Saturday, August 31, 2019

Pi foods solution

Suggestions to resolve the problem regarding the irregular visit of the sales person to the C and D class Retailers and Shortage of supplies to the distributors. Irregular visit of the salesperson: a) We can give good amount of Incentives to the salesperson who visit the C and D class Retailers 2, 3 times in a week. B) We can also make a minimum visit criteria which Is must for every salesperson, for E. . Every salesperson must veils the C and D class retailers minimum 2 times In a week. C) The more the salesman sold the reduces to the C and D class retailers the more Good Incentives he will get For E. G. We will also give him free tickets to Movies or If he performs very well than we can give him a free International tour, In this way the salesperson gets motivated and they start visiting the c and D class retailers more often.Shortage of supplies to the Distributors a) Difference in Forecasted sales figures and the Factory production figures is happened every time, because most of the time the production capacity of the factory s limited and it cannot be extended immediately as it involves high cost and additional equipment's to increase the production, so when this problem arrives when forecasted sales figures doesn't match the factory production figures in that case company can make a policy in which it can explain that our production capacity is only this For E. G. E can only produce 100 cigarette's in a week or our production capacity is limited to only 100 cigarettes per week and this policies can be explained o the C and D class retailers, that we can only supply 100 cigarette's in a week not more than that but we can give you special discount if u buy from us or we can supply u these cigarette's at a cheap rate than anyone else in the market in that case retailers will buy the cigarette's despite of the Sales forecast that shows 200 cigarettes is going to sold this week but only 100 cigarettes are supplied.In this way we can resolve the mismatch proble m of sales forecast and Factory production figures. ) We can clearly explain the production capacity to the retailers, that our production capacity is only this, but we can give u special discount If u buy from us. In this way the retailers will buy from us despite of what there Sales forecast says. A) We can give good amount of incentives to the salesperson who visit the C and D which is must for every salesperson, for E. G. Every salesperson must visit the C and D class retailers minimum 2 times in a week. ) The more the salesman sold the reduces to the C and D class retailers the more Good incentives he will get For E. G. We will also give him free tickets to Movies or if he performs very well than we can give him a free international tour, in this way the salesperson gets motivated and they start visiting the C and D class retailers more often. A) Difference in Forecasted sales figures and the Factory production figures is when forecasted sales figures doesn't match the factory production figures in that capacity is only this, but we can give u special discount if u buy from us.

