Tuesday, December 31, 2019

Joint Supply Planning For Supply Chain Management Essay

Table of Contents Page No Executive Summary 2 1.0 Introduction 4 2.0 Discussion and Analysis 6 2.1 Collaboration 6 2.1.1 Joint Supply Planning 6 2.1.2 Initiation of Win-Win Relationship with Joint Objectives 6 2.1.3 Magnify OEM- Supplier Partnership 7 2.2 Cost Management 7 2.2.1 Cost Drivers 9 2.3 Proactively Handle Convolution 9 2.3.1 Tracking and Monitoring 10 2.3.2 Transaction Processing 11 2.3.3 Handling and Operations 11 2.3.4 Planning and Decision Support 11 2.4 Develop Tailored Supply Chain to Drive Exports 11 2.5 Development of Key Staff for Supply Chain Management 12 2.6 Enhance Capabilities to Exploit Replacement Parts Segment 12 2.7 Aftermarket Opportunities 13 2.7.1 Parts Consumption Data 2.7.2 Supplier Relationships 2.8 Balancing the Supply Chain 2.9 Facility Selection 2.10 Transportation Route Optimization 3.0 References 1.0 Introduction In the year 2000, automotive industry was going through a major transition globally. This transition in terms of consolidation of networks forced automotive part suppliers to change their working styles and adopt new changes made by automotive industry worldwide. In the long run, these changes can be handled but short-term volatility was creating an environment of uncertainty. Due to this transition, Indian automotive industry was experiencing an interesting evolutionary phase. India being seen as a crucial market of the future by global OEMs. The automotive supply chain needs to play a bigShow MoreRelatedHostel Information System1665 Words   |  7 PagesCASE STUDY ANALYSIS OF EXEL PLC Supply chain management at Haus Mart INDEX TABLE OF CONTENTS Page No. 1. Executive summary 3 2. Problem (Issue) statement 4 3. Data analysis 4 4. Key Decision Criteria 5 5. Alternatives analysis 6 6. Recommendations 8 7. Exhibits 9 EXECUTIVE SUMMARY Exel Plc is the world’s largest third party logistics service provider. The company offers variety of services which can be broadlyRead MoreFactors That Affect India Automotive Supply Chain Essay1339 Words   |  6 Pagesbeing seen as crucial market of the future by global OEMs. The automotive supply chain needs to play a big role in this transition. Supply chain can help companies to get competitive advantage, which means going beyond meeting basic standards of performance such as connecting supply to demand at optimal costs. Following are the issues that can affect India automotive supply chain: †¢ The main concern will be to build a supply chain that can handle long term growth but it is strong, flexible and reactiveRead MoreMaterial Flows And Inventory Policy During Military Scm1484 Words   |  6 PagesMaterial Flows and Inventory Policy in Military SCM According to Major Joshua M. Lenzini in his article Anticipatory Logistics: The Army’s Answer to Supply Chain Management, â€Å"Supply chain management is similar for both corporate and military organizations. However, some significant differences are evident in these models. The first is the absence of maintenance on the corporate model. Another is that transportation, distribution, and warehousing are unidirectional in the corporate model but dualRead MoreCoca Cola And Inventory Forecasting1112 Words   |  5 Pageshas many branches and deals with a whole lot of inventory, there is a need to act proactively and timely so that there are no delays in logistics. Projections of inventory, i.e. inventory forecasting, are often done in the operations and supply chain management so that overproduction and inefficiencies are avoided. Coca-Cola also uses historic data to find out the direction of future trends (Butler, 2015). The process is used by the company to determine near acc urate allocation of budgets for futureRead MorePer Satterlee, Chapter Eight Of Organization Management1338 Words   |  6 Pageschapter eight of Organization Management and Leadership, is about operations management, which is how products or services are provided in the most efficient and effective way. â€Å"Operations management is the implementation of all the functions of management,† (Satterlee, p. 224). This includes where infrastructure may be built, where supplies and materials are obtained, production is scheduled, inventory is managed, and equipment is maintained. Project management takes a leading role within operationsRead MoreThe Supply Chain Of Honda Essay1334 Words   |  6 PagesFrom above, the process of Honda’s supply chain in purchasing is very clear. Firstly, the purchasing division of Honda signs a purchase order with the component suppliers and then these suppliers determines the needed raw materials and sends a demand to Honda after receiving the order. The next is that Honda trading classifies these orders into different materials and signs a purchasing order with these raw materials factories. After then these factories send these raw materials to suppliers. FinallyRead MoreCroc Analysis839 Words   |  4 Pages1) What are Crocs’ core competencies? Crocs’ competencies are supply chain management and small-retailer level marketing, just in time distribution. Crocs has used its core competencies to build a brand familiarity and popularity and to distribute new models and accessories in mid-season. Their supply chain management has helped the company to create a stronger maturity map for their products, and to extend the maturity map through marketing. (Figrure 1. [write a brief description first].Read MoreGeneral Motors E Procurement906 Words   |  4 Pageslarge supply chain. The scope of this supply chain and the role of GM in it is reflected in its annual $63 billion procurement expense. The cost savings associated with e-procurement will be immense. Second, GM’s ability to push adoption of e-procurement by every link of its supply chain raises the volume of sales through its e-procurement system up to $300 billion–$500 billion per year. This will undoubtedly generate further cost savings associated with purchasing across the whole supply chainRead MorePrinciples And Strategic Elements Of Supply Chain Management1323 Words   |  6 Pagesprinciples and strategic elements of Supply Chain Management Supply Chain Management already exists for more than hundred years. It wasn’t defined as terminology for some period of time and it took years to develop it. It began with Fredrick Taylor’s â€Å"The Principles of Scientific Management† that was concentrated on improvement of manual loading processes all the way to Supply Chain Management we have now (Lamprecht, James; Page 180). Because Supply Chain Management spreading beyond location of productionRead MoreAnalyzing Ikea s Growth Of The Firm, Dunning Oli Framework Approach Of Foreign Direct Investment ( Fdi )1325 Words   |  6 Pages(FDI), this essay will also declare several issues may exist in an international business as well as factors should be considered in global supply chain control. Moving on to analyse IKEA s implementation of global supply chain control and emphasize its outsourcing plan, comparing to other corporations what competitive advantage IKEA gain in managing supply chain and outsourcing. Main body: Referring to the leading theories of the firm approach conducted by Edith Penrose (2003) on the endogenous

Sunday, December 22, 2019

Informative Speech Outline Essay - 812 Words

Alissa Jarrar Informative Speech Prof. Dorsey 3/15 Topic: Dubai General Purpose: Tourism Specific Purpose: Attractions, Malls and Hotels I. Introduction A. Attention Getter- Who has ever been to New York City? Who has ever been to Las Vegas? Who has ever been to Miami? Who has ever seen pictures of these places? What if I told you there was another place just like all these places on the other side of the world. Does anyone know of the city of Dubai? It is exactly like New York City, Las Vegas and Miami in one. Dubai’s city is amazing. B. Thesis- Today I would like to inform you about some of the amazing places and things Dubai’s city has, such as their main attractions, malls and astonishing hotels. In a 2006 times†¦show more content†¦III. Malls A. Diera City Centre 1. One of oldest malls 2. Over 300 shops B. Mall of Emirates 1.Ski Dubai 2. Aquarium C. Dubai Mall 1. Biggest mall in the world 2. Over 1200 shops D. Dragon Mart 1. Shaped as a dragon 2. Major flea market Transition: I’ve told you about some attractions and the malls, Finally, I’m going to tell you about the hotels in Dubai and also some major possible future hotel projects. IV. Hotels In the article â€Å"Dubai continues growth as a tourism hotspot† out of the Travel and Tourism News, October 2010 addition states Dubai â€Å"has achieved significant growth in terms of hotel occupancy and tourism arrivals in the first half of 2010, with the number of hotel guests reaching 4,181,326 a nine per cent increase from 3,852,742 guests in the first half of 2009.† A. Burj Al Arab 1. Luxury hotel was opened in 1999. 2. The 4th tallest hotel in the world, it stands 321 meters high and is located on a separate artificial island. Built like a sail 3. At night, the hotel’s exterior is lit by a choreographed show of colors that change every half hour. 4. Huge aquariums, dancing fountains 5. Tiger woods hit golf ball off helicopter pad B. Atlantis 1. This luxury resort is situated on 113 acres, and is considered an architectural wonder 2. Prime location, on the crescent of The Palm Jumeirah, known as the 8th Wonder of the World. 3. This resort features â€Å"Aquaventure† – aShow MoreRelatedInformative Speech Outline802 Words   |  4 PagesInformative Speech Outline I. Introduction A. Thanks 1. Thanks professor Tuckerman for the introduction. B. Salutation 1. Good afternoon ladies and gentlemen. C. Ethos 1. What increases heart rate, causes sleep disturbance, makes people cry, act violent, makes some people sleep more and causes untold aches and pains? It s Wednesday! Six hours of homework to do, babysit the little sister, feed the dog, cut the grass, oh and lets not forget your boyfriend is being a jerkRead MoreInformative Speech Outline1598 Words   |  7 PagesSamantha Audiffred Honors Comm 110 Marieke Spiegelhoff Informative Speech Outline 25 February 2015 Audience Analysis ( ½ page)   Ã‚  Ã‚   The target audience for the informative speech is the honors communication 110 class and the professor. The class makeup is eight males and twelve females for the 20 students. This is a required course for all students attending UW-Whitewater; therefore, the majors and interests of the students will vary greatly. After an activity polling the class, the most popular ofRead MoreInformative Speech Outline2182 Words   |  9 Pageswithout stating to whom these ideas or statements belong to. A student suspected of plagiarism can be given a zero mark, and possibly fail the entire course. Assessment: Impromptu speech 10% Informative speech (15% speech, 5% outline) 20% Show and Tell Poster Session (10% speech, 10% poster) 20% Assignment : Group Interaction 10% Final Examination 40% __________________________________________________________________ Total 100% Read MoreInformative Speech : Speech Outline937 Words   |  4 PagesEmily Murray Informative Speech Outline General Purpose: To Inform Specific Purpose: To inform my audience how Communication Technology is now the face to face human communication; instant, easily accessible and more convenient but you lose a sense of warmth and meaning when all your communication is conducted electronically. Central idea: Humans have always communicated face-to-face and the use of technology poses cognitive obstacles to communication. The lack of human presence during technology-mediatedRead MoreOutline Informative Speech1491 Words   |  6 PagesNAME : Syifa Fadhilah Hamid CLASS : 12 DBM SUBJECT : Outline Informative Speech SPECIFIC PURPOSE : to inform my audience about Deja Vu CENTRAL IDEA : to inform my audience about the theory of Deja Vu. Including what, how and the effect about Deja Vu . INTODUCTION: Attention Getter : I can’t remember any things well while I thought something happened to me, I feel like I ever seen something but I don’t know when it was or where it was. And I also feel like I’ve been somewhere but I don’tRead MoreInformative Speech : Speech Outline1006 Words   |  5 PagesInformative Speech Final Draft Outline I. Introduction A. Attention getter: How many you have ever had a car accident or someone you care about had a car accident? B. Background and Audience Relevance: According to National Highway Traffic Safety Administration, in 2015, about thirty-five hundred people were killed, and four hundred thousand were injured in car crashes. Oral Citation 1: NHTSA, govt website, 2015. C. Speaker credibility: Many of my close family members have been in car accidentsRead MoreOutline Informative Speech1502 Words   |  7 PagesNAME : Syifa Fadhilah Hamid CLASS : 12 DBM SUBJECT : Outline Informative Speech SPECIFIC PURPOSE : to inform my audience about Deja Vu CENTRAL IDEA : to inform my audience about the theory of Deja Vu. Including what, how and the effect about Deja Vu . INTODUCTION: Attention Getter : I can’t remember any things well while I thought something happened to me, I feel like I ever seen something but I don’t know when it was or where it was. And I also feel like I’ve been somewhere but I don’t know whenRead MoreInformative Speech : Speech Outline1066 Words   |  5 PagesInformative Speech Outline I. Introduction a. Attention Material a. Raise your hand if you have or are currently working retail. b. According to Quentin Fottrell, from Market Watch, â€Å"Nearly 4 out of 5 U.S. students†¦ work while in school.† b. Tie to Audience a. Many of you have most likely experienced working retail or know someone who has. c. Credibility a. I recently worked 9 months in Bath and Body Works, so I am well aware of all of the horrors of working in retail. d. Thesis a. Working inRead MoreInformative Speech Outline1175 Words   |  5 PagesInformative Speech Outline Speech 131 Author’s Note: This research is being submitted for Title: Taxes Made Easy! Specific Purpose: To inform my audience about how to use the 1040EZ tax form. Central Idea: Today, I hope to make tax season easier for you by demonstrating to you how easy it is to fill out and file the 1040EZ income tax form, if you qualify. Introduction Stanton Delaplane once joked about the IRS, saying he heard it had suggested a simplified tax form with onlyRead MoreInformative Speech Outline1104 Words   |  5 PagesBCOM-3950 October 21, 2015 Informative speech outline Specific Purpose: To inform the audience how to enhance credibility when making conversation at work-related social events. Central Idea: To inform my classmates how to enhance credibility when making conversation at work-related social event by engaging in a conversation, being honesty, and keep confidences. Introduction: I. Today I would like to inform you on how to enhance your credibility when making conversation at work-related

