Thursday, October 31, 2019

Film Essay Example | Topics and Well Written Essays - 250 words - 2

Film - Essay Example There are very rare politically charged films that are found today and the reason for that is because according to ‘USA today’ analysis, 26 movies that were released in the past 20 years and which had politically charged theme only four films did a business of over $100 million and nearly two-thirds did a business less than $50 million. But apart from these statistics, directors apart from Michael Moore are still trying for politically charged movies such as ‘Lions for lambs’, a Robert Redford’s movie which highlights the US involvement in Iraq and Afghanistan. Other example includes the movie of Jolie’s Bosnian, ‘In the land of blood and honey’ (DeBarros and Bowles). The genre of films that are politically charged other than the documentaries include a suspense drama ‘Betrayed’ and ‘The zookeeper’. The musical film includes ‘School daze’ and the epic include ‘Syriana’ which have a politically-charged themes. Recently there had been a fiction film on a politically charged theme, ‘Route Irish’ and ‘the day the Earth stood still’. These films cover the social issues as well as political issues (DeBarros and Bowles). The cultural and societal change has made a differentiation in the present world and the spirit of sixties. Recent films on politically charged theme prove that directors are still trying to come up with the films of every genre to highlight the political issues. DeBarros, A and S Bowles. "Movie fans vote no on politically-charged films." 11 July 2007. http://www.usatoday.com. 20 March 2012

Monday, October 28, 2019

Education Essay Example for Free

Education Essay Step 1. Create a short answer (150-250 words) to each of the following questions. 1. How do social interactions among people in locales help define community?  2. How do schools help to shape the local boundaries of communities and the identity of community members?  3. Although schools and the communities they serve are closely entwined and community development is in the best interests of schools, why may school leaders be hesitant about involving schools and students in important community development roles? 4. Of all social institutions, why might schools be best placed to catalyze community development?  5. What are some likely results of school consolidation in a rural community or urban neighborhood?  6. Beyond the socially integrative functions, what distinct local economic roles might a school have in a rural community or urban neighborhood?  7. What characteristics of a well-planned school-community partnership project would indicate it is mutually beneficial?  8. How might a community or neighborhood development activity reinforce what is taught in the public school classroom?  9. What barriers might a community development organization expect to experience when seeking to partner with a public school or school district?  10. How can service learning and place-based education serve to facilitate a  viable schoolcommunity partnership and accomplishment of local community or neighborhood development needs? Step 2. Discuss your responses with a group of 4 or 5 classmates. SOAR ACTIVITY 15.1 SCHOOL-COMMUNITY PARTNERSHIPS Step 1. Contact your local elementary, middle and high schools. Step 2. Interview the principals about their partnerships with community organizations. Step 3. Have them describe each activity and assess the benefits to the school and community. Step 4. Compile a list of all the organizations and institutions involved with school programs. Step 5. As part of this project, prepare a list of recommendations for improving schoolcommunity partnerships in your area. LIFE Activity 15.1 Here are some examples of school-based service learning projects: 1. Drop-out prevention: A service-learning project focused on drop-out prevention might coordinate schools with local businesses to partner at-risk students with job shadowing and mentoring opportunities with local business leaders/members. These connections will help build bridges between schoolwork and work â€Å"in the real world,† and develop stronger ties between schools and local business, better meeting the needs of each while providing important opportunities to at-risk youth. 2. Subject-specific service-learning: Science and reading provide two examples of subjectspecific service-learning. Connecting college students majoring in science with schools to tutor K-12 students can create opportunities for hands-on learning during or after school hours. This might involve engaging in environmental projects, such as local water quality testing, cleaning of local stream or river beds, or wildlife conservation efforts. Similarly, college students majoring in language arts or reading might provide tutoring services during or after school for at-risk students, assist in running family literacy programs after school to engage parents in literacy efforts, and/or read to students at the elementary level. 2. Building school-community connections: Students plan a school-community day, in which school staff, community members, and students organize, run, and attend a school-community fair. The school can set up exhibits of student learning and projects students are engaged in that connect to the community. Community leaders can set up exhibits featuring ways they have been or would like to be involved with the school and with students. Local businesses might provide food and donate prizes or items for auction. Students at the school can perform music or showcase artwork. This would also be a good venue for team-building exercises between  community organizations and businesses and school staff and leaders, culminating in competitions with awards. These are only a few examples. We want to emphasize though that effective service learning projects are not â€Å"paint by the numbers† efforts, but are directly shaped by and responsive to the individual needs of local communities. That said, examples are useful, but ultimately your best guide is the community that lies before you. REFERENCE MATERIAL ON EDUCATION AND COMMUNITY SERVICELEARNING Syllabi: Literacy Tutoring: Principles and Practice (Syracuse University) http://www.compact.org/syllabi/syllabus.php?viewsyllabus=407 Service Learning in Higher Education (Vanderbilt University) http://www.compact.org/syllabi/syllabus.php?viewsyllabus=663 APPENDIX: Additional Resources to Learn about School-Community Partnerships for Community Development:  NOTE that the following descriptions have been taken directly from organization websites and have been only slightly modified, if at all. Associations, Organizations and Centers Center for Place-Based Education http://www.anei.org/pages/89_cpbe.cfm The Center for Place-based Education promotes community-based education programs. Its projects and programs encourage partnerships between students, teachers, and community members that strengthen and support student achievement, community vitality and a healthy environment. Coalition for Community Schools http://www.communityschools.org The Coalition for Community Schools represents an alliance of national, state and local organizations concerned with K-16 education, youth development, community planning, family support, health and human services, government and philanthropy, as well as national, state and local community school networks. The Coalition advocates for community schools as a means to strengthen schools, families and communities and improve student learning. Rural School and Community Trust http://www.ruraledu.org The Rural School and Community Trust is a national nonprofit organization addressing the crucial relationship between good schools and thriving communities. It also serves as an information clearinghouse on issues concerning the relationship between schools and communities, especially in rural contexts. School of the 21st Century. Linking Communities, Families and Schools http://www.yale.edu/21c/index2.html Based at Yale University, the 21C program develops, researches, networks, and supervises an educational model that links communities, families, and schools by transforming the school into a year-round, multi-service center that is open from 6 in the morning until 7 at night. The core components are affordable, high-quality child care for preschool children, before- and afterschool programs for school-age children; and health services, referral services, support, and guidance for parents of young children. Schools and Communities http://www.enterprisecommunity.org/programs/schools_and_communities/ This webpage of Enterprise Community Partners documents and disseminates the nation’s current efforts to combine school reform and community development. Web-based Documents and Material Local Governments and Schools: A Community-Oriented Approach http://icma.org/documents/SGNReport.pdf (International City/County Management Association, Washington, DC , 2008) Provides local government managers with an understanding of the connections between school facility planning and local government management issues, with particular attention to avoiding the creation of large schools remotely sited from the community they serve. It offers multiple strategies for local governments and schools to bring their respective planning efforts together to take a more community-oriented approach to schools and reach multiple community goals-educational, environmental, economic, social, and fiscal. Eight case studies illustrate how communities across the U.S. have already succeeded in collaborating to create more communityoriented schools. Includes 95 references and an extensive list of additional online resources. 40p. Report NO: E-43527 Reconnecting Schools and Neighborhoods: An Introduction to School-Centered Community Revitalization http://www.practitionerresources.org/cache/documents/647/64701.pdf (Enterprise, Columbia, MD , 2007) Provides an introduction to school-centered community revitalization. Part 1 presents the case for integrating school improvement into community development, drawing on the academic research linking school and neighborhood quality as well as early results from school- centered community revitalization projects across the country. Part 2 presents the core components of school-centered community revitalization, including both school-based activities and neighborhood-based activities. The final part of the paper illustrates the diverse approaches currently being taken to improve schools and neighborhoods, drawing on the experiences of eight  school-centered community revitalization initiatives in five cities: Atlanta, Baltimore, Chicago, Philadelphia, and St. Paul. 30p. New Relationships With Schools. Organizations That Build Community by Connecting With Schools. Volumes One and Two  http://www.publicengagement.com/practices/publications/newrelationshipssmry.htm (Collaborative Communications Group for the Kettering Foundation, Nov 2004) Case studies of organizations that establish strong connections between communities and schools using many different entry points. Includes a profile of New School Better Neighborhoods, a nonprofit intermediary organization in Los Angeles that works to design schools that serve as centers of communities. The organization brings together community stakeholders to plan multiuse development that combines residential, recreational, and educational use of scarce land in densely populated urban areas. Schools, Community, and Development. Erasing the Boundaries http://www.practitionerresources.org/cache/documents/56274.pdf Proscio, Tony (The Enterprise Foundation, Columbia, MD, 2004) This describes the results of efforts in four neighborhoods in Baltimore, St. Louis, and Atlanta to connect community-based revitalization initiatives with school reform programs in the same neighborhoods. Chapters include: 1) Building and Learning Go Seperate Ways; 2) The SchoolCommunity Alliance in Practice; 3) The Developer as Educator; 4) Housing and Economic Development. 39p. Using Public Schools as Community-Development Tools: Strategies for Community-Based Developers http://www.jchs.harvard.edu/publications/communitydevelopment/W02-9_Chung.pdf Chung, Connie (Harvard University, Joint Center for Housing Studies, Cambridge, MA; Neighborhood Reinvestment Corporation. , 2002) This paper explores the use of public schools as tools for community and  economic development. As major place-based infrastructure and an integral part of the community fabric, public schools can have a profound impact on the social, economic, and physical character of a neighborhood. Addressing public schools, therefore, is a good point of entry for community-based developers to place their work in a comprehensive community-development context. The paper examines ways in which community-based developers can learn from, as well as contribute to, current community-based efforts, particularly in disinvested urban areas, to reinforce the link between public schools and neighborhoods. Furthermore, the paper considers the policy implications of including public schools in comprehensive development strategies, and asserts that reinforcing the link between public schools and neighborhoods is not only good education policy, but also good community-development policy and practice. An appendix presents contact information for organizations participating in school and community linkages. 55p.

