Saturday, December 28, 2019

Walt Disney And Steve Jobs - 1458 Words

Throughout many generations of remarkable feats the late Walt Disney and Steve Jobs are two men who were influential to their eras. Both gentleman had tremendous capabilities that surpassed the average person. Their creativity allowed them to dream big, but even better they made dreams a reality. Walt Disney and Steve Jobs had many things in common, such as aspects of imagination. However, the two men were from different time periods. Disney was born in 1901 in Chicago, while Jobs was born in 1955 in San Francisco. Both men were molded by two different eras, where Disney was generally more formal, wore a suit and had a conservative businessman personality of the 1920’s , while Jobs demonstrated the fast-paced, shirt and jeans, over-optimistic mentality during the dawn of the technology period of the 1960s throughout the 21st century. They also deviated in their different managerial styles, had many diverging ideas about creative endeavors, and also differed in the beliefs of w hat their esteemed audiences and customers desired and deserved. But, beyond their visionary concepts, both gentlemen shared an aspect that would link them and their legacies into the fabric of American business and culture: Failure. By encountering failures throughout their lives, Disney and Jobs’, were able to cultivate a mentality to push beyond the ordinary. Before Disney’s Mickey Mouse, he would first have to lose the rights to Oswald and his other cartoons. Jobs’ would first encounter failureShow MoreRelatedThe Most Important Characteristics Of A Leader Essay1271 Words   |  6 Pagesimportant characteristics of a leader is their imagination. P2: Some people think the most important attribute of a leader is knowledge. ∠´ I agree with both positions since some leaders are effective based on their comprehensive knowledge of their job, whereas other leaders are extremely effective based on their extra ordinary imagination. Is it more important for a leader to have imagination or knowledge? A person that possesses an imagination can be exposed to a wider world of wisdom. PeopleRead MoreConflict at Walt Disney- Case Study1170 Words   |  5 PagesConflict at Walt Disney Eve Stapler Webster University Conflict at Walt Disney Within every organization there is some type of conflict, whether the conflict is personal, organizational or emotional. But the key is to manage the conflict so as to not hinder the profitability, functionality or public image of the company so that it is viable competitively. In the case of the Walt Disney Company, although the company had conflict within the organization, this did not hinder its competitivenessRead MoreInnovate the Pixar Way1279 Words   |  6 PagesProducts: feature films, short-films, animations, commercials, softwares Key people: †¢ Ed Catmull, President,Walt Disney Animation Studios Pixar Animation Studios †¢ John Lasseter, Chief Creative Officer, Walt Disney Animation Studios Pixar Animation Studios †¢ Steve Jobs, former CEO of Pixar Animation Studios and member of the Board of Directors at The Walt Disney Company Owner: The Walt Disney Company (since 2006) About the book INNOVATE THE PIXAR WAY (2010) by Bill Capodagli and Lynn Jackson †¢Read MoreInnovate the Pixar Way1285 Words   |  6 PagesProducts: feature films, short-films, animations, commercials, softwares Key people: †¢ Ed Catmull, President,Walt Disney Animation Studios Pixar Animation Studios †¢ John Lasseter, Chief Creative Officer, Walt Disney Animation Studios Pixar Animation Studios †¢ Steve Jobs, former CEO of Pixar Animation Studios and member of the Board of Directors at The Walt Disney Company Owner: The Walt Disney Company (since 2006) About the book INNOVATE THE PIXAR WAY (2010) by Bill Capodagli and Lynn Jackson Read MorePixar Of Pixar Animation Studios1106 Words   |  5 Pagesindividuals, was spun out as a corporation in February 1986 with investment by Steve Jobs shortly after he was fired from Apple (4). Jobs paid $5 million to George Lucas for technology rights and put them and $5 million cash as capital into the company. Pixar revenue has been doubled significantly during 1995 to 2003 especially after releasing Toy Story series. The significant milestone in Pixar history was when Walt Disney acquired the company by 5.7 billion dollar. In This paper, strategic decisionsRead MoreMerger Between Walt Disney and Pixar1070 Words   |  5 Pagesthat choice to compare and contrast. While researching the information on Disney and Pixar, I came across some differences between Steve Jobs and Michael Eisner regarding how the two companies will work together. Going through the articles that I have read through they all show that Disney and Pixar has always been competing against each other on who can make the best animated motion picture. Here is a little history Disney has always been about producing animated features and live-action movies andRead MoreDisney996 Words   |  4 PagesAnimation. The book, about the making of the Disney animated film Sleeping Beauty, proved to be a revelation for Lasseter. He discovered that people could earn a living by developing cartoons. Lasseter started writing letters to The Walt Disney Company Studios regarding his interest in creating cartoons. Studio representatives, who corresponded with Lasseter many times, told him to get a great art education, after which they would teach him animation. When Disney started a Character Animation ProgramRead MoreThe Conflicts And Politics Of Walt Disney1323 Words   |  6 Pagesdiscord which arises as a result of the opposition of needs and interests between the employees who are working together. The various conflicts and politics which affected Walt Disney in the past were caused by the falling company under the management of Michael Eisner. During the early 2000 s, Eisner who was the then CEO of Walt Disney was under a lot of criticism due to the company s falling performance and also his centralized decision-making process. The major cause of the conflicts was that thereRead MoreMergers and Acquisition939 Words   |  4 Pagesmanagement work to achieve a common goal, being the best at what you do, and getting there as fast as possible. As companies work hard to beat their competitors they accept many tactics to do so. As for my assignment, I have chosen to examine why Disney and Pixar merged as a company. A brief definition of an Acquisition and a merger will be given following with the difference between them. I will be discussing if these two companies were a success or a failure and why and which were their reasonsRead MoreCase Conflict at Walt Disney880 Words   |  4 PagesManagement Organization ____________________________________________________________________________ Week 6 Case Assignment 1. How would you describe the conflict between Michael Eisner and the Weinstein brother, the two board members (Disney and Gold), and Steve Jobs† Was it functional or dysfunctional? The functional conflict is defined as a confrontation between groups that enhances and benefits the organization’s performance’ while dysfunctional conflict is defined as any confrontation or interaction

Friday, December 20, 2019

Hiv / Aids As A Pandemic For Global Health - 2101 Words

A little over three decades ago, reports emerged of a new virus that was outbreaking in parts of the United States. Within the first twelve months of these reports, the disease sprung up among particular people groups such as homosexual men, patients with hemophilia, intravenous drug users and blood-transfusion recipients. Shortly after, an epidemic of AIDS emerged in Central Africa, particularly affecting women. Little was it known at that time that these small handful of cases would eventually multiply into the tens of millions of cases that makes HIV/AIDS one of the greatest epidemics in the modern history of global health. This essay seeks to demonstrate that although HIV/AIDS is one of the greatest health threats to the international community, interventions can be created which allow the successful treatment, prevention, care and support for communities facing the pandemic. Before discussing how HIV/AIDS has become a pandemic for global health, it is important to first establish an understanding of what exactly HIV/AIDS means and how the disease has been able to spread so rapidly across many countries and continents. The Human Immunodeficiency Virus (HIV) attacks the immune system and undermines a person’s ability to fight infections. As the virus destroys and weakens the immune cells vital functions, individuals become immunodeficient which results in increased vulnerability to a range of diseases and infections (WHO 2016). The most advanced stage of HIV infection,Show MoreRelatedThe Presence And Outbreak Of An Infectious Disease1176 Words   |  5 Pagesdisease can have global consequences. Such consequences include the deaths of many people due to an inability to contain the disease. When an infectious disease spreads to, and affects, different populations, this is known as a pandemic. One pandemic that has had far reaching consequences is th at of HIV (human immunodeficiency)/AIDS (acquired immune deficiency symptoms), which officially began in 1981 and since has taken the lives of over 39 million people worldwide (PBS). The HIV virus attacks one’sRead Moreecological model of health1211 Words   |  5 PagesApplying the IOM’s (Institute of Medicine) Ecological Model of Health Abstract This paper discusses how IOM’s ecological model can be used to stop the AIDs pandemic which is a health issue globally. This is because the number of people infected with the disease has increased over the years, since the first case was reported. Statistics show that over 34 million people are infected globally. The disease has been declared a pandemic due to the effects it has caused globally. Therefore, urgencyRead MoreStephen Lewis, A Canadian Politician And Humanitarian1311 Words   |  6 Pagessuffer through the AIDS pandemic, and critically examined how the neglect of global communities and their discrimination contributed to its failure to resolve. While the rest of the world seemed to be unresponsive to an AIDS-ravaged continent, Mr. Lewis found himself passionately involved in the crisis and began to take action. Since his involvement with the United Nations in 1984, Stephen Lewis has tirelessly advocated for African citizens affected by HIV and AIDS, ensured that health care and treatmentRead MoreCommunicable Disease: HIV/AIDS1243 Words   |  5 Pagesï » ¿Communicable Disease: HIV/AIDS What is a communicable disease? A  communicable  disease  is carried by microorganisms and transmitted through people, animals, surfaces, foods, or air.  Therefore, communicable diseases rely on fluid exchange, contaminated substances, or close contact to travel from an infected carrier to a healthy individual. The  disease  might need a blood exchange via an injection, float along a  sneeze  in a movie theater, or transmitted through childbirth. Hence, a human-to-humanRead MoreHuman Development Index to Measure Living Standards Within a Country, Especially HIV883 Words   |  4 Pagesstressing the ‘living’ rather than the means of attaining it (GDP). Thus, proposing an index that could function as a standpoint for economic and as well as social improvement. Among the various components found in the HDI there are 3 important ones: Health, Education and Wealth (United Nations Development Programme, 2013). Nevertheless, this indicator, since its conception, never stopped being criticised. (Srinivasan, 1994) Suggested that poor data quality was rampant in the HDI calculation, especiallyRead MoreHuman Immunodeficiency Virus ( Hiv ) / Aids1278 Words   |  6 PagesHuman immunodeficiency virus (HIV)/AIDS is a pandemic problem affecting global health. At the end of 2015, 36.7 million people were living with HIV/AIDS globally. The rate of incidence is more prevalent in Sub-Saharan Africa with almost 1 in every 24 adults living with HIV/AIDS. In the united states, HIV/AIDS is a diversified health problem affecting all sexes, ages and races and involving the transmission of multiple risk behavior. However, with the introduction of various prevention programs andRead MoreHiv / Aids : A Global Health System1606 Words   |  7 PagesHIV/AIDS: A global health system Rita K. Asiedu Rutgers University Abstract Human immunodeficiency virus (HIV)/AIDS is a pandemic problem affecting global health. At the end of 2015, 36.7 million people were living with HIV/AIDS globally. The rate of incidence is more prevalent in Sub-Saharan Africa with almost 1 in every 24 adults living with HIV/AIDS. In the united states, HIV/AIDS is a diversified health problem affecting all sexes, ages and races and involving the transmission of multipleRead MoreArticle 567 Of The 2009 Burundian Penal Code1450 Words   |  6 Pagesnew law has amplified the challenges of preventing HIV/AIDS within this community, which in turn negatively affects the overall efforts for global eradication of HIV. Reports of AIDS in Burundi first surfaced in 1983. At the time, same-sex behavior was not considered a criminal act. In fact, Burundi does not always have a history of homophobia - especially compared to the discrimination faced in its neighboring countries. Today in Burundi, HIV is one of the major causes of fatality. In 2015, aboutRead MoreGlobal Health Essay1345 Words   |  6 Pagesanticipate, prevent, and ameliorate global health problems would diminish Americas stature in the realm of health and jeopardize our own †¨health, economy, and national security, stated by The Institute of Medicine. Global health refers to health phenomenon that transcends across national borders. For instance, global health would address predicaments such as: infectious and insect-borne diseases that can spread from one country to another. Thus, global health should be addressed by collaborativeRead MoreHuman Immunodeficiency Virus ( Hiv )1416 Words   |  6 PagesHuman Immunodeficiency Viru s (HIV) has been scouring the planet for over three decades. It has a powerful ability to deteriorate a human body in a small length of time. This deadly virus attacks the human body’s immune system and can only survive in the human as its host. The virus is only contracted through body fluid exchange, for example, vaginal fluid, semen, intravenous drug users, and sexual intercourse is the most common way of contracting it. The virus attacks the T cells (type of white

