Wednesday, October 30, 2019

THE_MANAGEMENT_OF_LEAN_AND_AGILE_ORGANISATIONS_2008_6ME015 Assignment

THE_MANAGEMENT_OF_LEAN_AND_AGILE_ORGANISATIONS_2008_6ME015 - Assignment Example In this context, the present paper discusses the various features of lean production system and its related literature. The paper takes a descriptive approach where in the present lean manufacturing system is discussed in detail. Also an effort is made to compare the lean and mass manufacturing system. Mass manufacturing and distribution were considered ideal business strategies in the past. In those days, business organisations produced large amount of products with standard quality fixed by them. The products in large quantity were also supplied through the mass distribution system. These strategies were found practical and economical in times when production oriented business operations and economies of scale is the barometer of business success. However, these seem to be inefficient and unsuccessful in the modern business environment where products are being produced and distributed keeping in view the interests of ultimate customers. In the modern philosophy of marketing management and the era of customer relationship management (CRM), business operations are carried out more in conformity to the needs and tastes of customers than the economics of business operations. The main argument brought about by the advocates of lean manufacturing system is that mass production results in huge wastage of resources, mainly material and equipments and it needs huge investment in inventory, which is Mass manufacturing and distribution were considered ideal business strategies in the past. In those days, business organisations produced large amount of products with standard quality fixed by them. The products in large quantity were also supplied through the mass distribution system. These strategies were found practical and economical in times when production oriented business operations and economies of scale is the barometer of business success. However, these seem to be inefficient and unsuccessful in the modern business environment

Revolutionary War and Saratoga Essay Example | Topics and Well Written Essays - 750 words

Revolutionary War and Saratoga - Essay Example One might try to counter such a claim by stating that the British forces have a far superior level of combat training, readiness, and the possession of a professional army. However, it should be remembered by individuals that might espouse such a view that the colonial army, although not in existence for long, has had many years of experience fighting in the French Indian War as well as nearly constant practice in marksmanship and operations within difficult terrain as a function of the way of American life.2 In this way, although the Continental Army has not long been a formalized group, it is ultimately made up of a very hardened and experienced core that can and will continue to deal powerful and painful blows to the British forces until such a time that they can realize that control over the American colonies is no longer possible. Part 2: One of the most fundamental things that the reader back home should understand about the ongoing war within the colonies is the complete lack of respect and gentlemanly regard that the colonial forces apply in battle. No better a case can be seen with regard to this than what happened during the two battles that are collectively called the Battle of Saratoga. Whereas the traditional continental way of warfare has typically been for opposing armies to face off and seek to gain the upper hand, the Continental Army employed what can only be described as an organized assassination program that was specifically targeted towards killing any and all officers that could be caught in the crosshairs of the sharpshooters. Naturally officers of the British Imperial Army can and should expect that they are placing their lives at risk and it is not the intent of this newspaper article to establish that these men are off limits in the scope of warfare; however, what is more important is the fact that the tactics employed by the colonists were to specifically target these men as means of reducing leadership and spreading chaos and disord er through the ranks of our forces. Such a plan ultimately worked; although it is a new low with regard to the way in which the British Army has fought any of its former battles with a civilized group of people. As a result of such a tactic, the second battle of Saratoga was nearly a foregone conclusion as the level of boldness of the British officers, as well as the overall number of British officers available to lead and direct their men into combat, were lessened. This marked a turning point due to the fact that it was clear that the colonists were willing and able to go to any particular lengths necessary in order to win the conflict. Moreover, the particular tactic that was employed at Saratoga marked a turning point in the way that the colonists chose to fight the British. Where asymmetrical warfare has been something that these revolutionaries have employed all along, the manner in which they were ultimately willing to engage in a pitched battle where both sides faced off tog ether was tempered by the asymmetrics of employing sharpshooters to specifically target the eyes and ears of the British general.3 As a function of understanding the importance of such a battle, the reader can come to the general conclusion that even if and when the British Army is forced to engage with these rebels upon a battlefield, there is little if any guarantee that they will abide by the