Saturday, October 26, 2019

Marketing and market entry strategy in india

Marketing and market entry strategy in india A market entry strategy maps out how to sell, deliver and distribute HMs products in another country such as India. When products and services are exported to another country, the strategy will define ways of obtaining contracts and delivering them in that country. If HM has decided to conquer the international market in India, it is opened to many choices. These options may include the cost, risk and the degree of control that the company will encounter in the country. In entering an international business, it is important that the management of the HM should be able to choose marketing entry strategies and carefully choose the product that the company will market in India. Exporting, is the simplest form of marketing entry strategy which includes direct or indirect method such as using an agent, in the case of direct method and counter trade if the company opted to implement an indirect method. Due to technological advances, direct marketing is staging a comeback, leading to a relationship orientation. Moreover, since HM wants to be known globally, there are many other ways the company can choose from like joint venture or export processing zone. The management of HM may decide to choose the export strategy and include in their operation the specific channels to market their product. Relationship marketing has revolutionized the traditional marketing and has become the biggest paradigmatic shift in marketing practice in recent decades.It has not only changed customers to advocate by replacing customer satisfaction by customer delight but has also increased quality service offers that exceeds expectations. Similarly, it will open new horizons for HM. It will trigger the HM to introduce new products and services. According to Berry and Parasuraman (1991: 25) relationship marketing concerns attracting, developing and retaining customer relationships. Relationship marketing will provide HM with necessary selling approach to cope with various challenges, set by the modern market in India. Relationship marketing transforms single usage to multiple service usage and will strengthen HM by providing them the wherewithal with which they can carry out effective customer services in India. Nowadays, competition in fashion industry and demands of customers are increasing constantly. They demand for global fashion company like HM where there are provisions for an incentive to the customer. So, strong commitment to customer care, attraction and maintenance at all levels are the top priority of HM, while dealing with the customers. Relationship marketing will help HM to overcome these problems and make the sales procedures much simpler. Palmer (2001) enumerated the components of relationship marketing as being: a focus on customer loyalty and retention; long term orientation; tracing identifiable buyers; distinguishing different levels of relationship between the buyer and the seller; high levels of customer dedication; and service quality as being the responsibility of every employee. Relationship marketing will transform indifferent customers into loyal clientele and emphasizes on their retention. Customer retention is the means to delivering long-term profitability in H M. Customer relationships management focuses on customer retention, and customer retention is believed to be more profitable than customer acquisition. Dawkins and Reichheld (1990) found that higher retention rate leads to higher net present value of customers. The longer customers can be retained by HM, the more and more tangible benefits will accrue from a sustained income stream. The end goal of relationship marketing is profit for HM. Saren and Tzokas (2000) raised the usefulness of relationship marketing in creating unique, difficult to imitate knowledge through the processes of interaction and dialogue with the customer. Knowledge about customers can only be enhanced if HM is able to maintain lasting relationships with their customers. The determinants of store choice, customer loyalty, patronage behaviour, customer retention and relationship marketing have been widely studied around the globe. Therefore, a considerable volume of literature exists, especially regarding fashion industry. However, there is still considerable scope for research in this field as the environment of fashion industry is in a constant state of flux and the emergence of new store formats in India has led to dramatic changes in consumer behaviour. New and existing fashion industry tend to provide a completely new experience for their consumers by offering sophisticated customer service, a wide and assorted variety of goods, breakfast ambience, quality imported and branded products. Since, fashion has invading people style of living and HMs the product that has been chosen to go international market. Hence, this research will suggest a marketing entry strategy for HM using Porters Five Forces model (Porter, 1980) and SWOT analysis of other HM companies in other countries. The company is a new entrant to the Indian Market, thus, this paper will provide a marketing entry strategy analysis for the company as it invade the market in India. Competitors Analysis Competitors analysis is very important since HM is a new entrant within the market place. It is essential so that the HM will be able to know their competitors and the possible strategy that they may use to level up such competitors and know the needs of the target market. Thus, this means that HM will enter the India as a beginning industry considering many competitors within the market place. Marketing Entry Analysis Utilizing Marketing Mix Marketing is considered as one of the most important element underpinning successful business creation and because of its complex applications, marketing is defined in a variety of ways (Sheth, Gardner, and Garrett 1988). According to Elliot (1990), the marketing concept was first promulgated in the late 1950s. The importance of marketing concept incorporates oft-repeated elements such as: customer orientation; integrated marketing efforts; and resultant profitability (Elliot, 1990). The marketing mix principles can be adjusted on a frequent basis to meet the changing needs of the target market and other dynamics of marketing environment (McCarthy, 2004). In relation to marketing plan, marketing mix includes both short term and long term strategies makes for a more profitable marketing mix. Long term strategies build brand/company awareness and give sales revenue a permanent, gradual boost. Short term strategies create a temporary, immediate revenue boost by giving buyers an incentive to purchase. By implementing both long and short term strategies, you can attend to immediate sales goals while building your business reputation and goodwill (Kyle, 2004). 1.1. Product HM AB (originally known as Hennes Mauritz) is a Swedish clothing company, known for retail of low-cost designer clothings. It was established in Và ¤sterà ¥s in Sweden in 1947 by Erling Persson, though at the time it only sold womens clothing and was called Hennes, which means hers in Swedish. Persson acquired the premises and inventory of a Stockholm hunting equipment store named Mauritz Widforss in 1968. Persson expanded into menswear and renamed the store to Hennes Mauritz, later abbreviated to HM (www.hm.com). H M is the worlds favourite and preferred designer of apparels and clothing for man and women. In addition, H M is also known not only for their fashion cosmetic but because of the quality of the clothes designed durability and the funkiness of its clothes. Through the online stores, HM provides the regional, continental and European Market an exclusive clothing designs. The main goal of HM is to provide innovative designs of apparels and clothes for different types of people in different countries all over the world. The company is known because of its strategy of providing clothing designs exclusively for each countrys preferences and needs. 1.2. Pricing H M is believed to have advantages when it comes to its pricing tactic. In order to be known into the market place and as a new entrant, the company will provide its target market with an affordable cost while providing them a high quality products and services. The company will be given the customer and client a price that is lesser than its competitors so that the consumer will be enhanced to buy and patronize the H M clothes and cosmetics. 1.3. Placement/Distribution The HMs products will be distributed directly to its clients and consumers in order to be known in the market place. HM products can utilize joint venture strategies with distinguished distributor of apparels, clothes and cosmetics, providing them with great offers, so as to market the product of the H M internationally. In 2003, HM announced its entry into the traditionally exclusive Milan fashion scene. It remains to be seen if HM and other low-end retailers will be able to find a market there. In February 2004, The Gap, another prominent international retailer, sold off all of its German outlets to its competitor, HM. HM launched its first American outlet on March 31, 2000 on New Yorks famous Fifth Avenue. Following the success its stores, additional outlets were opened in the SoHo, Gramercy, and Herald Square areas of Manhattan, followed by outlets in Upstate New York in Syracuse, Utica, and West Nyack. The brand then expanded to other regions of the country, including Chicago and its outlying suburbs. The first two HM stores to appear on the West Coast of the US opened in San Francisco, California on November 19th, 2005. HM opened its first Canadian store in Fairview Mall in Toronto and soon after, its store in Torontos Eaton Centre was opened in March 2004. Following great financial success, HM opened ten other stores within the Greater Toronto Area. Stores were also opened in Montreal in Spring 2006. HM continued its expansion in the Canadian market and doubled the number of stores in 2006. It planned new markets include Barrie, Hamilton, London, Kitchener/Cambridge/Waterloo, St. Catharines and Windsor and Ontario market, Fairview (Pointe Claire) shopping centre, Rockland Centre, the Galeries dAnjou and the Carrefour Laval. (www.hm.com) 1.4. Promotion/Communication HM can use video advertisements, print advertisements and the concept of e-marketing to promote its products. These promotion and communication strategy will tend to meet the consumers form different places everywhere, especially those target markets or the consumers in the working place. Moreover, since the trend in the market place today is the usage of e-marketing, the company will provide a website that any client can access. The use of the Internet is changing technologically advanced marketing overnight while different industries have been trying to use it as part of their marketing strategy. It does not only reconfigured the way different firms do business and the way the consumers buy goods and services but it also become instrumental in transforming the value chain from manufacturers to retailers to consumers, creating a new retail distribution channel (Donthu and Garcia, 1999). E-marketing is a powerful tool used that can be used by HM. E-marketing is defined as the process of achieving marketing objectives through the use of electronic communications technology (ICT). Smith and Chaffey (2001) have provided a 5Ss learning devices on how the internet can be applied by all business firms for different e-marketing tactics. These 5Ss are useful for HM and are se lling, serve, speak, save and sizzle. E-marketing or online marketing strategy can be used by HM to market its products. Thus, the HM has created its own website (www.hm.com). HM will use the e-marketing strategy is to keep in touch to different internet users and to be able to attract more clients and consumers. HM will use e-marketing to accelerate its business portfolio whether the user of the website is a customer, employee, stockholders, vendors, retailers or end customers. 1.5. Market Segmentation Marketing segmentation is defined as an aggregating process clustering people with similar needs into a market segment (Perreault McCarthy, 2002: 74). According to Ravesteyn (2005), customer segmentation is critical for an effective relationship marketing strategy. HM will provide its target consumers for its product by using market segmentation strategy. The segmentation of the market is a critical aspect of relationship marketing and the segmentation of business customers by HM must be in line with the different levels of relationship offered by the company. They need to make use of relationship marketing and management at segment or market level to identify the target market they intend pursuing (Stewart, 1995). Primarily, the context of the market segmentation for this company will be the Psychographics. Strydom, Cant Jooste (2000) identify the following four types of segmentation: demographic, geographic, psychographic and behavioural segmentation. Psychographics includes soc ial class, lifestyle, and personality variables (Chiagouris and Kahle, 2000). The end result of using these variables is a psychological profile of each market segment. Issues also examined the customers loyalties, habits and self-concept. Social class describes how individuals want their office automation will meet their comfort and satisfaction, what they consider important about their immediate surroundings, their opinions on various issues, and their interests. As lifestyle studies concentrates on what the consumer requires, using these study results as marketing strategies eventually became a marketing concept. The marketing concept is a basic philosophy that maintains that HM should endeavour to satisfy the needs and wants of customers through a coordinated set of activities that also allows the HM to achieve its goals at a profit. The HM must be able to consider its consumer, especially the demands of the consumer so as to let the business have an opportunity of having an expansion of its business portfolio as required by the consumers. The focus of this overview is on the behavioural segmentation process, which refers to the segmentation of buyers or customers into groups on the basis of their knowledge of, attitude towards, use of or response to a product or service of a HM. The behavioural variables identified by Kotler (2000) include: Occasions occasional buyers develop needs, purchase, or use products. Benefits refer to the benefits that buyers seek. User status includes potential users, regular users, non-users, first-time users or ex-users. Usage rate will include light, medium or heavy users. Loyalty status are classified as hard-core loyals, split loyals, shifting loyals and switchers. Buyers-readiness stages where the customers are either aware or unaware of the product or service, informed, interested, have a desire for the product or service and have intent to buy. Attitude enthusiastic, positive, indifferent, negative and hostile. Research Objectives: Relationship marketing will contribute significantly to the development of HM in India. Therefore, it becomes essential to study its applications in a fashion company in India. This study fulfils this need. The study addresses the different pros and cons of relationship marketing in a fashion company in India. Thus, the general purpose of this research investigation is to identify, describe and analyse factors that have an impact on relationship marketing, customer retention and customer acquisition in Indian fashion context. The main objectives of this study are given below, To identify, describe and analyse factors that will have an impact on relationship marketing, customer retention and customer acquisition in a fashion company and at HM in India. To appraise the views of customers of HM in India, how they feel about the companys relationship with them. To gain insight on how HM in India build customer relationship marketing tactics. To understand and determine the mediating role of customer behavior between relationship marketing and customer retention and acquisition. To indentify the market entry strategies for HM in India. Research Questions: What is the relationship marketing tactics practiced by the HM in India? What is the market entry strategy practiced by the HM in India? Deliverables: As it has been described in the objectives of the research project that the main purpose of this study is to examine the market entry strategies and relationship marketing by HM in India and customer relationships in Fashion Company and to find out how fashion company relationships with customers promotes its entry in India. The final product of this research project will be a report, containing the HMs relationship strategy and market entry strategy in India, what are their advantages and disadvantages. The report will contain the perceptions of employee and customers. Finally, the report will highlight some relationship marketing problems of HM and a fashion company and suggest some guidelines to remove these problems and improve its customers base in India. Research Methodology: Interested customer and would be customers of HM in India will be approached to collect the data. There are two kinds of data. Primary data Secondary data Primary data includes the information about relationship marketing and market entry strategy available from customers of HM in India. This also includes responses by the different employee of HM on the shop-floor. Secondary data will tell about the impact of relationship marketing in the retailers and the data has been available in their system. To collect the data, retailers employees, posted at different positions, will be contacted. Similarly, to assess the changes in retail services, caused by the relationship marketing, customers views will also be found out. The tools to collect this data will be the surveys. For this, employees and customers will be interviewed, where as to know the views of customers, different questionnaires will be prepared to ask them different questions. To analyze the collected data, different statistical techniques will be used. Qualitative research can be referred to as the opposite of quantitative research method. Any research method has its advantages and it disadvantages. Qualitative research is a study done that produces its results and findings that do not result from statistical means or other method of quantification. This method of inquiry requires a high level of intelligence and experience from the researcher to arrive at a more realistic and targeted data from the respondent. Quantitative research is referred to as a measurement of how people feel, think or act in a particular way and that this survey tend to include large samples from fifty to any number of interviews, structured questionnaires containing mostly closed questions that require questions along with set responds. This involves the clear statement of variables i.e. specifying the dependent and the independent variable. Resources: The most important thing to carry out any research project is to know the background, research objectives, and research methodology of the research project. For this literature is searched out. The University Library will be the primary source to review the literature. Books in hard and soft form will be obtained from the library. Similarly, different research journals and articles in the library will be valuable assets to prepare a comprehensive research report. To prepare the questionnaires, surveys done by Fashion Company to know the relationship marketing and market entry strategy will be used. Similarly new questionnaires, depending on the situation, will also be prepared. Project Plan: The project is divided into three stages. Literature review Interviews of employees of HM and their customers Report writing Literature Review: To carry out any research project, a research must be able to review the literature. This makes researcher aware of work, done by other people in the respective field. The main source of literature is the journals, in which different researchers publish their findings of problems. Interviews of retail employees and customers: In order to collect information on the impact of market entry strategy and know impact on relationship marketing in the Indian fashion company, the employees of HM will be interviewed. They will be asked about the positive and negative points of relationship marketing utilization in their stores. Similarly, customer views will be taken through the interviews. Considering all these views, suggestion to improve the customer services will be advised. Report writing: The final product of the research project will be a written report. The structure of my report will be divided in following categories, Introduction: In the introduction, the market entry strategy and history of relationship marketing use in fashion sector will be discussed and how different relationship marketing systems will be used to address the issues of HM, with the passage of time. Aims and objectives: In this part of report, purpose of the research project will be stated very clearly; what are the aims of the study and what are the problems, which will be discussed in the report. Research methodology: This is the core part of the report. After stating the problem, different research methodologies will be explained to gather the data. The primary source will be the interviews of the employees and customers. From these interviews, impact of relationship marketing and market entry strategy of HM will be assessed. The questions asked to employees and customers will be provided in the appendix of report. Conclusions: After describing the problems and research methods, suggestion will be advised to eliminate the highlighted problems. Risk: In order to carry out any research project, it is very important to study all the aspects of the project. One of the main aspects regarding any project is the risks involved. There are also some risks involved, regarding the research project under consideration. One risk can be privacy. HM employees can be duty-bound and show reluctance to give information about their working procedures and on relationship marketing operations, used in the fashion company. Impact and Beneficiaries of Research: The main objective of this research activity is to investigate the market entry strategies and relationship marketing by HM in India and customer relationships in Fashion Company and to find out how fashion company relationships with customers promotes its entry in India. This research can be very helpful for the fashion sector. For instance, it will analyze the effectiveness of relationship marketing and its market entry strategies in India. It will determine the views of HM employees about the introduction of relationship marketing in their working environment. From this, both positive and negative points about the role of relationship marketing in the fashion sector, put forward by the HM employees, can be known. Similarly, the customers views about the insertion of relationship marketing and the effect of HMs market entry strategy can be found out. Customers level of satisfaction about the HMs customer services can be assessed. This report will also show the comparison of differe nt strategies among different HMs companies worldwide and how they use relationship marketing to achieve the same target. By knowing the views of customers through this study, their difficulties while dealing with HM, can also be discovered. This report will also address these issues and suggest solutions to eradicate these problems. So, the major beneficiaries of this report are the management of HM and by considering the suggestions of the report, they can improve their market entry strategies, customer services and hence the customer relationship from HM will be invigorated.

Thursday, October 24, 2019

Rehabilitation Of Criminals: A Waste Of Time Or Worth The Effort? :: essays research papers

Rehabilitation of Criminals: A Waste of Time or Worth The Effort?   Ã‚  Ã‚  Ã‚  Ã‚  Since 1960, the number of violent crimes committed per capita in the United States has increased by more than 450%. More than 24,000 murders took place in America in 1991.. With each passing year, rapes, robberies, murder, and other forms of extreme violence has become a way of life for some individuals who fall short of society's norms; however, it is only a small portion of criminals who commit the majority of the crimes. It is no longer rare to be a victim of a violent crime or to know someone who has been affected .   Ã‚  Ã‚  Ã‚  Ã‚  Get tough laws passed by many states have caused a increase in prison spending. Prison populations in the 1980's have more than doubled resulting in more prisons being built every year. Even with all the harsh sentencing guidelines, judges are not sentencing criminals to do necessary time . Prisons have become a revolving door society. Only 25% of those convicted are sent to prison. Judges usually have to let out a inmate before another one can take his place. There are limited cells in prisons, so the majority of crimes are punished by probation or court sanctions. Even when longer sentences are given, they are rarely served. The average murderer spends about six years in prison.   Ã‚  Ã‚  Ã‚  Ã‚  What factors decide the outcome of such individuals? Some experts feel there is no absolute answer, only speculation. There is however, a strong relationship between environment and the outcome of offenders. Low income, poor education,drugs, and family breakdown are some factors that keep repeating in cases of habitual offenders; however, the public sees the problem lies with the availability of guns and lack of morals. Only one factor stands out in both public and professional opinion, drugs.   Ã‚  Ã‚  Ã‚  Ã‚  To deal with crime, we must first go to the root of the problem. The American society is a breeding ground for violent crime. Preventative measures must be implemented to stop such behavior before it starts. Teaching family values in after school programs is a step in the right direction. Programs that teach respect, anger management, and accountability for one's own actions is a must in today's society.   Ã‚  Ã‚  Ã‚  Ã‚  Prison programs for the first time offender to help them become productive members of society can be a step in the right direction.Teaching inmates how to manage anger, drug counseling, people skills, as well as teaching blue collar trade to inmates will ease the transition from prison to the outside world. When the inmate is released, a half way house should be the residence of

Wednesday, October 23, 2019

Kite Runner by Khaled Hosseini

Physical geography has a major Influence to the story. The themes of geography that mainly pertain to the story are Place, Human/ Environmental Interactions, and Movement. Place can have physical and human characteristics. The physical geography of Afghanistan changed after the wars and the Taliban attacks. For example, before in the â€Å"old days the wind swept through the irrigated plains around Islamabad where farmers grew sugar cane and the sweetness impregnated the air. † Now there were narrow road and dries up gutters. In Kabul when Hosannas and Emir were young boys, they used to run up hills surrounded by Poplar and Pomegranate trees.Treetops could be seen poking from behind the houses as they played. Now most of the trees were gone used as wood for lumber to keep Taliban from hiding. Where before you could fins street vendors and restaurants, now there are only dusty roads, abandoned buildings, and beggars. The number of beggars and orphaned children increased after t he wars. The change in this geographical sense changed the way of life of the Afghan's because now they were homeless because their houses were taken over by â€Å"guest† as the referred to the Taliban.They were left without Jobs, ways of growing crops and providing for their families. The war left omen and children husbandly and fatherless. Another theme of geography that pertains is movement. Because of the war, people were forced to relocate. Those that had money fled from Afghanistan. Babe and Emir left from Kabul dictatorial and into a foreign country, America, in hope of a better future. In Afghanistan they were the aristocratic class and In America they became the working class.The following ethnic groups represented In Kite Runner are Afghans. Pakistanis, Arabs, Palestinian, Iranians, Russians, and Germans. The major ethnic groups represented are the Afghans' divided into two major groups, the Hazard's and the Pushpins, and the Pakistanis. The Hazard's are outsiders a ccording to other Afghans because of their Mongolia indigenous people of eastern and southeast Asia and Arctic region. They are also considered outsiders because the Hazard's are Shiite Muslims In a mostly Sunnis Muslim nation.The Pushpins are the dominant ethnic group In Afghanistan accounting for more than half of the population. The Pushpins are Sunnis Muslims in a Sunnis Muslim Nation. The majority of Pakistanis practice Islam. Islam governs their personal, legal, political and economic parts of their life. Pakistanis live in a hierarchical society and are respect because of age and position. There are many examples of their conflicts during the course of the novel. One example Is when Hosannas finds his mother's history book and starts reading it.In the book he finds an inure chapter about the Hazards and how they were persecuted and oppressed by the Pushpins. When he takes it to his teacher, he replies, â€Å"That's the one thing Shih's people do well, passing themselves as m artyrs. † This show how they differ and how they dislike each other. Another example is when the teacher ells Emir, that Iranians are â€Å"grinning smooth talkers who patted you on the back with one hand and picked your pocket with the other. † This shows how they dislike each other even though the Iranians, Like the Hazards, are Shih's Muslims.Another example with me in Mazda†¦ We left them out for the dogs†¦ † This shows that the Taliban could not put away their differences and they had so much hatred that they believed the Hazards were as significant as animals. The novel faithfully matches the reality of its time. Throughout the book, it mentions dates important to the plot but also events that happened in reality. For example, it leaked about King Mohammad Sahara Shah being sent away to Italy and being overthrown by his cousin Mohammad Doodad Khan in 1973.When further research was done, it proved to be correct with actual events. Another example of this was when the book mentions that the Taliban took over and massacred the Hazard's in 1998. After further studies, it proved to be accurate with the real events. Another factual event illustrated in the novel was when it mentions the United States boycotting the Olympic Games in Moscow in 1980. After research, it is proven that the facts given in the novel match the events that actually occurred.

Tuesday, October 22, 2019

Triboluminescence of Wintergreen Lifesaver Candies

Triboluminescence of Wintergreen Lifesaver Candies For several decades people have been playing in the dark with triboluminescence using wintergreen-flavored Lifesavers candy. The idea is to break the hard, donut-shaped candy in the dark. Usually, a person looks in a mirror or peers into a partners mouth while crunching the candy to see the resulting blue sparks. How to Make Candy Spark in the Dark wintergreen hard candies (e.g., Wint-o-Green Lifesaversteeth, hammer, or pliers You can use any of a number of hard candies to see triboluminescence, but the effect works best with wintergreen-flavored candy because wintergreen oil fluorescence enhances the light. Select a hard, white candy, as most clear hard candies do not work well.   To see the effect: Dry your mouth with a paper towel and crunch the candy with your teeth. Use a mirror to see light from your own mouth or else watch someone else chew candy in the dark.Place the candy on a hard surface and smash it with a hammer. You can also crush it beneath a clear plate of plastic.Crush the candy in the jaws of a pair of pliers You can capture the light using a cell phone that works well in low light or a camera on a tripod using a high ISO number. The video is probably easier than capturing a still shot. How Triboluminescence Works Triboluminescence is light produced while striking or rubbing two pieces of a special material together. It is basically light from friction, as the term comes from the Greek tribein, meaning to rub, and the Latin prefix lumin, meaning light. In general, luminescence occurs when energy is input into atoms from heat, friction, electricity, or other sources. The electrons in the atom absorb this energy. When the electrons return to their usual state, the energy is released in the form of light. The spectrum of the light produced from the triboluminescence of sugar (sucrose) is the same as the spectrum of lightning. Lightning originates from a flow of electrons passing through the air, exciting the electrons of nitrogen molecules (the primary component of air), which emit blue light as they release their energy. Triboluminescence of sugar can be thought of as lightning on a very small scale. When a sugar crystal is stressed, the positive and negative charges in the crystal are separated, generating an electric potential. When enough charge has accumulated, the electrons jump across a fracture in the crystal, colliding with ​exciting electrons in the nitrogen molecules. Most of the light emitted by the nitrogen in the air is ultraviolet, but a small fraction is in the visible region. To most people, the emission appears bluish-white, although some people discern a blue-green color (human color vision in the dark is not very good). The emission from wintergreen candy is much brighter than that of sucrose alone because wintergreen flavor (methyl salicylate) is fluorescent. Methyl salicylate absorbs ultraviolet light in the same spectral region as the lightning emissions generated by the sugar. The methyl salicylate electrons become excited and emit blue light. Much more of the wintergreen emission than the original sugar emission is in the visible region of the spectrum, so wintergreen light seems brighter than sucrose light. Triboluminescence is related to piezoelectricity. Piezoelectric materials generate an electrical voltage from the separation of positive and negative charges when they are squeezed or stretched. Piezoelectric materials generally have an asymmetric (irregular) shape. Sucrose molecules and crystals are asymmetric. An asymmetric molecule changes its ability to hold electrons when squeezed or stretched, thus altering its electric charge distribution. Asymmetric, piezoelectric materials are more likely to be triboluminescent than symmetric substances. However, about a third of known triboluminescent materials are not piezoelectric and some piezoelectric materials are not triboluminescent. Therefore, an additional characteristic must determine triboluminescence. Impurities, disorder, and defects are also common in triboluminescent materials. These irregularities, or localized asymmetries, also allow for an electrical charge to collect. The exact reasons why particular materials show tribol uminescence can be different for different materials, but it is probable that crystal structure and impurities are primary determinants of whether or not a material is triboluminescent. Wint-O-Green Lifesavers arent the only candies that exhibit triboluminescence. Regular sugar cubes will work, as will just about any opaque candy made with sugar (sucrose). Transparent candy or candy made using  artificial sweeteners  will not work. Most adhesive tapes also emit light when they have ripped away. Amblygonite, calcite, feldspar, fluorite, lepidolite, mica, pectolite, quartz, and sphalerite are all minerals known to exhibit triboluminescence when struck, rubbed, or scratched. Triboluminescence varies widely from one mineral sample to another, such that it might be unobservable. Sphalerite and quartz specimens that are translucent rather than transparent, with small fractures throughout the rock, are the most reliable. Ways to See Triboluminescence There are several ways to observe triboluminescence at home. As I have mentioned, if you have wintergreen-flavored Lifesavers handy, get in a very dark room and crush the candy with pliers or a mortar and pestle. Chewing the candy while watching yourself in a mirror will work, but the moisture from saliva will lessen or eliminate the effect. Rubbing two sugar cubes or pieces of quartz or rose quartz in the dark will also work. Scratching quartz with a steel pin may also demonstrate the effect. Also, sticking/unsticking most adhesive tapes will display triboluminescence. Uses of Triboluminescence For the most part, triboluminescence is an interesting effect with few practical applications. However, understanding its mechanisms may help explain other types of luminescence,  including bioluminescence  in bacteria and earthquake lights. Triboluminescent coatings could be used in remote sensing applications to signal mechanical failure. One reference states that research is underway to apply  triboluminescent flashes  to sense automobile crashes and inflate airbags.

Monday, October 21, 2019

The Pantheon Essays - Domes, Pantheon, Rome, Rotunda, Pantheon

The Pantheon Essays - Domes, Pantheon, Rome, Rotunda, Pantheon The Pantheon The Pantheon is one of the finest and best preserved examples of ancient Roman architecture. It stands in the center of Rome. The Pantheon was constructed by Marcus Agrippa in 27 B.C. This building did not include the rotunda in back. In A.D. 123 Hadrian built the rotunda, which was later changed in design by Septimius Severus and Carcalla. When the Pantheon was being built by Hadrian, credit was given to Agrippa. A large inscription was made on the front of the portico. The Romans built the Pantheon as a temple in honor of all the Roman gods. The name Pantheon literally means, "of all the gods." The Romans gave this name to any of the temple which served the purpose of worship of all the gods. The rotunda forms the main part of the building. It forms a half perfect sphere. The dome itself is 142 feet in diameter. It rises 142 feet above the floor.. The design of the dome was constructed to reflect the few sources of light admitted to the building. The dome was built of Roman brick and mortar, which was covered by marble inside of it. The rotunda is a thick concrete wall that is 6 meters thick. This is what supports the approximate weight , 5,000 lbs, of the dome. The only light which enters the building comes from the top of the dome. The oculus, the only window in the Pantheon, is 27 feet in diameter. The sunlight that shines through the oculus shifts hour-to-hour highlighting the walls that are painted throughout the building. In front of the rotunda is a beautiful porch, or portico, which belongs to the original temple built by Agrippa. Across the front of the portico stands 16 great Corinthian columns. Each hewn from a single stone. They were 14.2 meters high and 1.5 meters in diameter. The Pantheon was renamed the Santa Maria Rotunda when it became a Christian church in A.D. 609. The famous painter Raphael and other Italian kings are buried there. It now is a museum and serves as a tourist spot in Rome.

Sunday, October 20, 2019

Roslind Franklin essays

Roslind Franklin essays DNA was once considered a mystery of science. One of the people that helped to discover and solve the mysteries of DNA was Rosalind Franklin. Even though she had to struggle against a great deal of male ignorance in the scientific community, she still made an impact on the world of science. Born on July 25, 1920, Rosalind attended St. Paul Girls School in London. Franklin and her four other siblings received an advantaged childhood because their father was a banker. At an early age she showed an interest in science-like astronomy, physics and science. She also preferred building things than playing with a doll. (Stille, 74) Because of the time period in which she lived, Rosalind was considered odd because of her interests. Her interest in science continued until she reached college. Rosalind applied and was accepted to Cambridge University in 1938. Her father was against her going to a university because he did not think that it was proper. She went to the university despite her fathers opinion. She graduated in 1941. After graduating from Cambridge she participated in all sorts of research. During World War Two, Rosalind worked for the British government. She did studies on how to use coal supplies more economically. Much of her early research helped begin the modern field of carbon-fiber technology. (Newton, 52) She went to Paris, France from 1947 to 1950 to study the practice of x-ray crystallography. Rosalind returns to London in 1951 and accepts a research position at Kings College. Here is where she does the research that makes her most note able. She used the techniques that she learned in Paris to research the structure of DNA. She did not get along very well with her colleague Maurice Wilkins. He did not like her much because he thought she was supposed to be his assistant. The male staff members of Kings College treated her the same way. They never let her eat in the dining room of the...

Saturday, October 19, 2019

Global e-business ( two question in the sources) Essay

Global e-business ( two question in the sources) - Essay Example Many successful businesses are revamping their existing business structure and adding e-business components to their primary business model in order to enjoy the opportunity created by the disruptive web technology. Nonetheless, the extent of adapting to electronics business varies according to the companies, as some of them employ entire electronic business models and some only adopts support functions, like, communications. The purpose of this project is to devise the way in which Azinsu, an apparel brand with a niche market, can use benefits of internet based technology, so as to expand its market and modify traditional business structure, thereby going global. The aspects of e-business, which will be covered in the course of discussion, are design and manufacturing department and also, supply chain logistics. The appropriate mode of the company to cater to the needs of foreign customers will also be elaborated. Azinsu is an apparel company that has been extremely successful in creating its own brand in the female clothing industry. The product of the company has been highly popular among clients of the upper-end market, like, celebrities. The company has successfully created a niche market, where it has been consistently selling quality products. The traditional mode of operation of the company is, however, creating a constraint in sales. This is because products that are produced by the company are in huge demand all over, but lack of global presence is restricting them from having a global customer base. Presently, the company is devising new line of products, like, shoes and fragrances, which greatly appeal to the current target market, mainly consisting of fashion conscious women, who have the wherewithal to purchase the company’s products. In order to understand the juxtaposition of e-business in the traditional business model of

Friday, October 18, 2019

Ethics and the Criminal Justice Profession Case Study

Ethics and the Criminal Justice Profession - Case Study Example He fails to document this information." (Rothlein, 2007). This case shows that evidence has been discarded that may or may not affect the case. It is not within the bounds of the detective to determine that. All evidence must be disclosed. This case essentially tells how important the Brady v Maryland case is in the everyday job of the police officer or investigator. This in many ways is a difficult question to answer. No one wants to be held to a higher standard than those around them. However, I again quote the Law Enforcement Code of Ethics. In paragraph two it says: "I will keep my private life unsullied, as an example to all: I will be exempletory in obeying the laws of the land and the regulations of my department."(Law Enforcement Code of Ethics). If we do not hold the police officer at a higher standard than what might that affect when it comes time to prosecute a criminal If the arresting officer is known to indulge in drug abuse off duty and then arrests someone for doing the same while on duty, how does he justify that Because it is the law.

Article response Example | Topics and Well Written Essays - 750 words - 1

Response - Article Example The article seeks to clarify whether the effect of gender congruence between a competitor and the referent can occur independently from ambiguity avoidance. To clarify this, the authors conducted two experiments using Finnish, a non-gendered language. Like English, the Finnish language speakers produce fewer pronouns when the competitor and the referent have the same gender. Furthermore, this effect does not result from ambiguity avoidance. Competitors’ gender congruence and reduction of pronouns is higher in English language than in Finnish. In English, avoiding gender ambiguous pronouns is easy because semantic competition is normally affected by gender congruence. Discussion and comments of the article On reading this article, my knowledge was widened on what drives the effect of gender congruence in the English language. I knew that gender congruence effect in English language was driven by ambiguity avoidance. Initially, I assumed that the way speakers make reference to e xpressions was based on congruence effect alone. To enhance my understanding, I examined Van Compbel, Fukumura, Harley and Pickering (2011) study, which investigated how similarity in different entities affect a speaker’s choice and reference to some expression. ... Conversely, more pronouns are produced when the competitor and the referent are in different situations. The congruent effect appeared to be high in a situation in which the action described was relevant to the situational congruence. This implies that the effects that come as a result of congruence will depend on other representations of concepts known by the speaker. In the second experiment, this study revealed that whether a pronoun is ambiguous or not, the effect of competitor’s similarity is always present. At the end, the researchers concluded that the similarity effects are independent of ambiguity avoidance. The effect emanates from a speaker’s internal production challenges. Still, Van Compbel et al. (2011) results are similar toward the explanation of how ambiguity avoidance relate with the similarity or congruent effect. However, the studies use different approaches in investigating the effect of congruence on ambiguity avoidance. Both articles revealed that congruence effect is independent of ambiguity avoidance. In the main article by Fukuruma, Hyona and merete (2013), it is revealed that because congruence impact semantic competition, a speaker is aware of the pronoun ambiguity. This makes congruence effect independent. Conversely, Van Compbel et al. (2011) study confirms that it is the internally speaker production constraints that make congruence effect independent of ambiguity avoidance. Further, the similarity between these two articles drew my attention to another study by Arnold and Griffin (2007). The article investigated how one chooses between proper names and pronouns in a speech. The study was based on the traditional assumption that speakers strive to interpret

It's the Law ... or is it Essay Example | Topics and Well Written Essays - 500 words

It's the Law ... or is it - Essay Example There exist set rules and laws that are useful in curbing the misuse of other people’s work found in the web. The paper will briefly explore copyright laws governing internet information and the penalties for contravening them. There are numerous laws and regulations governing the use of internet information, but the paper will particularly look at copyright laws. In 1998, the then United States president Bill Clinton signed the digital millennium copyright Act (Scott). The act provides guidelines that should be adhered to by the users of the internet when accessing other people’s work that may include, music and intellectual work among others. Further, Scott documents that some of the copyright laws and regulations include: fair use, unauthorized access and copying, file sharing and liability. Let us examine liability. As stipulated in the copyright Act, one is not allowed to produce and distribute unauthorized copies from the internet. In the event that producti on is to be done, consent of the producer is supposed to be sought. Failure to do the same amounts to a breach of the law and the offender is liable for the legal consequences. When the breach occurs, the plaintiff can sue the actual offender or the internet service provider in a court of law. The complainant is also at liberty to seek an injunction from the court (Lesley). The purpose of the injunction is to prevent the offender from continual violation of the copyright rights. Lesley further documents that the copyright holder has the right to seek compensation from the offender in the court in form of monetary or statutory damages. The court of law is charged with the responsibility of establishing the guilt or innocence of the accused. If one is found guilty of violation the copyright act, he or she must take criminal responsibility.

Thursday, October 17, 2019

Compare and Contrast the customs of Mexican Americans and Puerto Term Paper

Compare and Contrast the customs of Mexican Americans and Puerto Ricans - Term Paper Example There are as many Puerto Ricans living in the United States than those living in the small island that has a population of four million (CountryWatch, 2011). Puerto Rico became property of the United States back in 1898 after the United States won the Spaniard-American war. A common trait between both ethnicities is that they are typically bilingual (English / Spanish). The Spanish spoken by Puerto Ricans is a bit different than the Spanish spoken by Mexican Americans in terms of words and accent. The parents of Puerto Ricans and Mexican Americans teach their kids Spanish at home and Spanish is often spoken in their households. Both races are sports fanatics. In boxing there is a big rivalry between Mexicans and Puerto Ricans. The Oscar De la Hoya vs. Tito Trinidad bout at the time was the biggest revenue generating non heavyweight pay per view bout in the history of boxing. Oscar De La Hoya is the most successful Mexican American fighter in the history of boxing. Baseball is the national pastime of Puerto Ricans, while many Mexican Americans prefer to play soccer. The tourism and travel tendencies of the two groups are different as Puerto Ricans often travel back and forth from the mainland US to the island of Puerto Rico. Sometimes Mexican Americans due to immigration issues of their parents do not travel as much back and forth. When they travel Puerto Ricans do not have to worry about foreign exchange considerations since Puerto Rico shares the same currency with the United States. Both ethnic groups believe a lot in the value of being a good host to their guests. Offering food and drinks to guests is a mutual custom of both groups of Latinos. The traditional foods of each Latino group are very different. Mexican Americans often eat a diet associated with floor tortillas, corn, refried beans, and rice, and chilies, spices, vegetables, beef, and cheese (CultureGrams, 2011). In Puerto Rico the most common meal is

Creating an Inclusive School Essay Example | Topics and Well Written Essays - 250 words

Creating an Inclusive School - Essay Example The special classes enable the special case students to access additional education benefits and programs. Rhonda and other special learners should benefit from LRE that allocates extra time for tests and quizzes. This provides adequate time for properly tackling examination questions. The special education teachers should read aloud the test and quiz questions. This will enable easy understanding of examination instructions. The teacher should allow Rhonda and other special learners to utilize the computer in preparing written assignments. This improves the presentation and quality of written assignments. Special learners like Rhonda should be given preferential seating arrangement at the front of the class. This ensures effective hearing and enhances visibility during class lessons. The LRE ensures that parents or guardians of the special learners participate in the learning processes. This is because the parents are provided with extra education materials like textbooks. The education materials are used to guide the special learners during home studies. The school administrator should encourage adoption of two learning classes for special learners; the special and the ordinary class. This will improve the education capabilities of special learners. The administrator should also budget for appropriate resources that enhance learning of special students like

Wednesday, October 16, 2019

It's the Law ... or is it Essay Example | Topics and Well Written Essays - 500 words

It's the Law ... or is it - Essay Example There exist set rules and laws that are useful in curbing the misuse of other people’s work found in the web. The paper will briefly explore copyright laws governing internet information and the penalties for contravening them. There are numerous laws and regulations governing the use of internet information, but the paper will particularly look at copyright laws. In 1998, the then United States president Bill Clinton signed the digital millennium copyright Act (Scott). The act provides guidelines that should be adhered to by the users of the internet when accessing other people’s work that may include, music and intellectual work among others. Further, Scott documents that some of the copyright laws and regulations include: fair use, unauthorized access and copying, file sharing and liability. Let us examine liability. As stipulated in the copyright Act, one is not allowed to produce and distribute unauthorized copies from the internet. In the event that producti on is to be done, consent of the producer is supposed to be sought. Failure to do the same amounts to a breach of the law and the offender is liable for the legal consequences. When the breach occurs, the plaintiff can sue the actual offender or the internet service provider in a court of law. The complainant is also at liberty to seek an injunction from the court (Lesley). The purpose of the injunction is to prevent the offender from continual violation of the copyright rights. Lesley further documents that the copyright holder has the right to seek compensation from the offender in the court in form of monetary or statutory damages. The court of law is charged with the responsibility of establishing the guilt or innocence of the accused. If one is found guilty of violation the copyright act, he or she must take criminal responsibility.

Tuesday, October 15, 2019

Creating an Inclusive School Essay Example | Topics and Well Written Essays - 250 words

Creating an Inclusive School - Essay Example The special classes enable the special case students to access additional education benefits and programs. Rhonda and other special learners should benefit from LRE that allocates extra time for tests and quizzes. This provides adequate time for properly tackling examination questions. The special education teachers should read aloud the test and quiz questions. This will enable easy understanding of examination instructions. The teacher should allow Rhonda and other special learners to utilize the computer in preparing written assignments. This improves the presentation and quality of written assignments. Special learners like Rhonda should be given preferential seating arrangement at the front of the class. This ensures effective hearing and enhances visibility during class lessons. The LRE ensures that parents or guardians of the special learners participate in the learning processes. This is because the parents are provided with extra education materials like textbooks. The education materials are used to guide the special learners during home studies. The school administrator should encourage adoption of two learning classes for special learners; the special and the ordinary class. This will improve the education capabilities of special learners. The administrator should also budget for appropriate resources that enhance learning of special students like