Saturday, December 14, 2019

Does Television Advertisement Have Positive Impact on Consumer Free Essays

You must have at least once in your life seen television advertisements which made you feel bored and decide that you would never buy these products. In fact, television advertising becomes an indispensable part in marketing strategies. No doubt, there are many commercial advertisements that produce good responses right after its first broad cast. We will write a custom essay sample on Does Television Advertisement Have Positive Impact on Consumer or any similar topic only for you Order Now However, nowadays, consumers are very easy to â€Å"allergic† to the advertisements that they do not have feelings. Television advertisements cause negative effects to consumers because they not fit consumers’ spending habit and thinking, use images that are annoying, and never tell all the truth about products. BODY: Many companies use television advertisements to penetrate the market but they did not succeed. The reason was that they forgot the key principle in marketing which is to put yourself in the consumer’s situation. According to Issabelle Szmigin, The act of consumption by people is very different to the picture sometimes produced from studies of consumption. It is one of the reasons why some brands continue to live a charmed life and others cannot. Children, for example, can respond positively from this generation to the next generation with the same toy and refuse others after a few months of interest. On the other hand, as is the case of Novo, the company very clearly get wrong strategies and retrenches but still become successful in the domain of health care, while some other brands are removed for more complex tactical and strategic reason which the consumer will never know about. In fact, you can see many television advertisements, that aired in the time period are very annoying, especially is midnight. Try asking, at this time, how many people will have to sit before the television waiting to see them. Besides that, many advertisements are very complex and have many details that made the audiences have to think. This causes customers to feel uncomfortable with the product. The important thing here is the television advertising does not suit the consumers’ spending habits, thoughts, so their failure in the market access is inevitable. For years, massive advertising appears on television. Besides the good advertisements, there are many advertisements that using crude images, loss of culture. We still know that the advertising are necessary, but the culture in advertising even more important. Especially, with mothers who are raising young children, advertising is an effective solution in helping children eat and learn, so they require a lot from advertisements. According Scott Ward, the extent to which children attempt to influence parental purchasing is very big. His research also reports data from mothers of young children, concerning their perceptions of the frequency with which television commercials influence their children to want advertised products, and the extent to which parents yield to children’ s purchase influence attempts. (Report Number 1, Effects of Television advertising on children and adolescents, 1971, p. 5). Mother’s decision to purchase much influenced from their children. The choice of image ads is extremely important but in fact, many marketers forgot this issue. There are many ads that use bad images that are not effective to influence the thinking of the children or attractive to them. And of course, the mother would never buy that product. Culture advertising is not only promote the manufacturer’s brand, distribution in the masses in order to sell more goods, but also help consumers select product that suit with their needs. Besides that, culture advertising is the respect of consumers. Thus, television advertising has caused negative impacts on consumer if bad images are used, making viewers allergic to those products. How to cite Does Television Advertisement Have Positive Impact on Consumer, Essay examples

