Monday, September 30, 2019

Changing the Target Audience in Retail Sales

â€Å"On average, middle-aged consumers devote 39 percent of their retail expenditure to department store products and services, while for younger consumers the average is only 25 percent. Since the number of middle-aged people will increase dramatically within the next decade, department stores can expect retail sales to increase significantly during that period. Furthermore, to take advantage of the trend, these stores should begin to replace some of those products intended to attract the younger consumer with products intended to attract the middle-aged consumer. Essay 1: The argument that department retail sales will increase in the next 10 years and thus department stores should begin to replace products to attract middle-aged consumers is not entirely logically convincing, since it omits certain crucial assumptions First of all, the argument ignores the absolute amount of retail expenditure of middle-aged and younger consumers devoted to department store products and services. Although younger consumers spend a smaller percentage of their retail expenditure to department store products than do the middle-aged consumers, they might actually spend more in terms of the absolute amount. Even if middle-aged consumers are spending more than younger ones in department stores, the argument ignores the possibility that the trend may change within the next decade. Younger consumers might prefer to shop in department stores than in other types of stores, and middle-aged consumers might turn to other types of stores, too. This will lead to a higher expenditure of younger consumers in department stores than that of middle-aged consumers. Besides, the argument never addresses the population difference between middle-aged consumers and younger ones. Suppose there are more younger consumers than the middle-aged ones now, the total population base of younger consumers will be bigger than that of the middle-aged ones if both of them grow at the same rate in the next decade. Thus there will be a bigger younger consumer base. Based on the reasons I listed above, the argument is not completely sound. The evidence in support of the conclusion does little to prove the conclusion since it does not address the assumptions I have already raised. Ultimately, the argument might have been more convincing by making it clear that the absolute population of middle-aged consumers are higher than that of the younger consumers and the number will continue to grow in the next decade, and that the middle-aged consumers will continue to spend more money in department stores than younger consumers do in the next decade. Essay 2: The argument that retailers should replace some of the products intended to attract the younger consumers with products intended to attract the middle-aged consumers is not entirely logically convincing, since it ignores certain crucial assumptions. First, the argument omits the assumption that the business volumes of both the middle-aged consumers and the younger consumers are the same. If the business volume of the middle-aged consumers’ 39% is smaller than that of the younger consumers’ 25%, the retail sales will not increase during the next decade. Second, even if the business volumes of both the middle-aged consumers and the younger consumers were the same in the last decade, the increase of the middle-aged people in the next decade is not the same as the increase of the retail expenditure, for the retail trade depends more on such factors as the economic circumstances, people’s consuming desire. Finally, the argument never assumes the increase of the younger consumers within the next decade. If the younger consumers increase at the same rate and spend the same amount of money on the goods and services of department stores, the retailers should never ignore them. Thus the argument is not completely sound. The evidence in support of the conclusion that the growing number of middle-aged people within the next decade does little to prove the conclusion—that department stores should begin to replace some of their products to attract the middle-aged consumers since it does not address the assumptions I have already raised. Ultimately, the argument might have been strengthened by making it clear that the business volumes of both types of consumers are the same and comparable, that the increase of a certain type of consumers are correlated with the increase of the retail sales, and that the growth rate of the younger consumers are the same as that of the middle-aged consumers. Essay 3: Based on an expected increase in the number of middle-aged people during the next decade, the author predicts that retail sales at department stores will increase significantly over the next ten years. To bolster this prediction, the author cites statistics showing that middle-aged people devote a much higher percentage of their retail expenditure to department-store services and products than younger consumers do. Since the number of middle-aged consumers is on the rise and since they spend more than younger people on department-store goods and services, the author further recommends that department stores begin to adjust their inventories to capitalize on this trend. Specifically, it is recommended that department stores increase their inventory of products aimed at middle-aged consumers and decrease their inventory of products aimed at younger consumers. This argument is problematic for two reasons. First, an increase in the number of middle-aged people does not necessarily portend an overall increase in department-store sales. It does so only on the assumption that other population groups will remain relatively constant. For example, if the expected increase in the number of middle-aged people is offset by an equally significant decrease in the number of younger people, there will be little or no net gain in sales. Second, in recommending that department stores replace products intended to attract younger consumers with products more suitable to middle-aged consumers, the author assumes that the number of younger consumers will not also increase. Since a sizable increase in the population of younger consumers could conceivably offset the difference in the retail expenditure patterns of younger and middle-aged consumers, it would be unwise to make the recommended inventory adjustment lacking evidence to support this assumption. In conclusion, this argument is unacceptable. To strengthen the argument the author would have to provide evidence that the population of younger consumers will remain relatively constant over the next decade.

Sunday, September 29, 2019

MGM project

Leading the project for the MGM development group will be Rampages Campground's Project Manager in charge of overseeing the entire project development to fruition. Brian Jason Financial Development Consultant will be heading the financial aspect of the project by the establishment of alliances with market partners that specialize in resort and vacation promotion and financing. Sales literature will take multiple avenues of distribution, but sole development of the literature will fall on the resorts marketing team headed by Logan Spears Marketing Development and Publicity Distribution.The Marketing team will also oversee any third party project consultants for the organization concerning promotion. Head of Business Development and Sales Angelo Mainlander will be in charge of placement and implementation opening promotions and sales for the MGM Aquatics project developing personal relationships with the projects major investors and shareholders providing up to date development informa tion. As well as the development of customer incentive projects after the completion of the initial, project.Any additional duties dealing with the implementation and success of the project will be delegated to the us porting cast of the organization to obtain specific responsibility and maximum effectiveness. Milestones Funds secured for project implementation Project engineering schematics and Plans Permits and Licenses obtained Work force developed and secured project rolled out Ground breaking Publication and marketing campaign launch Project Completion and Grand Opening Evaluation and Control Metrics The project must have the ability to assess the recommended market plan, and the methods of monitoring and assessing performance and success.The purpose of the evaluation and control metrics allows developers to create the necessary checks and balances needed to guide the organization through completion of the project. The following areas will monitor the performance of the project after completion in an effort to gauge performance. Market Share / First to Market Effect Occupancy Rate: Monthly and Annual Revenue: Monthly and Annual Expenses: Monthly and Annual Setting specific performance gauges, the developers are able to correct any misguided investments before, during, and after the completion of the project.

Saturday, September 28, 2019

Development and Analysis of Two Mini Case Studies Study

Development and Analysis of Two Mini Studies - Case Study Example with aim of being most innovative company with technologically advanced products that entered the market of mobile industry so that it can differentiate itself from PC industry (Fuller, 2010). It was successful in making its name in mobile device company in 2010. By the end of 2009, Apple grew to become fourth largest vendor of PC in the market of United States with market share of about 8%. According to Mishra (2011), Apple had market capitalization of about $220 billion in spring of 2010. Apple has mostly implemented multi-million dollar marketing campaigns like the most successful ads by slogan â€Å"Think Different† and it promoted itself as a well-known alternative for computer and mobile device industries. The company highlighted itself as the world’s â€Å"greenest lineup of notebooks†. According to Kim and Mauborgne (2009), the primary goal of Apple is to differentiate its products and intense competition in the PC and mobile device industry. However, App le faced some challenges when management and employees were having different opinions about running the company and they even missed some opportunities which impacted its competitive advantage and gave clear path to companies such as Dell, Gateway and Microsoft. Other failures that were faced by the company in its initial operational years comprised of design crime which meant it focuses on synonymous designs i.e. sleek and sexy and when it deviates from it some problems are encountered such as in 1998 the hockey puck which was colorful and translucent and 1997 20th anniversary Mac which was a bronze-colored monstrosity failed in the market; iWay or Highway approach by Jobs till 1997 made Apple lose its market share to Android as people wanted to freely use their iPhones and iPads and its attempt to target professional market by launching the Pippin, the Macintosh Portable, the invasion of the Mac clones and the Newton MessagePad; all were failure products (Pitta & Pitta, 2012; Tyna n, 2011). Apple Inc. now operates in various lines of computer and music industries; it designs as well as manufactures all of its computers and software. It was ventured into the music world by marketing its products such as iPod, iTunes and digital music player (Al-Rubaie, 2010). The main target market of Apple comprises of home users, small and medium sized businesses along with education segment that comprises of younger generation and creative individuals. Apple retail store has successfully captured its target market’s attention and helped it in offering direct access to its products and software. According to McGee, Thomas, and Wilson (2005), strategy used by Apple is differentiation strategy as it believes in providing innovative products to its target market that are developed with cutting edge technology. Recently, Apple won its case against Samsung in which it charged Samsung for copying the design of iPhones. According to Gahran (2012), the jury of much-hyped Appl e versus Samsung patent infringement lawsuit handed down the verdict in which Apple was given everything that it wanted which was a billion dollar payment from Samsung and possibility of injunction against sales of infringement of Samsung smartphones and tablets. The main critical success factors of Apple are that it has well integrated computer systems; AirPort Express is a package offered by the company that comprises of print spooler, audio, bridging and Ethernet; subcontracting of its