Matt Cruse Essay Example for Free

Matt Cruse Essay Free essays botnet Free sample essays for human being Skip to content * Home Free Essay on â€Å"Nuclear Weapons And Defense† Free Essay on â€Å"Airborne (Book)† Posted on June 11, 2011 by Essay fuhrer bot Free essay on Free Essay on â€Å"Airborne (Book)† found Airborn Joseph Campbell`s theory is used in this essay to determine that Matt Cruse is the hero in Airborn by Kenneth Oppel. Kenneth Oppel has developed the main character, Matt Cruse, very well using Joseph Campbell`s theory on the archetype of the hero`s journey. The novel`s main character, Matt Cruse, is a hero because of his call to destiny, his journey in the book, and the return, reward and reintegration in to the society. Firstly, the evidence that proves that Matt Cruse is a hero in this book is the fact that he was called to his destiny. There are two evidence that lead up to Matt Cruses` destiny. The two evidence are when he rescued Benjamin Molloy and when Benjamin was about to die, Benjamin Molloy said about magnificent creatures that he saw but Matt passed those predictions as the ravings of a dying man. The second evidence that proves that he was called to his destiny is the fact that Kate De Vries, second female character, comes on board the aurora and tells Matt that the man that Matt saved a year before was her grandfather, Kate trusts Matt enough to let him see her grandfather’s diary. Matt reads about what Kate’s grandfather saw and gets amazed and starts to believe that the creatures really exist. Matt rescues Benjamin Molloy, Kate’s grandfather, in the first chapter where all the characters are introduced and the captain asks matt to go in an arm that is aboard the aurora and rescue the damaged man in the hot air balloon. Hero’s are always brave and so is Matt. â€Å"â€Å"Mr. Cruse, I look at you, and of all the men, you’re the one who shows not the slightest hint of fear. Am I right? â€Å"Yes, sir. I have no fear of heights. † Matt said †

Monday, October 14, 2019

Adaptive Block Steganography Based Crypting Technique

Adaptive Block Steganography Based Crypting Technique A Novel Approach on Adaptive Block Steganography Based Crypting Technique for Secure Message Passing AbhipsaKundu,  Sudipta Sahana Abstract The enhancement of using internet system has increased the ease of information communication which throws challenge in data security. Now in current days safe and sound data transfer become more essential and significant. Cryptography and Steganography are two significant areas of research that involve a number of applications. Cryptography is the technology that involves to encode a message text into an unreadable text form that is known as cipher text and thesteganography is an art and technology of hiding information in a multimedia file without causing statistically significant change to thisfile for involving a secret message transmission. In this proposed work the plain text is transformed to a cipher text using Cryptography technique, where different person can able to use their preferable key for encoding the text and also some Boolean algebraic operations are used in the succeeding steps and after that this cipher text is hidden inside a gray scale image as a cover media wit h dimension of 2n x 2n and a secure pictorial block steganography based encryptionalgorithm is proposed for transferring text messageand also mentioned the Cryptanalysis and Steganalysis method for retrieving data at receiver side. The experimental result shows that for using different length of text message the distortion of picture is very much less that is negligible in open eyes. At last it can be mentioned that without knowing the appropriate knowledge of cryptanalysisand steganalysis retrieving of message is quite impossible. Keywords Cryptography, Steganography, Plain text, Cipher text, Cryptanalysis, Steganalysis. 1. Introduction Cryptography is generally a key enabling technology for protecting distributed systems. An encryption algorithm takes the original message and a key, and alters the original message mathematically based on the key bits to create a new encrypted message. Likewise a decryption algorithm takes an encrypted message and restores it to its original form using one or more keys. There are two general concepts of cryptographic keys: Private key and public key system. When same key is use for encryption and decryption both purpose then this is identified as symmetric key encryption by using secret key. Where public-key encryption is also known as asymmetric-key encryption. The private key is known only to your computer, and used for only encrypt the message while the public key is given by your computer to any computer that wants to communicate securely with it.To decode an encrypted message, a computer must use the public key. SYMMETRIC KEY CRYPTOGRAPHY ASYMMETRIC KEY CRYPTOGRAPHY In this paper, secure data transfer by using cryptography with Boolean algebra and key concept is focused where different body can use a particular mentioned length key that generally cant be guessed by a third person. Steganography is the process of communication of secret data by using a multimedia carrier like image, video, audio or it also can be send by using an IP Datagram. Generally people cannot detect the secret communication of data. Message to be hidden is concealed in another file called cover media. Combination of secret message and cover file is called as – stego media. The stego function operates over cover media and the message (to be hidden) along with a stego-key (optionally) to produce a stego media. STEGANOGRAPHY AND STEGANALYSIS The paper is organized as follow. Section 2 describes the different types of steganography Techniques. In Section 3 section the algorithms of cryptography, steganography for data encryption techniqueon the other hand cryptanalysis and steganalysis forthe decryption technique are discussed followed by an example in Section 4. Section 5 shows the Analysis Work. Finally, in Section 6 the conclusion of this paper is included. 2. Related work In this section the past work related to the problem of hidden text in an image file is analyzed. A literature survey in this extent finds an amount of work is done in encrypting the text message and also decoding the text. Here the methodology and highlights of contributions, conventions is summarized. In M. Bellare [1] formalized the new cryptographic primitive, Message-Locked Encryption (MLE), where the key under which encryption and decryption are accomplished is itself derived from the message. MLE delivers a method to reach secured duplication (space-efficient secure outsourced storage), an objective currently embattled by numerous cloud-storage providers. On the theoretical side the challenge is standard model explanations, and this technique makes Rig Das et al. [2] performed the Huffman encoding upon the secret message /image and then embedded each of the encrypted bits, the size of Huffman encoded bit stream, Huffman table into the cover image by altering the least significant bit (LSB) of each of the pixels. G.KarthigaiSeivi at al. [3] proposed a technique of finding the edge of the image using the Least-Significant-Bit (LSB) algorithm by employing Laplacian detector, and then data is hidden on center pixels whose blocks are located at the sharper edges. Yam bernJinaChanu at al. [4] describes a short survey on different types of steganography techniques for imagein spatial and transform domains and steganalysis techniques for the detection of secret message in the image in spatial domain by mentioning the strong points and weak points of the techniques. In k. singla et al. [5] proposed a hash based Steganography approach for protected steganography using edge detection. The method accomplishes high embedding capacity and enhances the quality of the encoded image. This technique first detects the edges in the image by well-known canny method and then the hash sort is used to embed the text data in to the edges of the color image. The hash function delivers a secure and fast method for image steganography. InS.Malik, A. Sardana [6] proposed unique methodology A Keyless Approach to Image Encryption without the use of encryption keys. The core idea behind this technique employs Sieving, Separation and Shuffling to produce random portions such that with minimal computation, the original secret image can be recovered from the random portions without any loss of image quality. Ali Daneshkhah et al. in his A More Secure Steganography Method in Spatial Domain [7] paper proposed a technique in which, the two bits of message is embedded in a pixel in a way that not only the Least Significant Bit (LSB) of picture element is allowed to change but also the second bit plane and fourth bit plane are allowed to be manipulated, but the point is in each embedding process only one alternation inone bit plane is allowed to happen. It is compared by the method LSB-Matching, the results shows this S. Sarreshtedari et al. [8] proposed a high capacity method for transform domain image steganography and algorithm works on the wavelet transform coefficients of the original image to embed the secret data byretaining integrity of the wavelet coefficients at high capacity embedding. 3. Algorithm 3.1 Cryptography Algorithm: 3.1.1 Password Matrix: STEP-1: Different password can be chosen for different PT but always it will be reserved 8 characters length. STEP 2: Transformevery single character of the password into its corresponding ASCII value. STEP 3: Convert each ASCII value into its 8 bit binary representation and place them in separate rows to generate a password matrix. 3.1.2 Generation of Auxiliary Keys : STEP 4: For that purpose the diagonal elements of password matrix is chosen as the first auxiliary key AK1, beginning from bottom left corner bit toterminate in top right corner bit. STEP 5: The second auxiliary password AK2 is generated by retaining the 0th bit of AK1 as the 0th bit of AK2 and doing XOR operation between the nth bit and (n+1)th bit of AK1 to obtain (n+1)th bit of AK2. And this process has further carry on for other AKs where from AK2 to AK3 and from AK(n) to AK(n+1) has been got. STEP-6: The number of Auxiliary keys generated depends on the number of letters in the plain text. 3.1.3 Formation of Cipher Text: STEP-7: Choose a plain text of variable length and calculate its length. STEP-8:  Change each character into its ASCII value and then into its equivalent 8 bit binary representation at the end arrange them as a matrix of nx8 where n is size of letters in plain text. STEP-9:  Perform bitwise XOR operation in between the binary values P1, P2, P3,†¦,Pn and the auxiliary keys AK1, AK2, AK3, †¦.,AKn respectively. STEP-10:  Complement the evenposition bits (column no. : 2,4,6,8) of every row of the last transformed value. STEP-11:  Divide the last generated 8 bits values into 4 parts each part having 2 bits, numbering them 1,2,3,4 and now arrange them as 4,2,1,3. STEP-12:  8 bits of each row of the matrix now has to be reversed. STEP-13: At last get our Cipher text 8 bit binary representation and convert it tocorresponding decimal value or the ASCII Value. This text will be transferred. 3.2 Steganography Algorithm: In this paper we have considered a gray scale image first; where we can encrypt the cipher text (encrypted data after cryptography process). At first we calculate the length of the cipher text and converted the text into its corresponding ASCII value. The size of the gray scale image is 256256. STEP-1: Taken the ASCII value cipher text as an input. STEP-2: Calculate the number of ASCII value of cipher text and stored it into a variable CT . STEP-3: Taken a gray scale image with dimension of 2n x 2n. STEP-4: Apply the partial BTB technique on this image with n x n size block matrix and each matrix Contain 2(n-m) x 2(n-m) (where, n = 2m) matrix size. STEP-5: Calculate the number of ASCII value of cipher text and stored it into a variable CT. STEP-6: Now convert the ASCII value of CT to its binary value of 8 digit and for getting ‘1’ from the corresponding binary value of CT the image pixel value has been increased two and also for getting ‘0’ this pixel value has been increase one. STEP-7: Now check the number of digit in CT. If it is less than or equal to n then only the 1st block 1st bit placed into 1st image block (1,1 position ),then 1st block 2nd bit placed into 2nd image block(1,1 position) thus the process will continue less than n (no. of character) or equal to n time. STEP-4: If the no. of character is greater than n then the 8 bit greater positions will be considered or Then the n+1 character 1st block 1st bit placed into 1st image block(8,8 position), 1st block 2ndbit place into 2nd image block (8,8 position) such as 2n+1 character 1st block 1st bit placed into1st image block (16,16 position),1st block 2nd bit placed into 2nd image block(16,16 position),then for 3n+1 characters to 4n (24,24 positions) will be considered and for 4n+1 to 5n (32,32) positions will be considered. STEP-5: This coded image will be transferred to the receiver side. 3.3 Steganalysis Algorithm: At receiver side the reverse technique of the previous method hasto be followed for decaying the image matrix and easily the text will be retrieve by the decryption algorithm. STEP-1: At first we have taken the Stego image that is got from sender side and then collect the original cover image. STEP-2: Compare both image and make a size of 256256 matrix contained the differentiate value of these two images where most of the values are zero excepting some are 2s and 1s. STEP-3: Neglect all those 0 values and arrange the others digits in a separate matrix whose size of column is 8. It is very imperative that the arrangement of the digits must not be hampered from the previous order. STEP-4:After getting the new matrix the number of the row signifies the number of characters present in the CT. STEP-5: Now replace the value of 2 with ‘1’ and 1 with ‘0’ and after that which matrix will be generated this is the 8 bit binary representation of our CT. STEP-6: Now convert the binary value with the corresponding decimal value and got the ASCII value representation of CT. 3.4 Cryptanalysis Algorithm: STEP-1: Generate the PASSWORD MATRIX that was described in the previous section 3.1. STEP-2: As well as create the AUXILARY KEYS from password matrix maintain the same rule followed as 3.1. STEP-3: Taken the ASCII value of Cipher text and convert them as 8 bit binary representation. Arrange the value of bits in nx8 matrix where n = size of CT. STEP-4: Reverse the each 8 bits values of every single row. STEP-5: Divide the last generated 8 bits values into 4 parts each part having 2 bits, numbering them 4,2,1,3 and now arrange them as 1,2,3,4. STEP-6:  Complement the odd bits (column no.:1,3,5,7) of every row of the last transformed value. STEP-7: Perform bitwise XOR operation in between the binary values of last transformed CT1, CT2, CT3,†¦,CTn and the auxiliary keys AK1, AK2, AK3, †¦.,AKn respectively And then got the original P1, P2, P3,†¦.Pn. 4. Example: 4.1 Cryptography Algorithm: Suppose our plain text is EARTH that has to be securely transferred to the receiver side. 4.1.1 Password Matrix: Suppose our 8 letter word password matrix is UNIVERSE= Table 4.1.1: 8 Bit Binary Representation As per mentioned in the algorithm for 5 letter plain text 5 auxiliary key will be formed at first. 4.1.2 Auxiliary Key Formation: After taking bottom left corner to top right corner diagonally elements we will get 01000011. That is AK1. Table: 4.1.2(Formation of auxiliary keys)Table: 4.1.3 (8 bits representation of plain text) Table: 4.1.4 (XOR operation between AKs with plain text)Table 4.1.5(Complement even bit position) Table: 4.1.6 (Rearrangement of columns)Table : 4.1.7(Reverse Each 8 bits of every Row) 4.2 Steganography Algorithm: Consider n = 8 and m = 3. The ASCII value representation of the Cipher text is 8 bit Binary value representation. We have reserved a 256 x 256 size of gray scale image for hiding the bit representation of cipher text, as the distortion of gray scale image is very much less than color image so it is considered. At first we will decompose this image at 8X8 matrix, where each cell of 8X8 matrix will consist 3232 size of matrix. N00 N01 N02 N03 N04 N05 N06 N07 N10 N11 N12 N13 N14 N15 N16 N17 N20 N21 N22 N23 N24 N25 N26 N27 N30 N31 N32 N33 N34 N35 N36 N37 N40 N41 N42 N43 N44 N45 N46 N47 N50 N51 N52 N53 N54 N55 N

