Thursday, November 28, 2019

Drin and Limpio Case

Introduction Drin is an Italian mobile phone company and it was motivated to venture into commercial business in Peru in a bid to create dynamic thinking on how an enterprise should be organized to gain a huge customer base. Drin targeted the presumably missing strategy in the telecommunication industry in Peru like targeting the young and low earning population, which was not served by the Telefonica Movil BellSouth.Advertising We will write a custom essay sample on Drin and Limpio Case specifically for you for only $16.05 $11/page Learn More This article seeks to answer several questions based on Drin’s organizational culture and its strategies on commercial operations. How the two cultures compare based on Hofstede’s scale Different factors influence organizational cultures. Organizational culture can be defined as shared beliefs, standards, and values based on organizational objectives (Vance 21). The culture depicted by Drin is highly flexible as it offers an alternative way of doing business by giving workers at subordinate level the freedom to initiate new ideas, exercise judgment, innovate, and express creativity. Drin did not necessarily focus on meeting targets. On the contrary, it aimed at gaining effectiveness. However, the management assumed a bottom up strategy where employees experienced little pressure with no predetermined goals or mechanized procedures. On the other hand, Peru had a different corporate culture, which was highly mechanized, predetermined goals, and deadlines had to be met. The hierarchical system involved powerful leaders who evaluate employees as individuals as opposed to gauging teamwork. Such management aspects make employees less creative and insecure to take responsibilities. Drin’s corporate culture Drin provides a desirable culture, which is flexible, and thus it gives chance to unforeseen alterations towards an effective enterprise. For Drin to realize growth, it emphas ized teamwork, viz. the Drin team. Katz posits, â€Å"Having shared beliefs about realistic goals, relationships, and behaviors serves as a precursor for cooperation towards efficiency† (92). Embracing workers’ freedom as embedded in the company logo gives employees the enthusiasm and motivation to work beyond the usual benefits of salary and hunger for effectiveness. Drin embraced young and astute workers who reflected the goal of the company to attract young clients who were somehow sidelined by the existing telecommunication company.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More However, Drin’s freedom crossed the official limits. Allowing workers to wear casual clothes affected the company’s outlook. Having defined uniform shapes identity coupled with increasing cohesion among workers and customers. Strengths of Drin’s corporate culture Drin’s philosophy to adopt a culture that embraced shared beliefs by young employees geared towards innovation with the support of top management ensured flexibility towards effective production. The Drin training programs offered employees a lifeline opportunity to build their career. This aspect ensured that their skills did not become obsolete and the company was in a position to produce tailor-made talents that could fit appropriately to the set objectives. Being part of the team provides the platform to learn from others and enjoy success together rather than individual, which might result in internal competitions and risk inefficiency (Katz 95). The Drin management provided administrative alternatives, which were different from the convectional predetermined plans, roles, and goals set by management and expected to be executed by employees without deviation. When the management serves as a guide and support to the entire system, workers feel respected and they are encouraged to give their best through cooperation and consultation (Palthe 43). Environmental and organization assumptions Drin wanted to create competition in Peru and break the monopolistic power by the Telefonica Movil BellSouth. In addition, there was a need to link the opportunity gap existing in the market. The young and low-earning population needed an affordable product such as the pre-paid card system, which Drin introduced. Drin believed that the corporate culture in Peru was becoming obsolete and there was a need to change the way business was conducted by creating flexibility in the workplace. This move improved the workers’ motivation, creativity towards satisfaction of company’s goals, and the clients’ satisfaction. Drin held organizational assumptions that the existing telecommunication company had a culture, which was limiting innovation and workers were subjected to mechanized procedures. Based on this assumption, Drin was ready to risk new evaluations and meet t he real needs for all individuals in society.Advertising We will write a custom essay sample on Drin and Limpio Case specifically for you for only $16.05 $11/page Learn More Towards Drin’s withdrawal, employees had started to feel the absence of order. The notion of freedom was becoming exaggerated and change in structure was inevitable. A highly organized and well-coordinated model was necessary to improve the culture, which was been compromised by excess freedom, thus risking unnecessary additions and inefficiency. The subsidiary can be salvaged, but few changes need to be incorporated in the initial structure of Drin. Drin’s initial corporate culture provided a wide array of opportunities for effective growth of the company. However, some unforeseen segments were overlooked. First, replacing the casual wear with branded uniforms creates a unique addition and a sense of identity to the company. Second, the role of management to supervise and coordinate the staff should be tightened to avoid time wastage and ensure proper usage of resources whilst upholding close relationships. Third, dropping the employee of the month award would be critical in a bid to avoid unnecessary competition among workers. Instead, awards should be done in terms of promotions based on performance and credentials. Finally, policymaking should remain flexible by giving employees a chance to make changes, but with prior consultations from the team leaders. This move will ensure that informed decisions are made, while at the same time encouraging creativity. Works Cited Katz, Robert. Skills of an Effective Administrator, Boston: Harvard Business Press, 2009. Print.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Palthe, Jennifer. â€Å"The Relative Importance of Antecedents to Cross-cultural Adjustment: Implications for Managing a Global Workforce.† International Journal of Intercultural Relations 28.1 (2004): 37-59. Print. Vance, Charles. Managing a Global Workforce: Challenges and Opportunities in International Human Resource Management, New York: Routledge, 2015. Print. This essay on Drin and Limpio Case was written and submitted by user Kallie Riggs to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

