Monday, September 30, 2019

Law and Order in Civil Society

The laws that govern us in the UK are often used to describe the freedoms that we enjoy. There are no political prisoners (although follows of Julian Assange may disagree), freedom of speech is widely practiced and people can go about their business without fear of persecution. It has not always been this way in the UK, but a succession of investigations, inquiries and laws bought in since the 1980's had bought Britain to this place. Robert Leach describes Law Making as â€Å"ostensibly the most important function of parliament†. (Leach, 2006, P233). Lets start by looking at the law as a whole. The law is essentially to protect its citizens. Law's passed down by the central powers, investigated and enforced by the police and the Judiciary will determine the level of punishment if necessary. Laws don't just ensure that people can't commit murders, robbery or vandalism but will also cover how your employer may treat you and the obligations they have to support you as an employee. Laws will also affect how one companies do business with another and how you drive your car. Law affects us as an individual on a daily basis, not just when we have done something wrong. There are many different variations of law's. International law will affect how nations interact with each other. National law is the law of the land, and can vary widely between states. In the United Kingdom corporal and capital punishment has been removed, but corporal punishment can still be found in some states such as Iran and capital punishment can be found in more developed nations such as the USA and India. In the UK THE National legal system is broken into three; that of England & Wales, Scotland and Northern Ireland. National laws will fall into one of two categories again; public & private. (Martin, 2007, p1) Public law will involve the government or the state, and there are three main types of public law; Constitutional Law – covering electoral or democratic issues and disputes; Administrative Law – looking at how the state is allowed to operate; Criminal Law – the application, enforcement and punishment of the individuals who break clearly stated law. (ibid, p2) Private law sees no state involvement, as the disputes are ones of a private matter. This could be an individual who felt that the new television he or she bought was not up to the standard advertised (contract law), a brother and sister trying to settle their late father's will (family law) or a PLC's obligations to their shareholder (company law). There are many more forms of private law and many laws laid down to regulate the state in which we live. (ibid, p3) As we can see, the laws in this country cover many different areas and many different groups. The laws are there to protect the people. Without laws, there would be anarchy. In the early 19th Century an man called John Austin defined law as being a command issued from a superior (the State), to an inferior (the individual) and enforced by sanctions. Some would consider this an inaccurate description as the law (and the State) can be challenged in the 21st Century. (ibid, p9) The Police are the front line force of law enforcement. They are responsible for investigating crimes, gathering evidence and deciding whether to charge a suspect. They play a wide and important role in the overall application of the law. The Police hove powers over suspected criminals that can be used to assist the conviction of the guilty. However, the police have been criticised for abusing their powers, occasionally leading to serious miscarriages of justice as the well know cases of the Guildford 4 and the Birmingham 6 demonstrated, and it was incidents such as these that led to the introduction of PACE. (Elliott, 2010, p384). The Police and Criminal Evidence act 1984 (PACE) was introduced to modernise the power of policed in the UK as a result of an inquiry led by the Royal Commission on Common Procedure (RCCP). PACE provides the code of practice that police forces have to abide by. Failure to comply with PACE can lead to misconduct charges against a police officer. As PACE is a code of practice rather then an Act of Parliament it can be easily amended if necessary. (Malcolm, 2007, p154) The codes cover several areas; Code A deals stop and search powers, Code B gives powers to search premises and seize property, Code C deals with detention treatment and suspect questioning, Code D relates to identification procedures, Code E deals with tape-recording suspect interviews, Code F guides on visual recording with sound interviews, Code G on arrest powers and Code H terrorism suspects under the Terrorism Act (2000). (Martin, 2007, p149). PACE affects every police officer in the country, but police forces in the UK are traditionally run as local police forces. The theory behind having a more decentralised approach was to create links to the community being policed and reduce the risk of Police oppression. A more centralised approach was taken with the Police Magistrates' Courts Act (1994) which allowed the Home Secretary to set objectives for all UK police authorities. The power increased further with the Police Reform Act (2002) and the Home Secretary will now produce an annual National Policing Plan which will set strategic policing policies for Police Forces in England and Wales. (Elliott, 2010, p382) The Bichard inquiry into the murders of Holly Wells and Jessica Chapman in 2002 was heavily critical of the Humberside police (ibid, p382). Published in June 2004 the inquiry noted that the failings of the Humberside Police were ‘systemic and corporate' (Bichard, 2004, p7). Despite the effects of this report, the Chief Constable of Humberside Police refused to resign. The Home Secretary suspended the Police chief, who challenged the legality of this action. The matter went to court where the Home Secretary's right was upheld. Since the inquiry the Police and Justice Act (2006) has increased the powers of the Home Secretary over the Police. (Elliott, 2010, p382) It is not just the Home Secretary that has powers over the police, but ordinary citizens as well. Should they wish to make a complaint to a police authority then this must be recorded by that police authority. The police must ‘obtain and/or preserve evidence' which is relevant to the complaint. Minor complaints can be dealt with by an acknowledgement of the error and a formal apology. If the complaint is upheld for a serious matter then senior figures form the police force will investigate and take any appropriate disciplinary action. If the complaint relates to a senior officer, the matter will be investigated by a separate police force. (Martin, 2007, p165) The Independent Police Complaints Commission (IPCC) exists to supervise the complaints procedure against police officers and staff and will set out and enforce the standards which must be followed. The IPCC also has powers to investigate any serious issues they may discover or that are bought to it's attention (Martin, 2007, p166). This was the case with John Charles De Menezes when his family made a formal complaint in 2005 (IPCC website – accesses 29/12/2010). The IPCC is designed to protect the people form those whose role is to protect the people. Acts such as PACE exist to give clear guidelines as to what a police officer can and can't do, yet there is an inevitable clash with Civil Rights issues In order investigate criminal suspects and criminal activity effectively the Police will need to have powers to stop and search individuals, to enter a person's house and make arrests if they suspect an individual is guilty of a crime. The power to interview and interrogate suspects and hold them in detention if necessary is a vital part of the investigative process. These are indisputable facts, and the power the police have over the individual is great. So what of civil rights? Anyone who is suspected of a crime should be safe in the knowledge that they will not be tortured, beaten or have a false confessions taken from them. (Davies, 2007, p153). In light of events in recent years police may need to prove that a suspect has not been chosen as a suspect because of their race or ethnicity. The BBC documentary â€Å"the Secret Policeman† first aired in October 2003. Film-maker Mark Daley went undercover in a police training camp to find out if the police was an institutionally racist organisation. Despite the reporter finding that this was not the case, there were several instances of clearly racist and bigoted behaviour which was described by the chairman of the Commission for Racial Equality as â€Å"truly shocking†. (BBC Website – accessed 29/12/10) Following the documentary ten police officers involved resigned and twelve more were disciplined and three police trainers were removed following a Police Complaints Authority (PCA) investigation, in agreement with the Independent Police Complaints Commission (IPCC). The Campaign for Racial Equality launched a formal inquiry and made 125 recommendations for change. (BBC Website – accessed 29/12/10) A topical issue of recent times concerns the policing of demonstrations. On 01 April 2009 Ian Tomlinson was assaulted at the G20 demonstrations in London. Although not a participant of the demonstrations, the Mr Tomlinson was in the area at the time of the protest. Later that day he seemingly died of a heart attack. A short while later, The Guardian released footage showing Mr Tomlinson being violently pushed to the ground by a policeman shortly before he died. A second autopsy alleged that Mr Tomlinson had died of internal injuries. (Elliott, 2010, p416). Allegations of Mr Tomlinson being beaten by police prior to the footage of him being forced to the ground by an officer continue, and a full inquiry will begin on 28th March 2011 (www.iantomlinsonfamilycampaign.org.uk – accessed 05/01/11). The debate between police powers and civil rights will continue over the next few years from 2011. The outcome of miscarriages of justice such as the Guildford 4 and the Birmingham 6 led to the introduction of PACE. The Secret Policeman documentary sprung from the MacPherson report into the murder of Stephen Lawrence which called the police â€Å"institutionally racist†. The death of Ian Tomlinson, as well as the recent clashes between police and demonstrators over university tuition fee's in November and December 2010 and the Police's use of the ‘Kettling' technique, has called into question the policing of demonstrations. With more demonstrations planned for 2011 as well as the results inquiry into the death of Ian Tomlinson, police power and accountability will debated again. The simple truth is that police officers need the rational-legal authority to investigate and prevent criminal action. Without it they could not effectively enforce the law. None the less, civil liberties that many people have fought and died must be protected. Malcolm Davies is right when he says that â€Å"legislation on police powers must balance conflicting needs of crime prevention and due process† (Davies, 2007, p153).

Network Security Plan Essay

INTRODUCTION (Purpose and Intent) The Corporation Tech IT Network Security Plan establishes guidelines for IT practices used on a day to day basis to provide a secure and robust computing environment. These practices are used in order to protect the mission, operation, and reputation of Corporation Tech System and its information systems. These system security policies, standards, and procedures that have been established for the Corporation Tech System, are intended to comply with the regulations and policies set down by the State of Florida, Corporation Tech, and the Federal Information Security Management Act (FISMA). SCOPE These standards and procedures apply to all information systems and resources under the control of Corporation Tech, including all computers connecting to the Corporation Tech network and all Corporation Tech System employees, contractors, and any other individuals who use and/or administer those systems and computers, particularly those involved with information system management. STANDARD PROVISIONS Corporation Tech IT will manage risk by identifying, evaluating, controlling, and mitigating vulnerabilities that are a potential threat to the data and information systems under its control. User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibited  from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or Internet computing resources. In the interest of maintaining account security, passwords will be changed on a regular schedule or anytime the integrity of the account is in question. Corporation Tech IT network or computing resources may not be used for personal commercial purposes, for personal profit or to violate the laws and regulations of the United States or any other nation, or the laws and regulations of any state, city, province or other local jurisdiction in any material way. Use of Corporation Tech resources for any illegal activity may result in loss of network access privileges, official reprimand, suspension or dismissal. Corporation Tech will cooperate with any legitimate law enforcement agency or inquiry in the investigation and prosecution of any alleged wrongful activity. Corporation Tech’s network or Internet facilities may not be used to disable or overload any computer system or network, or to circumvent any system intended to protect the privacy or security of another user. Corporation Tech owned networking and communications equipment, may only be moved by Network and Computing Support staff, or authorized agents. Reconfiguration of network hardware or software, except by designated individuals within IT, is strictly prohibited. Prior to connecting any server, network communication or monitoring device to the Corporation Tech Network, approval must be obtained from Data Center Communications. Attachment of any the following devices to the Corporation Tech network, other than those provided or approved by Network and Computing Support, is strictly prohibited: a. DHCP servers. b. DNS servers. c. NAT routers. d. Network Gateways. e. Packet capturing or network monitoring devices. f. Any device that disrupts or negatively impacts network operations. STATEMENT OF PROCEDURES The procedures for conducting a risk assessment and for the control and mitigation of risks to the Corporation Tech Information Systems include: NETWORK CONTROL Corporation Tech IT has software and systems in place that have the ability to monitor and record network, Internet and computer system usage. This includes monitoring and security systems that are capable of recording network traffic, including traffic to World Wide Web sites, chat rooms, newsgroups and e-mail messages, file servers, telnet sessions and file transfers into and out of our internal networks. This capability is necessary in order to maintain the health of Corporation Tech network operations and diagnose network related problems. Corporation Tech IT reserves the right to perform network monitoring at any time. The information collected may be used by technicians and management to assess network utilization and trends, and may also be provided to upper management or other authorities as evidence as part of any investigation of alleged policy violations. Corporation Tech IT reserves the right to perform periodic port scans, segment sweeps, and vulnerability scans on all network segments. Network operations, functions, and resources, which are not required as part of the normal and approved job duties or projects at Corporation Tech, may be bandwidth limited or blocked by network control devices in order to protect the integrity and availability of the overall system. Corporation Tech IT may suspend network access to any location or system that disrupts normal network operations or systems that violate Corporation Tech policy. In this event, an attempt will be made to contact the responsible individual to resolve the problem. DHCP SERVICES Corporation Tech IT provides centralized and redundant DHCP and DNS services for Corporation Tech. Due to the nature of these services, and because of the potential disruption of service and possible security breaches resulting from incorrect setup of additional systems, attachment of unauthorized DHCP or DNS servers is prohibited. The following guidelines must be followed when requesting or using any DHCP or DNS services: †¢ Systems requiring an IP address must support DHCP and be capable of obtaining DHCP address information from one of the centrally administered University DHCP servers. †¢ Using DHCP, devices requesting an IP address will be assigned a dynamic pool address from the subnet to which the device is attached. Devices with dynamically assigned IP addresses may have their address change. †¢ Static IP addresses needed for server class machines or specialized clients must be  requested from the Data Center Communications Team via a Help Desk ticket. DNS SERVICES User workstations, which have been assigned a dynamic pool IP address, will have an associated DNS name assigned by the network. Any DNS name or domain name that is to be associated with Corporation Tech network, must be requested from and/or registered through Web Services. DNS names ending in corptech.com are made available upon request for Corporation Tech approved services. Requests for assignment of DNS names must be for valid Corporation Tech related purposes. DNS names for domains other than corptech.com, and which are to be hosted by Corporation Tech systems, must be requested from Web Services. Any charges for initial or ongoing registration of the requested name are the responsibility of the requestor. DNS names, not in the corptech.com domain, will be handled on a case by case basis. Corporation Tech IT will work with any user requesting a domain name to identify an appropriate and available name, however Corporation Tech IT has final approval for all DNS name assignments. WIRELESS NETWORK SERVICES Because wireless networks can be used to provide access to the same resources and services as wired network systems, the same basic procedures that are used in a wired network environment can also be applied in a wireless network environment. However, due to the nature of wireless networks, additional security and control mechanisms are needed in order to maintain the security, operation and inter-operability of both traditional and wireless systems. Wireless routers are not allowed on the Corporation Tech network unless they have been approved by Corporation Tech IT. Access to the Corporation Tech Wireless network is limited to individuals who have a Corporation Tech account except in locations where the guest network is available. The Corporation Tech Guest Network is segregated from the internal servers and resources used by authenticated users to keep the network secure. The Corporation Tech Guest Network is only available in approved areas, and require a request to be expanded into any other areas. Users of the Corporation Tech Guest Network are required to provide a valid cell phone number in order to authenticate. Destruction and Disposal of Information and Devices Restricted information must be disposed of in such manner as to ensure it cannot be retrieved and recovered by unauthorized persons. When donating, selling, transferring, surplusing or disposing of computers or removable media (such as DVDs), the proper procedures to make data unreadable on those media will be taken. Acceptable procedures are listed on ISSP-009, â€Å"Medial Disposal.† NETWORK ACCESS Anyone who uses the Corporation Tech computing environment must have appropriate status (e.g. management, employee, staff, or authorized third party) and must be properly authenticated when required. Access will be provided to vendors and or other Corporation Tech partners through the sponsored VIP account process, as described on http://www.corptech.com/it/services/vip.aspx. VIP accounts are reviewed and renewed on six month intervals to see if access is still needed. When an employee leaves the organization accounts will be disabled once TERM status is updated, and individual departments must approve re-activation of account access. USER COMPUTING DEVICES Users are responsible for the security and integrity of Corporation Tech information stored on their workstation, which includes controlling physical and network access to the equipment. Users may not run or otherwise configure software or hardware that may allow access by unauthorized users. Anti-virus software must be installed on all workstations that connect to the Corporation Tech Network. Corporation Tech Computers may not be used to copy, distribute, share, download, or upload any copyrighted material without the permission of the copyright owner. PHYSICAL ACCESS Access to Corporation Tech IT Data Center should be restricted to those responsible for operation and maintenance. Access by non-IT personnel is not permitted unless they are escorted by an authorized IT staff member. Computer installations should provide reasonable security measures to protect the computer system against natural disasters, accidents, loss or fluctuation of electrical power, and sabotage. Networking and computing hardware are placed in secure and appropriately cooled areas for data  integrity and security NETWORK HARDWARE Network hardware are housed behind a locked door to protect physical access to switches and other network hardware. Access is only allowed though card access or with a checked out key. All switches and network hardware are password protected at a minimum via a local account setup on the device itself, these passwords are changed periodically as administrators leave the organization. Subnets allowed to authenticate with switch management will be restricted, to create tighter control of backend administration. Exec level access Timeouts implemented on Console and VTY lines, so that any idle sessions are terminated automatically. All switches are time synced using NTP, so that incidents can be tracked and correlated to the proper timeframe. SERVER ENVIRONMENTS All servers are subject to a security audit and evaluation before they are placed into production. Administrative access to servers must be password protected and use two-factor authentication whenever possible. Servers should be physically located in an access-controlled environment. All internal servers deployed at Corporation Tech must be owned by an operational group that is responsible for system administration. Servers must be registered with the IT department. At a minimum, the following information is required to positively identify the point of contact: a. Server owner contact(s) and location. b. Hardware and Operating System/Version c. Main functions and applications d. MAC address (If not a virtual server) Services and applications that will not be used must be disabled where practical. Access to services should be logged and/or protected through access-control methods to the extent possible. The most recent security patches must be installed on the system as soon as practical. Do not use administrator or root access when a non-privileged account can be used. Privileged access must be performed over secure channels, (e.g., encrypted network connections using SSH or IPSec). EXCEPTIONS All requests for exceptions to these standards and procedures will be handled by request, and will follow these guidelines: †¢ Must be submitted in writing to and approved by the CIO or with the proper authority. †¢ Will be reviewed on a case by case basis. NETWORK SECURITY Corporation Tech network design is built around three principles, Defense-in-Depth, Compartmentalization of Information and Principle of Least Privilege. Our first step was to look at what we are protecting, which is ultimately our business and clients data and information. To ensure a sound architecture we started the design of our network with scalability in mind. It is important that our design is flexible enough to meet future needs. The threats we know about and face today may not be the ones we face tomorrow. While developing security requirements for our IT system resources, we will determine if they are mission-critical or data-sensitive resources. This will allow us to determine where data confidentiality and integrity are the most important requirements, or where the priority is continuity of operation (availability). DEFENSE-IN-DEPTH Network safeguards offer the first protection barrier of IT system resources against threats originating outside the network. These threats can be in the form of intruders or malicious code. Our network design offers layered protections. What this means is the security layers complement each other; what one misses the other catches. This will be accomplished by locating security defenses in different places throughout our IT system, as well as not using two of the same types of safeguards. Although this may increase the complexity of our security system and can potentially make management and maintenance more difficult and costly, we believe the safety of the IT system resources should be based on the protection. With defense-in-depth in mind, the first layer of our network security plan starts with our network perimeter security. The principle network security defenses are firewalls, intrusion detection and prevention systems (IPS/IDS), VPN protections and content inspection systems like anti-virus, anti-malware, anti-spam and URL filtering. The traditional first line of defense against attacks is typically the firewall, which is configured to allow/deny traffic by  source/destination IP, port or protocol. It’s very straight forward, either traffic is allowed or it’s blocked. With the advent of Next Generation firewalls, which can include application control, identity awareness and other capabilities such as IPS, web filtering, and advanced malware detection, all of these features can be controlled by one device. COMPARTMENTALIZATION OF INFORMATION Corporation Tech will have IT system resources with different sensitivity levels or different risk tolerance levels and threat susceptibilities. These resources should be located in different security zones. The idea is to hide the data or information and make it available only to those systems where it is necessary for conducting system tasks. Examples of this are: †¢ E-mail, Web and DNS servers are located in the DMZ behind the perimeter firewall. †¢ Databases servers such as SQL servers are located in the Database Zone, within the internal firewall/IPS. †¢ Intranet servers, file servers and user workstations are in the LAN zone within the internal firewall. †¢ The Internet is located in the Internet zone behind the perimeter firewall. Principle of Least Privilege Corporation Tech administrators and users will have minimal privileges necessary for proper functioning within the organization. This rule applies also to data and services made available for external users. An extension to this rule is the â€Å"Need-To-Know† principle which says that users and administrators of Corporation Tech IT system have access to only the information relevant to their role and duties performed. Other points of security that we will address in our network services availability is the single point of failure principle, the separation of duty and job rotation rules. The network paths between users and mission-critical IT system resources, all the links, devices (networking and security) as well as the servers will be deployed in redundant configurations. The goal of the separation of duty and job rotation rule is to limit an employee’s ability to neglect and break the IT system’s security policy. Separation of duty dictates that important tasks/functions should be performed by two or more employees. Job rotation states that there should be rotation of employees in important positions. NETWORK HARDENING For each layer of security, we will ensure they are running the most up-to-date software and operating systems, and that the devices are configured properly. SECURITY ZONES Intrusion Prevention (IPS) devices are responsible for detecting and blocking penetrations and attacks conducted by intruders and malicious malware applications. We recommend an IPS be installed in the network path between potential threat sources and sensitive IT system resources. Attacks through encrypted SSL sessions are a potential vulnerability so we recommend decrypting the sessions prior to it reaching the IPS device in order to inspect unencrypted packets. The IPS will be properly optimized and monitored to catch attackers that have slipped past the first defense (firewall/router). Internal networks will not have direct access to the Internet so a Trojan sent to a user’s workstation through a phishing attack would not allow the intruder to connect to the external network. Internet services are available for internal users only through company email and HTTP Proxy servers. ENABLE SECURE NETWORK ACCESS We will install a VPN that is configured to allow encrypted communication to our network from the outside. Utilizing two-factor authentication, ensuring the integrity of the users making the request. This is external-facing to our network and allows users to tunnel into our LAN from the outside once the appropriate measures are taken to secure access. SEGMENTED DMZ There will be a front-end firewall for the external traffic and a back-end firewall for the internal traffic. Firewall rules will be optimized and tightened on all publicly available systems to allow traffic to only the necessary ports and services living within the DMZ. Firewall rules have been created to only allow the source IP addresses and port to the specific servers and proxies have been added in the network from which administrators are allowed access to the systems. Systems within different VLANs (with a layer 3 switches) have been configured to help isolate and respond to incidents if a server in the DMZ is compromised. Authentication on the LAN is required before access to the DMZ is even attempted. This prevents allowing complete control over these systems at any given time. DEVICE  INTEGRITY All hardware and software will be purchased only from the manufacturer or from resellers who are authorized and certified by the equipment manufacturer. Unused physical interfaces on network devices will be shut down. Access lists that allow only those protocols, ports and IP addresses that are required by network users and services are implemented. Everything else is denied. Network device configuration file are protected from unauthorized disclosure. Steps have been taken to avoid plaintext passwords in the configuration files. This has been accomplished by using encryption and/or a salted hash with iteration to protect the confidentiality of passwords in configuration files. Change passwords/keys immediately if the network device configuration file is transmitted in the clear (or is otherwise exposed) while containing non-encrypted passwords/keys. Secure protocols will be used when transmitting network device configuration files. All unneeded services on network devices must be sh ut down. Log files will be reviewed regularly to gain an in depth understanding of normal network behavior. Any irregularity will be reported and investigated. SECURE MANAGEMENT Only secure protocol standards (SSHv2; IKEv2/IPsec; TLS v1.0+) will be used when performing remote management of network devices. Default usernames and/or passwords will not be used. The network infrastructure security policy should define password length and complexity requirements. Review the network infrastructure security policy. This policy identifies who is allowed to log in to network infrastructure devices and who is allowed to configure network devices, and defines a plan for updating network device firmware at scheduled intervals. PORT VULNERABILITES Port 25 – Is used for SMTP (Simple Mail Transfer Protocol). It uses both tcp and udp protocols. This port used for e-mail routing between mail servers and is susceptible to many known Trojan’s. We are keeping this port in a closed state. Port 80 – Is used for web traffic Hyper Text Transfer Protocol (HTTP). It uses both tcp and udp protocols. Port 80 udp is also used by some  games, like Alien vs Predator. Code Red and Nimda worms also propagate via TCP port 80 (HTTP). Also, a number of trojans/backdoors use these ports. We are keeping this port in a closed state. Port 139 – Is used for NetBIOS. NetBIOS is a protocol used for File and Print Sharing under all current versions of Windows. By default, when File and Print Sharing is enabled it binds to everything, including TCP/IP (The Internet Protocol), rather than just the local network, meaning your shared resources are available over the entire Internet for reading and deletion, unless configured proper ly. Any machine with NetBIOS enabled and not configured properly should be considered at risk. The best protection is to turn off File and Print Sharing, or block ports 135-139 completely. We will leave this port in an open state but will turn off file and print sharing capabilities. Port 1900 – Is used for SSDP, UPnP. UPnP discovery/SSDP, is a service that runs by default on WinXP, and creates an immediately exploitable security vulnerability for any network-connected system. It is vulnerable to denial of service and buffer overflow attacks. Microsoft SSDP Enables discovery of UPnP devices. We are keeping this port in a closed state. Port 2869 – Is IANA registered for: ICSLAP. It uses both tcp and udp protocols and is used for Microsoft Internet Connection Firewall (ICF), Internet Connection Sharing (ICS), SSDP Discover Service, Microsoft Universal Plug and Play (UPnP), and Microsoft Event Notification. We will leave this port in an open state. Port 5357 – Is used by Microsoft Network Discovery, and should be filtered for public networks. It uses both tcp and udp protocols. It is also IANA registered for: Web Services for Devices (WSD) – a network plug-and-play experience that is similar to installing a USB device. WSD allows network-connected IP-based devices to advertise their functionality and offer these services to clients by using the Web Services protocol. WSD communicates over HTTP (TCP port 5357), HTTPS (TCP port 5358), and multicast to UDP port 3702. We will close this port and redirect traffic to HTTPS (TCP port 5358). Port 6839 – This port is not associated with any particular services and should be closed unless it is associated and used. Port 7435 – This port is not associated with any particular services and should be closed unless it is associated and used. Ports 9100, 9101 and 9102 – These TCP ports are is used for printing. Port numbers 9101 and 9102 are for parallel port s 2 and 3 on the three-port HP Jetdirect external print  servers. It is used for network-connected print devices. These ports should remain open to allow print services. There are no listed vulnerabilities associated with these ports. Port 9220 – This port is for raw scanning to peripherals with IEEE 1284.4 specifications. On three port HP Jetdirects, the scan ports are 9290, 9291, and 9292. It is used for network-connected print devices. This port should remain open to allow print services. There are no listed vulnerabilities associated with this port. Port 9500 – TCP Port 9500 may use a defined protocol to communicate depending on the application. In our case we are using port 9500 to access the ISM Server. The ISM Server is used for exchanging backup and recovery information between storage devices. This port should remain open while services are in use. There are no listed vulnerabilities associated with this port. Port 62078 – This port is used by iPhone while syncing. The Port used by UPnP for multimedia files sharing, also used for synchronizing iTunes files between devices. Port 62078 has a known vulnerability in that a service named lockdownd sits and listens on the iPhone on port 62078. By connecting to this port and speaking the correct protocol, it’s possible to spawn a number of different services on an iPhone or iPad. This port should be blocked or closed when service is not required on the device. References BEST: Network Security Policy and Procedures. (n.d.). Retrieved from http://www.ct.gov/best/cwp/view.asp?a=1245&q=253996 Example Security Plan. (2014, November 17). Retrieved from http://www.binomial.com/security_plan/example_security_plan_template.php Hardening Network Infrastructure Security Recommendations for System Accreditors. (n.d.). Retrieved from https://www.nsa.gov/ia/_files/factsheets/Hardening_Network_Infrastructure_FS.pdf Network Security Policy: Best Practices White Paper – Cisco. (2005, October 4). Retrieved from http://www.cisco.com/c/en/us/support/docs/availability/high-availability/13601-secpol.html Paquet, C. (2013, February 5). Security Policies > Network Security Concepts and Policies. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3 SANS – Information Security Resources | Information Security Policy Templates |.

