Monday, December 30, 2019

Demographic Diversity And Cultural Diversity - 1700 Words

DEMOGRAPHIC AND CULTURAL DIVERSITY GOPI KRISHNA CHALLA RIVIER UNIVERSITY Demographic and Cultural Diversity ABSTRACT The research is concerning Organizational Behavior which includes unusual types of Organizations with dissimilar types of public behaviors. Among that Demographic Diversity and Cultural Diversity of an Organization is extremely significant to turn into a triumphant organization or company in the marketplace Especially the Demographic and Cultural Diversity show the in good physical shape relationship with all kinds of Employees in special positions like Managers, Accountants, and Engineers etc. exclusive of any intolerance among them similar to age, gender, race, religion, and physical abilities. Understanding how these personality figure Organizational behavior is significant. The long-term accomplishment of whichever trade calls for a miscellaneous remains of capacity that preserve convey unmarked ideas, perspectives and views to their work. The challenge that assortment poses, consequently, is enable your manager to take advantage of on the mixture of genders, cultural backgrounds, ages and lifestyles to act in response to trade opportunities more quickly and imaginatively. With the developing social, cultural, and political norms, as well as changing demographics, migration patterns and globalization have had an impact on the piece of music of the people. This still impacts the commerce practices which make them to stay pace with the alteringShow MoreRelatedDemographic Characteristics and Cultural Diversity1392 Words   |  6 Pagesorder for groups and teams to become high performance groups and teams. Every group or team leader must be aware of the demographic characteristics and the cultural diversity of the team in order to become effective. Groups and Teams There are many factors that affect a teams performance; from leadership and communication, to demographic characteristics and cultural diversity. Each impacts the team in its own way. With out these major factors being forced upon a team or group individuals willRead MoreHigh Performance Team Essay1157 Words   |  5 PagesIn this paper I will discuss how a team/group can become a high-performance team/group, examine the demographic characteristics and culture diversity and the impact on the team/group behavior. I will also describe how demographic characteristics and cultural diversity contribute to or detract from high-performance groups or teams. What is a team/group? A team/group is a group of people who form together to complete a mutual goal such as a presentation, paper, discussing a topic or creating aRead MoreHigh-Performance Teams1225 Words   |  5 PagesAbstract The purpose of this paper is to explain how a group can become a high-performance team. The purpose is also to examine the impact of demographic characteristics and cultural diversity on group behavior. This paper will illustrate how demographic characteristics and cultural diversity contribute to or detract from high-performance teams. High-Performance Teams A high-level of performance makes up the basis for groups and teams today. High-performance is a major focus for many organizationsRead MoreCultural Change Initiative - Timely, A Non Profit Organization1430 Words   |  6 PagesCultural Change Initiative – Timely, a Non-Profit Organization The organization I would like to lead in a cultural change is a non-profit I have been a volunteer at for over a year. In order to respect the privacy of this non-profit, I will refer to them by the name of Timely. In my time spent at Timely, I have noticed lack of diversity in the board members, employees, and volunteers. The non-profit works towards helping those from a diverse background and demographic. Therefore, I have thoughtRead MoreCultural Change Initiative : Timely, A Non Profit Organization1517 Words   |  7 Pages Cultural Change Initiative Mary Ann Damian March 27, 2016 Managing Diversity Professor Tamara Von George, PhD Granite State College Cultural Change Initiative – Timely, a Non-Profit Organization The organization I would like to lead in a cultural change is a non-profit I have been a volunteer at for over a year. In order to respect the privacy of this non-profit, I will refer to them by the name of Timely. In my time spent at Timely, I have noticed lack of diversity in the board membersRead More High Performance Team Essay1586 Words   |  7 PagesHigh-Performance Team Abstract This paper will explain how a group within an organization becomes a high-performance team. It will also examine the impact of demographic characteristics and cultural diversity on group behavior. The paper will try to describe how demographic characteristics and cultural diversity contribute to, or detract from high-performance teams. Introduction There are a number of elements that are necessary for the creation of any team. These include: two or moreRead MoreDiversity And Cultural Diversity1198 Words   |  5 PagesBetancourt, Green, Carrillo Ananeh-Firempong (2003) cultural competence refers to understanding the importance of social and cultural influences that a minority group may have as an inherent trait. The authors also affirmed that a cultural competent system acknowledges, integrates and incorporates the relevance of culture, evaluation of cross-cultural relations, , and adaptation of services to meet culturally unique needs(pg.294). Diversity and cultural competence are two main concepts that are essentialRead MoreSouth Kore A Dramatic Change Of Multiculturalism816 Words   |  4 Pagesin South Korea captures this cultural phenomenon by showing racial diversity. For instances, several educational TV programs - e.g., Non-Summit (JTBC, 2014 - ), Global Talk Show (KBS, 2006-2010), Love in Asia (KBS, 2005 - ) - invite foreigners who currently live in South Korea in the show discussions for the purpose of reducing prejudices to different culture and achieving multiculturalism. On the contrary to an increase in foreign images in these shows, racial diversity is hardly found in soap operaRead MoreA Letter From District Administrator1569 Words   |  7 Pagescommitment, we have formed a Strategic Diversity Planning team that consists of district and school administrators. The team reflected on the district mission, vision, student demographics, and performance data. Our extensive reflection revealed the need for im provement in educating each student. In response to the change in our student population and performance, the planning team volunteered countless hours of their time to create this Strategic Diversity Plan. This strategic plan will ensureRead MoreHow Cultural Diversity Is Changing The Workforce. In Today’S1196 Words   |  5 PagesHow Cultural Diversity Is Changing the Workforce In today’s society there are many culturally diverse people in the workforce. Most organizations can no longer make the assumption that every employee has similar beliefs or expectations. When entering into the global marketplace, people are considered one of the most valuable resources to an organization’s success. A well-managed culturally diverse workforce has the potential to thrive if managed correctly; or if mismanaged, there can be devastating

Sunday, December 22, 2019

Code Of Ethics And Ethics - 1252 Words

In five years, changes that coincide with the projected 100% growth require the following revisions, starting with the code of ethics, issue identification and ideas affecting software architecture department will drive the upgraded growth. Achieving amplified productivity, and a restructured business model that outfits future profits. Correspondingly, meeting the focus on ethical and professional business objectives that satisfies stakeholders and organizational needs. Code of Ethics Adhering to professional ethics will strengthen the organization’s pursuit in compliance, marketing, and risk mitigation constructing guidelines for employees and stakeholders to follow. In facing the much-needed attention to the company and staff†¦show more content†¦Compliance begins the expansion to the consumer market once enforced. One of the ultimate goals of the 21st century is to understand the consumer market, catering to the target buyer. Which points towards the second core ethic, I will protect customer and employee rights and foster trust with honesty. Affecting organizational marketing in an efficient manner to improve trust between consumer. Making the revised code of ethics valuable for attracting unconvinced customers and reinforcing risk as the second line of defense in support functions. With Business being the first line of defense, risk mitigation is the second line of defense that protects areas like the market, investment, operational and credit risk. Warranting the need for the next code of ethic, I will take action regarding product and service risks that affect our customers and the organization. Risk management creates a significant incorporation of capabilities able to identifying problems across all departments. Issues Affecting the Software Architecture Department Current challenge resolutions with the company and software architecture department demand a sketch of the outlined requirements, software processes, technology changes, professional processes, and management influence. To identify current trends and exercising solutions that maximize a scalable platform. By establishing a solid foundation that will result in