Friday, August 30, 2019

Payment Methods in Ecommerce

With the rapid advancement in technology and the expansion of business, more and more companies are venturing into E-commerce in a race to grow not just regionally but also internationally. E-commerce adaption necessitates the change of the business model companies have been following traditionally and with it comes the change in the modes to make the payments.With the popularity of the internet for common use in business since 1990, E-commerce has been growing and touching the new horizons in every category of business , there are organizations today that depends heavily upon the E-commerce and there are examples amongst the fortune 500 giants which have seen tremendous growth in the era of E-commerce conducting the business online .(â€Å"Microsoft†,n. d) When the companies conduct business online the modes of financial payments become different from that of the traditional business payment ways like cash , checks, debit cards etc.Since while buying online, there is generall y no physical presence involved and customers could order the products sitting anywhere using their computers. B2B ( Business to Business)E-commerce today accounts for more than the 95 percent of total E-commerce and the B2B E-commerce means both the buying companies and the selling companies are the organizations and which consequently refer to larger amount of payment flow which is linked with buying or selling the products online , so electronic payment systems that are in place have to be very advanced when it comes to preciseness, security, privacy and the speed of processing the amount. â€Å"Turban et al† , 2004) There are always risk associated with the information that could be revealed over the internet while making a transaction and could lead to something unexpected like misuse of the instruments like credit cards and E-checks used to make the payment online. In an effort to make electronic payments more robust and error free, there are various protocols that are being utilized to encrypt the information being sent over the internet and these protocols differ in the encryption techniques. (â€Å"Electronic Commerce,† n. ) E-commerce is based on an ever advancing technology that gives birth to high end safety measures that could be applied while making the financial payments over the internet however internet Frauds, thefts still take place and need to be addressed since E-commerce is growing and would keep on growing at a fast pace as companies look to expand and make technology their platform for success in the retail market particularly. Introduction E -commerce is not limited only to buying and selling it also is an effective way of facilitating the inter and intra organizational flow of information and providing the customer service.There could be more than one way to define the E-commerce depending upon the prospective of the business and application of the technology, from a business prospective E-commerce is application of tech nology to make business more automated when it comes to day to day transactions and work flow, similarly if applied to the service industry E-commerce would mean a tool to address the service costs at the same time increasing the quality and speed of the service.The essay touches the various modes of electronic payment systems that are being used today as part of E-commerce today however it particularly concentrates upon online credit card payment systems, the terms related to the credit cards, their transactional process over the network, protocols that make credit card transaction secure over the internet . Some evolving electronic payment methods are simply electronic version of existing payment systems such as paper checks and credit cards and some other are based on the digital currency technology.Essay also focus upon the various protocols which exist to encrypt the information that is being sent over the internet to make the transaction exact and secure, the encryption techno logy that is being used along with the algorithms implanted in the cryptography techniques, the advantages and disadvantages of the various mode of payments that could make a difference when customers are concerned about the privacy and the security while making a transaction online keeping in view the amount of transactions that would take place in day to day business have been discussed since with increase in number of transactions number of thefts, frauds will also increase.Concept and Size of Electronic Payment Since payment systems use the electronic and computer networks, the nature of these payments is more complex than payment systems used in the conventional commerce so companies dealing in E-commerce should constitute frequent practice in banking. Most common form of the payments in E-commerce are payments made in Business to Business since they make more than 95 percent of total E-commerce payments today and these are executed through a proper network of electronic commun ication that would include digital telephony , IP telephony and use of internet to complete the transaction. (Turban et al, 2004 ) The amount of payment made in the electronic payment system varies from one type to another of the E-commerce; the payments that are made in the Business to Business E-commerce are quite higher than what are made in Business to Consumer or Consumer to Business types of the E-commerce.There are transactions that may range from $1 to $ 10 which generally take place in Business to Consumer form only and by their nature are known as the micro payments. Payments up to $ 500 are still mostly done under Business to Consumer form of E- commerce however are not considered micro payments, example of this could be buying a customized laptop from the Dell website which could cost around $500. (Danial, 2002) Payments higher than $1000 would generally fall under Business to Business E-commerce since individual customers who have to make a purchase bigger than this amo unt would preferably like to buy the products physically. â€Å"B2B transactions account about 95% of e-commerce transactions, while others account about 5%†. Turban et al, 2004 ) Modes of Payment in Electronic Payment system in E- commerce. There have been dozens of modes of payment in electronic payment system some of them are widely accepted and common however some of them are not. Some of them are just the electronic versions of the conventional methods that are there in regular form of commerce. Following are some common forms that are used in daily forms of E-commerce. 1. Electronic Fund Transfer. 2. Credit Cards. 3 E –cash. 4. Smart cards. 5. E –checks. 6. Electronic Debit Cards. Online Credit Card Payment System. â€Å"It seeks to extend the functionality of existing credit cards for use as online shopping payment tools.This payment system has been widely accepted by consumers and merchants throughout the world, and by far the most popular methods of pa yments especially in the retail markets†. (Laudon and Traver, 2002) A credit card is generally issued by the banks or other financial institution. It comes with a fixed amount of spending limit depending upon the type of the credit card and payment is to be made to the issuing institution within a stipulated time period it could be 30-40 days after which customer has to pay interest on the amount due. Following are the few terms that are related to the use of credit cards. 1. Card holder: – a card holder is the authorized person who is entitled to do purchases online using the card. 2.Card issuer: – Card issuer could be financial institution or a bank that has issued the credit card to card holder after a certain amount of verification about the card holder. 3. The merchant:- Merchant is the one who accepts payment via credit card used online in exchange of goods or services offered by him. 4. The acquirer: – a financial institution that establishes an acc ount for merchants and acquires the vouchers of authorized sales slips. 5. Card brand/card type :- there are types of credit cards that are accepted worldwide and different institution take care of different types of credit cards such as Visa and Master Card. (Turban ,Lee, King, chung , n. d)Process of using Credit Card While making a purchase online using a credit card, the transaction goes through a series of steps and following are few terms that need to be understood before understanding the transactional process, all these terms are kind of processes that could take place while processing a transaction. * Sale: A sale is when the card holder purchases a product or service from a merchant and the money is transferred to the merchant's account. *   Preauth: A preauth is not a sale transaction however it is a transaction to make sure that the credit card is valid and it typically charge around $1. 00(Techrepublic ,n. d)  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   * Postauth: â€Å"A p ostauth involves purchasing something before it is shipped. The customer can preorder something, and the amount is deducted from the customer's credit limit. No money is transferred, but the card hold is maintained on the customer's card.When the merchant fulfills (typically, ships the product), the merchant can perform a postauth to transfer the money and remove the card hold from the customer's card†. (Techrepublic, n. d) * Credit: This transaction is used while returning the good according to the procedure under the agreement and merchant puts the money back into the account. * Chargeback: A chargeback transaction is used in case of dispute settlement. In case of a dispute customer files a case and the financial institution involved temproraly withdraws money from the merchant`s account and transfers it to customer`s account. Each party have a certain number of days to prove the right billing and depending upon that amount goes in the account of right party. (â€Å"Techrep ublic† ,n. ) Steps involved in the online transaction While making a transaction customer fills in the credit card information on the HTML page and the information is sent over the server. 1. Server receives the information and sends it to the code that validates the information added by the user and if found valid this information is formatted into data that gateway could understand and is sent to gateway. (â€Å"Techrepublic† ,n. d) 2. â€Å"The gateway receives the formatted data from the HostRAD code, validates the card, and checks to see whether the amount for the transaction is available in the user's account†. (â€Å" Techrepublic† n. ) Upon validation if the card is found invalid or if there is not enough amount on the card a disapproval goes to the code and gateway charges the merchant money at this point of transaction even if it goes bad and if everything is found right the transaction is approved and an approval message is sent to the code. 3. Depending upon the type of the type of the card(Visa, Master card) gateway is batched upto the appropriate clearing house transactions arrive at the gateway, they're batched through to the appropriate clearinghouse. The clearinghouse that is used is determined by the credit card type and the bank that issued the card. As the clearinghouses receive transactions from all the gateways, the clearinghouses batch the transactions for all the banks involved, transferring monies from bank to bank.For providing this service, the clearinghouse takes between two percent and five percent of the total sale. (â€Å"Techrepublic†, n. d) 4. As the clearinghouses batch the transactions they receive, they transfer money from the customer's bank to the merchant's bank. 5. The merchant's bank receives the transactions from a clearinghouse and then transfers the appropriate amount of money for the customer transaction (started in box 1) into the Merchant's Card Not Present merchant account (†Å"Techrepublic†,n. d) Credit Card Transaction Security â€Å"More than 100 million personally-identifiable customer records have been breached in the US over the past two years. Many of these breaches involved credit card information. Continued credit card use requires confidence by consumers that their transaction and credit card information are secure†. (â€Å"Texas department of information resource† ,2009)The Payment Card Industry (PCI) Security Standards Council is the authoritarian agency that issues the standards and policies that help reduce the internet crimes in use of credit cards and all vendors that accept credit cards in their transactions have to abide by these laws . PCI council includes all the major Card brands like American Express, Discover Financial Services, JCB International, MasterCard , and Visa International. â€Å"Texas department of information resource† ,2009) â€Å"The Council created an industry-wide, global framework that d etails how companies handle credit card data – specifically, banks, merchants and payment processors. The result is the PCI Data Security Standard (DSS) – a set of best practice requirements for protecting credit card data throughout the information lifecycle†. (â€Å"Texas department of information resource† ,2009) â€Å"The PCI compliance security standards outline technical and operational requirements created to help organizations prevent credit card fraud, hacking, and various other security vulnerabilities and threats. The PCI DSS requirements are applicable if a credit card number is stored, processed, or transmitted.The major credit card companies require compliance with PCI DSS rules via contracts with merchants and their vendors that accept and process credit cards. Banks, merchants, and payment processors must approach PCI DSS compliance as an ongoing effort. Compliance must be validated annually, and companies must be prepared to address new a spects of the standard as it evolves based on emerging technologies and threats†. (â€Å"Texas department of information resource† ,2009) Following are some terms related to online Credit card frauds â€Å"Phishing – This technique refers to randomly distributed emails that attempt to trick recipients into disclosing account passwords, banking information or credit card information. This one scam has played a major factor in the crisis we face today.Since phishing emails typically appear to be legitimate, this type of crime has become very effective. Well designed, readily available software utilities make it nearly impossible to trace those guilty of phishing. Phishtank, an anti-phishing organization, recently revealed that nearly 75,000 attempts of this nature are made each month† Pharming – This new technique is one of the most dangerous of them all. Pharming involves a malicious perpetrator tampering with the domain name resolution process on th e internet. By corrupting a DNS, (Domain Name System), a user can type in the URL for a legitimate financial institution and then be redirected to a compromised site without knowledge of the changes.Unaware of the background predators, the consumer types in their bank account details or credit card number, making them the latest victim of fraud. Skimming – refers to a process in which a special device is used to copy encoding data from the magnetic strip of a credit or debit card. This device is usually secretly mounted to an ATM machine as a card reader. Dumpster Diving – this act refers to a process in which an individual vigorously shift's through someone else's trash in search of personal and financial information. With a mere credit card approval that contains a name and address, a criminal can easily open up a credit card in your name and accumulate substantial debt in no time.Security measures in online credit card payment systems. Four necessary and important m easures that must to be followed for safe electronic system are as following. 1. Authentication Authentication is a method to verify buyer`s identity before payment is authorized. 2. Encryption Encryption is a process to making data that has to be sent over the internet indecipherable so that it could not be read by unauthorized persons and read only by the persons in authority to do so. 3. Integrity It has to be made sure that information that is sent over the internet is not modified, altered in an intentional or unintentional way. 4. Nonrepudiation This is the quality of a secure system that prevents anyone from denying that they have sent certain data. Here the communication system should be fault tolerant. Server where the transaction has been sent should keep a record log of every transaction and the user can't deny that he or she has not accessed the server. Security Schemes Key security schemes that make sure that information sent over the network while engaging in a transac tion is secure include encryption, digital signature, certificates and certifying authorities. Encryption:-Encryption is a technology that deciphers any kind of information before being sent over the network so that it could not be retrieved and misused by an unauthorized person.Two common encryption technologies that are used to encrypt and decrypt the data are Secret key and public key encryption as explained below. Secret Key encryption In this cryptography technique one key that is known as secret key is used to both encrypt and decrypt the data at sender`s as well as receiver end . Secret key encryption is easy to implement when number of users are less. The algorithm that is used for secret key cryptography is Data Encryption standard (DES) (Schneier ,n. d). The only problem with this encryption method is that the key has to be sent over to the counterpart. (â€Å"Dret†, n. d) Public key cryptography/Assymetric encryption.In this kind of encryption there are two keys th at form the part of encryption technology they are the public key and the privaret key . the public key is known to allthe users however the private key is only known to one user the owner. there are two methods the kep pair could be used eithet the data could be encrypted by the receiver`s public key and it will be decrypted by his private key but there is a problem with this method since the encrypting key is public key no body will know who sent the message the other way is encrypting the data with receiver`s private key and decrypting it by public key however this method also has an issue every public key holder will be able to decrypt the message so it has to be combination of keys.The data is encrypted using the receiver`s public key and reencrypted using the receiver`s private key the reciver has to use combination of keys to decrypt the data fully which means that the first the reciver`s private key and then the sender`s public key. The algorithm that is used in this techniq ue is RSA. (â€Å"turban, 2004) (â€Å"Dret†, n. d) Electronic Protocols. SET (Secure Electronic Transaction) protocol is an e-commerce protocol designed by Visa and MasterCard. Customers can purchase online and their personal information would be protected and also their buying habits would be recorded along with the information they provided. â€Å"SET developed by Visa and MasterCard is an open standard for encryption and security specification for credit card transactions on the Internet.The SET is a set of security protocols and formats that main section are application protocol and payment protocol†. (â€Å"Itig† , n. d) SET has many merits: SET has provided merchant protective method, cost-cutting and enough security for the electronic payment. It helps making the online E-commerce free from online fraud to quite an extent. SET keeps more secrets for the consumer to improve the satisfaction of their on-line shopping experience. SET helps the bank and the credit card company to expand the service to more broad space –Internet. And it lowers the probability of credit card on-line fraud. Therefore SET seems more competitive than other online payment method.SET has defined interface for all quarters of online transaction so that a system can be built on the products made by the different manufacturers. SET protocol based E-commerce model Although SET has been widely used in the electronic payment area and has gained more attention from the electronic commerce promoter, the SET transaction mode model only. Even for B2C model, its application is also limited. (â€Å"Itig†, n. d) DES algorithm and the RSA algorithm are used in SET protocol to carry on the encryption and the decryption process. SET protocol use DES as symmetrical encryption algorithm. However, DES was no longer a safe algorithm right now. Therefore, DES should be replaced by more intensive and safer algorithm.Moreover, along with the development of processing speed and storage efficiency enhancement of the computer, the algorithm will be cracked successively. It is necessary to improve the extendibility of encryption service. SET protocol is huge and complex in the application process. In a typical SET transaction process, the digital certificates need to be confirmed 9 times, transmitted 7 times; the digital signature need be confirmed 6 times, and 5 times signature, 4 symmetrical encryptions and 4 asymmetrical encryptions are carried out. (â€Å"cs. ucf†,n. d) SET protocol involves many entities such as customers, merchants and banks. All of them need to modify their systems to embed interoperability.As the SET requests installment software in the network of bank, on the business server and PC of the customer and it also need to provide certificates to all quarters, so running cost of the SET is rather high. The protocol cannot prove transactions which are done by the user who signs the certificate. The protocol is unable to pr otect cardholder and business since the signature received finally in the protocol is not to confirm the content of the transaction but an authentication code. If cardholders and trade companies have the dispute, they cannot provide alone the evidence to prove its transaction between themselves and the banks. Although there are some drawbacks in the SET protocol, it is still the most standard and the safest in the present electronic commerce security protocol and the international standard of the security electron payment.In order to overcome the defect that SET protocol only supports credit payment style, PIN(Personal Identify Number) digital items are modified in this paper; with regard to the other deficiencies such as complexity, slow speed, poor safety and adaptation of SET protocol, this paper also makes a model of architecture security control mechanism, introduces electron transaction authentication center and strengthens the security of transaction process of SET protocol. (â€Å"cs. ucf†,n. d) Transmission control Protocol (TCP) which is the main protocol used to send data over internet was not designed back then keeping in view the security issues that could arise in today`s World where E commerce plays an important role. The data transmitted through TCP could be read, intercepted and altered.Security breach still happens while an email is being sent or files are being transferred over the internet. Customer is always concerned over security when processing a transaction and sending information over the internet. Credit card information like name, number and date of expiration. Presently most of the companies use SSL (Secure Socket Layer) protocol to provide security and privacy this protocol encrypts the order at PC before sending it over the network however this protocol may not provide all the security needed. There is another more secure protocol Secure Electronic transaction (SET) however SET is is a slow protocol and may take long time to respond and also it requires that the digital wallet is installed on the customer pc.Electronic Fund Transfer â€Å"Electronic funds transfer† means any transfer of funds, other than a transaction originated by check, draft, or similar paper instrument, that is initiated through an electronic terminal, telephonic instrument, or computer or magnetic tape, so as to order, instruct, or authorize a financial institution to debit or credit an account. Electronic funds transfers shall be accomplished by an automated clearinghouse debit, an automated clearinghouse credit, or by Federal Reserve Wire Transfer†. † (Turban ,Lee, King;amp; chung ,n. d) Electronic Checks. E check is the electronic version of the traditional paper based checks , Paper check has been one of the most important way of payments that has been in use for a long time keeping in view the same concept E check has been designed to serve the same purpose. E-check contains the same information like acco unt number, issuing bank, address of the issuing bank and the amount of check.To validate the authenticity of the person, instead of signatures it has a digital code which is generated while filling in a check and is cross verified with the database while encashing it. Electronic Check offers many advantages over the traditional paper check since all the information is filled in electronically over the computer and it is not revealed as it passes through very few people who are in authority. E checks are cheaper by many folds because of ease of processing, also E-checks are lot faster in procession since the data is sent electronically and the chances of getting a check bounced are almost negligible. Electronic Wallets Electronic wallets or the e wallets also referred to digital wallets.An e wallet is a software program that contains user`s payment information in encrypted form to ensure its security, for example an individual`s e wallet could contain credit card number , bank accou nt number ,contact information and shipping location . This information can then be automatically and securely transferred to an online order form. †. (Turban ,Lee, King;amp; chung ,n. d) Virtual Credit Cards â€Å"Closely allied to e wallets is concept of virtual credit card. A virtual credit card is an image of a credit card placed on the computer desktop. With one click of the credit card image the card holder access the account information and pays for the online purchases.Customer can even drag and drop the virtual card from desktop onto an online checkout page . The credit card number and contact information is automatically entered into the checkout form and the customer just needs a pin to enter or other form of identification to authorize the transaction†. (Turban ,Lee, King;amp; chung ,n. d) Concluding Remarks Although there are many online payment systems available to choose from while making a purchase under E-commerce however the credit card is still the do minant and the most popular way not only because of the convenience it has but also because of its worldwide acceptability.Despite of the several security measures in place, credit card frauds do take place and protection of the information provided over the internet while making a purchase is of utmost importance. Encryption using the DES and RSA algorithms make the data indecipherable while being transmitted over the network and these encryption technologies are hard to break into however there are other ways credit card information could be disclosed. Phishing and Pharming as mentioned above in the essay are recent threats that are becoming common and are needed to be addressed as soon as possible since the users who are not really aware of these threats could unintentionally disclose information they are not supposed to.Credit card has wider acceptability because of its long established network thanks to the credit card brands like the Master card, Visa international and America n express and because of its friendly characteristics like ease of carriage, fast processing, 24 hour purchasing facility and the convenience of making purchase sitting anywhere. With the advancement of technology new protective measures like thumb imprint, retina scan are gaining popularity however it will take time for them to become common and implemented everywhere while making an online transaction since there are the cost and awareness issues related to these high end technology gadgets.

Cultural Sensitivity Essay

Cultural sensitivity is vital to remember when any firm does any business in a foreign market. Certain strategies and procedures used in the United States may not translate the same way in other countries or have the same impact. Other areas in the world operate their businesses with different priorities and in different cultures so it is crucial to consider how these differences may affect how business is done. Ethical situations will inevitably arise when a firm begins operations in a new international market so it is best to be prepared to face such situations with character. Company A now feels ready to enter the Eastern Asia market to continue its plans to grow the company and its profits. Taiwan is the country chosen for the next international expansion and there are many things to consider before entering this market. After researching several Eastern Asia markets to globalize in Taiwan, a republic of China was chosen as the country to expand in because there is the potential to manufacture a large volume of their engine parts there while paying very little in labor costs. The absence of any organized trade union is also a factor because there will be little resistance offered from any form of union. With expansion to any new country or region there are always cross-cultural ethical differences to take into consideration since all countries or areas hold their own world-views, religions, politics, traditions etc. Expanding to Taiwan with obviously has an impact on both Company A and Taiwan itself. While labor costs in Taiwan are much cheaper than the United States Company A must act ethically with concern to culture of Taiwan and the people who the employ there. Some people in Taiwan are grateful for American expansion to their country because there are more jobs available but there are also currently many in Taiwan who look at the American expansion in their country as a negative. There is a major concern in both Taiwan and the US that many of the multinational corporations doing business in Taiwan are doing far  more that just operating a company there. Most believe that these multinational corporations have a significant influence on the political agenda’s of Taiwan w ho have the interest of their company in mind before that of the people of Taiwan. There is also major concern for the worsening of government regulation in Taiwan, as there appears that they are not protecting workers from any physical, mental or social risk in the workplace. Company A should also consider creating some form or insurance benefits package for its Taiwanese workers as this would go a long way in showing them that they are ethical, that they care about their workers, and that they respect the Taiwanese people. This all has an affect on company A because they must make a conscious effort protect their image and brand so that they can continue to grow their business within the US and worldwide. Company A must make ethical decisions towards their operations across the company and within Taiwan so that they are not branded as a company who is simply taking advantage of cheap labor in a foreign country. With the majority of Taiwan believing that workers are not protected and that multinational corporations are attempting to influence political issues, I t hink it would be wise for Company A to make massive effort towards showing the people in Taiwan that they will protect their workers and use any influence they hold to help improve government regulation and attempt to mutually benefit both the company and the people of Taiwan. Company A must also consider the traditions and general way of life for the Taiwanese people. For instance learning their foods, drinks, religious practices, and recreational activities and somehow blending them into the company culture may help workers feel more comfortable and trusting towards Company A. Taiwanese people drink a lot of tea and juice drinks with boba in them so maybe offering or selling those within the company property would be a good idea. Also Buddhism, Taoism, and Chinese folk religion are the common practices in Taiwan so perhaps offering a place of worship on company grounds would be a great gesture. As far as work hours are concerned, Taiwanese people are working similar business ours that Western countries typically will work so they are hard working people and are accustom to similar schedule to what the factory in the US would for Company A. The will also be critical adjustments needed to be made regarding Company A’s marketing strategies in Taiwan versus how they would typically market their products in the US. There are different consumers in Taiwan because of their dense population and their culture. Most Taiwanese people would not tend to purchase large trucks or vehicles that would necessitate the heavy duty parts that Company A manufactures so they must concentrate almost all of their marketing efforts around a specific group of Taiwanese consumer or business that utilizes larger vehicles on a consistent basis. Company must market their product mainly to businesses that use heavy-duty equipment in their operations and in industrial areas since the average Taiwanese consumer would not buy a large truck, as they are not sold in such large volumes as they are in the US. As far as marketing to consumers Company A’s focus should be on the wealthy people of Taiwan who can afford to operate and maintain larger vehicles. Company A should also reduce the price of their product to ac commodate for a smaller volume of sales on trucks in Taiwan and also to begin attracting new clients since they will be new to the area. This price reduction should be offset somewhat by the less expensive labor costs experienced in Taiwan. Cross-cultural communication is also important for Company A to build a strong relationship with its Taiwanese workers. The first barrier to communication is language. The primary language in Taiwan is Mandarin Chinese and while most Taiwanese businessmen do speak English, it would be a good idea for some representatives from Company to a learn some Mandarin Chinese to help with communication efforts. Company should also consider having some translators available to maintain clear communication as well. Taiwanese business is based mainly off of respect so it is important to meet fact-to-face whenever possible, include senior executives meetings whenever possible, direct presentations to the senior ranking person and also make sure to give and receive any gifts with both hands as a sign of respect, and always look people in the eyes. It is also very important to refrain from being too frank or outspoken because this will be viewed as disrespectful. Is it vital to keep these practices as well as learning other important cultural traditions when conducting business in Taiwan or with any Taiwanese people. As far as marketing is concerned, while in the US marketing can be based around creativity and branding, it is important in Taiwan to focus  their marketing around integrity and respect. Taiwanese people and their businesses are less concerned with gimmicks and flash and maintain an emphasis on ethics and as always respect is absolutely vital. There will without a doubt be many cultural differences to overcome when opening a new plant in Taiwan. Marketing strategies and how businesses are viewed will not be the same in Taiwan as they are in the US so while A Company may be accustomed to operating their plants at home in a certain way, they must make adjustments to accommodate for the cultural variances of the environment their new plant is operating in. The impact that the cultural differences will have could be minor or they could be significant depending on how well Company A does their research and how they handle adapting their new plant to conform to the Taiwanese market while maintaining efficiency and their core company beliefs. Taiwan is densely populated country and their consumers purchase mainly small fuel efficient vehicles and since Company A specializes in engine components for heavy duty trucks they must focus their marketing strategies on smaller sized trucks with an emphasis on the advantages of their engi ne components, along with businesses that utilize heavy duty trucks in their operations.

Thursday, August 29, 2019

Emerson's Experience Essay Example | Topics and Well Written Essays - 1000 words

Emerson's Experience - Essay Example This is the confusion that confronts human beings and it impacts a perception of the human beings role with respect to nature and the powers that human beings wield in that respect. Human beings are blurred by the present material existence, and therefore, unable to clearly place a difference between productive and unproductive commitments. In fact, human beings are unique and it is expected to use creative energy. However, in the long run a sufficient understanding of daily occupations and activities can provide an effective way of valuing such time distance. Human beings can be blurred by the value and importance of their current lives. Daily preoccupations fill human beings to the extent that very little time is left for reflections. People allocate a lot of significance to the misfortunes of life; on the other hand, these have no eternal meaning. Grief neither brings people close to one that have been lost, nor does it change who they are. In a reflection, the writer refers to his own particular case, his grief at the death of his own son in 1842. In fact, grief does not provide learning lessons to people and even pull human beings closer to a deeper knowledge of the world in the material forms. According to Emerson, temperament and mood are the wholesale component of perspective. Further, dreams and illusion makeup part of human beings that aid in seeing. A highly intelligent person is hopeless if the perception is incomplete by certain temperamental trait that blocks a central distance inside the real horizon of life. A person’ creativity cannot be efficiently utilized if he does not care adequately for the search for truths, even if he is overly sensitive, and unable to reform. Religious sentiment flow can be influenced by mood and temperament cannot be completely separated from moral sentiment. Scientific study of the size and

Wednesday, August 28, 2019

Homework Essay Example | Topics and Well Written Essays - 500 words - 10

Homework - Essay Example In addition, through increasing the level of government spending, the government will be capable of providing incentives for production, which will create employment opportunities, reducing the level of unemployment from 8.2%. GDP, income and consumption growth have been positive, but also growing below the expected rates. The economy is expected to have a GDP growth of approximately 2% in 2012 and 2013. Household consumption increased by 2.2% in 2011, a factor that resulted from jobs recovery and fiscal stimuli (Stewart, 2012). Because of the increase in gasoline and oil prices, spending on consumption has risen drastically. In order to compensate, the United States consumer is borrowing again, especially for auto loans; this has made consumer credit grow drastically in 15 of the last 16 months. The government can reduce the rates of borrowing to kindle the economy through affordable consumption. Business investment in equipment and software has posted a remarkable recovery, which is expected to go on in 2012. Growth in the investments can be attributed to availability of the opportunity of borrowing at attractive rates. On the other hand, construction investment suffers immensely from the situation of the housing market. Because of this situation, business bankruptcies have been declining and are expected to decline by 10% in 2012. Because of the increasing external trade deficit, the government can adopt the policy of import substitution in those products, which it has capabilities in producing. Resulting from the drastic increase in gas and oil prices, the economy is facing inflation. A further increase in price of oil could lead to an occurrence of a recession. However, the Federal Reserve Chairman holds the possibility of a 3rd Quantitative Easing (QE3) in case there is such an occurrence, which can trigger QE3. With the current growth in

Tuesday, August 27, 2019

Effects of Food Pricing on Low and Middle Class Americans Essay

Effects of Food Pricing on Low and Middle Class Americans - Essay Example There is a growing the consensus about food prices increase, has been primarily occasioned by three key elements. Firstly, the changes in climatic conditions have been blamed for decreasing farmer's production in the United States. Because of global warming and environmental degradation, the extreme weather conditions have resulted in poor harvest due to reduced rains, harsh snowy conditions that destroy crops and inhibit dairy production in the North America. Consequently, food prices have continued to rise due to fundamental shifts in demand and supply in global markets. The increase in genetically modified foods has resulted in an increase of prices due to expensive technology employed. Besides, many food-processing companies have laid down expensive groundwork leading to high prices of canned food items (French, 841S). In America’s social life, the lower-middle class families are struggling just as the families living in poverty since they cannot be able to afford sufficient diet meals due to increasing pricing on such commodities. With the families not able to purchase enough food for the entire family, it results in food insecurity. Food security is widespread in any American societies living in lower-middle class and who have children (Grossmann and Varnum, 81). Since food price is an essential determinant of diet, it is then likely that these families are unable to feed on balance diet, and their nutritional status is compromised. It is not surprising that these families are only able to access, and buy lowest cost diets and these diets are the least unhealthy in the market. With high food prices in the market, such families are not able to meet their costs hence fail to buy the nutrients dense diets that they need. In the market, the diets that are composed of low energy density rich food products are expensive compared to the ones composed if refined grains with added sugars and fats (Powell and Chaloupka, 229). The increase in food pricing thus creates a barrier for the lower-middle income class of American citizens to access the nutrients dense diets.  

Monday, August 26, 2019

Strategic Business Environment Essay Example | Topics and Well Written Essays - 2500 words

Strategic Business Environment - Essay Example This essay declares that the mission of any organization is always in line with the culture and thus aligning strategies in line with these means that only consideration of internal factors. Not anything that has to undergo a thorough review is a plan for a competing market. Besides, it seeks to maintain the norms and the beliefs of the people. This paper makes a conclusion that a strategic drift results from choices made in the organization. Not only does strategic drifts distract the management from its path of success, but also result in a complete loss of momentum. Additionally, it can lead to the wastage of money, time and other valuable resources. Overall, it increases the overall cost of operation and may sometimes lead the firm away from achieving its competitive advantage. Though undesired in the current business world, numerous causes result in a strategic drift. Some of the causing factors include paradigms, organizational culture, the reactive nature of companies and unhealthful institutionalized patterns. Organizations need to study the market condition prior to the changes occurring in it. The proactive aspect of the operation is the only tool that can control strategic drift. Besides, for sound management practices, a critical analysis of the business environment is necessary. Strategy formulations should als o be in line with the ever-changing trends, and there is a need for movement from the traditions or culture of organizations to more realistic views of the world.

Sunday, August 25, 2019

Exchange Rate Cooperation Essay Example | Topics and Well Written Essays - 1000 words

Exchange Rate Cooperation - Essay Example On the other hand, capital mobility hypothesis explains policymakers choice of exchange rate stability and monetary policy autonomy. Additionally, they explain European Community monetary policies congregated within Bundesbanks price stability standard. However, there are weaknesses in the development of the exchange rate cooperation. The weaknesses develop from the creation and evolution of exchange rate institutions and the policymakers’ ability in stabilizing exchange rates within the institutions. In solving these problems, domestic politics concerned with models of monetary policies and bargaining power needs to be developed. Exchange rate cooperation revolves around the dynamics of neoliberal institutions and capital mobility hypothesis. It is vital for the institution and capital mobility to have proper legislative in monetary politics to enable for the stability of exchange rate cooperation. In the book, Currency of Ideas and Monetary Politics, Kathleen R. McNamara argues that neoliberal consensus theory is not a function that directly raises capital; instead, it is the product of European political leaders’ interpretations of shared ideas (Kathleen 7). Additionally, an example of monetarist paradigm and German policy is used in explaining neoliberal consensus. Kathleen uses paradigms in explaining exchange rate cooperation across the world. Moreover, Kathleen argues that international economy shapes the terrain in which politics unfold. The interpretation of the structure and ideational processes dictate crucial choices of policy content and form. The book cautions against the making of assumptions about effects of economic interdependence on political results without tracing linkages of rising trade and capital flows. This uncertainty has very crucial consequences in the politics of monetary cooperation. Uncertainty obscures the distribution of effects in differ ences of exchange rate regimes (Kathleen 8). It has the high potential of depolarizing policy process by decreasing societal pressures for specific policies and insulating policymakers from public scrutiny.

Saturday, August 24, 2019

The Growth of Student Loan Debt in the US Research Paper

The Growth of Student Loan Debt in the US - Research Paper Example This subject is fit for study considering the fact that due to high unemployment rates, most students’ graduates are faced with the difficult burden of having to repay the loans. Subsequently, the numbers of students borrowing the loan have increased too by about 70%, a similar proportion to the balance increase as owed by the same students. Statistical figures from the Federal Bureau also indicate that there has also been witnessed an increase in the total number of borrowers to about 17% in 2012 from under 10% in the year 2004. The burden of the student loan has its extended repercussions given that few of these people who still owe student loans have not been able to purchase houses. The intention is that it has been extremely challenging for the former students who are still having unsettled students’ loans to finance mortgages for their houses. According to the Fed report, the high burden of students’ loans and higher delinquencies has a direct impact on the borrowers’ abilities to get admittance to other methods of funding such as the credit access, and also affect the performance of the other debts held by the people. The concern of the escalating rate of students’ loans burden has been keenly monitored by the Consumer Financial Protection Bureau which also holds the view that the high burden of debt on such students leads to the raising of pertinent questions such as the domino effect of the debt on the general American economy. Therefore, considering these statements and reports, it is quite clear that the issue of students’ loan is going to be a serious drag to the economy taking into consideration the fact that most of these young people who have debts are not going to be able to constructively participate in the enhancement of the economy like the former generations when they are faced with a loan debt burden that would require them to make extremely large payments out of their incomes

Friday, August 23, 2019

Cochlear implants and the debate within the deaf community. Arguing Research Paper

Cochlear implants and the debate within the deaf community. Arguing that cochlear implants have been beneficial for the deaf community - Research Paper Example The external components of the implant contains a microphone that is to be worn behind the ear of the patient, attached to a magnetic transmitter, which is attached to the earpiece and a sound processor. Once the implantation is complete, an audiologist uses a computer to set the speech processor for the patient. The audiologist sets the processor and programmes it to the appropriate levels of auditory stimulation between sound received from environment and brain nerve cells (Cochlear 1; Ouellette 1248). Once the processor is set, the microphone receives sounds from the environment and sends it to the speech processor, which then performs computation, and transforms the sound to electrical codes and digital format. The digital codes are sent to the outer ear component as coded signals bypassing the ear hairs. The magnetic transformer behind the ear then takes these codes, transforms them to electrodes arrays, and interfaces them to the cochlea. Then the internal device in the cochlea takes these arrays and stimulates the auditory nerves fibers that are connected to the brain, whereby the arrays are sent by the auditory nerve of the person to the brain for interpretation (Cochlear 1). This paper seeks to establish that cochlear implants technology is beneficial to the deaf community despite their opposition to the implants during their inception. In order to alleviate fears of the deaf community there have been improvements in cochlea implants technology over time and hence increased rate of success to patients who have undergone the procedure. Ideally, the procedure is meant to be applied to infants born deaf or those who have developed deafness in their early days. This is because cognitive development of a child into their senses and environment occurs between the ages of 0-3 years. Hence, if the procedure is undertaken during this

Thursday, August 22, 2019

Charting a New Course for Education and Teaching about Religion Essay

Charting a New Course for Education and Teaching about Religion - Essay Example Such decline is manifested in OECD (2006) report which indicated that educated Americans dropped from 30% to 14% while its national students’ achievement percentile level similarly plummeted down. This for authorities is truly alarming. It’s in this context that educators proposed seven strategies to reform American educational system. These proposed strategies are as follows: (a) development of a student progression; (b) reinvest resources devoted for improving quality of early education, recruiting more quality teacher, enhancing their instruction capabilities and provision of more resources to disadvantaged students; ( c) allocating budget for infrastructure construction for universal pre-school education; (d) hiring of top quality graduates for teaching courses and offering attractive but reasonable salary scheme and incentives as motivation; (e) improve performance management in the educational system and conduct of regular performance appraisal among educators and administrators; (f) provision of support mechanism for disadvantaged students;and (g) upholding education standard and adoption of curriculum that is responsive to the needs of the national economy and polity.

Anything Is Possible Essay Example for Free

Anything Is Possible Essay Elaine has sued Jerry because Jerry fired her. Elaine was on the job for two months. The job offer letter she had been given mentioned the great career opportunities at the company and stated that her annual salary would be $30,000. The employer is an employment at will employer. Elaine was given no reason for the termination. After the termination, Jerry hired a man named Kramer, who had less job experience and education than Elaine, for the position. Elaine has sued to get her job back. The result of this particular scenario has the opportunity to go either way. Jerry fired Elaine, a female, after just two months of working for him, and then Jerry hired a man. Elaine believes that Jerry fired her for discrimination against her gender. Since it is illegal to fire an individual due to their race, color, national origin, sex, or religion (Cheeseman, 2007, p. 428), Elaine sued Jerry. It is perfectly understandable to see why Elaine believes Jerry fired her discriminately. Elaine worked for Jerry for only two months before she was terminated for no given reason. This raises a red flag as two months is hardly enough time to effectively demonstrate how hard of a worker one is. I believe it takes around six to eight months for a person to become knowledgeable about their position and become completely comfortable in performing their essential job tasks. Elaine would still be in the learning phase of her new job at two months. Jerry immediately hired a male, Kramer, after he terminated Elaine. Kramer had less work experience and education than Elaine, but Jerry hired him anyway. It is very easy to see why Elaine feels the way she does in this situation, however, she cannot read Jerry’s mind. It is very possible that Jerry fired Elaine for a legitimate reason and chose not to share this with her. Elaine may have produced a rather large error in her part that she overlooked and either cost the company a lot of money or reputation. Perhaps Jerry realized this and fired Elaine for this reason and did not wish to tell her in order to prevent embarrassment from either party. Jerry may have a good friend who referred Kramer to him. This friend may have informed Jerry on what kind of employee Kramer is and how quickly and efficiently he can learn the job based on past work experience. Anything is possible and possibilities are everywhere. What is meant by this is that nothing is black and white. A situation may be presented one way, but may actually be the exact opposite. You must be open minded in situations. Understanding that discrimination in the workplace is unfortunately common, it does not mean that Elaine is a victim of it. My personal belief is that Elaine would have rightfully sued Jerry unless if he can produce strong evidence of some sort of wrong doing on Elaine’s part.

Wednesday, August 21, 2019

Tisco (tata iron and steel company limited)

Tisco (tata iron and steel company limited) 1. Introduction TISCO (Tata Iron and Steel Company Limited) is the worlds sixth largest steel company which was established by Indian businessman Jamshetji Nusserwanji Tata in 1907. It is also the largest private sector steel company in India in terms of domestic production. The company is the fifth largest steel producer in the world as it produces 18 million tons of steel in India and 52.32 million tons overseas. [1] The aim of the company was to maintain its reputation in the steel industry. For this they had to do some advancement in their technology because, the legacy system was outdated. Basically they wanted to transit from a production-driven company to customer-driven company which will make them more Customer friendly. [2] For the improvement in the system they had implemented ERP SAP 3 which later on resulted in a success of company. Generally its not so easy to be successful in the ERP implementation process, but as the company had taken right decision on right time, they were able to get the desired results from the implementation 2. ERP Implementation 2.1 Need of an ERP System TISCO was facing two main problems. Firstly, the systems which were they using were outdated and it was also having some errors. Secondly, the system was mostly designed for the process and which made them to pay less attention to the customer needs. [3] Finally, company decided to implement a new ERP system which is error-free as well as less complex and which will also help them to become more Customer friendly. 2.2 ERP System Selection The company wanted such an ERP system which would satisfy the factors such as time, profit, cost, compatibility, support, transparency and future requirements. While working on these factors company was also forecasting the condition which will become in the future after implementing any ERP system. So finally after a thorough study, the company ended up with the SAP 3 ERP which was fulfilling all the requirements of the company. [2] 2.3 ERP Implementation Process The ERP implementation process is a very time consuming because it has to go through some major factors like planning, designing and testing. Most important thing is that the system should meet the companys demands. Thus, to implement the SAP ERP system, a period of 8 months was allotted which was a big challenge for the company. [3] But the company was able to meet the deadline successfully. 3. Factors Contributing to Success 3.1 Planning The initial step for the company was to list out the goals that are is to be achieved. According to the goals they designed the process plan. TISCO wanted to create such an environment which will always make them to learn something new by which they can make changes to make the system more efficient. They had also planned about the changes that can affect the system in future. By this they can immediately implement the solutions for the changes without wasting the time. The company wanted the software to work in such a way that it would improve the products and services which will make the company to maintain its reputation in the steel industry. 3.2 Process Organization Its always good when the process is divided into some parts so that each process can be handled separately with less complexity. So the company had divided the whole process into two parts. The process which was more complex and had more transactions was defined as the ‘Hubs and the process with less complexity and transaction was defined as the ‘Spokes. [2] Hubs are the major part whereas the Spokes are the minor parts. Spokes were attached to the Hubs because finally the whole process was going to run together. These processes were designed into the SAP modules. Enough training had been given to the developers to work on these modules so that they can handle the problems which might occur while testing these modules. The company had given deadlines for each module because the final task was to run all these modules at the same time. And at this point if any kind of errors would occur then, there should be enough time to work on it. So, In order to run all these modules together the developers had to do the proper implementation of their knowledge. 3.3 Final Stage At this stage the company was ready with all the modules and was preparing to go live with the entire project. This stage was very crucial for them because this is the moment when they will get to know the results. As the company did not face any problems while working on the project, the desired results were expected. They had done the thorough analysis of the whole process and implemented the solutions for the changes where they were required. So the company was quite confident about the outcomes. 3.4 Result Finally TISCO got success in SAP ERP implementation project. This project helped the company in terms of financial, technical and managerial aspects. [3] This project made company to update its customers daily and providing a good quality of service across the country which led to the improvement of customer management. This project had led company to an improved productivity, enhanced customer service, speed delivery and reduced cost. The system was less complex and a user friendly which was the biggest advantage. This project helped the company to reduce the product cost and gain more profit in the industry. 3.5 Future Steps The success of this project was motivating for both the TISCO and the ERP vendors. Now TISCO is not only using this software but they are also going to work on it further to gain more benefits for the company as well as for the stakeholders. [3] This will help company to make more profits and satisfy the customer needs efficiently. In this way the company can keep its existing hold in the steel industry. 4. Conclusion Many big companies have failed to implement ERP systems. Due to this fact many companies doesnt prefer to implement ERP. But this fact did not affect TISCOs morale. They worked very hard on the project which made them more confident about the results. The speed at which they worked and the way they synchronized all the work was remarkable. This was one of the major contributing factors for the success. Finally the project gave the desired results and fulfilled all their expectations. 5. References 1. Wikipedia (2007) http://en.wikipedia.org/wiki/Tata_Steel 2. Bhavish Sood, (2001): Indian Express Group (Mumbai, India) http://www.networkmagazineindia.com/200210/case5.shtml 3. Crewind Technologies Pvt. Ltd. (2009) http://www.erpwire.com/erp-articles/saperp-success-in-tisco.htm