Privacy Issues and Monetizing Twitter

Privacy Issues and Monetizing Twitter Problems Faced by Twitter Trio A twitter is a social internet site, which allows users to send short text messages with a limit of 140 characters. The short messages are called tweets, and a twitter user seeks to have many followers as possible. Twitter users have been faced by many security problems, which is a threat to the Twitter trio.Advertising We will write a custom essay sample on Privacy Issues and Monetizing Twitter specifically for you for only $16.05 $11/page Learn More Some of these problems are caused by links that are found on the twitter page. Some links directs users to unknown destinations. These links have commands for downloads which might destroy an individual’s or company’s data. More so, the links directs a user to malicious user’s sites. Some cookies are designed to be destructive because when it is saved on the hard disk it destroys useful information or data. According to Ivey (2011), tweets written by users can also be searched using Google. This is a risk because the users feel that their tweets are being followed by investigators and hence they fear expressing their views in detail. Hackers have been able to follow tweets from users, hence hacking passwords and interfering with private information, especially when it leads to a company’s sensitive information. Since anyone is able to follow and see what users are commenting, competitors have been able to follow up company’s secrets and at times even financial and investors information. Since twitter users accounts enables them to follow other peoples accounts, hackers also create accounts and follows many users, hence the users follow them too without knowing whether the accounts are for malicious use. These malicious people enter the twitter network and seek to damage it as long as they follow thousands of the social network users. As compared to other website accounts like Facebook, when you sign up an account, it is ver ified through the email address that a user has provided, but when you sign up a Twitter account, it does not verify the account through the email address that has been provided. This has enabled spammers to create some fraudulent networks and accounts on twitter. It is recommended that personal information should not be added on Twitter because people can monitor user’s activities; there are cases where people have been robbed because of twitting their movements and activities, which led to buglers easily monitoring them. Despite the fact that a tweet is real time, destructive leaks of information about a company or an individual can travel all over the world in just seconds. This can damage a reputation which has been earned for years.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Shelly, Napier, and Rivers (2009) argue that Twitter unlike Facebook has many limitations because it allows a user to upload only one small picture. This is a major challenge to the three partners. Twitters interface is not friendly because when a user signs up for the first time, it is not easy to know what to do next. As compared to other social networks, people struggle to have many followers and hence it creates some competition and it is sometimes not easy for a new user to get followers. It is advisable for a user to consider both advantages and disadvantages before signing up on twitter as a social network. Data Privacy on the Internet and Threat to Privacy Although the Internet has made communication easy with information and other activities meant for entertainment, security about the data storage use in the Internet has become a major concern because it is not easy to tell whether malicious people can access personal information. Other issues are whether the websites visited are safe and how hackers can access a website data. The security threats are a major is sue because many Internet users have been exposed to security threats. These threats may be instructions that are created by malicious persons and are designed to spread in the internet and cause damages to data on unprotected websites. Hackers access the systems through codes generated by programming operating systems (Laudon Laudon, 2010). Employers are now searching for information about the applicants on Twitter and other social networks without the applicant’s knowledge. Some are disqualified because of posting nude pictures and abusive messages on the social networks. There are cases where an employer rejected some applicant’s letters because they had posted discriminatory messages about racism. Data on social sites like Twitter and Facebook are difficult to delete, unless there is substantial privileges. There is a time when the President of the United States Barrack Obama warned high school students about what they post on Facebook. The president believes that it is possible to access even deleted data on people’s accounts after many years. Many websites like PleaseRobMe has been developed to discourage those who access people’s private data, the hackers might fear that they are being tracked. Data can be altered by malicious persons when being sent from one site to another. Viruses can also be a risk to private data because they can infect a computer. These viruses are passed on by storage devices such as flash disks which affect the networked computers. They are mostly programs which are created by people for destruction purposes.Advertising We will write a custom essay sample on Privacy Issues and Monetizing Twitter specifically for you for only $16.05 $11/page Learn More Some have ability to replicate many times and clash the network system. These viruses include Trojan horse and spyware. Worms affects the performance of the computer and the system risks losing data. Some of these are meant to track a company’s data (Laudon Laudon, 2010). Data loss or privacy violation is either caused by human or machine error. The Internet has made communication easy in organizations whose branches are separated by geographical factors. With all the company’s information flowing from one computer to another through the Internet, secure transfer of data is an issue that has not been fully addressed. Companies have failed to protect or monitor their data workflows and it has become susceptible to damage or illegal access. Internet users are also exposed to commercial advertisers when they give their personal information upon filling forms provided by some sites in the internet. The Internet technology has enabled advertisers to analyze and take peoples personal information. Users are usually not aware that their personal information is being accessed as well as unauthorized tracking of internet activities (Stair Reynolds, 2008). Website managers or operators are capable of storing information about people who have visited the website. There are instances where users are supposed to input their personal information to access the websites. The information is then stored in a database which keeps on recording those who have visited the website. When the user’s information is profiled without the user’s knowledge, it raises privacy concerns. It is even worse if a company decides to profile employee’s health records on their website. When organizations fail to hide their unused data in a correct way, employees and other hackers may access its private information or it might be used in lawsuits. Moreover, shopping at the internet has raised a security concern since users fear that their personal information might be used in corrupt ways. Twitters Legal Requirements Twitter has failed in some of its legal requirements that govern its operations because some of organizations sensitive data such as investors and monetary data have been gi ven away through tweets (Ivey, 2011). Organizations important information is being leaked through these online tweets. Information such as patients details, which doctors keep on their computers or phones can be stolen and displayed on other social networks like Facebook or Google. Since these mobile phones or computers may not be encrypted, unauthorized persons can easily access data. Likewise, since Twitter is used around the globe, it has faced security privacy issues since each country has its own laws and the extent to which personal data is protected.