Saturday, August 31, 2019

How does Dickinson mock puritan values in her poems? Essay

Dickinson poem ‘the world is not conclusion’ does not reflect a concentrated attack however she does mock puritanism and undermine its values, although she is a religious catholic Christian herself she feels that people do not understand religion like she does and that they are trying understand something which they never will. She conveys in the poem that there is an afterlife and how it undiscovered ‘s you have to go through it to know, suggests that she has experienced death. mentions themes of puritanism and death in this poem, similar themes are discussed in ‘I felt a funeral in my brain’ and ‘There’s a certain slant of light’. Dickinson starts poem 501 with the lines ‘This world is not Conclusion. ‘ this line shows that Dickinson is certain that there is afterlife, this line also shows confidence in the speakers tone suggesting that maybe Dickinson has experienced this to be so certain. This line is paradoxical since since in this line she is suggesting that there is an afterlife however she ends the sentence with a full stop, implying a stop or end to something. The word conclusion stands out in this line since it starts with a capital letter and ends with a full stop. This gives the word ‘conclusion’ emphasises and shows its importance. This line shows religious connotations since it is related to death. It neither mocks or supports puritanism however it just highlights something that the speaker confidently believes. Poem 501 is written without any stanzas and flows right the way through this may be to highlight the continuous search for answers about death and religion and how this search it futile and everlasting since death can not be discovered. The tone at the beginning of the poem is quite arrogant implied by her confidence. Similarly in poem 280 Dickinson says ‘ I felt a Funeral, in my Brain,’ this suggests that she has been through death and that she is now recalling events from the past, this also hints that Dickinson is mocking puritan values since she may be implying that people try to understand death and she has already understood it, making her self more knowledgeable then the ‘scholars’. The word brain associates to mental stability or state of mind, we may interpret that by using the phrase ‘in my Brain’ it shows Dickinson losing her sanity and losing her mental stability as she is experiencing this in her mind rather than in reality. The coma used after ‘Funeral,’ is quite significant as it breaks the sentence in too two parts highlighting the distance between her actually experiencing death and her thinking that she is experiencing death. Against the tone her is quite arrogant as she seems to be more knowledgeable then the believers and the faithful people, suggesting she is pointing a finger at puritan values. Dickinson clearly mocks puritan values in the line ‘To guess, puzzles scholars-‘ this lines picks on the scholars knowledge and questions his knowledge, this line also suggests that the scholars are naive and in actual they don’t know what they are talking about. This shows a slight arrogance on the speakers part as it makes it seem as if the speaker has the knowledge and the scholars don’t. It also shows that maybe Dickinson has experienced death since she is so confident. The word ‘puzzles’ in this poem associates to confusion, which shows that Dickinson is mocking the puritan values as she claims they don’t have enough knowledge or understanding about something they believe in so strongly. The line ends with a dash this may represent how the scholars are trying to work out something which is not able to be understood and the dash may represent the endless search for answerers. Similarly in poems 280 she also highlights the puritanisms nativity by saying ‘That sense was breaking through-‘ this makes the puritans seem like they have no sense since she say ‘sense was breaking through’ its like she is implying that finally they are understanding. This line ends with a dash implying that the puritans are having some result and maybe that there is hope , this line also shows that the puritans are finally understanding god or religion. Dickinson criticises puritans again by saying ‘Faith slips-and laughs, and rallies’ from this we interpret that Dickinson is saying that faith can slip and is not always perfect. This picks at puritan values and makes it seem that they are not perfect, by saying this she implies that she may be something better then the people who follow puritan values. The word ‘slips’ associates to imperfection showing how Dickinson attacks puritan values it shows how she undermines the puritan values as imperfect and weak. Dickinson uses a dash after ‘slips’ in this line to emphasise the flaws of puritan values. The line has two comas in it, to slow the sentence down and really emphasise what Dickinson is saying, the comas also make us question the puritan beliefs. The capital letter of ‘Faith’ makes it something important and gives it a status. Similarly in poem 258 Dickinson says ‘That oppresses, like the Heft/Of Cathedral Tunes-‘ this line shows that the puritan values such as the cathedral tunes oppress people and put down there individualism. The word ‘Heft associates to something heavy or burden like, this shows how Dickinson attacks puritans since she is saying there traditions are suppressing, she also capitalises ‘Heft’ giving it a heavy and downwards feel, the capital letter almost literally puts a burden on the reader. Dickinson puts a dash at the end of this line since it shows a unfinished feeling and shows that their traditions are incomplete and they are never ending. Overall Dickinson does attack puritan values and mocks them. She repeatedly shows them to be oppressing and incomplete in the sense that puritans themselves are unaware of there teahings and faith.

