Writing an essay in english
Thursday, September 3, 2020
Tort Assignment 2 Example | Topics and Well Written Essays - 1500 words
Tort 2 - Assignment Example y have various kinds of remuneration plans and laws for harmed workers, however they are completely proposed to prepare for the negative outcomes of failure to acquire a pay brought about by injury. Most industrialized states are showing a restored enthusiasm for their frameworks of individual injury prosecution, which can be seen as a tendency towards reacting to individual injury through lawful review. For instance, in the United Kingdom, there is the Workers Compensation Act, of which the whole Part 3 and a few arrangements of Part 1 are relevant to word related wellbeing and wellbeing (IIDB, 2014). Segments of Part 4 are material to wellbeing and wellbeing choices requests. Subsequently, workersââ¬â¢ remuneration is where businesses should either pay or give protection that will pay clinical costs and lost wages of laborers who get harmed while playing out their employments. This paper will show that Tom, Dick and Harry have various rights and remuneration levels from a laundr y they worked for before being resigned on wellbeing grounds subsequent to creating various infections brought about by a compound they utilized at work. Under the Workersââ¬â¢ Compensation Act, a business is characterized as anybody with at least one specialists who work for them in an industry by either a recruiting or apprenticeship contract which is inferred, communicated, oral or composed. Then again, a laborer is characterized from various points of view, yet the most appropriate on account of Tom, Dick and Harry would be anybody under apprenticeship or agreement of administration whether suggested, communicated, oral or composed. Tort law characterizes an obligation of care as a legitimate commitment owed by a person to other people, whereby a sensible standard of care must be practiced while performing acts that are conceivably hurtful (Bagshaw and McBride, 2008). It likewise necessitates that the mischief must be predictable. On account of Squeakyclean, the organization had known for a long time that Blastoff, a synthetic liquid utilized during the time spent cleaning, causes a
Saturday, August 22, 2020
Discussion Questions III Essay Example | Topics and Well Written Essays - 500 words
Conversation Questions III - Essay Example The viability relies upon the quality of comprehension and capacity to impact and accomplish. ââ¬Å"Strategies for correspondence and impact should be established in a nitty gritty, setting explicit comprehension of both the personal conduct standards and the hidden social estimations of those with whom we need to lock in. Acknowledgment of this is an indispensable initial step for professionalsâ⬠¦ who need to apply impact upon and draw in with others over the globe.â⬠(Dr Mooij, 2009) Dealings are a significant piece of leading business to show up at commonly satisfactory choices or resolve issues where members hold contrasts of supposition or destinations. However, ââ¬Å"operating across national societies regularly amplifies exchange problemsâ⬠(Hendon, 1999, p.16) because of contrasts in deciphering the unobtrusive dialects of time, space and different ideas. Aside from culture, the capacity to arrange is additionally influenced by feelings, and non-verbal communication is deciphered distinctively in various societies. Make the straightforward move of a well disposed handshake for instance. Like the Germans, Americans will in general shake hands commandingly, however ââ¬Å"in a few pieces of Europe a handshake is normally speedy and to the pointâ⬠(in the same place, p.70) and the Asian handshake might be limp. Asians may decipher an American handshake as being ââ¬Å"too sudden and substantial handedâ⬠(on the same page) while an American may think about the less strong handshake as an indication of being unassertive. Spatial ideas direct welcome ceremonies, the size of oneââ¬â¢s individual ââ¬Ëcomfort zoneââ¬â¢, eye to eye connection, satisfactory guest plans, etc, all of which contrast between societies. Concerning time, this is something that is followed all the more carefully in a quick paced nation like America than it is in numerous different nations of the world. The common western method of reasoning sees the idea of time as direct and successive as opposed to cyclic and concurrent. Therefore, the arranging style for somebody having the previous recognition
Friday, August 21, 2020
Enterprise and Entrepreneurial Management Assignment - 2
Venture and Entrepreneurial Management - Assignment Example The business arranging process comprises of various related components; every component designed for the ââ¬Ëcreation of an effective pioneering venture.ââ¬â¢ Since valuable time is designated for the fulfillment of every component, it is important to assess their incentive as far as effectively making an undertaking. In this manner, the initial segment of this paper will give a study of every one of the business arranging processââ¬â¢ components to decide and approve its inalienable worth. Components: The Introduction Idea Generation. The initial step of each undertaking brings forth from two individual perspectives: the apparent market needs or needs and the way these two can be met. The last is generally described by the prime plannerââ¬â¢s individual ability, side interest, or any movement that has the potential financial incentive as an item or administration product. These two perspectives are the result of the prime plannerââ¬â¢s thought age and fill in as the s upporting spine of the entire marketable strategy. The following arrangement of thoughts will at that point root from these two perspectives. This being the situation, it is fundamental to keep the primary thoughts legitimate, steady and relevant to every single other segment to guarantee a durable structure for the entire strategy. Vital Objectives. These are the kinds of destinations that are defended by a binding together methodology (Robert, 1998). These destinations, which were set by the organizer to make sure about both market and post its situation as a trustworthy supplier of administrations or items, must be reasonably acknowledged; in this way, the utilization of systems. Be that as it may, destinations are ever-changing and are intermittently separated by the present moment and long haul objectives. Targets may come as benefit, hardware or administration updates, headway in advertise position against contenders, and different dreams of business progress. Market Analysis and Research. Aside from building the establishments of the field-tested strategy through thoughts and destinations, it is basic that applicable data about the market condition is joined. This component, among the various, has the most capability of including practical realities and acquires vital systems. The consequence of this exploration and examination may explicitly point the current and the objective situation of the business regarding its industry. By understanding this position, the organizer will have a tendency of what goal the business should take and critically, how to arrive. Understanding the Competition. Information available condition presents the nearness of the business contenders. This component centers around recognizing the dangers and openings these contenders present and serve to be a piece of the variables in planning the showcasing procedures (Harvard Business School Press, 2010). In business, obliviousness of the businessââ¬â¢ contenders can be one of t he most exorbitant blunders. Rivalry can be in a few structures, for example, a vital area (upon nearness with customers), industry position, item or administration pack, and whatnot. Budgetary Projections. Generally supportive in designating potential business ventures are the monetary data which comprised of income, benefit and misfortune estimate, and accounting report projections. These proforma of figures quickly identify with potential budgetary returns - the investorsââ¬â¢ addition (or misfortune) in joining an undertaking (Parker, 2006). The speculators additionally eye on the money related estimates of income just as the benefit and misfortune since these two
Sunday, June 14, 2020
Rapid Development of International Micro-finance
Rapid Development of International Micro-finance The Rapid Development of International Micro-finance Introduction One of the concepts of Finance that has continued to excel over the last two decades and to which numerous groups and institutions attribute their financial success in the various development projects is International Micro-finance. Though not so active, microfinance has been prevalent for centuries with savings and credit groups and numerous savings clubs all over the world offering financial services to the poor population that was often neglected by commercial banks. With the little profit that they made from these services, the various savings and credit developed further to form cooperatives and other development financial institutions such as micro credit organizations which provided small loans mainly to the poor people in the rural areas who could not meet the high collateral requirements of the existing commercial banks. The origin of global micro-finance institutions can be traced back to the mid -1970ââ¬â¢s in Latin America and South Asia whereby various credit and savings groups merged to form more stable micro-finance institutions which paved the way for the international micro-finance industry that has proved to meet the numerous financial requirements of individuals and development of numerous projects on a global basis. Over the last two decades, the global micro-finance industry has been on an increased rate of growth taking up the international financial market by storm. Statistics indicate that the industry has expanded its limits and currently it can serve up to 200 million clients across the worldââ¬â¢s geographical regions. For instance in Sub-Saharan Africa, the Micro-finance Institutions serve about seven million borrowers and records gross savings of nearly US$ 2.8 Billion with a total of about 17 million savers. Due to the numerous growth and prevalence of the micro-finance ind ustry in the region, gross loans portfolio together with savings growth has raised to 69% and 60 % respectively. A similar trend was evident in Europe whereby various types of large and more formal credit institutions came were formed. The micro-finance institutions established then primarily majored with rural and the urban poor population and were referred to as Peopleââ¬â¢s Banks, Credit Unions as well as savings and Credit Co-operatives. This research paper will go further to discuss the development of micro-finance on the international level. The paper will address various aspects and trends of the International Micro-finance as well as the general state of the industry on a global base. This paper is divided into four subtopics which include: the Causes of the Rapid development of international Micro-finance; Constraints to the development of a fully-fledged micro-finance in developed Countries; the Impact of development of International Micro-finance in developing economies and the Role of Public Policy in the Development of International Micro-finance. Literature Review Causes of The rapid development of International Micro-finance Over the last two decades, the micro-finance industry has been on an expansive mission, taking over the financial and credit role over the various commercial banks and other related institutions. One of the main reasons behind the rapid growth of the micro-finance industry is the fact that there has been a high demand for capital among the poorest. The main goal of micro-finance is to generate and hold savings for future financial needs. These savings play such a significant role in that they protect against the seasonality of cash flows especially among the poor people in the rural areas and the urban poor (Robert, 2002). By so doing, they help to fulfil an insurance role in covering the financial needs of the clients. More so, the various Micro-finance institutions across the globe facilitate the building up of deposits which enable the yielding of significant collateral levels which enable them to serve as a source funding for their customers. The Micro-finance industry across the globe has been on endless mission to counter poverty especially in less developed countries. Moreover, the microfinance institutions help to speed up economic development in the developing countries by offering a viable source of finance to the masses of people who wish to in invest and build up their financial basis. Micro-finance institutions have also played a significant role by ensuring that their members are protected against financial shock that has seen their children remain in school despite the bad financial times such as inflation. There are two major factors why Microfinance compares favourably to other financial institutions and interventions. These include the cost-effectiveness and the prospects for sustainability. According to Colin (2007), microfinance is advantageous by the fact reason that their donor investments are usually reused or recycled over time which facilitates the principle of sustainability in the financial flow and credit provision. According to statistics and data collected from the comparisons made between microfinance and other lending institutions such as commercial banks, microfinance stands out as a more cost effective developmental tool compared to the available alternatives such as formal rural financial intermediation and the rural infrastructure development projects (Andrew, 2006). In addition to these benefits, costs incurred in the application of microfinance services tend to diminish with the range of the outreach of their services unlike other related interventions which add on their costs and chargers as they cover more people (Colin, 2007). The second significant factor that has added to the rapid development of International microfinance across the globe is the sustainability that comes along with microfinance services. Normally, most of other related developmental tools do not have the potential to remain sustainable after offering the first or the initial start-up grants. In most cases, after offering the initial start-up capital, these institutions find themselves in need of new inputs for each and every client who joins the organization or the union in future (Colin, 2007). Unlike these institutions, microfinance remains stable so that they donââ¬â¢t require their future clients to meet such barriers such as initial inputs and new inputs for the sustenance of their financial services and their lending endeavours. This is despite the fact that they there are no rigorous econometric models to substantiate its operations and capital requirements given the fact that their main target is usually the on clients who ar e not so well up financially. However, statistics and research have proven that Microfinance institutions that target poor customers are at a better place to achieve fairly considerable repayments rates compared to those institutions that major with richer clients (IAMFI, 2008). The other factor that has facilitated the rapid development of International Microfinance is the formation of microfinance networks in the regions across the globe. These microfinance networks act as umbrella organizations for the functioning and the welfare of multiple microfinance institutions, thus providing a viable avenue their cooperation which guarantees support for each other and a centre for sharing ideas, experiences as well as articulating solutions to the common challenges that face them in their daily functions. According to Colin (2007), microfinance networks have been instrumental in the development of the microfinance institutions, and I quote, ââ¬Å"Country and regional microfinance networks have an additional focus on advocating local microfinance policies and help members transform into regulated deposit-taking financial intermediaries.â⬠An ideal example of such one of the largest microfinance networks in the world that has facilitated the rapid development of international microfinance is Accion. This is an NGO which is based in the United States and offers technical and consultancy services to the various microfinance institutions under it leadership. The major services offered by the network is concerning the management of the institutions, investment as well as governance support and guidance all aimed at building the institutionsââ¬â¢ capacity and financial strength so as to fully meet the needs of the low-income households across the globe (IAMFI, 2008). Constraints to the Development of a Fully-Fledged Micro Finance in Developing Countries In as much as there have been numerous expansion and growth of international microfinance, we must acknowledge the fact that the mission to achieve the excellence and development records has not been without some impediments. There are various constraints that the international microfinance industry faces in their bid to meet the financial needs of their clients. This is more evident in developing countries where most people turn to the services offered by the microfinance institutions due to their numerous financial needs occasioned by low capital endowment. The constraints or barriers that face the development of international microfinance can be analyzed in terms of their efficiency, their profitability as well as their levels of the overall outreach. One of the major constraints of the rapid development a fully fledged microfinance industry in developing countries is the establishment of inappropriate government regulations which affect the welfare and the functioning of the microfinance institutions in the various economies across the globe. The major issue with governments is the fact that the policy makers exhibit difficulties in formulating effective legal frameworks around facilitate the smooth operation of microfinance institutions operations (Robert, 2002). Countries which have taken the initiative to draft specialized microfinance laws in their economies have helped to enhance growth and innovation in the international microfinance industry. However, most economies around the globe formulate lenient policies on the microfinance frameworks thus creating environments that only lead to weak institutions which are undercapitalized. As such, they encounter numerous challenges and impediments in the development of their operations and scope of coverage. One of the most prevalent regulations which is more evident in various economies in Sub-Saharan Africa which undermine the global growth and development of the microfinance industry is the creation of interest rate ceilings; commonly referred to as usury laws, which limit the level of at which microfinance institutions can invest (Robert, 2002). The other major impediment of the development of fully-fledged international microfinance is the poor utilization of modern technologies in developing countries. This is more common with economies in regions such as Asia and Sub-Saharan Africa whereby there is underinvestment in the technology among the prevailing microfinance institutions in the regions. This effect can be attributed to the constrained resources of the Microfinance institutions as well as the failure of the responsible management team to recognize the significance of integrating technological advancements in the microfinance industry (Robert, 2002). More so, the system of management information systems forces is either absent and in the few economies which have adopted the system is not well managed. This in turn leads to poor loan-processing and poor record keeping by methods such as paper work and spreadsheets-based solutions which incapacitates the efficiency of the institutions to manage numerous numbers of clients across the globe thereby limiting the profitability and the growth potential of the microfinance institutions. In addition to the above impediments, the lack of transparency and consistency in lending activities among the various developing countries across the globe has amputated the rapid development of international microfinance. According to research findings on the consistency of lending activities of microfinance institutions in developing countries by Andrew (2007), and I quote, ââ¬Å"Most microfinance institutions in developing countries display poor asset quality, with higher portfolio at risk metrics than other microfinance institutions in developed economies of the world.â⬠This has mainly been caused by the lack of viable credit scoring methodologies among the institutions in the developing countries which have resulted in the inefficiency and the poor transparency in the management and their lending procedures. This in turn leads to increased costs incurred in funding for the microfinance institutions occasioned by the high risk involved in the investment due to inefficient management of the lending. Last but not the least of the constraints that limit the development of a fully-fledged International microfinance is the lack of early-stage funding among numerous institutions. One of the major problems that still face most microfinance institutions especially in the developing countries is the fact that the funding which should facilitate the growth of early-stage companies in developing economies remains limited (Colin, 2007). This has been the case despite the increasing recognition of the commercial viability that is attached to microfinance institutions. It has been a major challenge for the small institutions that are emerging to develop and to expand their scope due to the lack of access to affordable finance sources. This has been the case due to the fact that most investment in the microfinance activities in the developing economies is has been concentrated in only a few leading institutions which are fully developed (Andrew, 2007). Impact of Development of International Micro Finance in Developing Economies The impact and the significance of the rapid development of international Microfinance in developing countries cannot be over stated. The financial support offered by the microfinance institutions to the various development groups and individuals has brought positive change in the lifestyle of people across the globe in various ways. One of the most clear and evident impact of the development of international microfinance is the reduction of poverty and vulnerability especially among the low income earners in the developing economies and among the upcoming investors. According to findings by Robert (2002), and I quote, ââ¬Å"Microfinance has also facilitated the trend of saving among numerous households. Consequently, this has made it possible to invest and plan their life such that their livelihood is not affected by some unexpected financial setbacks that they may face in life. Through such investments, people across the globe have been able to increase their levels of income. More so, people have benefited from the jobs created by the various microfinance institutions that have been established across various regions in the world. As such, households are able to cover their expenses and improve on their lifestyle in areas such as nutrition, housing and improved health care standards (Robert, 2002). More so, there has been a significant reduction in the rate at which harmful child labour take place especially in less developed countries. On a general note, reports indicate that there has been a significant improvement among the participants or members who have consistently invested their loans on long term basis in terms of their incomes, assets and their livelihood security. For instance report indicates that participants or members of the microfinance institutions in Vietnam recorded 50% increases in their income levels since 1996 when they joined the mic rofinance institutions in their country (Colin, 2007). More so, as Robert (2002) carefully notes, and I quote, ââ¬Å"poverty reduction estimates based on consumption impacts of credit show about 5 percent of program participants can lift their families out of poverty each year by participating and borrowing from microfinance programs.â⬠The other impact of the international microfinance has been experienced on the per capita expenditure especially among the women members of the institutions whereby women have been empowered and can manage their own development activities as well as their expenditure needs without having to rely on external support. More so, the net worth of the active members of the microfinance institutions has been significantly increased, with more changes being evident among women. In addition, the development of international microfinance has led to the creation of favourable economic environment in the various regions which have adopted the microcredit programs. These programs have been significant to help the members who are not only faced with financial problems but also with issues to do with worries of possible economic crisis, political instability as well as the occurrence of natural disasters. The savings invested in the institutions are normally given back to the members in the form of credit loans which they use to recover and correct their affected projects and to support their daily needs in case such problems take place. Last but not the least among the impact of the rapid development of international microfinance programs especially among the developing and the developed economies is the smoothening of consumption as well facilitating the reduction of the seasonality of labour supply. This is due the numerous employment opportunities that have been created by the numerous microfinance institutions across the globe and the fact that members have substantial amounts of capital to invest and create self employment through business ventures (Andrew, 2007). This way, the long-term members of the institutions are assured of regular in flow of income from the diversified investment projects that they have already initiated to facilitate alternative source of income. Role of Public Policy in the Development of International Micro Finance The implementation of some public policies in the various nations across the globe has also affected the rate of development of international microfinance across the globe in a number of ways. Some policies have had a positive impact on the rate of growth whereas others slow the rate of development of the international microfinance institutions by limiting their scope and interest rate levels thereby limiting their potential to grow into marginal financial institutions. One of the public policies that affect the development of microfinance institutions and operations is the monetary and the taxation policy. Some taxation and monetary policies formulated and implemented by the respective governments may channel substantial amounts of capital or resources away from credit so that they are used in other investment instruments (Robert, 2002). This problem is more common in developing countries whereby the exchange rates as well as the interest rates are usually politicized so as to satisfy the selfish objectives of the politicians. More importantly, the formulation of poor monetary policies by the responsible financial bodies and the various governments such as inflation and economic instability usually reduce the level of savings for the low income earnings who happen to be the majority of the members of the various microfinance institutions across the globe. This consequently affects the group-based microcredit programs so that they are financially unstable to meet bigger projects of the various development groups and the financial requirements of their clients. Another policy that significantly affects the rate of development of the international microfinance institutions across the globe is the government regulation which reduces the capital available for the small businesses to lend their clients. This is due to the fact that the government values the stability of the banking system over the idea of widespread access as is the case with microfinance institutions. In other occasions, banks have shown their willingness to lend the microenterprises. Unfortunately, the policy regulators in these countries counter their efforts by initiating policies that inhibit such procedures. The other issue that affect the efficiency and the development of international microfinance operations is the numerous political interferences in the credit markets, which is more rampant in developing countries. In most cases, politicians have been known to divert development funds to moribund state-owned firms and political or worse off to a few wealthy and influential personalities (Robert, 2002). Rarely do these funds reach the hands of the poor people who seek credit to finance their developmental projects. This leaves the poor with a challenge to form their own credit system which is quite a hurdle given their low resource basis. Conclusion The topic of the rapid development of international microfinance is such a significant topic especially with the current need and challenge of the small scale entrepreneurs to engage in more viable financial development projects. This has been necessitated by the need to counter the high cost of living occasioned by the inflation and other economic challenges. It is important to acknowledge the role that the microfinance institutions play in the international economics welfare such as employment creation and the reduction of poverty among the poor people especially in the less developed and the developing countries. More so, the services rendered by these institutions such as microcredit lending and the mobilization of membersââ¬â¢ savings has enhanced the income of the members especially those who have remained loyal to save on a long term basis. It is also important to acknowledge the fact that there are some constraints that hinder the full development and growth of the microfinance across the various economies in the world. Such constraints as lack of transparency in the lending of credit to the clients among others must be fully addressed in order to achieve the full growth and expansion of the scope of the microfinance institutions I across the globe. The active NGOââ¬â¢s and the various policy making bodies across the various economies must take upon themselves the responsibility of ensuring the formulation of favourable policies and viable procedures that enable the free operation and the rapid development of international microfinance across the globe. References Andrew M. (2006). Venture Capital and the Finance of Innovation. Wiley. Print. Robert F. (2002). Analysis of the Effects of Microfinance on Poverty Reduction. New York University, Paper no. 1014. Print. Colin S. (2007). Supporting Growth and Sustainability of the Microfinance Industry in Sub- Saharan Africa. Lehigh University-College of Business Economics. Print. IAMFI. (2008). International Association of Microfinance Investors. CGAP. Retrieved From: http://www.iamfi.com/MI_east-asia-pacific.html. Net.
Sunday, May 17, 2020
Consumer Behaviour
Sample details Pages: 35 Words: 10630 Downloads: 4 Date added: 2017/06/26 Category Statistics Essay Did you like this example? A Study of Consumer Behaviour in the Automotive Industry in the UK Consumer behaviour is dependent on few factors that need to be considered in any industry. In the Automotive industry, there are several intertwining factors known. The Internet as one knows well has its importance in nearly every form of trade. Trade is directly dependent on communication, and these days the Internet is considered to be the most important and reliable means of communications for trade. In view of the Internet being an important medium through which customers may be communicated with, customer behaviour becomes an important subject. Observing customer behaviour in the recent past, its observed that there is immense scope for expanding the automotive industry. This is because there appears to be a better response from customers through the Internet. Donââ¬â¢t waste time! Our writers will create an original "Consumer Behaviour | Marketing Dissertations" essay for you Create order Purchases of parts are easily made and are believed to be considerably reliable. For purchasing vehicles, advertising through the Internet is the first step towards pulling in customers. Indeed, this step is believed to be effective as there are a number of individuals who first see adds online, and then decide to physically check a promotion out. With the Internet growing more and more common in the UK, it is expected that there will be much more activity on the part of consumers, which means that the automotive industry is going to do even better than it has in the past. Introduction: The world has reached a stage at which everything is close-knit. There are several bodies and structures that interact with each other that appear to be systematic. Globalization for instance is something has many countries, organizations and institutions operating together. Each of the components in the globalization process exists for its self and is self-driven, yet the system functions. In this regard, one might assert that markets of different types and sizes function in a similar manner. The motive industry is an example with its visible effects. Consumers are actively participating in the industry activity, making it an increasingly viable one for people to invest in. The services and products are known to be quite reliable with an immense amount interesting them. In recent years this has been the case and in time to come its expected that there is going to be even more interest in the automotive industry. Methodology: This paper includes views of the automotive industry and the communication processes involved. It exposes each part in considerable detail in sections. In doing so, it has managed to cover several areas of interest that explain consumer behaviour. In order to also give on an idea of what strategies organizations employ to boost their profits, fictitious company has been included with figures that are relevant tithe automotive industry. In view of the strategies involved in this company (EXCEED) one can determine how important communication is in the automotive industry. It is clear enough that the Internet is of tremendous value here, and it is for this reason that it is important to analyse its use. The weak as well as the strong points are exposed here, and one can match these up against the ones employed in EXCEEDs strategies. According to this, one can also assess how effective EXCEEDs strategies are and whether or not they are successful in the automotive industry. In considering the success of the strategies, it must also be asserted that it is believed that the strategies are successful considerably because of the success that automotive industry has had in recent times. It is also hoped that strategies will also go on to be further improved so that the industry does even better . Description: The world learns through experience, but living in an image-conscious world may prevent one from learning through his experiences. This is apparently a dilemma considering the fact that one lives in an age of post modernism; a stage during which signs mask reality, and one is often deceived through image-promoting strategies. This is true to say because of the fact that signs, logos and big names are now common, and people are often lured into believing the authenticity of different products because of the promotions they have. Consumer behaviour is considerably dependent on promotion of products; the manner in which products are promoted directly influences customer behaviour. Each medium used for promotion has its own impact, and the one that is believed to have a tremendous impact is the Internet. It is believed to boost promotions and sales greatly, and it helps customers in their first step before actually checking a car out. It is through the advertisements on line that they may be attracted and then move towards checking a vehicle out physically at a show room. It is this behaviour that has helped boost the automotive industry significantly. In fact it must be asserted that prior to globalization, consumer behaviour was observed as having a major effect on the development of nations. This is because it helps boost the economy internally as well as having its impact externally . Prior to the 1940s and 1950s, there was no such aim because of the fact that there were many problems that the country was faced with internally. Socially there were different levels on which the UK had to bring the people together. And perhaps during that time no one had come up with such an idea to divert the attention of the people, which occurred during the 1950s . From this era began to the shift towards an improved way of life that would take the country into an entirely different era. This era today is called globalization, a phenomenon that brought many parts of the world together through faster communication systems. Globalization has in fact resulted due to the fact that communication systems have been boosted in recent years. This is also the reason why the present age that people live in is called the age of communication. Literature Review: The expansion that has been witnessed today in organizational structures an effect of globalization too because they are spreading almost all over the world. As Organizations expand it is understood that they tend to face problems in efficiency. These problems need to be handled carefully in a logical manner so that smooth running of the organization can be restored to the way it was when it was located in its originating country. For this to be handled effectively, communication also needs to be of the highest level. Problems in efficiency may emerge due to the lack of communication or the lack of skills with newer personnel employed in the firm. This is because they are not aware of exactly what the cultural atmosphere was at the original location of the firm. Since they have been newly employed they are bound to face problems such as these. Strengthening the leadership of an organization automatically means that operations will be handled well, which in turn means that there will be financial gain at the end. In addition to this there wont be a shortage of executives if organizations indulge in setting up proper training plans for their apt employees. These plans should be implemented both, at home and abroad too so that uniformity is maintained throughout the organization. It is also essential that trainers do not get polarized in any one location geographically speaking. They should be allowed to exercise their skills and implement them wherever possible. This means that they will also gain maximum teaching experience which they can share with whoever the work with and teach. Three leadership techniques that have been found to increase the performance of an organization: 1) An efficient and lean organization; 2) A talent management plan that focuses on attracting and retaining high-performing individuals; and 3) A performance management program that rewards employees who meet set goals (Dorgan, Dowdy, 2002) From the above points one can see that the major problem that lies in organizations spreading into other cultures is the internal conflict, but aside from the internal conflicts the trend of marketing American products abroad is one that is patronized by the people of those cultures. It is the people that make this possible, as human beings are almost always ready for a change especially if it isnt going to harm them. Accepting new trends that are already in vogue in other neighboring countries is something that further motivates people into welcoming UK products. However, this is not only the case with receiving UK products in Asian countries . There is now more scope than there was ever before for products to be marketed. The marketing of goods across the globe is yet an extension of what took place in the 1950s. This may be said because of the fact that the effects of this process of globalization are almost the same as what was seen in the United States during the 1950s. The process of people welcoming products that are brought nearer totem heralds the current trend in globalization. This is the same process that was seen during the 1950s when consumer behaviour was on the rise. This trend is extended to other places in the world today through globalization, which means that there are a whole lot more people aware of what is available around the world. This also means that there is a lot more stuff for people to be engrossed in, which would further help people to be relieved of stress in their everyday lives. But it also must be realized that there are other things to consider besides stress relief and extension of cult ure (Annesley,1998). It must be realized here that there is an intense effort to control people economically through consumerism. During the 1950s this was seen as people bought what was advertised. Similarly, this is seen in many countries around the world that buy American products . An Example of an Organization in the Automotive Industry For this section, a fictitious organization has been named, but contains data that is relevant to the automotive industry and present-day values. In contemporary times this may seem to be a problem, as one may not really know which product to trust and which will be dependable. As opposed to having to depend on particular advertising to learn about products, people have often used other customer experiences as their guides. This means that people without experience of a particular product have in fact waited for others to purchase it; the observers its back and observes the performance and customer satisfaction. If a product happens to satisfy a customer, others will certainly be willing to use the same service providers. Hence, it can be seen here that reputation does matter to service providers and customers. In addition to this, it must be noted that experience of customers can be used as a vital tool in promoting services. This overshadows the uncertainty of that advertising may often portray. Though advertising is an essential strategy in promoting a product, it must be realized that there are several people that are not easily convinced simply through product display and the like. In view of this, customer testimonials are essential in proving authenticity of a product, as this proves how many customers have been satisfied and what customers have to say about. This is what many organizations are doing these days in order to boost their services. Indeed, EXCEED is one of them; EXCEED is a motoring supplier, and caters to a significant part of UKs market. In doing so, it needs to reassure its customers of its services and dedication them all. EXCEED is believed to be a credible motoring product and services supplier because of its reputation; its reputation is one that has been gained through reliability that customers have experienced through time. In view of this, more and more customers have turned to EXCEED services, as they have been convinced by other customers experiences through time. However, it must be asserted that an organization that operates as one of the biggest in the UK, cannot simply rely on word of mouth for gaining more business or maintaining its position in the market. Thesis because of the fact that competition can easily overturn ones reputation. In view of this, EXCEED has to go on promoting itself and has to do so in a positive manner by focusing on its strengths and either ameliorating or doing away with products and services that are not gaining headway. Currently with the reputation EXCEED has, it is the leader in the Upmarket, attending to millions of customers. It has more than 12 million drivers depending on them, has around 3500 uniformed patrols on the job, and caters to 7.5 million calls every year. It is apparent that with this kind of healthy activity in their business that EXCEED is number one. However, like any other organization that provides services and products, EXCEED is not satisfied with what it is doing in the sense that it wants to enhance services that are viable and either do away with or improve the services and products that are less in demand. In doing this, they have an understanding of the market and what their potentials are, and this lays the platform for EXCEED to construct strategy in terms of marketing and advertising; a strategy that they and the customers too would gain from.*EXCEED also has been on the risen terms of the customers that turn to them. this is a positive sign because the number that turn to their services and products each year. With selling more than 650,000 breakdown policies a year, something that they currently specialize in, there is even more scope for improvement (Breakdown Cover, 2005). According to the figure below, one can easily observe that breakdown is apparently the primary source of income in EXCEED. There are other sources as well, but this is the most important one, and indeed one that they are promoting. The important point to realize here is that EXCEED knows its strengths well due to the fact that they have kept close watch on all the activity in the company. They know their past well, they know what is going on at the moment, and they also know what their chances are in the market. In view of their potential being strongest as far as promoting breakdown services, EXCEED believes that its marketing and advertising strategies are of immense importance, as it is through these tools that they can manage to attain a wider segment of the market. In view of the current state of affairs in the market, the following are worth noting. Product Holding: Volume Breakdown (motoring): 2,300,000 Motor and home Insurance: 500, 000 Other Financial Services: 45, 000 Breakdown and Insurance: 600, 500 Breakdown and Financial Services: 50, 000 Insurance and Financial Services: 5, 500 Breakdown, Insurance and Financial: 32, 000 In developing further strategies in order to improve EXCEEDs name and services, it is worth generally putting together some of the features around which the company could work. Below are few points that help paint a picture of EXCEEDs functions EXCEED is believed to offer more than just breakdown coverage; it offers: EXCEED UK Breakdown Cover EXCEED 5 Star European Breakdown Cover Round the clock English telephone assistance. EXCEED Motor Insurance 8% discount on line. EXCEED Home Insurance They fish out a panel of insurers for their customers. EXCEED Car Data Check Recovers hidden history of a used car in case you want to purchase it EXCEED Vehicle Inspection EXCEED Travel Bookshop 18% off on line from the UKs largest provider of travel guides. EXCEED Driving School Nation-wide EXCEED approved instructors Database Strategy through the Internet: Considering the fact that EXCEED has been allotted around 14 million Pounds to promote their services, it appears that an appropriate promotion can be created. Generally, for this first step, around 40percent of the fund may be used. This is because a database has to be established if any current one cannot be used for the proposed plan here. In addition to this and appropriate interface has to go along with it, combined with special features that only allow input on the part of customers. In view of the services that are already being provided, EXCEED needs to search into customer needs. This search would have tube conducted through getting their feedback. It is obvious that asking each and every customer about what they would like EXCEED to provide them would not be feasible; it would be better for the customers to have access to EXCEED. This could be done through allowing customers to have access to an interface through which they could feed in their comments and recommendations online (Fill, 1999, 53-59). They would not need to have passwords and things to that effect, as the feed in process could be made plain and simple for them. This could be carried out through creating some sort of forum where customers can view other customers views as well, and thereby give them even better ideas to suggest. In addition to this, the service could have a feature that provides one access to feed in their views, but after entering them, they cannot be deleted. In other words the program manager would only delete whatever is posted in the forum. In this way, comments posted would be safe (Yandi, 2001, 15-21). In addition to an online provision, at outlets where EXCEED services are provided, the company could maintain on hand comment leaflets or even registers for comments. The leaflets would provide customers with the opportunity of filling in their comments while they are free. The registers would have to be filled in on the spot. The data from these registers could enter into another portion of the online database for comments and views. The leaflets when filled when the customers have time could be dropped off at any EXCEED outlet of services. The data from these could also be accumulated and fed into the database as well (Tapp, 2000, 22-34). In addition to customers posting their comments, it is also advisable for EXCEED to develop a means through which employees such as the patrolman could give their views and comments as well. With this type of feedback EXCEED would be able to determine to what extent each sides comments are practical. While the customers want services to improve according to their convenience, EXCEED also has to look at the possible changes from the employees angle. This would help the management come up with ideas that would satisfy the customers as well the employees in terms of easing their services to the customers (Tapp,2000, 22-34). In view of the management receiving all the comments through the database, the data needs to be sorted appropriately. Since it has all been collected under employee views and customer views, there is basically no real need to segregate the comments even further. However, theres need for better arrangement in the presentation of the collected comments. This refers to the placement of services throughout the country and where the comments have been received. This also means that in each comment entry, a customer has to state which part of the country s/he is in. Depending on whether there is sufficient services in particular areas or not, EXCEED can enhance its services. In addition to this, they can set to work on the requested services. Since it is the Breakdown services that EXCEED wishes to focus on according to the potential in the business, they need to construct the feedback system according to what has been described above. In view of such a database interface being constructed and implemented, it also facilitates customer comments after improvements in services have been made (Smith, 1998, 25-41). In view of the use of database, it must be asserted that the major cost of it is only in the initial stage. This is because once the databases setup; it only has to be maintained and monitored. Direct Marketing Customers Program for existing customers: In the direct marketing step, it must be asserted that at least another 3.5 million 5 million might have to be invested out of the budget. This is because of the fact that EXCEED needs a stronger approach to its current customers; EXCEED requires a more comprehensive set up with more communication employees in order to realize its goal. Assuming the amount is invested, the following course of action can be taken in order to develop direct marketing. Though EXCEED recognizes the fact that it has tremendous scope for improving the grip it has on the market and would certainly want more customers, they are wise in the sense that they acknowledge the value of their present customers; they know that if they satisfy their customers their reputation will remain as it was if not improve. In addition to this, it must be asserted that a company has better chances of maintaining stability in all forms when it focuses on the market it has already captured. Maintaining current customers is essential in terms of financial stability as well as customer loyalty. This is because the customers get to know that the company cares about them through the services that it provides them with. EXCEED knows its products and its customers too, but they need to remain in touch with them in order to make adjustments that the customers need. In view of this concern, the customers feel that the company cares about them; EXCEED needs to make the customers feel this way in order to make sure that the customers dont feel abandoned or stuck with a product. Hence, there is a need to make sure that each and every customer is aware of the fact that they can communicate with EXCEED directly (Evans et al,2004, 43-44). In view of the direct communication that is a major part of promotional strategy today, it must be asserted that EXCEED needs to communicate with its customers today as much as possible. In order to communicate with them they can have in place customer relation officers. These officers are in charge of remaining in touch with current customers. Indeed, there are many of these officers employed because of the fact that there are also many customers that have to be dealt with. It is not an easy process but certainly is one that is necessary (Pickton, 2001, 64-67). Considering the means of communications used, e-mail, telephone, fax,etc. are the commonly used ones. Postal mail is also used as a means of contact. However, emailing and telephone contact are most commonly used. Similar to the communication process that communication officers use to stay in touch with current customers, it also must be asserted that customers use the same means as well. In fact, they may even be familiar with the communication officers who deal with them. This gives one an idea of how the direct communication process works and how effective it is. Certainly, if a customer becomes familiar enough to know a communication officers name, it is obvious that the communication process used is effective enough to get desired messages through (Smith, 1998, 25-41). In view of the effectiveness of the communication proves, it is clear that product promotion can be enhanced. All the communication officers have to do is follow the instructions of the product and tell the customer about it. In addition to this, they can supply them with ways and means of getting hold of the products. Regarding the communication process being simple, it certainly is, but when one has to focus of the breakdown of it all, it gets a little tedious. This is because of the fact that one needs to know the market well, and see who is interested more in the products and services that EXCEED provides. In view of this, there are few factors that have to be taken into consideration. These include: age, gender, ones occupation, lifestyle,etc. Though most people who use EXCEEDs services would want to know more about the products and services the company has to offer it must be asserted that research into the current customer behaviour reveals that there are particular groups that are more volatile and more viable to work with. This is why communication officers may work more with some customers and less with others. This is not seen as being prejudiced in any way, but it is true to say that the process takes into consideration customer behaviour, and since EXCEED is dealing with millions of customers they need to focus on the ones that they need to build and maintain relationship with. This is precisely what boosts customer loyalty. As far as the customers that are not communicated regularly with, it must be asserted that they are also important customers but they are ones that are easily satisfied with the services they get. In view of the particular factors that are taken into consideration, it must be asserted that in the UK, both men and women are users of EXCEED services, especially breakdown services. While men are still more likely to be customers, younger age groups are almost even. Older men are more likely than older women to travel long distances, while older women are still likely to be drive and use EXCEED services. As far as ones occupation is concerned, both men and women are likely to be service holders of EXCEED because of the fact that they are compelled to drive around. Lifestyle is another thing that is taken into consideration. Again men and women are both likely to use EXCEED services, but the younger they are the less likely they are to have EXCEED services. In view of some people not having EXCEED services, they can be targeted through the marketing strategy; current customers could be used to spread the word around. However, the more important point to focus on includes the need to market EXCEED more to people that have already used EXCEED services. If they have not been using the services recently, they can be contacted and reminded of their expired membership. In view of communication methods that need to be used, email and telephone is most commonly used. Almost all people have an answering machine on at home and a message would be easy to leave for the. Those that have cell phones could either be called or a message or mail could be sent to them. Emailing is common, and for those that use Internet facilities commonly can be easily contacted through it. In view of each customers profile, various ways of getting in touch with him or her need to be mentioned(Brierly, 2002, 27-29). Customers may be asked on order forms how they might be contacted; these details are noted down in order to make sure the more appropriate means of contacting a customer may be used. In addition to the communication means mentioned above, EXCEED could also promote its products and services through alternative means. This would include promoting products through magazines, television, periodicals, radio, and the Internet. This strictly refers to advertisements that are not personal, as they are opposed to emailing or telephoning a person. Though advertising in the ways mentioned here is quite effective, it must be asserted that it is not the kind that would stimulate the customers emotions. Customers need to be contacted directly when they are or have been regular customers of EXCEED or any other company; it makes them feel valued, and again here it must be emphasized that the value of these feelings are crucial to maintain EXCEED services as they currently are offering incentives is important whether communication officers use direct contact of advertising strategies (Percy et al, 2001, 18-28).The difference is that when customers are contacted directly and told about the promotion they feel more valued. What EXCEED could do is circulate information about a new product among their current customers; they could tell them all the important details about it. At a later date, the product information could be revealed to the general public through advertising in magazines, one the Internet, etc. Since the regular customers would have already gotten the information first, they would feel more appreciated and valued. These are the kinds of techniques that could be used current customers as opposed to potential customers because it is the current customer that comes first. This is because of the fact that EXCEED needs to make sure its reputation and business stand as it is and not be lowered. Acquisition Strategy for new Customers: For this part of the promotional plan, EXCEED is left with a minimum of 3million Pounds. This means that funds might still fall short because television and radio promotion in addition to other forms will have to be used here. However, since television and radio communications might be used in the previous step, promoting products for newer customers could also be included. This would help save great deal of the funding, thereby allowing the whole promotional plant be implemented. The following includes how EXCEED might implement their plan to include new customers with the funds in hand. Since EXCEED has already discovered the market and are aware of the immense potential that lies ahead, they can implement a strategy that would cater to potential customers regarding Motoring Services, Financial Services and Travel Services. Random marketing strategies could be easily employed. It must be asserted that advertising through the Internet, magazines, radio and television are all appropriate means. In view of the cost factor here, moderate advertising through television could be implemented in order to fit the budget given. Advertising through the print media is considered to be more feasible. This is because EXCEED could have their advertisements placed in periodicals or magazines that are associated with motor companies(Yandi, 2001, 15-21). So when customers purchase cars or go through magazines that have information on particular cars, it is most likely that they would come across the advertisement. As far as motoring services are concerned, this is an appropriate means to advertise. However, as far as financial services are concerned, it would not work. EXCEED needs to target its potential market, regarding financial services, through a means that would create more chances of potential customers viewing the advertisement. When it comes to financial services, it is better to place ads on television and radio along with other products of EXCEED. In addition to this, it also must be asserted that advertisements for financial services must be places in magazines where financial services are offered for related products. This is believed to boost the chances of a companys product getting a response (Brierly, 2002, 27-29). Concerning Travel services, it must be noted that EXCEED could advertise through television and radio along with its other products. This would save them spending excess funds on separate advertisements. However, the main advertising for travel services would have to be done through travel guides. Just like other agencies and organizations advertise EXCEED too can do the same. the advantage is that EXCEED would probably be recognized through its name from other services and products it provides. In view of this, it must be asserted that there is also the reputation of EXCEED that can be taken into consideration(Brierly, 2002, 27-29). It must be considered that EXCEED is a company that already has many customers that it looks after and remains in contact with. Through this contact as well, services and products can be enhanced. This is a process that could indeed save some of the funds put towards promotional strategies. However, it is also worth considering whether it would actually be suitable to advertise through customers that are regular. This is because of the fact that some customers might feel that they are really being used to promote a company free of cost. Others might be more than pleased to promote EXCEEDs products and services. In view of this consideration, promoting EXCEEDs products through regular customers could be handled through email. For example, when customers are emailed, they could be presented with a link through which they could forward a particular new products description to friends, family members, and other contacts. It is assumed that most regular customers would then be able to exercise their free will instead of a sales person or communications officer telling them to forward product details to contacts. In view of EXCEEDs reputation in the market, and the fact that they want to maintain their relationship with their current customers, makes them a company that stimulates customer loyalty and really does make an effort to enhance services. If it were not the kind of company that cared about its customers and the services it provides, EXCEED would not go through such lengths for promoting itself and invest a great deal of time and money in doing so. It is important to note that the reputation of an organization such as EXCEED in the automotive market counts a great deal. Also, the promotion that the company has along with its reputation makes it winner. However, this does not in anyway mean that competitors would not stand a chance. Considering an organizational strategy and how it expects to catch customers attention and read customer behaviour, the following section deals with management processes. It also provides insight to the strategies used. The Business Ethics Process: This is a management process fit for all organizations in the automotive industry. It is comprised of programs, practices and systems designed to motivate, measure and monitor an organizations ethical performance. Elements include, but are not limited to, codes of conduct, mission statements, training and awareness programs, upward communications systems such as town meetings, and an ethics office network. An effective business ethics process is one of the first and most important lines of defines against unethical or illegal activities. The first step in establishing a good business ethics process is to access and diagnose four key factors: ethical climate, performance incentives, communications, and compliance. Ethical climate is an organizations culture, environment, motives, and pressures. It is the role of senior executives to establish and reinforce ethical climate throughout an organization. (Krantz 1997) Performance incentives are methods employed by the organization to motivate and direct employee behaviour in order to meet the companys goals. Communications are the messages employees receive about acceptable and unacceptable behaviour and the priority of these messages. Compliance refers to the organizations business practices, corporate policies and procedure, laws, rules, and regulations A few examples of breach of ethics follow: Recently, Digital Equipment Corp. filed a lawsuit against microchip giant Intel alleging Intels wilful infringement a ten Digital patents in building the Pentium series. And the suggested punishment: damages that could run into the billions and an injunction against these of Digital technology. If Digitals allegations are true, then thesis a clear case of unethical behaviour on part of Intel. The marketing methods employed by the tobacco companies are perhaps the biggest example of unethical practices by an industry. For years, the tobacco industry misled the public through their expensive and lavish media campaigns. Now, what they had sent around has come around. Making business more transparent is the bottom-line behind the new catch-phrase: ethical investment, which awards bucks to those companies which have sound environmental policies and avoid black-listed activities, and shuns those that pass the buck. Most of us know in our bones what constitutes good and bad behaviour. We have agreed, if only by default, on a set of moral or ethical principles. We call benevolent actions ethical because they accord with these rules. When it comes to commercial transactions, buying and selling, lending and borrowing, letting and renting, dealing in currency, investing and seeking investors, the ground rules change fundamentally. Theft is theft when you are a burglar or shoplifter but not when you are shopkeeper taking a 300% mark-up for no other reason than you have found people will pay such prices. Then you are simply being a good businessman, operating in a sellers market. You are let off the ethical hook because mug public doesnt know any better . If one is a professional liar who has found corporations will pay you handsome amount per hour to put a favourable spin on facts that have regrettably become public, you go for it. Astonishingly, you will find yourself congratulated by envious former colleagues, who have been paid quarter of that hourly rate to dig out the facts requiring the public relations fence-mending exercise in the first place. All this is fair enough once we have decided we are going to have market-driven economy. The benefits for society as a whole of letting the market set the running instead of social-engineering bureaucrats bent on making everything conform to a Plan are too obvious to need restating. Nevertheless, we should not try to pretend that things are other than the way they are. We should not kid ourselves that rapacity and greed are ethical simply because they are legal . Technological change and globalization is bringing companies into contact with other countries that do business by different rules. Pressures from internal and external forces are forcing the firms to treat their staff in ways that are different from traditional practices. With the communications revolution ethical issues has become part of every manager s job. (Defamation 1984) Companies realized that they had to conform to public values to survive. Shell, in 1995 suffered two blows to its reputation: one from its attempted disposal of the Brent Spar oil rig in the North Sea, and the other over the companys failure to oppose the Nigerian governments execution of Ken Saro-Wiwa, a human-rights activist in a part of Nigeria where Shell had extensive operations. Since then, Shell has rewritten its business principles, created an elaborate mechanism to implement them, and worked harder to improve its relations with NGOs. (Krantz, 1997) There are two reasons why ethics are vital for the businesses. One is when bad behaviour stirs up public debate legislation will arise that companies will find more irksome than self-restraint. The other distrust. A company that is not trusted by its employees, partners and customers will suffer. In an electronic world, where businesses are geographically far from their customers, a reputation for trust may become even more important. Ultimately, though, companies may have to accept that virtue is sometimes its own reward. One of the eternal truths of morality has-been that the bad do not always do badly and the good do not always dowel. (Smolowe, 1997) The problems that one faces with Internet transactions by and large have everything to do with the interference that one receives from files such as Internet cookies and hacking software, and these are the kinds of things that can damage the confidence with which consumers, retailers, etc. conduct day to day business. These are files that are able to interfere or extract personal information from any computer that it enters. This can take place at any time when we are surfing the net or opening up any important website. What these Internet cookies actually do is they enter a users Personal Computer when it is on, and then settle itself into it. When the user switches on the P.C. again, these files are activated, and send information back to the site that it came from. Thus it helps to maintain a record of the patterns that a particular Internet surfer uses. In doing so, these Internet cookies can use these patterns to keep sending the user information, available schemes, attractive offered. from different companies that are relevant to the kind of sites that s/he downloads. This is sometimes seen as an advantage because of the good schemes that might come up with the use of Internet cookies, but aside from this there may be serious implications. There could be very personal information that could be leaked out at the same time of using these cookies. This is essentially a problem for business organizations because there may be some very sensitive information that could be leaked out due to these cookies, and therefore, jeopardize the business. Further, this is such an acute problem that could eventually affect the reliability with which we are presently trading locally and internationally, and could very well destroy the whole concept of globalization. Along with the Internet cookies are the software hackers that are seemingly more inclined towards executives computers than governmental ones. It seems that they have lost interest in the heavily protected security systems in places like banks, perhaps because the risk is far too high. They are becoming better and better at entering the personal accounts of executives for the simple reason that they are easy targets and the rewards are fruitful. For this reason there is constant quest to develop software that is able to track the entry of hacker. Even so, it appears that this protection is not enough, as its said that there is no software that can give one hundred percentsecurity (Boulton, C. 2001). Where the Problem Lies: To begin with there is a very good phrase that could be aptly applied here, and it says, when in doubt, dont. We have been, for quite some time now, debating over the effectiveness, the danger and the benefits of the Internet cookie. The truth of the matter is that there is very little that we really do know, and indeed very little that one can be sure of regarding the same. One cannot really be sure about the way that the Internet cookie works. It can be responsible for destroying lives, indeed millions of lives. Critics on the other hand, argue that there is nothing to be worried about, as these Internet cookies are harmless text files that extract only information of search patterns. They say that it does not retrieve personal information, such as e-mail addresses. In response to this, we cannot really say whether the capability of the Internet cookie is related to this alone. If its capable of tracing and recording search patterns, it could be capable of extracting more than just this. This is the reason why, mania time, one can come across, especially after a particular website has-been down loaded, un-requested mail seeps into ones account. Surely, this is no coincidence, but purely a result of the Internet cookie picking up ones personal information. If this had been a case that occurred rarely, it would be unfair to blame it on the cookie. However, it happens much too often. Also, there may be more serious security concerns; national security concerns. There is no reason why there can be only one type of Internet cookie. There may a wide range of them, or even ones that are in disguise. The fact is that we dont really know whether or not they do exist in other forms as well. Most of the explanations put forward regard them as harmless and incapable of leaking out personal information, unless its voluntarily given to them. But people seem to be taking these assumptions to be the Gospel truth. It is only when they face a real threat or a real breach in security that they might wake up with start. These Internet cookies are ones that should be taken as seriously as hacker software. This is because one does not really know whether or not these Internet cookies are used to first retrieve the valuable or sensitive information, and then use it to hack someones financial transactions. For all that we know they could be going hand in glove, working in tandem to get their job done (Slover, P. 1998). The kind of software that is available to deal with these kinds of problems is Authentication and Encryption Software . These are the kinds of software that is capable of dealing with foreign data sneaking in undetected. What it does is it does not allow anything to enter the software that it is protecting, unless it bears a particular code. This code is like an identification code. (Authentication and Encryption software, 2002) Rights of Privacy: Security of personal information is a subject that is considered very serious. Using, copying, etc. any ones personal information or organizational information is considered a serious offence. This is the reason why there are so many laws made for the same. There are very strict laws that have been made because of the misuse of information. An example of a law or policy that a company might establish and stick to is the use of Internet cookies. The laws that are made, stand chance of being broken, and this is not just a risk for the people who use Internet facilitated companies, but is also one for the company that is providing services using the Internet and holding peoples personal information. This is because they too stand a chance of being deceived in the same way that a user of the same does. Along with this, there may be other kinds of software interference too that could cause personal information to be leaked out. This is not limited to software being used for this but also means that people within a company might decide to misuse the information directly. If this is the case then customers will lose their faith in these organizations. This is especially the case where there is a use of wireless laptop computers. However, the company cannot give any excuse for the same, and is still likely to face legal action for it. This is the reason why they have tube extremely vigilant over their software protection and ensure that their clients personal information is not misused and does not get into the wrong hands. (Slover, P.1998). A company might want to use an Internet cookie to track a users surfing patterns. But this should be stated in the policy. If this is not stated, then the user can take legal action against any company for not informing him about the use of the Internet cookie (Martinez, M.2002). Usually an organization should not mind if there is a presence of these cookies in their systems because this helps a person to search and obtain quicker results, though, most people dont like the idea, and prefer to be informed prior to their personal information being used. This is especially the case as far as organizations are concerned because this is something that could affect their trade relations. People would not want to do business with them if they found that there was no security in their means of financial transactions. They certainly do not want any interference with their transactions and dont want to allow any company to send files that will track their browsing patterns on the Internet. By the use of these files other competitors can get in touch with their sensitive information, and result in total chaos. This is where these organizations can implement software programs such as Kerberos, MD5, MIME Object Security Services(MOSS), OPIE, PGP, RIPEM, Skey and SSH. Security and Information Systems: An example of the misuse of personal information that may occur and result in possible loss is when the name and e-mail address of a personas recorded by certain software in one scheme on the Internet and issued by another related site. This can take place when an individual Oran organization punches in information such as date of birth or e-mail contact for the simple purpose of receiving information. It is this information that should be kept secret and not shared with any other sites. Sadly, this is the common scenario. And, this is especially the case when one opens up unauthentic sites. Their very appearance seems to be so highly designed that one can be easily deceived. And, then later, these are the same sites that are responsible for leaking out an individuals personal information . What actually happens is, these Internet cookies extract this information, and share it with other related sites that are similar tithe one that has been accessed. This is something that is most objectionable on the part of the user, as it takes away his or her the right of privacy. In addition to this, the issue arises because the company that has just taken the information might or might not be aware that they have Internet cookies using the information that their customers have been sending them. In the long run, this could affect the business of the same. Examples of this are seen when one downloads site, for example, a site on airline tickets. At that very moment one will get a whole lot of ads popping up that are related to cheap airline fares. This is actually a result of the way that the Internet cookies have used the information that the user has sent to get the airline ticket fares. This happens because there are so many of these Internet cookies that are floating in cyber space, waiting for an opportunity to get hold of anyone with the search patterns for airline tickets and fares. Another way is that the Internet cookies have already got into the system that the user is browsing. From here, it can easily get into the users PC and extract the required information. This is something, as said before, that the airline might not be aware of. But it is something that is actually their responsibility to deal with. They are the ones that are taking the users personal information and processing the same, so they are the ones who are directly responsible for ensuring safety to the same of the user. If security, in this respect, is going to become a problem for the user, then there will be many people who will be afraid to use the services provided by the airline. This, in fact, applies to all the trading companies all over the world. There will be very few people who will truly trust the Internet as a reliable means of financial transactions, etc. The reason for this is that there are so many financial transactions that are made every day that are potentially at risk because of these cookies and software hackers. So, for the same not to occur there must be a way of preventing these cookies from entering airline hardware, and this is directly the responsibility of the company that takes hold of a users personal information (Furger, R. 1998) (Slover, P. 1998). By using programs such as Kerberos, MD5, MIME, etc. an organization canals prevent any one reading their data. With the use of certain software organizations can have the data coded. In this way, no one can read the data unless the key is also presented. This is the best form of protection. But in order to do this, an organization has to have proper budget for their security. If an organization cannot come forthwith one then it means that there is no guarantee that it can provide security of personal information and financial transactions. It is for reasons of safeguarding customers privacy rights that many companies using on line transactions are now also advertising their privacy policy. It is no more considered to be a formality, as this issue has become so severe that the privacy policies are seen as must. It is absolutely mandatory that the same is advertised and printed in a size that a user cannot miss. Before this, the advertisement of privacy policy was printed in such a manner that one could hardly see it. But now things have changed, and printing it all unambiguously is seen as essential . This has all resulted from the gravity of the situation, and should give everyone a clue of what breaches in security can take place. This is essential for the business organizations because they are the ones that are dealing with finance through the Internet. The reason why these are so risky is that they can be tapped into and the finance removed if any outsider gets hold of the personal or confidential information of the company (Glass, B.2000). There may be a lot of argument put up in this respect, and software houses may even sound convincing that there is nothing to fear about Internet cookies, but the fact remains that these little seemingly harmless text files can get themselves into a computer system purely by accident and are able to extract sensitive information and send it out to the server that it originated from. It is very hard to believe anyone who defends their effectiveness, especially after getting to know or suspect what their capabilities are. We find us asking ourselves one a very important question, and that is, Are we ready to trust thousands of dollars in an electronic account and know that it cannot be harmed by the presence of things that we are really not sure about? The obvious answer would be no. This is the most sensible answer that indeed most organizations might give. But what if all the organizations who are aware of the same give the same answer, and surely they will, what happens to the pace of trade? Does it slow down or altogether come to a standstill? (Glass, B. 2000). Organizational Impacts/Issues: The fear is that there will be total chaos as a result of the realization of the situation. This is because there will be a fear in most of the people who use the Internet for these transactions. There will also be some who do not want to give up this means of transactions, and it is for this reason that there will also be many breaks in the trade relations between many organizations, locally and internationally. When this occurs the overall trade of many countries will be affected in different ways. This will reflect in the economic instability of countries, which could possibly lead to more competition taking place between the top currencies of the world. But why does everyone have to go through all the hassle? Why doesnt everyone simply upgrade their software with something that can free them from these cyber pests? The answer is plain and simple. There is software that is available that can detect and delete these Internet cookies and other sneaky software, but the only hitch is that they have to be constantly monitored just like the software viruses are dealt with. It is basically because of the fact that people do not take these Internet cookies so seriously that they dont even consider implementing software that is required to combat their entry. This is because of the cost of it all. They feel that it is an unnecessary expense to do the same. The fact is that in order to guarantee almost one hundred present protection against any sort of software threat, an organization needs to create a budget so that they can afford and the implement one that is feasible for their work (Glass, B. 2000). Future: Direct payments too, can also be affected due to the interference of hackers on line. This is the reason why it is extremely risky for a person to send his or her passwords or credit card number while they are chatting on the Internet. This is another very risky means of communicating because during this process sensitive information can very easily be picked up. It is one of the easiest software to hack. Organizations that dont have any offices in various parts of the world have gone through a lot of hard ship in this respect. Their only means of communicating with their clients is through programs such as these. If these have to be abandoned then it could mean that a whole lot of people might suffer as a result of the same (Glass, B. 2000). In addition to the transactions and the flow of information that are made through the Internet on a modem or a cable, we can also say that the wireless method of communication is by no means a safe mode of carrying out business these days, in fact, it is more vulnerable than the one that makes use of the cable or modem. The use of the wireless means of conducting business is supposed to be the most efficient and cost effective means of dealing with customers . But this also means that there are numerous outlets at which hackers can have access to the same. According to the latest information, these hackers go about their mischief just by sitting on Park benches or in their cars. They can detect the flow of any valuable information in cyber space and latch onto it in no time. If people were to give up this means of communicating and dealing with their customers then we would experience a sharp decrease in the business taking place. This is a relatively new way that people all over the world are doing business. As it is very easy for them to download anything from anywhere using their laptops. But again, if we have to start using software to combat these security risks, the user of the laptop would have to know how to apply the software, and even then they would not be 100 hundred per cent protected. Another reason why taint hacker software is not a hundred present effective is because there are a large number of technically ignorant people also using the Internet and downloading sensitive information. These people are not technically aware of the features of software such as the firewall, thus making them less effective (Boulton, C. 2001) (Glass, B. 2000). In truth, there is very little that can be done for the purpose of Internet security at present. This is because the anti-hacker and software protection that is developed at the moment is always behind the software that the hackers keep on developing. There seems to be no end to the way that they relentlessly develop the same. No matter what software is developed to combat it all, there is never a one hundredpercent protection against the same. Hackers have all the options and all the angles to aim at different software, and this is the reason for them being able to develop the kind of software that they do and always keep ahead of the anti-hacker software developers. The only real form of protection that an organization can look to is developing a budget. With this, the organization can decide what kind of software protection it can implement. Along with this, the organization also needs to ensure that it keeps on updating this form of Internet security so that the protection that t hey attain is as close as possible to the 100percent mark (Expert Recommends Protection Against Internet Hackers,2001). Conclusion: Though there are risks while constantly searching and accessing information from the Internet, it is obvious that there are ways to avoid trouble and thereby freely carry out ones interests. Certainly, the interests mentioned here refer to the consumer behaviour and the management strategies within the automotive industry. The study of a fictitious company in this paper is also helpful in determining what types of strategies are employed and how beneficial they are or might be for the future. Having also seen the ways in which the privacy of a person or an organization can be devastatingly affected, it is always better to play it safe and make it tough for the hackers and Internet cookies to get passed ones security system. Simple virus protections are all seen as mandatory in this age of electronic financial transaction. One would surely be ready to conduct any kind of program that would save the world from a war that could emerge due to the onset of no privacy as far as electronic financial transaction is concerned. Having said this all, one should not think twice, and do whatever is possible to even salvage the near to 100 % of protection that can help save a lot of lives being affected. In doing so, an organization can be an example to others so that they realize the gravity of the situation and therefore, follow in the same footsteps. It should also be very clear to Internet providers that it is their duty to ensure their customers of the safety and security of personal and sensitive information. It is a law like this that will ensure the tightness of ante against any breach in security. If this is not done, then in the long run we will surely find that there will be a lot of people losing their faith in the Internet, and this will directly affect the pace of business, which will in turn affect the rest of the world. References: Authentication and Encryption software 2000, Expert Recommends Protection Against Internet Hackers, 2001 Web Browser Cookies: Fact and Fiction. About.com 21 Mar. 2000. Annesley, J. 1998. Blank Fictions: Consumerism, Culture, and the Contemporary American Novel. London: Pluto P. Badaracco, J. L. 1997, Defining Moments: When Managers Must Choose between Right and Right. Harvard Business School Publishing Baudrillard, J. 1998, Eng. trans. The consumer society: Myths and structures. London: Sage. Beaven, C. 1997, Theyre Watching You, Esquire,. V 128 n2 p104 Boulton, C. 2001, Developer. Internet Security Systems Moves to Parry Drive-by Hackers Brierly, S. 2002, The Advertising Handbook, Routledge, 27-29. Cromption, R. 1996, Consumption and class analysis. 1996. Cubitt,S. 1990. Innocence and Manipulation: Censorship, Consumerism andFreedom in 1980s Britain. 1990. IN Consumption, Identity and Style.Routledge, New York. p102-118. Dern, D. P. 1997. Footprints and fingerprints in cyber space; the trail you leave behind. Online., v21 n4 p44. July-August, 1997 Dorgan, S., Dowdy, J. 2002, How good management raisesproductivity. The McKinsey Quarterly, 14. Retrieved October 25, 2002,from Infotrac database. Edgell, Stephen, Kevin Hetherington and Alan Warde (ed). ConsumptionMatters. Blackwell Publishers, Cambridge, MA. (1996). P113-134. Etheridge, J. 1984, Defamation V30/n8. p38 Evans, M., OMalley, L., and Patterson, M., 2004, Exploring Direct Customer Relationship Marketing, 2nd edition, London: Thomson,43-44 Fill, C. 1999, Marketing Communications: Contexts, Contents and Strategies, 3rd edition, Prentice Hall Europe, 53-59. Furger, R. 1998, Look Out you are being followed, PC World,. v16 n10 p33. Glass, B. 2000, Keeping your Private Information Private. PC Magazine. Hurley, A. 2001, Diners, Bowling Alleys, and Trailer Parks: Chasingthe American Dream in Postwar Consumer Culture. New York: Basic Books Internet Advertising: Ethics and Etiquette relevancy: 100; (Onli neLibraries and Micro computers): 06-01-1994 Etheridge, j.. Datamation06-01-84 V30/n8. p38 Martinez, M. 2002, Lock Youre your PC 2002 Mayer-Schnberger, V. 1997, The Internet and Privacy Legislation:Cookies for a Treat? West Virginia Journal of Law and Technology,Volume I March 17, 1997 Issue Percy, L., Rossiter, J. R., and Elliot, R., 2001, Strategic Advertising Management, Oxford University Press, 18-28 Pickton, D. and Broderick, A. 2001, Integrated Marketing Communications, Pearson Education/Prentice Hall, 64-67. Rodberg, S. 2001, Bowling Together. The American Prospect. Volume 12, Issue 7. April 23, 2001. . Simon P. 1996, Ethical Business, Management Review, 1996. Slover, P. 1998, WEB `COOKIES ARE HOT ON THE INTERNET Relevancy: 92; (St. Louis Post-Dispatch ); Dallas Morning News 11. 07-22-1998 accessedfrom e-library.com Smith, P. R. 1998, Marketing Communications: An Integrated Approach, 3rd edition, Kogan Page: London, 25-41 Smith, R. 1999, The Cookie Leak Security Hole in H TML Email Messages. 30 Nov. 1999. Smolowe, J. 1997, Sorry Pardner, Time Magazine, June 30,1997.Michael Krantz, Chip off the old block? Time Magazine. Tapp, A. 2000, Principles of Direct and Database Marketing, Pearson, 22-34. Thompson, C. J., Hirschman, E. C. 1995, Understanding thesocialized body: A poststructuralist analysis of consumersself-conceptions, body images, and self-care practices. Journal ofConsumer Research, 22, 139-153. Vallance, E. 1990 Business Ethics at Work Cambridge University Press. Yandi, D. 2001, Creative Marketing Communications, 3rd edition, Kogan Page, 15-21.
Wednesday, May 6, 2020
Essay on Comparing Gilgamesh to Genesis - 772 Words
Comparing Gilgamesh to Genesis In both Gilgamesh and Noah and the Flood, manââ¬â¢s wickedness leads to death, destruction, and rebirth all caused by billions of gallons of water sweeping the earthââ¬â¢s surface. The flood in both stories destroys most of mankind. The floods represent rebirth and a new beginning for mankind, as well as the gods and Godââ¬â¢s wrath. In Gilgamesh the gods decide to destroy mankind by flooding the earth for six days and nights. Utnapishtim is chosen to build a boat in order to restart mankind after the flood. In the Bible God also decides to flood the earth due to the increase in wickedness. God chooses Noah to build an ark and store seven pairs of every clean animal and two of every other kind of animal on itâ⬠¦show more contentâ⬠¦171-172) This quote describes how long God will have the rain go for. It also gives orders to Noah from God to collect all the animals. Noah and his family are the only ones chosen by God to survive the massive flood. After living right outside Houston for so many years, the flood in Gilgamesh seems more realistic because it only rains for 6 days and nights. I canââ¬â¢t imagine it raining here for 40 days and nights. God Promises Noah he will never flood the earth again by creating a rainbow. He describes it by saying: ââ¬ËI now establish My covenant with you and your offspring to come, and with every living thing that is with you. ââ¬â birds, cattle, and every wild beast as well ââ¬â all that have come out of the ark, every living thing on earth. I will maintain My covenant with you: never again shall all flesh be cut off by the waters of a flood, and never again shall there be a flood to destroy the earth.â⬠(Genesis pg. 174) This is Gods way of letting Noah know that he will never again flood the earth again. In Gilgamesh, Utnapishtim is chosen to survive the great flood because he too is faithful to his lord, God Ea. They each prepare for their journey by building a large boat, and bringing with them two of every animal and their families. Noahââ¬â¢s ark is thirty cubits high, and three stories while Utnapishtimââ¬â¢s boat is two hundred feet tall, with sixShow MoreRelatedComparing the Epic of Gilgamesh and Genesis1005 Words à |à 5 Pages The Epic of Gilgamesh has many similarities to the Bible, especially in Genesis and itââ¬â¢s not just that the both begin with the letter ââ¬Å"gâ⬠ââ¬â¢! One major similarity being the flood story that is told in both works. The two stories are very similar but also very different. Another being the use of serpents in both works and how they represent the same thing. A third similarity being the power of God or gods and the influence they have on the people of the stories. Within these similarities there areRead MoreComparing G enesis And The Epic Of Gilgamesh945 Words à |à 4 PagesWhile the book of Genesis in the bible and The Epic of Gilgamesh have striking similarities in the sense of creation and the great flood, the interactions between the divine beings and humans differ greatly. One matter that impacts the entire relationship between gods and humans in both accounts is that the gods in the epic are not almighty beings like God in Genesis since they cannot control each otherââ¬â¢s domains. Because of this, they must travel from place to place and work with other gods to carryRead MoreComparing Genesis And The Epic Of Gilgamesh940 Words à |à 4 PagesWhile Genesis in the bible and The Epic of Gilgamesh have striking similarities in the sense of creation and the great flood, the interactions between the divine beings and humans differ greatly. One matter that impacts the entire relationship between gods and humans in both accounts is that the gods in the epic are not almighty beings like God in Genesis since they cannot control each otherââ¬â¢s domain. Because of this, they must travel from place to place and work with other gods to carry out a certainRead MoreComparing and Contrasting the Floods in Genesis and The Epic of Gilgamesh588 Words à |à 3 PagesThe floods in Genesis and The Epic of Gilgamesh are in no doubt different but in so many ways similar. The two men are given a task to save humankind from a flood and succeed and are rewarded. The major basic events that take place in the stories a similar however the smaller details of them and how they are carried you are different. They two also tells us a lot about the relationship between humans to Divinity. The floods in The Epic of Gilgamesh and Genesis 6-9 are very similar. In both theRead More Comparing the Epic of Gilgamesh Flood Myth and Book of Genesis Biblical Flood Myth1792 Words à |à 8 PagesComparing the Gilgamesh and Genesis Floods à à à à The rendition of the historic, worldwide Flood recorded in Genesis of the Old Testament is similar to the account recorded on Tablet 11of the Sumero-Babylonian version of the epic of Gilgamesh, discovered in the 1800ââ¬â¢s by British archaeologists in Assyria. Let us compare the two in this essay. à Alexander Heidel in his book, The Gilgamesh Epic and Old Testament Parallels, provides a background for the survivor of the Sumero-BabylonianRead MoreGilgamesh VS ââ¬Å"Genesisâ⬠: Noah and the Flood1121 Words à |à 5 Pagesthe passage of time- Richard Dawkinsâ⬠. We all know the breath taking story of the Genesis flood, but have we ever noticed how similar it is to the Epic of Gilgamesh. Genesis is the story of how one God created mankind, along with everything else on Earth, and what punishments he put upon them when they acted wrong .Genesis is a chapter in the Holy Bible, which was written in the 18th century B.C. by Moses. Genesis is a Hebrew story about the creation of life and how God once destroyed it and EarthRead MoreEssay on The Theme of Knowledge in Gilgamesh and Genesis940 Words à |à 4 Pagesvariation but the main structure, ideas, and themes are generally found correlative. It is hard to believe that one work did not affect the others. The first great her oic epic poem of Gilgamesh and the Old Testament are parts of two cultures that are hundreds of years apart. Whereas Gilgamesh is a myth and the book of Genesis is the basis of many religions, they both have notably similar accounts of symbols, motifs, meaningful events according to the relationship between the divine and humans in literatureRead MoreFlood, Atrahasis Flood And The Epic Of Gilgamesh Flood1354 Words à |à 6 PagesThroughout the Genesis Flood, Atrahasis Flood and the Epic of Gilgamesh flood, there are many different ways to interpret the different views of The Flood. These different narratives in these stories have their own explanation on how this myth took place and the different beliefs that occurred during this flood. The way you portray each narrative is based on what exactly your beliefs are. When comparing the Genesis Flood narrative to that of the Gilgamesh Flood narrative, there are many similarRead MoreSimilarities Between Gilgamesh And Noah818 Words à |à 4 Pagesbooks of the Pentateuch, and the Confusion of Tongues compared to the Tower of Babel. However, I will focus on the Epic of Gilgamesh, comparing and contrasting it to the Biblical narrative of Noah. While both the Epic of Gilgamesh and the Biblical narrative of Noah explore a global flood, there are key differences in their use of gods and the specific details of the flood. Gilgamesh and the Biblical narrative of Noah seem to parallel each other. First, both have a significant protagonist, UtnapishtimRead MoreSimilarities Between Paradise Lost And Paradise Lost1239 Words à |à 5 Pagesepics of antiquity. The epics are Paradise Lost, Aeneid, The Epic Gilgamesh, and The Iliad. The most obvious difference is era. Paradise Lost is an epic poem from the 17th century and is written in blank verse which is the most modern phrasing method. According to an article on Enotes, out of the other three epics, the Iliad and Aeneid came from the same dactyllic family. (ââ¬Å"Compare Miltons Paradise Lostâ⬠). Meanwhile The Epic Gilgamesh is more old-fashioned in its verse Between the four books there
Subscribe to:
Posts (Atom)