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More According to Twitter, children under the age of 13 are not allowed to have a Twitter account. However, Twitter has not been able to follow who uses its services, and hence children, even as young as 9 years, are on the social network, which exposes them to dreadful comments from Twitter users. Additionally, Twitter has not been able to manage on who uses their network and it has violated laws that govern the creation of interactive sessions of celebrities where those who join the interactive session can obtain the celebrities private information without consent from the owner. Data mining is a threat to users because Twitter stores personal information without authority from its users, although this has assisted the legal enforcers to get criminals by assessing behavior patterns in a given area. Shelly, Napier, Rivers (2009) suggest that this indicates that Twitter has not been able to secure personal information because they do not have systems that protect access to user’s data. Ford motor company is an example whose data was hacked. Its data contained customer’s information such as their account numbers, transactions details and address number. How Customers/Users React to Twitter’s Proposal to Mine Its Clients’ Data Ivey (2011) conforms that although data mining would increase Twitters revenue, customers would not want their data to be mined and especially those who would not like other users to access their private data. Some of the users would quit Twitter and create accounts in other social networks like Facebook, but it is not clear whether data is fully deleted when a user deactivates the account. Like in the case of Facebook, when a user deactivates his/her account, the data is still accessible. However, some may be positive about data mining because some of the user’s main aim on Twitter is to read other users opinions, facts, and comments. The users can access and read other people’s feelings about a given topic, but some of the information might mislead them. Some users will also be able to read information about companies of their interest, especially when doing research. Data mining will be to the advantage of companies or users who are doing business and are customer focused. It will enable them to know the goods mostly consumed by customers because they will be able to access transactional history. According to Stair and Reynolds (2008), data is accessible since it is stored in classes of related groups; for example, in hotels, customer transaction data is recorded to identify the time that customers visit more and what they order most. When data is stored in clusters, it shows similar market sections. It can also be stored in a sequence to guides in customer’s behavior patterns. For example, Midwest grocery was able to study their customers buying patterns. This company arrived to a conclusion that men came on Thursdays and some on Saturdays to buy diapers and they also bought beer. When the retailer found out those men bought diapers together with beer, they kept the bear close to the diapers on Thursdays and Saturdays. Data mining will also assist the users find financial organizations with loan and credit data. The financial institution can compare its customer’s qualities and assess the risks of loans granted (Laudon Laudon, 2010). Monetizing Twitter According to the Twitter trio, both Microsoft and Google have many plans to monetize Twitter. They are planning to license Twitter’s real time search, and the company is hoping to make more money. Google and Microsoft will list billions of tweets, which are posted in monthly basis. Twitter should also come up with profile upgrades. These profiles will attract members who will also pay a fee for the upgrade, and Twitter and its marketers will get monetary gains. Twitter should also increase the number of characters because its limit is 140 words and create more space for photos to att ract more users. This is because many sport fans and other Twitter users are relying on the company’s services (Miller, 2010). Twitter should create more room for biographic data or seek assistance from Google since many users prefer amore friendly social site like Facebook, which allows a user to see friend’s photos and to upload many photos and store them on albums. Ivey (2010) conforms that, just like Google and Yahoo, Twitter should seek to become a search engine. It will earn money when customers search for services and products. When, for example, a Twitter user posts a question about where to get a certain commodity, followers will reply while also informing others who might want to buy such commodities in future. Twitter should also include tweets for job search, whereby the users are capable of posting their resumes. When users pay a fee to access the vacancies available and post resumes, it would earn Twitter more money. Similarly, employers looking for peopl e to recruit should pay a fee to access the posted information from job seekers. It should also create and manage sites for outsourcing tasks where it creates jobs for online who may work in groups or as individuals. Furthermore, Twitter should take advantage of getting people’s comments on a certain company; for example, performance and what the customers like or dislike. This will assist the company to get customers’ feedback about certain products and decide on improvements. The companies will be able to improve and change their products and services according to the customers needs and hence the companies should pay a fee to twitter for the service. Likewise, Twitter should come up with an advertising strategy for companies. These companies may be charged on monthly basis or after 3 months. Individual users can also make money in Twitter by posting advertisements, especially when a user has many followers. A user can also search on advertisements and link them to f ollowers who are interested in buying. Promotion is another way to make money where a user can promote upcoming products for a company to the followers. Options That the Trio Have The partners have an option to store user’s personal information, which will improve their competitive advantage. They want to come up with a big archive of user’s data. This will only be successful if they make sure that they have mined data with consent from users. Google and Microsoft has given permission to Twitter to post its tweets at the Google search, this will be easy for users searching for certain information. Users will benefit from real time messages and latest news. Twitter attracts many users on the Google search. They have also come up with data mines that are likely to increase revenue on twitter because psychologists and other researchers will be able to get information, especially on behavior patterns of human beings. They will encourage people’s participation by not including their names, but only taking helpful information particularly for research purposes without including the names. Twitter has also increased its income by making an agreement with Google and Microsoft to make it easy to search a blog service on the Internet. The company has been able to discuss with telecommunications sector to lower the costs and this will benefit twitter because it will increase its profitability (Ivey, 2011). Twitter has another plan of archiving user’s information. Users have responded negatively, but the company has assured them safety of data. The users fear is that their tweets could be used against them. Twitter trio should come up with a plan to ensure that even if they archive the information, the government or any other party will not interfere with it because users might think that FBI is following them. Microsoft has started Microsoft helps, which is a twitter tool that supports users through information on Windows 7. This real time inf ormation will be checked by Microsoft while also supporting customers. Using Twitter, customers are capable of accessing help online and in real time. They will also be able to bring about issues or problems encountered when using Windows 7. However, there are privacy concerns for the trio because the crackers are out to destroy data, especially when mining. SalesForce is an example of a company that allowed businesses to access conversations on Twitter and take important information. If a customer has a question about computers, SalesForce informs computer companies about the client. The partners, being highly supported by Google, are coming up with ways that will enable users to protect their personal data. Some users on Twitter are exposed to cookies, which direct them to unknown sites. Twitter users can no longer trust the company because it is not able to protect the users’ data. Both Microsoft and Google are supporting Twitter in its real-time messaging. Users have conf essed that they get many insights from other users since it involves sharing with different users around the globe. Twitter may provide information not found on Google because it involves asking more people and the network in real-time. Google has not been successful in creating interactive sessions like twitter. In case of any latest news such as plane crush, Twitter displays them in real time while Google may take some hours. Both Google and Twitter are working together to improve on their business model. Twitter is a poor search engine; Google has decided to post its tweets since Google is poor on social matters, and hence it has considered having tweets so that users can see real time comments. Combining of the two features that mainly focuses on search micro-blogging and messaging services found in these social networks will increase their monetary value. In essence, Twitter is turning out to be a place where users do business and it is increasingly growing in ecommerce because as users follow each other on their accounts, it is easy to promote products and services. It has been greatly favored because of its real-time characteristic, and this is a blessing to the Twitter trio. References Biskup, J. (2009). Security in Computer Systems, Challenges, Approaches and Solutions. Heidelberg: Springer-Verlag. Ivey. (2011). Privacy Issues and Monetizing Twitter. London: Richard Ivey School of Business Foundation, 2011-04-15. 9B11E002. Laudon, K.C., Laudon, J.P. (2010). Management Information Systems: Managing the Digital Firm (11th ed.). New Jersey: Prentice Hall. Miller, C. C. (2010, June 18). Sports Fans Break Records on Twitter. The New York Times. Retrieved from https://bits.blogs.nytimes.com/2010/06/18/sports-fans-break-records-on-twitter/?mtrref=undefinedgwh=993DB9C58627C72733D0FB968A58745Dgwt=pay Shelly, G.B., Napier, H.A, Rivers, O. (2009). Discovering the Internet: Complete Concepts and Techniques (3rd ed.). Boston: Cengage Learning, Inc. Stair, R. Re ynolds, G. (2008). Fundamentals of Information Systems (5th ed.). Hamilton, CA: Thomson Course Technology.