Sunday, October 13, 2019

Free Essays - Allegorical Meaning of Hawthornes Young Goodman Brown :: Young Goodman Brown YGB

Allegorical Meaning of Young Goodman Brown In the short story "Young Goodman Brown" by Nathaniel Hawthorn, the author uses many of his characters to symbolize the deeper meaning of the narrative.   The allegorical meaning of Hawthorns tale is that of belief.   If one believes that he or she is inherently evil than whether or not they do evil is inconsequential since the belief will ultimately lead to misery.   Young Goodman Brown is going on a voyage or trip yet later in the story it becomes unclear as to whether this was reality, just a dream, or a figment of his imagination.   Hawthorn was a romanticist and this narrative provoked both strong feeling and emotions.   Although, I believe it is the reader who starts to have strong feelings about the main character and it is the emotions of Young Goodman Brown that ultimately bring him to his downfall.   It is his anxieties and paranoia that take over and control his emotions.   It is clearly emotions that triumphant Hawthorn's "Young Goodman Brown" The story opens with Young Goodman Brown bidding his wife farewell.   Goodman claims this is a journey that he must attend to.   Interestingly, his wife Faith is portrayed as pure and good.   She is a loving wife concerned about her husband and his mission.   It is her pink ribbons that represent her young innocence.   From the beginning Goodman refers to his journey as having an "evil purpose".   As Young Goodman Brown enters the woods and meets up with companion he explains that "Faith kept me back a while".   So was it literally that Faith his wife caused his delay or more figuratively that it was his faith in goodness that was really holding him back.   Hobbling along in the woods Young Goodman Brown sees his catechism teacher.   This is yet another obstacle that has underlying meaning.   She represents the teachings of Christianity and all that is good in the world.   Yet this did not stop our character from continuing on his evil voyage.   In the latter part of the story, where Young Goodman Brown is at the circle of the devil with all the other sinners he calls out for Faith.   He then states, "My Faith is gone!...There is no good on earth; and sin is but a name.

Saturday, October 12, 2019

Explain Why Cultural Diversity Is Important In A College Education :: essays research papers

Explain Why Cultural Diversity Is Important In A College Education   Ã‚  Ã‚  Ã‚  Ã‚  I come from a small town. Hannibal, MO, the boyhood home of Mark Twain, is described its claim to fame as â€Å"a sleepy town drowsing.† Most surely he has never been more accurate, for this small enchanted river town has never awakened total equality.   Ã‚  Ã‚  Ã‚  Ã‚  It is a town full of ignorance, where nobody has ever thought twice of sharing and spreading their sly comments and idiotic judgements to anyone and everyone who will listen, and most people do. It is a town where fathers, mothers, brothers, sisters, and grandparents teach their kids to â€Å"ignore those no-good niggers,† stay away from those â€Å"half-breeds† and give hell to anyone â€Å" nigger-lover† who refuses to believe the truth. It sickens me.   Ã‚  Ã‚  Ã‚  Ã‚  Last year, we had an issue to address at our school. It later became known as The Cowboys vs. The Blacks, and never has our school been more involved. The newspapers screamed of the hate, violence, and threat of gangs that were corrupting our schools; the halls rang with the lastest gossip on the next big showdown. This problem slapped a school full of apathetic kids into a lively bunch ready to get involved. Involved in what? A controversy that all had opinions on, but how could you not have an opinion? It was the talk at all of the dinner tables, bars, and stores in town. Kids went home scared of the racial tension. Parents whined and cried of violence in the school.   Ã‚  Ã‚  Ã‚  Ã‚  The parents whined and cried, and at the same time forgot to remember that it was they, not the kids, who had taught the very prejudices that were â€Å" disrupting the education process.† My opinion is simple and elementary: Children are not born to hate others, they must be taught to judge colors. If we are taught prejudices, then obviously, the racial tensions at my school didn't disrupt education, rather enforced lessons often reviewed over fried chicken and potatoes.   Ã‚  Ã‚  Ã‚  Ã‚  I cried once in my sophomore history class. The girl in front of me sang and preached that life was just that way, no one could ever change anything, so why should we even try? Prejudice is taught in the home, and the home is where we learn everything we really need to know. I listened, fumed, and stood up to interrupt her. (I rarely frown, let alone yell, but I had had enough of her pessimism. All eyes and ears were on me, and as my dramatic nature began to influence me, I started to preach.)   Ã‚  Ã‚  Ã‚  Ã‚  I have a theory.

Friday, October 11, 2019

Bring Mobile Phones to School Essay

It has been debated nationwide and even worldwide for and against students being allowed to bring mobile phones to school. Usually, a school consists of three parts namely, the Primary, Middle and Upper section. We live in the 21st century which is very much a digital age and nowadays, almost every student other than in primary section, has a mobile phone. In my opinion, mobile phones are good for children as long as they are educated in its appropriate usage and the privilege given without being abused. Here are some reasons and benefits as to why students should bring phones to school. In the past, children had less activities in and after school and parents often never knew where their children were until they came home. In today’s world, children are so involved in after school activities such as clubs and societies, sports, music and tuition as directed by parents. Parents need to coordinate with the children, coaches, teachers in charge and other parties within their bus y day to day schedules. Mobile phones allow parents to communicate with children at any time. Parents can check up on children and arrange transportation or relay important information if necessary. This supports organizing the daily schedule as we go along the day’s activities and increases the safety aspect. Mobile phones can also be an invaluable tool in emergency situations. For instance, if a student is severely injured or there is a crisis situation, cell phones can allow students to contact authorities for help. This can be especially important for students who do not travel to and from school with a parent, but in public transportation or school vans. It also helps children to have communication and build up networks amongst groups of common interests. Facilities like SMS allow to reach and communicate with large groups instantly with a record for future references, which also will save time and money. This option is also an advantage for teachers to reach their students at large in an effective manner for common messages. Further, with the added options such as Dictionary, Thesaurus, Reminders, e-mails and camera, the mobile phone expands the knowledge base and the capacity of a child and his scope. These features are commonly available in all mobile phones. Moreover, the student who carries a mobile phone has to protect it, be disciplined in it’s usage and also has to be knowledgeable in using it to his or her benefit. This improves the capacity of responsibility, self-discipline and knowledge sharing of the child which are very important attributes in a person’s life.  In conclusion, I think students should be allowed to bring mobile phones to school under the parents’ guidance and the schools should be clear in communicating its rules and regulations in terms of usage of the phones within school hours.

