Wednesday, September 2, 2020

Dead Mans Path. Cultural conflict Essay Example | Topics and Well Written Essays - 500 words

Dead Mans Path. Social clash - Essay Example An unforeseen development would unfurl as the fundamental character was attacked with a problem in regards to the mentioned maintenance of the conventional way, a profound domain of amazing quality from this world to the following, or sheer negligence for social estimations of neighborhood chronicled setting. The fundamental character of the story is Michael Obi, the hero, the recently named director of Ndume Central School. He is viewed as level character because of his perpetual position all through the story; however a vital instructor because of scholastic skill in educating. He straightforwardly bolsters innovation and utilization of western practices, in this way denounces customary purposes of perspectives and practices of old educators and partners. In like manner, Nancy, his significant other, shares the fundamental character’s support for advancement. The cleric is viewed as the opponent, the character who incited Michael’s inclinations for current perspectives. The remainder of the characters give minor delineation in jobs, for example, the instructor Michael addressed and the lady seen strolling through the way. The story gives imagery as far as innovation through tasteful magnificence of the nursery: similar to heaven through arranged yards with blooming plants representing development and success.

Saturday, August 22, 2020

Internet Marketing strategy concepts and definitions

Web Marketing methodology ideas and definitions This part plans to introduce a total hypothetical structure so as to legitimize an examination of the past discoveries. In the writing audit, the evolvement of Internet promoting methodologies will be assessed. Past research identified with computerized promoting methodology and the components influencing consumer loyalty will be explained. The survey shapes the standards on which the examination is worked, by recognizing applicable hypotheses and ideas that will be broke down utilizing essential information. This section centers around online business, e-retailing, Internet promoting technique and customer conduct. 2.2.1 Internet Marketing Since business to purchaser (B2C) internet advertising is getting progressively well known as of late, the number of inhabitants in online shoppers is turning more standard and different (Kotler, 2008). Web advertising procedure gives steady course to an associations e-promoting exercises, characterized by Kotler (2007, p493), is getting one of the generally fast expanding advancements of direct showcasing and far reaching utilization of the Internet and has an assortment of effects on the two purchasers and advertisers. Consequently, the term Internet advertising alludes to an outside point of view of how the Internet can be used regarding conventional media to flexibly and convey administrations to clients (Chaffey, 2009). Smith and Chaffey (2008) express that: E-promoting can distinguish, envision and fulfill client needs proficiently Distinguishing needs from client remarks, enquiries, solicitations and objections requested by means of the sites email office Foreseeing the Internet gives an extra channel by which clients can get to data and make buys assessing the interest is vital to overseeing asset assignment to e-advertising. Fulfilling accomplishing consumer loyalty through the computerized channel, this identifies with client relationship the board. Proficiently in a robotized way, presumably should mean productively, expanding lifetime esteem and keep up the tremendous multitudes of not-revenue driven advertisers. [Chaffey and Smith, 2008, page 18] The Internet carries comfort to shoppers and has additionally allowed the making of virtual retailers, which are portrayed by having just an online nearness, for example, Amazon.com (Henderson and Er-Radi, 2000). Additionally, the key explanation that drives business associations to get to online is to include an incentive for clients by giving them alluring and viable sites. Kotler et al. (2008) consider that far reaching utilization of the Internet and different advancements has given advertisers a fresh out of the plastic better approach to make an incentive for clients and manufacture solid associations with them. The web has essentially changed clients idea of accommodation, speed, value, item data and administration. The creators additionally recommend that the accomplishment of snap just organizations, for example, Amazon, eBay and others to reconsider how they served their business sectors (Kotler, et al. 2008, p839). The significance of an Internet promoting methodology was underlined by Chaffey et al. (2009), who said that a solid system is expected to give reliable heading to an associations e-showcasing exercises. Also, the Internet advertising technique is a channel promoting methodology and decides the key hugeness of the Internet identified with other correspondence channels which are utilized to speak with clients at various client touchpoints; for Internet showcasing, numerous online associations proposed to utilize website streamlining (SEO), pay-per-click (PPC) showcasing, offshoots and email promoting (Chaffey, et al. 2009, p201). Clearly, the advertising blend (Kotler, 2001) can be applied by advertisers to inform their Internet showcasing methodology; the expansion of 4Ps 7Ps include: Product, Price, Place and Promotion, People, Process and Physical proof (Booms and Bitner, 1981). The promoting blend is applied much of the time to advertising system since it gives a basic key structure to changing various parts of a companys items assisting with affecting the interest for item inside the objective markets. Particularly for an association which is included legitimately in value-based web based business, computerized media have suggestions for the criticalness of various promoting blend for various markets (Chaffey et al, 2009). Moreover, Lauterborn (1990) proposed the 4Cs system the 4Cs infer more accentuation on client needs and worries than do the Ps: Convenience for the client; Customer worth and advantages; Costs to the client; and Communication. This client driven methodology likewise applies well to onl ine markets; it follows that the choice of advertising blend ought to be founded on nitty gritty information on purchaser conduct assembled through statistical surveying (Chaffey et al, 2009, p 279). Dennis and Harris (2002) additionally demonstrate that one advancement has merit as being unmistakable of the manner in which advertisers consider the client. The 4Cs are as clarified beneath: C1 Convenience for the client Spot (from the 4Ps), can be thought of as Convenience for the client, perceiving the clients decision to buy in manners that vibe helpful to them. C1 likewise incorporates key parts of web architecture, for example, route, design and simplicity of procurement. C2 Customer worth and advantages Item, can be thought of as Customer worth and advantages. E-retailers currently determine items to a vastly improved degree than already, assessing connections to the client and valuation for benefits that clients need. At the point when clients are purchasing on the web, they are far less inclined to request help than when they are available. E-customers should be particularly cautious about portraying items expressly as far as client worth and advantages. C3 Cost to the client Cost is spoken to as Cost to the client, the genuine cost that the client will pay, including bundling and transportation charge. Purchasers frequently have an observation that costs ought to be lower online than coming up. Retailers frequently offer further valuing alternatives incorporates: limits; additional items and additional items and administrations; assurances and guarantees; discount approaches; request crossing out terms (Chaffey et al, 2009) C4 Communication and client connections Correspondence is comparable to Promotion. It is a two-way process likewise including mentalities and input from clients to providers. Dennis and Harris (2002) express that retailers spend more on promoting than makers do, and they are nearer to clients and have more access to client criticism. Effective e-retailers regularly use disconnected publicizing and advancement, for example, magazines and banners, incorporated with internet showcasing interchanges. Online techniques incorporate pennant promotions and pop-ups, paid-for postings in web indexes and partner programs. E-retailers think that its hard to pick up and fulfill clients enthusiastic needs and needs. To accomplish this, e-retailers can make a web environment utilizing strategies, for example, music, visual download and recordings. Also, e-retailers can construct an image of items well on the way to be purchased by singular clients. For example, Amazon (www.amazon.com) coordinates new books to existing clients who possibl y intrigued by them, in light of earlier buys and makes proposals as needs be (Dennis et al, 2004 pp2-8). 2.3 E-business Reynolds (2000) exhibits that the Internet is changing the manner in which individuals lead typical business, regardless of whether this is finding better approaches for income, getting new clients, or dealing with another business gracefully chain. Web based business empowers organizations to offer items and administrations to purchasers around the world. As indicated by Warrington et al. (2000), the complexities of electronic trade by means of the Internet and the World Wide Web have offered advertisers a bounty of chances and difficulties. Online business is developing at an enormous rate, utilizing the Internet at first as a correspondence and special instrument, and later to perform circulation channels, finding a completely new circumstance of purchaser buying conduct. De Kare-Silver (2000) proposes that intuitive innovations are getting rid of the requirement for individuals to visit shops. The quantity of UK normal home web clients has ascended to 16.5m, time spent by home we b clients is likewise growing up, on the grounds that they look for and use sites more (Gibson, 2002). Oz (2002) comprises that buyers like to shop and purchase on the Internet for three significant reasons: accommodation, sparing time and relative shopping. Ginn (2010) likewise shows that online deals are a colossal and developing piece of the UK retail part, and presently represent a fourth of all new retail organizations; online deals are anticipated to reach  £78 billion during 2010. In spite of the expanding levels of Internet reception and utilization, Internet shopping in the UK speaks to under 10% everything being equal and web based shopping stays well known for specific items just (Soopramanien et al, 2007 refered to in Office of National Statistics Omnibus study, 2003). Besides, Internet shopping is viewed as both sheltered and simple by a huge number of buyers (Econsultancy, 2010). Along these lines, selling items online offers gigantic potential open doors for retaile rs; it likewise in a flash empowers organizations to arrive at clients who might not have visited their blocks and mortar store. An online business of dependable connections has become a huge factor for advertisers because of the expanding attention to the monetary advantages in looking after clients (Sahota, 2004). As per refered to from Reicheld and Schefter.s explore (2000), the extraordinary financial aspects of web based business make client maintenance a need for the e-retailers endurance in the computerized world. Chaffey et al. (2009, p628) shows that since 2001 numerous retailers have acknowledged the Internet as a tough exchanging condition and have started turning out to be the means by which to shape their organizations to adapt to the requests of exchanging and associating in a virtual situation. The creator likewise recommends that organizations can discove

Friday, August 21, 2020

The Wine Market in the United States

Case investigation It is apparent that the wine showcase in the United States is developing enormously. The equivalent can be confirm in European nations. The improvement of the wine quality as of late has demonstrated that the interest for the item is high, particularly in the United States. In addition, the opposition for the US showcase as a key and expensive wine advertise means that the market is developing with time.Advertising We will compose a custom paper test on The Wine Market in the United States explicitly for you for just $16.05 $11/page Learn More Moreover, the revival of the old world wine makers in the European nations means that wine advertise is yet to soak. Throughout the years, the interest of wine has varied as can be confirm for the situation investigation of the worldwide wine war. A portion of the elements that has influenced this interest incorporate, value, client inclinations, showcase separation, chain of dispersion and wine quality (Anderson 278). Then a gain, the gracefully of the wine has been influenced by the accompanying elements; the cost of the item, wine delivering innovation, the cost of related items, for example, lager, the climatic states of the wine creating nations and sponsorships given to wine makers or grapevine cultivators. In the accompanying conversations, the above perspectives will be delineated in a top to bottom way. As prior showed, the wine advertise is developing quickly. A case of such is exemplified in the US wine advertise. It is stated that with time another age of wine shoppers began to favor wine contrasted with regular liquor customers in America. From this viewpoint, it is prominent that greater part of the Americans are utilized to alcohol and lager (Bartlett 3). Nonetheless, with time, larger part of the liquor customers began to comprehend the medical advantages that are collected from taking wine. In actuality, American wine makers couldn't fulfill the residential market, provoking more wine to be imported from the old world’s wine makers. Another avocation of the extended market of wine is that a portion of the old world wine makers had just begun to fight for a prepared market of wine in America. The opposition was to a great extent contributed by cost and quality components. The Europe’s advance on the American market through different strategies is a case of a promising wine showcase. A case of such is prove by the financed promoting on wine items. In actuality, the sponsoring of these items is because of an European Union strategy on agribusiness. Then again, the American US makers have played another job of rebranding the remote wines as their own. Instances of such wine are the Italian wines; Ecco Domania and the Bella sera wines.Advertising Looking for paper on business financial aspects? We should check whether we can support you! Get your first paper with 15% OFF Learn More In request to decide the interest of wine in the wine business, one needs t o consider the different elements that impact the commodities’ request. For this situation, the wine’s request has unbelievably changed or vacillated after some time. In the first place, the cost of the wine in old world wine makers was moderately high. This is because of the way that, wine was just connected with class and glory. The expanding of the cost influenced the interest of the item and in due time, the interest of wine had decreased in a large number of the old world wine creating nations. Case of such is prove in Chile, Argentina and in Spain. The passageway of the new world wine makers, in particular; US and Australia, saw the opposite of this interest. The two nations guaranteed that wine was delivered with the most current innovation and made accessible at lower costs to a significant number of the wine customers. Moderately, this expanded the interest for wine. America has a great deal of liquor shoppers and their inclination in some cases relies upon th e cost of the item. In a similar setting, the consumers’ inclinations will decide the interest of the item being referred to. In the event of the American wine purchasers, the majority of them favored the remote wines. This was after the local wine makers in America began to expand the cost of their wines (6). Additionally, a portion of the wine customers in America put stock in the genuineness of the wine mixed in the old world. This influenced the interest of the neighborhood American-made wines, inciting for more wine brings into the nation. Another explanation that influences the interest of wine in America is the cost of other mixed beverages, for example, lager and alcohol (Bartlett 3). As showed before, dominant part of the ordinary Americans are utilized to brew and alcohol. Brew and alcohol can be named as substitutes to liquor. Since the costs of the two substitutes are generally lower than wine, the interest for wine goes down. Anyway different factors such medical advantages make a greater amount of the Americans devour wine than other mixed beverages. Be that as it may, a more appeal on wine doesn't make lager and alcohol sub-par. The prevalence of a ware relies upon the inclination of the buyer. Lion's share of the wine customers in the US are plentifully supplied individuals, knowledgeable and web shrewd. As indicated by the contextual analysis on the worldwide wine wars, the US wine customer base is likewise named as value delicate (6). This displays the refinement of the US wine customers. This implies they can purchase wine paying little mind to the cost, however with specific contemplations; utility. The wine shoppers need to purchase a result of significant worth and which they consider as quality. This is the explanation they favor low-valued wine from remote nations, and which they despite everything accept is still of acceptable quality.Advertising We will compose a custom paper test on The Wine Market in the United States explici tly for you for just $16.05 $11/page Learn More Supply is another significant angle to consider while talking about the wine business in the US. As indicated by Amerine and Josyln (146), the gracefully of wine into the US advertise has been affected by factors examined thus. Right off the bat, the cost of the item in the US was moderately high thinking about that the item was under severe guidelines (Bartlett 2). Then again, the greater part of the old world wine makers had little wine creation limit. This caused the new world wine makers to consume their market domains causing the cost of the ware to go high. In a large portion of the European nations, the cost of the grapevines was purchased moderately low by the shippers and different companies that were associated with huge scope wine creation. The cost of basic factors that add to creation of wine, for example, land or work can either decrease or increment the gracefully of the ware. For instance, the discontinuity of land in a large number of the European nations like Germany and UK decreased the flexibly of wine. For this situation, cultivating of the grapevine was done in little scope and just barely any cultivators provided the vines. Then again, enormous tracts of land in both Australia and America were utilized as vineyards. With time, the new innovation utilized in delivering wine by the new world made it simpler to diminish work and all expenses related with land and creation (4). Along these lines, this decrease of the creation costs expanded the gracefully of wine in the growing of wine showcase. Thirdly, the government’s activity to sponsor ranchers who had vineyards and wine making organizations guaranteed that a portion of the old world wine makers provided more wine. Works Cited Amerine, A., Maynard and Josyln, A., Maynard. Table wines: The innovation of their creation, Volume 2. Berkeley, CA: University of California Press, 1970. Print. Anderson, Kym. The world’s wine markets: Globalization at work. Northampton, MA: Edward Elgar Publishing, 2004. Print. Bartlett, A., Christopher. Worldwide wine war 2009: New world versus old. Harvard Business School Case Study, August 13, 2009. Print.Advertising Searching for article on business financial matters? How about we check whether we can support you! Get your first paper with 15% OFF Find out More This exposition on The Wine Market in the United States was composed and presented by client Juliana Weber to help you with your own investigations. You are allowed to utilize it for research and reference purposes so as to compose your own paper; in any case, you should refer to it as needs be. You can give your paper here.

Monday, June 1, 2020

Reflection on the Immersion Experience Essay - 825 Words

Reflection on the Immersion Experience (Essay Sample) Content: Reflection on the Immersion ExperienceStudent NameInstitution NameReflection on the Immersion ExperienceImmersion is a powerful strategy to enhance cultural competency in nursing. It is done to increase awareness of personal beliefs, values, behaviors, and learning from clients and medical professionals. I personally spent two days with a clinical pharmacist in the Intensive Care Unit (ICU). To me, this was a new unit and new area to work with. During my clinical round which is an inter-professional round, I found that the clinical pharmacist played a key role in the management of patient care. I noticed that most of medical team in was fully dependent on him in relation to medication prescribing.Before the immersion experience, I had a mere idea about the clinical pharmacist that he is only involved in rounds, giving suggestions and makes sure that medications are within normal dosage and time frame. I came to realize that in real life, the clinical pharmacist is no t only involved in the above role but has more in-depth thought about which medication is more beneficial and how it will affect the whole status of the patient. I experienced a certain case that involved the pharmacist.A patient was on two big guns antibiotics and the physician was not aware of the renal function of the patient. The clinical pharmacist started to rationalize the basics of molecular pharmacology on the option to eliminate one of them because it was worsening the kidney function and then replacing it with another one that was less nephron-toxic. In addition, all were evidence based.I saw the pharmacist ensure that patients received the right drug at the right time and the right dose. He monitored the side effects and effectiveness of drug treatment in order to achieve the best outcomes. He was part of the ICU team that often took rounds and advised doctors on the best drug regimen. This pharmacist appeared to be an expert in his field no wonder he was always involved in ICU patients who often need great special care and attention. According to me, he was a good hearted person. He helped patients regardless of type of illness, race, gender, profession and even background. He really possessed those qualities of a well trained professional. Moreover, his arguments to his colleagues were of positive attitude. There was no quarrel between him with the nurses but slightly with some of the physicians. This happened to be the negative experience I had and critically it was the negligence of some physicians.Some of the physicians lacked an understanding of the clinical pharmacist role. They could listen to what the pharmacist had to say but in practical, they could not do whatever they were supposed to do. They ignored what they were directed to do. Worse enough, they could not observe the hierarchy and chain of command. The clinical pharmacist could even try to tell them that he was the leader and that he was in command of the situation. Quite a number of physicians didn't agree with him, even after seeing that he had evidence based point of view. I can say that most physicians and doctors didn't really offer the support required to the clinical pharmacist. They appeared to neglect his advice at times something considered unprofessional.On the side of administration, I saw no support that came to the clinical pharmacist. Normally, hospital administrators manage hospitals, outpatient clinics, hospices, and drug-abuse treatment centers. They make sure hospitals operate efficiently and provide adequate medical care to patients through the medical personnel present. Here, there was minimal administrative support. Doctors including physicians and nurses struggled to keep up the situation despite the less supply of drugs they were receiving. There was a situation that a patient died in the ICU due to lack of blood for transfusion. The hospital had no more in their blood banks and this was a problem that resulted to death of a patient.H aving seen and experienced many issues during my immersion time, I can say that the hospital administration needs to do quite a number of things to foster smooth flow of activities. Every department especially the ICU one needs great attention because I witnessed one of the patients lose her life only due to blood shortage. All drugs needed should be supplied at the right time as well as at the right places. The administration also n...