Friday, December 6, 2019

Sociological Versus Metascientific Risk Assessment †Free Samples

Question: Discuss about the Sociological Versus Metascientific Risk Assessment. Answer: Introduction IT risk management is a risk management method in which information technology is assessed to identify the risks it poses or exposes a company to while being utilized. In a business or firm IT risk can be considered as part of a full scale enterprise risk management system (Crockford, 1986). An information security management system which is present in a company which is continually updated and maintained is a sign that the company has setup the necessary resources in helping to identify, manage and assess information security risks. IT risk management involves the assessment of not only the negative effects of using technology in a company but also the benefits that may be accompanied with it (Verin Trumper, 2007). Decision theory should be utilized when assessing risk because it is something that is comprised of a lot of uncertainty. IT risk management as with all forms of risk management should be done continuously to ensure that the information obtained is updated. This is becau se there are changes which are ongoing all the time that can affect a company and therefore for IT risk management to be effective the process of analysis of risk should be continuous to ensure the company can be able to avert a lot of risk when it faces a problem (Katsicas, 2009). Organizations should have in place an enterprise risk management system (ERM) which is very comprehensive. There are four main categories which should be addressed when implementing an enterprise risk management system. They are operations which focuses on the effective use of resources in an organization, compliance which ensures the company is compliant with the legal regulations and laws that are applicable to it, strategy which ensures the systems support are in line with the mission of the organization and financial reporting which ensures financial records are reliable (Flyvbjerg Budzier, 2011). IT risk management encompasses all these categories and therefore plays a critical role within an organization to ensure risk is kept at manageable level in a company. Risk sensitivity and risk appetite should be a guiding in factor within the IT risk management process (Taylor VanMarcke, 2002). Companies are now not being faced with lawsuits due to such cases because it has been stated in the law that all individuals including their employees are not to handle any handheld device while driving. If a company has blocked social media sites their employees can be able to access these sites using their personal devices. They can engage on social media as usual but if there is a case such as racial discrimination on social media which was instigated by an employee while at the work place the company is liable to any damages that may have been caused by the employee (Roehrig, 2006). An unknown device which is lost and found and used within a company can be a major risk factor. The device might contain unwanted information which might put the company at risk of having legal problems. These devices are also used by individuals who have malicious intent against the company or have purposed to carry out corporate espionage. It is therefore very important for the company to ensure tha t it has a strict policy which restricts employees from using their personal devices as they work (Antunes Vincente, 2015). The personal devices pose a major risk factor and are best avoided when at the workplace to ensure the level of risk that may come from them is minimal or none at all. Financial institutions such as Aztec usually have to adhere to the set industry or government compliance or regulation. This is mainly to ensure that such institutions operate within the law by acts such as ensuring they safeguard the data and finances of their clients Kasperson, Renn, Slovic, Brown, Emel et al., 1988). The presence of government or industry regulations ensure that any financial institution such as Aztec which may be in operation follows the set standards as it carries out its mandate. The regulations are created in a way that will reduce risks in which clients may have to face by setting up key standards in which the institution should adhere to while in operation. The regulations also ensure outsourced operations are evaluated before being given out to find out how much risk a financial institution can have when it gives out it work to a third party. Financial institutions such as Aztec handle a lot of sensitive information which belongs to its clients and sharehol ders. In the advent of various digital breaches and ransomware attacks governments and other regulatory bodies have had to enact stringent policies that ensure these financial institution invest heavily in keeping their data secure (British Standard Institute, 2006). It is a good approach both for the financial institutions and their clients. Reviewing of the risks which are posed when individuals are allowed to bring and use their personal devices at Aztec will demonstrate the importance of the IT risk management process and the benefits it has to a company. It will also shed light on the security posture of Aztec. IT risk management includes a number of processes which are undertaken by a company to establish the potential risks they face and how they can be able to mitigate them (ISACA, 2006). The first step involves establishing some context that can be used for the risk assessment. In this stage or process all the relevant information that pertains a company in our case Aztec is acquired followed by the scope, purpose, boundaries and basic criteria of the risk assessment being established (Technical Standard Risk Taxonomy, 2009). In this stage also the organization which will carry out the risk assessment is determined. The gathering of required information based on the scope and purpose of the risk assessment will h elp the individual performing the task to determine in which areas they are going to assess risk so that they may deliver on their mandate. Aztec has commissioned an IT risk analysis expert to assess the risk and impact which faces the company when employees are allowed to user their personal devices such as tablets, mobile phones and laptops as they work and carry out their mandate in the organization. Purpose of Risk Assessment The purpose of establishing context is to ensure that all the legal procedures and requirements are followed and evidence of this should be provided so that the whole IT risk assessment can be certified as a legitimate and trustworthy process (IEEE, 2006). Context establishment is also done to bring strategic value to the business from the information which will be acquired. This means that the risk assessment should be of benefit to the strategic plan of the business by indicating what kind of risks they can take and those that they cannot afford to take. Stakeholders and shareholders in an organization are the people who own the company. The company may have employees and a chief executive officer but these employees all work for the shareholders. The shareholders have invested their money in the organization because they believe in their mission and vision (Lacey, 2011). They also want to turn a profit from their investment. The shareholders invest in the company with the expectat ion of making a profit but with investments come risks. The risk assessment will give the shareholders more insight on the risks the company might face. It will also give the shareholders confidence in the company being able to bring them a profit or dividends while growing their share value (Korstanje, 2014). A risk assessment also enables an organization to establish a baseline which can help them determine the negative consequences which can befall them and to what extent their reputation can be damaged (Verin Trumper, 2007). Information technology being known as a critical resource within any organization helps in running most of the systems in a company. IT risk assessment is therefore a key factor while doing a risk assessment because it is an underlying factor in most of the operations of an organization. The constraints in which an organization faces are also documented and collected for use in guiding the risk assessment process (Spring, Kern Summers, 2015). The constraints may include cultural, technical, political or budgetary constraints. Risk management deals with continuously analyzing, controlling, implementing, monitoring and planning of the measures that a company has implemented to ensure that the security policy is maintained and enforced within a company. Risk assessment is usually carried out on demand or once a year until a clear view of assessed risk can be established. The risk assessment as established was to determine the risk factors that come with employees bringing their persona l devices to the workplace and using them in work related tasks. After the risk to be assessed has been identified the next step is to perform a risk estimation. Risk assessment in relation to information security field can be done through two methods. These methods are the qualitative and quantitative method. Quantitative risk assessment is the act of performing mathematical calculations that are solely about the security metrics of an application or a system (Lieberman, 2009). In quantitative risk assessment each risk scenario that is being assessed is based on a collection of risk factors which lead to the establishment of a single loss expectancy (SLE). After the single loss expectancy is established the annual loss expectancy can be known by finding the product of the annual rate of occurrence and the single loss expectancy based on the probability of a certain event occurring in a set period such as in a year which is the annual rate or occurrence (ARO). When performing a quantitative risk assessment it is a key factor to note that the total value of all the assets of a company are considered rather than the specific resource which was affected by a problem. From the risk assessment being done at Aztec we can demonstrate quantitative risk assessment by understanding that when employe es bring their own devices to the work place they not only expose their devices to risk but they also expose any company or relating data that has passed through their device. The company can be legally liable for any damages such as loss of confidential data or any other issues that pertain to the use of the employees personal devices as they work (Hubbard, 2009). Qualitative Risk Assessment Qualitative risk assessment is a risk assessment process which is utilized when an organization needs a risk assessment to be performed based on some certain constraints in which they may have. These constraints may include the company having a small budget to perform the risk assessment, the company needing the risk assessment to be performed in a short period of time, when the individuals performing the risk assessment are not equipped with the necessary skills such as financial, mathematical or risk assessment experience to perform a conclusive risk assessment or there is an absence of a significant amount of data which may be crucial in performing a comprehensive risk assessment. The main difference between a qualitative and quantitative risk assessment is that a qualitative risk assessment can be accomplished with the use of less data and shorter time periods as compared to the amount of data and time needed to accomplish a quantitative risk assessment (Hallenbeck, 1986). Qualit ative risk assessment are implemented through holding interviews with the involved stakeholders. In our case interviews can be performed on individuals or employees who use their personal devices at the work place as they do their mandated tasks (OBrien, 2002). Qualitative risk assessments are usually compared based on the description versus its measurable extent. In a risk assessment process a qualitative classification is performed which is later followed by a quantitative evaluation between the costs incurred in implementing security measures compared to the highest risks present. Risk estimation comprises of assessing the consequences of how a risk or problem has impacted an organization. This can be done through valuing the assets in which the company holds. It is also done through assessing the chances in which a risk might occur through vulnerability and threat valuation (Flyvbjerg, 2003). Lastly the chances of a risk occurring are recorded in the measured estimates and the consequences which are accompanied with the risk occurring. A risk registry is a document which contains information on all the risks discovered and the value levels of these risks. Risk evaluation is the process of comparing the risk levels obtained from the risk assessment process against the risk acceptance criteria which the company has specified and prioritizing the risks identified with risk treatment indications (Mayo, 2011). Risk mitigation is the process of evaluating, implementing and prioritizing the necessary steps or actions which are recommended to reduce risks which have been identified in the risk assessment process (Lerche Glaesser, 2006). The removal or elimination of risk is a task which is not practical or is hard to achieve. Senior management and other top management within an organization should utilize the least cost approach to have in place the controls which will be appropriate in controlling or reducing the risks which have been identified to reach a level that is minimal or acceptable such that it does not have any adverse impact on the mission or resources of an organization. In an organization such as Aztec there are measures in place to control which employees have access to what kind of information. The problem is that for any employee to play their needed role in carrying out their mandate within the company they needed to be given access to the resources and assets of the compa ny. If an employee used their personal device to login to the company database or system they might put the company at risk. This is because their personal device has not undergone any form of screening or testing to establish whether it is safe for use within the company (Simon Hillson, 2012). Data security is a key aspect in any organization because their data is a valuable resource to them. Data in an organization which is a financial institution such as Aztec is very important and if this data it tampered with or accessed by unauthorized personnel it can become a great risk to the company because they might incur a lot of costs and legal problems (Rob, 2016).. The equipment used by an organization is usually prescreened and continually patched and updated to ensure that it does not pose a risk which can be capitalized upon by malicious individuals in order for them to gain access to the data in a company. Personal devices which are used by employees have not been prescreened to ensure that they are secure for use in an organization. An employee poses a data risk when they come with their personal devices to use in the company. As soon as they gain access to the company data malicious individuals can use this loophole to again access to company data and demand for a rans om for it or tamper with the data which will cost the company being attacked immensely. Devices in which employees do not know of their origin should also not be used in the company. A device such as a flash disk may contain a virus which affects the computer or system in which it is plugged into. The company can reduce risks concerning data security by having a backup of their data such that when their primary database is attacked they can utilize their backup and continue their operations. The company can also instill a policy which bans employees from using their devices while they do their work (Shrader Westra, 1997). This will go a long way to ensure that the level of risk which might be posed by these devices is reduced immensely. Intrusion Detection Systems The company should also have a firewall in place to ensure that even when employees use their personal devices as they work any malicious software can be blocked from accessing the company system and its resources. The firewall will keep the company system protected and will ensure that the data which is stored on the company database is valid and can be used by the employees effectively as they carry out their duties. The company should also implement vulnerability scanners within their system to ensure that they can detect any risks before they become too severe (Caballero, 2009). Vulnerability scanners are built to regularly check a system for any vulnerabilities present. Unlike a firewall the vulnerability scanner is purposes with checking the system periodically for any suspicious software or vulnerabilities. Vulnerability scanners are important because they enable a company to find any malicious software or system which might have embedded itself within the company system. When employees come with their own devices and use them as they work a vulnerability scanner comes in handy in reducing the risk of the company being affected by any vulnerability or malicious software. The vulnerability scanners can scan their devices and block them from accessing the system to ensure that the risk of affecting the company is reduced. Risk assumption is when a company accepts the potential risks it may face and continue with their business operations as they work on ways to lower their level of risk. Most companies when they encounter a risk usually follow this path because they can work on the problem at hand and still serve their clients (Commoner, 2010). It may however be a risky venture because if the risk gets out of hand they might get into more problems than if they had stopped their operations initially to focus all their resources on fixing the issue. Risk avoidance can be practiced by a company if they deal with the cause of the risk and eliminate it. Risk limitation is the reduction or limitation of risk by having in place controls which can reduce the impact a risk may have on a company. Risk planning is when a company manages risk by coming up with a plan to take care of the risk. Research and acknowledgement is when a company or organization accepts that they are being faced with a risk and they rese arch on methods which can help them correct or rectify the risk. Conclusion A company such as Aztec can transfer risks to its insurers. Transferring risk in such a case to an insurer will ensure that any risk the company is exposed to the insurer can cover them (Dorfman, 2007). This is however a costly venture because the insurer has to be paid hefty premiums depending on the kind of cover the company has taken. Although it may be expensive it can help the company to save its reputation if there is a problem. The insurer will simply step in on behalf of the company and cover any damages the company has been imposed on (Costas, Gritzalisa, Petros, Athsnasois Sokratis, 2005). For a company such as Aztec risk assessment and management should be an activity which is carried out regularly to ensure that the company is always alert of any potential risk that may affect their business. When such a company implements a policy which ensures their employees do not use their personal devices for work related activities or at the work place they can be able to mitigate a lot of risks and vulnerabilities before they become adverse and impact the company largely in a negative way. It is therefore very important for such a company to carry out risk assessment regularly so that they are confident in the integrity of their database. It will also give them confidence to operate in the financial industry since they adhere to the legal requirements concerning risk assessment and mitigation. References Anderson K. (2005). Intelligence Based Threat Assessments for Information Networks and Infrastructures: A White Paper. Antunes R. Vincente G. (2015). A Production Model for Construction. A Theoretical Framework. Buildings. 5(1): 209 228. British Standard Institute. (2006). ISMSs-Part 3: Guidelines for information security risk management. Caballero A. (2009). Computer and Information Security Handbook. Morgan Kaufmann Publications Elsevier Inc. p. 232. Commoner B. (2010). Comparing apples to oranges: Risk of cost/benefit analysis. From Contemporary moral controversies in technology. Pp 64 -65. Costas L., Gritzalisa S., Petros H., Athsnasois N. Y. Sokratis K. (2005). A formal model for pricing information systems insurance contracts. Computer Standards Interfaces. p. 531 -532. Crockford N. (1986). An Introduction to Risk Management. Woodhead-Faulkner. p.18. Dorfman M. S. (2007). Introduction to Risk Management and Insurance. Englewood Cliffs, N.J: Prentice Hall. Flyvbjerg B. Budzier A. (2011).Why Your IT Project May Be Riskier Than You Think. Harvard Business Review. 89(9): 601 603. Flyvbjerg B. (2003). Megaproject and Risk: An Anatomy of Ambition. Cambridge University Press. Hallenbeck W. H. (1986). Quantitative risk assessment for environmental and occupational health. Lewis Publishers Hubbard D. (2009).The Failure of Risk Management: Why Its Broken and How to Fix it. John Wiley Sons. p.46 IEEE (2006). Systems and software engineering Life cycle processes Risk management. ISACA (2006). CISA Review Manual 2006. Information Systems Audit and Control Association. p.85. Kasperson R. E, Renn O., Slovic P., Brown H. S., Emel J. et al. (1988). The social amplification of risk: A conceptual framework. Risk Analysis. 8(2): 177 -187. Katsicas S. K. (2009). Computer and Information Security Handbook. Morgan Kaufmann Publications Elsevier Inc. p. 605. Korstanje M. E. (2014). Why risk research is more prominent in English speaking countries in the digital society. International Journal of Cyber Warfare and Terrorism. 4(1): 8 -18. Lacey P. (2011). An Application of Fault Tree Analysis to the identification and Management of Risks in Government Funded Human Service Delivery. Proceedings of the 2nd International Conference on Public Policy and Social Sciences. Lerche I. Glaesser W. (2006). Environmental risk assessment: quantitative measures, anthropogenic influences, human impact. Springer Lieberman D. (2009). Using a Practical Threat Modelling Quantitative Approach for data security. Lock G. (2017) Public Safety Driving Dynamic Risk Assessment. PS Driver Magazine. Mayo D. G. (2011). Sociological versus metascientific views of technological risk assessment. OBrien M. (2002). Making better environmental decisions: an alternative to risk assessment. MIT Press Rob A. (2016). 3 Types of Security Assessments. Threat Sketch Roehrig P. (2006). Bet On Governance To Manage Outsourcing Risk. Business Trends Quarterly. Shrader F. K. Westra L. (1997). Technology and values. Rowman Littlefield. Simon P. Hillson D. (2012). Practical Risk Management: The ATOM Methodology. Management Concepts. Spring J., Kern S. Summers A. (2015). Global adversarial capability modelling. 2015 APWG Symposium on Electronic Crime Research (eCrime) 1- 21. Technical Standard Risk Taxonomy. (2009). Published by The Open Group. Taylor C. VanMarcke E. (2002). Acceptable Risk Processes: Lifelines and Natural Hazards. Verin L. Trumper M. (2007). Project Decisions: The Art and Science. Management Concepts. Verin L. Trumper M. (2007). Project Think: Why Good Managers Make Poor Project Choices. Gower Pub Co.

