their children can sign up for an account. This is to counter the difficulty in verifying the ages of minors, who usually lack credit cards or other sources of information concerning their ages. That bill still requires approval from the North Carolina House of Representatives. Childrens Online Privacy Protection Act (COPPA) The New Problem of Sexting Sexting refers to sending a text message with pictures of children or teens that are inappropriate, naked or engaged in sex acts. According to a recent survey, about 20 percent of teen boys and girls have sent such messages. The emotional pain it causes can be enormous for the child in the picture as well as the sender and receiver often with legal implications. Some social networking sites attract pre-teens even kids as young as 5 or 6. These younger-focused sites dont allow the same kinds of communication that teens and adults have, but there are still things that parents can do to help young kids socialize safely online. In fact, when it comes to young kids, the law provides some protections and gives parents some control over the type of information that children can disclose online. For sites directed to children under age 13, and for general audience sites that know theyre dealing with kids younger than 13, theres the Childrens Online Privacy Protection Act (COPPA). It requires these sites to get parental consent before they collect, maintain, or use kids information. COPPA also allows parents to review their childs online profiles and blog pages. Cultural Issues Teens chose to go where their friends are. So they dont randomly select their friends, they connect with people who are like them. This is known as homophily in the sociological concept of which highlights that birds of a feather stick together. By the time most teens join MySpace or Facebook, they already know someone who is on the site. They are attracted to the site because of the people there. MySpace came out as the first and quickly attracted young adults. It spread to teenagers through older. Facebook started at Harvard and spread with in before spreading more broadly. First within Harvard, then to other colleges, then to companies, then high schools, and then the whole world. MySpace came first and many teens chose to embrace it. When Facebook came along, plenty of teens changed to it as the new thing. In doing so, some chose to leave MySpace, while most simply maintained two profiles. Yet Facebook did not simply take over MySpace. In May 2009 comScore reported that MySpace and Facebook had roughly equal numbers of unique visitors. In choosing between the two sites, teens marked one as for people like me, which suggested that the other was for the other people. Teens use social categories and labels to identify people with values, tastes, and social positions. As teens chose between MySpace and Facebook, these sites began reflecting the cultural frames of those social categories. Health Safety Issues Health and safety on the internet applies to the mental health of an individual rather than the physical. For example the use of social networking site Facebook is associated with issues of cyber bullying and peer pressure. Solutions Teen Users of social networks 1. Be careful Think twice before publishing personal data (specifically name, address, or telephone number) in a social network profile. 2. Think twice before using your real name in a profile. Use a pseudonym instead. Note that even then you have only limited control over who can identify you, as third parties may be able to lift a pseudonym, especially based on pictures. Think of using different pseudonyms on different platforms. 3. Respect the privacy of others Be especially careful with publishing personal information about others (including pictures or even tagged pictures), without that other persons consent. Note that illegal publication especially of pictures is a crime in many jurisdictions. 4. Be informed Who operates the service? Under which jurisdiction? Is there an adequate regulatory framework for protecting privacy? Is there an independent oversight mechanism (like a Privacy Commissioner) that you can turn to in case of problems? Which guarantees does the service provider give with respect to handling your personal data? Has the service been certified by independent and trustworthy entities for good quality of privacy, and security? Use the web to educate yourself about other peoples experience with the privacy and security practices of a service provider you do not know. Use existing information material from providers of social network services, but also from independent sources like Data Protection Agencies, and security companies. 5. Use privacy friendly settings Restrict availability of information as much as possible, especially with respect to indexing by search engines. 6. Use different identification data (e.g. login and password) than those you use on other websites you visit (e.g. for your e-mail or bank account). 7. Use opportunities to control how a service provider uses your personal (profile and traffic) data. E.g. opt out of use for targeted marketing. What parents can do Learn what your teen is doing on the Internet. One way is to ask your teen to help you with doing a task on the web. Help teens know what is appropriate to put on the web. They have the web knowledge but you have life experience. Be clear about what is not safe to post on the web: full name, address, specific places they go, phone numbers, ethnic background, and anything else that would help someone identify or locate them. Remind your teen that strangers and people they dont want accessing their information have the ability to do just that. Once something is posted on the web, it is no longer private. Stress that the rules of social networking sites must be followed. There are age limits on most sites. Establish limits on how much screen time your teen has including time at the computer, watching TV, or playing video games. Invite your teen to show you his/her web page. Give him/her a day or two of warning before looking at it. Some teens may rethink what they have posted. Consider joining the same website your teen is on and setting up your own profile. That way your teen will be able to look at your profile and you will be able to ask to view his/her profile. Knowing this, teens will be much better at self monitoring. Conclusion à ¢Ã¢â€š ¬Ã‚ ¢ Bullying and other threats which young users inflict upon each other may be more likely to arise than threats from adults. à ¢Ã¢â€š ¬Ã‚ ¢ Much is known about potential risks, but more research on the nature and extent of harm actually experienced by minors online is needed. à ¢Ã¢â€š ¬Ã‚ ¢ Parental involvement in their childrens online activity is important, but principles of privacy and trust should dictate how parents help children to stay safe. à ¢Ã¢â€š ¬Ã‚ ¢ Education and awareness are the most important factors in enabling minors to keep themselves safe. à ¢Ã¢â€š ¬Ã‚ ¢ Industry self-regulation is the preferred approach for service providers to meet public expectations with regard to the safety of minors. Legislation should not place burdens on service providers which prevent them from providing minors with all the benefits of social networking. However, available safety measures vary greatly from one provider to another and mandatory minimum levels of provision may need to be established. à ¢Ã¢â€š ¬Ã‚ ¢ There are a number of resources for learning how to guide youth, and program leaders can direct parents to them. One Internet watchdog, Parry Aftab, has several websites with advice tailored for parents, police and the youth themselves. One of them, WiredSafety, contains a guide to staying safe in online social networks.

Tuesday, November 12, 2019

The Global Transportation Industry: Bombardier Essay -- Case Study

Political Factors Being a major player in the global transportation industry, governments are both partners and customers to Bombardier. The transportation industry is seen as a quintessential strategic industry due to its highly profitable nature and contribution to a country's economic growth and prosperity, attracting significant support from their governments. The Government of Canada provides Bombardier with various subsidies such as tax breaks, financing, loan guarantees, and R&D support. The federal government, through EDC (Export Development Canada) administer these subsidies, even providing loans to international airlines enabling them to buy regional aircrafts from Bombardier . Such initiatives are necessary to allow Bombardier to thrive in an industry dominated by state backed international rivals. However, the issue of unfair subsidizing to undercut completion has been subject to legal cases and numerous allegations among the major rivals. The impact of this attention is being seen in the form of more conservative subsidy measures. In the light of such scrutiny, this trend is set to continue, forcing Bombardier to evolve into a more independent self sustained company. Economic Factors Along with the rest of the world, Bombardier has suffered the ill effects of the recession. However, there is an upward trend in the transportation industry led by growing demand and impressive economic growth forecasts in developing nations such as China and India. For the next 20 years, a return to sustained growth in business aviation is predicted, with a estimated demand for 24,000 business jets in all segments in which Bombardier competes. This represents total revenues of approximately $626 billion for the industry. These fac... ...any that is able to sell at a higher rate than cost has a greater chance of being more successful. Overall, Bombardier has been able manage a gross profit in the range of 15-16%. Given the nature of their operations being mostly on a contract basis, meaning that their product prices differ by customer, this shows that Bombardier is able to successfully sell their products at a consistently profitable manner. Additionally, it represents their ability to negotiate with customers. Of great notice is that they were able to maintain their margin levels throughout the recession of 2008-2009. Sources: Wiedman, 2002: http://www.camagazine.com/archives/print-edition/2002/dec/regulars/camagazine25484.aspx Stanford & Eprile, 1999 http://findarticles.com/p/articles/mi_hb6419/is_3_73/ai_n28735186/ SEC press release, 2004 http://www.sec.gov/news/press/2004-144.htm

Sunday, November 10, 2019

Warren Court

Between 1953 and 1969, Earl Warren was the Chief Justice of the United States Supreme Court. Supreme Court decisions made during the â€Å"Warren Court† time period led to significant changes in different aspects of life in the United States. The Warren Court affected public schools, separation of church and state, and the rights of individuals accused of crime. The Warren Court affected public schools. The Brown v. Board of Education had a big part in the Warren Court. They decided to ban segregation in public schools. Therefore, more black children attended white schools.However, the Brown v. Board of Education decision did not abolish segregation in other public areas, such as restaurants and restrooms. The Warren Court affected prayer in public schools. Engel v. Vitale decision states that prayer is no longer allowed in public schools. John F Kennedy suggested a â€Å"remedy† to people who disagree with Engel vs. Vitale. He says to pray more at home and not in schoo l. However, prayer in public schools continued. Prayers are part of school activities from early morning moments of silence to lunchtime prayer sessions.The issue in this continuing debate is that people wanted to continue fighting religion in school. Lastly, the Miranda decision affected American society. It has increased public awareness of constitutional rights. More people now know their rights and what they are entitled to. Someone accused of a crime be informed of his or her constitutional rights prior to interrogation. This protected the rights of the accused. Therefore, the Warren Court greatly affected American society. The Warren Court affected public schools and desegregation, prayer in public schools and the rights of individuals accused of crime.

Friday, November 8, 2019

The History of Feminism

The History of Feminism Free Online Research Papers The feminist movement in the United States began in 1948 in upstate New York. The first women’s rights convention was in July 19th of that year. The women involved with the feminist movement were ridiculed for fighting for women’s rights but it did not stop them from standing up for their beliefs. One example of a woman willing to do whatever it took to gain women’s rights was Susan B. Anthony. She was arrested for attempting to vote in the presidential election in 1872. These first women who advocated women’s rights became known as the â€Å"first wave of feminists.† Their greatest success was the passage and ratification of the Nineteenth Amendment to the Constitution granting women the right to vote beginning in 1920. Although they succeeded in gaining the right to vote, they did not succeed in reforming women’s social and economic positions. The early and middle 20th century women’s movement eventually became much less powerful force for social change. The second wave of feminism emerged in the 1960’s and went into full force in the 1970’s. The political activism involving the war and the fight for the rights of black people of the 1960’s led women to reexamine their powerlessness. Women were becoming more aware that they had accepted the sexist attitudes and practices in traditional gender roles. Because of their realization, they began challenging male dominance and were no longer happy in subordinate and submissive roles. Feminism in today’s society has a slightly different meaning with people than it has in the past. Surveys show that although women are endorsing feminist positions, they do not necessarily accept the label of a feminist. In 1987, 57% of women considered themselves feminists and by 2001, the proportion dropped to only 25%. Feminism as a unified political cause has fallen out of favor because when complex issues are discussed men and women would rather take sides individually. There continues to be a growing rate of acceptance of women in non-traditional roles such as working rather than staying home and taking care of the house and family. Since the fight for women’s rights began, feminists have endorsed the passage of the equal rights amendment, affirmative action for women and minorities, federal legislation outlawing sex discrimination in education, greater representation of women in government and the right of a legal abortion. Intersection of Social Inequality The Matrix of Domination is used to show the various intersections of social inequality including gender, social class, race and ethnicity. It shows how several social factors can converge to create a cumulative impact on a person’s social standing. Gender roles among African Americans have always provoked controversy. Advocates of Black Nationalism argue that feminism distracts women from fully participating in the African American struggle and believe feminist groups among them divide the black community. Black feminists oppose this view and argue there is nothing to be gained by accepting gender-role divisions of the dominant society. Native Americans stand out as an exception to the patriarchal tradition and consequently, most Native American women have resisted gender stereotypes. Latina’s are usually considered either part of the Hispanic or feminist movements, hardly ever both. They have been excluded from decision making in the two social institutions that affec t their daily lives: the church and the family. Abortion from a Global Perspective In 1973, the Supreme Court granted women the right to terminate pregnancies in the United States. The court ruling known as Roe v. Wade was based on a woman’s right to privacy and the decision was applauded by pro-choice groups and greatly condemned by pro-life groups. The legalization of abortion caused much controversy within the pro-life groups because of their belief that life begins at conception and they viewed abortion as an act of murder. The debates following Roe v. Wade have continuously revolved around prohibiting or at least limiting abortions. A large debate began in 1971 when the state of Missouri began requiring parental consent for minors wishing to have an abortion. Other debates include the technological advances in the medical field like the â€Å"morning after pill† and abortion inducing pills. Also, ultrasounds are now used by doctors to end pregnancy as early as eight days after conception. Sociologists see gender and social class as the defining issues surrounding abortion and say they are caused by the differences over women’s position in society. Feminists who defend abortion rights typically believe men and women are similar and oppose all forms of sexual discrimination allowing women to be active in the work force outside the home. Opposing this view is the pro life advocates who mostly believe men and women are fundamentally different and view women who work outside the home as destructive to society and their families. Like the United States, many European nations have liberalized abortion laws beginning in the 1970’s. Anti-abortion activists in Great Britain, France, Spain, Italy and Germany were inspired by the strong anti-abortion movement in the United States and have become more outspoken. Even though many countries have legalized abortion, a quarter of all the women in the world live in countries where abortion is illegal or only when her life is in jeopardy and consequently, 40% of all abortions worldwide (about 20 million a year) are performed illegally. Research Papers on The History of Feminism19 Century Society: A Deeply Divided EraThe Fifth HorsemanInfluences of Socio-Economic Status of Married MalesQuebec and CanadaTrailblazing by Eric AndersonAnalysis Of A Cosmetics AdvertisementPersonal Experience with Teen PregnancyBook Review on The Autobiography of Malcolm XAssess the importance of Nationalism 1815-1850 EuropeHip-Hop is Art

Wednesday, November 6, 2019

Webvan Firm Analysis

Webvan Firm Analysis Introduction Webvan is an online firm that deals with packaging, selling, and delivery of grocery products. The firm was established in 1996 under the leadership of Louis Borders. Borders’ vision was to establish a customer-focused grocery firm. The firm’s objective was to increase its customer base by nurturing a high level of customer satisfaction (McAfee and Ashiya 1).Advertising We will write a custom report sample on Webvan Firm Analysis specifically for you for only $16.05 $11/page Learn More One of the ways through which the firm intended to achieve this goal entailed simplifying the consumers’ purchasing process. The firm intended to achieve a high level of effectiveness and efficiency in its operations. For example, Webvan ensured that orders were delivered within thirty minutes. Its efficiency regarding product delivery was facilitated by the fact that the firm established a number of distribution centres. Problem identificatio n In a bid to achieve its vision, Webvan adopted the concept of online marketing. Webvan intended to exploit the niche market that is arising from the growth in the Internet and the high rate at which consumers are purchasing products online. The firm invested heavily in infrastructure, but it did not focus on marketing, which led to low sales. Consequently, the firm’s online model was adversely affected. This paper evaluates the problems faced by Webvan coupled with how they can be resolved in order to reposition the firm as a strong online company. Inherent complexities in Webvan’s business model Despite Webvan’s goals to attain an optimal market position in the e-groceries market, the firm faced a number of fundamental challenges. One of the major complexities faced by the firm relates to the fact that it did not understand how the groceries value chain operates. Therefore, the firm invested in a system that it had not tested (McAfee and Ashiya 3). Secondly, the firm also faced a major challenge in motivating consumers to adopt online shopping in their purchasing processes. During its inception, most consumers were only acquainted with purchasing groceries from convenient stores. By visiting the stores, consumers were in a position to access price discount in addition to gaining a unique experience during the purchasing process. Moreover, most consumers attached little economic value to the amount of time spent when shopping in the supermarket, which means that a significant proportion of consumers did not value convenience. Consequently, online shopping was a rather new concept to most consumers. Therefore, changing the consumers’ behaviour is one of the uphill battles faced by the firm.Advertising Looking for report on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Webvan intended to deliver a wide range of perishable and non-perishable products to custome rs through its online model. However, the 30 minutes duration within which the firm intended to achieve this objective was relatively short. Moreover, this model was untested with regard to delivery of perishable products. Therefore, the likelihood of the model failing was relatively high. Dealing with grocery products was another major challenge that the firm faced, as such products were characterised by low profit margins of 1% to 5%. The firm also faced a major challenge with regard to sustaining its wide product range and meeting the temperature requirements in to preserve the products (McAfee and Ashiya 7). Technological discontinuities and behaviour changes necessary to implement Webvan’s business model Webvan’s failure arose from its inability to understand how it would successfully integrate online shopping technology to groceries. Despite its failure, Webvan can attain an optimal market position by improving its online shopping model. In order to achieve this goal, the firm should focus on a number of technological discontinuities. Technological discontinuities refer to the changes that the firm will be required to implement in order to maximise its sales revenue. Considering the volatile nature of the IT industry, it is imperative for Webvan to develop a well-structured framework to implement the technological changes. First, the firm should align its operations with market changes by identifying the possible technological discontinuities and market needs that might affect its ability to maximise online sales. In a bid to identify the technological discontinuities successfully, Webvan should take into account the customers’ future needs and the prevailing technological trends. This move will minimise the likelihood of the implemented ICT technology from becoming obsolete. The firm should also assess potential substitute technologies that can be incorporated and compare with the technology that has already been integrated (McAfee and Ashiya 9). It is also imperative for Webvan to engage in a comprehensive marketing campaign. The campaign should focus at creating awareness on the benefits associated with online shopping. The firm should conduct its market awareness campaign on both traditional and emerging mediums, which will play a critical role in the firm’s effort to attract its customer base and hence its sales revenue.Advertising We will write a custom report sample on Webvan Firm Analysis specifically for you for only $16.05 $11/page Learn More Some of the aspects that the firm should focus on relates to the economic benefits of online shopping. For example, online shopping saves on cost, as the consumer does not incur additional cost in their purchasing process due to transport. Moreover, online shopping is more convenient with regard to time, as it eliminates the amount of time that the customer may be required to queue. Target market Webvan targeted three main custome r groups, which include the new technologists, price insensitive consumers, and time conscious consumers. Before adopting the online shopping model, Webvan conducted a comprehensive market research. From the market research, the firm identified a customer group that values their time. These customers include senior citizens, mothers with young children, upscale employees, students, and physically challenged customers. Some of these customers such as students, senior citizens, and upscale employees attach high value to the convenience associated with online shopping. Consequently, they prefer shopping perishable and non-perishable products online rather than visiting supermarkets. Challenges associated with Webvan physical plant infrastructure In an effort to exploit the online market, Webvan invested in a high capital and technology intensive project. The project entailed constructing a number of distribution centres in different parts of the US. The distribution centres were fitted with optimal warehousing and order management technologies (McAfee and Ashiya 11). Despite its commitment in implementing the online shopping technology, Webvan experienced a major challenge with regard to meeting the cost of the high-tech warehouse. For example, the firm incurred $40 million in constructing the distribution centres in Atlanta. The firm experienced a major challenge in sustaining the operations of the high-tech warehouses considering the fact that its grocery sales were relatively low. The high cost of operation forced the firm to implement the downsizing strategy. For example, in 2001, the firm retrenched 2000 employees. Most investors in Webvan lost the amount they had invested. Moreover, the firm was forced to apply for bankruptcy protection. Conclusion The case study shows that Webvan faced numerous challenges that hindered its success in the online shopping market segment. First, the firm did not conduct a comprehensive consumer market research in order to det ermine the consumers purchasing patterns. Consequently, its online shopping model relied on assumption rather than market facts.Advertising Looking for report on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More For example, the firm assumed that the prevailing market size in the US would translate into sales, which motivated the firm to engage in an aggressive market expansion. The firm also incurred high cost in maintaining the distribution centres it had established in the US market. Moreover, Webvan’s management team assumed that the frequency of online purchases would enable the firm to maximise its sales. However, most consumers who purchased through the firm’s online shopping system did not engage in repeat purchase behaviour. Therefore, the firm was not in a position to develop and maintain a strong customer base. The firm also experienced a challenge due to technological discontinuities. Recommendation Despite the above failures, Webvan can improve its online business model and hence its performance. In order to achieve this goal, the firm should consider the following. Webvan should conduct a comprehensive consumer market research. The research will give the firmâ⠂¬â„¢s management insight with regard to the consumers’ purchasing behaviour. For example, the firm will be in a position to identify the products that consumers purchase online rather than selling all its products through the online business model. The firm should continually invest in research and development with regard to ICT, which will improve the firm’s competitiveness within the online market segment. The firm should also evaluate its target market in order to identify changes in consumers’ purchasing patterns, and thus the firm will improve its online shopping technologies to be aligned with the prevailing market trend. McAfee, Andrew, and Mona Ashiya. â€Å"Webvan.† Harvard Business Review, 25 Sept. 2001: 1-28. Print.