Monday, October 28, 2019

The Evolution Of Corporate Espionage Business Essay

The Evolution Of Corporate Espionage Business Essay Espionage is the use of illegal means or deceptive practices to gather information. It is also commonly referred to as industrial or economic espionage. Industrial Espionage (or Economic Espionage) is the clandestine collection of sensitive, restricted or classified information. This information by its very nature is not openly accessible and can only be obtained through covert collection means. Industrial Espionage might include the theft of sensitive or restricted competitor information (such as financial data, restricted manufacturing processes, customer accounts, etc.), covert recruitment of sources within a competitors firm, and other such methods. Each and every day covert activities are being conducted for the purpose of obtaining information that can create value for another organization, be it a business or another government. Corporate initially meant united in one body (1398, from L. corporatus or corpus which means body  [1]  ). However, in due course of time the term the connotations attached with it finally paved way for the new age definition which is pertaining to a corporation or a group come together for a common goal. Moving onto Espionage, it means the systematic use of spies to get military, political or industrial secrets (1793, from Fr. Espionage  [2]  ). Corporate Espionage basically suggests impregnating a corporate system or structure with spies or systems so as to facilitate leakage of information which could in all probability mar the growth, financial stability the prospects of the victim organization to have sustained development in future. Corporate Espionage would cover illicit activities like theft of trade secrets, bribery, blackmail technological surveillance. And with developments that followed in the recent years, even attempts to sabotage a corporation may be conside red corporate espionage. Basically there are three primary motivations behind corporate espionage. First, an individual corporation may use corporate espionage to advance their goals towards maximizing shareholder value. Secondly, state-sponsored corporate espionage is an essential ingredient of modern day economic warfare or military application of the intellectual property. Thirdly, special interest groups may conduct corporate espionage to gather data to further their cause (i.e. environment interests). There are also instances where the distinction between legal and illegal intelligence gathering activities is blurred. Probably the most notorious case of corporate espionage that has been dealt in this study is Proctor and Gambles attempt to find out more about Unilevers hair care business by hunting through their garbage bins. Distinction between corporate espionage and competitive intelligence The difference between competitive intelligence and industrial espionage, is significant. By definition, industrial espionage refers to illegal activities which range everywhere from outright theft to bribery and everywhere in between. Conversely, competitive intelligence collection is governed for the most part by adherence to corporate and professional ethics which preclude the use of illegal means to obtain information. Moreover, the distinction between the two is in terms of modus operandi. At bottom, the competitive intelligence process consists of collecting information as elements which when legally, ethically but rigorously collected and analyzed, can provide the same kinds of information as might otherwise have only been available through such illicit means as theft. Burglary, outright theft or bribery might be some of the ways that criminals would resort to in order to obtain what a competitor may need constituting an act of corporate espionage. The evolution of corporate espionage over decades and the rationale behind its use The history of corporate/industrial espionage probably dates back to the sixth century when Justinian, the Byzantine emperor hired two monks to visit China. He wanted them to gain an understanding of silk production in China and to smuggle silkworm eggs and mulberry seeds out of that country to break its worldwide monopoly on silk production. The monks smuggled these eggs and seeds out of China in hollow bamboo walking sticks. Subsequently, in a few years the Byzantine Empire replaced China as the largest silk producer in the world. Over the centuries, industrial espionage practices continued to play a major part in the development of many countries. In the 18th century, alarmed by the industrial and military supremacy of Great Britain, France sent its spies to steal the latters industrial secrets. Corporate espionage gained more attention in the last few decades. Some of such instances are mentioned herein: In 1999, one of the most famous cases of corporate treachery, a Taiwanese company head was arrested as he was convicted to have paid an Avery Dennison (U.S. Label manufacturer) employee $160,000 for the secret formulas for the companys pressure-sensitive adhesive. In 1996, General Motors sued Volkswagen, charging that GMs former head of production had stolen trade secrets turned them over to Volkswagen. In 2000, Oracle Corporation head Larry Ellison had hired an investigation firm to dig out embarrassing secrets about Bill Gates headed Microsoft. In 2001, FBI arrested two employees from Lucent Technologies for conspiring to steal lucent trade secrets sell them to the Chinese government. In 2003, Italian auto manufacturer Ferrari charged Toyota with stealing the design for its Formula One racing car. Looking at the recent trend it becomes clear that corporate espionage cases have been increasing by leaps and bounds. The reasons for this can be attributed as: -advent of the information age with its tools and technologies has made it much easier to gather information and analyse intelligence. -Trained intelligence analysts can easily ferret out deeper information through masqueraded phone calls, purported interviews of the victim companys employees, going through their garbage, creating e-relationships with employees or joining use nets frequented by them. -The second issue that places most companies at risk is lack of employee awareness and education. At times, the management is to blame for the myopic approach that IT security should safeguard its intellectual property. The misplaced over-dependence on technology to protect the companys intellectual property is ridiculous, given that, even in the most digitised companies, over 70 per cent of critical information is still in non-digital forms. -Companies that invest hundreds of thousands of dollars in firewalls and PKIs (public key infrastructure) forget that over 15 per cent of their employees are talking to prospective new employers (or competition) at that very moment. Or that several third parties and temporary employees are swarming all over their organisation with complete access. -The single factor that makes corporate espionage devastating is its transparent nature. Physical assets when stolen get noticed and things can be attended to rapidly. But a company could be getting robbed of intellectual property or competitive advantage for years and might still not know what exactly is going wrong. Thus what began as that innocuous glance at what competition is doing, just to keep oneself abreast of the latest developments in the business one was in, is now taking the ugliest forms of ethical and legal violation. And this includes the entire gamut of wrongdoing: the selling of technological knowhow, product design, research papers, client lists and other trade secrets by loyal employees, infringing intellectual property law, teams resigning en masse from a company, taking along with themselves upscale, lucrative customers to the new entity, selling defence secrets in the lure of monetary kickbacks, and what not. In fact, corporate espionage has moved far from within the confines of the corporate sector to foreign nations, with many IT expatriates and even foreign employees with acquired citizenship acting as a conduit for the flow of confidential information from one corporate to another, from one nation to another. Cross border businesses and employees, remotely located custom ers in an era of E-Commerce, telecommuting contractual employees-all these are adding to the ease with which these acts of malfeasance are being committed. It is interesting to examine the Annual Report to U.S. Congress on Foreign Economic Collection and Industrial Espionage, FY 2008, it brings out the following:- The threat to the United States from foreign economic intelligence collection and industrial espionage has continued unabated since the publication of the Annual Report to Congress on Foreign Economic Collection and Industrial Espionage, 2007. Economic espionage cases went up slightly and nearly every day brought reports-in the press and in the classified world-of new cyber attacks against US Government and business entities. Additionally, the increasing use of new modes of communication and social networking provided uncharted opportunities for transferring information and spying on the part of enterprising foreign intelligence services. According to evidence amassed by the US CI community, a wide variety of foreign entities continued to try to illegally acquire US technology, trade secrets, and proprietary information. With companies encouraging outsourcing of research and development (RD) and establishing foreign bases of operation, foreign entities had more opportunities to targe t US information and technologies and mask their collection activities. As a result, it was increasingly difficult to measure fully the extent of their espionage and illegal acquisitions. Nonetheless, the CI community assessed that the cost in FY 2008 remained high, given the number of legal cases, investigations, and technologies targeted. à ¢Ã¢â€š ¬Ã‚ ¢ The FBI opened 55 new cases and pursued 88 pending cases during the reporting period, slightly more than reported in FY 2007. à ¢Ã¢â€š ¬Ã‚ ¢ ICE made 158 arrests in FY 2008 and achieved 187 indictments that resulted in 143 convictions for export-related criminal violations, more than any other Federal law enforcement agency. These efforts-similar to the previous year-significantly contributed to preventing sensitive US technologies, as well as weapons, from reaching terrorists, hostile countries, and violent criminal organizations. à ¢Ã¢â€š ¬Ã‚ ¢ DOC/BIS participated in more than 792 export investigations. This resulted in 40 criminal convictions, $2.7 million in criminal fines, over $800,000 in forfeitures, 56 administrative cases, and $3.6 million in administrative penalties. Wide Ranging Group of Actors According to information compiled during the reporting period, businessmen, scientists, engineers, and academics, as well as state security services from a large number of countries, continued to target US information and technology. The bulk of the collection activity, however, came from a core group of countries. Enduring Acquisition Methods While the most frequently reported collection methods remained the same during the past year, requests for information (RFI); exploitation of open-source media; and requests to purchase or share technology were often used. Some reports indicated an increase in the use of multiple methods in single contacts. General techniques included: RFIs Collectors used direct and indirect requests for information in their attempts to obtain valuable US data. These types of approaches often included requests for classified, sensitive, or export-controlled information. Solicitation or Marketing of Services Foreign companies sought business relationships with US firms that would enable them to gain access to sensitive or classified information, technologies, or projects. Acquisition of Technology Collectors continued to exploit direct and indirect acquisition of technology and information via third countries, the use of front companies, and the direct purchase of US firms or technologies in 2008. Conferences, Conventions, and Trade Shows These public venues offered opportunities for foreign adversaries to gain access to US information and experts in dual-use and sensitive technologies. Official Foreign Visitors and Exploitation of Joint Research Foreign government organizations, including intelligence and security services, also targeted and collected information, frequently through official contacts and visits. Statistics on visits and assignments to DOE facilities indicate that the number of visitors remained relatively stable compared to 2007. The statistics also show that visitors made multiple visits to individual facilities. China and Russia accounted for a considerable portion of foreign visits to DOE facilities during FY 2008. Cyber Attack and Exploitation Cyber threats are increasingly pervasive and are rapidly becoming a priority means of obtaining economic and technical information. Reports of new cyber attacks against US Government and business entities proliferated in FY 2008. Several adversaries expanded their computer network operations, and the use of new venues for intrusions increased. Threats against mobile telephones rose as well. Blackberry and iPhone-essentially general purpose computers-are susceptible to malicious software, according to opensource reporting. Foreign Targeting of US Travelers Overseas Foreign collectors also targeted US travelers overseas. Collection methods included everything from eliciting information during seemingly innocuous conversations to eavesdropping on private telephone conversations to downloading information from laptops or other digital storage devices. Targeted Information and Sectors Foreign collectors continued to seek a wide range of unclassified and classified information and technologies. Information systems attracted the most attention; aeronautics, lasers and optics, sensors, and marine systems were other top targets. Where as in case of India a report by Leslie DMonte Sapna Agarwal / Mumbai  February 10, 2007 from Business Standard (http://www.business-standard.com/india/news/corporate-espionage-goes-undetected-unsolved-in-india/274229/) highlights the existing state of affairs , in that Corporate espionage virtually goes undetected and unresolved in India. The arrest of a VSNL employee for allegedly leaking information to a competing company is one of the few cases of corporate espionage to have come to light. However, a majority of corporate espionage cases go undetected. If detected, very few complaints come to light. And in the few cases that complaints are registered, hardly any action is taken. Only 20 per cent of corporate espionage cases are detected. Of this, a mere 20 per cent get reported and only 10 per cent can be solved, says Raghu Raman, CEO, Mahindra Special Services Group. Moreover, there have been very few convictions in India till date for corporate espionage or data theft, while not a single case has been registered under Section 66 of the IT Act 2000 the recent online ticket booking fraud cases where airlines were duped, is a case in point. In data theft cases, proving the crime is difficult. Besides, it could span across countries, under different jurisdictions, making it more difficult for law enforcement agencies, explains Vijay Mukhi, president, Foundation of Information Security and Technology (FIST). Every company I meet knows they are victim of some or the other form of data theft, but are not aware of how to deal with it, he adds. Any corporate leveraging intellectual property rights (IPR), offering cost-effective solutions or innovative or ingenuous solutions and not taking structured measures to protect its IPR, loses 5-10 per cent of their revenues to data theft, corroborates Raman. We get at least one or two cases every month, besides many inquiries; our clients ask us for specific information from their competitors or send dummy interviewees to find out salary packages, says Sunil Sharma, CEO, Authentic Investigation, Delhi. Ajay Jugran, Partner of law firm, Lawcombine, says, This malady is deep-rooted. Its prevalent when PSUs call for bids. Trading in bidding information is rampant. Companies are even using annual maintenance (AMC) contractors to plant surveillance software in rival firms. The software gives a daily log of the data via e-mail. Corporates have not woken to this fact despite the fact that the law (unless for national security purposes) does not permit this, explains cyberlaw expert and Supreme court lawyer, Pavan Duggal. Corporate Espionage has risen to epidemic levels. Espionage strategies range from illegal to merely seedy. In most cases, the best defense is employee awareness. The current organisational focus on risk management, governance, and compliance has, for some, blurred the responsibility for ensuring the security of an organizations assets. Corporations have to reconsider the effectiveness of their overall security programs, given the current threat of corporate espionage. Comprehensive security programs should address this threat. Though espionage cannot be eliminated, implementing multi-layer safeguards will at least minimize losses. What Can Companies Do? As competition in the global market place increases, so will the instances of corporate espionage. Therefore, companies both big and small need to take steps necessary to protect themselves from becoming a victim. Here are four necessary steps to help protect valuable data from falling into the hands of competitors. 1. Companies must identify what information is sensitive and classify it as such. Information such as RD processes and innovations or new market strategies are easily identified as sensitive. However, other information such as personnel files, pricing structure, and customer lists are often overlooked and left unprotected. 2. A company should conduct a risk assessment to identify vulnerabilities, and the probability that someone will exploit those vulnerabilities and obtain sensitive information. 3. Establish, review and update security policies and appropriate safeguards, both procedurally and technologically, to thwart attempts to exploit vulnerabilities and gain access to valuable company data. 4. Train all employees. Users, managers and IT staff all need to be trained in what business information needs to be safe guarded, techniques that can be used to gain access to sensitive data, and what procedures should be taken to report compromises or suspected attempts to solicit sensitive information. Government Involvement in the Espionage Threat Countermeasures -The government must conduct a threat assessment to determine risk and External / Internal flaws in the security the major corporations both private and public sector undertakings so as to prevent any possible attack of espionage. This would help protect such information as is necessary for keeping the economy of nation on track and preventing from it from any derailment by the financial loss that might be caused due to espionage activities. -There is a need of initiative on the part of government to make policies and procedures that would help in controlling the rampant increase of espionage activities. Such policies and procedures must be in writing and easy to understand and should be accessible easily. Further it is also needed that such regulations passed by government must be disseminated so that it becomes friendlier for the victim of corporate espionage to take recourse to the measures provided under this. -The government must also stay updated with regard to various developments that take place in the corporate world. For this revision of such policies and procedures is required from time to time. Such policies must also be updated annually so as to keep in touch with the latest technological developments. -The government must also take care of its assets, its people, its information, and its property so that it can utilize all these resources properly without any threat of being espionage by enemy organizations. -The government while handling various public sector undertakings must take care of its human resources. There must be Proper Position Descriptions of all the employees which must be accompanied with Pre-Employment Investigations about their background. It must be followed by Periodic Investigations so as to check any change in the behavior of a disgruntled employee. -The government must also advocate for the publication and release of Audits and Investigations. There must be regular audits of all areas, as this would help in investigations of losses and investigations of violations of policy. After doing this the government would be successfully able to check corporate espionage.

