Wednesday, October 30, 2019

Does IT lead to job elimination, or job enhancement Essay

Does IT lead to job elimination, or job enhancement - Essay Example s are assembled or foods processed, through the use of robotic arms and conveyer belts, a job that may have been retrospectively been done by a hundred unskilled workers can be done by just a handful of machine operators. Inevitably, given the sensitive nature of labor issue, machines were not very well received by the workers they stood to replace; even today the interrogation of technology is often condemned by those who view it as a negative force rendering people jobless especially in labor intensive economies. While this is a logically sound argument, it is nevertheless one sided in view of the fact that the relationship between labor and technology is not as simple as that. In as much as technology may result in unemployment in some sectors, it has spawned millions of jobs in in numerous sectors and one can even argue that in the end it creates more jobs than it destroys. In the late 19th century at the height of the industrial revolution, a group of artisans working in the textile industry started a revolution of sorts in Britain against the use of machines in the production of textiles. They were afraid that automation of the process of production would cause them to lose their jobs since less skilled and therefore cheaper employees rendering them redundant could operate the machines. The Luddites as they were known became a significant social and political movement and they engaged in numerous acts of destruction in protest of adaption of machines in their industry (Baggaley, 2010). So much so that it is estimated that British soldiers were at some point involved in fighting the luddites than engaging napoleon. Ultimately, the movement was crashed through a series of trials in which the Luddites were convicted for machine breaking, which had been made a capital crime, and many were executed (Edgerton, 2011).  Today, the term Luddite is used to d escribe someone who is seen as being opposed to or slow to incorporate technology (Baggaley, 2010). Proponents

Monday, October 28, 2019

A Spatial Median Filter for Noise Removal in Digital Images Essay Example for Free

A Spatial Median Filter for Noise Removal in Digital Images Essay With each snap of a digital photograph, a signal is transmitted from photon sensor to a memory chip embedded inside a camera. Transmission technology is prone to a degree of error, and noise is added to each photograph. Signi? cant work has been done in both hardware and software to improve the signal-to-noise ratio in digital photography. In software, a smoothing ? lter is used to remove noise from an image. Each pixel is represented by three scalar values representing the red, green, and blue chromatic intensities. At each pixel studied, a smoothing ? lter takes into account the surrounding pixels to derive a more accurate version of this pixel. By taking neighboring pixels into consideration, extreme â€Å"noisy† pixels can be replaced. However, outlier pixels may represent uncorrupted ? ne details, which may be lost due to the smoothing process. This paper examines four common smoothing algorithms and introduces a new smoothing algorithm. These algorithms can be applied to one-dimensional as well as two-dimensional signals. Figure 1. Examples of common ? ltering approaches. (a) Original Image (b) Mean Filtering (c) Median Filtering (d) Root Signal of Median Filtering (e) Component wise Median Filtering (f) Vector Median Filtering. The simplest of these algorithms is the Mean Filter as de? ned in (1). The Mean Filter is a linear ? lter which uses a mask over each pixel in the signal. Each of the components of the pixels which fall under the mask are averaged together to form a single pixel. This new pixel is then used to replace the pixel in the signal studied. The Mean Filter is poor at maintaining edges within the image. 1 N ? xi N i=1 MEANFILT ER(x1 , , xN ) = (1) The use of the median in signal processing was ? rst introduced by J. W. Tukey [1]. When ? ltering using the Simple Median Filter, an original pixel and the resulting ? ltered pixel of the sample studied are sometimes the same pixel. A pixel that does not change due to ? ltering is known as the root of the mask. It can be shown that after suf? cient iterations of median ? ltering, every signal converges to a root signal [2]. The Component Median Filter, de? ned in (3), also relies on the statistical median concept. In the Simple Median Filter, each point in the signal is converted to a single magnitude. In the Component Median Filter each scalar component is treated independently. A ? lter mask is placed over a point in the signal. For each component of each point under the mask, a single median component is determined. These components are then combined to form a new point, which is then used to represent the point in the signal studied. When working with color images, however, this ? lter regularly outperforms the Simple Median Filter. When noise affects a point in a grayscale image, the result is called â€Å"salt and pepper† noise. In color images, this property of â€Å"salt and pepper† noise is typical of noise models where only one scalar value of a point is affected.