Thursday, November 21, 2019

Private Nursing Home Case Study Example | Topics and Well Written Essays - 1000 words

Private Nursing Home - Case Study Example The nursing home derives most of the financial resources necessary for steady functioning from the funds received from the local authorities' budget (constitute around 90% of the resources structure), the rest is financed through the residents' payments. For the analysis P.E.S.T.E.L. framework has been deployed. The factors of the external environment are grouped into political, economic, social, technological, environmental (ecological) and legal. The major factors for each group are listed and the degree of influence of each particular group of factors assessed. As the issue of post-retirement personal care and medical treatment of the elderly citizens is of high importance for the developed society, unsurprisingly the political environment has been influencing the state and perspectives of both private nursing and residential care homes through the history of their development. These two types for a long time has been treated and regulated separately until in 2001 they were legally addressed with the same types of requirements and legal provision. The most obvious and important trend is the significant increase of the number and share of the private sector nursing homes and decline in the share of these type of services provided by the public sector and administrated by the NHS. Privatisation of the earlier dominated by the public sector services had also affected provision of medical and care services for the elderly residents. For the particular nursing care home this trend's consequences are two-folds. First, it means shift in attention of the regulatory bodies towards the specific conditions of the privately owned homes and development of more specified requirements and constraints for the funding, facilities, care and medical treatment level, stuff competency etc. It may also result in increased funding opportunities for the privately owned nursing homes. Second, the increased competitive pressure caused by increased number of privately owned service-providers, both with regard to the residents' demand and funding provision, can become a market threat for the nursing home. Economic factors The general state of economy, income level and distribution and lifestyle of the population, determined by savings and spending preferences through the life are the important determinant of the nursing home's environment. General state of the economy of the country influences not only directly the economic and financial state particular business, but also the conditions of the customer base and local authorities, thus causing indirect influence on the nursing home. One of the factors to be considered is the growing income of the population and increased amount of funds available for spending in the late period of life. The improved financial position of many older people means that some are making a positive choice over long-term care; housing circumstances throughout life can affect decisions about housing and care later in life. (Peace, 2003, p.9) Another economic issue that is of great importance for the privately-owned nursing home, taking into account its size and limited resources, is the

Wednesday, November 20, 2019

The Strategic Positioning of Lenovo Laptops Essay - 3

The Strategic Positioning of Lenovo Laptops - Essay Example This research will begin with the statement that Lenovo, a Beijing-based company –having the slogan "For those who do" – has inevitably shot to prominence when it accelerated into the global market with IBM's PC business in 2005. The idea that the ThinkPad, treasured of American business people, that would be made by the Chinese company resulted in uneasiness at first; the $1.75bn ( £1.04bn) purchase had attracted extreme regulatory attention. Lenovo Group Ltd, the Chinese multinational computer technology company has its headquarters in Beijing, China and Morrisville, North Carolina, United States has hit the market with very strong securing of market share that has to a greater extent resulted to wake up call upon other competitors in the industry. The stiff competition has been the basis of this research in ensuring how the organization strategically secure and maintain its market niche are relatively remain profitable and grows undisputedly. The critical step in f inding the definition of the strategy of a business is the determination of its strategic positioning – the aspects of how it competes and in serving customers in the markets.  At the core of strategic positioning is the customer attraction, the customers bonding, retention and satisfaction of the customers. The Delta Model helps in providing a roadmap for identifying and analysis of the optimal strategic positioning, from the perspective of achieving customer bonding, and thus provides the three strategic positions for reaching the company’s target objectives.  