Sunday, October 27, 2019

How Gender Inequality Is Explained Sociology Essay

How Gender Inequality Is Explained Sociology Essay How has gender inequality been explained? (Answer with reference to a range of theories and approaches) Critically assess the attempt of one of the feminist group to overcome gender inequality. Social stratification A system by which a society ranks categories of people in a hierarchy (Macionis and Plummer: 2005: 190). Social stratification is common in different aspects throughout society and throughout history some of the most substantial categories affected are class, race, disabilities, sexuality and globally. However this essay shall be investigating the stratification by gender, referred to as gender inequality. There are many reasons for the disparity of gender circumscribed by its underlying social, legal, political, economic, and cultural characteristics (Rives and Yousefi 1997:1). Gender stratification categories people in regard to their sex, this can be defined as anatomical differences and physiological differences between male and female for example the difference in chromosomes, sex organs and hormones. The word gender has been socially constructed through the means of a stereotype and ideology of the social role, identity, position and behaviour of male and feminine through different institutions and aspects like the media, religion, culturally and historically. Up until the era of Suffragettes in the late 19th Century women were always deemed lower than men and inequality was highly significant society it was fundamentally a patriarchal society. The traditional preconceptions were that men were strong, intellectual beings that were the hunter gatherers and providers for their household. Whereas, women were passive objects that would cook, clean, cater for their husbands wants and desires, and doing nothing more than bear and raise children. To the woman he (God) said, I will greatly increase your pain in childbearing; with pain you will give birth to children. Your desire will be for you husband, and he will rule over you. (Genesis 3:16). This interlinks with religion and reiterates traditional and religious view from The Bible. There are a substantial amount of reasons why there is clear gender inequality in society, this essay will assess and show the many theories into the existence of this. Biological determinism is a theory that asserts that males and females appearance, mental and general behaviour and position on the social hierarchy is all in relation to their genetic make-up and genes, the differences between male and females socially is dependant on the fact of them being different sexes alone. The Evolution of Sexes written by Geddes and Thompson shows a generalisation of a biological determinist analysis of gender. They claim that social, psychological and behavioural traits were caused by metabolic state. Women supposedly conserve energy (being anabolic) and this makes them passive, conservative, sluggish, stable and uninterested in politics. Men expend their surplus energy (being katabolic) and this makes them eager, energetic, passionate, variable and, thereby, interested in political and social matters. These biological facts about metabolic states were used not only to explain behavioural differences between women and men but also to justify what our social and political arrangements ought to be. Due to all these factors it is apparent biological determinism theorists that gender stratification is fate, females are meant to be inferior to males and this cannot be fought or changed in society and therefore is highly beneficial. Functionalists would argue that gender stratification is universal and positive for society. A key functionalist thinker Talcott Parsons explained how the differences in the sexes (gender) have provided complementary roles for both male and female (Instrumental and expressive), and how the difference in roles which are biologically based helped traditionally integrate society. He believes that gender differentiation and the understanding of division of labor means social stability. Women labeled expressive by Parson should typically be in control of the family units be the emotional support, take care of the household chores and the security and well being of the children. Opposed to men, labeled instrumental whose role is to connect the family to the larger world primarily by participating in the labour force(Macionis and Plummer 2008:381), work and focus on issues outside of the internal family unit. Parson theorises that gender identity is social, formed through numerous means of social control and is needed for both male and female to gain appropriate skills to succeed in life. The knowledge of these specific skills and understanding of the difference of gender identities to the opposite sex (expressive and instrumental)are in a sense indoctrinated so that, for example if a male is not deemed instrumental he is therefore unattractive and is rejected by the expressive women. This clear distinction of the division in the family unit ensures harmony in the family and thus benefits society on a whole Functionalists view the potential for social disorder only when all of the aspects of traditional gender stratification are disturbed. (Schaefer and Lamm 1998). During the 20th Century there were huge upheavals in the traditional view of women and their roles and the view of a predominately patriarchal society they were living in. Women now wanted to be able to work and have an education, not deemed less able due to biological determinism and be treated equally, which gave birth to a collection of huge movements in sexism and inequality and also different views with in feminism (Liberal, Socialist/Marxist and radical). One point that is evident throughout all the different interpretations of feminism is that women have not been seen as equal throughout the social structure. Liberal feminists do not see womens oppression as part of large system structure but however believes that biological determinism as a source for inequality within the political and justice realm as completely barbaric. There may be some slight procreative differentiation but that should not be any differences in relation to the law, politics, employment or educational institutes, they believed the only way of reformation was through the reform of these institutes. Liberal feminists believe in the rights for every individual woman in society. Socialist/Marxist feminism is adopted through two major writings, Firstly in Engels writing in 1884 The origin of the family, private property and the State and through Marxs conflict theory evident in the Communist Manifesto, which is a struggle between the oppressors (capitalists/ bourgeoisie) and the oppressed (working class) to maintain an equal social structure one needs to overthrow capitalism. Beasley wrote that the base-superstructure model of society, that is, social relations- including those related to sexual inequality- are conceived as crucially shaped by the economic base of society, rather than ideas and attitudes (Beasley 1999:61) Marxist Feminists believed the only way to end this patriarchy was through social revolutions against capitalism for equality. As males dominated the means of production and owned all the property women Engels contended were alienated due to the economic reliance on their husbands. Engels links the modern oppression of women to the instituti on of private property. Correlatively , he argues that the economic system of capitalism draws women into the public workforce and thus sets the conditions for their equality (Carver and Steger 1999:254) The only way women would be able to throw the unfair justice of capitalism would be to be free of marriage, laundry, cooking, childcare and childbirth and reforming the structure of the family. So that women can get full-time jobs through revolting equaling out the inequality in gender. This essay has briefly summarised the main theories and some brief approaches of gender inequality, Radical feminism is similar to that of Marxist feminism but more extreme, it is similar in the aspect of it fundamentally believing that the oppression and control of women is to do with how Capitalism promotes gender exploitation. Women are segregated into a sex class and therefore should stick together. Radical feminists believe that the only way for gender equality is the complete eradication of patriarchal society and any aspect of society that males dominate, this is the only way for female liberation. Radical feminists believe women are oppressed through their ability to reproduce and the sexualisation by men, they should be seen as the enemy. The only way women can free themselves is through any aspect of association with males, this includes not having heterosexual relationships and not producing off spring in order to liberate. Alice Echols and Ellen Willis wrote about radical feminism in their book Daring to Be Bad: Radical Feminism in America that Radical feminism was a political movement dedicated to eliminating the sex-class system(Echols and Willis 1989:4) The sex class system also included the sex-role system which sees marriage, family, prostitution, and heterosexuality as repressive. They believed gender inequalities root cause was sexual oppression, women need to gain control over their bodies/biology and relatedly to value and celebrate womens bodies(Beasley, C 1999:55) . This interlinks with a psychoanalytic feminist such as Sigmund Freud where he shows that gender is embedded in language and through sexualisation and thought from the earliest state of childhood. This is through the penis envy theory, this is when girls realise they dont have a penis and from being attached to her mother, finds a stronger attachment to the father. She accepts her inadequacy and subordination in society by accepting her mothers values and containing her craving for her father. According to many theorists Radical feminism is also about generating widespread support for campaigns around issues such as rape, domestic violence and sexual harassment (Dean 2011) as well as the promotion of contraception, sterilization and abortion. The word radical in itself holds factors for criticism; this is an extreme view that has many factors that can be deemed incorrect. You cannot categorise all women into a sex class as there is no substantial evidence that supports the idea of this. How is it possible that all women just because of their biological similarities are the same, and can be generalised so flippantly? It doesnt entail any other aspects such as culture, psychological, class or economic factor in a way of determining gender construction.Radical feminism not only ignores important differences among women but also reproduces exactly the stereotypical vision of women and men (Beckham and DAmico 1994:80) Isnt this exactly what radical feminism is fighting against, the generalisation? Radical feminism ignores legislations like the Equal Pay Act 1970 and The Sexual Discrimination Act 1975 and how politics are constantly changing in regard to sexism and the maltreatment as women as a class. Radical feminism suggests that society should be matriarchal, this would continue the process of gender inequality but just the other way round. Another limitation of radical feminism is that instead of promoting marriage it does the opposite, that women should be rid of all these stereotypical roles, this in a way promotes promiscuity and even unhealthy relationships. Radicalism is damaging to society as a whole because society cannot reach its maximum potential if one group is more domineering than another.