Friday, September 27, 2019

Economies of Scale Essay Example | Topics and Well Written Essays - 2500 words

Economies of Scale - Essay Example This concept is popularly known as 'Economies of Scale'. Many firms in different sectors of the economy are experiencing the economies of scale by virtue of expanding their economic activities to a greater level. The economies of scale may be internal or external. Internal economies of scale are experienced within the same firm while external economies of scale are experienced in the same industry. In this paper the internal economies of scale are discussed in detail in the Section-I. Subsequently disadvantages of the economies of scale for a firm as well as for the consumers of the firms experiencing economies of scale are described in the section-II and III. Finally the implications of the regulatory authorities on the concept of 'minimum efficient scale' has been described in section-IV. If the average cost per unit of input falls per unit increase in the output, then the firm is said to be enjoying the internal economies of scale. This in other words it can be expressed as a percentage change in all inputs leads to a greater percentage change in outputs. Here average total cost (ATC) first decreases because fixed cost such as buildings, equipments and management expenses remains constant and have been utilized to their optimum. The total cost is spread over a greater range of outputs. This increasing returns to scale is achieved till an optimum level after which any increase in the quantity of input, the average total cost(ATC) increases showing the diseconomies of scale. Firms which generally require large capital investments show economies of scale. This internal economies of scale is of five types, such as technical, commercial, managerial, financial and risk bearing economies. The pattern of the economies of scale is shown in the figure- 1. Figure-1: Various types of economies of scale (Source: http://www.bized.co.uk/educators/16-19/economics/firms/presentation/scale_map.htm ) There are various factors as shown in the figure-1 contributes to different economies of scale. Each factor has got significance for reduction in average cost of production thus making the output cheaper. Technical: Technical economies are when improved techniques benefits a firm to increase its production to a large extent. "Businesses with large scale production can use more advanced machinery (or use existing machinery more efficiently). This may include using mass production techniques, which are more efficient form of production" ( tutor2u.net). This technical economies of scale is achieved due to several factors, such as: Indivisibility of Plant:- Due to imperfect divisibility of factors the economies of scale occur and the long-run average cost falls because of this indivisibility of factors (Kaldor & Robinson, cited by Ahuza, 2004). In this case most of the factors are 'lumpy' i.e. they are available in large indivisible units which can therefore yield lower cost of production when they are used to produce a large output. Here example can be given of telecommunication industry where the initial investment in infrastructure is too high. So by increasing a larger clientele base only the fixed cost can be spread over and increasing return to scale may be seen. Likewise another example is radio-dispatching technology used by the police officers. The cost of installing the technology is about the same no

Thursday, September 26, 2019

IMRD RESEARCH PAPER (McDonalds) Example | Topics and Well Written Essays - 1250 words - 1

IMRD (McDonalds) - Research Paper Example It helps eradicate all chronic disease like diabetes through eating the right food. People should be ready for jogging mostly at the morning to avoid obesity. The disease is associated with heart attacks. This Keeps people in good shape, Regardless of Mc Donald’s being the community based company, it should consider the health factor of the people not only the profits. As the most bigly and formally known in the community, it should come up with booklet advising the community the significant of good meal but not to ruin their life by making them food addicts. By the company so doing health will be stabilized through feeding ourselves with good food. Most of the children are overweight or obese, this is caused with parent feeding their children in fats and a lot of food staff which is overwhelming the fridge and all store in the house. Parent should consider the food thy give their children. Not only to buy sweet and sugary food. People have to consider the benefit of the food they buy for their children. Mc Donald’s have been criticized for not selling standardized food for the children making them nearly one third of America children are fat. This has attracted attention in the nation from healthy professional, parent to consumer. As attention is centered with many people, it has forced the company to come up with sugar free juice like apple dipper. Most of the company customers are children who come to eat their as the company claim to raise more money for food. This will chase their client as many young people and children cannot afford to buy food there. This will make the company less competitive; therefore, it will be out of market and losing some of its customer hence going loss. The companies don’t want to lose its sale through rising of price. Many people were insulated that the company does not provide quality food which is harmful; to consumer and children that why it’s selli ng very cheap their food. Since the

Wednesday, September 25, 2019

Review and analysis designers in Objectified A documentary film by Movie

And analysis designers in Objectified A documentary film by Gary Hustwit - Movie Review Example Such an understanding, for designers, should weave into nearly all areas of human interest. This position reinforces the view that designers should seek to create solutions through their products and to meet the material and non-material needs of the consumers. Material goods and design products are embraced as aspects of culture in the sense that they create a sense of identity to the targeted consumers (Lipton 116). Perhaps it would be necessary to regard the mixture of the designers within the broad subject of globalization and the liberalization of market. According to the various speakers in the documentary, many of these designers are driven largely by forces beyond their creative impulse. The documentary provides various examples where designs have evolved in response to certain difficulties or a shift in preferences within cultures, groups, or communities. The design of kitchenware, for instance is largely conditioned by matters of convenience. Basing on the opinions supplied by various speakers in the documentary, it is important for designers to seek an understanding of various cultural aspects that determine people’s values and practices. Such an understanding enhances the capacity of designers to develop products that respond to the specific needs of populations. The Japanese are cited severally and variously as people with close attachment to their culture. The Japanese designers often tend to infuse cultural aspects into their product in a manner that balances the cultural aesthetics and the utilitarian value of the products (Ashoraft 2). On this score, it becomes important to consider the cultural forces that provide the creative synergies of products from Asia and other parts of the world. Moreover, the documentary provides evidence that designers have to rely on the outside world and the needs of the markets and targeted end users to develop products that meet specific objectives. Designers have to work together with

Tuesday, September 24, 2019

Justification of the Chemistry lesson plan and concept map Essay

Justification of the Chemistry lesson plan and concept map - Essay Example But after going thru the comments I realised that the heading is indeed quite broad and indicative of encompassing a wide range of topics. Though quite relevant one, but for a 60-90 minute class we need to have a more focused topic. Therefore, I changed the topic to, ‘Describe the use of pH scale in comparing the concentrations of acids and alkalis’. In addition, the prepared lesson plan appeared quite comprehensive; therefore I changed the duration of the lesson plan also to 90 minutes from 60 minutes. I do realise the fact that it might become a tiring experience for students to be attentive for a full one and half hours, but the fact that there are some interesting and interactive experiments within the lesson, will help in sustaining the interest of students all this while. In this case also, initially my effort was to demarcate the outcomes in an objective manner. So I included a total of 5 points under the head ‘objectives’ and seven points under the head ‘Key concepts/ ideas’. But the feedback made me realise that, with more points the lesson might give a lengthier look, which may result in putting off the students in the initial stages itself. Therefore in the revised lesson plan I included only three objectives viz. It certainly helps to be objective in order to grab the attention of students and make them feel comfortable. Ridley (2004) came out with the assertion that in order to overcome the differences in expectations existing between them, the teacher and students must have a minimum level of sensitivity and understanding towards each other. This is stated to be of particular importance in the beginning of an academic programme or while teaching a new concept. Therefore, too many points might give them a feeling of an overdose for the day. But it must be taken into consideration while we try to explain the ideas to the students we will

Monday, September 23, 2019

The Strategy of Economic Development and World Trade Via Free Markets Essay

The Strategy of Economic Development and World Trade Via Free Markets - Essay Example Patriotic consumption is brought out by the author as it becomes clear following a terrorist act that occurred in 2001. Due to the event, there were many claims by the public figures that the individuals were patriotic in spending their money in the place to stimulate the economy of the country. Due to the event that occurred, the people would be much concerned with personal and family affairs without the observation of the economic objectives of the country. it was noted that Americans had rationales to shopping before the attack occurred but this reduced as there were other new considerations when they did their shopping. According to Murray, preppies are the ones that can be used in the context to bring about linking of the roles. The link comes as the students are able to develop some moderate amount of discipline. Most successful students in their studies are those that have developed discipline and work extra hard in their studies. The students should find time out of class by getting themselves involved in recreational activities such as fine arts or enjoying a beautiful scene. This allows them to show knowledge and appreciation to the scenes. Partying is viewed as an event that enables one to forget about some factors though the event should be restricted to weekends only. Additional self-indulgence is required in activities that are daily carried out and they should be combined with self-discipline. When these practices are considered, there is taking the form of displaying better quality in the activities and goods that one uses (Milner, 78).

