Wednesday, October 30, 2019

Market-Led Strategic Change at Tesco plc Research Paper

Market-Led Strategic Change at Tesco plc - Research Paper Example The second applies the analysis to Tesco plc, providing relevant examples. Companies develop marketing plans to know how it should direct its efforts towards bringing a particular product or brand to market. The plan acts as a roadmap, a set of guidelines to ensure success, and contains an analysis of the target market, the marketing objectives, and the marketing mix, which explains in detail the selected strategy for the product, its promotion, distribution, and price (Cohen, 1995). The quality of a marketing plan depends on the assumptions it makes about the customers and the basis for those assumptions, how the marketing objectives are defined, and how the marketing mix are analysed; above all, how it is put into action (Shark, 1994). Traditional literature on marketing programmes and actions such as by Wind and Claycamp (1976) identified the development of product policies (brand, quality, and value) as the most critical element of a marketing plan because this is how companies can engage customers and meet their needs. As Peter and Donnelly (1997, p. 127) observed: "developing new products is the lifeblood of successful business firms". Crawford (1994, p.9-11) categorised "new products" as follows: new to the world (inventions), new for the firm, additions to product lines, product improvements, and repositioning (retargeting for new use or application). Major changes in the marketplace, media and communications, ... elopment of product policies (brand, quality, and value) as the most critical element of a marketing plan because this is how companies can engage customers and meet their needs. As Peter and Donnelly (1997, p. 127) observed: "developing new products is the lifeblood of successful business firms". Crawford (1994, p.9-11) categorised "new products" as follows: new to the world (inventions), new for the firm, additions to product lines, product improvements, and repositioning (retargeting for new use or application). Total Integration Major changes in the marketplace, media and communications, and in consumers were the key drivers in the development of integrated marketing communications or IMC as a new paradigm for marketing professionals for the 21st century (Schultz and Schultz, 1998). Schultz and Kitchen (2000, p.3) identified four elements that pushed these changes in the practice of marketing: digitalisation, information technology, intellectual property, and communication systems, with the result that consumers have become more fragmented and converged into smaller, more targeted and specialised groups. Levitt (1975, p.10) was amongst the first to note the need for changes in the traditional methods, practices, and ways of thinking prevalent in the era of mass marketing and communications in the 1960s and 1970s, arguing that "management should not see itself as merely producing products but as providing customer-creating value satisfaction and pushing this idea to every nook and cranny of the organisationcontinuously, and with enough flair to excite employees". He warned that if this is not done, the company would have no consolidating sense of purpose or direction. The earliest formal definition of integrated marketing was formulated in 1989 by the American

Monday, October 28, 2019

Evaluating Reading Informally Essay Example for Free

Evaluating Reading Informally Essay Informal approaches to the evaluation of literacy have developed in response to the demands for greater accountability and the influence of national, standardized testing. The strength of informal approaches to evaluation is that it provides immediate feedback to both the student and the teacher. The teacher can use a set of assessment tools to measure student learning while the student can receive specific guidance on what to do to improve her/his reading skills. This essay will explore four informal approaches to reading assessment: teacher observation, teacher-student conferences, workbooks and worksheets and reading portfolios. The first approach, teacher observation, is multi-faceted. It builds on the daily interaction between teacher and students. The purpose of the observation is diagnosis. Teachers â€Å"place students in appropriate materials; assess readiness for a given task; determine reading interest, assess attitudes; and make decisions about decoding, comprehension, and study skills (Pikulski and Shanahan, 1982, p. 2). Although McKenna and Stahl (2003) would agree with Pikulski and Shanahan (1982) about the importance of teacher observation, they would disagree about the purpose. McKenna and Stahl (2003) refer to the process of diagnosis as â€Å"The Deficit Model† (p. 2) and what emerges from such a model is terms like â€Å"remediation† and â€Å"remedial reader† (p. 2). Instead McKenna and Stahl (2003) prefer â€Å"A Cognitive Model† (p. 8) where the teacher observes the capacity of students for â€Å"automatic word recognition† (p. 10), â€Å"language comprehension† (p. 15), and â€Å"strategic knowledge† (p. 19). Taking â€Å"automatic word recognition† as one example of how teachers apply their observation skills, teachers examine students’ abilities to predict or judge the appropriateness of a word in a given context, the fluency with which students read aloud passages in class, how quickly and accurately students recognize the most common words in the English language, whether students can use their language skills to decode new, unfamiliar words, and whether students understand the sounds associated with letters and words, not just the contexts. The second informal assessment technique, teacher-student conference, provides an opportunity for the teacher to assess student perceptions of their own progress. Rather than using the conference like a teacher-parent conference where the parents receive updates on the child’s progress, the teacher-student conference provides an opportunity for teachers to understand a student’s reading interests, attitudes towards reading, and the meaning-making strategies a student uses in the process of reading various kinds of materials (Pikulski and Shanahan, 1982, p. 3). Caldwell (2002) identifies three purposes of reading assessment: identify good reader behaviors, determine student reading level, and document student progress (p. 5). Some of what Caldwell (2002) identifies as good reading behaviors can be gauged during teacher-student conferences, especially in how each individual student makes meaning from any given text. Some of Caldwell’s (2002) reader behaviors are to â€Å"connect what they know with the information in the text, determine what is important in the text, recognize the structure of the text, and summarize and reorganize ideas in the text† (p. 8). Standardized tests do not allow students to use their personal backgrounds in interpretive reading, nor does it allow for exploring more than one important idea (the main idea) in a text. By using teacher-student conferences in a way that all students can express themselves, teachers create a space for increased learning. This idea touches on what McKenna and Stahl (2003) call â€Å"The Contextual Approach,† one distinct from a learning style model (p. 3). The third informal reading assessment, workbooks and worksheets, enable teachers to focus on individual students and their needs in practicing a specific skill (Pikulski and Shanahan, 1982, p. 8). The numerous workbooks on the market and worksheets on the internet make this approach a relative quick and time-saving way to assess student learning. None of the informal instructional methods should be used alone and this particular assessment method highlights the danger of approaching one method as a singular way to help students improve their reading skills. Reading instructors want students to not only improve their facility with recognizing and constructing words, sentences, and paragraphs, we also want students to make inferences, ask questions about the implications of a particular way of thinking, and synthesize multiple sources of information on an issue (Caldwell, 2002, p. 8). The ability to perform these latter tasks is consistent with what McKenna and Stahl (2003) describe as strategic reading knowledge (p. 19). Finally, the fourth assessment technique, reading portfolios, enable students to develop an informed perspective about their own reading and writing. Documenting student progress is one of the three reasons for assessing reading (Caldwell, 2002, p. 11). The benefit of this approach as an informal technique is that is shows the student the specific kind of improvement made in any given area. Unlike standardized tests, which compare students to a national norm or a cutoff score (Caldwell, 2002, p. 12-13), records of student progress assess a student’s learning in the area of reading over time. It also provides feedback to the instructor about teaching strengths and weaknesses. Specifically, reading portfolios â€Å"help the student keep track of books read, favorite stories, scores on workbooks/worksheets, or progress in various learning centers† (Pikulski and Shanahan, 1982, p. 8). In summarizing the value of informal reading assessments, Caldwell (2002) states it very succinctly when she says, â€Å"informal instruments are authentic than formal measures. They are similar to the actual task of reading. Reading a passage and retelling its contents are more authentic than reading a short paragraph and answering multiple-choice questions by filling in little bubbles on a scan sheet† (p. 13). The word â€Å"authentic† refers to an assessment’s ability to measure reading. Caldwell (2002) describes the value of informal assessment tools in their ability to mimic the reading process. Informal assessment techniques return control of the learning process to the teachers and students who interact on a daily basis within a classroom. In many ways, they are more important than formal reading assessments because they provide qualitative feedback. References Caldwell, J. S. (2002). Reading assessment: A primer for teachers and tutors. New York: The Guilford Press. Johns, J. L. (1982).The dimensions and uses of informal reading assessment. In J. J. Pikulski and T. Shanahan (Eds. ), Approaches to the informal evaluation of reading. (pp. 1-11). Newark, DE: International Reading Association. McKenna, M. C. , and Stahl, S. A. (2003). Assessment for reading instruction. New York: The Guilford Press. Tierney, R. J. (1991). Portfolio assessment in the reading-writing classroom. Norwood, MA: Christopher-Gordon Publishers. 9 November 2008. http://library. gcu. edu. Yancey, K. B. (1989). Reflection in the writing classroom. Logan, UT: Utah University Press. 9 November 2008. http://library. gcu. edu.

Saturday, October 26, 2019

1950-1960 Essay -- Essays Papers

1950-1960 During the 1950's, the United States experienced great change with the end of World War II, making it difficult to label the busy decade. America was the most powerful nation in the world and it was a time of complacency. The United States accepted two new states, Hawaii and Alaska (www.fifties.com). The science world boomed with new inventions; televisions broadcast nationally; rock n' roll was popular; commercial hotel and fast food chains became common; the car industry exploded; vaccinations for measles and polio were discovered; and birth control pills were introduced (Layman VII). Another event in the 1950’s was the ratification of the 21st Amendment, which limited presidents to two terms in office. The 1950's "baby boom" was also an affect from World War II. The American population increased 19% throughout the 1950's. One-third of Americans was under the age of fifteen (Layman 262). Another issue for the United States in 1950 was the Civil Rights movement. There was one court case that changed history forever. On May 17, 1954 in Topeka, Kansas, a black third grade girl, Linda Brown, was denied admission to a school that was for white children. Schools stigmatized black children, thereby denying them the equal protection guaranteed by the 14th Amendment. The court finally agreed with Linda’s father and Thurgood Marshall. The United Sates was modernizing, however, discrimination was still a large problem (www.fifties.com). If American was a growing society, it was also a society on the move. Life was progressively getting faster. Drive-in business and shopping malls were convenient. Mass culture brought material wealth to America, but many wondered at what cost. Poorer citizens were ignored, and the work et... ...ed States was once again beginning to modernize and grow. This not only affected American attitude, but it affected art and literature throughout the world. WORKS CITED Berman, David. "Pop Art: An analysis of English and American Styles." (www.st.townson.edu/~dberma2/). Candace. "Index Fifties Web". March 15, 2001 (www.fiftiesweb.com). Ginsberg, Allen. "America." The American Tradition in Literature. Vol. 2. Ed. Perkins, George and Barbara. New York: McGraw-Hill, 1999. 1795. Hughes, Langston. "Feet Live Their Own Life." The American Tradition in Literature. Ed. Perkins, George and Barbara. New York: McGraw-Hill, 1999. 1604. IDA (15) University of Dayton Annual Reports. "Annual Reports of the President 1950." Layman, Richard. American Decades: 1950-1959. Detroit: Gale, 1994. Wehrle, William O. A History of the University of Dayton. Dayton, 1962.