Saturday, October 26, 2019

Essay --

a) Reinhold Messner guessed that Otzi is 500 years old. b) Erika and Helmut Simon first discovered Otzi. c) Otzi probably brought species of grass that do not grow at that altitude. d) Walter Kutschera works with the Vienna Environmental Research Accelerator. e) Willard Libby assumed that C-14 content in the atmosphere was constant over time. f) Rainer Henn flew the iceman to his institute by helicopter. g) Konrad Spindler was the first person to estimate the iceman’s age to be about 4000 years. 2. The Similaun Mountain Peak’s height, in meters, is 3607 meters. 3. After the discovery of an unusual piece of equipment found with Otzi’s body, Spindler made the estimation that the iceman’s age is older than 500 years old on September 24, 1991. 4. A water divide is the line that separates bordering or nearby water basins. 5. a) The Inn is referring to the River Inn which is north of the water divide. b) Situated along the border of Austria and Italy, the location of Otzi sparked many debates. Initially, the water divide between the Rivers Inn and Etsch was used as a guide for the location of the border line, but snow and ice made it difficult to clearly identify the location of the water divide. Otzi was declared to be found just 92 meters within Italy after the clarification of the border line, which means Italy holds possession over Otzi. However, it was later observed that the water from the ice and snow was now draining towards River Inn. c) The Iceman was kept in Austria for six years after his discovery. 6. An ax with bronze-like blade was found with Otzi’s body. 7. The Iceman is kept in a glass vitrine with regulated temperature of -6â„Æ' and humidity of 98% at glacier-like conditions. 8. Zurich and Oxford la... ...or mass spectrometry. 22. AMS determines the isotopic composition of a sample material by first producing a negatively-charged ion beam, which is then subjected to a series of extremely selective filtering procedures in order to find C-14. 23. a) The second step for preparing a sample to be carbon- dated by AMS is the complete combustion of carbon to CO2. b) Iron (Fe) and Cobalt (Co) are used as catalysts in step 3. 24. a) The names of the two articles written by Willard Libby are â€Å"Atmospheric helium three and radiocarbon from cosmic radiation† and â€Å"Age determinations by radiocarbon content: checks with samples of known age†. b) Three articles were cited from the journal called Radiocarbon. c) The name of the article by Nicolussi and Patzelt is called Discovery of early- Holocene wood and peat on the forefield of the Pasterze Glacier, Eastern Alps, Austria.

Thursday, October 24, 2019

The Characters in Troilus and Criseyde

Characters Achilles, warrior who kills Troilus and Hector in battle Antenor, a soldier held captive by the Greeks, led to the fall of Troy, traded for Criseyde's safety Calchas, a Trojan prophet who joins the Greeks Criseyde, Calchas' daughter Helen, wife to Menelaus, lover of Paris Pandarus, Criseyde's uncle, advises Troilus in the wooing of Criseyde Priam, King of Troy Cassandra, Daughter of Priam, a prophetess at the temple of Apollo Hector, Prince of Troy, fierce warrior and leader of the Trojan armies Troilus, Youngest son of Priam, and wooer of Criseyde Paris, Prince of Troy, lover of HelenDeiphobus, Prince of Troy, aids Troilus in the wooing of Criseyde Synopsis Criseyde, the daughter of the seer Calchas, lives alone in Troy after her father abandons the Trojans to help the Greeks. Eventually she catches the eye of Troilus, a man who had previously scoffed at love, and becomes the object of his overwhelming desire. With the help of Criseyde’s uncle Pandarus he wins her love but soon loses it when the Greeks and the Trojans conduct an exchange of prisoners. Calchas, who knows of Troy’s imminent destruction, persuades the Greeks to exchange Antenor for his daughter and thus saves her from the doomed city.Criseyde promises Troilus that she’ll return to him after ten days but once she’s back in the care of her father she realizes the impossibility of her promise. Resigned to her fate, Criseyde yields to the flirtations of Diomedes, and her love for Troilus fades. When Deiphobus wins the armor of Diomedes, Troilus discovers a brooch he gave Criseyde upon her departure pinned to it. Heartbroken, he tries to find Diomedes and take his revenge during battle but after slaying many is in his turn killed by Achilles. As his spirit goes to heaven he reflects on the absurdity of all life itself. work cited Wikipedia online encyclopaedia