Sunday, September 29, 2019

Cost, volume, and profit formulas Essay

The cost-volume-profit analysis is a business tool which companies utilize in order to analyze the effects of changes on costs and volume in its profits. It has five major components namely, volume or level of activity, unit selling prices, variable cost per unit, total fixed cost, and sales mix. The volume of level of activity refers to the quantity of the product which is sold. Unit selling prices is the amount that the company sells one unit of its product to the customers. In CVP analysis, costs are classified as a either variable or fixed. Variable cost per unit refers to the costs which can be directly attributed to the production of the product like direct labor and materials. Fixed costs on the other hand, are costs which are incurred even if the company increase or lessen its level of activity. Sales mix is applicable to business organizations which has two or more products. It refers to the breakdown of sales according to product types. 3&4. Based on the formulas you have reviewed, what happens to contribution margin per unit when unit selling prices increase? Illustrate your explanation with an example from a fictitious company of how an increase in unit selling prices might affect contribution margin. Holding everything constant, an increase in the unit prices will directly increase the contribution margin per unit by the amount of price increase. For example, company A sells a burger for $2. 00 incurring $1. 50 for the production. Contribution margin is then $0. 50 ($2. 00-$1. 50). If unit price is raised from $2. 00 to $2. 50, the company’s contribution margin per unit will increase by $0. 50 which is equal to the amount of price increase ($2. 50-$1. 50). The contribution margin due to this price increase will be equal to $1. 00. 5. When fixed costs decrease, what does this do for sales? Illustrate your explanation with an example from a fictitious company. A decrease in fixed cost will have a direct impact in the required sales of the company in order to reach break-even or generate a target profit. In general, a decrease in fixed cost lowers the required sales as part of the previous fixed cost will now be counted as profit. Take for example, Starjuice which sells orange juice for $1. 00 per bottle/unit, has variable cost of $0. 70 per unit, and fixed expenses of $10,000. Starjuice wants to generate a profit of $5,000. Thus, it needs to sell ($10,000+$5,000)/($1. 00-$0. 70), 50,000 bottles of orange juice or $50,000 in total sales to reach this target. However, when fixed cost has decreased to $4,000, then the company only needs to sell ($4,000+$5,000)/($1. 00-$0. 70), 30,000 bottles or $30,000 in total sales. 6&7. Define contribution ratios. What happens to contribution ratios as one of the components changes? The contribution margin ratio refers to the ratio of the contribution margin to the unit selling price. For the Starjuice example above, the contribution margin ratio is 0. 30 or 30% as the contribution margin of $0. 30 is 30% of the total selling price of $1. 00. The changes in the contribution margin are often facilitated by the changes in unit selling price and variable costs. An increase in the unit selling price which is discussed above to enhance contribution margin will subsequently bring a rise in contribution ratio. On the other hand, a decrease in selling price will also bring a decline in contribution ratio. Increase in variable cost will directly lessen contribution margin thereby lowering contribution ratio. However, a decrease in variable cost will increase contribution margin and increasing contribution ratio.

A Study of the Archaeology of the UAE

The first dwellers Drumhead There is small grounds supplying cogent evidence for UAE population about Eight thousand old ages ago. Rocks are discovered in different countries of UAE for more than 200,000 old ages ago. It was found in isolation so it is non an easy attack to day of the month that rock for its find and usage in UAE. In the interior topographic point of Sharjah, late, important finds are made in the metropolis of Jebel Faya, where, different rock tools are found in the groups known as strata in the clip period between clip ages of 90,000 and 125,000 old ages ago. One of the diggings includes dramatic attempts for this adust epoch in Jebel Faya. It was taken as the bed for separation and deep bed with the tools of above Paleolithic rock with farther bed of rock tools of Neolithic type. At the starting clip of the Holocene another signifier of rocks was invented about dated back to 8000BC. An early signifier of flint was discovered at that clip period named as Fasad Point. In UAE history, abundant and widespread cogent evidence from that epoch is used in rock tools consisting of vitreous silica, chert and flint. It is referred as the late Stone Age by assorted historical surveies in prehistoric culture of Arab. It is besides known as Neolithic by other writers. A big scope of the applications is carried by the ulterior term in Eurasia. New rock age is characterized by all prolific symptoms of herding, agriculture, land rock fabrication objects, ceramics use and village life in settled province. Merely a few of these features are recorded in specific facet of UAE instance. For Farming, there is yet no specific cogent evidence. Domestic animate beings are found in the signifier of castanetss in UAE that was non associating to the wild animate beings. Cattle, sheep and caprine animal castanetss are found that were merely relevant to domestic animate beings. Animals and human organic structure are non a beginning of innovation and find of life on UAE. It is apparent that life was non obvious and the exact clip when life was started at UAE Earth, is non an easy to be dated precisely. Utmost attempt is deployed in this paper to joint either the research is confined towards the existent clip innovation or it is merely the clip period and castanetss every bit good as rocks those are discovered in the current clip period. Aim Purpose of this survey is dedicated to Archaeology. Historical analysis and development clip period is ever of involvement for find.Natural and innovations or historical background in natural scenes is of great involvement for pupils. In order to run into up the needed demands, all of the innovations are covered in this paper runing from rocks to animate beings and their tissues transmutation with the transition of clip.External environment is necessary for human existences and start of life is discussed in UAE. UAE is one of the great developed states where resources are in rich signifier.Resources are managed and efficaciously deployed as major factor for development.Boness and rocks are considered in elaborate attack as they can be used to place the clip period including what is the exact day of the month for their origin or find at this Earth.The most common and simplest phonograph record on the bead type discovered was 1.5 millimetre midst and 1 to six millimetre in diameter. Th ese common phonograph record were made up of the shell, coral and serpentinite.These are most of the times, intermixed with coral made cannular beads, white beads, to make the knowing and cosmetic effects for intermixed white and black.Following major find is related to castanetss of Socotra discovered at the islands of UAE.Audience Audience for this paper include,Research workersNewspaper WritersArcheologistsWritersScientistsMethodology Methodology for any kind of paper is based upon two signifiers of informations sets and survey scenes.PrimarySecondaryPrimary informations is collected through questionnaires, interviews and treatments whereas secondary signifier of information is collected through secondary beginnings including on-line diaries, newspaper articles, docudramas, one-year studies, web sites and Online peer reviewed diaries. Data is available for secondary surveies like it is used in this paper. Paper is based upon information aggregation from different studies and experiments. It is descriptive signifier of survey as all kinds of issues and jobs are discussed in description and farther add-on in information treatment is dealt in this survey as compared to early surveies. This survey is concentrating on experimentation consequences and archeologists point of views for descriptive analysis. Thesis The major and crux statement in this paper is based upon how all of the natural information can be traced back through strong groundss and cogent evidence. It is used in order to keep the natural every bit good as the critical information for full processing. To continue for the animate beings and processs analysis, it is necessary for the direction of information. Al environmental issues and biological science based informations sets are considered in the field experiment scenes of survey as they have to include experiments and unreal scenes as compared to the natural scenes. For more specifications, this paper is linked with the major and minor field natural scenes as no experimentation and cogent evidence is contingent with the footings or processs. No betterment or new technique deduction is provided as a sample and full procedure is delineated in an effectual manner of conjectured day of the months every bit good as finds. Prolific writers and information suppliers are recorded in this survey as an apparent cogent evidence for the written stuff. Literature and compendious information is inoculated in this survey to supply more authorised survey and waies. Consequences Consequences are non based upon any specific ground and its elucidation through experimentation or questionnaire usage. It is related to the inquiry either the clime issues and new land innovation or find is linked with the people motion from north and south zones to Arabic countries. UAE is a developed state and people move in and out for their other grounds as compared to the clime every bit good as new topographic point hunt. Boness and Rocks are used as the beginning of mensurating clip extent that can be related to the life startup on UAE land, but it could non be delineated in a confirmed manner. It resulted or finally ended with the affirmed consequences that no factor can do the nexus between rocks and castanetss shape in different angels and the human life on UAE land. The future waies that are asserted as the key technique or landmark for upcoming research workers are mtDNA of homo for clip appraisal. Student Opinion Bing a nature loving pupil and aimed at happening the ways in same survey lines, I am assure that this paper is written in a reader friendly manner and all kind of information pertained to archeology is efficaciously worthy. It can be farther used as a cardinal tool to place different facets in the natural scenes. Following major issues and positions can be coined on this paper evidencesRocks, Discovery and their UAE HistoryUAE life get down up and BonessHuman Genes or Stones, Which one is most Authentic for Life EstimationStudy Purpose Study Purpose is used to specify and place either it has been following the cardinal standards a research survey must stay by. Following regulations are followed by this survey in an operative mode.Aim( Aims are clearly mentioned and achieved with a future nonsubjective definition )Measurable( it is non mensurable as it is qualitative in nature )Restrictions Restrictions are an high factor in all surveies so this survey is besides confined to some bounds as follow.Time constrain is one of the major issues to be followed din this survey as more clip span can be finally lead towards field survey experimentation and more information informations base development.Experiment and Human engagement in this survey can ensue in more compendious consequences.Merely UAE state is considered for this specific survey as clip is the restriction every bit good the research worker must travel for the more exposure towards information aggregation and analysis.Cardinal Footings Cardinal footings used in this paper include following footings,Fasad PointAl MadarPearlsAkabBHS 18KHM0035MarawahUbaidSocorataIn Nutshell Summarizing it up, this paper is important nature addendum for research workers and archaeologists as they have to chief the structural demands and their sophisticated fulfillment. In order to utilize this information in an effectual mode, full procedure is linked with the concatenation of historical motions. Human organic structure and DNA is ever an of import portion for any find and appraisal intent. Animals and other life beings can besides be used as a tool to bring on the factor of life in historical analysis. For future research workers, more than one state must be selected along with more than one factor’s consideration to track life appraisal on the land under observation by them.

Saturday, September 28, 2019

Knowledge Questions for Unit Hsc 44

The account should focus on the actions of the candidate; it must include dates when activity took place. If responses to questionsare used then indicate this and attach the questionsWrite your account in here. As a candidate, make sure you describe and explain your actions.Knowledge Questions for Unit HSC Who draws up the Code of Practice for Social Care? The General Social Care Council. Outline features of systems used in Lincolnshire in respect of confidential reporting of issues of concern. The council has its own policy which helps to inform on bad practice, difficulties between staff members and complaints ect. This isthe ‘whistle blowing’ policy and it was designed in order to protect those wishing to make a complaint and to avoid such things as victimization. Although anonymous, complaints are still dealt with the same seriousness as named complaints although it is preferredthat applicants with complaints should not be anonymous. When the Children’s act 2004 was published it contained some major changes for the way in which services were to be delivered. Take one and explain in your own words the advantages this brings for the wellbeing of children and their families. The Childrens Act 2004 brought about many changes and most significant was the Every Child Matters campaign that runs along side the 2004 act. For the Act itself the main change that helps in the work that I do is the implementation of the CAF. This works in line with the need for inter-agency working. I think this is one on the most crucial changes of the Act, and as the Victoria Climbie inquiry showed many agencies were involved with the case and through lack of communication, information sharing and joint working Victoria Climbie died at the hands of her aunt. One of the many advantages is local authorities drive for inter-agency working. Through this many agencies are trying to change their way of working and with the help of the CAF more agencies are invited to the first meeting when a child has been shown to have additional needs. On the whole the process is proving to be more focussed on the child and family and this reduces any stigma for the families as in the past most cases where always referred to social workers. Families and children are now seen more often and social workers can now focus on the more complex and child protection cases. Through inter-agency working families and children are given the help that meets their needs and reduces the need for long term involvement. 8a Outline the features of the Dfes initiative â€Å"Building a Culture of Participation† This initiative is led by the government in their commitment to allow children to have a say in how policies affect them and to contribute to how a service is delivered. By listening to children and young people it ensures that policies and services are designed around their needs. This leads to better outcomes for children, young people and families. It also allows for policies to be effectively evaluated and evolve as necessary. 9a Outline the Common Assessment Framework. Explain why this Government initiative has been introduced and its purpose. The CAF was implemented in 2006 in order to have a universal assessment form that could be used by all agencies and professionals. This was in line with some of Lord Laming’s recommendations after the Victoria Climbie enquiry. As a universal document it reduces the need for repetitive assessments and focuses more on the child and family and multi agency working. The CAF process can start at any time once it has been identified that a child has an additional need. Once agreed all information is shared between the agencies involved again reducing the chance of a child ‘falling through the system’. As the CAF is aimed at early intervention some one such as a school teacher can be the lead professional allowing more serious cases to be dealt with by social workers. As children can often have what was once deemed as minor issues and not warrant the classification as a child in need, through the CAF they are classed as having additional needs which allows professionals to work with the child and family. Once a child that has been highlighted as a CAF they can move in and out of the system as identified issues arise. 9bc Summarise the targets of the combined health and education initiative â€Å"Healthy schools†. The national healthy schools programme promotes a whole school approach to health. The programme is a joint initiative between the department of health and the department for children, schools and families. It aims to deliver benefits for children on improvement in health, raise pupil achievement, more social inclusion and a closer working between health promotion providers and education establishments. The public health white paper choosing health (2004) set a challenging target for 75% of schools to achieve healthy school status by 2009 and for all schools to work towards this target. Through a planned curriculum schools can promote learning and healthy lifestyle choices. The four core themes within the programme are: Healthy eating Physical activity PSHE Emotional health and well-being. 12 How does the Joint Annual Review shape the way in which Children’s Services are delivered locally. You may wish to discuss Lincolnshire’s last JAR and comment on how the recent Service restructuring has been a result of this. The Children’s Act requires joint area reviews to be conducted in each children’s services authority area. The multi-disciplinary team of inspectors review all services provided to children and young people aged 0 – 19. There are around 42 key judgements which relate directly to the five outcomes highlighted in the every child matters framework. Through the Lincolnshire JAR report published in March 2007 it was proved that there was a need for better facilities for all children aged 0 – 19. There are now plans to develop a further 23 children’s centres by 2008. Through this service restructuring the aim is to shift the balance of services from interventionist to a preventative approach. The strengthening families will work with partner agencies to deliver the five outcomes for the every child matters. This is where children’s services as a targeted service interface as part of a universal service. 16e Identify the risks to effective working caused by stresses on the work force and recommend what action can be taken. When work becomes too stressful for an individual it can cause a knock on effect throughout the staff team and the cases in which the individual is working on. The individual can start to have more days off sick which could cause other staff members to add to their workload in taking on those individuals cases. Stress can also cause the individual to lose direction and focus in the cases they work on and this can result in a reduced quality of service for those particular families. Stress in the work place can be identified early and then reduced by regular supervision. Supervision gives the individual a chance to discuss their cases and anything that might be causing them to feel stressed. Supervisors are then able to help supervisee’s in managing there stress before it gets to the point where it affects all that they do. Staff meetings are another opportunity to get together on a regular basis with other team members as it’s a chance for everyone to discuss their working role as well as any difficult cases they may have. This gives a chance for positive reinforcement by the manager on the work that is being done and also a chance to ‘brainstorm’ ideas that might help with the work. 17 Explain in a short paragraph how the Social Model of disability affects children and their families which you work. The social model of disability says that people are disabled not by their impairment, but by society that does not take account of their needs and prevents them from having full access to society due to physical, communication and social barriers. A large majority of the families that I work with fall into the category of being disabled by society. Those families that are most disadvantaged are those living in poverty. Families face multiple stresses which can affect a child’s needs. If a parent struggles to provide an adequate environment for a child this will impact on the child’s developments and the parent’s capacity to care for the child. CHILD A CHILD B No dependence on social security benefits Household receives multiple enefits Two parent family Single adult household Three or fewer children Four or more children White Mixed ethnic origin Owner occupied home Council or privately rented home More room than people One or more persons per room 18a/b See 8a above. 18d Using Lincolnshire County Councils Competency framework, explain how you would assist a member of your team to develop skills in risk management with regards to child protection. You need to be specific to an individual competency. Using competency number 8 –Analysis and Judgement. I would be able to assist the member of staff in th e above question. As part of the competency it requires the individual to look closely at the work they do and how it could be improved. Part of this is through having a broad range of information about an issue. In this particular instance it would be child protection. This could be done in-house through regular supervision. This can be through asking the individual to research up to date information and then having a question answer session on the information they have found. This shows that the indivual has done what is requested and demonstrates that they have an understanding of the subject that they would then be able to take into their work practice. Another useful development skill would be to assign the individual to a child protection case that was held by a social worker. The indivual would gain insight into the process of how child protection is identified and then managed. This hands on approach would give valued knowledge and development without risk to the family involved. Finally a child protection training course would be beneficial to the individual to again further develop there knowledge of the subject. 19 What impact does placement disruption potentially have on the wellbeing of Children In Public Care. You should relate your answer the recent Government paper ‘Care Matters’ Most children who end up in care experience multiple moves. It is standard that three or more moves constitutes as placement stability. Child development theories say that repeated movements jeopardize the opportunity for children to develop secure attachments with carers and trusting relationships with adults. Children with behaviour problems, prior instability and the age of the child at placement have all been found to be important factors in placement instability. 24 List 3 types of evidence that would be valid in court. Explain your rational behind each one. 1) Video Evidence- For children 14years and under. Also for children classed as a vulnerable witness. Video evidence reduces the need for a child to be in court and to be face to face with the perpetrator. 2) Court reports – These are factual based evidence which follow a mandatory guideline for completing. 3) Records – Records are an essential source of evidence for investigations and inquiry’s, and may also be used in court proceedings. Therefore it is essential that any records on a child are clear and accurate and ensure that there is a documented account of an agency’s or professional’s involvement with a child and/or a family. 25 Provide three examples of recording information that might be deemed discriminatory and explain why, in at least one of these examples, the discrimination might pass without comment. 1) The child is ‘missing’ from the record – This doesn’t mean that the child hasn’t been mentioned at all, but that their wishes and feelings, their views and understanding of their situation, are not rec orded. The absence of a child from the record suggests to the reader that no work has been done with the child, or that the child has not been involved in any work. 2) Facts and opinions are not differentiated – Failing to differentiate between fact and opinions can result in the significance of some information being overlooked, or opinions becoming accepted as facts and which could influence the management of the case. If opinions and judgements are not substantiated in the record it can be difficult to explain how these were made to family members who access the records especially if the case holder who wrote them is no longer working within the agency. 3) The record is not written for sharing. This account must (except in the case of responses to questions) be authenticated by at least one of the following Work products seen List Witnessed by— Name Sign Expert Include on witness list Y/N I confirm the authenticity of the Signature of Candidate work above DATE 31. 03. 08 I confirm the judgements claimed Signature of Assessor TICK IF OBSERVED above DATE ———————– EV 5

Fashion Assignment - Armani Essay Example | Topics and Well Written Essays - 1000 words

Fashion Assignment - Armani - Essay Example The essay "Fashion Assignment - Armani" concerns Giorgio Armani's fashion. To best understand the brand design architecture of Giorgio Armani, we fist need to create an understanding of the environment in which it operates. Armani has diversified into many brand facets, adding more levels to its brands pyramid, with the original Giorgio Armani still at the apex. This shows the pride which it wishes to create for its parent brand, while forwarding its legacy down to the following brands. The setting up of standards is very crucial for Armani, as whenever, a new brand is launched, it is overseen to be aligned with the set standards of the parent brand itself. Giorgio Armani (at the top of the grid) is a very successful and elite corporate brand with a sole proprietorship; being the first in line showcasing the exquisite collection of couture gowns and suits to match the new fashion trends, targeting the segment of the elite class groups between the age of 35 – 50 with a high ran ge of prices and superior quality. While targeting the elite class, the line of Armani brands has made sure to target the upper middle class as well. The Armani Collizioni, caters to the segment of customers who love Armani as a brand but cannot afford the originally luxurious Armani and so Collizioni incorporates lower prices than that of its parent brand with a little simpler designs in order to sell to this segment of population. Similarly, Armani exchange caters to a very different and casual market grouping with realistic prices., unlike their couture lines. It is for the general public to take pride in wearing Armani and to create an association with the parent brand. Armani exchange is the most affordable and accessible brand in the Armani chain of stores. To be noted here, is Armani’s way of targeting each and every segment in the market while also not decreasing the perceived value and luxurious image of the brand. Each and every segment is targeted with a new name a long with the originally created legacy of its parent Brand (Magnoni & Roux, 2011). Going totally diverse from its initial offerings, Armani features a furniture line named as Armani Casa which entails the alluring Armani pride while offering high-end home decor; magnificently designed furniture, lamps, linens and fine dining essentials. In contrast to its other brands, Casa has only 40 stores worldwide which shows their lack of focus towards their range of furnishings. However, to make its furniture line more exclusive, all Armani hotels and Cafe’s are furnished with its own brand Casa (Giorgioarmani.com, 2012). Armani emphasizes greatly on its logo and towards creating its brand image, this is exceptionally evident through its efforts of framing the brand luxury and stressing on the brand name in all its sub brands. For clothing Armani has made sure to cover all market segments with naming its stores differently, however, the parent brand still has been associated with the new store names (Tungate, 2008). Brand Architecture The brand architecture of Armani communicates its marketing philosophy. The way Armani caters to all market segments is by highlighting the uniqueness of the brand itself and through appealing to different population segments based on their personalities (Magnoni &

Friday, September 27, 2019

Cellular Phone Usage While Operating Motor Essay

Cellular Phone Usage While Operating Motor - Essay Example and Tibshirani, R.J. (1997), the current road use regulations on road driving are insufficient to combat the problem. Indeed the current regulation are not sufficient because if some bans only prohibit hand held device while others bans hands free devices for certain types of motorists like teenagers or school bus drivers. This is not enough regulation to reduce accident caused by cellular usage because these drivers whether using a hand free kits on their cellular phone, they loss concentration while driving. Redelmeier, D.A. and Tibshirani, R.J. (1997) research showed that cellular telephone use is more common in urban areas with Tulsa and Oklahoma counties accounting for 60% of cellular telephone in use crashes in 1993 and 51% in 1994 (as cited on the police crash report). Among, the 77 counties in Oklahoma, phone use crashes were reported in 32 counties in both 1993 and 1994. While everyone knows that many accidents are caused by cellular phone usage while driving, finding accurate assessment of its scope has been challenging task. For one, many minor accidents go unreported and there is no proper records kept about the actual cause of the accident. Violanti, J. M., (1997) says that we should address the issue of banning the cell phone usage while driving because drivers are likely to loss concentration, thereby causing an accident. The source is related to other sources I have use since it also points out the issue of banning cell phone usage while operating motor vehicle as they are known to cause road accidents. According Alm, H., and Nilsson, L. (1995), they says that the drivers inattention is the number one cause of road accidents and also states that driving while using cell phone, has the same risk as one driving while drunk. The source is similar to the other sources used in this paper as it highlights the consequences of using cellular phone while driving. It advocates for total ban of using cellular phone while operating a motor vehicle. According to Redelmeier, D.A. & Tibshirani, R.J. (1997), they said that we should have a better understanding of the nature and magnitude of any road safety problem rather than restricting cell phone usage while operating a motor vehicle. Therefore, they recommended that we should make in vehicle information system that would reduce accidents on our roads. For this source they are looking in ways on how we can reduce road accidents on the roads rather than banning their usage which might be just a partial solution. The source is common to the others because it is addressing how not only can we reduce accidents by banning cell phone usage while driving but we can further reduce them by innovating our vehicles with make in information systems. References Alm, H., & Nilsson, L. (1995): The Effects of a Mobile Telephone Task on Driver Behavior in a Car Following Situation. Accident Analysis and Prevention, Vol. 27 (5), pp. 707-715. Brookhuis, K. A., de Vries, G., & de Waard, D. (1991): The effects of mobile telephoning on driving performance. Accident Analysi

The use and abuse of anabolic steroids by athletes, the problem seem Research Paper

The use and abuse of anabolic steroids by athletes, the problem seem to begin as early as high school and continues later on to the professionals - Research Paper Example Testosterone is the only hormone targeting the male sexual characteristics as it stimulates the reproductive organ and development of muscle and bones. It also promotes the growth of skin and hair and influence sentiments and sex drive in males. In males, the adrenal gland as well as the testes produces testosterone; whereas in the females it is only secreted by the adrenal gland. There are over hundreds various types of anabolic steroids synthesized in order to maximize its benefits. Since 2013, not a single type of anabolic steroid has been synthesized that do not have any kind of side effect. In most of the developing countries, anabolic steroids can easily be purchased without any prescription. However the American government has tried to impose some control over the buying and selling of these drugs. The use of anabolic steroids in US without any prescription is considered illegal and may also result in one year of imprisonment or $1,000 fine. These steroids are derivatives of testosterone, a hormone found naturally in males. A healthy male produces 2 to 10 mg of testosterone. It helps in hair growth, deepening of voice, growth of reproductive system and increases the density of bones and muscles (Anabolic Steroids). Anabolic steroids were originally developed in the year 1930 for treating the cases in which the body is not able to make much testosterone for fulfilling the daily requirement. In the following years physicians tried using this drug for other purposes but did not achieve effective results. Disadvantages associated with the drug over shadow its benefits and therefore its use was restricted to medical purposes only. Anabolic steroids were used by pediatrics for stimulating the rate of growth in children whose growth rate was slow. The availability of the synthetic growth hormone has limited the use of this hormone as growth stimulator in children. It was also used in the treatment