Monday, November 18, 2019

Creative Thinking and Problem Solving Essay Example | Topics and Well Written Essays - 250 words

Creative Thinking and Problem Solving - Essay Example tradictions or contraries, when in fact they are not, is the common fallacy of false dilemma--so called because the "dilemma," or hard choice between two options, is "false," because other options than the two offered are possible. This fallacy is also known as the "either-or fallacy" because it makes you think that your options are limited to either one or the other† (San Jose State University, n.d.). The proposed solution for one dilemma, particularly the one offering teachers only two choices: either to support the English only law or to leave their jobs are as follows: (1) to strictly adhere to the English only law, as indicated; (2) do not follow this law and suffer the consequences of losing their jobs; (3) if teachers lose their jobs due to non-conformity to the law, they could always seek possible remunerations as provided through the legal procedures citing violations of the Equal Employment Opportunities Law and civil rights violations. In this regard, they would real ize that this is a false dilemma and that there are other options besides the two that were

Friday, November 15, 2019

Stimulus measures policy forms

Stimulus measures policy forms Part 1. Some reject stimulus measures in all current policy forms. These economists focus on the damaging activities and decisions of (a) private corporations, (b) commercial banks, and (c) wealthy individuals. How can these three groups that lead our private market system, each in their own way, frustrate and foil the goals of a fiscal stimulus program. The 2009 Stimulus packages that President Obama released were done so with the intentions of trying to fix the recession bound economy. But the question that surfaced was what the long term results of this stimulus package were. Is it more beneficial or more harmful to our already down falling economy? A fiscal stimulus package by the government consists of generally three options either the use of tax cuts, increased transfers or increased government spending. All three options have one problem in common; it will cause the government budget to increase. It can only serve as a temporary boost to the economy, because the government has to find a way to fund this package. When the government needs to spend money that they didnt revenue from taxes it is called a budget deficit, they would need to borrow and most likely from foreign reserve banks or through the selling of bonds. In Keyness economic vision â€Å"the goal of macro policy is not to balance the budget but to balance the economy at full employment.† This does logically make sense because a low availability of jobs would mean an increase of transfer payments including unemployment compensation and welfare benefits. But if new jobs can be created it will decrease the burden of transfer payments and increase tax revenue. An increase of jobs would equal more taxes to collect and less economic problems when unemployment rates are lower. But since the recession and fiscal policy both are signs that suggest, the economic state is not currently at its best for investments. Private corporations are less eager to invest being that from a business perspective their initial intent is to make profit. Without the confidences in future profit rates theres less of an obligation to want to take the risk. I believe that from any business stand point, private corporations are interested in how much profits they can make and maybe secondarily how many jobs a new project or investment can create. Commercial banks on the other hand could result in a â€Å"crowding out effect because the increase in government borrowing will cause a decrease in private sector borrowing†. Crowding out means that theres less progression which is also an â€Å"opportunity cost for government spending†. When the government is shut out of all other options, borrowing money to finance the budget deficits can cause an increase in interest rates. Theres only a certain about of money available for borrowing and if the government borrows, less money is available for business investments. Wealthy individuals would tend to save more and spend less. They may also invest in foreign counties that stand at a better economy. Therefore private corporations, commercial banks, and wealthy individuals are three power groups that hold the foundation of our private market system. They have the general ability to effect consumption rates because of investments. Its a circular flow effect, less jobs cause less overall GDP consumption and less taxes, less confidence in economy, which causes less investment. After all Keynes did say that â€Å"the goal of macro policy is not to balance the budget but to balance the economy at full employment. The main problem here is that there are not enough jobs to boast the economy in the long run. The American dream is to do better than the past generation. Its hard to reach that when jobs arent available and a recession at hand. Part 2. Given our currently high unemployment rate and low inflation rate, argue for or against a Supply-Side policy focus versus a Demand-Side policy emphasis. Aggregate demand or aggregate supply whats a better a choice when you have high unemployment and low inflation rates? I believe that the demand curve is only going to be a temporary answer to the economic problem. â€Å"The demand curve will shift in response to changes in income, changes in expectations (consumer confidence), changes in wealth, changes in credit conditions or changes in tax policy.† The whole purpose of aggregate demand is to stimulate consumer spending. If unemployment is high its unlikely that this will solve the problem. How do you tell someone who is unemployed to buy more? In contrary I think the aggregate supply is a better policy choice to get the economy back and running. â€Å"The policy options to shift AS rightward include: Tax incentives for saving, investment and work, human capital investment, deregulation, trade liberalization and infrastructure development.† This works better because the tax cuts will increase consumption being that it would result in a higher level of disposable income. This means that people would be more motivated to work. Lets just say Person A makes $40,000 a year and taxes used to 10% and now they are down to 5%, this means that instead of paying $4000 in taxes it would just be $2000. Person A is able to work the same amount and have $2000 extra for disposable income. This guarantees that (C+G+I+(x-m) = GPD) GDP will go up if consumption goes up. Human capital investment is a long term effect; people find it worth their benefit to invest in school and training. Our goal is to find a way to both lower unemployment and lower the inflation rates. To do this we have to focus on the supply side or the production part of the market. By producing more (new technology) it would set the platform so that better prices levels are available. The technology is going to be useful for production for a while and the investments in education will increase the standards of living. This means that cheaper goods equal more consumption. Its a long term answer to the economy because the overall GDP will grow. The economy will grow and the production of output rises while unemployment and inflation falls. If all these aspects are intact theres no way that the next generation couldnt do better. I believe that a lot of the economic problems we face today are because of the actions that the government made without thinking of the long term effects. If we want our country to become stronger and stronger we have to think in long term strategies and I believe that the Aggregate Supply Policy is the right one. Part 3. Upon completing ECO 100, you have been hired by the Obama administration to advise them on Foreign Exchange Policy. Their concern is that low interest rates and a large trade deficit have led to a depreciating dollar. Accordingly, first prepare an overview of the way such rates and trade conditions can threaten our currency value. Then secondly, advise the President whether (or not) steps should be taken to strengthen the dollar in foreign exchange markets. What makes euros worth more than dollars and Chinese Yuan to be below both? The answer is that the currency market determines what the exchange rates are worth. The Foreign exchange market is just like the all markets where theres a demand theres a supply. But if there is a more demand than supply then the exchange rate would go up. Meaning if there was a higher demand for U.S dollars; dollar value would increase also known as appreciation. But in this example if there was an excess amount of U.S currency that is above the demand needed then our dollar value fall also known as deprecation. But the rule is that where theres a lost there is always a gain. Meaning if one countrys currency value goes up some other countrys money value has to go down. If the value of the U.S dollars improves in the Foreign Exchange Market then it would increase the overall supply of dollars. If our country has a trade deficit, meaning we import more and export less, we should find a method that attracts more exports. I think that the best approach to take would be to weaken the dollar. But in order for that to happen there had to be a way to alter the supply of U.S currency. In one perspective its a good thing if our dollars are more valuable we would be able to buy more foreign goods with the same dollar. But if theres too much of a supply of dollars the dollar may lose value. â€Å"As dollars become cheaper, American exports effectively fall in price and demand rises.† In order to reduce the amount of our trade deficit we could export more goods. If our dollar rates were low enough to attract foreigners to buy our good and cooperation would still make their profits then it would all work out. A weaken dollar would work until we could clo se the gap of our trade deficit and after that we would create a strategy that will strengthen the dollar by lowering the supply of it.