Sunday, September 22, 2019

Charles Manson and the Tate-Labianca Murders Essay Example for Free

Charles Manson and the Tate-Labianca Murders Essay On August 9, 1969 the seven innocent victims of the Tate-LaBianca murders were senselessly slain by a vicious cult and their leader Charles Manson†¦ Manson’s childhood was a troubled one, he was born Charles Milles Maddox on November 12, 1934 to sixteen year old Kathleen Maddox in Cincinnati, Ohio. Shortly after his birth, his mother married William Manson which gave him the name that is so well known today. Manson never knew his birth father. Not much is known about him other than he was a â€Å"Colonel Scott† of Ashland, Kentucky. In 1939, Kathleen was sentenced to prison for armed robbery, and a young Charlie spent the majority of his youth living in the homes of relatives and numerous boys homes. At the age of nine Charlie started his criminal career by burglarizing homes and stealing cars. Manson’s first violent offense came in 1952 when he sodomized another boy while holding a razor blade to his throat during his stay at a reform school. He was released in 1954 at the age of nineteen and met a young woman  named Rosalie Willis. They married in 1955 and a year later had a son, Charles Manson Jr. One month after the birth of his son, Manson was arrested for stealing cars and sentenced to three years which he served in San Pedro, California; his wife filed for divorce. After his release in 1958, Manson made a living by pimping, stealing checks, and conning women out of money. During this time he met and married a woman by the name of Leona and had a second son named Charles Luthor Manson. Leona divorced Manson after he was arrested yet again in 1960 and sent to McNeil Island Penitentiary. While serving his six year sentence Manson met a man by the name of Alvin â€Å"Creepy† Karpis, who happened to be a former member of Ma Barker’s gang. Karpis taught Manson to play the steel guitar which led to his obsession with music. Manson devoted much of his time in prison to practicing and writing music and held the belief that he would be a famous musician. Upon his release on March 21, 1967, Manson moved to San Francisco, California and began to collect a following of people. In 1968, Manson and several of his followers drove to Southern California where he met Dennis Wilson of The Beach Boys. Through Wilson, Manson was introduced to Doris Day’s son Terry Melcher. Manson believed that Terry was just the person that could help further his music career and was very upset when things did not work out. During this time the Manson Family moved into Spahn Ranch where Charles started piecing together his own philosophy based on a number of different religions. According to his interpretations of Revelations 9 and the Beatles’ song Helter Skelter, Manson also believed that there was a race war that was to take place in the summer of 1969 during which all of the black people were going to slaughter the white people. When this â€Å"war† did not take place Manson told his Family that they should â€Å"show the blacks how to do it†. (Rosenberg, 2010) On August 8, 1969, Manson ordered several of his Family members to kill any people inside the house at 10050 Cielo Drive. This house formerly belonged to Terry Melcher but was now being rented by Sharon Tate and her husband Roman Polanski, who happened to be in Europe on business at the time. Manson told his followers to â€Å"do something witchy†. After midnight on August 9th, Tex Watson, Susan Atkins, Leslie Van Houten, Patricia Krenwinkel, and Linda Kasabian walked up to 10050 Cielo Drive where they brutally shot and stabbed their first five victims; Steven Parent, Voytek Frykowski, Abigail Folger, Jay Sebring and Sharon Tate. Tate was eight months pregnant with both her and Polanski’s first child. Manson criticized his followers on the â€Å"messy job† that was done and took them for a drive later that night to look for more victims. Early the next morning Leno and Rosemary LaBianca were stabbed to death. On the wall and refrigerator was written â€Å"Death to Pigs† and â€Å"Helter Skelter†. It took authorities several months to discover who was behind the attacks. On November 6, 1969, while being held on an unrelated charge, Family member Susan Atkins told a fellow inmate of her participation in the Tate murders. She also admitted to being the one who wrote â€Å"PIG† on the Polanski doo r with Sharon’s blood and a towel. It was not until July 24, 1970 that Charles Manson, along with Susan Atkins, Leslie Van Houten, and Patricia Krenwinkel stood trial for the murders. The women were three out of the five Family members involved in the crime. Manson insisted on representing himself at trial, Ronald Hughes was assigned as assisting council in the case and to represent the girls. In March, Hughes suggested that Manson bring in attorney Irving Kanarek, who was known for his obstructionism tactics. Manson agreed and two weeks before the trial began he introduced Kanarek as his council. Hughes then moved his primary defense to Leslie Van Houten, who was said to be the least devoted to Manson. The prosecution was led by Vincent Bugliosi; his main goal in the case was getting a first degree murder conviction for Charles Manson. He planned to accomplish this by proving that Manson dominated his Family, with the prosecution’s star witness Linda Kasabian. This would prove to be an easy accomplishment. Kasabian agreed to testify when the prosecution made a deal for her immunity. In 1969, Kasabian, the married mother of two who had left home â€Å"in search of God†, met and fell in love with who a friend had described as â€Å"a beautiful man named Charlie† (Linder, 2008). Six weeks after Kasabian had joined the Family, Charlie decided that it was â€Å"time for Helter Skelter† (Linder, 2008). She then rode with Tex and the other defendants to the Tate house and witnessed the horrific killings of Steven Parent, Abigail Folger, and Voytek Frykowski. Although Kasabian was present for the murders,  she did not enter the house nor did she directly participate in them. She was quoted as saying to Manson, â€Å"I’m not like you Charlie, I can’t kill anyone† (Linder, 2008). She later rode with Manson and the others to the LaBianca house where she stayed outside and did not see the murders. Three days after the murders took place Kasabian left the family to rejoin her husband. She later turned herself into police in order to tell her story. Before she was able to return home to her family, Kasabian took the witness stand. While on the stand for eighteen days, she testified to everything that was done or said from the moment they left the ranch until they returned after the LaBianca murders. Prior to the Manson trial, Hughes had never tried a case and it showed early in the trial. Although using his knowledge of the hippie culture, he was able to raise some questions about Linda Kasabian’s testimony by pointing out that she had used hallucinogenic drugs and believed she was a witch. He also questioned her credibility by stating that she believed in ESP and would get â€Å"vibrations† from Charlie. Hughes’ main goal in Van Houten’s defense was to separate her from the rest of the defendants by showing that she was not acting of her own free will but was being controlled by Manson. It was said that Manson was not happy with the defense Hughes was offering Van Houten. In the last weekend of Novem ber, Hughes failed to show up for court and was never seen alive again. His body was not found until four months later and was badly decomposed. At least two of Manson’s Family members claimed that it was a retaliation killing for Manson. On January 25, 1971 a jury found all four defendants guilty of first degree murder in the Tate-LaBianca case. Two months later in March the jury sentenced all four to death. However, the principal actor in these murders, Tex Watson was yet to be tried. After the murders Tex returned to Texas where he was later arrested. He fought the extradition proceedings just long enough to get his own trial. In October 1971 Charles â€Å"Tex† Watson was convicted of seven counts of first degree murder. He would have received the death penalty if it was not for the California ruling that the death penalty was unconstitutional which also converted all four of the previous defendant’s sentences to life in prison. The Tate-LaBianca case has been the topic of controversy since it started in 1970. Some people claim that the trials were biased based on the fact that Manson and his followers chose to live a â€Å"hippie† lifestyle which  included the use of a number of drugs as well as free sex amongst each other. There was also a statement that president Nixon made claiming that Charles Manson was guilty whether it was directly or indirectly. Nixon claimed that he said this in order to criticize the media for glorifying criminals. Whatever the reasoning was behind this remark the defense in the case attempted to use it to have the case thrown out stating that an unbiased jury was now impossible. The judge denied the request however, and the trial continued. Whether the jury was biased or not the fact remains that these five individuals are responsible for the killings of at least seven innocent people and possibly countless others and should be punished for their crimes. Reference: Linder, D. (2008). The Defendants and Other Key Figures. In Trial of Charles Manson. Retrieved from http://www.law.umkc.edu/faculty/projects/ftrials/manson/manson.html Linder, D. (2008). A Chronology and Selected Images. In Trial of Charles Manson. Retrieved from http://www.law.umkc.edu/faculty/projects/ftrials/manson/manson.html Rosenberg, J. (2010). Biography of Charles Manson. In 20th Century History [Biography]. Retrieved from http://history1900s.about.com/od/1960s/p/charlesmanson.htm Bardsley, M. (2010). The Trial. In Charles Manson and the Manson Family. Retrieved from http://www.trutv.com/library/crime/serial_killers/notorious/manson/2.html

Saturday, September 21, 2019

Gothic Horror Stories Essay Example for Free

Gothic Horror Stories Essay Gothic horror is a type of romantic, horror fiction based on irrational fear that predominated in 18th century England. The term gothic originated from the architectural style of the middle ages, but came to describe the dark, terrifying tales that achieved such popularity. Gothic horror can be determined by many things which exist in all gothic horror stories, for example eerie settings such as gothic monasteries, bleak comfortless castles, grave yards and cobwebbed rooms lit by guttering candles. It can also be determined by a unique character such as a beast, monster, ghost, evil creature and innocent person. Usually the innocent person is killed by the evil creature in a gothic horror story. Fear, supernatural and the macabre were also essential elements in gothic horror. I looked at six stories but I will focus on three of the stories which appear to fit the genre, these stories are The Judges House written by Bram Stoker who lived from 1847 to 1912. It is about a person called Malcomson who moves into an old house. He gets disturbed by rats while living in the house and then gets killed by a judge. The Tell Tale Heart written by Edgar Allen Poe who lived from 1809 to 1849. This is about a man who is killed by another man at his house, police go to the house after getting a disturbance call from the neighbours then the killer confesses about the murder to the police. The Signalman written by Charles Dickens who lived from 1812 to 1870. The story is about a signalman who sees a ghost and every time he sees it, the ghost shows something in the future which is going to happen. The signalman tells a passing man about this incident, the man and him become friends. Then the signalman sees his own death without knowing, he tells the man about this, they think of a rational reason for this but however the signalman dies. All three stories were written in the 19th century. They were all set at the same time when they were written. This is a good effect because at the time when they were written, horror stories containing superstition and the macabre were popular because the people at that time believed in witchcraft, ghosts and demons. The location of the action is of great importance in the gothic novel because it creates an atmosphere and feeling to the story. The Judges House is located in the dining room of an old, quiet and isolated house. An old, rambling, heavy built house, this creates a scary atmosphere thus matching the typical setting of a gothic horror story. It goes on to describe the dining room as a, room in darkness, this also creates a scary and terrifying atmosphere because you cant see in the dark and you dont know whats in the dark, this also is an essential gothic horror element because darkness creates a creepy and scary atmosphere. The Tell Tale Heart is located in a house that is probably old as a lantern is used by the narrator, this creates a scary atmosphere like the Judges House because you cant see in the dark and you dont know what is in the darkness so the reader imagines things that create the scary atmosphere, for example, the reader may imagine evil creatures emerging from the darkness, or someone suddenly jumping out from the dark surroundings. The Signalman is located in a railway station that is isolated which is gloomy and dark. This creates an intimidating atmosphere because isolation makes the reader think why it is isolated and the darkness as I said before creates a scary atmosphere. Also it refers to the place as being a great dungeon which is a typical setting of a gothic horror story. From the three stories I have read, the plot in the story was similar, it is really about good versus evil and because its a gothic horror story evil is supposed to win. The Judges House it is about a person called Malcomson who moves into a old house because he wanted to get on with his studies he was doing, in this house Malcomson gets disturbed by rats, especially one rat that was bigger and looked evil. Then one day he was killed by the judge that haunted the house, who was in fact the bigger and evil rat. This is a typical gothic horror plot because the good is killed by the evil. I think Stoker wrote the story well because he always throughout the story created a scary and macabre atmosphere by using descriptive words baleful eyes to describe a thing such as the rat which would produce a frightening image in the readers mind. I think Stoker did this well because his usual style is horror. This is a typical gothic horror plot because the good is killed by the evil. The Tell Tale Heart is about a crazy man who kills an old man because he didnt like the old mans eye. I think Poe wrote the plot as he did because his usual style is being a critic, so he put a bit of criticism in the story as the man killed the old man because he didnt like his eye, he thought it resembled that of a vulture. This also is a typical gothic horror plot because the innocent person (the old man) is killed by the evil person (the crazy man). The Signalman differs from The Judges House and The Tell Tale Heart because the evil doesnt kill the good or innocent this time. The Signalman is about a signalman who sees a ghost which warns him about something which is going to happen. The thing which the ghost warns the signalman about is his death, and then the signalman dies. This isnt really a typical gothic horror plot. I think Dickens wanted to create a mystery in the story as well as horror because his usual style of writing is mystery and horror, so he put mystery in because he is use to it. Characterisation plays a major part in all three gothic horror stories. In The Judges House Malcomson is studying mathematics and people who study are thought to have a more mature approach to the supernatural, this is why he laughs when Mrs Dempster, the charwomen, warned him about mysterious somethings I think Stoker chose this character because he would fit a typical character as he is a innocent and rational person, Stoker knows this because horror is his usual style of writing. Also Malcomson is a very intrigued in his studies, I think Stoker gave these characteristics in Malcomson because Stoker himself went to college and knows how studying is interesting and affects a young person. The judge, who is another main character, only comes in the story at the end, but at the end we also find out that the judge is in the story before the end as the big, evil rat. I know that the judge is evil because every time this big rat comes, all the other rats go because of its present. I also know its evil by how Stoker described the rat, baleful eyes, and these descriptions produced, an image in my head showing that it was evil. The judge meets the character determinant as he is the evil creature, he is like a ghost that haunts the house and he is described in a certain way to make him look wicked and evil.

