Wednesday, October 30, 2019

Principles of Microeconomics Essay Example | Topics and Well Written Essays - 1250 words

Principles of Microeconomics - Essay Example This will create imbalance in the economy hence may result in a shortage of consumer goods. Question 2: opportunity cost means the best substitute given up in order to produce more of other type of goods. As more of one good is produced the opportunity cost to produce it rises (Sloman). Each time we make a choice to do something; simultaneously we are eliminating the choice of an alternative good. Moreover, if a country is producing more of one good it has to sacrifice ever increasing amount of the other. The reason for it is difference in factor of production. Production factors may suit production of a particular type of good and shifting resources to production of other type of good would result in increasing opportunity cost. For example: if government decides to build a shopping mall instead of hospital, the facilities and health care provided by that hospital is given up or forgone. Question 3: Change is quantity demanded: a change in quantity demanded occurs when there is move ment along the demand curve with respect to price and quantity. It usually stems from a change in the price of the product. An increase in the price causes downward movement along the demand curve leading to an increase in the quantity demanded whereas a decrease in the price causes an upward movement along the curve causing a decrease in the quantity demanded. ... It is important to note that this causes a total change in the range of price and quantity combinations. Price D1 D2 Quantity Question 4: An economic equilibrium is located when demand and supply of the commodity in discussion meets (Sloman). This point is said to be the optimum level of functioning point in an economy because all the stakeholders are able to achieve their objective of buying and selling their goods at their desired quantity level. However, economist work hard to reach this point since such an equilibrium is theoretical. Equilibrium would only be achieved at a point where demand and supply curves intersect. Moreover, any point below or above the equilibrium will either create excess demand in case of low price, or excess supply in case of higher price. The gap in supply and demand will exist in the short term. However, as sellers and consumers readjust their sell and purchase habit, equilibrium will be reached eventually. Question 5: If the technology to produce page rs improves it will push the supply curve to the right and there will be an increase in supply of pagers, meaning that for every price, the quantity supplied will increase. If the prices of cellular phones drop, the aggregate demand for pagers will decrease because cell phones are an alternative product, pushing the aggregate demand curve to the left, meaning that for every price, the quantity demanded will decrease. Both these factors shall bring down the price of pagers down by a significant level and make pagers much cheaper. Certain products have a very limited supply and an excessive demand, such as the superbowl tickets. The price elasticity of such products is extremely low as people are willing to pay more than the

Monday, October 28, 2019

Manchester Products Essay Example for Free

Manchester Products Essay Manchester Home expanded household furniture division by adding market leader PLFD – Addition of 990 million in PLFD revenues – Addition of established sales force, talented design teams – PLFD’s Signature Style line very popular with consumers †¢ Ability to combine PL design skills with MH engineering and manufacturing – Manufacturing expertise and ergonomic designs †¢ Concerns – How to tie-in PL’s bold designs with MH’s conservative style – Customer confusion over new brand name 5C’S OF THE ACQUISITION Company †¢ Companies’ strengths and weaknesses complement each other 5C’S OF THE ACQUISITION Customers †¢ Target consumers ages 34-55; Income over $50K – MH consumers are categorized as conservative elegance – PLFD consumers are more fashion-conscious, trend setters – Will need a way to reach both customer segments †¢ Results from target consumer surveys – Low brand loyalty – 60% would change brands – High information search – Style, design, quality, comfort most important qualities – all covered by MH/PL – PL has high brand awareness, almost double that of MH, will help to co-brand them to raise awareness for MH 5C’S OF THE ACQUISITION Collaborators †¢ Manchester already has network of office distribution channels, now they gain access to household distribution channels through Paul Logan. – PL sales force has strong ties to leading distributions channels – PL strength in upscale furniture stores, specialty stores, department stores †¢ Strong relationship with buyers – Concern over brand going away, necessary to create a smooth brand transition so consumers make the switch †¢ Push strategies important to build strong relationships with distribution network – 90% of PL shipments include Purchase Allowances 5C’S OF THE ACQUISITION Competitors †¢ Paul Logan was market leader †¢ Household Furniture Industry $36.64 billion in 2004; positive % growth projections A mature industry Large number of corporate consolidations Low-cost imports from Asia/Mexico moving into higher price levels Domestic companies ready to attack the vulnerability of the new brand and position †¢ We need strong advertising and marketing mix †¢ Many competitors have company owned stores – Crucial to leverage our distribution channels to gain market access 5C’S OF THE ACQUISITION Context †¢ Office furniture sales growth tied to employment growth and new business formation. – Burst of dot.com bubble and recession have decreased demand for office furniture †¢ Rise in ‘teleworking’ could increase demand for home office †¢ Demand for home furniture is tied to new home construction and home sales. †¢ Innovative and stylish products to bolster demand MOVING FORWARD ANALYSIS OF FUTURE BRANDING: OPTIONS †¢ Drop the Paul Logan name right away – Losing their current brand awareness – Need to educate customers – Strong distribution channel relationships could be damaged †¢ Keep using the Paul Logan name for the entire allotted three years – Ad agency advises against this option, as they don’t want to allocate advertising dollars to a brand with a three year shelf life †¢ Transition mid-point – Leverage the Paul Logan name to build strong brand awareness for Manchester – Continue to use the PL name in subtext for 1.5 yrs.; conduct consumer research to reevaluate after this time. – Business recommendation to convert the name 100% to Manchester Home after 1.5 yrs. ANALYSIS OF FUTURE BRANDING: OPTIONS †¢ Brand name transition: – First 6 months: Manchester Home: The New Home for Paul Logan Furniture – Following year: Manchester Home: The Home for Paul Logan Furniture – After 1.5 yrs.: Conduct consumer research to reevaluate transition †¢ Business recommendation is to drop the Paul Logan name †¢ Want to ensure the Manchester Home brand has achieved a sufficient awareness before removing PL OUR FUTURE ADVERTISING STRATEGIES †¢ Strong campaign is critical to the success of the new brand name – $184 million allotted for 2005 – Includes national and cooperative advertising for both PLFD and MH products †¢ Push vs. Pull – MH to allocate more $ towards Push advertising – Heavy Push Pull the first 1.5 yrs. – Marketing Communications mix to form long-term company image †¢ Promotional Programs – Purchase allowances – Recommend amending the planned 2005 marketing expenditures to allow for purchase allowances. †¢ Currently based on % of sales – Due to brand transition, allocate a fixed amount to advertising to ensure the levels do not drop RECOMMENDATIONS †¢ Continue to use the Paul Logan name to leverage brand awareness and channel partnerships †¢ Focus strongly on both Push and Pull strategies the first 1.5 yrs. to communicate the acquisition – Amend proposed 2005 advertising plan to incorporate more Push strategies, specifically Purchase Allowances that contributed to the success of the PL distribution network †¢ After 1.5 yrs., the business goal is to transition brand officially to Manchester Home QUESTIONS?

Saturday, October 26, 2019

Information Controls by Newspapers :: Papers

Information Controls by Newspapers All newspapers have different ways of passing on the news to their readers. This often depends on the audience the newspaper is targeting. The four newspapers that I will be writing about all target various readers. I will be looking at which pieces of information newspapers would use when reporting about the invasion of the Central European state of Bernia by Cara. 'The Planet' is a tabloid newspaper that backs the government. It is happy with the way things are and has a large circulation of readers, most of which are working-class people. 'The Reporter' is also a tabloid newspaper, which supports the Labour Party and also the trade union movement. This newspaper targets similar readers to that of 'The Planet' but has a smaller circulation. 'The Enquirer' is critical towards the two main parties and is known for it's in-depth political and international reporting. This newspaper is a broadsheet whose readers are mainly middle-class. The final newspaper, 'The Daily Recorder' is a strongly patriotic pro-government broadsheet. It believes in family values and in a British Identity. As newspaper A, 'The Planet', supports the government it would be very careful about the information it dispensed. It would not want people to know that there had been 150 civilian deaths because they had been caused in retaliation against the arrival of British troops. The reason it would not want people to know this is 'The Planet' backed the move by the government to send troops to Bernia. Printing this could stop other troops from wanting to go to Bernia. To help emphasis the fact that the troops were really needed they would talk about how Bernian refugees were fleeing to escape rumours of ethnic cleansing. 'The Planet' would also avoid printing the fact that there were 150 UK casualties as this like the civilian deaths would lower the moral troops. This newspaper would probably show the photograph of the man who had been killed in hand-to-hand fighting in Bernia just to show how out of control the civil war was becoming.

Thursday, October 24, 2019

Counter-Terrorism Strategies Reveal the Limits of Human Rights as a Cosmopolitan Discourse in the Age of Global Terror