Wednesday, November 13, 2019

Adam Smith :: Philosophers Philosophy Economists Essays

Adam Smith The British philosopher and economist Adam Smith was born in kirkcaldy, Scotland. He was educated at the universities of Glasgow and Oxford. In 1751 he became a professor at Glasgow. There he wrote The Theory of Moral Sentiment in 1759. This philosophical work gained Smith an appointment in 1764 as tutor of the young duke of Buccleuch. The tutoring took Smith to France, where he started writing The Wealth of Nations in 1776. It was the first complete work on political economy. The book discusses the relationship between freedom and order, analyzes economic processes, and attacks the British mercantile system's limits on free trade. All three aspects are woven together to create a unified social theory. In France Smith met and associated with many of the leading Continental philosophers of the physiocratic school, which based its political and economic doctrines on the supremacy of natural law, wealth, and order. He was specially influenced by the French philosophers Francois Quesnay and Anne Robert Jacques Turgot, whose theories Smith later adapted in part to form a basis for his own. The book dealt with the basic problem of how social order and human progress can be possible in a society where individuals follow their own self-interests. Smith argued that this individualism led to order and progress. In order to make money, people produce things that other people are willing to buy. Buyers spend money for those things that they need or want most. When buyers and sellers meet in the market, a pattern of production develops that results in social harmony. Smith said that all this would happen without any conscious control or direction, as if by an invisible hand.'; Smith also believed that labor, not land or money, was both the source and the final measure of value. He said that wages depended on the basic needs of workers, and rent on the productivity of land, Profits, he said, were the difference between selling prices and the cost of labor and rent. Smith said profits would be used to expand production. This expansion would in turn create more jobs, and the national income would grow. Smith believed that free trade and a self-regulating economy would result in social progress. He criticized the British government's high tariffs and other limits on individual freedom in trade.

Sunday, November 10, 2019

Animal Farm and Lord of the Flies Essay

In 1887 Lord Acton wrote in a letter to Bishop Mandell Creighton, â€Å"Power tends to corrupt, and absolute power corrupts absolutely.† It has often been noted that this is the primary theme in both Animal Farm and Lord of the Flies. In addition, these books share two sub-themes related to this primary theme. One sub-theme is that people will often abuse power when it’s not earned. The other is that when given the opportunity people will often degrade others to ensure their own security. Both books rely heavily on symbolism, as well as the actions of their characters, to express these ideas. Consequently, both these novels show us what a frightening place the world can become if people ignore the principles of civilization as we know it. In both books, for different reasons, the characters create their own governments, and some of them soon begin to usurp and abuse power. For example, in Animal Farm seven commandments were written on the wall, a few of them were: â€Å"No animal shall sleep in a bed, No animal shall kill another animal, No animal shall drink alcohol.† When one of the pigs, named Napoleon, took over he gradually changed the commandments. For instance, he changed the commandment â€Å"No animal shall kill another animal.† to, â€Å"No animal shall kill another animal without cause.† In Lord of the Flies there are several examples of characters abusing power. One of the characters, named Ralph, had originally started a democratic form of government. Two of the boys, Roger and Jack, eventually started there own form of government and took over. Jack fell in love with his new found power and became dictator to the boys. He even started a hunt to kill Ralph simply because he felt Ralph was a threat to this power. Because several of the characters in both books were insecure, they would often degrade others to improve their own security. This occurred in Animal Farm several times. For instance, there were two characters who always seemed to disagree (Snowball and Napoleon). Whatever one said the other would put it down or find something wrong with it, even if he actually agreed. Napoleon even urinated on Snowball’s plans for a windmill and ruined  them. In Lord of the Flies there are several examples of insecure characters downing others to improve their own security. For example, Roger, Jack, and even Ralph make fun of one of the other boys they call â€Å"Piggy† because he is overweight. Roger is so insecure he even kills Piggy because Piggy makes him feel threatened by contradicting his ideas and putting forth his own ideas that were sometimes better than Rogers. These books are both amazingly written and similar in several ways, but there is one major difference. The two books end with completely different views of civilization. Animal Farm ends with the animals not being able to tell the humans and the pigs apart, showing that evil had won. However, in Lord of the Flies, Ralph realizes when he sees the pig’s head (which is used to represent evil) in its pristine state, that even in all this savagery and evil some good may occur. Right after he realized this, a ship pulled up and rescued the boys. The themes of both books are true to the dark side of human nature. Golding holds out a tiny thread of hope; Orwell lets us see the bad things that could happen and leaves us to figure out how to prevent them.