Wednesday, October 23, 2019

Ethics, Privacy in the Workplace Essay

Introduction The aim of this essay is to provide a supportive argument – â€Å"for† the notion that an individual’s privacy is more important than any other considerations in the workplace. Workplace scenarios will be outlined including job applications, storage of personal information, Internet and email, information technology effects on privacy, workplace policies and procedures and medical privacy. Differing ethical theories will be applied to both sides of the argument. The Individual’s Privacy in the workplace Getting the job. The story is often heard in Australia how easy it was for people to gain employment in the economically booming 1960’s and early 1970’s; of how people would walk into a workplace in the morning and get a job straight away or within a couple of days jobseeking. Resumes, application letters and application forms were unheard of unless you were applying for a professional level position. As competition for jobs increased in the mid 1970’s and early 1980’s more and more selection tools were required when hiring new staff. Resume’s detailing training, past employment and referees assisted in the selection or rejection of new staff. Applicants are not required to list information in their Resume such as marital status, gender, political leanings, religion, date of birth and number of children as part of equal employment opportunity legislation. In government based agencies in particular, merit based recruitment is stressed. Whilst in small privately owned businesses, employers still prefer to recruit new staff who are known to them or who are recommended friends of existing staff members. With current federal legislative requirements regarding unfair dismissal rules, employers must use care when employing new staff. A job seeker expects their private information to be handled with trust and discretion. The employer expects information to be relevant so they can make an accurate assessment of the job seeker. When it comes to ethics, both parties are acting in their own best interests. The seeker wants a job which is rewarding and lucrative in return for their effort. The employer wants the most skilled person for the least financial outlay possible so that business goals and healthy profits can be achieved. By applying the ethical consequential theory of Egoism regarding privacy, both parties are acting out of self-interest which best serves their own long term goals. According to psychological egoism, humans are by nature – selfish. The jobseeker will divulge only enough personal information which will enable them to get and keep the job. The employer seeks to find out as much information as possible about the jobseeker so that their business is not damaged in the long run by selecting an inappropriate candidate. Shaw (2009) Page 59 Stored Information Traditionally an employee’s basic personal information such as their resume, emergency contact details, and bank details would usually be kept on hard file in a locked personnel filing cabinet. Personal information shared amongst work colleagues was up to the discretion of the employee and staff encouraged to leave personal problems or beliefs at home. With the advent of information technology systems becoming more commonplace, communications though shared databases, email, intranet, internet and even social media have largely replaced paper files in storing company and personal information. Besides conducting simple one to one personal communication in the workplace, our personal and private information is shared in cyberspace with and without our express permission and may be accessed off site by internal staff or external IT support contractors with administrative access. Websites visited and programs/files accessed on work computers in work time can be logged and monitored . This database of information needs to be protected from improper use and access by unauthorised people. The employee expects that the privacy of their information is protected. Monitoring IT usage at work by the employer may be seen as an action in the interests of the business but it can also be seen as an erosion of trust in the employer/worker contract relationship. The Fair Work Australia Ombudsman recommends that employers â€Å"implement best practice when maintaining privacy in the workplace. Employers, employees and their representatives need to know what information may be collected and retained and if it can be passed on to others. This best practice creates certainty and security for both employers and employees.† Fair Work Australia(2010) Page 1 If the non-consequentialist ethical theory of Kantism is applied to this scenario, employers are expected to do the right thing as an act out of duty and by these moral principles the employee information is protected. Under Kantism if an employer was to mishandle this private information by for example selling it to third parties, this action would be morally wrong. Employers may justify their actions in logging internet and computer activity as a means to reduce â€Å"goldbricking† or â€Å"cyber-slacking† which is defined as employee’s using company internet accounts for personal / inappropriate use whilst giving the outward appearance of being busy with their work. Employees may see this as an invasion of privacy if they have not been informed or consented in their employment contract of this monitoring occurring. With Kant’s theory an employee’s actions of cyber-slacking would be considered morally wrong as they are not doing the right thing by their employer. By the same token the action of monitoring a workers use of the internet or email without their consent would also be considered immoral under Kant’s theory of ethics. Shaw (2009) Page 452 Fair Work Australia also says that â€Å"Password and login codes may give employees the impression that their email and web browsing activities during work hours are private and not aware that their activities can be scrutinised by their employer.