Monday, December 30, 2019

Cadbury Silk - Free Essay Example

Sample details Pages: 4 Words: 1263 Downloads: 6 Date added: 2017/09/11 Category Advertising Essay Did you like this example? A new variant of the Cadbury Dairy Milk has been launched in India by Cadbury India. The new chocolate is priced at Rs 49 for 69 grams and Rs 99 for 160 grams bar. The chocolate will be available in the flavors like milk chocolate, roast almond and fruit nut. According to the reports, the company claims that the chocolates new variant has been launched keeping in mind the demand for smoother, creamier and finer chocolate available internationally. The company plans to promote the new chocolate through a aggressive promotional plan, which will include television, print, outdoor and Internet. The promotion will be handled by Ogilvy Mather moother, Creamier and more curvy for the divine melt-in-mouth experience| | Mumbai, January 27, 2009:  Cadbury India Ltd. recently announced the launch of Cadbury Dairy Milk Silk its premium offering under the Cadbury Dairy Milk brand (CDM). Smoother, creamier and chunkier the new CDM Silk chocolate has been formulated to provide superior ‘eat’ experience. Don’t waste time! Our writers will create an original "Cadbury Silk" essay for you Create order Developed specially for the Indian consumer, the new CDM Silk * New CDM Silk is creamier, smoother and tastier and melts in the mouth more easier than ever before * Its bigger, chunkier and curvier cubes pack more taste   and pleasure in every bite * CDM Silk is available in 3 variants Milk chocolate, Roast Almond and Fruit Nut| | provides the most divine ‘Melt in the Mouth’ feel. CDM Silk is finer than the finest chocolates and comes in a premium, internationally developed packaging. Attractively priced at Rs. 49 for 69 gms and Rs. 99 for 160 gms bar the new CDM Silk will be available in Milk chocolate, Roast Almond and Fruit Nut variants. Since its launch in 1948, CDM has been Cadbury’s flagship brand in India. CDM is the gold standard for chocolates and stands for the best tasting chocolate amongst all consumers. Over the years, CDM has successfully built a unique relationship with consumers across age groups. Sanjay Purohit, Executive Director Marketing, Cadbury India Ltd. ommenting on the launch, said, â€Å"Our newest offering, CDM Silk has been specially formulated to cater to the Indian consumers craving for smoother, creamier and finer chocolate available internationally. Infact, the initial consumer feedback during the test marketing has been very encouraging and many perceive CDM Silk to be superior to other international chocolate brands available in the country. † CDM Silk will be promoted extensively through a 3600 campaign created by Ogilvy Mather Advertising. The marketing communication will encompass TV, print, outdoor and internet. Notes to the editor: * The chocolate market in India is estimated at Rs. 2000 crores * Cadbury India is the market leader with over 70% market share in the chocolate segment| CDM Silk Dance Troupe- Advertisement in which ladies dance, conference room commercial Cadbury Dairy Milk emerged as the No. 1 most trusted brand in Mumbai for the 2005 edition of Brand Equitys Most Trusted Brands survey. During the 1st World War, Cadbury Dairy Milk supported the war effort. A dominant leader in the volume segment, the company’s latest move is designed to strengthen its presence in the value market as well. , latest strategic move. The company aims to position Silk as ‘smoother, creamier and chunkier. ’ The rationale for the launch is simple: distinct products add to growth. â€Å"We already have 70 per cent of the Rs 2,000 crore chocolate market in India and now with the retail environment changing, Silk will help us tap into a wider audience,† says Cadbury’s executive director, marketing and international business, Sanjay Purohit. But there’s another reason for this. India’s per capita chocolate consumption is just 54 gm compared to the UK and US’ 10. 5 kg and 10 kg respectively. Thus, the Silk offering is an attempt to replicate the Dairy Milk that is available in international markets. Globally, premium chocolate accounts for about a quarter of the market in terms of value, but just 10 per cent of the total volume. With that in mind, the company has paid keen attention to the recipe. Typically in India, Dairy Milk contains more cocoa-butter than milk-butter as the latter melts at higher temperatures thus making it more conducive for India . The reverse is true in other markets, where milk-butter helps give the chocolate a smoother taste. â€Å"With the quality of the retail environment changing in India, we can offer smoother creamier dairy milk,† says Purohit. For the product, retail factors play an important role. â€Å"We can offer it only in places that have an air conditioner,† Purohit admits. As a result, the company is targeting only the top 35 cities and about 30,000 outlets. â€Å"It is for a different type of audience,† he adds. Cadbury is of course not a novice in the premium category. Last year, the company announced its foray into the dark chocolate segment with the fashionably packaged Rs 75 Cadbury Bournville Fine Dark chocolate. Within a year the Bournville brand has managed to capture 2 per cent of the overall chocolate market in the country, while Cadbury’s other premium brand, Temptation, has about 1. 5 per cent of the market. With the launch of Silk, Purohit hopes that the premium offerings will garner 5 per cent of the overall market. At present, the existing Cadbury Dairy Milk has a market share of 35 per cent. Analysts say the â€Å"premiumisation† trend in the chocolate market will pick up further as a growing body of medical evidence suggests that chocolate with a high cocoa content is actually good for health. Also, while chocolate sales in India have increased 64 per cent, premium dark chocolate sales are growing at a much faster rate. Not surprisingly, for Silk too, it has come out with a full 360 degree campaign that includes three television commercials, outdoor, print and internet. Keeping the audience in mind, Cadbury has been sampling Silk on flights as well. All three TVCs underscore the finger-licking, messy joy of chocolate eating that ends with the tagline ‘Have you felt Silk lately? ’ The campaign, Cadbury says, takes chocolate indulgence to a new level it’s about blissfully losing yourself in the smoothness of the chocolate. Cadbury with  Dairy Milk,  Perk,  Gems,  5 Star,Celebrations,  Bytes,  Dairy Milk Eclairs,  Eclairs Crunch, Confectionery Industry| The confectionery industry in India is approximately divided into: * Chocolates * Hard-boiled candies * Eclairs ; toffees * Chewing gums * Lollipops * Bubble gum * Mints and lozengesThe total confectionery market is valued at Rupees 41 billion with a volume turnover of about 223500 tonnes per annum. The category is largely consumed in urban areas with a 73% skew to urban markets and a 27% to rural markets. Hard boiled candy accounts for 18%, Eclairs and Toffees accounts for 18%, Gums and Mints and lozenges are at par and account for 13%. Digestive Candies and Lollipops account for 2. 0% share respectively. Overall industry growth is estimated at 23% in the chocolates segment and sugar confectionery segment has declined by 19%. | In the Chocolate and Confectionery segment, Nestle India registered sales of Rs180 crore in Q1 2009, a growth rate of 14. 3% compared with Rs150 crore in the same period last year. The sales volume in this segment remained flat at 1. 09 lakh tonnes in the first quarter this year Given Indias mammoth population, it comes as a surprise that per capita chocolate consumption in the country is dismally low   a mere 20 gms per Indian. Compare this to  over 7 kgs in most developed nations. However,  Indians swallowed 22,000 tonnes of chocolate last year and consumption is growing at 10-12 percent annually Date of posting: 04-12-07 Mithai- the traditional Indian sweats are giving way to chocolates among upwardly mobile Indians. Chocolate sales have risen by 15% in 2007 to reach 36000 tonnes according to one estimate. Another estimate puts the figure at 25000 tonnes. 2 May 2001   Cadbury Indias  main source of  revenue  is its 70% bite of the 23000 tonnes Indian chocolate market.

Sunday, December 22, 2019

Analysing Willfred Owens Dulce Et Decorum Est. - 1377 Words

Analysing Willfred Owens Dulce Et Decorum Est. ‘Dulce ET Decorum Est’ is an anti-war poem, which emphasizes the intensity of war. The meaning of the ironic title roughly translated into ‘it is good and honourable’ but is not fully established until you examine the poem. The full title ‘Dulce ET Decorum Est Pro Patria Mori’ means ‘it is good and honourable to die for your country’. However the main aspect of this poem is paradoxical to its title. This demonstrates the message Wilfred Owen’s is insinuating and his attitude towards war. The poem is regarding Wilfred Owen and his troop of exhausted soldiers making their way back to base after combat at the front line until a gas shell is fired at them. A soldier is fatally†¦show more content†¦When the protection of the soldiers’ lives had been compromised, it was every man for himself. The persistent dangers the troop were in never rested, like a sleepless monster permanently looming over them ready to strike at any time. The psychological image that appears is of a huge rush to do something so simple as to live on. The form of the poem also manages to reflect Owens feelings of hatred and disgust at the war. There are three stanzas, three separate parts of the tale, all with their individual tones. The first uses the attitude of defeat, â€Å"Till on the haunting flares we turned our backs.† The second uses a hasty tone, â€Å"Gas! GAS! Quick boys! – An ecstasy of fumbling.† The third and final stanza is bitter, â€Å"Of vile incurable sores on innocent tongues.† This has the effect of taking the reader through different emotions the writer was feeling while writing the poem, a roller coaster ride of susceptibilities and resentfulness. This poem has a regular rhyme scheme, which is highlighted in the next section, â€Å"Fitting the clumsy helmets just in time But someone still was yelling out and stumbling And floundering like a man in fire or lime.† The ABAB rhyme scheme sounds like marching or the steady tattoo of a drum beating, reminding us of the subject of the poem and the consistent hammering of the angry tone. The simplicity of it reminds me of a children’s poem or a nursery rhyme. The pace of the poem

Saturday, December 14, 2019

Two Levels of Control Strategic and Operational Free Essays

Two Levels of Control: Strategic and Operational Imagine that you are the captain of a ship. The strategic controls make sure that your ship is going in the right direction; management and operating controls make sure that the ship is in good condition before, during, and after the voyage. With that analogy in mind, strategic controlstrategic controlThe process by which an organization tracks the strategy as it is being implemented, detecting any problem areas or potential problem areas that might suggest that the strategy is incorrect, and making any necessary adjustments. We will write a custom essay sample on Two Levels of Control: Strategic and Operational or any similar topic only for you Order Now s concerned with tracking the strategy as it is being implemented, detecting any problem areas or potential problem areas suggesting that the strategy is incorrect, and making any necessary adjustments. [716] Strategic controls allow you to step back and look at the big picture and make sure all the pieces of the picture are correctly aligned. Operational control : A process concerned with executing the strategy. , in contrast to strategic control, is concerned with executing the strategy. Where operational controls are imposed, they function within the framework established by the strategy. Normally these goals, objectives, and standards are established for major subsystems within the organization, such as business units, projects, products, functions, and responsibility centers. [717] Typical operational control measures include return on investment, net profit, cost, and product quality. These control measures are essentially summations of finer-grained control measures. Corrective action based on operating controls may have implications for strategic controls when they involve changes in the strategy. Types of Control It is also valuable to understand that, within the strategic and operational levels of control, there are several types of control. The first two types can be mapped across two dimensions: level of proactivity and outcome versus behavioral. The following table summarizes these along with examples of what such controls might look like. Proactivity Proactivity can be defined as the monitoring of problems in a way that provides their timely prevention, rather than after the fact reaction. In management, this is known as feedforward controlfeedforward controlsThe active monitoring of problems in a way that provides their timely prevention, rather than after-the-fact reaction. ; it addresses what can we do ahead of time to help our plan succeed. The essence of feedforward control is to see the problems coming in time to do something about them. For instance, feedforward controls include preventive maintenance on machinery and equipment and due diligence on investments. Table  15. 1. Types and Examples of Control Control Proactivity |Behavioral control |Outcome control | |Feedforward control |Organizational culture |Market demand or economic forecasts | |Concurrent control |Hands-on management supervision during a project |The real-time speed of a production line | |Feedback control |Qualitative measures of customer satisfaction |Financial measures such as profitability, sales | | | |growth | Concurrent Controls The process of monitoring and adjusting ongoing activiti es and processes is known as concurrent controlconcurrent controlsProcesses that entail monitoring and adjusting ongoing activities.. Such controls are not necessarily proactive, but they can prevent problems from becoming worse. For this reason, we often describe concurrent control as real-time control because it deals with the present. An example of concurrent control might be adjusting the water temperature of the water while taking a shower. Feedback Controls Finally, feedback controlsfeedback controlsProcesses that involve the gathering of information about a completed activity, evaluating that information, and taking steps to improve the similar activities in the future. involve gathering information about a completed activity, evaluating that information, and taking steps to improve the similar activities in the future. This is the least proactive of controls and is generally a basis for reactions. Feedback controls permit managers to use information on past performance to bring future performance in line with planned objectives. Control as a Feedback Loop In this latter sense, all these types of control function as a feedback mechanism to help leaders and managers make adjustments in the strategy, as perhaps is reflected by changes in the planning, organizing, and leading components. This feedback loop is characterized in the following figure. Figure  15. 4. Controls as Part of a Feedback Loop [pic] Why might it be helpful for you to think of controls as part of a feedback loop in the P-O-L-C process? Well, if you are the entrepreneur who is writing the business plan for a completely new business, then you would likely start with the planning component and work your way to controlling—that is, spell out how you are going to tell whether the new venture is on track. However, more often, you will be stepping into an organization that is already operating, and this means that a plan is already in place. With the plan in place, it may be then up to you to figure out the organizing, leading, or control challenges facing the organization. Outcome and Behavioral Controls Controls also differ depending on what is monitored, outcomes or behaviors. Outcome controlsoutcome controlsProcesses that are generally preferable when just one or two performance measures (say, return on investment or return on assets) are good gauges of a business’s health. re generally preferable when just one or two performance measures (say, return on investment or return on assets) are good gauges of a business’s health. Outcome controls are effective when there’s little external interference between managerial decision making on the one hand and business performance on the other. It also helps if little or no coordination with other business units exists. Behavioral controlsbehavioral controlsThe direct evaluation of managerial and employee decision making, not of the results of managerial decisions. involve the direct evaluation of managerial and employee decision making, not of the results of managerial decisions. Behavioral controls tie rewards to a broader range of criteria, such as those identified in the Balanced Scorecard. Behavioral controls and commensurate rewards are typically more appropriate when there are many external and internal factors that can affect the relationship between a manager’s decisions and organizational performance. They’re also appropriate when managers must coordinate resources and capabilities across different business units. Financial and Nonfinancial Controls Finally, across the different types of controls in terms of level of proactivity and outcome versus behavioral, it is important to recognize that controls can take on one of two predominant forms: financial and nonfinancial controls. Financial controlfinancial controlThe management of a firm’s costs and expenses to control them in relation to budgeted amounts. nvolves the management of a firm’s costs and expenses to control them in relation to budgeted amounts. Thus, management determines which aspects of its financial condition, such as assets, sales, or profitability, are most important, t ries to forecast them through budgets, and then compares actual performance to budgeted performance. At a strategic level, total sales and indicators of profitability would be relevant strategic controls. Without effective financial controls, the firm’s performance can deteriorate. PSINet, for example, grew rapidly into a global network providing Internet services to 100,000 business accounts in 27 countries. However, expensive debt instruments such as junk bonds were used to fuel the firm’s rapid expansion. According to a member of the firm’s board of directors, PSINet spent most of its borrowed money â€Å"without the financial controls that should have been in place. †[718] With a capital structure unable to support its rapidly growing and financially uncontrolled operations, PSINet and 24 of its U. S. subsidiaries eventually filed for bankruptcy. [719] While we often think of financial controls as a form of outcome control, they can also be used as a behavioral control. For instance, if managers must request approval for expenditures over a budgeted amount, then the financial control also provides a behavioral control mechanism as well. Increasing numbers of organizations have been measuring customer loyalty, referrals, employee satisfaction, and other such performance areas that are not financial. In contrast to financial controls, nonfinancial controlsnonfinancial controlsProcesses that track aspects of the organization that aren’t immediately financial in nature but are expected to lead to positive financial performance outcomes. track aspects of the organization that aren’t immediately financial in nature but are expected to lead to positive performance outcomes. The theory behind such nonfinancial controls is that they should provide managers with a glimpse of the organization’s progress well before financial outcomes can be measured. [720] And this theory does have some practical support. For instance, GE has found that highly satisfied customers are the best predictor of future sales in many of its businesses, so it regularly tracks customer satisfaction. Key Takeaway Organizational controls can take many forms. Strategic controls help managers know whether a chosen strategy is working, while operating controls contribute to successful execution of the current strategy. Within these types of strategy, controls can vary in terms of proactivity, where feedback controls were the least proactive. Outcome controls are judged by the result of the organization’s activities, while behavioral controls involve monitoring how the organization’s members behave on a daily basis. Financial controls are executed by monitoring costs and expenditure in relation to the organization’s budget, and nonfinancial controls complement financial controls by monitoring intangibles like customer satisfaction and employee morale. How to cite Two Levels of Control: Strategic and Operational, Papers

Friday, December 6, 2019

Applied Business Research Explore Business Research

Question: Discuss about the Relationship between monetary reward and job security for motivation of staff. Answer: Introduction This study explores on relationship that exists between the monetary and job security for motivation of the staff. Most of the research studies have indicated that encouragement and appraisal of the employees resulted to higher retention rate, productivity and job satisfaction. The bond that exists between the employee and employer should be very vital (Wang, Noe Wang, 2014). This relationship should be based on the respect from the employer to the employee to motivate and offer job security (McDermott, Conway, Rousseau Flood, 2013). The employer should provide different means as symbolic rewards it may inform of monetary rewards or even assurance on their job security (McShane Von Glinow, 2015). If offers these aspects the staff get motivated connect to their work and the comfortable environment that are offered by the authorities in regards to job security will help make them more devoted and committed towards their job (Anitha, 2014). The aspect of the monetary rewards enhances on the direct satisfaction of the staff, the job security assures them of their importance, and thus they become more committed to the organization (Appelbaum, 2013). According to the stakeholders theory it stipulates that organizations should have the social responsibility tha t entails them to consider all the interests of the parties that are affected by their actions (Arekar, Jain, Desphande Sherin, 2016). This means that it is their responsibility to clearly utilize on the resources such as monetary rewards towards the beneficial of the staff and in turn will offer the real nature benefits to the stakeholders through their outputs (Mowday, Porter Steers, 2013). The monetary rewards can boost motivation since these incentives have the extrinsic motivational impacts on the staff. Moreover, individuals who are motivated will naturally enjoy on the work they undertake (Armstrong Taylor, 2014). For better understanding on the relationship of monetary rewards and jobs security on motivation, it is essential to know the meaning. Psychologists define motivation as the process that drives people towards the achievement of a goal (Muogbo, 2013). Motivation has been found to give individuals purpose and the drive to achieve a certain thing (Azar Shafighi, 20 13). It has helped individuals to push or perhaps pull a bad situation that are negative aspects in their lives. Brayfield and Crockett (1995) has studied on the relationship between monetary rewards and job security as motivational factors for the employees (Perry, 2014). These individuals believed that they is a lot of relationship between these variables. Vrom (2003) reviews on the subject found out that the median correlation on these variables to be 0.54 (Bayraktar, Araci, Karacay Calisir, 2016). The research proposal will try to elaborate on the relationship between monetary rewards and job security in the motivation of the staff, to begin on the discussing it is important to define on the research problem and the objectives of the research. In the recent years, there have been an increase focus on the relationship between monetary reward and job security for the motivation of the staff. The prior studies have generally found out a positive relationship between monetary reward and job security to motivate the staff. However, there are also research where such a relationship has not been found (Muogbo, 2013). One of the measure, which has been found to assess the firm performance has been typically, been a combination of both the profitability and the growth measures (Azar Shafighi, 2013). The previous research were inclusive or even contradictory on the study of relationship on monetary reward and job security as aspects of motivating the employees. Consequently, many of the research have concluded that more research is needed in that areas in that there are many factors that can be considered when motivating employees and towards firm performance. The basis of the this study was due to the research gap I identified in this area of the need to found out of other factors and to define what type of relationship that exists between monetary rewards and job security for motivation of staff. Research problem Two authors Taylor (1856-1915) as well as Gibreth (1868-1924) they considered that the employees have small feeling to work so they ought to be motivated. Within this research, I want to examine on the relationship between monetary reward and the job security for motivation of the staff (Posthuma, Campion, Masimova Campion, 2013). Therefore, motivation will be measured in relation to the job performance (Armstrong Taylor, 2014). According to many researchers, there exists many of the common and different aspects in the field of motivation. In this study, it has been designed to offer a better understanding on the relationship of these factors to motivation of the employees. The research will be aimed to explore variables, which can drive the employees motivation (Azar Shafighi, 2013). Nonetheless, the research has been limited to determine on the level of motivation to the staff. The study aims to address the following problem: what is the relationship between monetary reward and job security for the motivation of the staff. The objectives of the proposed study are: To determine the effects of monetary reward and job security on the performance of organization To find how monetary reward and job security can have an effect on motivation of staff To guide the researchers and scholars in regards to importance of monetary rewards and job security as tool for motivating staff. Literature review Motivation has originally been derived from the Latin word mover, that means to move. It generally refers to the relations that exists between people and position (Rynes, Gerhart Minette, 2004). It entails the processes of how individuals put efforts, which are directed towards the achievement of a goal. Therefore, motivation of the staff entails to the intensity of their efforts to achieve the goals of the firm (Bayraktar, Araci, Karacay Calisir, 2016). According to Lazear (1986) suggests that provision of the monetary rewards to the staff for the aspect of motivation can attract and gear them to be productive in the organization (Scott, Brown, Shields, Long, Antoni, Beck-Krala Perkins, 2015). Further, he suggested t monetary rewards could gain extra efforts for the staff to the extent where the marginal value added is essentially equal to the marginal cost that is paid for the additional work (Buurman, Delfgaauw, Dur Van den Bossche, 2012). This means that this concept of monet ary reward can be one of type of the paid value to the staff in return for extra effort they put in work. Lazeer shown that there was a positive relation between monetary rewards for the motivation of the staff. Theoretical framework In accordance to literature review, there is development of the theoretical framework to represent the relationship between monetary reward and job security for motivation of staff. In this study, the factors influencing motivation are monetary and job security. According to Osterloh, staff who are creative have two main reasons for being motivated (Chen Hsieh, 2015). These reasons ought to be addressed by the organization for better performance. One of the reason is that monetary reward way of motivation is needed in order to create and exchange on the knowledge and ideas (Crawford, Rich, Buckman Bergeron, 2014). Staff who are motivated they tend to be inherently interested towards engagement in their work. Second reason is that is to enhance of the aspect of time. This aspect has owned on the tasks related to job and to the improvement of the productivity in all the levels of individuals within the firm. Research form Yahya and Goh (2002) highlights that incentive offered to the groups or the staff members could raise on the level of the creation of the knowledge, transfer of the knowledge and acquisition. Mathios (1998) has argued that the monetary rewards are more preferred by the highly educated individuals. Empirical investigations have indicated there is a positive relationship between the responsibility security as an inspirational component as well as the overall performance of the work. Based on Miller et al. (2001) researched that job security carries essential impact on the performance of the staff and they tend to be motivated to perform their responsibilities when the job security is low (Davenport Beck, 2013). The experts have discovered the fear of job loss reveals that the staff behaviour changes to worse as soon they commence worrying relating to this loss. Additionally, the investigations with this research signifies that job security give employees with a substantial enthusiasm, which has an effect on other motivation levels. An instance from Senol study emphasizes job security was rated as certainly one of the three most crucial motivational instruments to all the subcategories. Poyraz together with karma research study in 2008 on hotel employees also displayed that job security functions as a substantial tool for motivation because it can change on the side work behaviors and the thought of leaving the employment (Erbasi Arat, 2012). The majority of research has shown that job security as a motivational technique to the staff. Armstrong (2007) mentioned that financial incentives may work as an objective, which staff generally aim for, as well as an tool, that gives the outcomes of values. Furthermore, also a representation signifies that the recipient value of a given business might function as the basic reinforce given it is related to the feedback value. According to Bates, for the monetary reward to be effective in motivating staff, there should be a merit pay, which rises above seven percent of the base pay f or the staff to perceive them as motivational and to catch their attention (Florida, 2014). The importance of money as a motivating aspect has been consistently downplayed by most of the behavioral scientists example Herzberg who has clearly pointed out that value of changing jobs, the feedback and the cohesion exhibited from the team members are stimulants to motivation (Gerhart Fang, 2015). Armstrong research further argues that the more the staff they are motivated with the use of the monetary rewards, the more they tend lose interest in whatever they had to do in order to get this rewards. Research questions The research study will address the following questions. What is the relationship between monetary reward and job security for motivation of staff? What is the relationship between monetary reward and job security to job performance? How will monetary reward and job security guide the researchers and scholars on motivating the staff? Research Methodology Research design The strategy used for the research is cross sectional study in which I will conduct to investigate find the relationship of the monetary rewards and job security for the motivation of the staff (Harunavamwe Kanengoni, 2013). The study will be based on quantitative approaches and survey techniques that will be used for collection of the data. The focus of the research will be on staff in the service industry (Houston, 2000). The study will focus on the motivation factors of which are monetary reward and job security. The research instrument that will be employed in the research is structured questionnaires. Quantitative research method The research will use quantitative research method in quantifying of the problem through generation of the numerical data, which will be transformed to useable statistics (Khan, Shahid, Nawab Wali, 2013). In the research, we have dependent variable, which is job performance, and the independent variable that are job security and money reward. There will be use of the measurable data in the formulation of the facts and uncover the patterns to test the hypothesis. Justification of the method The use of this research method is significant in that it will allow me to measure and analyze the data. There will be study of the dependent and the independent variable. This will help the research be objective in explaining on the findings and will help to test the hypothesis. Data collection method The method for collecting of data will be survey technique where there will be use of the structured questionnaire. The questionnaires will be issued to 150 respondents from the selected organization. Justification of survey methods This method will the structured questionnaires to gather the information. The use of the survey in this research will help to decide on what needs to be changed, and where money could be, spend, and what the problems might be. The use of this method is better than the others is because it is less expensive as comparison to others. Moreover, they can be sent to various locations through either email, telephone or perhaps mail. Sampling and population The study area will be different organizations in the service industry. Organizations that will be included in the survey are the banks, private sector and the universities (Lăzăroiu, 2015). Due to limited aspect of time and the resources the number of organization that will be selected are 25 organization. The method used for sampling used will be systematic. The primary data that will be gathered will be through structured questionnaires. The sample size will be 150 individuals selected from the 25 organization. Justification of systematic sampling method The use of this method is significance in that it is simple and straightforward to carry out. Moreover, the data that will be chosen will be evenly distributed of which will be a representation of the normal population. Data analysis The information evaluation is going to be carried out employing the SPSS application. There will be multiple regression employing the enter approach to ascertain on the relationship between the dependent and the independent variables (Lin, 2007). The stepwise regression is going to be used on establish which of the two-predictor adjustable lead most on the staff motivation. The degree of relevance is going to be put at p=0 .05. Hypotheses is going to be accepted should there be a positive relationship between monetary incentive and job security for encouraging of employees. Nevertheless, hypotheses is going to be invalidated if there is no positive relationship between monetary reward and job security for motivating staff. Time frame Task name Subtask complete Date of completion 1. Ethical Approval Research topic was approved in phase one 24/8/2016 2. Literature review methodology Research literature review was completed 15/10/2016 3. Writing Writing of research proposal 30/10/2016 4. Editing Grammar mistakes, errors in sentence structures 12/10/2016 5. submission 15/3/2017 Limitation Just like any investigation, it will have some limitations. One of the limitation that ought to be experienced relate to the sample size. The respondent for the research will be only 150 due to constraint of funds for research (Manzoor, 2012). Another limitation of the study will likely be the limited geographical location for the analysis of the research. This will likely cause the generalization of the overall findings to be less affirmative. Conclusion The research study will try to explore on the relationship between the monetary reward and job security for the motivation of the staff. The research will use survey method for collection of the data where structured questionnaires will be carried out. The type of research for the study is quantitative approach, in which will use multiple regression for analyzes of the numerical data. Moreover, the research will focus on the theoretical framework on the literature review. Various limitation will likely be encountered and they have been identified from the project. Recommendations/implications In order to make the research to be successful there is need to fulfil the following elements .one of the recommendation for the study is need to have a large sample size for the population this will help to generalize on the findings and thus we could have consideration of more motivational factors. Second recommendation is that the organization that would be used for the study should have been applying monetary reward and offering job security to the employees as elements of motivation. There is also need to identify more motivation variables for the research in order to have conclusive results and fill the research gap identified. On the implication, the research should offer further room for studies other than the motivation for the staff and how the firm can improve on their performance. References Anitha, J. (2014). Determinants of employee engagement and their impact on employee performance. International Journal of Productivity and Performance Management. Appelbaum, E. (2013). The impact of new forms of work organization on workers. Work and Employment in the High Performance Workplace, 120. Arekar, K., Jain, R., Desphande, B., Sherin, P. (2016). Relationship between individual and structural determinants on job satisfactionanalysis of employee turnover in the Indian context. The Journal of Developing Areas, 50(6), 387-398. Armstrong, M., Taylor, S. (2014). Armstrong's handbook of human resource management practice. Kogan Page Publishers. Azar, M., Shafighi, A. A. (2013). The effect of work motivation on employees' job performance (Case study: employees of Isfahan Islamic Revolution Housing Foundation). International Journal of Academic Research in Business and Social Sciences, 3(9), 432. Bayraktar, C. A., Araci, O., Karacay, G., Calisir, F. (2016). The mediating effect of rewarding on the relationship between employee involvement and job satisfaction. Human Factors and Ergonomics in Manufacturing Service Industries. Buurman, M., Delfgaauw, J., Dur, R., Van den Bossche, S. (2012). Public sector employees: Risk averse and altruistic?. Journal of Economic Behavior Organization, 83(3), 279- 291. Chen, C. A., Hsieh, C. W. (2015). Does pursuing external incentives compromise public service motivation? Comparing the effects of job security and high pay. Public Management Review, 17(8), 1190-1213. Crawford, E. R., Rich, B. L., Buckman, B., Bergeron, J. (2014). The antecedents and drivers of employee engagement. Employee engagement in theory and practice, 57-81. Davenport, T. H., Beck, J. C. (2013). The attention economy: Understanding the new currency of business. Harvard Business Press. Erbasi, A., Arat, T. (2012). The effect of financial and non-financial incentives on job satisfaction: An examination of food chain premises in Turkey. International Business Research, 5(10), 136. Florida, R. (2014). The Rise of the Creative Class--Revisited: Revised and Expanded. Basic books. Gerhart, B., Fang, M. (2015). Pay, intrinsic motivation, extrinsic motivation, performance, and creativity in the workplace: Revisiting long-held beliefs. Annu. Rev. Organ. Psychol. Organ. Behav., 2(1), 489-521. Harunavamwe, M., Kanengoni, H. (2013). The impact of monetary and non-monetary rewards on motivation among lower level employees in selected retail shops. African Journal of Business Management, 7(38), 3929. Houston, D. J. (2000). Public-service motivation: A multivariate test. Journal of public administration research and theory, 10(4), 713-728. Khan, I., Shahid, M., Nawab, S., Wali, S. S. (2013). Influence of intrinsic and extrinsic rewards on employee performance: The banking sector of Pakistan. Academic Research International, 4(1), 282. Lăzăroiu, G. (2015). Employee Motivation and Job Performance. Linguistic and Philosophical Investigations, (14), 97-102. Lin, H. F. (2007). Effects of extrinsic and intrinsic motivation on employee knowledge sharing intentions. Journal of information science. Manzoor, Q. A. (2012). Impact of employees motivation on organizational effectiveness. Business management and strategy, 3(1), 1. McDermott, A. M., Conway, E., Rousseau, D. M., Flood, P. C. (2013). Promoting effective psychological contracts through leadership: The missing link between HR strategy and performance. Human Resource Management, 52(2), 289-310. McShane, S. L., Von Glinow, M. A. (2015). Organizational Behavior 7/e. Mowday, R. T., Porter, L. W., Steers, R. M. (2013). Employeeorganization linkages: The psychology of commitment, absenteeism, and turnover. Academic press. Muogbo, U. S. (2013). The Impact of Employee Motivation On Organisational Performance (A Study Of Some Selected Firms In Anambra State Nigeria). The International Journal of Engineering and Science, 2(7), 70-80. Perry, J. L. (2014). The motivational bases of public service: foundations for a third wave of research. Asia Pacific Journal of Public Administration, 36(1), 34-47. Posthuma, R. A., Campion, M. C., Masimova, M., Campion, M. A. (2013). A high performance work practices taxonomy integrating the literature and directing future research. Journal of Management, 0149206313478184. Rynes, S. L., Gerhart, B., Minette, K. A. (2004). The importance of pay in employee motivation: Discrepancies between what people say and what they do. Human resource management, 43(4), 381-394. Scott, D., Brown, M., Shields, J., Long, R. J., Antoni, C. H., Beck-Krala, E. J., ... Perkins, S. J. (2015). A global study of pay preferences and employee characteristics. Compensation Benefits Review, 0886368715598197. Taylor, F. W. (1914). The principles of scientific management.New York: Harper. Vroom, V. H. (1964). Work and motivation. San Francisco, CA: Jossey-Bass. Wang, S., Noe, R. A., Wang, Z. M. (2014). Motivating knowledge sharing in knowledge management systems a quasifield experiment. Journal of Management, 40(4), 978- 1009.