Friday, December 13, 2019

Common Criteria for Deciding Whether to Buy or Build Free Essays

Common criteria for deciding whether to buy or build a software solution would be to take a look at the System Development Life Cycle; Planning, Analysis, Design, and Implementation. Planning or initiation include a business problem, request for proposal, request for quote, and proposal/quote ie. first go/no go decision. We will write a custom essay sample on Common Criteria for Deciding Whether to Buy or Build or any similar topic only for you Order Now Analysis or logistics of implementation include business requirements, technical requirements, and data requirements, and GAP analysis which helps a company compare actual performance with potential performance. Design includes logical/physical, technical specs, process flow/data flow, system architecture, data design, screen layouts, and navigation map/flow. Once these criteria are examined and the complexity is determined, a decision can then be made to buy or build a software solution. Implementation is turning it into a working system that has been tested and put into use including documentation, training procedures, support capabilities, and associated updates. A manager’s selection for off-the-shelf software can be established by deciding if the criteria of cost, functionality, vendor support, viability of vendor, flexibility, documentation, response time, and ease of installation will be greater and a smoother transition than producing an in-house software solution. The two most important aspects of purchasing an off-the-shelf software are vendor support and vendor viability. If a manager chose to produce in-house software, the support is a constant in that the programmers who created the software are available at any time, and know the ‘in’s and out’s of the software’, whereas if there is no vendor support from the purchased software you are taking a gamble which may prove unwise, and the credibility of the manager is no longer. Cost, functionality, flexibility, and documentation are criteria that depends primarily on the specific situation, ie. budget, and needs. Discuss the four phases involved in managing a project. Compare and contrast these phases with the SDLC. Explain any differences. Managing projects of all shapes and sizes requires a fluid, nonlinear framework that has applications across all essential elements of project planning. The four-phase process that suggests how to allow for readjustment between the phases are initiate, plan, execute, and evaluate. Initiate, this first project management phase, the preliminary work is done to clarify the problem or opportunity and how a solution would look. All interested parties are consulted and the project scope – what is in and what is out – is clarified as well as initial costs and timelines. Plan, determines whether the proposed project will be of real benefit to the organization. If it is, the project is approved and more detailed planning starts. Business benefits, project objectives, requirements, governance, scope and project management methods are agreed. The Project Manager draws up the detailed project schedule and task and budget allocations. Execute, project stakeholders are interviewed to ascertain the detailed requirements, possible solutions are discussed and decided upon. Next, the solution is designed, built and finally implemented. Project management activities in this phase also include managing the project budget and schedule, reporting project progress, communicating with stakeholders and responding to project risks, issues and proposed changes. Evaluate, The purpose of this final phase is to determine whether the project was a success and what was learned can be gleaned and applied to future projects ie. , did the project deliver on time, within budget and to scope and quality requirements? Comparing the four phases in managing a project; initiate, plan, execute, evaluate with the SDLC phases; Plan, Analysis, Design and Implement one will see many cross similarities; each describing approaches to a variety of tasks or activities that take place during the process. After each phase is finished, it proceeds to the next one; reviews may occur before moving to the next phase which allows for the possibility of changes. Reviews may also be employed to ensure that the phase is indeed complete; and is ready to progress to the next phase. Explain the three primary project identification and selection phase activities. Who should make the decisions about project approval in a business organization? What information is important to the decision? Project identification and selection consists of three primary activities: identifying potential development projects, classifying and ranking projects, and selecting projects for development. Identifying potential development projects is a process that can be performed by a key member in top management, a steering committee, the head of a requesting committee, the development group or IS manager. Projects by top management reflect broader needs of the organization since there is an understanding of overall business. Projects identified by a top management or steering committee are referred to as coming from a top-down source. Projects designed by individual mangers or the IS group are more focused on the needs rather than a broader scope; projects stemming from managers, or business units are referred to as a bottom-up source. Top-down and bottom-up initiatives are used in identifying and selecting projects, it will vary on the scope and needs of the project. Classifying and ranking projects can be performed by top management, a steering committee, business units, or the IS development group. The project requirements will vary by the organization administering it, one group may choose to meet monthly, whereas another chooses to meet quarterly. Meetings typically consist of reviewing ongoing projects as well as new project requests. Selecting projects for development is the final activity in the project identification and selection phase. Since the criteria for a project can change at any time, numerous factors must be considered when selecting a project; perceived needs of the organization, existing systems and ongoing projects, resource availability, evaluation criteria, current business conditions, and perspectives of the decision makers. Projects can be accepted or rejected which means funding is allocated or the project will no longer be considered for development. A project can be returned to the original requesters who are told to develop or purchase the requested system themselves. Also, the requesters of a project may be asked to modify or resubmit their request after making suggested changes or clarifications. Due to the process of incremental commitment a selected project does not necessarily result in a working product. After each subsequent SDLC activity, the members of the project team will reassess the project. This reassessment will entail a more detailed understanding of the system’s costs, benefits, and risks to determine if the project was a worthy as it was thought to be. How should a project team determine system requirements? What are common sources of requirements? What are the limitations for each? In addition, discuss four types of documents that would be helpful in determining future system requirements. During requirements and determination analysts gather information on what the system should do from as many sources as possible. Sources include users of the current system, reports, forms, and procedures. All of the requirements are carefully documented and made ready for structuring. Structuring includes taking the system requirements during determination and ordering them into tables, diagrams, and other formats that make it easier to translate into technical systems specifications. Some examples of requirement determination include, impertinence, impartiality, relaxing of constraints, attention to details, and reframing. Impertinence is questioning everything. Are all transactions processed the same way? Could anyone be charged something other than standard price? Will employees be allowed or encouraged to work for more than one department? Impartiality is finding the best solution to a business problem or opportunity. All issues must be considered to try to find the best organizational solution. Relaxing of constraints, assuming anything is possible and eliminates the infeasible. Organizations change and all policies and rules should be evaluated. Attention to details, everything must fit into place. If one element is out of place, the whole system will fail. Reframing, looking at the process in a new way. It is easy to assume the project will be the same or similar, but this assumption can lead to failed systems. Constantly challenging yourself will prove beneficial in this process. Specific examples to be gathered at the requirements determination phase are, the business objectives that drive what and how work is done, the information people need to do their jobs, the data handled within the organization to support the jobs, when, how, and by whom or what the data are moved, transformed and stored, the sequence and other dependencies among different data-handling activities, the rules governing how data are handled and processed, policies and guidelines that describe the nature of the business, the market, and the environment in which it operates, and key events affecting data values and when these events occur. It is important that the scope of the system not become to large and expansive that analysis paralysis not occur, this can become costly and time consuming, and can lead to an abundance of work. To deter this from happening analysts must focus on the system in need not the system in place. Documents that are helpful in determining future system requirements are administering written questionnaires ie. surveys to discover issues and requirements, business documents ie. iscover reported issues, policies, rules, and concrete examples, and conducting written interviews with open-ended and close-ended questions. Also directly observing users an give a more objective and accurate review. Read the following online article and discuss two ways to justify IT budgets. How would you explain your IT budget to your CFO? To justify an IT budget is to provide a quality ROI on any new initiative. If the CFO can’t understand the needs of various departments then the only way to their pocketboo k is to present them with a bottom line return on their investment. In the case of procuring an IT budget, executives are often less than forthcoming because of the lack of information they receive from department heads. CEO’s respond most favorably to requests for IT budgets which are cost justified with a simple ROI business case. The business case needs to specifically show how potential costs associated with liability, may be minimized by implementing a sound IT infrastructure. The potential liabilities, such as loss of production and/or loss of reputation are translated into actual dollars in the ROI. A good business case or a good investment analysis will also measure the probabilities of different ROI outcomes. An investment analysis is the examination and assessment of economic and market trends, earnings prospects, earnings ratios, and various other indicators and factors to determine suitable investment strategies. Explaining the IT budget to the CFO you should first examine core needs ie. bandwidth, Internet, phone and staff, and plan to manage them on a minimal investment. Explore reducing excess capacity in the server room, renegotiate vendor contracts and rethink software licenses. Assuring the CFO that you have taken all necessary steps in limiting the IT budget will prove that you have taken all necessary steps to ensure a minimal budget while providing an the required IT services. Revisit past assumptions, you may have a contract that replaces hardware every two years, which could be an unnecessary budget item, and could in return be replaced every four years. Show the CFO how improvements have helped customer experience and saved money. Give him/her a friendly remember that not investing in things that could be and important aspect to IT when the economy turns around can come back to bite you. IT’s value is determined by the relationship between what the organization will pay, ie. cost, and what it will get back ie. benefits. The larger the amount of benefit in relation to cost, the greater the value of the IT project. How to cite Common Criteria for Deciding Whether to Buy or Build, Essay examples