† Fair Work Australia (2010) Page 3 Employers should provide clear workplace policies and procedures to ensure all parties understand the rights and responsibilities that apply to email and internet usage. Prescriptive guidance would detail the amount of appropriate personal email and internet usage within and outside the workplace that is allowable; prohibited activities and repercussions; legislation; how usage is logged and audited; and who has access to this information. Similar rules would apply to workplace landline and mobile phone usage. Fair Work Australia (2010) Page 4-5 By applying the consequentialist ethical theory of Utilitarianism to IT usage monitoring, the morally right action provides for the greatest happiness for all those affected, e.g., workload is shared evenly amongst staff; secret, divisive conversations are less likely to occur online and it is also a potential way to avoid potential conflicts in the workplace. Employers would use Utilitarianism to justify their actions in monitoring staff IT practices. An employee applying Egoism in this instance could argue that logging staff’s IT usage is an invasion of privacy and not in their interest, therefore mo rally wrong. Shaw (2009) Page 92 Privacy beyond the workplace Most people believe that what they do and the opinions they have in the privacy of their own home is private, however social media sites such as Facebook and Twitter can sometimes be viewed by third parties depending on privacy settings. It is believed that employers have viewed the social media sites of potential new workers to assess their suitability to the job. In an article in the Daily Mail newspaper (UK) the story claims that one in five bosses have rejected job applicants after viewing their social media sites. According to a survey by public relations company Eurocom Worldwide, â€Å"’The 21st-century human is learning that every action leaves an indelible digital trail,’ said Mads Christensen, Network Director at Eurocom â€Å" Reynolds (2012) In Australia, Telstra conducted a business survey which resulted in similar figures of more than 12.5% of bosses checking job applicants Facebook pages and turning away potential employees based on things they have seen on Facebook. â€Å"Top social media behaviours cited by bosses as leading to a candidate being ruled out are: †¢Posting negative comments about their workplace with 44% saying this could rule out an applicant †¢Posts/comments which are discriminatory (37%) †¢Inappropriate pictures posted on their profile (32%) †¢Posts/comments which contain confidential information (32%)† and 10% of employers use Facebook and other social networking sites to keep an eye on employee’s productivity. Symons (2011) Page 1 Employers say the biggest mistakes their current employees make on social networking sites are: â€Å"1. Posting negative comments about their workplace, with 26% saying this is the biggest mistake. 2. Posting confidential information (16%) 3. They post or are tagged in inappropriate pictures on their profile (14%) 4. Posting discriminatory comments (11%) 5. Posting comments/photos/links during work hours (10%) â€Å" Symons (2011) Page 2 Part of the key argument regarding personal privacy is: Do employers have the right to make judgements about potential or current employees based on information in social media sites? Surely this is not an accurate indication of their work skills and loyalty to a business as these social media sites are (usually) created when staff are not at work. It is tantamount to spying on a person in their private hours where their opinions are not necessarily those of their employer. The bosses may also have dubious moral and ethical behaviours outside of work hours, however the employer’s position of authority and power gives an unfair advantage over the worker. David W. Ewing devised an employees’ bill of rights where â€Å"No employee shall be penalized for engaging in outside activities of his or her choice after working hours†¦nor for expressing views contrary to top management.† Shaw (2009) Page 488 The employer would argue that viewing the content on an employee’s social media site is indicative of that individual’s moral standards which may in turn be detrimental to the company’s reputation, e.g. a primary school teacher with sexually provocative images of themselves may be deemed inappropriate behaviour and detrimental to the reputation and public perception of the school. Employers could justify their actions of looking into the private lives of their employee’s with Egoism and Kantism. It is in the employer’s interest to monitor the integrity of their staff – on and off the job. And inappropriate behaviour even if it is outside the workplace is detrimental to the reputation of the organisation they work for. The employee could take the moral stance using Virtue Ethics of which they consider themselves to be a moral and virtuous person by their routine behaviour whilst working and that they shouldn’t be ju dge by the actions they take outside of work. Shaw (2009) Page 88 Employee Medical Privacy Most recently there has been a report that Employers have been going along with employees to medical appointments and in some cases asking for medical certificates to be altered so that their employees can return to work earlier. The ACTU (Australian Council of Trade Unions) assistant secretary Michael Borowick has revealed that â€Å"the privacy of ill workers has been eroded, Employers, insurers and employer representatives are increasingly attending actual medical appointments with injured workers and, in some cases, forcing workers to attend company doctors. We’ve also had reports of doctors being pressured to change medical certificates and return-to-work plans.† In May 2012, construction materials supplier Boral was warned by Fair Work Australia against allowing supervisors to accompany injured staff into doctors’ consulting rooms, with the workplace umpire saying it had the potential to operate unfairly. The Fair Work Ombudsman said that the â€Å"Fair Work Act does not contain express provisions regarding whether an employer can accompany an employee to a medical appointment or have a private conversation with a doctor regarding the employee’s medical condition.† Wilkins (2012) It is incredible to imagine that such an intrusion of intimate personal privacy is occurring in the workplace let alone that there is scant legislation to prevent it. An employer could argue that it is in the interest of the company to ensure that employees are acting honestly in relation to the true nature of their illness as sick days cost the company money in delays and decreased productivity. Marketplace competitiveness is affected and workers compensation costs may also increase. By applying Utilitarianism theory, an employer may justify this action as it promotes the general welfare of the company and is result orientated. Whereas the employee may argue that utilitarianism is focused on the results of the action not whether the action is morally right or wrong for the privacy of the individual worker. In conclusion – on balance the argument of the notion that an individual’s privacy is more important than any other consideration in the workplace is affirmed. We now live in a society where we think we are in control of our personal and private details when in reality our opinions, movements, interests and affiliations are being monitored constantly without our knowledge. An individual’s right to privacy is dependent largely on the amount of information they share face to face, in writing or on the internet. It seems unfair that personal privacy should be sacrificed for corporate gain. Bibliography Books Shaw, W., Barry, V., & Sansbury, G. (2009) Moral Issues in Business (1st Asia-Pacific ed.), Cengage Learning. