Saturday, December 28, 2019

Cell Phones Cause Brain Cancer Essay - 1324 Words

After reading this title, I imagine how many people in our generation do not fall under in this category. In today’s world it is hard to go anywhere without seeing someone talking on a cell phone. Even if it’s walking, driving, or playing is the streets, you will be able to see them everywhere. Whether or not someone answering their cell phone is increasing the likelihood of fatal brain cancer, is in question. Apparently in recent years there has been much research completed looking for a solid answer to the question. Essentially, people are worried about their brains being microwave, breaking bonds and causing genetic damage and consequently a cancerous tumor to evolve. For example, the New York Times magazine article which expressed a†¦show more content†¦Therefore, there is no definitive link or evidence between cell phone usage and brain cancer. Cell phone radiation lacks the energy necessary to break chemical bonds which is the only known method of action for cancer causing radiation. Explicit Conclusion: Therefore, there is no definitive link or evidence between cell phone usage and brain cancer. Conclusively, 1. As a result, of David Reynard’s wife tragic brain tumor, previous studies had led him to believe cell phone usage and other suspected carcinogens cause the brain cancer. In most cases, The most exquisite — and arguably the most sensitive — means to identify a carcinogen is to study the effects of the substance not on humans or animals but on cells. In the 1970s, a Berkeley biochemist named Bruce Ames devised a cellular test to do just that. Ames’s test is based on a series of simple principles. Normal cells in the body grow through cell division, or mitosis, which is carefully regulated by genes. Certain genes accelerate growth, while other genes dampen or stop it. Cancer originates when the â€Å"accelerator† genes are permanently activated or when the â€Å"brake† genes are permanently damaged. Since genes are encoded by DNA, chemicals that mutate DNA — mutagens — can alter the growth-controlling genes and thereby cause cancer. Ames devised a special strain of bacterial cells that act as a â€Å"sensor† forShow MoreRelatedArticle Rebuttal - Does the Use of Cell Phones Cause Brain Cancer?706 Words   |  3 PagesRebuttal BCOM/275 March 19, 2012 Tania Say Article Rebuttal Does the Use of Cell Phones Cause Brain Cancer? The Opponent’s Argument In this paper valid points will be presented to refute the statement made by Dr. Ronald Herberman, Director of the University of Pittsburgh Cancer Institute, to his faculty and staff on July 21, 2008. â€Å"Limit cell phone use because of the potential risk of cancer† (Reyes, 2009). Herberman based his claim on unpublished data and stated â€Å"it takesRead MoreEssay about Cell Phone Radiation1306 Words   |  6 Pagesadvancement is cell-phones, which is one of the greatest development in technology. We have become dependent on mobiles phones and it seem like a high percentage of the population including elderly people, young adult and even kids under 18 have one of this devices. There are numerous advantages and disadvantages related to cell phones. In one hand there is the importance of being communicated for emergencies, business, social and personal purposes. On the other hand, the usage of cell phone had becomeRead MoreEssay on Does Cellphone Use Cause Cancer1429 Words   |  6 PagesNowadays owning a cell phone has become a common commodity but can this seemingly harmless device be the cause of cancer? Cell phones emit radio frequency (RF) energy a type of electromagnetic energy that could be biologically damaging to the body. However some resear ch suggests that the RF energy is a low frequency energy that is incapable of causing detrimental effects to the cells in the body. Some studies do not demonstrate a strong causal relation between RF exposure from cell phones and negativeRead MoreEssay about Radio Frequency Emissions726 Words   |  3 PagesI remember Safe Cell Tab being advertised as a sticker-like device that would reduce the risk of cancer when using it with a wireless phone. According to Wikipedia, sixty percent of the world’s population owns a cell phone. There are roughly 6.7 billion people in the world. This means on any given day 4 billion people are exposed to cellular phones. If cell phones have the potential to cause harm to the human body, then why does America only see 15,000 new cases of brain cancer per year? TheRead MoreCell Phones And Its Effects On Our Lives1366 Words   |  6 Pagesuse of technology and increasing use of cell phones, a lot of studies are taking place. Even though cel l phones today have been helpful with communicating with people far away, these cellular devices still are dangerous in many extravagant ways. Dangerous can mean many things when it comes to cell phones. Billions of people throughout the world are implementing cell phone use in their daily routines. Cell phones are becoming a prone addiction which causes us to not be so aware of our surroundingsRead MoreMarxism in Brave New World Essay995 Words   |  4 Pages(The Pew study noted that 48 percent of parents use the phone to monitor their childs location.) * Your kids can reach you in the event of an emergency, and vice versa. * If in danger, your children can reach the authorities or a medical provider. * Phones can be silenced during class or study periods, and active only in appropriate places. * Cell phones create a convenience that was previously unavailable. With cell phones, you can easily reach your kids for any reason: to ask themRead MoreAre Cell Phones Dangerous to Your Health?1504 Words   |  7 PagesThe number of mobile phone subscribers in the Philippines has soared from over 22.5 million in 2003 to over 57.3 million in 2007. It continues to rise daily at a very fast clip, allowing us to maintain our dubious claim as the text capital of the world. On the other hand, statistics in the United States show just how deeply ingrained cell phones have become in people’s lives: Fully 78 percent of all American adults own them, including 86 percent of 18- to 29-year-olds and 55 percent of those whoRead MoreRegulation Of Cell Phones : A Cell Phone938 Words   |  4 PagesRegulation of Cell Phones A cell phone according to the dictionary.com â€Å"a portable telephone that uses wireless technology to send and receive a phone signal. The cell phone covers an unlimited geographical area that is constantly being upgraded every year. A cell phone has a lot of advantages and disadvantages. Cellphones should receive stronger regulations to prevent texting while driving. They have been known to cause cancer and they may interfere with the functioning of aircraft. Firstly, whileRead MoreNegative Effects of Cell Phones1731 Words   |  7 Pagestask easier. A cell phone is a type of technology that is a common thing to see in everyday life. The world and the people in it have gotten used to this technology. Cell phones are making the lives of an estimated two hundred sixty five million Americans (Natterson 103) and three billion worldwide (Natterson 103), easier. As useful as cell phones may be, there are negative effects in over using cell phones. Cell phone technology was first developed in the 1980’s, but cell phones became common inRead MoreMobile Phone Use And Semen Quality870 Words   |  4 Pagesincrease in cell phone usage has brought up many concerns relating to our health. When I think about these health concerns, I think about my mother lecturing me, â€Å"Katheryn Paige Leyde, take your phone out of your front pockets right now!† I would role my eyes, and pull my phone out of my pocket. I never really thought of technology as a health hazard, but my mother had read an article; stating that trends in research show, technology can cause infertility, hearing loss or even cancer from the electromagnetic

Friday, December 20, 2019

Managers Developing Analytical Skills - 1022 Words

Introduction Analytical is the use of analysis to solve problems. Analysis is the breaking down of problems into smaller problems that can be solved separately. It usually uses a process that directs it towards achieving a certain goal. Analytical skill is therefore defined as the ability of visualizing, articulating and solving issues that are either complicated or not and making sensual decision that is based on the information available. When gathering and analyzing information, analytical skills are put into practice as well as when designing and testing solutions to problems. In management, analytical skill is the ability of dividing problems into parts so that you can visualize their relationships. Managers can plan and lead projects successfully if they have analytical skills. They can forecast financial results and develop plans accurately towards achieving goals and objectives by working together with their people. They can finally accomplish their plans and produce predictable results l ogically in a more systematic manner. Discussion In solving business problems, a manager frequently uses his analytical skills. When a crisis occurs in a location or a unit is not performing as expected, the manager applies his skills to question and do research on the cause of the problem. Once a potential cause has been identified, the manager chooses on an appropriate solution to solve the problem. An analytical approach, therefore, becomes an appropriate process of breaking downShow MoreRelatedA Research On Financial Management1461 Words   |  6 PagesINTRODUCTION This report describes on the first section a research about financial managers, which is covered with the job description, the roles, the skills Knowledge, work environment and the rewards job outlook. What is the financial management? â€Å"Financial Management means planning, organizing, directing and controlling the financial activities such as procurement and utilization of funds of the enterprise. It means applying general management principles to financial resources of the enterprise†Read MoreA Brief Note On Business Careers By Brenda Vazquez1097 Words   |  5 PagesCareers by Brenda Vazquez Work Environment and Duties: Financial Manager Financial Managers are responsible for the financial wellbeing of an organization. The duties of financial managers’ range from preparing financial statements to helping management make financial decisions to steer the company in the right direction. Financial managers prepare financial statements, business activity reports, and forecasts. Additionally financial managers must monitor details to ensure legal requirements are beingRead MoreThe Role Of Socio Cultural Competencies On My Career Growth1005 Words   |  5 Pagescompetencies which helps to mould my personality. I would like to include role of two successful Project Managers in my core Industry and also explain how did they use the competencies for their career growth, and how am I going to use those socio-cultural competencies for my successful career growth. I would also like to contrast my own competencies as a student, to become a Successful Project Manager. And there are also some the Positive differences which I can make to my career. Role of Socio-CulturalRead MoreDeveloping An Analytics Team Case Study Essay1606 Words   |  7 PagesDeveloping an Analytics Team Executive Summary Problem My company is a famous fruit dealer which has over 20 fruit physical stores all over New York City. We provide different kinds of fresh fruits to our customers with the best service. However, we noticed that our sales in winter experience a serious decline last winter due to the extremely cold weather which might make our clients reluctant to step out of their house and but fruits in our store. Therefore, the company is addressing some technologyRead MoreEmployee Training and Career Development1147 Words   |  5 PagesEmployee training requires a change in skills, knowledge, attitudes, and behavior of new employees who will allow an employee to perform effectively his or her job (DeCenzo amp; Robbins, 2007). New employees may have to change work habits, such as how they work, attitudes toward their company, coworkers, managers, and the company (DeCenzo amp; Robbins, 2007). Specific aspects of each position in the company will require specialized training no matter what skills each employee has before starting. Read More1. Identify the Major Managerial Skills Needed by Every Supervisor. Why Are These Important?837 Words   |  4 Pagesmanagerial skills needed by every supervisor. Why are these important? The major managerial skills are technical, human relations, administrative, conceptual, leadership, political and emotional intelligence skills. The Managerial skills which are required by managers working at different levels of management. The top-level managers require more conceptual skills and less technical skills. The lower-level managers require more technical skills and fewer conceptual skills. Human relations skills are requiredRead MoreCase Study of Prostitution1406 Words   |  6 Pagesyears of progressively responsible, professional experience related to area of assignment at a management level. Depending on area of assignment, Certified Public Accountant Certification or Certified Purchasing Manager Certification may be strongly preferred or required. KNOWLEDGE AND SKILLS Knowledge of: †¢ Managerial principles; †¢ Financial principles and practices in assigned areas of responsibility; †¢ Budgeting principles and practices; †¢ Applicable federal, state, and localRead MoreSystems Analysis And Design Paper1574 Words   |  7 Pagessuccessful. To be successful with these principles, an analyst must be able to lead, communicate and sell the Systems Analysis and Design principles to the project team. Systems Analysis and Design is a broad term for describing methodologies for developing high quality Information System which combines Information Technology, people and Data to support business requirement (Satzinger, 2016). The Systems Analysis and Design technique is not only limited to IT systems. There are many applications thatRead MoreGraduate Career Exploration Internship : Launchmetrics Essay1629 Words   |  7 PagesLaunchmetrics Chih-Yun Tsai LIM Collegeâ€Æ' Table of Contents Company and Department Overview 3 Internship Title and Description 5 Overview of Approved Learning Objectives 6 Summary and Evidence of Learning Objective Achievement 6 Summary of Personal Skill Development 9 References 10 â€Æ' Company and Department Overview Launchmetrics is a software development and data insights company that assist brands with their launch to market. In 2015, Launchmetrics was established through the merger of FashionGPSRead MoreChoosing A Long Term Career Essay1255 Words   |  6 Pagescomprised of positions such as Company Controller, Director of Finance, as well as Chief Financial Officer. Finance managers act as the responsible party for the financial health of an organization. As a Finance Manager, it is a requirement to both develop and motivate staff. Financial managers require an in-depth working knowledge of the entire financial industry. The Finance manager plays a crucial role in how the organization functions collectively. I will benefit from the information in this