Friday, October 25, 2019

Essay example --

1 John Adams—the first vice president of the United States, an American Founding Father, and well-educated Republican—is most commonly known for being the second president of the United States. As a lifelong opponent to slavery, Adams never bought a slave in his life. He assisted Thomas Jefferson in the writing of the Declaration of Independence, and helped negotiate the peace treaty with Great Britain. Adams won the Presidential Election in 1796 with only having only three votes more than Thomas Jefferson. But John Adam’s life wasn’t all based on presidency, obviously. His early life was just as normal as anyone else’s. John Adams was born on October 30, 1735 in Quincy, Massachusetts to John Adams Sr. and Susanna Boylston. Adam’s birthplace is now part of Adams National Historical Park. [3] He was born into a normal but not wealthy farming family. His father earned a living as a farmer and shoemaker about fifteen miles away from Boston. Adams loved the outdoors, and was always skipping school to go hunting and fishing. He would have preferred a life as a farmer, but later on his dad insisted that he get a formal education. Adams attended a local school that was designed for teaching skills of reading and writing, and he also attended a Latin school for those who planned to go to college. Adams commonly praised his father and indicated that he and his father were very close when he was a child. Young Adams went to Harvard College at age sixteen in 1751. His father expected him to become a minister, but Adams had doubts. After graduating in 2 1755, he taught school for a few years in Worcester, allowing himself time to think about his career choice. Later on, he decided to become a lawyer, and studied law in the office of John P... ...ever owned a slave either. I think it would have been better if he made it so it was illegal to own a slave but then that would have caused more problems for his presidency and lots of people would vote against him. I think that once everyone found out about Adams being against slavery, that’s what hurt him in the election when he ran for his second term and got beat. I also like that he was all about making the world peaceful, even though he knew people would hate him for it. The way Adams handled wars was good because he was always finding a way to make it to peace without actually physically fighting or going to war. Although there were wars that they went to, Adams did what he had to do to get it over with. He made his way around war as much as possible. Overall, John Adams is one of my favorite presidents mostly because of what he did and what he believed in. Essay example -- 1 John Adams—the first vice president of the United States, an American Founding Father, and well-educated Republican—is most commonly known for being the second president of the United States. As a lifelong opponent to slavery, Adams never bought a slave in his life. He assisted Thomas Jefferson in the writing of the Declaration of Independence, and helped negotiate the peace treaty with Great Britain. Adams won the Presidential Election in 1796 with only having only three votes more than Thomas Jefferson. But John Adam’s life wasn’t all based on presidency, obviously. His early life was just as normal as anyone else’s. John Adams was born on October 30, 1735 in Quincy, Massachusetts to John Adams Sr. and Susanna Boylston. Adam’s birthplace is now part of Adams National Historical Park. [3] He was born into a normal but not wealthy farming family. His father earned a living as a farmer and shoemaker about fifteen miles away from Boston. Adams loved the outdoors, and was always skipping school to go hunting and fishing. He would have preferred a life as a farmer, but later on his dad insisted that he get a formal education. Adams attended a local school that was designed for teaching skills of reading and writing, and he also attended a Latin school for those who planned to go to college. Adams commonly praised his father and indicated that he and his father were very close when he was a child. Young Adams went to Harvard College at age sixteen in 1751. His father expected him to become a minister, but Adams had doubts. After graduating in 2 1755, he taught school for a few years in Worcester, allowing himself time to think about his career choice. Later on, he decided to become a lawyer, and studied law in the office of John P... ...ever owned a slave either. I think it would have been better if he made it so it was illegal to own a slave but then that would have caused more problems for his presidency and lots of people would vote against him. I think that once everyone found out about Adams being against slavery, that’s what hurt him in the election when he ran for his second term and got beat. I also like that he was all about making the world peaceful, even though he knew people would hate him for it. The way Adams handled wars was good because he was always finding a way to make it to peace without actually physically fighting or going to war. Although there were wars that they went to, Adams did what he had to do to get it over with. He made his way around war as much as possible. Overall, John Adams is one of my favorite presidents mostly because of what he did and what he believed in.

“Stylistic Techniques in Kate Chopin’s The Story of an Hour” Essay

For centuries, American literature has served as indication on the power of words to articulate encouragement for change by creating a call to action. Indeed, literature â€Å"the art that expresses life in words† (Tanvir, Para. 4) has the ability to transform the comprehensive human race. Consequently, literature serves as a record of all the dreams that made such change a possibility throughout history. Each successive era, literature begins and ends with great writers communicating their own message to their intended readers. When skillfully written, enthusiastic, and engaging a piece of literature possesses the power to create a substantial contribution. One such great writer, Kate Chopin often wrote about an alternative way of thinking in regards to a women’s position in the 19th Century. Chopin was well known for some of the most shaping feminist stories and novels during her time. Accordingly, in her short story â€Å"The Story of an Hour† Chopin tells the tale of Mrs. Mallard’s reaction to the death of her husband, instead of fearing the forlorn widow years ahead of her; she falters upon a different comprehension all together. After hearing the news of her husband’s alleged death, Mrs. Mallard retreats to her bedroom in solitude. Although Mrs. Mallard is initially distraught by the news, she sits down, gawks out a window and astonishingly, it is spring and everything comes to life. As the reader takes an expedition with Mrs. Mallard on her revelation of true independence, Chopin’s strong word choice sheds light on and develops ideas that articulate, boost and deepen the content. Truly, her short story is comprehensible and clear-cut; Chopin plainly describes people and objects without wasting any words. While â€Å"The Story of an Hour† ... ...e of structural organization and powerful word choice work as a guide for the readers to gain a better understanding of Mrs. Mallard and an exploration of how she finds herself free after her husband’s sudden death. Works Cited Chopin, Kate. The Story of an Hour. Cummings Study Guide, 2006. Web. 10 Feb 2012. . Olson A. Gary et.al. Style and Readability in Business Writing: A Sentence-Combining Approach. Random House, 1985 Stepanek, Jennifer. "6 1 Trait Definitions." Education Northwest. Northwest Regional Educational Laboratory, 2012. Web. 11 Feb 2012. . Tanvir, Nabila. Chief Qualities of Literature. Online Library of Classic English Literature Books. 14 Aug. 2009. Taylor, Marilyn. Tips for Finding the Right Words. Writer 119.12 (2006).

Thursday, October 24, 2019

Childhood memories Essay

The purpose of this essay it to analyze the childhood memories of both Judith Ortiz Cofer and Anwar Accawi past from their stories, the silent dancing and the telephone respectively, who both have complicated early childhood memories. Accawi’s childhood memories are about the changes that were brought by the telephone which led to people moving from the village for opportunities away to make money. He is remorseful for this telephone technology since before it came, people were happy but in his adulthood, he claims that in his adult life he has not been able to find a â€Å"Better Life† than the life in Magadaluna. Accawi’s narrative is created on an adult perspective of regret and humor. He vividly remembers the village destruction as he realizes that the cruelty and idyllic coexist as the human being embodies them. Silent dancing is a story of Cofer in her elementary school through to her high school as they migrated from America to Puerto Rica and vice versa, it discusses the means through which the culture, gender, class and race shape her life without Cofer sounding naive or dogmatic. Her childhood memories are about the depression and discrimination in America due to their color and one day hoped that she would win some respect for her culture and herself. She puts it that â€Å"If you were to stretch that rubbery face, you could find my father’s face and deep within that face- my own† the differences in their childhood memories is that Cofer’s bitter memories are contributed by their movement from their native land in Puerto Rica to America where they face racial discrimination whereas the Accawi’s bitter childhood memories are caused by introduction of the telephone technology that is brought in to Magdaluna that ends up transforming the life of the natives. Another difference in both stories is that Accawi is against the changes that occurred due to technology and wishes that they never occurred while Cofer hopes that things will change in America where she and her culture will be recognized. The village of Magdaluna is simple with no new technology. There are no even calendars and people tell about certain times through extraordinary occurrences like earthquakes and birth of certain people. The children did odd jobs for the adults to earn little money and Accawi was very contented with this way of life. Accawi was happy and assumed that everybody else was happy too without the advantages of the technology. After the coming of the telephone, the way of life of the village of Magdaluna changed since people began to worship the phone. The villagers would gather around the phone waiting for any news and for job opportunities. As time passed by more people gathered around the telephone and more villagers emigrated from Magdaluna and this irritated some villagers like Accawi. .Judith Ortiz Cofer recounts the experiences of her upbringing in a chain of chronologically arranged vignettes that details her way of life as a little girl shuttled forth and back between her grandma’s casa in Puerto Rican village and the family’s American home at Paterson in New Jersey. Ortiz Cofer’s father worked in the United States Navy shipyards of Brooklyn Yard, a profession that required him to abandon his family for several months at different time. Worried about the safety of his family and mindful of his companion’s regular longing for the island, he regularly sends his wife (companion) and offspring to their local land located in Puerto Rico regularly. The narrative explains the life of Cofer as she grew against the cultural switch backs. Her past childhood memories involve the sadness, racial discrimination and depression in America where they lived in El Building which hosted many foreigners but they could not interact but it is the â€Å"But the pipes were also a connection to all the other lives being lived around us† and her mother â€Å"had been given strict orders by my father to keep the doors locked, the noise down, ourselves to ourselves†. She remembers a certain moment when her father was referred to as a Cuban but when he said that he was a Puerto Rican the other responded by shouting to Cofer’s father â€Å"same shit†. Cofer’s home life anchored her to the Puerto Rico’s past while the US remained her home. The sad childhood memories are passed from generation to generation in what is said to be the â€Å"Rubbery face† and Cofer hopes that the misery will end. At home she was a Spanish while outside home she spoke in English and she was always told that she sounded like a â€Å"gringa†. One of the mentors for this lady is her grandmother who is also very strict. Both childhood experiences are greatly contributed by their grandparents. Both stories show the reader how the present culture evolved. Cofer’s stories shows how the American culture is a product of many other cultures while Accawi’s story shows how western civilization changed the farming village at Magdaluna in Lebanese.

Mexican American Culture Essay

Abstract This paper is a review on Mexican American culture in the United States. I will discuss the history of this culture and how they became part of the U. S. I will also talk about the different wars and treaty that was signed to give them rights. I will also include the latest in demographics and population from the Census Bureau (2010). I will cover the Mexican Americans prejudices and discrimination and provide slurs that are commonly used in this group. I will go over some resilience factors that helped my ethnic group in dealing with prejudice and discrimination. Abstract This paper is a review on Mexican American culture in the United States. I will discuss the history of this culture and how they became part of the U. S. I will also talk about the different wars and treaty that was signed to give them rights. I will also include the latest in demographics and population from the Census Bureau (2010). I will cover the Mexican Americans prejudices and discrimination and provide slurs that are commonly used in this group. I will go over some resilience factors that helped my ethnic group in dealing with prejudice and discrimination. Another topic of discussion will be what I feel social workers need to know when working with my ethnic group. I will touch on Biases within the culture against other cultures and define one personal bias of my own. I will close my literature review with reflecting on what I have learned. Brief Mexican History The first Mexicans that became part of the United States did not have to cross any borders. Instead the borders crossed them. Spanish speaking people have lived in Northern provinces since the Spaniards colonized Mexico in the sixteenth century. They have always played an important role in the Continents culture and history. Mexico won its Independence from Spain in 1820. The War of Independence with Spain in 1820’s left Mexico with difficulty settling in its Northern provinces. A policy initiated by Spain that allowed Americans to settle in their regions, in effort to populate was continued by the Mexican government (King, 2000). However it backfired when Texas declared Independence from Mexico. Mexico felt betrayed by the Americans because they took advantage of their kindness and took over the state in 1845 (Skidmore, 228). The Mexican American War, 1846-1848, was driven by the idea of â€Å"Manifest Destiny;† which was the belief that Americans had the right to expand country borders from sea to sea. This principle has been a major political and religious rationalization in the United States, demanding assimilation, containment, or annihilation of everyone else in between and First Nations peoples and Mexican (Robbins, Chatterjee, & Canda, p. 135). This angered Mexicans and Native Americans and caused disputes. President Polk was eager and did not stop until he confiscated large areas of land and sought war. Polk felt a war with Mexico would only prove profitable for the United States, so he enticed the Mexicans to attack. Once Mexico attacked, Polk claimed he had to defend the United States, for Mexico had invaded American territory. Polk’s unexpected election, slavery conflicts, and the Mexican war were all issues in American politics during the late eighteenth and early nineteenth centuries. Of all the possible explanations for these problems, territorial expansion is the number one reason. The idea of Manifest Destiny split American politics more than any other factor up to the eighteen fifties. In 1848 under the Treaty of Guadalupe Hildalgo the Mexican American War came to an end. The signing of the treaty ended the territorial disputes that caused conflict between the countries. Mexicans were pronounced to be U. S Citizens and the treaty promised citizenship along with civil and property rights. The United States paid Mexico $15,000,000 in consideration of the extension acquired by the boundaries of the United States and agreed to pay American citizens debts owed to them by the Mexican Government. 1910 big groups of Mexicans crossed into the Southwestern United States. They were encouraged by the economic, social, and political movements of the Mexican Revolutionary years and the rise in industrial and agricultural employment in the United States. Arriving through both direct and indirect routes, Mexicans worked as unskilled and semiskilled laborers in agriculture[->0] and heavy industry (Figueroa, 1996). When the U. S joined World War II fear of shortage in agricultural field grew and we turned to Mexico for help through the Bracero Program, which allowed migrant Mexicans to temporarily work in U. S farms (Figueroa, 1996). The Bracero program brought over 5 million farm workers to work the fields of the United States. Underprivileged Mexicans fled their rural communities and traveled north to work as braceros. It was mainly by the Mexican hand that America became the most upmarket agricultural center in the world. Their arrival altered the social and economic environments of many border towns. Ciudad Juarez, across the border from El Paso, Texas, became a hotbed of recruitment and a main gathering point for the agricultural labor force (Bickerton, 2001). Current Population Demographics According to the United States Census Bureau (2010), the Mexican population is referred to as Hispanic or Latino, and refers to Cuban, Mexican, Puerto Rican, South or Central American, or other Spanish cultures. 308. 7 million People lived in the United States in 2010, 16% were of Hispanic or Latino Origin. Increase in Hispanics from 35. 3 million in 2000 making 13% of the total population. Between 2000 and 2010 the Hispanic population increased by 15. 2 million, accounting for half of the 27. 3 million increase in the United States. 43% of the growth came from Hispanic population between 2000 and 2010 which was four times the growth in the total population at 10%. The growth in Hispanics varied by groups, Mexican Origin population increased by 54% and had the largest change growing from 20. 6 million in 2000 to 31. 8 million in 2010. They accounted for about three quarters of the 15. 2 million increase in Hispanic population. In 2010, 37. 6 million of Hispanics lived in the eight states; California (28%), Texas (18. 7%), Florida (8. 4%), New York (3. 1%), Illinois (4%), Arizona (3. 8%), New Jersey (3. 1%) and Colorado (2. 1%), and in all other states 25. 4%. The highest Proportion in any state was 46% of the total state population in New Mexico. Mexican Americans experience with Prejudice and discrimination Mexican Americans have been victims of discrimination throughout the history of the United States. A few degrading words that people use when referring to Mexicans are; Wetback, Spic, and Beaner, whether American or not. They also have many stereotypes against them such as lazy, machismos, drunks and many more. One of the main reasons they are discriminated against is because of their illegal immigration into the United States. Mexicans were left no choice but to cross illegally to seek a better life, because of the cost and many obstacles it made it difficult to become a citizen. Often they were forced to work physically demanding jobs for less pay due to non-citizens or lack of options, or because they wanted badly to be part of the U. S and saw themselves to be best off here even if wages were cheaper than back at home. Companies did not make the situation better they took advantage of their need for jobs and employed them with poor working conditions and minimum wage because they knew they had no other choice. Resilience of the Mexican American Race Despite a growing presence throughout, Mexicans continued to face discrimination and renewed threats of deportation as national programs like â€Å"Operation Wetback† searched to detain braceros who had overstayed their visas. While working to ensure economic stability, leaders of Mexican communities supported the education of workers and the development of civic and community institutions like the Mexican Civic Committee. 250 Mexican workers were imported to work for Inland Steel and marched in unity with strikers and demanded transportation back to Texas. In the 1950’s Mexicans went to establish branches of civil rights organizations. Some of these organizations were GI forum which fought for rights of the Mexican World War II veterans. The League of United Latin American Citizens (LULAC) sought to increase the numbers of Mexican with U. S. Citizenship and to secure rights of Mexican Americans (Arredondo & Valliant, 2005). Throughout the 1970’s and early 1980’s Mexicans worked in groups like the Spanish coalition for jobs and Latino Institute to improve housing and education while also fighting employment and social discrimination faced. Political community activists fought for Benito Juarez High school and founded many organizations. What Social Workers need to know working with Mexican Americans Mexicans accounted for about three quarters of the 15. 2 million increase in Hispanic population, the fastest growing in the U. S. As these numbers increase there is a greater need for social work education to provide culturally sensitive training to social work students. Social Workers need to understand and know the different origins of Mexican cultures to not get them mixed up. Social workers need to set aside all biases when working with Mexican Americans or any other cultures for that matter. Mexicans do not want to be judged on their color or looks. As a social worker we need to understand the discrimination they are faced with and know what their beliefs are. Have knowledge on immigration and migration discusses how to assess for levels of acculturation; examine cultural values; and explore prejudice work issues if any. Biases against other groups A cultural bias I can think of is marrying or dating someone of a different race as you. Mexican Americans are very proud of where they came from and often want to keep wedlock in the same race. They feel by dating out of your race you are ashamed of who you are and consider it a disgrace. Mexican Americans want to keep the Mexican culture alive and growing, by missing with other the races we are losing some of our culture traditions. Due to the missing of races we are seeing more English speaking people than Spanish. It is very sad that today the majority of people raised in a Mexican, Hispanic or any other type of Mexican origin are not able to speak Spanish. Bilingual speakers are a must now days and if you cannot speak Spanish your chances of finding a good job are slim. My personal bias A personal bias of my own is people who speak Spanish and do not teach their children because they feel that this is the United States and everyone should speak Spanish. This really upsets me because I am one of the ones whose parents felt that learning Spanish was not important. I feel they did this because they did not want other children to view me as an immigrant. My parents wanted to make sure everyone knew I was born in America and did not want me to be judged by my skin or language. My parents saw how people who spoke Spanish got treated and instilled it into my head that I did not need to know Spanish because everyone living here is Americans and should speak English. They are now realizing the down fall in me not being able to speak Spanish and understand they made a big mistake. To change this we need parents to understand that our culture is very important and by not teaching us the traditions and languages you are hurting us and our economy. We already have problems not finding jobs, and now to make matters worse the one job that will accept us wont because we cannot speak Spanish. What I learned I have learned so much about the Mexican American culture the pain they endured the racial discrimination they experienced. Mexicans at first did not have the choice on whether they wanted to become of the United States, we crossed and took over their land whether they liked it or not. They were treated unfair and had to fight for their land, losing the battle and their men was not by choice. I learned that they fought several wars to seek justice; I learned they won Independence from Spain in 1820 and this is celebrated on September 16 which is my birthday. I also learned through everything they have been through they were strong workers and took jobs that others did not want because it was hard labor. Discrimination against us will never end but we will fight to see that everyone is treated equal. . Bibliography Arredondo, G. F. , & Valliant, D. (2005). Encyclopedia of Chigago: Mexican. Chicago. Retrieved http://www. encyclopedia. chicagohistory. org/pages/824. html Bickerton, M. (2001). Prospects for a Bilateral Immigration Agreement with Mexico: Lessons from the Bracero Program. Texas Law Review, 79(4), 895. Figueroa, H. (1996). Mexican workers in the United States: A profile. NACLA Report On The Americas, 30(3), 38. King, Rosemary, (2000-01-01). Border Crossings in the Mexican American War. The Bilingual Review, 25(1), 63-85. Robbins, S. P. , Chatterjee, P. , & Canda, E. R. (2012). Contemporary Human Behavior Theory 3rd edition. NJ: Allyn & Bacon. Skidmore, Thomas E. , and Peter H. Smith. Modern Latin America. Oxford: Oxford University Press, 1984. United States Census Bureau. (2010). Hispanic Population for the United States: 2010 Retrieved September 20,2012 [->0] – http://www. encyclopedia. chicagohistory. org/pages/30. html.

Wednesday, October 23, 2019

Strategies to Fight Low-Cost Rivals by Nirmalya Kumar

HP’s restructuring has shrunk Dell’s cost adv from 20% to 10%. Customers have appreciated added benefits like instant deliver, ability to seeYour traditional operation will become more competitive.Your low cost venture will make more money that it would have made as an independent unit. You can allocate adequate resources to the low cost unit. Dow Corning’s Xiameter unit – low cost provider of silicone products sells only 350 of Dow’s 7000 offerings, doesn’t cannibalize the its parents sales. From 28 M loss in 2001 to 500 M profit in 2005 Switch to selling solutionsNo synergies possible between existing enterprise and low cost unit. Integration of your products and services offer unique vale to customers. Australian mining company Orica – sold explosives to stone quarries. New service laser profiling rock faces to identify best places to drill holes. Become exclusively low customer cost providerNo synergies possible between existing en terprise and low cost unit. A major portion of customer segment is price sensitive. You are willing to acquire new business capabilities.RyanairFirms can either attack, co-exist uneasily or become low cost plays themselves. It is easy to fight traditional rivals due to similarities in their game plans and prowess but most companies overlook the threats from disruptive, low cost competitors. Coke fights Pepsi, sony with Phillips, avis with Hertz, P$G with Unilever. Amazon with Ebay etc.Businesses that sell at very low prices as compared to the incumbents might go to bankruptcy (US Airlines) but the point worth considering is that, they quickly reemerge. They slash fares and cut thrills and eventually grab a chunk of market. E.g. Southwest airlines, JetBlue, Aldi supermarket in Germany and other parts. The financial calculations of low cost players are different from the established ones. They earn smaller gross margins but their business models turn those into higher operating margin s.Higher than avng asset turnover ratio, impressive return on assets, because of returns and high growth rates, market capitalization is higher than industry leaders despite larger equity base. Framework for responding to low cost rivals.ASK – will this company take away my present or future customers? NO – watch but don’t take on the new rival. YES – don’t launch price war, instead try and increase product differentiation.ASK – are sufficient number of customers willing to pay more for the benefits my product offer? YES – Intensify differentiation by offering more benefits and over time restructure your company to reduce the price of benefits you offer. NO – Learn to live with the smaller company. If possible merge or take over rivals.ASK – if I set up a low cost business, will it generate synergies with my existing business? NO – Switch to selling solutions or transform into a low cost player. YES – Attac k your low cost rival by setting up a low cost business.Low cost players stay ahead in the market because consumer behavior work in their favor, new low cost entrant pose stiffer challenge compared to the traditional ones. e.g. – JetBlue’s entry is a concern for Southwest.The Futility of Price Wars. Even when market leaders copy the critical elements of the low cost rivals’ business models, they are unable to match their prices. e.g. – Internet booking for airlines doesn’t deliver the kind of cost reductions to traditional airlines that they do to low cost carriers. Slashing prices lowers the profit for leaders without driving the low cost rivals out of market.When Differentiation works: When leaders realize, they cannot win the price war, they opt for differentiation.Differentiation approaches: Design cool products. e.g. – Apple Continually innovate. e.g. – Gillette, 3M Offer a unique product mix. e.g. – Sharper Image, whole f oods. Brand a community. e.g. – Harley Davidson Sell experiences. e.g. – Starbucks, Nordstrom.Differentiation works when: Smart business don’t use this tactics in isolation. Companies must be able to persuade customers to pay for benefits. Companies must bring cost and benefits in line before implementing it.Dealing with dual strategies. Companies should set up low cost operations only when the traditional ones will become competitive as a result and new business will derive some benefits that that it would not have enjoyed as an independent unit. E.g. – First Direct, ING Direct. Low cost business unit should use a unique brand name like HSBC’s First Direct. Subsidiary should be housed separately.A two-pronged strategy delivers results only when the low cost operation is launched offensively to make money and not as a purely defensive ploy to hurt low cost rivals. Eh – Dow Corning’s creation of Xiameter.Switching to Conquer If there i s no synergy between traditional and low cost businesses, there are two other options to deal with the low cost rivals. Start selling solutions. E.g. – Orica’s blasting solutions Convert into low cost player. E.g. – Ryanair.Original Article by NIrmalya Kumar

Bullying And Violence: The Effects Introduction Essay

Bullying will become an increasingly important problem for parents, school, administrators, and teachers, and will affect our society at large if not prevented. People started to realize action needed to be taken. Some suggested a behavioral approach. Tamanini (2017) on the other hand, feels that the best way to prevent bullying is starting at home. There was also Cordi and Masturzo (2013) who suggested getting students to talk about bullying using fiction and non-fiction books that focus on that subject. They claim that it puts them in a safe place. Throughout time, people have created different interventions and programs and even disciplinary actions to slow down the excessive growth of bullying. Some have been successful and some not so much. Background Bullying is the act of intentionally harming someone physically, verbally, or psychologically. Bullying is often repeated over time and involves an imbalance of power. Acts of bullying include unwelcome touching, teasing and name-calling, sending threatening or mean-spirited messages (such as texts, chats, voicemails, or e-mails) or spreading of hurtful rumors. Bullying and cyberbullying, or bullying that occurs online, are sensitive issues for many children, educators, and families. Some children may be embarrassed that they have been bullied or have bullied others, so it’s important to create a safe environment, where they feel they can share their thoughts. My Position The position I have chosen to pursue is the fact that bullying starts at home. Parents must realize the effect they have on their children and the examples that they are setting. If they see you act on violence, they will do as they see and bring it to their own environment. This is a problem a lot of parents face and don’t realize that to prevent this issue it starts with them. They should even monitor their television and what they allow their kids to watch, especially at a young age. A simple show that your child watches can change their behavior instantly because what they watch they might consider it to be ok. With them being so young and not knowing any better is the best time for them to be influenced. Parents need to step up and be more involved with their children because neglect is a big issue. Parents will focus on what they have going on like work or everything else except their own kids. And that will cause them to act out. Basically, the influence of bullying sta rts at home all around. Forecast Main Points In this essay, I will discuss the cause and effect of bullying. It will touch bases on bullying starting at home and how to prevent it. It will also cover the different types of bullying and how books can help children overcome. Lastly, it will talk about how television has an impact on kid’s behavior towards bullying. Evidence It seems that kids that choose to bully others usually come from the influence of their parents. They come from a home where they see their parents fight a lot and or physical punishment is used (Tamanini, et al., 2017). She suggests that parents start taking disciplinary action on their child early. Students tend to also act out due to lack of attention from their parents, so they lash out to seek attention from others. This can include neglected children, children of divorced parents, children who come from homes where their parents abuse the use of drugs/alcohol. Tamanini (2017) stated, â€Å"Early intervention and effective discipline and boundaries truly are the best way to stop bullying, but parents of the victims or therapists cannot change the bully’s home environment† (2017). Espelage, Ryzin and Polanin (2015), studies the distal outcomes including bullying, cyberbullying, homophobic name-calling, and sexual harassment perpetration (2015). Cyberbullying is enga ging in rumor spreading through cell phone and or the internet. Homophobic name-calling is gender-based name-calling such as â€Å"gay’ or â€Å"dike†. And sexual harassment is unwanted sexual commentary or sexual rumor spreading. They used social-emotional programs to address the troubled behaviors and promote academic success. This program is meant to help young kids and teenagers become more self-aware, manage their emotions and build friendship skills. Cordi and Masturzo (2013) believe that students should use fiction and non-fiction books to talk about bullying. It helps students to feel as if they are not alone and put students in safe place. Just by reading fictional books helps them pay attention and question the choices of others. Whether a student chooses a book that is a classic or just a picture book, they can use books as aides in telling their own stories in a digital and audio form (Cordi & Masturzo, 2013). Students became very active using this method that was presented to them and they felt more comfortable.  Television shows surprisingly have a major negative effect when it comes to bullying. Take for example the show â€Å"Survivor†, which has the concept of a last-man-standing elimination game. It encourages people to form alliances to manipulate the other players just to gain their trust. Meanwhile plotting schemes of their own to go against their own alliances. According to Seale (2004), she states, †Å"These shows send the subtle but clear message to our kids that deceit, gossip, and verbal/physical aggression are perfectly acceptable ways to manipulate your social world towards your own personal gain.† (Seale, 2004). In our society, we seem to feed into the gossip, the humiliation or even the conflict. Opposing Argument Although television shows do play a role in children growing to be bullied, I do not agree that that is the only thing they do. Some shows do give out good messages. For example, the show â€Å"13 Reasons Why† talks about a young lady who had been dealing with bullying through-out her high school experience. At the end of the show, she commits suicide. But before she does, she creates 13 tapes where each person has their own tape and she explains how they played a role in why she took her life. The whole lesson of this show was to let young people know that even if you don’t think you are, you can push someone over the edge. Not everyone is as strong as you think. Some show project ways that kids themselves can intervene or even show parents how they can be more involved. Not all television shows are bad influences but still should be monitored.    Conclusion. Bullying seems to be inevitable. But it is not something that cannot be stopped or slowed down. Children and teens seem to get their bullying habits from many different sources. But one that I most agree with is that it starts at home. Parents need to pay more attention to their kids. Monitor what they watch so that media will not be an issue. Although I do know that you cannot keep everything on T.V from them, you can still educate them that what is shown on television is not always meant to be brought into real life. That the things they display aren’t always right. Parents need to also stop neglecting their children so that they will not go and seek attention in an appropriate way. Pay attention to how you act and what you say around them. Because what they learn from you they will unto others. Kids should feel comfortable in their own environment. Non-the less in their own skin. Students tend to see bullying as power. It is highly recommended that parents get involved with their children in bullying programs and become more engaged in the matter. References Cordi, K., & Masturzo, K. (2013). Using literature and digital storytelling to create a safe place to address bullying. Voices from the Middle, 20(3), 21-26. Retrieved from http://search.proquest.com.ezproxy.libproxy.db.erau.edu/docview/1324444987?accountid=27203Espelage, D. L., Low, S., Van Ryzin, M., J., & Polanin, J. R. (2015). A clinical trial of the second step middle school program: Impact on bullying, cyberbullying, homophobic teasing, and sexual harassment perpetration. School Psychology Review, 44(4), 464-479. Retrieved from http://search.proquest.com.ezproxy.libproxy.db.erau.edu/docview/1770814955?accountid=27203Tamanini, K. (2016). How Do We Stop Bullying in Schools?. Psych Central. Retrieved on November 16, 2017, From https://psychcentral.com/lib/how-do-we-stop-bullying-in-schools/ Seale, A., (2004). Divorce Help & Family Divorce Information. Television Bullying and the Role of the Media. p. 9. Retrieved from http://www.keepyourchildsafe.org/bullying/media-television-bullying.html