Miss Essay

1. Be able to address the range of communication requirement in own role 1.1 Review the range of groups and individuals whose communication needs must be addressed in own job role. Working within Surestart I work with many groups and individuals whose communication needs must be addressed which include 16 staff members, services users to date we have 1700 families registered with Surestart. We would have a lot of communication with Health visitors regarding referrals that they have sent in and also follow up telephone calls if there is any concerns with the family. I would also have contact with social services and be asked to attend case review meetings. I would also be expected to communicate with other agencies to refer our service users on the appropriate agencies for example other children centres, counsellors, women’s Aid and Hidden Harm Social worker, 1.2 Explain how to support effective communication within own job role Effective communication and interaction play a very important role in the work of everybody that works within Surestart. I feel that how I support effective communication is by setting a good example to staff. With communication been so important for the day to day running of the centre, each staff member would be asked to write in the diary in the main office so people can know where they are (this is for the save guarding of staff if they are out of the office, lone worker policy) There is also a white board in the main office so when staff are in programmes other staff are aware of this and that the parents/baby room are booked. I would also support communication by attending staff meeting ever second week and staff are told that they must attend once a month. There is also an open door policy as sometimes there is information that staff do not want to share in a team meeting as there maybe difficulties within the team and they would like to share information on a one to one basic. 1.3 Analyse the barriers and challenges to communication within own job role The barriers and challenges that I would face is staff working part time,  staff out doing programme and also may be difficult feeling between staff members. The other barriers and challenges that I would face is staff do not take on board what you are saying to them as they feel they are right so they do not even listen to what you are trying to explain. Some people may pick you up wrong on the information you are trying to get across. 1.4 Implement a strategy to overcome communication barriers Make sure I speak very clear, focus on what information I would like them to take on board. Supervision on a monthly basis, open door policy if anyone has a problem they can talk about it. Staff can ring and send emails at any time. The childcare supervisor meets with the childcare team every morning to make sure that all crà ¨ches have enough staff and if they have any concerns regarding the children. There is also a referral meeting once a week where we discuss the referral that health visitor/social workers have send in and also to discuss and concerns we would have regarding the parents. I also send rely slips to social worker / health visitor to let them know if a home visit has been completed or if we have been unable to contact the family. 1.5 Use different means of communication to meet different needs I am aware that each staff member has different learning styles, some staff like sharing information in a group and other staff like to share information in a one to one. It is also very important for me to take this on board as I do not want any member of the team feeling frustrated and ineffective. I want staff to be able to trust me and let them see that I value the work that they do. The different means of communication I use to meet different needs are. Emails are a very effective means of communication as each staff members gets the information at the same time and not second hand. Emails can be sent at any time and also printed out to file or record information that has been sent or received. Team meeting again are a very good as all staff are getting the same information and this is a nice way for other staff to meet and let everyone else know how things are going and if anyone is finding a family or child diffi cult then there is the support of the whole team for ideas of how to handle a situation. If anyone cannot make it then the team minutes are there to read. Telephone if I am not in the office I can still be reached on my mobile if anyone needs anything.  Health visitor/Social worker would also contact me by telephone if they needed an update on a family. Staff diary in the main office this lets staff members know who is in which room and if anyone is on leave or sick or if someone has an appointment. Sign in and out sheet beside the exit door this is for safety reasons as if there was a fire in the building then I would know who is in and out Reply slips are back to the health visitors/social worker as an update for the referral they have send in. Letters to parents this is to invite them along to programmes/events. Thought-out the year I would facilitate information mornings for breastfeeding support, weaning work shop and feeding for under 5’s this would be to share inform ation to welcome new service users to the Surestart. Face to face, my office is open to all staff at any time if they need to talk about anything. CU2941 Use and develop systems that promote communication 2. Be able to improve communication systems and practise support positive outcomes for individuals 2.1 Monitor the effectiveness of communication systems and practices. The diary in the front office if very effective for staff on home visit as we know where there are for their safety (lone worker policy). white board in the main office is very effective as this is where all staff write down their programmes so if there is any phone calls for staff the secretary knows if they are in the office or in programmes. Emails can be sent at any time and it means that the same information is been told to the staff at the same time and it is also the staffs responsible to pick up their emails. The childcare supervisor meets with the childcare staff each morning I feel that this is very effective as this is in place to make sure that all rooms are covered with their ratio, and most importantly that the needs of the children are met and if there is any problem in any of the setting it can be addressed as needed and that staff do not have to wait 2 weeks for a team meeting to discuss. One to on e communication i.e. Supervision and APR, I feel that this is very important within a setting. N-Drive – this is where documents can be saved and all staff can access it. In our office we have a policy of hot desking so documents can accessed at any computer. This is also for Surestart forms and newsletters so all staff can print them out as needed. Reply slips to health visitors/social worker/other agencies – this is where I reply to any referral letter that the project receives, I would reply to the other agencies if this family had received a home visit and services offered, if I was unable to contact the family for different reasons or if the family did not want to avail of Surestart services. Phone – if I cannot be reached at any time then a message can be left for me to return there call. 2.2 Evaluate the effectiveness of existing communication systems and practice Evaluating the effectiveness of existing communication systems and practice I am going to start with the ones I feels are the most effective. One to One Communication – I feel that this works very well within a team as some staff members do not like to speak in front of other and feel that their ideas might not be good enough. I also feel that face to face communication is very effective as some people can pick up a message wrong and take the wrong tone with an email. Supervision – this is there for staff to talk confidently with their manger I feel that this is very effective means of communication for the manger to tell how well things are going for that member of staff and for the staff member to say how they really feel about how things are going. ( I also feel that you have to have a good relationship with your staff for this to work, you have to be relaxed and friendly and staff members also have to trust you). Supervision is also very effective as this give staff clear boundaries of what is expected of them for the month a head and also make sure they are on target to achieve the targets in their APR. Team meetings – I also think this is effective as this can let everybody know how programmes are going if there is any follows to do with families in any of the programmes. If anyone is having any difficulties if any of the programmes is nice to get other ideas how to deal with it. It is also there for sharing information for the Surestart board and action for children. To let staff know what training is coming up. ARP- I have been working in a Surestart setting for the last 11 years, I feel that this is the first year I have felt that an APR has been effective like the rest of communication systems if it is not done right then it will not  be effective. APR is there to set goal and targets for the year ahead, I feel this is very important for staff as they know what is expected of them for the year ahead and then this is monitored at each supervision to make sure that staff in on track with their targets. Childcare meeting every morning – I feel that this is very effective as each member of the childcare team no where they are each day and who is covering in each setting and also if any member of the childcare team is concerned about a child this is discussed each morning. Emails- I feel has pro and con. It is very effective in a way that emails can be sent at any time and is very good for all staff to receive the information at the same time. I also feels that staff can pick the tone of emails up wrong and some information is best said face to face. Reply letter to health visitors/social workers/other agencies – I feel that this is a very effective The diary in the front office – This is effective if everyone plays there part in filling it in. If someone is on training or off on A/L and forgets to fill it in then it is very hard for other staff to know where they are. N-Drive – This is effective as all the Surestart form and standard letters are on it as well as newsletters. It is also that as this is used while hot desking it means that the documents that are placed on this drive can be accessed by the whole team so if I was saving any confidential information I would also password protect it. Phone – I do feel that this is effective as if I am not available by phone or mobile then a message can also be left. 2.3 Propose improvements to communication systems and practices to address any short comings I feel that communication can always be improved as we are only human and staff do forget to pass on messages, response to emails, and even fill in the diary in the main office. I have proposed that each desk has message pad so that all messages have to written down. I have proposed that the main diary is to be brought to the team meeting so that if anyone has any leave booked, any visits arranged or training then this can go into the diary. I would also remind everybody at team meeting about remembering to fill in the diary I have also propose that the reply slips to the health visitors/social workers be changed as I feel it could be improved. 2.4 Lead the implementation of revised communication system and practices CU 2941 Use and develop systems that promote communication 3. Be able to improve communication systems to promote partnership working 3.1 Use communication systems to promote partnership working The systems that we use to promote partnership working is:  One to one communications – I meet with the health visitor for breastfeeding once a week. Also any of the health visitors are welcome to call in at any time. Some health visitors like to bring parents that are hard to engage into the centre to meet me to show them around the building and meet the staff. I would also have contact face to face with our families on a daily basis through programmes and also registrations. Phone call – health visitors/social services and other agencies would phone for update and regarding case review meetings. Families would also phone on a daily basis if they needed help with anything or information. Post – we post letters to the agencies if we are unable to reach the families or if they no longer wish to be involved with the service. I would also post letters and newsletter to families. Emails – some agen cies like to send email as it is a faster way for them and this is ok with me as long as it is recorded. Referral reply – this is a letter drawing and signed by Surestart parents that we have permission to send it back to the health visitors to say we have been in contact and the Surestart services have been offered. Information events – this is different events for Surestart to promote their services. 3.2 Compare the effectiveness of different communications systems for partnership working I feel within waterside Surestart the systems we use are very effective. One to one communication I feel is very effective as this can reassure service users and colleagues and also outside agencies, you can focus on the goal. I can be supportive and positive to all that need it. I can also assess the services users’ needs and provide them with the support  needed and I also feel that this builds trust and relationships. Phone call – I feel that this is a very effective way of communicating as some health visitor/social worker/other agencies need an update ASAP as they may be on their way to a review meeting. All if a member of staff is not on the office this is a good way of communicating. As my role as family support worker I be in contact with families every day on the phone, may it be they have a question or I am inviting the families to programmes or arranging home visits. E mails – This is a very effective way that I communicate in Surestart, supervision notes to be sent 3 says before supervision, team meeting are to be sent and read before the meeting. Agencies are able to send emails / newsletters. Referral Response – I feel that this is a very effective way that Surestart communicate. This is send to health visitors/social workers who send in a referral this is to show the agencies that we have made contact with that family or that we have tried to contact the family and after 4 weeks we are unable to reach them. Information events – I feel that this is not really effective as we work on catchment areas and this is very hard to have an event in a general area, it has to be within the area, as we do not like to turn people away that may be interested in the service, as when agencies send in referrals they have a list of streets that is inside the catchment area and only if there is a need then they can be outside the area. 3.3 Propose to improvements to communications systems for partnership working I do believe that communication within waterside Surestart has got a lot better in the last year, I feel that this has a great deal to do with our new manager, she has gained the trust and respect of the staff and in return it is a pleasure to work with. I feel that I have a great leader to follow and learn a great deal from. The only improvement that could be made is that a leaflet could be drawn up for families that are outside the catchment area so that they leave with something rather than going away with no information (this is in the process on being done). I am also assisting the upgrade of the referral response form so that families sign this form so that we have permission to hold their information and that we are allow to send the form back to the referrer. CU2941 Use and develop systems that promote communications 4. Be able to use systems for effective information management 4.1 Explain legal and ethical tensions between maintaining confidentiality and sharing information Working with in a Surestart setting for the last 11 years, I know that confidentiality is very important. It’s important for agencies and services users to build a trusting relationship with me. I am very honest with the people I work with, when I am completing a registration form with parents I do tell them that their details will stay in a locked filing cabinet for 7 years, that there information is stored on a database password protected until there child/ren turn 4. I also let the parents know that under the data protection act they are able to see their file at any time. Parents also sign a form that we are able to share information with the health visitor and other agencies involved if we have any concerns regarding the child or parents. When I have taking programmes with parents I also start with group rules. Confidentiality always comes up, I always tell parents that what ever is discussed at the group I do not take it outside of the group, I can only speak for myself but that I would hope that everyone would stand by this too. I also always make it very clear to parents that if anything is discussed or disclosed any information regarding harm or danger or abuse to a child/ren then I will past this information on to my manger and the appropriate authorises. (Children’s order 1995, child safety is paramount) I feel that if I am honest with all the people that I work with then I do believe that you build up a trust and that by law I have to report and record all that is disclosed to me, although I did have a parent in the past that did not understand this, they felt that I was just reporting them to social services and she believed that social services where there to take her child away. This lady did not return to Surestart as what she disclosed I had to discuss with my manger. 4.2 Analyse the essential features of information sharing agreements within and between organisations Under the data protection act 1998, the purpose of the act is to protect the rights and privacy of individuals and to ensure that data about them are not processed without their knowledge and are processed with their consent whenever possible, this act covers personal data held in electronic formats, manual data and relevant filing systems. Surestart has devised a form that has recently been updated by my colleagues and myself, this form is where we get service users to sign that they agree Surestart is able to keep their details in a secure place for up to seven years, and that if we had any concerns regarding the child that we would contact the appropriate service also that if there is a social worker involved that we are able to update them on any programmes they attend for case review meetings. Health visitors would send in referral form with parent’s consent, what happens is we then phone that family and do a home visit and in that visit we fill out the Surestart forms wi th the families details on it, the consent for is then signed and sent back to the health visitor to say we have completed a visit this is what programmes they would like to attend, I would also send back a form to the heath visitor if that family did not wish to avail of Surestart services or that I could not reach them. These forms are kept with the registration and filed in a locked cabinet. When I am facilitating a programme within Surestart I always do group rules, parents can put what they like on it, confidentially always comes up, I just remind parents that what happens in the group will stay in the group with me, but I can only speak for myself and not the rest of the group and I do tell them that It would not be nice to hear anyone talking bad about another parent. I do inform the parents that if there anything disclosed within the group that has caused abuse of harm to a child them I am bound by action for children policies and procedures and under the children order act 1995 to past this information on to my manger and the appropriate services, I do tell the parents that I would discuss this with them before I reported what I have heard. 4.3 Demonstrate use of information management systems that meet legal and ethical requirement Under the data protection act 1998 Surestart need permission to hold data on the families that I work with, how this is done is that all parents have to sign the registration form and also the consent for their details to be stored according to action for children policies and procedures, which is that their details are stored for up to seven years, in a locked filing cabinet and up to four years on the Surestart database. Under the children’s order 1995 I am bound to report anything that I have heard or seen that my or has caused harm to a child. This would also be discussed with the parent/s what information I would be passing on to my manger. This also gives the parent an opportunity to explain. The information my lead to a referral been made to social services.

