Thursday, October 31, 2019

Carpooling apps marketing plan Essay Example | Topics and Well Written Essays - 500 words

Carpooling apps marketing plan - Essay Example The target market will be students as this is relevant for this course as these groups seeks to exploit cost minimization approach in their daily expenditure. Segmentation is equally exhibited by this app as various social classes share rides and donates differently with their comparatively average earners (Crawford, et al. 56). The positioning of this marketing plan is strategic and competitive since it works on the basis of cost saving to the commuters and offers a considerable discount on the overall recurrent expenditure on transport among the students. Consider strategic fit with host organization Carpooling apps is likely to gain much market coverage due to its integration of technology in the growing transport sector. With 511 and LYFT as the main products and San Francisco state university as the host organization, it is worth to note that the technological application by the firm is likely to be sustainable with its internal management structure. The external environment which can be attributed to the increasing adoption of technology by the young generation is a recipe to its sustainable operation performance in the market (Crawford, et al. 256).

Tuesday, October 29, 2019

Apple's marketing strategy in China Literature review

Apple's marketing strategy in China - Literature review Example The competitiveness of the global environment has been made possible by technological advances that have leveled the playing field for international businesses to penetrate cross-border markets (Friedman, 2007). Modern means of communication, which facilitates information gathering and business transactions, â€Å"allowing people around the world to compete, connect, and collaborate† (Cherunimal, 2010). Nor is the globalization trend limited to commerce and trade, such that â€Å"No institution, whether a business, a university or hospital, can hope to survive, let alone to succeed, unless it measures up to the standards set by the leaders in its field any place in the world† (Peter Drucker, 2007, p. 66). Several frameworks for international marketing planning have been conceptualized to capture its nature and scope, although the specific nuances of the process continues to evolve with the changing dynamics of globalization. Li and Li (2009) proposed an Internet-enabled , multi-agent-based hybrid framework, which was designed to address the three types of uncertainty conditions identified by Ashill and Jobber (2001), namely: state uncertainty, or the inability to forecast future events in the global marketing environment; effect uncertainty, which results from failure to understand the causes and effects of the changing environment; and response uncertainty, or the inability to predict how the market will respond to the changes. The framework is graphically portrayed in the following diagram: Figure 1: The Internet-enabled multi-agent-based hybrid intelligent support framework (Li & Li, 2009). The decision-making framework synthesizes the processes identified in earlier academic literature. Environmental scanning and monitoring involves the continuous observation of political, economic, social and technological events, and competitors’ moves (Jain, 1990). Strategic analysis assesses the strengths, weaknesses, opportunities and threats, evalu ates the principal criteria or factors which the firm must address. Management identifies the strategic intention, risk, synergy effects, and market attractiveness, and thereby defines the firm’s competitive advantage. Go versus no-go decision under uncertainty is a pass/fail test conditioned by fulfillment of the Go condition and failure of the No-go condition (Cohen, Rolph & Steffey, 1998). The decision-makers decide the course of action and possible alternatives to take, with cognizance of the state, effect, and response uncertainties. Entry mode selection under uncertainty is the choice of the manner in which the firm enters the target market, given the degree of risk and the level of market control (Chee & Harris, 1998). Finally, formulating marketing strategies is concerned with the means of achieving the defined marketing goals and objectives towards creating the competitive advantage defined for the firm. These processes will be more closely described in the following sections. In the hybrid model, the processes are carried out by multiple software agents, working in an Internet-enabled system through a suitable software architecture and underlying integration method (Li & Li, 2009). Table 1: International marketing envir

Sunday, October 27, 2019

Technique Of Video Streaming Using Opnet Tools Computer Science Essay

Technique Of Video Streaming Using Opnet Tools Computer Science Essay With the popularization of mobile technique, many users obtain various multimedia services through heterogeneous internet. Among these services, video streaming application is most challenging. Because of time constraint and VARIABLE BITRATE (VBR) property of a video, the problem of streaming high quality video in insufficient external WAN bandwidth. To solve this problems we are reviewing different technique like OPTIMAL CACHE ALGORITHM, MOSES (mobile streaming for video surveillances) etc. To make the good quality video streaming, we have to work on some different parameters like latency, image quality, video fluidity and frame losses. The mobile technique is most popularized and brought a great revolution in this 21stcentury.There are some terms like mobile video surveillance,video streaming which helps to do the mobile technology more and more advanced. This paper is basically focus on how the video streaming done using OPNET tools. For this we refer to the broad class of emerging real-time video surveillance. In mobile video streaming all the issues related with video garbing, processing, interpretation and dispatching of multimedia data becomes more challenging due to the presence of mobile platforms either in the transmitting or receiving side, wirelessly interconnected. For video streaming Givaldi and Prati proposed a streaming system called MOSES (mobile streaming for video surveillance), that effectively implements the described general purpose architecture for mobile video surveillance. MOSES supports video streaming in different condition, aiming at low-latency transmission over limited bandwidth network. The video stream is provided with a sufficient quality to be correctly analyzed by both human-based and computer-based video surveillance layers. To this aim we propose a optimization of the streaming process with an adaptive control of the streaming parameters. In this paper we also discussed how OPNET can be applied in modern video streaming technique. Network simulation is a major part of this OPNET modeler. It is useful to create the network and for the video streaming process. Basic steps which are used for video streaming technique are following:- Video Compression Principles and practice of video coding Basics behind MPEG compression algorithms Current image video compression standards Video Communication Video Streaming I Video application contexts examples: DVD and Digital TV Challenges in video streaming over the Internet Techniques for overcoming these challenges Video Communication Video Streaming II Video over loss packet network and wireless links à ¢Ã¢â‚¬  Ã¢â‚¬â„¢Error-resilient video communications Today There are lots of streamed video techniques are available till now. JPEG :- It is a joint photographic experts group, which is basically a single frame image compression. It mainly consists of minimum implementation, which are required to support some specific applications. MPEG:-It is a moving picture experts group. This process will work under the direction of ISO (International Standard Organization). In this basically, the ISO do coding of moving pictures. H.261:-This is one of the best processes found in the field of video compression. This process was completed with the help of algorithm known as motion compression algorithm. The H.261 video technique is use for the communication channel. RELATED WORKS:- In this paper we are reviewing different algorithms which are proposed by some reacher fellows on video streaming technique. They proposed different algorithms to resolve the problems of video streaming. In this paper, we are reviewing the following algorithms which are already proposed in the video streaming field. Cut-off Cache (CC) Algorithm :- This algorithm was proposed by Zhang et al. This algorithm use to handle the video staging process. In cut-off cache algorithm, the frames which are available inside the given video are sequentially compare with given cut-off rate. Cut After Smoothing Algorithm:- This is the next version of CC algorithm which was also proposed by Zhang et al. In this he had given the information about the utilization of WIDE AREA NETWORK bandwidth. This is also used to handle the video staging in more effective way. Optimal Cache (OC) algorithm:- The Optimal cache (OC) algorithm, is basically proposed to compute the video caching with linear complexity (O(n) , where n is the number of frames). The concept behind the OC algorithm is same as the CC algorithm but the main advantage is we can also use the concept of WAN bandwidth. Cache Selected After Smoothing Algorithm (CSAS). In this algorithm the researcher integrates two video processors and then combine it with cache selected process. After some years Chang,Ho and Oyang gave some other contribution on this field.They just tried to propose some other algorithms which is helpful for video streaming of high bandwidth. Priority Selected Cache(PSC) algorithm:- PSC algorithm is the modified version of the optimal cache algorithm. In this we have to select the frame data which are having maximum number of high priority. In this we have to replace the low priority frame with the high priority frames. Review Analysis:- In this paper we are basically dealing with the OPNET modeler. The original OPNET simulation model for MPEG-2 streaming was developed in the year 2000 by Srinivas Kandala and Sachin Despande. Theoretical Concepts:- Any video if we will take for an experiment it basically contain certain frames and that frames are having particular size. The following three variables which helps us for video streaming. Scene Length Distribution :-A particular movie or video which we have to compress is having certain scene in it. We have to divide those scenes with particular length. That process is called scene length distribution. Frame Size Distribution :- We know that one particular scene will contain certain frames . Now the frame type or size is essential aspect of model. Each and every frame has certain size. Stream Structure:- When we divide the particular video in certain scene and frame length than we can see that each scene containing certain pictures thats called GOP( group of pictures).This is called the stream structure. Node Model Design:- Now in this paper we are theoretically defining how we can create a node model using OPNET which helpful for us in video streaming technique. There are certain processes in OPNET by the help of that we can create a video streamed model. In OPNET we have to use constant bitrates stream (CBR). When we use CBR, the process model in OPNET is very simple, just use the standard. Simple source module and set the frame size and frame interarrival time to the desired value. When a stream is used scenes with high entropy get more bandwidth resulting in a higher visual quality. Because different streams tend to have high entropy. A scene at different moments in time, a bitrates is divided very efficiently, when several streams are transmitted over a packet switched network. Hence, by the help of this process we can easily make an OPNET model which helps in video streaming. CONCLUSION:- The theoretical concepts of video streaming using OPNET modeler are explained in this paper. An OPNET model was used to program low level process modules. The packet segmentation support allows the model to be used over several underlying protocols. The simulation results shows that it is based on the high level characterized in the time domain, the behavior of streamed video using OPNET models and streamed video using different algorithm is similar. For video streaming we basically have to follow some steps like video compression, video streaming 1, video streaming 2 etc. Current image and video compression standards:- STANDARD APPLICATION BITRATE JPEG Continuous-tone still-image compression Variable H-261 Video telephony and teleconferencing over ISDN P * 64 kb/s MPEG-1 Video on digital storage media (CD-ROM) 1.5 Mb/s MPEG-2 Digital Television 2-20 Mb/s H.263 Video telephony over PSTN 33.6-? Mb/s MPEG-4 Object-based coding, synthetic content, interactivity Variable JPEG-2000 Improved still image compression Variable H.264/MPEG-4 AVC Improved video compression 10s 100s Kb/s After reviewing all the above algorithm which are proposed till today we can conclude that , all the algorithm are used for different purpose in video streaming technique. Like some algorithms are used only for normal streaming but Cache Selected After Smoothing Algorithm (CSAS) and Priority Selected Cache (PSC) algorithm are basically used for the video streaming which are having very good quality with less bandwidth and low latency. The upcoming techniques for video streaming process are peer-to-peer, internet technique, wireless video streaming technique.