Thursday, December 12, 2019

Rationale of Expansionary Monetary Policy †MyAssignmenthelp.com

Question: Discuss about the Rationale of Expansionary Monetary Policy. Answer: Introduction: Canadian economy is growing in a fast pace due to various reasons such as GDP, increasing employment rate and expansionary fiscal policy management. The economy of Canada experienced a growth rate in its GDP by 3.7 percent, which in turn increased the household expenditure by 1.1 percent. The county also experienced a growth in its exports by 0.2 percent in its fourth quarter. Other factors that is affects the growth rate of the Canada is its increasing population. Canada experienced n increase in its population from 34.9 million to 36.5 billion. The country also experiences a high literacy rate of 97 percent. Thus, the country experiences an increase in its growth rate by 2 percent. The overall positive environment of the country puts a positive impact on the demand for liquor. This is because people of the country are educated and has the purchasing power required to buy liquor. The high purchasing power f the consumer also shows that they love to lead a high-class life (Hall, Robe rt Marc Lieberman, 2012). From the above figure, it can be seen that due to the above-mentioned factors has put a positive impact on the demand for liquor. The aggregate quantity demanded for liquor has increased from Q to Q1. Such an increase is because of increasing living standard of the people and increasing preference for liquor. The change in aggregate demand for liquor is mainly due to changes in other factors rather than price (Baumol et. al., 2015). Thus, the price for liquor is unaffected in the above diagram. Moreover, the product Tequila is considered as a luxury item and thus, it has a relatively elastic demand. The demand for this product is not affected too much extent. With a change in the factors of the economy such as GDP rate, unemployment, purchasing power and the changing life style of the people the demand for liquor will increase but not to that extent (Wetzstein, 2013). The country of Canada aimed at a GDP growth rate of 2 percent in 2017 and a inflation rate between 1 to 3 percent. According to the policy goals of Canada, the country has been able to achieve the growth rate of 1.5 percent and an inflation rate of 1.2 percent (Ryan-Collins, 2015). The monetary policy of the country had the objective of achieving a stable, predictable and low inflation economy. Thus, the country always aimed at two policy components such as inflation control policy and flexible exchange rate policy. In reducing inflation in the country the nation has also targeted a high interest rate policy on loan and mortgages. From the above figure, it can be seen that Canada has experienced an increase in its GDP growth rate management in 2017 compared to its past years. It has a GDP growth rate of 2.7 percent in 2015which increased to 2.8 in 2016. Presently in 2017, the GDP growth rate of Canada increased to 3.7, which even exceeded the estimated growth rate of 3.6 percent. Thus, the economy of Canada is expanding at a faster rate (Svensson, 2015). Figure 3 shows the trend in the inflation rate in Canada from 2015 to 2017. The company had a inflation rate of 1.5 in 2015 which increased by 1 percent to 1.6 in 2016. However, the policy maker of the country aimed to keep the inflation rate between 1 to 3 percent in 2017. According to the data of 2017 in the first two quarters, the country has been able to cut down its inflation to 1.2 percent by increasing its interest rate on loan and mortgages (Argy, Nevile, 2016). From the above figure and data, it is clear that Canadian economy has experienced an increase in its GDP and fall in its inflation rate over the past three years. The economy has been able to achieve the target growth rate and the inflation rate according to the policy of the country. However, on curbing the inflation the bank has increased the interest rate over loans and mortgages (Ekelund Jr, R.B. Hbert, R.F). (2013. This has reduced the money in the hand of the people. On the other hand, the country has experienced an increase in the GDP growth rate over the last three years. This has put the consumers in a better condition. Thus, it can be seen that the country will experience an increase in the demand for liquor, as people are becoming rich and high living style. However, the aggregate demand will not increase to that extent as the government is curbing the money from the hands of the people to curb inflation (Mankiw, 2014). Thus, the data that is presented in the above questi on helps to give the same prediction as stated in question one. Liquor consumption is increasing in Canada at a relative rate even though the government is trying to curb the money from the hands of the people. This is because people of Canada are fun loving and like to lead a good life even with limited amount of money. The GDP of the Canadian economy is very high. As a result of which people the purchasing power of the people will increase. The government will thus adopt deflationary fiscal policy to stabilize the economy. When the government adopts tight fiscal policy, there will be fall in the aggregate demand of liquor. The Government will raise the tax on liquor and thus it will increase the price of liquor. Thus, higher amount of taxes will reduce the spending of the consumers (Sims, 2016). This will also help the government to improve the deficit budget. When the government reduces its expenditure and borrowings, there is increase in the supply of funds in the credit market and thus the interest rate falls. This leads to crowding in effect on the economy. The exchange rate (MXP-CAD) in such a situation will increase and thus will be profitable for the Government (Bordo Landon-Lane, 2013). The expansionary monetary policy will make the consumption attractive compared to the savings. The products will become cheaper for the people of the other economies and it will help the exporters because the exports will become cheaper and it will also boost up the demand Moreover, these expansionary monetary policies will also increase the aggregate demand and thus boost up the economic growth (Bekaert, Hoerova, Duca, 2013). There will be increase in money supply in the economy and thus fall in the interest rate. This low rate of interest will encourage the business firms to invest and the consumers will be attracted to spend more. Moreover low interest rate will make the borrowings cheaper. This will also lower the incentive to save of the people. The exchange rate (MXP-CAD) will fall if there is expansionary monetary policy. This will strengthen the current account thus weaken the financial economy. As the financial condition of the economy declines, the current account will imp rove and thus it will also improve the balance of trade of the country. Thus, the GDP will increase and it will lead to increase in the imports (Hommes, Massaro Salle,2015).). When the government adopts expansionary monetary policy, the exchange rate will fall. This will lower the quantity of imports and thus increase the exports when they are denominated in terms of CAD. This is because CAD will become cheaper for the export countries importing liquor from Canada. These will increase the sales of the domestic firms. The exports will increase when the sale of tequila in terms of Canadian dollar remains unchanged. The imported goods will become more expensive and thus this will lead to inflation in the economy (Cochrane, 2016). When the government adopts deflationary fiscal policy, the exchange rate in terms of CAD will increase. The quantity of imports will increase and the exports will fall. This is because with an increase in the value of exchange rate CAD will become costlier for the foreign company importing Canadian liquor.The sales of the domestic firm will decrease when the value of the Canadian dollar remains unchanged. The value of Mexican peso will increase and thus there will be appreciation in the exchange rate. The imported goods will become cheaper (Ma, 2015). Reference list Argy, V. E., Nevile, J. (Eds.). (2016).Inflation and Unemployment: Theory, Experience and Policy Making. Routledge. Baumol, William J., Alan S. Blinder.Microeconomics: Principles and policy. Cengage Learning, (2015). Bekaert, G., Hoerova, M., Duca, M. L. (2013). Risk, uncertainty and monetary policy.Journal of Monetary Economics,60(7), 771-788. Bordo, M. D., Landon-Lane, J. (2013).Does expansionary monetary policy cause asset price booms; some historical and empirical evidence(No. w19585). National Bureau of Economic Research. Canada Inflation Rate | 1915-2017 | Data | Chart | Calendar | Forecast. (2017).Tradingeconomics.com. Retrieved 29 August 2017, from https://tradingeconomics.com/canada/inflation-cpi Cochrane, J. H. (2016, April). The Fiscal Theory of the Price Level and its Implications for Current Policy in the United States and Europe. InNext Steps for the Fiscal Theory of the Price Level conference at the Becker Friedman Institute for Research on Economics at the University of Chicago(Vol. 1). Ekelund Jr, R.B. Hbert, R.F. (2013).A history of economic theory and method. Waveland Press. GDP growth (annual %) | Data. (2017).Data.worldbank.org. Retrieved 29 August 2017, from https://data.worldbank.org/indicator/NY.GDP.MKTP.KD.ZG Hall, Robert E., Marc Lieberman.Microeconomics: Principles and applications. Cengage Learning, (2012). Hommes, C., Massaro, D., Salle, I. (2015). Monetary and Fiscal Policy Design at the Zero Lower Bound: Evidence from the Lab.CeNDEF working paper, (15-11). Ma, C. F. (2015). An Insight on the Rationale of Using Expansionary Monetary Policy during the Great Recession.University of Toronto Economic Review, 58. Mankiw, N. G. (2014).Essentials of economics. Cengage learning. Ryan-Collins, J. (2015). Is monetary financing inflationary? A case study of the Canadian economy, 1935-75. Sims, C. A. (2016, August). Fiscal policy, monetary policy and central bank independence. InKansas Citi Fed Jackson Hole Conference. Svensson, L. E. (2015). The possible unemployment cost of average inflation below a credible target.American Economic Journal: Macroeconomics,7(1), 258-296. Wetzstein, M.E. (2013).Microeconomic theory: concepts and connections. Routledge.

Wednesday, December 4, 2019

Innovation Trends in Computing and Communication †MyAssignmenthelp

Question: Discuss about the Innovation Trends in Computing and Communication. Answer: Introduction: The relation of hacking and IT is as old as they are. It has been more than a century in occurrence of hackers. From early 19th century, issue of hacking was encountered by IT users (Information Technology Law, 2017). In old days, hacking was done in very common ways by sending small harmful programing scripts to users computer, through virus attack and by using floppy disks frequently on different computers to spread virus. These all methods had potential to violate system security. Now, the area of hacking has become wider and causes different issues that I will discuss in segment of this report. Hacking has been implementing for last many years and it is a way to illegally access information from computers without taking permission from its owner. In case of IT, hacking is related to unauthorized access of systems and networks to get confidential information from them (Advocatekhoj.com, 2017). To implement this approach malware and other virus attacks are implemented. The main issue here is that hacking can cause high level damages to the networks, computing devices and some other losses of finance, information and reputation of users (Ncsl.org, 2017). Why Hacking is a Threat? Besides this, hacking is always considered as a big threat for users of information technology. There are several reasons that why hacking is a threat for IT that are listed as below (Itstillworks.com, 2017): It is one of the main reasons that hacking is considered as a threat. Hackers spread virus into system by using harmful executable programming scripts. This virus causes problems in functionality of system holistically and it becomes difficult for users to work with system and to control the spreading of virus (Comodo Antivirus Blogs | Anti-Virus Software Updates, 2017). Moreover, with the help of hacking bugs and operational mistakes can be raised into software solutions (Cyber.laws.com, 2017). Another big threat of hacking is that it causes severe problems for supporting system or network infrastructure in IT (Intelligentedu.com, 2017). Through hacking attacks, it is possible for hackers to raise issues of power failure, loss of communications, network damage and information leakage etc. (Ravi Sharma, 2012). This threat of hacking in information technology leads to system poor performance and loss of resources of information (Identity-theft-scout.com, 2017). Another biggest threat is of security and privacy of information (Ikarussecurity.com, 2017). Due to accidental hacking attacks, various issues in installation and maintenance of security tools occurs and it raises security issues of information for users. If security tools will not work properly then it will become easier for hackers to conduct attack on networks and computer systems (Dr. Dobb's, 2017). Furthermore, databases can be accessed from remote locations easily by cyber-attackers. This is all happened in absence of security tools system becomes weak and it is easy to violate its security and privacy. Due to above discuss reasons, hacking has always been a big threat for users of information technology and there is no doubt to say that hacking and phishing attacks has potential to obtain personal information from users of IT. Now from above discussion it is cleared that hacking is a big offence and causes so much damage for IT users. Therefore, some essential preventative approaches must be implemented to get rid of hacking attacks. What is available to protect against Hacking? The aim of this report is to identify and discuss a latest and advanced software solution that can provide protection against hacking. The most commonly available software solutions are antivirus software, firewall and anti-spyware software. These solutions must be used by IT users to control hacking attacks (T. Manirathnam, R. Devi, Dr. A. Muthukumaravel, 2014). First of all, if I talk about anti-virus software solution then it is easy to configure into system and it gives alert to users at identification of a virus. Moreover, antivirus software solution can fix virus or bug into system (Webroot.com, 2017). In this case, antivirus is useful for getting prevention against hacking in IT (CNBC, 2017). Another available software solution is firewall. It is an in-built software in operating system that must be in on mode (Schlesinger, 2017). Firewall detects unknown entities that try to enter into system and can cause damage. These entities can enter through any content that is downloade d from different website and it is in form of pop-ups or notifications (Y. Huang, Z. Huang, H. Zhao, X. Lai, 2014). Here, firewall restricts harmful pop-ups and allows users to block these pop-ups. Hackers mostly uses these techniques to access information from users systems. Besides this, anti-spyware software solution is also an essential tool that can be used to get prevention from hacking. It is commonly observed that hackers use spyware software to gather personal information of users without their permission. It is a harmful software and it is difficult to remove from system in which it is resided. In this case, anti-spyware software solution is used as a preventative approach of hacking. It is an effective solution to combat spyware. Like firewall and anti-virus, anti-spyware also provides real time protection to its users. So these are some operative solutions to control problems hacking information technology. Literature Review about Current Software Solution As I have discussed some commonly used software solutions that are easy to use to resolve problem of hacking IT (Tonge, 2013). But with further analysis, I got to know that according some researchers point of view OTP is an emerged solution that can provide better prevention from hacking issues. These researchers work in field of automation and cyber security for protection of data and they truly believe that OTP is an appropriate solution to maintain security and privacy of IT users. In case of online transactions and to perform other online activities on banking and business level websites, security and privacy must be maintained both at developers and users end (More, 2017). In this situation, a solution that we can use is OTP i.e. One Time Password. It is used for authentication of account or for opening any file. There are number of researchers that are working in this field and give assurance that it is a reliable and secure solution to stop hacking in information technology (E . Kalaikavitha etl [14]). These researchers also defines that how OTP is helpful in daily routine to set mobile and system authentication. OTP is generated with the help of a mathematical formulae and after generating OTP it is sent to the user through SMS on his mobile for authentication of his online account (E. Kalaikavitha, J Gnanselvi, 2013). OTP is highly recommended to use in case of mobile banking or internet banking where authentication of users account is very much important (Shesashaayee [15]). According to T. Saini [16], a new OTP is generated at every transaction and here genetic algorithm is used with a cryptography approach of elliptic curve. Getting new OTP every time enhances security of online users account and they do not need to worry about old passwords (T. Saini, 2014). One Time Password is one of secure techniques of prevention from hacking. The main factor of OTP enhances its efficiency is use of biometric authentication technique that increase security and p rivacy of users account at large extent. Furthermore, use of SHA algorithm is also important aspect of development of OTP. Now whenever any user do online transactions or send any important information regarding users account then OTP is highly preferred to use (Lidan Shou, He Bai, Ke Chen, and Gang Chen, 2014). Nowadays, most of the business organizations, banking institutions and ecommerce business organizations are using this software approach to enhance security level of their services for its users. Therefore, after this whole discussion I can say that OTP is an advanced solution that can be used for controlling hacking and phishing attacks (Saranya, T., Shalini, A., Kanchana, A, 2014). It is also defined by OTP developers that phishing attacks can also be controlled with the help of this technique. The use of one time password decreases the risk of security in case of overall process of authentication (M.H. Khan, 2014). There is no doubt that issues of cyber security are increasing day by day and it is time to resolve these issues by using advanced techniques. Although OTP is considered a better security approach, but there are other detection techniques are also available that can be used by users according to requirements to constrain hacking (A. K. Kushwaha, 2014). Conclusion To sum up, I can say that hacking is vulnerable in case of information technology and it can be severe if proper solutions will not be used by developers and users. Therefore, above discussed solutions must be taken into consideration seriously. These prevention approaches will allow users to maintain high level security and privacy of their systems and online accounts. Additionally, before start usage of every security method it will be better to get its fundamental knowledge. References Information Technology Law. (2017). Hacking - Information Technology Law. [online] Available at: https://ictlaw.com/computer-crime/hacking/ [Accessed 27 Oct. 2017]. Ncsl.org. (2017). Computer Crime Statutes. [online] Available at: https://www.ncsl.org/research/telecommunications-and-information-technology/computer-hacking-and-unauthorized-access-laws.aspx [Accessed 27 Oct. 2017]. Advocatekhoj.com. (2017). Hacking with Computer system | Information Technology Act, 2000 | Bare Acts | Law Library | AdvocateKhoj. [online] Available at: https://www.advocatekhoj.com/library/bareacts/informationtechnology/66.php?Title=Information%20Technology%20Act,%202000STitle=Hacking%20with%20Computer%20system [Accessed 27 Oct. 2017]. Itstillworks.com. (2017). Cite a Website - Cite This For Me. [online] Available at: https://itstillworks.com/negative-effects-hackers-2867.html [Accessed 27 Oct. 2017]. Cyber.laws.com. (2017). Hacking - Cyber | Laws.com. [online] Available at: https://cyber.laws.com/hacking [Accessed 27 Oct. 2017]. Intelligentedu.com. (2017). Chapter 18: Threats, Attacks, Hackers Crackers. [online] Available at: https://www.intelligentedu.com/computer_security_for_everyone/18-threats-attacks-hackers-crackers.html [Accessed 27 Oct. 2017]. Identity-theft-scout.com. (2017). Computer Hacking a Serious Threat to Your Identity Security. [online] Available at: https://www.identity-theft-scout.com/computer-hacking.html [Accessed 27 Oct. 2017]. Ikarussecurity.com. (2017). Hacking: prevention and how to handle - IKARUS Security Software. [online] Available at: https://www.ikarussecurity.com/support/information-advice/ikarus-security-recommendations/hacking-prevention-and-how-to-handle/ [Accessed 27 Oct. 2017]. Comodo Antivirus Blogs | Anti-Virus Software Updates. (2017). 5 Simple Steps to Protect Your PC from Malware Hackers. [online] Available at: https://antivirus.comodo.com/blog/computer-safety/5-simple-steps-protect-pc/ [Accessed 27 Oct. 2017]. Dr. Dobb's. (2017). Best Practices for Protecting against Viruses, Spyware, and Hacking. [online] Available at: https://www.drdobbs.com/security/best-practices-for-protecting-against-vi/212700118 [Accessed 27 Oct. 2017]. Ravi Sharma, Study of Latest Emerging Trends on Cyber Security and its challenges to Society, International Journal of Scientific Engineering Research, Volume 3, Issue 6, June-2012 1 ISSN 2229-5518 IJSER 2012 Saini, One Time Password Generator System, International Journal of advanced research in computer science and software Engineering, Vol. 4, Issue 3, 2014. Tonge, A. (2013). Cyber security: challenges for society- literature review. IOSR Journal of Computer Engineering, 12(2), pp.67-75. Kalaikavitha, J Gnanselvi, Secure Login Using Encrypted One Time Password (Otp) and Mobile Based Login Methodology, Research Inventy: International Journal of Engineering and Science, Vol. 2,Issue 10, pp. 14-17, 2013 Manirathnam, R. Devi, Dr. A. Muthukumaravel, Supporting privacy protection in personalized web search, International Journal of Innovative Science, Engineering Technology, Vol. 1 Issue 6, pp 326-330, 2014. Schlesinger, J. (2017). Why the emerging ransomware threat's next target could be your smartphone or tablet. [online] CNBC. Available at: https://www.cnbc.com/2017/05/19/new-hacking-threats-fingerprint-vulnerabilities-and-sophisticated-ransomware.html [Accessed 27 Oct. 2017]. Webroot.com. (2017). Computer Hackers Predators. [online] Available at: https://www.webroot.com/in/en/home/resources/articles/pc-security/computer-security-threats-hackers [Accessed 27 Oct. 2017]. CNBC. (2017). Prepare for hackers to change your credit score. [online] Available at: https://www.cnbc.com/2016/03/09/the-next-big-threat-in-hacking--data-sabotage.html [Accessed 27 Oct. 2017]. More, R. (2017). How to Protect Your Computer from Hackers, Spyware and Viruses. [online] Online Tech Tips. Available at: https://www.online-tech-tips.com/computer-tips/how-to-protect-your-computer-from-hackers-spyware-and-viruses/ [Accessed 27 Oct. 2017]. Lidan Shou, He Bai, Ke Chen, and Gang Chen, Supporting Privacy Protection in Personalized Web Search, IEEE transactions on knowledge and data engineering, Vol.26, no.2, 2014. Huang, Z. Huang, H. Zhao, X. Lai, A new One-time Password Method, IERI Procedia 4,pp. 32-37, 2014. M.H. Khan, OTP Generation using SHA, International Journal on Recent and Innovation Trends in Computing and Communication, Vol. 3, Issue 4, pp. 2244-2245. Saranya, T., Shalini, A., Kanchana, A., International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, Issue 3, pp. 3577-3584, 2014. K. Kushwaha, A Survey: Novel Approach Secure Authentication Technique by One Time Password using Mobile SMS, Journal of Global Research in Computer Science, Vol. 3, No. 11, 2012.