Tuesday, August 20, 2019

Elites in Representative Democracy

Elites in Representative Democracy Living Political Ideas Representative democracies will always need elites, Discuss. A Representative democracy is a form of government which is based on the principles of representatives who have been selected by the people; it can be argued that representative democracies will always need elites. This essay will firstly examine the notion of Representative Democracies in order to gain an understanding of its key components using the political ideas of both Edmund Burke and James Madison who were both in favour of Representative democracy. Elitism is a theory which emphasises the importance of a small elite group amongst society, links between Elitism theory and democracy will be analysed using the ideas of various Elite theorists. It can be argued that even though representative democracies aim to take into account the opinions and views of the majority this isn’t necessary the case since only a minority of society choose to participate in the political process. To conclude this essay, theories of populism will be discussed and also the argument that globali sation has aided in creating a greater number of elites in representative democracies. Representative Democracies are ones in which citizens within a country elect representatives to make decisions for them. Elections must be free and fair and the political party which receives the majority of votes forms the government[1]. The political theorist Edmund Burke supported the notion of representative democracy but saw the title ‘representative’ as depending on how much members of the public were able to rely on their representatives[2]. According to Burke, â€Å"your representative owes you, not his industry only, but his judgment; and he betrays, instead of serving you, if he sacrifices it to your opinion†[3]. As with Burke, James Madison gave support towards the rationales of representative democracy. According to Madison public views and opinions can be refined and enlarged when passed through a body of elected citizens. Madison also argued that Representative government forces elections themselves to provide a clarification of public issues, and t hose able to withstand the election process are likely to be able to represent the true interests of all citizens[4]. Elite theorists argue that individuals who are considered objectively superior to others should hold more superior positions within society[5]. Elitists believe that society comprises of three different types of people; firstly there is a supreme all-seeing leader who possesses unrivalled authority and secondly, there is‘warrior’ elite who is distinguished by its capacity for self-sacrifice. Finally, there are the masses that are weak and ignorant, their destiny is simply obedience[6]. According to Elitist theorist Mosca, modern elites have superior organisational skills which were necessary in gaining political power; he also asserted that all forms of social organization would be impossible without a ruling class[7]. Mosca states that: â€Å"Those who hold and exercise State Power are always a minority, and that below them lies a numerous class of people who never participate in real terms in government are subject to the will of the former; we may call them the ruled†[8]. Elite theorist Michel’s goes even through by suggesting the inevitability of elite rule as the â€Å"iron law of oligarchy†. According to this democracy is paradoxical and therefore impossible since democracy cannot exist without organisation and organisation requires elites. The ‘Iron Law of Oligarchy’, asserts that real democracy is unable to exist without becoming an oligarchy, an oligarchy is a form of government in which all power is vested in a few dominant individuals[9]. The two key classical elite theorists Mosca and Pareto differ in their view of which resources elites utilise, but both agree that the state and the civil society are characterised by an inevitable division of power between elites and the masses. Mosca sees elites to possess various organisational skills; elite theorist Pareto is more militant concerning the physical and mental strength which determine their suitability for government[10]. It can be argued that in any Representative Democracy, elites will still be present. The United Kingdom is a Representative Democracy this is because all citizens over the age of 18 are able to vote and the political party which receives the most amounts of votes is elected[11]. Regardless of this though the United Kingdom has extremely low levels of turnout and research has shown that it’s often those with higher levels of education and income are more likely to turnout than there less affluent counterparts. This therefore demonstrates the ideas put forward by Elite theorist since in a Representative Democracy only a small number of the electorate are having their opinions accounted for and those that are participating are likely to be considered members of an affluent elite within society. According to Manin, Elites do still play a role in Representative Democracy. This is because people are selected based upon uncommon characteristics which are valued by voters. Voters select these distinctive qualities that they would like to see in their representatives. These qualities vary from a variety of things for example their uncommon ability to articulate and promote a particular political opinion[12]. Therefore the notion of elites is still evident since these people possess a particular talent or characteristic that most people sharing that opinion do not also possess. Manin also states that even though individuals may recognise the importance of elites they do not necessarily support the theory of Elitism[13] Opposed to Elitism is the theory of Populism; populism emphasis’s the belief that the instincts and wishes of the majority provide the principal legitimate guide to political action. Movements or parties described as populist have been characterized by their claim to support the common people in the face of corrupt economic or political elites[14]. Populism is a democratic system whereby politicians make a direct appeal to the people and will claim to give expression to their deepest hopes and fears and all intermediate institutions are often distrusted[15]. This therefore demonstrating alternative approaches which believe the opinions of the people should be considered before taking any form of political action. It can be argued that within the era of globalisation new elites have become one of the consequences of representative democracy. Globalization has seen the increasing ability of corporations to expand across borders. Globalization is a process which has been engineered by corporate elites; governments have helped this process by taking incremental policy action which was implemented in secret without national debate and discussion. For example, In Europe, polls have shown a persistent majority opposed to the introduction of the Euro, but since powerful elite supports it the plans move forward[16]. According to Herman, â€Å"Globalization has also steadily weakened democracy, partly as a result of unplanned effects, but also because the containment of labour costs and scaling down of the welfare state has required the business minority to establish firm control of the state and remove its capacity to respond to the demands of the majority.† [17]. To conclude, even though the principle aim of Representative Democracy is to ensure the views of the majority are been accounted for it can be argued that Elites are still prevalent. A Representative Democracy is one which is based upon the views and principles of representatives elected by citizens. Elite theorists argue that there is a group of individuals in society whose ideas and preferences are more superior to others, they see democracy as a temporary phenomenon which will morph into an oligarchy since it requires individuals with superior skills. In can be argued that even though Representative Democracies aim to include the opinions of every citizen only a small group of society chooses to participate in the political process and it’s often those from a more elite section of society. Theorists suggest that Elites are a positive aspect of Representative Democracy since citizens elect candidates who possess various characteristics which are appealing to those voting for example the ability to articulate various political principles, and are therefore necessary to a Representative Democracy. Globalisation is a process whereby corporations are able to operate across borders, it can be argued that such a process has harmed democracy since governments often take action without any national debate and discussion and in the process has created a group of Elites whose opinions are considered superior to those of the majority. Bibliography Eagles, M Johnston, L Holoman, C Johnson W L (2003) Politics, Broadview Press, Devon Faulks, K (1999) Political Sociology, Edinburgh University, Edinburgh Held, D (2006) Models of Democracy, Stanford University Press, Stanford Herman, S E (1999) The Threat of Globalisation, New Politics, Vol 7, No 2, Winter 1999, http://www.wpunj.edu/~newpol/issue26/herman26.htm accessed 29th October 2008) Heywood, A (2003) Political Ideologies (3rd Edition) Palgrave Macmillan, Hampshire Landermore, H (2008) Is Representative Democracy really Democratic?, Interview of Bernard Manin and Nadia Urbinati, New York, http://www.laviedesidees.fr/Is-representative-democracy-really.html (accessed 29th October 2008) Lynch, D T Dicker, J T (1998) Handbook of Organization Theory and Management, Marcel Dicker, New York http://www.polisci.berkeley.edu/Faculty/bio/permanent/Ansell,C/Encyclopedia/Oligarchy.pdf (accessed 29th October 2008) http://www.becal.net/lc/re_pshe_ce/citizenship/ce_resources/year11democ2.pdf (accessed 29th October 2008) 1 [1] http://www.becal.net/lc/re_pshe_ce/citizenship/ce_resources/year11democ2.pdf [2] Lynch, T D Dicker, J D (1998) p. 191 [3] Burke cited in Eagles, M et al (2003) p. 195 [4] Held, D (2006) p.73 [5] Heywood, A (2003) p. 222 [6] Heywood, A (ibid) [7] Faulks, K (1999) p.39 [8] Faulks, K (ibid) [9] http://www.polisci.berkeley.edu/Faculty/bio/permanent/Ansell,C/Encyclopedia/Oligarchy.pdf [10] Faulks, K (ibid) p.40 [11] http://www.becal.net/lc/re_pshe_ce/citizenship/ce_resources/year11democ2.pdf (ibid) [12] Manin, B (2007) cited in Landermore, H (2008) [13] Manin, B (ibid) [14] Heywood, A (2003) p.301 [15] Heywood, A (ibid) [16] Herman, S (1999) [17] Herman, S (ibid)

Monday, August 19, 2019

Beach dune erosion Essay -- essays research papers

Vegetated sand ridges called dunes, built up by dry beach sand blown inland and trapped by plants and other obstructions, back most beaches. As sand accumulates, the dunes become higher and wider. Plants play a vital role in this process, acting as a windbreak and trapping the deposited sand particles. A characteristic of these plants is their ability to grow up through the sand and continually produce new stems and roots as more sand is trapped and the dune grows. Stable sand dunes play an important part in protecting the coastline. They act as a buffer against wave damage during storms, protecting the land behind from salt-water intrusion. This sand barrier allows the development of more complex plant communities in areas protected from salt-water inundation, sea spray and strong winds. The dunes also act as a reservoir of sand, to replenish and maintain the beach at times of erosion. Frontal sand dunes are vulnerable. The vegetation can be destroyed by natural causes such as storms, cyclones, droughts or fire, or by human interference such as clearing, grazing, vehicles or excessive foot traffic. If the vegetation cover is damaged strong winds may cause 'blowouts' or gaps in the dune ridge. Unless repaired, these increase in size, the whole dune system sometimes-migrating inland covering everything in its path. Meanwhile, with a diminished reservoir of sand, erosion of the beach may lead to coastal recession. To avoid this, protecting the vegetation is vital. The beach, between high and low tides, is hard-wearing but the sensitive dunes, which we cross to reach it, must be protected also. For this reason damaged and sensitive dunes might need to be fenced and access tracks for vehicles and people provided. Processes such as waves, near shore currents and tides continually modify shorelines. The ability of beaches to maintain themselves is achieved through these natural forces. The natural process of beach renourishment, sometimes called "dynamic equilibrium", is how the beach responds to weather. When waves are high during storms or when hurricanes hit the shore, sand is carried from the beach and deposited on the ocean floor. This makes the ocean bottom flatter and makes waves break further from shore and smaller. During subtle weather or erosion, smaller waves slowly shift the sand back to the shore and replenish the beach. When people build... ...ready spent almost $100 million to dredge sand from the ocean floor and dump it onto 33 miles of coastline. Ocean City Beach was renourished in 1982 for five million dollars, but washed away in only two and a half months. When beach residents demand something be done about the beach dune erosion, and all the money the is spent on contemptible endeavors to stop mother nature, a storm or hurricane will come along and wipe out the development. Then billions of dollars are spent to rebuild coastline homes and resorts, which set up a repeating cycle of economic and environmental idiocracy. One day, in a better society, we will save our beaches from development so that everyone is free to enjoy them in an unhampered, natural state. We will stop wasting billions of dollars in our futile attempts at man-made beach resurrection and pointless rebuilding of homes and resorts. It will become clear that the development of America's coastline is too costly to maintain and is destroying our beaches. Until then we will scurry to the tiny public designated beach access areas, fight for parking spaces and sunbathing positions, and enjoy one of our planet's most beautiful assets while we can.

Sunday, August 18, 2019

Repetition and Metaphor in the Short Story, Eleven by Sandra Cisneros E

Use of Repetition and Metaphor in Sandra Cisneros' Short Story, Eleven In the short story "Eleven" by Sandra Cisneros, a young girl named Rachel is characterized. Through a specific incident, Cisneros shows how Rachel does not act as old as eleven ideally should. Through repetition and metaphor, Cisneros alludes to Rachel?s personality and childish views. This story basically tells of a girl?s pride being hurt. It was Rachel?s birthday and her teacher embarrassed her by stating a raggedy old sweater was hers. The metaphors Rachel uses to describe this article of clothing and her age throughout the story are indicators that she is still a child and that she lives a simple life. For example, Rachel said ?Because the way you grow old is kind of like an onion or like the rings inside ...

Saturday, August 17, 2019

Determination Of Water Crystalization Essay

I. Aim: To determine the formula of the hydrate of copper (II) sulfate. II. Hypothesis: Hydrates are ionic compounds that have a definite amount of water as part of their structure. The water is chemically combined with the salt in a definite ratio. Ratios vary in different hydrates but are specific for any given hydrate. In this experiment, the hydrate of copper sulfate has the formula CuSO4.xH20. When it is heated, the water is released as vapor and we can describe the reaction as below: Hydrate Anhydrous salt + Salt CuSO4.xH20 CuSO4 + xH20 The amount of water in the hydrate is determined by taking the difference between the mass of the hydrate before and after heated. Then, the percentage composition of water can be calculated basing on its mass. According to usual theory, hydrated copper sulfate has the following formula CuSO4.5H2O. Therefore, the result collected from the experiment should be x = 5. III. Equipment/Chemical: 1. Equipment: * 1 x Evaporating dish * 1 x Pipe-clay triangle * Some crucible tongs * 1 x Pressed fiber pad * 1 x Digital balance (uncertainty: à ¯Ã‚ ¿Ã‚ ½0.001g) * 1 x Spatula * 1 x Glass stirring rod * 1 x Bunsen burner * 1 x Tripod stand 2. Chemical: Hydrated copper (II) sulfate IV. Variables: * Independent: the mass of hydrated salt. * Dependent: the percentage composition of water in the hydrate. * Control: room temperature, capacity of fire gas, standard equipment. V. Method: 1. Clean and dry evaporating dish. 2. Set up a Bunsen burner under a tripod stand with a pipe-clay triangle on top. 3. Place the empty evaporating dish on the clay triangle and heat the dish with the hottest flame for 3 minutes. This is done to be sure that the dish is absolutely dry. 4. Use tongs to remove the dish from the clay triangle and then place it on a pressed fiber pad so that it can cool for several minutes. 5. Use a digital balance to determine the mass of the cooled evaporating dish. Record this mass to the same number of decimal places as the uncertainty of the balance (à ¯Ã‚ ¿Ã‚ ½0.001g), in other words, the measured mass will have 3 decimal places. Remember not to weigh the dish when it is hot because heat waves tend to be circular and upward, which tends to make objects appear to weigh less. 6. With the dish on the balance, put into it a specific amount of hydrated copper sulfate; make sure that the amount of hydrated copper sulfate is less than half full of the dish. Be sure the spatula is very clean to avoid contamination. Record the mass of the dish with the hydrate to the same number of decimal places as the uncertainty of the balance. 7. Place the dish on the clay triangle. Gently heat the dish by moving the burner bark and forth around the base. Increase the heat gradually. Avoid any popping and spattering. 8. Heat strongly for 5 minutes or until all of the blue color has disappeared. During the heating, a glass stirring rod should be used to spread the solid and break up larger portions of the hydrate. Be sure not to pick up any of the solid on the stirring rod. If the edges of the solid appear to be turning brown, remove the heat momentarily and resume heating with a cooler flame. 9. Allow the dish to cool for 2 minutes. Immediately find the mass of the dish with the anhydrous salt, and record the mass to the same number of decimal places as the uncertainty of the balance. The dish must be weighed before the compound reabsorbs water from the atmosphere. 10. Calculate the initial amount of hydrated copper sulfate before heated. Record the answer to the same number of decimal places as its calculated uncertainty. 11. Determine the amount of vaporized water. Record the answer to the same number of decimal places as its calculated uncertainty. 12. Then, the value of x can be found basing on the formula ratio. 13. When finish, the anhydrous salt can be thrown into the waste container and the evaporating dish washed.

Friday, August 16, 2019

Ethnocentrism: Culture and Editorial Board Essay

ABSTRACT There are many issues that can be attributed to an individual’s cultural beliefs and how they can relate to another individuals specific cultural beliefs and set standards. Sometimes these issues can be minor and dealt with appropriately, but in other cases these cultural differences can be monumental and cause different societies to wage wars against one another. The way that an individual judges or perceives other cultures beliefs and standards based on the guidelines of their own culture is what sociologist refer to as ethnocentrism and is what we are going to be looking at in further detail in this paper. There are many factors that contribute to the persistent societal disputes and disagreements that are forever occurring throughout the globe. There is a great divide that can be felt in regards to understanding and accepting each individual society; each one has its own unique culture and many individuals are not capable of viewing a culture different than their own without passing predisposed judgments and ideas that are typically instilled by their own culture. Ethnocentrism is a term that sociologists use to define this universally occurring unaccepting set of attitudes and behaviors. Ethnocentrism can be attributed to social evolution, local & foreign competition and can also be a result of cooperation with what is considered to be the in-groups and not the out-groups (Axelrod & Hammond, 2003). The main concept of ethnocentrism is individuals seeing their specific group or culture as being the in-group or the superior to the other cultures and the individuals that they are compri sed of. Judging another culture by the standards of their own; it is important to remember that ethnocentrism is not the same as racism (Rodriguez, 2013). Culture is a very important factor of ethnocentrism and it is vital to understand what is it; culture is everything that can be associated with a specific group of individuals, it is the way a group of individuals or society think and act in a common manner generally a result of how they were  raised, the way they communicate; a common set of ideas or the making and understanding of symbols special to that group as well as the traditions that unify that group of individuals by having established shared values, beliefs and customs. Culture includes also the things that we own, the material objects that we consider to be important and the social institutions that we value, mores and folkways and the technology that is available and depended on (Editorial Board, 2012). As Americans there are many things as a society and culture that we have become accustomed too; freedom of choice and speech, freedom to express our individuality; the United States was founded on the principle the equa lity for every individual is fundamental and is the reason we have become more commonly known as the melting pot. There are many various cultures that are represented throughout our society and many of which are to some degree maintaining the characteristics and traditions of their homeland (Editorial Board, 2012). The fact that America is considered to be a melting pot and is the land where foreign individuals come for their chance at the American dream is considered to be a large contributor of ethnocentricity mentality of white Americans. This mentality leads to a sense of power and superiority and the labeling of other cultures as unequal or unimportant in our country; in many this leads to a sense of resentment from both sides resulting in violence. There are many aspects of the American culture that we consider to be acceptable, the correct way of doing things; these behaviors are specific to our culture, our norms (Editorial Board, 2012) and just as we may be offended and by aspects of other cultural norms it is important to remember that the same is true for other cultures as well, they may find them to be extreme, disturbing or even unethical. It is important to remember that many cultures view us with the same predetermined judgments and perceptions Set by their own culture and that ethnocentrism is not only how Americans view other societies and why the violence and destruction due to these judgmental attitudes is so prevalent. Many of the fundamental concepts and behaviors of the American culture are not considered to be acceptable in other cultures such as our principle of freedom and equality, these are not common attributes of many societies,  equality and individualism are nonexistent in many; our general lack of informality both professional and personal has a tendency to make members of different cultures uncomfortable and can be punishable by law in some (Rodriquez, 2013). If an American were to go to a traditional Arab society in the summer months wearing our traditional summer attire, shorts, thank top and sandals it would likely cause an issue; this societies cultural standard requires women to be fully covered from head to toe and has very strict rules; I have no doubt that she would be harassed by local law enforcement and even made remarks to by local civilians, she would be started at and considered to be very unacceptable because this is not what is deemed acceptable in their society. This assignment required us to watch a movie that communicated the cultural values and norms of a different culture; for this I decided to use a tradition that has become a cultural norm in variations throughout many societies. This tradition originated in Egypt and was borrowed by many other cultures and changed to fit their own cultural & religious needs. This traditional ritual I still practiced today in many different cultures considering our own. This is not a topic I would generally consider for a paper but it certainly did provide me with a unique cultural experience. The movie I watched was called the cut it is a short documentary on the controversial ritual of female circumcision also know in many cultures as female genital mutilation. This documentary was on the prevalence of the tradition in Egypt but this is also a common procedure in many other cultures. This ritual has been performed for over 200,000 years and is deeply imbedded in the roots of the Egyptian culture (The Cut, 2013). FGM is just as common in many cultures, if not more as the circumcision of infant boys in the American culture but due to the nature of the procedure has been considered a highly controversial, undiscussed issue tha t affects many different cultures and more specifically a large amount of the female members of these cultures. The documentary reported that over 90% of the females in Egypt have been through the procedure and there are similar numbers in other practicing countries. Many young girls some as young as 9 years old are forced to go through this ritual often bound and gagged without regard to the children’s wishes, there are 2 different types of FGM both undoubtedly extreamly painful; the first type removes only the clitoris while the second type removes both the clitoris and the labia; this is done  by inserting pins into the top and bottom as well as the middle to stretch the skin and enable a mid-wife to cut the skin. This procedure is done with no anesthesia and due to the fact that it was outlawed in Egypt 5 years ago it is often performed in the child’s house. The outlawing of FGM has been of little benefit, if anything it has caused more damage. Infection and death have become more common as many parents fear prosecution and do not get medical attention when necessary result ing to an increase of deaths from the ritual. FGM was the main topic of the documentary but it also offered a visual image of their surrounding; the area where they were filming looked like a whole other world, a dust covered, and dirt road, full of clay hut like houses where the women were completely covered wearing traditional vales. I was surprised to see that many of the men who were filmed walking down the busy shop lined streets were wearing similar dress clothes to that of our American business men, they had on expensive looking suits some had ties, some did not, and I was also surprised that there were some wearing jeans and t shirts. One of the interviews was conducted inside the women’s house which was elaborately decorated with silks and beautiful gold statues and metal accents. There was also a strong behavior difference, in American society many people like and want to be on TV, news and radio interviews are conducted every day on sensitive subjects but this is not the case for the women on this documentary. Many of them appeared to be fearful and reluctant due to the fact that their culture considers it unacceptable to speak with anyone especially outsiders on camera about such a sensitive traditional subject (The Cut, 2013). There are many reasons that I personally had the reaction I did to th e documentary and more specifically the subject matter itself, being a women of any culture makes this an offensive tradition or cultural belief; this part of the female body is a very private if not sacred part of the body and to forcibly remove it with no regard for the young girls wishes is very disturbing. To imagine the pain they are subjected to and the lifelong consequences it can have; there have been no medical benefits associated with the procedure, in the Egyptian culture there is not much of a religious aspect of the ritual either it is conducted on behalf of the groom’s family and is often a requirement for marriage. I find it unfathomable that these young women are forced through this ritual with no anesthesia or pain medication during or after to remove the parts of  the female body that are capable of arousal or pleasure out of fear they will enjoy this experience to make them more desirable to be a bride. As American’s we are exposed to sex on a daily basis, TV shows, commercials, movies and even the news, American’s are fascinated with sex; it is a form of entertainment for us, a type of communication and for some even a career and others just a hobby, this just goes to show the level of difference that can be seen between various cultures. In many different cultures sex is not spoken about ever, in our culture it is hard to make it through the day without hearing a reference to sex. Many relationships in our culture especially one between a man and his wife have a foundation to some degree on physical romance and the connection that it forms. In many of these sexual relationships the ultimate goal is personal pleasure or satisfaction of both individuals, look at the abundance of his/her personal lubricants, condoms and other accessories that are present in our culture to ensure and enhance this process, there are even herbal remedies and prescription medications to help women achieve orgasm during sexual intercourse. This is not the case in Egypt and other cultures that practice FGM; this ritual is performed as not only a method of purification but to prevent female orgasm the pain is supposed to serve as a reminder that sexual arousal and pleasure is unacceptable (The Cut, 2013). There are many complications associated with this ritual and has been proven to be more harmful physically and mentally than beneficial; many of the members of these practicing cultures see it as a symbol of purification and not an act of violence. In many cases of FGM the mother in law will check to ensure their son is marrying a pure women and it is also believe that young women that are not circumcised will be short, stubby and unattractive. I find it shocking that this practice is still so common or ever was in the first place, many female members of these societies also find this ritual to be disturbing and unnecessary. I feel that many members of our society would find this aspect of the Egyptian culture to be disturbing and would certainly cause an ethnocentrism attitude. In our American culture we have a similar tradition, many still consider this to be controversial but the circumcision of infant boys is also embedded deep into our cultural roots and has been performed for many generations. In our society the cultural  norm is to remove the excess skin while the child is still an infant and the pain will not be remembered; this tradition is slightly religious and slightly attributed to medical benefits such as decrease risk of infection later in life but was originally used to signify the transition from boy to man as well as to purify the body as the openings were believed to be entrances for impure malignant spirits (Millett, n.d). There are critics and opposers to our tradition as well both inside and out of our own culture which can be seen as another example of ethnocentrism. Many associate both FGM and circumcision of infant boys to be a form of hierarchical control by subjecting young children to conform to a hierarchical system and religious beliefs and cultural norms that they may not wish to be associated with (Millett, n.d). It is often very difficult for members of a society to accept, understand or even conform to their own cultural standards never mind those of a different culture; how an individual or group of individuals act or react in relationship to others, especially a different culture is what sociologists refer to as social interaction and is fundamental to understanding and having the ability to understand the thoughts, actions and interactions with other individuals, especially those that are different than ourselves (Editorial Board, 2012). As human beings there is undoubtedly one thing that we have in common, our reluctance to accept that which is different, to understand the action of others in which we disagree with, these negative attributes of our species leads to a great deal of conflict and violence which and between both homogenous societies such as Egypt which is mainly comprised of the same culture and dichotomous societies such as America which is made up of multiple various cult ures. Homogenous societies generally have less controversy and issues than that of dichotomous due to the fact that most members are raised and socialized in the same manner and have a similar shared set of values but even in these societies there can still be conflict like that surrounding the controversial topic of FGM. A dichotomous society is much more likely to have conflict between the various cultures present and the complications it can bring when trying to communicate on an interpersonal level; these issues and complications are also large contributors to ethnocentrism. There are many consequences of  ethnocentrism and the attitudes associated with it and are a large part of our inability as not only a nation but globally to deal with many of the important critical issues that often get neglected due to the fear of being uncomfortable and lack of understanding as well as the effort necessary to effectively work interdependently with other societies and cultures and the individuals they are made up of too support and aide rather than to judge and wage wars based on our own specific cultural standards and beliefs. REFERENCES Editorial Board. (2012). Introduction to Sociology. (1st ed), Prentice Hall The Cut. (2013). Female Circumcision is Egypt is Custom, Tradition and Religion. Retrieved on 4/17/2013 from http://www.youtube.com/watch?v=a25S9jrEmKc