Thursday, October 24, 2019

Informative Speech on 9/11 Planes Essay

How many of you can still remember exactly where you was on 9/11? I remember I was in my 2nd grade classroom and hearing over the intercom that our teachers needed to turn on the T.V. As we began watching the horrific events that was taking place and yet to take place, we was all confused on what was happening, and why. We just knew what we was watching was not normal. The World Trade Center attacks were part of a strategic plan of a terrorist group al-Qaeda. Throughout the speech, I will be mapping out the attacks as they unraveled. Four planes were hijacked, each intended for different targets. According to the New York Times, the flights that were hijacked included American Airlines Flight 11, United Airlines Flight 175, American Airlines 77, and United Airlines Flight 93 (Schememann A1.) American Airlines Flight 11, which carried five Al-Qaeda terrorists, 81 passengers, and 11 crewmembers, was the first plane to hit the North Twin Tower. The flight was scheduled from Boston, Massachusetts to L.A. California. Within fifteen minutes of that flight, the Al-Qaeda hijackers had injured three people, killed one, and forcibly made their way into the cockpit, and overtook the captain and first officer. Mohamed Atta was the hijacker that took over the planes control, and was in control of the events that followed. The air control system realized something was wrong when they lost all contact with American Airlines Flight 11, until Mohamed Atta, accidently sent a message to the air control system instead of the passengers in the plane. At 8:46 local time, the aircraft crashed into the North tower of the World Trade Center. 102 minutes after the impact, the North tower of the World Trade center collapsed. United Airlines Flight 175 was the second passenger flight, which carried five hijackers and 60 people, which was boarded to go from Boston, Massachusetts, to Los Angeles, California. Within 30 minutes of take off, the hijackers had forcefully entered the cockpit and overruled the pilot and first officer, allowing Marwan al-Shehhi to control the airplane from then on. Unlike American Airlines Flight 11, Airlines Flight 175 kept their air traffic control system on, and it was visible on New York Center’s radar. Many of the passengers and also crew members made phones calls from the phones located on the plane. 17 minutes after the North Tower was hit by American Airlines Flight 11, the United Airlines Flight 175 then struck the South Tower, which was the only impact from September 11, 2001 that was seen live on television as it occurred. 56 minutes after the impact on the South Tower, of the World Trade center, the building collapsed. American Airlines Flight 77, which killed the five Al-Qaeda terrorists and 59 passengers boarded the plane, and also the 125 people that were in the building of the third attack, the Pentagon located in Washington, D.C. The flight was departing from Dulles, Virginia to the destination of Los Angeles, California. It took the five hijackers 35 minutes to intrude the cockpit; Hani Jonjour then took over as the pilot of American Airlines Flight 77. The western side of the Pentagon at 9:37 was hit. At 10:10 A.M. a section of the Pentagon had collapsed, it took days for firefighters to extinguish the massive fire. United Airlines Flight 93, withheld four Al-Qaeda terrorists and 44 passengers, crashed into a field near Stonycreek, Township, Pennsylvania. It only took the Al-Qaeda members 46 minutes to take control over the plane. The passengers of the plane had decided they were not going to let the hijackers hit their target and kill them without an attempt to recover the planes control. The passengers on the plane were in touch with people from the phones, to be aware that the World Trade Center had been hit, along with the Pentagon. The passengers attempted to gain back the control of United Airlines Flight 93, and during this attempt, the plane crashed into the field in Stonycreek Township. United Airlines Flight 93 was the only plane that did not reach its hijackers’ target. Many of us was aware of the events that took place on 9/11, but really didn’t know much about the passengers that was boarded those four planes on September 11, 2001, a day that forever change America. On Flight 11, Charles â€Å"Chuck† Jones, 48, almost made it into outer space. He was qualified to fly on the space shuttle and was scheduled to fly a mission when the 1987 Challenger explosion indefinitely postponed launched. On Flight 77, Suzanna Calley, 42, of California, would have celebrated her 20th wedding anniversary on Wednesday, September 12th, and her 43rd birthday on Monday, September 17. On Flight 175, Ruth McCourt, 45, and her daughter, Juliana, age 4, were aboard United Airline Flight 175. Ruth McCourt’s brother, Ronnie, escaped the ground floor of the World Trade Center. On Flight 93, Todd Beamer, 32, leaves a pregnant wife and two sons. His family believes that he died when he and other passengers tried recovering Flight 93 from the hijackers. The flights of 11, 77, 175, and 93 has forever change the life of America and on 9/11, there will always be a moment of silence for the people that bravely lost their lives that day. Work Cited http://en.wikipedia.org/wiki/American_Airlines_Flight_11 http://en.wikipedia.org/wiki/United_Airlines_Flight_93 http://en.wikipedia.org/wiki/American_Airlines_Flight_77 http://en.wikipedia.org/wiki/United_Airlines_Flight_175 http://usatoday30.usatoday.com/news/nation/2001/09/11/victims-capsules.htm

Wednesday, October 23, 2019

The atmosphere in which the modern business organization

The atmosphere in which the modern business organization operates is something which can change in no time at all.   In comparing Fortune Magazine’s â€Å"Most Admired Companies† from 2007, and in retrospect, 1987, some interesting facts emerge.   First, the two lists are compared as follows: 2007  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   1987 1. General Electric  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   General Motors 2. Starbucks  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Exxon 3. Toyota Motor  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Ford 4. Berkshire Hathaway  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   IBM 5. Southwest Airlines  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Mobil 6. FedEx  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  General Electric 7. Apple  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   ATT 8. Google  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Texaco 9. Johnson & Johnson  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Dupont 10 . Proctor & Gamble  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Chevron These two lists are characterized by a few common elements; first, the issue of profitability is something that is universal in the lists, even thought they are separated by a decade of time.   The companies that are in the lists, upon further research, are all companies which, while not constant, have been profitable overall.   In fact, some of these companies, such as Ford and Exxon, have fallen upon hard times occasionally, and their positive position in the mind of the public has allowed them to recover from some major catastrophes, such as Ford’s plant closings and Exxon’s Valdez disaster, which almost destroyed the company.   Interestingly, in the 2007 list, a new type of company, Starbuck’s appears.   It can be said that the company is different because much of what they sell is image, and not the tangibles offered by automotive manufacturers as a quick example. How much of the evaluation is dominated by the profitability of the company? In the present day evaluations, profitability of the company, of course is a key element as it has always been; however, the companies of today are evaluated more so on net income after taxes as a percentage of sales for a few key reasons.   First, some of the companies that are rated as top companies are those which offer non-durable products such as Starbuck’s, for which a measure such as return on assets is not the best evaluative tool. How many of these companies currently on the ‘Most Admired' list also appear on Fortune’s current list of â€Å"The 100 Best Companies to Work For†? As a matter of fact, three of the companies currently on the ‘Most Admired’ list also appear on Fortune’s current list of ‘The 100 Best Companies to Work For’; specifically, the companies are Google, Johnson & Johnson and Starbucks.   Based on this finding, there are several possible theories for the relationship between companies being ranked on both lists simultaneously.   Obviously, companies that are among the best to work for will generate a level of admiration.   Moreover, it is also likely that companies that are so admired will attract the kinds of talented and qualified people as employees who would be likely to speak well of companies.   Conversely, companies that are not good to work for are unlikely to be admired. Conclusion In conclusion, what can be seen in comparing popular companies from present and past is that some firms have great longevity, some do not, but all achieve greatness at one time or another.

Tuesday, October 22, 2019

4 Words to Delete from Your MBA Application Essays

4 Words to Delete from Your MBA Application Essays Certain words or phrases appear in almost every MBA application essay. I’ve explained below why you don’t want to use 4 of these too-common words/phrases and what some alternatives might be. If you want to make your application stand out, do some editing and make sure to avoid these words completely. You might be surprised at the result. 1. HOPE e.g. I hope that you will accept me to your program. OR e.g. I hope to be able to obtain a management position with the help of your education. Why not? MBA schools are seeking confident applicants who know where theyre going, and believe in themselves. Your competitors know that theyll reach their goals; they see themselves as naturals for the school. Alternatives: My short-term goal is to become manager of financial analysis at a leading investment bank. OR My ability to take clear, decisive action, combined with MBA courses in strategic planning, will allow me to make an impact at ABC company from day one. OK, now we’re talking! 2. HIGH SCHOOL e.g. My most substantial accomplishment was leading the school drama club in high school. Why not? MBA applicants are expected to be professionals and current leaders. Writing about high school indicates that your leadership has been on a downward path, with less impressive things done in college and/or since graduation. Imagine a leading CEO you admire, and imagine him or her answering this question by talking about high school. (On a related note, remove any high school or earlier items from your resume.) Alternative: My leadership of a production quality team at my employer led to improvements that doubled gross margins. It’s obvious this person is someone impressive who should be seriously considered for admission. 3. WORLD-RENOWNED e.g. I am applying to your business school because of its outstanding reputation and world renowned faculty. Why not? Business schools with outstanding reputations don’t need to be told that you want to go there because of their outstanding reputations. Your goal is to differentiate yourself from the competition so why join every other applicants in describing the place or faculty as world-renowned? HBS applicants neednt talk about the schools world-renowned case study method, unless they want to be the same as every other applicant. Alternative: The schools unique marketing to China specialization matches perfectly with my short-term career goal, which is to start and lead a business unit at my familys firm focused solely on marketing to China. That’s so much better, isn’t it? 4. FEEL e.g. I feel that Ill be happy in the financial services business. Why not? Tell a school what you know is true, confidently; and do it as an adult, giving reasons, often based on research. Just as with the first word I discussed, hope, feel is a sign of lack of confidence. Say I intend, I know, etc. and explain why thats true. Start to project the aura of a leader. Would any CEOs that you know, lets say Donald Trump or Larry Ellison, ever speak that way while trying to sell themselves? Theyd do their homework, just as youll have to do during your MBA studies, and confidently state the results of their careful research. Alternative: The combination of my work experience as a financial analyst, my strong interest in investing, and conversations Ive had with management at XYZ financial services firm have led me to set a short-term career goal to move from the buy side to the sell side by joining a financial services firm as research associate. Delete these four words from your MBA application essays and I promise you more effective and powerful language will show up. Can you think of some other words to delete from your essays? Please share them in the comments. Need guidance in your MBA/EMBA Application process? Maximize your applications with help from The Essay Experts MBA Admissions Consulting Services. Or feel free to email me directly at larryessayexpert@gmail.com. Larry Sochrin

Monday, October 21, 2019

Is Recess Necessary in Schools essays

Is Recess Necessary in Schools essays There is a common misconception in our society that recess does not serve any real purpose. The Board of Directors of the American Association for the Childs Right to Play believes that recess is vital to a childs overall healthy development. Recess periods, which are regularly scheduled periods within the elementary school day for unstructured physical activity and play, give students a chance to discover their interests and passions, to develop ingenuity and inventiveness and serves as a vehicle that helps children establish self-esteem and strive for achievable personal goals. It also allows children to practice life skills such as conflict resolution, cooperation, respect for rules, taking turns, sharing, using language to communicate and problem solving in real situations that are real. There is a common misconception in our society that recess does not serve any real purpose. The Board of Directors of the American Association for the Childs Right to Play (IPA/USA) believe that recess is vital to a childs overall healthy development. (IPA/USA ) Recess periods, which are regularly scheduled periods within the elementary school day for unstructured physical activity and play, (Wechsler, Devereaux, Davis, It also allows children to practice life skills such as conflict resolution, cooperation, respect for rules, taking turns, sharing, using language to communicate and problem solving in real situations that are real. (Council on Physical Education for Children-COPEC, 2001) In a 1989 survey by the National Association of Elementary School Principals, 90% of the reporting school districts had some form of recess. Since that ...

