Monday, September 30, 2019

Comparing Literature, Story of an Hour & the Necklace

EN102 XXXXXX 2009 Assignment XX 1: Write a 200 word response on why you picked the literature that you chose. This can be in first person and informal. I selected my choice of literature from the list rather quick because I leaped at the opportunity to once again write about the â€Å"Story of an Hour. † Of all the short stories that I have read in our book thus far, this story by far is the story that I enjoyed the most. I think this is because the ending took me a little by surprise, and believe it or not I found the ending somewhat humorous. I thought the tables had now turned in favor of the husband who probably felt the same she did after she found out that he died. Other words, he was probably the one who was relieved now. The second piece of literature chosen, â€Å"The Necklace,† was chosen because it was simply linked to my first choice. I immediately read â€Å"The Necklace† after making my choice. To my surprise, I enjoyed this story as well but the beginning seemed to drag on a little too much. The story started with a drawn out description of the woman and her fascination of the rich. I felt that this could have shortened some but all in all I enjoyed this story as well. I’m satisfied with my selection and feel that these two stories will prove well in providing a comparison. 2: List your thesis statement. This should be one sentence and it should focus on the literature. Mrs. Mallard and Mme Loisel had different desires but both found happiness for a brief period of time that was quickly stolen away. 3. Read pages 96-99 in your textbook and then list: a. An idea from the literature that you can compare. Create a topic sentence that can be supported by a full paragraph of analysis and or examples or quotes from the textbook or your research. â€Å"The story of an Hour† and â€Å"The Necklace,† Mrs. Mallard and Mme Loisel are two women who live on separate continents but share somewhat equal moments of sadness within their lifetime. b. Another idea from the literature that you can compare. Create a topic sentence that can be supported by a full paragraph of analysis and or examples or quotes from the textbook or your research. A focal point of each of these stories mentions a window posed with a chair that at some point these women seek refuge, sitting to reflect upon their innermost emotions. c. An idea from the literature that you can contrast. Create a topic sentence that can be supported by a full paragraph of analysis and or examples or quotes from the textbook or your research. Mrs. Mallard and Mme Loisel are dissimilar in these stories. Mrs. Mallard in â€Å"The story of an Hour† is somewhat liberal and seems to be content with the future of being without a husband. On the other hand Mme Loisel in â€Å"The Necklace† lives in poverty and is dependent upon the income of her husband who is a ministry clerk. d. Another idea you can contrast. Create a topic sentence that can be supported by a full paragraph of analysis and or examples or quotes from the textbook or your research. In the endings of â€Å"The story of an Hour† and â€Å"The Necklace,† obviously they are not identical but these two stories are assured to bring about a reaction or stir to the reader. 5. Post your introductory paragraph below. Make sure you catch the reader’s attention, list the titles of the literature and the authors’ names. Your introduction should end with your thesis statement. Like a deal with the devil, Mrs. Mallard and Mme Loisels desires twirled as if they were choosing to enter an hour of sadness that guaranteed freedom or an evening ball that guaranteed wealth. â€Å"The Story of an Hour† by Kate Chopin and â€Å"The Necklace† by Guy De Maupassant are astonishing stories that offer a twist for the reader. Each had different desires and found happiness for a brief period of time that was quickly stolen away. . Keep in mind that you may want to change your thesis and your introduction after you start working on your rough draft. This is common. Your introduction and thesis are the most important elements of your term paper and it is not unusual for these to be revised several times. Feel free to check in with your instructor if you want feedback on your thesis or introd uction before you turn in lesson 6. 7. Submit your assignment as one Word/Rich Text   document using the upload tool or by pasting your work in the HTML editor.