Friday, August 30, 2019

GST in Malaysia Essay

In Malaysian Tax System, Royal Custom & Excise Department is responsible for all policies related of Goods and Services Tax (GST). Currently, the rate of GST can be category to 3 rates which are standard rate, zero rate and exempt supplies. (Gst.customs.gov.my, 2014) GST can only be charged on the business was registered under the Malaysian Goods and Services Act 2014. The registration exemption is given if the business’s annual turnover of taxable supplier is below than the GST registration threshold. Thus, such businesses cannot charge GST on their products or services from their customers. (Gst.customs.gov.my, 2014) The GST registration is available from 1st June 2014 for any businesses which have reach the GST registration threshold of more than RM500, 000 are required to register under with Royal Malaysian Customs Department for the Goods and Services Tax (GST) before 31st December 2014. Nevertheless, the business with annual turnover below RM500, 000 may apply for the GST voluntary registration that is because registration GST is voluntary. (HengAnn, 2014) There are no any extra fees charged for GST registration processing. Goods and Services Tax (GST) and Value-Added Tax (VAT) are a type of consumption tax had been invented in 1950’s. Both of GST and VAT are based on value added concept and it is a multi-stage tax, so GST or VAT will charge at each stage of supplies chain. Currently, there are 160 countries had implemented GST or VAT and from this statistic has shown that GST and VAT are an effective and fair tax system. According to the data shows based on the region, 160 countries had implemented GST or VAT are as the following countries: 7 countries in ASEAN, 19 countries in Asia, 53 countries in Europe, 7 countries in Oceania, 44 countries in Africa, 11 countries in South America and 19 countries in Caribbean, Central and North America. On 7th April 2014, the Goods and Services Tax was passed in Dewan Rakyat Malaysia with 119 votes for and 81 votes against. Start from 1st April 2015, GST will effective at a standard tax rate of 6%. The propose of implementation GST will replace the current consumption taxes which are Government Sales Tax (10%) and Services Tax (6%).

Thursday, August 29, 2019

Cooperation or Hegemony Essay Example | Topics and Well Written Essays - 1250 words - 1

Cooperation or Hegemony - Essay Example The paper reviews how the present-day international trade functions. It points out that core of the international trade system lies in the trade policies towards protectionism or free trade of different states. The author shows that in contemporary times, the international trade system involves certain rules, which explicitly target reducing protectionism. In this way, the instability, which may occur because of the uncertainty and unpredictability of trade relations can be, minimized. The work examines if the United States has a complete hegemonic control and dominance over the international trade market, because it is a known fact that powerful states tend to have broader focus upon political power, aggregate national income, social stability, and economic growth, which in some way affect the working of the international trade system. It also attempts to see whether different countries have brought the trade system together. The author concludes that much of the international syste m, which is established today, focuses on the ideas of the United States, which included an anti-government and liberal approach to the area of the trade. The international trade system seeks to create such a situation, so that countries can benefit from trade on maximum. The writer analyzes historic events which prove that the United States had a major role in creating a beneficial trade system. The conclusion of the research is the United States has a hegemonic control, necessary for the stability of the international market.

Wednesday, August 28, 2019

American presidency Assignment Example | Topics and Well Written Essays - 250 words

American presidency - Assignment Example This database should be broad enough to allow for online and instantaneous retrieval of information, in order to extirpate lies from the debate. The failure to introduce a form of fact-check will leave the public vulnerable to lies despite the gravity of the debate. For instance, Romney charged wrongly that the 716 billion dollars in healthcare reductions would proceed from current beneficiaries. Romney’s charge that Obama used 716 billion dollars to facilitate the Obamacare may be at least dishonest since even Romney’s running mate, Rep. Paul Ryan introduced similar source of revenue in his annual budget plans. Likewise, House Republicans had voted in favor of similar plans in 2010. In a closely related wavelength, Romney included the excision of the Independent Payment Advisory Board as a way of eliminating excessive spending. Although the House voted against the board in March 2012, the Senate has not yet effected the decision of the House. Under the 201o Healthcare Reform Act, the board does not recommend the rationing of healthcare services, increment of premiums, or deductions for healthcare beneficiaries as Romney charged (Cohen, 1). The likeable aspect of the format that was used is its interactive aspect. The interactive aspect was not merely underscored by the facilitation of the answer-question exchange between the presidential contenders and the head of the Commission on Presidential Debates, but by allowing the contenders to ask each other questions and to query each other on policy frameworks. This is instrumental in pointing out the lacunae in policy frameworks and understanding the tenability of the same frameworks. Clearly, the three takeaway points from the debate are: the jobs that needed to be created en masse; the healthcare system which Obama felt needed to be made egalitarian and public-centered as opposed to Romney who wants its spending assuaged; and the economy which Obama wants strengthened

Tuesday, August 27, 2019

Business Strategy for H&M in Brazil Essay Example | Topics and Well Written Essays - 3500 words

Business Strategy for H&M in Brazil - Essay Example Hennes & Mauritz, hereafter H&M, is a well-known Swedish firm specializing in retailing and designing fashion apparels and accessories. The firm offers a variety of cosmetics, apparel, footwear, and accessories for children, teenagers, women, and men. The firm operates in Asia, Europe, and North America, having numerous outlets over 38 countries. The company employs over 87,000 people, with headquarters in Stockholm, Sweden. This paper presents a business strategy for H&M for the introduction of the clothing brand in Brazil, one of the rapidly emerging economies in the world (Doyle, Moore, and Morgan, 2006:275). The paper analyzes the company and clothing industry, market analysis, target group analysis, and entry strategy for the company into the Brazil, including the PEST and SWOT analysis. The paper concludes with a recommendation part for the company. Erling Persson established H&M in 1947 in Vasteras, Sweden. Over the years, the company has significantly growth in the clothing i ndustry, and currently operates in over 38 countries and an employee base of over 87,000 spread all over Europe, North America, and Asia. The central idea of H&M is to offer its clients a variety of fashionable products of good quality at an affordable price. One of the strategies of H&M is the continuous development of its collection such that each customer finds a new product o the next visit to the stores. In essence, the company uses over 100 buyer and pattern makers, and designers (Capell and Khermouch, 2002:107). Apart from the permanent designers, the company connects with other top-class designers in creating fashion campaigns, including reputable designers such as Madonna, Stella McCartney, and Karl Lagerfeld. Their collection includes children’s, teenagers’, women’s, and men’s apparel, cosmetic, footwear, and accessories. Moreover, the company has in recently developed a full interior design collection. Due to the nature of their products, the c ompany targets people at all ages and tastes, which has both its challenges and benefits (Chetty and Campbell-Hunt, 2004:62). Apart from the over 2200 stores spread across the world, the company also offers catalogue sales and internet shopping in Germany, Austria, Sweden, Finland, and Norway. One of the interesting aspects of H&M is that it outsources all its production (Larenaudie, 2004). The company boosts of over 700 independent suppliers, primarily situated in Europe and Asia with 16 production offices. However, their suppliers have their own subcontractors, thus the overall figure of manufacturer units sums up to 2700. In 2010, the company’s turnover was about 12 billion Euros. The company targets a 10-15 percent growth per year for all new stores. In this regard therefore, H&M plans to employ an additional 6000 or 7000 people (Capell and Khermouch, 2002:107). The head office in Stockholm houses the entire corporate management, as well as other departments including fin ance, expansion, advertising, communication, logistics, security, information technology, designing and buying, expansion, corporate social responsibility, and international relations. Nonetheless, the company’s corporate culture adapts to the conventional global corporation culture, treating the entire world as a single market. The company operates in different countries, but the operations and plans are essentially similar in all the stores. The company does not prefer any country from its market areas, but rather implements its business strategy similarly in all. The central idea here is to offer products to various segments, rather than marketing for one only (Dimitratos and Plakoyinnaki, 2003:191). This is common for companies like H&M that have resources to cover a broad market. Industry Analysis Analyzing the strong clothing imports and high expenditure on apparel items by Brazil, as well as the consumer preference for the latest fashion, it is evident that the country is a very attractive emerging

Monday, August 26, 2019

Managing change at Cox's Container Company Case Study

Managing change at Cox's Container Company - Case Study Example The researcher states the general manager of the company (Erica Wilson) does not include her workmates in the survey. She found that the company lacks actual cost and operational controls. She recommends the company to employ financial and managerial specialists. In addition, when the new employees are employed to work on budgetary control, others do not support them. Abdul Aziz is one of the opposing workers of the organization. The above problems that are facing this group need to be analyzed. The analysis can be carried out in two ways. The first approach involves analyzing all the employees affecting the performance of the company. These employees include the senior managers, middle managers, and business expert such as accountant. Failure of an organization can be linked to the failure of the employees. In this company, the employees are unconcerned with each other. They do not cooperate, communicate, or consult each other. Harold Cox is the senior most executive in the Cox†™s Container Company. He is politically and financially involved with people’s affairs. His leading job is to develop strategic and long-term decisions of the company. This involves planning the long-term profitability of the company through increasing sales. In addition, he is responsible for delegating some powers to his juniors. For instance, he has assigned Erica Wilson to evaluate the actions of the company. Erica Wilson is the general manager of the company. She is responsible for making operational decisions of the company.

