Thursday, November 28, 2019

Shiyuan Li Essays - Marie Daulne, Walloon People, House Slippers

Shiyuan Li Communications Learn your heritage! I once heard someone say, "It is important to learn about your heritage!" ever since then, I have been keen on to searching and digging about who my ancestors were and what kind of future they have tried to provide for his descendants. In Deuteronomy from the Bible it goes, "Remember the Days of Old, consider the years of many generations: ask your father, and he will show you; your elders, and they will tell you." This passage not only inspired me, but also became a light that guided through my conversations with my elders. When I was younger, I had no interest in what my grandparents had to say to me. Afterall, they are just people who are living in a totally different generation and their advices are cannot be implemented the same way in a modern day context. But what I disregarded is that they have so much to offer to me; their success, failures, experiences. It was then that I started to converse with them. I learned about the wars, the floods, the catastrophes and triumphs. I searched and found that the house my father grew up in is now protected and cared by the government because of its heritage and significance. I learned that my late grandfather who loved me dearly but I never was able to speak to was part of the construction of the first Chinese nuclear bomb, and that his father was one of the most famous philanthropists during the Korean War who selflessly dedicated his wealth and resources into the country that he loves and identifies with. What I am trying to say is that knowing your heritage is one part of accepting your identity. Nowadays we all want find out who we are and achieve our goal, and a good sense of your heritage will help one find that. When I hear about what my ancestors have done to pave my future, I feel a sense of comfort that I cannot find from anything else. Heritage is like an inheritance that is worth far more than monetary value. This is an inheritance that sticks and stays by your side. I feel a sense of belonging and comfort, and it inspires me to draw closer to my family. Chinese families are really really big, and being the only family that is not in China makes it really hard for us. The connections that I have built with them has turned from "oh you are my relative" to "thank you so much for the contributions that you have made to make my life better." I am now able to talk about my heritage and values proudly, and I hope that I can continue to celebrate this great history of mine by conti nuing to preserve it for my kids. In todays world, much of our heritage has been lost either through wars or neglect. More and more arts and traditions are forgotten everyday, ones that will never be recalled from time. If we just put down whatever devices that has strangled us into this mobile society, and talk to our elders about their past and their family stories. Trust me it will be worthwhile.

Sunday, November 24, 2019

Movie regulations in American and British movie industry †Film Essay

Movie regulations in American and British movie industry – Film Essay Free Online Research Papers Movie regulations in American and British movie industry Film Essay Cinema has been seen as a way of free artistic expression since its invention. Film makers assumed that they could allow themselves more than in, for instance, in theatres- they assumed that if the scenes were not acted live before the audience, they could be more daring. Un- or fortunately, the public had a different opinion on the subject. Although developed independantly, ways to fight the obscenity and immorality on both side of the ocean(UKUSA) were relatively similar. In United States. Hollywood soon became infamous for many scandals and began to be seen as a rotten city. Afraid of obscenity in movies, over 100 cities established local censorship laws. To improve the image of the Hollywood, Motion Pictures Producers and Distributors Association was founded in 1922. It was supposed to introduce a set of rules that would prevent the immorality in movies. The Association was led by Will H. Hays, who came up with the so called Production Code, better known as the Hays code. In the beginnig, he tried to persuade producers to avoid immorality, but he rarely succeeded. Matters gor even worse when talking movies appeared. Hayss Donts and Be carefuls were officialy published in 1930. I think it would be hard to find a worse period to introduce it as the Great Crisis forced producers to do everything to attract people to cinemas. Constant complaints made Motion Picture Association of America to take further steps and in 1934 Production Code Administration w as created. From then, no movie could be distributed without getting a certificate from it; if the movie was released, PCA could fine theatres where it was shown with up to 25 000$ fine. It could also demand script changes. Although it may be surprising, Britain founded its own regulatory body earlier than Hollywood. As in later in States, British Board of Film Censors was created by film industry to control and prevent immorality in movies. Unlike in American case, local authorities kept the right to object the Boards opinion, but since 1920 such thing very rarely happened. At that time, both, American and British standards were very similar- sex, nudity, provocative dancing, drug use, venereal disease, childbirth, ridiculing religion were prohibited. In other words, everything that could possibly offend anyone was prohibited to be shown in films. There were some differences, of course, as both countries varied in terms of sensitive issues. In USA these were mainly white/black people issues.Despite the fact that these examples are dealing with two completely different spheres of life, they all come from the same source. Both black-white issues and the concept of British Empire were very touchy subjects and presenting them in movie in an inappropriate way could arouse arguments and disturb the social balance. Nowadays it is considered rather as a way to preserve stereotypes and stop possible criticiscm of film makers. Therefore, Hollywood could not produce films which showed white slavery, miscegenation (sex relationships between the white and black races) (as in many states such relationships were simply forbidden, it would be presenting a crime.) As United Kingdom was then still a colonial power, BBFC had to protect its image, so in the regulations from 1916 we can read that scenes holding up the Kings uniform to contempt and ridicule and subjects dealing with India, in which British Officers are seen in an odious light, and otherwise attempting to suggest the disloyalty of Native States or bringing into disrepute the British prestige in the Empire. were not allowed to be shown in movies. Besides morally undesired content both regulations also covered different fields. For instance, Hays code listed and explained quite specifically what a good movie is: in short- an entertainment of great moral importance, it is an art that enters intimately into the lives of human beings; movies also have special moral obligations , thats why no picture shall be produced which will lower the moral standards of those who see it. We can see here a great care about Americans consience and morality, an element that is very common in USAs public life from its beginning. In UK, on the other hand, not only was the moral side covered, but also certain elements that were not seen as typical neither were wanted from a good citizen of the state. Therefore no References to controversial politics, Scenes and incidents calculated to afford information to the enemy or Incidents having a tendency to disparage our Allies were allowed. Political issues were very briefly covered in the Hays code, probably due to the fact that American entertainment was always centered on moral provocation and general respect for the state institutions seemed natural, whereas in Great Britain the idea of ridiculing and criticising the government in entertainment had a long tradition. Whats significant, the british regulations would change and become relatively flexible and more genral, though BBFC would still cut films whereas Hollywood would stick to Hays code, even just formally. Faced with social changes and development of TV producers started to dare for more again. MPPAs(which replaced Motion Pictures Producers and Distributors Association) response to thatwas makin the rules even stricter in 1952. The problem occured when in 1952 thanks to the fact that the First Amendment started to apply to movies as well, thus given producers the free speech right. Though practically useless, the Production Code lasted til 1968, when it was finally replaced by rating system. At the same time BBFC, to prevent losing practical control over movie release, as it happened in States, introduced a rating system, just like it happened in many other countries. rating system allowed to release a movie that didnt meet all the strict rules, but to supply it with a kind of warning. Because of the fact that movie industry was already back then one of the most internationalized branches of culture, since introducing the rating system there were no major differences in movie regulations between UK and America til now. The only further changes will probably make even more similar, first of all to save problems the movie producers. sources: http://en.wikipedia.org bbfc.co.uk/ artsreformation.com/a001/hays-code.html Research Papers on Movie regulations in American and British movie industry - Film EssayWhere Wild and West MeetAppeasement Policy Towards the Outbreak of World War 219 Century Society: A Deeply Divided EraTwilight of the UAWDefinition of Export QuotasThe Effects of Illegal ImmigrationComparison: Letter from Birmingham and CritoHip-Hop is ArtMarketing of Lifeboy Soap A Unilever ProductBringing Democracy to Africa

Thursday, November 21, 2019

The Principles of Management Communications Used to Successfully Research Paper

The Principles of Management Communications Used to Successfully Achieve Organizational Objectives - Research Paper Example In other words, in an organizational set up, communication has to involve the transfer of meaning and information from managers to employees and vice versa. The information communicated could take a wide range of forms that may involve symbols, words, numbers, and concepts among others. For any conveyed meaning or information to make sense, the receiver of such information has to make meaning from the conveyed elements. Therefore, considering that communication involves making meaning of the sent information, it would follow that organizations that design effective communication policies in their organizational management would perform much better than those with inferior communication strategies. Any organization has to put in place norms standards of communication that would lead to effective communication that result to change within the organization. Management involves the process of directing others to achieve organizational goals. Managers and employees have to be active listeners and pay attention to details for such communication to be effective. Research in Oncology has revealed that effective listening can be accommodating to others, leading to effective communication (Cohn, 2007). For instance, it is necessary to have communication at the same level. In other words, instead of communicating while one is standing, there is a need for both communicators to sit and have an eye-to-eye contact. Gupta (2013) further elaborates the need to have emotional contact expressed through facial or eye-to-eye contact as well as the use of maintaining a cordial relationship through proper tones, gaze or touch during such communication. Cohn (2007) further elaborates the need to av oid prejudgments during communication by allowing the speaker to express themselves fully without interruptions or unnecessary criticism. Moreover, there is a need to show emotional connectedness with the speaker by reflecting back to

Wednesday, November 20, 2019

REFLECT THOUGHT Assignment Example | Topics and Well Written Essays - 500 words

REFLECT THOUGHT - Assignment Example The main difference in these regards is the understanding that in these regions, strength is a more valued quality than intelligence, as the majority of work is farm or manual labor. It’s clear that this difference could lead to relativism as one culture places higher value than another on intellectual forms of intelligence. Even as difference value is placed on these elements, it’s clear that the different values are different because they have specific viability in the culture, leading to support of relativism. 2. Psychological egoism claims that whatever we do, we do out of self-interest. Give an example of an act you think is not done out of self-interest, and explain how the psychological egoist might try to interpret that act as selfish. One of the major acts that are claimed to be done not out of self-interest is charity work. Everyone from celebrities to billionaires to everyday citizens has regularly involved themselves in charitable activity as a means of contributing to world culture and helping disenfranchised individuals. Even as these acts are performed out of charity, a psychological egoist may claim they are done out of self-interest. The egoist could potentially argue that in performing these acts the people are not doing it out of a selfless interest to help others, but actually as a means of making themselves feel better. Similarly, the egoist might argue that these people are participating in these charitable activities to make themselves look better in the eyes of their peers and the general public. The problem of prayer in school is a hot-button issue. In the hypothetical dilemma John wants prayer, while Mary does not. One of the potential compromises that could be reached for this situation is to allow prayer in school for those individuals that choose to pray. Still, prayer must not be an institutionally sponsored activity; for instance, teachers would not be able to institute prayer sessions. This scenario

Sunday, November 17, 2019

Case study Essay Example | Topics and Well Written Essays - 1500 words - 1

Case study - Essay Example In 1993, Peter Solvik joined Cisco and made IT the central functionality of the company. He showed interest in starting many projects for the upgrading of IT in the company. He brought many changes and supported the company in adopting IT successfully. However, when Peter Solvik left the company and Boston joined as the new CEO, there were many problems revealed with the current IT adopted by the company (McAfee, McFarlan and Wagonfeld 4). ERP was introduced by Peter Solvik in the company and was installed for handling inventory and manufacturing functions but with the passage of time, other functions was also added to the ERP system due to which, problems were there (McAfee, McFarlan and Wagonfeld 3-4). Boston after becoming the CEO identified these problems and showed interest in three main projects, which were to upgrade the ERP, to develop enterprise reporting and business information solution and to develop a single database (McAfee, McFarlan and Wagonfeld 5). This paper will di scuss all the relevant details of the case in depth. IT Governance Styles at Different Levels Peter Solvik after joining Cisco changed the company’s consideration of IT as an overhead. He made sure that IT performed the role of central functionality of the company. According to his opinion, without using latest technology, the company was not able to progress. Under his governance, ERP system was implemented, which was to handle manufacturing and inventory tasks at the start. In his tenure, the company created its own internet and intranet, due to which not only the data transfer procedures were eased out but also many customers were added to the company’s profile due to which, the company was able to generate more revenue. Peter Solvik’s IT governance style was profitable and commendable for the company as it was due to this style that the company gained reputation and enhanced profits in the market. The organization was made an IT centralized organization (McA fee, McFarlan and Wagonfeld 3). At network/infrastructure level, internet and intranet were developed to control all network related functions such as sales, manufacturing and others. A website was developed with the name Cisco.com. At data level, intranet was used for data transferring while at application level, the ERP was developed to handle the manufacturing and inventory applications of the company. Problems with Cisco There were many problems with the company’s IT by 2001, which were discovered after Boston’s joining the company. Many customized tools were there to handle different functionalities for which, extra costs were paid. The investment for the customized tools was too much and information retrieval was problem. In addition, there was no central decision making for the IT functions as every department made its own decisions due to which, there were problems related to upgrading ERP system of the company as a whole. There was lack of centralized planning , which was again problematic for the company (McAfee, McFarlan and Wagonfeld 5). Many old custom interfaces were required to be put out of action in order to install a newer version of ERP, which will be problematic for the users of ERP. In addition, ERP was designed mainly to

Friday, November 15, 2019

Consumer Behaviour On Decline Of Sales Marketing Essay

Consumer Behaviour On Decline Of Sales Marketing Essay Introduction This report is prepared to analyse how consumer behaviour changes has led to the decline in sales volume of Xclusive perfume brands across the UK market. For the last two years sales has declined consistently across the target market of upper class consumers in UK. Xclusive is an premium perfume brand from Premium Products Ltd, a company based out of UK. Company launched this premium brand for men and women in UK market in 2006. By 2007, they had a 1.2% market share, reporting a total sales turnover of 7.96 million GBP (Esprit Magazine, 2007) In 2008 and 2009, the sales declined by 5% and 6.2% respectively. Preliminary reports show a decline in popularity of this brand and lesser movement in stores among the upper class customers. This report is intended to analyse the reasons which led to the sales decline over the last two years. Report will test the hypothesis that consumer behaviour variations led to the decline in sales. Other key objective of this report is to come up with suggestions to reverse this declining sales trend and influence a positive change in consumer behaviour to increase the sales. Current Product and Marketing Strategy Xclusive brand of premium perfume for men and women was launched by Premium Product Ltd in 2006. There were four lines within this Xclusive brand herbal, musky, woody and spicy. Musky was the popular most brands followed by Herbal. They were packaged in exclusive golden bottles, which gave exquisiteness to the whole product package. Health consciousness was on the rise among the UK consumers in 2006. That made the company launch this exclusive herbal perfume to the upper class consumers. This was launched as part of their market differentiation strategy compared to other premium brands. Main target was upper class men and women in UK with social grade A and B. (Businessballs, 2008). This market size constituted 25% of the total UK population. Premium Products Ltd used a premium pricing for all products including this Xclusive product line, with herbal being the most expensive as it was made from healthy ingredients. The company adopted a selective distribution strategy targeting only luxury zones and concentrated on boutiques and big malls like Wesfield and Metrocenter. Distribution strategy was centred around premium malls and online shops like Perfume shop. (Suite101, 2007) Company did the promotion mainly through celebrity ads in mass media like TV and upper class magazines like Glamour and Cosmopolitan. Promotion was around healthy sports men and women using this exclusive perfume. (National Readership Survey, 2007) Problem Analysis Problem: In the last two years there has been a drastic decrease in the sales of fragrance products (perfumes). Study was conducted on market and consumer buying process to understand the reasons behind this decline in sales. In the market study, objective was to test whether external market conditions were favourable to perfume business. Market study was done using the PEST method. While doing sales analysis, it was found that decline in sales actually came from women segment. Hence market and consumer behaviour study was mostly attributed to the social class A and B women segments. Buyer responses Choices of product brand dealer timing price Buy more, less, stay loyal etc buyers black box Needs wants, stimuli Product, price, place, promotion etc Environmental (PEST) factors Buying Process Analysis We looked at the typical buying process of premium perfumes by women in UK. Looking at the major players involved in a typical purchase decision. Initiator Influencer Decider Buyer User Usually, women themselves are the initiators to buy perfumes for following reasons: Long lasting scent Makes feel attractive One that others comment on Makes feel sexy Changes or enhances mood Initiators can be men also who buy gifts for women. It basically depends on the age group of women. But generally speaking, the influencers can be: Peer group Celebrities Referred by magazine (foil pouch samples preferred) Advertisements in media Women themselves and men also. Both men (as gifts) and women. Women, her friends, relatives etc. Since women play the major role of initiator and decider in this buying process, we need to understand internal and external factors which can impact the consumer behaviour of women belonging to social class A and B. Consumer behaviour characteristics Consumer behaviour refers to the selection, purchase and consumption of goods and services for the satisfaction of their wants. (Ezinearticles, 2007) There are multiple factors which can influence the consumers behaviour over a period of time, which includes both internal and external. Broadly the internal factors could be personal traits like age, income, occupation, personality, lifestyle etc and psychological factors like motivation, perception, learning, beliefs and attitudes. External factors can be social ones like reference groups, social status and influence of family. It could be cultural factors too like culture and sub-culture and social class. This is very much relevant to the premium perfume product segment too. External Factors affecting consumer behaviour Among the external factors, the key ones which directly impact consumer behaviour are demographics and social class. Next comes the influence of reference groups like celebrities, friends and family. But since the target segment is mainly upper class and upper middle, culture/sub-culture seems to be the least important variable. Demographics It is more an internal factor, which is of course shaped by external influence. Teenagers: They are more interested in citrus scents. Usually they prefer a fragrance that makes them attractive to others. They dont have any affinity towards a brand, but they like to try out different fragrances and brands. Adults: They are most likely to buy fragrances for most likely to wear a perfume to feel sexy. Older women are more likely to switch fragrances within their collection once a week or more. As they are more health conscious, they are more likely to consider Home Fragrances, Eau de Perfume, and Essential Oils as part of the Fragrance category. They are much more branding savvy. They prefer fruity and flowery fragrances and follow celebrities to a large extent. (Fragrancefoundation, 2007) In the UK, every woman between the ages 25 and 34, on an average carry  £ 71 worth of cosmetics in their handbag. (China cosmetic packing, 2010) Three out of five women were more likely to buy a fragrance samples in a magazine (foil pouch samples preferred). Now women prefer having a wardrobe or collection of fragrances too. (Fragrancefoundation, 2007) They still follow celebrity endorsements while choosing the fragrance. This is evident from the popularity of M brand introduced under the brand of Mariah Carey (Entrepreneur, 2007)). Consumers have revisited classic fragrances as the shift in buying behaviour moves towards quality, authenticity or value. (Academic Mintell, 2007) Social Class Similarly, differences in social class can create customer groups. In fact, the official six social classes in the UK are widely used to profile and predict different customer behaviour. In the UKs socioeconomic classification scheme, social class is not just determined by income. It is measured as a combination of occupation, income, education, wealth and other variables. (Tutor2U, 2007) Relevant social class segments for our premium perfume segment: Upper upper   old, established, socially prominent families Lower upper   new rich   Upper middle   professional people   Lower middle   white collar, salaried workers (Emailcommerce, 2007) Now the characteristics of each of these social classes vary as they are bound by different cultural and sub cultural elements. In the current marketing strategy the product was positioned just for upper class women and we didnt have a differentiated positioning for each sub cultural or social class groups within this broad definition of upper class women. Needs and buying process of upper middle class woman is completely different to a upper upper class woman. For example upper and lower middle can get influenced by friends and co-workers more and women tend to be mostly decision makers and purchasers. However in the upper upper and Lower upper, influence of family may be higher. Reference groups like social clubs, charity organisations, and social get together could be more relevant to influence the upper class women. Hence a segmented marketing approach is needed. However the 2009 downturn has frequency the purchase of perfumes among women. Women on average buy 4 fragrances a year. (Fragrencefoundation), due to the downturn there this has decreased to 2-3 fragrance a year. Still women spend enough on cosmetics. Among the higher social classes, penetration of social media has increased. Online purchases using cards has become common. Internet as an outlet has increased its penetration by 4% in the UK market. (Fragrancefoundation, 2007) Reference Groups Reference groups could also potentially influence the buying of premium perfume product. Reference groups can be aspirational or associative. Celebrities and socially respected ladies form aspirational reference groups for high class UK women. Associative reference groups could be members of a social club or co-workers or even members of church and some organisation. Friend circle is another major influential reference group as they could be sharing same interests and preferences. Family could be another reference group, this is however dealt separately. (Consumerpsychologist, 2007) In the target segment of Xclusive premium perfume product, reference groups are quite relevant. For example, Celebrity brands  are driving market growth among younger fragrance users. Over 30 new celebrity fragrances were launched in 2007. One in five 16-24 year olds claim to own at least one, compared with one in twenty over-45s. Celebrity fragrances provide the entry point for young people into the whole luxury sector.  (Fragrancefoundation, 2007) (As internet is becoming a key social media, reference groups like forums and fragrance review sites is also becoming key influencers in the decision making process. Sites like http://www.bestperfumeforwomen.co.uk/ provide reviews and give a ranking on best perfumes. You can no longer launch hundreds of fragrances, as the customer is more selective and wants something unique. Its not only the downturn that has forced this change in consumer behaviour. Thanks in large part to the internet, shoppers are much more knowledgeable about fragrances-more than many brands think. A look at some of the fragrance blogs or websites, such as Sniffapalooza (once derided, but now courted by fragrance brands) shows that consumers are having educated discussion and debate about fragrance, comparing different products and asking why they are all alike. Fragrance expert Michael Edwards calls this consumer the connoisseur, and compares such behavior to the foodie trend that emerged several years ago. Influence of Family In our target segment of upper and higher middle class women in UK, influence of family members is vital in making purchase decisions. Individual members of families often serve different roles in decision making process. Some individuals are  information gatherers/holders, who seek out information about products of relevance. These individuals often have a great deal of power because they may selectively pass on information that favours their chosen alternatives.  Typically husbands play the role of influencers; they let their wives know their wishes and suggestions. Husbands usually travel and get to know from social gatherings and even from online or internet means. In the case of premium perfume, the role of each individual in the family is critical be it that of gatherers who may be typically younger lot or social buffs, or that of influencers like husbands or decision makers or even purchasers. This makes marketing more tough as the messages need to reach a wider cross sec tion of UK society. Point of sales marketing can help to convince purchasers, but broad marketing conveying the features of Xclusive premium perfume should reach others like older ladies, socially respected relatives, and husbands. (Consumerpsychologist, 2007) Three out of four women say that when they find a fragrance they really like, they tell their friends about it. Every 2 in three women give perfumes as gift to partners, friends and family. Impact of culture/sub-culture elements Each culture contains sub-cultures groups of people with share values. Sub-cultures can include nationalities, religions, racial groups, or groups of people sharing the same geographical location. Sometimes a sub-culture will create a substantial and distinctive market segment of its own. OgAAAPeyJpurr1ryoFWlKXRdQZJVSyMAct7AfdHZmI-zSL4J5aoWNgxDAjv20AMfd_XlBjE5RI8O3Ge8wNG63V0VYoUA15jOjGI8ihdsXtJS1SOoJjWTF231BFIw (Source: From the Module presentation) For example, the youth culture or club culture has quite distinct values and buying characteristics from the much older gray generation. Similarly sub-cultural groups like immigrants from other countries and resident nationals belonging to other regions will show different characteristics to the UK culture. For example in the case of Asians, family relationships are much stronger and gifting is usually informal and ritual. However in UK, relationships are more loose, but gifting is done formally. Packaging is more relevant to the UK upper class when compared to other nationals. European communities give lot of importance to quality and elegance. Just like nationality as the above diagram shows, there are many more factors which shape up the cultural trait of an individual. Suggestions to influence consumer behaviour Fine grained social class segmentation: Have more targeted segments by age, by social class and by age. This is important as messages may have to be different and different fragrance products needs to be marketed to different social class and age groups Celebrity references: Continue to use references from celebrities, but widen your celebrity base to influence different segments. Musicians, film stars, entrepreneurs, sports personality and so on. For example younger lot get influenced with entrepreneurs as they look for confidence image to get associated with the perfumes they use. Older may prefer music stars and film personalities. Educational Promotions across wide cross section: Sales staff needs to be trained to improve their selling support and skills in order to advise customers correctly. Fragrances sold in self-selection should carry information on the outer box to provide consumer with the key ingredients of the product. Leaflets in boxes could also contain information for the consumer on the fragrance, on how to wear and tips on fragrance layering, and its ingredients which is a standard for many prestige skincare brands. In addition samples can be used to explain fragrance notes. Furthermore online sampling has been successfully carried out by luxury brands. Promotional messages should be targeted at initiators, influencers and decision makers. POS marketing is critical for purchases like free samples. Increasing the reach:Target to increase the number of outlets to reach a wider segmented base of upper and higher middle class women. Use internet as a channel to target convenience shoppers. Online purchase and spending is increasing in the upper class UK consumer segments. More over place reviews and customer testimonials especially of reference groups in social marketing sites to influence the prospective buyers. Differentiated products and channels for multiple segments: Thus there is a need to address the Teenage customers and Adult customers with different products according to their preferences. There are basically different types of shoppers which are Convenience Shoppers Value Shoppers Image Shoppers Experience Shoppers Luxury perfumes for women come under Image Shoppers and Experience Shoppers were, Teenagers belong to Image Shoppers and Adults belong to Experience shoppers. Understanding customers, their preferences, their needs led to the conclusion that our firm should go for two product lines, one addressing the teenagers and the other addressing the adults. The perfumes should have a variety of flavors i.e., a variety of citrus flavors for teenagers and flowers and fruity flavors for adults. Also advertising and promotional activities should be based on this segmentation. Recommended Positioning Strategy for Xclusive Premium Perfume Brand Introduction This report is prepared to suggest a positioning strategy for Xclusive brand of premium perfume for defined market segments. The objective of this new positioning strategy will be to have a positive influence on various factors which impact consumer behaviour and purchase decision of this premium product. However this report is limited to the positioning of the products for one of the target segments, which is upper class and higher middle class women. We assume that positioning strategy for the segment of men is working fine as sales has shown positive upward trend so far. Key Gaps with the Current Positioning Strategy Broad and inappropriate target segmentation: As per the current marketing strategy the target segment was defined as upper class men and women. Positioning message or current tagline Exclusive fragrance for just you was used to attract upper class men and women to feel that they own it and join a elite group of premium perfume owners. The target segment of upper class women was broader as consumer behaviour characteristics tend to differ with in the target segment of upper class women by age and social class. Hence the marketing messages failed to impress all the prospective buyers among the target segment of upper class women. Earlier, the segmentation was based on just income and status as quite evident from the positioning message. But it failed to impress all the cross sections of the prospective buyers. Lack of differentiated products and positioning: Tagline and positioning creates a perception map in the minds of consumers. Exclusive fragrance just for you suggests following characteristics it is expensive, it is exclusively for upper class only, it is unique from other products. However in real sense product was not differentiated from the competitor products. Hence there was a different between customer perception and experience which led to customer dissatisfaction and decline in repeat purchase. Teenagers Vs Adults with in the upper class target women Pure herbal Adults how to gain their credibility retain customer the core segment to be targeted.. Quality Personal body chemistry Brand image Teenagers Low price(relatively) Stress more on ambience Increase of celebrities Increase of social media usage especially in teenage networking sites Personal body chemistry Brand image As you can see above, teenagers are showing more affinity towards synthetic fragrance while adults are interested in herbal products. This itself calls for a rift in preferences and perception about the same fragrance product. Marketer need to address this with a differentiated product strategy. This kind of differences in perception mapping of the same product by two sections of the target segment was not considered while deciding the product and positioning strategy. Lack of proper celebrity references: Celebrities used for promoting Xclusive brand were mostly contemporary stars from the field of sports and films. But this is again not in line with the tagline, the company had. Ideally the company should have tried to bring in an image of a classic brand and they could have chosen somebody from old classic films like Lawrence of Arabia or actresses like Julie Andrews (Classic Movies, 2008) UK Consumers, especially the women in the age group of 30 to 60 were revisiting the classic brands and this could have been a better strategy. Couldnt reach all influencers: In the case of upper class women, a typical purchase process is influenced by friends, family members like husband, social clubs, social marketing forums and then ofcourse the aspirational groups like successful businesswomen or celebrities. Xclusive as a brand didnt have any such associations with these influencers. They were mostly targeting the decision makers and purchases with ads being targeted in magazines like Glamour. Redefine the target segments among the Women Xlusive brand has suffered a decline in sales over the last two years among the women target segment. From the market analysis and consumer behaviour study we can find that current marketing strategy was not good enough to attract all prospective consumers among the target segment of upper class women. Initial market strategy was just built around the income class, but it was not taking into account the consumer behaviour changes as per different factors like social class, age, cultural difference and so on. Shift in target segmentation from Upper class women to multiple target segments of segment 1: upper upper class and upper middle class (employed) woman segment 2: teenage women in upper middle class and upper class (with a high disposable income) Differentiated Products and Positioning Me too products or generic product line with one positioning message will not work in this changed environment. UK consumers are more going towards value shopping and they are likely to make more informed decisions rather than going by quick stimuli. Segment Product Positioning Upper class and upper middle class women Xclusive Classic range of fragrance in herbal mix Health and Class Exclusively Teenage upper class and upper middle class Xclusive Style Synthetic perfumes with citrus flavours Style and Confidence Suggesting following the Key Brand method to look at what factors would influence women in the above target segments choose a fragrance in the premium segment. (Brandkeys, 2010) Hence the differentiated products and positioning should be made around the following attributes selected from the above matrix Product Image Scent Ingredients Reactions Classic range of fragrance in herbal mix Classic Sexy Sociable Traditional Floral Spicy Natural Ingredients Fresh Original Sensual Powerful Inspired Strong Hence positioning messages are created around these product attributes for the two product lines. Packaging is also made consistent with these attributes to create that whole product image. Classic product line needs to be packaged in premium glass bottles with a golden plating. Style product line for teenagers will be in colourful glass bottles which are cut on sides to give it a style and powerful cuvy shape.   Creative Campaigns around Positioning Messages One of the problems with fragrance is that the penetration rates are not that high. However, a lot could be done to bring more consumers into the fragrance market. Critics say that marketers focus too much on youth, and that the scents and sometimes racy advertising campaigns aimed at this group have turned off older consumers. Appealing to women in their 30s, 40s and 50s and those who have lost touch with fragrance with an appropriate offer and marketing campaign could bring in much additional revenue. So having nostalgic and retro campaigns would be a good way to target the segment of middle aged upper class and upper middle class women. Celebrities can be actresses like Elizabeth Taylor and Julia Andrews. They can promote the Xclusive Classic brand around creating images of classic and vintage stuff never ceases or use everlasting films like Lawrence of Arabia. Moving away from contemprory stars to more stars from the classical age would be good to convince and influence changing UK consumers especially among the aged upper class segments. (The Freelibrary, 2007) Avertisement targeted at adult women Use of gold plated bottle cover and golden color font in a classic written style Xclusive *Julie Andres, an actress from yester years still a living legend to be a brand ambassador of the Classic product line Similarly for the teenage segment, celebrities from field like politics, business, sports could be chosen who can give an image of style and confidence. A study conducted among young UK women chose a set of role models like Margaret Thatcher, Marilyn Monroe, Kylie Minogue, Jamie Ogata (Confident Japanese UN official). (Cranfield University, 2009) We can probably use them as celebrities to push our style and confidence image in the mind of teenagers. Unlike adults, teenagers are more image shoppers. They can be triggered for an instant purchase by a sudden stimuli. (Telegraph, 2008) Advertisement targeting teenagers: Bold confident young women, curvy bottle shape with bold red font usage Xclusive Re-inventing Shopping Experience Shopping for fragrances needs to be made easier, and stores better adapted to how consumers browse and buy. Research by Paris-based JMG Research shows that the consumer is looking for new retail formats. She is looking for a new experience and is very reactive to new propositions. When something is out of the ordinary she will buy, says JMG Research managing director Jà ©rà ´me Goldberg. New retail store formats have to be tried out like eliminating counters in department stores, merchandising by fragrance family or creating areas for replenishment for the consumer who is only looking for that service. In a recent survey, majority of those questioned did want to see fragrances organized by brand, but 40% also said that they would like to see fragrances organized by the way they smell. Many UK women middle aged consumers now go in for a fragrance collection. This basically tends them to be more brand loyal. Fragrance is emotional and the industry needs to pay more attention to this rather talking about technical information. There needs to be beauty assistants who are helpful and knowledgeable and not just push the latest launch, says John Ayres, director of UK-based fragrance consultancy Pandora. Sales people should be doing a lot more educational selling rather than aggressive as consumers have more options to choose from. (Articles base, 2007) Leaflets in boxes should also contain information for the consumer on the fragrance, on how to wear and tips on fragrance layering and its ingredients. This is standard for many prestige skincare brands. Also samples can be used to explain fragrance notes. http://www.bglam.com/wp-content/uploads/2009/12/discount-3.JPG (Sample online perfume catalogue) Another trend is the moving away from class to mass channels for purchase. UK consumers now prefer Tesco to specialised classes like department stores.

Tuesday, November 12, 2019

Allegory Essay -- essays research papers

Allegory Plato’s The Allegory of the Cave is a short story specifically discussing the parallels between the shadows the prisoners sees on the wall of the cave, and the illusion, which passes off as truth in today\\'s society. The Allegory of the Cave is about Socrates teaching his student, Glaucon, certain principles of life by telling him one of his allegories. The Allegory of the Cave can be interpreted in many ways; one way is to make a comparison between the story and the way of thinking by individuals in a closed society. Socrates states that the cave is a world many of us would like to see, but is not really how the world is. It is almost like the movie \\"The Matrix\\", where Neo, the main character is to discover that the world he lives in, is not the real world, but a world generated by machines and computers. Only in Socrates\\' allegory, the world is not created by computers, but by individual minds. Socrates wants Glaucon to be a wiser, better-educated man, who will later become a ruler of the State. He wants him to know not only the right, but also experience the wrong, because only a man who knows the bad, can truly understand and appreciate the good. Socrates does this by telling him a story, to let him better understand the principles of life. Men are chained down in a cave and have a wall blocking their view to the outer world. The prisoners can only see the shadows of the objects on the other side of the wall. If the prisoners see the shadows of the men ...

Sunday, November 10, 2019

Business Continuity Plan

Data Sources in Digital Forensics March 17, 2013 Joana Achiampong CSEC 650 Introduction Four sources of data that stand out for forensic investigators in most criminal investigations are files, operating systems, routers and network traffic, and social network activity. Each data source presents a variety of opportunities and challenges for investigators, meaning that the more reliable data collection and analysis activity typically involves examination of a variety of sources.Digital forensics must cover the four basic phases of activity, which include: data collection, which describes the identification and acquisition of relevant data; data examination, which includes the processing of data through the use of automated and manual tools; analysis, which describes the evaluation and categorization of examined data into coherent groups, such as their usefulness in a court proceeding; and reporting, in which the results of analysis are described with careful attention paid to recommen dations (Marcella & Menendez, 2009).The viability of each data source to an investigation must be evaluated based on how they can contribute to each phase. For example, the ability of routers and switches as a data source to help investigators might be effective in one area, but not in the other three. An examination of router activity might yield a surfeit of observable data that fails to provide diverse analytical tools that cannot be relied upon in a forensic setting. Another example is network traffic, which may yield a large amount of data that is unreliable or has a high degree of volatility (Garfinkel, 2010).Time is often essential for forensic investigators, and it is often important to know in advance the dynamics of each data source. This helps investigators avoid wasted time, or spending time analyzing data that may of minimal help in a forensic setting. For these reasons, it is important to critically assess the pros and cons of each data source for their ability to prov ide contributions. A valid assessment of each data source should be made based on consistent factors such as costs, data sensitivity, and time investment.The overall costs of each data source depend on the equipment that will be required to collect and analyze data without corruption. Costs also refer to the training and labor required during the course of the collection and analysis, which may be higher for uncommon sources that require a unique process and chain of command pattern. Data sensitivity is critical is a forensic tool, but may be more questionable depending on the source. For example, network activity can provide a wealth of information depending on the device and setting upon which data is moved.However, a network environment with many devices and multiple configurations may provide unreliable data that cannot be recognized in court proceedings. In addition, chain-of-command issues regarding the contribution of outside network analysts could compromise a source that wo uld be otherwise valid. These issues have to be considered in any data source assessment. Data Files The most common data sources in a digital forensic examination are current and deleted files. Most forensic investigators in most data retrieval environments begin with an examination of the various media store on the hard drive of a computer, network, or mobile device.The variety of types of stored data in current and deleted files, in addition to partitioned packet files and the slack space of a device’s memory, can be massive and diverse. A typical first step in data retrieval is to shut down a system and create a data grab or forensic duplicate upon which collection and analysis can be made. This ensures the integrity of the original data, while allowing investigators the ability to manipulate data however they see fit. However, this process alone creates challenges for forensic investigators, including an inability to capture live system data.This might prevent investigat ors from catching a perpetrator in the act of altering or adding data to a device or system. One of the primary benefits of files as a data source is the ability to separate and analyze the types of files, which creates a specific signature based on the content and user (Marcella & Menendez, 2008). Data can be pulled from deleted files, slack space on a system’s hard drive, or free space, all of which provides information that can be useful to investigators.The directory location and allocation type for each file informs the data that has been collected, including a time stamp and whether tools have been used to hide the data. Each of these characteristics provides investigators easy-to-access information about a system. In addition, there are a variety of hardware tools that can be used to access data. This technology is fairly common, meaning that associated costs tend to be minimal when retrieving data from files (Purita, 2006). File examination can yield a variety of type s of suspicious activity that tend to be helpful for investigators.One example is the presence of hidden evidence on file systems. This type of data can be hidden in deleted file spaces, slack spaces, and bad clusters. File space is marked as deleted when it is removed from an active directory. This data will continue to exist within a cluster of a hard disk can be identified and accessed by creating a file in Hex format and transferring the copied data. Data can also be hidden in many others ways, including by removing partitions that are created between data and by leveraging the slack space that exists between files.Attempts by users to hide data using these methods are quickly identifiable by investigators, who can then restore the data using a variety of inexpensive and efficient methods. For example, matching RAM slack to file slack identifies the size of a file and makes it easier to identify and retrieve (Sindhu & Meshram, 2012). This type of retrieval inherently emphasizes the importance of data integrity. This type of integrity is important in any forensic environment, and compromised data is usually rendered instantly unusable. The many opportunities for data retrieved from file space to be compromised are a drawback to this data source.For example, data retrieval using bit stream imaging provides a real-time copy onto a disk or similar medium. However, this can be compromised based on the fact that re-imagining of data is constantly changing during re-writing. Investigators will typically choose the type of data copy system based on what they are looking for. However, changes to data can occur if the appropriate safeguards are not taken. Write-blockers are often used to prevent an imaging process from providing data that has been compromised by writing to that media. Sindhu and Meshram 2012) stated that computing a message digest will create a verification of the copied data based on a comparison to the original. A message digest is an algorithm th at takes input data and produces an output digest. This comparison helps investigators ensure the integrity of data in many cases. There are additional pitfalls when it comes to using files as data sources. Users have different resources for eliminating or hindering data collection. One example is overwriting content by replacing it with constant values. This type of wiping function can be performed by a variety of utilities.Users can also demagnetize a hard drive to physically destroy the content stored there. Using files as a data source in this case will require a complex operation requiring different tools. Users can also purposefully misname files – for example, giving them . jpg extensions when they are not image content files – in order to confuse investigators. Investigators have to be familiar with strategies for circumventing these pitfalls, such as maintaining an up-to-date forensic toolkit and remaining committed to maintaining data integrity.In the end, fi les are very highly relied upon by investigators and are a strong source forensic data. However, investigators must be experienced and have the appropriate tools to ensure the viability of collected data. Operating Systems Generally speaking, the data that can be collected from Operating Systems (OS) is more diverse and rich than file systems data, and has greater potential to uncover application-specific events or vital volatile data specific to a network operation (Sindhu, Tribathi & Meshram, 2012).However, OS data mining can be more difficult and challenging, and often requires investigators to make quick decisions based on the type of data they are seeking. OS data mining is more case specific, in part because the retrieval of data is frequently connected to network configurations. Collecting volatile data can only occur from a live system that has not been shut down or rebooted (Marcella & Menendez, 2008). Additional activity that occurs over an individual network session is ve ry likely to compromise the OS data. For this reason, investigators have to be prepared and aware of what they are looking for.Time is of the essence in this case, and it is important to decide quickly whether or not the OS data should be preserved or if the system should be shut down. Keeping a system running during data extraction can also compromise data files. This also leaves data vulnerable to malware that has been installed by a user with bad intentions, determined to undermine the operations of investigators. The types of data that can be retrieved from the OS include network connections, network configurations, running processes, open files, and login sessions.In addition, the entire contents of the memory can be retrieved from the OS history, usually with little or no alteration of data when the footprint of retrieval activity is minimized. The order in which this data is collected typically runs in a standard succession, with network connections, login sessions, and memor y collection sitting at the top of the list or priorities. These sources are more important because they tend to change over time. For example, network connections tend to time out and login sessions can change as users log in or out.Network configurations and the files that are open in a system are less time-sensitive and fall further down the list of priorities for investigators. The forensic toolkit must be diverse to ensure that data retrieval is achieved with minimal alteration (Bui, Enyeart & Luong, 2003). In addition, the message digest of each tool should be documented, along with licensing and version information, and command logs. This careful documentation protects users from sudden loss of data or other disturbances during data retrieval.In addition, a number of accessibility issues can be implemented by users, including the placement of screen saver passwords, key remapping and log disabling features, all of which can disrupt the work by investigators, either providing unworkable obstacles or time-consuming hurdles that make complete transfer impossible. Ultimately, the use of OS as a data source is a case-by-case tool dependent on the availability of other sources and the specific needs and tools of investigators. Routers and Network TrafficAmong network configuration data sources, router activity and network sourcing has the potential to provide the most specific amount of incriminating activity for forensic use. Forensic equipment should have time stamping capabilities activated to provide an accurate time signature of network interaction between an end-user and a router or switch (Schwartz, 2011). Importantly, firewalls and routers that are tied to a network often provide network address translation which can offer additional information by clarifying configuration or additional IP addresses on a network (Huston, 2004).There are a number of tools available to people seeking an analysis of network activity, including packet sniffers and intrusi on detection systems (Marcella & Menendez, 2008). These tools help investigators examine all packets for suspicious IP addresses and special events that have occurred across a network. This data is usually recorded and analyzed so that investigators can compare unusual events to evaluate network weaknesses and special interests of would-be attackers.This is of great interests to security agents determined to identify and stop potential network intrusions. A number of technical, procedural, legal and ethical issues exist when examining and analyzing network data. It is imperative that investigators be sure to avoid disconnected from a network or rebooting a system during data retrieval. They should also rely on live data and persistent information. Finally, it is important to avoid running configuration commands that could corrupt a network or its activity (Gast, 2010).Issues such as storage of large amounts of data over a highly trafficked network and proper placement of a decryptio n device along a network can impact how data is available and whether or not it maintains integrity. It is also important to consider the ethical and legal issues of data retrieval along a network when it involves sensitive data, such as financial records and personal information like passwords. In many cases, ethical issues can be circumvented with careful documentation and the publication of organizational policies and procedures that are strictly followed.However, these are all issues that must be considered in the analysis of network trafficking as a data source. Social Network Activity The sheer volume of social network activity – such as that on Facebook, Twitter, and Instragram – makes examining it as a data source great potential as a forensic tool. To this point, the little available research on social network data has failed to come up with a comprehensive framework or set of standards for investigators. Social network tools across mobile platforms invariably have geolocation services.However, the use of these as a data source has been questioned from ethical and legal perspectives (Humaid, Yousif, & Said, 2011). The communication layer of social media applications on mobile devices can yield rich data, such as a browser cache and packet activity. Packet sniffing can expose unencrypted wifi use and third party intrusion across a social network. However, these tools are highly limited when they are restricted to social network activity. The best tools may be the ability to create a social footprint, which includes all friend activity, posted pictures and videos, communication habits, and periods of activity.For most people, this information is only available on social network websites and is not stored on a user’s hard drive. A certain climate of permissibility tends to apply to social network use, in which users are prone to making data available online that they would not otherwise expose. All of this strengthens the use of soci al networks as a data source. The greatest pitfall to social network activity is the malleability of the material. Users frequently change their habits, including the times of the day and the users with whom they connect.Cumulative social network data can be used to create a graph of all activity across a variety of factors, including time, space, usage, and devices (Mulazzani, Huber, & Weippl). But this is a rapidly changing field. There is little doubt that the cloud computing data storage and continued growth of social networks will change this field quickly, which could quickly undermine past data that has been retrieved. Potential Usefulness in Specific Events The usefulness of a data source is strictly tied to the event it is intended to investigate.It is imperative that investigators are clear on their goals prior to selecting a source to retrieve and analyze data from. For example, a network intrusion would be best tackled with an examination of network traffic, followed by social network analysis, Operating Systems, and data file systems. Network analysis is less prone to attacking strategies that can compromise file and OS data. It can observe network traffic to find anomalous entities and their entry point within a network. It can also identify source and destination data by data recovery and access to routers r other network access points (Aquilina, Casey & Malin, 2008). This is critical information for network intrusion investigations. Operating Systems enable access to volatile data, but this is limited by single-time use and data integrity issues. Most OS examinations look at network connections first, which is often another way of accessing the same data. File storage and social network analysis tend to offer peripheral views of the same material. Operating systems are the most helpful data source in malware installation investigation, followed by network traffic, data files, and social network activity.Examination of volatile data offers a ran ge of data, including network connections and login sessions, which are primary tools for finding the source of malware installation (Aquilina, Casey & Malin, 2008). Maintaining the integrity of data through quick retrieval and minimal footprints helps ensure its usefulness. At the same time, monitoring network traffic in a pro-active manner is often the surest way of pinpointing time signatures and matching them with network activity (Marcella & Menendez, 2008). The best data sources for identifying insider file deletion are data files, network traffic, social network activity and OS.Each source offers benefits for this type of investigation, but data file collection and analysis yields bad clusters and slack space, both of which pinpoint the likelihood of deleted files. Recovery can begin from this point. Network activity and OS data retrieval can lead investigators to unusual login attempts and anomalous activity in order to pinpoint the location of deleted files along a network. At the same time, social network examination can help investigators understand reasons for deleted files and even learn more about the habits and lifestyle of a likely perpetrator.In the end, a collection of each of these sources provides a rich, revealing glimpse at deleted file activity. Conclusion Network traffic, data files, operating systems, and social network activity are four common data sources in digital forensic. Each provides a unique opportunity and set of risks for investigators, and the source should be chosen based on clear objectives and awareness of all circumstances. In many cases, the best choice is a combination of sources to provide multiple opportunities to arrive at the relevant evidence.Another factor is whether the data search is reactive or pro-active, with network traffic often providing the best source of evidence in a pro-active, forward-thinking environment. The variable of time must also be considered, specifically with respect to how investigators a pproach volatile data. Each of these issues must be considered when evaluating data sources. References Aquilina, J. , Casey, E. & Malin, C. (2008). Malware forensics: Investigating and Analyzing Malicious Code. Burlington, MA: Syngress Publishing. Bui, S. , Enyeart, M. & Luong, J. (2003, May). Issues in Computer Forensics. Retrieved ttp://www. cse. scu. edu/~jholliday/COEN150sp03/projects/Forensic%20Investiga tion. pdf Garfinkel, S. (2010). Digital forensics research: The next 10 years. Digital Investigation, 7. 64-73. Gast, T. (2010). Forensic data handling. The Business Forum. Retrieved from http://www. bizforum. org/whitepapers/cybertrust-1. htm Humaid, H. , Yousif, A. & Said, H. (2011, December). Smart phones forensics and social networks. IEEE Multidisciplinary Engineering Education Magazine, 6(4). 7-14. Huston, G. (2004, September). Anatomy: A look inside network address translators. The Internet Protocol Journal, 7(3).Retrieved from http://www. cisco. com/web/about/ac123/ac1 47/archived_issues/ipj_7- 3/anatomy. html Marcella, A. & Menendez, D. (2008). Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Data. Boca Raton, FL: Auerbach Publications. Mulazzani, M. , Huber, M. & Weippl, E. (n. d. ). Social network forensics: Tapping the data pool of social networks. SBA-Research. Retrieved from http://www. sba- research. org/wp-content/uploads/publications/socialForensics_preprint. pdf Purita, R. (2006). Computer Forensics: A valuable audit tool. Internal Auditor. Retrieved from http://www. theiia. rg/intAuditor/itaudit/archives/2006/september/computer- forensics-a-valuable-audit-tool-1/ Schwartz, M. (2011, December). How digital forensics detects insider theft. InformationWeek Security. Retrieved from http://www. informationweek. com/security/management/how-digital-forensics- detects-insider-t/232300409 Sindhu, K. & Meshram, B. (2012). A digital forensic tool for cyber crime data mining. Engineering Science and Technology: An Internati onal Journal, 2(1). 117-123. Sindhu, K. , Tripathi, S. & Meshram, B. (2012). Digital forensic investigation on file system and database tampering. IOSR Journal of Engineering, 2(2). 214-221. Business Continuity Plan Data Sources in Digital Forensics March 17, 2013 Joana Achiampong CSEC 650 Introduction Four sources of data that stand out for forensic investigators in most criminal investigations are files, operating systems, routers and network traffic, and social network activity. Each data source presents a variety of opportunities and challenges for investigators, meaning that the more reliable data collection and analysis activity typically involves examination of a variety of sources.Digital forensics must cover the four basic phases of activity, which include: data collection, which describes the identification and acquisition of relevant data; data examination, which includes the processing of data through the use of automated and manual tools; analysis, which describes the evaluation and categorization of examined data into coherent groups, such as their usefulness in a court proceeding; and reporting, in which the results of analysis are described with careful attention paid to recommen dations (Marcella & Menendez, 2009).The viability of each data source to an investigation must be evaluated based on how they can contribute to each phase. For example, the ability of routers and switches as a data source to help investigators might be effective in one area, but not in the other three. An examination of router activity might yield a surfeit of observable data that fails to provide diverse analytical tools that cannot be relied upon in a forensic setting. Another example is network traffic, which may yield a large amount of data that is unreliable or has a high degree of volatility (Garfinkel, 2010).Time is often essential for forensic investigators, and it is often important to know in advance the dynamics of each data source. This helps investigators avoid wasted time, or spending time analyzing data that may of minimal help in a forensic setting. For these reasons, it is important to critically assess the pros and cons of each data source for their ability to prov ide contributions. A valid assessment of each data source should be made based on consistent factors such as costs, data sensitivity, and time investment.The overall costs of each data source depend on the equipment that will be required to collect and analyze data without corruption. Costs also refer to the training and labor required during the course of the collection and analysis, which may be higher for uncommon sources that require a unique process and chain of command pattern. Data sensitivity is critical is a forensic tool, but may be more questionable depending on the source. For example, network activity can provide a wealth of information depending on the device and setting upon which data is moved.However, a network environment with many devices and multiple configurations may provide unreliable data that cannot be recognized in court proceedings. In addition, chain-of-command issues regarding the contribution of outside network analysts could compromise a source that wo uld be otherwise valid. These issues have to be considered in any data source assessment. Data Files The most common data sources in a digital forensic examination are current and deleted files. Most forensic investigators in most data retrieval environments begin with an examination of the various media store on the hard drive of a computer, network, or mobile device.The variety of types of stored data in current and deleted files, in addition to partitioned packet files and the slack space of a device’s memory, can be massive and diverse. A typical first step in data retrieval is to shut down a system and create a data grab or forensic duplicate upon which collection and analysis can be made. This ensures the integrity of the original data, while allowing investigators the ability to manipulate data however they see fit. However, this process alone creates challenges for forensic investigators, including an inability to capture live system data.This might prevent investigat ors from catching a perpetrator in the act of altering or adding data to a device or system. One of the primary benefits of files as a data source is the ability to separate and analyze the types of files, which creates a specific signature based on the content and user (Marcella & Menendez, 2008). Data can be pulled from deleted files, slack space on a system’s hard drive, or free space, all of which provides information that can be useful to investigators.The directory location and allocation type for each file informs the data that has been collected, including a time stamp and whether tools have been used to hide the data. Each of these characteristics provides investigators easy-to-access information about a system. In addition, there are a variety of hardware tools that can be used to access data. This technology is fairly common, meaning that associated costs tend to be minimal when retrieving data from files (Purita, 2006). File examination can yield a variety of type s of suspicious activity that tend to be helpful for investigators.One example is the presence of hidden evidence on file systems. This type of data can be hidden in deleted file spaces, slack spaces, and bad clusters. File space is marked as deleted when it is removed from an active directory. This data will continue to exist within a cluster of a hard disk can be identified and accessed by creating a file in Hex format and transferring the copied data. Data can also be hidden in many others ways, including by removing partitions that are created between data and by leveraging the slack space that exists between files.Attempts by users to hide data using these methods are quickly identifiable by investigators, who can then restore the data using a variety of inexpensive and efficient methods. For example, matching RAM slack to file slack identifies the size of a file and makes it easier to identify and retrieve (Sindhu & Meshram, 2012). This type of retrieval inherently emphasizes the importance of data integrity. This type of integrity is important in any forensic environment, and compromised data is usually rendered instantly unusable. The many opportunities for data retrieved from file space to be compromised are a drawback to this data source.For example, data retrieval using bit stream imaging provides a real-time copy onto a disk or similar medium. However, this can be compromised based on the fact that re-imagining of data is constantly changing during re-writing. Investigators will typically choose the type of data copy system based on what they are looking for. However, changes to data can occur if the appropriate safeguards are not taken. Write-blockers are often used to prevent an imaging process from providing data that has been compromised by writing to that media. Sindhu and Meshram 2012) stated that computing a message digest will create a verification of the copied data based on a comparison to the original. A message digest is an algorithm th at takes input data and produces an output digest. This comparison helps investigators ensure the integrity of data in many cases. There are additional pitfalls when it comes to using files as data sources. Users have different resources for eliminating or hindering data collection. One example is overwriting content by replacing it with constant values. This type of wiping function can be performed by a variety of utilities.Users can also demagnetize a hard drive to physically destroy the content stored there. Using files as a data source in this case will require a complex operation requiring different tools. Users can also purposefully misname files – for example, giving them . jpg extensions when they are not image content files – in order to confuse investigators. Investigators have to be familiar with strategies for circumventing these pitfalls, such as maintaining an up-to-date forensic toolkit and remaining committed to maintaining data integrity.In the end, fi les are very highly relied upon by investigators and are a strong source forensic data. However, investigators must be experienced and have the appropriate tools to ensure the viability of collected data. Operating Systems Generally speaking, the data that can be collected from Operating Systems (OS) is more diverse and rich than file systems data, and has greater potential to uncover application-specific events or vital volatile data specific to a network operation (Sindhu, Tribathi & Meshram, 2012).However, OS data mining can be more difficult and challenging, and often requires investigators to make quick decisions based on the type of data they are seeking. OS data mining is more case specific, in part because the retrieval of data is frequently connected to network configurations. Collecting volatile data can only occur from a live system that has not been shut down or rebooted (Marcella & Menendez, 2008). Additional activity that occurs over an individual network session is ve ry likely to compromise the OS data. For this reason, investigators have to be prepared and aware of what they are looking for.Time is of the essence in this case, and it is important to decide quickly whether or not the OS data should be preserved or if the system should be shut down. Keeping a system running during data extraction can also compromise data files. This also leaves data vulnerable to malware that has been installed by a user with bad intentions, determined to undermine the operations of investigators. The types of data that can be retrieved from the OS include network connections, network configurations, running processes, open files, and login sessions.In addition, the entire contents of the memory can be retrieved from the OS history, usually with little or no alteration of data when the footprint of retrieval activity is minimized. The order in which this data is collected typically runs in a standard succession, with network connections, login sessions, and memor y collection sitting at the top of the list or priorities. These sources are more important because they tend to change over time. For example, network connections tend to time out and login sessions can change as users log in or out.Network configurations and the files that are open in a system are less time-sensitive and fall further down the list of priorities for investigators. The forensic toolkit must be diverse to ensure that data retrieval is achieved with minimal alteration (Bui, Enyeart & Luong, 2003). In addition, the message digest of each tool should be documented, along with licensing and version information, and command logs. This careful documentation protects users from sudden loss of data or other disturbances during data retrieval.In addition, a number of accessibility issues can be implemented by users, including the placement of screen saver passwords, key remapping and log disabling features, all of which can disrupt the work by investigators, either providing unworkable obstacles or time-consuming hurdles that make complete transfer impossible. Ultimately, the use of OS as a data source is a case-by-case tool dependent on the availability of other sources and the specific needs and tools of investigators. Routers and Network TrafficAmong network configuration data sources, router activity and network sourcing has the potential to provide the most specific amount of incriminating activity for forensic use. Forensic equipment should have time stamping capabilities activated to provide an accurate time signature of network interaction between an end-user and a router or switch (Schwartz, 2011). Importantly, firewalls and routers that are tied to a network often provide network address translation which can offer additional information by clarifying configuration or additional IP addresses on a network (Huston, 2004).There are a number of tools available to people seeking an analysis of network activity, including packet sniffers and intrusi on detection systems (Marcella & Menendez, 2008). These tools help investigators examine all packets for suspicious IP addresses and special events that have occurred across a network. This data is usually recorded and analyzed so that investigators can compare unusual events to evaluate network weaknesses and special interests of would-be attackers.This is of great interests to security agents determined to identify and stop potential network intrusions. A number of technical, procedural, legal and ethical issues exist when examining and analyzing network data. It is imperative that investigators be sure to avoid disconnected from a network or rebooting a system during data retrieval. They should also rely on live data and persistent information. Finally, it is important to avoid running configuration commands that could corrupt a network or its activity (Gast, 2010).Issues such as storage of large amounts of data over a highly trafficked network and proper placement of a decryptio n device along a network can impact how data is available and whether or not it maintains integrity. It is also important to consider the ethical and legal issues of data retrieval along a network when it involves sensitive data, such as financial records and personal information like passwords. In many cases, ethical issues can be circumvented with careful documentation and the publication of organizational policies and procedures that are strictly followed.However, these are all issues that must be considered in the analysis of network trafficking as a data source. Social Network Activity The sheer volume of social network activity – such as that on Facebook, Twitter, and Instragram – makes examining it as a data source great potential as a forensic tool. To this point, the little available research on social network data has failed to come up with a comprehensive framework or set of standards for investigators. Social network tools across mobile platforms invariably have geolocation services.However, the use of these as a data source has been questioned from ethical and legal perspectives (Humaid, Yousif, & Said, 2011). The communication layer of social media applications on mobile devices can yield rich data, such as a browser cache and packet activity. Packet sniffing can expose unencrypted wifi use and third party intrusion across a social network. However, these tools are highly limited when they are restricted to social network activity. The best tools may be the ability to create a social footprint, which includes all friend activity, posted pictures and videos, communication habits, and periods of activity.For most people, this information is only available on social network websites and is not stored on a user’s hard drive. A certain climate of permissibility tends to apply to social network use, in which users are prone to making data available online that they would not otherwise expose. All of this strengthens the use of soci al networks as a data source. The greatest pitfall to social network activity is the malleability of the material. Users frequently change their habits, including the times of the day and the users with whom they connect.Cumulative social network data can be used to create a graph of all activity across a variety of factors, including time, space, usage, and devices (Mulazzani, Huber, & Weippl). But this is a rapidly changing field. There is little doubt that the cloud computing data storage and continued growth of social networks will change this field quickly, which could quickly undermine past data that has been retrieved. Potential Usefulness in Specific Events The usefulness of a data source is strictly tied to the event it is intended to investigate.It is imperative that investigators are clear on their goals prior to selecting a source to retrieve and analyze data from. For example, a network intrusion would be best tackled with an examination of network traffic, followed by social network analysis, Operating Systems, and data file systems. Network analysis is less prone to attacking strategies that can compromise file and OS data. It can observe network traffic to find anomalous entities and their entry point within a network. It can also identify source and destination data by data recovery and access to routers r other network access points (Aquilina, Casey & Malin, 2008). This is critical information for network intrusion investigations. Operating Systems enable access to volatile data, but this is limited by single-time use and data integrity issues. Most OS examinations look at network connections first, which is often another way of accessing the same data. File storage and social network analysis tend to offer peripheral views of the same material. Operating systems are the most helpful data source in malware installation investigation, followed by network traffic, data files, and social network activity.Examination of volatile data offers a ran ge of data, including network connections and login sessions, which are primary tools for finding the source of malware installation (Aquilina, Casey & Malin, 2008). Maintaining the integrity of data through quick retrieval and minimal footprints helps ensure its usefulness. At the same time, monitoring network traffic in a pro-active manner is often the surest way of pinpointing time signatures and matching them with network activity (Marcella & Menendez, 2008). The best data sources for identifying insider file deletion are data files, network traffic, social network activity and OS.Each source offers benefits for this type of investigation, but data file collection and analysis yields bad clusters and slack space, both of which pinpoint the likelihood of deleted files. Recovery can begin from this point. Network activity and OS data retrieval can lead investigators to unusual login attempts and anomalous activity in order to pinpoint the location of deleted files along a network. At the same time, social network examination can help investigators understand reasons for deleted files and even learn more about the habits and lifestyle of a likely perpetrator.In the end, a collection of each of these sources provides a rich, revealing glimpse at deleted file activity. Conclusion Network traffic, data files, operating systems, and social network activity are four common data sources in digital forensic. Each provides a unique opportunity and set of risks for investigators, and the source should be chosen based on clear objectives and awareness of all circumstances. In many cases, the best choice is a combination of sources to provide multiple opportunities to arrive at the relevant evidence.Another factor is whether the data search is reactive or pro-active, with network traffic often providing the best source of evidence in a pro-active, forward-thinking environment. The variable of time must also be considered, specifically with respect to how investigators a pproach volatile data. Each of these issues must be considered when evaluating data sources. References Aquilina, J. , Casey, E. & Malin, C. (2008). Malware forensics: Investigating and Analyzing Malicious Code. Burlington, MA: Syngress Publishing. Bui, S. , Enyeart, M. & Luong, J. (2003, May). Issues in Computer Forensics. Retrieved ttp://www. cse. scu. edu/~jholliday/COEN150sp03/projects/Forensic%20Investiga tion. pdf Garfinkel, S. (2010). Digital forensics research: The next 10 years. Digital Investigation, 7. 64-73. Gast, T. (2010). Forensic data handling. The Business Forum. Retrieved from http://www. bizforum. org/whitepapers/cybertrust-1. htm Humaid, H. , Yousif, A. & Said, H. (2011, December). Smart phones forensics and social networks. IEEE Multidisciplinary Engineering Education Magazine, 6(4). 7-14. Huston, G. (2004, September). Anatomy: A look inside network address translators. The Internet Protocol Journal, 7(3).Retrieved from http://www. cisco. com/web/about/ac123/ac1 47/archived_issues/ipj_7- 3/anatomy. html Marcella, A. & Menendez, D. (2008). Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Data. Boca Raton, FL: Auerbach Publications. Mulazzani, M. , Huber, M. & Weippl, E. (n. d. ). Social network forensics: Tapping the data pool of social networks. SBA-Research. Retrieved from http://www. sba- research. org/wp-content/uploads/publications/socialForensics_preprint. pdf Purita, R. (2006). Computer Forensics: A valuable audit tool. Internal Auditor. Retrieved from http://www. theiia. rg/intAuditor/itaudit/archives/2006/september/computer- forensics-a-valuable-audit-tool-1/ Schwartz, M. (2011, December). How digital forensics detects insider theft. InformationWeek Security. Retrieved from http://www. informationweek. com/security/management/how-digital-forensics- detects-insider-t/232300409 Sindhu, K. & Meshram, B. (2012). A digital forensic tool for cyber crime data mining. Engineering Science and Technology: An Internati onal Journal, 2(1). 117-123. Sindhu, K. , Tripathi, S. & Meshram, B. (2012). Digital forensic investigation on file system and database tampering. IOSR Journal of Engineering, 2(2). 214-221.

Friday, November 8, 2019

Secondary Citations in APA, Chicago, and MLA - Proofed

Secondary Citations in APA, Chicago, and MLA - Proofed Secondary Citations in APA, Chicago, and MLA Referencing is a fundamental part of academic writing. Sometimes, though, you’ll come across something that you want to use in your work, only to find that you can’t access the original source. This is when secondary citations come into play. What Are Secondary Citations? We use secondary citations to cite something we’ve read about elsewhere when the original text is unavailable. You might, for instance, come across a statistic in an article, but then discover that the book it was taken from is out of print. Using a secondary citation- i.e., citing the source in which the unavailable text is cited- will let you use the information required despite not having access to the original source. With all of the referencing systems listed below, however, this approach is best reserved as a last resort. Make sure to check that the source is really unavailable before using a secondary citation! Ask a librarian if you need help. They have magical book-finding powers. Secondary Citations in APA With APA referencing, secondary citations are indicated using the phrase â€Å"as cited in† in the in-text citation. The citation should also include the author’s name and year of publication for the text where you found the inaccessible source referenced: According to Charles (as cited in Maconie, 2013), funk and soul music are fundamental aspects of U.S. culture. In the reference list, you should provide full publication detail for the source you’ve been able to access. In relation to the example above, then, the Maconie source would be referenced in full. Secondary Citations in Chicago With Chicago referencing, the correct approach depends on which version of the system you’re using and whether you’re citing or quoting a source. For author–date style referencing, when simply citing a source, you should add â€Å"cited in† to your in-text citations (we’ll use the Charles/Maconie example throughout for clarity): Charles (cited in Maconie 2013) praises Bootsy Collins. If you were quoting the same source, you’d use â€Å"quoted in† instead. You’d also give a page number for where the quote appears in the secondary source: Charles (quoted in Maconie 2013, 34) describes Bootsy Collins as â€Å"the greatest† bass player of his time. A snappy dresser, too.(Photo: Jester Jay Goldman/flickr) The same â€Å"cited in†/†quoted in† distinction applies when using Chicago-style footnote citations, but you need to provide full publication information (and page numbers) for both sources: 1. C. Charles, A History of Funk and Soul (New York: PMP Publications, 1994), 216, quoted in S. Maconie, Musical Freaks (Chicago: PI Press, 2013), 34. Whichever system you use, list the secondary source (e.g., in the examples above, Maconie) in the reference list/bibliography. Secondary Citations in MLA MLA uses â€Å"qtd. in† (short for â€Å"quoted in†) to indicate a secondary citation, such as in the following: Charles writes that Bootsy Collins would â€Å"put bass in your face† (qtd. in Maconie 46). As with the other systems here, you should list the secondary source (i.e., the text you’ve been able to access) on the â€Å"† page.

Wednesday, November 6, 2019

Critique of Twelve Angry Men Essays

Critique of Twelve Angry Men Essays Critique of Twelve Angry Men Essay Critique of Twelve Angry Men Essay Book Critique: Twelve Angry Men, Reginald Rose and David Mamet The criminal justice system of the United States, when first framed through the U. S. Constitution and Bill of Rights, was a revolutionary breakthrough in contemporary peace-keeping. For fear of becoming like their former governing nation wherein unreasonable trials were held in such a way that numerous individuals accused of criminal acts were not offered a opportunity to demonstrate their innocence or, in some cases, a trial by jury – the framers of the Constitution created a justice system based on the preservation of the rights of the accused, as well as ascertaining an un-biased truth and dealing justice. This brief explanation on the foundation of the U. S. Criminal justice system plays an importance to the piece of literature under criticism. Reginald Rose’s screenplay Twelve Angry Men provides insight into the judicial underbelly of a criminal trial, particularly the rigors of the jury’s decision-making procedure. Many issues to the contemporary justice system are made manifest despite the fact that the entirety of the play, excluding the opening court scene, takes place in a New York City jury room. The scenario of the case being presided over is an â€Å"offense against the person†; a homicide in specific in which, a New York City teenager is accused of fatally stabbing his father. The defendant has a criminal record (and a lot of circumstantial evidence piled against him) and therefore if convicted, the application of the death penalty is mandatory (in this scenario), which obviously should give the presiding jury a sense of pressure, given that a human being’s natural right to freedom and life rests in their unanimous decision. The application of the death penalty in this criminal case may have been just added for dramatic emphasis but the relevance to the modern criminal justice system is what makes an entertaining play plausible. For example, obviously in real criminal court, a guilty verdict would not necessarily be a death-sentence. The guilty party would have the chance to appeal to the court of appeals, and given the weak evidence (mentioned later), that appeal would be granted and moved into a higher level of judicial review. Another issue that Twelve Angry Men displays is Reginald Rose’s depiction of a diverse jury. The characters – who remain nameless except for their numbers – seem to have representatives from all spectrums of society. Such characters include: a sports-fanatic football coach, a former street-urchin, a Swiss-German immigrant, a doctor, an advertising agent, a self-made businessman, a bigot, and a level-headed representative of the â€Å"everyday American† to name a few. Eleven members of this diverse group of people, all with their own agenda (such as tickets to a ball game, or the desire to escape the un-air-conditioned room), immediately establish their biased, objective view of the accused youth by casting a â€Å"guilty† vote during the preliminary vote process. Only the level-headedness and determination to not condemn a youth so easily led one man to cast a not-guilty vote. Once the play reaches this point it relies on this one man to convince the other jurors to set aside their bias and examine the evidence before casting a guilty vote. Once again, all though the issue of bias is very likely to come up in genuine criminal trials, the use of these clashing characters is likely intended for dramatic effect. It is not the diversity of the jurors that makes the situation quite unlikely in a real criminal trial (because jurors are chosen at random from a Venire or list of randomly selected names from a Master Jury List and therefore given to diversity) but the fact that, as a rule, groups of people generally follow the majority and that one lonely level-headed juror (# 8) should not be able to convince them otherwise. If one does ignore that aspect then one still discovers later in the literature that many of the other jurors display a personal prejudice that influences their objectivity. For example, juror 10 exhibits a these people are dangerous outburst near the end functioning as outright bigotry. Other such jurors display a sense of past emotional scarring that influence their decisions only when touched by juror #8’s candor. This trial could immediately be dismissed as prejudicial error and therefore given to a retrial. Another interesting prejudice is the fact that most of the jurors characterize the accused youth through certain criminological theories. For example, this troubled teen has grown up in a poorer district, obviously right next to the El train; therefore he must have â€Å"turned out† bad. This is known as the Chicago School created by Clifford Shaw and Henry Mckay, which states that social disorganization (gangs, poor neighborhood, lack of decent educational facilities, etc†¦) causes criminal behavior in individuals. While this may present some grain of truth, the theory itself has not been proven to be undeniably correct in all circumstances thus the term â€Å"theory† rather than it being adopted as a law. On the issue of the incrimination of the accused youth, the twelve dissenting jurors (led by the level-headed juror #8) must reanalyze the evidence and witness testimonies provided by the court. At first glance, the evidence seems fairly damning to the accused: a unique murder weapon (switch-blade) that was supposedly bought by the rebellious teen, an overheard declaration- by an old man with a limp living below the duo- during a heated argument between the accused and the victim declaring that the teen would â€Å"kill him†, a poor-sighted woman who apparently saw the stabbing through a passing train, as well as a poor alibi given by the youth that he was at the movies, yet neglected to remember what was being shown. Without difficulty can one understand and justify the majority of the jury’s initial vote for a guilty verdict. But, would not taking the evidence at face value violate the founding principles of the United States criminal justice system? Condemning one to death with a casual glance at these evidences is neither about protecting the rights of the accused as a human being nor finding the truth to deal swift justice. Juror #8’s approach to the evidence is to illustrate that: On cases in which the death penalty is the consequence – jury, as objective citizens must decide whether or not a criminal charge can be proven to be fact. If the evidence of prosecutors does not determine that no other theory is possible, then who has the right to do anything but set the defendant free? In other words, the evidence provided could be displayed in a way that shows it was Possible that the defendant is innocent due to lack of undeniable evidence; therefore you cannot condemn the accused. This is relevant to the criminal justice system in several ways. For example, the fact that the dissenting jurors have to reevaluate these evidences even though it is clear that, while they do provide some sort of cases for the prosecution, the testimonies of handicapped people hardly is damning evidence. In a legitimate criminal trial, the defense would be able to employ a reasonable doubt tactic. The Defense attorney could easily prove by cross-examining the two witnesses’ stories and raise reasonable doubt as to the guilt or innocence, this derives from the fact that the old man’s testimony is hearsay evidence. While this may present a fairly weak case, this tactic would prove that the evidence and testimonies would not be absolutely conclusive to the accused youth’s apparent guilt.

Sunday, November 3, 2019

International Business Essay Example | Topics and Well Written Essays - 3000 words - 4

International Business - Essay Example Multinationals are powerful companies employing many people and earning a lot of money. Often their location is welcomed by governments around the world because of the benefits of employment and wealth they bring to a country. Multinationals are a source for progress. I agree with the statement because of the fact that it gives way to globalization, international relations and sustainable development. The first multinational corporation in the world was the Dutch East India Company and the first modern multinational company is believed to be East India Company. It was a mega corporation holding immense power and control in the sub-continent by coining money, forming colonies and negotiating treaties. Multinationals have power and control, they can use their huge revenues and control over distribution channels and brand loyalty of consumers to push countries to open their markets and lessen their support for local companies. If we talk about China alone, great amount of foreign invest ment has entered their economy with foreign-funded firms increasing from a number of 470,000 to over 500,000 in just a span of two years, from 2004 to 2006. Multinationals form a major part of this increasing number, employing about 24 million people and representing around hundred of China’s 200 large exporters and monopolize main market segments like soft drinks. With the emergence of multinationals, the world is advancing leaps and bounds due to increasing globalization. Technology and communications have advanced to such a level that it has revolutionized the selling of products all over the world. Multinationals get in touch with new communities in the global market by building production factories in other countries, besides, their home country. Coca-Cola, a huge soft drink manufacturer now sells and manufacturers soft drinks in over 200 countries across the world. Similarly, Microsoft, a computer software company, earns its 27% of annual sales revenue outside of the Un ited States. In many ways the world is becoming one large market than a series of separate national markets. The same goods and services can be found in many countries throughout the world. Globalization is the term now widely used to describe the increased worldwide competition between businesses (Stimpson, 2006). There are several reasons for this increasing global competition. Free trade agreements and economic unions have reduced protection for industries. Consumers can now purchase goods and services from other countries with no import controls. Improved travel links and communications between all parts of the world have made it easier to compare prices and qualities of goods from many countries. This has further developed as the internet has become more widely available worldwide. Many countries which used to have undeveloped manufacturing industries have been building up these businesses very rapidly. Countries in South East Asia and China itself used to import many of the go ods they needed. Now, that their own manufacturing industries are so strong they can export in large quantities. This creates much more world competition. Globalization has led to more choice and lower price for consumers. It has forced firms to look for ways of increasing efficiency. Inefficient producers have gone out of business. Many firms have merged with foreign businesses to make it easier to sell in foreign markets. This is one of the