Tuesday, October 22, 2019

Chicago Referencing †Citing a Newspaper (Author-Date Style)

Chicago Referencing – Citing a Newspaper (Author-Date Style) Chicago Referencing – Citing a Newspaper (Author-Date Style) Chicago referencing can seem complicated. This is partly because of the number of source types it covers. But it’s also because there are two versions: author-date citations (common in the sciences) and footnote citations (common in the humanities). In this blogpost, we focus on how to cite a newspaper with author-date style citations. Make sure that this is the version you’re using in your paper before you follow the advice! Do I Need to Cite Newspaper Articles? The Chicago Manual of Style’s online guide says that â€Å"Newspaper and magazine articles may be cited in running text†¦ and they are commonly omitted from a reference list.† This means that you may be able to simply mention a newspaper article in your work: As Edith Lederer notes in a Washington Post article published December 31, 206, Ban Ki-moon valued meeting with world leaders as part of the fight against climate change. However, most colleges want you to demonstrate your ability to cite sources, so you should check your style guide before omitting a citation for a newspaper article. If your style guide doesn’t offer specific guidance on newspaper articles, it’s usually better to include a citation and an entry in the reference list. In-Text Citations The rules for in-text citations of newspaper articles are the same as for other sources: i.e., give the author’s name and year of publication in parentheses: Ban Ki-moon valued meeting world leaders to discuss climate change (Lederer, 2016). If the author is named in the text, give the year of publication immediately afterwards. If quoting the print version of an article, you should also give page numbers: Lederer (2016, 23) reports that Ban Ki-moon valued â€Å"face-to-face meetings† with world leaders to discuss fighting climate change. For online articles, no page numbers are required (although you can give a paragraph number if you need to be specific). Some newspaper articles may not have a named author. In such cases, use a shortened version of the article title instead: Ban Ki-moon valued meeting world leaders to discuss climate change (â€Å"Ban Ki-moon buoyed by climate accord,† 2016). Most newspaper articles will have a named author, though, so remember to check carefully. Reference List In the reference list, newspaper articles should be listed using the following format: Surname, First Name. Year. â€Å"Title.† Newspaper Name, Month Day. Chicago referencing doesn’t include page numbers in the reference list, even for print articles. This is because pagination can differ in different editions of the same newspaper. A reference list entry for the Washington Post article cited above would therefore appear as: Lederer, Edith M. 2016. â€Å"Ban Ki-moon buoyed by climate accord but laments conflicts.† Washington Post, December 31. If no author name is available, use the title instead. For online articles, a URL should be given as well. In addition, for regional newspapers, you may want to name a city and state: â€Å"Climate Change: ‘If We Save Tuvalu, We Save The World’.† 2016. Civil Beat (Honolulu, HI), September 2. civilbeat.org/2016/09/climate-change-if-we-save-tuvalu-we-save-the-world/

Cute Boyfriend Quotes

Cute Boyfriend Quotes Do you love it when your friends gush, Hes so cute! whenever you talk about your boyfriend? Do you like everyone to think that you are dating the cutest guy in the world? Cute boys are sexy eye-candy at every party or pub. If you have a cute boyfriend, you make your friends envious. These cute boyfriend quotes will make you fall in love with your boyfriend all over again. Share them with your friends, and learn what your friends think about your boyfriend. Sarah McLachlan My love, you know you are my best friend. You know that Id do anything for you, and my love, let nothing come between us. My love for you is strong and true. Louisa May Alcott ​Love is a great beautifier. Jennifer Aniston I feel sexy in my jeans and wearing my boyfriends T-shirt. Kim Kardashian Ive always been the type to fall in love fast and, with every boyfriend, I plan out my wedding in my head. Rita Rudner My boyfriend and I broke up. He wanted to get married and I didnt want him to. Steve Maraboli When in a relationship, a real man doesnt make his woman jealous of others, he makes others jealous of his woman. Cecily von Ziegesar, You Know You Love Me Give a girl a boyfriend and she becomes a total expert on relationships. Michelle M. Pillow When people get into their 30s plus boyfriend sounds weird...if you really think about it. Instead, I think we should universally start using the term manfriend or snookie bookie cuddles pie. Elizabeth Barrett Browning How do I love thee?Let me count the ways.I love thee to the depth and breadth andheight my soul can reach. Emily Bronte Whatever our souls are made of, his and mine are the same. P. Colby If love is a language of the heart, my heart speaks volumes. Robert Sexton Sometimes your nearness takes my breath away; and all the things I want to say can find no voice. Then, in silence, I can only hope my eyes will speak my heart. Ashley Tisdale In high school, it was all about popularity, being with the boyfriend and all the girls thinking hes cute. John Lennon Love is a promise, love is a souvenir, once given never forgotten, never let it disappear. Dr. Seuss You know youre in love when you cant fall asleep because reality is finally better than your dreams. Jodi Picoult You dont love someone because theyre perfect, you love them in spite of the fact that theyre not. Alexandra Penney in Self The ultimate test of a relationship is to disagree but to hold hands. Barbara Johnson Never let a problem to be solved become more important than a person to be loved. Stephenie Meyer, New Moon I honestly have no idea how to live without you. Calvin Klein I think theres something incredibly sexy about a woman wearing her boyfriends T-shirt and underwear. Ginnifer Goodwin Nudity is for my boyfriend or my doctor. April Winchell I am severely distracted these days. Its hard to sit in front of the computer, uploading bad music for hours, when you have a wonderful boyfriend who treats you like a Goddess.

Monday, October 21, 2019

Free Essays on The Red Wheel Barrow

to draw a greater image for the reader. In â€Å"The Red Wheelbarrow† he gives us three separate images: the red wheelbarrow, the rain water, and the white chickens. The three images that Williams gives the reader are important to consider as a whole because they draw the scene. Williams who liked to write about small town life was writing about a farm. The wheelbarrow is the first and most important piece of the picture that Williams draws for us. The writer’s opening line serves the purpose of distinguishing the red wheelbarrow as part of a greater system. The wheelbarrow serves a primary function in the system of farming by allowing the farmer to move earth from one place to another. This is necessary for cultivating land and certainly makes agriculture possible. The fact that the wheelbarrow is red is suggestive of a more feminine symbol of the maturation cycle another cycle of life (Youngberg 153). The second image is of the rain water. Rain serves as a carrier for nutrients and hydrates plants on a farm. Williams uses the water as a symbol of growth. From a greater perspective the symbol water is one of purification. The rain water glazing the wheelbarrow is like a natural purification connecting the wheelbarrow to the earth (Youngberg 152). The third image that Williams paints is the white chickens. The chickens tie everything together ... Free Essays on The Red Wheel Barrow Free Essays on The Red Wheel Barrow The Weight of Words The first time a person reads â€Å"The Red Wheelbarrow† they feel weight behind the words. The poem is only one sentence, but it holds so much meaning that you can feel it in between the lines. It is so dense that reading it just once only begins to open the intricate symbols between the first word and the last. In only four short lines Williams draws a powerful image of man’s infinite connections with nature through a system of allegorical symbols and changes in point of view. Williams is an imagistic poet. Imagistic poets carefully chose their words to draw a greater image for the reader. In â€Å"The Red Wheelbarrow† he gives us three separate images: the red wheelbarrow, the rain water, and the white chickens. The three images that Williams gives the reader are important to consider as a whole because they draw the scene. Williams who liked to write about small town life was writing about a farm. The wheelbarrow is the first and most important piece of the picture that Williams draws for us. The writer’s opening line serves the purpose of distinguishing the red wheelbarrow as part of a greater system. The wheelbarrow serves a primary function in the system of farming by allowing the farmer to move earth from one place to another. This is necessary for cultivating land and certainly makes agriculture possible. The fact that the wheelbarrow is red is suggestive of a more feminine symbol of the maturation cycle another cycle of life (Youngberg 153). The second image is of the rain water. Rain serves as a carrier for nutrients and hydrates plants on a farm. Williams uses the water as a symbol of growth. From a greater perspective the symbol water is one of purification. The rain water glazing the wheelbarrow is like a natural purification connecting the wheelbarrow to the earth (Youngberg 152). The third image that Williams paints is the white chickens. The chickens tie everything together ...