Thursday, December 5, 2019

Digital Forensic Investigation Of USB Flash Drive- Free sample

Question: Discuss about a Report on Digital Forensic Investigation of USB Flash Drive? Answer: Introduction The aim of the report is to analyze a particular scenario based on digital forensics and the various investigation tools and techniques utilized for forensically analyzing the evidence items found in the particular situation. The scenario involves a crime scene committed by an ex-employee who was selling the organizations customer details such as bank account numbers, credit card details and other confidential information (Ali 2012). However, a USB flash drive that belongs to the man contains evidence that he used the credit card details of those customers to become a vendor of an individual website that required, at least, fifty credit card details for vendor ship approval. The report carries out a detail forensic investigation of the digital image of a USB flash drive for evidence relating to the above mentioned incident items. In this report, the above case has been investigated using digital forensic imager tool Encase software. It also involves description of the facts about the data hiding methods discovered during investigation of the case. The process also tries to identify the evidence found and their individual purposes. Analysis Some well-known forensic tools and techniques can be applied for processing the digital image of the USB flash drive and some relevant files, and evidence items can be recovered (Solomon et al. 2011). As many theories and pieces of evidence suggest, there are significant possibilities for hiding data in USB hard drives. Data hiding can be achieved using the concept of clusters. Digital forms of data hiding techniques include watermarking, cryptography or steganography. These are most commonly referred to as non-physical data hiding approach. Nevertheless, there is also another approach known as the physical aspect of data hiding. However, the case study states that neither cryptography nor steganography have been used in the data hiding process (Karlsson 2012). Hence, it can be told that physical data hiding has been followed in the present study to hide the customers financial details such as credit cards details, bank account details and other confidential information referred to in the case study. It takes advantage of the physical characteristics of the digital storage for the hiding purpose. Report of the Emails, Picture and Account Number The email IDs found from the investigation has been used for conversation among the suspects. The two emails are relevant with the case. Specific date and time that those emails were active have been identified. Date Time Action Evidence Found Notes 15/01/2016 1:00 pm Looking for email ID owners avendor12@gmail.com ccstolen_gov@dptfrd.co.uk Date Time Action Evidence Found Notes 15/01/2016 12:00 pm Examination of pictures found It is one sample among the 50 cards provided to the website by the ex-employee. Date Time Action Evidence Found Notes 15/01/2016 1:00pm The case is loaded into Encase for verification. Bank account number 00-11-22 12345678 USB drives most commonly function as data carriers and, therefore, can be very efficiently utilized for transporting business related data out of the organization (Sencar and Memon 2012). There are two alternative approaches to connect a USB device to the companys computer where the customer database resides. The first method is relatively straightforward, which involves a USB cable connected to the computers USB port. On the other hand, the second alternative technique is to utilize a USB hub. In the case of data hiding, the second approach is to be followed using USB hub. To hide the data, the different devices (USB stick acting as the data carrier, USB mouse and the USB hub) are combined to form a single appliance (Roy and Jain 2012). This method shows as if only the USB mouse is connected to the computer, when in fact, the internally hidden hub and USB stick goes unsuspected and can secretly store data using the mouse. Apart from hiding data, this technique can also be used to spread malware items. Solomon et al. (2011) stated that combination of data hiding and malware with the utilization of a USB stick can be applied as a hidden malware infected data carrier to transport data out of the organization. Data hiding technique It can be assumed that the attacker utilized a USB mouse to protect a USB data carrier (USB stick and USB hub combined) inside it. To fit the connected parts in the limited space inside the mouse, the size of the USB hub can be reduced by only keeping the PCB (printed circuit board) hub chip and the cable components. After that, the striping of USB stick is to be performed (Kruse and Heiser 2010). After stripping the stick (removal of the outer casing), a small PCB along with the memory chip and other necessary components are left. Apart from that, to incorporate adequate room inside the mouse case, the size of PCBs can be further reduced and ultimately the PCB and USB cable are connected inside the mouse with the process of soldering or with help if a connector (Hoog 2011). After carefully stripping the components, it is necessary to modify the USB hub so as to put the two PCBs (hub PCB and mouse PCB) together on top of each other. It is a crucial step to execute as it can block the internal LED rays in case the mouse uses LED color. For this purpose, the adjustment of USB hub PCB with the mouse PCB is performed very carefully (Rahman and Khan 2015). The next step is to wire the mouse hardware for connecting the USB port to the USB hub. The parts or components are then put together with the aid of soldering the wires. When this process is complete, the mouse can be connected to the computer and can be used to perform standard functions. This method allows any data stored in the USB stick to be hidden inside the mouse. NTFS (new technology file system) facilitates with potential opportunities for hiding data. However, according to ACPO (2010), USB flash memory devices does not write data into the same location more than once. As flash memories are non-volatile in nature, and flash translation layer (FTL) protocol is responsible for providing an access transparency between the user of a flash drive and the system itself. Encase Forensics is a software tool used for forensic analysis purposes. This particular case can be analyzed using this imager tool that recovers the basic USB history for investigation (Nelson, Phillips and Steuart 2015). The USBSTOR reveals the brand, vendor and a serial number of the USB. Other than that, the Mounted Devices key is found to get information about the drive letter. Imaging the USB drive is, therefore, the particular forensic investigation methodology adopted to parse the information. It can be effectively utilized for proving that the USB flash drive was connected to the organizations computer, by matching the drive letter and the time and date of USB drive insertion, along with the serial number or PID. To retrieve this information a detail forensic analysis was performed on the USB flash storage device using accurate forensic analysis tools (Sansurooah et al. 2013). Evidence analysis and examination are the next steps that involve interpreting the recovered data. After obtaining the forensic image, Encase Forensics is applied on the disk view: The exact number of used nodes is retrieved which in turn provides information about the type of partition being employed in the device. This is because the disk view of Encase does not contain any direct blocks on the inode tables (Lee 2014). Common program for recovering data in this manner necessitates a thorough examination of the inode structure including the direct blocks. Thereby, this tool is mainly utilized for the purpose of recovering deleted, damaged or erased information kept on Ext2 / Ext3 partitions of USB flash storage drives. Forensic Analysis using FTK Imager The items found using this tool are a bank account number, two email addresses, a photograph of a credit card and a particular website text. This is mounted with an FTK imager to enable PCI File Recovery (Kamble, Jain and Deshpande 2015). The following command is followed: File Image Mounting. After that, the steps to be performed are shown in the snapshots below: Thereafter, the PC Inspector File Recovery Window is activated and Open Unit is chosen: The disk created by FTK imager is then selected and Find Logical Unit is chosen. Next, the latest option is selected. After this step, a list of file is displayed to be recovered with this tool. Hence, mainly text files and image file have been found using this tool. The process applied for hiding the data has been discussed in detail above. Disk imaging is a digital forensic technique that uses specific imager software. Encase and FTK both are familiar imager tools in this field (Hoog and Strzempka 2011). However, for this case, FTK imager is used for analyzing the USB flash drive found in the ex-employee's jacket pocket. According to the ACPO (Association of Chief Police Officers) digital evidence analysis, data can be hidden using other tools except steganography or encryption. It can be referred to as generic data hiding technique. Other alternative methods are discussed in the below paragraph. Knowing how data is being hidden in the USB flash drive file system structure essentially enables useful means to find that data. For this reason, various forensic analysis tools are used. However, besides steganography, encryption, or any other similar types of data hiding techniques, there are forensic analysis measures that can be applied to generic methods also (Roy and Jain 2012). For example, using FS, slacker, USB hub and stick combination with USB mouse / USB keyboard / USB printer can also be achieved to hide data. Finding hidden data is becoming quire complex with passing days as the number of anti-forensic tools and techniques are increasing. However, concerning the present case study, it is much easier to strip the components of a USB hub and a USB stick to fit the PCBs together so as to enable them to function in the desired manner. After that, they can be easily incorporated in a USB mouse and can be kept secretly hidden in the internal part of the mouse. Following whic h, anyone handling the mouse would in no way suspect the present of the USB hub and stick inside of it. Alternative technique The data hiding process discussed above was based on utilizing a USB mouse for data hiding (Dezfouli et al. 2012). However, there are possible alternative variations that can be implemented to perform a similar job as data hiding. Combining a USB stick and an USB hub for data transport can also be achieved using a USB keyboard. USB keyboards are usually equipped with USB hubs built internally. Therefore, the job can easily be performed even without the need for an extra USB hub. Metasploits Slacker is a useful tool for data hiding purposes that can be applied onto an USB flash drive having to operate on an FAT (file allocation table) or NTFS / new technology file system (Casey 2011). The slack space on a USB drive can be effectively utilized to hide data to make it inaccessible and unreachable. Slacker is a useful tool for such activities. The method adopted by Metaspoilts slacker depends on fragmenting the data into numerous segments and distributing the fragmented data across the USB drives slack space. Therefore, slacker utilizes the slack space o a hard disk by file splitting and slack space hiding. This process makes it more difficult for the forensic analysis tools to trace the hidden files and folders. In addition to that, there can be other alternative tools and techniques. However, Vacca (2012) states that extensive knowledge of the characteristics and structural specifications of hard drives or more precisely, USB drives can be helpful in figuring out the exact process used for hiding those particular data. Moreover, the implications also suggest that the type and characteristics of the area, the nature of disk activity after that information has been already written on the disk also hold significant impact on the overall approach of forensic analysis as the degree of persistence of the hidden data is influenced. Conclusion The various data hiding techniques that could have been applied for the purpose of hiding those data and information are discussed in this paper. The possible approaches to hide data using a USB flash drive, a USB stick and USB hub combined, acting as a data carrier have also been analyzed in this paper. It can be said that the employee could have used an of the above mentioned techniques for hiding data in the USB drive. For example, MetaSpolits slacker could have been used for hiding data in the slack space. Besides, there is a possibility that other types of data hiding techniques were applied. However, using some particular forensic analysis tools and methods, the digital image of the concerned USB flash drive has been captured for performing the forensic activities. The forensic imager tools such as FTK or Encase are usually applied for this purpose. However, for this particular study, the FTK imager has been chosen to analyze the image of the USB hard drive. References ACPO, 2012.ACPO Good Practice Guide for Digital Evidence. [online] Available at: https://library.college.police.uk/docs/acpo/digital-evidence-2012.pdf [Accessed 10 Jan. 2016]. Ali, K.M., 2012, July. Digital Forensics Best Practices and Managerial Implications. InComputational Intelligence, Communication Systems and Networks (CICSyN), 2012 Fourth International Conference on(pp. 196-199). IEEE. Casey, E., 2011.Digital evidence and computer crime: Forensic science, computers, and the internet. Academic press. Dezfouli, F.N., Dehghantanha, A., Mahmoud, R., Sani, N.F.B.M. and Bin Shamsuddin, S., 2012, June. Volatile memory acquisition using backup for forensic investigation. InCyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on(pp. 186-189). IEEE. Hoog, A. and Strzempka, K., 2011.iPhone and iOS forensics: Investigation, analysis and mobile security for Apple iPhone, iPad and iOS devices. Elsevier. Hoog, A., 2011.Android forensics: investigation, analysis and mobile security for Google Android. Elsevier. Kamble, D.R., Jain, N. and Deshpande, S., 2015. Cybercrimes Solutions using Digital Forensic Tools.International Journal of Wireless and Microwave Technologies (IJWMT),5(6), p.11. Karlsson, K.J., 2012. Android anti-forensics at the operating system level. Kruse II, W.G. and Heiser, J.G., 2010.Computer forensics: incident response essentials. Pearson Education. Lee, J., 2014, October. Cyber incident forensics as a forward lean security. InInformation and Communication Technology Convergence (ICTC), 2014 International Conference on(pp. 872-873). IEEE. Nelson, B., Phillips, A. and Steuart, C., 2015.Guide to computer forensics and investigations. Cengage Learning. Rahman, S. and Khan, M.N.A., 2015. Review of Live Forensic Analysis Techniques.International Journal of Hybrid Information Technology,8(2), pp.379-388. Roy, T. and Jain, A., 2012. Windows registry forensics: an imperative step in tracking data theft via USB devices.IJCSIT) International Journal of Computer Science and Information Technologies,3, pp.4427-4433. Sansurooah, K., Hope, H., Almutairi, H., Alnazawi, F. and Jiang, Y., 2013. An Investigation Into The Efficiency Of Forensic Data Erasure Tools For Removable Usb Flash Memory Storage Devices. Sencar, H.T. and Memon, N. eds., 2012.Digital image forensics: There is more to a picture than meets the eye. Springer Science Business Media. Solomon, M.G., Rudolph, K., Tittel, E., Broom, N. and Barrett, D., 2011.Computer forensics jumpstart. John Wiley Sons. Vacca, J.R., 2012.Computer and information security handbook. Newnes.

Thursday, November 28, 2019

How to Start a Research Paper

How to Start a Research Paper Starting a research paper is always a great challenge to many people. In fact the way you start your research paper will determine its final outcome. That is why it is very important to start correctly so that you can end it in right manner. So the big question is, how can you start a research paper? In this article, we are going to guide you by giving you proper structure to follow when starting a research paper. 1. Decide on the topic One very important stage of starting a research paper is to choose the right topic. When we say the right topic we actually mean a topic that you are well conversant with. It needs to be topic that you are passionate about and you are willing to go all the way to ensure that you address the problem. You need to do some preliminary research to see if the topic that you have chosen has adequate information that you need. If you realize that the topic that you have chosen does not have enough information, don’t waste time, just look for another. 2. Construct thesis Once you have chosen the right topic and you are sure that you will get enough information, the next step that you need to undertake is to conduct the thesis. To do this, you first need to formulate several hypotheses. Hypothesis are basically potential answers to your research questions. You should use the knowledge that you have on that topic when coming up with potential answers. Thesis actually forms the back bone of you research paper. You therefore need to ensure it include all necessary information so that readers know what exactly you will argue on the inter course of the paper. In order to come up with an outstanding thesis statement, experts recommend that you should discuss it with other researchers so that you can get a bigger picture on the topic. 3. Conduct an extensive research Once you have formulated the right thesis, you need to collect information to back your claim. This means that you need to conduct an extensive research in order to collect accurate data to support the thesis statement. For instance, if you are doing a science based research, you need to conduct various experiments in order to collect accurate data. On the other hand, if you are doing an art base research, then you need to conduct research to collect both primary and secondary information that will be crucial for your research paper. 4. Start your research paper Once you have conducted extensive research and collected crucial information that is needed for the research, you need start writing your research paper. The first step through the process of writing is to first write an outline of what you are planning to cover. An outline will actually guide you when writing your research paper. When starting, ensure that you do so with factual statement about the subject that you are addressing. Most people usually like to start by addressing general topics before they finally narrow it down to their research topic. However that is not recommend. Experts recommend that you should first start by factual statement on the topic that you have chosen to address. When starting your research paper, it is also very important to tell your audience what other researchers have written on that particular topic, what they have found and what they have not and what you are planning to address. If you are still thinking it is too difficult to write a research pa per by yourself so just ask for help from reliable writing service and  pay to have paper written.