Friday, October 25, 2019

Race and Political Power in the Pre-Civil War Period Essay -- Essays o

Race and Political Power in the Pre-Civil War Period How did race translate itself into political power during this period, and how did Blacks attempt to combat that power. Racism has been the most provocative topic in American history; it has seemed to transcend other struggles, and fester its way into almost every facet of American culture. It has grown like weeds in an unattended garden in to the ideology of America. Politicians use it as a tool for reelection, corporations use it as a way to exploit, and the media uses it as a way to control. But the underlying question is where did it come from, how did it translate itself into political power, and how and what did African Americans do to combat that power. Many of the answers to these questions lie in the pre civil war area also known as the antebellum period. During the early 17th century a powerful farmer by the name of Nathaniel Bacon tried to use African Americans to conquer surrounding tribes and take their lands for indentured servants who had served their time and wanted land. Bacon added blacks to his corps of whites only after he found out he had to fight William Berkley the colonial governor. Berkley thought that arming the Jamestown rubble was too dangerous to be allowed. After Bacons death the Virginia government reacted to the spectacle of interracial servant solidarity by slowly eliminating white servitude and expanding the then new institution of black chattel slavery. By doing this he could guarantee a permanent labor force and win the support of his constituents. Because of efforts like that of Governor Berkley, Virginia had become the primary site for the development of black slavery in the Americas. By the 1650s some of the indentured servants had earned their freedom. Because replacements, whether black or white, were in limited supply and more costly, the Virginia plantation owners considered the advantages of the perpetual servitude policy exercised by Caribbean landowners. Following the lead of Massachusetts and Connecticut, Virginia legalized slavery in 1661. In 1672 the king of England chartered the Royal African Company to bring the shiploads of slaves int o trading centers like Jamestown, Hampton, and Yorktown. Slavery spread quickly in the American colonies. At first the legal status of Africans in America was poorly defined, and some, like European indentured servants,... ...ed afterward may have reached 100. But the rebellion lasted less than two days and was easily suppressed by local residents. Like other slave uprisings in the United States, it caused enormous fear among the whites, but it did not seriously threaten the institution of slavery. Less organized resistance was both more widespread and more successful. This included silent sabotage, or foot-dragging, by slaves, who pretended to be sick, feigned difficulty understanding instructions, and "accidentally" misused tools and animals. It also included small-scale resistance by individuals who fought back physically, at times successfully, against what they regarded as unjust treatment. The most common form of resistance, however, was flight. About 1000 slaves per year escaped to the North during the pre-Civil War decades, most from the upper South. This represented only a small percentage of those who attempted to escape, however, since for every slave who made it to freedom, several more tried. Other fugitives remained within the South, heading for cities or swamps, or hiding out near their plantations for days or weeks before either returning voluntarily or being tracked down and captured.

Thursday, October 24, 2019

Wikileaks Case Study

Case Facts: †¢WikiLeaks is an international, online, self-proclaimed not-for-profit organisation that publishes submissions of undisclosed and secret information, news leaks, and highly classified media from anonymous sources and whistleblowers. †¢The head of the online organisation, which was founded in 2006, is Australian born, Julian Assange. †¢Its purpose is to provide whistleblowers with a domain to publish their case to the public and preserve their identity (Lennon 2010). †¢Exposes various government and privately owned organisations. First major act of exposure was the publication of Republican vice-presidential candidate Sarah Palin's emails by WikiLeaks (DeFraia 2012). †¢Another act of exposure released on its website showed a US military helicopter firing at a group of enemy suspects, which were in fact Iraqi civilians including children (DeFraia 2012). †¢Since the release of this video, WikiLeaks has publicly aired millions of confidential pu blications (WikiLeaks 2012). †¢WikiLeaks publishes war logs from Iraq: 400,000 confidential US documents on the Iraq war from 2004 to 2009 (DeFraia 2012). Interpol put Julian Assange on most-wanted list. Suspected of rape. As a result, Paypal cuts off WikiLeaks from using its services, thus ceasing donations (DeFraia 2012). DECISION MAKER: A decision maker by definition is someone who administers a business (Farlex 2012). In the case of WikiLeaks, according to the definition, this would be Julian Assange as he is the head of the WikiLeaks organisation. Ultimately it is Assange’s decision to release classified information to the general public through his website. ETHICAL ISSUES AND ASSUMPTIONS:The assumption that can be made in this case is that Julian Assange was always aiming to smear the reputation of certain organisations and expose classified information. His WikiLeaks website provided him with the medium to do this as it allowed people wanting to expose classified information to do so as an anonymous source. The controversy surrounding the WikiLeaks case, and discussion by the general public, centres on whether it is ethical to release private and confidential information to society. This is the main issue that the organisations that are being exposed are arguing as it is damaging to their reputation.Another issue is that from the perspective of the organisations that are hiding this confidential information. Should they be ethically bound to release all information that may affect the general public to society? In reality, WikiLeaks is acting unethically by invading people’s privacy in order to expose them, and is it really to the benefit of society? However, they argue that what they do is public disclosure whistleblowing, and they argue that the public has a right to know what its government is doing (Cox 2010). ETHICAL DILEMMA: The ethical dilemma in this case is found to be: To release classified information to the general publicO R Not to release classified information to the general public These two dilemmas have undesirable outcomes for the decision maker and all parties concerned. Releasing the information to the general public will cause continued criticism of WikiLeaks plus create a backlash for the organisations involved. To not release classified information to the general public could see organisations continue to get away with unethical acts. UTILITARIANISM: There are numerous parties who are directly and indirectly affected by both considered actions. These groups are: †¢Julian Assange †¢General public Informants releasing information to WikiLeaks (Whistleblowers) †¢Targeted organisations †¢Employees of targeted companies/organisations †¢WikiLeaks employees From a utilitarian framework point of view all of the above mentioned stakeholders need to be analysed on how the ethical dilemma will affect each of them. There will be positive and negative consequences for each of the parties, be it in the long term or short term. To release classified information to the general public †¢Julian Assange oReceive ongoing criticism and scrutiny from affected parties – short/long term oContinued support from whistleblowers – long term General public oWill continue to be informed about unethical practices by certain companies and organisations – long term oIncreased scepticism of large organisations and governments – long term †¢Whistleblowers oContinued support of WikiLeaks as a medium for publication of classified information – long term oEasy and anonymous alternative to traditional whistleblowing – short term †¢Targeted organisations oLoss of reputation because of the revelation of unethical practices – short/long term oMistrust from the public in the organisation because of unethical practices – short/long term oLoss of productivity – short/long term Employees of targeted organisations oAffected through downturn of productivity, which may result in them being made redundant/sacked – short/long term †¢WikiLeaks employees oRetain employment – long term Not to release classified information to the general public †¢Julian Assange oNo information to release – long term oCease in funding – long term oTermination of WikiLeaks as an organisation †¢General public oWon’t be made aware of unethical practices – long term †¢Whistleblowers oLose the medium to anonymously expose organisations partaking in unethical acts – long term †¢Targeted organisations Confidential information remains classified – long term oMaintain positive productivity – long term oReputation remains intact – long term †¢Employees of targeted organisations oWill maintain employment – long term †¢WikiLeaks employees oWill lose their jobs – long term Recommendation: When applying the utili tarianism framework to the ethical dilemma, the greatest good for the greatest number applies. In this case, the greatest good for the greatest number would be for WikiLeaks to release the classified information to the general public as they are the greatest number.This decision would negatively affect the organisations that are being exposed as well as their employees. Even though employees at these firms may subsequently lose their jobs because of the exposure of confidential information, the general public will be the greater benefactor as they will be made aware of the immoral actions of these organisations and thus be more cautious when it comes to interacting with them. Therefore I recommend the release of information to the general public. KANTIANISM: From a Kantian view point, the decision maker is obligated to act in the best interests of the general public as they are the main stakeholders.From the ethical dilemma, which is either to release classified information to the g eneral public or not to release classified information to the general public, two maxims are developed. In this case they are: To always be honest with the general public Or To never be honest with the general public Applying the Categorical Imperative: To always be honest with the general public The above maxim passes the universalisable test, as every organisation must always be honest with the general public, as then organisations will always be trusted and maintain a high standard of integrity.The maxim, to always be honest with the general public, also passes the Respect for Persons test, as the decision maker is being honest to the public and fulfilling his duty by respecting them as people. This maxim also passes the autonomy of rational beings assessment as it is not restricting their right to freedom of information. This action passes all the Categorical Imperative criteria, thus the maxim is ethical. To never be honest with the general public Again, using the universalisab le test, the second maxim does not pass.If every organisation is dishonest then this will lead to distrust of organisations concerned by the general public. As for the respect for persons test, this maxim also fails. As honesty is a sign of respect, then being dishonest to the general public is not respecting them as human beings. The last Categorical Imperative, autonomy of rational beings, also fails because the intent of the decision maker is to supply honest information to the general public, which in this case he would not do. Overall, this maxim fails in all three Categorical Imperative criteria, thus the action in unethical. Recommendation:From a Kantianism point of view, a maxim must pass all three Categorical Imperative tests in order for it to be declared ethical. In this case, the second maxim failed to pass all three tests and therefore cannot be judged ethical. However, the first maxim, to be honest with the general public, passed all three criteria and therefore can be determined as an ethical course of action for the decision maker. With regard to the case, the recommendation would be for WikiLeaks and Julian Assange to release classified information to the general public. RIGHTS ANALYSIS: The below rights are concerned with this ethical dilemma:Julian Assange †¢The negative right to freedom of speech, which obligates others not to take this right away from him. †¢The negative right to autonomy, which obligates other people to abstain from taking this right away from him. Informants releasing information to WikiLeaks (Whistleblowers) †¢The negative right to freedom of speech, which obligates others not to take this right away. †¢The negative right to autonomy, which obligates other people to abstain from denying this right. Targeted organisations †¢The negative right to confidentiality, which obligates others to refrain from denying them this right. The negative right to make decisions from a business perspective, which obligates others to resist from taking this away from them. †¢The negative right to autonomy, which obligates other people to abstain from denying this right. General public †¢The positive right to freedom of information, which obligates others not to deny them of this right. Clash: Under the rights framework, there is a clash between Julian Assange’s right to freedom of speech and the targeted organisation’s right to confidentiality. Recommendation: Due to the clash, it must be determined which right overrides the other.The targeted organisation’s right to confidentiality is deemed to be more important in the scheme of the situation in relation to Assange’s right to freedom of speech by releasing the information. As the information that the organisations are keeping confidential is often very sensitive, Assange must respect this right of these organisations. Therefore, it is recommended that the decision maker (Assange) not release the informat ion under the rights framework. CONFUCIAN ETHICS: Using this ethical framework, the ethical dilemma must be analysed against the relevant Confucian virtues. Ren:This virtue relates to humaneness with the goal of benefiting a workplace, community, sub-group or any relevant stakeholders. In relation to the case, Julian Assange can be seen to be acting humanely by informing the community of the wrongdoings of the organisations concerned. Yi: This virtue relates to righteousness or justice and involves doing what is ethically just in a certain situation, particularly from a business sense. In relation to the case, Assange is acting as a moral character by considering what is best for the general public and in turn acting justly and rightly by releasing the classified information to the public.Xin: This virtue relates to integrity and faithfulness. In relation to the case, Assange is acting with integrity by exposing wrongdoings to the general public and thus acting in adherence to moral and ethical principles. He is also displaying faithfulness to WikiLeaks followers as he continues to release information even though he is under scrutiny from various areas of society. Recommendation: In examining the case study against the relevant Confucian virtues it can be recommended that it would be appropriate for Julian Assange to release the information to the general public.In following the golden rule, do not do to others what you would not like done to yourself, I would not like important information kept from me. Therefore Assange is acting in accordance with this framework by releasing the information. FINAL RECOMMENDATION: In summary, after analysing the ethical dilemma against the four ethical frameworks, it can be concluded that the morally just course of action for the decision maker, Julian Assange, would be to release classified information to the general public. All four frameworks produced the same outcome through their different processes.From the organisatio ns’ viewpoint, they would like to keep the publications as classified as possible, however it is impossible for them to prevent parties who are aware of the information informing WikiLeaks of the wrongdoings. The act of supplying information to WikiLeaks is becoming increasingly popular because of the anonymous factor and is becoming a more favoured way of whistleblowing as there are no repercussions. A mitigation strategy for this case is not exactly clear cut. It’s hard for WikiLeaks to find an effective strategy that is as impactful and informative to the public.The strategy I have decided on is that Assange can inform the relevant authorities in a private manner if any organisations have demonstrated illegal activities, and only report on specific activities that are illegal. This will mean that the organisations that do have confidential information to protect will remain confidential. This strategy will also mean that the whistleblower will remain anonymous. This is a strategy similar to WikiLeaks, however it will mean that only the illegal actions are exposed and reported to the necessary authorities for them to announce to the general public. REFERENCES:Cox, T 2010, ‘Is WikiLeaks brave or unethical? ’, National Public Radio, 10 November 2010, viewed 21 September 2012. ; http://www. npr. org/2010/11/30/131699467/is-wikileaks-release-brave-or-unethical; DeFraia, D 2012, ‘WikiLeaks Timeline: key moments’, Global Post, 16 August 2012, viewed 21 September 2012. Farlex Inc 2012, Princeton University USA, viewed 22 September 2012. Lennon, R 2010, ‘Case Study of the WikiLeaks Whistleblower’, Dublin City University, viewed 21 September 2012. ; http://www. ruairi. info/ethics. pdf; WikiLeaks 2012, no source recorded, viewed 21 September 2012. ; http://wikileaks. org/;

Wednesday, October 23, 2019

Presentation Of Behaviorism And Social Learning Essay

Learning about how and why people and animals alike behave in a specific way has always been a topic of interest that spans even in the Olden Times, hence, Behaviorism came about.   It is a theory which takes learning as the result of the actions of the environment on the learner. ( Denis & Phillips, 2003, p.7 ).   Associated with this theory is the view of tabula rasa, where the mind has nothing and that all information our mind has is a result of the experiences we go through.   Under Behaviorism are the following types of learning: Classical Conditioning, which depicts the connection between stimulus and response. (Davis, 2002, p.166)   Imagine a new born baby who cried because it was slapped by the doctor on the buttocks. The slap on the buttocks was the stimulus, and crying was the response to that stimulus. Operant Conditioning deals more with the positive and negative outcomes of a response, simply put, positive and negative reinforcements.  Ã‚   For example: a child studies hard because every time that child gets high grades, a gift is given to that child.   The giving of the gift reinforces the child’s behavior to earn high grades for the long-term.   Another type of learning that falls under Behaviorism is the Social Learning Theory, which involves the observation of admirable things, which are thus, modeled or mirrored.   (Kafai, 2004, p.129). This learning theory can be summed up through these words: â€Å"Learning by Observation.† A child following the footsteps of an elder sibling who has been recognized due to excellent grades can be a good example of the Social Learning Theory in application.   The Self-Efficacy Theory, a theory that falls under the Social Learning Theory also plays an important role in psychology. It states that the person’s perception of what he or she can do or is capable of, makes that person choose actions that will pave the way for him/her reaching set goals.   Personality Development/Self-Confidence Books/Courses embody self-efficacy, as it is common knowledge that if you believe in yourself, more often than not, you succeed in a task. Behaviorism, I believe, can be used for self-understanding and self-improvement. References Davies, Martin. (2002). The Blackwell Companion to Social Work. Britain: Blackwell Publishing. Denis, Charles., & Phillips, Jonas F. Soltis. (2003). Perspectives on Learning.   New York: Teachers College Press. Kafai, Yasmin B. (2004). Embracing Diversity in the Learning Sciences. Yorkshire: Routledge.

Tuesday, October 22, 2019

Womens Economic Role In WWII essays

Women's Economic Role In WWII essays Coming only 21 years after the war to end all wars, World War II plunged the United States into yet another worldwide conflict. This brought significant changes to everyone's lives, especially those of American women. Until the 1940's, women usually got married at a young age. They did housework and took care of their children while their husbands went to work to support the family. In fact, during the depression, the federal government joined with local government, school boards, and private business to exclude married women from the work force (Woloch 301). All of this changed forever with the onset of World War II, which opened numerous opportunities for women. During the Depression years of the 1930's, many changes took place. Men were losing their jobs, and family life was severely stressed. "Middle class families had a sudden decline in status. In such families, wives often moved in to fill a power vacuum" (Woloch 285). "Contradictory pressures" were brought to bear upon women wage earners (Woloch 287). "Public attitudes urged them not to work, but economic circumstances both spurred wage labor and in some instances made jobs available" (Woloch 287). While there was significant job loss suffered by both men and women during these years, due to the "segregated occupational patterns" of women's jobs and the fact that "men did not seek 'women's work,'" women were "protected to an extent" by a division of labor within the work force (Woloch 287). While many women maintained jobs, employment in some cases was very difficult. Wages were low and working conditions were unpredictable with "layoffs or speed-ups" (Woloch 288). While "Fra nces Perkins sat as Secretary of Labor in Franklin Roosevelt's cabinet, massive male unemployment brought forth demands that married women be dismissed from jobs in order to spread the work" (Janeway x). At about this same time, the National Recovery Administration permitted lower minimum w...

Monday, October 21, 2019

buy custom Military Changes Then and Now essay

buy custom Military Changes Then and Now essay Introduction To some several Americans, they have known only one part of life; being part of the military. Generations of male family members and now females have been moving from one base to another being part of the armed forces. These men and women have protected the country during times of unrest. Different changes have been effected in the military over the years. This paper will examine the military history from then and now. The changes Todays military is of course very different from that of our great grandfathers and those who came before them. Presently, there are greater options for the military members unlike in the past. The advancements come in such areas as education, the decision to allow women to hold combat positions, allowing black women to serve in the military, private sector employment. The state of housing for the military has also changed. There have been several changes throughout in terms of housing. The military housing sector has I fact advanced in great leaps and bounds. The old days barracks have been replaced with modern accommodations. These modern units are full featured installations with a sports arena and other recreational opportunities on the ground. They also contain family support areas like those in education, medicine, and counseling (Adams, G). History of the Battle Dress Uniform The Battle Dress Uniform otherwise known in short as the BDU has been used by the military and from 1981 to 2005 has been the same. Initially there were two types of the BDU which were designed for hot weather and the other for temperate weather. The hot weather type had a coat and a pant made up of 100 percent cottn while for temperate made of a nylon and cotton blend. These uniforms were criticized for easy fraying. They were later replaced in 1996 with an enhanced hot weather BDU. With constant ongoing research, better BDUs have been created. Modern BDUs for example use a dye that prevents detection from NIIC (Near Infrared Image Converters) which helps soldiers to avoid detection by allowing them to blend with the surrounding (Kelly, E). Over the years, the military has embraced several changes on recruitment of members to the service. Then, it was so controversial to integrate blacks into military. Things have changed so fast that now black women have, although it is a work in progress, these women can now and largely serve in the military alongside the men. And also for the first time recently, the first female submariners are now training, a great obstacle they have overcome which was unthinkable of in the past. Then the official policy of the US military since the civil war was to keep the white and Negro races segregated. In fact Negro soldiers were assigned to Negro units as they were regarded as being unsuitable for combat. But now the situation is different as even the commander in chief is a black, President Obama who is the US president. (Time CNN). The military has thus earned a reputation as a meritocracy where minorities as well as women can flourish. Another change is the repeal of the DADT policy otherwise better known as the dont ask dont tell policy. Gays and lesbians now serve openly in the military. This is a new social challenge that has not been there. In 1993, President Bill Clinton signed the US military dont ask dont tell policy that prohibited anyone demonstrate(s) a propensity or intent to engage in homosexual acts" from serving in the armed forces because "it would create an unacceptable risk to the high standards of morale, good order and discipline, and unit cohesion that are the essence of military capability." (Johnson, R.). The DADT policy banned all military lesbian, gay and bisexual members from openly serving in the military. A bill was later introduced into the house and repealing the DADT. In December 2010, the bill was passed and now all these diverse sexual oriented groups can now openly serve in the military (Religious tolerance). Last but not least we examine the military satellite communications, then and now. According to Mak King, the Military satellite communications have become so essential that the military have to use them during combats. In the past though, satellite communications was not as important as it is today. But over the years, there has been increased demand for capacity and this has called for improved satellite designs. New improved satellite communications have been developed to combat higher level crimes and this has been possible with technology advancements over the years (King, M. and Riccio, M.). Conclusion Over the years, the phase of the military has undergone leaps and bounds to change its face and its operations. Several aspects have changed over time and this include; their housing units and standards, allowing minorities and women to serve in the military and even higher ranks, lifting of the DADT which now allows gays and lesbians to serve openly in the military and last but not least is the improvement of communications tools used to combat crime and this has been made possible thanks to technology advancements. Of special interest is also the BDUs which have been changed to prevent detection from NIIC (Near Infrared Image Converters. Buy custom Military Changes Then and Now essay

Sunday, October 20, 2019

A Tree Grows in Brooklyn Vocabulary Terms

A Tree Grows in Brooklyn Vocabulary Terms Betty Smiths first novel,  A Tree Grows in Brooklyn, tells the coming-of-age story of Francie Nolan and her second-generation immigrant parents struggling to provide for their family. Its widely believed Smith herself was the basis for the character of Francie. Heres a vocabulary list from A Tree Grows in Brooklyn. Use these terms for reference, study, and discussion. Chapters I-VI: tenement: an apartment building, usually in a low-income area, that is without luxury amenities ragamuffin: a child whose appearance is unkempt and uncivilized cambric: a finely woven white linen interminable: long and dull with little sign of ending (or terminating) premonition: a warning or feeling about something that will happen in the future (usually negative) vestibule: a reception area or foyer, often in a school or church Chapters VII-XIV: fetching: attractive or pretty, beguiling peculiar: unusual or suprising, out of the ordinary bucolic: of or in the countryside, literally a shepherd or cowhand sprig small shoot or twig of a plant, usually decorative or garnish filigree: a delicate ornamentation or detail usually gold or silver, on jewelry banshee: from Irish folklore,  a female spirit whose high-pitched wailing signals an imminent death (on the) dole: unemployed and receiving benefits from the government. Chapters XV-XXIII: prodigious: impressively large, awesome languorous: without energy or liveliness, sluggish gallantly  do something in a brave or heroic way dubious: having doubt or uncertainty, skeptical horde: a large unruly crowd saunter  to walk at a leisurely pace relegate: to demote or assign to a lower category Chapters XXIV-XXIX: gratis: free, without cost contempt:  disrespectful dislike conjecture: opinion based on incomplete information, speculation surreptitious: secretive, sneaky vivacious: animated, lively, happy-go-lucky thwarted: prevented from accomplishing something, disappointed sodden: drenched, thoroughly soaked Chapters XXX-XXXVII:   lulled: calmed, settled down putrid: decaying with a foul odor   debonair: sophisticated, charming lament: to mourn, or feel sad about a loss fastidious: having exacting attention to detail Chapters XXXIII-XLII: contrite: apologetic, feeling sincere regret for a misdeed contorted: twisted or misshapen infinitesimal: so small as to be irrelevant or unmeasurable Chapters XLIII-XLVI:   contemptuously: disrespectfully, disdainfully poignant: creating or evoking a feeling of sadness or empathy genuflect: to kneel and show deference or reverence especially in a house of worship vestment: garment worn by a member of clergy or religious order Chapters XLVII-LIII: vaudeville: variety show with comedic and slapstick performances rhetorically: speaking in a theoretical or speculative manner, not literally mollify: to pacify or appease matriculate: to enroll and pass through a school or course of study munitions: collection of weapons Chapters LV-LVI: prohibition: forbidding, or, period in American history when alcohol was illegal. jauntily: cheerful and arrogant, lively sachet: small perfumed bag This vocabulary list is just one part of our study guide on A Tree Grows in Brooklyn. Please see the links below for other helpful resources: Review: A Tree Grows in BrooklynQuotes from A Tree Grows in Brooklyn

Saturday, October 19, 2019

British Petroleum Research Paper Example | Topics and Well Written Essays - 1000 words

British Petroleum - Research Paper Example With reference to the studies conducted by Vassiliou (2009), it is of essence to first note that British Petroleum (BP) is British multinational Oil and Gas Company, which has established its operations in over eighty countries across the World. Additionally, the company is ranked as the third largest energy company in the World and the fourth largest company in the word in terms of revenue earned. Norse and Amos (2010) in their writings stated that on the 20th of April 2010, there was an explosion at the coast of Louisiana, which originated from BP’s deep-sea petroleum rig that was used for drilling purposes. Following the explosion, the rig burnt down for more than thirty hours before it finally sank into the deep sea and during this time the hydrocarbons in the deep-sea oil reserve had started leaking onto the Gulf of Mexico and it took eighty-seven days to close the leak. According to Juhasv (2011), the accident at the deep sea caused the death of eleven people most of whom were employees of the company, and several people who were near the site of the accident suffered severe injuries. In addition, the oil spill resulted into one of the worst environmental pollution in the world history and it even caused certain illnesses that were related to the spill exposure to those who participated in the clean-up exercises and some of the residents of the gulf region. In regards to the company, it suffered huge economical expenses in the clean up and compensation exercises. This present research paper mainly seeks to analyze the communication strategy adopted by the company after the explosion and in what ways the company could improve its crisis communication strategies. According to Kotter (2012), when an organization is faced with any crisis, it is always important to communicate with all the stakeholders in order to maintain good relations with them. Equally, when BP was

Friday, October 18, 2019

Management Info Systems Project wk6 Essay Example | Topics and Well Written Essays - 250 words

Management Info Systems Project wk6 - Essay Example The practice of e-commerce increases with increasing demand of goods in the online platforms, necessitating the integration of the supply chain management a process that poses challenges in the contemporary business world. Geunes researches on the application of supply chain and e-commerce in an organization. The book provides answers to the research questions in the project because it expounds on the benefits of integrating e-commerce and supply chain management as well as the paybacks that result from its integration. Navid’s article covers the roles of e-commerce in the supply chain management as a means of minimizing cost. The article presents details about the e-commerce process and research literature as well as a description of the requirements and necessities in the contemporary competitive world. It will be useful in understanding the relevance of e-commerce in supply chain management. Rekha explores further the impacts of e-commerce on supply chain management. He has highlighted and provided insightful thoughts that will greatly assist in the final project. Therefore, journal article will help in the achievement of objectives in the project as it reveals the major impact of e-commerce on supply

Kant and plato Essay Example | Topics and Well Written Essays - 1500 words

Kant and plato - Essay Example These perceptions, in turn, are not just consequences of an examination or analysis of judgments of experience into their inseparable parts. According to Kant, before â€Å"a judgment of perception can become a judgment of experience; it is requisite that the perception should be subsumed under some concept of the understanding.† (41) From this perspective, perceptions would supposedly lead us to make our judgments and that synthesis appears only in so far as the priori conceptions of the understanding enable us to go beyond the particular judgment of perception and to turn them into universal judgment of experience. To prove, according to Kant, the possibility of experience in the context of the a priori concept of understanding, one needs to represent what belongs to judgments in general and the various moments of the understanding in them. (42) Kant explained that understanding provided us with the categories that we could use in order to judge experience. He argued that this is particularly useful in judging ideas, such as the soul, God or freedom – things that are beyond experience. Understanding in his philosophy is not unlike judging, specifically when the act is done to unite representations in a consciousness. Again, the fundamental elements here are the intuition as well as Kant’s concept of the noumena or things in themselves, existing outside our intuitions such as Kant’s metaphysical knowledge which abstracts from all experience. â€Å"Experience,† wrote Kant, â€Å"consists of intuition, which belong to sensibility, and of judgments, which are solely the understanding’s business.† (43) This explanation is one of Kant’s depictions of interrelating and interdependent elements required in order to achieve knowledge. To clarify possible confusion, Kant summed his analogies in this way: â€Å"the business of the senses is to inuit; that of the understanding, to think.† (Kant

Exercises from pan text Essay Example | Topics and Well Written Essays - 1000 words

Exercises from pan text - Essay Example This is because the necessity of the qualitative research needs to be presented and analyzed, thus providing for more than just a basic study of the literature. At this point, I am actually thinking of using both qualitative and quantative literature reviews. I feel that a combination of the two will provide for a very successful literature review, rather than just simply covering one concept only. If my audience is my professor or my committee, typically they do not give set expectations regarding topic selection. Rather, this is the responsibility of the researcher. At this point, I do not have any questions, as I am still brainstorming and gathering my research. Since there are no ideas to analyze present in question 1, the scale is not necessary. However, to provide something to answer the question, I would ask about the best way to make a topic not too specific or not too general for this type of research discussion. I rate this as a 5, simply because it is one of the most important things to consider prior to researching—if a topic is too large or too small, the research will not go well. Professional journals have assisted me with topic ideas. They also have helped me to identify possible topics. Because I am able to see the types of research previously presented, I have been able to decide if I would want to analyze a different aspect of various studies and thus provide something new to the research community. At this point, I am interested in reviewing some of the study instruments provided in some of the other research studies in order to get ideas on how I may approach my own. So far, I think surveys are one of the best tools for gathering research, because they are quick, effective, and allow for the gathering of appropriate information. I have not brainstormed topic ideas with other students yet, but I do think that if I did, this could be quite helpful simply because my peers may provide

Thursday, October 17, 2019

System Development - Tools and Techniques Essay

System Development - Tools and Techniques - Essay Example The causes of information systems failure may therefore include: - lack of research, risk management criteria as well as long term commitment. In terms of costs and their required functions, the implementation of information systems becomes more complex day by day. Mere assumptions that an individual is in the position of managing and IS project without conducting thorough prior research, formal training, and the engagement of required expertise would be a lie (Korac-Boisvert and Kouzmin 1995). In line with the same, all the stakeholders of an information systems management right from the management, Information technology staff and the leadership ought t be engaged. Risk determination with regards to the project needs to be undertaken as well as factors such as budget overruns and delays needs to be researched and distributed normally before the project is initiated (Westrup 1998). The facilitation of this elaborate plan is majorly only possible when the management engage all partie s in setting a more realistic period under which any given form of information system is delivered. The second cause of failure is the, â€Å"acceptability† of failures. ... Despite being involved in repeated high profile failures you will find that a health institution still succeeds in winning over 60% of government contracts with the only looser being the taxpayer. The training given the high demand for their services at present does not seem to be of any significance as failure seems and order of the day and hence acceptable or to an extent is even expected. The third cause is the lack of user buy-in and ownership. It should be noted that despite an introduction of change, there is need to convince the users of the efficiency that is likely to arise out of a given new system. These would include the onset of better work practices and better patient in the unique environment of the National Healthcare System (Slater 1996). Due to the pragmatism portrayed by most clinicians, the above factors may be of much value to them as well as the convenience brought about by the use of information technology system. Overlooking the end users of a system may be qu ite detrimental; consulting them should therefore be of priority since this would enable the establishment of systems, which are of great relevance to the users of such information (ParA and Elam 1998). An example in the healthcare system would be the implementation of the Computerized Physician Order Entry Systems. Such a system is of much benefit to the management since they provide them with detailed information to enable their scrutiny of the physicians. On the other hand, there is no addition to the daily practice of the physician since with the slowdowns of the systems what results is more frustration (Westrup 1998). The system becomes even more redundant

Wednesday, October 16, 2019

Walden - A Treatise on Transcendentalism Example | Topics and Well Written Essays - 500 words

Walden - A Treatise on Transcendentalism - Term Paper Example Living with a meagre amount of income, he built a home and enjoyed the most rustic freedom available to mankind. Moreover, Thoreau alleged in the tome that over-dependence on literature was never an effective conduit towards transcendence or the ideal conception of one’s spiritual condition against the lure of worldly facets or sensual perceptions; spiritual success can be attained through individual intuition or experience. The magnificent natural surroundings endowed to us by Mother Nature is goading us to live simply and to concentrate on the elemental sounds of nature such as the rustling hum of the leaves, the chirping of migratory birds, the ringing of the chapel’s bells, the jangling and muffling of wagons, the farm animals moaning, and the tiny creatures flirting. The last chapter of the book condemned the American preoccupation with success and excessive affluence that were vestigial to their pursuit of happiness. Thoreau compassionately encouraged humanity to alter their lives for the wellness of the spirit and not for the mounting of wealth and material possessions. He epitomized these pieces of advice by means of passages interspersed in the book such as â€Å"sell your clothes and keep your thoughts,† and â€Å"say what you have to say, not what you ought.† Furthermore, Thoreau denounced conformity because this administrative demand hinders the genuine journey of humanity towards happiness and contentment; individuals, as he accepted, should follow what their hearts and minds utter because only though self-discretion will a person obtain a blissful subsistence. The masterpiece of Thoreau generally criticizes the debilitating fixation of the Western culture towards consumerism and materialism which in the long run will spawn the obliteration of nature. The venture of Thoreau towards simplicity has three objectives; primarily, the endeavour was performed to elude the global weakening effect of the Industrial Revolution.

System Development - Tools and Techniques Essay

System Development - Tools and Techniques - Essay Example The causes of information systems failure may therefore include: - lack of research, risk management criteria as well as long term commitment. In terms of costs and their required functions, the implementation of information systems becomes more complex day by day. Mere assumptions that an individual is in the position of managing and IS project without conducting thorough prior research, formal training, and the engagement of required expertise would be a lie (Korac-Boisvert and Kouzmin 1995). In line with the same, all the stakeholders of an information systems management right from the management, Information technology staff and the leadership ought t be engaged. Risk determination with regards to the project needs to be undertaken as well as factors such as budget overruns and delays needs to be researched and distributed normally before the project is initiated (Westrup 1998). The facilitation of this elaborate plan is majorly only possible when the management engage all partie s in setting a more realistic period under which any given form of information system is delivered. The second cause of failure is the, â€Å"acceptability† of failures. ... Despite being involved in repeated high profile failures you will find that a health institution still succeeds in winning over 60% of government contracts with the only looser being the taxpayer. The training given the high demand for their services at present does not seem to be of any significance as failure seems and order of the day and hence acceptable or to an extent is even expected. The third cause is the lack of user buy-in and ownership. It should be noted that despite an introduction of change, there is need to convince the users of the efficiency that is likely to arise out of a given new system. These would include the onset of better work practices and better patient in the unique environment of the National Healthcare System (Slater 1996). Due to the pragmatism portrayed by most clinicians, the above factors may be of much value to them as well as the convenience brought about by the use of information technology system. Overlooking the end users of a system may be qu ite detrimental; consulting them should therefore be of priority since this would enable the establishment of systems, which are of great relevance to the users of such information (ParA and Elam 1998). An example in the healthcare system would be the implementation of the Computerized Physician Order Entry Systems. Such a system is of much benefit to the management since they provide them with detailed information to enable their scrutiny of the physicians. On the other hand, there is no addition to the daily practice of the physician since with the slowdowns of the systems what results is more frustration (Westrup 1998). The system becomes even more redundant

Tuesday, October 15, 2019

Security Basics Essay Example for Free

Security Basics Essay Hardware firewalls are integrated into the router that sits between a computer and the Internet. They typically use packet filtering, which means they scan packet headers to determine their source, origin, destination addresses and check with the existing user defined rules to make an allow/deny decision. . Speed: Hardware firewalls are tailored for faster response times, so it can handle more traffic loads. Security: A firewall with its own operating system is less prone for attacks. This in turn reduces the security risk and in addition, hardware firewalls have enhanced security controls. No Interference: Since the hardware firewall is an isolated network component, it can be managed better, and does not load or slowdown other applications. The firewall can be moved, shutdown, or reconfigured with minimal interference to the network. Fortinet firewall. Its the most prominent hardware firewall proposed by Gartner technology research group which is widely used for Internet security. The key features of Fortinet hardware firewall are: Intrusion Prevention System (IPS) The IPS monitors network activities for malicious or unwanted behavior and can react, in real-time, to block or prevent those activities. AntiVirus/AntiSpyware/AntiMalware The advanced Antivirus technology ensures real-time protection against a multitude of attacks at the network gateway. Support two types VPN (SSL, Ipsec or Site-to-site) with bi-directional content filtering. Inspects all major protocols like SMTP, POP3, IMAP, FTP, HTTP. Software firewalls are installed on individual servers. They intercept each connection request and then determine whether the request is valid or not. Software firewall process all requests by using the server resources. Apart from performance limitation, the software firewall has numerous advantages. While comparing with the hardware firewalls, software firewalls are easier to configure and setup. Through the software firewall, we can restrict some specific application from the Internet. This makes the software firewall more flexible. The software firewall give users complete control on their  Internet traffic through a nice user friendly interface that requires little or no knowledge. Linux, CSF (ConfigServer Firewall) provides proven security via the control panels like cPanel, DirectAdmin and Webmin. From there, its quite easy to modify configurate files and stop, start and restart the applications. This makes configuring and managing the software firewall very simple. For windows, its recommended to stick on with the default windows software firewall because the third party software firewall will make the server overloaded and this leads to poor server performance. Task 2: McAfee, Panda, Norton, AVG, and Kaspersky all provides trail versions for their products. Only Panda, and AGV offer free versions of their software. Trojans horse programs in computing is generally a non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm. This is usually contracted ironically when trying to rid your pc of viruses through online sites which are fakes and in fact introduce you to one. Malicious email attachments are a way for a sender to transmit files to another user via email. In a similar way to junk mail coming in your door at home, email users regularly receive unsolicited emails from unknown senders. These emails can often contain links to malicious web sites or have attachments containing malicious software. Usually contracted from opening emails from known unknown sources. Drive-by- downloads A drive-by download refers to the unintentional download of a virus or malicious software (malware) onto your computer or mobile device. A drive-by download will usually take advantage of (or â€Å"exploit†) a browser, app, or operating system that is out of date and has a security flaw. You get this by visiting websites running malicious codes. Task 3: Full Backups are- a complete backup of everything you want back up. Restoration is extremely fast because you’re only backing up one set. Drawback is the backing up process is slow, and requires high storage. Differential Backups look at which files you have changed since your last full backup and then creates copies of all the files different from that  one. Faster to create than full backups, restoration is faster than using incremental backup, and not as much storage is required as a full backups. Drawbacks are restoration is slower than a fullback, and creating differential backup is slower than creating an incremental backup. Incremental Backup- creates copies of all the files, or parts of files that have changed since the previous backups of any type. This method is the fastest when creating a backup, and requires the least storage space. Drawbacks it’s the slowest for restoration because it may require several sets of data to fully restore. Backups should be stored off-site because it’s a secured way of keeping files away from hackers, and potential virus, its always important to check to make sure it still functional. A cold backup site is little more than an appropriately configured space in a building. Everything required to restore service to your users must be procured and delivered to the site before the process of recovery can begin. As you can imagine, the delay going from a cold backup site to full operation can be substantial. There are the least expensive to maintain. A warm backup site is already stocked with hardware representing a reasonable facsimile of that found in your data center. To restore service, the last backups from your off-site storage facility must be delivered, and bare metal restoration completed, before the real work of recovery can begin. Hot backup sites have a virtual mirror image of your current data center, with all systems configured and waiting only for the last backups of your user data from your off-site storage facility. As you can imagine, a hot backup site can often be brought up to full production in no more than a few hours. Hot backup site are the most expensive approach to disaster recovery. Task 4: The password I choice to use was â€Å"Don’t worry about what life brings to you worry about how you’re going to deal with it!†Dwawlbtywahygtdwi24

Monday, October 14, 2019

Changing roles of men and women in Australia

Changing roles of men and women in Australia Right, role, freedom for women and changing role between men and women was questioned in today society. Especially in Australia a very multicultural nation where one in four of its 22 million people were born overseas, have a parent who was and four million speak a language other than English. This essay will point out shifting roles of men and women by examining womens rights in different aspects of that multicultural society such as Health, Work, Politics, Popular culture, Home family and Education. Let go back to the 1930s. At that time, the men worked and earned money. The fathers were usually far away from their children. Whereas, the women just stayed at home and took care of home and children. It was generally accepted that womens roles were as Kindergartener and home-keeper. In the other words their destiny were getting married, having Childs and dedicating their lives to the requests of their husbands and children. This was part of the culture that men and women understood their places in society and accepted it. Furthermore, it was believed that if women work after the marriage, they were slack in their responsibility to their husbands and children. It also could be seen as being lax their obligation to the nation. This is because at those days evolving the number of the nations population was one of the most important problems. Therefore, people believed that settling the countrys population was womens duty. For these reasons just unmarried women often had good jobs. A working married woman was considered to be taking a mans job, however they were paid less than men. In addition to, Marriage and divorce laws favored men in terms of custody of children and rights to property. All of those were these sorts of inequalities. In the Second World War shortages of labour caused by so many men joining the armed forces opened the door for many more women to work. That was the beginning of change. Many women took up jobs that had previouslydominated by males such as Politics, military affairs, scientific research. Moreover standards of living changed. Technology has developed and it was reforming peoples lifestyles and domestic roles were altered by the invention of washing machines, vacuum cleaners and electricity. For many women this helped to save a lot of time in housework. Therefore since they have more great opportunities to study and contribute for society and following their interest. Many women have now reached higher situations within politics, the occupations and even business in Australia. Further more the introduction of the contraceptive tablet allowed people to more easily plan their families and decide to space their children. That brought a decrease in the number of children in each family. It also allowed married women to pursue careers without the worry of pregnancy interfering with their plans. In addition, much laws has been put in place that purpose to make equal opportunities for women in the workspace, such as good pay, childcare, anti-discrimination and rules against sexual harassment. For example during the 1980s women took leading roles in the nations affairs. In 1981 Senator Janine Haines became the first woman leader of a major political party-the Australia democrats. In 1986 Justice marry Gaudron was the first women to become a judge of the High court and 1989 Rosemary Follett became the first female chief minister of the ACT (Bereson 2001, p.3). And recently Julia was first sworn as the 27th Prime Minister of Australia on 24 June 2010. She was not born in Australia but she is a migrant. This event does not only mean but also confirms the great role of women in Australian society. As a results Australia has become one of the first nations in the world giving women the rights to vote and to be seated in parliament. From that the women in Australia now achieved higher positions within politics. It is no longer considered that these opportunities are not available to women. Indeed Besides politics, women also more successful in many different fields such as art and culture, sports, even in business. For example Louise Sauvage won a gold medal in Sydney Olympic Games 2000 (Costain 2003, P.4). Robin Archer-a woman of many talented she is a singer, writer and a director. She was artistic Director at Melbourne festival art in 2003 (Costain 2003, P.12). Even very traditional organizations such as religion, churches have changed their attitudes towards women, for example the Anglican Church in the mid-1980s in Melbourne accepted women to be ordained as ministers. Today in secondary schools and universities more women than men educated, and more women than men advanced in bachelor degrees in university. In 2006, women make up for 54.8 per cent of all tertiary education students and 47.5 per cent of all students enrolled in training courses and vocational education. The common were joined in society and culture, management and commerce, hospitality, food indust ries, and personal services courses. Also there are more than 30 per cent of small business operators in Australia are women. Women hold 57 per cent the Australian public service workforce and 36 per cent of senior executive situations. (Women-towards equality) The changing roles of women and greater participation in all levels of society, has led to the role of men to change. Men are now expected to be part of a household management team. In the other word they are ready to share domestic work with their wife. That never ever happened in 1930s. This has caused anxiety in men with traditional backgrounds. They are not sure of their roles any more. However In fact, women are still in a tougher situation than men when it approaches to vocations and work in general. Child care can be difficult to secure and is often too costly. For example if a child is ill it is usually the mother who will be likely to take their time off work to take care them. The greater responsibilities of teaching children, which are still considered womens responsibilities, mean that it is so tough for women to get full-time work especially in jobs requiring overtime. Because of this, instead of full time women usually have to do casual jobs or part-time. Most of these works are not career-orientated positions, so it is not realizable for women to reach higher positions in their work. Furthermore womens attendance is especially strong throughout common culture. Womens image in film clips, movies, magazines, television shows, newspapers and even news programmers is often as a sexualized decoration. There for Women have often been discriminated against, esp ecially on sexual harassment, even at work. Ultimately, any change also has two sides. Although the position of women in Australia society has been confirmed, it also means their responsibility is heavier. Especially in some fields that require physical strengths, superior skills and health. These things women are inferior to men. However all string of success mentioned above helped to break down traditional ideas about what women could or could not do. It made women more visible in public society and enabled them to lead lives that were much nearer to mens lives in standings of liberty and selection.

Sunday, October 13, 2019

Fetal Alcohol Syndrome Essay -- Pregnancy Health Essays

Fetal Alcohol Syndrome Many studies have established that a developing organism is susceptible to exogenous and endogenous factors during certain stage of the organism’s development. The effects of ethyl alcohol or ethanol on the developing fetus, which manifest a variety of characteristic abnormalities, are collectively called Fetal alcohol Syndrome. Ethanol exposure to the fetus causes various malformation ranging from the cellular to the organismic levels with the eventual results frequently being different levels of mental retardation (3). Chick embryo studies provide a relatively good model for defining the effects of ethanol at many organizational levels of neurogenesis, cell death, neuronal migration and differentiation, cell to cell connectivity, and synaptic function When ethanol is administered to embryos on days one to three of development, the cholinergic neuronal phenotypes were markedly decreased possibly in the sparing of catecholaminergic phenotypes which were increased. This differential sensitivity of these two early neuroblast populations to ethanol may also reflect the difference in their ontogenesis: cholinergic elements are reported to be expressed as early as the primitive streak, whereas catecholaminergic elements appear later (3). Embryos on embryonic day one are most susceptible to the effects of ethanol. Embryonic day one in the chick is marked by an active process of neurogenesis and neuro-organization. The neural tube elements are made during this early embryonic period. Brodie and Vernadakis inspected the effect of ethanol on cholinergic spinal cord neurons during this embryonic period. The neuroblast during this period shows plasticity with respect to neurotransmitter phenotypes, when ex... ...s in these target organs at critical developmental periods would result in defects of these organs (5). BIBLIOGRAPHY: Abel, E. and Sokol, R. A Revised Conservative Estimate of the Incidence of FAS and Its Economic Impact. Alcoholism, 0145-6008:514-524 (1991). Bonthius, D. and West, J. Permanent Neuronal Deficits in Rats Exposed to Alcohol During the Brain Growth Spurt. Teratology, 44:147-163 (1991). Brodie, C. and Vernadakis, R. Critical Periods to Ethanol Exposure During Early Neuroembryogenesis in the Chick Embryo: Cholinergic Neurons. Developmental Brain Research, 56:223-228 (1990). Burd, L. and Martsolf, J. Fetal Alcohol Syndrome: Diagnosis and Syndromal Variability. Physiology and Behavior, 46:39-43 (1989). Keir, W. Inhibition of Retinoic Acid Synthesis and its Implications in Fetal Alcohol Syndrome. Alcoholism. 15/3:560-564 (1991).