Friday, November 29, 2019

Gender Roles In Star Trek Next Generation Essays - Deanna Troi

Gender Roles In Star Trek Next Generation Gender Roles In Star Trek Next Generation In 1966 a series called Star Trek was created. It's creator, Gene Roddenberry, did not create the show to be a science fiction series. The series was much deeper than that. It wasn't just about discovering new planets and civilizations. It was about controversial issues. Even though the series' take place in the 23rd and 24th century the issues struck with the times and related current issues. Through each series, The Original, Next Generation, Deep Space Nine and Voyager, there has been progression with the times and the issues. The issues that surround the episodes of Star Trek include race, religion, sexuality, the depiction of science and gender roles. The central focus being talked about in this paper will be gender roles. Gender roles in Star Trek deal with leadership and sexuality. Men and women have had different roles in Star Trek as well as different progressions. Men in Star Trek have always had a leadership role. In the original series the four main characters are men. The captain, Kirk, the second in command, Spock, the doctor, Bones or McCoy, and the head engineering officer Scotty are all men. In the Next Generation series there is Captain Picard, the second in command, Riker, and there are others engineering roles played by Warf and Data who are all men. In the Deep Space Nine series Captain Sisko and the head engineer is male. In Voyager the second in command, Chakotay, as well as Tuvok, a Vulcan Spock like character, and Neelix, the cook are all men. Women in Star Trek have made a real progression, at least more then Men have. When men are already at the top having leadership roles there's no place to go but down. This isn't necessarily there work performance or merit is going down but the women's performance, merit and acceptance going up. The women of Star Trek started at the bottom and could only go up. The original series did have one woman in a starring role. Uhura was the head communication officer, however her role was really more of a secretary and didn't really have many lines and if she did they weren't very lengthy, nothing much more than, Yes captain. In the Next Generation series the women started to move farther up the leadership ladder. The women starring roles were Beverly Crusher, the doctor, and Diana Troy, the counselor. In Deep Space Nine, the second in command was female, Kira Nerys. The Voyager series was a big step for women in Star Trek. There was the captain, Janeway, Kes and Seven of Nine. This series brought women into leadership roles. The progression of women in Star Trek has been appropriately timed and has even pushed a little bit past the time. Even though Uhura basically played the role of a secretary her role still pushed the envelope for the time because of her race. She was a black actress du ring or right after the civil rights movement. She even thought of quitting the role because she felt that she wasn't used enough for her role in the series. However, after Martin Luther King, Jr. talked to her and told her how important it would be for her to stay on the show, she did. Women in Star Trek have progressed from a secretary type, to a doctor and counselor, to the second in command and eventually the first in command or the captain. Their progress allows them to be more influential. Let's talk more specifically about the Next Generation series. The Original series showed the four starring male roles to provide everything for the crew. This is not the case in Next Generation. Next Generation is more like a family with a father, a mother and children. But who were the biggest members of the family? There are four characters, which give the presence of a family on Next Generation. First, you have the father. This is actually quite simple. You have Captain Picard who plays the father. He is much older than any of the other crew seen on the series and therefore has seniority as well as he is the