Monday, November 25, 2019

Affordable Discussion Essay Right Here

Affordable Discussion Essay Right Here Discussion essay is a type of academic work, which is often assigned at high school and college. It should include a thought-out and detailed analysis with great conclusions. It’s like an ordinary discussion when you present ideas and points of view. Not all students are good at discussion essay writing since they should demonstrate their diligence, writing skills, and ability to present their own ideas in a convincing way. We would like to offer such students to write discussion essay for them. Advantages of discussion essay writing Firstly, you will get professional help as our writer hold a Master’s degree or a PhD. It’s their job to meet all requirements and formats to provide high-quality papers. If you are interested in some particular style of writing a discussion essay and don’t have any idea how to do it, you’d better ask us for assistance. Our writers know the difference between APA and MLA styles. Your teacher will appreciate your work and your ability to provide a correctly formatted paper. Secondly, you will receive your paper when you need it. It means that you only have to state your deadline. Our writers will make everything possible to meet it. Moreover, they are used to working in such conditions. No matter how short a time frame may be, we will still provide a great discussion essay. Time doesn’t have any influence when the writer knows his job. Thirdly, you can contact our support team any time and get any information you need: from an order procession to its delivery. It usually takes 10 minutes for our managers to process your order and get in touch with you. Then they look for the most appropriate writer for your order. Writers with experience and knowledge in your field are of high priority. Besides, we have one more great function for you to offer. At the time of cooperation, you can consult not only our managers, but our writers, who are always ready and glad to provide any information you would like to know. As you can see, we are here to grant a high-grade discussion essay outline and the work itself. Moderate costs for high quality papers Excellent works can cost affordable sums of money, and we can prove it. What is an average cost for writing a discussion essay? Just check prices on other websites. They could hardly be called affordable or even moderate. We offer services of good quality at reasonable costs. What is more, we offer some profitable discounts for our clients from time to time. Would you like to see it yourself? Check our prices. Do you see the difference? You don’t have to write discussion essay when you can order it and pay an affordable price for it. Most students come back, and we appreciate it.

Thursday, November 21, 2019

Corporate Fraud in Richards Letter Essay Example | Topics and Well Written Essays - 1500 words

Corporate Fraud in Richards Letter - Essay Example The seriousness of Richard’s action against Richard, as the global head of sales, in the Computer Associates Corporation, he was involved in various acts, which affected his responsibilities in the company. One of his actions was the facilitation of an extension of the fiscal quarter (Soltes 4). This was indeed serious since it affected the reporting of the other fiscal quarters. The effectiveness of the information reported by extension of a fiscal quarter would be affected. Richard was also accused of allowing his subordinates to obtain contracts after the end of a fiscal quarter (Soltes 4). This is serious because it will influence the accuracy of the financial reports used by the stakeholders. The accuracy of financial information for the organization is remarkably essential for both the management and other stakeholders involved such as the investors. Inaccurate financial information may affect the expectations of the prospecting investors and shareholders of the organiza tion. It is better for an organization to give accurate financial information rather than falsehood representation. Information represented falsely can lead to extortion of investors emanating from misleading financial information. ... Although the actions of Richard emanated from the company’s culture of maintaining its performance, the actions of Richard did not follow ethical standards. When proper accounting approaches according to GAAP are used, accurate and efficient financial information is obtained. The chief reason for carrying out investigations on Computer Associates Company was because SEC doubted the accounting reporting of the company. When GAAP approaches are not used in a company’s financial reporting, it is most likely that the company’s financial reporting would have problems. For instance, one of the GAAP approaches is the matching principle, where revenues are recognized in the period of their earning or in the period when expenses that match the revenues are paid. In Computer Associates Company, there was a problem regarding the recognition of revenues. It was noted that; some of the contracts were signed after the last day of a fiscal quarter. This had an impact on the rec ognition of revenues since revenues obtained from the contracts signed after the end of a trading quarter, could either be related to the first quarter or the following fiscal quarter. Falling of stocks by 42% and fall in expected financial results in the first quarter of 2001 made SEC notice that some accounting procedures of the company were not proper (Soltes 3). If the company achieved the same accounting results through GAAP, it would have implied that there could be other contributing factors other than the use of wrong accounting principles. For instance, there could be a misappropriation of funds, which could also be investigated by the relevant authorities.  

Wednesday, November 20, 2019

Classification & Division Essay Example | Topics and Well Written Essays - 500 words

Classification & Division - Essay Example rting as always involves the question of winning, every team endeavors to triumphs over the other and that is what constitutes the essence of the sports. In the same breadth, no team would want to be outweighed the easiest way and would put spirited fight salvage the situation (Eric Digest 29). It is unfortunate that in most occasion sports which are intended for the good reasons end up in an orgy of violence. In fact, sports and violence can be comfortably be spoken of in the same line of statement. Most sports turn to be violent not at the beginning of the march, but during progression or at the end of the game, this leave only one option to explain the source of the violence in sports; the fans not being happy with the results and the only way to ease their tension and anger is to brew tension and disrupt the otherwise peaceful environment to turn chaotic. For the purpose of in-depth understanding of the nature of violence in sports, this paper has classified the various sources of the violence witnessed in the sports with regard to what instigate them (Eric Digest 31). There can be a dichotomous and a chronology of the violence in sports to bring about order in comprehending the information. To give a rational opinion about this, we have to enumerate the parties actively involved in the sporting activities; the players, the fans, and the officiating body. It is possible that violence can be instigated by any of the three parties mentioned. The officiating personnel are sometimes the best source of violence in sports in reference to the decision they make on how the players engage in contradicting the rules of the game (Eric Digest 23). For instance, when a football referee give a penalty shoot during injury time there is most likely to be an eruption of violence as the fans of the other team will view it malicious and meant to necessitate defeat on them. The other source of violence is between the fans, fans have always been known to have natural hatred on

Monday, November 18, 2019

Micro case Study Example | Topics and Well Written Essays - 500 words

Micro - Case Study Example Monopolies are given the rights to be the only firms in operation as a result of various barriers to entry into the industry. The major barriers are permits or licenses, ownership of key resources, copyrights and patents, high start up cost and being offered subsidies. Monopolies may also come across barriers in going out of the market, whereby they are restricted from exit from the market if they are responsible for producing an important product. (Musgrave et al, 41). If a government concludes that products manufactured or provided by such firms are indispensable for the benefit of citizens then such monopoly could be halted from exiting because it improves the living standards of people. Monopolies are also characterized by being in charge of technological knowhow used in production or information, which is not available to potential competitors. In addition to this, monopolistic enterprises might have some information or technology, which is not known to others. The technology or information may or may not be solely owned and it could even be a secret formula, which could be a unique way of producing the distinctive product, which will leave other firms in no position to produce the same The key source of a monopoly are the hurdles to entry, which originate from sources such as ownership of key resources and patents, whereby the government may give individual firms the exclusive rights to produce some products. Therefore, production costs will make the only producer more proficient compared to a large group of producers, which will be forced to go out of the market (Musgrave et al, 21). The government can regulate a monopoly so as to prevent heightened prices in a market, and this is achieved by setting the average price of products. The main drawback is that at times the regulated prices are below average the total costs incurred, which means that prices are lower than the producer’s average total costs, and in such cases, a firm