Since the start of the Universal Declaration of Human Rights in 1948, human rights were introduced as a system that exceeded any boundaries, such as religion, gender, ethnicity and nationality, in order to protect each individual. It was an attempt to universalize human standards of decency, morality and dignity, by way of constructing a global human community. It is through this that human rights were able to be changed and recognised as a standard for global order, regulated through international law. The act of terrorism is not a new concept, and has been responsible for many innocent lives over many years, however not until the attacks on the United States, known as 9/11, has terrorism become such a globalized issue. It was through the symbolic destruction of capitalism, coupled with the vast media outlets to create witnesses that allowed for Western society to face a new threat of vulnerability. The mass production of human rights violations aimed at such a seemingly powerful Western country induced a culture of fear, specifically regarding the weaknesses in national security. Terrorism, national security, and war became the dominant dialogue throughout international politics, and governments began to develop counter-terrorism legislation in order to enhance feelings of safety and security, but also to seek retribution against terrorist groups. It is through this introduction of new counter-terrorism legislation that allows the expectations of human rights protection to become confused, as state security becomes the prime concern. This new legislation becomes a shield to hide behind when human rights violations are committed, allowing the state to use the premise of counter terrorism as a justification for neglecting what was previously an internationally standardized notion of human rights protection. It then becomes a paradoxical debate of violation and protection, where policies designed to protect society from these human rights violations, not only affect the terrorists whom they are aimed at, but start to affect the people who’s rights they aim to protect. Where the notion of human rights is concerned in protecting the individual, counter-terrorism in the age of global terror re-employs these boundaries between the individual in the interest of the state, and disregards human rights. Pojman (2006) states that terrorism is a type of violence employed to deliberately target non-combatants in a ruthlessly destructive and often random manner in order to support concrete political or religious objectives. Because of its random ature, the act of terrorism destabilizes any notion of a human rights system by allowing each individual to be susceptible to its effects. Denying one their right to life is depriving them of their most fundamental human right. According to Anthony Giddens (in Pojman), the difference between what he labels as â€Å"old-terrorism† and â€Å"new-terrorism† lies in its locality in geographical terms, where the first is concerned with nationalist ideology and remained local, and the latter is focused on its global implementation (2006). September 11th became the poster for this â€Å"new-terrorism†, bringing with it the stark realisation that Western Society was not impervious to terrorist regimes. The vulnerability of the United States seemed not to have been considered previously, and the mass murder evoked an intense culture of fear amongst the people, only to be further manipulated by the media, causing governments to strike with new legislation. The notion of prevention was a strong instigator for new strategies, where the state intended to seek out terrorist activity before it happened. Terrorism uncovers the limits of the human rights system in achieving universal consensus. However the authority of rights is more so undermined when counter-terrorist acts violate these moral principles in the constant pursuit of their re-avouchment. Under the title of counter-terrorism, democratically defined countries are deserting fundamental principles of human rights that were once upheld, such as the presumption of innocence, the right to a fair trial, freedom of expression and the right to seek asylum (McCulloch, 2003). The entire premise behind having a universal declaration of human rights was to maintain a society in which people could have access to a global mechanism of protection and support. However counter-terrorism has dismantled these ideals and replaced them with suspect and presumed guilt. The position of human rights in the international community has been seen as dispensary to the higher priority of achieving security through counter-terrorism. Faced with the exposure of the weakness to its homeland, the US opted for a military based counter-terrorism approach, resulting in the deployment of military forces into the Middle East and Central Asia, initiating what was known as the War on Terror (Schorlemer, 2003). The invasion of Afghanistan was designed to strengthen state borders from afar by defeating terrorists at their source. However, in order to do so, the US strategy was to utilize violence to secure their human rights. In using violence, they contradicted exactly what they were fighting for. The state of emergency that was declared following 9/11 and the climate of fear fostered by terrorist activity destabilized the notion that all individuals are entitled to rights protection. In a state of war, honouring human rights is neither practically possible nor theoretically required (Luban, 2002). It becomes intrinsic in the system of war that constitutional rights and civil liberties of populations can be brought to a halt under the pretence of enhancing state security, all the while allowing for the deterioration of basic human rights under circumstances of organised violence. The US disregard for abiding to the universal human rights of global citizens can strongly be seen in the military intervention in Afghanistan, and further in the counter-terrorism strategies of rendition, torture and detainment practiced by the US and their allies in pursuit of security. Under the model of war, the lethal use of force on enemy troops is permissible, and the accidental maiming and killing of civilians is seen as collateral damage rather than victims of atrocities (Luban, 2002). Therefore, by declaration of war, George W. Bush implemented a counter-terrorism strategy, that by virtue of its nature undermines the system of human rights as an internationally enforceable system available to all individuals. This is reinforced by highlighting its illegitimacy in instances of war. As terrorism is not an enemy in the conventional war sense, as it is not a visible and tangible body with a defined territory, the US forces in Afghanistan have relied on using air strikes to atta ck insurgents, according to Garlasco (reference). Usual requirement of evidence or proof before a conviction becomes less regulated or required when at war, with plausible intelligence and insufficient evidence adequate as the foundation for action (Luban, 2002). In situations of flawed or limited intelligence, it has not been terrorists but civilians that have become victims of air strike assaults, thus having their right to life stolen from them (Garlasco). An example of this kind of fatal mistake occurred in the Afghani town of Uruzgan in 2002, where faulty intelligence concerning the location of Al-Qaeda fighters led to the execution of a lethal air strike, killing 21 civilians. This problematic endeavour to protect our rights is therefore legitimizing civilian casualties as collateral damage of war. Counter-terrorism strategies have justified the illegal detainment, torture and rendition of suspected terrorists as a necessary process in achieving security and paradoxically reasserting the human rights of moral citizens. The aftermath of September 11th brought about the legitimization of human rights violations through new counter-terrorism laws, whereby these violations can most distinctly be witnessed through the treatment of prisoners in the Guantanamo Bay Naval Base in Cuba. Democratic rights such as the presumption of innocence, the right to a fair trial, and freedom from torture were all eradicated in the operations that took place at the base, denying them these basic civil liberties in an unrelenting pursuit of truth and justice for the violence inflicted on American citizens on September 11th. Common practice has been the illegal detention of suspected terrorists, where the rights to due process and a fair trial are not upheld. Recently, the evidence against the military has been growing, including official Pentagon documents, indicating that interrogators consistently employed hard line counter-resistance measures in absolution to induce prisoner co-operation. Such measures include sleep deprivation, prolonged isolation, painful body positions, feigned suffocation, beatings, sexual provocation and displays of contempt for Islamic symbols (Bloche and Marks, 2005). Under the 1984 United Nations Convention Against Torture (CAT), an event is considered torture if it satisfies three constitutive elements; the infliction of severe mental or physical suffering, for the recipient to be perpetrated for a purpose, and for this to occur by way of an official (Hocking and Lewis, 2007). The operation of torture in counter-terrorist tactics echoes the breakdown of moral consensus on the use of torture, with the US disrespect for this international human right setting a negative global standard (Wilson, 2005). Therefore, when another State executes this act of torture, the US and their Western Allies seek their services for interrogating their own suspected terrorists, rather than condemning the act. The US, since September 11th, has engaged in transferring their suspects to other countries, where the torture and interrogation can be carried out. This instance of rendition mirrors the practices undertaken by the Swedish Government, where they abducted extremist Islamic suspects and transferred them to Egypt, where torture under interrogation is considered legal custom (Bloche and Marks, 2005). Counter-terrorism has allowed for the undermining of the adoption of human rights globally. Where western democratic states were formerly viewed as human rights advocates, they now deny this role of leadership in aid of suppressing this culture of fear induced by global terrorism. Counter-terrorism strategies have both enhanced the degradation of human rights in regards to the moral basis for international relations, and allowed for the threat of terrorism to be used by state governments to increasingly militarize the protocol of law enforcement and increase the surveillance of civilians (McCulloch, 2003). The war on terror has perpetuated a permanent state of emergency with no foreseeable end. Thus in many western countries, the prolonged war against terror is being used politically rather than legally, to justify the permanent restriction of civilian human rights (Zizek). Shielded by the counter-terrorism legislation, states have put into practice new national security laws whilst pre-existing emergency legislation has achieved legitimacy, claiming to be an essential response to the threat of terrorism (Wilson, 2005). In support of their counter-terrorism strategies employed abroad, states such as Australia, the United Kingdom, Canada and the US have relied upon internal strategies to curtail the threat of terrorism. Such measures include the indefinite detention of suspected terrorists without trial or judicial review, the increased surveillance and reduced privacy protections, the dramatic increase in the powers afforded to domestic spy agencies, the right to silence and choice of legal representation eradicated completely, and the vastly expanded resources afforded to military and police engaged in homeland security (McCulloch, 2003). The civil and political liberties that were considered so important during the devising of the UDHR, are now ironically being violated by the very people who them in place. The power to detain people will increase state security organizations power to suppress dissent by adding detention to the potential adverse consequences of political opinions that challenge the political status quo (McCulloch, 2003). In times of global terror, the implementation of increased surveillance does not invoke a feeling of security amongst society, but conversely, further extends the culture of fear that occurs through constant intimidation and increasingly inhibited freedoms. The dispensability of human rights in times of state emergency is revealed when our global principles can be undermined by counter-terrorist strategies so immediately. The principle of counter-terrorism, to enhance state security, has reinforced the rigidity of national borders, by entrenching foreigners and citizenship as acceptable bases for distinction and discrimination and the rejection of humanitarian concerns for individual needs (Mertus and Helsing, 2006). The figure of the refugee as the individual, deprived of citizenship and reliant on the goodwill of other states, illustrates this collision between the protection of individual versus the protection of the state (Humphrey, 2002). After the Second World War, the refugee acquired a measure of political significance as victims of persecution. However the contemporary threat of terrorism has redefined refugees as victims of an international system of nation states founded on a hierarchy of exclusion (Humphrey, 2002). Rather than generously extending protection to individuals seeking asylum from persecution, torture and war, counter-terrorism strategies have increased the conditionality in the acceptance of refugees. ‘Boat people’ arriving on remote areas of the northwest shoreline of Australia constitute the manifestation of the international refugee crisis in this country. Recent asylum seekers are confined in remote detention centres in economically poor island communities to the north of Australia. This criminalization of refugees by the Australian government reflects a rejection of their moral responsibility as human rights guarantors whilst ironically committing human rights violations of their own. The detainment of asylum seekers inflicts a greater degree of suffering on these individuals with detention providing a re-traumatizing environment that may contribute to the development of mental health problems (Stout, 2002). The political discourse employed by the government in relation to ‘boat people’ stripped the refugee of compassion and their human rights by referring to them as ‘illegal’s’ that pay ‘people smugglers’ (Humphrey, 2002). Thus rather than alleviate the suffering imposed on refugees by virtue of their situation, various States are going to extreme lengths to undermine the legitimacy of their asylum claims by making invalid character judgments. Similar to human rights, the category of refugee is non-racial; in theory a state is obliged to extend support and assistance to a refugee without racial selectivity. Australia has a history of denying asylum based on race, such as the exclusion of Chinese immigrants during the 1880s, and now this racial exclusion is being inflicted on individuals of Middle Eastern descent based upon them sharing the same ethnicity as Al-Qaeda and Taliban terrorist groups. The racial assumptions that acquaint the Afghani or Iraqi race with terrorism have falsely led to the prolonged detainment and refused asylum of Middle Eastern individuals. Thus terrorism has accelerated the shift in global attitudes toward refugees from one of state moral responsibility to the prioritization of state security over accepting claims for asylum. Whilst viewed as a strategy of counter-terrorism, enhanced border security and the increased conditionality required for refugees to gain asylum disqualifies human rights as a unifying discourse without qualification. The implementation of counter-terrorism strategies by Western nations in reaction to the 9/11 attacks were largely reactionary and centred on enhanced state security to reduce the likelihood of terrorist activity infiltrating national borders. The contemporary manifestation of terrorism represents a clash of civilizations, pitting the culture of Islamic fundamentalism against a Western culture composed of modernity, secularity and democracy (Pojman, 2006). In this clash human rights rests precariously in the middle. On the one hand, terrorism denies victims their rights, yet the enactment of counter-terrorism strategies to address these violations paradoxically impedes on the rights of global citizens. The way in which western countries have responded to the threat of terrorism has not only violated principles of human rights and international law but has also proved to be ineffective in combating terrorism. Almost eight years after the proclamation of the ‘global war on terror’ terrorists are still striking with alarming frequency and ease in our cities: Madrid, London, Sharm el Sheikh, Bali and Mumbai represent the more recent and appalling acts. If our world is in a state of war, why is it that western forces have not been as successful as past governments in achieving victory in similar time periods as in past wars (Hocking and Lewis, 2007)? The First World War was won in five years and the Japanese Empire in World War II was defeated in four years following their attack on Pearl Harbour. Despite all the energies and resources deployed to strengthen the West’s ‘War on Terror’, global terrorism has not lost its power to recruit combatants and inflict destruction on unsuspecting communities (Hocking and Lewis, 2007). In the context of terrorism, war has proven to be ineffective as it fails to address the environment with which terrorism has evolved. Terrorist organizations flourish in societies that have been marginalized by globalization and where there are unresolved conflicts and few accountability mechanisms for addressing political grievances (Hocking and Lewis, 2007). The feeling of despair and sense of hopelessness rooted in oppression, ignorance, poverty and perceived injustice have been identified as causal factors in the development of terrorism. Just as the benefits of globalization and modernity have been unequally distributed so have the capabilities of marginalized populations to gain access to their human rights. Thus to combat terrorism, the implementation of social and economic policy can help to mitigate exclusion and the impact of rapid socio-economic change which foster the grievances which terrorists exploit to gain legitimacy (Hocking and Lewis, 2007). Greater emphasis on counter-terrorism strategies, which address the causal factors of terrorism, will thus increase individual access to human rights and diminish their marginalization and global inequality. Terrorism is a political and criminal activity that undermines the foundation of the contemporary human rights system. It rejects the notion that by virtue of every individual’s humanness they should have access to a host of civil, political and socio-economic rights. The attack of 9/11 exposed security weaknesses of the US, subsequently inducing fear in all western states that they could too be easily targeted by religious extremist factions. Counter-terrorism has aimed to heighten state security often to the detriment of upholding universal principles of human rights. Just as terrorism views all enemy citizens with the same contempt that is there is no distinction between the president and an average citizen, in many regards counter terrorism makes no distinction between terrorists and civilians in that human rights restrictions are imposed on all individuals in states of emergency. Once relied upon as states of human rights advocacy and leadership, western states have legitimized the rejection of human rights under the banner of counter-terrorism. The ‘War on Terror’, increasing surveillance of citizens, restriction of their constitutional rights and the abandonment of state’s moral duty toward asylum seekers symbolizes the dispensability and conditionality of universal human rights. The abrogation of human rights underlying contemporary counter-terrorism practices reflects the limits of the human rights system to neglect in times of emergency, fear and vulnerability.