Sunday, August 25, 2019

Cubans in Miami Research Paper Example | Topics and Well Written Essays - 1250 words

Cubans in Miami - Research Paper Example In addition to this, the Cuban community is characterized by the low fertility levels due to their demographic structure. The reasons for their high social and economic status are first and foremost that women are in income generation activities more than the men. In addition, the Cuban was characterized by the presence of a strong ethnic closed society. Finally, the Cuban society was involved with post-revolutionary activities which helped them to fight for better living standards. The Cuban people are to have a strong cultural system. However, due to the differences and the way of life in the United of America, they have adjusted their values and beliefs and they have been to the American society. Several studies have suggested that about 1 million of the American population are of Cuban origin. More accurate data from the United States Bureau of Census conducted at about 1980 revealed that about 803,226 of the American population were associated with the Cuban descent, and this number of Cuban origin people is to have increased over the years (Lisandro129). The immigration of Cubans to America has always been linked to economic situations and political events on the island. Before the American government helped in ending the Spanish rule on the island in 1899, the northern Cuban neighbor had played a considerable role in Cuba’s economic and political issues. As the involvement of the US government intensified during the 19th and 20th centuries, the United States of America had become a preferred place of settlement for Cuban emigrants who have succeeded to get powerful positions in the financial, intellectual and political landscapes in the United States (L. Glenn 31). As statistics depict, the number of Cuban immigrants before 1885 was relatively low. However, about five years later, the number of Cuban immigrants to United States of America has more than tripled. New heights of immigration of Cubans were reached between 1897 and 1910 which is a

Saturday, August 24, 2019

Nursing sociology_Analysis and critical evaluation of primary health Essay

Nursing sociology_Analysis and critical evaluation of primary health and community care services from perspective of health professionals about aged care - Essay Example Home and Community Care (HACC) is a cost-sharing program between the Commonwealth and State/Territory governments to enable the aged individuals to remain in their own homes by financially supporting the old individuals’ primary carer. (Department of Health, 2008) As part of strengthening the goals of HACC program, members of HACC Program can receive financial support up to $12,000 each year whereas HACC carers can also receive $12,000 each year for their service (Aged Care Policy Directorate, 2006). Aside from HACC, Community Aged Care Packages (CACP) also Extended Aged Care at Home (EACH) also strengthens support for aged population within their own home. CACP provides the aged people with support service which focuses on the complex caring needs of aged individuals whereas EACH aims to delivery health care services at home (Australian Government, 2008). Australia has inadequate number of registered nurses (Kearney & Thomas, 2008, p. 5) Because of the limited government funding, as much as 2.6 million people in Australia receive healthcare services from informal carers instead of receiving care from primary carers (Austin et al., 2005; Gilmore, 2004) as compared to the actual health care demands of the aged population. Allen Consulting Group (2007) reported that there are only 57 primary carers that handle the health care needs of 100 aged individuals today. Since informal carers do not have sufficient knowledge on ways to protect themselves from strains, this group of people are more prone to suffer from physical injury. To increase the number of primary nurses and protect their health and well-being from excessive workload, the Australian government provides educational financial assistance ($9,316) to nursing students (Kearney & Thomas, 2008: p. 5). Aged Care Policy Directorate. (2006, April). Retrieved September 25, 2008, from Guidelines for Service Provision Levels in the Home

Friday, August 23, 2019

Criminal law Essay Example | Topics and Well Written Essays - 750 words - 1

Criminal law - Essay Example For an act of complicity to be charged there must be at least one principal in the first degree. This is the party who actually performs the actus reus of the crime. An defendant charged with complicity can be classed as a principal in the second degree, which would be someone who is present during the commission of the crime and aids and abets the commission but does not perform the actus reus. An accessory before the fact would be someone who aids and abets the commission of the crime but is not present when it happens and does not perform the actus reus of the offence. An accessory after the fact is one who assists that perpetrator after the crime has been committed. This could be by hindering the apprehension of the perpetrator. Under modern law second degree principles and accessories before the fact are punished identically whereas accessories after the fact would receive a lesser punishment. The American approach to complicity is to punish the principals and the accomplices in equal measure. This is known as derivative liability whereby the accomplices liability is derivative of the conduct of the principal offender. The mens rea required for a charge of complicity is that the accomplice must intentionally aid or encourage a criminal act and have the same mental state necessary for the crime committed by the defendant. There are some exceptions where the accomplice can be charged with complicity where it is sufficient in law for the accomplice was acting with the knowledge that the defendant might commit a crime. With aiding and abetting a crime the accomplice must have intentionally aided the defendant’s criminal act by intentionally committing the acts that assisted or encouraged the defendant to commit the crime and the accessory intended that his acts would help the defendant to commit the offence1. Where the accomplice knows his conduct will assist or encourage the defendant to commit a crime but does not actually intend

Thursday, August 22, 2019

Preparing to Conduct Business Research Essay Example | Topics and Well Written Essays - 750 words

Preparing to Conduct Business Research - Essay Example Identity theft as Sennewald & Christman (2008) assert, occurs when an individual uses another individual’s information or personal details as his/her own in order to engage in fraudulent activities or other crimes. The growth of identity theft affects the retail world immensely. The issue of retail identity theft can be solved through an exploratory research. The application of both qualitative and quantitative research designs would ascertain a highly credible, precise, and accurate research. The designs will explore the topic from different points of reference through the application of different methods. The application of a single research design, whether the qualitative research design or the quantitative design would lead to inefficiency in the determination of the seriousness of the issue, and the probable solution. On the one hand, using the quantitative research design will lead to a high degree accuracy in the quantification of retail identity theft. The research method will make it possible to collect measurable data, which through numerical comparisons, will be analysed and presented through easy to interpret methods. In addition, the application of the quantitative method will be of great importance in reporting the collected data since it appl ies standard statistical analyses, which are comprehensible and understandable (McLeod, 2008). On the other hand, the incorporation of the qualitative method during the conduction of the research will enhance the effectiveness of the study through the improvement of the accuracy of the results. The qualitative research design will focus on the identification of the motives, the driving forces, and the triggers of the behaviour. In addition, the design will enhance the credibility of the research through the incorporation of a participant observation techniques, interviews with victims of identity theft, and reformed identity thieves among other methods. Through these methods, the research will possibly

The Grapes of Wrath and California History Essay Example for Free

The Grapes of Wrath and California History Essay I. The Joad Family is the main character in the novel of John Steinbeck entitled The Grapes of Wrath. The said novel was published in the spring of 1939 during the Great Depression. The Joads in the novel portrayed the migrants of California. From Collins and Steinbeck point of view, the migrants of California can be compared to â€Å"Jeffersonian yeomen† who aspire to gain their respective small farms. Jeffersonian Yeomen, historically, however, did not succeed in their goal. It was the farms owned and mange by the businessmen of San Francisco that ruled the rural economy of the state. Its big agricultural output was favored by the â€Å"goldrush† which permitted the growing of â€Å"cash crops† in the urban markets and the mining camps of San Francisco (David Igler Davis, 2002). It was in 1935 and 1939 when the great depression happened in California. The migrants came from Missouri, Arkansas, Texas and Oklahoma; the lower Plain states of the southwest. The number of migrants by that time was about 300,000. They were caked â€Å"Okies†. In the Grapes of Wrath, it was the Joads who migrated to California. The thirteen members of the family rode in one vehicle which includes even the grandparents and their grandchildren. Along the way the grandparents as well as the in-laws and uncles died. It was the fifty-year old Ma Joad who was left to lead the group in their journey. Tom Joad, son of Ma Joad and an ex-convict also played a significant role in the story. They join the thousands other migrants in their quest for better opportunities in California. II. In The Grapes of Wrath, the Joads migrated to California to seek for employment. They left the almost â€Å"perfect† and â€Å"peaceful† Weedpatch Camp because of the misfortunes that happened in their homeland. Dust storms occurred in Oklahoma and they had suffered financial crisis. Based on California history, the migration can be explained by several factors. The farms in Oklahoma and other states affected by the depression became unprofitable due to drought that happened in their land. There was low economic activity and widespread unemployment by that time. Tenant farmers were evicted by the landowners as a consequence of the New Deal Agricultural Adjustment (AAA). These programs had forbidden farmers to plant grain or cotton in exchange of cash. New Deal Programs inevitably had effects that went beyond the farm economy, through the recovery of the agricultural sector was the administration’s primary aim. Some agencies attempted to reorient the rural social structure, making it possible for laborers and tenants to live with dignity and even become landowners. Relief agencies operating in rural America improved public buildings and transportation facilities, hired unemployed people, maintained institutions, and enriched lives. And the New Deal undertook a revolutionary-and successful- effort to electrify the countryside. More federal activities were undertaken in response to the Dust Bowl, an ecological crisis that beset the Great Plains with especial severity. Government agencies promoted conservation, retired highly erodible acres from farming, resettled some victims on more viable lands, and provided sustenance for others (Danbom, 2006). The use of machinery which produces greater efficiency also contributed to the said eviction. Moreover, a big percentage of farmlands was destroyed by the great dust storms that occurred in the mid-1930s. Since then, poverty stroked Oklahoma. The Okies decided to move to California to be able to survive. They were encouraged by the â€Å"word-of-mouth campaign† by their friends and relatives. They were inspired by the information from other people that they could earn high salary in California by simply picking cotton and fruits. Moreover, transportation from Oklahoma to California was not a problem by that time (Orsi, 2001). III. The migrants moved to California because they believe that they will be able to find a brighter future there. Aside from the effect of the Great Depression in the life of the Okies, the mass migration was also brought by false advertising. In October 1929, the stock market of the United States fell and California was affected. This incident had caused California to suffer acutely because California oil shares which are the most active sectors in the 1920s had collapsed and many investors suffered. The depression also hit California but the economy recovered in the year 1934 and 1937 (Eymann 2004). It was then when California needed many laborers in the cotton fields. Indeed California offered high salary during those times when the number of cotton plantation in California was multiplied. A need for thousands of harvesters of crops had commenced especially in San Joaquin Valley. They had a problem of labor shortage not unemployment that is why high salary was offered to those Okies who were employed to pack meat, cement clay, railroad and even ice manufacturers. The salary that California offered was twenty to fifty percent higher than the salary of Okies in their homeland. Due to the nature of their work, the migrants had chosen to settle in one place with their children. IV. In the novel and in historical reality the migrants are hoping to find a better life in the fertile fields of California. They are expecting that when they reached â€Å"the promised land† they will be employed and earn high wages. They had believed that when they reach their destination, life will become easier. They will â€Å"simply† work in the cotton fields and harvest fruits and earn a big amount of money. They will raise their children there and all of them will not starve and will be able to gain bright future in California. They hoped to revitalize their wealth and recover their source of revenue on the land V. When they had reached their destination, they found themselves as victims there. Work was inadequate, salaries were small, and they were disliked, refuse to be accepted and suppressed by the residents. Their endeavors to upgrade their lives were branded as Communism, a system much disliked and feared by many Americans of the time. (John Steinbecks The Grapes of Wrath By Lee Cusick) Agricultural workers were not covered by Social Security, unemployment insurance, the minimum wage and the National Labor Relations Act. The New Deal was primarily a political response to the Depression, and unlike farm owners, the migrants had little political influence. While California Growers obtained federal price supports for some products, legally enforced marketing orders for others, and massive government expenditures for irrigation projects, migrant laborers received a small, poorly funded camp program that never got beyond the â€Å"demonstration† stage (Harvest of Gypsies). Grower satisfaction with the Okies was short-lived. The flood of migrants in 1937 had created an embarrassing oversupply of labor, and the squalor of their camps refelected on the industry. In 1938 it became apparent that the Okies were politically embarrassing as well. They were democrats, supported Culbert Olson, and displayed firm loyalty to the New Deal. They also disrupted the strong Republican hold on rural communities, a fact that led to the formation of the California Citizen’s association (CCA), which, like the Associated Farmers, fronted for banking, oil, railroad, real estate, and insurance interess allied with the agribusiness community. The CCA, detrmined to attack the New Deal and Olson through the migrants, launched a publicity campaign that, as Walter Stein has pointed out, went a long way toward creating a popular view of the Okie in California as â€Å"degenerate, degraded loser in the American struggle for survival. † Like migrants of the 1920s, nearly half settled in metropolitan areas, primarily Los Angeles, the Okies were quickly absorbed. The rest, however, turned north to the San Joaquin Valley where they sought work in the complex, industrialized agricultural system. Ineligible for relief for a year because they were new to the state, they accepted the low wages that the Mexican work force would not, and in a short time almost completely displaced the Mexicans as California’s harvest laborers. When the Okies became eligible for unemployment relief, the state relief administration under Gov. Meriam cut off relief payments if work was available in an agricultural harvest, forcing them into the old relief, harvest labor, relief cycle that essentially subsidized low farm wages. Important distinctions between the Okies and traditional harvest labor were not only that the migrants were white Anglo-Saxon Protestants but also that they sought permanence. They settled in Central Valley towns, sent their children to the local schools, and registered to vote. Their poverty could not be ignored. Living in shocking conditions in tent camps along irrigation ditches, they exposed the exploitation of farm labor in California’s peculiar agricultural system and became a highly visible burden in local communities, particularly in the San Joaquin Valley (The Great depression Chapter 21). A year later, the labor surplus of the Depression had been transformed into an extraordinary wartime shortage of workers. Migrants who were not subject to military service found well-paying jobs in California’s booming shipyards, aircraft factories and other defense plants. The Joads and their fellow Okies ultimately found economic salvation, not on the small farms they dreamed of owning, but in urban industry fueled by billion of federal defense dollars (Steinbeck, 1988). VI. The story of the migrants fit California History due to the efforts of Steinbeck and Collins who â€Å"actually lived† at California gathering information to capture â€Å"true scenarios† in California. Steinbeck stayed at Weedpatch Camp for several days, talking to residents, attending camp committee meetings and dances, and watching Collins tactfully promote his concept of limited and guided elf-government. Steinbeck and Collins travelled in the old bakery truck to nearby farms and ditch-side migrant settlements, and the author read the manager’s regular reports to the Resettlement Administration’s regional office in San Francisco. The reports, which included social and cultural observations on migrant life and individual anecdotes sometimes told in Okie dialect, were extraordinary documents. The News had already published excerpts from them, and Steinbeck eventually mined them for the material for The Grapes of Wrath. In 1936 he used them to get beneath the surface of migrant life, to understand the deep despair and hopelessness that poverty and homelessness had created (David Igler Davis, 2002). References: Danbom, D. B. (2006). Born in the Country: A History of Rural America Johns Hopkins University Press. David Igler, C. , Davis. (2002). The Human Tradition in California: Rowman Littlefield. Eymann, M. , , C. W. (2004). Whats Going On? : California and the Vietnam Era: University of California Press. Orsi, R. R. W. B. a. R. (2001). The Elusive Eden McGraw-Hill. Steinbeck, J. (1988). The Harvest Gypsies: On the Road to the Grapes of Wrath Heyday Books.