Sunday, October 20, 2019

The Complete History of Hip Hop

The Complete History of Hip Hop SAT / ACT Prep Online Guides and Tips Although widely synonymous with rap music today, hip-hop actually got its start as a full-on cultural movement in the 1970s. For the first few decades that the term was around, hip-hop wasn’t just about music: it also referred to art, style, dance, and philosophy. In this article, we cover the full history of hip hop dance and music and include a helpful hip hop history timeline for reference. Origins of Hip Hop Hip hop (or hip-hop, the two can be used interchangeably) began as a culture and art movement in the Bronx, where demographics were rapidly shifting in the early 1970s. During the 1950s and 60s, many white, middle-class people left the cities to move to the suburbs. The African Americans and Latino Americans that were left behind in cities (or who moved to the cities in the intervening years) encountered many challenges in their neighborhoods, as budgets were slashed and resources diverted to the wealthier, whiter communities. Faced with a lack of economic opportunity, as well as rising crime and poverty rates, the young people in the Bronx and nearby communities began creating their own kinds of cultural expressions. These forms of expression would come together to form the four pillars of hip hop. The 4 Main Elements of Hip Hop Music Most scholars agree that there are four main elements, or pillars, to hip hop music. These pillars originated in the 1970s and continue to represent hip hop culture today: Deejaying: making music using record players, turntables, and DJ mixers Rapping: rhythmic vocal rhyming style Graffiti painting: also known as â€Å"graf† or â€Å"writing† Break dancing: a form of dance that also encompasses an overall attitude and style All four of these elements remain signifiers of hip hop as a larger cultural movement. Hip hop is typically broken into three phases: old school, new school, and 21st century. Old School Hip Hop Old school hip hop typically dates from the origination of the movement in the early 1970s up until the mid-1980s. The first major hip hop deejay was DJ Kool Herc. Mixing percussive beats with popular dance songs, Kool Herc was instrumental in developing the sounds that became synonymous with hip hop, such as drum beats and record scratches. Influenced by Kool Herc and his peers, hip hop deejays developed new turntable techniques, like needle dropping and scratching. Kool Herc also popularized rapping, which drew upon the traditions of West African griots, talking blues songs, and black power poetry, among others. Towards the end of the old school hip hop era, the movement began to gain national recognition. The Sugarhill Gang’s song â€Å"Rapper’s Delight† (released in 1979) rocketed up the national music charts, ushering in a new wave of musicians, artists, and performers, while also introducing people around the world to this new type of music. New School Hip Hop By the mid-1980s, hip hop had firmly entered its new school era. The names that headed up hip hop’s new school are more recognizable to a contemporary audience: Run-D.M.C, LL Cool J, the Beastie Boys, and Public Enemy. Each of these artists is responsible for making hip hop what we know today. Run-D.M.C brought hip hop to a larger audience through performances on MTV. The Beastie Boys pushed deejaying further with their digital sampling. LL Cool J and Public Enemy pushed rap in new directions: LL Cool J by bringing romantic themes into hip hop and Public Enemy by using rap to push forward political ideology. Other artists that came of age during hip hop’s new school era include Queen Latifah, who, along with Salt-n-Pepa, brought women into the genre, the Fresh Prince, aka, Will Smith, and M.C. Hammer, all of whom popularized hip hop music even more. As hip hop grew in popularity, it expanded beyond its regional roots, too. In 1989, N.W.A’s Straight Outta Compton became the most prominent hip hop album to emerge from somewhere besides New York City. The East Coast - West Coast divide evolved into a full-on rivalry between the two groups, which ended with the unsolved murders of Tupac Shakur and Notorious B.I.G. From the ashes of the rivalry between the East and West Coasts came late 1990s hip hop, which saw artists like the Wu-Tang Clan, the Fugees, and Diddy reach new levels of popularity. Hip hop became a worldwide phenomenon at this point, too, with new audiences and artists emerging in places like Tokyo, Cape Town, London, and Paris. By the turn of the century, hip hop was the best-selling music genre in the United States. Hip Hop in the 21st Century The 21st century was a tough time for the music industry. The advent of streaming services affected all genres, including hip hop. Despite the monetary effects of the shift in music delivery, hip hop retains its prominence, influencing musicians of all genres. Over the last decade or so, hip hop has moved further from its East and West coast roots. New epicenters for the genre have emerged in New Orleans, Atlanta, Houston, and Detroit, as well as in other cities throughout the United States. Building off of the original four pillars that defined the genre, hip hop artists touch every part of American culture, from dance (think Beyonce’s show-stopping productions) to fashion (where artists like Kanye West have launched lines) to politics (Barack Obama referenced Jay Z several times during his 2008 campaign). While the future of the music industry remains uncertain, one thing’s for sure: hip hop is here to stay. Major Moments in Hip Hop History Throughout hip hop’s history there have been major moments, from the first time a drummer used a break beat on a record to the first time a hip hop album went platinum. Here are some of the major moments in hip hop history. Year Event 1925 Dancer Earl Tucker (also known as Snake Hips) incorporates floats and slides into his dancing, which would later inspire breakdancing. 1962 James Brown’s drummer, Clayton Fillyau, uses the break beat on the record Live at the Apollo. These beats would later influence break dancers. 1965 Muhammad Ali delivers one of the earliest rap lines before his bout against Sonny Liston. 1969 James Brown records â€Å"Sex Machines† and â€Å"Funky Drummer.† Both songs would later influence percussion in hip hop. 1970 Hip hop first appears in the Bronx. 1973 DJ Kool Herc deejays his first block party in the Bronx. 1974 After watching DJ Kool Herc, other DJs start playing in similar styles around the Bronx. DJ Pleaser Lovebug Starski first refers to this movement as â€Å"hip-hop.† 1975 DJ Grand Wizard Theodore invents the record scratch. 1976 DJ Afrika Bambaataa battles Disco King Mario in the first DJ battle. 1978 The music industry first uses the term â€Å"rap music,† which shifts the focus in hip hop from the deejays to the emcees. 1983 Ice T pioneers rap on the West Coast. Michael Jackson does the moonwalk, borrowing from b-boy dance moves. 1984 The Fresh Fest concert, a hip hop tour featuring artists like Run D.M.C, nets $3.5 million. Hip hop has arrived. 1985 Salt-n-Pepa enters the scene as one of the first female rap groups. 1986 The Beastie Boys release Licensed to Ill. 1987 Public Enemy releases Yo! Bum Rush The Show. 1988 N.W.A releases Straight Outta Compton. 1989 A group of friends in Manhattan forms A Tribe Called Quest. D.O.C releases No One Can Do It Better. 1991 N.W.A sells nearly one million copies of N****z For Life in its first week of release. 1992 Dr. Dre’s album, The Chronic, goes multi platinum. Wu-Tang clan release 36 Chambers. 1995 Queen Latifah wins a Grammy award from Best Rap Solo Performance. 1996 Jay-Z releases Reasonable Doubt. The Fugees’ album, The Score, wins two Grammys and debuts at number one. Tupac Shakur is fatally shot. 1997 Missy Elliott releases Supa Dupa Fly. Notorious B.I.G is shot and killed. 1998 Lauryn Hill’s solo album, The Miseducation of Lauryn Hill, earns 11 Grammy nominations and five wins. 1999 Eminem sells four million copies of The Slim Shady LP. 2000 Dr. Dre sues Napster. 2002 Talib Kweli debuts his solo album and introduces himself as a political voice. 2003 Eminem faces controversy and opens up debate about hip-hop and racism after being caught using the N-word. Federal investigators raid the offices of Murder Inc. 2004 Dr. Dre gets punched in the face at the 2004 Vibe Awards ceremony. 2008 Jay-Z becomes the first rapper to headline Glastonbury, the largest greenfield music and performing arts festival in the world. 2010 Nicki Minaj releases Pink Friday, which hits number one on the US charts. 2018 Kanye West releases his eighth studio album, Ye, which debuts at number one. What's Next? If you're looking for something fun to do tonight, this slime recipe might be exactly what you need. Did you know that water has a very special density? Check out our guide to learn what the density of water is and how the density can change. Want to know the fastest and easiest ways to convert between Fahrenheit and Celsius?We've got you covered! Check out our guide to the best ways to convert Celsius to Fahrenheit (or vice versa).

Saturday, October 19, 2019

Recent biotechnological approaches that have been used to enhance the Essay

Recent biotechnological approaches that have been used to enhance the yield and diversity of amino acids, vitamins, antibiotics - Essay Example These enrichments are only possible with Biotechnology. In the agriculture sector, many technologies are used such as genetic manipulation and gene transfer, development of recombinant vaccines, molecular markers, DNA-based disease diagnosis and characterization, embryo transfer and in vitro propagation of plants. In the food industry, the food processing is the main part where biotechnology intermission is required. For the improvement of the bacterial strains, genetic modification of the strains for the food processing microorganisms by the identification, characterization and alteration is done. Thus biotechnology has vast applications in many fields. Biofuels: As the fossil fuels are very limited, the search for the alternative methods that are renewable and safe are looked upon. The biological fuels such as ethanol, methane, hydrogen etc., are increasing day by day. To improve the production quality of these biofuels, the biotechnological approaches are used. The drawbacks of th ese methods such as low yield, high cost of feed, ad lack of active micro organisms can be overcome by using biotechnological approaches. ... Here the metabolic pathway is altered. The glucose metabolism towards the metabolic pyruvate formate lyase pathway by interrupting the succinate producing and lactate producing pathways. (Yoshida et al. 2006). By this technique the yield of hydrogen was increased from 1.08 mol/mol glucose to 1.83 mol/mol glucose which is 190 percent increase in the yields when compared to the wild strain hydrogen production. (Yoshida et al. 2006). The maize is used for the production of biofuel nowadays. The distillery soluble waste obtained after the ethanol production called as dried distiller grain soluble (DDGS), is usually left out as cattle feed. The researchers have found that this DDGS has a lot of nutritional value and if the feed is improved with amino acid and vitamin content, it can be used for swine and poultry. (Ufaz and Galili 2008). Lignocellulostic biomass is widely used as the main source of sugars for the fermentation to biofuels and other energy sources. These sugars are present b ound to the plant cell walls. The process of overcoming these barriers by the use of some break through technologies is termed as â€Å"biomass recalcitrance†. (Tomes and Lakshmanan 2010). Pretreatment of the biomass and then using it as the raw material for biofuel production will result in better yield. As lignin is not degraded easily by the protease enzymes, some modification to the substrate is very essential. Lignin hinders its active site form the enzymes and also binds reversibly to the proteins, because of this nature of lignin the enzymatic conversion is very less. So an alternative approach of increasing the pore size of the biomass can help to increase the enzymatic activity. Enzymes such as cellulase and hemicellulase are used for the

Friday, October 18, 2019

Discussion Assignment Example | Topics and Well Written Essays - 250 words - 30

Discussion - Assignment Example The main question is whether the borrower will be able to repay the debt. There are numerous financial measures that can be used to establish a borrower’s capacity including liquidity and debt ratios (Graham and Smart 56). The third aspect is capital. The lender takes into consideration any capital the borrower contributes towards the investment. This is owing to the fact that a larger contribution reduces chances of default. The fourth element is collateral. Borrowers may apply for credit cards, lines of credit or loans that secured or unsecured. Secured products including a home equity loan or an auto is considered as collateral (Graham and Smart 56). The value of the collateral is determined and plays an important role in lending decisions. Finally, the conditions including interest rates, principal play a huge part in lending decisions. Mail float contributes to the time delay between when a particular payment is made and when it is received and leads to a delay in the cash collection process. Processing float refers to the time between the recipe of a specific payment into a company’s account and results into a holdup in the cash collection process (Graham and Smart 523). Finally, the availability float is defined as the time between when the payment is received and deposited into a company’s account and more time is taken in cash

Biography of school principal Essay Example | Topics and Well Written Essays - 1250 words

Biography of school principal - Essay Example The researcher starts that his school principal Mr. X joined the school management some five years ago. Apparently, he was a very strict person with serious looks. He was a retired army officer who served the nation for more than 40 years. He was at the post of Major when he was retired and before his retirement, he had planned about his future career and that was to join some educational institution. He was Masters in Business Administration and therefore he was fit for the job requirements of a principal. When the author first saw him the researcher found him to be very sturdy, stringent, yet elegant and of course very disciplined. Despite his complete soldier looks and attitude, he possessed a very attractive and decent personality. But now when the author met him for the sake of interview he found him very different from what he was previously probably the Erikson’s development theory was working its way. He was born in a family who was closely affiliated with the services in army, navy and air force. His father was also an army general. He had five siblings and he was the third child of his parents. He was completely looked after by his mother in his infancy and childhood since his father was usually on his duty. According to the Erickson’s developmental stages, he was at the first stage when he started developing mistrust about his father as he was not available to give him care and affection that an infant requires. In his early childhood when he was around 2.5 years old his toilet training was started.