Friday, September 20, 2019

The Information Technology Act

The Information Technology Act When Internet was developed, there was hardly any inclination that Internet could transform itself into an all pervading revolution which could be misused for criminal activities and which required regulation. Today, there are many disturbing things happening in cyberspace. Due to the anonymous nature of the Internet, it is possible to engage into a variety of criminal activities in cyberspace. All existing laws had to be amended to suit the latest developments. Since other laws cannot handle cyber legislations completely, the need was felt to introduce cyber law as a separate discipline. Reasonable Security Measures must be adopted while handling, storing, processing Sensitive Personal Information and Data. This paper examines the various aspects of Cyber Legal System. Keywords- Cyber Crimes, Cyber Crime Investigation, Cyber Forensics, Cyber Space, Cyber Law, Data Protection, Digital Signatures, E-Contracts, Intellectual property rights, IT Act INTRODUCTION The growth of Information Technology has given rise to a new society named Cyber Society. Computers and allied technology is used as a basic tool in Communication, Storage, and Control. Cyber Society includes Cyber Space which is no different from physical space in real society. Information and Communications Technology popularly known as ICT is considered as an integration of computers, software, storage, visual systems, telecommunications that enables a user to access, store, transmit and handle information. To maintain harmony and co-existence in Cyber Space, a need was felt for a legal regime which we call as Cyber Law. In simple words, Cyber Law is the law governing and regulating cyber space. Cyber Laws impact every aspect of Cyber Society be it Education, Entertainment, Business etc and are considered as basic laws of Cyber Space. INFORMATION TECHNOLOGY ACT Indian Cyber Law comprises mainly of Information Technology Act. The Information Technology Act was enacted in the year 2000 and came into force since then. IT Act 2000 is not a penal statute. The Act is intended to promote e-governance of which an essential part is e-commerce. All cyber crimes do not come under the ambit of IT Act; many crimes are covered under IPC. The objective of IT Act 2000 is to provide legal recognition to electronic records and transactions carried out by way of electronic data interchange. CYBER CRIMES Cyber Crimes require no special introduction. In this information technology era, computers and technology are used in every phase be it Business, Education, Governance, Communication, Booking of Rail, Air, Cinema Tickets to name a few. Crimes committed in the Cyber World are Cyber Crimes. In general, cyber crimes can be explained as crimes committed by using a computer either as a tool or a target or sometimes both. There are a variety of Cyber Crimes including Unauthorized Access, Tampering Computer Source Code, Electronic Documents, Forgery, Virus, Trojans, Online Defamation, Cyber Trespass, Stalking, Email Harassments, and Lottery Scams etc. New types of crimes are evolving day by day. Information Technology Act 2000 discusses certain types of Cyber Offences and provides Civil and Criminal Remedies thereon. The punishment is also provided under Information Technology Act 2000, Indian Penal Code, Criminal Law, and Banking Law etc. Therefore, any crime committed on the Cyber Space or by use of Cyber tools is punishable under Indian Law. These Laws are also applicable for persons residing outside India provided any computer, computer network, computer resource in India is used to commit a crime. E-CONTRACTS DIGITAL SIGNATURES A contract is considered as a key element in business. All agreements enforceable in a court of law only are called contracts. The ICT has given a new medium to transact business which is the electronic medium. A new form of business called e-business has become popular today which led to a revolution in commerce by way of e-commerce. With the rise in e-commerce, e-business, the business essentials also turned electronic. This has bought in a revived approach to paper based contracts by introducing e-contracts or online contracts. Information Technology Act has provided legal recognition to all e-contracts. The Act has advanced a unique form of authentication by way of e-authentication which includes digital and electronic signatures. An Electronic document to be legally valid has to be affixed with digital/ electronic signature. The digital signature is needed to use a PKI (public key infrastructure) authentication mechanism. Digital Signature forms an important component of E-contracts and a standard one way hash algorithm is adopted for checking the data integrity. In simple words, there is a public key which in the public domain and there is a private key which is known only to the private user, only if both the keys correspond the document is validated. The Government has licensing authorities called CAs (Certifying Authorities) who would be responsible for issuing a standard key generation systems to the public. A digital certificate would be issued based on application and certain approved procedures. At present there are four agencies established for this purpose including NIC, IDRBT and two private agencies like TCS, Safe Scrypt. IT Act 2000 has also provided a clarification as to determining the time and place of an electronic document when it is transmitted from one place to other. Any electronic document including a webpage, e-mail or any computer generated document can be held against the originator for legal purpose under the ambit of this law. Any automatic system which is either a hardware or software like programs, servers, routers can be considered as an Agent of the owner and any action taken by such a system may be legally held to be an action taken by the owner himself. DIGITAL RIGHTS Freedom of Speech and Right to Privacy are considered as certain rights which all the Citizens enjoy in the nation. Correspondingly, these rights also exist in the digital world. Just as freedom of speech is guaranteed by the Constitution of India, the same also extends to Online Speech or Cyber Speech that might include expression on a website, rights of regulators to restrict the freedom in the interest of sovereignty and integrity of the country, maintaining friendly relations with its neighbors as well as to retain harmony and peace in the society. The Information Technology Act provides that the Controller of Certifying Authorities can order decryption of any information and failing to co-operate with the concerned authority could lead to imprisonment. In addition, under POTA (Prevention of Terrorism Act), the appropriate authorities can intercept communication including emails under approved procedures without the knowledge of the user of the email. Likewise, an investigating Police officer has certain rights to not only intercept and monitor communication but also provide requisition support of the Network administrator for the purpose under Criminal Law read along with Information Technology Act. Right to privacy is a personal right that is guaranteed by the Constitution of India. In the world, whenever a person visits a website or sends out an e-mail his digital identities are being recorded by several systems. Additionally, users share their personal information for varied reasons to different websites. This information is covered under the privacy rights of a user. INTELLECTUAL PROPERTY There exists digital property in cyber world as like the real property in real world. The digital property is also known as Intellectual Property. It is an intangible asset and a vital element in the e-business. It comprises of Copyright, Patent, Trade Mark, Trade Secret, Domain Name, Semi Conductors and Industrial Layouts, Designs. Domain Name is a crucial digital property which a website owner possesses. There is a contractual arrangement between the Domain Name Registrant and Domain Name Registrar. Domain Name registrars are those who are authorized for the purpose by ICANN (Internet Corporation for Assigned Names and Numbers) and the law regarding domain names is governed indirectly by the policies of the ICANN. Laws relating to domain names is associated and linked closely to Trade Mark Law. Generally, the person holding a trademark right can claim priority to possess a corresponding domain name. Content is another cyber property that needs to be considered. Content either within a file or on a website confers a copyright to the original author. The holder of copyright can assign or license the copyright for a price or allow it to be freely used by the public. Infringement, Punishments, Remedies are provided under the Copyright Law. Copyright in cyber world has some grey areas mainly due to a strict definition of Copyright law as applicable to the Meta Society would make Caching, Proxy Server Setting, Meta Tags setting, Caching by a search engine, Hyper linking, Framing, File Sharing etc as possible copyright infringements. Another area where digital property can be recognized is patents on Software and Web Utilities. These are encompassed under the Patent laws. A patent holder can enforce payment of licensing fee or damages if a Patent system is used by another person without specific authorization. Patents in the cyber world are facing a dilemma especially in regard to aspects of technology that are needed to keep the Internet going like Framing, Hyper Linking etc since they are claimed as patented products by the patent holders. DIGITAL EVIDENCE Evidence is the element which probablises a case in a court of law. The evidence in digital form is called Digital Evidence. This digital evidence may be found in computer hard disks, cell phones, iPods, pen drives, digital cameras, CDs, DVDs, floppies, computer networks, the Internet etc. In Civil Law, evidence is analyzed on the principle of PREPONDERANCE OF PROBABILITY. In Criminal Law, evidence is analyzed on the principle of BEYOND RESONABLE DOUBT. Digital Evidence is relatively difficult to destroy. Even if it is deleted, digital evidence can be recovered. When criminals attempt to destroy digital evidence, copies can remain in places they were not aware of. The Present Legal Scenario mandates two sets of quantum of evidence à ¢Ã¢â€š ¬Ã‚ ¢ STRINGENT à ¢Ã¢â€š ¬Ã‚ ¢ RELAXED FACTORS OF DIGITAL EVIDENCE à ¢Ã¢â€š ¬Ã‚ ¢ IDENTIFICATION à ¢Ã¢â€š ¬Ã‚ ¢ PROCUREMENT à ¢Ã¢â€š ¬Ã‚ ¢ PRESERVATION à ¢Ã¢â€š ¬Ã‚ ¢ ANALYSIS à ¢Ã¢â€š ¬Ã‚ ¢ PRESENTATION IN A COURT OF LAW If it can be proved that the chain is not compromised and from the time the sample is taken a standard protocol was followed,the defence tries to demonstrate that there was a possibility of compromise in the chain and proves that he is entitled for a benefit of doubt.(NDPS ACT ,FOOD ADULTERATION). The basic philosophy of understanding or accepting evidence is to know its authenticity. A document should be demonstrated or proved that it is the same document what is purports to be. The forensic skills, technology may be used to prove or demonstrate before a court of law. Section 65 B of the Indian Evidence Act 1872- a certificate similar to Section 3, 4 of Bankers Book Evidence Act. LOGIC BEHIND THE LAW In a secure environment, if persons are to transact there should be a trusted authority. The authority would supervise things to check the integrity, attributions and to prevent non- repudiation. If all these characteristics are given to any environment, the legal system of any country would accept it as legally admissible evidence. TRUSTED AUTHORITY The certificate issued by a trusted authority there is a general tendency to believe it to be true. There are many cases of manipulation of these certificates, but still such systems are not scrapped off. Eg: Voter ID, Passport There cannot be a 100% fool proof system. If it can be demonstrated before a court of law that the new technology is reasonably reliable which would indicate that if manipulated can be found out, then it is accepted by the court. The trusted authority is the certifying authority. It certifies the digital signature. There is an attribution or a presumption a corresponding amendment in the Evidence Act all these together make a presumption. All presumptions are rebuttable. The presumption shifts the onus or burden to the other party to prove the compromise. It applies to civil and criminal law. It is the passport office of the digital world. CYBER CRIME INVESTIGATION It is the Collection, Analysis, investigation of digital evidence, cyber trails. The various techniques of cyber crime investigation include forensic analysis of digital information -using forensic tools, use of sound forensic procedure to identify and detect evidence, examination of evidence, observation of proper custody of evidence, control procedures, documentation of procedures, findings to ensure admissibility in a court of law, preparation of comprehensive written notes, reports. INCIDENT RESPONSE It is considered as a pre-cursor to techniques of cyber crime investigation, forensic tools. Incident Response