Thursday, September 26, 2019

Company intro and 2 product descriptions Article

Company intro and 2 product descriptions - Article Example It has a strong customer care centre to take care of customer queries and inquiries. The research & development domain makes it sure to offer the quality products produced by their blend of ample experience and scientific research, always giving ways to new formulas and making products according to clients' requirements. The natural Lemon essential oil brings out incredibly fresh and comfortable feeling! Sluggish metabolism will not only make you fatigue easily but also dehydrates your skin and causes small acnes. New +10 Lemon body wash can whiten and reduce your acnes. The essential condensation rich in Forsythiae Fructus helps the body metabolize redundant body fluids. To feel fresh and comfortable, all you need is to massage during daily showers. Continuous usage can smooth aspiration tract sensitivities, and prevent acnes. After age of 30 the human body's hormones and immunities decrease, and this not only darkens the skin and turns it yellowish, causing dryness, roughness and hyposthenia. The +20 Dong Quai body wash is a cleanser which is developed to prevent aging and it rejuvenates the youth feeling within you. A mysterious microelement forms from the combination of extracted Angelica Sinesis & Rose. This mysterious microelement fulfills the lack of hormones from aging process.

The Principles of Delivering Remarkable Service in the Hospitality Essay

The Principles of Delivering Remarkable Service in the Hospitality Industry - Essay Example It is important to adopt positive attitude when dealing with customers because this is the key practice towards achieving remarkable service delivery in the hospitality industry. Therefore it can be argued that organizations in the hospitality industry need to embrace the culture of remarkable customer service delivery. Organizations need to empower itself to ensure that exceptional customer service delivery is made possible. Remarkable service delivery enhances the identification of customer needs and how to customize the service delivery approach. This will ensure that all members in the entire organization fully embrace and develop the culture of effective and efficient remarkable service delivery. To achieve this organization need to incorporate principles of remarkable service delivery in its operations, vision and the entire corporate culture. These principles basically provide guidelines and procedures on how organizations in hospitality industry can have remarkable service delivery (Kusluvan 2003). It notably helps teams and leaders in hospitality industry have an insight understanding on remarkable excellent customer service delivery. The principles of delivering remarkable service in the hospitality industry entail the following. There are various attributes in hospitality industry which significantly contribute to these organizations delivering remarkable service. These attributes compliment the remarkable service delivery skills which are very essential in the industry. These attributes ensure that the remarkable service delivery skills are focused on the satisfaction of customer needs. It establishes a core foundation in establishing strong relationship with the customers based on trust and loyalty. It is notable that all the attributes contributes collectively on the customer retention, loyalty and overall success in the hospitality industry (Kusluvan 2003). The

Conclusion and Recommendation for report evaluate 3 e-business website Assignment

Conclusion and Recommendation for report evaluate 3 e-business website - Assignment Example Though, they might not be willing to make a purchase but they may have friends that find the products being sold there interesting and hence, act as potential customers. So, a person that clicks â€Å"Recommend to Friends† button indirectly becomes a sales person for the website. Unfortunately, Baskinrobins.com, maggiemoose.com and benjerry.com did not think of using any such option. This websites however, can greatly benefit from this entity not just in terms of generating online traffic, but also in increasing sales and profitability. There are some other factors on which these websites need to focus upon, following are few of them. Segmentation The segmentation of baskinrobbins.com is well managed, giving ease to client’s understandability. It can be seen that the website categorizes the demand of cakes in three categories based on special day, membership and geography. In comparison to baskinrobbin.com, the two sites, maggiemoos.com and banjerry.com lack such effect ive segmentation. There is a dire need of segmentation in these two websites based on the customer's purchase behavior across several product categories. It has been seen that benefits sought can also make use of more analytical information rather than plain descriptive demographic profiling (Bhatnagar & Ghose, 2002). Customers’ reviews On the broad canvas of e-commerce, where sellers and buyer do not really interact in tangible manner, there always comes a problem of decision making. A person may not be sure of its reliability and may hesitate in placing the order. However, this dilemma will automatically be resolved if the person is recommended of the website by some other customer who has used the product before. In e-commerce websites, customers review acts as word of mouth. If a website lacks customers review, one can lose several doubtful but potential customers. Same is the case with baskinrobbin.com, maggiemoos.com and benjerry.com. A scrap book or comment on several new or famous cakes should be provided to give an insight of products and services to eliminate doubts and boost up customers confidence. Online security When it comes to online shopping, the only threat that hinders decision of customer is financial security. In case of baskinrobbin.com, it has not only provided personal information security, but also financial security. When a customer enters his/her credit card number or bank account it is encrypted by sophisticated software program (secured socket layer technology or SSL), so any potential hacker cannot access it. On the other hand, Maggiemoos.com and benjerry.com lack security measurements. Recent security glitch has been disclosed about benjerry.com where an invoice of a lady was shown by simple Google search. Though, it only showed personal information and address, but fraudster could use this data as a starting point of their fraud scheme. Security should be provided to the fullest to retain potential customers (Woffenden, 2 010). Content It is commonly said that content is king. It is what search marketers have been harping for years, because a site rich in content is definitely more useful than a site with poor/copied content. Creating rich content provides value to readers, who may be willing to pass this nugget of knowledge to others through links on their blogs, forwarded e-mails or simply word of mouth. In maggiemoos.com, benjerry.com and

Wednesday, September 25, 2019

Disney Summer Internship Training Program Evaluation Essay

Disney Summer Internship Training Program Evaluation - Essay Example Reaction – This is how the learners reacted to the learning process. The reaction in this case might be positive or negative. 2. Learning – This step tries to gauge the level at which the learners acquire knowledge and skills. 3. Behavior – This step seeks to find out what changes in the job performance were as a result of the learning process. 4. Results – this step concerns itself with finding out the results that arise from the learning process in terms of increased efficiency of operations and improved production and quality. (Kirkpatrick, 1959) This model is relatively important as it provides a valuable tool in the process of planning, trouble shooting and evaluation. But though this level is used for training purposes, the model can also be used for other applications in the learning processes such as informal learning, education and development (Nadler, 1984). Kirkpatrick wrote that his objectives would be related to the traditional classroom progr ams, the most general form of training. He further stated that many of the procedures and principles can be applied to all manner of training activities that includes participation in outside programs, performance review, planned instruction, and the comprehension of selected books (Craig, 1996). This paper would seek to evaluate the Disney Internship training program plan. In the paper, the plan will be weighed according to Kirkpatrick's model to find out what changes should be made to the plan, if the objectives of the plan were achieved, the strength and weaknesses of the plan, to identify the people that should participate in future programs, what participants benefited the most and what changes, if any, should be made to the program to make it better. The objective of this training plan is to increase the quality of service provided by interns through the dissemination of knowledge to them that they can use and apply to their workplace to improve their efficiency and productivi ty. Another objective of the plan would be to increase the number of students who would come back to the organization to work as full time employees. This is because, after the intern training program, they would have been introduced into the working world and trained as full level employees. Further, the plan will introduce a seminar course so as to enable the interns to share in the culture of Disney. This is whereby the interns will be introduced to the various activities that go on in the organization. This will fast track their intake into the work force of the organization, boosting their individual confidence and the overall performance of the organization. The plan would also enable the interns to network with the managers and high level employees of Disney and this will open up even more opportunities for them. The training methods in this training plan will include the use of the standard in-class training alongside other techniques of training including the use of simulat ions, behavior modeling, mentoring, on the job training and job rotation. These various methods of training will aid the intern in mastering the necessary skills required for the job. These methods of training will guide an individual more comprehensively as it seeks to not only impart the knowledge needed, but also to give a hand on approach to tackling the job. Using this plan will improve the efficiency of the intern in retaining the skills imparted. Job