Wednesday, December 11, 2019

Big Data Can Be Grouped Based On Differentâ€Myassignmenthelp.Com

Question: Explain Big Data Can Be Grouped Based On Different? Answer: Introduction Data is defined as quantities, symbol or features that are performed by the computer machines that can also be stored, transmitted by either in electrical signals and recorded on the mechanical or electric signal. Big data, therefore, is either a data but with big storage. Its used in the description of data collection that is majorly very big and expanding at a very high rate. However, this type of data is normally very huge and complex that no any other traditional tool can operate efficiently. Big data examples are social media impact which is around 500++ terabytes to store data before being used into the system (Azarmi, 2014). However, Big data can be categorized into either structured, unstructured and finally semi structured. Velocity This refers to the speed in which generated data operates. It describes how fast the information is produced by the demands in establishing the real strength of any data. Variability This shows how data is consistent with how many times the data operates to the effect on how the data can be handled more efficiently. Variety This describes the nature and sources of data regarding structures and semi structures (Caro, 2015). It contains some of the unstructured data containing a given issues based on storage and data analysis. Benefits of Big Data Processing The importance of big data is not based on how much data is produced but what amount of data can be placed in practice (Belloc, 2016). You can produce data from different sources in finding out answers for cost reductions, time and ways of obtaining new product for decision making. Many tasks can be achieved by using this technique. Some of detecting any fraudulent acts, establishing ways in risk reduction, establishing the causes of any business failure and generating sale issues on customers buying trend. Business can only develop with a good source of data (Chorafas, 2001). Therefore, processing this gives multiple benefits to the world such as-Businesses benefits from the use of intelligence while implementing decisions in access to different social sites thus enabling the company to improve their strategies in business. In additions, improved customer services can be improved whereby a traditional system is replaced with new technologies from Big data for improvement of natural language (Davenport, 2013). Also, big data can also be used in the creation of areas for storing new big data before deciding what to be transferred to the data warehouse. A more complex type of prescriptive modeling can also help firms in predicting any business opportunities and implementing decisions that target marketing companies thus avoiding the collapse of business tools (Federal Data Science and Advanced Analytics in Agricultural Science, 2017). The Big data tool can ingest different types of data both in structured and semi structured like the web server or some phone mobile application log. It comprises both the text files, emails, text messages and documents for data management. Also, big data tools help in the provision of a framework to enhance the use of data mining system to analyze information by the introduction of patterns. This will enhance performance in business activity by adapting analytical models to correspond with the business operational application. Big data application in wall-mart stores is doing a lot with Big data. The presentation of big data is characterized by the increased variety volume and velocity. The complimentary documents explain the details of a strategic IT plan similar to the firm in identifying all the gaps in the allocation of its materials (Shirin Hijaz Matwankar Dr. Shubhash K. Shinde, 2016). At this report, the evolution of big data, challenges for most companies are technologically related. The most effective implementation to be adopted relates to cultural challenges, organization alignments that result from the ignorance to adapt the new change. Organizational analysis The company is doing big data business has helped a lot in the improvement of technology. The total output for every business locality. The report is based on the usage and management of IT sections according to the improved ideas from big data. Nature of business From our humble beginning as being the small retailer in Rogers, Ark, the Wal-Mart business has expanded into various parts of the US and different countries internationally. But with new big data innovations, the business is creating a place to enable the potential customers to shop anywhere online. We are establishing new branches to accommodate more communities in job market around the globe. Everyday low price (EDLP) is one of the best strategies used by our firm to focus on price determinants for the benefits of our clients. From our grocery and entertainment in support of goods the company produces goods and crafts that our customers appreciate. Internal analysis Wal-Mart is a powerful retail brand. Strength and weakness This company has a good reputation regarding currency, convenience and different items in the store. The original dream of Waltons is to conduct a productive business of large discount with many departments. The greatest kind of strength adopted by the company includes an understanding of low prices, market conditions, the distribution channel and competence in current data technology. Also, low prices and both this technique have helped this company a lot. The greatest Wal-Mart strengths come as a result of the expansion of his prosperity. It has the core competence that promoted the use of new technology system in support of its international logistics. But in contrast with strengths that makes Wal-Mart successful, there is also weakness in conducting out various duties. Unfortunately, the company has a poor public image that sometimes viewed as being unfriendly to the community. Also, rumors on how employees are treated are also a major thread for the company. Some of the people say that the company tends to pollute the environment and congestion within the place of work. Despite this entire rumor, the Wal-Mart has this problem of inflexibility mostly in dealing with customers around. However, the marketing activities in Walmart establish a marketing Sandra piccolo whereby is one of the growing industry in the US. This technique has helped it in attempting ways on how to deal with their external competitors around the market (Srinivasa Bhatnagar, 2012). But effective stakeholders contribute a lot in the market both direct and indirect for the benefit of business. The engagement of stakeholders in business field has generated a good communication in effective settings. The suppliers, on the other hand, can be traced by the video from Wal-Mart explains the benefits with the company supply trucks. The evidence attributes for the effective relationship with suppliers on how the company survives. The community has evidence in Walmart explains the importance of financial benefits. With the current macro-Environment, The external environment influences the decisions that managers possess in orders to improve the continuity of the company. Sometimes, managers have a little impact when it comes to environmental issues. But there is a new trend that introduces market trends known as green retailing. The concept to reduce this kind of waste is by the act of retailers increasing the level of customer expectation. The industry and strategic group explain the existence of competitors together with those in the market. Its important to understand that big data helps a lot in real time fraud detection, social media analysis, optimizations of call center and display of web for the need of business technological advancement. It has also improved all the analytical issues within the business environment. Data collection and storage Wal-Mart is the biggest retail store; it has various data operating within the system. Therefore it has to maintain the flow of vital information into the system by establishing the data caf. This and hub where the art focuses on handling information by putting in a working environment in solving different issues. The company has employed over 200 streams both in external and internal data. This comprises of 40 pet bytes where the data can be analyzed. The company is beneath the business access of concentrating majorly on data within the business field. It has heavily invested in data management (U?urlu Sevim, 2015). It can, therefore, track, gather by using social data in improving their productivity within the market. Normally, the largest social network ever used in the marketing industry happened in the year 2012. This has given lots of lips service necessary for social data storage in arriving at crucial business decisions. The retailer has also invented a program known as product content collection system to promote vendors in delivering their products catalogs to Wal-Mart. Also, the company has implemented a technique in conjunction with product information through the Global Data Synchronization network, the product content collection system. However, to improve such technique, its necessary to ensure that once the customer enters the job market, data can be collected by importing, put in a good cloud storage and customers can use it for their benefits. Data action When it comes to Wal-Mart, having big data suggest that the company has impressed the conduct of business in many ways. Being one of the leading markets, it has Hadoop-based technologies in regulating the use of big data systems (McNeill, 2013). The real time data analysis has enabled the company in driving direction on decisions from different people by improving the level of the supply chain. But in these days, accessing big data has become easier than before. This is due to reduced cost of storage and how to process this data has become easier. Wal-Mart Company collects its information majorly on web traffic, mobile apps and other different sources. At, the root storage of big data requires some measure to help improve the performance. A larger amount of data in the system needs input/output operations per second to deliver data to delivering tool. The data can either be stored in re-size, e-handbook or e-zine. This is made up of direct attached storage, but redundancy happens when the system suffers an outage of any component. IDCS storage solutions explain on how the big data can be stored based on the look of big software and hardware in the market. Attention is given to new software like NoSQL database. The impact of storage is also studied on architecture, storage media, capacity and perspective of revenue across the center in Wal-Mart business center. Recommendation and Conclusion Some of the organization doesn't concentrate on the data management in their system. But the only required knowledge is being confident in business decisions. You have to possess a strategy to help in the management of big data as shown in Wal-Mart business. The final step one has to make includes researching the technologies that help in deciding the most appropriate big data analytics. The data obtained on different social media platforms on data management is an attractive source of information and therefore needs to be tackled with care. Data in action Big data can be described by the volume, variety, velocity, variability, and veracity. The volume contains the quantity of and the data