Friday, November 15, 2019

Business Essays Puma Company Brand

Business Essays Puma Company Brand Puma Company Brand 1. Executive Summary Puma AG is a multinational company that is based in German and manufactures high athletic and sportswear shoes both for women and men, It was founded by Rudolf Dassler after a dispute with his brother Adi Dassler with whom they had founded the Dassler Schuhfabrik in 1924. Puma had a very poor brand image that show a decline in its market share and prompted puma to change it strategic decisions to improve on its image, this process of change was led by Jochen Zeitz Puma CEO based on phases one to four of strategic plan to change puma’s image so that it can compete favorable in the marketplace and within a couple of years Jochen Zeitz had change puma’s brand image into one of the most desirable and sought after brand of sportswear and footwear worn both buy celebrities and fashion followers all over the word. 1.1 Introduction Puma was founded in Dassler Schuhfabrik, Herzogenaurach, Germany by Rudolf Dassler after a dispute with his brother Adi Dassler with whom they had founded the Dassler Schuhfabrik in 1924. Until early 2003 puma had a very poor brand image that show a decline in its market share and prompted puma to change it strategic decisions to improve on its image, this process of change was led by Jochen Zeitz Puma CEO based on phases one to four of strategic plan to change puma’s image so that it can compete favorable in the marketplace and within a couple of years Jochen Zeitz had change puma’s brand image into one of the most desirable and sought after brand of sportswear and footwear worn both buy celebrities and fashion followers all over the word. This report is divided in three parts, Part one presents the factors that influenced puma to change it brand image and it further goes to describe these factors under Macro-environmental analysis basing on market trends, rivalry between customers and strategic group mapping. The second part presents the puma’s resources and capabilities in terms of strengths and weakness as well as virtuallity as seen as strengthens and the third part of the report presents puma’s winning strategies basing on pumas situation that fits the company, sustainable completive advantages and as a better performing company. According to case study of Puma AG (in Thompson, A.A., Strickland, A.J. and Gamble, J. (2005) Crafting and Executing Strategy (Fourteenth Edition), McGraw-Hill, New York, pages C411- C432), The environmental and competitive factors that influenced Puma’s strategic decision to improve its Brand image is identified under Macro- environmental factors, rivalry between competitors and strategic group mapping as below. 1.1.2 Macro –environmental factors Lack of social acceptance of Puma brand from the upper class customers who were not willing to wear the brand because they considered to of poor quality and were sold â€Å"dirt-cheap† Puma’s brand was compromised and this a affected it’s value for example Rudi’s son wanted puma products to reach all the customers of all social back ground and this move was seen by the upper class people as some thing below them and they can not be seen wearing the same brand as people on welfare recipients. In order for pumas brand to be accepted as a high quality brand of value, force puma to change and improve its brand so that it can be socially accepted by customers. Change in customers taste and style for example there was high demand for supports ware and fashion apparel tend that was oriented toward high value and lifestyle products, this change in customers demand influenced pumas to changed it’s brand image to meet the customers growing demand Demographic change in soccer market for example their was a high demand to respond to needs of both kids playing on local pitch and nationals soccer team playing professional at international level that required high quality brand and in order for puma to tap in to these demographic change puma needed to improve its brand image. Market change of 1980 when sports brand became more dynamic and consumers taste diversified into new and more exciting high price that make products more desirable this forced puma to change its brand image so that they can charge high price as customers associate high prices with quality of brand or product and the more highly charged the more desirable the brand. Introduction of niches in the market offered attractive growth rates both incumbent and new market players for example skateboarding markets, golf sports, sports equipments for out door activities made puma change its brand image, for example for puma to enjoy this attractive growth its brand has to be of high quality. Merging of manufactures to form one big group for example Rosso joined forces with several other manufactures in northern Italy to form Genius group this was seen as a threat because this means more resources and strong financial stand and this led to high fragmented global market and for puma to survive in a highly fragmented market it needed to change its brand image Puma’s brand was disreputable and had lost specailised sports dealers in its distribution network in order for puma to gain its distribution network it had to improve on its brand image 1.1.3 Rivalry between competitors Puma greatest rivalries are from the following competitors: Nike Inc Nike is the number one sports brand in world over and from the case study Based in USA Has got sub brand like Tiger words and Michael Jordan Adidas Salomon AG Deals on core sports (soccer, athletics skiing) Has got stronger financial resources Has got it’s marketing and design departments in Germany and France Prada Sports Luxury brand It has entered in to sports segments four years ago Deals in trendy fashion wear of high prices Diesel Based in Italy Fashion brand ,majoring in sunglasses, footwear Competitors entered the market such as Adidas, Nike, Rebook among others entered the market and made competition for market share was very high and these competitors had better quality brand than puma and among them, they shared 27% of the market share, this stiff competition influenced puma to improve on it’s brand image to survive to survive in the competitive market Nike was the biggest competitor of all and it had the largest market share for example Nike was became the world’s largest sports equipment manufacture in the late 1980 and maintain this position since then. Puma was dealing in almost identical products like puma but its brand was poor so in order to have a share in the market place puma needed to improve on its brand image. Adidas-Salomon was also another competitor that entered the market as the second world’s largest producer of sports equipment manufacture in world with approximately $6.5 billion in sales and was present in every country this put puma in a very difficult situation and in order for puma to have a favorable share in the market it needed to change its brand Reebok also entered the market at the time when puma brand was poor, Reebok was the world third largest player in the sports market, Reebok identified footwear industry as a key market and began to aggressively into overseas market this expand was seen as a threat to puma and to survive it puma had to change its brand image Prada though a luxury bran, it also started deal in sportswear four years ago and this is a threat for Puma and because though the price for Prada brand is high, it high quality goods do attack customer who are willing to spend for example super starts, this is a threat to puma because puma has to not only with Prada but with Nike, Adidas and Reebok for customers. 1.1.4 Marketing strategies Acquisitions of groups for example Rosso bought out other partners and embarked on growth and expansion this means more competition for market shares as he built a solid and vast distribution platform across five continents reporting annual sales of $330 million with luxury brand selling jeans for as much as $100-$200 a pair making it’s brand more appealing to customers and in order for puma to survive Such a hash market, it needed to change its brand image Innovations as a marketing strategy for example Nike diversified his product portfolio to target people of ages 20 -30 with enthusiastic sports appeal, Reebok changed its marketing strategy and began transition toward football, baseball and soccer which Puma was one of puma product line and in order for puma to attract new customers it has to change it brand image for example puma designing and new functionality in new collections and launched retro looks of the 1970s/80s All companies engaged in massive advertisement for their brand a awareness so that they can compete favorable in the market for example in Nike marketing strategy, it focused on sponsoring huge events and popular events, Reebok also sponsored popular events and had a licensing agreement with national basket association that increased its brand awareness To compete with each other favorability each company outsource production and raw materials where their cost was cheap and labour was available this enables each company to cut on production cost. Product differentiation causes constraints on rivalry for example the is high rivalry for example between Nike, Adidas and Reebok because thought there is high brand identification in the market they almost dealt in similar sports equipments which offer customer the usage. 1.1.5 Strategic group mapping to position competitors Strategic Group Map on Footwear Mark From the strategic group mapping, the rivalry between Puma and Nike is very low and puma doesn’t pose a threat because Puma doesn’t enough market shares as compared to Nike, This is because Puma is a stage where its brand is poor and customers are not willing to buy puma products and this explains why the position of puma and Nike are far a part from each The close positioning of Nike, Adidas and Reebok are and narrow and almost tight because they are competing for almost the same size for example the rivalry between Adidas and Reebok are almost of the same size in market share and they have to keep competing for the market with no dominance from Adidas and Reebok as a leading rivalry, this is because the cost of production is low and so is the cost of labour The cost of switching from one brand to another is very low for customers the rivalry firms because customers can freely buy from another from Nike, Adidas and Reebok especially where there is no brand royalty that’s why they are so close together Nike, Adidas and Reebok entered the market almost at the same time when puma’s brand image needed improving this cause high competition for the market shares and for customers and this explains why less room for expansion for Nike , Adidas and Reebok that needs to protect it’s market share from Puma The cost of production was low between the rivalry firms as most of had outsourced all production and raw material where they were cheap to produce, this made the market so unstable and due to high competition for the market share. 2 Puma’s strengths and weakness 2.1 Strength Puma had collaboration with some of the famous designers from different cultural back ground for example puma’s new projects were developed under the supervisions of trendsetters like Yashuiro Mihara and Jil sanders which are strongly influenced by kickboxing. This cooperation and collaboration opened a new wide market for puma for example where high fashion meets sportswear, for example this collaboration led puma to produced high quality brand that suppers starts like Madonna were happy to be spotted wear puma brand and this made many fashion and brand wearer buy more of puma products Puma launched new collections which blended with sports, lifestyle and fashion for example puma curato shoes, unala cropped woven women’s ware which are very sport fashionable and trendy, such causal sportswear became like very day kind of wear for certain age group for example the young starts who identified themselves with puma logo and style, this made it easy for puma to target and reach the right market as at the right time as puma knew it’s market and customers well Innovations -puma carried innovations at each part of the process for example puma worked with engineering teams of Jordan grand prix Racing to learn about new materials like carbon fire which are then built into pumas shoes like shudou shoes, this innovation enabled Puma to produced high quality sportswear that were so desirable that puma gain a lot more customer that puma became looked upon as a trend starter in the footwear market for other companies like Nike and Adidas as follow Puma outsourced all productions and raw material procurements in European were to expensive and raw martial were cheap in Asians countries , this allow puma to reduce it’s working capital and allow puma to shorten the production and enable full quality control of input factors Puma had knowledge and experience, this is one of pumas major strength because according to the case study Zeitz’s understanding of fashion as â€Å"the new combinations of elements of the past it easy for puma to produce products without having to design for scratch rather than use its heritage, this made it easy for Puma to re-launched older products for example the retro look where some parts were taken from 1970/1980 collections were re-launched after adding modern elements such as fit or color way shoes Puma has good planning and timing for example puma for example puma entered the sports market two years before its revival in order to maximize profits and this gave puma enough time to prepare for up coming demand, Puma had gain market experience and gave customers the impressions of always being in the sports market. Puma participated in various marketing campaigns to arose customer brand awareness for example it sponsored big events, chose music television channel which was known for its young audience who tired to differentiate themselves and targeted them with puma adverts, for example Puma use the MTV and Music Mongol as Jazzy to promote footwear and other apparel this made lead to the popularity of puma brand and in the last five years saw increased sales as the brand was considered â€Å"rebellious and stylish â€Å" as two most desirable attributes as compared to it’s competitors Acquisitions of other company for example puma acquired Swedish company Tretorn, Europe’s third largest manufacturer of tennis ball from Proventus for â‚ ¬23 million which the contributed to â‚ ¬45 million in sales and puma was able to allocate its over head cost of distribution functions Puma had a shareholder New Regency which put puma in several successful Hollywood movies such as devil and high crime this benefited puma massively from generous product placement. This new regency made it easy for puma to reach it market audience through movies, adverts that portrays the image of puma as a company Technologically puma created a web presence that fit its imaged for example its home page displayed different adverts from Jamaica line. Interactive stories transported readers into managers’ thoughts during his 96 hour business tripe around the world wearing pumas casual and business attire. A project promoted on the internet was the â€Å"top winner thrift† A collection of 510 unique and individual shoes was created and sold at premium prices all over the world. 