may be referred to as precise set of actions to handle any security incident in a responsible, meaningful and timely manner. The goals of incident response include confirming whether an event has occurred, educating senior management, helping in detection or prevention of such incidents, minimizing disruption, facilitating criminal action against perpetrators. Various steps of incident response are detection of incidents, initial response, investigation of event, reporting, resolution, pre-incident preparation. CYBER FORENSICS It is considered as the use of investigative, analytical techniques to identify, collect, examine, preserve and present evidence or information which is magnetically stored or encoded. Cyber Forensics can be also defined as the scientific method of examining, analyzing data from computer storage media so that data can be used as evidence in court The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computer and who was responsible for it. Computer evidence is just like any other evidence in the sense that it must be authentic, accurate, complete, convincing to Juries, in conformity with common law and legislative rules. EXAMINER OF ELECTRONIC RECORDS Section 79 A of IT Amended Act 2008 empowers the Central government to appoint any department or agency of Central or State government as Examiner of Electronic Evidence. This agency will play a crucial role in providing expert opinion on electronic form of evidence The explanation to the Section has an inclusive definition of electronic form evidence that means any information of probative value that is either stored or transmitted in electronic form and includes computer evidence, digital audio, digital video, cell phones, digital fax machines. With the increasing number of cybercrime cases it will become necessary to set up at least one Examiner of Electronic Evidence in each State. The CDAC cyber forensics lab in Trivandrum, CFSIL laboratory in Hyderabad are playing similar role at present in cybercrime. COMPUTER- LEGAL DEFINITION COMPUTER is defined under Section 2(1)(i) of the IT Act as:- Computer means any electronic magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software, or communication facilities which are connected or related to the computer in a computer system or computer network;[1] ANALYSIS OF DEFINTION The term computer has been defined in a very wide sense. Considering the definition, devices like microwave ovens, washing machines, scanners, printers, desktops, personal computers, mobile phones etc are considered as a computer under Information Technology Act. COMMUNICATION DEVICE Similarly the word communication devices inserted in the Information Technology Amended Act 2008 has been given an inclusive definition, taking into its coverage cell phones, personal digital assistance or such other devices used to transmit any text, video etc like what was later being marketed as iPad or other similar devices on Wi-Fi and cellular models. CYBER SECURITY There is a need to create a secure environment in cyber space and also prevent unauthorized access and misuse of computer system. In simple words, the security of the cyber space can be called cyber security. Cyber security is critical due to the dangers that threats in cyber world. It requires a global co-operation and effort from all stake holders. DEFINITION The term Cyber Security is for the first time given a legal definition under Indian Cyber Law. Cyber Security has been newly added in the IT Amended Act 2008, under Section 2 (nb) which is as under- Cyber Security means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction. [2] ANALYSIS OF DEFINTION The said definition provides security in terms of both, physical security to the devices and security to the information stored therein such devices. The above definition also provides protection for unauthorized access, use, disclosure, disruption, modification and destruction to both physical device and the information stored therein. All communication devices like phones, smart phones and other devices used to communicate audio, video, image, text is covered under the ambit of the definition. DATA PROTECTION LEGAL REGIME Processing of data raises considerable issues on privacy, e-security, misuse of individual information and data. Personal data like credit cards, debit cards etc are normally routed via many countries. The Government of India recently notified the Reasonable security practices and procedures and sensitive personal data or Information Rules, 2011 (Rules) under Section 43A of the Information Technology Act, 2000 (ITA). These Rules have been made effective from April 11, 2011. Section 43A of the ITA inter alia deals with protection of data in electronic medium1 by providing that when an body corporate is negligent in implementing and maintaining reasonable security practices and procedures in relation to any sensitive personal data or information which it possesses, deals or handles in a computer resource which it owns, controls or operates and such negligence causes wrongful loss or wrongful gain to any person, such entity shall be liable to pay damages by way of compensation to the person so affected. Section 43A applies to data or information in a computer resource. The Rules define Personal Information and Sensitive personal data or information to mean as follows: Personal Information means any information that relates to a natural person, which, either directly or indirectly, in combination with other information available or likely to be available with a body corporate, is capable of identifying such person Sensitive personal data or information means such personal information which consists of information relating to;- (i) Password; (ii)Financial information such as Bank account or credit card or debit card or other payment instrument details; (iii) Physical, physiological and mental health condition; (iv) Sexual orientation; (v) Medical records and history; (vi) Biometric information; (vii) Any detail relating to the above clauses as provided to body corporate for providing service; and (viii) Any of the information received under above clauses by body corporate for processing, stored or processed under lawful contract or otherwise.[3] EXCEPTION TO SENSITIVE PERSONAL DATA OR INFORMATION Any information that is freely available or accessible in public domain or furnished under the Right to Information Act, 2005 or any other law for the time being in force is not to be regarded as sensitive personal data or information. ANALYSIS Definition of personal information is wider than sensitive personal data or information (SPDI). The definition of SPDI is in the nature of an exhaustive list of items. Hence, no other information apart from the one listed above, would be considered as SPDI. It is interesting to note that Section 43A only included SPDI within its ambit, but some of its provisions of the Rules have been made applicable to Personal Information. It is appropriate to note that these Rules apply to personal information irrespective of the nationality of the provider of the information; thus information provided not only by Indian nationals but also by nationals in different jurisdictions, whose information is stored, dealt or handled by a corporate entity in a computer resource in India would attract the provisions of the ITA. The applicability is driven by the location of computer resource in India, as can be seen from the wording of Section 43A of the ITA read with the Rules. Rules will also be applicable in cases where the information is collected in India and is transferred to any computer resource outside India and also in cases where the information is neither collected nor stored in India, but is dealt with or handled in India E.g. even accessed from India. Thus, typical outsourcing businesses where personal information of foreign nationals is transferred to Indian entity (ies) who deal or handle such information would henceforth attract the provisions of the IT Act. DATA PRIVACY RULES SECURITY MEASURES The Data Privacy Rules require that the body corporate and the Data Processor implement reasonable security practices and standards; have a comprehensively documented information security program, and security policies. These must contain managerial, technical, operational and physical security control measures that are commensurate with the information assets being protected and with the nature of business. The International Standard IS/ISO/IEC 27001 on Information Technology Security Techniques Information Security Management System Requirements is recognized as an approved security practices standard that the body corporate or the Data Processor could implement to comply with security measures under the Data Privacy Rules. Any other security standard approved by the Central Government may also be adopted by the body corporate or the Data Processor in compliance with the security measures under the Data Privacy Rules. The security standards adopted by the body corporate and the Data Processor should be audited by an auditor approved by the Central Government. The audit must be carried out at least once every year, or at such times as the body corporate or the Data Processor undertakes a significant upgrade of its process or computer resource. If there is an information security breach, the body corporate or the Data Processor will be required, upon request from a governmental agency, to demonstrate that it has implemented the security control measures as per its documented information security program and information security policies. A corporation is required to designate a Grievance Officer to address the grievances of the Provider. The name and contact details of the Grievance Officer must be published on the website of the body corporate. The Grievance Officer must address the grievances within 1 month from the date of receipt of grievance. JURISDICTION Since the cyber world is a boundary less world, there are lots of issues regarding Jurisdiction, which laws would apply. Material may be lawful at one place, but unlawful somewhere else for instance the places from where is it accessed. The Yahoo Case is a classic example. ILLUSTRATION Consider a scenario, where a person A is employed as a computer programmer by a bank in Country X. The programmer managed to instruct a computer to transfer money to his account in Country Y. A case was registered against the programmer in Country X. On Appeal, the Court in Country X had no jurisdiction over matters from Country Y. Though S.75 of IT Act provides for extra-territorial operations of this law, but these should be enforced with orders and warrants of external authorities and demands a highest level of inter-agency cooperation. ADJUDICATING AUTHORITY ADJUDICATING OFFICER Up to Rs.5 Crores IT SECRETARY OF THE STATE. CYBER APPELLATE TRIBUNAL appellate jurisdiction. SUB COURT or CITY CIVIL COURT. CYBER CRIME PROSECUTION Section 67 C to play a significant role in cyber crime prosecution- Section 67 C brings a very significant change in the IT Act, 2000. According to this section, intermediaries shall be bound to preserve and retain such information as may be prescribed by the Central government and for such duration and format as it may prescribe. Any intermediary that contravenes this provision intentionally or knowingly shall be liable on conviction for imprisonment for a term not exceeding 2 yrs or fine not exceeding one lakh or both. Many cybercrime cases cannot be solved due to lack of evidence and in many cases this is due to the fact that ISP failed to preserve the record pertaining to relevant time . This provision is very helpful in collection of evidence that can prove indispensable in cybercrime cases POSSIBLE RELIEFS TO A CYBERCRIME VICTIM- STRATEGY ADOPTION A victim of cybercrime needs to immediately report the matter to his local police station and to the nearest cybercrime cell Depending on the nature of crime there may be civil and criminal remedies. In civil remedies, injunction and restraint orders may be sought, together with damages, delivery up of infringing matter and/or account for profits. In criminal remedies, a cybercrime case will be registered by police if the offence is cognizable and if the same is non cognizable, a complaint should be filed with metropolitan magistrate For certain offences, both civil and criminal remedies may be available to the victim CONCLUSION The word cyber crime is not mentioned in the IT ACT for the reason that not to scare away the potential users and keeping in mind the basic philosophy of reducing the digital divide(computer literate or not ) . Reasonable measures should be adopted. The IT Act is an articulation of all existing laws with e added to most of the provisions. The dark or grey areas should not alone be highlighted. We can therefore conclude that cyber law knowledge is the need of the hour for the persons working with computers, computer systems, computer networks, computer resources and information communication technology since these laws cover the legal aspects of the information technology and ignorance of law is no excuse in the eyes of law.

Thursday, September 19, 2019

An Inspector Calls by J.B. Priestley :: Papers

An Inspector Calls by J.B. Priestley Set in a modern Victorian house in South America. It is mid autumn in October.Charmaine lives with her mother,Liz. ''Ive told you already,Charm, your not having a Halloween party!'' ''But mum, you have never let me have a party before.'' ''I know and whatever you do or say isnt going to change my mind about it.'' ''Just at least let me take responsibility for something for once!'' ''No,your not having a party in this house.'' ''Why are you being so unfair, i hate you sometimes!'' ''Dont you ever say you hate me. Just go to school. Ive had enough of you!'' exclaims her mother. Charmaine grabs her bag,sandwich,Snickers bar and bottle of Evian,then she checks her long,silky hair in the mirror before she leaves. As Charmaine arrives at school she sees her friend Maxine starting to approach her,Maxine looks kinda upset and Charm wasnt really in the mood to make her best friend feel as happy as usual. Also Charm had bad news to tell her friend about the party. ''Hey Max, are you alright?'' ''Not really, I had an argument with my mum this morning and she said I am not aloud to go out tonight,I have to babysit Liam because shes going to a meeting at work.'' ''I had an argument with my mum too, I asked her if I was aloud a party tonight and she said ''No'' just like everything I ask for.'' ''Oh maybe we should just give Halloween a miss this year.'' ''Well I had an idea. My mum is going out tonight night with some work mates and maybe if I asked her if I could have a couple of friends round to watch a few scary movies,she might let me.'' ''Yeah she might do and I could ask her if I could bring Liam with me to your house, if you don't mind him being there.'' ''Sure,I dont mind, it will be well good,get to see Johnny Depp,in his new flick.'' ''He is so gorgeous!''

Wednesday, September 18, 2019

Alcohol and its effects Essay -- essays research papers fc

Alcohol is a large part of American culture. All over the United States drinking is not only acceptable but a social norm from teenagers to adults. This is not only the case in the U.S., but all over the world, where some drinking ages are 18 and 19 years of age. In America specifically, alcohol has been around for centuries and is a large part of many social gatherings. Although this is the case now, in the early 1900’s during the prohibition period, all alcohol was banned and deemed illegal to possess. Even though illegal, the task was just too heavy and alcohol was too much a common practice for most Americans. As time went on the prohibition period ended and the laws were revoked, making it legal again to possess alcohol. The drinking related problems that were around during prohibition pale in comparison to the problems alcohol has caused since then. Many people wonder if kids are drinking earlier and earlier and they feel the drinking age should be raised. On the other hand many people are against raising the drinking age, mainly those whom would be affected by this decision, Americas youth. From its affect on society, including its appeal towards young adults, to the diseases it causes, the problems of alcohol abuse are widespread and in many forms.   Ã‚  Ã‚  Ã‚  Ã‚  It is a known fact that many Americans drink alcohol on a weekly basis. Depending on the rate and volume of consumption, alcohol has many different effects on the human body. Light drinking has been proven not to be a problem, and is even considered to be healthy. A glass of Red wine once a day is known to be beneficial to the heart. It helps prevent coronary heart disease by reducing plaque deposits in the arteries surrounding the heart, preventing blood clotting, while also helping to dissolve clots that already exist (Rehm 1210). Moderate and heavy drinking is a different story though. When drinking to the point of moderate to heavy consumption, there is a greater risk for personal injury. Car accidents are not the only causes of injury when under the influence of alcohol. Many incidents of injury are directly related to alcohol consumption including violence, and accidental personal injury. This being said, drunk driving is the main cause of death associated w ith alcohol consumption (Rehm 1220). Researchers have found that with increased volumes of alcohol consumption on... ...  Ã‚  Health and Research World, 1991, 52. This article speaks of adolescent alcohol use and abuse. It examines the lack of research done on adolescent health issues and the current knowledge of the consequences of adolescent alcohol consumption. The article also presents strategies on how to inform and clarify the issues of adolescent alcohol abuse. Brad Mackay, â€Å"Alcohol Rivals Tobacco for Health Impact: WHO,† Canadian Medical   Ã‚  Ã‚  Ã‚  Ã‚  Association, June 8, 2004, 1778. This article was short but provides a good comparison of alcohol and tobacco. The article presents good facts while giving good suggestions for solutions to the rising problems with alcohol. Jurgen Rehm, â€Å"The Relationship of Average Volume of Alcohol Consumption and Patterns of Drinking to Burden of Disease: An Overview,† Addiction Research Institute, May 8, 2003, 1209-1228. This article is aimed towards a large study to estimate the global burden of disease attributable to alcohol. The article tries to identify the relationships between average volume consumption, patterns of drinking, disease, and injury outcomes. The article also gives many numbers to back up its points.