Wednesday, October 23, 2019

Havells Case

1. Does the proposed acquisition make sense for Havells? Why or why not? Ans: The proposed acquisition makes sense for the following reasons: ? The acquisition of Sylvania will give Havells access to the wide marketing networks of SLI. It will serve as a good channel for marketing Havell’s products in Europe ? Access to the R&D and engineering capabilities of SLI ? Ownership of various brands of Sylvania: Sylvania, Zenith, Linolite, Claude, Concord and Marlin ? Exposure to lighting and lighting fixtures segment, as Sylvania was primarily engaged in this segment whereas Havells had a small presence in the lighting market. . What are the major risks associated with this acquisition? Can these be managed? Ans: Major Risks associated with the acquisition are- Strategic risk is the current and prospective impact on earnings or capital arising from adverse business decisions, improper implementation of decisions, or lack of responsiveness to industry changes. There is a risk that the acquisition fails to bring out the desired synergy. Operational risk is, as the name suggests, a risk arising from execution of a company's business functions. It is a very broad concept which focuses on the risks arising from the people, systems and processes through which a company operates. There is a huge difference in the culture of the two companies which presents a challenge of the integration of the European executives in the Indian team. y Financial risk is an umbrella term for any risk associated with any form of financing. Risk may be taken as downside risk, the difference between the actual return and the expected return (when the actual return is less), or the uncertainty of that return. The acquisition deal of Sylvania was expected to cost more than $200 million, which is a huge amount for Havells. Also there is uncertainty about the returns from the acquisition

Tuesday, October 22, 2019

Viral Marketing Essay Example

Viral Marketing Essay Example Viral Marketing Essay Viral Marketing Essay History Unbalanced scales. svg The neutrality of this section is disputed. Please see the discussion on the talk page. Please do not remove this message until the dispute is resolved. (September 2008) There is debate on the origination and the popularization of the term Viral Marketing, though some of the earliest uses of the current term are attributed to Harvard Business School graduate Tim Draper and Harvard Business School faculty member Jeffrey Rayport. The term was later popularized by Jeffrey Rayport in his 1996 Fast Company article The Virus of Marketing , and Tim Draper and Steve Jurvetson of the venture capital firm Draper Fisher Jurvetson in 1997 to describe Hotmails e-mail practice of appending advertising for itself in outgoing mail from their users. [3] Among the first to write about viral marketing on the Internet was media critic Douglas Rushkoff in his 1994 book Media Virus: Hidden Agendas in Popular Culture. The assumption is that if such an advertisement reaches a susceptible user, that user will become infected (i. e. , accept the idea) and will then go on to share the idea with others infecting them, in the viral analogys terms. As long as each infected user shares the idea with more than one susceptible user on average (i. e. , the basic reproductive rate is greater than one the standard in epidemiology for qualifying something as an epidemic), the number of infected users will grow according to a logarithmic curve, whose initial segment appears exponential. Of course, the marketing campaign may be wildly successful even if the rate at which things are spread isnt of epidemic proportions, if this user-to-user sharing is sustained by other forms of marketing communications, such as public relations or advertising. Among the first to write about algorithms designed to identify people with high Social Networking Potential is Bob Gerstley in Advertising Research is Changing. Gerstley uses SNP algorithms in quantitative marketing research to help marketers maximize the effectiveness of viral marketing campaigns. In 2004 the concept of Alpha User was released to indicate that it had become ow possible to technically isolate the focal point members of any viral campaign, the hubs who are most influential. Alpha Users can today be isolated and identified, and even targeted for viral advertising purposes most accurately in mobile phone networks, as mobile phones are so personal. In response to its use, many sites have started up trying to describ e what viral marketing is and to offer viral marketing services as an outsourced extension of a business. [citation needed] [edit] Notable examples * The Ponzi scheme and related investment Pyramid schemes, are early examples of viral marketing. In each round, investors are paid interest from the principal deposits of later investors. Early investors are so enthusiastic that they recruit their friends resulting in exponential growth until the pool of available investors is tapped out and the scheme collapses. * Multi-level marketing popularized in the 1960s and 70s (not to be confused with Ponzi schemes) is essentially a form of viral marketing in which representatives gain income through marketing products through their circle of influence and give their friends a chance to market products similarly. Multis include Amway and Mary Kay Cosmetics among many others. * Early in its existence (perhaps between 1988 and 1992), the television show Mystery Science Theater 3000 had limited distribution. The producers encouraged viewers to make copies of the show on video tapes and give them to friends in order to expand viewership and increase demand for the fledgling Comedy Central network. During this period the closing credits included the words Keep circulating the tapes! [5] * In 2000, Slate described TiVos unpublicized gambit of giving free TiVos to web-savvy enthusiasts to create viral word of mouth, pointing out that a viral campaign differs from a publicity stunt. [6] * In 2001, BusinessWeek described web-based campaigns for Hotmail (1996) and The Blair Witch Project (1999) as striking examples of viral marketing, but warned of some dangers for imitation marketers. [7] * Launched in 2002, BMW Films was among the earliest viral marketing ampaigns. It attracted nearly 55 million viewers and helped to elevate the career of Clive Owen. * Some accuse Publius Enigma, a series of unusual postings in 1994 that relate to The Division Bell, to be viral marketing to gain attention for the album. * Burger Kings The Subservient Chicken campaign, running from 2004 until 2007, was cited in Wired magazine as a striking example of viral or word-of-mouth marketing. [8] * Cadburys Dairy Milk 2007 Gorilla advertising campaign was heavily popularised on YouTube and Facebook. The release of the 2007 concept album Year Zero by Nine Inch Nails involved a viral marketing campaign, including the band leaving USB drives at concerts during NINs 2007 European Tour. This was followed up with a series of interlinked websites revealing clues and information about the dystopian future in which the album is set. * In 2007, World Wrestling Entertainment promoted the return of Chris Jericho with a viral marketing campaign using 15-second cryptic binary code videos. The videos contained hidden messages and biblical links related to Jericho, although speculation existed throughout WWE fans over whom the campaign targeted. 9][10] The text Save Us and 2nd Coming were most prominent in the videos. The campaign spread throughout the internet with numerous websites, though no longer operational, featuring hidden messages and biblical links to further hint at Jerichos r eturn. [11][12] * In 2007 the New York Times advertising columnist Stuart Elliott wrote about a business-to-business viral campaign for a software company, showing that viral advertising has application in areas outside of consumer marketing. [13] * In 2007, Portuguese football club Sporting Portugal integrated a viral feature in their campaign for season seats. In their website, a video required the user to input his name and phone number before playback started, which then featured the coach Paulo Bento and the players waiting at the locker room while he makes a phone call to the user telling him that they just cant start the season until the user buys his season ticket. [14] Flawless video and phone call synchronization and the fact that it was a totally new experience for the user led to nearly 200,000 pageviews phone calls in less than 24 hours. [citation needed] * Avirginsplea. om claimed that a 25-year old virgin living in Toronto named Geoff needed five million hits on his website in 30 days in order for Jenn, one of his very hot platonic female friends, to help him lose his virginity. * The 2008 film Cloverfield was first publicized with a teaser trailer that did not advertise the films title, only its release date: 01Â ·18Â ·08. Elements of the viral marketing campaign included MySpace pages created for fictional characters and websites created for fictional companies alluded to in the film. The Big Word Project, launched in 2008, aims to redefine the Oxford English Dictionary by allowing people to submit their website as the definition of their chosen word. The viral marketing project, created to fund two Masters students educations, attracted the attention of bloggers worldwide, being featured on Daring Fireball and Wired Magazine. [15] * The marketing campaign for the 2008 film The Dark Knight combined both online and real-life elements to make it resemble an alternate reality game. Techniques included mass gatherings of Joker fans, scavenger hunts around the world, detailed and intricate websites that let fans actually participate in voting for political offices in Gotham City, hidden phone numbers and websites in the queue lines of The Dark Knight roller coasters at Six Flags Great America and Six Flags Great Adventure, and even a Gotham News Network that has links to other Gotham pages such as Gotham Rail, a Gotham travel agency, and political candidates pages. The movie also markets heavily off of word of mouth from the thousands of Batman fans. Both the second and third games in the Halo series were preceded with viral marketing in the form of an alternate reality game called I Love Bees for the second game, and Iris for the third game. * In December 2009, podcasters of The Mike OMeara Show launched a viral marketing campaign on Facebook to encourage others to download the show. * Between December 2009 and March 2010 a series of seven videos were posted to YouTube under the name iamamiwhoami leading to speculation that they were a marketing campaign for a musician. In March 2010, an anonymous package was sent to an MTV journalist claiming to contain a code which if cracked would give the identity of the artist. [16] The seventh video, entitled b, appears to feature the Swedish singer Jonna Lee. [17][18][19][20] * On July 14 2010, Old Spice launched the fastest growing online viral video campaign ever, garnering 6. 7 million views after 24 hours, ballooning over 23 million views after 36 hours[21]. Old Spices agency created a bathroom set in Portland, OR and had their TV commercial star, Isaiah Mustafa, reply to 186 online comments and questions rom websites like Twitter, Facebook, Reddit, Digg, Youtube and others. The campaign ran for 3 days[22]. [edit] Viral Marketing Services Viral marketing services (VMS) include full service marketing, advertising, and media brokerage. There are outsourced companies hired for these services. Like other professional niches, (i. e. lawyer, accountant, IT), companies are now being sought for their professional insight and expertise in Guerilla marketing strategies and advanced Internet and mobility technology in the hopes of providing more leads, sales, and profits than traditional marketing service providers. A VMS company will typically create impressions for a very specific market or audience as defined by a client. The more impressions created for a client, the greater the chance of increasing prospective customer awareness of the client’s products or services. A VMS company’s basis of success is based on the ability to successfully leverage many forms of media to create a large market presence for the client. A VMS company is not responsible for searching out leads. Rather, they are responsible for creating leads through brand recognition by means of market branding and innovative advertising services. edit] Methods * Internet Search Engines Blogs * Target Marketing Web Services * Social Media Interconnectivity * Industry specific organization contributions * Television Radio * Multiple forms of Print and Direct Marketing * SEO Web Development * Customer Participation Polling services * Outbound/Inbound Call Center Services * Mobile SmartPhone Integration VMS target m arketing is based on three important principals: 1. Social Profile Gathering 2. Proximity Market Analysis 3. Real-Time Key word Density Analysis By applying these three important disciplines to an advertising model, a VMS company is able to match a client with their targeted customers at a cost effective advantage. [edit] Motivations Products and services change as consumers demand change. Because of this, businesses have recognized that the method of marketing must change. Marketing is about putting your business in front of the largest interested audience for the lowest cost per viewer. In the early 20’s, radio was the means of reaching a mass audience followed by television in the late 40’s. Television would maintain the number one spot in terms of mass audience advertising until the Internet took hold in the mid-90’s. Now people are sharing information, collaborating on topics of interest, and networking on the internet in ways not previously imaginable. [edit] Statistics * Two thirds of the world’s Internet population now visit a social network or blog site weekly[23] * 220+ million people visit the top 25 social networks each month[24] * Facebook alone has 500+ million active users[25] Social media Internet traffic has exceeded adult entertainment sites * Time spent visiting Social media sites now exceeds time spent emailing[26] * Consistent polls reflect that 89% of people forward news, events, and vendor specific information to people in their network. [27] * 59% of adults polled state that they use their cell phone to remain connected with their social network[28] Because of statistics such as these, companies – big or small – have seen to it that viral marketing services are integrated into their company. Because the cost per impression is typically much lower in comparison to other forms of media, businesses have been able to reach a very large buying audience at a lower cost when compared to other forms of available media. [edit] Techniques Many companies simply embed key words on their web site to support Search Engine Optimization best practices in order to receive a high ranking on Google in the hopes of building a strong internet business. However, this is only one component to capitalizing on the power of viral marketing. Viral marketing is about connections. The more quality connections a company can make, the more business impressions they will create. The more business impressions they create the higher likelihood that a consumer (or other business requiring a service) will make contact to purchase a good or service. By use of a social profile gathering system, a VMS company is able to create interconnections with web sites and social media groups specific to the client’s market audience. In addition to the more common social media web sites (LinkedIn, Facebook, etc. , the internet is home to over 300,000 social community web service providers. Each of these social community web service providers have from 5 million to 50 million active users thus creating a large community of active consumers. By actively maintaining an extensive analytical database of these connections, a VMS goal is to be able to successfully match a business with the targeted buyers. Technology is the tool that allows b usinesses to moderate, manage, and automate communication with the global scale of Internet users. VMS technology incorporates artificial intelligence which allows a system to communicate with a prospective buyer via their phone (voice), SMS (Text Message), blog site, or email. Without having this level of sophisticated technology in place, a VMS company would be unable to manage the large amount of users and leads available on the Internet; but because of the advancements of technology, targeted campaigns can meet the goals and requirements of businesses from all over the world.