Monday, November 25, 2019

Social Networking

Social Networking Introduction In their quest to integrate with others, people develop various behaviors besides doing different things through which they create and maintain relationships and social networking being one of these. Social networking is the collection of people into various groups who have common interests and sometimes similar likes and dislikes.Advertising We will write a custom research paper sample on Social Networking specifically for you for only $16.05 $11/page Learn More It can also be defined as the creation of groups of people who want to share information and help each other in building relationships as it occurs in local villages and communities. It should be noted that, though social networking is possible and can easily be done in schools, villages and workplaces, it is rampant on the internet. This is the case because unlike in the villages and schools where people might not want to share their information or personal views with one another, the internet has millions and probably billions of people who are ready to share information (Niciejewska 17). This is also boosted by the fact that internet covers a relatively wide area and people want to get firsthand information from all parts of the world and therefore, find it more interesting to network online. However, though social networking has various advantages like enabling easy and first flow of information, it also has far reaching consequences including consuming time which could have been used for other productive activities. Advantages of Social Networking Social networking is a common feature in the world nowadays and it is practically impossible for any person to say that the world can do without networking at any level. It is practiced from professional aspects to personal lives and by the old, the middle aged and the young generation a like. It has become more a way of life than it is a technological aspect of how people spend their leisure time which was the init ial intention. To begin with, social networking has decreased the costs of get in touch with people because the social networking sites that people use are mostly free. People seated in the comfort of their private rooms can easily communicate with different people in different continents within a minute at a cost that could have been used to communicate with one person. On top of that, business people can easily learn the likes and dislikes as well as other behaviors of their target markets thus carrying a research at no cost and this enables them in designing their products according to the consumers’ need. In addition to that, people can easily advertise their goods and services on the social networking media for a negligible cost when they are networking (Rosenbloom 431).Advertising Looking for research paper on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More Additionally, social networking helps in building confidence of people to one another. This is highly advantageous to business people who will want to create a good rapport with their customers so that they can maintain them for future purposes. Customers feel more confident if they interact with the business people both on professional and personal grounds and this makes them feel at easy. It should also be noted that it is easy to get correct and objective information from the customers whom one interacts with both on professional and personal grounds than those with whom one interacts with on business reasons only (Smith and ze 338). On top of that, social networking has really improved the way people can offer after sale service since even if people are very far apart communication is easy and one can easily find his or her customers. Moreover; social networking sites like facebook, twitter and others have increased the connections among people nowadays which have been advantageous in the long run. Many of the connect ions that started in the social networking sites have ended in face to face meetings and made longtime friends who help each other in many aspects of live. In addition to that, social networking has increased the flow of knowledge from one person to another. Scientists, sociologists and people from other professions have been able to get information through the social networking sites therefore, increasing their knowledge base besides communicating their theories (Raje 76). This would have been impossible in other circumstances and some theories developed would have ended up being isolated and irrelevant. In conjunction with that, social networking has also changed the way education is conducted and improved the interactions between teachers and students. Students have joined several social networking sites and teachers have embraced this technology therefore, making learning process more accommodating. Extended classroom discussions, assignments, test and quizzes are found online n owadays and they can be accessed all day round making learning an interesting activity. On top of that, relationships between parents and teachers have been boosted by social networking sites whereby teachers and parents can communicate without having to meet face to face (Niciejewska 18). This not only saves time but also increases the chances of interaction between teachers and parents who most of the times are far apart. On top of that, social networking has been used by various organizations to seek for support from the masses. It can be noted that nowadays, various political parts have successfully used social networking in their campaigns because it is cheap and reaches a huge number of people at the same time.Advertising We will write a custom research paper sample on Social Networking specifically for you for only $16.05 $11/page Learn More Furthermore, social networking has been used by various groups to connect people seeking for employment with t he available employment opportunities, thus increasing the employment rates in the community (Mason and Frank 7). This is common among college students who have even come up with their social networking site where the alumni give information to final year students about the employment opportunities that are available at the given time. Disadvantages Despite the immense importance of social networking in the lives of people nowadays, it has brought about some very dire consequences which have not only cost people money but have also led to loss of lives. Social networking sites like facebook and twitter require that people provide their information concerning their age, gender, location and other important information. This information most of the times reach people who are not known to the provider of information. Others use the information on social networking sites without the consent of the concerned people for their benefits (Harwood 64). In addition to that, it has been reporte d that criminals use social networking site to get information about their targets which has increased crime rates. Additionally, social networking sites have become addictive and people spend a lot of their time either chatting in the social networking sites or trying to get new friends. This leads to various behavioral changes in a person and end up making people antisocial on personal grounds because they are consumed by the networking sites all the time and do not have time to socialize with their immediate neighbors. On top of that, the time spent on social networking sites by people has been increasing exponentially since the discovery of the sites (DasGupta 159). This means that people have reduced the time spent on other issues to concentrate on social networking. Among the most affected time is the time people spend on work and this has led to loss of a lot of productive time thus, reducing efficiency in working places. This has made some organizations to prohibit their emp loyees from visiting social networking sites during working hours. When people are networking online, it is difficult to authenticate the information that they provide. Consequently, people have used this weakness of the internet to their advantage by giving false information about themselves to unsuspecting people in the social networking sites. On top of that, children are also at risk of being misused especially by sex predators because they can easily access the children’s information from online sites and lure them into meeting face to face. In conjunction with that, the social networking sites make people to feel connected with the world while in actual sense they are not (Bradburne 193).Advertising Looking for research paper on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More This has been proofed to increase the feeling of loneliness among people and thus leading to psychological and emotional trauma. In addition to that, there is no limit as to what people can post on the social networking sites and this has been a cause of concern as people have taken advantage of this to post provocative information and pictures which not only cause emotional trauma but also death. Conclusion Social networking is an inevitable aspect of human live because of the way that it has been incorporated in the day to day activities of people. People meet, connect, learn and do their business through social networking sites. With the advancement in technology, the importance of social networking is increasing and it is important that people learn how to deal with it given the adverse effects that it can have. Bradburne, Alan. Practical Rails Social Networking Sites. New York: Apress, 2007. Print. DasGupta, Subhasish. Social Computing: Concepts, Methodologies, Tools, and Appl ications. Hershey: Idea Group, 2009. Print Harwood, Mike. Security Strategies in Web Applications and Social Networking. Burlington: Jones and Bartlett, 2010. Print. Mason, Robin, and Frank Rennie. E-Learning and Social Networking Handbook: Resources for Higher Education. London: Routledge, 2008. Print. Niciejewska, Katharina. The Influence of Social Networks in Japanese Business-Kairetsu as a Japanese Network. Munchen: GRIN Verlag, 2007. Print. Raje, Fiona. Negotiating the Transport System: User Contexts, Experiences and Needs. Farnham: Ashgate Publishers, 2007. Print. Rosenbloom, Bert. Marketing Channels. Hoboken: Cengage Learning, 2011. Print. Smith, Peter, and Ze Zook. Marketing Communications: Integrating Offline and Online with Social Media. London: Kogan Page Publishers, 2011. Print.

Thursday, November 21, 2019

Explain the factors influencing demand and supply of motor vehicles Assignment

Explain the factors influencing demand and supply of motor vehicles Explain what effect an increase in the price of petrol is likely to have on equilibrium price - Assignment Example if consumer’s income is reduced then demand for motor vehicles, especially higher priced vehicles, is reduced; as a result the price and supply of vehicles drop. Incidents such as strikes or a rise in the cost of steel incur extra production costs for manufacturers; a rise in output costs means a fall in supply at a higher cost for the vehicles. On the other hand, if production costs are decreased and therefore motor vehicles are cheaper to produce then an increase in supply will occur with a reduction in price. Supply and demand can be illustrated as curves on a graph and where the two curves merge is the equilibrium price and number; the equilibrium sets the benchmark towards which the market moves and if demand and supply swing then the equilibrium correspondingly changes. An increase in petrol prices is an additional drain on consumer’s incomes particularly those who receive low or middle incomes, thus higher petrol prices will affect demand for vehicles in that consumers will not be able to maintain them by way of affording petrol. Demand will therefore drop and the demand curve will move to the left while the curve representing supply will move to the right resulting in a lowering of the equilibrium price of the

Wednesday, November 20, 2019

A project is a complex, non-routine, one time effort limited by time, Essay

A project is a complex, non-routine, one time effort limited by time, budget, resources and performance specifications designed to meet customer needs Gray CF & Larson EW - Essay Example If there is a defined process, then standardisation is not a problem. In every software project, standard processes are employed and therefore, these can be standardised. For instance, PMI has created global standards of excellence for project management and so has National Competency Standards for Project Management (NCSPM 2007). Most of these standards are produced on an overall requirement and performance of people across the world. These might not be the ones that one might be able to adapt to their companies. Instead, a standard can be created based on the performance of the company's employees for their own internal requirement. This would ensure that the standards are more attainable and the same can be compared later with the global standards set by others. 2. The primary purpose of project management is to ensure that the customer requirements are met within the budgeted time and cost, in addition to the resources and performance specifications. While this is the target that the project manager would try to meet, there could always be issues which have to be countered by him. The time budget is drawn with the requirement of the customer in mind. The plan for the entire project in terms of time required will be drawn only on the basis of the requirements that the customer brings up. May be the customer or the company's management might bring up a time control in the plan which might make the project manager to recast the plan she has drawn. The time control and the requirements of the customer together will decide on the nature of resources that will be required for the company. Based on the resources that the project manager will employ to meet the requirements and the time limits, the costing budget is drawn. The performance specific ations will be the measure to judge how efficiently the team worked to deliver what was expected out of it, which is nothing but the customer requirements. Therefore, the entire requirements of the customer is the starting point and therefore, when the project manager meets her time schedule, resources, budget and the performance specifications, there will not be any issue in meeting the customer requirements. 3. The time, budget, resources and performance specifications are neither complementary nor competing demands. They are interrelated but not necessarily complementing one another. For instance, the planned time for a project and the constraint of time is related to the resources and the budget. When the resources in the project are increased, there will be a reduction in the time required. Not necessarily a standard mathematical relationship. The reduction may not be proportional to the resources that were employed. The same way, an increase in the time keeping the resources constant will escalate the budget. There could clear relationship between the time, resource and the budget. However, the time increase itself could have been the result of reduced resource availability. In case of performance specifications, these are only measures of the rest of the parameters that make up the project. The project performance ratings that are normally done will be calculated out of the time, bu dget, all resources or specific resources, multiple jobs and then