Saturday, October 12, 2019

The Tragically Paradoxical Role of Women in Ancient Roman Society :: Essays Papers

The Tragically Paradoxical Role of Women in Ancient Roman Society In nervous preparation for the essay section of my history final, I found myself fascinated by Livy’s anecdotes concerning the common thread of violence against women. Livy, a Roman historian, wrote a significant number of volumes concerning the ride and fall of the Roman Empire. Three stories in particular, the rape of the Sabine women, the rape of Lucretia, and the death of Verginia, shed light on the ancient Roman female as a surrogate victim blamed for her gender and sexuality in relation to men. While considering the themes of March’s Women’s HerStory Month and now April’s Domestic Violence Awareness month, I thought it might be relevant to raise awareness of women’s struggles during this time. Such a reflection would spur progress towards a society that fosters nonviolence and gender equality. One should note how the women involved in these stories face a fundamental and perhaps ethical paradox in their situation. Many articles in learned journals refer to Livy’s rape of the Sabine women as a myth, but I believe a kernel of truth shines through this supposed fiction to reveal how the aggressive and selfish character of the early Romans imposed themselves on the lives of unknowing, innocent Sabine women. In 715 BC, Rome was experiencing rapid expansion so Romulus, the current leader, faced a problem in his ambition to increase the population. There existed no intermarriage among neighboring communities and consequently, the Romans felt resentful. Due to a shortage of woman, the Romans actually faced extinction at this time. So Rome staged a celebration of the Consualia, a festival in honor of Neptune, patron of the horse. Citizens came from nearby towns such as Caenina, Crustumium, Antemnae, and all the Sabines. However, when the show began, all the able-bodied Roman men rushed through the crowd and seized all the young women. As a result, war broke out between the Sabines and the Romans and it was the woman who actually emerged to unite their husbands and fathers, blaming themselves for the war (while they were the true victims). Livy claims that the nature of a women’s heart caused them to sympathize with their husbands, who had kidnapped them and taken them from their homes. â€Å"The men, too, played their part: they spoke honeyed words and vowed that it was passionate love which prompted their offense. No plea can better touch a woman’s heart† (Livy 44).

Friday, October 11, 2019

Marketing Research Project

This is a proposal of marketing search project that is conducted by group A. Ben & Jerry is chosen as our search target company. In the first part of this proposal, you can find detailed background information of Ben & Jerry, which gives a rough description of its four â€Å"P† (price, promotion, place and people). In addition, it also covers several issues about the European ice cream market. The next part of this proposal is mainly discussing marketing management problems.You can find out Ben & Jerry‘s symptoms, suspected causes of its marketing management problems, Ben& Jerry’s actions and its consequences. Besides that, we listed several questions to help us analyze customers’ buying behavior and the main methods we will used in order to finish our survey. The schedule and sampling plan will give you a full picture of our project progress. Ben & Jerry’s Market Research Background Proposal 3 Plan of Approach BACKGROUND Market and Brand of Choice F or the Marketing Research project 2005/2006 we chose to do our marketing research within the ice cream industry, in the Netherlands.The Ice Cream industry in the United States developed rapidly; nowadays they have started to expand their market to other continents such as Europe and Asia. We can find so many international ice cream brands in Europe, especially in the Netherlands such as Haagen Dazs, Ben & Jerry’s, and Australian. Among the various international brands that are popular around the world, we are most interested in Ben & Jerry’s. We have noticed that Ben & Jerry’s is one of the most popular brands one can discover around big cities.Furthermore, we decided to go for Ben & Jerry’s because we will benefit by doing research in The Netherlands since Ben & Jerry’s is under the Unilever, which is part of the Unilever Group owned by the Netherlands-based Unilever N. V. and UK-based Unilever PLC, which is also one of the biggest consumer produc t company. Ice Cream Market Issues Sales of impulse ice cream are set to register positive value growth of 5. 5% during 2003, reaching a value of EUR 216. 8 million stimulated by good weather at the beginning of the summer season and dynamic impulse in terms of new product development and advertising.In volume, sales are expected to increase by 2%, indicating a marked preference for the higher value innovations introduced by leading manufacturer Unilever. Much of the growth are predicted to be driven by dairy-based impulse ice cream, which is the most popular product in the Netherlands with sales accounting for nearly 70% of total volume. Ben & Jerry’s Market Research Background Proposal 4 Plan of Approach Furthermore, the single portion dairy ice cream is expected to register higher value growth in 2003, at 8. %, which lead to improving the performance of previous years due to a combination of better weather and intense brand and product promotion. Important Issues about the Brand Ben & Jerry’s are using special characteristics for their brand that are simple to pronounce, recognize, and remember. The cow and green environment behind their logo is depicting their awareness of quality and benefits. Ben & Jerry’s tries to acknowledge their customers that they always use natural and fresh milk, always keep clean and green environment while producing their ice cream.To promote and to prove their mission, Ben & Jerry’s uses special slogan like â€Å"From Cow to Cone†, â€Å"Lick Global Warming†, â€Å"Organic Ben & Jerry’s†, and â€Å"50 Ways to Promote Peace†. Since Ben & Jerry’s target market is ranging from kids to elderly people (Family), they have to ensure that there is an existence of brand awareness in specific segments. For kids, they would be more interested in the ice cream packages or paper with their favorite cartoons, such as Disney’s characters or Warner Bros.For adults and elderly people, they would take into consideration more about the nutrition facts, taste, and low-fat ice cream. Thus, it will be more interesting for them to see â€Å"Organics, low sugar, or low fat Ice Cream†. Ben & Jerry’s are using brand extension to develop their brand. They have produced thousand of ice cream flavors under the name of one successful brand, which of course is â€Å"Ben & Jerry’s†. They have extended its brand to organic ice cream, original ice cream, scoops menu, bars original ice cream, single original ice cream, and single novelties with different choice of taste in each product.

Thursday, October 10, 2019

African American and American Society Essay

African Americans No matter where or when a person lives, skin color, beliefs, class, or history he/she will see a difference in the way every ethnic group is treated. This world has never been fair for anyone. Life can treat a person with the greatest of care or it will treat a person as if he/she is lower than dirt. African Americans are no different. They have faced great hardships and triumphs throughout the years. Since they had been forced from their homeland they have been treated as if they had no rights or thoughts of their own. They were placed in the status of slaves even though they were human beings too. No matter if they were placed in the minority group by the dominate majority group of white Americans they remind structurally pluralism by keeping to their beliefs and traditions. Before and after slavery African Americans did not receive equal treatment. â€Å"Even when slavery ended, Jim Crow laws went into effect meaning that the very best of everything was reserved for white’s only-school, jobs, neighborhoods, hospitals, etc. † (Moore, 2008). In other words, the African Americans took the subordinate status to the dominant white Americans. Their race was used to dictate what rights they would be allowed to have in America. At one point, they did not have the right to be free and over the years they were given that right back. Even though they regained their right to be free, they still were not very free. They were only allowed to eat in certain places, drink from certain fountains, and ride in the back of the bus. This is not what would be called very free. They were not even given the opportunities to receive a quality education or to vote. â€Å"With the 1896 Supreme Court decision in the case of Plessy v. Ferguson, the separate by equal doctrine was upheld, and the system of segregation in the South was securely in place† (Merger, 2012, pg. 169). When it came to getting a quality education, they were placed at the bottom of the totem pole. The whites receive the best opportunities for receiving a quality education while the African Americans were not. It was not until the Brown v. Board of Education of Topeka case that African Americans were allowed a better education. â€Å"Separate schools were inherently unequal and imposed an inferior status on black children, causing irreparable psychological change† (Merger, 2012, pg. 173). The rights as citizens were also being denied by not allowing them to vote and make a proper living to take care of theirfamilies. Years ago, African Americans were not allowed to vote, so they had no say in the laws that were made that would deny them their rights as American citizens or human beings. This kept them from changing the laws that kept them from achieving economically and politically. The Civil Right Movement began a new era for African American. It was their gain of the right to vote and be elected to office that gave the some power over their rights as human beings and citizen in the economic and political environment. Even after everything that the African Americans have gone through, they still face prejudice and discrimination in all areas of their lives. It is no wonder that for some it feels as if it is never over. No matter what a person looks like, how he/she talks, their beliefs, where he/she lives, how much money he/she has, or what race he/she may come from we all bleed red and where cut from the same cloth. We all deserve to have the opportunities and resources that are out there to help better ourselves. African Americans are human beings too and they have the same rights as everyone else.