Friday, November 29, 2019

How different concentration of enzyme catalase affects the rate of breaking down substrate hydrogen peroxide Essay Example

How different concentration of enzyme catalase affects the rate of breaking down substrate hydrogen peroxide Paper Enzymes are large proteins that speed up chemical reaction. As globular protein, enzymes have a specific three-dimensional shape which is determined by their sequence of amino acids. Despite their large overall size, enzyme molecules only have a small region that is functional. This is known as enzymes active site. The substrate molecule is held within the active site by bonds that temporarily form between the R groups of the amino acids of the active site by bonds and all groups on the substrate molecules. This structure is known as enzyme-substrate complex. Enzymes are classified into several categories, such as hydrolytic, oxidising, and educing. Depending on the types of reaction they control. In this case, the enzyme I will use in the investigation is catalase from celery extract, which is concluding as hydrolytic enzyme. This type of enzyme accelerates reactions in which a substrate is broken down into simpler compounds through reaction with adding up water molecules. Oxidising enzyme, known as oxidises, accelerate oxidation reaction; reducing enzyme speed up reducing reactions in which oxygen is removed. A substrate is the molecule, which can bind into the active of enzyme. In this case, I will use hydrogen peroxide as the substrate. Enzyme works in the same way as a key operates a lock. Enzymes active sites have a particular shape like a lock and only a particular key ( substrate) can fit into that lock. Enzymes are therefore specific in the reactions that they catalyse. This is known as the lock and key theory. In practice, unlike a rigid lock, the enzyme actually changes its form slightly to fit the shape of the substrate. In other works, it is flexible and moulds itself around the substrate. As it alters its shape, the enzyme puts a strain on the substrate molecule and thereby lowers its activation energy. We will write a custom essay sample on How different concentration of enzyme catalase affects the rate of breaking down substrate hydrogen peroxide specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on How different concentration of enzyme catalase affects the rate of breaking down substrate hydrogen peroxide specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on How different concentration of enzyme catalase affects the rate of breaking down substrate hydrogen peroxide specifically for you FOR ONLY $16.38 $13.9/page Hire Writer In this case, enzyme catalse has a specific active site, which just for the substrate hydrogen peroxide to fit in, then the reaction takes place. The reaction involved is hydrolysis. The equation of reaction is: 2H2O2 2H2O + O2 Factor that would affect the reaction: Temperature At low temperature, the reaction takes place very slowly, this because molecules are moving relatively slowly as have low kinetic energy. Substrate molecules will not often collide with the active site, and so binding between substrate and enzyme is a rare event. Therefore, reaction is slow. A rise in temperature increases the kinetic energy of molecules which therefore move around more rapidly and collide with one another more often. This means at a higher temperature, the reaction will take place faster than a lower temperature and an increasing or a decreasing of temperature will affect my reaction and results. For this reason, I will control this effect by using a water bath to maintain the temperature the same during the whole reaction. As enzyme work best at a certain temperature, this is known as optimum temperature. If the temperature is too low, enzyme cannot work properly; if the temperature is too high, this may denature the enzyme active site and enzyme will lose its function. So to avoid this problem, I will keep the water bath has the temperature of 25?C, which is the room temperature. Therefore enzyme catalase will work properly and temperature will not be a factor to affect this investigation. PH Most enzymes also have an optimum pH at which they function best. In human body, most enzyme work fastest at an optimum pH of about 7. For example, the digestive system Pepsin found in the stomach to digest proteins. A change I pH means a change in the concentration of hydrogen ions in the surrounding of the enzyme. This affects the ionisation of R group in the amino acid residues of the protein molecule and the shape of the active site to bind with the substrate. The lower the pH, the bigger the hydrogen ions concentration it is . Hydrogen ions can interact with the R group of amino acids, affecting the way in which they bond with each other and therefore affect their 3D shape. So the lower the pH, the higher the hydrogen ions concentration it is, and therefore the slower the reaction. Oppositely, the higher the pH, the faster the reaction it will take place. To control this factor, I will keep the pH all the way through the same by using a pH paper to check the pH number during the experiment. Enzyme concentration The rate of reaction increases as the concentration of enzyme increase. Because higher concentration of enzyme means higher number of enzyme molecules, so that more enzyme molecule will collide with substrate molecule, therefore the reaction will take place faster. When there is plenty of substrate, the rate of reaction is not limited by the concentration of enzyme. Therefore if the concentration of enzyme is increased, the number of collision with the substrate molecule and hence the rate of reaction will increase. If the amount of substrate is limited, the rate of reaction decreases because if the amount of substrate is limited, the enzymes active site will not collide with substrate very often, therefore a few products will be made. As the reaction progressing, the substance will be broken down slowly, therefore less substrate left. So enzyme molecules freer, therefore products will be produced more slowly. Hence the slower the reaction goes. In this experiment, the enzyme concentration is an independent variable which I will vary the concentration of celery extract each time to investigate how different concentration of celery extract( enzyme concentration) affect the rate of breaking down hydrogen peroxide. Substrate concentration Increasing in the substrate concentration will increase in the rate of reaction. Because increasing the substrate concentration, we increased the number of substrate molecules; therefore more collision will take place between substrate and enzymes active site. Hence mere products will be produced. Therefore the faster the rate of reaction takes place. However, if we continue increase the substrate keeping the enzyme concentration and volume the same. The rate of reaction will not continue to increase. This is because a higher substrate concentration active site of all the enzyme molecule is busy with substrates. The number of enzyme molecules because a limiting factor. The rate of reaction at higher substrate becomes constant. In this case, I will keep the volume of hydrogen peroxide the same for using each time. Inhibitors Enzyme inhibitors are substances that directly or indirectly interfere with the functioning of the active of an enzyme and so reduce its activity. There are two types of inhibitors: Competitive inhibitors Competitive inhibitors are the molecules which have a shape similar to the substrate, so they fit into the active site of the enzyme. Therefore the substrate cannot enter into the active site and so the enzyme cannot catalyse the reaction. Hence, the reaction is slow down. However, the inhibitors are not permanently bound to the active site and so, when it leaves another molecule can take its place. Sooner or later, all the substrate molecules will find an active site, but the greater the concentration of inhibitors, the longer the reaction will be. Non-competitive inhibitors Non-competitive inhibitors will bind to another part of the enzyme rather than the true active site. This changes the shape of the enzymes active site so that the substrate no longer fits. Therefore the reaction is slow down. As the substrate and the inhibitor are not competry for the same site, an increase in substrate concentration does not decrease the effect of inhibitors. To control the factor of inhibitors. I will not add any substance except celery solution and hydrogen peroxide during the experiment. Prediction I predict that the higher the concentration of celery extract I use, the fast the rate of breaking down hydrogen peroxide I will get. As in higher concentration of celery extract, the more number of catalase molecules in the solution. So there are more collisions between substrate ( hydrogen peroxide) and enzyme( catalase) active site, and more products will be formed( water and oxygen). The rate of reaction can be measured by measuring the volume of oxygen produced in a period of time. The larger the volume of oxygen produced in the same period of time, the fast the reaction is taken place. Preliminary work In order to get finest and reliable results, I did a preliminary work. This enable me not just find out a suitable range of celery extract of catalase concentration I will use in my real experiment, but also help me descried the time interval I will measure the oxygen get and justify the equipment and method. I think these all lead me to get reliable and accurate results in the end. In the preliminary work, I choose to do three different concentration of celery extract. To get different concentrations of celery extract, I used distilled water to dilute the celery extract. I tested the range of celery extract between 100% 20%, the highest concentration is 100%, the lowest concentration is 20% and the median is 60%. The reason I chose these three concentrations is because between each concentration, there is 40% difference and this enable me to test that in which level of concentration, reaction goes best and to find out which concentration of celery extract I will use in my real experiment.