Friday, November 8, 2019

Battle of Savages Station in the Civil War

Battle of Savage's Station in the Civil War The Battle of Savages Station was fought June 29, 1862, during the American Civil War (1861-1865). The fourth of the Seven Days Battles outside Richmond, VA, Savages Station saw  General Robert E. Lees Army of Northern Virginia pursuing Major General George B. McClellans retreating Army of the Potomac. Striking the Union rear guard, centered on Major General Edwin V. Sumners II Corps, Confederate forces proved unable to dislodge the enemy. Fighting continued into the evening until a strong thunderstorm ended the engagement. Union troops continued their retreat that night. Background Having begun the Peninsula Campaign earlier in the spring, Major General George McClellans Army of the Potomac stalled before the gates of Richmond in late May 1862 after a stalemate at the Battle of Seven Pines. This was mostly due to the Union commanders overly-cautious approach and the inaccurate belief that General Robert E. Lees Army of Northern Virginia badly outnumbered him. While McClellan remained inactive for much of June, Lee tirelessly worked to improve Richmonds defenses and plan a counterattack. Though outnumbered himself, Lee understood his army could not hope to win an extended siege in the Richmond defenses. On June 25, McClellan finally moved and he ordered the divisions of Brigadier Generals Joseph Hooker and Philip Kearny to push up the Williamsburg Road. The resulting Battle of Oak Grove saw the Union attack halted by Major General Benjamin Hugers division. Lee Attacks This proved fortunate for Lee as he had moved the bulk of his army north of the Chickahominy River with the goal of crushing Brigadier General Fitz John Porters isolated V Corps. Striking on June 26, Lees forces were bloodily repulsed by Porters men at the Battle of Beaver Dam Creek (Mechanicsville). That night, McClellan, concerned about the presence of Major General Thomas Stonewall Jacksons command to the north, directed Porter to retreat and shifted the armys supply line from the Richmond and York River Railroad south to the James River. In doing so, McClellan effectively ended his own campaign as the abandonment of the railroad meant that heavy guns could not be carried to Richmond for the planned siege. Taking a strong position behind Boatswains Swamp, V Corps came under heavy attack on June 27. In the resulting Battle of Gaines Mill, Porters men turned back several enemy assaults through the day until being compelled to retreat near sunset. As Porters men shifted to the south bank of the Chickahominy, a badly shaken McClellan ended the campaign and began moving the army towards the safety of the James River. With McClellan providing little guidance to his men, the Army of the Potomac fought off Confederate forces at Garnetts and Goldings Farms on June 27-28. Remaining away from the fighting, McClellan made the situation worse by failing to name a second in command. This was largely due to his dislike and distrust of his senior corps commander, Major General Edwin V. Sumner. Lees Plan Despite McClellans personal feelings, Sumner effectively led the 26,600-man Union rear guard which had concentrated near Savages Station. This force comprised elements of his own II Corps, Brigadier General Samuel P. Heintzelmans III Corps, and a division of Brigadier General William B. Franklins VI Corps. Pursuing McClellan, Lee sought to engage and defeat the Union forces at Savages Station. To due so, Lee ordered Brigadier General John B. Magruder to push his division down the Williamsburg Road and York River Railroad while Jacksons division was to rebuild the bridges across the Chickahominy and attack south. These forces were to converge and overwhelm the Union defenders. Moving out early on June 29, Magruders men began encountering Union troops around 9:00 AM. Armies Commanders Union Major General George B. McClellanMajor General Edwin V. Sumner26,600 men Confederate General Robert E. LeeBrigadier General John B. Magruder14,000 The Fighting Begins Pressing forward, two regiments from Brigadier General George T. Andersons brigade engaged two Union regiments from Sumners command. Skirmishing through the morning, the Confederates were able to push the enemy back, but Magruder became increasingly concerned about the size of Sumners command. Seeking reinforcements from Lee, he received two brigades from Hugers division on the stipulation that if they were not engaged by 2:00 PM they would be withdrawn. As Magruder contemplated his next move, Jackson received a confusing message from Lee that suggested that his men were to remain north of the Chickahominy. Due to this, he did not cross the river to attack from the north. At Savages Station, Heintzelman decided that his corps was not necessary to the Union defense and began withdrawing without first informing Sumner. The Battle Renewed At 2:00 PM, having not advanced, Magruder returned Hugers men. Waiting another three hours, he finally resumed his advance with the brigades of Brigadier Generals Joseph B. Kershaw and Paul J. Semmes. These troops were aided on the right by part of a brigade led by Colonel William Barksdale. Supporting the attack was a 32-pounder Brooke naval rifle mounted on a rail car and protected by an iron casemate. Dubbed the Land Merrimack, this weapon was slowly pushed down the railroad. Despite being outnumbered, Magruder elected to attack with only part of his command. The Confederate movement was first noticed by Franklin and Brigadier General John Sedgwick who were scouting west of Savages Station. After initially thinking the approaching troops belonged to Heintzelman, they recognized their mistake and informed Sumner. It was at this time that an irate Sumner discovered that III Corps had departed. Advancing, Magruder encountered Brigadier General William W. Burns Philadelphia Brigade just south of the railroad. Mounting a tenacious defense, Burns men soon faced envelopment by the larger Confederate force. To stabilize the line, Sumner randomly began feeding regiments from other brigades into the battle. Coming up on Burns left, the 1st Minnesota Infantry joined the fight followed by two regiments from Brigadier General Israel Richardsons division. As the forces engaged were largely equal in size, a stalemate developed as darkness and foul weather approached. Operating on Burns left and south of the Williamsburg Road, Brigadier General William T.H. Brooks Vermont Brigade sought to protect the Union flank and charged forward. Attacking into a stand of woods, they met intense Confederate fire and were repulsed with heavy losses. The two sides remained engaged, with neither making any progress, until a storm ended the battle around 9:00 PM. Aftermath In the fighting at Savages Station, Sumner suffered 1,083 killed, wounded, and missing while Magruder sustained 473. The bulk of the Union losses were incurred during the Vermont Brigades ill-fated charge. With the end of the fighting, Union troops continued withdrawing across White Oak Swamp but were forced to abandon a field hospital and 2,500 wounded. In the wake of the battle, Lee reprimanded Magruder for not attacking more forcefully stating that the pursuit should be most vigorous. By noon the following day, Union troops had crossed the swamp. Later in the day, Lee resumed his offensive by attacking McClellans army at the Battles of Glendale (Fraysers Farm) and White Oak Swamp.