Wednesday, October 9, 2019

Huck Finn’s Consciousness

In Mark Twain’s quote, â€Å"a book of mine where a sound heart and a deformed conscience come into collision and conscience suffers defeat† evidently has symbolism. The deformed conscience in this quote refers to southern society in Huckleberry Finn’s world, while the sound heart refers to individuality and Huck Finn being an individual. There are many influences that contributed to Huck Finn’s â€Å"deformed society†. Some are the southern society he grew up in, the fact that Jim is a slave, his heart and individuality, and the fact that he feels that Jim is a person and not a slave.In Huckleberry Finn, Huck and Jim, a slave, take many adventures together. The problem is that the time period is pre-Civil War. Slavery is still huge in the South and blacks are looked down upon. This troubles Huck and often causes internal conflict. Southern society in this time period was difficult. Huck was often struggling with the fact that his society was tellin g him one thing, but he believed another. Society has a huge affect on Huckleberry’s feelings and actions and often cause conflict. This society has â€Å"deformed Huck’s conscience† because he doesn’t know what to believe or what is right.Another thing that deformed his conscience was the fact that Huck thought of Jim like a person and a friend, and not a slave. This was a problem for a few reasons. First of all, tying back into southern society, Jim was a slave and he was looked down upon. No one would think of befriending a slave, let alone trying to help him escape. Huck, however, is trying to escape himself from his society and environment with his dad. In today’s world, the society still affects the way we respond and think. Like Huck, if our society tells us one thing that we don’t agree with, we have trouble.Most people would want to fit into their society and do what everyone else believes, but sometimes it doesn’t work out. Today’s society runs in a way that influences everyone around us. There are many forces, however, that attempt to change the â€Å"deformed conscience†. These forces can be known as leaders in society. People from the president to world-wide leaders can help change this process and can change how society affects people in the community and their take on life and the society around them.

Tuesday, October 8, 2019

Project and operations management Essay Example | Topics and Well Written Essays - 2250 words

Project and operations management - Essay Example Several external factors however are of concern when it comes to developing new products for the company (The Times 100, 1995). Such factors may include the need to develop low carbon products, increasing energy security and addressing the impacts on global warming. The research and development for the company operates on a model of push and pull where airs out to manufacturers their new developments so as to drive new technological innovations and the pull where the focus shifts towards market demands; what their customers want. The company’s major challenge is mainly technical or economic. With increasing complexity in technology, then the more people are needed by the company to overcome this challenge (The Times 100, 1995). But it has proved to be another challenge for the company to recruit more skilled workers that will be able to remain competent and enable ARM maintains its position in the market. Executive summary A project is typically a collaborative enterprise (Blu m, 1986). It usually involves research that is conducted frequently, involving a carefully planned research design that sets to achieve a given aim. Projects are social systems within organizations that are constituted by teams to accomplish given tasks within a given period of time (Spottydog, 2003). A project is usually conducted by school going and university students or by organizations. For school going students it may require the students to undertake fact finding and analysis from either secondary sources of information or from empirically gathering data (Yuan-Yi, 2001). The final output is usually in the form of a dissertation. The dissertation will contain sections of the whole projects inception, inquiry methods analysis, finding conclusions and most at times would require them to make suitable recommendations (Konecny, 2006). On the other hand for organizations it will consist of a temporary task that is undertaken in order to create products that are unique and satisfact ory services many at times in pursuit of satisfying the growing and changing demands of consumers such as the case of ARM mentioned above. (Morris Peter, 2007). Therefore the objectives of the given project will determine the target status at the end of the whole project. This will be necessary to achieve the planned benefits or the aims of the project. For example, in many countries engineering projects are specifically defined by legislation and requires that any engineering project should be carried out by only the registered engineers and companies for constructing buildings, industrial facilities, and transportation of infrastructure and such like other duties (Pinto, 2001). In such cases the project scope will be well defined within a contract from owners of the project and the engineering and construction companies. This kind of project has two major phases which are design and construction. Design phase involves drawing and calculations and the next which is the final phase will be to send the project plan to a developer who will do the construction work (Archibald, 1992). Project Brief A project in its self if a process and any process usually involves a set of interrelated actions and activities that have to be carried out in order to achieve a pre-specified result or services. The

Monday, October 7, 2019

Australian Rural Health-The Role Of Nursing Practice Essay

Australian Rural Health-The Role Of Nursing Practice - Essay Example The recruitment and retention is a challenging aspect as the growing need for rural health care demands more and more skilled and service oriented individuals. The employees especially ladies have to work in the alien work environment. The responsibility will be more and accountability will be more when compared to the nurses working in the urban environment. The job activities demand more individuality and pressure handling mentality to cope with the emergencies arising. The supporting staff and equipment will be less when compared to nurses working in urban hospitals The future projections state that there will be an acute shortage in the rural health camps as many skilled veterans will be retiring. The recruitment pace didn’t gather momentum. The demand for the skilled workforce in nursing was not met. The retention is another major hurdle as the individuals are isolated from the social and family to serve the community. The employees cannot avoid their personal life for lo nger durations and opt to retain them which may affect the service pace of the community health services. The employees will not be paid extra for opting to work in rural areas. The salaries are not encouraging to them to perceive the job with more confidence and with dedication. The growth will be at snail pace where their counterparts in cities earning more. The performance appraisal and incentives are not provided to lift their spirits. Moreover, the nurses have to accommodate to the new culture and traditions to serve in the remote areas.... extension of the nursing role into that of many other health professions; The recruitment & retention of the nurses The recruitment and retention is a challenging aspect as the growing need of rural health care demands more and more skilled and service oriented individuals. The employees especially ladies have to work in alien work environment. The responsibility will be more and accountability will be more when compared to the nurses working in the urban environment. The job activities demand more individuality and pressure handling mentality to cope with the emergencies arising .The supporting staff and equipment will be less when compared to nurses working in urban hospitals The future projections state that there will be an acute shortage in the rural health camps as many skilled veterans will be retiring .The recruitment pace didn't gather momentum. The demand for the skilled workforce in nursing was not met. The retention is another major hurdle as the individuals are isolated from the social and family to serve the community. The employees cannot avoid their personal life for longer durations and opt to retain them which may affect the service pace of the community health services. The employees will not be paid extra for opting to work in rural areas. The salaries are not encouraging to them to perceive the job with more confidence and with dedication .The growth will be at snail pace where their counter parts in cities earning more. The performance appraisal and incentives are not provided to lift their spirits. More over the nurses have to accommodate to the new culture and traditions to serve in the remote areas.. Workplace issues, include safety, intra- and inter-professional relationships, maintaining

Sunday, October 6, 2019

Pros and Cons of Police Gratuities Essay Example | Topics and Well Written Essays - 500 words - 1

Pros and Cons of Police Gratuities - Essay Example This means that gratuities in the police force are for favors, called for now or later. Secondly, issuing gratuities to police officers is a way of seeking preferential treatment. Newburn argues that businesses that offer gratuities are in essence encouraging greater police presence near their business (Newburn 10) Additionally, gratuities are a form of temptation to many officers. An officer who is used to a free lunch at a kiosk is easy to manipulate, to accept a bribe disguised as a gratuity. Furthermore, once officers are used to gratuities, they take it as an obligation of members of the public to give it before they can receive the services. This, in turn, becomes a habit and only a few who can afford to pay to receive the services. Acceptance of gratuities imposes a sense of obligation to the officer accepting the gratuity. Therefore, the officer bears the obligation to deliver a request for service or favor. Gratuities also expose officers to biased judgment since they are likely to treat the members of the public who give them gratuities with favor. Firstly, police work involves a lot of risk. According to Martin, â€Å"In police work, results are measured in such terms as the number of arrests and amount of weapons and drugs recovered† (Martin web). These risk activities carried out by police officers calls for a form of appreciation in form of gratuity, at least to appreciate their hard work. Secondly, it is a form of appreciation for service offered besides their line of duty. For example, an appreciation after offering services where two vehicles had an accident qualifies as a gratuity. It is rude for a police officer to refuse an appreciation by the parties. Thirdly, it can be argued that gratuities are so small to cultivate any favor.

Saturday, October 5, 2019

(consumer behavior) Essay Example | Topics and Well Written Essays - 1000 words

(consumer behavior) - Essay Example Questionnaires with appropriate scales were used to randomly collect data from people in different areas in an undisclosed city in the UK. After testing for validity and reliability, the collected data were quantitatively analysed using the structural equation modelling together with invariant tests with age and gender as moderators; those aged between 17 and 40 were considered as young while those above 40 were taken to be old (Aroean 72). It was found out that innovativeness could be a predictor of playful consumption and brand consumption though the latter does not predict playful consumption. This is an important article in understanding the role that consumers and behavioural perspectives play with regard to playful consumption. Organisations would find this research important in satisfying â€Å"innovative, playful consumers† thus the need for playful product brands (Aroean 70). As such, brand managers could retrieve relevant information to boost brand loyalty and share. Interestingly, the research reveals that switching brands does not pass as a predictor of playful consumption which means that marketers should not be concerned with their innovative customers who find varied play brands. But even so, these consumers would need to be constantly supplied with new playful rewards in form of new products so as to avoid adaptation. Nonetheless, the use of random sampling makes this study less desirable to marketers seeking to penetrate specific target markets with specific products. Eckhardt, G. M. and Houston, M. J. â€Å"On the Malleable Nature of Product Meaning in China.† Journal of Consumer Behaviour 7.6 (2008): 484 – 495. Wiley Online Library. Web. 29 October 2012 It is known that customers attach various meanings to products guided by context. But little research has been done to determine the source of this variation. Just like the other consumers, Chinese consumers hold multiple meanings