Assess the Design and Functionality of Existing and Established Essay

Assess the Design and Functionality of Existing and Established e-Business Sites - Essay Example Greater participation by the individual entrepreneurs and the venture capitalists for the money required for the firm's initiation, maintenance and growth. Some of the new customer's needs that could not be possible by the conventional business practices are satisfied by the e-business along with the traditional needs. (1. William. M. Pride) The potential for using the website itself to collect and analyse the evaluative data, is one of the most exciting prospects for the website evaluators. The most important methodological areas of this type are the use of software to monitor, analyse and report on the utilisation of this site. Another way to employ the website itself for evaluation is to construct online surveys to collect users' information and feed back. Becker gave a detailed description as to how this can be accomplished; he has given the procedure to construct forms and the details of different input that can be created in constructing a form. Common gate way interface (CGI) that can be used to process the data that users submit through online forms, a number of simple and practical approaches to storing and accessing submitted form data including how to have the data automatically sent to an e-mail address and the use of a generic CGI script program that can save the data to disk in a variety of formats that ca n then be imported into databases and statistical programs for analysis have also been described by him. Survey methodology: Surveys can be used during the conceptualisation and development phases to conduct market research, identify potential users and ascertain their information needs and computer expertise. It can be conducted during the implementation and evaluation phases to assess user reactions to both content and usability of the site. Experimental and quasi-experimental designs: Experimental and quasi-experimental designs are the major tools that the evaluators have for addressing the questions like effectiveness, benefit or return attributable to the site itself as opposed to the alternative casual factors. (2.Johns Hopkins) Cognitive walkthrough: The walkthroughs require a detailed review of a sequence of actions. In a code walkthrough, the sequence represents a segment of the program code that is stepped through by the reviewers to check certain characteristics. In the cognitive walkthrough the sequence of actions refers to the steps that an interface will require a user to perform in order to accomplish some task. The evaluators then step through that action sequence to check it for potential usability problems, the main focus of the cognitive walkthrough is to establish how easy a system is to learn. For doing a cognitive walkthrough four things are required: Fairly detailed description of the prototype of the system such as the location and wording for a menu can make a big difference The description of the task the user is to perform on the system, this should be a representative task that most users

Tuesday, September 24, 2019

Researching politics and international relations Essay

Researching politics and international relations - Essay Example To understand the scientific rigor regarding researching, one must focus on the types and the different methods of research. There are numerous methods of research. However, we narrow our researching methods down to two ways; the Qualitative and the Quantitative method. There are numerous methods of research. However, we narrow our researching methods down to two ways; the Qualitative and the Quantitative method. Each is a scientific method much used and approved, by researchers. Before reverting to our topic, it is better to have an extensive overview of the scientific method, quantitative and qualitative methods(Brady&Collier,2004). The research process itself is extremely complex with several variables staying in effect at one time. It is important for the researcher to ensure that the focus remains on the subject that is being researched. Both qualitative and quantitative methods are as different as day and night. Scientists use them to test casual theories. Qualitative mainly fo cuses on how and where. It pertains to the quality of the data, e.g. the quality of a sample , is it randomly taken or is it specific(King ,Keohan ,Verba,1994). However, quantitative method includes all the finer mounts and pertains to the quantity of the data, e.g. a sample of a large population maybe a small sample or a large one. The sample size typically depends upon the objective of the research and what the researcher is basically aiming to identify. Quantitative Method: Generally speaking, scientists use this method for statistical analysis.It is defined as a method of research which focuses on numbers. Nowadays, all types of quantitative methods are required in almost every discipline of social science. This is because they help quantify different aspects of the research along with different phenomenon linked to the variables of the research. Generally, after the experiments are held, researchers use statistics to determine the result of their experiments. Statistical analys is is done by taking out a sample from the experiment and is used to determine the approval or disapproval of the entire group. Quantitative research is based on statistical analysis and can be easily replenished. This method is preferred because of its accuracy in social sciences. The fact is the quantitative researches helps quantify the different questions that the researcher has posed for the purpose of the research. There is no aspect of subjectivity involved here, whereas qualitative research can at times be limited because it is more opinion based than anything else and cannot be generalized easily. Quantitative research is done when subjective formulation of theories has been done in the field of study. The quantitative method of data collection is highly systematized and efficient. The major component of quantitative research is how vague concepts of quantity are measured so that statistical tests can be run on their differences between groups(Manion&Morrison,2000). The qua ntitative data collected is analyzed via statistical databases.If the results of the experiments on the data are significant then it is used to propose a valid hypothesis. Quantitative research of any sample of collected data is systematized and rigorous, which is easier to duplicate and resurrect. The main criticism this method holds is that focuses on one point of the data. Qualitative Method: Miles and Huberman defined Qualitative method as the method that uses words instead of numbers( Miles&Huberman,1994). It is considered â€Å"soft† in regard with quantitative methods of research. Within the vast framework of qualitative research there are numerous methods to compile data and results. Qualitative research is very important in the fields of psychology and anthropology because this method probes in deeper into the data to dig out results, which often cannot be analyzed as thoroughly due to other systematic errors.When data based on quantity comes up, we use traditional q uantitative methodology. However, when researchers are up against data

Food Safety Management Case Study Example | Topics and Well Written Essays - 1500 words

Food Safety Management - Case Study Example The first one was to focus on the causative agents and determine the preventive measures of food poisoning. Secondly, the report is supposed to contain the characteristics of food poisoning and foodborne infections. Therefore, this investigation will help determine the primary cause of the incident among the guests. The hotel provides catering services in a number of occasions that include weddings, conferences and other meetings. One of the primary concerns is to ensure that the clients are provided with quality and safe food. However, there are a number of issues in the hotel industry like food poisoning and contamination and the hotel has to ensure that it curbs them. Food contamination may occur when harmful microorganisms are introduced to the foods. It is brought about by handling of the foods poorly as Lawrence, Dobmeier, Bechtel, & Holstege (2007) points out. Most significantly, food contamination can emanate from pathogens or chemicals introduced to the foods during the preparation process or storage. Moreover, handling of food with dirty hands is the leading way globally through which microorganisms get into food. In this case, some bacteria like E. coli can be transferred to food. In addition, there is cross-contamination between food and unclean kitchen tools. Further, fresh fruits can be contaminated by washing them with dirty water containing faecal matter from animals. Food poisoning can cause illness and to some extent death when not contained in time. Mostly, growth of bacteria in food when cooked or poor handling worsens the situation. To reduce  food poisoning  occurrences, a number of conditions have to be met. It is important to understand that food contains bacteria naturally and microorganisms are likely to grow if they are within a conducive environment (Hennekinne, De Buyser, & Dragacci, 2012). Therefore, be the food handlers’ must be responsible to ensure that they do not provide a conducive environment for

Monday, September 23, 2019

Business plan for running oil based Fragrances Company Research Paper

Business plan for running oil based Fragrances Company - Research Paper Example Business Strategy†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦5 v. Financial Summary†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦6 Business Opportunity†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦7 i. Mission Statement†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦....†¦8 ii. Market Landscape†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.9 iii. Competitors†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦9 Customers†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..10 i. Customer Profile†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦10 ii. Customer Feedback†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦..10 Marketing Plan†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦11 i. Goal†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦11 ii. Strategy†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.11 iii. Products†¦..†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..11 iv. ... Phase II†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.15 iii. Phase III†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦18 iv. Phase IV†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦,†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.21 Management Team†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.22 Exit Strategy†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦23 Bibliography†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦24 Appendix†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.25 A. Executive summary i. Business opportunity Elegance Fragrances Company seeks to create a strong oil based fragrance brands in United States through its marketing advantage. It will offer its patrons with a wide variety of oil fragrance selections with a special appeal to the health-aware-public outlined in the marketing segment of this plan. The products will be heal thy and environment friendly as they don’t contain neither toxics, nor harmful substances such as aluminum (Abrams 123). Though the Arabic and Muslim communities are our target customers, the products are expected to catch the attention of many people from different walks of life. The increasing numbers of people interested in aesthetics has increased the demand for fragrances not only among the Arabic and the Muslim communities but also other communities across the world. Elegance fragrances will be of high quality, and of low cost (Levesque & McNeil 78). The patrons will enjoy a variety of

The history of south africa between 1650 and 1913 Essay

The history of south africa between 1650 and 1913 - Essay Example The Dutch colony in South Africa, established after their arrival in 1652, was â€Å"accidental† (Keegan 15). The Dutch had initially intended South Africa to be no more than a trading post. They hoped that they would be able to trade with the native population to ensure supplies for their ships. However, this arrangement did not work out as well as the Dutch had planned and a decision to colonise the area was made. In order to do this, the Dutch came into conflict with the Khoikhoi natives through colonising their land. This act of force was met with heavy native resistance (Ross 22-23). The first Khoikhoi-Dutch war began in 1659 and was ended with a treaty, acknowledging Dutch rights over the disputed territory. The Dutch had successfully exploited native tribal tensions despite low morale and limited numbers. The conflict did not end with the imposition of the treaty; in 1673 a four year war began as a result of the murder of white elephant hunters. At the end of the war, t he Dutch seized at least 1,765 Khoikhoi cattle and 4,930 sheep. Even though the Dutch never again declared war on the them, this was the beginning of the end for the Khoikhoi and they were forced to retreat to other areas (Frederickson 30-31). The second point to be analysed is the arrival of the British and how this impacted on the Dutch and the Bantu, with particular reference to the Xhosa. Like the Dutch, the British occupation in South Africa was not initially about colonisation. The first occupation, beginning in 1795, was a â€Å"temporary measure† aimed at preventing the French from gaining authority in the area and to â€Å"guarantee provisions and a safe harbor for Britains great Asian fleets† (Beck 42). Life in the colony continued as it had done prior to the British invasion, but there was significant concern about unrest in Eastern frontier