Wednesday, November 6, 2019

John Watsons Behaviorism essays

John Watson's Behaviorism essays John Watson was born in 1878 in Greenville, South Carolina, a town that was enriched with religion and spiritual practices. Many people believed John would grow up to be a minister or have a wonderful job with the church, but John Watson had other ideas. By the age of thirteen, he was swearing, drinking, and chasing women. At school, Watson began to be rather vicious and violent. He was obviously intelligent but he was lazy, somewhat insubordinate, and never made a decent grade (Cohen, pg 10). Watson also began fighting with kids at school as a response to his hatred of it. Suddenly, Watson took a radical turn and, at the age of fifteen, was accepted into Furman University. This is amazing coming from the man that would one day fight for the radical ideas that he would propose. Watson, after being a juvenile delinquent, would start a movement that many would not understand or accept. This paper will show how John Watson created a small ripple in the water that is now a perm anent fixture in the world of psychology. Watson called for a new and radical psychology that he termed Behaviorism. In his lectures on the new psychology of Behaviorism, he stated, Behaviorism claims that consciousness is neither a definable nor a usable concept; that it is merely another word for the soul or more ancient times (Watson, pg 1). One of Watsons biggest hurdles to get over was this change from a school of thought that was based on consciousness to one that believed it was not needed at all. By eliminating states of consciousness as proper objects of investigation, Watson sought to remove the barrier of subjectivity from psychology which exists between it and the other sciences (http://fates.cns.muskingum.edu/~psych/psycweb/history/watson.htm). David Cohen wrote a book called The Founder of Behaviorism which included this famous quote from one of Watson&ap...

Monday, November 4, 2019

Multimedia and design Assignment Example | Topics and Well Written Essays - 250 words

Multimedia and design - Assignment Example ny professional in any occupation where they build or construct something from scratch, there are right ways and wrong ways to utilize elements of design and they are not all based on what someone simply likes. When looking at the fashion, someone can design an outfit but is it functional? Badly designed outfits will never be worn and are not ever going to be purchased if they do not include good elements of design. The same with a car. If the design of a car is based on what the creator likes, then no one would buy it. Design in these fields has to do with marketability and bad design can crush profitability. Interior design is another field where elements can create different moods. If a person mixes and matches fabrics and textiles all due to their own likes, the space can be overwhelming to be in or even evoke a negative response. When it comes to design in technology, while taking a look at a website, if a design of a website is not functional, no users will come visit the site. If it is cluttered and is chaotic, it is not appealing to anyone. When looking at multimedia as a personal experience, it is all about using design of pictures, interactive features and other elements to create ways for people to get something out of their experience. When thinking of blogs, websites or social networking sites, it is a goal of multimedia techniques to intrigue others. It is a form of marketability and branding to enhance a persons visit. It is not necessarily for ones own use but for productivity and profitability increases in ways to increase others personal experience. It creates more of a personalized

Friday, November 1, 2019

Define hero. Why does our society insist upon elevating people to the Essay

Define hero. Why does our society insist upon elevating people to the rank of hero Is John Bradley a hero despite his insistence that he was not - Essay Example James Bradley writes the book after stumbling upon a letter written by his father John Bradley to his parents describing the event as one of the happiest moments of his life (Bradley & Powers 4). The letter caused John to embark on a research that resulted in the book. John Bradley as the corpsman got tasked with trying to save the lives of the marines who fought the bloody battles in the field. As one of the three surviving men, John struggled to return and live a normal life as possible by choosing to become a funeral director and raise his family. John Bradley’s participation in the flag raising and war is in every angle a mark of true heroism despite his insistence that he was not. John Bradley should be viewed and elevated to hero status as a result of his show of courage and sacrifice in representing his country in a risky and bloody battle that would have resulted in his death. Upon the death of his little sister Mary Ellen, Bradley enlisted into the navy as a funeral director with the hope of evading land battle. A quote from the book summarizes the sacrifice that was undertaken by these flag-raisers â€Å"behind them, in safe America, Bing Crosby sang of a white Christmas, just like the ones he used to know. Ahead lay a hot island of black sand, where many of them would ensure a long future of Christmases in America by laying down their lives† (Bradley & Powers 122). This proves the sacrifice that Bradley along with other participants of the war undertook to ensure the greater good of a future America. This show of devotion in representing his country in the slightest way possible shows that he was ready to die for his country. Not many people are willing to undertake such an act of heroism. To knowingly place one’s life under the direct threat of death requires guts, spirit, and strong will from an individual. To display such character often calls for unconventional thinking and acting.