Monday, November 18, 2019

Answering questions one by one Essay Example | Topics and Well Written Essays - 1500 words

Answering questions one by one - Essay Example There are some theories which claim that there is more gender apart from the female and male version (Halvor, M 1997). Patriarchy is a universally accepted Trans cultural and Trans historical phenomena according to which women are oppressed everywhere by the men in a similar manner. Gender is an important part of the social construction along with gender being a process for stratification system and also a structure. There are day to day processes which are in forced by gender. One gender is different from another one on the basis of process, rituals of the daily life and also the conversations. Stratification is in which men as a group holds greater amount of power and status than women as a group. Women are treated as being some other species as compared to the men. Gender is responsible for dividing the work in the economic production as well as the home production (Litosseliti,L, and Sunderland J,2002). It legitimates the one which are in authority and they will organize the emot ional life as well as the sexuality. The products created, tasks assigned, expectations from the job, value for money is different for both the genders in the society. Gender is something which basically displays women and men both of them to create along with control the workplace (Elizabeth G, 1992). Discourses refer to spoken communication along with the written communication. The denotations it holds include the discourse analysis along with the semantics which is a generalized concept of the conversations which exist in the contexts and also the modalities. There is a totality of the vocabulary which is used and is existent in the field of social practices long with the intellectual enquiry (Epictetus F, Dobbin,J,1998). An example of these can be taken from the religious discourse, medical discourse and also the legal discourse. There is a lot of work which is carried out on discourse and some of the work was carried out by Michel Foucault along with other social theoreticians according to which discourse is an entity of signs along with sequences having enouncements (Symeon, 1980). It is the communication of thought by words, conversations along with various talks which come under intelligent and earnest discourse. It is a formal discussion of a subject which appears in writing along with the speech. It is an integral part of the treatise, sermon and also the dissertation. Discourses are an important part of the linguistics which are an important part of the unit of writing and also speech which is connected (Machiavelli, N 1970) .Enouncement is an integral part of the discourses and it is linked with unit of semiotic signs along with the abstract construction which allows the signs to communicate and assign specific along with the repeatable relations between the objects, statements and also the subjects. This thus concludes that discourse is composed of semiotic sequences which have a relation among the signs which exist between and among statements, s ubjects and also the objects. White people are responsible for creating a dominant image of the world and they totally ignore an important factor that this thing is playing an integral role in