Thursday, November 28, 2019

Performance Related Pay free essay sample

Performance-related pay (PRP) is a financial rewarding system that links pay awarded to the work output of employees (CIPD, 2013). It is connected directly to individual, group and organisational performance (Armstrong, 2005). In the late 1980s and early 1990s, performance pay scheme became prevalently used in both private and public sectors in UK organisations, where it is perceived to be a motivation tool. 2. Theories about PRP As Thorpe and Homan (2000), the role of incentive pay in employee motivation nearly sets up on psychological theories. Locke and Latham (2004) define motivation as internal factors that impel action and to external factors that can act as inducements to action. The theories of motivation provide a solid theoretical basis for the study of the use of financial rewards for stimulating employees to higher levels of performance for the achievements of organizational objectives (Schuler, 1998). Expectancy theory and equity theory offer the fundaments for performance-related pay. 2. 1 Expectancy theory Expectancy theory is relied on expectations that people bring with them to the work situation, and the context and the way in which these expectations are satisfied. We will write a custom essay sample on Performance Related Pay or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page In other words, there is greater scope to understand how employees may require to be treated differently and to interpret why employees do not necessarily respond in a mechanical way to changes in, for example, the level of pay (CIPD, 2013). Vroom’s expectancy theoryVIE assists to understand the motivation through three elements: †¢expectancy – Employees perceived that they possessed the necessary skills to do their jobs at least adequately; †¢instrumentality– Employees perceived that if they performed their jobs well, or at least adequately, they would be rewarded; †¢valence – Employees perceived the rewards offered for successful job performance to be attractive (Arnold and Randall et al, 2010). According to the expectancy theory, money is a significant motivator for most people, and in order to get or secure a higher base salary or some form f bonus payment, we will normally change our behaviour and attitude, directing or increasing effort in a specific direction. Tying pay to specific performance can ensure people are motivated to increase their efforts and performance and ensure performance outcomes are met (Mikovich and Newman, 2005). 2. 3 Equity theory Another psychologic al thinking that is relevant is equity. Equity theorists claim that people seek balance between their inputs and the reward outcomes. The predictions of equity theory are less often supported by research when people receive than their shares, as opposed to when they receive fewer (Mowday, 1991). In other words, employees are more likely to do something in response to feeling under-rewarded than over-rewarded. Equity theory focuses on perceptions of fairness in the workplace, including distributive justice—that is, whether people believe they have received (or will receive) fair rewards; procedural justice—reflects whether people believe that the procedures used in an organization to allocate rewards are fair; interactional justice—refers to whether people believe they are treated in an appropriate manner by others at work, especially authority figures (Arnold, 2010). When people in an organization feel they have been treated justly, they will be more willing to be ‘good citizen’ at work (Liden et al, 2003). While the motivation to perform ‘good citizen’ behaviours are enhanced by a sense of justice (Arnold, 2010). However, Adams argued that whether the input and reward are in balance is determined on the basis of feelings/perceptions compared with others in relation to social norms. 3. Models In relation to the relationship between pay and performance, pay can be related to individual, the working group or orgnisation performance (Brown and Heywood, 2002). 3. 1 Individual PRP An individual performance-related pay system is â€Å"usually involve payment which is integrated into base salary either in the form of a percentage increase or additional increments on a pay scale† (Kessler, 2005). Individual PRP relates reward on an assessment of the employee’s work performance. It assumes that the differences between individuals are measurable so that retention of high quality employees who wish to enjoy high performance reward is increased (Gerhart and Rynes, 2003). In addition, adopting pay incentives will stimulate employees’ better behaviours that will improve work performance and thus, improve organizational performance. Also, employees are motivated to create more efficient methods to boost productivity. However, individual PRP has negative impacts which may de-motivate employees. It assesses the individual’s performance through using qualitative judgments, therefore bias and unfairness coming from performance appraisal is unavoidable by appraisers’ subjectivity. Moreover, Harris’s research (2001) shows that over half of the management failed to understand the â€Å"value system† of PRP, which in turn made inaccurate judgments on performance. 3. 2 Team PRP Team-based performance-related pay schemes include variable pay which depends on the performance of a team. The aim is to consolidate the team through incentives, establishing a united, mutually supporting team with a high level of involvement (Acas). Meanwhile, team-based pay motivates less effective employees and serves as an incentive for the whole team to improve. There are also potential disadvantages of team-based PRP. In contrast to individual PRP, peer pressure is heavy and result in consistence instead of creativity. Subsequently, bullying or harassment will be resulted from individuals who are perceived to be under-contributing. On the other hand, an amount relies on the underlying magnitude of the free rider problem, whereby team members expect others to accomplish the extra workload to increase team PRP. The greater the concern about some employees’ free-riding, the less will pay be linked to team PRP for the total team input into the production process is reduced (Robert, 2007). 3. 3 Organisation PRP Organizational PRP associates with larger groups than teams, like manufactory and company. The universal PRP schemes for organization level relied on profit-sharing and gain-sharing, or alternatively on dividends of employee-owned shares and change in share value. Hence, employees are able to share such financial participation as profit or share ownership, and are more directly responsible for the project’s success. The firm PRP system is effective as the workforce is aware of their contribution. Besides, employees can participate in organizational control and show greater commitment to the organization. Drawbacks come along with organization PRP benefits. The motivation value of implementing such a scheme is relatively weak. On one side, the added-value systems like profit-sharing involves complicated information and rules and thus employees will feel confused with them. On the other side, the bonus payments are usually available with a delay of several months or years and sometimes combined with other indicators of firm-level performance such as sales, productivity, amount of cost saved and etc. 4. Evidence The tables are from the 1998 Workplace Employee Relation Survey (WERS) (McNabb and Whitfield, 2007). Table 1: Impact of performance related pay, employee and financial participation on individual earnings PRP acts as a motivational tool that attracts workers to perform higher competency and induce employees to pay greater effort. Table one supports this point, showing that workplaces that exert any type of PRP schemes pay higher than those that do not. Among them, individual PRP only makes the most contribution to earnings by comparison with the team and organizational PRP only. Nevertheless, the only single scheme impact is far behind that of combined application of two or more types. Earnings are highest in workplaces where firms adopt a combination of individual and workgroup-based or organizational PRP schemes, as can be seen from the column three. Table 2: Interaction effects Along with, the impact of PRP on pay is strongly controlled by the joint of financial participation. As can be seen from table two, earning is relatively high where PRP co-operate with employee share-ownership. PRP is not only backed up by employers, but also by governments to promote employee financial participation through a range of fiscal incentives. For instance, the UK’s new Share Incentive Plan requires employees to leave their shares in trust for a minimum of five years to avail of tax relief. . Conclusion In conclude, PRP is one of the main financial incentives to motivate employees on the basis of expectancy theory. If PRP is designed and implement efficiently and measured fairly, positive impacts will be appeared on employees’ performance. Earnings are paid higher when organization applies PRP and highest when uses a combination of individual and team or organisational PRP. In spite of this, there is no optimal approach to PRP, an d in practice each model has its own advantages and disadvantages. Individual PRP works best where employee decision-making processes centered on jobs, whereas group-based PRP works best where employees are involved in making decisions about their work-roles in their broader context (Delbridge and Whitfield, 2001). Different organizations should undertake different PRP to suit its own situation. And schemes need to be tailored with the management strategy and organisational culture, such as the organization that demands team work would not be appropriate to establish individual PRP system.

Sunday, November 24, 2019

Free Essays on Mapp Vs. Ohio

MAPP vs. OHIO Dollree Mapp was convicted of having had in her possession, books, pictures, and photographs of pornographic material in violation of 2905.34 of Ohio’s Revised Code. The conviction was valid though, â€Å"based primarily upon the introduction in evidence of lewd and lascivious books and pictures unlawfully seized during an unlawful search of defendants home.† (caselaw) â€Å"On May 23, 1957, three police officers arrived at Miss Mapp’s residence in that city pursuant to information that a person was hiding out in the home, who was wanted for questioning in connection with a recent bombing, and that there was a large amount of policy paraphernalia being hidden in the home.† (caselaw) The officers arrived at the home and demanded entrance, but Miss Mapp refused to let them in without a search warrant. The officers then took surveillance of the house until four more officers arrived at the scene four hours later. The officers then entered threw at least one of the many doors to the house forcibly. Miss Mapp had been on her way to the door when they busted threw and she then asked to see the search warrant. One of the officers showed Miss Mapp a piece of paper that was claimed to be a warrant. Miss Mapp then grabbed the piece of paper and stuffed it down her shirt. One of the officers then grabbed her arm forcibly and retrieved the paper and placed Miss Mapp under arrest while the officers search through all of her belongings. â€Å"At trial no search warrant was produced by the prosecution, nor was the failure to produce one explained or accounted for.† (caselaw) The Ohio Supreme Court believed a â€Å"reasonable argument† could be made based on the methods of employment to obtain the evidence was justified and wasn’t unconstitutional, but the Courts explained. â€Å"The Fourth Amendment†¦put the courts of the United States and Federal officials, in the exercise of their power and authority, under limitations and res... Free Essays on Mapp Vs. Ohio Free Essays on Mapp Vs. Ohio MAPP vs. OHIO Dollree Mapp was convicted of having had in her possession, books, pictures, and photographs of pornographic material in violation of 2905.34 of Ohio’s Revised Code. The conviction was valid though, â€Å"based primarily upon the introduction in evidence of lewd and lascivious books and pictures unlawfully seized during an unlawful search of defendants home.† (caselaw) â€Å"On May 23, 1957, three police officers arrived at Miss Mapp’s residence in that city pursuant to information that a person was hiding out in the home, who was wanted for questioning in connection with a recent bombing, and that there was a large amount of policy paraphernalia being hidden in the home.† (caselaw) The officers arrived at the home and demanded entrance, but Miss Mapp refused to let them in without a search warrant. The officers then took surveillance of the house until four more officers arrived at the scene four hours later. The officers then entered threw at least one of the many doors to the house forcibly. Miss Mapp had been on her way to the door when they busted threw and she then asked to see the search warrant. One of the officers showed Miss Mapp a piece of paper that was claimed to be a warrant. Miss Mapp then grabbed the piece of paper and stuffed it down her shirt. One of the officers then grabbed her arm forcibly and retrieved the paper and placed Miss Mapp under arrest while the officers search through all of her belongings. â€Å"At trial no search warrant was produced by the prosecution, nor was the failure to produce one explained or accounted for.† (caselaw) The Ohio Supreme Court believed a â€Å"reasonable argument† could be made based on the methods of employment to obtain the evidence was justified and wasn’t unconstitutional, but the Courts explained. â€Å"The Fourth Amendment†¦put the courts of the United States and Federal officials, in the exercise of their power and authority, under limitations and res...

Thursday, November 21, 2019

Corporate governance board in an organization operates via the Essay

Corporate governance board in an organization operates via the different members of board of directors - Essay Example The aim of this paper is to illustrate the working of corporate governance by means of the literature review. Corporate governance rules are settled by the directors who give rules and regulations for the firm to move it in a specific direction to achieve different goals. Corporate governance actually gives rules for internal control of the firm. This literature review shows different views on corporate governance of various scholars i.e. the point of generation of this idea and its history. The paper then elaborates on the principle of corporate governance and their responsibilities; two distinctive models are described for corporate governance, which are used all over the world. These models clearly defines that why the firms in the United Kingdom are not as powerful as in United States. The reason is provide latterly in the paper by showing different examples of United States industries that actually fails because their corporate governance was unable to work. Then what are corpor ate governance model used by the Asian companies are provided. The paper uses three different examples to show that either corporate governance work or not. ... The last section is the few lines defining the conclusion taken from over all paper. The paper uses the examples of real firms that show that either corporate governance work or not. These real examples show that how their corporate governance works so that we can conclude that either the concept of corporate governance work or not. Corporate governance concept does work but it all depends on the individual forming the board of director or corporate governance. Corporate governance ideology does work and that is the reason that why the top firms are still working. The best direction and decision making system is the only reason that works and all these are provided by corporate governance. The paper not only shows that the either corporate governance work or not rather it also provide that how corporate governance work. The examples of real firms that are taken to elaborate the aim of paper will clearly define that how their corporate governance working for the success of the firm. Fro instance, the example of Cadbury shoes that their corporate governance decided to separate the confectionery firms from the beverages firms and this decision really works and the firm actually gain profits. Different statistical data of the companies are provided by the paper that shows that impact of decision making and regulation provided by corporate governance. The approach to literature review is made by the use different scholarly piece of work. Different books are used to elaborate the topic and scholar's journals are sued to seek the issue discussed by this paper. Moreover, the paper uses the real firm's data showing the actual and real evidences that either the corporate work or not. This data is taken from different

Wednesday, November 20, 2019

Change Organizational Model Research Paper Example | Topics and Well Written Essays - 1500 words

Change Organizational Model - Research Paper Example The core value of Mace Ford is that it deals with both new as well as used car sales. Through its performance, the company aims to provide its customers the cars that hold the most appropriate amalgamation of style, performance and safety for satisfying their exact needs and wants. Mace Fiord provides its customers the assurance of finding the exact vehicle for them that meets their necessities. 3.0 Organizational Development Problem in Mace Ford and Its Causes Considering the operations of Mace Ford over the past several years, it has been evaluated that the most crucial problem that it faced in its operational lifecycle is that of managing the changes in its new location on Highway 41 South, US. The dealership that they had with Ford has led to this change in location because after the deal, Mace Ford were supposed to have Ford trucks, the line of which is much bigger than the line of cars (Hayes, 2009). Quite a few causes have been identified for the prospect problem in the organi zational development of Mace Ford after its dealership with Ford. With the move of changing location, the organization faced the challenge of maintaining effective internal communication. The organizations’ people like that of the engineers, contractors and workers cited problems mentioning ineffective receiving of organizational information. The management at Mace Ford was not being able to ensure that up-to-date information was received by each employee. The management and operational controlling heads were not able to provide the appropriate means for accessing the systems of the company in the initial phases of its operations in the new location. The management of the company was much busy with maintaining the scheduled... Considering the operations of Mace Ford over the past several years, it has been evaluated that the most crucial problem that it faced in its operational lifecycle is that of managing the changes in its new location on Highway 41 South, US. The dealership that they had with Ford has led to this change in location because, after the deal, Mace Ford was supposed to have Ford trucks, the line of which is much bigger than the line of cars (Hayes, 2009). Quite a few cases have been identified for the prospect problem in the organizational development of Mace Ford after its dealership with Ford. With the move of changing location, the organization faced the challenge of maintaining effective internal communication. The organizations’ people like that of the engineers, contractors, and workers cited problems mentioning ineffective receiving of organizational information. The management at Mace Ford was not being able to ensure that up-to-date information was received by each employee . The management and operational controlling heads were not able to provide the appropriate means for accessing the systems of the company in the initial phases of its operations in the new location. The management of the company was much busy with maintaining the scheduled plan for the location change and adhering to the present orders of Ford and thus they could not organize their internal communication properly. The dealing with an individual employee is also an important task for the management.

Sunday, November 17, 2019

Sweatshop Labor Essay Example | Topics and Well Written Essays - 250 words

Sweatshop Labor - Essay Example The company ethical guidelines affect the whole operations of the business. When the guidelines are clear to all subordinates, the employees are unlikely to make unethical decisions. However, in case the company leaves the ethical issues to be decided by the supervisors, they are likely to engage in unethical issues which might end up tarnishing the reputation of the company in the market (Esbenshade, 2004). Therefore, ethical perspective such as the minimum salaries and age of the employees ensures that decision made inside the company’s premises observe these guidelines. A company influences its ethical environment by setting the standards to be met by the employees. When the standards are beyond what the employees can achieve, the subordinates are likely to engage in unethical behavior in order to achieve them (Esbenshade, 2004). This explains why some employees in Bangladesh working for one of the Wal-Mart subsidiary opted to come with their children in the workplace in order for them to help their parents to reach the set

Friday, November 15, 2019

The Essence Of The Marketing Concept

The Essence Of The Marketing Concept Market segmentation can be defined as the process of breaking down the total market for a product or service into distinct sub-groups or segments where each segment may conceivably represent a separate target market to be reached with a distinctive marketing mix. Segmentation and the subsequent strategies of targeting and positioning start by recognizing that increasingly, within the total demand/market for a product, specific tastes, needs and demand may differ. It breaks down the total market for a product or service into individual clusters of customers, or segments. Here, customers who share similar demand preferences are grouped together within each segment. Effective segmentation is achieved when customers sharing similar patterns of demand are grouped together and where each group or segment differs in the pattern of demand from other segments in the market. In most markets, be they consumer or industrial, some kind of segmentation can be accomplished on this basis. 2 Targeted marketing efforts Most companies realise that they cannot effectively serve all the segments in a market, and must instead target their marketing efforts. For example, in developing a new car, the manufacturing firm will have to make a decision on many issues, such as should it be a two-, four-, or five-seater model, with a 1000, 2000 or 3000cc engine? Should it have leather, fabric or vinyl seats? The over-riding factor when deciding these issues is customer demand. Some customers (segments) may want a five-seater 2000cc model with leather upholstery, while others may prefer a four-seater with a 1000cc engine and fabric seats. A solution would be to compromise and produce a four-seater 1500cc model with leather seats and fabric trim. Clearly, such a model would go some way to meeting the requirements of both groups of buyers, but there is a danger that because the needs of neither market segment are precisely met, most potential customers would purchase from other suppliers who could cater for their specific requirements. Ironically, one of the biggest post-war car failures was the much heralded and much hyped American Ford Edsel car. This is a car that was produced following extensive marketing research, the results of which were aggregated, and the end product was a car that satisfied the true needs of very few buyers making it the most spectacular flop in modern motoring history. Target marketing is thus defined as the identification of the market segments that are identified as being the most likely purchasers of a companys products. Specifically, the advantages of target marketing are: Marketing opportunities and unfilled gaps in a market may be more accurately appraised and identified. Such gaps can be real (e.g. sweet, strong, harsh or mild) or they can be illusionary in terms of the way people want to view the product (e.g. happy, aloof, silly or moody). In the case of the former, product attributes can fulfil these criteria whereas for the latter these attributes might well have to be implanted in the minds of customers through an appropriate advertising message. Market and product appeals through manipulation of the marketing mix can be more delicately tuned to the needs of the potential customer. Marketing effort can be concentrated on the market segment(s) which offer the greatest potential for the company to achieve its goals be they goals to maximise profit potential or to secure the best long-term position for the product or any other appropriate goal. 3 Effective segmentation Theoretically, the base(s) used for segmentation should lead to segments that are: Measurable/identifiable Here, the base(s) used should preferably lead to ease of identification in terms of who is in each segment. It should also be capable of measurement in terms of the potential customers in each segment. Accessible Here, the base(s) used should ideally lead to the company being able to reach selected market targets with their individual marketing efforts. Meaningful The base(s) used must lead to segments which have different preferences or needs and show clear variations in market behaviour and response to individually designed marketing mixes. Substantial The base(s) used should lead to segments which are sufficiently large to be economically and practically worthwhile serving as discrete market targets with a distinctive marketing mix. The third criterion is particularly important for effective segmentation, as it is an essential prerequisite when attempting to identify and select market targets. In segmentation, targeting and positioning, a company must identify distinct subsets of customers in the total market for a product where any subset might eventually be selected as a market target, and for which a distinctive marketing mix will be developed. The following represents the sequential steps in conducting a segmentation, targeting and positioning exercise for any given product market. Select base(s) for segmentation and identify appropriate market segments. Evaluate and appraise the market segments resulting from the first step. Select an overall market targeting strategy. Select specific target segments. Develop a product positioning strategy for each target segment. 6. Develop an appropriate marketing mix for each chosen target segment in order to support the product positioning strategy. 4 Segmentation bases in consumer product markets Geographic segmentation consists of dividing a country into regions that normally represent an individual sales persons territory. In bigger companies, these larger regions are then broken down into areas with individual regional manager controlling salespeople in distinct areas. In international marketing, different countries may be deemed to constitute different market segments. Demographic segmentation consists of a wide variety of bases for subdividing markets, and each of these is now discussed: Age is a good segmentation variable for such items as clothes where the fashion-conscious young are more susceptible to regular changes in style and older segments are perhaps more concerned with such factors as quality and comfort. Sex is a strong segment in terms of goods that are specifically targeted towards males or females and again an obvious example is clothing. Here, fashion is a powerful element when purchasing, and a whole industry surrounds this criterion. Income as a segmentation base is more popular in certain countries like the USA than others who regard such matters very privately. Social class is possibly the single most used variable for research purposes. It is universally used. The National Readership Survey divides everybody into the following categories as shown in Figure 1: A Upper middle class (higher managerial, administrative or professional) which comprises about 3 per cent of the population B Middle class (intermediate managerial, administrative or professional) which comprises approximately 10 per cent of the population C1 Lower middle class (supervisory, clerical, junior administrative or professional) containing around 25 per cent of the population C2 Skilled working clsass (skilled manual workers) who comprise around 30 per cent of the population. D Working class (semi- and unskilled manual workers) or around 27 per cent of the population E Lowest levels of subsistence (state pensioners with no other income, widows, casual and lowest grade earners) who form the remaining 5 per cent, or thereabouts, of the population. Figure 1 Social class and grade structure Education is often related to social class, because, as a generalisation, the better educated tend to get the better jobs. It is generally acknowledged that a persons media habits are related to education. Accordingly, newspapers design to aim their news and newspaper content towards the upper or lower ends of the social spectrum, and encourage advertisers to target their advertising appropriately, depending upon whether an advertisers product has an up-market or down-market appeal. In fact they publicise their readership profile of the percentage of ABC1, etc groups that actually read their newspapers or magazines and this information is ascertained through independent auditors. This is done principally to alert advertising agencies who will place their clients advertising according to the social classes towards at whom their products are targeted. Nationality or ethnic background now constitutes a growing and distinctive segment for potential target marketing. Food products, clothing and hair care products are obvious examples of products that fit into this segmentation variable. Political is perhaps a less obvious segmentation base. An individuals political leanings might well influence the way he or she behaves in terms of purchases made. Such purchases are of course reflected in the types of newspaper and other media that is read, and this, in turn, contains advertising which is aimed at people who read such media, so political leanings might be more significant than it initially seems. Family size will have an effect on the amount or size of purchases, so this is certainly a meaningful segmentation variable. Family life cycle is a logical follow on to the above and this will tend to determine the purchase of many consumer durable products. This is based on the notion that consumers pass through a series of quite distinct phases in their lives, each phase giving rise to different purchasing patterns and needs. For example, an unmarried person living at home will probably have very different purchasing patterns from someone of the same age who has left home and is recently married. Wells and Gubar have put forward what is now an internationally recognised classification system in relation to life cycle and these stages are shown in Figure 2: Bachelor stage young single people not living with parents (which gave rise to the category of YUPPIES or young, upwardly-mobile persons) Newly marrieds no children (sometimes referred to as DINKIES meaning double income no kids) Full nest I with the youngest child being under six years of age (sometimes referred to as ORCHIDS meaning one recent child, heavily in debt) Full nest II is where the youngest child is six or over Full nest III is an older married couple with dependent children living at home Empty nest I with no children living at home, but the family head is in work (sometimes referred to as WOOPIES meaning well off older persons) Empty nest II where the family head is retired Solitary survivor in work Solitary survivor retired (unkindly referred to as COCOON meaning cheap old child-minder, operating on nothing) Figure 2 Family life cycle segmentation base SAGACITY is a refinement of the family life cycle grouping system. This is a system that believes that people have different behavioural patterns and aspirations as they proceed through life. Four main stages of life cycle are defined as: Dependent (mainly under 24 living at home) Pre-family (under 35s who have established their own household, but without children) Family (couples under 65 with one or more children in the household) Late (adults whose children have left home or who are over 35 and childless) Income groups are then defined as being in categories: better off and worse off Occupation groups are defined as white (collar) or the A, B and C1 social groups and blue (collar) or the C2, D and E social groups The system works as shown in Figure 3: Life cycle Dependent Pre-family Family Late Income Better off Worse off Better off Worse off Occupation White Blue White Blue White Blue White Blue White Blue White Blue Approx % 7 7 5 5 11.5 10.5 2.5 7.5 10 7.5 9 18 adults UK (NB Because of rounding, total figure does not add to 100%) Source: Research Services Limited Figure 3 Sagacity Life Cycle Groupings Type of neighbourhood and dwelling (ACORN) is a relatively new segmentation base. Its underlying philosophy the fact that the type of dwelling and area a person lives in is a good predictor of likely purchasing behaviour including the types of products and brands which might be purchased. This classification analyses homes, rather than individuals, as a basis for segmentation. It is termed the ACORN system (A Classification of Residential Neighbourhoods). The source of this is the 10-yearly population census that is undertaken during every year ending with one the next being due in 2001. The system was developed by Richard Webber for Consolidated Analysis Centres Incorporated (CACI). It breaks down the census of population into various categories of homes as shown in Figure 4. Acorn Type of dwelling Approx % UK population Group A Agricultural areas 3 B Modern family housing, higher incomes 18 C Older housing of intermediate status 17 D Poor quality older terraced housing 4 E Better-off council estates 13 F Less well-off council estates 9 G Poorest council estates 7 H Multi-racial areas 4 I High status non-family areas 4 J Affluent suburban housing 16 K Better-off retirement areas 4 U Unclassified 1 (Source CACI) Figure 4 ACORN Classification system These ACORN classifications are further sub-divided into yet smaller groupings. For instance, Group C which refers to Older housing of intermediate status, is broken down into: C8 Mixed owner-occupied and council estates C9 Small town centres and flats above shops C10 Villages with non-farm employment C11 Older private shousing skilled workers Mosaic system This system is an extension of the ACORN system except that this is based upon individual postal codes (or zip codes). Each postal code in the UK consists of up to seven letters and figures. An individual postal code represents approximately ten dwellings and each of these groups of dwellings is given an individual Mosaic categorisation, of which there are 58 categories. The idea of mosaic comes from the notion that if a different colour was ascribed to each category and superimposed on a map of the UK the resulting pattern would resemble a mosaic. The full Mosaic listing is not reproduced here, but by way of illustration some of these are described below: M1 High status retirement areas with many single pensioners 1.0% of population M15 Lower income older terraced housing 1.5% M25 Smart inner city plats, company lets, very few children 1.5% M33 Council estates, often Scottish flats, with worst overcrowding 1.3% M46 Post 1981 housing in areas of highest income and status 0.2% M50 Newly built private estates, factory workers, young families 3.3% M57 Hamlets and scattered farms 0.7% Taken together, the demographic bases described constitute the most popular bases for segmentation in consumer product markets, since they are often associated with differences in consumer demand. As such, they are meaningful to advertisers. For instance, occupation and social class are linked because of the way that occupation is used to define social class. It is, therefore, relatively easy to reach the different social classes through their different media and shopping habits, although boundaries between the purchasing power of different classes become blurred when, for example, skilled manual workers are able to earn higher incomes than their counterparts in lower or intermediate management. Direct or behavioural segmentation appeals to marketing people as it takes customer purchasing behaviour as the starting point for segmentation. Such bases include: Usage status when a distinction might be made between say light, medium and heavy users. Brand loyalty status where customers can be divided into a number of groups according to their loyalty, or their propensity to repurchase the brand again. Status categories are: Hard core loyals who purchase the same brand every time Soft core loyals who have divided loyalties between two or more brands and purchase any of these on a random basis Shifting loyals who are sometimes called brand switchers in that they buy one brand, and stay with it for a certain period, and then purchase another brand and stay with it for a certain period. They may then return to the original brand Switchers who show no particular preference or loyalty to one particular brand, so their purchasing pattern cannot be clearly determined. Benefits sought is a segmentation base that determines the principal expectation(s) that a purchaser is seeking from the product. For instance, in the case of an automobile oil, purchasers might be looking for cheapness, a well known brand, its viscosity or its engine protection reputation. Occasions for purchase also falls under this category. An example here relates to the purchase of holidays. Lifestyle or psychographic segmentation is based on the idea that individuals have characteristic patterns of living that may be reflected in the products and brands which they purchase. The advertising agency, Young Rubican, has come up with a classification system called Four Cs where C stands for consumers. These categories are: Mainstreamers or the largest group who do not want to stand out from the crowd. They are the biggest segment (over 40 per cent of the population) and tend to purchase branded products over supermarket brands. Reformers are people who tend to be creative and caring, many doing charitable work. They are largely responsible for the purchase of supermarket brands. Aspirers are usually younger people who are ambitious and keen to get on at all costs. Their purchases tend to reflect the latest models and designs. Succeeders are those who have made it and do not see the need for status symbols that aspirers seek. They like to be in control of what they are doing and this includes their purchases where they generally have very clear and firm ideas of what they see as a good product and what they see as being a less useful product. 5 Segmentation bases in industrial product markets Segmenting an industrial product market introduces a number of additional bases, uses similar bases and also precludes some of the ones more frequently used for consumer product markets. Such bases are: Type of application/end use e.g. adhesives for home, office and industrial use Geographical e.g. North, South, East and West regions or by country Benefits sought Closely related to the above, but in terms of what the product actually does for the buying company e.g. detergents for general cleaning or detergents that are actually used in the production process Type of customer e.g. banks or insurance companies or people who purchase for public authorities Product/technology e.g. fibres for the carpet industry or the clothing industry Customer size e.g. larger customers might receive different treatment to smaller customers and this is called key account selling whereby the sales manager deals directly with major accounts Usage rate e.g. light users or heavy users; regular or sporadic users Loyalty of customer e.g. regular purchasers of the companys products and sporadic purchasers. The treatment accorded to loyal customers might differ to that given to occasional customers Purchasing procedures e.g. centralized versus decentralized purchasing (which can affect the buyer/seller relationship); the extent to which purchasing is carried out by tightly defined, or more flexible, specifications which allows the seller more latitude in terms of making suggestions, the extent to which purchasing is by tender (i.e. by some kind of closed bidding system) or by open negotiation Situational factors considers the tactical role of the purchasing circumstances. In some purchasing situations it requires a more detailed knowledge of the customer whereas in others the buyer/seller relationship is kept strictly to commercial matters Personal characteristics relate to the people who make purchasing decisions As with consumer markets, industrial market segmentation may be on an indirect (associative) or a direct (behavioural) basis. A variety of bases may be also be used in conjunction with each other in order to obtain successively smaller sub-segments of the market. The essential criteria given earlier for bases of consumer market segmentation being identifiable, accessible, substantial and, most important, meaningful are equally applicable to bases for industrial market segmentation. A nested approach has been suggested on the basis of a hierarchy from the broad to the specific (See Figure 5). DEMOGRAPHICS OPERATING VARIABLES PURCHASING APPROACH SITUATIONAL PERSONAL CHARAC- TERISTICS Figure 5 A nested approach to segmentation in industrial markets At the centre we have people who actually make buying decisions and their personalities must be considered. Then come situational factors that look at the tactical role of the purchasing situation. This demands customer knowledge. Purchasing approaches examines customer purchasing practices (e.g. who actually makes buying decisions, or the decision making unit). Operating variables allow a more exact pinpointing of potential and existing customers within the final category that is demographic variables, or the broad description of the segments related to customer needs and patterns of usage. 6 Effective segmentation Once market segments have been identified, the marketers task is to assess these various market segments. This appraisal should be in relation to sales and profit potential, or in the case of a non-profit organization, their ability to add to organisational aims. This means that each segment should be viewed in terms of its overall size, projected rate of growth, actual and potential competition, nature of competitive strategies and customer needs. Companies that decide to follow a concentrated or a differentiated targeting strategy must decide which of the segments in the market they wish to serve. Such a decision to select specific target markets must be based on some of the factors outlined earlier, including resources, competition, segment potential and company objectives. There are four characteristics that make a market segment particularly attractive: It has sufficient current profit and sales potential to meet the organisations aims and objectives Competition in the segment is not too intense There is good potential for future growth The segment has some previously unidentified requirements that the company has recognised and is now in a position to serve especially well 7 Product positioning A company has to develop a positioning strategy for each segment it chooses to serve. This relates to the task of ensuring that a particular companys products occupy a planned for place in chosen target markets, pertinent to opposing competition in the marketplace. The notion of product/brand positioning is applicable to both industrial and consumer markets, and the key aspects of this approach are based upon the following suppositions. All products and brands have both objective attributes (e.g. sweet/sour; dark/light; fast/slow) and subjective attributes (e.g. modern/unfashionable; happy/sad; youthful/elderly). Potential purchasers might think about one or more of these attributes when deliberating which product and/or brand to purchase. That potential customers have their own thoughts about how the various competing products or brands rate for each of these particular attributes. In other words, the positioning of the brand along the parameters of these attributes (eg entertaining on the one hand to mundane at the other extreme) takes place in the mind of the customer. Once this is done, it is possible to establish important attributes in choosing between different brands or products, together with the customers perception of the position of competitors products in relation to these characteristics, and then establish the most advantageous position for the company within this particular segment of the market. The final step in the appraisal of segmentation, targeting and positioning is developing appropriate marketing mixes. This involves the design of marketing programmes that will support the chosen positional strategy in the selected target markets. The company must therefore determine the 4 Ps of its marketing mix, i.e. what price, product, distribution (place) and promotional strategies will be necessary to achieve the desired position in the market. There are four acknowledged strategic options for target marketing: Undifferentiated marketing where there is one single marketing mix for every potential customer in the market. Differentiated marketing where there are many marketing mixes for different segments of the market. Concentrated marketing which has a single marketing mix for a segment of the total market. Custom marketing which attempts to satisfy each individual customers requirements with a separate marketing mix. 8 Summary We can now appreciate how marketing begins to work. Having defined the purpose of segmentation we have looked at the obvious and the less obvious bases for segmentation in both consumer and industrial markets. We have also ascertained that used well, the techniques and concepts described in this chapter can contribute significantly to overall company marketing success. Market segmentation, targeting and positioning decisions are thus more strategic than they are tactical. Segmentation variables should be examined in detail, especially new segments. These should then be authenticated in terms of viability and potential profit. Targeting investigates specific segments in terms of how they should be approached. Positioning relates to how the product is perceived in the minds of consumers and a suitable marketing mix should then be designed.

Wednesday, November 13, 2019

Religion and the Igbo People :: Essays Papers

Religion and the Igbo People The Igbo are a profoundly religious people who believe in a benevolent creator, usually known as Chukwu, who created the visible universe (uwa). Opposing this force for good is agbara, meaning spirit or supernatural being. In some situations people are referred to as agbara in describing an almost impossible feat performed by them. In a common phrase the igbo people will say Bekee wu agbara. This means the white man is spirit. This is usually in amazement at the scientific inventions of the white man. Apart from the natural level of the universe, they also believe that it exists on another level, that of the spiritual forces, the alusi. The alusi are minor deities, and are forces for blessing or destruction, depending on circumstances. They punish social offences and those who unwittingly infringe their privileges. The role of the diviner is to interpret the wishes of the alusi, and the role of the priest is to placate them with sacrifices. Either a priest is chosen through hereditary lineage or he is chosen by a particular god for his service, usually after passing through a number of mystical experiences. Each person also has a personalised providence, which comes from Chukwu, and returns to him at the time of death, a chi. This chi may be good or bad. There is a strong Igbo belief that the spirits of one's ancestors keep a constant watch over you. The living show appreciation for the dead and pray to them for future well being. It is against tribal law to speak badly of a spirit. Those ancestors who lived well, died in socially approved ways, and were given correct burial rites, live in one of the worlds of the dead, which mirror the worlds of the living. They are periodically reincarnated among the living and are given the name ndichie – the returners. Those who died bad deaths and lack correct burial rites cannot return to the world of the living, or enter that of the dead. They wander homeless, expressing their grief by causing harm among the living. The funeral ceremonies and burials of the Igbo people are extremely complex, the most elaborate of all being the funeral of a chief. However, there are several kinds of deaths that are considered shameful, and in these circumstances no burial is provided at all. Women who die in labour, children who die before they have no teeth, those who commit suicide and those who die in the sacred month – for these people their funeral ceremony consists of being thrown into a bush.

Sunday, November 10, 2019

Library System Essay

ACKNOWLEDGEMENT This dissertation would not have been possible without the guidance and the help of several individuals who in one way or another contributed and extended their valuable assistance in the preparation and completion of this study. First and foremost, my utmost gratitude to Mr. Raquel V.desello the Brgy.Chairman of Street whose sincerity and encouragement I will never forget. Mr. Dominic Sales has been my inspiration as I hurdle all the obstacles in the completion this research work. My sincere thanks also goes Mrs. De Leon for offering me the summer internship opportunities in their groups and leading me working on diverse exciting projects. I thank my fellow comp.labmates in Trent Information First and other Group: Mr. Renz Paolo Cruz, Rochelle Dones for allow me to barrow her flash drive, and, for the stimulating discussions, for the rush hour we were working together before few minutes before defense, and for all the fun we have had in the last two years. Also I thank my friends in face book that gave me at least their effort to gave few sentence in my documentation Last but not the least, I would like to thank my family: my parents Mrs. Chanda Desello and Mr. Quemadge Desello, for giving birth to me at the first place and supporting me spiritually throughout my life. Same as my partner in case study Lienard Magno ABSTRACT This report describes our group’s implementation of a library Management system. We used the Entity-Relationship model to design a database that will store and organize the library’s data. We have Created the database using vb6.0 and populated it with some sample Data. The system can keep track of library cards, customers, Librarians, library locations, books, videos, and the relationships Between them. Using vb6.0 and adodb, we have Created an Internet-based graphical user interface that allows Customers and librarians to access the system remotely A simple library management system that provides following facilities login, register, add category, add / remove book, search / issue book, return book. Language used is C# and vb is been used in code. One Admin user is already there once db is installed with user name admin and password admin. Admin user has extra functionalities like add category, add/remove books. These functionalities cannot be done by simple user that registers. Password encryption – decryption has been used in project. It’s very simple project where in all the event of all forms has been handled in that acts as business and data access layer. All vB interactions are in this file only. CHAPTER I INTRODUCTION Now a day, in a highly technological society, human productivity is made more efficient through the development of electronic gadgets. Now, with the advent of such modernization in education, one way to globalize the process of research is to realize that technology is advancing at an incredibility fast place. Computers are not confined to being used for entertainment but its role in education is also vast. In School, reading materials are stored in libraries. Library is a place in which books and related materials are kept for use but not for sale. It is also organized for use and maintained by a public body, an institution or a private individual. In addition, it is a place in which we get information in any format and from many sources. The librarian has to keep the room neat so that it is conducive for learning. The librarian is also the person who is liable for monitoring all the books that are borrowed and returned by the borrowers. The proponents will propose the Library Books borrowing and Returning System for Taytay Elementary School located at Taytay, Rizal, he Head Librarian, Ms. De Leon stated that they are currently using the Dewey Decimal Library System. They are still utilizing a manual system. The library users and the librarian still use card catalogues in searching for reading materials and use index card for the records of borrowed and returned books. The proponent’s study was what is which encounter to the Library by the user, Librarian and how the Owner or the Administrator of the said school will provide a good service to their clients to have a good feedback. The study will focus on transaction which done inside the Library like borrowing, returning of books by students, faculties and staffs. In this area, the usage of computerized library system is needed because it is easier and obviously it saves paper compare to the manual library based. Other countries such as South America and Middle East. STATEMENT OF THE PROBLEMS library system in doing transactions with their clienteles. Specifically this study pourpost to answer the following questions: 1. How can the system helps the librarian? 2. What are the inputs needed in the system in order for the students/staff/visitors to be able to login/logout when entering and borrowing books? 3. What are the information and data needed to put up a computerized library system of (tes) Taytay Elementary School. SCOPE AND LIMITATIONS SCOPE The system is create for the library except for easy way for librarian to make her work easy this is also for their customer to barrow books easy and to return also for data for clearly using it.. Delimitation The other way,this study is limits for the proposed enhancement computerized library system of Taytay Elementary School. System proposed to only one authorized person.

Friday, November 8, 2019

Similarities between China, Germany, and the Soviet Union essays

Similarities between China, Germany, and the Soviet Union essays The events that occurred in China under Deng Xiaoping s rule are similar to the events that occurred in Nazi Germany under Hitlers rule and the Soviet Union under Stalins rule to a great extent. Successful dictatorships use many techniques to win their countrys support. Propaganda, indoctrination, controlled participation, direction of popular discontent, and force and terror are all commonly used in this form of government; and all are techniques the leaders of those three countries used time and again. All of the media, such as radio and newspapers, was altered to portray the governments as being successful and honorable. No information that could possibly uncover the governments truths was allowed to be exposed. Furthermore, the leaders of the countries began to include their beliefs and ideas into the nations schools and youth programs alike. Children were exposed to the communist and fascist ideas at young ages to ensure continued government support. Also, these regimes used th e technique of controlled participation. People who are allowed to participate in and contribute to something are more likely to support it. In China they introduced the spy-on-your-neighbour campaign, and local authorities had no problem recruiting thousands of neighbourhood informants and auxiliary police to enforce the crusade. One problem the governments did face was that of those who did not believe or did not support their rulers ideas. The solution: direction of popular discontent and the use of force and terror. If civilians still refused to believe the ideologies of their leaders, the governments would try to put the blame on others. In Nazi Germany, Hitler blamed the Jews, Slavs, political opponents, union leaders, ministers of religion, pacifists, and homosexuals for Germanys economic problems at the time. After the Tiananmen Square incident, the Chinese leader placed the blame on the th...

Wednesday, November 6, 2019

Theories of Ideology in Sociology

Theories of Ideology in Sociology Ideology is the lens through which a person views the world. Within the field of sociology, ideology is broadly understood to refer to the sum total of a persons values, beliefs, assumptions, and expectations. Ideology exists within society, within groups, and between people. It shapes our thoughts, actions, and interactions, along with what happens in society at large. Ideology is a fundamental concept in sociology. Sociologists study it because it plays such a powerful role in shaping how society is organized and how it functions. Ideology is directly related to the social structure, economic system of production, and political structure. It both emerges out of these things and shapes them. Ideology vs. Particular Ideologies Often, when people use the word ideology they are referring to a particular ideology rather than the concept itself. For example, many people, especially in the media, refer to extremist views or actions as being inspired by a particular ideology (for example, radical Islamic ideology or white power ideology) or as ideological. Within sociology, much attention is paid to what is known as  the dominant ideology, or the particular ideology that is most common and  strongest in a given society. However, the concept of ideology itself is actually general in nature and not tied to one particular way of thinking. In this sense, sociologists define ideology as a persons worldview and recognize that there are various and competing ideologies operating in a society at any given time, some more dominant than others. Ultimately, ideology determines how we make sense of things. It provides an ordered view of the world, our place in it, and our relationship to others. As such, it is deeply important to the human experience, and typically something that  people cling to and defend, whether or not they are conscious of doing so. And, as ideology emerges out of the  social structure  and  social order, it is generally expressive of the social interests that are supported by both. Terry Eagleton, a British literary theorist, and intellectual explained it this way in his 1991 book  Ideology: An Introduction: Ideology is a system of concepts and views which serves to make sense of the world while obscuring the  social interests  that are expressed therein, and by its completeness and relative internal consistency tends to form a  closed  system and maintain itself in the face of contradictory or inconsistent experience. Marxs Theory of Ideology German philosopher Karl Marx  is considered the first to provide a theoretical framing of ideology within the context of sociology. Michael Nicholson  / Contributor  / Getty Images According to Marx, ideology emerges out of a societys mode of production. In his case and in that of the modern United States,  the economic mode of production is capitalism. Marxs approach to ideology was set forth in his theory of  base and superstructure. According to Marx, the superstructure of society, the realm of ideology, grows out of the base, the realm of production, to reflect the interests of the ruling class and justify the status quo that keeps them in power. Marx, then, focused his theory on the concept of a dominant ideology. However, he viewed the relationship between base and superstructure as dialectical in nature, meaning that each affects the other equally and that a change in one necessitates a change in the other. This belief formed the basis for Marxs theory of revolution. He believed that once workers  developed a class consciousness  and became aware of their exploited position relative to the powerful class of factory owners and financiers- in other words, when they experienced a fundamental shift in ideology- that they would then act on that ideology by organizing and demanding a change in the social, economic, and political structures of society. Gramscis Additions to Marxs Theory of Ideology The working-class revolution that Marx predicted never happened. Nearly 200 years after the publication of The Communist Manifesto, capitalism maintains a strong grip on global society and  the inequalities it fosters continue to grow. Fototeca Storica Nazionale.  / Contributor  / Getty Images   Following on the heels of Marx, the Italian activist, journalist, and intellectual  Antonio Gramsci  offered a more developed theory of ideology to help explain why the revolution did not occur. Gramsci, offering his theory of  cultural hegemony, reasoned that dominant ideology had a stronger hold on consciousness and society than Marx had imagined. Gramscis theory focused on the  central role played by the  social institution of education  in spreading the dominant ideology and maintaining the power of the ruling class. Educational institutions, Gramsci argued, teach ideas, beliefs, values, and even identities that reflect the interests of the ruling class, and produce compliant and obedient members of society that serve the interests of that class. This type of rule is what Gramsci called cultural hegemony. The Frankfurt School and Louis Althusser on Ideology Some years later, the  critical theorists  of  the Frankfurt School turned their attention to the role that art,  popular culture, and mass media play in disseminating ideology. They argued that just as education plays a role in this process, so do the social institutions of media and popular culture. Their theories of ideology focused on the representational work that art, popular culture, and mass media do in telling stories about society, its members, and our way of life. This work can either support the dominant ideology and the status quo, or it can challenge it, as in the case of  culture jamming. Jacques Pavlovsky  / Contributor  / Getty Images Around the same time, the French philosopher Louis Althusser developed his concept of the ideological state apparatus, or the ISA. According to Althusser, the dominant ideology of any given society is maintained and reproduced through several ISAs, notably the media, religion, and education. Althusser argued that each ISA does the work of promoting illusions about the way society works and why things are the way they are. Examples of Ideology In the modern United States, the dominant ideology is one that, in keeping with Marxs theory, supports capitalism and the society organized around it. The central tenet of this ideology is that U.S. society is one in which all people are free and equal, and thus, can do and achieve anything they want in life. A key supporting tenet is the idea that work is morally valuable, no matter the job. Together, these beliefs form an ideology supportive of capitalism by helping us make sense of why some people achieve so much in terms of success and wealth  while others achieve so little. Within the logic of this ideology, those who work hard are guaranteed to see success. Marx would argue that these ideas, values, and assumptions work to justify a reality in which a very small class of people holds most of the authority within corporations, firms, and financial institutions. These beliefs also justify a reality in which the vast majority of people are simply workers within the system. While these ideas may reflect the dominant ideology in modern America, there are in fact other ideologies that challenge them and the status quo they represent. The radical labor movement, for example, offers an alternative ideology- one that instead assumes that the capitalist system is fundamentally unequal and that those who have amassed the greatest wealth are not necessarily deserving of it. This competing ideology asserts that the power structure is controlled by the ruling class and is designed to impoverish the majority for the benefit of a privileged minority. Labor radicals throughout history have fought for new laws and public policies that would redistribute wealth and promote equality and justice.