Wednesday, August 21, 2019

Negligence and duty of care

Negligence and duty of care Duty of care. Duty of care is the first element of negligence and therefore, in order to discuss further on duty of care, one would have to first define the tort of negligence. In Blyth v Birmingham Waterworks Co,[1] the courts defined negligence as an omission of something which a reasonable man would do and the doing of an act which a reasonable man would not do. In Heaven v Pender,[2] the courts held that the presumption of duty of care arises when one person is placed in a position with regard to another person or property, it is in ordinary sense that if he does not use reasonable ordinary care in his conducts, he would cause danger or injury towards the other person or property. Therefore, ordinary care is required to prevent the occurrence of such danger. In Stovin v Wise,[3] the courts explained that generally there is no duty to rescue a stranger from danger. The duty mentioned above is regarding duty that is imposed by law or in other words, it is a legal duty. Test to determine the standard of duty of care. There are a few test that is used in determining the existence of duty of care. The primary test is the neighbour principle established in the well-known case of Donoghue v Stevenson.[4] In this case, Lord Atkin laid down that the rule that you are required to love your neighbours becomes a law by itself and it requires one to take a reasonable care to prevent any acts or omissions that can be reasonably foreseen to be likely to cause injury to your neighbour. The question posed to this principle is regarding who is one’s neighbour in law. The courts held that neighbour in law is someone who is directly affected by one’s act or omission. It is a reasonable man’s test whereby the courts would have to determine whether a reasonable man would foresee that his conduct would affect the plaintiff adversely. If the answer to this hypothetical question is yes, then the plaintiff is considered to be his neighbour and he owes a duty of care to the neighbour.[5] It is essential to note here that the neighbour principle requires the defendant to be a foreseeable victim and thus, in order for the defendant to be a foreseeable victim, there has to be a close proximity. Therefore, the neighbour principle requires the plaintiff to be of a close proximity with the defendant. The plaintiff would not be a foreseeable victim if there is no proximity between the plaintiff and defendant. In the case of Home Office v Dorset Yacht Co Ltd,[6] the courts held that the principle laid down in Donoghue v Stevenson should be regarded as a milestone in determining whether there exist a duty of care. This principle significantly assist the development of the law of negligence. Prior to the case of Donoghue v Stevenson, there was vagueness in the law regarding civil liability for carelessness.[7] In an 1889 textbook, there was a list containing fifty-six various duties of care.[8] Therefore, the judgment in Donoghue v Stevenson brought an end to the chaotic situation and had introduced the law of negligence as a separate civil wrong. The next test used by the courts to determine whether duty of care is established is the Anns test laid down by the courts in Anns v Merton London Borough Council.[9] This is a two-stage approach laid down by Lord Wilberforce whereby the first is to determine whether there is a relationship of proximity between the alleged tortfeasor and the person who had suffered the loss. If it foreseeable that the carelessness of the tortfeasor would lead the other party to suffer damage, then a duty of care would on prima facie be established. The second stage of this test requires the court to take into account any considerations that may negate the said duty or to reduce and limit the scope or group of persons that the duty will be imposed upon. This two-stage approach in essence is to determine whether it is reasonable to foresee that the defendant’s act or omissions will cause any damage to the plaintiff. If it is reasonable to foresee that the defendant’s act would cause harm to the plaintiff, then there exist a presumption of duty of care.[10] This test receive heavy criticism in Governors of the Peabody Donation Fund v Sir Lindsay Parkinson Co Ltd.[11] The courts in this case held that the neighbour principle laid down by Lord Atkin should be proved before the duty of care is presumed to exist but the scope of the duty depends on the facts of the case. The courts should consider whether the duty of care imposed on the defendant is just and reasonable. In Curran v Northern Ireland Co-ownership Housing Association Ltd,[12] the learned judge, Lord Keith, held that the Anns test has been given more importance than it should have been given and held that the test need not be applicable in future cases in establishing the duty of care. The third test used in determining the duty of care is the Caparo test which is derived from Caparo Industries plc v Dickman.[13] In this case, there were three factors that is needed to be fulfilled to establish duty of care. The first is the courts must determine whether the damage caused is reasonably foreseen, the second is whether there is any policy to negate the duty of care and the third is whether it is just and reasonable. If this requirements are fulfilled, then duty of care is established.[14] It is important to note here that all three elements under the Caparo test needs to be fulfilled in order for duty of care to be established. Development in Malaysia. In Malaysia, the courts have used all of the above test. However, the test that is currently used by the courts is the three stage test which is the Caparo test. This can be seen in the case of Majlis Perbandaraan Ampang Jaya v Stephen Phoa Cheng Loon Ors.[15] In this case, the Federal Court had referred to the Caparo’s case do determine whether duty of care exist. The issue that arises in this principle is whether this principle only applies to economic loss or it may extend to all situations. The courts used the foreseeability test and held that this test applies to all situation. The courts only had to determine whether the duty of care which is imposed upon the defendant is just and reasonable. The courts went on stating that it would be rare for the outcome of the test to be not just and reasonable. This test is used in a more recent Malaysian case which is Projek Lebuh Raya Utara-Selatan Sdn Bhd v Kim Seng Enterprise (Kedah) Sdn Bhd.[16] In this case, the courts reiterated that the standard of care to determine negligence is that of the reasonable man and it is an objective test. Another recent case is the case of Jordan Saw Yu Huan v Low Suan Chuan Ors.[17] In this case, the high court applied the Caparo’s test and the courts were of the view that it was just and reasonable to impose such duty of care upon the defendants and held that the defendants in this case had breached such duty of care. Therefore, it is clear that the recent development in Malaysia regarding the standard of care required to establish duty of care is more inclined towards the three-stage approach which is commonly known as the Caparo’s test. The courts in Malaysia had followed the Caparo’s test because this test requires that the damage caused to the plaintiff to be reasonably foreseen by the defendant. The defendant would not owe a duty of care if he cannot reasonably foresee the damage. Therefore, this test more straight forward as compared to the other test laid down earlier. [1](1856) 11 Ex 781 at 784. [2](1883) 11 QBD 503 at 507. [3][1996] AC 923 at 930-931. [4][1932] AC 562 at 580 (HL). [5]Norchaya Talib, Law of Torts in Malaysia (3rd edn, Sweet Maxwell Asia 2011) 98. [6][1970] AC 1027. [7]Dato Mohd Hishamudin Yunus, ‘JUDICIAL ACTIVISM — THE WAY TO GO?’ [2012] 6 MLJ xvii. [8]Thomas Beven, ‘Principles of the law of negligence’ (1889). [9][1978] AC 728. [10]Norchaya Talib, Law of Torts in Malaysia (3rd edn, Sweet Maxwell Asia 2011) 100. [11][1984] 3 All ER 529 (HL). [12][1987] 2 All ER 13, 710. [13][1990] 1 All ER 568 (HL). [14]Norchaya Talib, Law of Torts in Malaysia (3rd edn, Sweet Maxwell Asia 2011) 106. [15][2006] 2 MLJ 389 (FC). [16][2013] 5 MLJ 360 (CA). [17][2013] 4 MLJ 137.

Tuesday, August 20, 2019

Security Metrics Maturity Model for Operational Security

Security Metrics Maturity Model for Operational Security CHAPTER ONE: Introduction In this chapter, the key concepts and definitions by well known security authorities on security metrics is introduced and discussed. Then the issues and motivation that brings about this research topic is explained. Thereafter, the end result which is the objectives is put forth. To achieve these objectives, the goals are briefly outlined. There is also a section that explains the scope of the research and limitations for this work. Finally, the research flow on the chapters is explained. 1.1 Introduction Information Technology (IT) is continuously evolving at faster rate and enterprises are always trying to keep pace with the changes. So does the threats. As the complexity of IT increase, the unprecedented threat environment and security challenges also have increased multi fold over the years. Security Managers and CSOs with the blessings of top management keep investing and on security solutions to protect from ever increasing adversaries. But getting the blessings is not always an easy task for them as management normally does not see the direct benefit. Convincing on security investment is also part of challenges for Security Managers and CSOs. As part of the convincing process, the Security Metrics (SM) plays a vital role in any organization. It helps the management to have a close to comprehensive view of their organizational security posture. SM provides some measurement on how secure the organization is. However, how accurate is the information provided by the SM? Can the management take the SM as a final view of their respective organizational security posture? Can SM ensure the investment made for security is worth? A good SM should be able to answer accurately or provide some qualified response for the questions that management have. SM receiving many attention lately as IT Security is no more an option. With multitude of attacks from adversaries and many regulatory requirements, organizations are spending on security investment to ensure they are protected and stay competitive in markets. The greatest push factors for the metrics awareness are the recent amplified regulatory requirement, greater demand for transparency and accountability. Additionally there are many internal factors that driving organization to justify security investments, security and business objectives alignment and finally to fine-tune effectiveness and efficiency of organizational security programs. Much has been written and researched on SM on various aspects from data collection, analysis to measurement method etc. A considerable number of research efforts have been emerging in best practices, methodologies, framework, tool and techniques are being recommended and adopted to mature the security metrics. However, relatively little has been reported and proven on quality and matured metrics one has to follow and put in practice. Moreover security cannot be measured as a universal concept due to the complexity, uncertainty, non-stationary, limited observability of operational systems, and malice of attackers [VERENDEL V, 2010]. More has to be researched in the area of security metrics. Many interpretations and meanings of Security Metrics have been found on the Internet. Some examples taken from well know publications and researchers are as follows: According to the National Institute of Standards and Technology (NIST), â€Å"Metrics are tools designed to facilitate decision-making and improve performance and accountability through collection, analysis and reporting of relevant performance-related data† [NIST-SP, 2001]. Whereas SANS in its â€Å"A Guide to Security Metrics, SANS Security Essentials GSEC Practical Assignment†, Shirley C. Payne says that â€Å"Measurements provide single point-in-time views of specific, discrete factors, while metrics are derived by comparing to a predetermined baseline two or more measurements taken over time. Measurements are generated by counting: metrics are generated from analysis. In other words, measurements are objective raw data and metrics are either objective or subjective human interpretations of those data†. [SHIRLEY C. PAYNE, 2006] She also further describes what would be considered a â€Å"useful† metric: â€Å"Truly useful metrics indicate the degree to which security goals, such as data confidentiality, are being met and they drive actions taken to improve an organization’s overall security program.† Yet another one practical definition by Andrew Jaquith, states that â€Å"Metrics is a term used to denote a measure based on a reference and involves at least two points, the measure and the reference. Security in its most basic meaning is the protection from or absences of danger. Literally, security metrics should tell us about the state or degree of safety relative to a reference point and what to do to avoid danger†. [JAQUITH (1), 2007] [M. SWANSON, 2003] highlights some of the key uses of security metrics in an organization. They are (not limited to):- Enabling organizations to verify compliance level against internal and external institutions. (e.g. laws, regulations, standards, contractual obligations) and internal ones (e.g. organizational policies and procedures Provide visibility and increasing transparency on accountability with regards to specific security controls and facilitating detection. Provide effectiveness and efficiency of security management by providing better visibility on security posture at high and granular level, helping in security strategies and display trends. Helping management to decide better on security investments in terms of allocating resources, product and services. Having a right security metrics is a paramount in gauging a security posture of an organization. Most of the SM concerns coins from the correctness and effectiveness. Correctness denotes assurance that the security-enforcing mechanisms have been rightly implemented (i.e. they do exactly what they intended to do, such as performing some calculation). Effectiveness denotes assurance that the security-enforcing mechanisms of the systems meet the stated security objectives (i.e. they do not do anything other than what is intended for them to do, while satisfying expectation or resiliency).[BARABANOV et al, 2011] Organizations faced with many security metrics options to be used. The security managers and CSOs bombarded with large set of related, unrelated, heterogeneous security metrics by different source or assets within the organization. How will they make these metrics to be more meaningful and eventually reduce risks and support strategic security decisions? Therefore, the decision makers should be furnished a proper security metrics guidelines that encompass the right type of measurement / data to choose, correct way of analyzing and interpreting and any other recommendations. This research, therefore will explore further on the existing security metrics recommendations currently in practice. In order to improve the current security metrics, more research efforts are needed and focused in the area of good estimators, human element reduction, obtaining more systematic and speedy means to obtain meaningful measurements and better understanding of composition of security mechanisms. [LUNDHOLM et al, 2011] Therefore, this research will explore the identification of quality security elements to determine matured security metrics as there are many areas within IT security that contributes to an organizational security posture. This mainly involves providing weight-age for each and every element. Thereafter the elements are then prioritized and finally sum up to provide a final security posture of an organization. Some of the key domains within security are cryptography, operational security, physical security, application security, telecommunication security and many more. The research will identify elements within these domains that play a vital role in an organization to produce a security metrics report for management. These elements are further scrutinized and qualified to be part of the security metrics. The scrutinization and qualification is done through various researches done by previous researchers. The systematic techniques will provide a guided recommendation for near optimal security metrics for an organization. The key questions for this research will be what is acceptable security metrics element or measurement for a domain? How accurately these parameters are obtained? How effective are they? As a whole how matured are the metrics? How these various elements and parameters can be used to provide an accurate and convincing security posture report for an organization in a practical manner? To go further explaining this research, imagine this scenario: A key security personnel of an organization presenting a finding of the company’s security posture. She/he talking about how good the security in place, how good is the security fortress, how impenetrable the security perimeter and so on. To support his claims he throws some PowerPoint slides with security metrics. The management was like awed and feeling comfortable with the presentation and they felt secure doing their business. But then there are few questions from the floor on the accuracy, quality, completeness and maturity of the metrics. How confidence is the security metrics presented? Hence a proper model that supports the claim is needed. The model will substantiate the claims of the security personnel on her/ his findings. Therefore this research will look into the ways of substantiating by proposing a maturity model. The end result of this research will be guiding principles that leads Security Managers to produce a convincing and close to accurate report for C Level management of an organization. This research will look into various studies done on existing measurements and security elements for Security Metrics and produce a method that will portray the maturity of security metrics used in an organization. 1.2 Problem Statement The lack of clear guidance on security measurements that represent a security posture of an organization has been always a problem despite many researches done in the area. Despite many methods and definition in the area of security metrics were introduced, nothing is strikingly clear that enable organization to adopt and implement in their respective organization particularly in operational security. There are many theoretical and more to academia texts available in this area [JAQUITH, 2007, M. SWANSON, 2003, CIS-SECMET, 2012]. Organizations still lack of precise knowledge of practicable and effective security metrics in the operational security settings. 1.3 Motivation There is an obvious need in guiding organization to the right direction in implementing their respective organizational security program. There is paucity exist in the mode of guiding process for organization to implement security program with the right metrics to monitor their operational activities. The main incentive behind proposing a matured security metrics for operational security is a workable solution and guide for matured security metrics for any organization. Organizations need a model to look into the type of metrics used in their security program and a model to chart their metrics improvement program. Hence the solution will be an asset for organizations in implementing reliable and practical security metrics. This paper will answer question like â€Å"Are incidents declining and improving security over time? If yes or no, how reliable are the answers?† Is my metrics are correct and reliable if not how can I improve it? Further, the paper will provide some practic al top down approach in approaching security metrics in an operational environment. Another motivation for this paper is the findings from the [PONEMON, 2010], who claims many researches lack of guidance, impractical in operational environment and purely formal treatment as no empirical support as a whole. In the end, through some findings of this paper, organizations will be able to gauge the return on investment on security investments. They should be able to measure successes and failures of past and current security investments and well informed on future investments. 1.4 Objectives The problem statement and motivations bring the objective for this work. The objectives for this project will be: a. To provide security metric quality taxonomy for operational security b. To devise methods for matured security metrics for operational security To achieve these objectives, the methodology and goals used for this work would be: Conduct a literature review on existing research works and state of the art Identify the key operational areas based industry expert inputs Develop a taxonomy based on the key operational areas Identify the key criteria or parameters that make a good quality metrics Identify on how to categorize or rank the metrics to represent the maturity of a metric Develop a method to guide for a quality security metrics Develop a metric score card to represent maturity level Develop a Security Metrics Maturity Index (SM-Mi) 1.5 Scope of Work For the purpose of this research only a certain area of operational security is identified. Also to be more focused, to give a better view and example, we will choose few important and popular metrics among security practitioners. The research is aim to provide a very practical approach in operational security metrics for an organization, but is not meant to be treated as an exhaustive guide or resource. Metrics prioritization is out of the scope of this research as organizations have various different business objectives and goals. These decide and dictate the type of metrics to be used and emphasized as such metrics will not be discussed [BARABANOV, 2011]. 1.7 Thesis Layout The research consists of 6 chapters; the first chapter will describe some security concepts and motivation for this topic. The second chapter will delve into the related works done in this area. This chapter will identify some key research findings and what is lacking in them and how some of the information will help for this thesis. As for the research methodology and proposed framework, chapter 3 will explain this. Chapter 4 will identify and explain in detail the formulation of proposed metrics and taxonomy for operational security in the form of techniques. Meanwhile Chapter 5 will discuss a case study based on the solution proposed. Chapter 6 will be a brief chapter that summarize the research and will discuss on future direction of this research.

