Monday, September 30, 2019

The Pueblo Revolt of 1680

Running head: PUEBLO REVOLT The Pueblo Revolt of 1680 Kelley Christy Grand Canyon University HIS 103 May 17, 2009 The Pueblo Revolt of 1680 The English and Spanish strategies at colonization in the late 1600’s were very different, resulting in very different outcomes. The English methods of displacement and extermination of the native populations led to wholesale destruction of the cultures targeted. On the other hand, the Spanish attempted to peacefully associate with the local populations. This lead to the creation of a hybrid culture of Spanish and Indian peoples. The birth of this new culture demonstrated the success the Spaniards had in the waning days of the century (Otermin, 2007). The Spaniards used the idea of converting the native populations to Christianity and forcing their values to match their own (Otermin, 2007). Eighty years after the establishment of the first colony in the Rio Grande Valley by Juan de Onate in 1598, Spanish missionaries had built thirty missions as well as thirty religious stations. The Pueblo tribes and the Spanish colonists coexisted but not without conflict. Thousands of Pueblos were converted to Christianity. The converts adopted the rituals of the Christians, such as the Christian form of marriage and baptism. They also practiced the Christian burial rituals. However, these converts also observed their native religious rituals. This straddling of both religions angered the Franciscan missionaries. This anger drove the Franciscans to destroy religious objects and shrines of the natives, and punish Indian ceremonial leaders (Otermin, 2007). In addition, the Spanish forced the natives to provide slave labor to build churches, as well as work in mines and farms for the encomenderos. These encomenderos were Spanish colonists whose role was to protect the local natives from hostile Indian tribes. Late in the seventeenth century, diseases imported by the Spaniards such as smallpox and measles, began to decimate the Indian population. Natural disasters such as crop failures and major droughts added to the misery of the natives. Attacks by the hostile Navajo and Apache tribes aggravated the strained relationship between the Spanish colonists and the Pueblos (Otermin, 2007). In 1670, a missionary claimed he was bewitched by a Pueblo community. Several Indians were executed and several more were beaten for this offense. From this, the seeds of revolt were planted. Ten years later, Pope, one of the beaten natives rose to lead a massive revolt. Pope’s united forces sought to drive all traces of Spanish influence from their lands. The Pueblo Revolt of 1680 was successful in ridding the Pueblos of the Spaniards for a decade. Pope’s efforts united the Pueblos against an oppressive Spaniard regime and gained their people a few more years of independence. Reference Otermin, D. A. Mexican American Voices: Resistance and accommodation in New Mexico. (2007). Digital History. Retrieved May 14, 2009, from: www. digitalhistory. uh. edu/mexican_voices/voices_display. cfm? id=24

Sunday, September 29, 2019

Cadbury Report Essay

Introduction Initial corporate governance developments in the UK began in the late 1980s and early 1990s in the wake of corporate scandals. Cadbury Report (1992) defines ‘Corporate Governance as An Act of governing by the board of Directors†. Financial reporting irregularities led to the establishment of the ‘Financial Aspects of Corporate Governance Committee’ led by Sir Adrian Cadbury. The resulting Cadbury Report published in 1992 outlined a number of recommendations around the separation of the role of an organisation’s chief executive and chairman, balanced composition of the board, selection processes for non-executive directors, transparency of financial reporting and the need for good internal controls. The Cadbury Report included what is termed as â€Å"The Code of Best Practice† and its recommendations were incorporated into the Listing Rules of the London Stock Exchange. The Code was initially directed to the board of directors of all listed companies registered in the UK, but it is was not limited to only the listed companies as it also encouraged many other companies as possible to aim at meeting their requirements. Bringing greater clarity to the respective responsibilities of directors, shareholders and auditors will also strengthen trust in the corporate system. Companies whose standards of corporate governance are high are the more likely to gain the confidence of investors and support for the development of their businesses. According to Cadbury Report (1992) By Law, all directors are responsible for the stewardship of the company’s assets. Conclusion and Recommendations The Cadbury Report was followed by three more major reports: Greenbury (1995), Hampel (1998) and Turnbull (1999). The Greenbury Report responded to the concerns about the level of executive pay rises, especially in the privatised utilities. The Hampel Report reviewed the progress of companies in responding to the Cadbury and Greenbury Reports and made some suggestions for improvement. The Turnbull Report addressed the important issue of how to implement best practice systems of internal control. The Report had set a deadline of 30 June 1993 for the beginning of reporting compliance with the Code. By this time 54 out of 66 reporting FTSE100 companies had complied  with the reporting requirement. The percentage of companies with combined CEO and Chairman of the board had declined from 25% to 15%. Within a year the percentage of FTSE350 companies with remuneration and audit committees had doubled and the percentage with nomination committees was rising. The result of all this activiti es is that UK corporate governance ranks as the most open and transparent system of any in the leading industrialised countries. The UK is now ranked ahead of the US in terms of the quality of the environment facing investors on the basis of the governance practices of the firms they are most likely to invest in. Compliance with the Code of best Practise was not enforced and it was not mandatory many firms subjected. Many firms conformed because they did not want to fall victim to the destructive consequences resulting from the disregard of corporate governance. References Cadbury, A. (2002). Corporate Governance and Chairmanship: A Personal View. New York, Oxford University Press Cadbury, A. (1990) .The Company Director, London: Director Books. Cadbury, A. (2000).‘The Corporate Governance Agenda’, Corporate Governance, Vol.8 (1), pp.7-15.

Saturday, September 28, 2019

Albert Einstine’s theory of relativity

If my theory of relativity is proven correct, Germany will claim me as a German and France will declare that I am a citizen of the world. Should my theory prove untrue, France will say that I am a German and Germany will declare that I am a Jew. – Albert Einstein – Address at the Sorbonne, Paris, possibly early December in 1929, in New York Times 16th February 1930. In the aforementioned quote pronounced by Albert Einstein it is visible that there is an existing correlation between his words and the current world. It also logically signifies some of the social issues which prevailed in the society during Einstein's days, such as the status he held in the world due to his genius intellect. His quote being discussed was said to have been spoken in the time of the Holocaust (World War II). Albert Einstein of all the physicists' to emerge from nineteenth and twentieth centuries, is one of the very few names known by almost everyone in the world. The German born theoretical physicist is also the originator of the great theory of relativity and many more which will be mentioned later on. Albert Einstein a Jew, born on 14th March 1879 in Ulm, Germany1 was one of the greatest minds in world history. He is known as a brilliant physicist who contributed more to the scientific world than any other person. His theories on relativity paved the way to how science currently views time, space, energy and gravity. Einstein was so advanced in his thinking that his studies and work set the standards for the control of scientific energy and space explorations currently being studied in the astrophysics. Einstein's many contributions to physics include his special theory of relativity, which reconciled mechanics with electromagnetism, and his general theory of relativity which extended the principle of relativity to non uniform motion, creating a new theory of gravitation1. His other contributions include relativistic cosmology, capillary action, classical problems of statistical mechanics and their application to quantum theory, an explanation of Brownian movement of molecules and many more. Works by Einstein include more than fifty scientific papers and also non scientific books. As a result of his service in theoretical physics, and especially for his discovery of the law of the photoelectric effect in 1921 he was awarded the Nobel Prize in Physics. Moreover in 1999 he was named Time magazine's â€Å"person of the century†. The above mentioned quote conveys the idea of how the society views people with stunning success. He clearly highlights the words, â€Å"If my theory of relativity is proven correct, Germany will claim me as a German and France will declare that I am a citizen of the world† (Albert Einstein, 1929). This illustrates how he is accepted throughout the world for his genius intellect; especially with regard to the theory of relativity. In addition these words also demonstrate how people understood the value of his theory. Einstein is known to have worked at many universities including, University of Zurich, Charles University of Prague, University of Berlin, Princeton University (New Jersey)1. It is said that even the geniuses accepted him as on of the greatest minds to ever set foot on this earth. By the time of World War II he was so well known in America that he would be stopped on the side on the street by strangers wanting him to explain â€Å"that theory†. He finally figured out a way to handle the incessant inquiries, by telling them, â€Å"Pardon me, so sorry, I am always mistaken for Professor Einstein.†2 This clearly points out how people in the society valued and accepted Einstein. Among the current issues in the world, social issues can be stated as one that causes the most damage to human life style. These issues can be classified under many sub categories; such as racial, political, religious, tribal, mythical issues, and also not forgetting colour bar. All these issues have one common reason which is, the virtual groups that humans have formed within their mind. As a result there were various consequences such as wars, exploitation, alienation, humiliation. The historical foundation for the quote in question is the mass execution of Jews during World War II. His quote unmistakably points out that if his theory proves untrue, how France will say that he is a German and Germany will declare that he is Jew. This also indicates how he would be discriminated against and he would not be accepted in the society that he was born in if he was an ordinary person as appose to a world renowned scholar. During this time people were physically and psychologically affected by the war. In an era like such Einstein spoke the word above mentioned twice, once in France and the other in the United States, which shows how bad the situation was at that time. Even today great researches, theorists, inventors exist. Some instances they are from developing or third world countries. They might be even from a particular minority from, a so called virtual group, where they suppressed, due to the status they are born in to or given to by the modern society. From the quote under consideration we could see how well such people are recognised by the world; and this quote sounds more or less a message to such people existing in the world to come up and present their ideas to the world so that the human kind would benefit from their ideas. Although this is the surface message there is also a deeper implication which is really important; and in the quote it is signified in a sarcastic tone. That is in reality people have themselves divided into groups and of which they should get rid off right now in order for the world to grow and prosper. In conclusion, even though Albert Einstein is not physically alive in the world today his inventions, theories and his words would live on forever. At a time of such turmoil in the world he discovered a way to enhance and bring more creativity to the world. As he sarcastically mentioned in this quote people need to diminish the sense of status in society and start accepting people by what they can offer to better the world. Unfortunately such actions take a lot of will power and unity in the world, factors that are currently not present in the world, thus, his quote holds importance today as much as it did in the past.

Friday, September 27, 2019

Analysis of Being Steve Jobs Boss Article Assignment - 3

Analysis of Being Steve Jobs Boss Article - Assignment Example Jobs’ methodology actually starts â€Å"with the user and looking at the entire end-to-end system† (Bloomberg, 2). Schulley revealed Jobs’ admiration for Sony, which became the basis for his Mac factory, tailored to Sony’s elegance and design. He identified Dr. Edwin Land, co-founder of the Polaroid Corporation, as one of the Jobs’ heroes. Ross Perot, founder of Electronic Data Systems, and Akio Morita, builder of Sony, were likewise explicitly looked up to by Jobs as his great inspiration and heroes. The interview likewise discussed Sculley's strategy to focus on marketing Jobs’ products in the market. However, his humility made him express that â€Å"Steves brilliance is his ability to see something and then understand it and then figure out how to put it into the context of his design methodology—everything is designed† (Bloomberg, 4). He acknowledged making two mistakes: not having to work with Intel and not going back to Steve. Schulley ruminated that â€Å"Why don't we go back to the guy who created the whole thing and understands it? Why don't we go back and hire Steve to come back and run the company?" (Bloomberg, 5). In hindsight, Schulley was convinced that â€Å"if Steve hadn't come back when he did—if they had waited another six months—Apple would have been history. It would have been gone, absolutely gone† (Bloomberg, 5). One shares the same contention and agrees to Schulley in the discussions proffered in the article.

Thursday, September 26, 2019

Has the recent recession around the world hit the international Essay

Has the recent recession around the world hit the international business and trade badly Especially the automotive industry - Essay Example a deal assuring to provide a colossal package to combat the impact of global recession on the automobile industry (EUbusiness Ltd 2010), it still remains to be complex phenomena as to why the recession took such a heavy toll on trade and commerce worldwide. Critically speaking, a set of entropy predicted the probable outcome of a sweeping downward surge in various cross-country economies, eventually leading to discrepancy in the ratio of production and consumption. These factors lay hidden both in the functional as well as the structural aspects of the car industry. The editor of the Dog Lemon Guide Clive Matthew-Wilson notes that the international automobile sector can produce approximately 90 million new units every year, which is well over the estimated 60 million buyers. Drawing on from this statistics, he concludes that in the aftermaths of global recession, the potential consumer market was mobilized independently by respective states – a deal which is not very likely to last forever. Hence, it is notable that the affordability factor in terms of owning personal automobiles will continue to weaken furthermore as the world starts adjusting to the ongoing slump (Dog and Lemon Guide 2010). In the light of this evidence, this paper is going to critically assess the impact of recession on international trade and commerce, particularly the automotive arena. The study will incorporate discussion of the relevant literature duly backed up by empirical evidences, followed by detailed analysis of the methodologies. Lastly, a questionnaire attached at the end of the document will reflect the research findings and provide assistance to conducting interviews for further elaboration of the methodologies. Before elaborating furthermore on the thesis question, it is worth investigating into the period that led up to the recent financial crises around the globe. It may be noted, however, that bulk of the study in this regard will focus on the US trade infrastructures and

Competition and competitiveness derive from different theoretical Essay

Competition and competitiveness derive from different theoretical frameworks and UK policy has failed to distinguish adequately between the two. Explain and discuss - Essay Example The competitiveness policy encourages on benchmarking whereby an entrepreneur visits another competitive entrepreneur and finds out on what he/she does in order to attain his/her success (Bristow 2010). In competition, every business is always straining to win the other by getting most of the customers on its side and not by merging and obtaining monopoly to exploit on the market. This is because if an entrepreneur exhibits monopoly power, he or she may exploit the market when there is no government interference. Marxian views competition as the act of competing for land, capital and workers alongside competing with other business and firms for profit making (Tan 2014). This means that a business unit must compete for the workers and it should provide reasonable pay for workers. Through this, they can be able to attract workers from other business units and this makes them have adequate labor. They should give their workers allowances and other benefits to encourage and motivate them. The business unit should not overwork the workers but instead they should give them a reasonable pay. Secondly, the business unit should also effectively compete for land as a factor of production. This simply means that the business unit should have enough money to buy adequate land since often businesses have to expand their premises. For a business to be successful then it should have adequate land to carry out its business activities and land is a competitive factor; hence they should strain to get the best available land according to the land use. Marketing business units should also strain to get land near their market while mineral based business units should strain to get land within their mineral extraction place and the market. Capital is the money needed to start and run a business. The business units should find the best financial institution where they can get access to loans and other financial support to run their businesses. Finally,

Wednesday, September 25, 2019

Car aerodynamics Essay Example | Topics and Well Written Essays - 1000 words

Car aerodynamics - Essay Example An aerodynamic automobile is designed to streamline the wind, it does not have piercing edges that cross the wind stream above the windshield and have a type of tail, which is called a liftback or Kammback or fastback. Different automotive companies like the Volkswagen, Loremo and Aptera, try to reduce the tail area of their small vehicles like the 1-liter models. They are designed to have a smooth and flat floor for the Venturi effect to be supported and generate the desired downwards-aerodynamic energy. The wind entering the engine cove is used for combustion, passengers and cooling, and then it is re-injected by an outlet under the floor. Air is slowed and pressurized in a diffuser for rear and mid engines, it loses a little pressure while it is passed through the engine cove and is filled in the slipstream. A seal between the high pressure around the gearbox and low pressure area around the wheels is required by these cars. The suspension in these cars is either retracted or stre amlined and the engine cove floor is closed. Streamlined shape is given to the roof rails, antenna and door handle. A round fairing as a nose is given to side mirrors. Though racing cars need airflow through the wheel base for break cooling and a lot of air is emitted from the radiator into the wheel bay, it is said to cause increase in drag. â€Å"Most aerodynamic design work is actually done initially on a computer, then the design is checked and modified by placing a vehicle with that design in a wind tunnel† (Erjavec 158). Wind tunnel and computer modeling are used to analyze and study automotive aerodynamics. The tunnel is sometimes furnished with a rolling road to achieve most accurate results from a wind tunnel test. The rolling road is a movable floor like the floor of at treadmill and moves at a particular speed as the air flows in. This affects the results by preventing the formation of a boundary

Tuesday, September 24, 2019

Sociology - Symbolic interaction and gay marriage Essay

Sociology - Symbolic interaction and gay marriage - Essay Example What is most significant is the fact that the society has to approve the same and not hold the gay men accountable for what they indulge within. There is a good amount of information available at hand which suggests the proper incorporation of the gay marriages within the society’s aegis. The other side of the issue suggests that the society does not quite accept such gay relationships. They believe that it is very strange to enter into such relationships because it would bring problems for the people who are spread in different areas of the world. The straight individuals feel that the gay relationships effectively mar their own linkages that they have with the people around them, and make the same look awry and skewed (Bell, 2009). This perspective has been reached upon with the passage of time as gay relationships have come on excessively in this day and age, and within different areas of the world more than anything else. The gay marriage is such an important part of the s ociety in the current times that one cannot look beyond the same. There have been immense comprehensions that have been reached upon which suggest the notion of people being against the same as well as the ones who believe it is the right of the individuals to pick and choose their own orientation.

Monday, September 23, 2019

Integration of Financial Markets over past 25 years Essay

Integration of Financial Markets over past 25 years - Essay Example The world has become a smaller place and globalization has contributed towards the growth of international credit as a result of an international integration of the goods and services market and the growing presence of multinational companies. The GNP has seen more than twice growth in the share of imports and exports for most nations which in turn brought about a large increase in international lending and borrowings for the purpose of addressing the needs of current account transactions (Bekeart, Harvey, and Lumsdaine, 2002). Open financial markets have been regarded as an opportunity for expansion of investor’s portfolio diversification scope and therefore has a higher potential for greater risk-adjusted return. For the country, smooth consumption is allowed and saves them from potential shocks. Financial flows also result in the flow of capital with potential welfare gains and growth and international risk sharing. The costs of financial integration might also be as drastic as its benefits. Countries run the risk of reversal of capital flows and the risk of increased volatility through a largely open capital market. The recent financial crisis has been an example of the drawbacks of financial integration worldwide where the financial meltdown in one country has impacted the complete global economy. Although there was some misalignment of fundamentals, the financial crisis has brought focus to the instability inherent within the financial markets as a result of the financial integration process. This calls for a stronger regulatory supervision and more stubborn financial systems (Agà ©nor, 2001). The paper is organized beginning with a discussion on the operational significance of international financial markets and moves on to evaluate determinants of foreign exchange markets for the long run and the short run. The paper also analyses the international stock exchange and its role and reflection on the financial integration.

Sunday, September 22, 2019

Definition of Idioms and Collocations Essay Example for Free

Definition of Idioms and Collocations Essay A phrase which has a meaning that is commonly understood by speakers of the language, but whose meaning is often different from the normal meaning of the words is called an idiom. Of the various definitons of ‘idiom’, therr criteria, both semantic and syntactic, emerge as predominant. The first is semantic opacity, or what has come to be known as ‘noncompositionality’, the fact that the meaning of an idiom cannot be deduced from a sum of the meanings of its parts: in this sense, the meaning of an idiom is not ‘motivated’(bussmann 1996: 316). Thus, the meaning od ‘die’ cannot be produced from the sum of ‘kick’ + ‘the’+ ‘bucket’ , or ‘be patient, slow down’ from ‘hold’+ ‘your’+ ‘horses’. No constiluent os an idiom carries independent meaning. The secon criterion relates to the apparent morphological and transformational deficincies od idioms, in not permitting the syntatic variability displayed in other, freer sequences of words; operations such passive ( * the bucket was kicket by Sam), international modification ( * Hold your restless horses), and topicalization ( *The bucket Sam kicked) cannot occour with the idiomatic meaning being retained. The third criterion is the lack of substitutability in idioms, their ‘ lexical integrity’ (Fernando and Flavell 1981:38); synonymous lexical items cannot be substituted in an idiom, as in have a crush on , but not *have a smash on (Bussmann 1996: 216), nor can elements be reversed or deleted. Idioms are, therefore, syntagmatically and paradigmatically fixed (Nuccorini 1990: 418). In addition to these criteria, it has beed observed that idioms belong to an informal register, are figurative or metaphorical in meaning, have homonymous literal counterparts, are often â€Å"instutionalized† (Fernando and Flavell 1981: 17) or proverbial in nature (describling situations of common social interest), and have an affective quality (implying a certain affective stance) ( Nunberg, Sag, and Wasow 1994: 492-93). They are frequentlu nontranstable (Fernando and Flavell 1981 : 81) The term ‘collocation ‘ seems to date back toFirth, who discusses the collocation of ass with silly, obstinate, stupid, and awful (1957: 190-215); in defining the term , Crystal( 1997: 69-70) refers to the habitual cooccurrence of auspicious with occasion, event, sign, an so on, while Carter ( 1987: 57) contrasts the collocation {have, get} pins and needles, which is always plural and nonrever ible, with the free combination pin and needle. Like idioms, collocations are groups of lexical items which repeatedly or typically cooccur, but unlike idioms, their meanings can usually be deduced form the meaning of their parts ( but cf. Bussmann 1996: 81). Collocations are predictable to a greater or lesser degree, with some words having a very narrow collocational range ( e.g., spick, which may occur olny in spick and span) and others having a very wide collocational range ( e.g. , clean, which can occur in a wide variety of strrucures and phrases). Carter notes that the (near) synonymus putrid/rancid/addled/rotten have restrictions on the range of their collocability ( putrid fish and rancid butter, though not the reverse), but he also obseres that ranges are not entirely fixed but can be extended ( rotten fruit,though also perhaps rotten fish/eggs).

Saturday, September 21, 2019

Development of the Childs Brain

Development of the Childs Brain Early Childhood Development (ECD): A step towards a better future Shamsa Amin Hussaini Gifted with countless skills and abilities, every child enters this world with a fresh, fertile, sponge-like brain, ready to be exploited. The critical years of every child begins from the conception through birth to the 8 years of age and according to developmental psychology, this is the time of significant physical, cognitive, social and emotional development for every person. Incidents and experience in these first few years of life, and even before birth leave their impressions throughout children’s life, signifying the influence of external environment on a child’s development. Dr. Hiam Ginnot says, â€Å"Children are like wet cement. Whatever falls on them makes an impression.† Therefore, these early years are said to be the best time for children to learn and should be maximized to lay a foundation of a brighter future. The explosion of research in this area of Early Childhood Development (ECD) has gained public attention and has become a topic for discus sion. Department of Elementary and Secondary Education, Missouri (2012), states that researches over the years indicate that significant short-term and long-term benefits are gained by children who participated in early education programs. Additionally, three meta-analyses of over 120 research studies indicate that around eighty percent children with ECD programs scored better on school entry as compared to those who did not experience such programs. Moreover, Tribune (2013) reveals that globally the enrolment in primary school has increased,from fifty-three percent in 1990 to eighty-one percent in 2011.This signifies the benefit of ECD children are receiving. However, there are a lot of people who are unaware of this knowledge or do not make ECD initiatives a part of their lives and eventually remain deprived of its benefits. According to UNICEF (2013), each year, 7.6 million children under the age of five die worldwide and more than two-hundred million children do not reach their full potentials. This in turn makes their countries lose approximately twenty percent of the adult productivity. Besides, in Pakistan there exist a lack of significant data and statistics about ECD implementation, however, it was reported that about 86 children every 1000 live births were reported to die in 2012 (Tribune, 2014) and no one knows how many of the living children may not have achieved their developmental milestones. Researchers have proved that a positive Early Childhood Development can open a world of possibilities and opportunities for a child but many children in Pakistan are never exposed to it. Similar to Pakistan, there are several other developing countries where children less than eight years are suffers multiple things which negatively influences their development. There could be several reasons due to which many children are unable to maximize their potentials in developing countries like Pakistan. These may include poverty, gender biasness, economic status, e thnicity, disability and poor health. All these factors prevent these innocent beings from receiving adequate nutrition, care and opportunities to learn as their environment is non-stimulating for a positive growth. Such circumstances make the poor families focus on keeping their children fed and neglecting the other cognitive, health, emotional and social needs of their children. Concurrently, researches prove that children without exposure to ECD programs lack in their social, emotional and cognitive skills. Therefore, the significance of this issue in countries like Pakistan cannot be denied. . If these children are provided with appropriate Early Childhood Development, may become a source of the country’s development in future and bring prosperity. This article aims to provide a basic understanding about Early Childhood Development, its statistics, the importance of investing in it and the ways to promote it within the society. Understanding of Early Childhood Development varies from people to people and is affected by several factors including local and family traditions, culture, national policies, schooling systems, awareness etc. However, increasing discussions about early childhood activities and development had familiarized people with the concept to some extent. ECD is not just confined to schooling and education, but, it is concerned with holistic well-being of a child. While it stresses on providing a joyful learning environment at schools, it also caters child’s health, nutrition and hygiene. ECD also entails cognitive, social, physical and emotional development. Therefore, Early Childhood Development may not just be conducted at school environment or a formal setting, it may occur at an informal setting as well, provided by anyone from governmental organizations (NGOs), governmental organizations to communities and parents. Literature reveals that the major concept behind the ECD programs is that every child is unique with different growth and developmental needs to be addressed. Moreover, ECD programs does not just develop children, it also compensates for any kind of negative influences or experiences in any aspect of life like social, emotional, nutritive, cognitive et cetera. In addition, ECD also supports Child Rights Convention, according to which every child has a right to be provided with opportunities to develop his personality and his mental and physical abilities. Scientific researchers have proved that about ninety percent of the brain develops by the age of five years and during early childhood, genetics, environment and experiences together work to build integrated circuits in the brain. Additionally, a stimulating environment, adequate nutrients and social interaction are said to be the major requirement for optimal brain development. ECD programs focus on these factors and emphasizes on providing stimulating environments to children ad meet all their needs for the betterment of their future lives. However, children’s development is often ignored in our society where they are seen as smaller versions of adults due to which advances in physical, psychological and social development remains unimportant. The normal development of children is categorized into three aspects; physical, psychological and emotional. Physically, the rate of development increases as children passes infancy. With increasing age children develop different gross and fine motor skills. As discussed earlier, both genetic and environmental factors affect the child’s normal development. Growth of a child depends on certain hormones in the body. The particular hormone responsible for physical development of a child is sensitive to environmental stressors. Environment with less stress and more care, love and stimulation favors the growth of children. Thus, environmental factors play a significant role in children’s physical development. Apart from physical, normal psychological development of children includes cognitive and emotional development. Psychologist, Jean Piaget adequately explains the cognitive development during childhood. According to him children play an active role in gaining, constructing and understanding the knowledge of the world. He developed four stages of children’s cognitive development. According to which, early cognitive development involves processes based upon actions whereas in later stages there are changes in mental operations of children. As they grow, their thinking becomes logical, abstract and their learning abilities improve. Moreover, children begin to use deductive reasoning and abstract ideas as their age increases. Also, children experience enhanced concentration, judgment and attention span with age. In addition to cognition, children also exhibit emotional development like increase in self-awareness and feeling empathy and pain. Further, children begin to appreciate the feelings and perceptions of others, contributing to their moral development. Hence, psychological development enhances children’s moral reasoning and abilities. Furthermore, children’s social development occurs as they grow and come in contact with the people around them. This aspect of their development includes relationship of child with their parents, siblings and friends. Literature underlines that early relationships with caregivers play a major role in children’s development and continue to influence social relationships throughout life. According to psychologist Albert Bandura, children learn new behaviors from people each time when they interact with their social environment. By observing the actions of others, they tend to develop new skills and acquire new information which they practice later. Also, with increasing age, children become more socially active and participate in different activities where they have hands-on experiences, helping in developing higher brain functioning. Also, children love to play different games and as they grow, they move from solitary state to playing in groups and respecting others†™ opinions. ECD is an initiative which aids the normal development of children and fulfils their developmental milestones that are related to their physical, social and emotional aspect. It also guarantees outstanding returns not just for the individual alone but for the society and the country too. Therefore, the developing countries are seen to support the idea as it provides them, a hope of overcoming the darkness of poverty and other problems. Also, literature says that learning experiences in early years of life has lasting impacts on the holistic well-being of an individual and the development missed at this stage can hardly be replaced in later life. And if replaced, it is expensive and challenging, therefore, Early Childhood Development should be focused as a preventive and secure measure for each child. Arguments exist that children have always grown up to be intelligent and reliable young adults without the benefits of an intentionally planned proper early childhood development programs. But in today’s vast and challenging world there is a need to provide children with environment of learning opportunities so that our future generation could grow up into successful people and in turn benefit our country. For the same, several initiatives have been taken at community, national and international levels. UNESCO and UNICEF are two of the several international organizations which work to close the knowledge gap and promote ECD initiatives throughout the world to improve children’s life. Furthermore, it has been observed that in developing countries, effective ECD facilities and services are available mostly to the high profile and rich areas leaving the poor deprived and dwelling in the cycle of poverty. However, there are still several governmental and NGOs working throug hout Pakistan, in urban and rural areas, to benefit the population with ECD initiatives in all aspects. Some of them are; Ali Institute of Education, Aga Khan Development Network, Children’s Global Network for Pakistan, HOPE, and PAHVNA, Health and Nutrition Development Society. Even though organizations are working to promote ECD programs in Pakistan yet, a lot needs to be done. We need to ensure that the possibilities of the world remain open to every child and this could be achieved by providing a safe stimulating environment in early childhood. Today’s children are the future of every nation; they will become tomorrow’s citizens, workers, and parents. So, society, parents and government should invest wisely in ECD initiatives as they play a vital role in preparing the younger generations for a lifetime of productivity and prosperity. Several strategies could be adapted to progress towards the goal of providing healthier learning experiences both at home and in community too. Primarily, parents need to be aware of the concept of ECD and its importance as they control their children’s life. They should be empowered to nurture their child’s development and in absence of professional ECD programs and services, parents could independently be a source of a positive early childhood development for their child by paying attention to young children’s emotional, social, cognitive and health needs. Community, governmental and NGOs could do this through informative programs, advertisements, discussions and parents’ education initiatives. Moreover, society at large needs to be educated about importance and benefits of investing in ECD programs as well. For the purpose of spreading awareness and knowledge, not just amongst parents but also for the society as a whole, media could be beneficial as it reaches out to large number of people at diverse places, belonging to different cultures, in shorter time. Besides, adopting interventions respecting the economic, social and cultural aspects of the community would make it easier for the community people to accept and practice them, ultimately promoting Early Childhood Development. For example, healthcare professionals could support parents to integrate their child-rearing practices with the recent, scientific recommended approaches to bring up their child more efficiently. Additionally, teachers should be empowered and informed about ways to blend the concept of ECD with their teaching learning practices. This could be done through training programs, supervisions, and monitoring children’s development with time. Moreover, community people could be empowered to establish low-cost community based centers in order to enhance the development of the children in the particular community. Apart from community, NGOs and government together could play a vital role in promoting ECD throughout the society. They could join hands and work in partnership to pro vide holistic ECD services to the country. Furthermore, at governmental level, policy initiatives like promoting rich learning environment for young children can provide a basis for their future productivity and success in the society. As highlighted above, low socioeconomic status is one of the factors leading to ineffective childhood development of several children in Pakistan. Therefore, there exists a need to adopt simple, cost-effective measures which could be implemented at home or anywhere to promote a healthier ECD and minimize the negative effects of the economic status. In community, ECD can be best promoted by mother, family especially grandmothers and cousins. Mothers could engage their children in different activities at home like playing with objects, singing poem, showing colorful pictures, making origami or involving children in fruits or vegetable identification. These activities can help in promoting children’s cognitive development. Also, children love to play with their grandparents, who can tell stories to the kids and play with them at free time. The more children listen to people, they improve their own language and vocabulary, so, communication and storytelling can help parents develo p language skills of their children. Moreover, parents could be trained regarding different activities they could plan for their child at home. Besides, physical development of children could be achieved though several ways including provision of proper nutrition. All in all, children’s growth and development should be a primary focus of community as well as government as these young people are the ones who will form the workforce of the country in the near future. To bring about prosperity and success, every individual needs to get active. One should start with his own home; one simple act can create a big effect. It is hoped that a better understanding about the rapidly growing concept of Early Childhood Development can ignite a thought to work for ECD of children at every level possible. Today, when the world is speedily moving ahead, there is a compelling need for the adults to choose and act wisely to create better, competitive and capable individuals within the available, limited resources in Pakistan. Therefore, make a wise decision, support and invest in Early Childhood Development programs to nurture optimal growth and development of the children in our country. References http://www.unicef.org/publications/files/Inequities_in_Early_Childhood_Development_LoRes_PDF_EN_02082012.pdf Download – national scientific council RCC http://www.successdegrees.com/inspirationalquotesaboutearlychildhoodeducationandteaching.html http://www.unicef.org/earlychildhood/index_40748.html http://nowforlater.org/files/2013/03/The-Facts.pdf http://data.worldbank.org/country/pakistan http://tribune.com.pk/story/665437/at-8-6-pakistan-is-among-countries-with-highest-infant-mortality-unicef-report/ http://books.google.com.pk/books?hl=enlr=id=sTuWAgAAQBAJoi=fndpg=PA339dq=physical+development+of+childots=rVCJYirUYrsig=uz_4SqhKfY2mRUI6sVu1E3pHxfo#v=onepageq=physical%20development%20of%20childf=false http://bernard.pitzer.edu/~dmoore/psych199s03articles/bjorklund.pdf

Friday, September 20, 2019

Cybersecurity: Advantages and Disadvantages

Cybersecurity: Advantages and Disadvantages Cybersecurity: Friend or Foe? From 2005 to 2020, the digital universe will grow by a factor of 300, from 130 exabytes to 40,000 exabytes, or 40 trillion gigabytes.[1]The Internet is growing at an outrageous rate, and with it so must security. Cyber Security is â€Å"measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack†(Webster). This word was first used around the year 1994. While the internet and cyber security are symbiotic, what happens if one grows faster than another? Will that set fire to the internet and topple it, or make it stronger? In recent years, cybersecurity has become a hot topic in many countries. In the U.S., cyber security is now a major issue and one that many people do not comprehend. Actually cyber security helps our everyday lives and keeps us safe from cyber attacks. These cyber attacks could steal important information like credit card numbers or addresses even age and any other information stored on a site with no cyber security measures. The US government and the private sector are utilizing numerous strategies to keep up with the rapid pace of increasingly sophisticated cyber security threats. However, U.S. citizens are beginning to question if the government’s and private sector’s attempts to effectively combat cyber security is now undermining civil liberties and exceeding limits of government secrecy. In the past, present and future, cyber security has been both an ally and enemy of the U.S. government and U.S. citizens. First we begin by rewinding to the past to see how Cyber Security has changed the Internet. The Internet originated in 1962, hatched from the brain of Paul Baran of RAND, who developed the idea of distributed, packet-switching networks. This was the first idea of its kind and would revolutionise the world in years to come. With the help of Paul Baran and DARPA an agency of the United States Department of Defense; In 1969 the Advanced Research Projects Agency Network aka (ARPANET) goes online and is the worlds first fully operational distributing, packet switching-network. Shortly after the rise of ARPANET, Bob Kahn and Vint Cerf both noticed the usefulness of the internet and began to draw out and develop the basic ideas of the Internet. Finally In 1974, the company BBN launched the first public packet-switched network called Telenet (X. Cringely). The civilian Internet was born in the mid-1990’s as an off shoot of ARPANet’s military network. The Internet is bringing a revolution across with it bringing global supply of endless vital information that brings new reformed conventions and destroys old world definitions. Much time goes by and we finally see the full rise of the World Wide Web. In 1992 the number of hosts, which means computers or servers supplying information, breaks 1,000,000. By its third year the World Wide Web has a growth rate of 341,634% in service traffic. And the Internet was baptized in 1996 by holding the â€Å"first World Exposition† ever shown on the Web. It has now become so embedded in our everyday lives that it has radically altered the way individuals and societies interact (Kaufman). From this point on we see the birth of a new force that will bloom into a beautiful flower in later generations, yet the question remains whether this flower be a sweet smelling rose or poisonous Lilie. With the advent of the Internet came the need to protect information from being taken; this came in the form of Cyber Security. In the beginning Cyber Security did not matter a great deal because there was no real confidential data being handled on the web. It was still a relatively new concept. Thus there was not much security other than the CIA or NSA would occasionally use the web to track down criminals individually by surveillance (McCracken). When the Internet began to intertwine with our daily lives, cyber security problems began to occur. Large amounts of confidential information began to be stored on the Internet, and hackers began to penetrate through simple defenses to steal this critical information. In response, the NSA and CIA implemented multiple layers of Cyber Security to their servers. Following numerous cyber attacks, private sector companies also began to tackle this issue by hiring Information Technology experts capable of protecting their information from hacker s. As companies everywhere were in need of Cyber Security to keep others’ vital information safe, they began their search for people with the skill set they needed. This new type of job pays a lot because of the high demand for this technical knowledge (Lawrence). At this point cyber security basically is only showing its friendly face. The industry was adequately protecting critical information without encroaching on peoples privacy. Lastly, the need to protect information became a global issue with countries committing warfare via digital frontiers and borders rather than physical ones. Cyber Security began to create divisions among countries such as China, Russia, U.S as these three countries became leaders in hacking, stealing information and digital espionage. A great example of this is in 2001 of the FB â€Å"hack which raised concern all over the world of for security reasons. This hack happened when the FBI went on a sting operation to retrieve small part of information without being noticed from two Russian intelligence based computers. However layers are afraid that this act may bounce back to them as they have committed a cross-border hack many people believe that they have done this with poor judgement (Lemos). They obtained this information from these servers without the assistance of Russia. This could mean that the U.S. can widen its borders on where it can search and capture criminals. However thi s also bring the law up of Whatever we do to them, they can do to us, said Yarbrough, a former Department of Justice cyber crime prosecutor†(Lemos). Clearly this inter-country cybersecurity warfare marked the beginning of the negative results of cyber security and paved the way for increasingly complex issues in the present. Now we currently face a critical situation in which Cyber Security is becoming more of a foe than an ally. It has gotten out of control and is now forcing citizens to question whether the government and private sector are respecting their very civil liberties. With the advent of the cloud both the government and private sector store huge amounts of information outside of their physical offices, making it even more risky for cyber attacks. The enemies are able to attack just as easily from within the organization as from without. A well known example of internal hacking was Wikileaks, in which a U.S. soldier J. Kirk Wiebe downloaded confidential embassy communications from around the world and shared them with the press. Another U.S. government leak was perpetrated by Edward Snowden a famous whistleblower from within the NSA. He downloaded thousands of classified files, attacking from within the NSA , to show the world what he considered to be an overreaching of the U.S. government in citizens and other countries privacy (Riley). While the government and the private sector may be winning the battle of effectively keeping citizens and their data safe, they are sacrificing civil liberties and privacy that has been the hallmark of our country since its founding over two hundred years ago. Now Cyber Security threats are not only pertinent to government based servers but as to the private sector as well. Companies such as Target and Sony have been widely affected by these attacks. Target recently lost large amounts of market share due to the cyber security attack they suffered in which numerous amounts of confidential customer information was stolen. People are shying away from Target due to the general fear of having their information stolen. Sony has been attacked numerous times but has now learned from the past and is creating new security and encryption platforms to ensure customers it is safe. Every time a company is attacked, a beneficial outcome rises from the overall flaws that are exposed, allowing organizations to improve their Cyber Security. An example of this is a recent bug called Heartbleed. HeartBleed is a bug that breaks through OpenSSL to find passwords and other confidential information. It attacked what were previously considered impenetrable platfor ms including Yahoo, Instagram, and even Google. Weeks later all breaches were sealed and lessons were learned. Currently, the competition from both the government and private sector for the same scarce Cybersecurity professionals is resulting in a war for resources and talent, making it even more difficult for the friendlier side of cyber security to prevail. Now the government targets these cyberwarriors when they are still students and lures them in before they can go to a private company. How? They begin to pay scholarships, tuition, books, and a salary. â€Å"Unlike many government programs, Cyber Corps has seen its budget triple to $45 million a year in the past three fiscal years,† says Victor Piotrowski, lead program director for Cyber Corps at the National Science Foundation† . â€Å"Almost four in 10 IT security positions went unfilled in 2013, according to a survey of more than 500 organizations by the Ponemon Institute, which studies privacy, data protection, and information-security policy† (Lawrence). Frequently, government employees are lured away by substant ially higher salaries in the private sector. An increasingly important challenge for the government in retaining skilled cyber warriors is that many employees choose to leave government employment because because they say they do not want to spy on U.S citizens behind their backs (Lawrence). With these many challenges, cyber security currently appears to represent more of a foe than an ally. [1] New challenges will surface in the future in cyber security. Just as less than 70 years ago, the world had no idea that internet was about to revolution the way we look at the world and interact, it is difficult to speculate on the direction of cyber security. However it is possible to hypothesize on the near future and what is to come. Cyber security has already begun to be a problem for mobile telephony, and it is likely to increase exponentially. Mobile phones are an enticing target as they display important information such as location, credit card accounts, secret work files and photos. More and more hackers are begging to target this growing platform. Between April and December 2012, the types of threats detected on the Google Android platform increased by more than 30 times from 11,000 to 350,000, and are expected to reach one million in 2003. (Center for European Policy Studies, CEPS)*insert end connecting some what to thesis and future*[2] What began as small cyber battles between countries has now given rise to a full scale â€Å"Digital World War†. Now a days we see countries aggressively hack each other. The U.S. is deeply worried about China, as it has attacked its intelligence agencies multiple times. The U.S. government has prohibited â€Å"Chinese hardware in US institutions such as NASA, the Department of Justice and the Department of Commerce, unless a thorough assessment of â€Å"cyber-espionage or sabotage† (CEPS) risk by specialised federal officials has been carried out.† Furthermore, the U.S. government recently accused 5 high ranking chinese officials of cyber espionage. This unprecedented accusation has led to increased tension between the two governments with both accusing each other of espionage. Is this the end of the internet and where will we go from here? The Internet just keeps expanding and expanding and so does cyber security and its accompanying abuse of privacy and civil liberties. The NSA could eventually cause the downfall of the internet because they have fatally altered the perfect balance of self-expression, internet cyber security, and governance. In a recent speech that Snowden gave with techies, he stated that â€Å" the NSA is setting fire to the internet, and that you are the firemen† (McCracken). An additional issue that is just as important to the future of the internet and cyber security is the recent FCC decision regarding â€Å"fastlane†, which allows internet service providers to charge a premium for faster service for websites. A likely scenario is that large corporations with large budgets will have greater access to sharing files than small corporations or nonprofits. Some experts fear that this intrusion on free and equal access to s haring information over the internet sets a dangerous precedent that could allow organizations a great power in manipulating what information is available to world wide web users. This U.S. government policy could be the greatest enemy to the civilian internet and civil liberties than any cyber security initiative. While the internet and cyber security have existed for a relatively short period of time in human history, it has radically changed the way governments, corporations and individuals interact. In its inception, cyber security played a friendly role in protecting the limited information available on the world wide web. Currently, a darker side of cyber security, developed in the name of protecting U.S. citizens, has radically changed the U.S. government’s approach to cyber protection. U.S. citizens and other governments have been shocked to learn that their phone calls and their data is all open to scrutiny by the U.S. government. People and organizations, such as Snowden and Wikileaks, have begun to fight back to reestablish the balance of civil liberties and cyber security. The future of this critical issue is yet to be written, but it is clear that cyber security hackers will become increasingly sophisticated, requiring additional intervention to ensure citizen safety. Indust rialization of new viruses and digital weapons could truly change the balance of power between countries and threaten our way of life as we know. In the past, mercantilism allowed countries with the most land to maintain the greatest power, yet now this reality has taken a paradigm shift. The country with the most readily available digital warriors and resources will triumph in this new world order. Cyber security was developed to help protect law abiding citizens, but the balance has begun to dangerously tip. Many Americans believe that the civil rights, upon which our country was founded, are now severely threatened in the name of digital protection. Cyber security issues will most likely bring about a retrenching of how we share information. The global openness of the world wide web as we now know it will likely become a thing of the past as organizations react to the cyber security enemy and build dedicated communications platforms that deny access to the world. What the world h ad built as an open platform is now destroying itself from the inside out. Citations: Kaufman, Micha. The Internet Revolution is the New Industrial Revolution. Forbes. Forbes Magazine, 5 Oct. 2012. Web. 30 Apr. 2014. Klimas , Liz . Connecting the Dots: A Timeline of the NSA. The Blaze 3 June 2013, Technology ed.: n. pag. Print. Lawrence , Dune . The U.S Government Wants 6,000 New Cyberwarriors by 2016.Bloomberg Businessweek Technology 15 Apr. 2014, Technology ed.: n. pag. Print. McCracken, Harry . SXSW: Edward Snowden Has No Regrets About NSA Leaks. TIME 10 Mar. 2014: n. pag. Print. Riley , Michael. Snowdens Access to NSAs Deepest Secrets Disputed. Bloomberg Businessweek Technology 18 July 2013, Politics Policy ed.: n. pag. Print. X. Cringely , Robert . A History of the Computer. PBS. PBS, 1 Jan. 1996. Web. 30 Apr. 2014. [1] http://idcdocserv.com/1414 [1]better closing present and tying it to the thesis and main idea of paraagraph [2]j

Thursday, September 19, 2019

Arthur Millers Death Of a Salesman Exposes Morals and Values of American Culture :: Death Salesman essays

Arthur Miller's Death Of a Salesman Exposes Morals and Values of American Culture Arthur Miller's play, "Death Of a Salesman" is a very  Ã‚   elaborate play that tells the story of a man's dream to achieve greatness from nothing. It almost seems to make fun of American society's competitive nature, "Imagine? When the mail comes he'll be ahead of Bernard again!" Willy(1215)  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  The title "Death Of a Salesman" leaves nothing to the imagination of how this play ends. Indeed this is a story about the noble, cowardly death of Willy Loman, a traveling salesman. Arthur Miller used the efficient idea of using flashbacks to allow the play to take place within a few days instead of years. Willy Loman as the central character, lives with his wife, Linda and has two sons, Biff (elder) and Happy. Willy Loman who is quite literally a "low man" has so many personality traits accurate to real life, this is no surprise since Miller based Willy's character on his uncle, Manny Newman. Miller said, "That homely, ridiculous little man had after all never ceased to struggle for a certain victory, the only kind open to him in society - selling to achieve his lost self as a man with his name and his son's name on a business of his own"  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Willy was defiantly in a struggle however, he was certainly not in a struggle to convince himself he was doing better than he really was, "I can park my car in any street in New England, and the cops protect it like their own." Willy (1165).   Willy Loman did not want to die, he went to Ben to seek approval of what he thought would please the family"...Ben, I want you to go through the ins and outs of this thing with me. I've got nobody to talk to, Ben, and the woman has suffered, you hear me?" Willy (1210) He also proved this with his many "near incidents" and the rubber pipe. According to "Suicide:The facts and myths" by Judi Marks, "Attempted suicides are a sorrowful form of communication, but they're also trial runs for the final event."  Ã‚  Ã‚  Ã‚  Ã‚   Anyone who commits suicide actually does not want to die and reality, just wants a solution to end their problems or  pains. In this case Willy's problem was he thought he was so  well-liked by society, however what he wanted most was for  his sons to like him, and for his wife to not have to suffer his torment anymore.

Wednesday, September 18, 2019

Internal Medicine :: Medicine College Admissions Essays

Internal Medicine Brought up in semi-urban environment, my parents taught the lesson "survival of the fittest". As a part of such lessons I soon realized the true picture behind, those efforts which made me what I am today. My individuality fortunately rests on an enriched cultural heritage and family values. Entry into medical school was out of fascination for the intricate human architecture and its functioning. A free mind should not be restrained; hence working vigorously I was exposed to the various difficulties encountered by medical students and it was the search for solutions which made me dig out details from medical texts. My encounter with the world of medicine could not deter me from enjoying various facets of student life as I marched ahead to win laurels for my alma mater. Being a part of the team, which performs efficiently with positive results, was a satisfying experience while acting as medical officer at Pramukhswami college. It was a nice experience working as a team with assistants and technicians, helping a fellow resident in other department, assisting during invasive procedures, performing conventional investigations, being on call, attending patients of trauma, all this in harmony with machines and computers. This generated a sense of team spirit and professional coordination amongst my colleagues from different clinical and para-clinical faculties. Sometimes the responsibilities as a guide for undergraduates in addition to thrice a week emergencies was tough, but great cooperation and compassionate approach from my smiling colleagues never let me down. All the efforts seem to be worth when the patient says "thank you doctor" with a smile. The process of achieving better training began at my own medical school and as the quest still remains, I preferred United States for further education and training. This motivated me to pass USMLE at first attempt with competitive scores. I anticipate a career in general medicine. I am eager to maintain my interest in teaching through patient education and through involvement with student training.

Tuesday, September 17, 2019

Effective Habits Worksheet Essay

Review Phoenix Career Plan results of Career Plan Building Activity: Work Culture Preference, respond to the following in 50 to 100 words each: 1.Describe your ideal study environment. My ideal study environment has to be in a quit and organized place. I like to listen to soft classical music in the background while I study. My dominant intelligences is Visual, Verbal, and Interpersonal. Learning while I listen to music helps me focus. Having my desk organized, I spend less time digging through files and books to find the information I need for my studying. 2.List some of the distractions that might hinder your study progress or your performance in an online classroom. There are few distractions that can hinder anyone’s studying progress. With the online classroom, you need to go on the internet. There are many interesting pop-up ads and web site that will get your attention. Social community web sites such as Facebook can also distract your studying habit. The internet can be helpful in many ways, but it can also hinder your studying progress. 3.What actions can you take to manage and eliminate distractions? The best way to eliminate distractions is to set your homepage to the University of Phoenix web site. You should also bock any pop-up advertisement through internet options settings. Keep your desk organize for you to easily locate the things near your surroundings. This will help you focus on the subject your studying. 4.How will you apply your personal learning style? How does your personal Learning style affect your study habits? After finding out my VARK score, this gave me the best way for me to learn using different strategies. I have learned that I am better with Visual learning strategies. I will be more focused with underlining my notes, use symbols, charts, or graphs to display my notes. This will be more effective and going back to my notes will help me remember the lesson I have learned. 5.List 5 effective study strategies from this week that you will use. Explain why you selected them and why they are effective strategies for online learning. 1.Making studying into a part of my daily routine. Even with the busy schedule that I have, having it as my daily routine will allow me to go online and follow my syllabus and stay on track with my learning habit. This is also effective for online learners because, it is self-studies and you need to manage your time wisely to achieve your success. Your professors are not there to check up on you daily. 2.Collaborate with others will help me with the understanding of the topics. They can provide with the ideas that I haven’t thought of. Going into the discussion form, you can chat with others and express your own opinions to get feedbacks. This will help the online learns since they are not in the class room environment. 3.Trying to get more sleep daily. This is something I really focused this week. Sleeping will reduce your stress level and help you focus more on the topic. Online learners might be busy with their schedules. This is something they all should consider. It will improve your personal as well. 4.Following a regular exercise program is something I am going to try. Exercising is also related to stress level. It is very difficult to focus when you are stressed. The best way to release stress is to exercise. Exercise will help everyone who are studying online. 5.Getting a tutor will be something I will use later in the difficult courses. With my current busy schedule, it is very difficult keeping up with the subjects. Having a tutor will help me with the things I missed. This will help the online learners in the same way that I did. 6.Identify one change you can make immediately to increase the effectiveness of your study habits. Explain how this will help you become more effective. Making studying into a part of my daily routine will be the most effective way to increase the effectiveness of my studying. Set myself with a fixed time schedule and always committed to the studying schedules, As long as I follow the schedule well, this will change my daily routine and I will always make an appointment around my studying time. 7.How does your personal learning style relate to your ideal workplace and your personal work competencies? With my personal learning style, I am likely to gain more from visual, verbal, and interpersonal environment. With my work culture, I am better with teamwork centered and leadership intensive. This relates to my interpersonal skills and I share information with others and teach the information as well. This can also relate to my competencies strengths. I have well organizing skills which tells me that it also relates to my personal learning style, 8.How is understanding your ideal learning environment applicable to selecting your ideal workplace? Understanding you ideal learning environment, you will have the knowledge how to make it more effective and how to learn in a stress free environment. Everyone has a different ways to learn. Once you have mastered how to effectively study with you learning habit, you can look for a position which will allow you to work more effectively and produce the most profit for the company.

Monday, September 16, 2019

8 Key Element for a Business Model

E-commerce: business. technology. society. E-commerce E commerce Business. Technology. Society gy y Kenneth  C. Laudon Copyright  © 2011 Pearson Education, Ltd. Chapter 5 Business  Models  for  E? commerce Copyright  © 2007Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 1-2 E-commerce Business Models Business  model d l Set  of  planned  activities  designed  to  result  in  a   Set of planned activities designed to result in a profit  in  a  marketplace Business  plan Describes  a  firm s  business  model Describes a firm’s business modelE commerce  business  model E? commerce business model Uses/leverages  unique  qualities  of  Internet  and   Web W b Slide 2-3 8 Key Elements of Business Model 1. 2. 3. 4. 5. 6. 7. 8. Value  proposition Revenue  model Market  opportunity Market opportunity Competitive  environment Competitive  advantage Market  strategy Market strategy Organizational  De velopment Management  team Slide 2-4 1. Value Proposition Why  should  the  customer  buy  from  you? h h ld h b f ? Successful  e? ommerce  value   S f l l propositions: Personalization/customization Reduction  of  product  search,  price  discovery  costs Facilitation  of  transactions  by  managing  product   delivery Slide 2-5 2. Revenue Model How  will  the  firm  earn  revenue,  generate   p profits,  and  produce  a  superior  return  on   p p invested  capital? Major  types: Advertising  revenue  model g Subscription  revenue  model Transaction  fee  revenue  model Transaction fee revenue model Sales  revenue  model Affiliate  revenue  model Slide 2-6 3. Market Opportunity What  marketspace  do  you  intend  to   h k d d serve  and  what  is  its  size?Marketspace:  Area  of  actual  or  potential  commercial  value   in  which  companyà ‚  intends  to  operate in which company intends to operate Realistic  market  opportunity:  Defined  by  revenue   potential  in  each  market  niche  in  which  company  hopes  to   potential in each market niche in which company hopes to compete Market  opportunity  typically  divided  into   M k t t it t i ll di id d i t smaller  niches Slide 2-7 4. Competitive Environment Who  else  occupies  your  intended   h l d d marketspace? p Other  companies  selling  similar  products  in  the  same   marketspace Includes  both  direct  and  indirect  competitors Influenced  by: Influenced by:Number  and  size  of  active  competitors Each  competitor s  market  share Each competitor’s market share Competitors’  profitability Competitors pricing Competitors’  pricing Slide 2-8 5. Competitive Advantage Achieved  when  firm: h d h f Produces  superior  pro duct  Ã‚  or Produces superior product or Can  bring  product  to  market  at  lower  price   than  competitors th tit Important  concepts: p p Asymmetries First? mover  advantage Fi t d t Unfair  competitive  advantage Leverage Slide 2-9 6. Market Strategy How  do  you  plan  to  promote  your   products  or  services  to  attract  your   products or services to attract your target  audience?Details  how  a  company  intends  to  enter  market and  attract  customers Best  business  concepts  will  fail  if  not  properly   marketed  to  potential  customers k d i l Slide 2-10 7. Organizational Development What  types  of  organizational  structures   within  the  firm  are  necessary  to  carry  out   within the firm are necessary to carry out the  business  plan? Describes  how  firm  will  organize  work Typically  divided  into  functiona l  departments As  company  grows,  hiring  moves  from  generalists  to   As company grows hiring moves from generalists to specialists Slide 2-11 8.Management Team What  kinds  of  experiences  and   background  are  important  for  the   background are important for the company’s  leaders  to  have? Employees  are  responsible  for  making  the  business  model   work Strong  management  team  gives  instant  credibility  to   outside  investors Strong  management  team  may  not  be  able  to  salvage  a   weak  business  model,  but  should  be  able  to  change  the   model  and  redefine  the  business  as  it  becomes  necessary Slide 2-12 Insight on Business Online Grocers: Finding and Executing the Right Model g g Class Discussion Slide 2-13 Categorizing E-commerce Business ModelsNo  one  correct  way We  categorize  businessà ‚  models  according  to: We categorize business models according to: E? commerce  sector  (B2C,  B2B,  C2C) Type  of  e? commerce  technology;  i. e. m? commerce Type of e commerce technology; i e m commerce Similar  business  models  appear  in  more  than   one  sector Some  companies  use  multiple  business   Some companies use multiple business models;  e. g. eBay Slide 2-14 B2C Business Models: Portal Search  plus  an  integrated  package  of  content   and  services Revenue  models:   d l Advertising,  referral  fees,  transaction  fees,  subscriptions g p Variations:Horizontal  /  General Vertical  /  Specialized  (Vortal) Vertical / Specialized (Vortal) Pure  Search Slide 2-15 Insight on Technology Can Bing Bong Google? Class Discussion Slide 2-16 B2C Models: E-tailer Online  version  of  traditional  retailer Revenue  model:  Sales Variations: Virtual  merchant Virtual merchant Bricks? and? clicks Catalog  merchant C t l h t Manufacturer? direct Low  barriers  to  entry Slide 2-17 B2C Models: Content Provider Digital  content  on  the  Web News,  music,  video Revenue  models:   Revenue models: Subscription;  pay  per  download  (micropayment);   advertising;  affiliate  referral  fees Variations:Content  owners Syndication S di i Web  aggregators Slide 2-18 B2C Models: Transaction Broker Process  online  transactions  for  consumers Primary  value  proposition—saving  time  and  money Revenue  model:   R d l Transaction  fees Industries  using  this  model: Financial  services Travel  services Job  placement  services Slide 2-19 B2C Models: Market Creator Create  digital  environment  where  buyers   and  sellers  can  meet  and  transact Examples:   Priceline eBay y Revenue  model:  Transaction  fees Revenue model: Transaction fee s Slide 2-20 B2C Models: Service Provider Online  services e. g. Google:  Google  Maps,  Gmail,  etc. Value  proposition   Value propositionValuable,  convenient,  time? saving,  low? cost  alternatives  to   traditional  service  providers t diti l i id Revenue  models: Revenue models: Sales  of  services,  subscription  fees,  advertising,  sales  of   marketing  data marketing data Slide 2-21 B2C Models: Community Provider Provide  online  environment  (social   network)  where  people  with  similar   interests  can  transact,  share  content,  and   , , communicate   E. g. Facebook,  MySpace,  LinkedIn,  Twitter Revenue  models: R d l Typically  hybrid,  combining  advertising, subscriptions,  sales,  transaction  fees,  affiliate  fees Slide 2-22 B2B Business Models Net  marketplaces E? istributor E procurement E? procurement Exchange Industry  consortium Industry cons ortium Private  industrial  network Private industrial network Single  firm Industry? wide Industry wide Slide 2-23 B2B Models: E-distributor Version  of  retail  and  wholesale  store,   , MRO  goods  and  indirect  goods Owned  by  one  company  seeking  to  serve   many  customers Revenue  model:  Sales  of  goods Example:  Grainger. com Slide 2-24 B2B Models: E-procurement Creates  digital  markets  where   participants  transact  for  indirect  goods B2B  service  providers,  application  service  providers  (ASPs) B2B service providers application service providers (ASPs)Revenue  model: Service  fees,  supply? chain  management,  fulfillment   services Example:  Ariba Slide 2-25 B2B Models: Exchanges Independently  owned  vertical  digital   p y g marketplace  for  direct  inputs Revenue  model:  Transaction,  commission  fees Revenue model Transaction commission fees C eate po e u co pet t o bet ee Create  powerful  competition  between   suppliers Tend  to  force  suppliers  into  powerful  price   T d f li i f l i competition;  number  of  exchanges  has   dropped  dramatically d dd ll Slide 2-26 B2B Models: Industry Consortia Industry? wned  vertical  digital  marketplace   open  to  select  suppliers More  successful  than  exchanges More successful than exchanges Sponsored  by  powerful  industry  players Strengthen  traditional  purchasing  behavior Revenue  model:  Transaction,  commission  fees R d l T ti i i f Example:  Exostar Example: Exostar Slide 2-27 Private Industrial Networks Designed  to  coordinate  flow  of  communication   among  firms  engaged  in  business  together fi di b i h Electronic  data  interchange  (EDI) Single  firm  networks Most  common  form   M t f Example:  Wal? Mart’s  network   for  suppliersIndustry? wide  networks Often  evolve  out  of  industry  associations   Often evolve out of industry associations Example:  Agentrics Slide 2-28 Other E-commerce Business Models Consumer? to? consumer  (C2C) eBay,  Craigslist Peer? to? peer  (P2P) Peer to peer (P2P) The  Pirate  Bay,  Cloudmark M? commerce: Technology  platform  continues  to  evolve Technology platform continues to evolve iPhone,  smartphones  energizing  interest  in  m? commerce   pp apps Slide 2-29 Insight on Society Where R U? Not Here! Class Discussion Slide 2-30 E-commerce Enablers: Gold Rush ModelE? commerce  infrastructure  companies   p have  profited  the  most: Hardware,  software,  networking,  security E? commerce  software  systems,  payment  systems Media  solutions,  performance  enhancement CRM  software CRM software Databases Hosting  services,  etc. Slide 2-31 How Internet & Web Change Busi ness E? commerce  changes  industry  structure   g y by  changing: Basis  of  competition  among  rivals Barriers  to  entry y Threat  of  new  substitute  products Strength  of  suppliers Bargaining  power  of  buyers Bargaining power of buyers Slide 2-32 Industry Value ChainsSet  of  activities  performed  by  suppliers,   manufacturers,  transporters,  distributors,  and   f di ib d retailers  that  transform  raw  inputs  into  final   products  and  services   Internet  reduces  cost  of  information  and   Internet reduces cost of information and other  transactional  costs Leads  to  greater  operational  efficiencies,   lowering  cost,  prices,  adding  value  for   lowering cost prices adding value for customers Slide 2-33 E-commerce & Industry Value Chains Figure  5. 4 Slide 2-34 Firm Value Chains Activities  that  a  firm  engages  in  to   create inal  products  from  raw  inputs Each  step  adds  value Effect  of  Internet: Eff fI Increases  operational  efficiency p y Enables  product  differentiation Enables  precise  coordination  of  steps  in  chain E bl i di ti f t i h i Slide 2-35 E-commerce & Firm Value Chains Figure  5. 5 Slide 2-36 Firm Value Webs Networked  business  ecosystem   Uses  Internet  technology  to  coordinate  the   value  chains  of  business  partners l h i fb i Coordinates  a  firm’s  suppliers  with  its  own   C di t fi ’ li ith it production  needs  using  an  Internet? based   supply  chain  management  systemSlide 2-37 Internet-Enabled Value Web bl d l b Figure  5. 6 Slide 2-38 Business Strategy Plan  for  achieving  superior  long? term   returns  on  the  capital  invested  in  a   business  firm   business firm Four  Generic  Strategies 1. Di fferentiation   2. Cost 3. Scope 4. 4 Focus Slide 2-39 Chapter 6 E-commerce Marketing Copyright  © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 6-40 Netflix N fli Strengthens and Defends Its Brand Class Discussion Slide 6-41 Consumers Online: Internet Audience & Consumer Behavior Around  70%  (82  million)  U. S. ouseholds  have   Around 70% (82 million) U S households have Internet  access  in  2010 Growth  rate  has  slowed Intensity  and  scope  of  use  both  increasing d f b h Some  demographic  groups  have  much  higher   Some demographic groups have much higher percentages  of  online  usage  than  others   Gender,  age,  ethnicity,  community  type,  income,  education Slide 6-42 Consumers Online: Internet Audience & Consumer Behavior Broadband  audience  vs. dial? up  audience Purchasing  behavior  affected  by   neighborhood Lifestyle  and  sociological  impa cts Use  of  Internet  by  children,  teens Use  of  Internet  as  substitute  for  other  social  activitiesMedia  choices Traditional  media  competes  with  Internet  for  attention Traditional media competes with Internet for attention Slide 6-43 Consumer Behavior Models Study  of  consumer  behavior Social  science   Attempts  to  explain  what  consumers  purchase   Attempts to explain what consumers purchase and  where,  when,  how  much  and  why  they  buy Consumer  behavior  models Predict  wide  range  of  consumer  decisions Predict wide range of consumer decisions Based  on  background  demographic  factors  and   other  intervening,  more  immediate  variables   h i i i di i bl Slide 6-44 General Model of Consumer Behavior Figure  6. Slide 6-45 Background Demographic Factors Culture:  Broadest  impact Subculture  (ethnicity,  age,  lifestyle,  geography) S b lt ( th i it lif t l h ) Social Reference  groups Direct  Ã‚  reference  groups g p Indirect  reference  groups Opinion  leaders  (viral  influencers) Lifestyle  groups   f l Psychological Psychological  profiles Slide 6-46 Online Purchasing Decision Psychographic  research Combines  demographic  and  psychological  data Combines demographic and psychological data Divides  market  into  groups  based  on  social  class,  lifestyle,   and/or  personality  characteristics and/or personality characteristicsFive  stages  in  the  consumer  decision  process: 1. 2. 3. 4. 5. Awareness  of  need Search  for  more  information Evaluation  of  alternatives Actual  purchase  decision Actual purchase decision Post? purchase  contact  with  firm Slide 6-47 Consumer D i i C Decision Process & P Supporting Communications Figure  6. 3 Slide 6-48 Model of Online Consumer Behavior Decision   process  similar  for  online  and  offline   behavior General  online  behavior  model Consumer  skills Product  characteristics Attitudes  toward  online  purchasing Perceptions  about  control  over  Web  environment p Web  site  featuresClickstream  behavior:  Transaction  log  for   Clickstream behavior: Transaction log for consumer  from  search  engine  to  purchase Slide 6-49 Model of Online Consumer Behavior Figure  6. 4 Slide 6-50 Model of Online Consumer Behavior Clickstream  factors  include: Number  of  days  since  last  visit Number of days since last visit Speed  of  clickstream  behavior Number  of  products  viewed  during  last  visit b f d i dd i l ii Number  of  pages  viewed Supplying  personal  information Number  of  days  since  last  purchase Number  of  past  purchasesClickstream  marketing Clickstream marketing Slide 6-51 Shoppers: B rowsers & Buyers Shoppers:  87%  of  Internet  users 72%  buyers 72% buyers 16%  browsers  (purchase  offline) One? third  offline  retail  purchases  influenced  by   O thi d ffli t il h i fl db online  activities Online  traffic  also  influenced  by  offline  brands  and   shopping pp g E? commerce  and  traditional  commerce  are  coupled: part  of  a  continuum  of  consuming  behavior part of a continuum of consuming behavior Slide 6-52 Online Shoppers & Buyers Figure  6. 5 Slide 6-53What Consumers Shop & Buy Online Big  ticket  items  ($500  plus) Travel,  computer  hardware,  consumer  electronics Expanding   Consumers  more  confident  in  purchasing  costlier  items Small  ticket  items  ($100  or  less) ($ ) Apparel,  books,  office  supplies,  software,  etc. Sold  by  first  movers  on  Web Sold by first movers on Web Physically  small  i tems High  margin  items   Broad  selection  of  products  available Slide 6-54 What Consumers Buy Online Figure  6. 6 Slide 6-55 Intentional Acts: How Shoppers Find Vendors Online pp Search  engines  (59%) S h i (59%) Coupon  Web  sites  (29%) Coupon Web sites (29%) Comparison  shopping  sites  (27%) E? ail  newsletters  (25%) Online  shoppers  are  highly  intentional,   looking  for  specific  products,  companies,   services Slide 6-56 Table  6. 6 Slide 6-57 Trust, Utility, Opportunism in Online Markets Two  most  important  factors  shaping  decision   Two most important factors shaping decision to  purchase  online: Utility:   U ili Better  prices,  convenience,  speed Trust: Asymmetry  of  information  can  lead  to  opportunistic   behavior  by  sellers Sellers  can  develop  trust  by  building  strong  reputations   for  honesty,  fairness,  delivery   Slide 6-58 Basic Marketing Concepts MarketingStrategies  and  actions  to  establish  relationship   Strategies and actions to establish relationship with  consumer  and  encourage  purchases  of   p products  and  services Addresses  competitive  situation  of  industries  and   firms Seeks  to  create  unique,  highly  differentiated   products  or  services  that  are  produced  or  supplied   by  one  trusted  firm Unmatchable  feature  set Avoidance  of  becoming  commodity Slide 6-59 Feature Sets Three  levels  of  product  or  service 1. Core  product e. g. cell  phone g p 2. Actual  product Characteristics  that  deliver  core  benefits Ch t i ti th t d li b fit e. g. wide  screen  that  connects  to  Internet 3. Augmented  productAdditional  benefits Basis  for  building  the  product’s  brand e. g. product  warranty Slide 6-60 Featu re Set Figure  6. 7 Slide 6-61 Products, Brands & Branding Process Brand: Expectations  consumers  have  when  consuming,  or   thinking  about  consuming,  a  specific  product Most  important  expectations:  Quality,  reliability,   Most important expectations: Quality reliability consistency,  trust,  affection,  loyalty,  reputation Branding:  Process  of  brand  creation Branding: Process of brand creation Closed  loop  marketing Brand  strategy Brand  equity Brand eq it Slide 6-62 Marketing A ti iti M k ti Activities: From Products to Brands Figure  6. 8Slide 6-63 STP: Segmenting, Targeting, Positioning Major  ways  used  to  segment,  target  customers 1. 2. 3. 4. 5. 6. Behavioral B h i l Demographic Psychographic h hi Technical Contextual Search Within  segment,  product  is  positioned and  branded  as   a  unique,  high? value  product,  especially  suited  to   q g p p y ne eds  of  segment  customers Slide 6-64 Are Brands Rational? For  consumers,  a  qualified  yes: Brands  introduce  market  efficiency  by  reducing  search  and   decision? making  costs For  business  firms,  a  definite  yes: A  major  source  of  revenue Lower  customer  acquisition  cost Increased  customer  retention Successful  brand  constitutes  a  long? asting  (though  not   necessarily  permanent)  unfair  competitive  advantage Slide 6-65 Can Brands Survive Internet? Brands & Price Dispersion p Early  postulation:   Law  of  One  Price ;  end  of  brands Early postulation: â€Å"Law of One Price†; end of brands Instead: Consumers  still  pay  premium  prices  for  differentiated   products E? commerce  firms  rely  heavily  on  brands  to  attract   customers  and  charge  premium  prices Substantial  price  dispersion Large  differences  in  price  sensitivity  for  same  product Large differences in price sensitivity for same product â€Å"Library  effect† Slide 6-66Revolution in Internet Marketing Technology Three  broad  impacts: Scope  of  marketing  communications  broadened   Richness  of  marketing  communications  increased g Information  intensity  of  marketplace  expanded Internet  marketing  technologies: Internet marketing technologies: Web  transaction  logs Cookies  and  Web  bugs Cookies and Web bugs Databases,  data  warehouses,  data  mining Advertising  networks Customer  relationship  management  systems Slide 6-67 Web Transaction LogsBuilt  into  Web  server  software Record  user  activity  at  Web  site y Webtrends:  Leading  log  analysis  tool Provides  much  marketing  data,  especially  Ã‚   Provides much marketing data especially combined  with: Registratio n  forms R i i f Shopping  cart  database Answers  questions  such  as: What  are  major  patterns  of  interest  and  purchase? After  home  page,  where  do  users  go  first? Second? Slide 6-68 Cookies & Web Bugs Cookies: Small  text  file  Web  sites  place  on  visitor’s  PC  every  time   they  visit,  as  specific  pages  are  accessed Provide  Web  marketers  with  very  quick  means  of   identifying  customer  and  understanding  prior  behavior Flash  cookiesWeb  bugs: Tiny  (1  pixel)  graphics  embedded  in  e mail  and  Web  sites Tiny (1 pixel) graphics embedded in e? mail and Web sites Used  to  automatically  transmit  information  about  user  and   page being viewed to monitoring server page  being  viewed  to  monitoring  server Slide 6-69 Insight on Society g y Every Move You Make, Every Click You Make, Weâ₠¬â„¢ll Be Tracking You , g Class Discussion Slide 6-70 Databases Database:  Ã‚  Stores  records  and  attributes Database  management  system  (DBMS):   Software  used  to  create,  maintain,  and  access  databasesSQL  (Structured  Query  Language): Industry? standard  database  query  and  manipulation  language  used  in   y q y p g g a  relational  database Relational  database: Represents  data  as  two? dimensional  tables  with  records  organized  in   rows  and  attributes  in  columns;  data  within  different  tables  can  be   flexibly  related  as  long  as  the  tables  share  a  common  data  element flexibly related as long as the tables share a common data element Slide 6-71 Relational Database View of E-commerce Customers Figure  6. 12 Slide 6-72 Data Warehouses & Data Mining Data  warehouse:Collects  firm s  transactional  and  custom er  data  in  single   Collects firm’s transactional and customer data in single location  for  offline  analysis  by  marketers  and  site   managers Data  mining: Analytical  techniques  to  find  patterns  in  data,  model   Analytical techniques to find patterns in data model behavior  of  customers,  develop  customer  profiles Query? driven  data  mining Query driven data mining Model? driven  data  mining Rule? based  data  mining l b dd Collaborative  filtering Slide 6-73 Data Mining & Personalization Figure  6. 13 Slide 6-74 Insight on TechnologyThe Long T il Big Hits and Big Misses Th L Tail: Bi Hi d Bi Mi Class Discussion Slide 6-75 Customer Relationship Management ( (CRM) Systems ) y Record  all  contact  that  customer  has  with  firm Generates  customer  profile  available  to  everyone  in firm  with  need  to  Ã¢â‚¬Å"know  the  customer† fi ith d t â€Å"k th t † Customer profiles can contain: ustomer  profiles  can  contain: Map  of  the  customer’s  relationship  with  the  firm Product  and  usage  summary  data Demographic  and  psychographic  data Profitability  measures Contact  history   Contact history Marketing  and  sales  information Slide 6-76Customer Relationship Management System Figure  6. 14 Slide 6-77 Market Entry Strategies Figure  6. 15 Slide 6-78 Establishing Customer Relationship Advertising  Networks Banner  advertisements Ad  server  selects  appropriate  banner  ad  based  on   Ad server selects appropriate banner ad based on cookies,  Web  bugs,  backend  user  profile   databases Permission  marketing Permission marketing Affiliate  marketing g Slide 6-79 How Advertising Network Works e. g. , DoubleClick Figure  6. 16 Slide 6-80 Establishing Customer Relationship (cont’d) Viral  marketingGett ing  customers  to  pass  along  company’s  marketing   message  to  friends,  family,  and  colleagues Blog  marketing Using  blogs  to  market  goods  through  commentary  and   U i bl k d h h d advertising Social  network  marketing,  social  shopping   Mobile  marketing Mobile marketing Slide 6-81 Insight on Business Social Network Marketing: Let’s Buy Together Class Discussion Slide 6-82 Establishing Customer Relationship (cont’d) Wisdom  of  crowds  (Surowiecki,  2004) ( , ) Large  aggregates  produce  better  estimates  and  judgments Examples:   E l Prediction  markets Folksonomies Social  tagging Social taggingBrand  leveraging Slide 6-83 Customer Retention: Strengthening Customer Relationship p Mass  marketing Mass marketing Direct  marketing Micromarketing   Micromarketing Personalized,  one? to? one  marketing  Ã‚   Segmenting  market  on  precise  a nd  timely  understanding  of   Segmenting market on precise and timely understanding of individual’s  needs Targeting  specific  marketing  messages  to  these  individuals Positioning  product  vis? a? vis  competitors  to  be  truly  unique Personalization Can  increase  consumers  sense  of  control,  freedom Can  also  result  in  unwanted  offers  or  reduced  anonymity Slide 6-84Mass Market-Personalization Continuum Figure  6. 17 Slide 6-85 Other Customer Retention Marketing Technics Customization Customer  co? production Transactive  content:   Combine  traditional  content  with  dynamic  information   tailored  to  each  user’s  profile Customer  service FAQs Q Real? time  customer  service  chat  systems Automated  response  systems Automated response systems Slide 6-86 Net Pricing Strategies Pricing Integral  part  of  marketing  strategy I t l t f k ti t t Traditionally  based  on:   Fixed  cost   Variable  costs   Demand  curve Price  discrimination Price discriminationSelling  products  to  different  people  and  groups   based  on  willingness  to  pay Slide 6-87 Net Pricing Strategies (cont’d) Free  and  freemium Can  be  used  to  build  market  awareness Versioning Creating  multiple  versions  of  product  and  selling   essentially  same  product  to  different  market  segments   at  different  prices at different prices Bundling Offers  consumers  two  or  more  goods  for  one  price Off t d f i Dynamic  pricing: Auctions Yield  management Slide 6-88 Channel Management Strategies Channels: Different  methods  by  which  goods  can  be  distributed  and   soldChannel  conflict: When  new  venue  for  selling  products  or  services  threatens   gp or  destroy s  existing  sales  venues E. g. online  airline/travel  services  and  Ã‚  traditional  offline   travel  agencies Some  manufacturers  are  using  partnership   gp p model  to  avoid  channel  conflict   Slide 6-89 Chapter 7: E-commerce Marketing Communications Chapter 7 E-commerce Advertising Copyright  © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 7-90 Video Ads: Shoot, Click, Buy Class Discussion Slide 7-91 Marketing Communications Two  main  purposes:Sales  Ã¢â‚¬â€œ promotional  sales  communications   Branding  Ã¢â‚¬â€œ b di B di branding  communications i i Online  marketing  communications Online marketing communications Takes  many  forms Online  ads,  e? mail,  public  relations,  Web   sites Slide 7-92 Online Advertising li d i i $25  billion,  15%  of  all  advertising Advantages: Internet  is  where  audience  is  moving g Ad  targeting Greater  opp ortunities  for  interactivity Greater opportunities for interactivity Disadvantages: Cost  versus  benefit How  to  adequately  measure  results Supply  of  good  venues  to  display  ads Slide 7-93 Online Advertising from 2002-2014 Figure  7. Slide 7-94 Forms of Online Advertisements Display  ads Rich  media Video  ads Search  engine  advertising Social  network,  blog,  and  game  advertising Social network blog and game advertising Sponsorships Referrals  (affiliate  relationship  marketing) E? mail  marketing g Online  catalogs Slide 7-95 Display Ads Banner  ads Rectangular  box  linking  to  advertiser’s  Web  site IAB  guidelines e. g. Full  banner  is  468  x  60  pixels,  13K e g Full banner is 468 x 60 pixels 13K Pop? up  ads Appear  without  user  calling  for  them Provoke  negative  consumer  sentiment g Twice  as  effective  as  normal  banner  ads Pop? nder  ads:  Open  beneath  browser  window Pop under ads: Open beneath browser window Slide 7-96 Rich Media Ads Use  Flash,  DHTML,  Java,  JavaScript About  7%  of  all  online  advertising  expenditures Tend  to  be  more  about  branding d b b b di Boost  brand  awareness  by  10% Boost brand awareness by 10% IAB  standards  limit  length Interstitials Superstitials Slide 7-97 Video Ads Fastest  growing  form  of  online  advertisement IAB  standards Linear  video  ad Non? linear  video  ad In? banner  video  ad In? text  video  ad Ad placement Advertising  networks Advertising  exchanges Banner  swappingSlide 7-98 Search Engine Advertising h i d i i Almost  50%  of  online  ad  spending  in  2010 Types: Paid  inclusion  or  rank Paid inclusion or rank Inclusion  in  search  results Sponsored  link  areas p Keyword  advertising e. g. Google  AdWords e g Google AdWords Network  keyword  advertising  (context   advertising) d ii ) e. g. Google  AdSense Slide 7-99 Search Engine Advertising (cont’d) Nearly  ideal  targeted  marketing Nearly ideal targeted marketing Issues:   Disclosure  of  paid  inclusion  and  placement   practices Click  fraud   Ad  nonsense   Slide 7-100 Mobile Advertising Half  of  U. S.Internet  users  access  Internet   Half of U. S. Internet users access Internet with  mobile  devices Currently  small  market,  but  fastest   growing  platform  (35%) growing platform (35%) Google  and  Apple  in  race  to  develop   Google and Apple in race to develop mobile  advertising  platform AdMob,  iAd Slide 7-101 Sponsorships & Referrals Sponsorships Paid  effort  to  tie  advertiser s  name  to   Paid effort to tie advertiser’s name to particular  information,  event,  venue  in  a  way   that  reinforces  brand  in  positive  yet  not  overtly   that reinforces brand in positive yet not overtly commercial  manner ReferralsAffiliate  relationship  marketing p g Permits  firm  to  put  logo  or  banner  ad  on   another  firm’s  Web  site  from  which  users  of   th fi ’ W b it f hi h f that  site  can  click  through  to  affiliate’s  site Slide 7-102 E-mail Marketing & Spam Explosion Direct  e? mail  marketing   Low  cost,  primary  cost  is  purchasing  addresses Spam:  Unsolicited  commercial  e? mail Spam: Unsolicited commercial e mail Approx. 90%  of  all  e? mail Efforts  to  control  spam: Technology  (filtering  software)   Government  regulation  (CAN? SPAM  and  state  laws) Voluntary  self? regulation  by  industries  (DMA  ) y g y Volunteer  efforts Slide 7-103Percentage of E-mail That Is Spam Figure 7. 6 Slide 7-104 Online Catalogs Equivalent  of  paper? based  catalogs Graphics? intense;  use  increasing  with  increase   in  broadband  use in broadband use Two  types: 1. 2. 2 Full? page  spreads,  e. g. Landsend. com Grid  displays,  e. g. Amazon Grid displays e g Amazon In  general,  online  and  offline  catalogs   complement  each  other Slide 7-105 Social Marketing â€Å"Many? to? many†Ã‚  model Uses  digitally  enabled  networks  to  spread  ads Blog  advertising   Blog advertising Online  ads  related  to  content  of  blogs Social  network  advertising:   Social network advertising:Ads  on  MySpace,  Facebook,  YouTube,  etc. Game  advertising:   G d ti i Downloadable  Ã¢â‚¬Å"advergames† Placing  brand? name  products  within  games Slide 7-106 Insight on Society g y Marketing to Children of the Web in the Age of Social Networks g Class Discussion Slide 7-107 Behavioral Targeting Interest? based  advertising Data  aggregators  develop  profiles Data aggregators develop profiles Search  engine  queries Online  browsing  history O li b i hi Offline  data  (income,  education,  etc. ) d Information  sold  to  3rd party  advertisers,  who  deliver   ads  based  on  profile Ad  exchanges Privacy  concerns acy co ce s Consumer  resistance Slide 7-108Mixing Off-line & Online Marketing Communications g Most  successful  marketing  campaigns   M t f l k ti i incorporate  both  online  and  offline  tactics Offline  marketing Drive  traffic  to  Web  sites Drive traffic to Web sites Increase  awareness  and  build  brand  equity Consumer  behavior  increasingly  multi? channel 60%  consumers  research  online  before  buying  offline % y g Slide 7-109 Insight on Business g Are the Very Rich Different From You and Me? Class Discussion Sl ide 7-110 Online Marketing Metrics: Lexicon Measuring  audience  size  or  market  share Impressions I i Click? through  rate  (CTR) View? hrough  rate  (VTR) Vi th h t (VTR) Hits Page  views P i Stickiness  (duration) Unique  visitors Loyalty Reach Recency Slide 7-111 Online Marketing Metrics (cont’d) Conversion  of  visitor   Conversion of visitor to  customer Acquisition  rate q Conversion  rate Browse? to? buy? ratio View? to? cart  ratio Vi t t ti Cart  conversion  rate Checkout  conversion  rate   Checkout conversion rate Abandonment  rate Retention  rate Attrition  rate E mail  metrics E? mail metrics Open  rate Delivery  rate Delivery rate Click? through  rate   (e mail) (e? mail) Bounce? back  rate Slide 7-112 Online Consumer Purchasing ModelFigure  7. 8 Slide 7-113 How Well Does Online Adv. Work? Ultimately  measured  by  ROI  on  ad  campaign Highest  click? through  rates:  Searc h  engine  ads,   Permission  e mail  campaigns Permission e? mail campaigns Rich  media,  video  interaction  rates  high Online  channels  compare  favorably  with  traditional Most  powerful  marketing  campaigns  use  multiple   Most powerful marketing campaigns use multiple channels,  including  online,  catalog,  TV,  radio,   newspapers,  stores newspapers, stores Slide 7-114 Comparative Returns on Investment Figure  7. 9 Slide 7-115 Costs of Online Advertising Pricing  modelsBarter Cost  per  thousand  (CPM) Cost  per  click  (CPC)   Cost  per  action  (CPA)   Cost per action (CPA) Online  revenues  only Sales  can  be  directly  correlated Sales can be directly correlated Both  Ã‚  online/offline  revenues Offline  purchases  cannot  always  be  directly  related  to  online   Offli h t l b di tl l t dt li campaign In  general,  online  marketing  more   expensive  on  CPM   In general online marketing more expensive on CPM basis,  but  more  effective Slide 7-116 Web Site Activity Analysis b i i i l i Figure  7. 10 Slide 7-117 Insight on Technology It’s 10 P. M. Do You Know Who Is On Your Web Site? Class Discussion Slide 7-118Web Site †¦ as Marketing Communications Tool g Web  site  as  extended  online  advertisement W b i d d li d i Domain  name:  An  important  role   Domain name: An important role Search  engine  optimization:   Search engine optimization: Search  engines  registration Keywords  in  Web  site  description K d i W b it d i ti Metatag  and  page  title  keywords Links  to  other  sites k h Slide 7-119 Web Site Functionality b i i li Main  factors  in  effectiveness  of  interface Utility Ease  of  use Top  factors  in  credibility  of  Web  sites: Top factors in credibility of Web sites: Design  look Info rmation  design/structure g / Information  focusOrganization  is  important  for  first time  users,  but   Organization is important for first? time users but declines  in  importance Information content becomes major factor attracting Information  content  becomes  major  factor  attracting   further  visits Slide 7-120 Factors in Credibility of Web Sites Figure  7. 11 Slide 7-121 Table  7. 9 Slide 7-122 Chapter 8: Ethical, Social, and Political Issues in E-commerce E commerce Chapter 8 Ethics, Law, E-commerce Copyright  © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 8-123 Ethical, Social, Political Issues in E-commerceInternet,  like  other  technologies,  can: Internet like other technologies can: Enable  new  crimes Affect  environment Threaten  social  values Costs  and  benefits  must  be  carefully   considered,  especially  when  there  are  no   id d i ll h h g g clear? c ut  legal  or  cultural  guidelines Slide 8-124 Model for Organizing Issues Issues  raised  by  Internet  and  e? commerce  can  be  viewed  at  individual,   social,  and  political  levels social and political levels Four  major  categories  of  issues: Four major categories of issues: Information  rights Property  rights Property rights Governance Public  safety  and  welfare Slide 8-125Moral Dimensions of Internet Society M l Di i f I S i Figure  8. 1 Slide 8-126 Basic Ethical Concepts i hi l Ethics Study  of  principles  used  to  determine  right  and  wrong  courses  of   action Responsibility p y Accountability Liability Laws  permitting  individuals  to  recover  damages Due  process Laws  are  known,  understood Laws are known understood Ability  to  appeal  to  higher  authorities  to  ensure  laws  applied  correctly Slide 8-127 Analyzing Ethical Dilemmas l i hi l il Process  for  analyzing  ethical  dilemmas: 1. 2. 3. 3 4. 5. Identify  and  clearly  describe  the  facts Define  the  conflict  or  dilemma  and  identify  the   y higher? rder  values  involved Identify  the  stakeholders Identify the stakeholders Identify  the  options  that  you  can  reasonably   take t k Identify  the  potential  consequences  of  your   options Slide 8-128 Candidate Ethical Principles Golden  Rule Universalism Slippery  Slope Collective  Utilitarian  Principle Risk  Aversion Ri k A i No  Free  Lunch The  New  York  Times  Test The  Social  Contract  Rule Slide 8-129 Privacy & Information Rights Privacy: Moral  right  of  individuals  to  be  left  alone,  free   from  surveillance  or  interference  from  other   individuals  or  organizations Information  privacy p y Subset  of  privacy Includes:The  claim  th at  certain  information  should  not  be   collected  at  all The  claim  of  individuals  to  control  the  use  of  whatever   h l i f i di id l l h f h information  is  collected  about  them Slide 8-130 Privacy & Information Rights (cont. ) Major  ethical  issue  related  to  e? commerce   and  privacy:   d i Under  what  conditions  should  we  invade  the   privacy  of  others? Major  social  issue:   j Development  of  Ã¢â‚¬Å"expectations  of  privacy†Ã‚  and   privacy  norms privacy norms Major  political  issue: Development  of  statutes  that  govern  relations   D l t f t t t th t l ti between  recordkeepers  and  individuals Slide 8-131 Information Collected at E-commerce SitesData  collected  includes Personally  identifiable  information  (PII) Anonymous  information Anonymous information Types  of  data  collected yp Name,  a ddress,  phone,  e? mail,  social  security Bank  and  credit  accounts,  gender,  age,  occupation,   B k d di d i education Preference  data,  transaction  data,  clickstream  data,   browser  type Slide 8-132 Social Networks & Privacy Social  networks Encourage  sharing  personal  details Pose  unique  challenge  to  maintaining   privacy Facebook s  Beacon  program Facebook’s Beacon program Facebook s  Terms  of  Service  change Facebook’s Terms of Service change Slide 8-133 Profiling & Behavioral Targeting ProfilingCreation  of  digital  images  that  characterize  online  individual  and   group  behavior Anonymous  profiles A fil Personal  profiles Personal profiles Advertising  networks Track  consumer  and  browsing  behavior  on  Web T k db i b h i W b Dynamically  adjust  what  user  sees  on  screen Build  and  refresh  profiles  of  consumers Google’s AdWords program Slide 8-134 Profiling & Behavioral Targeting (cont’d) Deep  packet  inspection Business  perspective: Web  profiling  serves  consumers  and  businesses Increases  effectiveness  of  advertising,  subsidizing  free   content Enables  sensing  of  demand  for  new  products  and  services Critics  perspective:Undermines  expectation  of  anonymity  and  privacy Consumers  show  significant  opposition  to  unregulated   collection  of  personal  information Enables  weblining Slide 8-135 Internet & Government Invasions of Privacy Various  laws  strengthen  ability  of  law  enforcement   agencies  to  monitor  Internet  users  without   i i I ih knowledge  and  sometimes  without  judicial  oversight CALEA,  PATRIOT  Act,  Cyber  Security  Enhancement  Act,   Homeland  Security  Act Government  agencies  are  largest  users  of  private   sector  commercial  data  brokers sector commercial data brokers Retention  by  ISPs  of  user  data  a  concern Slide 8-136Legal Protections In  U. S. ,  privacy  rights  explicitly  granted  or   derived  from Constitution   Constitution First  Amendment  Ã‚  Ã¢â‚¬â€œ freedom  of  speech  and  association Fourth  Amendment  Ã‚  Ã¢â‚¬â€œ unreasonable  search  and  seizure F th A d t bl h d i Fourteenth  Amendment  Ã‚  Ã¢â‚¬â€œ due  process Specific  statutes  and  regulations  (federal  and   Specific statutes and regulations (federal and state) Common  law Slide 8-137 Informed Consent U. S. firms  can  gather  and  redistribute   transaction  information  without  individual’s   i i f i ih i di id l’ informed  consent Illegal  in  Europe Informed  consent: Opt? in   Opt out Opt? out Many  U. S. ? commerce  firm s  merely  publish  information   p practices  as  part  of  privacy  policy  without  providing  for   p p yp y p g any  form  of  informed  consent Slide 8-138 FTC’s Fair Information Practices Principles Federal  Trade  Commission: Federal Trade Commission: Conducts  research  and  recommends  legislation  to  Congress Fair  Information  Practice  Principles  (1998): Fair Information Practice Principles (1998): Notice/Awareness  (Core) Choice/Consent  (Core) Choice/Consent (Core) Access/Participation Security Enforcement Guidelines,  not  laws Guidelines not laws Slide 8-139 FTC’s Fair Information Practice PrinciplesNotice/Awareness i / Sites  must  disclose  information  practices  before  collecting  data. Includes Sit t di l i f ti ti b f ll ti d t I l d identification  of  collector,  uses  of  data,  other  recipients  of  data,  nature  of   collection  (ac tive/inactive),  voluntary  or  required,  consequences  of  refusal,  and   steps  taken  to  protect  confidentiality,  integrity,  and  quality  of  the  data Choice/Consent There  must  be  a  choice  regime  in  place  allowing  consumers  to  choose  how   their  information  will  be  used  for  secondary  purposes  other  than  supporting   the  transaction,  including  internal  use  and  transfer  to  third  parties.Opt? in/Opt? out  must  be  available. Consumers  should  be  able  to  review  and  contest  the  accuracy  and   completeness  of  data  collected  about  them  in  a  timely,  inexpensive  process. Access/Participation ccess/ a c pa o Security y Enforcement Data  collectors  must  take  reasonable  steps  to  assure  that  consumer   information  is  accurate  and  secure  from   unauthorized  use. There  must  be  in  place  a  mechanism  to  enforce  FIP principles. This  can  involve  self? regulation,  legislation  giving  consumers  legal   remedies  for  violations,  or  federal  statutes  and  regulation. di f i l ti f d l t t t d l ti Slide 8-140FTC Recommendations: Online Profiling Principle p Notice Recommendation Complete  transparency  to  user  by  providing  disclosure  and  choice  options   on  the  host  Web  site. â€Å"Robust†Ã‚  notice  for  PII  (time/place  of  collection;   before  collection  begins). Clear  and  conspicuous  notice  for  non PII. before  collection  begins). Clear  and  conspicuous  notice  for  non? PII. Opt? in  for  PII,  opt? out  for  non? PII. No  conversion  of  non? PII  to  PII  without   consent. Opt? out  from  any  or  all  network  advertisers  from  a  single  page   consent Opt out from any or all network advertisers from a single page provided  by  the  host  Web  site.Reasonable  provisions  to  allow  inspection  and  correction. Reasonable  efforts  to  secure  information  from  loss,  misuse,  or  improper   access. Done  by  independent  third  parties,  such  as  seal  programs  and  accounting   Done by independent third parties such as seal programs and accounting firms. medical  topics,  sexual  behavior  or  sexual  orientation,  or  use  Social  Security   medical topics sexual behavior or sexual orientation or use Social Security numbers  for  profiling. Slide 8-141 Choice Access Security EnforcementRestricted  Collection Advertising  networks  will  not  collect  information  about  sensitive  financial  or European Data Protection Directive Privacy  protection  much  stronger  inà ‚  Europe  than  U. S. European  approach:   Comprehensive  and  regulatory  in  nature p g y European  Commission’s  Directive  on  Data  Protection   (1998):   (1998): Standardizes  and  broadens  privacy  protection  in  European  Union   countries Department  of  Commerce  safe  harbor  program: For  U. S. firms  that  wish  to  comply  with  Directive Slide 8-142 Private Industry Self-RegulationSafe  harbor  programs: Private  policy  mechanism  to  meet  objectives  of   Pi t li h i t t bj ti f government  regulations  without  government  involvement e. g. Privacy  seal  programs e g Privacy seal programs Industry  associations  include: Online  Privacy  Alliance  (OPA) Network  Advertising  Initiative  (NAI) CLEAR  Ad  Notice  Technical  Specifications Privacy  advocacy  groups Emerging  privacy  protection  business Slide 8-143 Insight on Business Chief Privacy Officers hi f i ffi Class Discussion Slide 8-144 Technological Solutions Spyware,  pop? p  blockers Cookie  managers k Anonymous  remailers,  surfing Anonymous remailers surfing Platform  for  Privacy  Preferences  (P3P):   Comprehensive  technological  privacy  protection  standard Works  through  user s  Web  browser Works through user’s Web browser Communicates  a  Web  site’s  privacy  policy Compares  site  policy  to  user’s  preferences  or  to  other  standards   such  as  FTC’s  FIP  guidelines  or  EU’s  Data  Protection  Directive Slide 8-145 How P3P Works k Figure  8. 2(A) Slide 8-146 Insight on Technology The Privacy T Th P i Tug of War: fW Advertisers Vs. Consumers Class Discussion Slide 8-147 Intellectual Property Rights Intellectual  property:Encompasses  all  tangible  and  intangible  products  of  human   mind Major  ethical  issue: j How  should  we  treat  property  that  belongs  to  others? Major  social  issue: Major social issue: Is  there  continued  value  in  protecting  intellectual  property  in  the   Internet  age? Major  political  issue: How  can  Internet  and  e? commerce  be  regulated  or  governed  to   g g protect  intellectual  property? Slide 8-148 Intellectual Property Protection Three  main  types  of  protection: Copyright Patent Trademark  law Trademark law Goal  of  intellectual  property  law: Balance  two  competing  interests  Ã¢â‚¬â€ public  and   B l t ti i t t bli d privateMaintaining  this  balance  of  interests  is  always   M i t i i thi b l fi t t i l challenged  by  the  invention  of  new   technologies Slide 8-149 Copyright Protects  original  forms  of  expression  (but  not   ideas)  from   being  copied  by  others  for  a  Ã‚   ideas) from being copied by others for a period  of  time Look  and  feel  copyright  infringement  lawsuits Fair  use  doctrine Fair use doctrine Digital  Millennium  Copyright  Act,  1998 First  major  effort  to  adjust  copyright  laws  to  Internet  age Implements  WIPO  treaty  that  makes  it  illegal  to  make,   distribute,  or  use  devices  that  circumvent  technology? ased  protections  of  copyrighted  materials Slide 8-150 Patents Grant  owner  20? year  monopoly  on  ideas  behind  an   invention Machines Man? made  products p Compositions  of  matter Processing  methods Invention  must  be  new,  non? obvious,  novel Encourages  inventors g Promotes  dissemination  of  new  techniques  through   licensing Stifles  competition  by  raising  barriers  to  entry Slide 8-151 E-co mmerce Patents 1998  State  Street  Bank  &  Trust  v. Signature  Financial   Group Business  method  patents Led  to  explosion  in  application  for  e? commerce  Ã¢â‚¬Å"business   L dt l i i li ti f â€Å"b i methods†Ã‚  patentsMost  European  patent  laws  do  not  recognize   M tE t tl d t i business  methods  unless  based  on  technology Examples Amazon’s  One? click  purchasing DoubleClick’s  dynamic  delivery  of  online  advertising Slide 8-152 Trademarks d k Identify,  distinguish  goods  and  indicate  their   source Purpose p Ensure  Ã‚  consumer  gets  what  is  paid  for/expected  to  receive Protect  owner  against  piracy  and  misappropriation Infringement Market  confusion Bad  faith Dilution Behavior  that  weakens  connection  between  trademark   and  product Slide 8-153 Trademarks & Internet CybersquattingAnticy bersquatting  Consumer  Protection  Act  (ACPA) Cyberpiracy Typosquatting Metatagging M i Keywording y g Deep  linking Framing Slide 8-154 Governance Primary  questions Who  will  control  Internet  and  e? commerce? What  elements  will  be  controlled  and  how? What elements will be controlled and how? Stages  of  governance  and  e? commerce g g Government  Control  Period  (1970–1994) Privatization  (1995–1998) Privatization (1995 1998) Self? Regulation  (1995–present) Government  Regulation  (1998–present) Slide 8-155 Who Governs E-commerce & Internet? Mixed  mode  environmentSelf? regulation,  through  variety  of  Internet  policy   and  technical  bodies,  co exists  with  limited   and technical bodies co? exists with limited government  regulation ICANN  :  Domain  Name  System Internet  could  be  easily  controlled,   I t t ld b il t ll d m onitored,  and  regulated  from  a  central   location Slide 8-156 Taxation E? commerce  taxation  illustrates  complexity  of   governance  and  jurisdiction  issues governance and jurisdiction issues U. S. sales  taxed  by  states  and  local  government MOTO  retailing E? commerce  benefits  from  tax  Ã¢â‚¬Å"subsidy† yOctober  2007:  Congress  extends  tax  moratorium  for   an  additional  seven  years an additional seven years Unlikely  that  comprehensive,  integrated  rational   approach  to  taxation  issue  will  be  determined  for   approach to taxation issue will be determined for some  time  to  come Slide 8-157 Net Neutrality Currently,  all  Internet  traffic  treated  equally  Ã¢â‚¬â€œ all  activities  charged  the  same  rate,  no   ll i i i h d h preferential  assignment  of  bandwidth Backbone  providers  would  like  to  charge   differentiated  prices  and  ration  bandwidth 2010,  U. S. ppeals  court  ruled  that  FCC  had  no   authority  to  regulate  Internet  providers Slide 8-158 Public Safety & Welfare Protection  of  children  and  strong   g sentiments  against  pornography Passing  legislation  that  will  survive  court   P i l i l ti th t ill i t challenges  has  proved  difficult Efforts  to  control  gambling  and  restrict   sales  of  drugs  and  cigarettes sales of drugs and cigarettes Currently  mostly  regulated  by  state  law Unlawful  Internet  Gambling  Enforcement  Act Slide 8-159 Insight on Society Internet Drug Bazaar Class Discussion Slide 8-160