stored. Variety looks at the type of data while velocity is the speed which the data is generated. On the other hand, variability is the irregular process that involves managing of the data. Veracity includes the quality of which quality of data varies. Industry influencers, academicians, and other stakeholders certainly concur on the fact that, big data has become a big game changer to organizations in the society today. First and foremost it should be noted that modern industries have embraced technology globally. The 21st century has been witnessed with industries investing big for the future. However, the goals of organizations differ on big data projects depending on their goals and resources. Big data is essential in industries making the market efficient by ensuring cost reduction. Furthermore, big data technology is important in the banking industry. For instance, the banking industry is faced with many challenges which include: credit risk, card fraud, customer data transformation and general IT problems. The employment of the big data in the banking and security has been vital to monitor financial market activity. Financial institutions are using network analytics to curb illegal training activity. On the other hand, retai l traders and major banks use big data trade analytics to monitor payment. This has provided customer driven promotions which are an important relationship management. In the manufacturing industry; it has enhanced product research which is essential for budgeting and product preference. Healthcare industries are considered to be using big data analytical capabilities to improve surgical and ultrasound facilities. Big data analytics, therefore, is a trending practice that companies and organization have considered adopting. Big data analytics are software products which are fundamental in an application running on big data computing platforms. The most commonly used software is Hadoop and NoSQL data bases. Hadoop helps organizations make decisions that have been categorically rather than a small sampling of data. Additionally, advanced data analysis can be carried out to avoid the operational expense of outsourcing. Government agencies collect vast amounts of data in public fields and cyber security. It should be noted that Hadoop not only ensures security to the public but makes a collection of data simple. Telecom companies often process millions of calls every second. The rapid pace of telecommunication requires efficient storage of Apache Hadoop. When it comes to manufacturing systems Hadoop ensures quality provision of products. Organizations can design their products with the help of big data (Srinivasa Bhatnagar, 2012). To begin with, health and life sciences deal with a high population of health cases. With the busy health institutions. Big data technology can be used globally to provide devices to patients who are miles away. For example, a Doctor is based in India can send medical information to a fellow doctor in Africa. In the business sector, big data can be found used to ease storage of large data and monitoring of the business for several years. Recommendation systems in business are used to prevent business risk and customers interactions. More often than not in the contemporary society, today business stakeholders have engaged in online transactions and marketing which has proven to be vital with the current changes in technology. Moreover, Recommendation systems can provide an opportunity for the customer's preference of certain products. For instance, with the online websites of products buyers can go through the specifications of their choice. Another important factor of the recommendation system is that the user can distinguish between qualities of the certain site depending on the services that they offer. This is usually in the case games, music and streaming live sites. It is no doubt that YouTube has proven to be the widely used sight due to the reliability and the quality of their services (Chorafas, 2001). A user will never opt to use another site because YouTube provides a proper recommendation system that can b e used at any place any time. In the world today, smart phones are widely used to the advancement in technology. With this effect, mobile phone companies have ensured that their data is available on search engines, websites, and emails. Samsung phones are used widely in the globe yet their company is situated in Asia. The success of the massive sale is the suggestion of products for customers to buy via their email. They have not only used several media houses to market their phones but also ensuring that their mobile phones image are available to all continents. Recommendation systems have also been effective in the Car manufacturing industry. Toyota cars are quite common because they came up with terms and conditions that are friendly to the buyer. For example, they have given a friendly warranty and have also recommended Vehicles that belong to the middle and elite class in the society. They are several car manufacturers in the world today, but Toyota is the most preferable. Good s that are sold abroad have also been a key factor in the recommendation systems. Buyers who ship their goods and services online have been able to cost share with the manufacturer. It should be noted that the manufacturer attracts plenty of customers and also spends less when exporting their products. Word of mouth through friends has proven to an effective way of recommendation. For instance, a friend can tell a friend who spreads the message to another third party. This is usually in the services provided by transport, bar, salons and the health sector. Organizational transformation refers to activities that improve the day-to-day running of the business systems. This is usually accompanied with the aim of improving the quality and provision of services by the organization. Transformation occurs by redesigning, re-energizing and redefining. For effectiveness of the organization, transformation teamwork is required by colleagues and the senior management. It should be noted that t ransformation has the fundamental root which is human values. Risk management, therefore, refers to a process of identifying, assessing, and controlling potential threats to an organization. It is simply an organization preparedness in and after a threat. The main types of business risk include reputational risk, financial risk, operational risk, compliance risk and strategic risk. Reputational risk refers to the name of a business being damaged due to a certain situation. A reputational risk can easily lead to loss of customers. Therefore it is the mandate of an organization to stand firm in such scenarios. Financial risk refers to the money flowing in and out of business and the possibility of a loss. The chief accountant of a business should always be on the forefront to manage cash flow in the business. Operational risk is the unexpected failure in the running of a company due to unavoidable situations. Compliance risk involves the terms and conditions that the government puts across in the running of the business. Failure to adhere leads t o leads to dismissal of the business. On the other hand strategic risk is a situation whereby, the companys strategy becomes less effective due to changes in technology, raw materials, and active competitors. If a company is with any risk, there should be proper communication to avoid the last minute rush. Having proper channels of communications ensures that every employee works extra hard to restore the reputation and quality operation of the company. Risk management contains processes which in the long run prevent the company or business from collapsing. The first step, in this case, is to identify the risk, then analyzing the risk as a team in the organization. It is then followed by evaluating the risk and responding by looking at solutions then lastly monitoring and reviewing the risk. Big data in the industry sector has ensured that there is operational optimization. This is witnessed by gaining more precise predictive systems and less risk failure. Furthermore, it has ensure d that there is employee engagement by monitoring their performance. In addition customer experience by ensuring that their preferences have been met. However big data on the industry has come out which challenges. Most companies are only analyzing little content of their data in the manufacturing industry due to their complex operations. Storing of data has proven to be very challenging because they become useless with changes in time. Dealing with security has also proven to be a challenge which industries are spending much but are not adequately doing away with insecurity. One of the most significant impacts of big data is the transformation change to support data opportunity. Existing data preferences have simplified the process of monitoring and evaluation of banks and other financial services. Using data to make marketing decisions has led to the increase of market productivity which has improved the annual global marketing spending. The challenges that organizations face incl ude: data quality is often very poor. Data stored in structured databases are often out- of date. At times there are cases of duplicate mailings from clients. Most of the data gathered are unstructured which is a difficult task to distinguish quality data from the less important. It is also easy to confuse data by easily assuming that the output of the data proved to be reliable. In the society, today with the changes in technology economic stakeholders should train their staff. As much as technology has brought up efficiency and time saving; the negative impacts should be emphasized. Shortly, big data is a factor that will transform organizations information technology. Clearly, in the 21stcentury, big data has played a big role in time management and penetration of the wider market (Chorafas, 2001). However, it should, therefore, be noted that in some areas accessibility of big data is limited due to lack of electricity and poor internet server. For better reliability of big data, organizations should be up-to-date with the current software. References Azarmi, B. (2014).Talend for Big Data. Packt Publishing. Caro, C. (2015). A Retrospective Look at College Football in the Late BCS Era A Case Study in Sports Analytics, Sports Management, and Sports Economics.Journal Of Business Case Studies (JBCS),11(2), 71. https://dx.doi.org/10.19030/jbcs.v11i2.9175 Belloc, H. (1967).On. Freeport, N.Y.: Books for Libraries Press. Chorafas, D. (2001).The Internet Supply Chain. New York: Palgrave Macmillan. Davenport, T. (2013).Enterprise analytics. Upper Saddle River, N.J.: Pearson Education. Federal Data Science and Advanced Analytics in Agricultural Science. (2017). Shirin Hijaz Matwankar, Dr. Shubhash K. Shinde. (2016). Case Study: Political profiling based on Twitter Sentiment analysis for Big Data using Data Mining Algorithms.International Journal Of Engineering Research And,V5(02). https://dx.doi.org/10.17577/ijertv5is020239 Srinivasa, S., Bhatnagar, V. (2012).Big Data Analytics. Berlin, Heidelberg: Springer Berlin Heidelberg. McNeill, D. (2013).A framework for applying analytics in healthcare. Upper Saddle River, New Jersey: Financial Times/Pearson Education. U?urlu, M., Sevim, ?. (2015). Artificial Neural Network Methodology In Fraud Risk Prediction On Financial Statements; An Emprical Study In Banking Sector.Journal Of Business Research - Turk,7(1), 60-60. https://dx.doi.org/10.20491/isader.2015115752