Sunday, September 29, 2019

Strategic Branding on UK Broadband Services

Following the deregulation of the telecommunication industry in United Kingdom, a number of competitors and substitute products have emerged. With the mandate under the Communications Act 2003, the Office of Communication (OfCom) was established as a regulatory office for the UK communications industries, which includes television, radio, telecommunications, and wireless communications services.Its scope, under the Communications Act 2003, is as follows: 1. to further the interest of citizens in relation to communication matters, and 2. to further the interests of consumers in relevant markets, where appropriate by promoting competition.The British Telecommunications (BT) is one of the world’s leading providers of communications solutions and services, which operates in 170 countries around the world. In the United Kingdom, BT serves over 20 million business and residential customers with more than 30 million exchange lines, as well as providing network services to other licen sed operators. Its BT Retail subsidiary is UK’s largest communication service provider, by market share, to the consumer and small business markets. It supplies a wide range of communication products and services, including voice, data, internet, and multimedia services (online BT.com). Once a nationalized company, BT plc has traditionally dominated the UK’s fixed line telecom market, controlling over 80 percent of the UK’s access lines, earning ? 8,507 million in revenues for 2006 (BT Annual Report 2006). However, the passage of the Communications Act 2003 has been intended to increase competition to the once monopolized of the fixed line industry in UK. Industry experts predicted that BT Retail’s share of the UK’s fixed line market will fall from 82 percent to 45 percent over the next decade as increased competition begins to bite.At the moment, around 93 percent of UK households have a fixed line, with eight in ten supplied by BT. However, despi te the predicament of many industry experts, the benefits of increased competition has not been achieved as BT continue to have strong market dominance within the UK fixed line industry (Richardson 2005). Table 1. British Telecom’s Retail connections Year end 31 March 2003 2004 2005 2006 Total Retail connections (‘000) 29,566 29,661 29,630 28,293 Business 9,208 9,111 8,780 8,353 Residential 20,358 20,550 20,850 19,940 Source: British Telecom Group plc (2006).BT Group plc Annual 2005 Report. (United Kingdom: BT Group) [Online] Available: http://www. btplc. com/Sharesandperformance/Annualreportandreview/Annualreports/Cautionarystatement. htm Table 2. British Telecom’s Broadband customers Year end 31 March 2003 2004 2005 2006 BT Wholesale ADSL end users (‘000) 803 2,226 4,973 7,949 of which are LLU lines 3 11 41 356 of which are BT retail customers 439 967 1,752 2,584 Source: British Telecom Group plc (2006). BT Group plc Annual 2005 Report. (United Kingdom: B T Group) [Online] Available: http://www. btplc.com/Sharesandperformance/Annualreportandreview/Annualreports/Cautionarystatement. htm Despite the high penetration of fixed line business of British Telecom, the level of penetration for broadband services is still very low in the United Kingdom. Project Aims and Objectives The primary objectives of this dissertation will be to determine why many British consumers still opt to use the dial-up as internet connection in the United Kingdom and how companies can attract users to use broadband services. We also review the current market environment such as policies of Ofcom that could affect a company’s marketing strategy.The following is a list of objectives which the author aspires to accomplish in the dissertation: 1. A background study on the current internet access industry in the United Kingdom and prospects on the industry’s growth. 2. An exploration on the relevant theory on the impact of brand equity and brand position ing on company’s profitability and market share. 3. A proposal on effective branding approaches to mitigate the increasing competition with the deregulation of the telecommunication industry in United Kingdom. Importance and Relevance of the ResearchPrimarily the research will be valuable to any business industry or body attempting to build on its business strategies, customer relations and competitiveness in a competitive industry. The research would make businesses more aware of the importance of business strategies in a very competitive industry. It gives you an idea about how businesses can know more about their markets segments and attract more markets. Secondary impact of the research will be on a long term scale, it will aid retail marketing initiatives. The trends of the industry and the markets will have a significant impact on the whole field in the future.The research may also be essential to other interested parties such as the educational institutions business un iversities, news papers and government. The paper will also be useful later on in academics for future references. The Overview of the Study The remainder of this study is as following statement: Chapter 2, Internet Access industry background and market analysis, will provide first a concise information on the industry market value, market segmentation, and leading companies. We will provide a strategic competitive analysis of the industry using Porter’s Five Forces of Competition and SWOT Analysis using BT Group.We will also briefly discuss Ofcom’s strategic review of the telecommunication industry and its effect on industry players in particular British Telecom. Review of brand management, will review related literature on the brand management such as brand equity and brand positioning. Identify the long-term effects of the effective brand positioning in increasing market share within the industry. Chapter 3, Methodology, will present the methods of collecting primar y data from consumers and the chosen research method for the dissertation. Chapter 4, Results and Discussion, will present and discuss the results of the survey.The discussion will also relate the relevant literature and the results that have been obtained from the survey. Chapter 5, Summary, Conclusion and Recommendations, the â€Å"Summary† section will first provide a comprehensive summary of the major findings of this study. The â€Å"Conclusion† section will highlight the implications of the research findings. Finally, â€Å"Recommendations† will be proposed to on the possible approaches to effectively implement an effective branding strategy to mitigate the increasing competition in the telecommunications industry. CHAPTER 2: Review of Related LiteratureThe literature review will consist of three parts: (1) Environmental Analysis, highlighting the recent deregulation and increasing competition within the industry, (2) Competitive Position of British Teleco ms for the market segment of broadband services, and (3) Review of related literature on brand management. In the Environmental Analysis section, the research will discuss the competitive landscape of the broadband market in UK, and define the nature of competition within the industry. The research will describe the role of Ofcom in promoting competition within the industry and specific market segment.The research will describe the market size, volume and growth of the industry. Second, the research will discuss the competitive position of the British Telecom in the market. It will provide an assessment of BT’s strengths and weaknesses and how BT has a very strong foothold of the market. Lastly, the review will also highlight the importance of brand management in growing the broadband services business of British Telecom. In this paper, we follow the framework of Delta model which has been proposed by Hax and Wilde.The Delta model defines three points (1) strategic positions that reflect the fundamentally new sources of profitability, (2) aligns these strategic options with a firm’s activities and provides congruency between strategic direction and execution, and (3) introduces adaptive processes capable of continually responding to an uncertain environment (Hax and Wilde II 1999). The Delta model integrates the structural analysis and value chain framework from Porter with the resource-based view on the Firm and complement those with new Extended Enterprise perspective and with offering Total Customer Solutions.The Internet Service Providers’ Association United Kingdom defines the internet access market consisting of total revenues generated by Internet Service Providers (ISPs) from the provision of narrowband and broadband Internet connection through both consumer and corporate channels (Datamonitor, 2007). The United Kingdom Internet access market generated total revenues of $8. 2 billion in 2006, this representing a compound annual gro wth rate (CAGR) of 6. 4% for the period spanning 2002-2006 (Datamonitor, 2007).In a survey conducted by the Office of Telecommunications, 93 percent of homes currently own a fixed line phone, this proportion has remained stable at just over 90 percent for the last year. At least 4 in 5 households are using BT for their fixed line; however, at least a quarter of BT customers would consider using another supplier if they offered services of equal quality. Furthermore, 18 percent of the respondents mentioned barriers to switching as their reason for remaining with BT rather than positive reasons.These consumers were largely living in non-cabled areas with less choice of fixed line suppliers (Office of Telecommunications 2003). Brand name and the Quality of service The main reason BT customers gave for not switching to another operator was satisfaction with BT, this being driven by the fact that the vast majority of satisfied customers (72%) have never experienced any problems with thei r services. Generally, BT customers value the service quality and reliability above cost, suggesting that the trustworthiness of other suppliers alone is not sufficient incentive for these consumers to switch (Office of Telecommunications 2003).Barriers to switching A quarter of customers that would remain with BT if other suppliers offered an equal service, mentioned barriers as their reason for remaining with BT. This equates to 18 percent of all BT customers. The barriers mentioned included: switching being too much hassle, cost of switching, unaware of other suppliers, always used BT, and the additional services. The research, however, notes that the respondents are more likely to live in a non-cabled area – hence limited availability of alternative providers (Office of Telecommunications 2003).Key trends in the telecommunications industry The key word in today’s technology is convergence. In the last two years, global telecommunications company have been developin g the next-generation voice services that could cut corporate call costs by automatically routing traffic between fixed line and mobile infrastructure (online ITWeek). One key development has been the development of Fixed Mobile Internet Convergence, where IT and media industry deliver both content and the infrastructure to consumers.The widespread adoption of Voice over Internet Protocol (VoIP) has been a promising to consumers yet holds a mixed fate for the fixed line telecoms market. On a positive note, it offers cheap or often free long distance calling to consumers and can therefore boost market share. However, this may be at the expense of diverted traditional sales and loss of line rental and call revenue on fixed lines. On the other hand, VoIP take-up could spread with the proliferation of wireless broadband, as opposed to wireline broadband, which will serve to expand the fixed line market and encourage a more rapid take up of wireless technologies.The development of more s ophisticated mobile phones and PDA also threaten to detract from fixed line sales as these devices develop the same quality of capabilities as fixed line services (online IT Week). Analysis of Competition The Delta Model builds on the structural analysis of Michael Porter to gain insight and understand the external factors determining the industry attractiveness and match it with the firm’s resources to be successful in the industry (Hax and Wilde II 1999).In his book Competitive Strategy: Techniques for Analyzing Industries and Competitors, Michael Porter discusses the five forces of competition in an industry. He illustrated the five competitive forces as: (1) Rivalry between competing sellers in an industry, (2) potential entry of new competitors, (3) the market attempts of companies in other industries to win customers over to their own substitute products, (4) the competitive pressures stemming from supplier-seller collaboration and bargaining, and (5) the competitive pr essure stemming from seller-buyer collaboration and bargaining (Porter 1985).Porter’s five forces of competition is a widely used tool to determine the company’s current strengths and competitive position. Having a clear picture of the balance of power in a competitive industry will help in planning for a sustained growth in the industry. In the Figure 5, the researchers analyzed and plot the competitive forces in UK’s fixed line telecom industry (Porter 1985). Rivalry of Sellers: Moderate The UK market is relatively fragmented, with no one company dominant.For end users, switching costs are not very high, and in fact ‘customer churn' is often cited as an issue that ISPs must cope with, particularly in the consumer market. A typical company offers a diverse range of communication-based services, such as TV and telephony, so success in the Internet access business need not be vital to its survival. Furthermore, rapid market growth means that players are not fighting to win a share of a static market from their competitors. Rivalry in this market is assessed as moderate.Buyer Power: Moderate ISPs offer their Internet access services to customers ranging from consumers to large corporations. As fairly similar services can be offered to customers of all sizes, the typical size is quite small. Switching costs are moderate, and include the time required to leave one contract and move to a competing contract. There is some differentiation: for example, one player may offer consumer Internet access as a standalone service, while another bundles it with cable TV services.Also brand loyalty may be significant if an ISP gains a particularly good (or bad) reputation among users. As the Internet has high penetration in the UK, corporate customers in particular will consider the service of vital importance to their business. Overall, buyer power is assessed as moderate. Supplier Power: Strong ISPs act as intermediaries between their customers and the telecommunication infrastructure that underpins the Internet (and telephony): ADSL lines, servers, packet switching software, and so on.Some ISPs, especially telecoms incumbents such as BT, own and operate an extensive physical network themselves. For these companies, key suppliers are manufacturers of the hardware and software involved, such as Cisco Systems. ISPs that do not own a network can purchasing wholesale access to the necessary infrastructure from an owner-operator, and then offer it at retail to end-users. For ISPs using this business model, key suppliers are BT and other network owners.While it is unlikely that ISPs of either type will integrate backwards, since the upstream businesses are very different to their own, most network owner-operators have already integrated forwards into the retail ISP market, and are competing directly with ISPs that do not own networks. Network manufacturers are not completely reliant on the ISP market for their revenues, as they can also operate in markets such as corporate intranet; network owners usually generate revenue from telephone services and their own ISP retail business as well as wholesale Internet access.Overall, supplier power is strong. Threats of New Entrants: Strong The threat of new entrants is strong. New players will be attracted by the continuing strong growth rates in this market. The physical infrastructure needed is usually already available. For example, a cable TV company can move into the Internet access market by making use of the cable network it has already installed; while players without their own infrastructure can buy access to telecom networks.This reduces the capital requirements for market entry – although customer demand for ever-increasing bandwidth may mean that investment in infrastructure will be needed for future growth. Retaliation in terms of price competition is very likely in this market, and new entrants need to differentiate themselves from incumbents †“ not an easy task when selling a commoditized service that can be specified completely with a few parameters such as bandwidth and downtime. Threats of Substitute: WeakThe threat of substitutes is weak: the Internet has developed as rapidly as it has because it is itself a substitute for many other services and products. These include traditional forms of advertising, news providers, music (and increasingly video) physical media such as CDs and DVDs, ‘bricks and mortar' outlets for supplying goods and services, and communication services such as mail and telephony. The benefits of these older substitutes are assessed as small, as the Internet alternatives have clearly demonstrated their popularity with consumer and corporate customers.However, to take two examples, for consumers with concerns over the security of online financial transactions, or businesses who wish to advertise to segments of the population who are not online, the older substitutes may retain advantages. B ritish Telecom’s Competitive Position A company’s strategy consists of the competitive efforts and business approaches that managers employ to please customers, compete successfully, and achieve organizational objectives.It represents management’s answers to such fundamental business questions as whether to concentrate on a single business or build a diversified group of business, which cater to a broad range of customer or focus on a particular market niche. A strategy thus reflects the managerial choices among alternatives and signals organizational commitment to particular products, markets, competitive approaches, and ways of operating the enterprise (Hooley et al. 2001). Sustainable competitive advantage as argued by John Kay is only achieved if the company has distinctive capabilities or resources that its competitors does not have.Kay (1999) argues that resources can be considered as unique or reproducible. A unique resource, for example the brand name of BT, can be considered as an important asset that can be a basis of sustainable competitive advantage. A reproducible resource and capabilities, on the other hand, pertains to assets that can be easily copied or reproduced by competitors and does not offer the company the distinctive competitive advantage. A good example of a reproducible resource would be the process of delivery voice calls.Many are now able to voice call services on their own and can learn the process more very quickly and easily; however, what differentiate BT is its extensive network infrastructure which it has built over the years to gain scale economies, and build on their strategic brand name (Kay 1999). In understanding the sources of competitive advantage, Hooley & Broderick (1998) introduced two fundamental approach in creating sustainable competitive advantage based from Micheal Porter’s Competitive Advantage.Micheal Porter suggests that companies undertake two roads towards establishing itself as a market leader. First, a company can position itself through cost leadership or differentiation. The former strategy requires that a company to operate more efficiently, thereby lowering its operational cost relative to its competitors. The later strategy requires that a company identify a resource that add value for the customer and modify the product or service in a way that will entice the customer to buy (Hooley & Broderick 1998).Hunt and Morgan (1996) recommends a resource-based model as a way to investigate competency and superior firm performance through a more intimate integration of organizational theory, marketing and economics. Furthermore, strategic resource improves a firm’s performance over time. If a firm mobilizes unique and immobile resources to create sustainable competitive advantage, then a firm can enjoy generating greater economic rents than competitors in the industry.In addition, the resource-based theory asserts that distinctive competencies of a fir m can ultimately result to superior outcomes and performance (Luo, Sivakumar, & Luo 2005). Kay (1999) also defined the three primary sources of sustainable competitive advantage as: (1) the market’s barriers to entry; (2) a unique firm history and experience which has transformed the firm and industry; (3) the tacitness of relationship with customers or suppliers. In this section, we assess BT’s competitive position in the market using SWOT Analysis to identify its sources for competitive advantage. SWOT AnalysisAs we have analyzed the competing forces that could affect the overall success of BT in the fixed line telecom industry in UK, we also recognize the need to be able to identify the strength and weakness of BT as well as external opportunities, and threats. Exhibit 3 illustrates a SWOT analysis of BT strategic capabilities. The value of the SWOT analysis is its ease of use, its simplicity, and its flexibility. In addition, SWOT analysis allows the synthesis and integration of various types of information which are generally known but still provides the possibility to organize and synthesize recent information as well.The insight to be gained in performing the SWOT analysis is the understanding of the core competency of the company that would give it a distinctive competitive advantage over its rival. More importantly, it provides the groundwork on (1) how the company’s strategy can be matched to both its resource capabilities and its market opportunities, and (2) how urgent it is for the company to correct which particular resource deficiency and guard against to particular