Civil Disobedience to Black Power Essay

Up until the 1960’s the civil rights movement was practiced through peaceful protests established from the idea that equal recognition amongst all peoples was only acquired through non-violent acts. In the late 60’s these techniques transformed into fast and more efficient methods with different value sets. The changes within the Civil Rights movement occurred because African Americans were sick of the painfully slow progress accomplished through the civil rights movement, didn’t agree with the idea that being mistreated, disrespected, and stomped over (figuratively and literally) was the only resolution to overcome racism and segregation, and decided that violence and bloodshed (stemming from the theory that asking for deserved rights was to slow a process, when they could just take them) was aggressive enough to catch the eyes of many and gain Black Dominance or at least equal rights. Even with the Civil Rights Act in place, African American’s were tired of being neglected and disregarded. Peaceful protesting was only doing so much, the alternative of Black Power had begun to flourish in the late 60’s because it demanded respect through violent, attention-grabbing approaches that were created to actually change segregation and equality. The 1950’s and early 60’s were eras driven by the consumer culture, the US was extremely wealthy, the automobile industry was booming, suburban lifestyle had grown, television became extremely popular, and the general view of America was good (to say the least). The only ‘bad’ aspect of the US was inequality and the unrecognized rights (Blacks deserved). The US originally opted for saving justice and peace amongst Black communities in civil and non-violent ways, but there was limited execution. In 1954, for example, the Supreme Court unanimously ruled segregation in public schools unconstitutional in Brown v. Board of Education. This landmark case began a series of significant Civil Rights movements with regards to desegregation and equal rights. The early 60’s brought upon new perspectives and the idea of peaceful resolution was one of them. Due to the fact that American culture was thriving in material goods and prosperity African Americans figured the best way to go about change was to do it in calm, civil, non-brutal manners. Organizations like the National Association for the Advancement of Colored People (NAACP), Congress of Racial Equality (CORE) and the Southern Christian Leadership Conference (SCLC) began to emerge. Doc A, B, and C convey the goals pertaining to African Americans (in the early 0’s) and their hope for equal rights, legal citizenship, voting rights, and equal economic/labor opportunities. Doc A showcases the Student Nonviolent Coordinating Committee’s perspective that love transforms hate and nonviolence is the best way to bring about integration. The early 60’s held so much potential and optimism. African American’s were seeking equal privileges so contently because they experienced Americans’ positive response to America’s success and didn’t want to harm the culture or destroy the peace. One attempt for Civil Rights included a peaceful protest in Birmingham, Alabama. The response of the police was outrageous. As seen in Doc B, the photograph (from 1963) shows racist and corrupt police attacking African Americans after a peaceful protest (to allow Blacks into church). Rather than defend himself, the black man depicted in the photo is responding with no resentment or anger. Many African Americans were beaten and sent to jail; including Martin Luther King, Jr. Doc C (1963) is a letter written by MLK from the Birmingham Jail promoting peace and arguing that â€Å"injustice anywhere is a threat to justice everywhere. † MLK desired peace rather than violence because of his educational background and upbringing-his father was the minister of the Ebenezer Baptist Church and he passed on his understanding, tolerance, and religious views (inspired by peace) to his son. MLK could be peaceful, even after going to jail for no reason. After the Birmingham incident, John F. Kennedy announced his promise to end racial discrimination on radio and television. The speech served as motivation to civil right leaders, a wake-up call to Congress, and the inspiration for the Civil Rights Act of 1964 and Voting Rights Act of 1965 (unfortunately JFK never lived to see these passed). Although these rights were legally authorized, African Americans were not fully protected. Just because they were laws in place, didn’t mean they were implemented with major concern or emphasis. Race riots, racial profiling, and illegal discrimination were still occurring. African Americans realized that in order to truly get what they wanted, they needed prompt uncivil protests. Stokely Carmichael, a violent-protest-supporter, coined the phrase â€Å"black power† and stated â€Å"I am not going to beg the white man for anything I deserve; I’m going to take it. † We see the change in strategy for Black Nationalism. Carmichael’s speech, entitled, â€Å"what we want† from 1966 (Doc E) implies the only way to get money, property, respect, and in general civil rights for African American’s is to demand it, whether it was by strike, boycott, riot, or any other possible means of violent rebellion. The reasons why there was such a focus on gaining equality through violence was because peaceful protests were not developing equality quick enough, African American’s needed each other in order to attain enough votes for one collective ballot, and violent acts needed the most attention because they needed to be stopped the fastest. Take, for example the scenario of when a child throws a fit, the parent will do whatever it takes to stop the child’s interrupting objection and annoying whines, the same initiative for Black Power. Some philosophers even argue that Black Power was an act of revenge, Blacks felt obligated to torture Whites and act in violent ways to get even with them for their previous treatment of African slaves. At this point African Americans had to fight for things Whites got easily, like jobs, money, respect, social status, religion, privacy and the general right to be able to go to common-day-places (like the grocery store or local restaurant) and not have to worry about discrimination. The Black Panther Party for Self-Defense (Doc F in 1967) preached that black people must resort to violence because they have not made any gains through peace. Malcolm X, a Black Power activist and violent-protesting-leader supported this idea and said, â€Å"Stand on your own feet and solve our problems ourselves instead of depending on white people to solve them for us. † This quote shows the foundation for Black Power-fast, unexpected, memorable recognition. Malcolm X ridiculed Martin Luther King’s attempt at Birmingham saying it showed the uselessness of nonviolent-protest. The increasing amount of African Americans promoting violence concerned American citizens. Whites believed that if the government didn’t take action, mass riots and destruction would erupt everywhere, and they were somewhat on track. By 1968, (according to Doc G) 62% of African Americans were registered to vote, that’s 33% more than in 1960. This evidence suggests that the violent acts did make an impact and shape the Civil Rights movement into what we view it as today.