Monday, November 25, 2019

The Battle of San Jacinto in the Texas Revolution

The Battle of San Jacinto in the Texas Revolution The Battle of San Jacinto on April 21, 1836, ​was the defining battle of the Texas Revolution. Mexican General Santa Anna had unwisely divided his force to mop up those Texans still in rebellion after the Battle of the Alamo and the Goliad Massacre. General Sam Houston, sensing Santa Annas mistake, engaged him on the shores of the San Jacinto River. The battle was a rout, as hundreds of Mexican soldiers were killed or captured. Santa Anna himself was captured and forced to sign a treaty, effectively ending the war. Rebellion in Texas Tensions had long been simmering between rebellious Texans and Mexico. Settlers from the USA had been coming to Texas (then a part of Mexico) for years, with the support of the Mexican government, but a number of factors made them unhappy and open war broke out at the Battle of Gonzales on October 2, 1835. Mexican President/General Antonio Lopez de Santa Anna marched north with a massive army to put down the rebellion. He defeated the Texans at the legendary Battle of the Alamo on March 6, 1836. This was followed by the Goliad Massacre, in which some 350 rebellious Texan prisoners were executed. Santa Anna vs. Sam Houston After the Alamo and Goliad, panicked Texans fled east, fearing for their lives. Santa Anna believed that the Texans were beaten even though General Sam Houston still had an army of almost 900 in the field and more recruits came every day. Santa Anna chased the fleeing Texans, alienating many with his policies of driving off Anglo settlers and destroying their homesteads. Meanwhile, Houston kept one step ahead of Santa Anna. His critics called him a coward, but Houston felt he would only get one shot at defeating the much-larger Mexican army and preferred to pick the time and place for battle. Prelude to Battle In April of 1836, Santa Anna learned that Houston was moving east. He divided his army in three: one part went on a failed attempt to capture the provisional government, another remained to protect his supply lines, and the third, which he commanded himself, went after Houston and his army. When Houston learned what Santa Anna had done, he knew the time was right and turned to meet the Mexicans. Santa Anna set up camp on April 19, 1836, in a marshy area bordered by the San Jacinto River, Buffalo Bayou and a lake. Houston set up camp nearby. Sherman’s Charge On the afternoon of April 20, as the two armies continued to skirmish and size each other up, Sidney Sherman demanded that Houston send a cavalry charge to attack the Mexicans: Houston thought this foolish. Sherman rounded up about 60 horsemen and charged anyway. The Mexicans did not flinch and before long, the horsemen were trapped, forcing the rest of the Texan army to briefly attack to allow them to escape. This was typical of Houston’s command. As most of the men were volunteers, they did not have to take orders from anyone if they didn’t want to and often did things on their own. The Battle of San Jacinto On the following day, April 21, Santa Anna received some 500 reinforcements under the command of General Martà ­n Perfecto de Cos. When Houston didn’t attack at first light, Santa Anna assumed he would not attack that day and the Mexicans rested. The troops under Cos were particularly tired. The Texans wanted to fight and several junior officers tried to convince Houston to attack. Houston held a good defensive position and wanted to let Santa Anna attack first, but in the end, he was convinced of the wisdom of an attack. At about 3:30, the Texans began silently marching forward, trying to get as close as possible before opening fire. Total Defeat As soon as the Mexicans realized an attack was coming, Houston ordered the cannons to fire (he had two of them, called the â€Å"twin sisters†) and the cavalry and infantry to charge. The Mexicans were taken completely unawares. Many were asleep and almost none were in defensive position. The angry Texans swarmed into the enemy camp, shouting â€Å"Remember Goliad!† and â€Å"Remember the Alamo!† After about 20 minutes, all organized resistance failed. Panicked Mexicans tried to flee only to find themselves trapped by the river or bayou. Many of Santa Anna’s best officers fell early and loss of leadership made the rout even worse. The Final Toll The Texans, still enraged over the massacres at the Alamo and Goliad, showed little pity for the Mexicans. Many Mexicans tried to surrender, saying â€Å"me no La Bahà ­a (Goliad), me no Alamo,† but it was no use. The worst part of the slaughter was at the edges of the Bayou, where fleeing Mexicans found themselves cornered. The final toll for the Texans: nine dead and 30 wounded, including Sam Houston, who had been shot in the ankle. For the Mexicans: about 630 dead, 200 wounded and 730 captured, including Santa Anna himself, who was captured the next day as he tried to flee in civilian clothes. Legacy of the Battle of San Jacinto After the battle, many of the victorious Texans clamored for the execution of General Santa Anna. Houston wisely refrained. He correctly surmised that Santa Anna was worth much more alive than dead. There were still three large Mexican armies in Texas, under Generals Filisola, Urrea and Gaona: any one of them was large enough to potentially defeat Houston and his men. Houston and his officers spoke with Santa Anna for hours before deciding on a course of action. Santa Anna dictated orders to his generals: they were to leave Texas at once. He also signed documents recognizing the independence of Texas and ending the war. Somewhat amazingly, Santa Annas generals did as they were told and retreated out of Texas with their armies. Santa Anna somehow evaded execution and eventually made his way back to Mexico, where he would later resume the Presidency, go back on his word, and try more than once to re-take Texas. But every effort was doomed to failure. Texas was gone, soon to be followed by California, New Mexico, and much more Mexican territory. History lends events such as the independence of Texas a certain feeling of inevitability  as if it was always the destiny of Texas to become first independent and then a state in the USA. The reality was different. The Texans had just suffered two huge losses at the Alamo and Goliad and were on the run. Had Santa Anna not split his forces, Houstons army may well have been beaten by the Mexicans superior numbers. In addition, Santa Annas generals had the strength to defeat the Texans: had Santa Anna been executed, they likely would have kept fighting. In either case, history would be much different today. As it was, the Mexicans crushing defeat at the Battle of San Jacinto proved decisive for Texas. The Mexican army retreated, effectively ending the only realistic chance they ever had of re-taking Texas. Mexico would futilely try for years to reclaim Texas, only finally relinquishing any claim to it after the Mexican-American War. San Jacinto was Houstons finest hour. The glorious victory silenced his critics and gave him the invincible air of a war hero, which served him in good stead during his subsequent political career. His decisions were consistently proven wise. His reluctance to attack Santa Annas unified force and his refusal to let the captured dictator be executed are two good examples. For the Mexicans, San Jacinto was the start of a long national nightmare that would end with the loss of not only Texas  but also California, New Mexico, and much more. It was a humiliating defeat and for years. Mexican politicians made great plans to get Texas back, but deep down they knew it was gone. Santa Anna was disgraced  but would make yet another comeback in Mexican politics during the Pastry War against France in 1838-1839. Today, there is a monument at the San Jacinto battlefield, not far from the city of Houston. Resources and Further Reading Brands, H.W. Lone Star Nation: the Epic Story of the Battle for Texas Independence. New York: Anchor Books, 2004.

Thursday, November 21, 2019

Susan Sontag on Photography Essay Example | Topics and Well Written Essays - 3500 words

Susan Sontag on Photography - Essay Example In all of her works, Sontag believed that the proliferation of photographic images had developed a worldwide recognition that photographs ought to be exact representations of reality. Thus, the essence of photography is pure reflection of reality. As such, every photographer must know, both technically and artistically, the proper way of capturing images in order to deliver a pure message about a phenomenon. In this paper, we intend to examine further some of Sontag’s critical teachings about photography by emphasizing on its purpose, the ideal relation between the photographer and his subject, and the key issues surrounding the practice of photography. After this, we deepen our understanding on the essence of photography by looking at one essential issue, that is, the problem of photo manipulation in modern photojournalism. In this part, we first study the trends in photographic manipulation to understand how the practices have been caused, either directly or indirectly, by t echnological and commercial innovations. After this, we discuss why and how photo manipulation is done. Such topics are to be discussed in relation to specific cases of photo manipulation in the mass media like newspapers and magazines. ... A. Important Ideas: Susan Sontag’s On Photography Susan Sontag condemned photography by asserting that it only delivers images that are nothing more than shadows of reality. As she metaphorically strengthened this thesis, humans who view photographs are like trapped men in a cave who only see the shadows of the outside world. What they deem as ‘real’ are actually distorted reflections of reality. To arrive at a more meaningful discussion of On Photography, let us first delve into her definition of photography. To Sontag, to photograph is to appropriate to the thing being photographed. It is an act of non-intervention. Thus, there should be distance between the photographer and his subject. However, she believed that since photographs do not provide contextual stories about the world, they become miniatures of reality. The world, therefore, becomes a series of unrelated particles or phenomena, with no interconnectedness or continuity. But the capacity to imitate re ality is not the only definitive characteristic of photography, for in the artistic activity of the photographer he is able to elevate his creations as pretentious works of art. As narrated by Bridget Brimer in her online article entitled Literary Interpretation and Analysis of Susan Sontag's Book, On Photography, Chapter 1: "In Plato's Cave", through the use of various skills in photography, the photographer is able to convert a phenomenon into an image that provides a transient experience to its intended audience. Thus, Sontag saw the act of photographing as symbolic shooting, or even raping. Sontag reckoned that photographing is like raping since the photographer sees his subject in a manner that is unavailable to himself (subject’s). He gains knowledge about

Wednesday, November 20, 2019

Divine Chocolate; Marketing and Communications Plan Essay

Divine Chocolate; Marketing and Communications Plan - Essay Example They create barriers in the distribution channel by offering attractive bonuses to retailers who surpass their preset targets. Divine also lacks the international economies of scale that the dominators enjoy. In a research conducted in 2007 divine held 0.3% of the total chocolate sales in the UK as compared to 83% market shared by the three dominates. The use of fair-trade certification has contributed significantly to the marketing communications of divine chocolates to the consumers. A research conducted in 2007n proved that most consumers had left other chocolate brands in favor of Divine due to the mark of quality and its splendid taste. It therefore, has been suggested that Divine should develop a marketing plan focused on communicating it product to retailers and final consumers on the basis of fair pricing, product differentiation and emphasis on quality. In conclusion, it has been established that though divine is a small organization it has a high potential of the top of the value chain. It all the features required to get their only solution is adopting a communication plan focusing on the retailers and attaining economies of scale. Divine chocolate company, is a manufacture fair-trade chocolates in UK and United States, marking its first establishment in the UK in 1996. It partners with Kuapa Kokoo cocoa growers from Ghana, comic relief and Christian aid. It has a unique trading system; the farmers are the main shareholders in the company. Its first product, Divine milk chocolate, has been launched in late 1998. Another range of its products include dark chocolate and drinking chocolate; it launched another product in 2000 called dubble, in collaboration with comic relief. The brand was later on launch in the US in early 2007. Currently three main organizations own divine chocolate company. These organizations include Kuapa Kokoo; a group of cocoa producers from Ghana own 45% of the shares, Twin trading

Monday, November 18, 2019

Drama Essay Example | Topics and Well Written Essays - 1500 words - 1

Drama - Essay Example ?The Piano Lesson† defines the history of African-Americans, which is a history that is painful and problematic to all ethnic groups in this country because of the conflicts and dispersion of traditions and values that African-Americans have a right to keep. The plot follows the Charles family and the symbolic and literal piano that maintains the centerpiece of their lives. Every aspect of the play revolves around the piano, past and present, and a reader is left to wonder at the intensity with which the Charles family values music in their lives. At its foundation, however, the play isn’t about a piano; it is about the need for stability and heritage that is inherent in all of their lives. Neither brother nor sister can live without what that particular piano represents, and that, in itself, highlights the purity of the metaphor that Wilson has crafted for his audience. Wilson’s cannon of plays on the African-American perspective may be â€Å"more thematic than theatrical; the plays are rich in their variety of characters and conflicts, and in the resolutions to these conflicts† (Boan 263). Even a casual reader of his plays, specifically â€Å"The Piano Lesson,† will come away feeling like they have been granted access into the African-American dynamic and struggles that African-Americans as a culture have to deal with in all elements of their lives. Culture, to any race, is a specific understanding and implementation of their heritage, and it’s easy to lose that in white America, where the dominant culture has become a melting pot of ideologies that are inconsistent with any one race or heritage. Many of these ideologies are often incompatible with the heritage and beliefs that certain races may want to uphold, which makes balancing life with personal traditions more complicated than it seems. Further, â€Å"beneath the diversity within the dramatic framework of the plays lies the assertion that the present for black America has been invariably shaped