Thursday, October 17, 2019

Position Paper on The Applicability of the KouzesPosner Model of Essay

Position Paper on The Applicability of the KouzesPosner Model of Leadership - Essay Example While this may be true, it is often in an extreme crisis situation that leadership is ultimately tested. They have developed a framework identifying five specific practices critical to effective leadership in organizations. These include the following: Includes actions like seeking challenging opportunities for themselves and employees in pursuit of company goals, pushing new approaches inside the company, looking for ways to improve, experimenting and taking appropriate risks, creating a learning environment inside the work units, exercising initiative to overcome obstacles. The search for opportunity begins when leaders take on meaningful challenges, and thus experience conditions that test their capabilities. Leaders should be able to assess and take risks. From those experiences, they can learn to lead a team to accomplish extraordinary achievements (Kouzes and Posner 2002). The CEO of Dell Michael Dell challenged the processes used to sell computers to consumers Michael Dell definitely broke the rules and continues to do so. He was able to bring others into accepting his vision of a better way to sell computers. He was the first to sell directly to the end-user and he was the first to use the Internet so effectively to sell his computers. Focuses on talking about future trends, c... He was able to bring others into accepting his vision of a better way to sell computers. He was the first to sell directly to the end-user and he was the first to use the Internet so effectively to sell his computers. b) Inspiring a Shared Vision Focuses on talking about future trends, communicating a positive view of the future, appealing to others to share in their vision of the future, demonstrating to others how future interests can be reached through the company, being enthusiastic and positive about the future, speaking with positive conviction about the meaning of work. To enlist the support of a team for a common purpose, leaders must effectively convey their own vision. Furthermore, leaders need to cultivate a shared sense of ownership of that vision; only then will team members mobilize for the greater good of the team and its common goal (Kouzes and Posner 2002) ExampleA good example of this is Milton Stewart now represents Davis Wright Tremaine, LLP as the director of business development. Along with managing over 400 attorneys, his responsibilities in the firm include forecasting, planning and communication with his clients. Milton has been able to inspire a shared vision by being consistent and staying on message. He truly believes that you can win at business ethically thus this is one of the visions he shares with his employees, and thus wants them to be ethical in their dealings. Milton hates to leave things unfinished, never leaving the ball in his court. Milton responds to every email, letter, or phone call, exemplifying his belief that who you are and what you do, are one in the same. Mr. Stewart another vision which he shares with his

Report on security (read attachmment) Essay Example | Topics and Well Written Essays - 2000 words

Report on security (read attachmment) - Essay Example Physiological and /or behavioural characteristics are two basis of biometric recognition system. Human characteristics used for biometric recognition system are based on parametres like: universality, uniqueness, permanence, collectability, performance, acceptability, and circumvention, Ofcom(2009). Furthermore, verification and identification are two modes in system operation. Few technical considerations in selecting a system are false accept rate or false match rate (FAR or FMR), false reject rate or false non-match rate (FRR or FNMR), receiver/relative operating characteristics (ROC), equal error rate or crossover error rate (EER or CER), failure to enroll rate (FTE or FER), failure to capture rate (FTC), and template capacity. Dynamic Air Parts plc is currently using swipe card sytem .Swipe card is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card. The swipe card system is read by ph ysical contact and swiping past a magnetic reading head. An individually encoded pass card looks a like a credit card. The stripe on the back of the security pass card is a magnetic stripe, often called a magstripe. Typically, the data on an encoded security swipecard includes: 1. Name 2. ID # (social security number or other unique number) 3. Access level (where you're allowed to go) Next generation of magnetic cards - Smartcards. Smart Cards or Smartcards is the term referred to cards, made from plastic, with similarities in size, thickness and other physical appearance as plastic credit cards. It can describe chip card or integrated circuit card. Smart cards in addition have an Integrated Circuit (IC) Chip embedded in it. Smart cards are also known as IC cards and ICC cards. The amount of information can be stored in smart cards is much greater compared to magnetic stripe cards. Some of them can also be reprogrammed to add, delete or rearrange data. Compared to magnetic cards, sm art cards offer more advantages, such as: 1. They can be readily reconfigured. 2. They are reusable. 3. They give more security, thus reducing the risk of transaction fraud . 4. They are much more durable and reliable. 5. They allow multiple applications to be stored in one card. 6. It provides reduction in costs. 7. It has technical specification standards. 8. It gives security of information. 9. It has more organized information. 10. It has emergency information. 11. The process doesn't require paper. 12. One card can access multiple transactions. 13. It reduces fraud. 14. It has high memory capabilities. 15. It has the ability for on-site approval. 16. End-user only accessibility. Besides advantages, smart cards also have some disadvantages, such as: 1. It gives liability issues if stolen or lost. 2. The accuracy of information is small. 3. Lack of technology to support users . 4. It is potential hazard to data security since too much data is stored on one card if lost or stolen. 5. It is a potential area for computer hackers and computer viruses. Fingerprint Recognition Systems. A fingerprint contain a number of unique physical characteristics called minutiae, which includes cert ain visible aspects of fingerprints such as ridges, ridge endings and bifurcations (forks in ridges). Minutiae are generally found in the core points of

Wednesday, October 16, 2019

Position Paper on The Applicability of the KouzesPosner Model of Essay

Position Paper on The Applicability of the KouzesPosner Model of Leadership - Essay Example While this may be true, it is often in an extreme crisis situation that leadership is ultimately tested. They have developed a framework identifying five specific practices critical to effective leadership in organizations. These include the following: Includes actions like seeking challenging opportunities for themselves and employees in pursuit of company goals, pushing new approaches inside the company, looking for ways to improve, experimenting and taking appropriate risks, creating a learning environment inside the work units, exercising initiative to overcome obstacles. The search for opportunity begins when leaders take on meaningful challenges, and thus experience conditions that test their capabilities. Leaders should be able to assess and take risks. From those experiences, they can learn to lead a team to accomplish extraordinary achievements (Kouzes and Posner 2002). The CEO of Dell Michael Dell challenged the processes used to sell computers to consumers Michael Dell definitely broke the rules and continues to do so. He was able to bring others into accepting his vision of a better way to sell computers. He was the first to sell directly to the end-user and he was the first to use the Internet so effectively to sell his computers. Focuses on talking about future trends, c... He was able to bring others into accepting his vision of a better way to sell computers. He was the first to sell directly to the end-user and he was the first to use the Internet so effectively to sell his computers. b) Inspiring a Shared Vision Focuses on talking about future trends, communicating a positive view of the future, appealing to others to share in their vision of the future, demonstrating to others how future interests can be reached through the company, being enthusiastic and positive about the future, speaking with positive conviction about the meaning of work. To enlist the support of a team for a common purpose, leaders must effectively convey their own vision. Furthermore, leaders need to cultivate a shared sense of ownership of that vision; only then will team members mobilize for the greater good of the team and its common goal (Kouzes and Posner 2002) ExampleA good example of this is Milton Stewart now represents Davis Wright Tremaine, LLP as the director of business development. Along with managing over 400 attorneys, his responsibilities in the firm include forecasting, planning and communication with his clients. Milton has been able to inspire a shared vision by being consistent and staying on message. He truly believes that you can win at business ethically thus this is one of the visions he shares with his employees, and thus wants them to be ethical in their dealings. Milton hates to leave things unfinished, never leaving the ball in his court. Milton responds to every email, letter, or phone call, exemplifying his belief that who you are and what you do, are one in the same. Mr. Stewart another vision which he shares with his

Tuesday, October 15, 2019

Nurse practitioner school Personal Statement Example | Topics and Well Written Essays - 250 words

Nurse practitioner school - Personal Statement Example I was subsequently requested to work in specialty surgery by a vascular surgeon due to my efficiency, experience, and expertise in various aspects of nursing. I did this for several years as I also worked and furthered my studies to obtain my registered nurse (RN) license. This was later on followed by working as a charge nurse in a very busy trauma center where I gained more knowledge in performing a variety of administrative and clinical duties by providing quality care nursing and coordinating total nursing care for patients and residents alike. My other duties had included implementing specific programs, procedures, and processes, expediting work flow but still ensure accuracy in quality health care, and being actively involved in many committees that recommended and implemented various evidence-based practical measures in nursing. I went on several medical missions in the past and these experiences were instrumental and influential in my desire to obtain a masters degree in nursing. Medical mission trips are very good ways to get grounded in reality and give back to underprivileged people right here within our own borders (Fahlbusch & Bromiley, 2003). The work of a nurse is quite challenging but is also extremely rewarding which is why I desire to obtain a masters degree in due

Monday, October 14, 2019

First Solar Turns Sunshine into Profits Essay Example for Free

First Solar Turns Sunshine into Profits Essay Case Summary: First Solar was founded in 1999 from the Walton family. According to the Marketing Sun Power, First Solar’s mission is â€Å"to create enduring value by enabling a world powered by clean, affordable solar electricity.† (p. 90) The company manufactures solar modules, which have razor-thin cadmium telluride. They are manufactured this way because it can still produce electricity even when clouds are blocking the sun. With this product First Solar wants to promote that it is socially responsible. It not only markets its cost efficiency through solar energy, but it also helps maintain sustainability by reducing the use of fossil fuel. First Solar products have advantages with rival companies because its product does not depend on silicon wafers. Silicon wafers is the preferred product from other solar companies. Silicon wafers is a costly product and it’s also a scarce resource. Key Marketing Issues †¢Competition: In the business world competition is when businesses or firms enter the market with similar products. Per the article First Solar does not seem to have great threat of other firms, as it is the leading manufacture of solar power. First Solar uses razor-thin cadmium telluride material, while other companies use silicon wafers. Silicon is a scarce material and expensive as well. †¢Oligopoly: I would consider First Solar to be an oligopoly. Since it seems that there are few sellers that control the solar panel market. I would also say that since First Solar uses different material it has an upper hand when it comes to solar modules. This can change if different innovations enter the market. †¢Political Forces: Political force can always influence the wellbeing of a company. For example Germany and other European nations are encouraging  alternative energy and that is why Germany has become First Solar’s target market. †¢Technological Forces: Technological forces will continue to change the marketing perspective, because technology changes. Marketing strategies change to adapt and become appealable to consumers. †¢Government: Governments from various nations can influence with providing subsidies that help corporations maintain a decreased rates for solar energy. A problem that First Solar and other solar companies will have to tackle, because Germany will be reducing its subsidies soon. Personal Case Analysis As a personal analysis I was intrigued by the product differentiation between First Solar and other solar companies. Most solar companies use silicon wafers for their solar cells and panels. First Solar uses a razor-thin cadmium telluride solar cells and panels, which makes them an innovator of this product (what makes them marketable). They expect to decrease its cost to .50 cents per watt by 2014, which is 50% less than what is being paid at this moment. First Solar is not only based out of Tempe, Arizona, but it’s also marketed globally. Germany use to be its primary market, but now it is moving to the North American market. Case Questions 1-Which marketing environment forces are likely to have the greatest impact on First Solar? The greatest impacts from environmental forces are Economic Conditions (buying power), Political Forces, and Technological Forces. Economic conditions change in which can affect the buying power. A perfect example would be the subsidies that are being received in Germany. Buying condition can decrease when the subsidies are lost. Unless there is a political agenda or lobbying involved. This is when technological advancement can be improved  to provide a less costly product. 2-What types of organizations are most likely to exert the strongest competitive forces on First Solar? In order for a competitor to compete against First Solar, they would need to develop a superior product then what First Solar has produced. First Solar has produced a razor-thin cadmium telluride product that even works on cloudy days. One company that I think could bring competition would General Electric. General Electric is a well-established company that is looking into being a sustainable company and has the wealth to pursue solar panels. 3-How did technology affect First Solars responses to the changes in the marketing environment? How can it continue to maintain its technological edge in its industry? First Solar started out because of high oil prices, environmental concerns with natural resources. First Solar does not use expensive material like silicon wafers, which is a scarce material and very costly. It will continue to maintain its technological edge because it is aware that it needs continuous assessments in every aspect of the market (fossil fuel, government, technologies, innovation, and consumer demand). Conclusions: First Solar has developed a product in which reduces the use of fossil fuel and creates alternative energy. Its marketing strategy has been focused on its unique development of technology (cadmium telluride cells) and the need to provide consumers and businesses a more sustainable product with a lower cost. Due to these advantages the company can attack the market aggressively. First Solar is aware of the challenges that will arise in the future. Environmental forces keep companies always on edge, which makes them continue to improve with new technological innovations. Marketing plans need to be adjusted on a continuous basis due to changes that may arise from government, natural resources, political views and social views.