Wednesday, December 4, 2019

Business Communication Of Tower Insurance †MyAssignmenthelp.com

Question: Discuss about the Business Communication Of Tower Insurance. Answer: Introduction Communication has been taken the form of interactive dialogue between the company and its consumers that it covers the all stages such as pre-selling, selling, consuming and post-consuming. The impact of technology has a huge impact on the means of communication. People have become aware about technology and communicate by using computer and internet (Grmanov, 2016). The report is described the various methods of business communication for attracting more customers towards the products and services. Advertisement can be attractive concept of business communication to influence more and more customers to buy the products. The name of the company is Tower Insurance and it is located in New Zealand. The company was founded in 1869 and the Government of New Zealand had given the capital for building the New Zealand Government Life Insurance Department. After three years, ownership of Tower insurance was transferred to the holder of policy. Michael Stiassny is the current chairman of Tower Insurance Company. Graham Stuart, David Hancock, Warren Lee and Steve Smith are the directors of the company. The organizational structure of Tower Insurance is a top down approach. Figure 1: Organizational structure Tower Insurance Company is publically listed in New Zealand. Earlier it dealt only in medical insurance but due to growth in the organization, it presently deals in two divisions such as medical insurance and investment divisions. The company provides different services to the customers such as car insurance, house insurance, rural insurance, boat insurance and travel insurance. The good aspect of this organizational structure is that entiremanagement and leadership is conducted by topmanagement only. Board of members of the company communicate with management team to provide the guidance regarding strategies and supervision to be incorporated for company. The vision of Tower Insurance is to be the guiding light for the population of New Zealand. The company is putting lots of efforts to accomplish and collaborate teams to work together in functions which contribute to provide valuable customer experience and long standing relationship with them. The mission statement of the company is to provide the best quality insurance services to its customers in professional as well as personal manner. Moreover, the mission statement is focused on keeping the well efficient technical expertise and knowledge. Issues of the company However, Tower Insurance Company is the leading insurance company in New Zealand but there are number of issues in the company which influence the efficiency of the employees. The vision statement of the company is less attractive which is unable to influence the customers and the workers. There are various people in New Zealand who are unaware about the schemes and profitable policies. It is necessary for the company to implement the strategies and effective communication method for reducing the gap between the clients and the company. Method for addressing the issues There are number of communication methods which would be helpful for the company to improve the efficiency of the employees. Advertising method is effective method for the company because it is able to promote the business by fulfilling the expectations of the clients from the organization (Baker Logue, 2017). Advertising is one of the most common methods of business communication which includes a paid message company build and place in a specific media. For instance, running advertisements on television or radio, in newspapers and magazines, utilizing outdoor media such as vehicle, billboards, banners or pay per click displays on websites. Advertising has the ability to create awareness. Retail advertisement try to develop sales on the other hand image advertising highlight the message of the company (Avant, Kim Hayes, 2017). Goal of the business communication method The goal of the advertising method used by Tower Insurance Company is to get the proper attention of the customers towards the company by providing them efficient knowledge about the products and services of the company. The customers of the company will be benefited from this business communication method and get aware about the schemes of the company regarding insurance (Kim, Hayes Avant, 2015). Tower insurance company is dealing with number of insurance and provide the schemes and offers in their policies, the advertising method will be effective for the company to accomplish the vision and mission of the company. The major goal of the advertising method in Tower Insurance Company is to inform, convince and remind customers about the insurances of the company. The efficiency of the organization and the focus of the business towards long term relationship with customers and employees will be increased due to this business communication method (Cummins Weiss, 2013). Usage of advertisement method The advertisement method is being used in the Tower Insurance Company to spread awareness about the companys services. The techniques of advertisement are social media marketing, television or radio advertising and bandwagon. However, the vision and mission statement of the company is clear and the team of the company are teams are collaborated for working together in functions. Torrent insurance company can use this method in the time of implementing new schemes and proposals for insurance. It would be helpful for the company to attract new customers. It can be used for target customers by providing valued ideas to attain the competitive advantages. The customers of the company are happy with the services of the company but it is vital for it to make ensure that the bonding with customers should be long lasting (Greene, Tanner Wright, 2015). That is why this technique should approach to those customers who are unaware about the offered schemes and insurance by the company. Implementation of the advertisement method The advertisement method of business communication is implemented by Tower Insurance Company in order to make public aware about the different services of insurance. Advertisement method in the company can be implemented by applying repetition, promotions and bandwagon. Repetition is the effective technique of the advertising which is used to build identity awareness and customer memory. Tower Insurance Company can use other successful approaches mention the name of the company more than once. It will include the advertisement on televising because T.V. has the combination of sight and audio which permits the advertiser to costume the repetition by changing its delivery (Harris, Musgrove, Ernstberger, Cox Choi, 2017). On the other hand, bandwagon technique is also effective for it which will facilitate company in convincing the target customers in competitive environment. The approach of promotion can be used by the company to sell its service to the customers. Coupons, offers, priz es and involvement will be enthusiasm clients to create the relationship with the sponsoring the services of the company. Merits of the advertisement techniques Advertisement technique is helpful in bringing new services to the consumers along with offering adequate advertising facilitates in marketing of the different services given by the respective company. It will be helpful for Tower Insurance Company to increase the number of customers because advertisement is the approach of targeting the customers. The unnecessary cost of the company can be reduced with the help of advertisement technique by eliminating the middleman (Khang, Han, Shin, Jung Kim, 2016). The advertising method will facilitate in enhancing the morale of the employees as challenge will come at the workplace with new opportunities to utilize and develop their skills (Terkan, 2014). Demerits of the advertisement techniques However, advertisement is the effective technique to promote services and products of the company. It has some negative impacts as well which may influence the Tower Insurance Company. It is an expensive function because it is considered as an indirect cost which is added into distribution expenses of the company. Advertising is an economic waste because unbalanced advertising is the reason of specific goods to cost more than they should. Advertisement of high policies of luxury things influences the buying power of customers (Marotta, Zhang Acquisti, 2015). Thus unnecessary advertising in Tower Insurance Company builds societal corruption. It has been analyzed that there are many similar products in the market which are advertised. For instance, there are many companies of policy that provide the same service, but are advertised as dramatically different products. Evaluation of strategys success Tower Insurance Company has implemented the new strategies of advertisement technique to improve the issues within an organization and keep focus on the accomplishment of vision and mission of the company. The implementation of the effective advertisement technique facilitates organization to focus on efficiency and productivity. The above image shows that the management expenses reduced in 2017 in comparison of 2016. It has been found that online sales enhanced from 9% of new business transactions from March to September due to advertisement technique. The above diagram shows the online conversion rate optimisation and improvement. Conclusion Concise summary In the limelight of above discussion, it has been concluded that advertising is the most efficient tool of business communication. The report has been made on the Tower Insurance Company and in this company proper advertising technique has been applied. The major goal of the advertising method in Tower Insurance Company is to inform, convince and remind customers about the insurances of the company. Every coin has two aspects which show one face in positive way and another is negative way. The advantages and disadvantages of the advertising techniques have been elaborated. 3 highlighted points Organizational structure: The organizational chart of the company is effective but there should be some changes in the organization structure. New organizational structure of the company will be effective than previous chart. The chart should be made by keeping all in the mind and CEO of the company should conduct the meeting before taking any important decision regarding employees and changes in the insurance policies and schemes (Lei Moon, 2015). Issues in the company The company should focus on the attractiveness of the vision statement. The implemented policies and schemes of different insurance should be reached to targeted customers. Along with that marketing segmentation should be developed in the company which involve specific market by considering the different characteristics of the customers. Usage of advertisement technique Advertising technique is effective business communication to get the proper attention of the customers towards the company by providing them efficient knowledge about the products and services of the company. References Avant, J. A., Kim, K., Hayes, J. L. (2017). Thirty Years of Advertising Research in Leading Communication and Marketing Journals: Learning From the Parent Disciplines.Journal of Current Issues Research in Advertising,38(1), 44-64. Baker, T., Logue, K. D. (2017).Insurance law and policy: cases and materials. Wolters Kluwer Law Business. Cummins, J. D., Weiss, M. A. (2013).Analyzing firm performance in the insurance industry using frontier efficiency and productivity methods.InHandbook of insurance(pp. 795-861).Springer New York. Greene, S. G., Tanner, J. R., Wright, P. (2015). An Analysis of the Impact of the Motor Carrier Act of 1980 on the Use of Advertising by General Motor Freight Carriers. InProceedings of the 1986 Academy of Marketing Science (AMS) Annual Conference(pp. 246-250). Springer, Cham. Grmanov, E. (2016). Influence of selected factors on the efficiency of insurance companies.Journal of Management, (2), 29. Harris, M. L., Musgrove, C. F., Ernstberger, K. W., Cox, K. C., Choi, P. (2017). Differential Effects of Marketing Messages in Online Advertising for an MBA Program.International Journal of Technology and Educational Marketing (IJTEM),7(1), 15-25. Khang, H., Han, S., Shin, S., Jung, A. R., Kim, M. J. (2016). A retrospective on the state of international advertising research in advertising, communication, and marketing journals: 19632014.International Journal of Advertising,35(3), 540-568. Kim, K., Hayes, J. L., Avant, J. A. (2015). Thirty Years Of Advertising Research In Leading Communication And Marketing Journals: Learning From The Parent Disciplines. InAmerican Academy of Advertising. Conference. Proceedings (Online)(p. 82). American Academy of Advertising. Lei, N., Moon, S. K. (2015). A Decision Support System for market-driven product positioning and design.Decision Support Systems,69, 82-91. Marotta, V., Zhang, K., Acquisti, A. (2015). Who Benefits from Targeted Advertising?. Terkan, R. (2014). Importance of creative advertising and marketing according to university students' perspective.International Review of Management and Marketing,4(3), 239. Tower Insurance. (2017). 2017 full year results and announcement of entitlement offer. Retrieved on 21 February, 2017 from: file:///C:/Users/Geetika_ABSAS/Downloads/171114%20-%20Tower%20Limited%20FY%2017%20Results%20Announcement%20Presentation.pdf.