Tuesday, September 17, 2019

Apa Formal Research Paper

Running head: APA Formal Research Paper Include a running header (a short title of your paper) only on the title page Type as: Running head: TITLE IN ALL CAPS All additional pages should just have the short title without the phrase Running head Center the title The long title of your paper should include the main idea and scope of your paper The title should be typed in 12 point Times font Do not bold, underline, or italicize the title How to Format a Formal Research Paper Using the APA Citation Style 1 Include a page number on every page Jane Student State UniversityCenter and double space your name and the name of your college, university, or institution Education 432 Professor Haberdasher March 15, 2010 Center and double space the course title and number, the instructor, and the date APA FORMAL RESEARCH PAPER Start your abstract on page 2 Abstract Center the word Abstract Some assignments will call for an abstract. An abstract is a summary of your paper. An abstract should be shor t and concise but include the topic of your paper, the main points you are writing about, and the conclusions you reach. Do not indent the 1st line of your Abstract It should be written in block format Include a brief sentence summary for all sections of your paper. An abstract is typically 150-250 words long. APA FORMAL RESEARCH PAPER Center the full title at the beginning of the main body of the paper 3 How to Format a Formal Research Paper Using the APA Citation Style After your title, begin your paper with your introduction. Do not use the Your paper should: * be double spaced * have 1 inch margins * be typed in Times font * indent paragraphs ? inch or 5-7 spaces Footnotes can be used to provide additional information Use a superscripted number and include a Footnotes section at the end of your paper ord Introduction as a heading. It is understood that the opening paragraph of your paper is your introduction. The APA suggests the following set up for an introduction: Introduce t he problem, explore the importance of the problem, describe relevant scholarship, and explain your approach to solving the problem. This may vary depending on your assignment. Headings should After you write the introduction, you will develop the body of the paper. be boldfaced, centered, and all major words In a formal psychology paper documenting an experiment, the standard capitalized structure for an experiment is: Method, Results, Discussion.Each of these sections would use a heading to guide the reader through the paper. The paper ends with References, Footnotes, Appendices and Supplemental Materials1. Consult the Publication Manual of the American Psychological Association 6th edition for further guidelines. For Papers Other than Original Psychology Experiments If you are using the APA format to write a formal paper but are not writing up a psychology experiment, use descriptive headings to describe the Sub-headings should be left hand justified, boldfaced, and all major word s capitalized The Body of your PaperIf you want to refer to a Footnote already listed in your paper type (see footnote #) various sections of your paper. The paper ends with References. You can include Footnotes, Appendices, and Supplemental Materials if appropriate (see Footnote 1). The body of your paper will largely be determined by the assignment you are working on. Use your college writing center for help with APA FORMAL RESEARCH PAPER 4 developing the body of your paper after you have written your first rough draft. How to Cite Sources in Your Paper Any time you use outside research (newspapers, magazines, books, websites) you must cite your source.The APA requires you to include a brief citation in the body of your paper (called an in text citation). This gives your reader enough information to find the full citation located on your References page at the end of your paper. Consult an APA style guide to see the proper format for including in-text citations. Block Quotations I n-Text direct quote example Here is an example of an in text citation: Robert Monge (2009) notes, â€Å"Most in text citations are relatively short. They usually are no more than three or four sentences long† (p. 54). If you have a quotation that is longer than 40 words than you must use a block quotation.Block Quote example Robert Monge (2009) points out: The block quote is used for direct quotations that are longer than 40 words. The block format is a freestanding quote. This means you do not include quotation marks. Instead, you introduce the block quote on a new line using the author and year. Use a colon to set up the quote. Indent your entire quote ? inch or 5-7 spaces. Include the page number at the end of your block quote outside of the ending period. (p. 55) . APA FORMAL RESEARCH PAPER Center the word References at the top of your page 5 References Gritz, S. (1991, January 20). Gulf War bombing broadcasted live on TV.The Chicago Tribune, pp. A3, A5. The References pa ge is where you list the full citation for all of the brief In-Text citations you used in your paper Jackson, J. J. , & Samuel, T. S. (2001). The impact of climate change on sea levels. Journal of Environmental Science, 55(4), 233-277. doi:10. 1070/8567-6582. 33. 5. 888 James, H. N. (1988). Victorian gender roles [Ebrary version]. doi:10. 1044/00643983238 Osborne, M. H. (1994, April 5). Nirvana's Cobain commits suicide. The Seattle Times. doi:10. 1038/022-9010. 76. 1. 143 Rabe, M. M. (2001). The art of manipulation: Stories of mind control.New York, NY: HarperCollins. Start the References section on a new page References are listed alphabetically by author If there is no author, use the title of the reference The first line is left hand justified. Each additional line of the citation is indented ? inch or 5-7 spaces. Reference entries are double spaced See an APA citation style guide for details on how to format the various types of references (newspaper, magazine, book, websiteâ₠¬ ¦. ) APA FORMAL RESEARCH PAPER Footnotes appear after your reference page Center the word Footnotes Footnotes should not be longer than one paragraph Footnotes 1 Content footnotes are used to provide additional information about a point of discussion in your paper. Copyright permission footnotes are used to cite long sets of data, studies, tests, tables that have been reprinted or adapted. Footnotes should uses consecutive superscripted numbers in text with corresponding entries on a separate Footnote page after the References page. APA FORMAL RESEARCH PAPER 7 Appendices appear after your reference page and after your Footnote page (if you have any). Center the word Appendix All other style rules applyAppendix An Appendix is used to include materials that are brief and can be presented in a print format. It can include lists, tables, photographs, charts, graphs, and other information used to illustrate the main points in your body paragraphs. Use parenthesis to point your reader t o an appendix (See Appendix for complete chart). If you only have more than one appendix, label your Appendices: Appendix A, Appendix B, Appendix C, etc. ) If you have more than one appendix, each appendix will appear on a new page

Monday, September 16, 2019

Vermont Teddy Bear Brief

Vermont Teddy Bear Company From Wikipedia, the free encyclopedia Jump to: navigation, search Vermont Teddy Bear Company Type Privately held company IndustryManufacturing, retail Founded1981 HeadquartersShelburne, Vermont ProductsTeddy bears Owner(s)The Mustang Group Subsidiaries Calyx & Corolla Gift Bag Boutique PajamaGram TastyGram WebsiteVermont Teddy Bear Company The Vermont Teddy Bear Company is one of the largest producers of teddy bears and the largest seller of teddy bears by mail order and Internet. The company handcrafts each of its teddy bears and produces almost 500,000 teddy bears each year.The company was formerly traded on the NASDAQ stock exchange under the ticker symbol BEAR, but was taken private by The Mustang Group, a Boston-based private equity firm, on September 30, 2005, partially to avoid the reporting requirements of the Sarbanes-Oxley Act. The company was founded in 1981 by John Sortino, who sold handcrafted teddy bears in an open-air market in Burlington, Ve rmont. Sortino happened upon the idea of packaging and selling bears through the mail when a tourist visiting Burlington wanted a bear mailed to her home.The concept was called the â€Å"Bear-Gram†, which features the customized teddy bear placed in a box (complete with an â€Å"air hole†) and stuffed with other goodies. By 1995, the company moved into its new headquarters in Vermont's Champlain Valley. The company has two factories: one in Shelburne and one in Newport. The Shelburne factory is an especially popular tourist destination, and also served as a concert site for the annual Vermont Mozart Festival. The company also maintained two retail locations in Vermont – Shelburne and on the main road between Waterbury and Stowe.VTB acquired Calyx & Corolla, an upscale flower company headquartered in Vero Beach, Florida in 2003. Ironically, one of Vermont Teddy Bear's marketing slogans claimed that sending a teddy bear is â€Å"a creative alternative to sending flowers. † In 2005, the company launched a new sister company, Gift Bag Boutique, which offered handbags and purses along with many make-up accessories. Along with PajamaGram, which sold gift pajamas, and TastyGram, which offered gourmet food gifts, the creation of this sister company brought the total number of companies under the Vermont Teddy Bear umbrella to five.Gift Bag Boutique and TastyGram stopped accepting orders as of June 26, 2008. [1] â€Å"Crazy† Controversy For Valentine's Day of 2005, Vermont Teddy Bear caused widespread controversy by offering a â€Å"Crazy for You† Bear. The bear was offered dressed in a white strait jacket with a red heart embroidered onto the front of the jacket. A tag entitled â€Å"Commitment Papers† came with the bear. The tag read â€Å"Can't eat, can't sleep, my heart's racing. Diagnosis – crazy for you. â€Å"[2] Mental health groups from all over the U. S. sked for the bear to be pulled out of production and removed from VTB's website. Many groups called for a boycott of the company. They claimed that the bear made light of the suffering caused by severe mental illness and contributed to the stigma that people with mental illness often encounter. The company's response was that there was no offense intended and it was merely a play on the phrase â€Å"I'm crazy about you. † The company claimed that the bear was intended to be a light-hearted depiction of the sentiment of love.When asked to remove the bear from their inventory, VTB responded by keeping their existing stock up for sale although they stated that they would not make any more in the future. The price of the bears from VTB was US$69. 95. After the company sold out, which happened within just a few days of the story hitting the news, the eBay bids reached several hundred dollars. Elizabeth Robert, the CEO and CFO of VTB was serving as a member of Vermont's largest hospital, Fletcher Allen Health Care, at the time o f this incident.In response to the significant controversy she resigned from the board. [3] Advertising VTB was listed amongst â€Å"‘a broad range of direct marketers' pitched by the show’s hosts themselves† who were taking out more ads on talk radio in 2010, according to Dan Metter, director of talk-radio sales of Premiere Radio Networks. Conservative radio hosts were seeing an uptick in listener numbers and advertising in the lead-up to the year's midterm elections. Premiere is the syndicator of the top three talk-radio shows — hosted respectively by Rush Limbaugh, Sean Hannity and Glenn Beck. [4]

Sunday, September 15, 2019

Analysis of Kony 2012 Campaign

Campaign: Kony 2012 http://www. youtube. com/watch? v=Y4MnpzG5Sqc Short versions: http://www. youtube. com/watch? v=j36n8Kn_lUY http://www. youtube. com/watch? v=VWd0veKp1R0&hd=1 (this may be a stronger version) 1. Why we are choosing this one: This was a very successful campaign. Most of our group had heard about the Kony campaign and have shared with more than one friend; thus it was a successful viral marketing campaign. The statistics show that 112 million people viewed this video in one week. 2. The Message Targeted towards people who are obliged humanitarian causes.Help create awareness of the campaign, which is to imprison Kony by December 2012 with the help of aid from foreign and Ugandan governments. To do this, they were selling products and promoting a â€Å"Cover the Night† day in which individuals who wear/post/display their products. The video tells you to make these purchases in order to help fight Kony, there are links to the website from the video and so the p urpose of the campaign was very clear and relevant. The Messenger is Jason Russell who is the co-founder of Invisible Children.The film’s purpose is to promote the charity’s â€Å"Stop Kony† movement to make Ugandan cult and militia leader Joseph Kony known to the international world in order to have him arrested by December 2012. Joseph Kony is already an indicted war criminal in the International Criminal Court. Environment – right time and right place. People are interested in this type of cause and it is popular to be a humanitarian right now. It was spread through YouTube, Facebook and Twitter. People feel good sharing this type of information; it makes the Sender feel as though they are helping a good ause and so they feel good. The result It was a triumph in that it has been viewed by more than 92 million people on YouTube and 20 million more on Vimeo, so well over 112 million people by the end of the first week. This is the same amount of people w ho watched the Super Bowl. (Visible Measures) After ten days, 52% of adults in the US had heard of the video. (PEW research center) More people viewed the video in such a short amount of time than any other video on the internet (to date). Kony 2012 facts and figures: http://static. guim. co. k/sys-images/Guardian/Pix/pictures/2012/4/20/1334929057518/Kony-2012-in-facts-and-fi-009. jpg Invisible Children won’t yet say how much money it made from Kony 2012, but by conservative estimates, it has likely tripled its $13. 7 million 2011 revenue and it’s possible that the actual number is much, much higher. (http://www. businessweek. com/articles/2012-08-30/kony-2012-guerrilla-marketing) [Add details regarding how it was spread] Celebrities have helped spread the message (Justin Bieber, Kim Kardashian, Rihanna, Oprah Winfrey) Why did it work?The film discusses the desire to share, to be part of something, to inform others. Within the first two minutes, has drawn people in and makes them curious as to what is next. It was a very good quality video; both in resolution and the way it was directed. The director of the film, Jason Russell, is very personable. He is using people emotions to make them feel part of the problem. He even involves his own child in the film to make everyone feel that they are connected to this problem. People really want to feel like they are helping a good cause. It was also really the right moment.The film uses everything that is popular right now to keep people’s attention – instagram photos, facebook timeline. People, especially young people and hipsters, really want to help. The products were not very expensive but enabled the viewer to feel as though they were part of the video and â€Å"creating history. † The video emphasizes being part of, and making, history. Purchasing the products allowed for those who wanted to participate in Cover the Night to be part of the â€Å"in† group. Additionally, f amous and important people became involved and vouched for it.Many politicians and even celebrities became involved. What could have been improved? After the video there were allegations that the project was a scam. The Ugandan people were claiming that Kony was not even in Uganda and so contributing to this campaign will not help us. Also there was a rumor that the US wanted to have a reason to come into Uganda for oil. So they could have been their intentions more clear and probably clarified that even if Kony is currently not residing in Uganda, he still must be found and arrested.