Sunday, October 13, 2019

SWOT Analysis of Ultra Tech Cement Industry

SWOT Analysis of Ultra Tech Cement Industry The SWOT analysis about Ultra Tech cement and its position in the market. The company is one of the best in the cement industry, analysing it through the different framework of analysis in order to judge the actual situational and industrial position of the company in order to find out how actually is the company doing. The company is facing a lot of problem regarding its promotion and marketing techniques due to which it faces a short of awareness in the market due to which people are not aware of the product but instead of all the problems it is quite stable and maintain its position in the market. After performing Swot analysis of the company by reviewing porters 5 forces and pestel analysis companys strategic standing and positioning have been analysed. Currently the company is having a better standing as threat of entry is very low due to high initial funds required to establish the factory setup. Contents INTRODUCTION: Ultra Tech is Indias biggest exporter of cement clinker. The companys production plants have increase across eleven integrated area, one white cement plant, twelve grinding units and five terminals four in India and one in Sri Lanka. Most of the plants have ISO 9001, ISO 14001 and OHSAS 18001 certification. In addition, two plants have outcome ISO 27001 certification and four have received SA 8000 certification. The process of certification is at present started for the left over plants. The company exports over 2.5 million tons per annum, which is about 30 per cent of the countrys total exports. The export market comprises of countries around the Indian Ocean, Africa, Europe and the Middle East.ÂÂ  Export is a pressure area in the companys strategy for growth. Worlds top 10 cement companies comprises of Ultra Tech Cement Limited. The company has an annual capacity of 48.8 million tones, and manufactures and markets ordinary There is blast furnace slag cement and There is Pozzol ana cement. The companys subsidiaries are Dakshin Cements Limited, Harish Cements Limited; there is Ceylinco (P) Limited and Ultra Tech Cement Middle East Investments Limited. (Kalesh, 2009) SWOT ANALYSIS: STRENGTHS: Cement demand has grown in tandem with strong economic growth derived from: Growth in housing sector (over 30%) key demand driver. Infrastructure projects like ports, airports, power projects, dam irrigation Projects. National Highway Development Programme. Bharat Nirman Yojana for rural infrastructure and rise in industrial projects. Production The companys production facilities are spread across 11 integrated plants, one white cement plant, 12 grinding units and 5 terminals, 4 in India and one in Sri Lanka. High quality cement production is increasing annually.ÂÂ  Annual production capacity is 23.10 million tones. Use of high-end equipment such as the Gamma Metrics Machine and the X-ray Analyser ensures that each product passing out of company. There is manufacturing facility adheres to global standards of quality andÂÂ  performance. Logistics: Ultra Tech Can directly deal with the limestone tenders and thus the middle man do not affect its cost. Company use the local transporters which provide the efficient transportation cost. Thereby reducing the extra expense and making cement more economical for the local man to afford. Plantation: Ultra techs manufacturing plant uses ultra-modern technology and imported machinery. Companys Unit at Koala is the only Unit in this sector in India to have a desalination plant. It is used for meeting the water needs of the plant and the colony. The waste gases from the cooler are used in the desalination plant. that makes the product recyclable and environmental friendly thereby contributing to the environment. The Ultra Tech cement manufacturing the greenbelt at companys Units is simply awesome and is surrounded by trees all around. At some points, company is advancing to achieve the skyline. Only the leaves and the flowers and hear the cacophony of the birds.ÂÂ   Companys CSR (corporate social responsibility) activities extend to 127 villages, in proximity to its plants, across the country. (William B. Werther, David B. Chandler, 2010) Brand Positioning: In the world, Aditya Birla Group is the eighth largest cement player. Ultra Techs products include Ordinary Portland cement, Portland Pozzolana cement and Portland blast furnace slag cement. The company exports over 2.5 million tons per annum, which is about 30 per cent to the countrys total exports. Ordinary There is cement is the most commonly used cement for a wide range of process. Applications cover dry-lean mixes, general-purpose ready-mixes, and even high strengthÂÂ  pre-cast and pre-stressed concrete. OPC(ordinary Portland cement) is used for applications, such as commercial buildings, industrial constructions, Multi storied complexes, cement concrete roads and heavy duty floors. PPC ( Portland Pozzolana cement )cement is used forÂÂ  big construction like dam and thermal powerÂÂ  plant. Distribution Channels: Ultra Techs distribution network is very widely spread out in the country with over 5,500 dealers and 30,000 retailers with its strong distribution channels currently Ultratech is starting to acquire a strong positioning in the market giving head on competition to its rivals. Quality: All the plants of Ultra tech are ISO 14001 Environment Management Systems certified sustain toÂÂ  OHSAS 18001 standards. Clean technologies and processes that combine economic progress and sustainable environment are adopted by the company for better performance. There is plants at Awarpur and Ratnagiri in Maharashtra; There is Jafrabad and Magdalla in Gujarat; Hirmi in Chhattisgarh; Arakkonam in Tamil Nadu; Tadipatri in Andhra Pradesh; Jharsuguda in Orissa and DurgapurÂÂ  in West Bengal.ÂÂ  They have won the Capexil Certificate of Export Recognition Top Exporter -Cement, Clinker, Asbestos and Cement Products for the years 2000, 2002 and2003. Bhartiya Udyog Ratan Award presented to Sh. KYP Kulkarni By Indian Economic Development Research Association (IEDRA) for good quality of cement to customer, New Delhi in 2004. (Narayanan, 2007) WEAKNESSESS: Cement Industry is highly fragmented and it is also highly regionalized and Low value commodity makes transportation over long distances uneconomical. Not available in all the places: Ultra tech is not available at all the places as it is not manufactured at all places and all plants are not available everywhere due to which people cannot find it everywhere hence the profit margins are affected to a greater extend. Human Resource: Due to openness in the Ultra techs work culture which is very informal that does not suit forÂÂ  better management in corporate . The environment being very informal affects the management a lot as being the management they have to maintain a distance and discipline but due to the openness there is no such thing and they face a lot difficulty to control. And Ultra tech has insufficient man power due to its easy recruiting and selection method. Marketing: Lack of awareness program for consumers due to low promotion mix: the company faces the problem of proper promotion due to which the customers doesnt know much about the product resulting into less sales of the product instead of being a good product. Lack of marketing mix: ÂÂ  the company suffers with the problem of proper marketing mix which in return results into the whole confusion state and the product does not reach to the customers properly and in fact a lot of them dont know about it also. Delay in supply: the company being situated in the outer parts of the city and its plant not being located in every city causes delay in the supply of the product. (Porter, 1988) Health: Highly dusty environment at the time of dumping the cement is hazardous forÂÂ  health. It affects humans respiratory system adversely. Ultra tech is therefore not contributing to society as its corporate social responsibility remains unfulfilled due to many hazards. Others: Cement industry is highly fragmented and regionalized as Low value commodity makes. As transportation over long distances is uneconomical for value sector, so cost of transporting cement is high and this keeps cement from being profitable over long distances. In other talks, shipping cement costs more than the profit from selling it. PESTEL ANALYSIS: Analysing the above through pestel framework Ultratech was highly affected by the environmental factors. As cement plants are very harmful for the environment causing a lot of pollution and is harmful for the health of human being hence proving that the environmentally it is not good and hence its plants all are made to be situated outside the city where the population rate is low or no population. So Ultratech is bearing great difficulty in managing the environment along with the health issues. OPPORTUNITIES: With the low per capita consumption of cement in India 102 kg compared to the global average of 260 kg and the emphasis on infrastructure development, Ultra tech has ample opportunity to ride the growth curve. Ultratech can develop new marketing area. It can sign MOUs (memorandum of understanding) withÂÂ  government regarding supply of cement forÂÂ  government work. Ultratech can also maintain the position of competition in the market. Institutional market like corporate and offices, school society complexes are growing in large scale, which will increase the requirement. People are opting for more stable structures and good future, so large use of cement is taking place, so government isÂÂ  spending heavily on infrastructure project as Indian industry base is growing rapidly Thus, this is the right time to fully invest in these market. There is regular demand of cement which in turn will increase foreign investment in this sector. As roadsÂÂ  transformation proce ss is going on throughÂÂ  which the traditional method of road building will be convert by modern concrete roads. Substantially lower per capita cement consumption as compared to developing countries (1/3 rd of world average) Per capita cement consumption in India is 82 kgs against a global average of 255 kgs and Asian average of 200 kgs. For green field capacity 20 million tons per annum will be required to match the demand in pipeline for other two years leading to favourable demand supply scenario. (verma, 2008) THREATS:ÂÂ   As huge cement industry emerge there is more competition for ACC (Associated Cement Companies) to carefully enhanced its price , product and at the same time satisfy its dealers and customers. Cheap priced brand are capturing like a mushroom to lower income customerÂÂ  base. Players such as Jaypee Cement, Prism Cement, and Birla cement. ACC cement are eating up considerable market share. Due to India satisfy growth many new international cement companies are expected in coming years which will bring enormous change and can start price war. Government intervention to adjust cement prices Transportation cost is upgrading. Due toÂÂ  loading restriction there is overloading industrialist shows increase in costs due to the shortage in coal industry. Many retailers are influence by better profit margin, andÂÂ  other Benefits because of small industries increase competition among them, which in turn give heavy discount to customer and start malpractices. Timber is also being considered as one of the substitutes of cement, which is cheap and long lasting. Due to continuous attack of earthquake, many countries like Japan, Indonesia, Singapore etc are now using timber in construction since those areas are high earthquake affected. (Kalesh, 2009) PORTERS 5-FORCE MODEL(THREAT) ANALYSIS: Analysing the above through the five forces framework: Threat of New Entrants: TheÂÂ  high costs are major entry barrier for the entry of new players. The high shipment costs make it difficult to import cement. Cement being a high volume low value commodity results in high goods costs, which makes cement imports economically unlikely. Domestic Cement industry is highly integrated from global cement markets. Making cement duty free, as cement is being imported from neighbouring countries. However, due to logistics issues and lack of port, handling capabilities, imports of cement will remain negligible and do not pose a threat to domestic industry of Ultratech. Competitive rivalry between existing players: Previously the rivalry was strong among the players, as the industry was not consolidated. During the last few years the industry has become more consolidated with the Top 3 players Ultratech is having a combined market share of 49 percent in 2005-06 as compared to 32 Percent in 1999-2000. (Porter, 1988) Its competitive analysis is as follows: Domestic players competing Ultratech are: Associated Cement Companies Ltd (ACCL) Associated Cement Companies Ltd manufactures ordinary Portland cement, composite cement and special cement and has begun offering its marketing expertise and distribution facilities to other producers in cement and related areas. The company plans capital expenditure through expansion of existing units and/or through acquisitions. Birla Corp Birla Corps product portfolio includes acetylene gas, auto trim parts, casting, cement, jute goods, yarn, calcium carbide etc. The cement division has an installed capacity of 4.78 million metric tones and produced 4.77 million metric tones of cement in 2003-04. The company has two plants in Madhya Pradesh and Rajasthan and one each in West Bengal and Uttar Pradesh and holds a market share of 4.1 per cent. Going forward, the company is setting up its captive Power plant to remain cost competitive. Madras Cements Madras Cements Ltd is one of the oldest cement companies in the southern region and is a part of the Armco group. The company is engaged in cement, clinker, dolomite, dry mortar mix, limestone; ready mix cements (RMC) and units generated from windmills. Lafarge India Lafarge India Pvt Ltd, a subsidiary of the Lafarge Group, has a total cement capacity of 5 million tonne and a clinker capacity of 3 million tonne in the country. Lafarge commenced operations in 1999 and currently has a market share of 3.4 per cent. It exports clinker and cement to Bangladesh and Nepal. It produces Portland slag cement, ordinary Portland cement and Portland Pozzolana cement. Grasim-Ultra Tech Cemco Grasims product profile includes viscose staple fiber (VSF), grey cement, white cement, sponge iron, chemicals andÂÂ  textiles. With the acquisition ofÂÂ  Ultra Tech, L Ts cement division inÂÂ  early 2004, Grasim hasÂÂ  now become the worlds seventh largest cement producer with aÂÂ  combined capacity of 31million tones. Grasim (with Ultra Tech) held a marketÂÂ  share of around 21 perÂÂ  cent in 2005-06. Gujarat Ambuja Cements Ltd (GACL) Gujarat Ambuja wasÂÂ  set up inÂÂ  1986 with the commencement ofÂÂ  commercial production at its 2 million tonneÂÂ  plant in Chandrapur, Maharashtra. The group has clinker manufacturing facilities at Himachal Pradesh, Gujarat, Maharashtra, Chattisgarh, Punjab and Rajasthan. The company has a market share of around 10 per cent, with aÂÂ  strong foothold in the northern and western markets. ItsÂÂ  total sales aggregated US$ 526ÂÂ  millionwith a capacity ofÂÂ  12.6 million tonne in 2003-04. Gujarat Ambuja is one ofÂÂ  Indias largest cement exporter and one ofÂÂ  the most cost efficient firms. It hasÂÂ  also earmarked around US$ 195-220 million for acquisitions Cements Ltd. CONCLUSION: As India is the second largest producer of cement in the worlds many big player presents in the market after that Ultratech cement increases his market share due to the high growth rate of real estate. Because of continuously growth of ultra tech cement after little yearÂÂ  company may occur top cement manufacturer in India. After swot analysis of Ultra Tech I found that company has many strength, but few weakness also present, there are various opportunities for companyÂÂ  in IndiaÂÂ  and other Asian countries because the infrastructure is continuously developing. Company has won the best Employer award in 2007, so young generation have various career opportunities in it. Overall performance of company is increasing continuouslyÂÂ  in each sectorÂÂ  like as Production, HR, Marketing it is good for company it is soon about to establish a strong brand name in the industry due to its good quality and reputed image that is making it exclusive from its competitor s.

Saturday, October 12, 2019

gdp analysis :: essays research papers

U.S. Economic Outlook: 2005-06 GDP Analysis   Ã‚  Ã‚  Ã‚  Ã‚  In order to ensure competent and accurate forecasts for both 2005 and 2006, I obtained GDP information from a few different sources. Accessing the information without having to register at a â€Å"nominal† fee was a bit interesting at times, but nonetheless I found a couple of sites that all forecasted GDP and all of it’s components within a tenth of a percent of each other.   Ã‚  Ã‚  Ã‚  Ã‚  The one I found easiest to follow and analyze was the TD Quarterly Economic Forecast that I accessed at their website, www.td.com/economics. According to information provided here and enclosed information from Reuter’s and Comerica, Real GDP growth is expected to tail off from about 4.4% in 2004 to 3.2% by the end of 2006. All three of these articles identified 2004 as the best year for our economy growth wise in the current business cycle by far. Consumer spending and business investment growth are predicted to decline pretty sharply over the next two years, while the housing / residential construction sector is expected to show negative growth. This, in itself may be an indication that there may be a reverse trend in the property / real estate market, bringing prices down and keeping that market honest. All of these forecasts are contributing factors to the predicted dip in both final domestic demand as well as final sales. Good news though is that export growth is expected to increase, which will reduce the amount of growth in imports, directly correlating to a drop in the nation’s unemployment rate. Increasing the number of jobs will infiltrate more money on the domestic front and eventually serve as a shot in the arm to a parched economy. All in all the U.S. economy is in pretty good shape and here to stay. Optimally, we would like to see this year and next build upon last year’s incredible figures and shoot consumer spending further through the roof.

Friday, October 11, 2019

Bacterial Concentration and Diversity

The objective of this particular paper was to study the results that were extracted when bacterial communities were formed. These bacterial communities were formed through the process of the reproducibility of small volume of repeat sampling from replicate bioreactors with stabilized continuous-flow chicken cecal bacterial communities. The results referring to the bacterial concentration and diversity were then analyzed by phenotypic, biochemical and ribotype analysis. To grow bacteria a stable environment is the most essential requirement this stable and a constant environment is known as steady-state conditions.This allows bacterial cultures to be obtained in a reproducible manner for batch consistency. The cultural efficacy was determined by taking an assumption that the aliquot taken from the cultures were identical and therefore did not overall affect the results to be determined by the particular experiment (bacterial culture). Mixed samples of avian cecal material were used to establish replicate bioreactor cultures. Repetitive samplings of the planktonic components were done to determine if all aliquots had the like bacterial contents within the same bioreactor.Consistency was seen during this repetitive sampling process but changes were seen in the specific composition of the resulting communities that initiated from one supply of cecal assortment. These are the basis on which the whole experiment and the methodology are based on. METHODOLOGY: †¢ Bioreactor and Sampling Design: The cecal contents were extracted from 150 birds (chicken) and then thoroughly mixed under sterile anaerobic conditions. Three replicate bioreactors (Bioflo ® 110 Fermentor/Bioreactor, New Brunswick Scientific Co, Inc., Edison, NJ) were used. The steady-state conditions were maintained by keeping the cultures under continuous-flow conditions at a flow rate of 0. 8 ml/min and also flushed with carbon dioxide that was free of any oxygen. For the first 48 hours the pH of the bioreactor was maintained to a stable 6. 2  ± 0. 3. Then for 3 weeks the cultures were allowed to reach equilibrium the planktonic component was sampled 11 times during this 3 weeks period. After this period 1ml aliquots were collected for analysis. i. e. pH measurement , bacterial isolation etc.†¢ Bacterial Isolation and Preliminary Identification: The material obtained from the bioreactor was sampled and some of the bacterial cultures obtained were quantified by growth of a 10? l aliquot on selective media in triplicate. The triplicate had a 5% sheep blood and was used to determine hemolytic reactions and for the recovery and the enumeration of the aerobic microbial species. The identification and the isolation of the aerobic bacteria was done by streaking the 10  µl aliquots onto TS-blood agar , Brilliant Green Agar, BGA; Becton Dickinson, Sparks, MD), CHROMagar E.coli and Orientation, MacConkey, mEnterococcus, and Rogosa plates. These plates were then incubated for 24 hours at thirty seven degrees. Likewise anaerobic bacteria were isolated too but the streaking was done onto Brucella-blood agar, Phenylethyl alcohol agar (Becton Dickinson, Sparks, MD), Veillonella, and BBE plates. The plates were then incubated anaerobically for 48-72hours at the same temperature. These bacteria were also tested for aero tolerance. †¢ Enumeration:The total aerobic and anaerobic population levels were enumerated by serial dilation onto TS-blood agar, MacConkey, mEnterococcus agars or Brucella-blood agar plates, respectively. †¢ Ribotype Characterization: Isolates from the bacterial lawns were collected and analyzed by using RiboPrinter ® Microbial Characterization System following the manufacturer's instruction using lytic enzymes. Endonuclease EcoRI was used to cleave the DNA and gel electrophoresis was used to separate the fragments and analysis was done using a modern hybridization blotting technique.The DNA hybridized was labeled rRNA operon prob de rived from Escherichia coli, and the bands were detected by chemiluminescence. The image formed was captured and transferred to the RMCS database and data were normalized to a standard marker set. The images were compared with the 6448 EcoRI riboprint patterns in the DuPont database and a 900 EcoRI riboprint pattern custom in-house database (USDA, ARS, College Station, TX). †¢ Data Analysis: For each set of combined cecal material the above mentioned 3 replicate bioreactor were established.These were then analyzed for enumeration and characterization (eleven per bioreactor). The statistics were represented in tabular form. Commercially available software was used to analyze and calculate data. Differences in cfu/ml were compared among the replicate bioreactors. MAIN RESULT: The collecting of bacteria cultures or any other organism is greatly affected by the sample size and the frequency of organisms being sampled in a particular environment. Some of the processes or the methods described above also have limitations due to different constraints that govern their working e.g. enumeration. Enumeration of bacteria is affected by many factors including individual species growth rates, fitness of each competing species etc. therefore the bacteria produced or grown in a selective media maybe less productive when exposed to competition from many other species in a non-selective media culture. The probability of collection is greatly affected by the spatial distribution of organisms. As a rule the sampling requirement must increase as the degree of unit aggregation increases.Enumeration is also affected by aggregation and may account for some of the variation reported in the bacterial quantification. Therefore considerations should be given to the sampling size when using aliquots for inoculation from cultures with known aggregating species. An important thing to mention here that whatever the sampling technique is used there are also certain limitations associate d with sampling. It is not only quite difficult to harvest all species comprehensively but our present technological inability also creates a hindrance because we are unable to artificially culture all bacterial species.It was also seen that the efficiency of detection of pathogenic bacteria is affected by dilution i. e. a lower efficiency of detection was achieved where the prevalence of the target bacteria was diluted. A threshold quantity of specific bacteria maybe required for the proper mix. Adjustments in population density, adhesion and diversity which occur during culturing period greatly affects this observation. CONCLUSION: The aim of this study or experiment was to determine reproducibility of small volume repeat sampling with the help of a bioreactor.Basically bacterial concentration and diversity were the two important factors that were being concentrated these two quantities were analyzed within stabalised continuous-flow chicken cecal bacterial communities initiated b y replicate aliquots taken from thoroughly mixed samples. Pooled cecal material was created from layer chicks to establish the bioreactors. After a steady-state was reached the plankton components were sampled repetitively for three weeks and was then characterized by phenotypic, biochemical and ribotype analysis.No notable differences were found in the bacterial concentrations that came from the same bioreactor. Differences were found in bioreactors initiated from the same stock material. BIBLIOGRAPHY 1. Tawni L Crippen, Cynthia L Sheffield, Kathleen Andrews, Roy Bongaerts, and David J Nisbet, (2008), Bacterial Concentration and Diversity within Repetitive Aliquots Collected from Replicate Continuous-Flow Bioreactor Culture, Open Microbiol J. 2008; 2: 60–65, published online 2008 May 23.

Thursday, October 10, 2019

Individual Privacy vs National Security Essay

Introduction Since the terrorist attack of 9/11, America has been in a high level conflict with terrorist around the world, particularly the group known as Al Qaeda. There has been many discussions within the U.S. Congress about the measures of how to effectively combat this organization and their members, here and abroad. Consequently, the issue of individual privacy vs. national security has generated discussions within the civilian and government sectors. To date, the discussions continues with many private citizens who feels they are constantly losing their privacy , when will it end, and how long will it continue. In this report, it will discuss where privacy issues began and where the public see individual privacy vs. national security come together in its most recent society. Do the public succumb to total governmental control, or do they propose continued debate in the nation’s process of the national security process. There are always two sides of a story, the pros and cons, the laurels and pitfalls, or the good and the bad, and for the public, it has to decide which side in each of these is the right side it feels is the best possible side to be on. One hand, national security is decided by the government to protect its citizens, by the measures it puts into place it feels is necessary, and what duration these measures will be in effect. On the other hand, the level of security and safety is set without discrimination to all. This results in the dilemma of the battle between individual privacy versus national security issues, that are essential to the individual, the public, and government. The Claim: What privacy should an individual lose to protect against terrorist because It gives society a level of feeling protected by the protections in place. The public can only maintain a limit of safety by giving up a degree of privacy to governmental agencies in order to protect this basic need; and it is a trade off to give up a certain amount of privacy, but not complete privacy. Justification of Claim: The justification of the claim is that it is prudent and the right of the public to debate the process of privacy, which the public has come to rely on for many years. Even though limited under the constitution, privacy rights and national security is important to the country’s citizens on all levels of government. The Bill of Rights is the area where citizens’ rights are specified, and over the years of war, and specifically after 9/11, citizens have seen and felt an erosion of their rights. Constitutional protections of individual rights not expressed specifically by the Bill of Rights is being at best controversial, (Linder 2012a). Many originalists, including most famously Judge Robert Bork in his ill-fated Supreme Court confirmation hearings, have argued that no such general right of privacy exists. The Supreme Court, however, beginning as early as 1923 and continuing through its recent decisions, has broadly read the â€Å"liberty† guarantee of the Fourteenth Amendment to guarantee a fairly broad right of privacy that has come to encompass decisions about child rearing, procreation, marriage, and termination of medical treatment. Polls show most Americans support this broader reading of the Constitution, (Linder 2012b). Looking forward under this decision, each citizen relies on its government to maintain a fair level of protection and security as well as maintaining a balanced level of privacy. The justification for this claim shows how the rights of individuals is a must, within the American society, compared to the national security of the country’s territory and a balanced approach it must give to its people within previous rulings. Individual Privacy vs. National Security After 9/11 a set of laws was set in place to protect us from Terrorism and terrorist attacks and placed under a new governmental act called the Patriot Act. With the past occurrences of 9/11, with the airlines planes crashing into the twin towers in New York City, and the Pentagon, it was not hard to convince the public this action was not needed. The residing administration presented stacks of follow-up attacks to Congress from experts and officials on a daily basis with grim pictures or scenarios of possible attacks on nuclear facilities, schools, shopping centers, and  others alike, that the public saw measures in place as acceptable and adequate, (Downing 2008a). Downing further states; Americans have seen their privacy and other rights curtailed in previous wars but the present-day privations are unfounded only in the duration of these rights. Just how long will the duration of war on terrorism and rights last, it has already lasted longer than any other US wars. Further sources of concern to the public, are the rich array of devices and techniques of the government, such as improved computer programs, databases, and surveillance gear, never before used in previous wars and never devoted as resources to any state or its partners. What if any remedies are there in the political system in the privacy of individuals versus national security protections and concerns? The courts have narrowed away some of the concerns, but the bulk of these powers, many of them are still persisting. Congress has been hesitant to amend passing the Patriot Act and its follow-ups, due to fear of being labeled unpatriotic, but also for fear of being blamed for further terror attacks. So far, no president or presidential candidate will probably seek to curb the purview of the Committee on the public safety, nor hardly mention future changes. Privacy, like its colleague individualism, has been in decline anyway †Ã¢â‚¬Å" putting up only token resistance here and th ere against mass society, a corporate-based economy, and relentless bureaucratization. So perhaps the war on terror requires us to bid a fond adieu to privacy and send it off to government bureaus for safekeeping. They broke it, it’s theirs (Downing, 2008b) According to laws enacted by the government after recent terrorist activities, it has the right to eavesdrop on telephone communications, monitor online communications of suspects, and incorporate surveillance on anyone it feels is a threat. With recent attacks upon American soil and the loss of thousands of lives, law enforcement agencies have asked for broader and pervasive laws to counter security challenges. Some have asked if these changes will impact the privacy of its citizens, and indeed over the years, history has shown the rights and liberties of citizens have been curtailed and in some instances revoked completely. One example, during World War II 120,000 Japanese Americans were forced into internment camps. Nowhere in the U.S. Constitution is there a harmonization-of-laws guarantee, by definition (An adjustment of differences and inconsistencies among the difference of  measurements, methods, procedures, schedules, specifications, or systems to make them uniformed to or mutually compatible with). In 1803 Chief John Marshall said in his opinion Marbury v. Madison, the Supreme Court is the final arbiter of â€Å"what the law is.† 2003 Tracy Mitrano Marshall also stated, that settling the duties of inconsistencies, disharmonizations, and contradictions falls to the duties of the Court, which in its practices, means that many such problems may go unaddressed for years and some of the controversies may never be resolved. Complications and constitutionally are thought of as checks and balances, and the cost of checks and balances systems are weighed in confusion and consternation and capricious that have the appearance of resolving conflicts once and for all. Before we go deeper into the analysis of the legislation, let’s examine the following terms of privacy and security. The American Heritage Dictionary defines privacy as secluded from sight, presence or intrusions of others, confined to one person. There are those who have pointed out that nowhere in the constitution the word privacy appears. The word security comes from the Latin word Securus, meaning carefree. Definitions of security begin with freedom from danger, risk, harm, etc. No matter what measures are taken to assert security, no one should think the outcome would mean complete freedom. Notice how the definition of the word security, implies that its function is as the means to quality, freedom, no less and not as an end to itself, as balance is the key. The American history provides us a variety of examples of how that balance has shifted over time. The Alien and Sedition Acts of the 1790s were the first example of a federal law believed to have thrown off the balance in favor of security over civil liberties, designed to silence and weaken the Democratic-Republican Party by the Federal P arty. To protect the new United States from an antagonistic French Revolutionary government as legal devices over the Naturalization Act, that actually backfired, ensuring the Revolution of the 1800’s to expire. This episode stands as a lesson of federal legislative overreach-political impulses of legislation touted as patriotic and necessary for national security, and the dissolving of the Federal Party. The internment of the Japanese, remains the opposite of Roosevelt’s emergency measures, which were the most shameful of all mistaken emergency legislative measures. As in each case of emergency legislation that protects national security, it also  curbs civil liberties and must be interpreted in context of a very complex history. Acts and organizations such as FERPA, HIPAA, and FSMA shares the purpose of preserving the privacy of records in keeping with the foundational tenents of fair-information practices. These fair-information practices are as such are transparency, relevancy, the ability to correct records, institutional obligations to maintain records of disclosures and provide notice to subjects, and finally, the security of those records. Dealing with paper records years ago, under FERPA regulations, colleges and universities now are struggling with the task of bringing electronic security up to the same level of confidentiality and availability. Due to the creation of IT security programs-which include policies, procedures, guidelines, risk assessment, and education/training-corresponds to new legal developments such as FMSA and HIPAA, which raises the specter of liability, legal requirements should also come as an encouragement for IT professionals. Intrusion-detection and -response plans require leadership, articulated practices, enforcement polices, and education within the campus communities, all of which relevant hardware and software as well as highly trained personnel to address these matters adequately and professionally. Sharing-of-information legislation, under national security, such as the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (the USA- Patriot Act) and the Homeland Security Act pulls in a direction contrary to privacy legislation. It is the longest piece of legislation of emergency legislation, well over a hundred pages, passed in the shortest time period, in all American history. It comes with three overall goals: (1) to enhance government to government information sharing (by lifting regulations that had monitored law enforcement relations between federal, state and local authorities, (2) to allow government surveillance and encourage private entities to share information with the government (by alleviating legal liability); and (3) create and expand existing criminal law design to fight terrorism (by adding specific provisions and expanding the definition and powers of existing legislation. So vast is the reorganizatio n of the federal government under this act , the implications have yet to be spelled out. But there are two are already along with, the Student and Exchange Visitor Information System (SEVIS) program, which requires every college and  university to report, abuses and fraud crimes, specifically allowing the death penalty for any abuse, (i.e. hacking) that results in serious physical injury or death. The second is the goal of the USA-Patriot Act-government surveillance and these two aspects of the Homeland Security Act have the most direct impact on scholarship and research, libraries, and IT resources in higher education. (Tracy Mitrano, 2003) Further in notations of privacy and national security, (Bajaj and Austen 28 Sep 2010) report, the United States and law enforcement and security agencies have raised concerns with new proposals electronic powers to track terrorist and criminals and unscramble their encrypted messages through e-mail and other digital communications. Officials from India have also stated they will seek greater access to encrypted data sent over popul ar Internet sources such as Gmail, Skype and other sources such as private networks that allow users to bypass traditional phone line links or logging in to remote corporate computer systems. Some have said that India’s campaign to monitor data transmissions within their borders may hurt other important national security goals: by attracting other global businesses and becoming a hub for technology innovations. In another report by, (Kandra, Anne; Brandt, Andrew; Aquino, Grace Jan 2002) Federal legislation passed in October gave investigators more tools for apprehending terrorists. Proponents of the law said it was needed to protect ourselves. Opponents said it will threaten our constitutional rights. But whatever position you take on these issues, it is important to know how the new laws will affect everyone’s lives online. They continue to report, the Patriot Act is complex and powerful, and it also broadens the definition of terrorism and increases the penalties for the crime of terrorism. Some of the more drastic changes in the law involve electronic surveillance. The act allows federal investigators to implement more powerful tools to monitor phone call s, email messages, and even Web surfing. What are the implications of this new type of surveillance for your Internet privacy? It is difficult to say exactly. The Patriot Act is vague on many key points, and understandably, law enforcement officials are not eager to show details about tools like the controversial Internet surveillance system, DCS1000 (and more commonly recognized by its previous name, Carnivore). â€Å"One of the biggest issues with Carnivore is that we don’t really know how it works,† says Ari Schwartz, associate director of the  Center for Democracy in Technology, a nonprofit group based in Washington, D.C., that focuses on preserving privacy and civil liberties on the Internet. What are the implications of this new type of surveillance for your Internet privacy? It is difficult to say exactly. The Patriot Act is vague on many key points, and understandably, law enforcement officials are not eager to show details about tools like the controversial Internet surveillance system, DCS1000 (and more commonly recognized by its previous name, Carnivore). â€Å"One of the biggest issues with Carnivore is that we don’t really know how it works,† says Ari Schwartz, associate director of the Center for Democracy in Technology, a nonprofit group based in Washington, D.C., that focuses on preserving privacy and civil liberties on the Internet. It is probably a fair assessment to say that joking when sending an e-mail about planting a bomb is not very good idea these days, and researching biological terror techniques over the Internet is not conceivably a good idea which would also draw suspicion. (Kandra et al., Jan 2002) Under the Patriot Act Amendments, the FERPA Act has a health and safety exception. It is well known to students and administrators, who invoke it to look at a student’s record in the case where a student is missing and police hopes to find clues to the student’s disappearance from their e-mail. The Patriot Act added a new terrorism exception design to protect the health and safety of everyone e lse. It is worth noting the broad definition of domestic terrorism, meaning activities that involve dangerous acts of human life, that are in violation of the criminal laws of the United States or any state, that appear to be intended to intimidate or coerce a civilian population or individuals, influence the policy of a government by intimidation or coercion , or affect the conduct of a government by mass destruction, assassination, or kidnapping and occur primarily within the United States. Within the principal of the Homeland Security act, its job is to reorganize a significant amount of the federal law enforcement and immigration and naturalization bureaucracy under the roof of one central agency, which grew out of concern that compartmentalization federal intelligence and law enforcement structures did not permit adequate study and intelligence and warning. The Homeland Security Act has already had a noticeable impact on immigration. The Student and Exchange Visitor Information System (SEVIS) a mandatory government issued program that tracks  the whereabouts of visiting foreign students attending colleges and universities. The concept is nothing new, as there were widespread disuse of bureaucratic disorganization from within the INS. The Patriot Act echoed the existing INS laws to require mandatory reporting and enforcement, and the Homeland Security Act passed on the baton. Civil privacy legislation that includes security legislation such as FERPA, HIPAA, and FSMA should be the rule. National security information sharing and anti-terrorist legislation, such as the USA-PATRIOT Act and the Homeland Security Act—should be the exception. With the USA-PATRIOT Act divergence from traditional constitutional standards, there have been many people who are concerned that the exceptions may soon swallow the rule. Tensions between these two types of legislations speaks to the more general concern of the American society at large, about a reduction of privacy overall, whether caused by changes in the law, in social norms, or in the very nature of information technologies. Even today with new technology its task has grown and evolved in recent years, and over the past three decades, the challenges have grown to protect individual and personal privacy, and to curb privacy violations. In general, several surveys and polls that were taken seem to suggest that the public feels there has been a loss of privacy and intrusions and the backdrop behind these new proposals could potentially impact privacy and civil liberties on a greater scale. Analysis from an ethics point of view, there are major concerns under national debate on tensions between privacy and security. Below are the following measures of security being proposed and public, personal and privacy issues under consideration. 1. Stricter security measures at airports, ports, points of interest in the U.S., and gathering places such as stadiums, and other large mass venue, (A) Extensive checks of baggage, personal searches and vehicles, (B) Intensive custom and immigration checks, (C) Restrictions within airport areas and certain public places, (D) Additional spot searches and personal property checks in key public areas, (E) Increased surveillance and monitoring of movements in key public areas. 2. Detailed, accurate identification and verification of identities and background,. (A) Mandatory issuance of national identity cards for all people, (B) Increase use of facial profiling systems for assessment of potential suspects. 3. Increased surveillance of all communities. (A) Monitoring via Internet  (‘Carnivore’}wireless, wire-lines, satellite, etc., (B) Broader wiretapping powers, (C) Broader (and possible indefinite) detention, arrest, and asset seizure powers, (D) Authority for blanket searches, secret searches, (E) Website activity monitoring and data collection, (F) Access to personal and business records of all kinds. 4. Tighter immigration laws to screen immigrants/visitors more thoroughly, (A) More thorough screening of credentials and backgrounds of visa applicants, (B) Tracking of movements of immigrants and other visiting foreign nationals through databases. (Krishnamurthy, 2001a) CRITERIA FOR ETHICAL DECISION-MAKING: (See additional charts posted be low by Krishnamurthy). POSSIBLE ACTIONS The proposed increases in security measures may be beneficial for the good of everyone if implemented in an impartial manner regardless to race, ethnicity, religion. Accountability and transparency in law enforcement procedures, especially on privacy issues must continue to be preserved, despite recent attacks. The judicial system must be empowered to deal effectively with all abuses of proposed security measures with regards to protecting the constitutional rights and liberties of all its citizens. It must also ensure anyone accused has adequate legal representation and a fair chance to prove their innocence. Ensure that the current atmosphere of rich ethnic and cultural diversity environment of the country with one another is not compromised. 1. Assess that this is a real and tangible problem we are facing. 2. If so, can it be handled without impacting/violating privacy at all. 3. If not, can it be handled by making it as less intrusive as possible. There are possibilities that additional lengthy investments for public infrastructure needed to be made nationwide to expand capability of existing systems or newly incorporated systems to handle the challenges. 5. VIRTUES APPROACH GOALS: A focus on individual development of virtues A thoughtful reflection on self-realization of human potential The developing virtuous habits and attitudes leading to ethical action throughout the communities. POSSIBLE ACTIONS An assessment of whether the proposed measures will reinforce positive virtues we hold important, such as our patriotism, self-sacrifice, compassion, patience and courage, or whether these options could harbor destructive traits leading to religious intolerance, less compassion, racism, fear, and suspicion. To impress upon more awareness through debates and discussions across the nation to distinguish religion from universal human values of peaceful co-existence, mutual respect, and non-violence, and  human dignity. To focus on cultivating tolerance, compassion and patience (Krishnamurthy, 2001c). The following abstract articles shows and or explains further privacy and security issues since the terrorism of 9/11/2001 put in place as part of measures private citizens may need to become accustomed to in their part of loss of privacy rights in their security of national security. Security and Privacy After September 11: The Health Care Example Abstract: The following article examines the collaboration between privacy and security in relations to the medical rule, issued in 2000 under the Health Insurance Portability and Accountability Act (HIPAA). Studies shows that the HIPAA stands up well to concerns of post 9/11 era. Affairs about public safety are met by current provisions that permit revelations to protect national security, to react to emergency situations, and to respond to law enforcement investigations. The article examines in particular detail the envisioned Model State Emergency Health Powers Act, sketched in the wake of the 2001 anthrax attacks. It has been argued by Professors Lawrence Gostin and James Hodge that this Act is justified by a new â€Å"model of information sharing† for medical information purposes. This article concludes that public health concerns are suitably addressed by the existing HIPAA rule, and that a â€Å"model of information sharing† sends completely the wrong signal about how the health system will handle issues of data privacy and security. More generally, the article investigates positions of â€Å"security vs. privacy†, where both values are antagonistic, and situations of â€Å"security and privacy†, where both values work together. (Swire and Steinfeld January 22, 2003) Civil Liberties vs. Security: Public Opinion in the Context of the Terrorist Attacks on America Abstract: This abstract article discusses, in the tradition of research on political tolerance and democratic rights in context, this analysis uses a national survey of Americans directed shortly after the September 11, 2001 attack on America to study people’s eagerness to trade off civil liberties for grander personal safety and security. We find that the bigger people’s perception of threat, the lower their endorsement for civil liberties. This  effect interrelates, however, with trust in government. The lower people’s trust in government, the less willing they will agree for a trade off of civil liberties for security, regardless of their perceptions of threat. It is known that African Americans are much less likely or willing to trade civil liberties for security than their counterparts of whites or Latinos, even with other circumstances taken into account. This may be their long-standing commitment of their struggles for human and civil rights. In matters of party issues, liberals may be less likely to trade off civil liberties than moderates or conservatives, but liberals tend to converge toward the position taken by conservatives when their sense of the threat of terrorism becomes high. While this is not a projection of the future, the results suggest that Americans’ commitment to democratic values is greatly dependent on other concerns and that the context of a wide-ranging threat to national or personal security can provoke a considerable readiness to give up rights. (Davis & Silver, 2003) Mobile cameras as new technologies of surveillance? How citizens experience the use of mobile cameras in public nightscapes Abstract: In surveillance studies using mobile camera technologies in public nightscapes, terms such as sousveillance and inverse surveillance define forms of surveillance that have a bottom-up and democratic character. On the other hand, in this paper this democratic notion is queried by looking into procedures and occurrences with both Closed Circuit Television (CCTV) and mobile cameras by Dutch citizens. By superseding in the nightlife district of the Rotterdami city centre, data has been collected on both mobile and CCTV camera confrontations. From this, an investigation is made into how mobile cameras are practiced in the Nightlife landscape. Comparing these practices with CCTV provides understanding into new surveillance issues that come into view due to the mobile camera. Analyzing surveillance technologies, provides prospective as hybrid groups, that may take different shapes in different places, and allows for involvements that attempts to improve our perception of current changes in the surveillance technology landscape. (Timan & Oudshoorn, 2012) The Spy in the Cab: The Use and Abuse of Taxicab Cameras in San Francisco Abstract: Since 2003 security cameras were required in San Francisco taxicabs. Their story has come to contain many features that are familiar to surveillance examinations. Their acceptability is explored of the trajectory using the concept of surveillance slack, and the stages and tensions where the line of use and abuse is has been drawn. The effectiveness of what the cameras are perceived to be doing, the integration of its use, and how the slackness or tautness of surveillance interacts in tension and conflicts. Since its first introduction, the new technology initial reaction was met with moral panic. This is just another element of privacy intrusion in the name of national security, the public now must adapt to. (Anderson, 2012) These abstracts are the several indications of elements put into place after the 9/11 Terrorist attacks in 2001. Privacy rights have eroded over the years since, by the US Government claims to protect its citizens. From cameras, in inconspicuous places, wire-tapping, and monitoring e-mail, and social sites, these are just a few of the acts we are controlled under. Needless to say, we may never see these laws or acts diminish anytime soon, so it is better to adjust now, and band together before further intrusions are brought upon society. My assessment of the information taken from this report is that the privacy rights we hold as individuals within the country are vague, although most Americans seem to think their rights are guaranteed by the U.S. Constitution . Although under the 14th Amendment a certain amount of rights has been guaranteed, even these rights can be limited by the powers of the U.S. Government, especially during a time of war, or other emerging acts. When you look at the broad powers of war, emergency acts, and even the powers that exists of the U.S. Congress, we can assume any privacy we hold true is basically up to the representatives we elect to represent us. We as a people of the republic come together when there are disasters, and acts of terror, and differs on many policies of the day, but what we have as collected group is the power of vote, and this power is what we can use to help balance the power of our existing government. The research of this paper was conducted using various sites concerning a  combination of privacy of individual citizens, versus the introduction of laws enacted by the US Government, since the terror attack of 9/11/2001. Taking in all the information collected, and analyzed, this report has been intended to show the privacy each citizen held before and after the attack. It comprised what the public has perceived as a given right, over what was actually allowed by law. Conclusion The Claim: What privacy rights should an individual lose to protect against terrorists? It gives society a level of feeling safe by the protections in place. The public can only maintain a limit of safety by giving up a degree of privacy to governmental agencies in order to protect this basic need; and it is a trade off to give up a certain amount of privacy. On one hand individual privacy seems to be an inherent right thought of by the public as a Constitutional right. On the other, it is limited rights given by the 14th Amendment. Whatever rights we hold true today is the norm, yet not all true rights we bear are in real existence. What remedies in the political system in the privacy of individual privacies versus national security protections and concerns? The courts have narrowed away some of these concerns, but the bulk of the powers still exists. Even though Congress has been hesitant to amend the Patriot Act, in fear of being too intrusive, the powers to be are that it has the power to limit the society’s individual rights. Throughout the years rights have been in decline, and we wonder whether it will be because of terrorist acts, the U.S. Patriot Act, or the Homeland Security Act, it is something we all will have to get accustomed to. References (Anderson, 2012) Surveillance & Society, ISSN 1477-7487  © Surveillance Studies Network, Retrieved from http://library.queensu.ca/ojs/index.php/surveillance-and-society/article/view/cab_spy Bajaj, V. And Austen, I. (28 Sep 2010) B1 New York Times, Privacy vs. National Security: [Business/Financial Desk] http://search.proquest.com.proxy-library.ashford.edu/docview/755073818/fulltext/13AA4752BA6755D6A1B/1?accountid=32521 Darren W. Davis, Brian D. Silver, (12 DEC 2003) American Journal Of Political Science, Retrieved from http://onlinelibrary.wiley.com/doi/10.1111/j.0092-5853.2004.00054.x/abstract Downing, B. M. (2008, August 26th) The Agonist Retrieved from http://agonist.org/national_security_versus_individual_privacy_no_line/ (Kandra et al., Jan 2002): 37-41PC World 20. 1National security vs. online privacy http://search.proquest.com.proxy-library.ashford.edu/docview/231422330/fulltext/13AA49614672EB98EE2/3?accountid=32521 Krishnamurthy, B. (Posted 11/01/01) Website. Markkula Center for Applied Ethics Retrieved from http://www.scu.edu/ethics/publications/briefings/privacy.html Linder, D. (2012). Exploring constitutional law. Informally published manuscript, educational, non-commercial site, umkc.edu, Kansas City, United States. Retrieved from http://law2.umkc.edu/faculty/projects/ft rials/conlaw/home.html Miltrano, T. (January 1, 2003) Web Page title. EDUCAUSEREVIEW ONLINE Retrieved from http://www.educause.edu/ero/article/civil-privacy-and-national-security-legislation-three-dimensional-view Swire, Peter P. and Steinfeld, Lauren, Security and Privacy After September 11: The Health Care Example. Minnesota Law Review, Forthcoming. Available at SSRN: http://ssrn.com/abstract=347322 (Timan & Oudshoorn, 2012) Surveillance & Society, ISSN 1477-7487  © Surveillance Studies Network, 2012 Retrieved from http://library.queensu.ca/ojs/index.php/surveillance-and-society/article/view/mobiles Downing, (2008a) and (2008b) Krishnamurthy, (2001a), (2001b) and (2001c) Linder, (2012a) and (2012b)