Saturday, September 28, 2019

Human development Essay

Life starts at conception. Immediately fertilization takes place changes and events occur that will determine the kind of person to be born. This research tries to find out the effect of early life on the later life of an individual. And if early life affects the later life of the individual, then do children who grow up in violent communities have a tendency to exhibit violent behaviors as adults? The research will apply the cross-sectional design. People who differ in age are studied at the same time. A comparison of age related changes and the social behavior is done. A hypothesis is put forward and a cross-sectional experiment is done to test it. One advantage of this design is that one can collect data from different ages of children over a short period of time. Stages of human development After fertilization takes place, the zygote is formed. The zygote undergoes cell division some hours after it is formed. It takes one week to reach the uterus. In the uterus there occurs implantation. The zygote makes connection to the blood vessels. This process takes about one week(Brian & Scott, 2005). After the zygote completely implant into the uterus, it becomes the embryo. This stage occurs between the 3rd week and the 9th week. During this stage the human body structure start to develop. The internal organs also start developing. The embryo consist of three layers: the ectoderm, the outer layer; the endoderm, the middle layer and the endoderm, inner layer. The ectoderm develops into the skin and hair; the mesoderm develops into bones , cartilages and the cardiovascular system ; the third layer develops into the internal organs . The heart start beating after four weeks. By 8 most body organs can be seen in although not well developed. Brian and Scott, 2005 ). The embryo rest in the amniotic sac which contains amniotic fluid. This fluid protects it. The embryo is connected to the mother via the placenta and the umbilical cord. The development of the embryo follows two principles: the cephalocaudal i. e it develops from head towards the legs and the proximodistal – the parts near the centre of the body develops first e. g the arm develops before the hands (Lichtenberg & Norton,1970). The third stage is the Fetus stage. This stars from the ninth week. At this stage, most body organs start to work. There is remarkable increase weight. During this period, the body systems like the respiratory system develop. The fetus can move and play in the uterus. It can hear the heart mother’s hear beat and the mother speak. It can detect flavor. The fetus’s senses are developed. The sensory influence can have a lifetime effect on the fetus. A research done by deCasper and Spence( cited in Lorraine ) shows that the last few months of prenatal developments can shape the life of the newborn infant. It can have either positive or negative effect on the infant. For instance extreme stress in the mother can have several effects: First, the stress tigress the production of hormones which reduces the level of oxygen consumption of the fetus. Second, stress may affect eating habits of the mother thus affecting the fetus in turn. Third, it may cause the mother not to take onto account resting, exercising and may influence her to drink. All these have negative effect on the fetus (Joseph , & Sandraw,1994). The mother’s age. The mother’s age seems to have an effect on the newborn baby. For instance teenage mothers mothers are likely to have problems during pregnancy and during birth. This is because they may not have the resources and skills to give them a good prenatal care. Again children born by teenage mothers may have problems. However a study ( Leavitt, 1993) revealed that it is the environmental and economic background that affect the child and not necessarily the age of the mother. Also the prenatal care given to the mother determines the behavior of the child. Nevertheless, older women, over 35 years experience more problems during pregnancy than younger women. They also record higher rates of miscarriage and Down ’s syndrome (Cited in Nelson). In general, for a healthy pregnancy and healthy baby, the age of the mother should be between 20 to 35 years. Teratogens. : Drugs, deseases and environmental harzards. Teratotegen is anything that affect a pregnancy. Some teratogens are: Drugs: Many drugs consumed by pregnant women pose great danger to the fetus and the mother. This was discovered after a drug called thalidomide caused women to bear children with malformed body organs. Thalidomide was being used by pregnant women to assist them sleep Other examples of teratogens are alcohol, cocaine, caffeine, nicotine and cigarettes. Joseph & Sandraw, 1994). Diseases: Some diseases do not have any serious effect on the pregnant women. However most viral and bacterial diseases have effect on the pregnancy. The most serious ones are AIDS, gonorrhea, syphilis and genital herpes. These may cause low immune system and various disorders in the unborn (Lichtenberg & Norton, 1970). Environmental hazards: The wastes from the industries contain chemicals. These chemicals may be absorbed into the mother’s body in small quantities through breathing and drinks. These cause great damage to the fetus since they are teratogens. Environmental teratogens are more serious because the mother may not be aware that she is taking it. Thus she may not have control over it. (Joseph &Sandraw, 1994). However some teratogens may be avoided especially those found in food as food additives. Freud(1954) suggested that life starts at birth. Most psychoanalysts of his time believed so. They believed that the brain developed at infancy. Winnicot(cited in Freud) did a research which found that the experience of the unborn is very important the infant. It could have emotional implications that could affect the person even as an adult. Winnicott observed children and saw that there very many differences. He noted that problems caused during labor could traumatize the baby who develops a lot of distress. He conclusively said that the experience gained in the womb remain in memory for a lifetime. In the womb, traumatized fetus even develops defensive mechanisms to face the expected trouble. Later research therapists conducted research and were able to conclude that early trauma created a lot of fear for the rest of the life of the infant. The feelings of anxiety, seeing being devoured by ogres, falling into a bottomless bit are as a result of early trauma. An example is given of an infant who was mistakenly exposed to cold in a very cold night (Lorraine). This child always dreamt lying in the refrigerator and this continued even after 30 years. This shows that early trauma caused the infant to expect disaster at any time. However the discovery of the effect of perinatal trauma on the life of an individual helped therapists to treat patients with problems related to early trauma (Freud, 1954). Recent research by perinatal psychologists, neurobiologists, experimental psychologists has shown great connection of fetal trauma to problems experienced later in life. Initially biologists used to think that the fetus had incomplete myelination of neurons and therefore it could not have memories. Research shows that the thinly myelinated nerves of fetus can transmit waves but at a lower rate. Joseph et al.. Thus the experience gained in the womb may make one to be aware of violence, disaster lack faith. With this in mind, parents have started to consider the unborn as part of the member of the family. A father who played a game with a baby and the mother found that the next baby easily learnt the game. These parents tried to avid any experiences that may cause fetal distress (Lichtenberg & Norton,1970). Fourteen independent studies have shown the relationship between antenatal maternal anxiety and emotional distress in the child. Prenatal stages are likely to be affected by antenatal stress. These reports have suggested that maternal distress affect the fetus as evidenced by increased fetal heart rate (FHR). This is done by use of ultrasound and monitoring FHR over long periods of time. Both the experimental and distress –induced study design have been employed to achieve this. For a normal case, at about the 15th week of the pregnancy fetal movements exhibit a certain pattern. As developments progress the fetal movements become dependent on specific heart rate pattern. These patterns finally develop into sleep-wake patterns which characterize stable temporal origination near term. There is a relationship between body movements and FHR accelerations. Fetal behavior is organized in rest – activity or sleep- wake cycle (Lichtenberg & Norton, 970). Effect war and social violence Family violence and trauma caused by war are passed through generations. Adults who were exposed to abuse and violence are more likely to show violence to their own offspring. They have difficulty forgetting their past and live normally. War and violence are everywhere in our societies. Many ethnic clashes continue for years and our children are being exposed to their effects. The children are being thought that disputes are being solved by use of violence. This violence is passed from generation to generation. Research and behavioral science has began to confront the problems of children exposed to violence. (Heidi, 2002). Over the last few decades, there has been an increase in the prevalence of domestic violence. Domestic violence has severe effect on families and society in general. Domestic violence can be in the form physical abuse, psychological abuse and sexual abuse. Exposure to violence creates traumatic stress. Traumatic stress can be either short term or long-term. Terr ( cited in Brian & Scott, 20005) describes short term trauma as â€Å"Type I† e. g a single event of rape or beating. He described repeated or prolonged trauma as â€Å"Type II†. Type II has more serious effects than type I. Individual exposed to this kind of trauma may develop Post Traumatic Stress disorder (PTSD). PTSD makes one to show routine withdrawal and oversensitivity. Many children from domestic violence homes show levels of (PTSD) (Leavitt, 1993). If untreated, the children exhibit violent behaviors, delinquency and other social and psychological problems. Since young child do have the ability to express themselves verbally, the emotional problems developed are behavioral such as lack of sleep, feeding problems, inability to concentrate, withdrawn and physical complaints. The pre-adolescents child may in addition to the above problems show loss of interest in peers, poor self concept violence,, defiant behavior and temper out bursts. Adolescents are likely to fail academically and start abusing drugs. Youth who exhibit violent behaviors can be traced to families experiencing domestic violence. An estimated 20% 30% of dating teenagers abuse or are being abused by their partners mentally, sexually, emotionally or physically. Between 30% and 50 % of adult relationships show the same cycle of violence (Leavitt, 1993) Nelson ( 2000), points out that community violence also has an impact on children who were victimized or who witnessed member of community or family members being victimized get affected. The effect of violence spread to even those children who are not directly affected by violence. Violence tampers with activities of the child which might make the child a better person. Impact of violence on the child depends on the level of development of the child. Early exposure to violence is more detrimental than later exposure( p. 266) In 1995 FBI report it reported that 27% of all violent crime involved domestic violence. All forms of violence affect the child’s mind. One study was done to show the connection between the brain and someone’s violence. Psychologists observed brain imaging data for a great number of people with violent behaviors. The research focused on specific brain regions. One was the orbital frontal cortex and the amyglada. The results showed that most of the cases, there was absence of normal activity in the orbital and anterior regions. While the shoed normal activity. The two regions will not counteract and this may explain some people are hyper aroused ( Lorraine).

Friday, September 27, 2019

Traxial Lab Report Example | Topics and Well Written Essays - 1750 words

Traxial - Lab Report Example A triaxial cell was used in the experiment. The soil was encased in the cell. The soil was loaded hydrostatically until the desired pressure was obtained. The axial load was increased up to the soil failure, when the pressure was constant. The resulting deformation, and applied load was measured using a system of acquiring data, and load deformation curves plotted. When the soil reached a high confine pressure, it reached a brittle-ductile transition (Ferrari, A. laloui, L. & Koliji, A. 2011). Beyond this stress condition, the soil increased the load capabilities with no observed failure due to the additional axial strain that was imposed (Zhang et al. 2010) Introduction A triaxial compression test involves a method that is used in measuring the chemical properties of solids that are deformed such as rocks, soil, powders, or granular components. During this method, water or oil as medium of confining is normally used to ensure that the confining pressure is same in the different dire ctions. In the case of loose granular components like sand, the soil is kept in a cylindrical latex sleeve having a flat circular platen or metal plate covering the bottom and the top ends (Ferrari, A. laloui, L. & Koliji, A. 2011). The cylinder would then be placed inside the water bath to offer pressure along the cylindrical sides. The top metal plate would be driven mechanically down or up along the cylinder axis to have the material squeezed. In this case, the distance covered by the top metal plate is obtained as a force function that is needed to be moved. In this case, the surrounding water pressure is controlled carefully (Zhang et al. 2010). The volume net change of the given material would equally be measured depending on the amount of water that moves inside and outside the bath (Ferrari, A. laloui, L. & Koliji, A. 2011). This measurement is obtained whenever water has saturated the samples through taking the measurement of the quantity of water flowing in an out of the p ores of the given samples. In order to understanding the characteristics of the triaxial compression test, an experiment was set to investigate the undrained triaxial compression test. The key objective of the experiment was to find out the undrained shear strength of soil samples through the use of the triaxial compression test. Experiment procedure The apparatus used in the study involved a triaxial cell, and the soil component. Water under pressure was poured into the triaxial cell. The specimen was vertically loaded through a ring to ensure that the load was measured. The vertical load was increased up to when a failure occurred. At the same time, the vertical strain was recorded using the dial gauge. This test was repeated using different cell pressure values. The samples were extruded out of the tube and trimmed to the size of the soil sample. The soil sample had a diameter of 38mm and a length of 76 mm. The samples were then sleeved using a rubber membrane. The samples were t hen put on the pedestal at the cell bottom and sealed using a ring of rubber. The loading cap was placed on top of each sample and equally sealed using the rubber ring before having the drainage tube secured. After this, the cell was mounted over the sample and filled following the checklist of the flooding triaxial cell. The test was then set up with the help of the assistant from the clip studio, and the checklist for the pressurising triaxial cell completed before running the stages of the test. After completing the stages of

Thursday, September 26, 2019

Metaphors For HCI Assignment Example | Topics and Well Written Essays - 500 words

Metaphors For HCI - Assignment Example Unrelentless research in the field of HCI has been mostly successful. Consequently, this has basically transformed computing (Brad, 1999). Metaphors are often used in daily speech. For example, people speak about time like it is currency or money. By employing a metaphor, time which is an abstract concept is made more understandable and familiar. By using this currency metaphor in respect to time, it becomes normal for people to spend, save, waste, give or borrow time. When we look at how system interfaces are designed, we can also view how metaphors play a vital role. The types of user interactions people do, the objects found on the screen, and names associated with commands are mostly based on terms which are familiar. Icons, desktops, windows, menus, pasting, cutting and copying are all part of the virtual interface metaphor. The desktop metaphor has been used by mac windows system from an early age. This led to the windows operating system designed by Microsoft. The current desktop metaphor poses some significant problems to its users. They have difficulty in; finding or organizing information within the hierarchical file systems, managing their reminders and schedules, obtaining a big picture view, and utilizing archived or stored information, which is often discarded by users so that they are not overwhelmed by it. However, these problems have been addressed in Lifestreams. As such, it is a better metaphor than the current desktop metaphor. Lifestream replaces conventional directories and files by adopting a time ordered stream of documents. The human memory too works this way in storing information. It stores information in a stacking order according to time. To locate, organize, monitor or summarize incoming information, Lifestream uses software agents and stream filters. Lifestream solves the difficulties experienced by desktop system users by providing a metaphor

The culture of Zulu Research Paper Example | Topics and Well Written Essays - 2000 words

The culture of Zulu - Research Paper Example This led to the Battle of Isandlwana where the British suffered a humiliating defeat at the hands of the Zulus. They were eventually defeated by the British in the battle of Ulundi in 1979 (Dougherty & Sievert, 2008). During the Apartheid years, Zulus were classified as third class citizens and were forced to suffer discrimination at the hands of the state. Zulus have played an important role in the end of Apartheid and in the development of modern South Africa. The two important political parties of the country – African National Congress and the Inkatha freedom party were both formed by Zulus. They also participated in large numbers in the struggle to end Apartheid in both the parties. In this essay, discussions will be focused on the culture of Zulus especially their Religion, political organization of Zulus before the arrival of British and the Gender relations in Zululand (Dougherty & Sievert, 2008). Mode of Subsistence Farming and cattle rearing were the primary modes of subsistence of the Zulus. Cattle especially the Ox was very important for the Zulus. Cattle were also given great significance and there was also a special place for the cattle in the family .The cattle was reared largely for eating purposes. Although all the cattle and the farms were owned by the head of the family who was a man each of his wives was provided with a set of her own farms and cattle which were used by her in order to feed her immediate family (Dougherty & Sievert, 2008). Zulu Religion The Spirit World Zulus placed a lot of importance on their ancestors and their spirits. These ancestors were supposed by them to be living in Unkulunkulu which was considered as the world of the spirits. The ancestors were the link between the living and the spirits. For this reasons they needed to be remembered by the family members, praised regularly and also appeased by maKing offerings to them. In case a family failed to do so, the spirits are were to visit them in the form of trou bles. These troubles can be solved only if the mistake of the family is rectified and the spirits of the ancestors are pacified by some offerings and by showering praises on them. The Sangoma was the spiritual healer and the priest of the Zulus. In case of a mishap such as failure of crops, death of livestock, draught or any other natural calamity the Sangoma was the one who declared the reasons for the calamity. The calamity could have been caused by the unhappy spirits or by witchcraft. If it was the former, the family was supposed to appease the ancestors but if it was the latter a witch-hunt and the elimination of the witch responsible was carried out (Monteiro-Ferreira, 2005). Another important religious person among the Zulus is the Inyanga. The Inyanga can be said to be the doctor of the Zulu tribe. He mostly used local plants and animals in order to find cure of the common diseases like cuts, bruises. The cure was usually followed by religious rituals in which the spirits we re praised and pacified and asked to restore the health of the person who is sick (Monteiro-Ferreira, 2005). It is not only ancestors whose spirits were worshipped by the Zulus. The spirits were also supposed to exist in animals, forests, mountains and caves. Thus animals should be fed properly and cared for, the forest and the mountains should not be made angry or the spirits living in them will have their vengeance on the people. The Zulus are afraid of the phenomenon of lightning. They believed

Wednesday, September 25, 2019

Reading Response Essay Example | Topics and Well Written Essays - 250 words - 20

Reading Response - Essay Example Topik argues that voyages lead to the global trade which allowed other goods from Asian countries, particularly tea in becoming part of the European culture2 (Topik 2006). Topik in his article highlights that the revolutionary boom and the voyages boost the trade of cheap drug food like tea in the European region. With the passage of time, people become excessively addictive of tea. On the other hand, James states that the expansion of global trade made cheap goods like tea available to people and they became fashion symbols. I am of the view that James in the article emphasizes on the West Indians of East India Company and salves were the reason for making people addictive, whereas Topik in his article states that the control of the production of the tea plantation was the major issue, and trade of cheap products. In my opinion, both articles present the same idea that the global trade made tea one of the most significant and most widely used commodities. In addition, the adaptation and accessibility of these commodities made tea common in the people. There is a minor difference in the idea presented by the authors. James talks more tea as an imperia l commodity whereas, Topik talks about the trade and slavery as a cause for tea to become a common

Tuesday, September 24, 2019

The concept of self-determination in international law is, in Essay

The concept of self-determination in international law is, in practice, less wide-ranging than might be supposed - Essay Example It is in terms of whether the human element within several states is entitled to choices that may lead to severing their destiny from that of a given state and ultimately disrupt the state’s body politic. (Coicaud, 2001, p.53). The uniqueness of self-determination makes the existence of a corresponding international rule whether contractual or general far more problematic. This also varies in degree according to whether its conceived as a right conferred by international law or as a right which states an internationally obliged to ensure within their legal systems self determination as seen as a freedom within the internal logic of declaration, human rights and fundamental freedom which every state would be bound under general law, charter or other instruments to ensure it to persons or groups within their legal system, a matter de lege ferenda. (Karen, 2002, p.29). Exceptions are allowed in given arrangements of conventional law. Personality of individuals is not believed in international law. Thus the existing international law is even further from ensuring a right of self-determination as a matter of direct right under international law itself. International law and international politics comprise the rules and reality of the international system so that it makes sense to study one without the other. Scholars decide to separate the so called `real politiks from the utopian idealism on the emphasis that the failure of League of Nations and the rise of fascism were clear demonstrations of the ineffectiveness and irrelevance of international law and institutions’2. This described reality was as anarchic international law system in which the state was the primary actor and its interaction with other states was in a context of a competitive war of all against all motivated by national self interest and a thirst for power. (Karen, 2002, p.42). The tribunal created

Monday, September 23, 2019

Social psychology (within a school setting) Essay

Social psychology (within a school setting) - Essay Example Behaviorism argued that a subject matter of psychology must be firmly grounded in observed human behavior rather than in unobservable mental constructs. This approach suggested completely new theoretical structures and empirical approaches. Thus at a time it seemed that the majority of social psychologists were behaviorists, which asserts that human behavior can be understood in terms of stimulus response relationship without necessarily referring to underlying mental state. Then Gestalt inspired group dynamics (MCGARTY, 1997:1-15). He claimed that social environment is not only made up of things but of relations bettering things, Thus Gestalt's tradition promoted a concern with groups as real social entities. Another trend 'Attitude Change' came in vogue with the end of World War II. The third major Trend that was occurring in 1960s, with the breakdown of the dominance of attitude concept, was the rise of 'Attribution theory'. The ground work of this theory was laid by Heider's book, 1958 "The Psychology of Interpersonal Relation" during 1970s and became the most dominant concern in social psychology. Cognitive Dissonance (McGarty, 1997:20-26): According to Festinger, theory of Cognitive Dissonance is a deft blend of motivational and cognitive constructs. Cognitive dissonance is a type of psychological discomfort, produced by having attitudes in consistent with behavior, which creates pressure to change those attitudes. When a teacher has to mould or change children's attitude, most of the occasions, reward and punishment is applied but the previous notorious behavior is seen to be repeated in some other social context or situation. The application of cognitive dissonance theory can bring stability and positivism when applied for a purpose of attitude change. Freedman in 1965 conducted an experiment "forbidden toy" of Aronson and Garlsmith regarding the permanence of dissonance induced opinion change. Its utility in school setting is thus: If the children become aggressive when punished for touching forbidden things then dissonance should be generated in them through mild threat for that thing. So this cognitive dissonance generated in them makes the forbidden item less attractive. This mild threat will bring in them self persuasion which will lead to neutral attitude for that thing. (MCGARTY, 1997:20-26) Self-Perception VS. Cognitive Dissonance (Bem 1972:1-62) : Self-perception theory differs from cognitive dissonance theory in that it does not hold that people experience a "negative drive state called "dissonance" which they seek to relieve. Instead, people simply infer their attitudes from their own behavior in the same way that an outside observer might. Self-perception theory is a special case of attribution theory. Attribution Theory (Heider, 1958): This theory is concerned with the ways in which people explain (or

Sunday, September 22, 2019

Google Analytics Results Essay Example for Free

Google Analytics Results Essay Within a week, your site should get some traffic. The report of this traffic will be found on the dashboard of your site as well as the Google site. Take your screen shot of the main analytics page (from the Google site) and paste it to a word document. In addition to this screen shot, include the following items: 1.Visit the Google site and analyze the total visits, bounce rate, traffic sources, and page views on your site. Write a short paragraph summarizing the specific numbers and what they mean (not the definitions of these fields but what the data is telling you). I found 1 visitor in my Google site. The bounce rate and traffic source was 100%. The page view was 1. 2. List three specific changes you can make to your site to increase the total visits. Search engine optimization is about ways to get your website to the top of search engines: This cannot be stressed enough. I can do this by generating useful content like articles and blogs, by social networking and the development of multimedia. This sounds easy but it’s a lot of hard work. Still, I can also strategically spread my content in different websites while keeping my target niche in mind. Be very careful not to over link to pages within my site, this is a new penalty from Googles most recent update. Use social media: Post compelling content and I’ll soon build a loyal following. Follow and share with other users, who may reciprocate and follow me. Keeping up to date with social media and finding time to post can be tricky, but it’s well worth it. Let people talk and become part of a community and they’ll promote your content for me. This will save me a great deal of time, and it will share much further. Be patient: Search engines need a lot of time to index a new website and domain. They need time to index all my content; its worth the wait and should be factored into my website profitability and/or popularity timeline. In the meantime, continue to add high quality content to my website and keep it up to date and relevant. 3. Write a short paragraph which explains how you could use this tool in the future to help you distribute information or sell products/services on the web more effectively. The good thing about the internet is that I can reach people from different countries of the world. Not only that, I can also find a plethora of great info on the web with a bit of research. Just imagine how my business can benefit from the powers of the internet when online users find me. Your business can be at an advantage if I can create your own website. Your site should be fully optimized and should contain highly relevant content so that online users can easily find me. Provide different pages for various information products that I am trying to sell. I can use articles, images, videos, and other effective marketing tools. What kind of info do I want to sell? Perhaps I can offer the info product in downloadable form or I can have your own shopping cart. The cart can provide a different shopping experience to all your customers and so they will not hesitate to come back again soon. My information products should also be updated regularly. No one is interested in obsolete information and make sure that I focus on the in-demand info or topics. Determine what other people are interested at the moment or perhaps in the near future. From there, I can already create the info products that can provide me with higher earnings. Monitor my sales and take out the ones that don’t get much attention from buyers. I can even ask for feedbacks so that I can choose my products well.

Saturday, September 21, 2019

Security And Confidentiality On The Internet Information Technology Essay

Security And Confidentiality On The Internet Information Technology Essay On 9th of November 2009 The Internet teacher requested 3000 word report related to the FETAC Internet module. This report was to be submitted by 14th of January2010. The topic of the report is Security and Confidentiality on the Internet with reference to cookies, viruses, encryption, digital signatures, firewalls, filtering software and personal privacy. Recommendations were requested. 2. Method of Procedure I found most of the information on the internet. In order to obtain the relevant information, I used Google Search Engine with keywords in English: Internet Security, Privacy on the Internet, Malware, Computer Viruses, Cookies, Firewalls, Filtering Software, Encryption, Digital Signatures, Computer Protection, Threats on the Internet. Keywords in Lithuanian: Privatumas Internete, Saugumas Intenete, Kompiuteriniai Virusai, UgniasienÄ-s, Filtravimo PrgraminÄ- Ä ®ranga, Ã…Â  ifravimas, Skaitmeninis ParaÃ…Â ¡as, Pavojai Internete. Also, some printed sources of information such as books and a periodical press in English and Lithaunian were adopted. Several pages for each topic were checked to confirm that the information was correct and fully understud. That hepled me to make conclusions and to give recommendations. 3. Findings 3.1 Importance of Subject With the progress of affordable technology more of us store more and more of our life in bits and bytes. By the end of 2009 there was more than 1,5 billion Internet users in 260 countries on every continent. The Internet is not a single network, but a vast array of connected networks situated all over the world, easily accessible by personal computers, notebooks, netbooks, smartphones, PDAs, game consoles, advanced TVs, same photo cameras or even kitchen appliances as hi-tech fridges and microwaves in a variety of ways. Today, the Internet uses gateways, routers, broadband connections, Wi-Fi spots and Internet service providers (ISPs) to make itself available at all times. Individuals and organizations worldwide can reach almost any point on the network without regard to national or geographic boundaries or time of day, there is some exceptions regarding to Internet censorship. Nowadays, it become hard to find the business without any connection to the Internet, because of its excellent source of marketing, convenience, high speed, low cost, and almost unlimited possibilities. Institutions of education, hospitals, banks, institutions of public service, providers of mobile service and internet, utility companies and of course our government has our personal information on their computers and they are connected to the Internet. With the birth of Social Networking Sites such as Bebo, Facebook, MySace, Twitter ect., we sharing our pictures, personal details, our thoughts and lives with friends and if we are not careful with everybody on the Internet. Just Facebook on its own has more than 400 million users. Even more, with new generation of Internet- Cloud Computing, individuals and business users are storing less data on their hard drives and more in the cloud- remote servers, operated by giants like Google and Amazon. However, while using the Internet, along with the convenience and speed of access to information come new risks. Among them are the risks that valuable information will be lost, stolen, corrupted, or misused and that the computer systems will be corrupted. If information is recorded electronically and is available on networked computers, it is more vulnerable than if the same information is printed on paper and locked in a file cabinet. Intruders do not need to enter an office or home, and may not even be in the same country. They can steal or tamper with information without touching a piece of paper or a photocopier. They can create new electronic files, run their own programs, and even hide all evidence of their unauthorized activity. So if we are closing and locking the door in our house to prevent criminals gain access to our valuables, we must take care of our house and life in the digital world and use all possible security and privacy on the Internet measures against the threats. WORLD INTERNET USAGE AND POPULATION STATISTICS World Regions Population ( 2009 Est.) Internet Users Dec.31,2000 Internet Users Latest Data Penetration (%Population) Growth 2000-2009 Users %of Table Africa 991,002,342 4,514,400 67,371,700 6.8 % 1,392.4% 3.9 % Asia 3,808,070,503 114,304,000 738,257,230 19.4 % 545.9 % 42.6 % Europe 803,850,858 105,096,093 418,029,796 52.0 % 297.8 % 24.1 % Middle East 202,687,005 3,284,800 57,425,046 28.3 % 1,648.2% 3.3 % North America 340,831,831 108,096,800 252,908,000 74.2 % 134.0 % 14.6 % Latin America/Caribbean 586,662,468 18,068,919 179,031,479 30.5 % 890.8 % 10.3 % Oceania / Australia 34,700,201 7,620,480 20,970,490 60.4 % 175.2 % 1.2 % WORLD TOTAL 6,767,805,208 360,985,492 1,733,993,741 25.6 % 380.3 % 100.0 % Copyright  © 2001 2009, Miniwatts Marketing Group 3.2 Personal Privacy Total privacy does not exist on the Internet, but it is possible to minimize the risks. Most security breaches are not done by technology, but by social engineering. In security, people is the most risky factor of all, yet its the one thing thats often forgotten. A company may setup firewalls, security software, locks and fingerprint scanners, but if they forget to establish and enforce a well designed security policy, they have forgotten the most important part. The easiest way to get a password from someone is just to ask! In more likely situations, an attacker may simply call random people and pretend they are a tech support person trying to fix a problem, and ask for confidential information as part of the diagnostic. Pretexting Pretexting is the way of stealing information by providing just a little bit of known information, and pretending to be someone youre not. Thats how identity thieves can call banks and, after a few tries, by simply providing basic information about the target, get all the data they want. Phishing Phishing is when you receive an email that looks like its from your bank, Paypal, online shop or another secure site you use, and asking you to login to confirm your information. It works in this way: the criminals sets up a website which looks like the genuine one and then sends phishing email to thousands of people, until they find somebody. Then when the person tries to login, his login information is intercepted by the bad guys and used to steal valuable information. Malware Malicious programs, especially Key loggers can record what keys on the keyboard you are pressing when login to secure websites, to obtain your username and password. Often Key loggers are incorporated together with Trojan Viruses, programs which pretends to be useful software i.e. antivirus or computer maintenance programs, to send stolen information to the criminals. Privacy threats on Social Networking Sites Internet users have to be very careful with the private information that they share on the web. Internet is becoming very popular way to communicate with people. Most people who give too much of private information about themselves arent aware about the risks they taking. There are people who can pretend to be your friends, gain information and use this information against you for blackmailing, psychological terror or for access to secure private pages. Conclusions and Recommendations The offenders are always inventing new methods to steal private information. We have to be aware about that, constantly refresh our knowledge about security and existing scam schemes and take all possible security measures by using trusted up to date security software. Never click a link in an email from unknown sender, never download from an untrusted source, and always type in the address of your financial sites to access them. Need to avoid to disclose sensitive information online especially to the people we dont know very well. Also we have to remember that these attacks also can be done offline. Most identity thefts are done by people simply going through rubbish bins and getting confidential data that was thrown out, like a bank statements, invoices, payslips ect. We cant do much to secure our personal data collected and stored by businesses and institutions which can also be stolen or misused, just hope that they will take same good care as we do. 3.3 Cookies What are Cookies? Cookies are a piece of text that a web server sends to web browser and are stored on a users hard disk. Main purpose of cookies is to help prepare customized web pages with our settings, interests, browsing habits. It works in similar way to loyalty cards i.e. if we bought a book in Amazon internet shop, next time when we come back to Amazon first it will offer similar books to our purchase. Cookies do not act maliciously on computer systems. They are text files that can be deleted at any time. Cookies cant be used to spread viruses. But because any personal information that we gave to a web site will be stored in a cookie some people can accept it as a threat to privacy and anonymity. To prevent misuse of information in the cookie if its stolen, information in the cookie is encrypted. How do They Work? When we visit a site that uses cookies, it can ask the browser to place one or more cookies on the visitors hard drive. It will contain our name and password, fill in form i.e. delivery addresses and basically what we do in the page. Next time, when we come back to the site the web browser sends back the cookies that belong to the site and then we will see personalized Web page with our details. Generally cookies help us to save a little bit of time. And we always have possibility to switch it off, however internet shopping web pages requires cookies to accesses them. How Could I Prevent/Manage Cookies? If we want to delete cookies we have to follow these steps: Internet Explorer: Tools /Internet options/Security /Set security level to high or custom level/Cookies/Disable. Mozilla Firefox: Tools/Options/Privacy/Cookies/Uncheck/Allow sites to set cookies Other options are to use designated Cookie Managing software or to use advanced Antivirus programs which also have the option to control cookies, to block cookies that we dont want and save only the cookies that we want. Conclusions and Recommendations I think that cookies are useful because we can get personalized information to read, do not spend time on security questions where it is necessary to enter a password, we dont have to spend time filling up same forms. Cookies do not collect information saved in the computer, it can contain only private data that we give to a website on our own free will. And if we dont want some cookies we are able to remove them from computer when we want. Some websites such as internet banking, e-shops and similar are impossible to use properly without allowing the cookies. 3.4 Viruses What is a Virus? Computer viruses are small malicious program codes, which are designed by using various techniques to hide themselves inside the executable files. Their aim is to replicate, spread between the computers using removable media or network and to interfere with computer operation: slowing down computer, damaging or deleting data, disturbing users and wasting time by showing annoying massages. Virus can be classified by several characteristic: depend on the origin, on the way how they infect computer, on the place where they hide, on the damage that they can cause However, the computer virus is only one type of the malicious software or malware, but majority of computer users referring to all malicious programs (Trojan horses, worms, rootkits, spyware etc.) as the viruses. Type of Virus Different viruses can have many common characteristics and constantly appearing viruses with new specifications or combinations. Resident Virus. Loads the replication module into RAM memory when is executed, after this virus can infect all files that are accessed by user or operating system. If the antivirus program fails to spot the virus in the RAM it can infect all scanned files. FAT Virus. The File Allocation Table is a fundamental element in the system it works like an index, keeping information where is the files stores on the hard disk drive (HDD), which sectors are empty etc. If this vital index is destroyed by virus, it makes impossible for computer to locate files. It also can overwrite the files or entire directories corrupting them permanently. Sometimes the only solution to fix the computer affected by FAT virus is to format hard disk drive. Huge downside of this is that all information on HDD will be permanently erased. Virus of Direct-Action. Sometimes referred as Non-Resident Virus, they are unlike to resident virus, not loading in to RAM memory. They try to infect the programs and cause damage at the moment of execution of infected file. Most of viruses are Resident. Overwriting Virus. Most destructible type of virus, it overwrites the information in the infected files corrupting them permanently. If you dont have the back-up copy of your files its a bad news because the only way to get rid of this type of virus is to delete infected files. Boot Virus. Also known as System Virus. These viruses infect critical section with boot code on hard disk or another bootable media storage that helps to start computer. When the computer starts up and the boot virus is launched, it can take complete control over infected computer and does everything it wants (steal private information, delete system files etc.) Clean bootable antivirus software required to disinfect the system. However depend on the virus this solution is not enough to clean bootable sector. Macro Virus. Macros are micro-programs associated with a file that serve to automate joint complexes of operation. Macro virus expand from applications which use macro, word document (file with extension .doc),Excel (file with extension .xls) data of Access (file with extension .mdb), Power point (file with extension .pps). When we open a file containing a virus of this type of macros are automatically loaded causing the infection. Most applications that use macros have, but many macro viruses easily circumvent this protection. Multipartite Virus.Very advanced type of virus that can perform multiple infections combining different techniques. These viruses are considered very dangerous, for its ability to combine many techniques of infection and harmful effects of their actions. File Virus. Infect programs or executable files (files with extension .ex and .com) when run the infected program, the virus becomes active, producing different effects. The majority of exiting viruses are of this type. Logic Bombs.Neither virus is considered strictly as they do not reproduce. They are not separate programs, but hides in an unmarked segment within another program.They aim to destroy the data on a computer or cause other significant damage on it when certain conditions are met. While this does not happen, no one notices the presence of the logic bomb. Its action can be extremely destructive. Trojan Virus.Trojan arent considered virus, because they dont replicate themselves. Trojans are commonly hidden in the programs that appliers to be useful, but instead opens unauthorized access to users computer. Trojans also can be installed thorough web pages with executable content (ActiveX control), email attachements. The effects of the Trojan can be very dangerous, allowing remote control from other computer (downloading, uploading, modifying or deleting files), installing key loggers and other malware, connecting computer to botnet (sending SPAM messages, perform network DDos attacks). How can computers become infected and what damage can cause? Viruses can infect computers through: Internet (email attachments, infected web pages, downloading infected files) Computer networks Removable Media Drives Virus Symptoms: The computer runs very slow Reduces the available memory The computer shuts down or freeze frequently There are programs which do not work or malfunction There is less free space on your hard disk Computer files disappear Strange messages appear on the screen. Some file are renamed or extended Conclusions and Recommendations Not everything that affects the normal functioning of a computer is a virus. Is very important to have means to detect and disinfect viruses use an antivirus program and update daily (use default settings). Scan all removable disks before use it and scan computer periodically at least once a week. 3.5 Firewall A firewall is a system that protects a computer or computer networks blocking unauthorized network access while permitting authorized communications. Firewall can be implemented in software, hardware or combination of both. Firewall is placed between protected and unprotected networks and acts as a gate to protect network or single computer, by inspecting network traffic, applying rules and allowing or denying connection. Firewall can use different techniques to do so: Packet filter (inspects every information packet passing through the network) Application gateway (applies rules to specific applications such as FTP, Telnet servers.) Circuit-level gateway(applies rules to TCP or UDP connections, when are made there is no further inspection.) Proxy Server (checks all network activity passing through network.) Conclusions and Recommendations Everyone should use a firewall against network intruders to protect computer and private information. Most of the antivirus programs and operating systems have integrated firewall software. Minor disadvantage of firewall, it can slow down Internet traffic and can be tricky for not advanced users to set-up it properly (not blocking traffic for useful programs). 3.6 Filtering Software The filtering software is designed to control what contents are allowed to be accessed on Internet. Often its installed on the computers of educational, government organizations, private companies. Filtering software is commonly used by parents to prevent their children from having access to certain web places unsuitable for minors. It also can be used as the mean of censorship in some countries. How does it work? Nowadays on the market there are many options of filtering software with various techniques and content filtering to prevent from harmful online material. The filtering programs works like that: Address blocking websites containing such content Controlling access times Accepting default address list Possible to establish your own list of addresses Assigning different profiles or different days and times(work, leisure, etc.) Controlling which services can be used at any time and for each user (mail, chat, etc.) Advantages and disadvantages of Filtering Software. Advantage of filtering software is that does not allow minor to access pages of violence, pornography, racism. In a work place it prevents employees of wasting their time and resources for personal proposes (chatting online, social network pages, etc.). Main disadvantage is over-zealous filtering. Par example, in some filters attempts to block the word sex would block words such as Essex and Sussex and etc. Internet censorship in some countries limits freedom of speech for different reasons and that is not a good thing. Some Filtering Software examples. Netnanny, Mobicop, DansGuard, CleanFeed,Web Sence 3.7 Encryption Its a method to convert the characters of a text that can not be understood unless it is read with the corresponding key. Used to protect the integrity of secret information if it is intercepted. Encryption is also used when data is sent via secure intranet (VSPN). Encryption is used for electronic commerce to protect credit card information. How does it work? The keys are the heart of the encryption. The keys are complex mathematical formulas (algorithms) used to encrypt and decrypt information. If someone encrypts a message, only one with the appropriate key can decrypt the message. Algorithms are used to perform a hash function. This process produces a unique MD5 for this message. The MD5 is encrypted with the senders private key resulting in a fingerprint. Conclusions and Recommendations Everyone who has and important or secret information (banks, hospitals, government, universities, e-commerce sites) they have to keep this information in secret from fraudsters. In recent years, it was few cases when portable computers of government organizations with secret information were lost or stolen. Laptops (portable computers) became more and more popular and most of us have some kind of personal information on our computers. So it is very important to have that information encrypted, in case of losing it. 3.8 Digital Signatures A set of data in electronic form attached to or associated with others which are used to identify the signatory, which allows you to check the provenance, authenticity and integrity of messages exchanged over the Internet. There are two types of electronic signatures: basic and advanced. The basic does not guarantee the identity of the signer, neither the veracity of information received since the sending does not ensure that the issuer has made it known to us, while the advanced signature identifies the signer and detect any subsequent change of data that could occur. The digital signature is a specific techology signature and created by the so-called System Asymmetric key cryptography and it works like that : The holder has two keys : public key and private key ,private key is only known to the issuer and is associated to the information you send .while the person who received only know their public key . Two keys are needed and complement each other to get the encrypted message appears as the original . When we want sent private information the information is encrypted by system which use mathematical operations so the information becames encripted ( strange numbers and letters) so the message only can be deciphered by the people who know the instruction and have a public key Conclusions and Recommendations It should be used by the organitations which have an important or secret information as banks, universities, hospitals, etc., these organitations should use digital signatures in order to avoid the risk of fraud .they have to be sure about the authenticy of the sender.

Friday, September 20, 2019

The Operational Strategy for Gap Inc

The Operational Strategy for Gap Inc It is clear in the market that as an organization Gap is struggling. Profitability, changing customer needs and tastes and increased global competition has affected our performance. The Gap North America division for instance, has not posted an annual increase in sales at stores open at least a year since 2004. In 2009, sales were $3.82 billion, down almost one-third from where they were in 2004, Clifford (2011). At least four changes at CEO level have occurred, and as the new CEO, the need to determine and implement an effective operational strategy is of paramount importance. The objective of this presentation is to obtain board approval on the proposed Operational Strategy for Gap and any possible changes to the recommendations and conclusions drawn by the executive team. The methodology adopted involved reviewing the entire business operations of Gap and that of its leading competitors (especially Zara). This involved using secondary data from the case study, internet searches on trends and developments in the global fashion industry and that of the company. In the development of this operational strategy it was important to note that, the operational strategy is sub servant to the broad corporate strategy and using the Porters (1985) value chain analysis. This according to Heizer and Render (2011) uses identified activities that represent strengths or potential strengths and maybe opportunities for developing competitive advantage. It must be noted early, however, that an alternative perspective exist that the use of resource view approach. Using the resource view approach means that Gaps effectiveness is predicated by determining the optimum fit for the firms resources in the dynamic environment as noted by Heizer and Render (2011). A hybrid response and differentiation strategy shall be adopted as apposed to the traditional cost leadership strategy within Gap. Our focus and competitive advantage as an organisation has thus shifted from just become cheaper to becoming better and faster. This means that we are aligning to changes in cus tomer needs, increasing global competitiveness and a dynamic business environment. (A justification for this strategy is provided for in annexure 1 of this report). The CSFs necessary to ensure the success of the operational strategy included, effective communication, internal marketing, change management and while communication was found to be the most Cost of implementing changes to ensure that successful execution of the operational strategy was determined asà ¢Ã¢â€š ¬Ã‚ ¦.. The recommendations put forward to the board included the need to adopt the operational strategy in line with understanding that radical change is a prerequisite. Critical Success Factors to include, internal marketing of the operational strategy, building a performance culture, ensuring effective communication and putting in place a reward-systems that are linked to performance are a must. Table of Contents Page 1.0 Design of goods 2.0 Process and Capacity Design 3.0 Location Selection 4.0 Layout design 5.0 Supply Chain Management 6.0 Inventory Management 7.0 Scheduling 8.0 Conclusion and Recommendations List of References Annexures 1.0 Design of goods 2.0 Process and Capacity Design 3.0 Location Selection 4.0 Layout design 5.0 Supply Chain Management Hanna and Newman (2002) define SCM as the configurations, coordination and improvements of a sequentially related set of operations. It is the output from operations referred to by Hanna and Newman (2002) that customers get, and therefore, the strategic emphasis of well-managed supply chain is to have a competitive advantage driven primarily by strong customer focus. Heizer and Render (2011) define SCM as the management of activities that procure materials and services, transform them into intermediate goods and final products and deliver them through a distribution system. The authors believe that in todays business competition is not between companies but rather supply chains. This means that if internal operations at Gap can be improved to surpass that of competition it will give our organisation a competitive advantage. This section of the report will focus on how Gap can change its relationship with suppliers and distributors and most importantly an evaluation of managing our purchasing and outsourcing activities in line with increased competitive activity. In reviewing the above the objective it to build a chain of suppliers that focuses on maximising value to the ultimate customer Heizer and Render (2011). The major challenge within Gap has been our inability to control and determine what is to be made and what is to be purchased effectively. As we maximise value along the chain we will be able to ensure that we improve on quality, delivery and innovation. Our global presences demands that the review of the supply chain be linked closely to the overall strategy of the business. In other words this means that the operational strategy must link back to the broad corporate strategy for GAP. Key aspects of this the broad corporate strategy and operational strategy is driven primarily be the need to increase competitiveness through product customisation, high quality, cost reductions and speed to market with the added emphasis being on the supply chain Heizer and Render (2011). Refer to the corporate strategy in à ¢Ã¢â€š ¬Ã‚ ¦. It is proposed that a new integrated supply chain be adopted with Gap. This means that, having fewer suppliers and building on a centralised manufacturing. The advantages will be cutting down on unnecessary costs by suppliers while building on a pool of highly effective supplier base that is aligned to the firms overall vision and direction. Zara continues to use vertical integration as a method to build on expandin g its supply chain. The Japanese, method of Keirestu would work well as we combine both few suppliers and vertical integration. Whilst our traditional many-supplier strategy worked in the past suppliers were responsible for maintaining the technologies and expertise, costs and quality controls the surge in competitive activity especially form Zara has shown that centralised and or few supplier strategy works better. The need to focus on controlling supply and building on technological advantages is an imperative to the success in the industry. It will be necessary as few suppliers will help on improve inventory management as we move closer to the implementation of a JIT system. These few suppliers will be asked to participate in the design of goods by helping in the partnering in research and development initiatives to include, provide design innovations, input on changing customers tastes and needs and technological expertises. Review of existing Suppliers: our focus is to cut down on scatter and huge number of suppliers and thus focus on building dependable close yet very few suppliers with long-term strategic relationships Heizer and Render (2011) Because of the shift in focus of our broad strategy (differentiation) it means that the selection of our suppliers inevitably has to change. This change however is radical demanding that our lower end suppliers that are not cost effective and do not meet the changing requirements set by the organisation must be immediately cut out. Whilst the medium to long-term aspect of our strategy demands that we build a centralised manufacturing. This means that, existing risk associated with the environment (customs duties, tariffs, security screening, natural disasters, currency fluctuations, terrorists attacks and political issues), controls (management metrics and reliable secure communication for financial transactions product designs, and logistics scheduling) and process performance (raw material and component availability, quality and logistics) need to be considered, Heizer and Render (2011). Ongoing reviews of competitors centralised manufacturing performance will continue in line with building on the above necessary changes to ensure that risks identified can be mitigated. Heizer and Render (2011) proposes that while changes in the supply chain management happens differently in different organisation its success will depend on the building mutual agreement of goals, trust and compatible organisational culture. These are discussed in the conclusion section of the report. Fisher (1997) offers insight on how supply chain decisions affect strategy. Because Gap desires to use a hybrid strategy various aspects of Fishers input are critical to the success of the organisation. Our Supplier goals will equate to those of Benetton and that is to share market research jointly and develop products and options. Our Primary selection criteria however will select primarily for capacity, speed and flexibility. Gap would need to invest aggressively to reduce production lead time while use product design that lead to low setup time and rapid production ramp-up. 6.0 Inventory Management Effective supply chain management that is aligned to both a well-structured operational and corporate strategy has ensured that Zara remains highly profitable. It has also meant that it (Zara) can continue to build on its in-house production and inventory management systems. Backed by advanced technologies and inventory optimisation models Zara has been able to improve on its efficacy. To this end, Zara has a failure rate of 1% compared to the industry of 10%. The experiences that we have faced as an organisation in managing inventory has greatly performance because our 10% error rate in our clothing collection is very high and makes us very uncompetitive. In-part our many-supplier strategy is to be the cause of theses failures while in turn the fact that suppliers are many, makes the handling and processing of inventory very difficult from inbound logistics of raw material inventory to delivery of finished goods inventory. Two categories of inventory posses the biggest threat to our organisation and are a major concern. These are the management of raw material inventory and finished goods inventory. It is key to note that in line with changes in supply change, a review of our customer satisfaction (refer to Goods and service design à ¢Ã¢â€š ¬Ã‚ ¦) suppliers, production schedules and human resource planning are key in achieving success in inventory management as noted by Heizer and Render (2011). Poor record keeping of inventory has also been a major problem this has been caused by the huge stock of unsold items returned from own store retail chains in exchange of in-season stocks. While the existing many-supplier strategy has also increased stock and warehouse as lead times for stocks continue to negatively affect stock holding levels and record keeping. This also in turn increases holding stock costs and insurance charges while our competitors especially Zara centralised distribution warehouses hold stock for only 72 hours. A very effective and simple system to implement in store is a two -bin system. It is the view of the executive that going back to basics in inventory control will play a critical role in ensuring that we succeed in tracking and monitoring stock movement for the group. If is difficult to worry about more scientific approaches such as probabilistic models when the major challenge is that we have excess stock of clothing lines that have not been sold. Art P eck the former CE for Gap the Northern American rightfully notes Unless we put cute clothes in front of our customer on the shelfà ¢Ã¢â€š ¬Ã‚ ¦everything else we do isnt going to matter. 7.0 Scheduling Contracting manufacturing has created major challenges for our organisation in the past, as lead times have been long, late deliveries and prevention of out-of stock situations become an on going exercise. Lessons from the industry have shown the need to restructure our scheduling in line with proposed changes in supply chain and inventory management. According to Heizer and Render (2011), the scheduling decision addresses the problem of matching productivity to fluctuating demands. It is however important to note that different processes suggest different approaches to scheduling. Based on our selected strategy and the position taken by our competitors such as Zara and HM, it is important that we build on process focused facilities in the medium to long term period as we seek to centralise our operations. This means that we generate a forward-looking schedule, where MRP generates due dates that are refined with finite capacity scheduling techniques as noted by Heizer and Render (201 1). Automated scheduling systems will be put in place with trained and competent personnel. This is necessary to ensure that accurate and relevant production database is maintained throughout the entire organisation. Therefore in the first few months of operationalising the CE and Operations Director will review item master file, routing file, work-centre master file to ensure that scheduling is down to satisfactory standards (something that my predecessors failed to effectively manage). In own store retail structures Gap will employ a strategy current used by Zara to effectively manage staff. This method involves cyclical scheduling as it has been proven to reduce man-hours and increase staff motivation. Software to perform scheduled staff based on stores forecasted sales volumes with location staffing even during peak periods has been identified and been purchased to achieve the above requirement of cyclical scheduling at own store retail locations. Feasible and efficient schedules of production must be developed, the demands of human resources and facilities must be determined and controlled Heizer and Render (2011). 8.0 Conclusion and Recommendations The above analysis has clearly shown that change is eminent within the organisation. It is important to note that this change is radical and has to be implemented immediately. The criticality of the operation strategy (like all other major programs such as the balanced score card) demands that executives are tasked with specific duties and responsibility to ensure its success. To this end, executive management must ensure that operational decisions assigned to them be coordinated and communicated effectively among all operational structures and divisions (a schedule for the critical implementation has been shown below). The major concern from a marketing perspective is our failure to provide customers with products that clearly meet their specific needs and or tastes. The ever-changing business environment and increased competitiveness globally has also worked against the firm. However, from a purely operational perspective this has meant that we need to change our operating model an d ensure that it is aligned to the broad corporate strategy. In this regard the most effective strategy will be a hybrid response and differentiation strategy. This strategy will be different to the traditional cost leadership strategy within Gap. Our focus and competitive advantage as an organisation has thus shifted from just become cheaper to becoming better and faster. This means that we are aligning to changes in customer needs, increasing global competitiveness and a dynamic business environment. Key aspects of differentiation that will be incorporated are innovative design and a shopping experience unmatched to competition whilst the response aspect of our strategy will ensure flexible manufacturing reliability in our inventory, supply chain and scheduling structures and quickness in process design (as this will now be a lean structure). Key Operations Decision Major activities to be conducted Responsibility Due Date Design of Goods Process and capacity design Location Selection Layout design Supply Chain Management Inventory Management Scheduling The success of the Operational Strategy will not solely be based on its adoption and approval by the board but also by the need and realisation that it has to be implemented. However, implementation will also involve change, Burnes (2004), effective communication, Thill and Bovee (2001), internal marketing, Keegan (2001) and redefinition of reward systems and performance culture, Hitt, Black and Porter (2004). These critical success factors will help build on trust, ownership, teamwork and transparency while ensuring the successful implementation of the Operational Strategy. 8.1 Performance culture Reid (2005), sums up a performance culture that Gap must adopt to achieve a credible performance learning system these are: Openness and trust: candor must be encouraged and managers have to be willing to speak the unspeakable. Trust produces an environment where there is less defensiveness when issues are raised; people react more honestly and ask questions. Managed differences: conflicts are addressed and unfulfilled commitments exposed, options and alternatives are looked at without predetermined outcomes. Simplicity and focus: there is focus on implementation, with clarity and precision defining what needs to be accomplished and how. There is commitment at every level to remove complexity from the way of doing business. Playing to peoples strengths: leaders know their people and match effectively talent and task, as they understand their peoples strengths and how best to elicit them. 8.2 Internal marketing Internal marketing must become part of the on-going process within Gap. This will involve functional process alignment, motivation and empowerment of employees at all levels to consistently deliver and satisfy customer experience. Internal marketing must empower employees and give them accountability and responsibility because it helps non-marketing staff to learn and be able to perform their tasks in a marketing-like manner. For the internal marketing to be effective, employees must internalise the core values of the organisation. Sponsors can print t-shirts, caps and merchandise to give employees to wear every Friday so that they remember the importance of the project. 8.3 Reward systems To address motivation and morale within Gap there is need to initial review the existing reward and performance bonus scheme. The traditional approach of linking this to bottom line heavily undermines long term sustainability of the organization, as managers and employees race to meet target. Having worked in operations, the risk is made high as we near the festive season sales personnel dump long shelf life products on customers (on the basis that they will be in critical short supply) so as to meet targets. This works well until two months down the line, customers either refuse to replenish orders and or return product because it is nearing expiration. These losses are usually only accounted for way after the productivity bonuses have been paid out and annual accounts drawn. Whilst it is important to inform or remind employees what results are desired and motivate them to achieve and exceed the performance targets, the performance learning system (balance score card will help addre ss ensure this is done with great transparency). To achieve the above, sponsors through the HR department must ensure: Drafting job description based on process requirements and characteristics Translating process goals and action plans, personal training and development requirements into personal performance measures. Defining appropriate performance targets based on known capability and desired characteristics. Formally appraising performance against the range of measures developed and compare with target performance. Rewarding and recognizing superior performance. A balance must be struck in selection of reward system mix for both long term and short term success of Gap. Thus, in the short-term, rewards such as bonuses, commissions and piece-rate payments can be used long-term rewards can constitute stock based incentives i.e. stock options, stock appreciation rights and phantom stock plans. 8.4 Change Management Having internally marketed the adoption of the Balanced Scorecard as a PMM system, performance measure owners, must manage the change process. The change being implemented in Gap is planned as it is being consciously embarked upon, Burnes (2006). Stages of the planned change will entail: exploration, planning, action and integration. During each stage identified above it will be necessary for performance measure owners to involve employees for the change process to be successful. The change process reinforces behaviors that are aligned to Gaps objectives through feedback and full utilization of the reward system being created. However, in the implementation of the balance scorecard and in effecting change as a critical success factor to the entire project barriers might impede the successful execution of the project. According to Burnes (2006) the barriers to effective change programs are: competing resources, functional boundaries, change management skills, communication, Them and us- the opposition element, people needs and training, unrealistic timetables, resistance to change and initiative fatigue These factors can occur at any stage and can affect employees both the general labour force and even managers and the executive. To overcoming these barriers, Burnes (2006) proposes communication, ability to establish high trust relationships, negotiation, Influencing and build on self confidence.