Saturday, November 16, 2019

Looking At Port Scanning Techniques Information Technology Essay

Looking At Port Scanning Techniques Information Technology Essay This article gives you an in-depth knowledge on some of the commonly used TCP port scanning techniques along with the pros and cons associated with each of the port scanning technique. Apart from the TCP based port scanning, it also briefly explains the different port scanning techniques available to scan the non TCP ports. Index Terms three-way handshake, open port scanning, stealth scanning, half open port scanning, Ident scanning, FTP bounce scanning, Decoy scanning, UDP scanning. In this paper firstly we will see an overview of port scanning, which includes what it is, why it is used, how it can be used and what are its effects. The second section explains in details about the various port scanning methods. This section includes detailed description on each of the port scanning methods based on TCP and some of the other port scanning methods, including the advantages and disadvantages of each of the methods. This section also contains information on the TCP connection establishment, which would be helpful to have a better understanding on the various port scanning techniques. Overview on Port Scanning Before start discussing about the actual topic port scanning, first lets see what a port is, how it is used and what its functions are. The Transmission Control Protocol and User Datagram protocol are used for communication over the internet. Each of this protocol contains 65536 ports (from 0 to 65535). Each port has an associated service running. The first 1024 ports are the reserved/privilege ports which runs the dedicated service defined by IANA (Internet Assigned Numbers Authority) (for example port 80 is reserved for HTTP service, port 21 for FTP, port 23 for telnet access and etc.) and these ports are known as well-known ports. The remaining are called registered ports (from 1024 to 49151) and dynamic and/or private ports (from 49152 to 65535). So, the applications in the computer use its specific port for communication with the server or with another computer. Now lets discuss about port scanning. Port scanning is a technique used to uncover the port details in a computer. Details like whether the port is open/listening or not, if it is open/listening which service is running on that port, etc can be obtained by scanning the ports. Port scanning is mainly used to find if there is any security risk involved in the computer and also to check for its weaknesses. Port scanning is done by sending messages to all the ports of the computer, and based on the response from each of the ports we can check whether the computer is prone to attacks. This technique is used by the network administrators to check for vulnerabilities in the network, like if a port is unused and it is open, then it should be closed immediately, because open ports will listen to the incoming messages which could me malicious. This could be a useful technique for the network administrators to secure their network. Also it would be good to port scan our own computers periodical ly, so that we will be able to find out what are the unwanted process and some of the malwares running in our own computer systems. Having said this, we should also be aware of the fact that, the port scanning methods will be known to the hackers too, who will try to break into the network/computer to steal the vital information. Using this technique the hackers will try to get a list of unused open/available ports. The hackers will then try to probe these ports for additional information and weakness. Using these results the hacker will try to exploit and will gain access to the computer. The operating system in the target computer will have the knowledge of logging the request that is used for port scanning activities. So the hacker will use an effective method to perform port scanning else the hacker can be easily identified. Port Scanning Methods The port scanning technique can be classified into three main types, they are Open scanning This type of scan opens a full TCP connection with the targeted host. Half-open scanning In this type of scan the client terminates the connection on receiving a response from the targeted host. Stealth scanning This type of scan prevents the connection request to the targeted host to be logged. All the above mentioned scanning types are used by a hacker to get the list of open or closed ports in the server. Among the three the open scanning technique gives accurate information about the state of the port, but it is easily detectable. Stealth scan technique can fool some of the basic Intrusion detection systems and some of the basic firewall rule sets. Before explaining in detail about each of the port scanning technique lets look into the steps involved in establishing a full TCP connection and the usage of each of the flags in the TCP message [Marco, Eddy, Germinal, Gabriela, 1999]. This is because most of the port scanning methods are based on the TCP connection and the functionalities of each of the flags bits in the TCP message. Following are the list of flags used in the TCP message and its functionalities. SYN This flag is used to initiate a TCP connection. FIN This flag specifies that the sender has finished sending the entire data. RST This flag is set to reset the connection. ACK This flag is set to acknowledge for the request. URG This flag is set to indicate that the urgent pointer is valid. PSH This flag is set to indicate that all the data should be pushed to receiver immediately without waiting for the additional information. The TCP connection establishment consists of three steps hence it called as three-way handshake. First the client will send a TCP message with SYN flag set with an initial sequence number to the targeted host. The second step is that, if the respective port in the target host is open then the target host will acknowledge the clients SYN by incrementing the clients initial sequence number by 1 and sends back to the client along with its own initial sequence number with the SYN message. Third step, the client on receiving the target hosts TCP message with SYN flag set it will send an ACK message and the target hosts initial sequence number incremented by 1 to the target host. This is how the TCP connection will be established between two hosts. Shown below is the pictorial representation of three-way handshake TCP connection. SYN, Clients ISN (initial seq. num) Client Target host SYN, Target hosts ISN (initial seq. num) Clients ISN + 1Client Target host ACK, Target hosts ISN + 1 Client Target host Having the basic knowledge of TCP connection and the functionalities of each of the flags in TCP message we will discuss in detail in each of the port scanning techniques. Open Scanning Technique: The open scanning technique will try to establish a full TCP connection with the target host. Based on the response from the target the client will decide whether the port in the target host is open or closed. This technique is slower when compared to other two techniques, since it involves in establishing a three way connection with the target. Also this technique is easily detectable and can be filtered easily. Described below is one of the open scanning methods. TCP connect scan method: The TCP connect scan method uses the connect() method in the operating system to establish a three-way connection between the target host [Dethy, 2001]. Client will send Æ’Â   SYN Server will respond with Æ’Â   SYN, ACK Client will respond with Æ’Â   ACK In the above three-way handshake the server responds with the SYN message which means that the listening port in the targeted host is in the open state. Client will send Æ’Â   SYN Server will respond with Æ’Â   RST, ACK Client will respond with Æ’Â   RST In this case, the server responds with the RST message to the request. This shows that the listening port in the targeted host in the closed state. By this way a list of open or closed ports in the targeted host can be obtained. The advantages of this scanning method are that it is fast, accurate and does not require extra user privileges. The disadvantages are this method is easily detectable and could be logged. Half Open Scanning Technique: In the half open scanning technique the client will terminate the connection even before the three-way handshake is completed. Two types of scanning methods come under the half open scanning technique. They are 1) SYN scanning and 2) IP ID header or dumb scanning. SYN scan method: This method is similar to the full connection/TCP connect scan method. The difference is that when the client receives a SYN message from the target host it will close the connection by sending a RST message to the target machine. This is because the SYN message from the target host is enough to know that its listening port is in open state. If a RST message is received from the target host then it means that the listening port in the target host is in closed state. Thus a three-way handshake is restricted in this type of scan method. The pictorial representation of which is shown below [Dethy, 2001]. Pictorial representation if the port is in open state, Client will send Æ’Â   SYN Target will respond with Æ’Â   SYN, ACK Client will respond with Æ’Â   RST Pictorial representation if the port is in closed state, Client will send Æ’Â   SYN Target will respond with Æ’Â   RST, ACK The advantages of this method are it is fast, accurate and it is less frequently logged when compared to open scan method. The main disadvantage is that for this type of scanning the sender or client needs to customise the IP packet which requires special user privileges, and this is the case for almost all of the operating systems. IP ID header or dumb scanning method: The basis of this scan method is similar to the SYN scan method but the difference is that IP ID header or dumb scanning method uses a third host to scan the target host, and based on the id value in the IP header field this scan method will decide whether the listening port in the targeted host is in open or closed state. The third host should be identified in such a way that it should send very little amount of traffic or preferably no traffic, hence this type of host is said to be silent or dumb host. It requires lots of effort to identify this type of host. In this scenario, there will three different host. One is the attacker host (A), second is the silent host (S) and third is the target host (T). First A will send consecutive ping packets to S, this is to analyse the id value in the IP header field. Each time the silent host will increment the id value by 1 in its response. An example of which is shown below, 60 bytes from AAA.BBB.CCC.DDD: seq=1 ttl=64 id=+1 win=0 time=96 ms 60 bytes from AAA.BBB.CCC.DDD: seq=2 ttl=64 id=+1 win=0 time=88 ms 60 bytes from AAA.BBB.CCC.DDD: seq=2 ttl=64 id=+1 win=0 time=88 ms Now using the source address of host S, host A will send a spoofed SYN message to the host T. The host T will respond to host S with either SYN message or the RST message based on the listening ports state. Now the host A will examine the ping responses from the host S to check the id value in the IP header. If the id value is more than 1 then it shows that the respective port in the host T is open, because only when the host S will respond back to host T and increments the id value. That is the host T would have responded to the host S with the SYN message for the spoofed SYN message from the host A. If the value of id is 1 then it indicates that the respective listening port in the host T is in closed state. Stealth scanning technique: The stealth scanning technique is a technique used to avoid the logging of port scan performing in a host and to break into the basic filters and firewalls implemented. This technique slows the scan due to which the ports are scanned over a long time period. Thus it restricts the target host to trigger an alert. In this section we will discuss about four types of stealth scanning techniques. FIN scan method: As the name implies this method uses the FIN flag in the TCP message to identify the list of open or close ports in the target host. That is the attacker will send a TCP message with FIN flag set to target host. Based on the response from the target the attacker will determine whether the listening port in the target is open or closed. If the listening port in the target is closed then it will reply back with the RST message. The negotiation is shown below, Attacker will send Æ’Â   FIN Target will respond with Æ’Â   RST If the listening port is open then the target will not send any response back. The negotiation is shown below, Attacker will send Æ’Â   FIN Target response Æ’Â   none The advantages of this method are it can bypass many intrusion detection systems and these scans are not logged. The disadvantage is that at times it can produce false results. NULL scanning method: The null scanning method will send a TCP message to the target without setting any of the six flags in the TCP message. Based on the response from the target the attacker will generate a list of open ports. If the response from the target is RST then the listening port in the target host is said to be in closed state, else if a there is no response from the target then the port is open. The advantages of this method are it can bypass many intrusion detection systems and these scans are not logged. The disadvantage is that at times it can produce false results and it can be used only in UNIX systems. XMAS scanning method: The implementation of XMAS method is exactly opposite to the NULL scanning method. That is, the Xmas scanning method will send a TCP message with all the six flags set. If the response from the target is RST then the listening port in the target host is said to be in closed state, else if a there is no response from the target then the port is open. The advantages and disadvantages of this method are same as that of the NULL scanning method. TCP fragmenting method: The TCP fragmenting itself is not a port scanning method; instead it is used to improve the other stealth port scanning methods like FIN, NULL, and XMAS [Marco, Eddy, Germinal, Gabriela, 1999]. This method splits the TCP header into smaller fragments such that it is not easily detected by the firewalls and other intrusion detection systems implemented. All the above discussed port scanning techniques are specific to the TCP ports. There are other port scanning techniques available for scanning non TCP ports, some of which are explained below. UDP scanning technique: The UDP scanning technique is used to get a list of available/open DUP ports in a target host. The method sends a UDP message to the target, and based on the response from the target the attacker will determine whether the port is open or closed. If the response from the target host is a UDP message then the port is open. If the response from the target is an ICMP port unreachable [Dethy, 2001] message then the port is closed. If the response is some other ICMP unreachable message then the port is filtered. If there is no response from the target host then the listening port is either open or filtered. The advantages are, it is used to scan non TCP ports and it is not restricted by TCP Intrusion detection system. Its disadvantages are it is easily detectable and requires root access. Ident scanning technique: The scanning methods that we have discussed so far is used to get a list of open/available ports, but the Ident scanning technique is used to get the information about the owner of the process running in those available/open ports. This method uses the insecure issue in the Identification protocol to uncover the owner details of the process running in the listening ports. This technique can be employed only when the target host is running the identd service in port 113. FTP bounce scanning technique: This technique uses an option in the FTP protocol to perform port scanning. That is, this method uses proxy ftp servers to communicate with the target host and to perform port scanning in each of its ports. For this the proxy functionality in the ftp server should be enabled. In this method, first the attacker establishes ftp connection with the proxy FTP server. Then using the port and list commands it tries to scan each of the ports in the target host. If the listening port is open then the server will send 150 and 226 response codes to the attacker, else if the port is closed the server will respond with the 425 reply code to the attacker. Decoy scanning technique: The decoy scanning technique sends several packets to the same port in the target host. All of these IP packets contain spoofed IP address except one of the packet. That is, one in a several packets holds the actual attackers IP address. Thus this method makes sure that at least one response from the target host is sent to the attacker. The advantages of this method are that it is extremely hard for the administrator to identify the exact scanner/attacker and the result obtained from this method is accurate. The disadvantage of this technique is that, since it sends several packets to the same port the flow of traffic will be high. Conclusion The different types of port scanning techniques are explained in detail along with their advantages and disadvantages. We have seen that most of the port scanning techniques are based on the TCP protocol, but other port scanning techniques are available to scan the non TCP ports. At present numerous software tools are available to perform an effective port scanning in the local host or the remote host to check for the existing vulnerabilities and ways to fix them. Some of the popular tools are SATAN and N-Map. Port scanning techniques are not only used by the attackers to break into the computer/network, it can also be used to check our own computers for vulnerabilities and to take preventive actions for those vulnerabilities.

Wednesday, November 13, 2019

Violence against Women :: Sociology Essays Research Papers

Violence against Women Gender-based violence has been recognized as a large public health problem as well as a violation of human rights worldwide. One out of three women has been beaten, coerced into sex, or abused in another way at least once in her life (www.infoforhealth.org). The abuser is usually a member of the family, introducing the difficult problem in that the abuse usually happens behind closed doors, and is often viewed by cultural norms and legal systems as a family matter rather than a crime. The statistics available on violence against women are startling. Domestic violence is the major cause of death and disability for European women ages 16 to 44 and accounts for more deaths and injuries than automobile accidents and cancer. The Russian government estimates that over 14,000 women were killed by family members in 1999, but there is still no legislation that specifically addresses domestic violence. In South Africa, more women are shot in the home by relatives than are shot on the streets or by intruders (web.amnesty.org). Two of the most common forms of abuse in childhood, adolescence, and adulthood are intimate partner abuse and coerced sex. Intimate partner abuse is almost always accompanied by serious psychological abuse and in one quarter to one half of cases is also accompanied by forced sex. Most women that are abused numerous times often become terrified of their partners. Many are scared to speak to someone about the abuse due to the fear that the abuse will get worse if reported (www.infoforhealth.org). In some countries, women are discriminated against by laws that do not protect from violence in the home. Police and persecutors sometimes refuse to help women abused in the home because of the false assumption that these women bring on the abuse themselves. Women that attempt to testify against their husbands may lose custody of their children. For women of these nations, there is no way out and nobody to listen (web.amnesty.org). The effects of abuse may be detrimental to a woman’s reproductive health, as well as to other aspects of her physical health and psychological state. Along with increasing injury, physical abuse can cause an array of other problems such as increased risk of unintended pregnancy, sexually transmitted infections, adverse pregnancy complications, chronic pain, physical disability, depression, and drug and alcohol use. Health care providers often miss opportunities to detect if a woman has been abused by either being unaware, indifferent, or judgmental.