2.1.2 Weakness Poor brand Image Before the revival, puma has a very bad brand image that most customers from the upper social class did not want to buy puma products because it was considered cheap, this ruined poor reputation and it took years for this image to be rebuilt through phases. Luck of financial resource Puma did not have a strong financial resource as can be seen from the balance sheet of 1999-2002 this could have been due to reduced sales as the brand was of poor image. From the case study puma has the lowest balance sheet compare to its competitors Luck of customers Due to puma poor brand image of 1992-2002 it was not attracting customers because the brand was poor the substitute were readily available on the market most of pumas customers might have crossed to Nike or Adidas as they had better quality footwear Limited market when the brand was poor puma has the least market share as compared to Nike, Adidas and Rebook that to gathered shared 27% of the market share. This failure by puma to capture a larger make share is a weakness and this decreased on brand attractiveness, this can be due to puma’s marketing communication which is different for market segment Puma lost its sports dealers distribution network due to poor brand image and unhealthy sale. Though this was gained, Puma still missing the sports segments distribution systems From the case study Puma has a higher overhead as compared because some of its products were sold cheaply at a very low price making it really hard to figure out what the profit was made as costs were being attached to total sales regardless of what product segment was sold 2.1.3 Virtuality Puma is the first virtual sports company according to pumas mission statement and uses Virtual Warehouse Management System. According to Jochen Zeitz, CEO of puma Virtual actually may be the wrong word. One should probably say a virtualized company, where location doesnt really play a role anymore. Its totally independent from location and how you do business, and move things forward. Take product development, for example. Its actually divided among all the three hubs, with certain development functions in Germany, certain in the U.S., and others in Hong Kong. They each complement each other and work together. Its all integrated through proper IT, so no matter where you are, you can access the same kind of information and add to the entire development chain†. (Reveries.com, Dec 2202). 2.1.4 Virtuality as strength for puma Information sharing Puma has a global management structure several head quarters supported by a strong information technology infrastructure this makes it easy for sharing of vast network resources on a global scale for example during design stage and using the Lotus notes and information database application, key information about design process and procedures and it can be entered in to the database and it can viewed by all the production team located in all the regional hub, this makes exchange of idea and decision making fast without the need for production team and designers to be physical locations in one place. For example footwear can be designed in German then it can be checked by product development team in another country, the review is done throughout the production cycle till the product is finished and ready for sale. Hi technology infrastructure The strong information technology infrastructure can be used to link all the global regions together for example during executive meetings video-teleconference can be use link all the mangers in the various regions together during a meeting enabling fast sharing executive information for managerial decision marking Online Reseller Puma’s virtuality has enabled puma to provide its customers with aid of viewing and buying products through a web based stores and retailers for example puma’s â€Å"Qualified Puma Online Reseller† has made it possible for customer to order products and view their purchase status as they a wait delivery whenever their locations Family Websites Through virtual presence puma has been able to a couple of puma family websites for example in 2000 puma featured an online store in offering a few product in United States only though this has become more common of Pumas online stores, this makes it easy for puma presence to be very where in any country in the world and makes it easy for puma sales team to interact with customers online. Puma also open it’s door to the public via web presence (Pumabiz.com) by allow users access to company information such as corporate structure, financial reports and puma performance in the market, this web presence enabled puma attack potential and future business partners as well as recruiting new staff using the Pumabiz.com website. Virtual warehouse Puma’s virtualisation process lead to the creation of a virtual warehouse where as soon as customers order goods they are assigned with unique making it easy to locate the goods and goods are dispatched to customers no matter where they are with the specific given period. The virtual warehouse system solves puma’s traditional way of storage and led to a feeling that puma is everywhere as the virtual warehouse was everywhere puma has a subsidiary. By using vitulised system puma has competitive advantage for example Puma all core competence is seen as a single big company and globally it’s employees are all over the world and through use of puma communication technology employees are able to share all the resources and the process of virtualisation is being seen as a future that most companies will follow (cf Fuderholz, 1998) The interaction of customers, suppliers and shareholders through the use of information system and communications between organisations have brought only supplier and investors together but has brought shareholders closer for example shareholder through the use on information system are able to search and find out how the company id performing in the market 3 Winning strategies There are evidences from Puma financial reports that suggest puma strategies in the resent years have led to winning strategies; this can be seen from its broad actives that have improved puma’s image considerably. 3.1 Fits the Company’s situation well Increase in orders Pumas orders has increased by product line according to puma’s outlook for example order for footwear went up by 4.7% to â‚ ¬ 721.1 millions and order for apparel has increased by 19.9% to â‚ ¬ 397.7millioms followed by accessories which increased by 13.6% to â‚ ¬68.9 million See Appendix ii 111 Global branded Sales growth Puma management confirmed increase in sales on of footwear, apparel and accessories for based on the financial results for the first quarter of 2008 this has the strength of Euro against other currencies for example footwear sales were down by 4.6% to â‚ ¬404.1 millions, Apparel almost remained the same as last years total â‚ ¬246/9 millions and accessories increased by 30.0% to â‚ ¬ 90.1million Consolidated sales In the first quarter of 2008 consolidated sales grew for example sales in footwear flat but with all puma region meeting satisfactory sales level except USA, the sales of apparel goods increased by 18.5% to â‚ ¬ 231.8 million and accessories in creased by 16.5% to â‚ ¬ 47.3 million with contributions from the entire region in double digits Europe, Middle East also saw increased sales of 19.9% which all together left the company with 3.4% revenue of which footwear sales accounts for up to1.9%, apparel increased by 5.7% and accessories by 3.7% despite a slow sales in America. (26 February 2008 | Source: just-style.com) Pumas sales for the full year of 2005 consist of consolidated and license sales which increased by 18.4% to â‚ ¬ 2.4 million for which the sales of apparel accounts for 16.5%, accessories increase to 16.5% and footwear increased by 17.7% Gross profits at 5% from the sales and earning development report, puma’s gross profit from the first quarter increased to 52.2% as compared to last years. The margin of footwear increased from 52.0% to 52.1%, accessories increased from 53.4% to 54.9% and apparel was low compared to last year’s gross profits Puma embarked on phase IV Puma has started its phase IV in 2006 of becoming â€Å"most desirable sports lifestyle company† that consists of expansion out side of European market as all as expansion of product categories; this includes entering the already existing markets as well as entering into new areas for example puma aim to offer products that cover all the sport lifestyle such as incorporating sportswear into fashion and making puma more distinguished to beat off competition from its rivalry. Phase IV expansion strategy show tremendous growth in profits as result of continuous high sales and puma ability to spot new trends in the market and offer products accordingly Puma’s shareholders value In 2007 Puma’s main long term goal was founded, when Pinault Printemps Redoute of France take over Puma, this brought the two companies that share the same vision and culture together, for example the take over made it possible for each company to provide support to the other to reach it’s strategic objectives. The take over was not objected by the share holders because the offer price of â‚ ¬330 per share was considered fair and this made both companies more money. Good balance sheet Pumas sales for the full year of 2005 consist of consolidated and license sales which increased by 18.4% to â‚ ¬ 2.4 million for which the sales of apparel accounts for 16.5%, accessories increase to 16.5% and footwear increased by 17.7%, this as compare to pre 2003 shows that puma has got a healthy balance sheet for example puma equity ratio is above 60% and of March 31, 2008 total assets increased by 0.8% to â‚ ¬ 1,811.5 millions 3.1.2 Competitive advantage Barney (1991) defines sustainable competitive advantage as A firm is said to have a sustained competitive advantage when it is implementing a value creating strategy not simultaneously being implemented by any current or potential competitors and when these other firms are unable to duplicate the benefits of this strategy (italics in original) (p. 102). Based on both Barney’s work and the definition in the dictionary, a sustainable competitive Advantage is defined as long term benefit of implementing some unique value-creating strategy not currently being implemented by any known or potential competitors along with the incapability to duplicate the benefits of this strategy. Factors that have enabled puma achieve sustainable competitive advantage are identified below Knowledge and Expertise Puma has uses expertise in design knowledge with major competencies in all parts of design and marketing for example with the acquisition of Puma by PPR group has enabled puma to use PPR large base design team to produces high quality of desirable brands, this knowledge and expertise makes puma completive set a part from it’s main competitors. Brand as completive advantage Pumas brand is so strong and dynamic according to Zeitz that by 2003 puma’s popularity was so strong that mega starts like Madonna was proud to wear Puma’s, This brand image and associations of it’s brand with international starts is of competitive advantage in selling of apparel and footwear because it brings about publicity for puma and brand awareness and open up venues for other opportunities for example by 2003 puma signs a deal to be the official supplier of apparel and footwear to the FIA world rally champion. Expansion into other market Puma has been expanding its market especially in china, for example puma has open many stores in Olympic village in china to showcase new collection and meet the demand for Puma’s footwear demand , this expansion has attacked new customers and puma has provided support to individual sports personality for example, the CEO of Puma is quoted as â€Å" If we find the right person we will consider partnering with those Chinese sports starts† ( China daily report 26,2007) Innovative products Puma has a advantage in footwear, apparel and accessories because it a lot easier for puma but fashion know who with the help of designers and the CEO of puma has the understanding of fashion â€Å"the new combination of elements of past† in which when puma spots a new trend instead of making a new brand, puma uses it old brand to design and this counted for 10% of footwear, apparel and accessories based on the old design and this also made puma a trend starter. In footwear puma also collaborated with sought after designers like Stella McCartney, Alexander McQueen to produce new line of women’s and men’s footwear which was launched in the spring of 2006 Broad consumer appeal Puma offer a very diverse product line for everyone and this accounts for the broad customer appeal because there is product for everyone. In the spring collection of 2003 did carter for both male and female for example Nuala product line with cropped woven pants and Nuala Nylon coat for women as well as Kings ss soccer shirts that catered for both men and women. Puma also ventured into Action sports line for emerging sports like BMX skateboarding and downhill mountain biking creating platinum series offering causal footwear and apparel and accessories for such events Relational market asserts Puma has got greater bond with its customers this has forged a working relationship work with customers to manufactures highly unique and customized brands for example in the case study puma promoted the â€Å"top winner thrift† a collection of 510 unique and individual shoes that were created out of recycle cloths from Jeans and ties, with the purchase of such items, customers allowed to enter puma’s exclusive community on the web. Supplies to meet the various demands of consumers Puma’s major supplier was Yue Yuen, the largest supplier of footwear, so when the demand for particular footwear goes up puma is more readily meets the demand from constant supply of branded products from YueYuen. Intellectual market asserts Puma has great in depth knowledge regarding customers needs and preferences for example puma has gained knowledge and credibility in sportswear and equipment, this was a results of many years of trading on the same product line and which made it very easy to have competitive advantage over others fashion industry, this knowledge made it easy for puma to re-launch products that customers most prefer to have. 3.1.3 Better company performance Marketing campaign Puma participated in various marketing campaigns to arise customer brand awareness for example it sponsored big events, chose music television channel which was known for its young audience who tired to differentiate themselves and targeted them with puma adverts, this has resulted in o better performance because it improved brand awareness which in turns led to high sales performance. Out sourced production Puma outsourced all productions and raw material procurements in European were to expensive and raw martial were cheap in Asians countries, this allow puma to reduce it’s working capital and allow puma to shorten the production and enable full quality control of input factors, this results in a better company performance because it enables puma to meet the market needs effectively and save a lot of money from having