Saturday, November 16, 2019

Should Museums Charge For Admissions Advantages Disadvantages Economics Essay

Should Museums Charge For Admissions Advantages Disadvantages Economics Essay Museums are expensive to run, with the costs of acquisitions, conservation, maintenance, staff salaries and special exhibitions all weighing heavily upon their budgets. In many cases much of their funding comes from the government, whether at national or local level, with the remainder made up through endowments, income from museum shops and other commercial ventures, private donations and sponsorship, and, very often, through entry fees. By for-profit standards, museums are illogical. Museums have a business model with costs much greater than their revenues. In a non-profit organization, an admission fee wont even begin to cover the costs of delivering its service. Museums have found various ways to increase their income opportunities, for example through gift shops and restaurants. Logically, lowering the admission price, would increase the amount of visitors, these visitors would spend more money in gift shops and restaurants and could possibly result in a higher income. On the other hand, a museum misses out on extra income through admission fees. Is there an equilibrium price? And what are the alternative pricing options? The research question in this paper is: Should museums charge an admission fee? Literature on this issue provides this paper with a theoretical framework, next I will explore the effects of digitalization for museums. A Dutch case study, done by Aarts de Jong Wilms Goudriaan Public Economics (APE) will complete the answer to this question. Museum economics: Museums have high fixed costs. This results in a high average cost curve for museums. The demand curve often lies below this average cost curve. This makes it impossible to set an entrance price at which the total amount of income received through admission fees covers the costs of the museum. (Frey, 2006; Caves,2000) However, admission prices are of the main determinants that influence the economic outcome of a museum. The economic value of a museum is often very high as a result of its collection and location. To increase revenue however, museums do not only depend on admission fees but also on the income that comes from museum gift shops, restaurants, and renting possibilities. Additionally, museums receive a great deal of support, sponsoring and donations. For example, for Boijmans van Beuningen Museum Rotterdam only 20% of its total revenue is derived from direct revenues, while 80% is derived from subsidies. For some Dutch museums however, revenue derived from entrance fees can be up to 50% (Munster et al. 2008). Most museums receive governmental or public support, for the government, their economic performance is of high interest for policy makers. In all cases, entrance fees prove to be a very important determinant that influence the economic outcome of a museum. Questions about what role museums are playing, should play and will play in society, are today subjects very much under discussion. Is the museum a storehouse for things and memories, a showground, a centre for education, a playground for academics, a castle for people with a suitable habitus the way Pierre Bourdieu describes it, or an institution with an important role to fulfil in peoples life and a far-reaching part to maintain in the development of a society? In his article, National Museums: To charge or not to charge? OHagan explains that the most important function of a museum is educational. This function involves people educating and informing people concerning their past and origins, and if finance permits those of other peoples, through the artefacts of the museum, thereby contributing to the formation of a sense of the countrys identity and position in the world. For education only however, physical presence is not entirely necessary and especially in the digital world a museum is able to perform its educational role partly through the use of Internet. With this educational function in mind, charging an entrance fee would limit certain groups of people in accessing the museum, and therefore learning about its content. For museums admission fees maintain to be an important determinant of its revenues therefore museums use pricing options, such as price discrimination. Price differentiation occurs when a firm charges a different price to different groups of consumers for its service, for reasons not associated with costs. Students, children and elderly are often charged less than normal adult visitors. Only a minority of visitors pays the full entrance price. There is however one issue when looking at cultural organizations. The price elasticity for cultural demand is rather low which means differentiating in price does not result in a significant change in demand. As a result of this by raising its entrance price, a museum can generate a significant increase in revenue. Given the income of a consumer (i.e. the spending limit), prices and individual preferences result in a package of goods and services that best satisfy their individual utility. This economic optimization process leads to certain fe atures in which demand for different goods and services such as visits to museums depends on income and prices. Not only the price of the museum itself, but also the price of competing leisure activities and additional costs, such as travelling expenses play an important role in consumer behaviour. However tourists are less likely to feel limited by the admission fee. (Frey et al. 2006) The influence of competing leisure alternatives depends on the character of a museum; For a museum that is highly competing with other leisure alternatives, the price sensitivity of the visit turns out to be higher. In contrast, highbrow and unique museums show that their visitors are less sensitive to price changes. Blockbusters have also shown to be very price-inelastic. (Goudriaan et al, 2007) People with higher incomes tend to be higher educated and more developed preferences for cultural activities (Frey, 2006; Throsby 2001) People who are accustomed to visiting a museum to visit, are not inclined to change this behaviour when their income decreases or admission fees increase. On the other hand, people who are not accustomed to a visiting a museum are insensitive to the incentive free of reduced admission are ought to give. (Goudriaan et al, 2007) Digitalization allows museums to exhibit their collection online, this allows the museum to educate people online. Physical presence is no longer necessary to receive education about the museums artefacts. This could potentially lower the amount of visitors entering the museum. However, most museums gain great benefits from using the digitalization to their advantage, they educate and communicate with their visitors through the Internet. To charge or not to charge? Much has been written about the advantages and disadvantages of setting the admission price of a museum to zero (OHagan 1995; Anderson 1998; Baily and Falconer 1998). In for example the United Kingdom, national museums grant free entry to their visitors. More and more services have free access, such as the Internet, newspapers, unauthorized downloading, public transport etc. As a result, free access has gained popularity. Free access to museum has advantages, it enables all people to be able to visit the museum without getting charged. This might attract a new and bigger audience to experience the museum. In his article, Kirchberg (1998) found that income is the dominating characteristic influencing the subjective significance of entrance fees as a barrier to visiting museums. People in lower social classes experience admission charges as a barrier almost five times as much as higher sociological classed people. Increasing entrance fees increases revenues but according to Kirchberg, not only decreases the number of visitors but also change the socio-economic composition of the attendance. Distributing welfare is mainly the reason for subsidies, in the case of museums the distribution argument does not really hold up: studies have shown that visitors to a museum usually come from higher social classes. People from higher social classes can afford to pay an entrance fee, in practice this means that subs idizing admission prices, does not transfer welfare to lower social classes. Another benefit of free entry to a museum is that is increases the amount of visitors. For a museum, a high number of visitors often reflects cultural prestige (OHagan 1995). In his article OHagan also points out that donors prefer non-profit firms. With higher entrance fees, donors are less wiling to donate money or artefacts. The marginal costs of an additional visitor is zero, therefore another argument for free entry to a museum is the efficiency argument: entrance fees should then also be zero to satisfy efficiency (Frey, 2010). On the other hand, literature suggests that there are problems in determining the costs of museum services (Baily and Falconer 1998). There are still costs in allowing visitors into a building, they require security, heating, light and physical space). Free access also has disadvantages. According to Frey, efficiency is not attained if the respective museums get overcrowded and the quality of a visit decreases. This results in museums limiting visitors by enhancing admission restrictions, such as requiring visitors to place a reservation in advance. This raises the danger than tickets can be sold on the black market, a visit then cab still become a costly experience. Visitors can also think that something that has no price, has no value resulting in a decrease in a museums total revenue. In his article Steiner (1997) calculates the impact of free entry for one day to the total revenue of a museum. His study shows that the amount of additional visitors does not overcome the loss of the admission charges it would receive on a normal day. Additionally, the crowd of people the museum attracted contributed to the loss of value of the exhibition. Most of the museums that offer free access, charges for access to special or blockbuster exhibitions. Another strategy for free museums to make visitors pay is asking for a donation at the end of the visit. By doing so, they museum captures the wiliness to pay form visitors (OHagan 1995). A visitor is not obliged to pay, but often willing to do so as they enjoyed the visit. The more satisfying the visit, the more a visitor is willing to pay. This is also a better distribution of welfare, as the social higher classes have to ability to pay more, and the lower social classes have the ability to pay less. With free entrance leading to a higher amount of visitors, exit donation can bring in significant extra financial resources for a museum. Prices can be differentiated to allocate the resources as efficiently as possible. According to Frey, when demand is low, prices should be kept close to zero. When demand is high, prices can be higher to avoid overcrowding, This enables visitors with the highest willingness to pay to enter the museum. People with a low price elasticity should be charged higher prices than visitors with a high price elasticity of demand. Finally, price can be differentiated when visitors target a special exhibition, normal collection should be priced lower. Another option is to charge local visitors less than foreign visitors or tourists as tourists have a significantly lower price elasticity of demand than locals. Often, when visiting a city, visiting the museum is a must, and the additional costs of entrance fee are often easily paid for. Another argument for entrance fees is that the extra benefits a visitors receives from going to a museum, added to for example the existence value (Frey, 2006) should be paid for. As pointed out before, price elasticity of demand for cultural services is low, therefore ticket prices may not be the best explanation for demand. OHagan finds that, when The Long Room of Trinity College Dublin stated on entry that admission prices are required to improve the quality of the visit, the amount of visitors raised. Another variant of entry fees is creating a museum club. A fixed contribution is required to become a member and receive free entry to the museum. For culturally active people, this is a good solution and often cheaper than paying full entrance fees. For a museum, it has the same advantages and disadvantages of free entrance but it raises revenues (Frey, 2010) Problems with pricing is that it is often considered unfair. Considering the main role of a museum is education, it should be free for everyone to visit and become educated. In his article, Frey proposes a whole new pricing mechanism for museum: the application of exit prices. Instead of charging visitors when they enter a museum, they are charged on exit. The amount of time spent in the museum sets the exit price. A disadvantage of this proposal is that the length of visit becomes a great part of an economic calculation. A major advantage is that the experience of the visit, is charged afterwards. If the experience was not satisfying for the visitor, he/she would leave early and pay a lower price. Visitors pay for their use of the facility, this raises efficiency. The price system can considered to be less unfair, because up to a certain point, people can set their own prices. Frey also opts for the first 20 minutes to be free of charge, so that people who normally would not visit a museum, receive an incentive to stay only for a short period, maybe they will return later for a longer visit. The Dutch case study Aarts de Jong Wilms Goudriaan Public Economics (APE) has been commissioned by the ministry to research the possibilities for free entry for Dutch museums. In several extensive research papers, they calculate the effects of free entrances fees. Table 1: The quantitative effects of free entrance on all Dutch museums: Additional visits (x1000) Increase in visits (%) Total costs (x1mln.) Total cost per extra visit in Euros Free entry to the entire collection 5.867 30,0 98,9 17 Free entry every Sunday 416 2,1 23,4 56 Free entry once every month on Sunday 183 0,9 6,0 33 Free entry during one working day per week 267 1,4 11,2 42 Free museum card for students 1.623 8,3 12,3 8 Free entry to general collection 5.207 26,6 81,9 16 Source: APE Table 1 shows that the effects on the number of visits are most significant when free entry is given to the entire museum, including general collection and special exhibitions, followed by free entry to the general collection only. Both options also bring in the highest overall costs for the museums, costs per extra visit are relatively low because there is no real shift in the amount of visits from days on which visitors are charged, to days visitors are not charged an entrance price. A weekly free entry on Sunday raises the most costs for the museum because a shift appears from days on which visitors are charged to days visitors are not charged any admission fee. In all cases, the loss of entrance fees causes the greatest deal of costs for a museum. Their research shows that free entry increases the number of visits, but they state: we do not expect miracles to happen from removing entrance fees. The composition of visitors has proven to be very difficult to change. In another research, done by APE they have calculated the price elasticity of Dutch museums. From 1984- 2005 admission prices raised with 6,2% per year, this does not lead to a significant change in the umber of visits. They show that with a price elasticity of -0,18 the museum sector has the lowest price elasticity of all cultural sectors. With every 1% increase in price, visits reduce by 0,18%. According to the research this is a result of the fact that potential visitors value travelling expenses and consumption costs to be more important than admission prices. The price of substitutes is a major determinant for the number of visits to a museum: when substitutes raise their prices, the number of visits to a museum increases and vice versa. Ape also predicts price sensitivity for 2005- 2015: Figure 1: Predictions for changes in admission prices 2005-2015 Source: APE The index shows that the number of visits to a museum is unlikely to be affected by an increase or a decrease in entrance prices. Conclusion Museums have high fixed costs. This results in a high average cost curve for museums. The demand curve often lies below this average cost curve. This makes it impossible to set an entrance price at which the total amount of income received through admission fees covers the costs of the museum. However, admission prices are of the main determinants that influence the economic outcome of a museum. To increase revenue however, museums do not only depend on admission fees but also on the income that comes from museum gift shops, restaurants, and renting possibilities. Additionally, museums receive a great deal of support, sponsoring and donations. Museums have different roles to fulfil, educating is one of them, as is collection and researching. An important goal for many museums is reaching groups far from consuming culture. Other goals are financial revenue, conservation and gaining prestige. In this essay, various literature has been discussed offering different pricing options. The most important ones are free entry and efficiency admission fees, which both have advantages and disadvantages. Free entry is likely to increase the number of visitors, but museum visitors often come from higher socio-economic classes, which transfers the benefits from no entrance fee mostly to these upper classed visitors instead of the social lower classes as it is intended to. The existence value shows that museums radiate positive external effects for non-visitors, this effect supports free entrance. However, the benefits for visitors are higher than for non-visitors. Low price elasticity for museums helps support the argument for admission fees. There are various pricing options. Standard pricing is considered to be unfair, as it does not consider the willingness and ability to pay for visitors, considering the educating role, different groups of people should all be able to enter the museum. Prices need to be differentiated, allowing elderly, students and other groups to enter for a reduced price to match their ability to pay. Another option is to charge local visitors less than foreign visitors or tourists as tourists have a significantly lower price elasticity of demand than locals or the application of exit prices. The case study by APE, shows that removing entrance fees only results in a significant increase in the number of visitors when all Dutch museums would remove their entrance fees. As a result of a low price elasticity for museum visits, a change in price does not significantly affect the demand for a museum. These findings indicate that free entrance is not the best option for a museum to reach many people. Price changes do not affect the number of visits that much, a museum is better of differentiating its price in a way that lower socio-economic classes are still able to afford a visit if they decide to. Since higher socio-economic classes continue to be the most dominant visitors in a museum, an entrance fee will not likely decrease the number of visits. Entrance fees can contribute to a museums revenues and allow a museum to generate extra income that can be spent on increasing the quality of the experience for visitors.