Monday, October 21, 2019

Key Elements Of Relationship Survival †Psychology Essay

Key Elements Of Relationship Survival – Psychology Essay Free Online Research Papers Key Elements Of Relationship Survival Psychology Essay I believe there are several key elements that are needed in order for a relationship to survive and without these elements a relationship could be subject to failure. When a person thinks of a relationship, they begin to think of what they would want, need or how they could possibly benefit from it. However, while thinking of reaping for themselves, they fail to think about the other person. The needs of one person may not be the same needs as the other person this leads to the fact that we are all different. However, there are several elements in a relationship that we all have in common and can also relate to. It is important to have some one to share your life with. Some don’t believe in relationships and would prefer to be alone. While I am one who feels that having some one is a part of growing in life, getting older, raising a family; I will enlighten those who don’t believe in relationships the importance of them and the key elements that will assist in holding a strong relationship together. Those elements are attraction, friendship, respect, love, trust, security, intimacy, and the hardest of them all finance. I will now explain my beliefs on how without these elements a relationship is destined for failure. ATTRACTION When a person meets someone the first thing that is distinguished is the way that person looks. Is he or she attractive or not and the answer is usually quick and automatic, it is as though we are programmed with this distinction. Sometimes, after we have made our decision about that person, our conclusion could infer whether we even want to make friends with that person. For instance, if a person is not attractive and has a bad attitude another person may not be very drawn in or comfortable with getting to know that person. However if a person is attractive and has a nice attitude another person may feel more comfortable with communicating and possibly getting to know that person thus establishing an acquaintance that in time develops into a friendship or something more serious. In other words, there is certain criterion that has to be met even before friendship is established. Attraction is a necessary factor in the beginning of a relationship. FRIENDSHIP When friendship is finally initiated the responsibility for keeping a friendship is not difficult as long as the two people are honest and loyal. They have to be good listeners and they have to kindness and compassion for the other person. What I look for in a friend is someone who could be there when I need them and that person does not mind sharing, giving, understanding and being trustworthy and in return I would give that person the same treatment. In a relationship, not only is it a wonderful asset to have friendship but it is also one of the key elements for relationship survival. RESPECT Many people are familiar with the word respect, special thanks to a well known and heavily praised singer and songwriter by the name of Aretha Franklin. Mrs. Franklin’s song spelled out the word R.E.S.P.E.C.T and the singer explained what it means to her. What does respect mean to you? Everybody carries their own personal definition to the word respect. Not just the textbook meaning but what the word really means to you, my idea of respect is do unto others as you would have them do unto you. It is pretty self explanatory, if you like to be treasured then treasure the person you are with. Respect to me is taking the time to bare with a persons feelings if you are having a hard time understanding that person respect them with patience. If you are angry with a person respect that person by not lashing out in anger to cause harm to that person. Respect is not hitting someone, if a person hits someone they are in a relationship with they do not respect that person and neither doe s that person have respect for themselves. A relationship needs respect to move two people closer together, when a person realizes they are very well respected by another person they begin to feel trust. TRUST Trust is the heart of a relationship. â€Å"†¦trust is the belief by one person that anothers motivations towards them are benevolent and honest.† (www.wikipedia.com) I believe that without trust there may as well not be a relationship at all. For instance, someone cheats on their partner but they do not break up with each other the victim may forgive the cheater, however the victim never forgets what the cheater has done. Consequently the relationship is damaged. When the cheater, who is no longer a cheater, leaves home for a walk to the mailbox, the victim is on edge and uncomfortable. The victim is afraid that the used-to-be-cheater is going to cheat again. Going to the mailbox is not nearly enough to worry about but lack of trust can turn the mind of the victim to an obsessive accuser and no one likes to be accused of things all of the time. Without trust, a relationship will burn down and there will not be any pieces left over to gather up and try to put back toget her. Trust is a strong key element of a relationships survival. FINANCE An explanation for finance is usually not needed, but I will state my belief regardless. Marital conflicts arise not because of money itself, but because of a couples differing emotions about money. (â€Å"More Than Just Money† By. Suzanne Woods Fisher, Christianity Today, Spring 2003 Issue.) Without money or the support of money a relationship turns pretty unsteady. â€Å"†¦but they soon find out that money is a tie that can bind more tightly and more painfully than any marriage license.† (â€Å"Before ‘I Do’ Don’t Do This† By. Jeff Opdyke, Love and Money, Wall Street Journal.) Knowing that someone is broke all the time, some people really do not participate in wanting to be in a relationship with that type person. It is not that they are considered as â€Å"gold diggers† or people who are all about money but everyone needs a little financial back up sometimes. Although being careful with spending and other joint efforts fin ancially are also very important. For the love of money is a root of all kinds of evil (The Holy Bible 1 Timothy 6:10). Having sure finances is very helpful in keeping a relationship stable and secure. INTIMACY An intimate relationship is an interpersonal relationship with a great deal of physical and/or emotional intimacy. It is usually characterized by romantic or passionate love and attachment. Sexuality may or may not be involved. (www.wikipedia.com) When adding all of these key elements together two people will be able to ascertain intimacy. Intimacy is a beautiful feeling shared between two people that can lead to lots of wonderful moments in life one of those moments is the art of being in love. Some people mistake intimacy for sex, true enough it is a part of it but in a good relationship that has all of the key elements sex usually follows falling in love. Everybody loves to be caressed with caring and love. Intimacy is a valuable key element in a relationship. LOVE This is the final factor that is not so final because I believe that during the creation of all of the key elements love is perfectly filled in to all of the blanks. Love has several different meanings in the English language, from something that gives a little pleasure (I loved that meal) to something for which one would die for (patriotism, pair-bonding). It can describe an intense feeling of affection, an emotion or an emotional state. In ordinary use, it usually refers to interpersonal love. As an experience usually felt by a person for another person, it is commonly considered impossible to describe. Dictionaries tend to define love as deep affection or fondness†¦ (www.wikipedia.com) In conclusion, if a person ever wonders, through lacking any of the key elements of relationship survival, â€Å"Why am I still with this person?† They can always refer to this element. People go through lots of pain, lacking these important elements at times, but the greatest element of them all could be the reason we all continue to endure, enjoy, or unfortunately lose who we really are, and that element is love. Love is the strongest key element of relationship survival. shawndrell0904@aol.com Research Papers on Key Elements Of Relationship Survival - Psychology EssayThree Concepts of PsychodynamicComparison: Letter from Birmingham and CritoThe Fifth HorsemanMind TravelResearch Process Part OneCapital PunishmentHarry Potter and the Deathly Hallows EssayThe Relationship Between Delinquency and Drug UseWhere Wild and West MeetAnalysis of Ebay Expanding into Asia

Sunday, October 20, 2019

Hafnium Facts (Atomic Number 72 or Hf)