Monday, August 19, 2019

Stubborn Pride in The Stone Angel :: essays research papers

In the novel there is mention of the war cry of the Curries, â€Å"Gainsay who dare!† (15). Such a translation may be "Oppose me (us) if you dare to." There is a very predominant theme of stubborn pride in The Stone Angel, which makes the novel sententious to its readers. Pride refers to a strong sense of self-respect, a refusal to be humiliated as well as joy in the accomplishments of oneself or a person, group, or object that one identifies with. Proud comes from late Old English prud, probably from Old French prude "brave, valiant". There are destructive and constructive effects of stubborn pride in that pride is a double-edged sword and separates inclination and response. There is a certain amount of pride that goes along with social status. Jason Currie was a "self-made man" who "had pulled himself up by his bootstraps" (7). Hagar was very proud of her father's success, on account of "he had begun without money" (14). Hagar stated, "Father took such pride in the store - you'd have thought it was the only one on earth. It was the first in Manawaka, so I guess he had due cause† (9). Hagar recounts the Stone Angel as being "my mother's angel that my father bought in pride to mark her bones and proclaim his dynasty†¦" (3). Hagar's father was an extremely proud man, a trait that was inevitably passed on to his daughter, and he took great pride in this "terribly expensive" statue, which "had been brought from Italy" †¦ "and was pure white marble" (3). Hagar calls to mind displaying her pride as young as age 6 when she says, "There was I, strutting the board sidewalk like a pint-sized peacock, resplendent, haughty, hoity-toity, Jason Currie' s black-haired daughter" (6). The Currie's thought very much of themselves, this is shown when Hagar speaks of her father, saying, "Matt and Dan and I always knew he could never have brought himself to marry his housekeeper" (17). All too often though, pride can be the defining trait that leads to the tragic hero's tragic downfall. Excessive pride also materializes itself as arrogance. It interferes with the individual's acceptance of the grace of God, or the worth which God sees in others. As Mr. Troy asks Hagar, â€Å"Don’t you believe, in God’s infinite Mercy?† (120), she replys â€Å"What’s so merciful about Him, I’d like to know?† (120). Hagar had developed such pride in herself that she had even let go of God, or the fact that she needed God.

Sunday, August 18, 2019

Power in Shakespeares Macbeth :: GCSE English Literature Coursework

Power in Macbeth There are many different types of power that a person may have. Some of the time, however, the person in that power is not the best person to be in that power. This is especially true in William Shakespeare's Macbeth. Throughout the course of the play, the Three Witches and Lady Macbeth are the people with the most power over Macbeth's life. The more power that a person has, the more corrupt they become. Many different people in Macbeth have power, and there are different ways to be powerful, Usually, men are the ones who are outward and aggressive about it, and women are more subdued about it. Lady Macbeth has a great deal of power over Macbeth the power which she holds over him, is the fact that she possesses more of the "manly" quality than Macbeth himself does. Because of this, Macbeth is ashamed of himself. As a result of Macbeth's shame, he attempts to do everything in his power to prove himself to Lady Macbeth. He is attempting to prove himself to Lady Macbeth, because she obv iously has her doubts, "When you durst do it, then you were a man,/ And, to be more than what you were, you would/ Be so much more the man." (1,7,54-56). As a result of Lady Macbeth's doubts and mocking, Macbeth finally murders Duncan in a final attempt to prove himself to Lady Macbeth. Although Lady Macbeth was successful at convincing Macbeth to murder Duncan, the Three Witches were the people who made it all possible. The Three Witches hold the ultimate power. If the Three Witches had indeed not informed Macbeth about what was to be, then be would not have repeated the Three Witch's prophecies to Lady Macbeth, "All hail, Macbeth! Hail to thee, thane of Glamis!/ All hail, Macbeth!/ hail to thee, thane of/ Cawdor!/ All hail, Macbeth! that shalt be king hereafter." (1,3,50-53). In turn, if Lady Macbeth had not been informed about the prophecies, she would have never expected Macbeth to murder Duncan in a desperate attempt to fulfill the prophecies. On the other hand, the Three Witch es not only gave Lady Macbeth the opportunity to alter Macbeth into the tyrant which he now is the Three Witches also led Macbeth to his downfall soon after Macbeth came into power. How the Three Witches accomplished this, was they made Macbeth feel over-confident, "Be lion- mettled, proud, and take no care/ Who chafes, who frets, or where conspirers are:/ Macbeth shall never vanquish'd be until/ Great Birnam wood to high Dunsinane hill/ Shall come against him.

Saturday, August 17, 2019

Power of Women in the Epic of Gilgamesh

Anthony Sales Ierfino The Power of Women Imagine a woman so beautiful she had the power to tame wild beasts with one look at her voluptuous body. In â€Å"The Epic of Gilgamesh†, Gilgamesh’s temple priestess has the power to do just that, she tames Enkidu. Ishtar, when denied by Gilgamesh, threatens to â€Å"let the dead go up and eat the living† (10). In this epic, women represent great power, wisdom and finally temptation and evil. In the epic, the woman symbolizes different things.One of these is how woman use the power of love (sex) and temptation to attain a certain goal or task. When the trapper’s son tells his father of Enkidu, his first and immediate instinct is to send for Gilgamesh’s temple priestess, Shamhat, so she can seduce him and â€Å"have her take off her robe and expose her sex† (3). Upon seeing Shamhat’s voluptuous body, Enkidu loses all his wild and animalistic instincts. He then makes love to her for six days and seven nights, as â€Å"she was not restrained, but took his energy† (4).Having had sex with the harlot, Enkidu is humanized and in turn is rejected by the animals he grew up with. Shamhat not only proves that sex and temptation are powerful tools (or weapons), but that the woman is even more powerful because she holds such â€Å"powers† (sex and temptation). Not only Are women powerful, but in the Epic, they are portrayed as evil. Ishtar, goddess of love and war, is portrayed as a selfish and uses her power of seduction for evil.Princess Ishtar asks Gilgamesh to marry her, telling Gilgamesh â€Å"Be you my husband, and I will be your wife†¦Ã¢â‚¬  (8). Gilgamesh replies by not only insulting the princess but by recounting her past lovers and how she has loved them only to turn on them, â€Å" You loved the colorful ‘little Sheperd’ [Tammuz] bird and then hit him, breaking his wing, so now he stands in the forest crying ‘My Wing’! † (9). He then, ends his reply by saying she loves him now, but she will only turn on him.Ishtar, embarrassed and deeply angered, goes up to the heavens going to her father Anu asking for him to let her unleash the Bull of Heaven so he go down and kill Gilgamesh. When Anu simply states that Gilgamesh did nothing wrong, Ishtar threatens that if she does not get what she wants she will â€Å"knock down the Gates of the Netherworld†¦and will let the dead go up to eat the living! † (10). Despite a warning from her father that no crops will grow for 7 years Ishtar is undeterred. This shows how, Ishtar, is selfish uses her power of seduction on Gilgamesh.But when rejected, she is blinded by her fury and willing to do anything to get revenge even if it means the deaths of innocent men. It is clear that women are portrayed in a certain way in the Epic of Gilgamesh. This is due to the position they held the social hierarchy of the day. They were portrayed as beings with the power of seduction whether they had good intentions or evil intentions were completely up to them. This is why they were treated as mere objects that must be controlled by man.The temple priestess, for example, held much power, she was the representative of God on earth, not only this but it is she who ensures there will be a good crop, whether or not the king will be successful in battle. In this instance the Temple Preistess, Shamhat, sent by Gilgamesh to tame and eliminate the threat that is Enkidu. Secondly how Ishtar, after attempts to seduce Gilgamesh and fails, blinded by rage and selfishness, wreaks havoc on the innocent people of Uruk as she attempts to get revenge on Gilgamesh.

Samsung Corpotate Strategy

Samsung Company Overview Samsung Company is a world leader in digital technology innovation. Samsung believes in innovation and continue to look after the new technology to grow their business. I believed that company wanted to build a market in which customers are more loyal to the Samsung brand and trust in the name of Samsung. â€Å"SAMSUNG is dedicated to devel-oping innovative technologies and efficient processes that create new markets, enrich people's lives, and continue to make Samsung a digital leader† http://www. samsung. com/hk_en/images/aboutnew/corporateprofile/title_txt. if Samsung accomplished its success through the strategy of how to manage creativity, partnership with venders, and talent. Samsung is not only expanding in electronics but also expanding into other industries such as health care, medicine, and biotechnology. Samsung’s mission and vision will make Samsung a cutting edge company. I would say Samsung is the creator of the future of electroni cs. Samsung is among the world’s top five electronics brand and has $400 billion in revenue. The mission of the company explain everything â€Å"As stated in its new motto, Samsung Electronics' vision for the new decade is, â€Å"Inspire the World, Create the Future. This new vision reflects Samsung Electronics’ commitment to inspiring its communities by leveraging Samsung's three key strengths: â€Å"New Technology,† â€Å"Innovative Products,† and â€Å"Creative Solutions. † — and to promoting new value for Samsung's core networks — Industry, Partners, and Employees. Through these efforts, Samsung hopes to contribute to a better world and a richer experience for all† (http://www. samsung. com/us/aboutsamsung/corporateprofile/vision. html) Micro and macro environment for Samsung globally Porter’s five forces: The Threats of new entrantsThere is always a potential threat for Samsung that a new company will enter into th e market. Most of the companies find outsourcing company in China and label its brand. Only thing they have to do is to formulate a marketing strategy and distribution channel. Today’s global economy is depended on China. China is called world’s factory. Most of the products are manufactured at very low cost in China. Electronic companies like HP, SONY, DeLL, Gateway, Apple, and many others used China’s manufacturing industry. So there is always a threat of new entrants into the electronics market. MANILA, Philippines – The Philippine electronics industry attracted $2. 477 billion in fresh investments in 2011, the highest ever, and the new projects are expected to generate an estimated $5 billion in additional export revenues annually once they go into full commercial operation† (http://www. abs-cbnnews. com/business/02/21/12/electronics-industry-attracts-24b-investment). The Bargaining Power of Buyers Electronic world is changing everyday and in th e market there are many types and many verities to pick one from. Even it’s very difficult for a customer to find the best one with very competing prices to each others.Most of the individuals are price sensitive they can check the prices on line and fine the cheapest price before making any decision. Institutional buyers are more quality sensitive than price. Most of the companies focus on corporate customers. There is a completion in the market. The Bargaining Power of Suppliers Intel is leading in microprocessors it provided 85% of CPU so the power of suppliers is high because of low number of competitors in the market. Different companies produce different kind of products. Hard disk producers are many in the market. The power of suppliers is quite low because of many competitors in the market.Threats of Substitutes In the changing technology world, there are many substitutes available to the customers to choose one. Companies like Samsung have to keep the quality and pri ce up to the customer expectation. Samsung should understand the need and demand and desire of each group of customer. Samsung interviewed customers to check the water. The Intensity of Rivalry among Competitors Samsung group has many competitors in the global electronic world. The brand name competitors of the Samsung are LG, SK, Matsushitsa, Micron, Sony, Apple, Kyobo Life Insurance, Meiji Life Insurance, Sumitomo Life Insurance, Hp, Dell.SWOT analysis of Samsung Strengths †¢Electronics Product line and investment in other industries such as life insurance and biotech etc. †¢Heavy investment into R and marketing strategies. Company has more than one dozen R centers around the world and its 138000 R team members are working hard for the company’s success. †¢Leader in electronics especially in cell phone and more or less 60 other products. For example DVD, Ac, LCD, and Refrigerators etc. †¢Supplier of HD, DRAM, SDRAM, Memory Sticks, and semiconductors. â⠂¬ ¢Decision making process of the company. †¢Samsung provide better guarantee and service than its competitors.Weakness †¢Some of the Samsung products are not user friendly. This factor is keeping Samsung behind in the Global electronics market. For instance there are many draw back in digital camera Samsung S860. First of all the lens of this camera turn off automatically after 30 seconds. †¢Company invested too much into the R but need to spend on marketing. †¢Competitors spent on advertisement heavily but Samsung can’t explain introduce its products via advertisements. †¢Need to improve the battery life of many of its products. Opportunities †¢Globally the demands for electronics are increasing quickly.In the digital world everyone like to have his or her own cell phone and a laptop. †¢Need more production according to the market. †¢Market share can be increased in ASEAN regions, it is increased by 32. 7% during the year 2006. †¢Cell phone market is very big and expanding by the time, this is the industry where Samsung should invest more. †¢Samsung has the competitive prices. The growing markets like India, China and Brazil are very price sensitive. Threats †¢Prices of the electronics are decreasing 10% annually that is a threat to most of the electronic manufacturer in the industry. †¢Entry of new products every day. Green products and environmentalists organizations. †¢Restrictions on usage of lead, cadmium, mercury and flame retardants products. †¢R need to pay attention while developing a new product previously Samsung paid $134 million Inter Digital because Samsung lost a patent dispute. Similarly Ericson filed a lawsuit against Samsung. †¢Counterfeiting products are the major problem for any company in the world. Duplicate product’s annually revenue is more or less U$500. †¢It’s always a threat when outsourcing any product to a country like China wher e law is not well implemented to protect the patent rights.Samsung and Business Environment of Canada Study shows that Canadian customers prefer a better quality than price. Customer demands better guarantees and return policies. Canadian population is considered one of the educated nations in the world. Canadians welcome new technologies and love to learn. Sony is the first one who invented color television, and played a leading role in the world of electronics. Most of the Canadians like Sony brand and pay the high price. Sony is very much dominated the Canadian market, the price is high and products have conventional design.Samsung can penetrate the market with better advance stylish designs and lower price and better guarantees. I believed that will take time to take over the Canadian market. â€Å"We’ve been No. 1 in TVs since 2006 in Canada,† Politeski says. â€Å"In Canadian living rooms, there are an awful lot of Samsung TVs. So the brand name — whether it’s on TVs or appliances or mobile phones, any of our product categories — continues to grow momentum, and consumers become more and more interested in it. How do you become No. 1 in any category? Attention to what the customer thinks is most important† (http://business. financialpost. om/2012/05/01/samsung-aims-to-dethrone-apple-in-smartphone-market/). With Sony Canadians have no other choice if SECA use a right marketing strategy it’s possible that Samsung can win people opinion and market share. SECA should carefully formulate strategy on the target market, segmentation and repositioning the product. SECA can use demographic segmentation and divide market into four groups. Low income families, group of people who are price sensitive. High income families, group of people who prefer quality over the price. Young generation group, who prefer new innovations and technology advancements.They buy products when it comes first in market and pay the full pric e. The old generation group those people buy when they need and are very price sensitive. Business user group those people are less price sensitive than quality, customized products and guarantees. Hobbyists is a group who like to buy new innovations which can satisfy their hobby quest. SECA can differentiate its products from others buy innovating user friendly and cost effective products for everyone. SECA should listen their corporate customers and customize their product according to their needs. â€Å"Canadian expansion strategy will be on full display.Following in the footsteps of rivals Sony and Apple, Samsung plans to open several stand-alone retail locations across the country, as the company attempts to strengthen its direct relationship with consumers† (http://business. financialpost. com). SECA should use 4P’s of marketing to achieve success in Canadian market. Product; brand strength could be achieved by producing better products and user friendly products . It could be done by producing stylish and durable cell phones, brighter and bigger flat screen TV’s, cost effective, energy efficient, durable AC, refrigerators, and other electrical home appliances.Place; Samsung should open its own retail stores across the country. Currently Samsung use distribution channels those are Best Buy, etc. Samsung should use online and on site distribution channels. Price; There are variance in the Samsung’s prices and discounts which creates confusion in the market. Samsung have to pay attention on the pricing strategy of its products. Promotion; Samsung should invest more in advertisement and promotion in Canada. With the help of advertisements a company conveys its message to the customers.A right advertisement and promotion would be a key to success in the Canadian market. Canada could be a tough market for Samsung if the company will not redesign its marketing strategy. Canadians are more loyal to SONY brand. To compete the electroni c giant like SONY, Samsung should adopt a better strategy that produce a better product, price, placement and promotion. Samsung Corporate and Global Strategy I agreed more or less with the Samsung’s corporate strategy and global strategy. There are few steps need to take in Samsung’s corporate and global strategy.I will discuss about why I like Samsung’s corporate and global strategy. Business Wire of Boston writes about Samsung that it took the 25% of the market share and was star performing during the first quarter of the year 2012. I believe that Samsung is doing something right at the corporate and global level the reason why company became the world’s number one had set vendor. â€Å"BOSTON–(BUSINESS WIRE)–According to the latest research from Strategy Analytics, global handset shipments grew a modest 3 percent annually to reach 368 million units in the first quarter of 2012.Samsung was the star performer during the quarter, capturing a record 25 percent market share to become the world’s number one handset vendor for the first time ever† (http://www. businesswire. com). At first Samsung’s business model was to produce more mobile phone in number, they pay less attention to the quality. By the time Samsung decided that company should produce not only quantity but also better quality to compete in the global market. They accomplished this dream with their vision â€Å"Leading the Digital Convergence Revolution†(www. samsung. com).Chairman of the company Mr. Lee played a dynamic role in the success of Samsung. During the revolutionary strategic change in the company he said that we have to change everything only we will keep our children and wives. It sounds funny but the Chairman Lee changed everything in the company. The new strategy strived more on better look and quality than quantity. The design advisor Tom Hardy helped Mr. Lee’s vision to accomplish. Company’s designe rs had been sent to different fashion and design companies around the world to have a better perspective about the global design.Samsung took advantage from its design centers around the world and become a global electronics name that consumer trust and like. â€Å"If money was the answer to innovation then Samsung Electronics would certainly rank among the best in the world. Samsung spent 10 trillion won ($9 US billion) on research and development in 2011† (http://www. vancouversun. com) Samsung can produce in house semiconductors, LCD screens, and memory plant. This is the reason why company can independently, cost effectively, and