Wednesday, November 13, 2019

Clear Liquid Thought: The Photographs of Jim Dine Essay -- Photography

Clear Liquid Thought: The Photographs of Jim Dine The camera sees even beyond the visual consciousness. --Ralph Eugene Meatyard Argument: The Photographic Unconscious In his article "Photographie avant analyse"1 photography critic Franà §ois Soulages discusses the reciprocal influence between photography (as an emerging technology in the nineteenth century) and the study of the unconscious (prior to the invention of psychoanalysis). To what extent, he asks, did a new technology such as photography enlighten, modify, or enrich the understanding of the unconscious? And, conversely, how did what he calls "the hypothesis of the unconscious" allow for a better understanding of a new technology? These questions, inherent in the beginnings of photography and essentially linked to its role in the comprehension of the visible and the invisible body, have gained considerable importance today. The photographic works I will discuss here participate in our understanding of the unconscious in a paradoxical way, since they do not imply disclosing images of the artist's unconscious specifically encoded into symbolic meaning. On the contrary, my concern is with these works' potential to generate visual equivalents of inner life perceptions in a variety of puzzling formal patterns whose disclosure of meaning is cunningly deferred. The photographic compositions of Jim Dine are not narratives of inner life, but forms of visual experience that inform our ways of thinking the unconscious. ------------------------------------ 1 Franà §ois Soulages, "Photographie avant analyse", Photographie et inconscient (31-35). In this study, Soulage primarily deals with the beginnings of photography and with its paradoxical uses in psychiatry .. ...rundberg, Andy. "Now, the Camera's Eye Turns Inward", in The New York Times, May 28. 1989. Hamon, Philippe. Imageries.Littà ©rature et image au XIXe sià ¨cle. Paris: Josà © Corti, 2001. ------------------------------------ 19 The phrase used in the title of this article is coined after the title of one of Dine's black-and-white photogravure prints, "Clear Liquid Talking", 1996. Krauss, Rosalind.The Optical Unconscious. Cambridge, Mass. : MIT Press, 1993. Meatyard, Ralph Eugene. Caught Moments -- New Viewpoints. Exhibition catalogue. London: Olympus Gallery, 1983. Powers, Richard. Three Framers on Their Way to a Dance. New York : W. Morrow, 1985. Sibony, Daniel. "Une technique de l'instant ou la machine à   clicher", La Recherche photographique 7 (1990) Soulages, Franà §ois. "Photographie avant analyse", Photographie et inconscient, Soulages ed. Paris: Osiris, 1986.

Monday, November 11, 2019

Hardness of Water

INTRODUCTION: WHAT IS HARDNESS OF WATER:It is when water passes through or over deposit such as limestone; the level of Ca ²Ã¢  »and Mg ²Ã¢  ºand HCOâ‚Æ' ions present in the water can greatly increase and cause the water to be classified as hard water. This term results from the fact that cation and magnesium ions in water combine with soap molecules, making it hard to get suds. High level of water ion such as Ca ²Ã¢  » and Mg ²Ã¢  ºÃ‚  can cause scaly deposits in plumbing appliances & boilers.These two ions also combine chemically with soap molecules resulting in decreased cleansing. The American water works Association indicates that the ideal quality water should not contain more than 80mg/l of total hardness as CaCOâ‚Æ'. High levels of total hardness are not considered a health concern. There are two types of Hardness:Temporary hardness: this is due to the presence of bicorbonates of calcium and magnesium. It can be easily removed by boiling. Permanent hardness: this is due to the presence of chlorides & sulphate of calcium & magnesium. This type of hardness cannot be removed by boiling.MOTIVATIONI was bothered that the water in Ilara community doesn’t combine easily with soap leading to excessive consumption of WATER.ENVIRONMENTAL SIGNIFICANCE:Scales are formed as inner coating of the pipelines prevents corrosion Absolute soft waters are corrosive and dissolve metalsMore causes of cardio vascular diseases are reported in soft water areas Hard water is useful to growth of children due to the presence of calcium Hard water cause excessive consumption of soap used for cleaning purpose, sodium soaps react with multivalent metallic cations to form a precipitate, thereby lose their surfactant properties. Lathering doesn’t take place until all hardness ions precipitate out.APPARATUS Conical Flask {250ml} Burette with retort stand Beaker Wash bottles Standard flask PipettesMETHOD Simple titration methodREAGENTS Ammonium chloride Amm onium hydroxide Ilara-Mokin water {Hâ‚‚O} Magnesium sulphate Erichrome black T EDTA (Disodium salt).PREPARATION OF REAGENTS 1. Standard solution of EDTAThe usual reagent is the disodium salt, which is a dehydrate, Mr=372.24; it is available in sufficiently pure form to be used as a primary standard for most purposes. If necessary, it may be dried at 80 ° for four days to remove a small percentage of water that may have been absorbed. The solution should be stored in plastic containers rather than glass bottles. The solution is stable but if stored in glass bottles (particularly if the glass is new), the concentration of a dilute solution will decrease appreciably with time as metal ions are extracted out of the glass. To prepare 2 1 of the reagent, dissolve 7.44g of the salt in enough deionized water to make exactly 2 1 of solution. 2. Buffer solution(pH 10)Add 17.5g of ammonium chloride to 142cm ³ of ammonium chloride to 142cm ³ of 0.88 ammonia solution and make up to 25 0cm ³ with deionized water. 3. Eriochrome Black T indicatorThis indicator can be purchased as a powder. The solid is hygroscopic, and so must be stored in a tightly stoppered container.EXPERIMENTAL PROCEDURE (testing of the Ilara-mokin water) We Pipetted 200ml of the water sample and transfer it to a clean 250ml conical flask. We Added 2ml of Ammonia buffer solution to the water sample so that the pH will be maintained between 9 & 10. We added few drops of EBT indicator to the conical flask and the sample turns to wine red in color. Before we started the titration; we rinsed the burette with few ml of EDTA  then Filled the burette with 0.02m EDTA solution & adjusted to zero then fixed it in retort stand. We titrated the sample against the EDTA solution in the burette till all calcium and magnesium ions present in the sample reacted with the EDTA.The appearance of blue color indicated that all Ca and Mg ions were complex with EDTA and forms a metal EDTA complex. i.e. the end poin t of the titration We Noted down the burette reading and repeated titration two more times.RESULT OF THE EXPERIMENTSAMPLE A FINAL READINNGS 1.50 1.40 1.40 INITIAL READINGS 0.00 0.00 0.00 TITRE VALUES 1.50 1.40 1.40Average titre value= 1.50 +1.40+1.40 =4.3 3 3  =1.43cm ³Ã‚  =1.43 x 20= 28.6 cm ³SAMPLE B FINAL READINGS 2.90 3.10 2.90 INITIAL READINGS 0.00 0.00 0.00 TITRE VALUES 2.90 3.10 2.90Average titre value=2.90+3.10+2.90 = 8.90 3 3  =2.97cm ³Ã‚  =2.97 x 20= 59.4cm ³

Friday, November 8, 2019

The Introduction of Goal-Line Technology as a Strategic Change in Football Essays