Hafnium Facts (Atomic Number 72 or Hf) Hafnium is an element that was predicted by Mendeleev (of periodic table fame) before it was actually discovered. Here is a collection of fun and interesting facts about hafnium, as well as standard atomic data for the element: Hafnium Element Facts Fresh, pure hafnium is a metal with a bright, silvery luster. However, hafnium oxidizes to form a beautiful rainbow colored surface effect.Mendeleev predicted the existence of hafnium in a report he prepared in 1869. It was one of two non-radioactive elements believed to exist, but not verified. It was finally discovered in 1923 by Georg von Hevesy and Dirk Coster by using x-ray spectroscopy on a zirconium ore sample. The element name honors the city of its discovery (Hafnia is the old name for Copenhagen).As you might expect, hafnium is not found free in nature. Instead, it forms compounds and alloys. Because the two metals share similar occurrence and properties, hafnium is extremely difficult to separate from zirconium. Most hafnium metal has some degree of zirconium contamination. Although hafnium is found with ores (mainly zircon and baddeleyite), it is not as reactive as most transition metals.When hafnium is powdered, the increased surface area improves its reactivity. Powdere d hafnium readily ignites and may explode. Hafnium finds use as an alloying agent for iron, titanium, niobium, and tantalum. It is found in integrated circuits, vacuum tubes, and incandescent lamps. Hafnium is used in nuclear reactors, mainly as nuclear control rods because hafnium is an exceptionally powerful neutron absorber. This is one significant difference between hafnium and its sister element zirconium zirconium is essentially transparent to neutrons.Hafnium in its pure form is not particularly toxic, but it does represent a health hazard, particularly if inhaled. Hafnium compounds should be handled with care, as should any transition metal compound, because the ionic forms be dangerous. Only limited testing has been done on the effect of hafnium compounds in animals. All that is really known is that hafnium usually exhibits a valence of 4.Hafnium is found in the gemstones zircon and garnet. Hafnium in garnet may be used as a geochronometer, which means it can be used to date metamorphic geological events. Hafnium Atomic Data Element Name: Hafnium Hafnium Symbol: Hf Atomic Number: 72 Atomic Weight: 178.49 Element Classification: Transition Metal Electron Configuration: [Xe] 4f14 5d2 6s2 Discovery: Dirk Coster and Georg von Hevesy 1923 (Denmark) Name Origin: Hafnia, the Latin name of Copenhagen. Density (g/cc): 13.31 Melting Point (K): 2503 Boiling Point (K): 5470 Appearance: silvery, ductile metal Atomic Radius (pm): 167 Atomic Volume (cc/mol): 13.6 Covalent Radius (pm): 144 Ionic Radius: 78 (4e) Specific Heat (20Â °C J/g mol): 0.146 Fusion Heat (kJ/mol): (25.1) Evaporation Heat (kJ/mol): 575 Pauling Negativity Number: 1.3 First Ionizing Energy (kJ/mol): 575.2 Oxidation States: 4 Lattice Structure: hexagonal Lattice Constant (Ã…): 3.200 Lattice C/A Ratio: 1.582 Hafnium Fast Fasts Element Name: HafniumElement Symbol: HfAtomic Number: 72Appearance: Steel gray metalGroup: Group 4 (Transition Metal)Period: Period 6Discovery:Â  Dirk Coster and George de Hevesy (1922) Sources Hevesy, G. (1925). The Discovery and Properties of Hafnium. Chemical Reviews. 2: 1–41. doi:10.1021/cr60005a001Greenwood, Norman N.; Earnshaw, Alan (1997). Chemistry of the Elements (2nd ed.). Butterworth-Heinemann. pp. 971–975. ISBN 0-08-037941-9.Lee, O. Ivan (1928). The Mineralogy of Hafnium. Chemical Reviews. 5: 17–37. doi:10.1021/cr60017a002Schemel, J. H. (1977). ASTM Manual on Zirconium and Hafnium. ASTM International. pp. 1–5. ISBN 978-0-8031-0505-8.Weast, Robert (1984). CRC, Handbook of Chemistry and Physics. Boca Raton, Florida: Chemical Rubber Company Publishing. pp. E110. ISBN 0-8493-0464-4.

Saturday, October 19, 2019

Wireless ad hoc network management Essay Example | Topics and Well Written Essays - 1000 words

Wireless ad hoc network management - Essay Example Until the completion of implementation, the ICT director informed me that the questions I was posing were irrelevant. They were irrelevant because they were related to operational automatic network management systems, currently not in place in our organization.Accordingly, the information collected from the ICT director, and which determined the direction of this report, centered around the management of wireless ad hoc networks and policy-based management frameworks.In designing and deciding upon a wireless ad hoc network management system, it is important to keep an eye on the desirable operational features sought in a management system for deployment in a wireless ad hoc network environment. These features, as elucidated by the ICT director and supported in the literature on the topic, are discussed below.According to Tian and Cox (2004), any network management system involves a certain amount of additional control traffic to regulate the various operational characteristics of the network. In bandwidth-constrained wireless networks, it is extremely important to minimize this signaling overhead, ensuring that the links are not congested with management traffic. Thus, as Cardei, Cardei and Du (2005) emphasize, the constrained bandwidth in wireless ad hoc networks greatly influences the choice of the mechanisms or protocols used for the various managerial tasks.Ad hoc networks generally have nodes with limited battery life, and may have limited storage and/or processing capabilities (Zhang, Hu and Fujisu, 2006). Hence, as emphasized by the ICT director, the organization needs a management system that does not burden the resource-limited network nodes with undue storage and processing requirements. Efficient signaling and minimal computation requirements will substantially alleviate the demand on the limited battery power. 2.3 Automated, Intelligent and Self-Organizing The ability for self-organization is one of the key aspects in the successful deployment of any application in an ad hoc network environment. Indeed, as our ICT Director stressed, given the dynamic nature of most ad hoc networks, an adaptive management framework that automatically reacts to changes in network conditions is required. In order to accomplish this, the management system should be able to automatically learn about the diverse capabilities of the nodes involved, and use this information as one of the criteria to assign appropriate roles to the different types of nodes. The implication here is that, as Zhang, Hu, and Fujisu (2006) stress, dynamic policies need to be supported for automated network control based on dynamic re-evaluation of communication capabilities and assets of an ad hoc network. 2.4 Secure and Robust Finally, an ad hoc network management system should be secure and robust. It should allow secure exchange of management data among authorized users, and enhance the overall survivability of the network (ICT Director). This may require the means to authenticate and authorize users, and support encryption capabilities. In addition, the system should allow reliable transmission of management data with means to detect failure and provide fault-tolerance (ICT Director). 3.0 Policy-Based Network Management In designing and deciding upon our network management architecture, our ICT Department was guided by the concerns outlined in the preceding section. Using these concerns as a roadmap for the determination of the format of our organization's ideal network management system, the ICT department identified policy-based network systems as the optimal option. The reason lies in that

Friday, October 18, 2019

Research and Report on Ecotourism Essay Example | Topics and Well Written Essays - 250 words

Research and Report on Ecotourism - Essay Example Promoting interaction with natural environment is an upcoming ecotourism style that attracts more guests. Florida Eco-Safaris promotes the trend through provision of nighttime canopy line tours and horseback horse riding that entertains and educates visitors. Bison Quest, located in Montana also attracts more guests through delivery of interactive experience with bison. Thus, the organization promotes conservation while maintaining intrinsic bison tradition. In addition, ecotourism companies appeal to more people by offering family retreat services. For instance, Deep Creek Lake Tours in Maryland deliver exclusive family eco-friendly holiday and Child guided hikes. Space tourism refers to travelling to the space for leisure determinations. It is a futuristic idea, however, substantial professional work support the activity. A space attraction includes experience of buoyancy and exciting views of the Earth (Kortenkamp 5). Nonetheless, creating successful infrastructure will facilitate the development of the industry. Perhaps, space tourism is an emerging and luxurious travel specialty, which involves use of suborbital flights. Up to date, an alliance of the National Space Society is progressing legislation to modernize the activity. Besides, XCOR Aerospace and Virgin Galactic are working towards establishing space tourism

Should adults be charged in situations where teenagers are drinking or Essay

Should adults be charged in situations where teenagers are drinking or have been drinking in their presence - Essay Example Many countries around the globe have kept a legal standard where minors are not allowed to gain access to alcohol (as sellers are bound not to sell to the under-aged). These restrictions are dodged by these minors as the under aged tend to acquire alcohol easily through numerous methods. There are many instances within the United States of America that parents of these minors are the providers of alcohol to their own children. This act is done by them to ensure that their children consume alcohol within their house rather than going out and fetching is from some unauthorized bootleggers. Parents in such cases tend to keep their children safe by providing them alcohol within the house so that their children should stay out of trouble by stepping out of their houses and getting involved in some kind of misdemeanor. Such an act is questionable by authorities and usually if such cases are found or caught where parents or any other adults are involved in contributing towards the delinquen cy of a minor, those adults or parents are held responsible both on civil as well as criminal basis. Lack of evidence is always the case where adults or parents escape the charges of supporting minors in acquiring alcohol.

Thursday, October 17, 2019

Marketing research Essay Example | Topics and Well Written Essays - 1500 words

Marketing research - Essay Example ?†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦11 Marketing Research Project: Coffee Shops – A Pilot Usage and Attitude Study Introduction: Coffee shops are commonly defined as establishments that primarily serve prepared coffee along with light snacks. From a cultural point of view, coffee shops serves as centres of social interaction where individuals especially youths are provided with a place to congregate, talk, read, write, entertain one another. As defined by Mintel (2009), coffee shops are shops where â€Å"coffee is the primary sales item. They are based on the European and North American coffee shop models, typified by Starbucks, Costa Coffee, Cafe Nero and Coffee Republic and offer a wide variety and different types of coffee, e.g. cappuccino, latte, mocha, etc. Other items are usually on sale, such as pastries, tea, coffee beans, etc. Ho wever, the food offer may be restricted.† Further, the operational venues of these coffee shops are also of relevance: â€Å"Coffee shops include venues such as individual stores, kiosks and concessions. These may operate in a number of locations – motorway service areas (MSAs), health clubs and hospitals, for example. However, they must be independent of the facility they are located in.† (Mintel, 2009) This paper briefly addresses the report of a pilot study on the usage and attitude of coffee consumers, especially young consumers. The data collection for the survey report has mainly been conducted in big coffee shop brand names such as Starbucks and Costa Coffee from the localities of London. The data was collected from 20 young people aged 18 and above, along with a well-structured questionnaire designed on the basis of the usage and attitude of the young coffee consumers. Moreover, the paper looks into the broader picture of coffee shops market in the UK. It briefly provides the current scenario of the UK coffee shops market, which is now considered a booming market contributing remarkably to the UK economy. While competition is getting tougher, the usage and attitude of the young coffee consumers are becoming significantly essential for the coffee shops in order to accomplish competitive advantage. Methodology: Coffee shops are growing faster and wider, thanks to the novel process of globalisation. With the level of market competition growing fast, there is also a growing need of more variables to be included in the market analysis of coffee shops. The study included in this paper is a pilot survey designed to test the questionnaire and the survey approach and to produce some exploratory information which may be of interest to marketing decision makers. The survey conducted for the purpose comprised of 20 young people (aged 18 and above) and students, to be administered by respondent self-completion. In order to explain the behavioura l and attitudinal information of the young consumers of coffee shops, the survey has collected data from both males and females, and coffee shop users and non-users as well. Research objectives:

Other topic Essay Example | Topics and Well Written Essays - 750 words - 1

Other topic - Essay Example Since earlier films were often limited by finances, actions and time, their production sometimes do not show the whole story. For instance, Stephen King’s â€Å"Christine† has several differences in the novel and the film. Changes in the story may either make it better or worse and in the case of King’s novel, perhaps due to time constraints, some omissions weakened the story. In the following paragraphs, changes in the movie such as the setting, Arnie’s physical description, the omissions of the characters of Sandy Galton, Buddy Repperton’s friend and Jimmy Sykes, Darnell’s character and the fight between a man and Arnie based from the novel will be discussed in relation to how they affected or not the story’s effectiveness. In the novel, the story is set in Pennsylvania while in the movie, it is in California. The difference in the setting does not make a strong effect on the story because the scenes were set in order to resemble at most the ones described in the story. Moreover, there are perhaps not many cultural or scenic differences between the two places that would have altered the story. In addition, King tells in his novel that Arnie is wears glasses and has pimples. As his friend Dennis describes him, â€Å"Arnie was pimple city† (3). In the movie, although the aforementioned character wears glasses, his face is pimple-free. However, the difference does not make any Arnie a better-looking character in the movie. He is, as depicted in the novel, still a teenager who is the picture of an easy target of the

Wednesday, October 16, 2019

Marketing research Essay Example | Topics and Well Written Essays - 1500 words

Marketing research - Essay Example ?†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦11 Marketing Research Project: Coffee Shops – A Pilot Usage and Attitude Study Introduction: Coffee shops are commonly defined as establishments that primarily serve prepared coffee along with light snacks. From a cultural point of view, coffee shops serves as centres of social interaction where individuals especially youths are provided with a place to congregate, talk, read, write, entertain one another. As defined by Mintel (2009), coffee shops are shops where â€Å"coffee is the primary sales item. They are based on the European and North American coffee shop models, typified by Starbucks, Costa Coffee, Cafe Nero and Coffee Republic and offer a wide variety and different types of coffee, e.g. cappuccino, latte, mocha, etc. Other items are usually on sale, such as pastries, tea, coffee beans, etc. Ho wever, the food offer may be restricted.† Further, the operational venues of these coffee shops are also of relevance: â€Å"Coffee shops include venues such as individual stores, kiosks and concessions. These may operate in a number of locations – motorway service areas (MSAs), health clubs and hospitals, for example. However, they must be independent of the facility they are located in.† (Mintel, 2009) This paper briefly addresses the report of a pilot study on the usage and attitude of coffee consumers, especially young consumers. The data collection for the survey report has mainly been conducted in big coffee shop brand names such as Starbucks and Costa Coffee from the localities of London. The data was collected from 20 young people aged 18 and above, along with a well-structured questionnaire designed on the basis of the usage and attitude of the young coffee consumers. Moreover, the paper looks into the broader picture of coffee shops market in the UK. It briefly provides the current scenario of the UK coffee shops market, which is now considered a booming market contributing remarkably to the UK economy. While competition is getting tougher, the usage and attitude of the young coffee consumers are becoming significantly essential for the coffee shops in order to accomplish competitive advantage. Methodology: Coffee shops are growing faster and wider, thanks to the novel process of globalisation. With the level of market competition growing fast, there is also a growing need of more variables to be included in the market analysis of coffee shops. The study included in this paper is a pilot survey designed to test the questionnaire and the survey approach and to produce some exploratory information which may be of interest to marketing decision makers. The survey conducted for the purpose comprised of 20 young people (aged 18 and above) and students, to be administered by respondent self-completion. In order to explain the behavioura l and attitudinal information of the young consumers of coffee shops, the survey has collected data from both males and females, and coffee shop users and non-users as well. Research objectives:

Tuesday, October 15, 2019

Cold war and Aid to africa during cold war Essay

Cold war and Aid to africa during cold war - Essay Example The group was divided into two that is those who wanted a military action of invasion to take place and those who advocated for a diplomatic action of eradicating the missiles. After eight days the US president organized a blockade of Cuba and all the military forces in the US were prepared to launch the blockade according to Bostdorff (63). This led to a more tension between the US and the Soviet Union thus intensifying the cold war. Flights of reconnaissance continued to take spy over Cuba and the same time the two nations that is US and the Soviet Union continued to exchange warnings. Finally the Soviet Union President Khrushchev declared the countries withdraw of the missiles from Cuba according to D'Anieri (54). As a result the United States also withdrew its missiles from Turkey which threatened the Soviet Union. After the Cuban Missiles crisis a hotline was installed between the two nations so as to resolve such treats in the future. Kennedy’s Assessment of Handling the Crisis and the Various Kinds of Advice Given Kennedy’s later assessment of the Cuban crisis was that if he has decided to follow the advice of the military force on the issue the US would have failed in handling the Cuban Missile crisis leading to the painful crisis ever. During the various white houses meeting Kennedy held with his advisers, he received various options regarding the solution to the crisis. Kennedy chose his advisers from various areas in order to gain a wide range of proposals according to Siracusa (67). On the first day of the first meeting, everyone in the meeting advocated for bombing of Cuba. However Kennedy and others favored a surgical attack which they considered equal to the scale of attack from the Soviet Union. By the third day of the crisis an advice came from the Secretary General of states who suggested a US surprise attack to Cuba. The Executive Committee (ExComm) itself had six solutions which it advised the president on concerning the Cuban missiles one of them was taking no action which would put the country in danger and make the president look weak. The second was appealing for help from the United Nations but could not work since the then UN chairman of its security councils was from the Soviet Union. The third option was a secret approach to Castro, however this could not work since the weapons were possessed by Soviet Union not Castro. Their other possible advice was an attack on Cuba through this would lead to nuclear war according to Bostdorff (54). The fifth advice was to undertake a surgical air strike which would eliminate all missile sites. However this would have led to third world War, therefore the most favored advice of the ExComm was the blockade which was aggressive enough and gave Khrushchev a second thought on the crisis. Aid to Africa during and After the Cold War During the cold War Donors geographical political objectives weakened the worthiness of threats to determine distribution of aid based o n the adoption of the democratic modifications. Particularly during this period, aid to African countries was mostly allocated based on political allegiance as opposed to performance as suggested by Segell (206). As a result this caused abuse and other cases absolute theft of world wide assistance by the fraudulent government official. Strategic alliance was the major driving force in development assistance since the security imperatives controlled the

Monday, October 14, 2019

HR Strategic aspects of the labour market and Managing organisational performance Essay Example for Free

HR Strategic aspects of the labour market and Managing organisational performance Essay The economic events occurring during the last two decades provide indications and evidences that the area of human resourcing has significantly changed in response to the emerging complexities of the discipline. Perhaps, among the primary components of corporate organization, the dynamics of human resourcing appear to be the most challenging as well as complex. Experts in the area of Human Resource Management (HRM) invariably agree that the surging demand for a new organizational role for the human capital. Even the usually common terminologies used to describe the HRM processes, such as labor contracting, training and development, performance evaluation, have been recycled to outsourcing, learning and growth or performance management systems. Many even replaced, such as personnel to human resource to human capital, to describe in more sophisticated way, the new character of human resourcing. Still, HRM practitioners are of the opinion that changes will continue to pervade the HR area and may soon take or evolve into new competencies again. Torrington’s Views: The HRM discipline and the Labour market Torrington presents the burgeoning labour issues confronting many organizations as propounded by theorists and practitioners. Indeed, the complexities of human resourcing are invariably revealed in the documented HR practices compiled by the author, who has been keenly observing that the area of human resource management is beginning to undergo a form of transformative process where the task s, positions and the organization virtually mutates into its more sophisticated form. Based on data provided by the author and taken from a report, there is a general shortage of workers especially the young sector. In the area of healthcare, the National Health Service (NHS) is spending ? 1bn annually on temporary, agency and locum staff. According to Laing and Buisson, well known heathcare analysts, the demand for agency staff is expected to increase across public and private healthcare sector in response to the long-standing manpower shortages in practically every healthcare occupation. The author adds that the size of the market for manpower has risen by more than four times during the two decades commencing from 1992. Even the NHS had to triple their budget expenditures during the same period. Torrington estimates this sector is worth ? 2. 4bn in the market. However, the core of the problem has shifted to the quality of care that many temporary staff provide, thus the decision to reduce manpower outsourcing, Here, the need to get better deals from agencies is becoming paramount as new alternatives of human resourcing in this sector is being addressed. The author concludes by proposing an appropriate response system through flexible staffing solutions. Torrington highlights the strategic aspects of resourcing to respond effectively to the critical messages demanded and manifested by the labor market trends. Here, he analyzes the need to adopt certain flexible resourcing choices that will focus attention either to the ready-made or home grown human capital. The labor market trends bespeak of the dilemma faced by the human resourcing industry in general. A number of recommendations are provided to address this set of HR issues – the retention strategy. The retention indicators point to a disturbing trend at the charts. The issue of retention and its corresponding techniques and strategies has been brought into the open as a result of the need to assuage the cost of transfers, job and even career shifts. The author brings the issue of turnover rates and trends as indicative of HR instability in many sectors while exacting some forms of costs on the organization as a result of new rounds of resourcing and the need to adopt staff retention strategies. Torrington insists that organization strategies versus HR strategy issues not only should be HR-driven but primarily must mutually provide a perfect fit. The author discloses the strategic aspects of performance how these are driven by HR policies and processes as practiced. This is implied to mean that a change in perspective be made in the human resourcing function: from taking control of the employment processes to a more significant HR function of managing performance. True enough, this shift in focus may have been long wanted to smoothen human capital transitions to work excellence. This further suggests that efforts are better spent on ensuring that performance management becomes the primary driver of the HR function. A number of firms have found better insights into this form of HR shift considering that the new HR performance processes adds relevance and more meaningful roles for HR theorists and practitioners rather than just the documentary and aspect legalese of human resourcing. The author proposes the adoption of a performance management system that translates into organizational performance anchored on the knowledge and learning processes as HR initiatives. Here, the proactive roles expected of the HR practitioners are deemed directed towards gradually converting the company into a learning organization where the human capital competencies are planned, managed and nurtured. Performance management system indeed is a critical need as with the 360 degree feedback system. Conclusion Torrington proposes a two-dimensional performance appraisal system based on individual and team perspectives. He emphasizes management of employee performance guided towards organizational and personal goals and objectives and an objective appraisal system to measure extent of accomplishment based on target setting. A sequential and step-by-step approach is propounded with a component critique system based on an overarching 260 degree feedback system. A comparison and contrasting view of performance management system (PMS) and its environment of procedures indicate that the PMS has and is being widely used in organizations out to harness the potentials of its people. The degree of effectiveness indicates the variability of conceptualization and implementation, but nonetheless removes the major irritants in people management that ultimately affect the relationship as well as the performance dimensions of each of the component of the human capital sponsored primarily by senior management. Thus, the proactive nature of the PMS approach entitles it to wider adoption and desirability among organizations aiming to address many of its human resourcing issues. Subject 2 Performance Management System: Linking Organizational Goals Torrington outlines the essential factors in managing organisational performance showing how a Performance Management System (PMS)links to organisational goals. Concrete and abstract benefits and disincentives are identified and benchmarked with industry practices guided by the universal principles and theories of performance management. As practiced, performance management systems commence from the goal and target setting based on the requirements of the job. Here, employees and workers are clarified in the objectives of their positions, the requisite competence, and the learning and growth perspectives if the job as well as the compensation based on how the organization assesses the relative important of the task. The use of the PMS has been tested widely and has proven to be more effective than the traditional evaluation system. This is because of the inclusion of a compendium of measures that ensures that organizational goals are aligned with the specific tasks assigned to the employee. From the targets, agreements on the degree and how these targets are achieved under quality processes are laid down and the PMS target setting contract is accomplished. Thus, the use of the PMS allows the following benefits to accrued to both the worker and the organization: among others, expectations are clear and scope and limitations of the jobs are understood by both sectors; employees can clearly predict and manage their own levels of performance based on targets as well as the needed support to accomplish the tasks; there is an objective system of evaluation and appraisal that removes subjectivity and abstract judgments; when provided with an incentive and reward systems, PMS becomes effective as a tool and basis of rewards and incentives; and, there is a better working relationship between the worker and his superior based on earlier agreements and covenants. Likewise, PMS considers possible constraints and limitations on both sides, thus alternative measures are agreed for the degree of performance resulting from the occurrences of such constraints and impediments. For the organization, the benefits are clear in terms of stronger motivation on the worker; budgeting can be integrated into the system through measurable and appropriate inventive and rewards system; the subsequent appraisal and evaluation system allows for an ideal atmosphere for the discussion of the evaluation and appraisal results to encourage future performance based on areas that additionally needed reinforcement and support. In addition, PMS encourages both individuals and teams to be evaluated based on targets that are aligned with the organizational goals. On the other hand, the disadvantages of adopting a Performance Management System (PMS) includes the requirement for a more detailed procedures and measurement system that may prove to be too elaborate and complex for the worker to understand and appreciate. Likewise, the process of documentation in support of the performance is considered difficult and tedious. Further there is no assurance that performance can indeed by achieved as there may be unforeseen circumstances not considered during the target setting completed before the start of the performance period. (Noe, Hollenbeck, Gerhart, Wright, 2008) Nonetheless, there is a need to study the organizational culture on whether the latter would help the system or otherwise. Conclusion Taking into account the benefits and disadvantages of Performance Management Systems (PMS), the absence of a more measurable, objective and comprehensive system of measuring and evaluating performance is non-existence despite the presence and utilization of good measuring tools and instruments. This is the complexity of the new HResourcing strategy that allows greater flexibility and uniqueness in the approach to managing performance. On the overall, the rationale for adopting PMS far outweighs the need to ignore the benefits provided by this new system. Often, the major constraint in adopting PMS is whether the organizational culture would allow such a change in the system. Thus, the efforts may indeed be tedious, but nonetheless, there is strong desirability in the system that will be more advantageous to every stakeholder in the PMS environment system.