Wednesday, November 13, 2019

Political Critique of Race Relations in Alice Walkers Color Purple Ess

The Color Purple as Political Critique of Race Relations      Ã‚  Ã‚   If the integrated family of Doris Baines and her adopted African grandson exposes the missionary pattern of integration in Africa as one based on a false kinship that in fact denies the legitimacy of kinship bonds across racial lines, the relationship between Miss Sophia and her white charge, Miss Eleanor Jane, serves an analogous function for the American South. Sophia, of course, joins the mayor's household as a maid under conditions more overtly racist than Doris Baines's adoption of her Akwee family: Because she answers "hell no" (76) to Miss Millie's request that she come to work for her as a maid, Sophia is brutally beaten by the mayor and six policeman and is then imprisoned. Forced to do the jail's laundry and driven to the brink of madness, Sophia finally becomes Miss Millie's maid in order to escape prison. Sophia's violent confrontation with the white officers obviously foregrounds issues of race and class, as even critics who find these issues marginalized elsewhere in The Color Purple have noted. But it is not only through Sophia's dramatic public battles with white men that her story dramatizes issues of race and class. Her domestic relationship with Miss Eleanor Jane and the other members of the mayor's family offers a more finely nuanced and extended critique of racial integration, albeit one that has often been overlooked.(11)    Like Doris Baines and her black grandson, Sophia and Miss Eleanor Jane appear to have some genuine family feelings for one another. Since Sophia "practically . . . raise[s]" (222) Miss Eleanor Jane and is the one sympathetic person... ...nold, 1993. 85-96.    Sekora, John. "Is the Slave Narrative a Species of Autobiography?" Studies in Autobiography. Ed. James Olney. New York: Oxford UP, 1988. 99-111.    Shelton, Frank W. "Alienation and Integration in Alice Walker's The Color Purple." CLA Journal 28 (1985): 382-92.    Spivak, Gayatri Chakravorty. "Explanation and Culture: Marginalia." Humanities and Society 2 (1974): 201-21.    Stade, George. "Womanist Fiction and Male Characters." Partisan Review 52 (1985): 264-70.    Tate, Claudia. Domestic Allegories of Political Desire: The Black Heroine's Text at the Turn of the Century. New York: Oxford UP, 1992.    Tompkins, Jane. Sensational Designs: The Cultural Work of American Fiction. New York: Oxford UP, 1985.    Walker, Alice. The Color Purple. New York: Harcourt, 1982.      

Monday, November 11, 2019

In human communication, the spoken and unspoken words belong to both the sender and receiver Essay

Communication is the process of sharing meaning with others. The sender is the person who sends the massage and the receiver is the person who receives the massage. There are encoding and decoding processes that happen during this stage. The sender encodes his idea or thought into a massage. For instance, there is a policeman staring at you, and you somehow notice the action and panic. The exchange between sender and receiver occurs. As the receiver, when you notice his action, you will decode the body language and his serious facial expression and you will think that as a sign that you’re in trouble. This interpretation may due to your knowledge and experiences. These both encoding and decoding is very important. This kind of massage can be either in the form of verbal communication or non-verbal communication. Verbal communication or also known as spoken word can be divided into two types, oral verbal communication and non-oral verbal communication. Oral verbal communication is the usage moment when we utter the words or speaking whereas non oral verbal communication is the usage of alphabets system in a proper manner or in a simple word, writing form. Non-verbal communication or also known as unspoken word can also be divided into oral non-verbal communication and non-oral non-verbal communication. Non-verbal communication as a whole can be defined as’ those bodily actions and vocal quality that typically accompany a verbal massage and are usually interpreted as intentional’. A person who is standing on the basis to deliver a speech even though looks like he is only performing a verbal communication may also unintentionally performs non-verbal communication too. This can be seen through his body language for instances, body gestures, facial expressions and even eye contacts. This explains the theory given by Verderber that non-verbal communication and verbal communication can be both happen at the same time. In communicating with each other, language is one of the compulsory features that are required. According to Rudolph F. Verderber, language is the body of works and system for their use in communicating that are common to people of the same community or nation, the same geographical area, or the same cultural tradition. If the spoken language used by the sender is not as same as the receiver, it will lead to the problem in conveying the massage. Body language as opposite is universal and can be understood by almost everyone around the globe despite of their nationality, races, genders or even their mother’s tongue. Smile for an instance, sending the message that the doer is happy, friendly and also in a good mood. Shannon and Weaver are the creators of the first communication model. This model was first created to show how the radio and telephone is working. There are three major parts of this model which ate sender, channel and receiver. The sender will encodes and transmitted the messages in form of binary code or data through the channel. The receiver then will receive and decodes the data into understanding messages. Plus, during the process of sending the messages, there may be some interruption or noise happened either internally or externally. This may due to the imbalance hormone, lack of information, crowd noise or even health problem. Communication begins with self. This principle explains how one’s experiences and knowledge affects his or her ways in treating and communicating other people. Experts also agree that people are products of how others treat them and of the messages others send them. I quoted Carl Rogers, â€Å"every individual exists in a continually changing world of experience of which he is the center.† Someone who experienced either bad or good experiences in his past will have already prepared if the same situation occur again. For example Ali was once been scolded by his lecturer when he did nit hands in the assignment during the due date, this will become a turning point or lesson for him so that in the future he won’t repeat the same mistake again. Communication at the same time is also complicated. The combination of verbal, non-verbal, behavior and attitude of speakers, the intonation and other factors when they combine will make the messages hard to be understood. Moreover, the usage of high-level vocabularies, the complicated structures and uncommon term will make even the simplest message hard to comprehend. As conclusion, in ensuring the communication between two parties is successful, they must have the most important aspect of communication, which are mutual respect and mutual understanding.

Friday, November 8, 2019

Why Powerful Men Behave Badly, Why Powerful Women Dont

Why Powerful Men Behave Badly, Why Powerful Women Don't Why do so many sex scandals involve men of influence and power? Whether theyre politicians, heads of state or business leaders, powerful men are frequently linked to incidents involving cheating, infidelity, prostitution, sexual harassment, sexual assault, rape, and other inappropriate behavior toward women. Why do we rarely see powerful women in the same situation? Experts on human behavior suggest it may come down to biology and opportunity. Prolific Equals SurvivalTIME senior editor Jeffrey Kluger reminds us of some basic science: Human males have never been thought of as models of sexual restraint - and with good reason....The goal of any organism, after all, is to ensure the survival and propagation of its genes, and males - far more so than females - are eminently equipped to do that. Even the worlds most reproductively prolific mothers rarely produce more than eight or nine children in a lifetime. Males can conceive everyday, even multiple times a day, and come emotionally hardwired to do just that. What are females hardwired to do? Select and mate with males who will provide good genes and stick around long enough to help ensure their offspring will reach maturity. Preferring Powerful MalesDavid Carrier, a University of Utah biology professor, explains why in the animal kingdom, females prefer powerful males: From the perspective of sexual selection theory, women are attracted to powerful males, not because powerful males can beat them up, but because powerful males can protect them and their children from other males. What physical power and brute strength is to the animal kingdom, political power is to the human race. And the greater the amount of power and control, the greater the access to desirable females and the more opportunity to mate. More Power, More SexDarwinian historian Laura Betzig who has studied sex and politics for decades, ties power to sex  as far back as the royal fertility rites in Sumer nearly 6,000 years ago. Attractive females became a commodity when Egyptian kings demanded beautiful servant girls from their provincial governors. Betzig provides examples across cultures and centuries to illustrate her point: the more powerful a man/monarch/ruler is, the more women he has sex with. She cites R.H. van Guliks survey Sexual Life in China to illustrate the power/sex differential: [Gulik] says that by the 8th century BC, kings kept one queen (hou), three consorts (fu-jen), nine wives of second rank (pin), 27 wives of third rank (shih-fu), and 81 concubines (yu-chi). That was the tip of the iceberg: imperial harems numbered in the thousands. Lesser men kept fewer women. Great princes kept hundreds; minor princes, 30; upper middle-class men might have six to 12; middle class men might have three or four. The Point of Politics is SexBetzig draws comparisons to Darwin and his theory of natural (and sexual) selection which posits that the whole point of competition is reproduction, and sums it up simply: To put it plainly, the point of politics is sex. Much has changed since ancient China. Most of the world does not regard the unfettered conquest of females as either politically prudent or culturally acceptable. Yet some political leaders (especially married ones) still behave as if the more women they bed, the better. Sexual HubrisThe Washington Post referred to this as a leaders sexual hubris† and like Betzig, Kluger and Carrier acknowledged that leadership has long been associated with sexual dominance throughout history and within the animal kingdom. Though current social norms create pressure to squelch that sort of behavior, it erupts with such regularity that the Post asked a panel of experts: Why do so many leaders fall prey to confusing power with sexual charisma? Because It CanBusiness owner and consultant Lisa Larson likens sexual hubris to a dog licking its nether regions it happens because it can: As Baron Acton said, Power corrupts and absolute power corrupts absolutely. Inappropriate sexual conduct is a form of corruption.... She opines that men may be spurred by two reasons: The first is what I call Revenge of the Nerds....when someone who could achieve great things academically but suffered through romantic rejection during their youth suddenly find themselves in a position to be able to get what they want....The second is what I call the Sally Field syndrome they like me, they really like me....Power is sexy and people in positions of power often find themselves recognized in public, being praised and flattered as never before. Its hard for that not to go to your head. Power as AphrodisiacMarie Wilson, founder and president of The White House Project and the co-creator of Take Our Daughters and Sons to Work Day, focuses more on the seductive power of power. She acknowledges that the sexual jolt power conveys is rarely discussed: Power is the most potent aphrodisiac. Forget oysters, power is at the top of the menu when it comes to sexual arousal.... We caution powerful people about how their power needs to be carefully used when it comes to making decisions that affect their office or enterprise, but I wonder how many are warned about the new magnetism they suddenly have (and wont have once their power is gone)....Because our sexual power is tied into our ego, as the political ego develops, so may political id... [T]he sexual undercurrent running through politics is strong, and its used all the time openly or behind the scenes. But its a power source that has to be reckoned with in leadership, and one that is all to rarely discussed outside of the lascivious details when a scandal erupts. Equal Opportunity CorruptionWilson doesnt believe that powers sexual potency is gender specific. She shares her own experience of winning a local election and finding that men contacting her were interested in more than constituent services. Like Wilson, Kluger also acknowledges that power and sex can corrupt women just like men and describes the work of Larry Josephs, a professor of psychology at Adelphi University, who uses a new measure of behavior thats called the dark side: Men, certainly, arent the only people who abuse their power sexually. Women exhibit the dark side...too, and can become accustomed to power and its perks as easily as a man can. Whats more, testosterone, a primal driver of dominance behavior, is not the exclusive province of men either. Women produce testosterone just like men do, even if at different levels, says Josephs. That means women have testosterone-driven tendencies as well, and that pays dividends. Dominant animals tend to be more reproductively successful whether theyre male or female. Its true that very few headlines highlight the sexual indiscretions of powerful women and no politically prominent female thus far has been accused of rape or sexual assault. But that may change as increasing numbers of women rise to positions of political power. Women have been seeking the same opportunities as men for centuries. Once those opportunities are realized and we achieve some semblance of equality, will we successfully avoid the dark side or victimize others as weve been historically victimized? Sources:Betzig, Laura. Sex in History.  Michigan Today, michigantoday.umich.edu. March 1994.Kluger, Jeffrey. The Caligula Effect: Why Powerful Men Compulsively Cheat. TIME.com. 17 May 2011.Larson, Lisa. The female advantage. views.washingtonpost.com. 11 March 2011.Pearlstein, Steve and Raju Narisetti. A leaders sexual hubris? views.washingtonpost.com. 11 March 2010.Standing up to fight. Terradaily.com. 23 May 2011.Wilson, Marie. Beware new leaders. views.washingtonpost.com. 12 March 2010.