Wednesday, May 6, 2020

Essay on Creation of the World - 3047 Words

Creation of the World Missing Works Cited Powerful mythologies are normative, as Mircea Eliade described, defining for their societies how the world may be ordered. Myths provide the living backdrop on which people may act. In the Christian societies of Europe and America the â€Å"origin myth† that defines the divine order that Christians should follow is laid out largely in Genesis, and the worldview expounded within it in some sense provides the baseline from which â€Å"scientific† alternatives must deviate, at least within the Europe and America. In Genesis, the world, created wholly by God, is described by a divine order composed of a series of superiority relationships—that is to say, of hierarchies. As the Creator, God has†¦show more content†¦The transition is easily accommodated by the Fall of Man, in which decay and corruption are introduced into the world. These changes do not refute the static nature of Creation however—even the Flood (Genesis 7) or the destruction of the Tower of Babel (Genesis 11), both of which fundamentally altered the nature of the world in which people live, can be interpreted as part of an ordering process. Eliade describes how many myths occur in a sort of â€Å"sacred† time (Eliade, Myth and Reality, p. 13) in which the Supernatural plays out upon the world. Even these later parts of Genesis, which concern less abstract occurrences—bordering on the historical—about humans, occur within the time frame of Genesis and can thus be considered as part of an extended Creation. Within this frame, the chaos produced by the Fall is slowly sifted into a new order that defines the present and is cemented by God, as with the covenant of the rainbow (Genesis 9) that prevents the recurrence of a great destruction like the Flood. And of course, from the very beginning all of the events of Genesis are totally subsumed under the providence of a single creator. It is only a small stepShow MoreRelatedThe Creation Of The World952 Words   |  4 PagesThe Creation from Animals In most cultures and myths most people seems to agree on that the animals and creatures of this world, were here way before humans ever existed. The different ideas of ways of how humans are created are very different but yet most cultures do agree that animals were here before humans. Some of these creation myths also believe that an animal was honored by the creator or God to help create this world. Two creation myths that seem to agree on more things about the creationRead MoreThe Creation Of The World1206 Words   |  5 PagesThe Bible begins with the creation of the world, but also in the very beginning, there is the presence of disobedience to God. In Genesis 12, there is a new beginning. God begins to change the world, that change began with an individual: Abraham. In Genesis 12:1-3, God says to Abraham, â€Å"I will make of you a great nation, and I will bless you, and make your name great, so that you will be a blessing† God continues to say, â€Å"I will bless tho se who bless you, and the one who curses you I will curse†Read MoreThe Creation Of The World1912 Words   |  8 PagesCreation stories are obviously stories about the creation of the world. They, just like us, vary in their origins and how they are structured. Each contains the tale of how that certain culture or religion views the beginning of everything, ranging from the animals to the world itself. Creators came in the form of gods or other super-human beings and they handled each world differently. These stories each gave us an idea of how the world we are living in was made, and some even tells us about howRead MoreCreation Theology And The Creation Of The World2019 Words   |  9 PagesCreation happened at the beginning of time. In cultures all around the world, there can be found explanations of how people came to be and how the world they live in was formed. Creation theology is a bit different. It explains how Christians believe the God of the Bible formed the world and how that impacts them today. A belief that most Christians hold that can be traced back to the Apostle’s Creed is that God the Father is â€Å"maker of heaven and earth†. This can be translated in different ways howeverRead MoreThe Creation of the World Essay731 Words   |  3 PagesThe Creation of the World The creation of the earth and all that is within the earth is mysterious, yet miraculous at the same time. Although there are probably hundreds of different accounts, they all seem to be different while almost identical in text. I will be comparing and contrasting between the Priestly account and the Yahwist account in the book of Genesis. Along with these accounts I will be discussing the key elements in the theology of creation and eco-spirituality in the worldRead MoreThe Creation Of The World Bank1999 Words   |  8 PagesThe creation of The World Bank was an attempt to remedy the wealth disparities facing African nations, and open new markets for international trade. Africa’s economic stagnation calls for a shift in paradigm, leaning towards sustained economic growth. It is only through the sustained growth of these economies that the World Bank can claim success. This essay will assess the meaning of failed development, effects of trade liberalization and the impact th at multi-national corporations have had on AfricanRead MoreMayan Creation Of The World Myth1042 Words   |  5 PagesMayan creation of the world myth There are a variety of creation myths from the different peoples of the world. One of the most known myths is from the Mayan people. The Mayans were an indigenous group whose civilization was located in southern Mexico, Guatemala, Belize and Honduras. They were a very strong group that lived during the sixth century. While, to us, the Mayan creation story is a myth, the Mayan people considered it a true event. The Popol Vuh contains the Mayan’s creationRead MoreA Book About The Creation Of The World875 Words   |  4 Pagestell you able one child that I just started to write to. Her name is Ruth and she is 4 years old. I have started to tell her some Bible stories and I also wanted to share them with you. The story I will be writing about is the story about the creation of the world. I encourage you to read this story in Genesis 1. I wanted to share some insights that I recieved from going through this passage in the Bible. I read this passage in my Bible and then I tried to summarize it the best I could to tell it toRead MoreEssay on Different Theories of the Creation of the World850 Words   |  4 Pages There are many different theories about the creation of the world. The two that rival each other are the religious versions and the scientific version. The quote â€Å"They say that every atom in our bodies was once a part of a star†, by Carl Sagan an astronomer, supports the scientific theory, which is being accepted as true more and more each day. What the quote tells us is that Carl Sagan believed in the Big Bang theory and the theory of evolution. This quote supports the Big Bang theory in many waysRead MoreThe Computer And The Creation Of The World Wide Web1411 Words   |  6 PagesCh 9: Agree: â€Å"The computer and the creation of the World Wide Web have transformed the world† (p.166). Rationale: I totally agree with this statement and I believe that the creation of computer and World Wide Web has completely transformed the healthcare system. Now instead of personally visiting the doctor for little things you can simply e-mail and request prescriptions online. For an example, when e-mailing the doctors did not exist, I would waste my time and pay co-payments for non-urgent things

Tuesday, May 5, 2020

Commonwealth Bank of Australia Risk for Devices-myassignmenthelp

Question: Discuss about theCommonwealth Bank of Australia Risk for Personal Device. Answer: Review Of The Project Financial services refer to a range of financial services provided by various players in the financial industry. They include services provided by banks, insurance companies, and government-sponsored enterprises among others. In broad terms, institutions operating in the financial sector are regarded as highly sensitive especially with regards to the security of their systems. Financial service providers are virtually present all over the world even in remote areas to satisfy the financial needs of individuals, groups, companies and other institutions (Gustav Kabanda,2016). The intermediary role played by financial service industry in Australias economy is quite significant. Individuals, government agencies, businesses and nonprofit organizations rely on this sector to either get funds when need be or dispose of excess cash which is then lent out to those who need it, technologists play a significant role in facilitating this transaction. Clients .Clients are the most important asset to the Commonwealth Bank of Australia. The bank is focused on establishing lasting cordial relationships with its various clients both depositors and debtors. The bank's clients include retail clients, institutional investors, financial sponsors, entrepreneurs, and corporations. Implementation of the project would mean that these clients needs attended to at any given time and with much efficiency (Felt,et al,2011) Employees. Employees are an important shareholder and an important asset to the bank. The company is focused on nurturing and developing the professional capability of their employees. The project might be limiting to employees to employees without such devices and an opportunity for those with the devices to enhance their professional prowess There are some legislation that would determine the ability of Commonwealth Bank of Australia to implement the project which includes Archives Act 1983, Privacy Act 1988 and Freedom of Information Act 1982 which were established as a necessity as a result of the risks that emanate from allowing employees to bring own devices at the workplace. If it can implement the project, the Bank will, therefore, be required to put in place certain control measures to ensure that it meets all legal obligations (Watkins, 2014). The bank would, therefore, be required to examine the implications of the project to both the business and its overall security. As per best standards requirements, commonwealth bank of Australia would be required to determine the implication of the project by analyzing an already existing real example, identify the existing regulations and legislation to facilitate compliance, put in place various support measures, both financial and technical and finally roll out the proj ect. The realization of this is solely dependent on the ICT department or the technological department of the Bank. Financial institutions are affected by many risks which can be categorized into. Credit risks Credit risks occur as a result of failure by debtors to pay what they owe a bank. Failure to pay can be as a result of inability by the debtor or unwillingness to pay. Credit risks are likely to affect Banks operations, its shareholders as well as its ability to issue fresh loans (Acharya, et al,2017) Legal risks Legal risks occur as a result of violation of legal standards set by government institutions as well as other regulatory bodies in which financial institutions are supposed to abide by. Legal risks affecting financial institutions include violation of security and fraud laws. Legal risks can have adverse effect towards the operation and the reputation of a financial institution like the Commonwealth Bank of Australia. Systematic risks Systematic risks occur as a result of changes in the value of an organizations assets. Systematic risks occur mostly a s a result of changes in the prevailing economic conditions such as changes in interests rates, changes in foreign exchange among others. Systematic risks can also have a significant impact on the operations of Bank (Acharya, et al,2017) With the possibility the occurrence of many risks therefore, any Financial Institution is therefore required to be aware of these risks among others so that it can put in place policies of identifying and addressing the risks before they can have a significant impact on their operations. Security Posture Modern organizations are faced with a myriad of challenges which continue to threaten their survival. While challenges can present an opportunity for an organization to put in place measures to avoid more devastating challenges, the emergence of serious challenges that can lead to ultimate incapacitation of an organization. Of major concern is the financial service sector whose data security is paramount especially due to the adverse effects that can result from any serious threat through infringement of banks systems and databases. Such data these would adversely affect not only the bank but also its various stakeholders who depend on the services offered by the bank (Shim, et al,2013)The management of Commonwealth Bank of Australia especially those in the IT department are tasked with the responsibility of ensuring that such threats are mitigated. It is their sole responsibility to protect the Banks systems, data and the privacy of its clients by adequately managing the bank's fina ncial information. Amid the increasing level of competition in the Australian financial sector, the Bank has no option but striving at providing the best data security measures in the industry. Commonwealth Bank of Australia has been viewed to be way ahead of its main competitors in as far as information security is concerned. With the many strategies undertaken by the Bank, implementation of the project allowing employees to bring their devices to the workplace is likely to have huge implications on its operations because employees might have unauthorized access to some of its crucial information from their devices which might lead to loss, damage or manipulation of data. While the project might have both positive and negative implications, it will be necessary for the Bank to undertake sufficient research to find out whether the benefits surpass the negative outcomes (Thomson,2012). Monitoring is key in managing any sensitive data or information form an organization. By allowing employees to bring their own devices this practice which is highly encouraged at the Bank is likely to be affected. Among the implications of this project to the bank is the reduction of system security assurance. The bank will also be able to monitor the working of their employees because the use of personal devices makes it relatively hard for the management to distinguish when employees are using the devices for personal undertakings or work-related tasks. The project will also facilitate deviation from the banks secured use of sensitive information to the unsecured use of such information. It is also possible that such devices might be stolen thus risking the Banks sensitive information. The project also comes with an additional budget for the company, implication on its human resources, compliance regulations as well as legal obligations and liabilities. To regulate such implication s, Commonwealth Bank of Australia will need to put in place regulatory policies stipulating the terms of use of personal devices (Miller,Voas Hurlburt,2012). Reasons for implementing a BYOD Policy There are numerous reasons to why an organization can organization can adopt the use of a BYOD policy which include improving the real time productivity and engagement of employees because the policy makes them more satisfied and provide results from any location, creating a smarter and skilled labor force, to introduce a more flexible strategy at the work place, reduce hardware investment by a company among other benefits. Return on Investment is used to ascertain the cost reduction achieved by a project over certain duration of time. This method can be used by Commonwealth Bank of Australia to analyze the long-term impact of implementing a BYOD policy. Return on Investment is calculated as follows Net Profit / Total Investment * 100 Commonwealth Bank of Australia must, therefore, undertake an evaluation of the merits and demerits of the project and its overall implications on the Banks' goals and mission. This will then be followed by formulation of policies to regulate the use of personal devices and the general security of the Banks systems. The Bank may also hire the services of solution providers whose main responsibilities will be assessing the risks associated with the project, formulation of different projects to govern the project as well as coming up with control measures to facilitate implementation of these policies. Commonwealth Bank of Australia will, therefore, be required to notify their employees on what to expect upon implementation of the project regarding the privacy of their personal information which might need to be subjected to company monitoring (Pillay,et al,2013) Implementation of BYOD project will require the bank to consider its ability to remove the banks information from employees devices upon their departure from the bank, clarify on what devices, platforms, and networks that can be used in these devices including any associated prohibitions to use such devices, avail a procedure to address possible theft of these devices in order to protect Banks Information and clarifying on the consequences of any violations from employees regarding the use of personal devices. The bank should also establish its ability to access and have control over information belonging to it including the use of mobile device management system as well as identify support limitations resulting from these devices to ensure that they are addressed. Before implementing the Common program wealth Bank is also required to analyze how the project is likely to affect the various stakeholders and the bank at large and therefore it should solicit views from its employees, th e finance department, its legal advisers and finally its technological team (Ghosh, Gajar Rai,2013). The solution lies in the Banks ability to use smart policies and compliance; such policies would include an adoption of a formal mobile policy that stipulates consequences of violation, sufficient security measures use of training programs to solve mobile liabilities. A mobile policy would include ensuring that each device that is being used by an employee is remote wipe enabled. Although the process might require much time and resources, it will save the Bank a significant amount of resources that it might incur in an instance where these devices are used to break the law (Moyer,2013). Threats, Vulnerabilities, And Consequences Although highly considered for their useful functionality and high efficiency at the workplace, technological devices such as iPads, mobile phones, laptops, and ipads have come with numerous challenges that continue to affect not only employees but also their employers. Recent studies have shown an increase in the usage of usage of own smart phones and tablets for business with the number expected to keep rising (Morrow,2012). The number of Companies allowing employees to make use of their devices for business has also continued to rise with a recent research predicting that at least 38% of global companies will have implemented Bring Your Device into their operations. This is also a trend that has been witnessed 2017 which has recorded a significant increase in the level of usage of personal devices by employees at the workplace. This is to signify perhaps the Importance that some employers attach to the use of personal devices for business. However, adoption of BYOD Policy requires employers to shift their focus to remain updated on changes in technology as well as being mindful of data security and privacy issues (Lebek, Degirmenci Breitner, 2013). For the Commonwealth Bank of Australia, the implementation of the project allowing employees to use their devices for business will, therefore, come with threats, vulnerabilities, and consequences for both the Bank and its Employees. As such, the Bank will find it necessary to focus on changes in technology and regularly address security and privacy issues arising a result of the project (Garba,et al,2015) There are various risks associated with the implementation of the project. By allowing its employees to use personal devices for official purposes, the Bank will commit itself to any violations committed by their employees through the use of personal devices, For any offense broken by their employees, Commonwealth Bank of Australia will be held responsible (Ghosh, Gajar Rai, 2013). A good example of such risks would be where a driver of the bank causes an accident because of using a cell phone while driving as it was the case of the COCA-COLA Company driver who hit a woman while on the phone in 2016. The cases of Employers being sued for employee use of personal devices have been on the rise in the recent past ( Bzur, 2013).There, therefore, some risks that Commonwealth Bank of Australia will be faced with as a result of implementing this project. Abstracted driving Distracted driving is one of the most common risks that result from the use of personal devices at work. The impact of this can be quite huge for a company. The use of mobile phones by drivers while driving can result in unwarranted legal battles as well as penalties due to injuries or deaths of road users. Risks associated with distracted driving is, therefore, one of the risks that Commonwealth Bank of Australia is likely to be faced with as a result of allowing employees to use their devices at work (French, Guo Shim,2014). Loss of devices with unsecured data Lost devices can pose risks not only for Companies but also for individuals. Due to the sensitivity of information handled by monetary institutions, loss of personal devices such as phones or tablets used by employees in their daily duties may lead to leaking out of secrets and sensitive information about the Banks Clients and employees. Such information may end up being used against the company in legal suits (Burt,2011). Sexual Harassment Sexual harassment at the workplace is one of the major risks of allowing employees to bring their devices. Sexting is the most common form of sexual harassment used by adults. It is the process where someone sends another person sexually explicit messages or photographs through mobile phones. Sexting is classified together with speaking inappropriately to a colleague at the workplace (French, Guo Shim,2014). However, unlike the use of inappropriate language at the workplace done orally, Sexting using personal devices at the workplace presents concrete evidence that can be used against the Bank. Content posted on social media The final risk that the Bank is faced with has to do with the content posted on social media using employees devices. It is a common practice by some companies that social media sites be blocked from the companys network; however, with the adoption of this project, it might be difficult to regulate what is posted on social media by employees. Some of the risks associated with social media might include racist comments posted on Facebook by an employee using a BYOD device or an inappropriate photo such as that of an employee trespass (Guan, 2012). All these can be used against the Bank in legal suits and therefore making the Bank liable for violation of the Law. Companies cannot afford to ignore the increasing rates of adopting BYOD that has been caused by the rise in the use of technology. By implementing the project, Commonwealth Bank of Australia will allow usage of employees devices such as smart phones, laptops, and tablets for official duties instead of company-provided devices. Among the information stored in such devices might include inventory, mobile schedules, photos and training videos among others to facilitate easy access of data. While the practice of allowing employees to bring their own devices at eth workplace is becoming a norm, there are many consequences that Commonwealth Bank of Australia might be subjecting itself to by implementation of the project (Mansfield-Devine,2012). Resentment by employees By implementing the project, the Bank will force its employees to incur extra costs to acquire the requisite devices for those who might not be having them. Requesting employees to purchase new devices for work purposes might, therefore, leave them unhappy. Additionally, the costs of usage and transportation are also likely to be pegged on employees (Scarfo,2012) It is likely that employees will be unwilling to shoulder this cost. Too much usage of personal devices for work-related tasks also makes them depreciate within a short period. Among the considerations that The Bank might be considered before implementation of the project will be determining who will be responsible for any repairs on the personal devices. Additionally, the issue of costs associated with the loss of the device while at work can also lead to resentment on the part of employees (Zahadat,et all,2015) Reduced productivity Another consequence of the use of personal devices by employees can be associated with their distractive nature. By using their devices at the workplace, employees are more likely to spend a considerable amount of their productive hours on social sites such as Whatsapp, Facebook Instagram, and Twitter. While the Bank desires to maximize profits, the implementation of the project will result in a distraction of employees from their primary duties which will directly affect their productivity. The small amount of time spent by one employee to send a text message to a friend or surf the web can collectively lead to wastage of so much time which will reduce the overall productivity of the Bank (Mitrovic,et al,2015) Little Control over the Device By allowing the use of personal devices, the bank will also have little control over them. Although the Bank might result in restrictions on the files that can be activated by the device there some employees as a result of their technological prowess might jailbreak such restrictions and gain access to restricted content (Wiech,2013). Data Security Risks Increased entry points for hackers The use of personal devices in the workplace increases the chances of hacking of an organizations systems. While hacking in a situation where all the Banks desktops are within its premises might be relatively difficult, having employees work from their mobile phones or laptops makes it possible to hack from multiple points thus making it easier for hackers to get hold of sensitive information from the bank (Downer Bhattacharya, 2015) Access to Unsecured Wi-Fi Accessing of unsecured Wi-Fi can be quite risky to the bank's data. Allowing use of personal devices would mean that employees will use the same devices that they use to access unsecured Wi-Fi Connections at restaurants, their homes or even at the Airport. Such unsecured networks can facilitate easy hacking of the Banks systems (Suby,2013). Discoverability of data This can be the case where there is a loss of the devices. Any loss resulting from theft or employees carelessness puts the employers data which is stored on the device at risk. Additionally, the project also means that the privacy of employees will also be at stake. For example, in the case of any legal proceedings, personal devices being used by an employee might b explored by the employer or a third party if need be. Some of the personal information that could be explored includes information contained in social media accounts, geographical location or even private photos. This could be against the wishes of the employee (Song, 2014). People leaving the Bank Sometimes employees might leave a company abruptly without prior notice. In such a situation where employees leave the Bank without notice, the management might not have time to remove the bank's information and passwords which might facilitate unauthorized access to the Banks systems by former employees (Vijayan Hardy,2015). Creation of a data classification scheme is the first step in the process of classifying data .It is then followed by the creation of security standards which set the appropriate practices of managing data. The following is an example of a data classification scheme Category 1: This category of data is available for public display, and may include a companys contact information. Category 2: This category represents internal data that can be accessed by Companys stakeholders such as an organization chart. Category 3: Under this category is sensitive organizations data whose leakage to unauthorized persons can significantly affect an organization. Example include a companys contracts with third parties Category 4: This category represents highly sensitive data such as customers account information. Its disclosure can lead to legal tussle for an organization Category 4: highly sensitive data that could put the company in legal of financial risk if disclosed, for example, customer account information and employee social security numbers. Data classification Risks Risk Mitigation Category 2 data loss, defective deletion employee education Category 3 data loss digital signatures, encryption, Category 4 Theft Authorization, digital signatures and biometrics Risks and Risk Mitigation for various data categories Conclusion In conclusion, BYOD Policy is a concept that has gained momentum in the recent past as per the recent statistics of the number of organizations that are embracing it. Commonwealth Bank of Australia intends to join the list of companies that use this policy by implementing its project that will require their employees to use personal devices to be used as the main devices for performing their work tasks. However, successful implementation of the program will depend upon an analysis of numerous factors as well as the inclusion of various shareholders within the Organization. Commonwealth Bank of Australia will, therefore, be required to conduct a cost-benefit analysis of the proposed project before its implementation as well as the various considerations and measures that will be laid out to facilitate successful implementation of the project. Among the considerations that the Bank will need to look at are the various laws governing the use of personal devices at the workplace by emplo yees to facilitate co0mpliance by both the employees and the management. However, the implementation of the project will come with many challenges that the company will be required to mitigate. The associated threats, vulnerabilities, and consequences will affect both employees and the management. Among the risks that the Bank will be faced with are legal liabilities in case of violation of the exciting laws regarding the use of personal devices by the employees, abstracted driving, increases of sexual harassment among employees, associated risks of social media content ,possibility of loss of devices with unsecured data resentment by employees, loss of productivity for employees and the bank and Managements loss of control over devices used by employees in performing their work tasks. The Bank will also be faced with many data security risks including the risk of its systems being hacked from multiple points, the risk of former employees of the bank being able to access the Banks c onfidential information and the risk of discoverability of data. References Gustav, A., Kabanda, S. (2016). BYOD adoption concerns in the South African financial institution sector. InCONF-IRM(p. 59). Acharya, V. V., Pedersen, L. H., Philippon, T., Richardson, M. (2017). Measuring systemic risk.The Review of Financial Studies,30(1), 2-47. Zahadat, N., Blessner, P., Blackburn, T., Olson, B. A. (2015). BYOD security engineering: A framework and its analysis.Computers Security,55, 81-99. Song, Y. (2014). Bring Your Own Device (BYOD) for seamless science inquiry in a primary school.Computers Education,74, 50-60. Guan, L. (2012). Established BYOD management policies needed.Government News,32(2), 9. Bzur,A.,(2013).4 Risks When Employees Bring Their Own Devices to Work.Inc. Ballagas, R., Rohs, M., Sheridan, J. G., Borchers, J. (2014, September). Byod: Bring your own device. InProceedings of the Workshop on Ubiquitous Display Environments, Ubicomp(Vol. 2004). Moyer, J. E. (2013). Managing mobile devices in hospitals: A literature review of BYOD policies and usage.Journal of Hospital Librarianship,13(3), 197-208. Lebek, B., Degirmenci, K., Breitner, M. H. (2013). Investigating the influence of security, privacy, and legal concerns on employees' intention to use BYOD mobile devices. Suby, M. (2013). The 2013 (ISC) 2 Global Information Security Workforce Study.Frost Sullivan in partnership with Booz Allen Hamilton for ISC2. Mitrovic, Z., Veljkovic, I., Whyte, G., Thompson, K. (2014, November). Introducing BYOD in an organisation: the risk and customer services view points. InThe 1st Namibia Customer Service Awards Conference(pp. 1-26). Burt, J. (2011). BYOD trend pressures corporate networks.eweek,28(14), 30-31. Shim, J. P., Mittleman, D., Welke, R., French, A. M., Guo, J. C. (2013). Bring your own device (BYOD): Current status, issues, and future directions. Smith, A. D. (2009). Internet retail banking: A competitive analysis in an increasingly financially troubled environment. Information Management Computer Security, 17(2), 127-150. Ghosh, A., Gajar, P. K., Rai, S. (2013). Bring your own device (BYOD): Security risks and mitigating strategies. Journal of Global Research in Computer Science, 4(4), 62-70. French, A. M., Guo, C., Shim, J. P. (2014). Current Status, Issues, and Future of Bring Your Own Device (BYOD).CAIS,35, 10. Garba, A. B., Armarego, J., Murray, D., Kenworthy, W. (2015). Review of the information security and privacy challenges in Bring Your Own Device (BYOD) environments.Journal of Information privacy and security,11(1), 38-54. Zahadat, N., Blessner, P., Blackburn, T., Olson, B. A. (2015). BYOD security engineering: A framework and its analysis.Computers Security,55, 81-99. Watkins, B. (2014). The impact of cyber attacks on the private sector.Briefing Paper, Association for International Affair, 12. Ghosh, A., Gajar, P. K., Rai, S. (2013). Bring your own device (BYOD): Security risks and mitigating strategies.Journal of Global Research in Computer Science,4(4), 62-70. Downer, K., Bhattacharya, M. (2015, December). BYOD security: A new business challenge. InSmart City/SocialCom/SustainCom (SmartCity), 2015 IEEE International Conference on(pp. 1128-1133). IEEE. Vijayan, J., Hardy, G. M. (2015). Security Spending and Preparedness in the Financial Sector: A SANS Survey. Morrow, B. (2012). BYOD security challenges: control and protect your most sensitive data.Network Security,2012(12), 5-8. Chin, E., Felt, A. P., Greenwood, K., Wagner, D. (2011, June). Analyzing inter-application communication in Android. InProceedings of the 9th international conference on Mobile systems, applications, and services(pp. 239-252). ACM. French, A. M., Guo, C., Shim, J. P. (2014). Current Status, Issues, and Future of Bring Your Own Device (BYOD).CAIS,35, 10. Mansfield-Devine, S. (2012). Interview: BYOD and the enterprise network.Computer fraud security,2012(4), 14-17. Thomson, G. (2012). BYOD: enabling the chaos.Network Security,2012(2), 5-8. Felt, A. P., Chin, E., Hanna, S., Song, D., Wagner, D. (2011, October). Android permissions demystified. InProceedings of the 18th ACM conference on Computer and communications security(pp. 627-638). ACM. Wiech, D. (2013). The benefits and risks of BYOD.Manufacturing Business Technology. Zahadat, N., Blessner, P., Blackburn, T., Olson, B. A. (2015). BYOD security engineering: A framework and its analysis.Computers Security,55, 81-99. Scarfo, A. (2012, November). New security perspectives around BYOD. InBroadband, Wireless Computing, Communication and Applications (BWCCA), 2012 Seventh International Conference on(pp. 446-451). IEEE. Pillay, A., Diaki, H., Nham, E., Senanayake, S., Tan, G., Deshpande, S. (2013). Does BYOD increase risks or drive benefits.Melbourne, The University of Melbourne. Miller, K. W., Voas, J., Hurlburt, G. F. (2012). BYOD: Security and privacy considerations.It Professional,14(5), 53-55.

Saturday, April 18, 2020

Running On Peanuts free essay sample

â€Å"What should my name be?†I asked myself this on a sunny, steamy June afternoon, just over a year ago.As I scrolled through the required information to make a new Instagram account, I was stumped at what to call my soon-to-be food blog.Then it came to me: runningonpeanuts.As a runner who loves any kind of nut butter, I knew that it was the perfect name. Two years ago I gave up crusty ciabatta, toasty bagels, and ooey-gooey cinnamon buns.I gave up anything with gluten because it made me feel lethargic.In taking this step, it led me towards a paleo based diet; one full of healthy fats and protein that boosted my energy.By taking this leap of faith, not only did I discover that I thrive off of these macronutrients, but I grew to appreciate them.I don’t go a day without eating eggs for breakfast or peanut butter right off the spoon. We will write a custom essay sample on Running On Peanuts or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page I was beginning to become passionate about my food and wanted to share my creations with others. As I pulse the basil, kale, garlic, pine nuts, and extra virgin olive oil, my mouth salivates thinking about how delicious this pesto will be.This simple recipe that I mixed into a bowl full of quinoa pasta and sauteed zucchini is the post that earned me 367 likes when I didn’t even have 100 followers yet.When I saw the number of likes, I knew I had made the right decision in starting runningonpeanuts.This meal helped my blog grow to have over 235 followers and over 130 recipes and food ideas.Not only has this blog provided a creative outlet, it has helped me find the right lifestyle for me.What I love about Instagram is that as a paleo based eater, I can inspire others who are searching for new recipes whether they are paleo, vegan, or eat anything and everything.While all of my recipes may not be fitting for every diet, bloggers can still inspire each other and make modifications. Runningonpeanuts has allowed me to be comfortable with eating differently.When eating out, I have grown confident in the decisions that I make for myself because now I know that ultimately, it is my body and I can fuel it the way that makes me feel my best.When people ask â€Å"How?† or â€Å"Why?† I eat in this way, I tell them that it makes me feel amazing and helps me reach my athletic goals, instead of getting embarrassed because I eat differently.However, the most rewarding part is when my classmates and closest friends tell me that they saw a recipe on my blog that inspired them to eat more vegetables or consume less sugar.I vividly remember one conversation that I had after track practice with my friend Carly.As we sat stretching on the track, she asked what brand of yogurt I recommend, and I told her the best brands are ones with minimal ingredients and more protein than sugar.I told her to avoid anything artificial and to buy the most wholesome yogurt, not the one with the least amount of calories.Now, everyday she comes up to me and tells me the healthy foods she has been eating.These conversations make me feel as if I can make a difference in improving the quality of someones life, while simultaneously doing what I love.