Sunday, November 3, 2019

Management Accounting Essay Example | Topics and Well Written Essays - 1500 words - 1

Management Accounting - Essay Example The system of product costing is particularly used to assist in determining the amounts in the inventory balance sheet, and the income statement cost of sales. The information gathered in management accounting is mainly financial in nature, as well as, dollar dominated, although in most cases, systems of management accounting collect and report information that is non-financial as well (C?adez? & Guilding, 2007). This essay is a review of the operations of management via accounting in modern enterprises, as well as, an analysis of the way in which management via accounting can be utilized to maintain low fuel costs while ensuring safety. Management accounting emerged as an activity that was significant for the first time during the initial revolution of industries, in the enterprises and industries that were leading in those days. As such, financial accounting led to the rise of management accounting, which has its origin in its European merchant stewardship role of trading venture t hat began in Italian Renaissance, as well as, tax records that have apparently been required by governments for the duration that they have existed (Abdel-Kader, 2011). In the book The Visible Hand by Alfred Chandler (1977), he argues that the history of American business can be categorized into two phases that are separate, one representing the market economy which is what economists characterize as perfect completion, and the other phase represents managerial capitalism. The new structure of line-and –staff, after it has been merged with the new process that is continuous of producing, as well as, analyzing accounting and information that is statistical, allows information and plans in the enterprise to flow up and down (Chandler, 1977). Some of the ways that management via accounting enables managers to deliver economic, efficient, as well as, effective outcomes in a line-and-staff structure, is by Lowering Internal Transaction Costs This involves the lowering of the trans action costs internally through the routinizing of the units transactions. With the use of the modern technology the great volumes can make it possible for the costs of transactions to be lowered. Regardless of whether the program priorities are long-term or short-term, the management planning aspect is a vital success and productivity contributor. Every management needs to identify a course of action the organization should take from the alternatives that are available. In order for the transaction management to be operational, as well as, of value more application case studies are required. Through specialization as a result of economies of scale, production shifts to where it is relatively cheapest (Hurt, 2013). Reducing the costs for information on markets and supply This happens through linking the administration that produces units with that of buying, as well as, distributing the units.The price marketing system is the device of coordination that caters for allocations. The p rice that makes a balance between the demands of consumers and the supply by the producers is achieved through market interaction. This market interaction is what is basically referred to as the invisible hand. A consumer’s demand, on one hand, for a commodity highly depends on the price of that commodity to a large extends (Needles, Powers & Crosson, 2011). More rapid cash flow and payment Through the management systems companies promote specialization that is suitable for sustainable development. The more rapid

Friday, November 1, 2019

See Order Instructions Research Paper Example | Topics and Well Written Essays - 2000 words

See Order Instructions - Research Paper Example Everyday police officers face different challenges and experiences that expect them to make decisions on how to handle the situation individually without involving additional advice or immediate supervision, and this is the heart of police discretion. In law enforcement, Hassell and Archbold (2010) argue that the police officer has the mandate to make judgments or reasonable decisions within certain legal bounds. Police officers face a wide range of options especially when confronted by dangerous situations. Some of their decisions have been misconstrued as misconduct and a good example is the use of excessive force. External and internal mechanisms affecting police discretion involve the lack of agreement on the exact criminal behaviors that law officers should use in discretion. As a result, there is no evident legal discretion of the criminal actions requiring discretion. However, there are control mechanisms including Internal and external control mechanisms, control by citizens, legislative controls, and control by courts. Analysis A study by Palmiotto and Unnithan (2011) posits that more attention remains on the need to prepare police officers for the appropriate use of discretion. These preparations begin at the training school in the academy continuing later to their field practice. According to the trainings, the use of discretion is critical mainly after an event or on regular basis.