Sunday, November 24, 2019

Movie Review Essays

Movie Review Essays Movie Review Essay Movie Review Essay Name: Course: Lecturer: Date: Movie Review The PBS documentary â€Å"Chicano! History of the Mexican American Civil Rights Movement† examines the struggles of Mexican Americans in securing their rights. It mostly focuses on demonstrations and the struggles that Mexican Americans went through in the sixties. It examines different topics such as the land issues in New Mexico, the mistreatment and discrimination that Mexican Americans faced in their quest for the realization of equal treatment, and the challenges facing Mexican Americans as they demonstrated in various parts across the country. When America went to war with Mexico, it ended taking up a substantial share of land belonging to Mexico. Many Mexicans in these regions found themselves foreigners and tenants in the land that had belonged to them for many generations. Some leaders emerged who were courageous enough to face the federal government, and to unite the people towards fighting for their land. The problems that faced Mexican Americans in the rural areas might have been different from those facing the Mexican Americans in the urban areas, but the people united towards fighting for a common purpose that was to be treated as equal citizens, and to realize an end to discrimination. Throughout the documentary, Mexican Americans demonstrate their willingness to regain what belongs to them. They did not abandon their culture, and this is clear in the role that music, dance, and poetry played in the civil rights movement I have learnt several things from the documentary. Many Mexican Americans were poor, and this denied them the opportunities that the white Americans had in terms of education, jobs, and housing. Many Mexican Americans fought in the Vietnam War, where many ended up losing their lives. The efforts of the soldiers fighting in the war were never recognized, for the soldiers came home and they could not find any jobs. Mexican Americans were willing to work together with African Americans during the sixties, with the aim of addressing the needs for the poor. However, the shooting of Martin Luther King Jr. ended this relationship, and the two communities started having disagreements. Mexican American women were not passive during the civil rights movement. They wanted to join the men as they fought for equality, and they took an active role in the movement. Many Mexican Americans had faced different forms of discrimination. To some extent, this made them ashamed of their identity. Mexican Americans wanted to be in a nation where they would have their own political party, schools, and other social systems. This was similar to the segregation rule that was present in the African American community though not to the same extent. African Americans had their own schools. These schools were not well equipped, and this denied the African American the same opportunities in education as the white Americans. The idea of segregating the community from the rest of American society would not have benefited Mexican Americans. It would have denied them the chance to learn from other people as they worked and learned together. Moreover, it would have advanced the discrimination that they already faced. Many people do not realize the struggles that the Mexican American community faced over the years. They do not realize what the people had to endure so that they could secure their rights and the rights of their children. The leaders and organizers who led the people are rarely mentioned in history. They are not celebrated as much as other civil rights leaders. The Chicano movement was significant in ensuring equality in America. The people never gave up their quest although they were not successful in realizing all their goals. Their tenacity and willingness to end discrimination and prejudice has contributing to making America what it is today; a land that recognizes the rights of the minority and is willing to give all people the same opportunities. Work Cited: Chicano! History of the Mexican American Civil Rights Movement. NLCC Educational Media, 1996. Documentary

Thursday, November 21, 2019

Perspectives on operations management Essay Example | Topics and Well Written Essays - 1250 words

Perspectives on operations management - Essay Example This research will begin with the statement that operations management strategy is simply a tool which can help the organizations to carry out their business inefficient manner. Operations strategies are the main key to the measurement of performance of any business entity. The main concern of business entities is how they will survive and can continue their functions in an effective manner. For this purpose, an efficient operations strategy set the long-term directions for the business and these directions ensure the future success of any organization. An efficient operations strategy can help the business entities to win the race and stand at top of the crowd in a competitive environment. Â  X Company is the chain of independent retail outlets in Hartwell in Essex and opening a new Wal-Mart store at the edge of the town. The advice is needed about the potential operation strategy in response to the recent opening of Wal-Mart store. The authors have prepared a plan for the future b usiness operation strategy for the new Wal-Mart store. According to many successful financial advisors, Operations strategy for any business has a direct impact on the profitability levels and corporate strategy. Structural design is the main element of the operations strategy. As the Company X is running its business as a retail outlet and wants to set the new business operation strategy for new Wal-Mart store. There are some key points for the structural design of new operations strategy in the paper.

Wednesday, November 20, 2019

Juvenile Diabetes Essay Example | Topics and Well Written Essays - 750 words

Juvenile Diabetes - Essay Example Diabetes is a disease. It affects both children and adults. The fundamental nature of the disease is that individuals have blood glucose levels which are higher than the normal range (Basics About Diabetes, np). We eat food, this food is converted into glucose, and our bodies use this glucose sugar for energy. The human pancreas is the organ which is responsible for making the hormone known as insulin. Insulin helps the glucose get into our cells. Diabetes is dangerous because it means that the body cannot produce enough of its own insulin or it cannot use the insulin produced sufficiently. Diabetes causes sugar to increase and build-up in the blood. The consequences can be severe, as noted by National Center for Chronic Disease Prevention and Health Promotion, "Diabetes can cause serious health complications including heart disease, blindness, kidney failure, and lower-extremity amputations. Diabetes is the sixth leading cause of death in the United States" (Basics About Diabetes, np). The symptoms of juvenile diabetes, which is estimated to account for between 5% and 10% of all diabetes cases, are varied. The symptoms may include a frequent need to urinate, an excessive thirst, or an unexplained loss of weight. A person may also experience feelings of excessive hunger, numbness or tingling in the fingers and toes, or a sudden problem with vision. Other symptoms may involve dry skin, an increase in infections, or sores which are slow to heal. The onset of juvenile diabetes is often accompanied by nausea, vomiting and stomach pains. There are well-known risk factors for diabetes in adults, such as obesity and physical inactivity, but the risk factors for juvenile diabetes are "less well-defined" (Basics About Diabetes, np.) Risk factors are thought to be autoimmune, genetic, and environmental and these areas are the subject of continuing research. There are, fortunately, treatment methods for juvenile diabetes. The most basic methods include a healthy lifestyle accompanied by regular insulin injections. There should be a healthy diet and a regimen of physical activity. The insulin injections compensate for the inability of the pancreas to produce the requisite amount of insulin. These methods must be coordinated because the amount of insulin which must be injected correlates to the amount of food intake and the amount of physical activity. It is Dalton 1 important to note, however, that while there are rather well-established treatment methods there are no methods for prevention. Researchers continue to search for what they refer to as "environmental triggers" and "genetic triggers" in an effort to find some means for preventing the onset of diabetes in juveniles. There is some enthusiasm in the medical community about possible cures for diabetes in the future. Some of the theories and methods currently being researched and tested include pancreas transplants, the transplant of islet cells (these cells produce insulin), artificial forms of pancreas development, and forms of genetic manipulation where "fat or muscle cells that don't normally make insulin have a human insulin gene inserted - then these "pseudo" islet cells are transplanted into

Sunday, November 17, 2019

Organizational Behavior Essay Example | Topics and Well Written Essays - 750 words - 13

Organizational Behavior - Essay Example Communication may be formal or informal. Formal communication is through officially designated channels of message flow between organization positions. Communications in this case will e within the subsidiary and also from the subsidiary NYSEG to the parent company Iberdrola. There are three types of formal communication that include downward communication that flows from upper management to subordinates. In this scenario downward communication will also arise when Iberdrola makes policies and gives instructions to NYSEG their subsidiaries. This type of communication is made up of job instructions, procedures and practices among others. Upwards communication is transmission of information from the lower to the higher levels in the organizations or from the subsidiary to the parent company; it involves job related problems ad subordinates perceptions of organizations’ policies among others. Horizontal communication is the flow of information across the organization at a given l evel of an organization. This will involve departments and facilitates problem solving, sharing of information across different work groups and task coordination between departments and project teams (Mumby, 2013). Informal communication is the interactions in the organizations that do not reflect officially designated channels of communication. The rise of technology has made this possible through the use of social media. It involves grapevines and rumors around the organization and emerges from social and personal interests of the employees and is an inherent and a necessary aspect of the organization life. Both type of communication is done verbally through oral or written form and non-verbally though facial gestures or body language among others. Most organizations’ have regular meetings dedicated to discussing issues and areas where odd situations may arise that affect their