Thursday, October 10, 2019

New York Times Paywall Strategic Considerations Essay

According to Chairman Sulzberger the goal of the paywall was to â€Å"build the Times’s digital subscription base and develop a new robust consumer revenue stream, while maintaining its significant digital advertising business.† Secondary to the constraint of maintaining the ad business was the requirement to maintain social buzz and branding. To begin, the NYT wanted to increase future revenues for the paper and offset the inevitable decline of its print revenue. This, in the short run, was a success. As described in Question #2; this added over $81 million in previously unexploited revenue in just the first year, indicating significant potential for future growth in digital subscription revenue. To maintain the ad business, the paywall could not significantly decrease the digital advertising revenue. For NYT Media Group, and by extension NYT, digital advertising increased by 5.3% in 2011, suggesting that the implementation of the paywall did not reduce digital adverti sing revenue in the short run. However, the NYT quarterly reports (shown in Appendix C) showed the paper’s digital ad revenue decreasing through much of 2012 and early 2013. Additionally, the paywall should not lead to a loss in readers or impressions. According to Exhibit 13 in the case, (and explained further in Question #2), the page visit drop equates to a 21 page per visitor ratio before the paywall to an 18.5 page per visitor ratio after the paywall, roughly a 11% drop in impressions. If the NYT has a pay-per-impression contract with its advertisers, this can mean up to a 11% drop in ad revenue in the long run, calling into question the overall success of the paywall. Finally, the NYT wanted to maintain the social buzz and branding for the paper. They did this by allowing unlimited access to articles if visitors came to the website via search engines or social media. This allowed people to read and be aware trending articles coming from the paper and keep their brand visible.. Overall, the paywall was working at the time of the case. It successfully registered significant numbers of readers willing to pay for the service. The paywall policy added a consistent revenue stream while maintaining leisure readers and promoting its online social presence. Whether the paywall will work in the long run will be determined by the revenue from subscriptions outpacing the loss of advertising revenue. 2. Is the New York Times paywall well-designed? Is it  priced right? Financially, paywall design is a basic supply vs. demand problem where the NYT optimizes revenues from online subscriptions against the advertising dollars lost. In the months before the paywall was instituted, the NYT site had approximately 715 million page views per month (adjusted to 30 day month). As soon as the paywall took effect, page views dropped to approximately 635 million as readers moved to other sites (Appendix A). This equates to an 11% drop in ad impressions within an industry seeing growing viewership. Therefore, we assume that online ad revenues decreased by approximately 11% after the paywall went into effect (decrease in online ad revenues of $23.68M off a base of $211.68M in 2011). Conversely, the 390,000 online subscriptions brought in $81M (at $4 per subscription), more than enough to make up for the loss in ad revenues. From this perspective, the paywall was a striking success. In addition, our team performed a conjoint analysis to help determine how customers value the various features and workarounds for the subscription paywall, and to evaluate whether the NYT could further optimize its pricing structure (Appendix B). In this analysis, we examined weekly subscription price ($8.75 vs. $3.75), paywall design (initial free article limit of 0 or 20), subscription leakiness (ability to access articles around paywall via social networks, etc.), and platform availability (subscription for all devices at once or tiered fee per device). This analysis confirmed our intuition that consumers are most sensitive to the price of the subscription. We also found that consumers are unlikely to value a subscription if they can get 20 free articles upfront. This is a much bigger determinant of whether and how much a customer will pay for a subscription than the possibility of getting free articles through their soci al network or other referral means. Based on this, the NYT would be able to charge an additional $2.37 if they were to stop offering 20 free articles per month and an additional $1.01 per subscription if they stopped allowing leaks to their paywall. However, making these changes would reduce page views and would have to be balanced against losses in ad revenues. Another way the NYT could raise revenues is to reduce the cost of an all device subscription. Based on the average subscription cost of $4.00, very few customers are opting for the all-platform subscription. However, our  analysis shows that customers are willing to pay $5.46 ($3.75 base subscription plus $1.71 in additional value) for a subscription open to all platforms. Making this change could add $29.6M in revenue if all customers took this deal while increasing subscriber page views due to increased access. 3. What is the long-term goal of the New York Times in creating the paywall? To understand the future of the NYT paywall, we looked at the newspaper’s recent trends in advertising and circulation revenues. In 2011, NYT Media Group derived 45% of its revenues from circulation and 49% from advertising (Exhibit 2). The NYT has seen a steady decline in print and digital advertising and recently reported that the paper â€Å"generated $900 million in ad revenue [in 2012], compared with $2 billion in 2002.† [1] Its print subscriber base is not faring much better. The Sunday Times saw a 10% drop in print subscribers by 0.15M from 2007 to 2011. The weekday NYT print circulation dropped 17.43% and the Saturday Times declined by 10% over the same period. Despite this, print subscribers still account for about 84% of the paper’s circulation revenue. [2] Digital subscriptions have seen strong growth since 2011. According to the Q2 2013 NYT earnings report, â€Å"Paid subscribers to The Times†¦ digital-only subscription packages, e-readers and r eplica editions totaled about 699,000.†[3] This represents a 35% year-over-year increase since 2012 and a 79% increase since Dec 2011. Based on these trends, we can conclude that digital circulation will play an important role in the future of the NYT. The long-term goal of the NYT paywall is to build a permanent digital subscription base. To make digital circulation effective, the NYT needs the paywall. Why would subscribers pay for digital access if they can get it for free? It is interesting to note that in March 2012, the NYT reduced the free access threshold from 20 articles to 10 – and in the following year, it expanded its digital customer base by 35%. Digital circulation cannot single-handedly support The Times going forward. The paper must rely on a mix of revenue streams and the print edition (and the decreased ad revenue it brings in) will continue to be a major source of income. The price of the print edition has skyrocketed in recent years from $0.75 in 2001 to $2.50 in 2013. We wonder if a more secure  paywall might also allow similar future price increases in the digital realm. 4. Will newspapers transition to all digital? How should the New York Times manage a transition to the new world of content provision? Despite the mainstream use of iPads and other electronics for consuming news, the printed newspaper is still in demand. In 2011, NYT newspaper sales made up 45% of the annual revenue. This is attributed to a strong segment of readers who still prefer the hardcopy of the paper. The overall trend still suggests that news is rapidly moving towards the digital form, perhaps eventually transitioning to an all-digital platform. The transition to fully digital will likely not happen within the next five years based on the print subscription trends from 2007 to 2011, but the NYT must be prepared to manage its revenue sources as circulation diminishes. The NYT has three main revenue streams – advertising (both digital and print), subscriptions, and other ventures. Together, advertising and subscriptions made up 94% of the revenue in 2011. In this largely digital age, only 28% of the advertising revenue stems from digital ads. To evaluate the NYT strategy to transition to digital news, we must determine the newspaper’s profitability today and in the future. Our analysis focuses on the NYT Media Group, rather than the whole company which includes other newspapers and ventures. In 2011, the Media Group comprised of 67% of the company’s revenues so we assume the operating costs are proportional. We also assume that operating costs include production costs and SG&A, and ignore depreciation and amortization for this analysis (Appendix F). Based on our scenario planning, which varied the percentage of print and digital subscriptions and ads, we conclude that the NYT is profitable today and will continue to be profitable despite the shift towards the digital platform. While overall revenues from ads and circulation decrease (as the rate of digital subscriptions cannot make up for the loss in print), the operating cost of running production decreases. If the news become completely digital in the future, the NYT must focus on driving online subscriptions and ads. 5. Would a paywall work for all newspapers? For other content providers? If not, what other strategies would work? The paywall may not work for all newspapers. In some cases like the NYT, the paywall model worked, but the same strategies may not apply to other newspapers. The successful was largely due to the NYT strategic positioning and ability to attract a large number of unique visitors (~33 million) and page views ( ~600-700 million) as compared to those of USATODAY.COM, WASHINGTONPOST.COM, WSJ.COM, etc. (~5-15 million, ~80-150 million respectively). Other key reasons for its success included the steady increase in the online newspaper traffic, past experience in digital subscriptions, low marginal cost in adding customers for its digital subscription, and external reasons such as launch of IPad in 2008 which improved the user experience for reading digital content. Other newspaper such as The Washington Post, Scientific American, and the Economist have succeeded with the paywall because of their specialized content. According to US newspaper industry report in 2009, 5000 players in this ind ustry operated for total annual revenues of $35 billion but the top 50 firms accounted for more than 75% of the revenue. For the remaining firms, implementing a paywall could be significantly destructive to their business as customers would go elsewhere. Therefore, a newspaper firm has to be strategic if it wants to introduce paywall in its revenue stream. Not every content provider can have successful paywall. Some strategies that have been defined earlier can work in their favor. Other strategies include the BostonGlobe vs. Boston.com strategy. One has high quality content with great user expereince (paid service of 99 cents for 4 weeks) and the other has free low quality content. Another model is the Metro; free widely distributed newspaper at metro stations. Hulu.com provides free content for a limited time and moves other content to Hulu Plus. Netflix.com allows access to TV shows and movies anytime with flat rate subscription cost. Appendix A – Chart describing data presented in Question 2 Appendix B – Output from Regression Analysis in Excel Appendix C – Selected NYT Financial Information from 2012-2013 The below excerpts came from the NYT Media Group’s investor reports found here: http://investors.nytco.com/investors/financials/quarterly-earnings/default.aspx Q213: Print and digital advertising revenues decreased 6.8 percent and 2.7 percent. Q113: Print and digital advertising revenues decreased 13.3 percent and 4.0 percent. Q412: Print advertising revenues decreased 5.6 percent and digital ad revenues rose 5.1 percent. Q312: Print and digital advertising revenues decreased 10.9 percent and 2.2 percent. Q212: Print and advertising revenues decreased 8.0 percent and by 4.0 percent. Q112: Print and digital advertising revenues decreased 7.2 percent and 10.3 percent. Q411: Print and digital advertising revenues fell by 8 percent and 5 percent. Appendix D – References for Question 3 [1] http://www.nytimes.com/2013/10/14/business/media/a-leaner-times-aims-for-global-growth.html?_r=0 [2] http://www.nytimes.com/2013/10/14/business/media/a-leaner-times-aims-for-global-growth.html?_r=0 [3]http://investors.nytco.com/investors/investor-news/investor-news-details/2013/The-New-York-Times-Company-Reports-2013-Second-Quarter-Results/default.aspx Appendix E – Forecast Figures on NYT Profitability based on % Figure 1: Forecast of the NYT Total Revenue, Total Operating Costs, and Operating Profit as digital circulation and advertising increase while paper circulation and advertising decrease. Assumptions are listed in Appendix F. Figure 2: Detailed breakdown of advertising revenue from digital and print as the NYT transitions towards all digital. The year 2030 was chosen to determine the NYT’s strategy to become an all digital news provider. Appendix F – Assumptions made to evaluate NYT profitability for the future 1. Depreciation and amortization were not included in calculating profitability. 2. Advertising revenues continue to decline at the same rate as 2008 – 2011. 3. Print subscriptions continue to decline at the same rate as 2008 – 2011, calculated by summing the Sunday and weekday subscriptions while subtracting out the Saturday subscriptions to make up the overlap. 4. The average cost of the paper subscriptions is $10.50 (unweighted by popularity of subscription type) and the average cost of the paywall is $5.80 (not discounted by sign up offers and one-time discounts). 5. The percentage of revenue from digital ads grows by 5% from 2012 to 2016 as the NYT shifts toward a digital platform. The assumed 5% growth is conservative based upon online readership and unique visitors on the site. 6. The cost of production is directly related to the number of paper subscriptions. The production can be scaled down when demand is reduced. 7. The revenue from circulation declines at 0.7% from 2012 to 2016 because the loss of print subscribers outweighs the increase of digital subscribers.