Monday, November 11, 2019

Historical and Scientific Perspectives on Homosexuality Essay

Historical and scientific perspectives have molded homosexuality, and the way homosexuals are viewed by themselves and others. In past western society ancient Greece, homosexual teachings were performed by the Greek society, and were thought of as a societal norm Younger males were normally seen in a homosexual relationship with an older male, these types of relations were common in ancient Greece. The way Greek perceived life back in ancient times it is starting to ease up in our modern time, and homosexuality is beginning to be viewed as if we were in ancient times especially among western countries. In modern time homosexuals are learning to cope with their homosexuality, as it is beginning to be seen as something normal that has been here since ancient times for thousands of years. Homosexuality in the ancient Greek society shows that even back then people were aware of the different sexual behaviors and feelings certain people might have, and even back then they accepted people’s individual sexual choices. In modern day when a homosexual is first coming out and announcing his way of life he/she should be proud of what they are doing because it is something that has been going on for thousands of years, and is not something to be ashamed and secretive about. Homosexuals should not let judgmental people get to them by saying you were born that way or the environment influenced you to behave like that. The truth is the truth and you are who you are nothing can or will change that is if we stay true to our self. This means as long as we know where we came from and who we ar e why should we let peoples words bother us because we know the truth about our self. As we move along, back to ancient Greece and now also including the people of ancient Rome’s homosexuality. In both of the cities ancient Greece/Rome men would travel the streets of the city looking for someone to rock their world. On top of roaming the streets for some good quality male bonding they would dress and act as if they were not men, but female. This was look at in disapproval and unacceptable that is why when the religion of Christianity increased and started to grow the downfall of ancient Rome followed, and homosexual relations were banned. The new found law prohibited sexual behavior that was not found normal. Normal sexual behavior being male-female  and marriage any other acts of sex, and the people would be punished for their actions. This law continued for many years to follow, and people were committed and punished if they broke the law. Unfortunately this did not stop homosexuals from expressing their homosexuality they just became more discrete about it, so they would not see punishment from their actions. Today, most modern religions still do not approve of homosexuality seeing it as a sin. Some countries are very religious, and prohibit homosexual activity; those that are found guilty will be severely punished. The view that is seen on homosexuality in the modern day has been seen for thousands of years. That is why some homosexuals are afraid to accept their sexuality because of religious reasons (punishment from god) and society (disapproval). The hatred that is forced upon gay individuals has made it very difficult for them to be accepted among society. In our society it is normal when found to be gay to be criticized for it, and deal with harsh treatment that a straight person accepted in society would not have to deal with. When found to be a gay individual they even may have to change their church to one that accepts the view of a homosexuality. When growing up we learn that homosexuality is unnatural and not the right way of life that is not the case it is completely natural. Unfortunately many times in the beginning a homosexual might not know what they are experiencing wondering why they are different, and if it is alright they could grow to hate them self for it thinking that they are not normal. In modern time many countries still punish homosexuals, while others are more accepting they just deny homosexuals the right to marry due to religious reasons. That is all slowly changing and I think in the future will be seen differently. The scientific views on homosexuality are homosexuals inborn or is it caused due to environmental influences. That is a question that have been asked and wondered for many years, but in modern days there is evidence directing us towards homosexuality developing as an inborn characteristic. Research done on both identical and fraternal twins, show that there are higher concordance rates of gay monozygotic twins. Rathus, Nevid, and Fichner-Rathus, (2005) report that about â€Å"52% of identical (MZ) twin pairs were found to be â€Å"concordant† (in agreement) for a gay male sexual  orientation, compared with 22% of fraternal (DZ) twins and only 11% of adoptive brothers† (p. 312). Also, evidence has suggested that hormonal influences could be responsible for differences in sexual orientation. Rathus, Nevid, and Fichner-Rathus (2005) explain that prenatal sex hormones be responsible for tissues in the brain to think sexually one way, but for genital development to be the other way. Also, structural examinations on the brains of heterosexual and homosexual males have provided speculative evidence that a part of the hypothalamus in gay males is smaller than that region of the hypothalamus in heterosexual males. Developing an understanding from the scientific view point on homosexuality has helped homosexuals understand why they are the way they are. Before scientific studies provided the information that homosexuality could be due to inborn, many individuals believed that people decided to be homosexuals. After the scientific studies though that thought is seen as false, and the reason why people become homosexuals is because they are born that way. Homosexuals do not choose their sexual path they are born having sexual arousals from the same sex. Homosexual people do not hate them self as much knowing the facts from the scientific studies that they were born that way, rather than choose to be that way now they feel it is how god wanted they to be and they can accept them self’s. Out The Closet and Accepting Who they are The biggest goal to overcome when being a homosexual is when the perfect time to come out the closet, and admit to our family and friends (hey I’m a homosexual). Not only is finding the perfect time hard to find, but also finding the right words to use when telling them you are not just going to say hey I’s a homosexual. Another difficult obstacle to overcome is accepting the different view we will see from society when coming out. Many homosexuals are afraid to tell friends and family because they have not completely grasped the concept of what they are. This is especially seen in someone who is transformed from heterosexual to homosexual. Another thing  that bobbles around their thoughts when coming out is that they will lose important people in their life or lose their job. Coming out or letting people into your homosexuality is a very challenging experience that is one of the most difficult task a homosexual will face. One of the most common deaths an early homosexual faces is suicide normally for one of two reasons understanding their new sexuality or the fear of coming out to other people about it. Once a homosexual takes control of their power and accepts the fact they are living a life of homosexuality they can adjust to what society expects from them. After they can accept what society thinks of them they can form a relationship with an intimate partner, and develop a perfect homosexual lifestyle. Historical and Scientific Views Reflected on Personal Sexuality One’s personal sexuality has been molded and determined by history and scientific views that are seen in one’s life culture or society. Historical and scientific views reflected the way people see their own personal sexuality for the better. It has helped homosexuals better understand why they are the way they are, and they are not different that throughout time there has been people of the same sexuality facing the same problems. In modern time the punishment might not be as harsh as back in ancient time, but it is still there and seen. Homosexuality is still frowned upon by many, and many also criticize and harass homosexuals because of their difference in behavior. In the future with homosexuality become more open and known about to the public I think that schools should teach about it at an earlier age to help the younger society better understand it. Homosexuality in most cases is misjudged and treated in the wrong way if people learned about it at an earlier age t hey could learn to have a kinder understanding, and be more accepted of homosexuals. Another benefit of teaching it at an earlier age is that it would give people the benefit of know why they are the way they are, and if they feel they are different.Homosexuality has been around for thousands of year before Christianity it was accepted freely, but after the religion started growing rules banned homosexuality from being free. Homosexuals had to live in the shadows hiding who they were afraid of society, and how they would be treated and the punishment they would receive  if found to be homosexuals. Throughout time the harsh treatment homosexuals faced has not ended it is becoming more in the open, and they are beginning to be accepted for who they are. Homosexuality is not always chosen it is sometimes something we are born being we cannot help they way we feel, but that does not make us different. Our sexuality might not be the same as everyone else’s, but neither are their sexuality to ours. Reference Rathus, S.A., Nevid, J.S., and Fichner-Rathus, L. (2005). Human sexuality in a world of diversity. (6th ed.) Boston, MA: Allyn and Bacon.

Friday, November 8, 2019

Free Essays on Steel

Have you ever wondered how skyscrapers came about? Before there were skyscrapers, there were towers. Made of heavy stone, towers had thick, sturdy walls, but the rooms were dark and cramped. The reason the towers were so dark was because having too many windows would weaken the structure. Soon Gothic cathedrals joined the quest for height. Long, stone arms, called flying buttresses, supported the cathedral’s heavy weight, allowing the walls to be filled with colorful glass windows. George A. Fuller was the first person to invent the sky scrapper. Fuller worked on solving the problems of â€Å"load bearing capacities† of tall buildings. Fuller built the Tacoma building in 1889, the first structure ever built where the outside walls did not carry the weight of the building. In order for Fuller’s idea to work he needed a material and enough of that material to make a steel cage that could support the weight. The Flatiron Building was one of New York City’s first skyscrapers, built in 1902 by Fuller’s building company. With an idea as valuable as Fuller’s someone had to step up to the plate and create a way to mass-produce steel inexpensively. That man was Henry Bessemer of England. In 1855, Bessemer developed the idea of â€Å"air blowing the carbon out of the pig iron†, which is still used today to make modern steel.... Free Essays on Steel Free Essays on Steel Have you ever wondered how skyscrapers came about? Before there were skyscrapers, there were towers. Made of heavy stone, towers had thick, sturdy walls, but the rooms were dark and cramped. The reason the towers were so dark was because having too many windows would weaken the structure. Soon Gothic cathedrals joined the quest for height. Long, stone arms, called flying buttresses, supported the cathedral’s heavy weight, allowing the walls to be filled with colorful glass windows. George A. Fuller was the first person to invent the sky scrapper. Fuller worked on solving the problems of â€Å"load bearing capacities† of tall buildings. Fuller built the Tacoma building in 1889, the first structure ever built where the outside walls did not carry the weight of the building. In order for Fuller’s idea to work he needed a material and enough of that material to make a steel cage that could support the weight. The Flatiron Building was one of New York City’s first skyscrapers, built in 1902 by Fuller’s building company. With an idea as valuable as Fuller’s someone had to step up to the plate and create a way to mass-produce steel inexpensively. That man was Henry Bessemer of England. In 1855, Bessemer developed the idea of â€Å"air blowing the carbon out of the pig iron†, which is still used today to make modern steel....