Saturday, September 14, 2019

Introduction to Modern Management

Introduction to Modern Management Lindsay Bursar Aspen University Abstract Throughout history many different theories have been developed, researched, written about and put to the test in actual work place setting to see how well they work and how effective they are. Lower-level management, comprehensive analysis of management and human relations movement in management theory are Just a few of them. Each theory was and still is important in today's modern business world.Every theory has had some kind of impact on the new theories in management that eave come about since then and will still continue to have an impact in the future. It's important that managers now and managers in the future are educated on these different management theories so that they can provide the support and education to their employees need and deserve. This will foster a positive work environment that will lead to increased productivity and success within companies. Every company must have good, competent man agers in order to survive and be successful.Module 1 Introduction to Modern Management Assignments: Essay Questions â€Å"Managers should be paid more than regular employees. † Do you agree with this statement? Justify your answer in scholarly detail. There are many reasons management should be paid more than a regular employee. One of the reasons being the workload managers take on and another being the necessary skills that a manager must possess to name Just a few. As a current member of management at the hospice agency I work for, I agree that management should be paid more.However, I agreed with this before I became management as well. As a regular employee I saw everyday how different the workload was between a regular employee and management. According to a recent study an average manager is actually worth 1. 75 employees (Edwards, 2012). After being promoted into my current management position, I agree with this statement 100%. Now instead of doing the Job of one, I'm doing the Job of three and still manage to get everything done and in on time or ahead of a deadline while also managing my employees.Employees in my old position who have the workload of only one sometimes struggle to meet the same deadlines. The expectation of productivity is much higher for a manager versus those of a regular employee. The importance of a good manager cannot be stressed enough. Management influences every aspect of an organization from top management to lower level management (Cert. & Cert., 012). If any organization or company intends on being successful then it is of the utmost importance that they hire good management because these people are the ones who lead the company towards their goals and towards success.Good management must have the skills to carry out the four basic management functions; planning, organizing, influencing and controlling (Cert. & Cert., 2012). Without these skills any member of management would be ineffective and unsuccessful. Manager s should be paid more than regular employees because not every employee in an organization possesses these skills. If every employee did, the need for management would be obsolete. â€Å"Discuss in scholarly detail why it is important for managers to be aware of cultural differences in their dealings with people. One of the biggest reasons it's important for management to aware of cultural difference is because of the increase in multi-national businesses and business deals. In today's business world an increasing number of companies have started doing business with people from different countries and cultures. Because of this trend of globalization, it is very important that managers understand and respect cultural differences. If differences in customs and culture are not known or not respected, business deals can quickly go south and be lost (Brown).Managers must know what kind of behaviors would be inappropriate in situations where you are dealing with people from other culture s in order to avoid doing anything that would be deemed rude or disrespectful. They need to be able to teach their employees what is acceptable and prepare their employees and themselves for interactions where this knowledge is paramount. One of the best things managers can to do to prepare their staff for these interactions is cultural awareness training (Acculturates! Consulting, 2011).By giving staff cultural awareness training they're being given the tools to learn about the customs and cultures they'll be interacting with. Employees will go to meetings for business deals or potential business deals armed with the cultural knowledge to ensure that they will not offend or come across as disrespectful. This training and knowledge that managers give to their employees will enable them to be culturally sensitive. This will make not only the employees, but also the company move forward and be successful in the international business world. How is lower-level management analysis diffe rent from comprehensive analysis of management? Is the latter approach suitable for an organization focusing on increasing productivity by concentrating on the ‘one best way to perform a task? Explain your answer in scholarly detail! † According to Cert. & Cert. (2012), â€Å"lower-level management analysis concentrates on the ‘one best way to perform a task† (p. 28). This means each task a worker does is closely looked at and studied to come up with the most efficient way to complete the task that will yield the highest production.This approach is also known as the scientific method of management (Cert. & Cert., 2012). Frederick W. Taylor has come commonly known as the creator of scientific management. While Taylor worked at Bethlehem Steel Co. His goal was to increase worker efficiency and productivity. He did this on the idea that â€Å"every Job had one best way to do it and that this way should be discovered and put into operation† (Cert. & Cert. , 2012, p. 29). This approach differs from the comprehensive analysis of management because it looks at very specific tasks and simplifies each task as much as possible to create efficiency.Comprehensive analysis of management focuses on â€Å"the entire range of managerial performance† (Cert. & Cert., 2012, p. 32). Whereas lower-level management analysis or scientific management focused more on the micro aspects of how to efficiently do a Job, comprehensive analysis of managements focuses on the macro aspects. Henry Payola was very influential in creating a management philosophy for the comprehensive analysis of management (Cert. & Cert., 2012). So much so that the general ideas and principles of management that he wrote about are still considered very useful in today's management world.Payola had 14 main principles of management that cover many different topics and believed that having managerial excellence is an ability that can be obtained (Summon, 2010). The three bigges t principles that Payola focused on were â€Å"organizational efficiency, the handling of people, and appropriate management action† (Cert. & Cert., 2012, p. 33). These principles can be seen being used in modern management today. I believe that using the comprehensive analysis of management is suitable to use in an organization that is focusing on the â€Å"one best way' to do a Job to increase the organizations productivity.While Frederick W. Tailor's contributions to the management world were very influential and important, they are also unpopular because of the extreme his ideas went to. In order to increase productivity the whole many should first be working towards a common goal or direction. If a company is focusing solely on the â€Å"one best way' to complete a task, that is the goal there are focusing on first with increased productivity second. By focusing on the â€Å"one best way,† other aspects and employees in a company are being ignored which ultimate ly will not lead a company towards increased productivity.Looking at a company and the company's goal in a comprehensive view is what will help achieve the goal of increased productivity. Everything and everybody must work in conjunction with one other to reach their goals. Discuss in scholarly detail the human relations movement in management theory. How would you, as a manager in an organization, use the human relations approach to manage employees? † According to Cert. & Cert. (2012), the human relations movement is â€Å"a people- oriented approach to management in which the interaction of people in organizations is studied to Judge its impact on organizational success† (p. 5). This movement was started because of the Hawthorne studies that were conducted from 1927 to 1932 by Professor Elton Mayo (Cert. & Cert., 2012). These studies gave managers a lot to think about and a new direction to start researching. The human relations movement focuses more on employees as individuals instead of focusing on procedures and policies in the workplace (Ziegler, 2014). Instead of a company environment that focuses on quotas and procedures, the environment focuses on communication between managers and employees.With a better understanding of employees and an environment more focused on communication, production and success for a company can actually increase. If the workplace is negative, noncommittal and unproductive, then there are some big changes that would need to be made. As a manager I would use this knowledge o learn about my employees and find out what motivates them to work more efficiently and productively. I would figure what exactly would help create commitment to the company from employees and grow off of that.I would start building relationships between management and employees to strengthen the unity within the company to continue working towards the common goal of success. If an attitude of commitment and high productivity can be grown and fostered within the employees then the manager is doing a good Job of creating an effective work environment. Good relationships with the employee's means employees are titivated and will work harder and more productively. â€Å"Discuss in scholarly detail how a manager's understanding of his employees' physiological, safety, social, esteem, and self-actualization needs improve productivity? Managers must have human relations skills in order to be effective. Human relations skills are defined as â€Å"the ability to work with people in a way that enhances organizational success† according to Cert. & Cert. (2012). It's important that managers understand Mascots Hierarchy of Needs to improve productivity within their employees. The five levels of Mascots Hierarchy of Needs are physiological, feet, social, esteem and self-actualization (Burton, 2012). In order for people to achieve the top level of self-actualization, each of the other levels must first be fulfilled starting wi th the lowest and then making the way up the hierarchy.These five levels are not only pertinent to people's lives outside of work but also their lives and well-being in the work place. The first level, physiological, is people's need for air, food, sleep, etc. If an employee doesn't have those basic needs met then they come to work tired or feeling sick and their productivity will be decreased. The second level, feet, has to do with people's need to feel secure. Within the workplace, employees need to feel safe and secure in their Job on a daily basis to keep up their productivity. The third level, social, refers to peoples need to feel a sense of belonging and acceptance.Within a company it's important that employees feel valued and part of a team. The fourth level, esteem, is what will make employees feel confident. After an employee masters a skill and is recognized for it, their self-esteem will rise. This can lead to an increase in productivity because they are proud of themsel ves and what they've accomplished. The last level is self-actualization. An employee strives to the best that they can and be all that they can possibly be. Once that is reached, the employee will be satisfied within their Job. They'll feel accomplished and part of a team.