Sunday, October 13, 2019

Factors that Influence Fear of Crime

Factors that Influence Fear of Crime Introduction Today, fear of crime has become a very prevalent and burning issue in the society. There are many people today who express their fear and anxiety over crime and, their concern for being victimized. There are certain factors that shape the level of fear of crime and being victimized of the people. It includes gender; age; any past experience related to crime that an individual can have which could have happened where one lives; ethnicity, etc. There are different ways in which people react to crime. These ways include protecting themselves, avoiding crime, and trying to prevent victimization by not holding anything for which they could be victimized (Will and McGrath 1995). The media also plays a vital and critical role in shaping the amount that people hold of fear of crime. This is due to the reason that media cover crime stories in a very extensive as well as disproportionate way. Although not everyone is a victim of crime but criminal acts touch everyones life (Gray et al 2008). Gender is a significant factor in shaping the level of fear of crime among individuals. It is a known fact that women fear crime more than men. The amount of fear also varies with the age of the individuals, location, social context, TV viewing habits, neighbourhood structure of the individual, and ethnicity. The research problem for the study is to understand the influential factors that shape the view that individuals hold of fear of crime including protection and precaution methods. The research also sheds light on the difference in perception of men and women regarding the fear of crime and what influences that difference. Significance of the research Fear of crime has a huge and profound impact on any society. The choice of people regarding where to live, socialize and shop depends on their relative perceptions of the safety of their neighbourhood, towns and cities. There are different scenarios related to crime against the person of which people are fearful of. The most fearful scenarios differ for men and women. Women are more fearful of crime and being victimized rather than man (Jackson 2006). The research identifies the role of social construction that influences the perception of men and women regarding the fear of crime. Fear of crime can be a result of the latent influences and perception of the individual that he forms of the surrounding environment. The research is significant in terms of these perceptions and factors that influence people, both male and female regarding their personal safety and fear of being a victim of the crime. The research will help in gaining a deep knowledge and understanding of these influentia l factors for fear of crime, and differences in fearing crime by men and women. Research Questions The research questions for the research study are as follows: What different influential factors shape the perception of fear of crime and being victimized of both male and female? Do the social construction surrounding men and women impact their perception and degree of fear of crime? What are the measures used for avoiding or preventing of crime and being a victim and difference in these measures for men and women? Pertaining to the above mentioned research questions, the objectives of the research are framed as follows: To identify different influential factors shaping the perception of fear of crime among men and women. To understand the social construction around men and women, and its impact on their perception of fear of crime. To identify the precautionary measures taken by people for preventing or avoiding crime and difference in these measures for men and women. Review of the past research Fear can be defined as the term that involves a variety and a mix of confused feelings, estimations of risks, perspectives, and thus have different meanings and applications for different people. Crime is a natural phenomenon in the society and the latter cannot be freed from it fully at any time. Fear is a natural response from society and people towards crime. Wynne (2008) mentions the increasing importance and concern for fear of crime in past few decades among criminologists, media, policy makers and general public. There is parallel growth in sensitivity for being a victim of crime and fear of being a victim of crime. Influential factors in fear of crime Scott (2003) mentions that crimes that have an immediate effect on people living in society, such as burglary, robbery, etc. creates a higher degree of fear among individuals rather than the crimes done on a larger scale and on long-term basis. There is no universal definition for fear of crime. It can be defined in various ways, such as a sense of personal security in the society or the community, an emotional response to possible crime that could be violent or any physical harm. Doran and Burgess (2011) argue that constraining daily activity patterns by people due to fear of crime highly influences quality of life. All those affected by fear of crime have the chances of succumbing to the exclusion or social isolation. There is a consistent finding for the relationship between fear of crime and gender. Women are more likely to suffer from fear of crime in comparison to men. There is different meaning of fear of crime for men and women. Men are most likely to be fearful of assaults; women have the highest fear of crime about sexually motivated harm or attack. Shadow of sexual assault is a concept that explains the fear of crime of females. Undoubtedly, women are most concerned about rape and sexual assault, but according to Ferraro (1995), women are fearful of other offences that could occur as a consequence. For instance, women are more fearful about burglary into their home than men; the reason being the probability of occurrence of a sexual attack (Wynne 2008). Furthermore, Gabrosky (2008) claim that rape is considered as a high profile attack that attracts extensive media coverage. This can have a shadowing effect on the perception of women for other kinds of crime against the person. The author led to the conclusion that in order to reduce the fear of crime among women, there must be reduction of fear of being raped. Another influential factor for the fear of crime among individuals is age. There are contradictory findings for the relationship between fear and age. Moore and Shepherd (2007) argue that while previous studies showed elderly people as the most fearful people in the society, recent studies are reporting the opposite of the earlier findings. This shows contradictory findings for the relationship between fear and age. Scott (2003) mentions that older women are less fearful than the younger women for sexual attacks. Moreover, since old people avoid going outside more at night, they are less exposed to fear of crime than their younger counterparts as the young generation spend more time out of their house, and thus are more fearful of assaults. However, elder people are most afraid for mugging and breaking into the house. Physical and social limitations of elderly make them feel vulnerable to the crime. Being a victim of burglary or robbery creates a high level of fear among people of all age (Farrall 2008). Wynne (2008) states that perceived risk of fear of crime has also a relation to the neighbourhood incivilities. Drunken behaviour and alcohol consumption publicly adversely affect the inhabitants of the place. Individuals leaving in an area of neighbourhood incivilities have more constrained daily life activities and behaviour. There is reduced natural surveillance in these areas which increase the level of fear among people and make them adopt constrained life behaviour. Zebrowski (2007) argues that there is also a significant relationship between fear and risk. If an individual thinks of anything that can expose him to the chance of being a victim of a crime, then the perceived risk is high. The chances of being a victim and the assessment of the crime rates in a particular situation and at a particular place evokes fear and perceived risk of being a victim of crime against the person. However, risk is not objective and is shaped by the social and cultural influences. Farrall (2008) sheds light on the role of media, interpersonal communications and knowing a victim in shaping the level of fear of crime among individuals. There is significant effect of hearing stories from people regarding events of crime, media coverage and personal knowing of victims in raising the level of fear of crime and perceived risk of victimization. This leads to an increase in anxiety and the fear of crime. The indirect experience rather than the direct experience plays a more critical role in increasing worries and anxieties about victimization, and fear of crime because media as well as interpersonal communications are obvious resources of getting access to second hand information about the crime. Gender differences in fear of crime Kinsella (2011) states that the patriarchal ideology and the subordination of women are the factors that contributes to the high degree of fear of crime among women. Characteristics, such as independence, autonomy, etc. are considered as inappropriate for women and in the eventuality of a women becoming a victim of crime, these ideas are further mobilized. The above-mentioned characteristics also frame the socialization process for women and the fear of crime among women is related ideologically to the characteristics of feminism that they are being taught in the society. However, Fetchenhauer and Buunk (2005) have stated in their study that women have a higher degree of fear of crime than men, while the rate of victimization among women is less in comparison to their fear of crime against the person. Females are more fearful of every event ranging from burglary, rape, sexual assault, mugging in the street to any kind of physical injury. These gender differences can be attributed to the sexual selection which favours status and risk-taking fights among men, and protection and caution among women. The power control theory assumes that the men are educated to be risk-taking and fearless, while women are educated to be risk-avoiding and fearful. However, the more level of fear of crime in females cannot be attributed to the social stereotypes of male and female. It is the sexual selection of characteristics that leads to the gender differences in fear of crime. Research Methodology Research methodology is an important part of the research report as it gives the explanation of the methods used for the collection of data and the logic behind these methods. Following sections determine the research methodology for the study. Research Approach Deductive research approach is selected for the research study so as to accumulate large volume of qualitative data in respect of the perception of fear of crime among men and women and influential factors that shape the level of fear of crime among individuals. Deductive research approach is helpful in collection of more specific data about the research objectives. It is also helpful in coming to the specific outcomes from generalized results (Crowther and Lancaster 2008). Research Design It assists in identification of appropriate set of research methods that meet the identified research approach well (Creswell 2003). It signifies the base of the research methods used for collection of information related to the topic of the research. It refers to the overall strategy which is chosen to conduct the research and integrate different components of the study. It acts as the blueprint for the research study collecting, measuring and analysing the data. In order to make a comprehensive research, primary and secondary data from the identified and selected resources is taken into consideration. Exploratory research design is the design type selected for the study as it explores the influential factors and social construction behind the fear of crime among individuals. It leads to obtaining background information on the research topic and explain the existing concepts. Research methods Research methods help in collection of relevant data for the study. Both primary and secondary research methods are used for the research study. Primary research method includes semi-structured interviews of sample. In semi-structured interviews, respondents are given the chance to feel free about what is important to her rather than what is important to the interviewer. The interviewer also remains flexible and adaptable to the situations in which he is interviewing the sample (Bryman and Bell 2007). The secondary research method selected for the research study is review of the past research. The data is collected from authentic and reliable sources from internet including journal articles, books and other authentic sources over internet (Cooper 1998). Sample selection Appropriate sampling is essential for organizing the collection of data in an effective way. It has to be based on unbiased approach so as to justify the approach for data collection and improving the reliability and validity of the collected data for reaching final results (Denzin and Lincoln 2000). Interview Respondents: A convenience sample was adopted for the research study, consisting