The Introduction of Goal-Line Technology as a Strategic Change in Football Essays The Introduction of Goal-Line Technology as a Strategic Change in Football Essay The Introduction of Goal-Line Technology as a Strategic Change in Football Essay This report discusses the introduction of goal-line technology as a strategic change to the game of football and the likely impacts on the organisations associated. Football has become a global business and is one of the few industries which has grown during the current financial crisis, with larger television deals and transfer fees than ever before. This report summarises two leading goal-line systems available before discussing the potential benefits and challenges of implementing the technology. The focus then turns to the impact such a change will have on the game’s stakeholders before finally drawing conclusions on how the implementation could be managed and whether the systems should be adopted. Introduction Goal-line technology is a proposed technology which is able to determine when the ball has crossed the goal-line, therefore indicating when a goal has been scored or not. Over the past ten years there has been great debate about whether this type of technology should be introduced to the game, however so far the concept has been rejected by FIFA, football’s world governing body. There are currently two leading systems which could be implemented and these will be explained in depth further on in the report. In 2010 the International Football Association Board (IFAB) agreed to re-examine goal line technology. It stipulated that any goal-line system must be accurate and the indication of whether a goal has been scored must be immediate and confirmed to the match officials only, within 1 second of the incident (FIFA, 2010). In recent years calls to introduce goal-line technology have intensified as a result of a number of high profile refereeing errors. A recent survey of 48 captains in the Europa League by international players union, FIFpro, found that 90% of respondents said they wanted goal-line technology introduced (CNN, 2010). In the modern game, where there are huge amounts of money at stake, and given the current economic climate, every decision is vital. There are plenty of arguments against the introduction of goal line technology and these will be discussed along with any potential advantages. Goal-Line Systems Available * Hawk-Eye System This system uses six cameras in the stands at either end of the field to track the position of the ball. The images are processed by a bank of computers in real time and the data is sent to a central computer, which combines all the information to determine whether or not the ball has crossed the line. If the ball has crossed the line then the central computer will transmit an automatic signal directly to the referee, such information could be communicated to a watch or an ear piece (Hawk-Eye, 2010). The Hawk-Eye system utilises cameras that can operate at up to 500 frames per second compared to standard broadcast cameras that operate at around 25 frames per second, which means that Hawk-Eye is able to detect if the ball crossed the goal-line for only a fraction of a second. The system compensates for the eventuality that players will obstruct the view of the ball (D’Orazio, Guaragnella, Leo and Distante, 2010) by using six cameras from different angles and Hawk-Eye is able to locate the ball accurately when only 25% of the ball is visible. The cost of implementing the system at one stadium would be around ? 250,000. * Cairos GLT System The Cairos system has been jointly proposed by football manufacturer and leading sportswear designer Adidas and Cairos Technologies AG. The system consists of thin cables installed underneath the penalty area and behind the goal-line. Electrical currents passed through the cables generate magnetic fields which are picked up by sensors in the ball when in the goal area. A transmitter inside the ball sends the data about the ball’s location to a ouple of receiver antennas which then transmit the data to a central computer. When the computer determines when the ball has crossed the goal-line it sends a radio signal to the referee instantly informing that a goal should be awarded. (Cairos, 2010). It is not currently known how much this system would cost to install although it is likely to be similar to that of the Hawk-eye system. SWOT analysis for goal-line technology. Impacts of Goa l-Line Technology Fig [ 1 ] (Dailymail, 2010) The introduction of goal-line technology has many benefits to the game of football and its stakeholders. The worldwide football industry generates billions of pounds in revenue through sponsorship and marketing deals with the largest clubs in the world raking in over ? 300m in revenue (Deloitte, 2010). With huge amounts of prize money on offer it is more important than ever to minimise the number of refereeing errors in the game. The most recent argument for introducing a goal-line system came at the 2010 FIFA World Cup where Frank Lampard’s shot against Germany had clearly crossed the line (Fig 1) but no goal was given. Had the goal been correctly awarded then the outcome of the game could have been totally different. As it was England exited the World Cup in the second round winning around ? 6m in prize money and missing out on potential prize money in excess of ? 19m. There are numerous other examples which show that wrong decisions have massive financial implications on football teams. The last few years have seen an increase in the abuse of referees as a result of poor decisions, in extreme cases referees have received death threats and chosen to retire. The introduction of goal-line technology could help to eradicate the problem as the technology rules out human error in relation to goal-line decisions. We have seen in tennis that since the introduction of hawk-eye there have been far less confrontations between players and officials. Players accept the outcome and this would be the same in football. As a result, referees would get 99% of goal-line decisions correct and players, managers and fans would be able to accept those decisions. Incidents of crowd trouble would also be likely to fall as everyone would be able to see the exact position of the ball and there would be no reason for fans to feel hard done by. The sport betting market is becoming an increasingly large industry, with Sport England estimating the value of spending on sport-related gambling in England grew from ? 1. 7bn in 1985 to ? 2. 8bn in 2008 (Sport England, 2010). It is also estimated that ? 1bn in the UK alone was staked on the 2010 FIFA World Cup (BBC, 2010). After the England v Germany match at the 2010 World Cup, bookmaker William Hill decided it would pay out to their customers who bet on Frank Lampard scoring in the match. The bookmaker estimated that this gesture would cost them a â€Å"six figure sum†. (William Hill, 2010). There are many other cases where goal-line incidents have cost the public and bookmakers, and these examples provide another argument for using goal-line technology and show the potential economic impact outside the football world. It should also be recognised that video technology is currently used in football and has been successful. National governing bodies use video technology to cite players after a game for dangerous or foul play that may have been missed by the referee, the necessary punishments are then handed out a similar system is also used in rugby union. The introduction of this process has helped to stamp out serious foul play in the game and in some countries has been further developed to punish players for simulation, or diving. This shows an example where technology has been introduced to the game and is helping to improve and maintain the games ethics. Goal-line technology would simply be another method of adding value to football through the use of technology. Potential Challenges of Implementation. There are various challenges and arguments to overcome before goal-line technology could be implemented, for example: 1. With installation costs in excess of ? 200,000, questions are being asked if it is appropriate to spend such a large amount of money on a goal-line system in the current economic climate. Although in relation to the current wages in modern football, ? 250,000 is a relatively insignificant amount for the top clubs. The technology is also an attractive sponsorship opportunity which would contribute to the installations. Tennis has proven that there is money to be made from selling the sponsorship of the Hawk-Eye system, Rolex sponsor the system at the Wimbledon Tennis Championships (Fernandez, 2010). This would also be true in football and it is likely that football would attract greater amounts of sponsorship money because of the popularity of the game, the greater numbers of spectators and the global television audience (Levine, 2000). On the other hand, the majority of clubs outside the top divisions would struggle to gain sponsorship and would therefore have to face the installation costs themselves. 2. FIFA believe that the rules for officiating football should be the same across all leagues and nations. If smaller teams could not attract sponsorship deals and could therefore not afford to install the technology, FIFA’s belief would not be realised and the already evident gap between the top flight teams and the lower divisions could be further widened. However, in Rugby League, video technology is only used in the elite tournaments and has proven a successful introduction. A similar approach could be taken in football, where either every team in a league agrees to install goal-line systems or no teams install them. This approach would allow the implementation of goal-line technology in a consistent and fair way and would solve the problem of which level of the sport to stop at. E. g. International, Professional, Semi-Professional. 3. Where do you draw the line with technology in football? Controversy can happen all over the pitch, in the form of off-side or penalty decisions for example, and technology could be introduced to analyse every decision. FIFA believe the human element of the game should remain the critical element of it and if we start using technology all over the pitch then it will change the way the game has been played for hundreds of years, therefore technology should be used to assist and not replace referees. Goal-line incidents are the only decision which is totally definitive and if a decision can be provided to the referee instantly then the flow of game will hardly be affected. FIFA has therefore indicated that if technology is ever introduced, it would only be used for goal-line incidents (FIFA, 2010). 4. Not every ground has suitable facilities to install the technology. If the Hawk-Eye system was adopted then clubs would need to have suitable stadia in which the cameras could be installed. Smaller clubs with small stadia may struggle to install the cameras in the optimum positions which could affect the accuracy of the system. If the Cairos GLT system was adopted there may be similar installation problems because the system has to be installed underneath the pitch. Many clubs now have undersoil heating already installed which could make it difficult to implement the Cairos system depending on whether these two technologies could be installed in tandem. The effects of Goal-Line Technology outside the game. The debate about goal-line technology has had an impact on industries linked to football, as well as other sports. FIFA have agreed to look into goal-line technology again which has stimulated competition and technological advance between the 17 companies who have proposed their systems which could be used, although the two systems discussed earlier appear to be the market leaders. Nevertheless the subject of line-calling technology has unearthed a niche market which is becoming increasingly relevant in all sports, thus leading to job creation and healthy competition within the market. The company whose technology is chosen would experience rapid growth because of the sudden demand for their product which would be implemented throughout the world. Because such a system is still in its infancy, there would be plenty of rival companies that would continue to develop their own systems for use in other sports or in other areas of the game. However, this could again raise the debate of where you draw the line with technology in football. It is likely that the implementation of goal-line technology would have little impact on the organisational structure of FIFA and other governing bodies, it is probable that a new department will be created to work in tandem with the chosen manufacturer and to fix any problems with the technology but major structural changes should not be necessary. A change in the laws of the game would be required to accommodate goal-line systems and a process would need to be implemented to state when a goal can be awarded and how this would be done. For example, the tennis model could be followed where the game would be stopped and a replay could be shown on big screens inside the stadium, or a simple signal could be sent to the officials only, indicating a goal should be awarded. It is likely that the latter would be adopted because it would not interrupt the flow of the game. Goal-line technology would have a great effect on the fans, both at the game and watching on television. We have seen in tennis that Hawk-eye creates excitement and tension amongst fans, adding value to the sport. A goal-line system would also have a similar effect in football, although it is likely that only the television audience would get the benefit of seeing the outcome because the game would have to be interrupted in order to show the outcome at the stadium. Fans would be happy that goal-line systems would rule out human error and it would also help to eradicate the blame culture where fans blame bad refereeing decisions for defeat. In the aftermath of the England v Germany match, the English fans and media placed the blame for the defeat on the referee and his assistants when in actual fact England were massively outplayed by Germany. The implementation of goal-line technology would take the emphasis away from questionable decisions and allow teams and fans to address the real issues. Another interesting point involves the legal consequences of implementing goal-line technology. If the technology was to fail during a game and give the wrong decision, would the club involved be able to sue FIFA or the manufacturer for loss of earnings? However, there have been no recorded cases of this occurring in other sports. Conclusions. There are many challenges associated with implementing any new technology in an organisation, and this will be no different if goal-line technology is introduced to football. Inevitably there will be teething problems however the ultimate success of such an implementation depends on how these problems are dealt with. I have drawn up a few recommendations which could help the implementation and transition process to make sure any issues are overcome: * Goal-line technology should be phased in over time It will take years to install goal-line systems in all suitable stadia across the world and therefore I feel that installing systems in the top divisions and tournaments, such as the UEFA Champions League or FIFA World Cup, would be a good starting point. Ultimately, these divisions and tournaments provide the highest financial opportunities to clubs and nations, therefore in today’s economic climate where football is seen as a business, it makes sense to begin with these top tournaments. As time progresses, implementation will move to the lower leagues and tournaments. * Goal-line technology will only be used in a fair manner Such technology should only be used if every team in a division has access to it. It would not be fair if only a select number of teams are able to experience the benefits. Either every team in a division utilises the technology, or none of them do. Bursary or funding schemes for lower league teams The national governing bodies could look to provide financial assistance to clubs who will struggle with the costs of implementing the technology. Or, the manufacturer could install the systems for free in exchange for the rights to sell the sponsorship of the system (Fernandez, 2010). FIFA and other governin g bodies will see plenty of benefits, both tangible and intangible, as a result of the implementation of goal-line technology: * Currently, FIFA has a poor reputation amongst the majority of the public throughout the world. Goal-line technology is wanted by the vast majority involved with football, including referees (BBC, 2010), and if FIFA approve its introduction it would be the first step in re-building its reputation across the world. It would be seen as a positive decision and would move football forward in line with other sports that have embraced available technologies. * Introducing the technology would greatly assist referees and this would help to reduce referee abuse by players and fans. Eventually, the technology could help to encourage more people to take up refereeing. Today, it is estimated that 7000 referees in England are leaving the game each season (Mole, 2009) * There are massive financial benefits to be gained through sponsorship of the systems. FIFA is a not-for profit organisation, yet in 2009 it recorded a positive annual result in excess of ? 100m (FIFA, 2010). The majority of revenue was made up of marketing and TV contracts and the sponsorship opportunities of goal-line technology, at events such as the FIFA World Cup, would increase revenues further. In conclusion I feel that goal-line technology has to be introduced to the game, we are seeing more and more examples of the need for such technology and with increasing amounts at stake for every game that is played it is time to take some of burden off referees and provide some assistance. Football has developed from a recreational game into a multi-billion pound industry and in the modern world the original laws of the game need to move with the times.