Wednesday, November 6, 2019

High Rate Of Population Growth Children And Young People Essay Essays

High Rate Of Population Growth Children And Young People Essay Essays High Rate Of Population Growth Children And Young People Essay Essay High Rate Of Population Growth Children And Young People Essay Essay Issues confronting kids in Pakistan, A Pakistans maternal mortality ratio is estimated to be between 350 and 600 per 100,000 unrecorded births as compared to 17 per 100,000 unrecorded births in the United States. One in 10 kids does non last their 5th birthday with the bulk of deceases due to diarrhoea, pneumonia or vaccine-preventable diseases. Thirty per cent of kids are inveterate malnourished and lack safe H2O and family sanitation, particularly in rural areas.A Pakistan spends less than 2.5 per cent of its GDP on the instruction sector.A A Just over half of the 19 million kids of primary school traveling age are enrolled in primary instruction. Compared to 58 per cent of male childs, there are 48 per cent of misss enrolled in primary school.A Just over a 3rd of Pakistani adult females are literate.A An estimated 3.6 million kids under the age of 14 plants, largely in exploitatory and risky labor.A The 2005 temblor destroyed about 8,000 schools, 4,000 H2O strategies and about 80 per cent of wellness centres. ( unicef ) An appraisal of the grade of kid labour in Pakistan is hard to happen due to several restrictions of basic deficiency of informations. The last information was conducted in 1996 by the authorities of Pakistan. The study estimates 3.3 million of the 40 million kids were found to be economically making work on lasting footing. In entire 3.3 million kid labour, 2.4 million ( 73 per centum ) were male childs and 0.9 million ( 27 per centum ) were misss. Harmonizing to the study it was besides found that out of entire labour 7 per centum labour are child labours. Harmonizing to the above study, over 21 million kid labourers between the age of 10 and 14 old ages are working in the state. Out of which 27 per cent are misss and 73 per cents are male childs. ( Ghani, 2011 ) Child Labor in Selected Industries and Sectors Consecutive No Child labour Name Of Survey Year Geographical Region/Area Number of Child work force Child Labor as % of entire work force 1 Football fabrication industry 1996 Sialkot 7000 17 % 2 Surgical instruments fabricating industry 1996 Sialkot 7700 31 % 3 Brick kiln fabrication 1998 Sialkot 2740 16 % 4 Auto-workshops 1998 Sialkot 5221 60 % 5 steel furnaces and trim parts fabricating trim industry in Baghbanpura country of Lahore 1998 Lahore 123 27 % 6 Itanneries 1998 Kasur 167 7 % 7 Auto workshops 1999 Lahore 3378 18 % 8 Light Engineering Industry 1999 Gujranwala 4531 17 % 9 Childs of Textile Paradise- Power loom 1999 Lyallpur 2100 5 % Chapter # 4 DATA ANALYSIS Statement of the Problem ? ? ? ? ? ? ? ? ? ? ? ? Aims of Study This research is conducted to look into the jobs of child labour. In peculiar the aims behind this research survey are ; To analyze the impact of poorness on child labour. To analyze the impact of literacy on child labour. To analyze the impact of rising prices on kid labour. Research Method This survey is secondary research. This information is collected through cyberspace and books. This information was analyzed by utilizing pie and column charts in Microsoft Excel. Hypothesis The survey would be based on following hypothesis ; these hypothesis have been develop after reexamining the relevant literature To analyse the consequence of poorness on kid labour H1: Consequence of poorness on kid labour is important H1o: Consequence of poorness on kid labour is non-significant To analyse the consequence of rising prices on kid labour H2: Consequence of rising prices on kid labour is important Water: Consequence of rising prices on kid labour is non-significant To analyse the consequence of literacy on kid labour H3: Consequence of literacy on child labour is important H3o: Consequence of rising prices on kid labour is non-significant Entire kid labour in universe 250 Million Male childs 140 Million Girls 110 Million Entire kid labour in universe 250 Million Full clip working kid labour 120 Million Entire labour in Pakistan 2011 55,770,000 Entire kid labour in Pakistan 2011 21,000,000 ( htt23 ) Child Labor in Pakistan State Entire No. of kids age 5-14 old ages ( 1000000s ) Entire No. of Economically Active Children age 5-14 old ages ( 1000000s ) Ratio Of Child Labor Punjab 22.63 1.94 8.6 % Sindh 8.62 0.30 3.5 % NWFP 6.71 1.06 15.8 % Baluchistan 2.07 0.01 0.5 % Sum in Pakistan 40.03 3.31 8.3 % ( PCLU ) Analysis: Entire figure of child labour in Pakistan are 40.03 out of which Punjab has the higher figure of child labour by 22.63 million and Baluchistan has the lower sum of kid labour that is 2.07 million as shown above in the graph. Analysis This graph shows the figure of child labour who is economically active between the ages of 5-15. As shown above Analysis NWFP has the highest ratio of child labour in Pakistan that is 15.8 % and the lowest ratio of child labour in Pakistan is in Baluchistan by 0.5 % . Entire ratio of child labour in Pakistan is 8.3 % . Research Instrument ? ? ? ? ? ? ? Data Analysis and Results Poverty ( % ) Year Child labour % ( Y ) Poverty % ( X1 ) 2007 12.5 4.89 2008 13.1 5.57 2009 12.6 7.46 2010 11.8 7.57 2011 12.5 6.37 Poverty ( % ) Analysis In 2007 the consequence of poorness on kid labour is 12.5 % and continuously the ratio of child labour is affected due to the addition in ratio of poorness. In 2008 the ratio of child labour increased. In 2009, 2010 the ratio of poorness addition but the child labour deceased in lower ratio and in 2011 ratio of kid labour once more increased by 12.5 % . Inflation ( % ) Year Child labour % ( Y ) Inflation rate % ( X2 ) 2007 12.5 7.6 2008 13.1 20.8 2009 12.6 13.6 2010 11.8 13.4 2011 12.5 11.9 ( Economic Survey Pakistan ) Inflation ( % ) Analysis In 2007 the ratio of rising prices is 7.6 while the ratio of child labour is 12.5 % , which mean kid labour is affected by rising prices, same in 2008. But in 2009 rising prices ratio addition in high ratio but kid labour besides addition but in little ratio. In 2010 once more ratio of rising prices deaths so the ratio of rising prices and kid labour is parallel and in 2011 both ratio addition. Literacy ( % ) Year Child labour % ( Y ) Literacy rate % ( X3 ) 2007 12.5 56 2008 13.1 50 2009 12.6 54.9 2010 11.8 58 2011 12.5 54.7 ( replies ) , ( htt19 ) , ( Answers ) , ( htt21 ) , ( Wastic, 2010-2011 ) , ( htt22 ) Literacy ( % ) Analysis In 2007 the literacy ratio is really high but graph show that is low consequence of literacy on child labour. The literacy ratios and child labour ratio are altering in all old ages. Chapter # 5 Decision The intent of this survey was to Research on kid labour concluded that it is a particular economic and societal issue that needs planetary attending for the development of the kid to cut down the strength of kid labour Strict punishments and all right must be charged who violates the Torahs of kid labour. Media should to hold to play a important function to make consciousness among the people to blockade the kid labor.A Decision is type qi U can give terminal chief: 1. ) The kids are working as a labor in school traveling age for the endurance of there households and to full make full the basic necessities. 2. ) Peoples do nt cognize the importance of instruction. That s why most of kids remain illiterate. 3. ) It is non merely duty of authorities we are besides responsible for that. Index Laws prohibit the employment of kids in Pakistan before we talk about labor Torahs, allow s first have a expression at the constitutional commissariats refering to child labor. aˆ? Article 3: the province shall guarantee the riddance of all signifiers of development and the gradual fulfilment of cardinal rule, from each harmonizing to his ability and to each harmonizing to his work. aˆ? Article 11 ( 3 ) : No kid below the age of 14 old ages shall be engaged in any mill or mine or any other risky employment. aˆ? Article 25 ( A ) : The province shall supply free and mandatory instruction to all kids of the age of five to sixteen old ages in such mode as determined by jurisprudence. aˆ? Article 37 ( vitamin E ) : The province shall do proviso for procuring merely and humanist conditions of work, guaranting that adult females and kids are non employed in holidaies unsuited to their age or sex, and for pregnancy benefits for adult females in employment. Following instruments of statute law trade entirely with the topic of kid labor. AÂ · The Employment of Children Act 1991 AÂ · The Employment of Children Rules 1995 Other than these two, there are other Torahs as good which trade with the employment of kids and modulate the on the job conditions for employed kid workers. aˆ? Mines Act, 1923 aˆ? The Children ( Pledging of Labor ) Act, 1933 aˆ? The Factories Act, 1934 aˆ? The Road Transport Workers Ordinance, 1961 aˆ? Shops and Establishments Ordinance, 1969 aˆ? Merchant Shipping Ordinance, 2001 ( Paycheck.pk, 2012 )