buy custom Final Paper essay

buy custom Final Paper essay It is very important that an organization puts effective measures in place to strengthen its public relations so as to be able to operate in a favorable business environment. The essence of proper public relations cannot be over emphasized but truth be told, it forms a huge part in the activities of any organization. To achieve these targets, the organization utilized the various tools at its disposal. This paper highlights in a very deep sense the essence of creating proper channels of public relations in large-sized organizations such as (Company X) and the repercussions that become of such activities. This essay focuses on how public relations support processes such as marketing of the organizations products through developing both the image and product of the company otherwise known as publicity. It is greatly important that we recognize the fact that the public relations function would be used to attract various stakeholders for example, the organizations employees as well as certain non-target market groups. Public relations methods such as exposure to media offer proper audience as well as a potential benefit to the organization. It is important therefore that we understand the basics of public relations and its application in organizations in as far as aspects such as culture, design and structures are concerned. Worth noting is the fact that public relations help in a very big way to improve the relationship that the organization has with its external environment. Therefore, this essay will contextualize the public relations idea with the Company X forming the basis upon which projections will be made. Definition of public relations The term public relations can be described in many ways. Generally though, it is described as a process of cultivating admirable ties for organizations and its subsequent products as well as the major publics by exploring various communication channels and tools. It basically refers to the process through which various public relations officials, often tasked with curving exemplary images for the organization, team up with the news teams and various media houses to publicize an organization or the organizations product via stories in both printed and broadcasted media (Ledingham Bruning, 2001). The dynamics shaping up the contemporary world has; however, brought in a new lease of life in as far as the role of public relations is concerned. These include creating appropriate but accepted images for an organization by use of articles and other forms of representation found in media outlets that are relevant, aids the monitoring process of many media channels in as far as sentiments ab out the organization and the products are concerned, offering management to possible crises that would hurt the companys image or its product and lastly public relations has been noticed to create friendly environments for organizations as concerns their target markets. This has been made possible through exploring methods such as community participation, spendthrift and events as well as programs of specialty. In any organization, the main target of the department of public relations is to increase the organizations reputation and protect it at the same time. Importance of the public relations to the organization Owing to the competitive nature of the business field in the contemporary world, it has become increasingly important that organizations and any other business enterprises device competitive advantages over their rivals through exploring the best public relations practices. In so doing, these organizations get to market themselves to the public (customers) through the effective media. Public relations service the company through aiding in the process of giving the public domain and the media more efficient ways to understand the functioning of the organization. For the internal environment of the organization, the public relations would be referred to as public information or customer relations. These departments come in handy to the employees particularly in instances where they are burdened by problems. Through carrying out surveys and PR also helps the company to accomplish its full probable. They offer a response to the company from the public. This usually takes the variety of r esearch concerning what areas the public is most unhappy with, and or happy. A successful public relations officer has to possess certain qualities as well as skills that would help in determining the success of his or her activities. These include efficient communication skills; be it in the written form or the spoken form. An individual should be fluent and clear in the method of communication he so chooses to disseminate information. Such individuals must also have a good mastery of multitasking (Wilcox Cameron, 2011). This is actually the process of engaging in two or more activities concurrently to facilitate the process of job completion. Multitasking also helps in a big way to manage time and work within the scheduled time frames. Background information on how the media functions and the world of advertising could be added advantages. An individuals interpersonal skills should also encompass proper organizational and planning skills that would help in shaping public relation s. An individual working in the public relations department of the organization would need to be able to work under pressure. This is considering the fact that this job has its pressure points that need a lot of composure to maintain. Academic qualifications are also an added advantage. How the organization utilizes public relations to create brand and influence opinions For an organization to create a brand it has to be acting in a specific way different from competitors and in a manner that favors its target populations; mostly customers and prospective investors. In creating a brand, the organization can therefre be at a position to influence the activities of many people. It is important to realize the fact that brand creation in itself is a way to create influence as the target group will start to identify itself with this brand. The biggest problem is not creating a brand but how to do it. The process of creating a brand involves many players as well as resources most significantly; financial. The organization utilized the various tools at its disposal to achieve these targets; these tools are mostly the various forms of communication that the company utilized to create efficient public relations. The company used methods such as blogs and websites (collateral literature) to gain market dominance in the internet circles (Baron, Conway Warnaby, 2010). Blogs allow the prospective customers and investors to ask for any clarifications on the operation of the organization. This allows the customer confidence to be boosted in the company and in so doing the customer and the investor groups can tag along to the activities of the organization. Websites also work in a similar fashion as blogs only that it is more convenient and detailed in its information. This way the organization managed to influence its target groups into joining its operations. Organizational values, ethos, structures, philosophies and designs are just but a few of the information common sighted in these sources. Added to these methods, the company utilized talk shows in the various media outlets to boost on the perception building process among its target customers. Talk shows are media through which an organization gets to showcase its range of activities to any interested persons. This is a job carried out by public relations professionals doubling up as spokespersons. The company also utilized the print media to establish their influence and their marketing brands. Working on a motivating philosophy, the organization managed to put advertisements and promotional activities on print media sources. These sources include books and other literary sources, local newspapers and newsletters. Brochures and the organizations magazine were also some of the methods used. So as to increase their popularity, the organization used publicity events otherwise referred to as stunts or pseudo-events (Smith, 2004). The organization also utilized desk visits to keep their dedicated and prospective customers in touch with their activities. In this case, public relation professionals took to journalists in the leading media houses the new products so as brief them of the new promotion schemes. Considering it is through the media houses that the larger percentage of the population gets to acquire information, the organization managed to establish their brand and consequently, their influence. Another way through which the organization managed to create their brand was through the use of direct communication methods to reach its constituents. The idea of carrying important messages and ideas to customers was a major representation of dedication on the part of the organization that managed to cultivate in the customers a sense of trust and appreciation. The organ ization also managed to assert their influence through organizing nationwide seminars and induction sessions in which they not only attracted new stakeholders on board but also made it possible for them to learn all the procedures and activities that shape up the organization. In this way, the organization managed to attract more customers and investors as well as other important stakeholders. The attraction process only represented in a big way the influence they had managed to create in the customers. Social media sites and their implication in the organizations operations The 21st century has witnessed a flurry of activities especially as concerns the internet developments. The olden days of telephony and e-mails have been overtaken by the present days and their sophisticated yet widely used methods of communication. These methods are mostly tied to the social media sites and their rapid development in the past few years. It is not uncommon to see most if not all business enterprises resorting to social sites to market their products to the numerous users. Social media sites can be described as technologies in the web and mobile sectors that manage to create interactive dialogues out of important communication. They can also be described as media for social interaction that allow its users to exchange user-generated information. It has acted to revolutionize the communication systems between the various groups that would be interacting to generate a business idea. Key to understanding the idea behind social media sites is the fact that they are intern et based and as such manage to bring into congruence the activities of various groups. In a bid to market their prices, social media sites have in their ranks various categories that business enterprises are exploring. The organization under discussion, being a profit making business enterprise, also utilized these social sites. Social media sites consist of sections such as bookmarking, news, networking, photo and video sharing and wikis (Hendricks, 2010). All these categories were incorporated by the organization and used effectively to bring the best out of them. Specific reference, though, can be made to the networking sites, photo and video sharing sites and lastly the wikis. In the networking sector, the company made use of facebook and twitter which are arguably the largest networking sites. Counting on the large user bases of these two sites, the organization posted links on their pages (especially for facebook) and making use of mini blogs (in the case of twitter) to nab a larger consumer base. As concerns the video sharing sites, the organization, being a communication oriented organization (mobile telephone Company), resorted to the use of the popular YouTube and videoconferenciing techniques to share information on their new technologies. For instance the money banking services recently launched by the organization were posted in YouTube for subscribers who are farfetched to see. This allowed the customers to learn the requi site techniques without necessarily being instructed at individual levels. The working of the wikis is rather understandable. The organization shared the necessary information such as specific dates and location as well as activities. This allows customers to acquire information about the organization in a rather easy fashion. These social sites have managed to propel the organizations image to the global stage thereby increasing its influence as well as popularity. However, it must also be noted that the use of media and social sites have also brought in their fair share of disadvantages. Considering social sites are merely informal sites that allow organizations or rather companies such as this to reach their customers, it is hard, therefore, that formal discussions would ever be promulgated. The process of disseminating important information would only be limited to very secretive or formal platforms. This would go a long way in hindering the development process especially if cer tain interested stakeholders cannot access these forums. Another huge threat posed by these sites is the fact that successful companies such as this, have to deal with the menace of hackers who are for all time on the lookout for information privy only to the members of the organization. A good example would be a hacker obtaining important documents such as the companys competitive advantages alongside other strengths. This is a serious problem that has been dubbed as cyber theft and is on the verge of killing the spirit of cyber technology or rather the internet progressions so far witnessed. Crisis faced by the organization Being a communications company, this organization mainly faces the threat of tariff regulation in the face of increased competitors. The communications industry is a very competitive one especially if it has many players on board. Having been, in the business for a long time the organization seemed to have taken over the mobile industry and as such set user friendly tariffs. However with increased competitors coming to the fore and lowering the billing rates, it is becoming increasingly important that the organization finds a way out. As such, the organization managed to resort to other inventions to keep its faithful customers. Considering the new entrants set very low tariff levels which in turn translate into very low billing rates, the organization decided to venture into other equally productive ventures so as to keep its turnover rates at constant levels at the same time maintaining its large customer base. To start with, the company has decided to introduce new tariff packs to counter the strategies adopted by the new market entrants. Apart from this, the organization decided to invent services such as mobile banking services as well inviting its consumer base to subscribe to its initial public offers (IPOs). These are measures adopted in the face of stiff competition especially in the sector of making calls so as to increase the efficiency levels of the company. The introduction of new ventures have helped in not only maintaining the large user base but also bringing in more customers especially in the rural areas who might not be in positions to access services such as banks. This is seen as strength and a competitive advantage that will take time to get imitated by any competitors. Comparisons to a non-profit organization Most non-profit making organizations are charity organizations and in other instances community initiated programs that are always at helping a category of persons within their areas of jurisdictions. Comparisons made between these two organizations could be on the basis of raising awareness and reaching their prospective customers. To this end, both types of organizations are deemed to be using the same methods in as far as public relations is concerned. In both cases, the use of the media and other social networks as discussed herein could be applicable (Vernon, 2002). This is to imply that even the non-profit making organizations would resort to wide spread advertisement schedules to obtain customers and various stakeholders such as financiers. The differences on their part are numerous considering the major goals of these two organizations are totally different. To start with, their mission or goals would be different. The profit making organization would stress on obtaining turn overs as well as increasing their operation areas while the non-profit making organizations would stress mainly in offering their services to their customers in the best possible ways. The other major difference, though not related to the aspect of public relations, would be in the payment of tax schedules. The profit making organization has a strict tax payment regime while the non-profit making organization has tax concession regimes that sees them operating at little or no costs. The only payments made by the non-profit making organization could be in the form of obtaining license fees. Conclusion The aspect of public relations is very important in the establishment of an efficient organization as it acts as the mirror by which the organization in question is known and therefore attention should be accorded to all channels of public relations. As seen from the company X discussed herein, it is important that organizations aiming to use the media and social sites to market themselves as well as their products or services do so in most commonly used sites. Without a doubt, the competition among organizations majoring in similar products would reach a high new level where the differences will be picked according to the public relation channels in existence. Buy custom Final Paper essay