Friday, November 15, 2019

Social Media and Network Security

Social Media and Network Security Mohammad I. Khan GMU Honor Code statement: By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on http://oai.gmu.edu/the-mason-honor-code-2/ and as stated, I as a student member of the George Mason University community pledge not to cheat, plagiarize, steal, or lie in matters related to academic work. In addition, I have received permission from the copyright holder for any copyrighted material that is displayed on my site. This includes quoting extensive amounts of text, any material copied directly from a web page and graphics/pictures that are copyrighted. This project or subject material has not been used in another class by me or any other student. Finally, I certify that this site is not for commercial purposes, which is a violation of the George Mason Responsible Use of Computing (RUC) Policy posted on http://copyright.gmu.edu/?page_id=301 website. Abstract Social media security is a big concern nowadays and network security itself is another concern. Network security has changed a lot in the recent years. This paper aims to investigate and talk about the public associations on social media networks, the rationale of social practices, the dynamic way of character and protection, the creation and dispersal of social media and network security, the social media network security and the overall network security of the present time. This paper begins with todays social media character and network security for social media. It discusses the nature of network security, system protection, the social networking progression of security. Furthermore, it also describes network security threats, their definition and types, and how we will be benefitted from this, and whats the new network security infrastructure might be in the near future. Also, this paper provides the background, uses, ethical and social issues, advantages and disadvantages of th e network security based on social media sites and network security individually in details. Keywords: Social networking sites; network security; social media and network security Introduction Social media has not only changed the way people interact in the world, but also it is advancing more to make it easier to access. Social networking sites allow people to communicate and remain in contact with friends as well as meet new people. Social media alludes to online communication that takes into consideration client created content as content sound, video, pictures and so on to be distributed in a very versatile way for overall public utilization regularly. It also includes the intuitive exchange with others. Social media is a vital source for sharing social activities. There are various kinds of social media such as Wikis, Blogs, Microblogs, Photo Sharing, Videos, News Feed and so on. Social networking sites are viral; at times, mysterious in nature, prompting social sites being seen as targets for hackers and cyber-criminals recently. Reasons being that online networking itself permits the clients to customize their online identity and share personal information. Along wi th all these things, network security is also a concern nowadays and has a relation with them. Famous social networking sites, for example, Facebook and Twitter have been able to be focused for security attacks. Without network security, we cannot protect our privacy and our stuff on the internet and in the social networking sites. In this paper, I will analyze the current practices of network security for social media services what is network security and the benefit of network security, social networking threats, future of network security, and emphasis on the ethical/legal and social aspects as well as a glimpse at the future security issues facing this area. Background, types and current security threats Network security refers to any kind of activities intended to secure system. In particular, these activities secure the ease of use, integrity, trustworthiness, and safety of the network and information. Compelling network security focuses a variety of threats and prevents them from entering into the network. Network security is refined through software and hardware. The software must be continually updated and figured out how to shield the network from developing threats. A network security system normally comprises of numerous parts. All parts work together, which minimizes maintenance and enhances security. These parts include Anti-virus and anti-spyware, firewall for blocking unauthorized access to the computer, Virtual Private networks (VPN) for providing secure remote access. On the other hand, Social media security is an issue nowadays. Online social networks were especially one of the hackers most loved targets. According to Dong and L.N., network security has turned into th e present spotlight on the improvement of information technology. From all parts of network information security issues, we should first make sense of the variables that trigger network security (Dong, L. N., 2014). According to another research study (2009) accumulated by the US National Cyber Security Alliance (NCSA), more than 74% of clients unveil individual data, including email addresses and birthdays on their profiles (Express Computer, 2009). Cyber-criminals can take data about anyone from their social networking profile and posts and afterward tailor their assaults taking into account anyones interests and likes. This is known as social engineering and it makes security threats a great deal more hard to perceive. According to Wu, Social Engineering, which relies on exploiting the human element of trust, obtain or compromise information about an organization or its computer systems (Wu, 2012, p.173). With such a large A number of users, Facebook is a target for scams; it can likewise uncover anybodys personal information to their group of friends. Scams on Facebook incorporate cross-site scripting, clickjacking, survey scams and theft of identity. One of the scammers most loved strategies for assault existing apart from everything else is known as cross-site scripting or Self-XSS. Clickjacking is likewise frequently fixing to survey scams which trap users into introducing an application from a spammed link. New Facebook security highlights give assurance against scams and spam. However, tragically theyre primarily incapable. Self-XSS, clickjacking and review tricks basically did not exist only a couple of years back, but rather they now show up on Facebook and other social networks every day. Another study showed that Facebook, for instance, was sued commonly in 2011 which made the firm pay about $20 million to compensate its clients for utilizing their information without explicit permission (Vel murugan Mathiyalagan, 2015). Security threats on social networking sites keep on growing. Another example of social networking site is twitter. It is a micro-blogging site. Even though most shortened URLs are real, if a link redirects anyone to another page that requests a twitter password everybody should leave it immediately for security purpose. Ethical issues related to social networking sites and Network security Social networking permits anybody to share essentially anything on the web. Any business without a social media policy networking approach risks expanding outside security attacks. Here are a few ethical rules a business ought to take after when conveying online: Sharing information which will give anyones brand a positive picture. People need believable information, so they should give them that. This will fabricate trust for business, which can expand leads and clients. When sharing, know about others viewpoints. Be interested in what others need to say. When to react, be reasonable in what we say to make a social prosperity for our business and client connections. Be mindful of who can see our information, what is being shared, and what is being said and partook in regards to our business. If something negative is being shared, investigate it for believability. On the off chance that it is dependable, react to it in a positive style to demonstrate that we think about what is said concerning our business, and that some kind of move is being made to progress. Overall, a business ought to make a positive, trustworthy online nearness for both their own particular advantage and for the advantage of their clients. On the other hand, a security policy is the accumulation of standards that help the clients to carry on in a certain approach to recognizing what is lawful and unlawful to access to ensure computer system in their network. Also, it helps the administrator to ensure that everything in the network system is secure and no one can pulverize or harm the system. So, the security policies are important to big business network. Likewise, without security policies the clients will open websites and these websites may have a virus or worms which will impact to our network function. Moreover, an unapproved individual can access to the network and do the illicit activity which will destroy the system. There is numerous approach to apply security policy. For instance, strong password, use a firewall and so on. However, one of the greatest ethical issues that identified with system is security policy. In some organizations the security policies are apply feebly or in awful way. Secondly, the hacke rs are enormous issue to the network and it is spread quickly in the word for quite a while. For instance, stolen medical insurance record from any organization and they will offer this data to another organization with no authorization. Third, the weak network design security system is gotten to be one of the greatest ethical issue that identified with network. Some administrator in the organizations do not apply enough security to the network, which cause a great deal of unauthorized clients access to network and look over the secret information. It happens because of the weak network security. According to Jayson, Some of Facebooks research on client conduct found that 71% of individuals drafted at least one post that they never posted (Jayson, 2014). Social Implications Social media is potentially the most indispensable segment of the Internet. At the same time, being open and social networking sites makes true worries about protection and security. Social networking sites urge individuals to be more open about their own lives. Besides, things they post stay accessible uncertainly. While most sites permit their clients to control who sees the things theyve posted. Social networking sites are possessed by private organizations, and that they profit by gathering information about people and offering that information on, especially to third party advertisers. Security settings are just intended to shield one from different individuals from the social network, yet they dont shield ones information from the proprietors of the service. Basically, one person is giving every one of his/her information over to the proprietors and believing them with it. There are other reasons also that can expose ones privacy. One study showed that boasting more than 500 mi llion active users around the world, the social networking site is presently being focused by cyber-criminals (Sanchez, 2010). On the other hand, Viruses and malware frequently discover their direction into computers through enticing advertisements. Its better not to click those ads. Secondly, we have to be cautious of whom we acknowledge invitations from while making online network. Sharing our information to individuals we dont know can be hazardous. In case, if we get friend requests from an unknown person, we should not accept the request in the social networking sites. Third, Part of the online networking websites are all the different games and applications. These are also called third party apps. Most of them are unsafe, before giving the application a specific level of consent concerning our information we have to be careful. We have to ensure what the application is viewing and sharing before consenting to the terms. Exposing too much information falls us into trouble. Four th, we have to utilize our security settings properly. Social media sites give us the capacity to limit who has the access to our information. For instance, Facebook gives us a chance to choose who our friends are and what content they can see.   One Consumer Reports says that issues are on the rise 11% of households utilizing Facebook had inconvenience a year ago, which ranges from a more unusual utilizing their login information to online harassment (Fitzpatrick, 2012). Future of social networking and network security The future of security controls on social networks is by all accounts on a promising direction. for example, biometrics system will be installed with two-step verification and enhanced endeavors are being made for securing clients privacy. With thoughts, for example, online ID labels, eye recognition system etc. Conclusion Social network holds colossal control over the lives of people and this force brings a duty of making social network a more secure spot. This must be done when security frameworks are solidly set up without bargaining the wellbeing of clients. References Dong, L. N. (2014). Design of computer information network security system.  Applied Mechanics and Materials, 539, 305-309. doi:  http://dx.doi.org.mutex.gmu.edu/10.4028/www.scientific.net/AMM.539.305 This is research and reviews that describes the network security systems. Fitzpatrick, A. (2012). Study Says Facebook Privacy Concerns Are on the  Rise Is It Accurate? Retrieved October 04, 2016, from http://mashable.com/2012/05/04/facebook-privacy-concerns-study/#vnDzBrKMnqqf This is a website that says about the Facebook privacy and security. Jayson, S. (2014). Social media research raises privacy and ethics issues.  Retrieved October 04, 2016, from http://www.usatoday.com/story/news/nation/2014/03/08/data-online-behavior-research/5781447/ This is a newspaper publication that discussed privacy and ethics issue for social media. Social networks: Boon or bane? (2009).  Express Computer, Retrieved from http://search.proquest.com.mutex.gmu.edu/docview/217384554?accountid=14541 This is a research and reviews that describes the network security threats. Sanchez, M. (2010, November 10). Know the Security Implications  of Social Media. Retrieved October 04, 2016, from http://blogs.cisco.com/smallbusiness/know_the_security_implications_of_social_media This blog was created for knowing the security implications of social media. Velmurugan, J. S., Mathiyalagan, P. (2015). SOCIAL NETWORKING THREATS AND  SECURITY ISSUES: AN ENQUIRY. International Journal of Management Research and Reviews, 5(4), 270-274. Retrieved from http://search.proquest.com.mutex.gmu.edu/docview/1683315551?accountid=14541 This is a research and reviews on Social networking threats and security issues. Wu, H. (2012). A review of social media security risks and mitigation  techniques.Journal of Systems and Information Technology, 14(2), 171-180.doi:  http://dx.doi.org.mutex.gmu.edu/10.1108/13287261211232180

Wednesday, November 13, 2019

Statement of Educational Goals and Philosophy :: My Philosophy of Education

Statement of Educational Goals and Philosophy When I was in High school I decided that I wanted to be a secondary teacher. At first I didn’t want to be a teacher, but a few of my teachers changed my mind. In secondary school, I was thought of as an outcast by both my peers and my teachers. I had moved from Washington D.C. to the small country town of Galax, in Virginia, and the way I talked and dressed gained allot of negative attention. People thought that I was not capable of anything but starting trouble, when in fact I was very quite and shy. This negative stereotype made school a painful experience and I did not enjoy going to school. It wasn’t until my junior year that I had teachers who saw that I was in fact a intelligent person, capable of anything. They were the ones that showed me that, given the right direction, any student can accomplish anything. They also showed me that learning could be made fun. These teachers are what made me want to teach. They made me want to be the teacher that is there to help every student reach their full potential. In the following paragraphs I will state my philosophy on education and some goals that I will meet. It wasn’t until a project that my Education 210 teacher, Miss Smith, assigned my group a project on essentialism that I realized I was an essentialist, this approach to education was made popular by William Bagley. This approach was originally thought of as being to critical of students, but the launching of Sputnik in nineteen fifty seven and â€Å"A Nation at Risk† in nineteen eighty three brought essentialism back. In all things that are done in the classroom, such as classroom management, the curriculum, teaching methods, and the ways of evaluating my students, I plan to follow the essentialist approach. I wish to do this because it is my belief that schools should instill traditional moral values and the intellectual knowledge that students need in order to become model citizens. After all, I believe that the purpose of education is to mold students into model citizens because they are future leaders.

Sunday, November 10, 2019

Education is the key to a bright future

â€Å"Education is the key to a bright future†, a statement that my parents have constantly reminded me of and has become a reality. My ambition and determination to succeed in education has prompted me to maneuver through the thickets of financial constrains to which I was predisposed throughout my early schooling life. In many occasions in the course of my education, I have been forced to halt my progress to give my parents an opportunity to gather more resources to push me forward. The hardships I encountered have shaped me into a determined student and consequently, I have engaged in many activities with the aim of ensuring that I cultivate a better life is for myself as well others in society. After completing my high school studies in Russia, the top grades attained gave me an opportunity to access college education, although this leaning stage was not a bed of roses bent on the several challenges encountered. However, my zeal to reach my goals and objectives could not give any room to despondency and hopelessness. Complacency and dwelling in the comfort zone have always been my worst enemies which I have overcome with sober mindedness and hard work. At the time, the course that I decided to study was Japanese and English studies. My choice of course was in line with my bigger vision of studying not only in Russia but also in other countries like U. S and Japan since I believed in looking for higher opportunities which can only come forth with sharpened multi-lingual abilities. It bears mentioning that financial constrains forced me to seek employment especially during the holidays. Luckily I found an opening in a certain tourism agency where I worked as an assistant record keeper, carrying out all the duties assigned diligently and effectively. The money however was inadequate since I only worked for a few hours after school and therefore I had to find some more work to adequately meet my needs. Consequently, I volunteered to teach English language in several high schools from which I earned some more income. This was a greatly supplement to what my parents earned from their cloth selling business. Eventually, my three years in college were complete and wonderful credits could not fail to reflect in my certificates. After graduating from my first college, my parents concurred with me that it was the high time I explored the academic world in a different environment having acquired the great foundation. However, the financial aspect of it had to be addressed quite explicitly to ensure that problems do not crop up in the middle of the journey. My dreams had always been to further my studies in the United States. My parents had to look for all the available means to ensure that my quest for excellence in the world of academia was fulfilled. Eventually they managed to raise funds for my flight and a part of my college tuition fee at Hunter College in New York. The background I had in Russia was of great help in my new environment where most students are English speakers. Therefore, my persistence and ability to make the right choices and appropriate decisions seemed to be paying off as my dreams of studying in America had finally come true. As a Russian transfer student, my English skills facilitated my interaction not only with my fellow college mates but also with the highly qualified teaching staff. I decided to further my studies in English and Japanese translation for which the progress was quite commendable and the grades encouraging. However, my hopes of finishing the second college were overshadowed by severe shortage of finances to cater for tuition and also my upkeep. Despite the wonderful efforts made by my parents and friends to sponsor my studies at Hunter College, there was always a deficit which made me to be in and out of college on several occasions. More often than not, I had to plead with the college administration to allow me stay in class for more days since the amount paid intermittently for my tuition was inadequate to sail me through to the end of each semester. Unfortunately, I could not make it to complete the stipulated three years period of study and therefore had to terminate my studies. However, I have never believed in impossibilities since my optimistic disposition gives no room for hopelessness. I am determined to climb the next available rung in the diverse opportunities in Berkeley College where I intend to study a Bachelors degree in Fashion Marketing and Management. As I have explained, my greatest obstacle has been shortage of funds. Therefore with a scholarship, I am sure I will have the ability to study this business course to its full length. After acquiring this precious knowledge, I intend to help my parents in marketing the various fashions of clothes they deal with and also assist them in expanding their business through good management skills. I also envision establishing my own business empire in the long run.

Friday, November 8, 2019

Martha Corey, Last Woman Hung in the Salem Witch Trials

Martha Corey, Last Woman Hung in the Salem Witch Trials Martha Corey (c. 1618–September 22, 1692) was a woman in her seventies living in Salem, Massachusetts when she was hanged as a witch. She was one of the last women to be executed for this crime and was featured prominently in playwright Arthur Millers allegorical drama about the McCarthy era called The Crucible. Fast Facts: Martha Corey Known For: One of the last people hanged as a witch in the 1692 Salem witch trialsBorn: c. 1618Parents: UnknownDied: Sept. 22, 1692Education: UnknownSpouse(s): Henry Rich (m. 1684), Giles Corey (m. 1690)Children: Ben-Oni, illegitimate mixed-race son; Thomas Rich Early Life Martha Panon Corey, (whose name was spelled Martha Corree, Martha Cory, Martha Kory, Goodie Corie, Mattha Corie) was born about 1618 (various sources list anywhere from 1611 to 1620). Little is known about her life outside the records of the trials, and the information is confusing at best. The dates given for Martha Corey in the historical records do not make much sense. She is said to have given birth to an illegitimate mixed-race (mulatto) son named Ben-Oni in 1677. If so- she would have been in her late 50s- the father was more likely a Native American than an African, though the evidence is scant either way. She also claimed to have married a man named Henry Rich in about 1684- in her mid-60s- and they had at least one son, Thomas. After he died on April 27, 1690, Martha married the Salem village farmer and watchman Giles Corey: she was his third wife. Some records say that Benoni was born while she was married to Rich. For 10 years, she lived apart from her husband and son Thomas as she raised Benoni. Sometimes called Ben, he lived with Martha and Giles Corey. Both Martha and Giles were members of the church by 1692, and Martha at least had a reputation for regular attendance, though their bickering was widely known. The Salem Witch Trials In March 1692, Giles Corey insisted on attending one of the examinations at Nathaniel Ingersolls tavern. Martha Corey, who had expressed skepticism about the existence of witches and even the devil to neighbors, tried to stop him, and Giles told others about the incident. On March 12, Ann Putnam Jr. reported that she had seen Marthas specter. Two deacons of the church, Edward Putnam and Ezekiel Cheever, informed Martha of the report. On March 19, a warrant was issued for Marthas arrest, claiming she had injured Ann Putnam Sr., Ann Putnam Jr., Mercy Lewis, Abigail Williams, and Elizabeth Hubbard. She was to be brought on Monday, March 21 to Nathaniel Ingersolls tavern at noon. During the Sunday worship service at Salem Village Church, Abigail Williams interrupted the visiting minister, Rev. Deodat Lawson, claiming she saw Martha Coreys spirit separate from her body and sit on a beam, holding a yellow bird. She claimed that the bird flew to Rev. Lawsons hat, where he had hung it. Martha said nothing in response. Martha Corey was arrested by the constable, Joseph Herrick, and examined the next day. Others were now claiming to be afflicted by Martha. There were so many spectators that the examination was moved to the church building instead. Magistrates John Hathorne and Jonathan Corwin questioned her. She maintained her innocence, stating, I never had to do with Witchcraft since I was born. I am a Gospel-Woman. She was accused of having a familiar, a bird. At one point in the interrogation, she was asked: Do not you see these children and women are rational and sober as their neighbors when your hands are fastened? The record shows that the bystanders were then seized with fitts. When she bit her lip, the afflicted girls were in an uproar. Timeline of the Accusations On April 14, Mercy Lewis claimed that Giles Corey had appeared to her as a specter and forced her to sign the devils book. Giles Corey, who defended his wifes innocence, was arrested on April 18 by George Herrick, the same day Bridget Bishop, Abigail Hobbs, and Mary Warren were arrested. Abigail Hobbs and Mercy Lewis named Giles Corey as a witch during the examination the next day before magistrates Jonathan Corwin and John Hathorne. Her husband, who defended her innocence, was arrested himself on April 18. He refused to plead either guilty or innocent to the charges. Martha Corey maintained her innocence and accused the girls of lying. She stated her disbelief in witchcraft. But the display by the accusers of her supposed control of their movements convinced the judges of her guilt. On May 25, Martha Cory was transferred to Bostons jail, along with Rebecca Nurse, Dorcas Good (misnamed as Dorothy), Sarah Cloyce, and John and Elizabeth Proctor. On May 31, Martha Corey was mentioned by Abigail Williams in a deposition as disquieting her divers times, including three specific dates in March and three in April, through Marthas apparition or specter. Martha Corey was tried and found guilty by the Court of Oyer and Terminer on September 9. She was sentenced to death by hanging, along with Martha Corey, Mary Eastey, Alice Parker, Ann Pudeator, Dorcas Hoar, and Mary Bradbury. The next day, Salem Village church voted to excommunicate Martha Corey, and Rev. Parris and other church representatives brought her the news in prison. Martha would not join them in prayer ​and instead told them off. Giles Corey was pressed to death on September 17–19, a method of torture intended to force an accused person to enter a plea, which he refused to do. It did result, however, in his sons-in-law inheriting his property. Martha Corey was among those hanged on Gallows Hill on September 22, 1692. It was the last group of people executed for witchcraft before the end of the Salem witch trials episode. Martha Corey After the Trials On February 14, 1703, Salem Village church proposed revoking the excommunication of Martha Corey; a majority supported it but there were six or seven dissenters. The entry at the time implied that the motion failed but a later entry, with more details of the resolution, implied that it had passed. In 1711, the Massachusetts legislature passed an act reversing the attainder- restoring full rights- to many who had been convicted in the 1692 witch trials. Giles Corey and Martha Corey were included in the list. Martha Corey in The Crucible Arthur Millers version of Martha Corey, based loosely on the real Martha Corey, has her accused by her husband of being a witch for her reading habits. Sources Brooks, Rebecca Beatrice. The Witchcraft Trial of Martha Corey. History of Massachusetts Blog, August 31, 2015.Burrage, Henry Sweetser, Albert Roscoe Stubbs. Cleaves. Genealogical and Family History of the State of Maine, Volume 1. New York: Lewis Historical Publishing Company, 1909. 94–99.DuBois, Constance Goddard. Martha Corey: A Tale of the Salem Witchcraft. Chicago: A.C. McClurg and Company, 1890.Miller, Arthur. The Crucible. New York: Penguin Books, 2003.Roach, Marilynne K. The Salem Witch Trials: A Day-by-day Chronicle of a Community Under Siege. Lanham, Massachusetts: Taylor Trade Publishing, 2002.Rosenthal, Bernard. Salem Story: Reading the Witch Trials of 1692. Cambridge: Cambridge University Press, 1993.

Wednesday, November 6, 2019

Visiting a Foreign Country Essay Example

Visiting a Foreign Country Essay Example Visiting a Foreign Country Essay Visiting a Foreign Country Essay for example to ask your way around the town, and will boos

Sunday, November 3, 2019

Target-Market Selection Research Proposal Example | Topics and Well Written Essays - 1250 words

Target-Market Selection - Research Proposal Example If the company does not pay enough attention in order to discern its exact target market, it could land up in trouble at the time of devising its marketing strategy since it would address a completely unknown marketing segment, one which was not asked for by the product’s target domains. Thus it is essential that the target market is selected in a proper manner as falling short on the same count could lead to wastage which no organization is willing to afford. Wastage can also happen if the secondary audience, one that is not exactly the audience for the said product is catered to the product and its message and thus there is a complete mix-up within the related ranks. (2) Beyond evaluating current businesses, designing the business portfolio involves finding businesses and products the company should consider in the future. Using the product-market expansion grid, illustrate the process that a company can use to evaluate a portfolio. Pick an example for your demonstration that is different from the one used in the text. Be sure your example covers all cells. The product-market expansion grid of Ansoff is basically a model that is useful in demonstrating a clear link between the different processes of the business unit strategy so that there is a clear cut identification of the growth opportunities for the business. Since this grid looks at product and market in different alignments, a company can analyze a portfolio by touching the method for market penetration where it could sell the product in an excessive manner by making it available in a wholesome quantity.

Friday, November 1, 2019

The Development of American Science and Technology in the Eyes of Essay

The Development of American Science and Technology in the Eyes of Henry Adams - Essay Example Firstly, it will contextualize the historical developments that led to the zenith of American development. Secondly, it will discuss the monumental feats at the early years of the Gilded Age and the important industries and figure heads during that time. The Post-Civil War, the Reconstruction Period and President Grant Important developments in the American nation happened notably during the Presidency of Ulysses Grant in 1869, after the Civil War and the offset of the Reconstruction Era. The societal context of Adams’ life at that time was in a period of aggressive American territorial expansion to the West. By traversing the annals of American history during the post-Civil War and the height of the Reconstruction, the politics of the American federal government dictated the type of society that the nation had produced during those years. President Jackson was a hostile leader but more importantly, supportive of the idea of Southern reconstruction. He was willing to give the black race, formerly slaves of the white people, the equality and freedom they were demanding before and during the Civil War. Policies such as the Human Rights of 1865, the establishment of the Freedman’s Bureau and the emancipation of slaves with the eventual abolishment of the policy of slavery was the major political aura surrounding Adams during the 1850s and the 1860s.1 This meant that the society of Adams allowed the osmosis of both races - the whites and the clacks. Parallel with the developments in the political sphere of the United States, accompanying technological advancements had been enhanced at the entrance of President Grant’s administration. This was made possible through the seizure of the Southern plantations under the supervision of the American federal government. In this case, the predominant industrial states up North worked in hand with the agricultural aggregates of the South.2 The formerly debating economies of the North and the South had been complementing one another towards a definite linear development of what would turn out to be a strong American economy. Adams writes in his recollections that the United States at the late 19th century and the dawn of the early 20th century had been fully industrialized. Scientific and technological advancements were the turning points of the time.3 The rise of big businesses and the industrialization of the agricultural sector served the economy well. The United States had almost been immediately marked as one of the rising superpowers of the international scene.4 By analysing what Adams had written, it can be said that based on his words, a rich capitalist-oriented society was at its peak. By his experiences after the Civil War and with the subjugation of the South by the North, political stability went in favor for the Republican Party. In such case, Republican policies and the support of free labor was the basis of American economy.5 The Gilded Age and the Emergence of the Amer ican Oligarchy Adams’ recollection in the chapters â€Å"The Dynamo and the Virgin†, â€Å"The Height of Knowledge† and â€Å"The Grammar of Science†, the author infers the development of America with the entrance of the Gilded Age of politics and economy. Adams greatly details the happenings which surround

Wednesday, October 30, 2019

Anlysis of The Dechra PLC Essay Example | Topics and Well Written Essays - 1250 words

Anlysis of The Dechra PLC - Essay Example 36.6 million and ?11.7 million, respectively. The paper illuminates Dechra PLC’s investment, financing, and dividend payout trends in the recent years. Moreover, the paper will also conduct an in-depth analysis of the financing, investing, and dividend trends using tools such as standard deviation, averages and charts. Part 1: The company in the recent past has undertaken significant investments, changes in divided policy, and changes in its capital structure. Changes in capital structure In general, over the last five years the company has been experiencing increase in the indebtedness. In the year 2009, the company was indebted to a tune of 23.08 while in the year 2013 the indebtedness has swollen to 103.84 in just a span of five years (Dechra, 2013). This is not a good indicator in the financial statement because the more the debts the company the company has the worse its leverage ratio gets. The thumps rule requires that the ratio should not be higher than 1. That is to s ay that the debt to equity ratio should be 50:50. In the case of Dechra PLC., this is not the case the leverage ratio judging from the table below. In order to clear its debt and register a sound capital structure the company has embarked on an ambitious process to sell off its veterinary services wing at a cost of GBP 86.2 million with transaction costs and taxation on disposal cost expected to cost 0.9 million and 0.4 million respectively. The proceeds from these sales will be used to offset the debts of the company. This viable move will overhaul the financial structure of the company for the better and put its going concern concept back on track. Capital structure of Dechra PLC in the last five years Year 2013 2012 2011 2010 2012 Non current debt (millions) 103.84 114.05 56.08 17.76 23.08 Shareholders equity (millions) 174.62 103.68 98.33 86.23 80.69 Leverage ratio 1.68 0.909 1.753 4.855 3.496 Retrieved on 8 November 2013 from http://www.hl.co.uk/shares/shares-search-results/d/d echra-pharmaceuticals-plc-ordinary-1p/financial-statements-and-reports Changes in investment The company is strategically involved in various investment activities that will ensure that it commands a sizeable share of the pharmaceutical industry. One such investment is the acquisition of â€Å"Eurovet Animal Health B.V.† which was acquired on 5th of April, 2012. This acquisition is in line with the company expansion strategy. The strategy goes a long way to ensure that the company expands its foothold into the pharmaceutical market (Dechra, 2013). The other strategic investment that has been effected by the company is the successful exclusive worldwide licensing agreement with SCYNEXIS Inc. the exclusive license gives the company the authority to manufacture and commercialize SCY-641, a medication used in the treatment of KCS. This world right to produce this drug is a great achievement for the company that cements the company’s going concern concept. Changes in divide nd policy The company has been steadily increasing its dividend payout over the years judging by the financial reports in the last five years. It is worth noting that dividend policy is the discretion of the management of Dechra PLC. They have the freedom to settle on any kind of distribution policy whether stock repurchase, share split, or dividend policy (Booth & Maksimovic, 2001). It is worth noting that Dechra has over the years stuck to dividend payout as their default distribution