of 3 men and 3 women for analyzing the influential factors in shaping the level of fear of crime among individuals. Six persons residing in the capital city of Australia were invited to participate in the study. The researcher chose to utilise a sample from a singular geographical location so as to reduce the potential for a skew in reporting on the fear of crime due to divergent crime statistics and experiences in different geographic locations. The interviews were conducted via telephone, using a semi structured interview technique (Fink 2005). Another semi-structured interview was conducted with 3 men and 3 women face-to-face from same geographic location of Australian capital city for identifying the differences in perception of fear of crime among men and women and gender differences in concern. Data Analysis Approach The data collected from the semi-structured interviews is analysed qualitatively by recording the interview and transcribing the data into transcripts so as to analyse the data and arrive at findings of the research (Jackson 2008). Analysis of the collected data is done by explaining the findings and factors theoretically with the help of use of transcripts of both the interviews. Reliability and validity of the data In order to make the research reliable and valid, voluntary consent was obtained from respondents so that they can actively get involved in the research process. The personal information of the respondents is kept confidential other than gender and age as these are crucial for finding and analysis of the collected primary data. The credibility of the analysis is maintained by recording the data while interviewing the participants and maintaining the confidentiality of the participants without including personal bias in the analysis section of the research study (Bergh and Ketchen 2009). Findings and analysis The findings are analyzed with the help of use of transcripts and coded data so as to attain the objectives of the research in light of the research problem and questions, and enabling the researcher to get an idea about the influential factors in fear of crime and gender differences in perception of crime against the person. Analysis of the interview questionnaire In regards to the question regarding currently adopted measures for making the house and oneself secure, most of the respondents used deadlocks for doors and kept windows and doors locked when they are out of the house. Those having kids are more concerned about the security of their kids. Use of alarm and living in a good neighbourhood preferably an apartment are other methods used by them to make them secure. As one respondent said, I live in an apartment block and deliberately chose one where you have to get buzzed in through an intercom system. I think that living in an apartment with neighbours around means that if something happens to me people will be around to help, it is obvious fact that neighbourhood provides natural surveillance. Similarly other response, I live in a secure apartment complex. I chose this complex because it has secure car parking. It also has a security system that stops people getting into the common areas indicates the same influential factor of good ne ighbourhood and natural surveillance. Fear of particular crimes All the female participants had the highest fear of being raped and sexual assault followed by home invasion which is again an outcome of being vulnerable to any kind of physical injury or assault by the invader. As said by one female respondent, I would be scared if someone broke into my house, because you never know what they are going to do to you if they are confronted. You are so vulnerable in your own home in that situation, shows sexual assault is most fearful scenario for women. For men, home invasion and mugged in the street are particular crimes they have fear of. In home invasion too, the fear of rape of daughter or wife is high rather than stealing of things or valuables as is evident from this response, I am worried about my wife and kids being attacked and raped. Age and fear of crime It can be analyzed from responses that there is a relationship between age and fear of crime and fear of type of crime varies with age, especially women. Young women are fearful of sexual assaults while elder individuals both male and female are worried and anxious over someone breaking into the house and being mugged in the street. As said by one old-age respondent, We are seen as easy targets for young people. What also surprises me is the willingness of young people to use violence and weapons in crimes, it can be analyzed that age-old people are fearful of crime because of their social and physical limitations. I dont worry that much about it happening to me but I really worry about the kids- this particular response by a middle-age women also shows they become less fearful of sexual assaults but have other worries for being a victim of the crime. Middle age individuals also worry about their growing age and, thus growing vulnerability of being a victim of crime as can be observe d from this specific response: They like to target all old people but they do horrible things to older women. Role of media in perceived risk of being a victim All the respondents said that the stories they hear of the crime, media coverage and knowing the victim personally have influence their thinking of likelihood of being a victim of crime. Specific responses, such as, I read the news on line and watch the TV, so I am pretty conscious of what is happening with people being attacked in the city, my girlfriend getting attacked really scared me, I am pretty involved with my kids school, so I hear a lot of stories through there, Im scared of all this because the world is just so crazy these days and so much bad stuff happens and I hear about it all the time, throws light on indirect experiences as a major factor in influencing the fear of crime of individuals. Relationship of neighbourhood and fear of crime Most of the respondents were in agreement that a good neighbourhood provides natural surveillance and they are comparatively less worried due to living in a good area. One of the respondents gave specific answer: Say if you lived in a neighbourhood where crime is off the chain then yeah, you would be scared of it whether you were a man or woman. But like me, I live in a pretty chilled area where not much bad stuff happens. It can be analyzed that living in a good neighbourhood lessens the fear of crime in both men and women. Likewise, a bad neighbourhood increases fear and anxiety as mentioned by one of the female respondents, When I take my dog for a walk around the neighbourhood, I often see youths hanging around in groups drinking and smoking and get quite scared that they might try and mug me. Gender differences In regards to the query whether women are more fearful than men, all three female respondents agreed that women are more fearful; the reason is social construction, more expression of feelings and concern by women, and physical limitations. Male respondents also agreed to the point which shows that females are more worrisome than males. For the question of impact of stereotype of women being weak on fear of crime, all female respondents agreed that it is a fact and it has an impact on their level of fear of crime. One male respondent was neutral and said that anybody could defence in that situation, while two of them said that men can face the situation more bravely. It can be inferred from the responses that social construction and stereotype of women being physically weak contributes significantly in framing the level of fear of crime. For the question of likelihood of being a victim of crime, both male and female respondents said that they do not continuously think of being a victim, but females showed concern for being more careful and cautious when going out alone in night as can be observed from the following responses: I dont think it is that likely. I am quick to add that I dont think it is likely if I avoid places and things that increase my risk of being a victim, said by a male respondent, My work requires me to work long hours, so I guess the risks are a little bit higher because of that, I tend to go out a lot more on my own to meet up with friends; so yeah there are times I think I am more likely to have something happen, said by female respondents. In response to the question for reason for different behaviour of women and men over fear of crime, most of the respondents said that the social construction and the masculine factor of not admitting fear even when one possesses it makes women express more about the fear of crime than men. However, one of the respondents mentioned the role of ones education, set-up and kind of person one is, in holding different behaviour of fear of crime. It can be analyzed from the above responses that societal construction and difference in behaviour of men and women regarding being manly and feminine are influential factors for gender differences in fear and crime. Discussion and conclusion From the analysis of the primary responses and secondary research, it can be inferred that there are certain influential factors in shaping the fear of crime among individuals. As identified from the responses, good neighbourhood reduces the risk of being a victim of crime, while the same is enhanced in vice-versa situation. Wynne (2008) has also mentioned the significance of natural surveillance and neighbourhood incivilities in shaping the level of fear of crime among individuals. Fetchenhauer and Buunk (2005) throws light on women fearing more of crime than men arising from the sexual selection that favours risk taking behaviour men and protective behaviour of women. Primary research also confirms the fact that women worry more of fear of crime than men and is due to the natural attributes of male and females. Primary responses also shed light on gender differences in worst case scenario for occurrence of crime. While men are mostly concerned of home invasion and being robbed or mugged in street, women were most fearful about sexual assaults followed by burglary. Zebrowski (2007) supports the finding stating that women also feel worried due to consequence of other crime scenarios, such as burglary, where woman could also face a sexual attack. Role of media and other indirect experiences of crime increase the level of anxiety among individuals as mentioned by Farrall and Lee (2008). Primary research supports the finding as it is analyzed that most of the responses pointed towards media stories, heard stories and personal knowing of a victim having influenced their level of fear of crime. Patriarchal ideology of society and subordination of women to men leads to women fearing more than men (Kinsella 2011). Findings from the responses are in coherence with the secondary research as most of the respondents agreed that women stereotyped as being weak and subordinate contributes to their level of fear of crime. As Moore and Shepherd (2007) speak of older women being less fearful than younger women of being sexually assaulted, findings from interview also points on more likelihood of young women being victimized due to sexual assault or rape. However, social and physical vulnerability increases in old age leading to more fear of crime, which is also supported in the study by Doran and Burgess (2011). It can be concluded from overall research that influential factors in the framing of fear of crime among individuals include age, neighbourhood, gender differences and stereotypes, and indirect experiences of crime through media, interpersonal communications and knowing of a victim of crime. Fear of being victimized is higher in females than males and this can be attributed to the societal construction and natural sexual selection that favours risk-taking attitude of men, and risk-avoiding and protective attitude of women. Limitations of the research The research study is confined to a single geographic location due to which the results cannot be generalized to other societies or geographies. The comparison of the responses of one geographic location with another was not done. Personal judgment of the respondents and variation in individual opinions while responding was another limitation of the research. The primary data is collected by using interview method. In this research work, the interview has been conducted with only 12 individuals in Canberra. This is another point of limitation as this would create problems in driving relevant findings and generalizations. All in all, the limitation involved in this research is low sample population for interview purpose. Future Recommendations There should be inclusion of more than one geographic location so that comparison can be made between geographies regarding the fear of crime which can also help in generalization of the result. To collect more and more precise data about the research problem, it is recommended to use only authentic and reliable sources to collect general information and further use this information for finding specific outcomes in more appropriate way. The sample size should be selected taking into consideration the purpose of the research so as to arrive at more authentic findings and results in respect of the research problem.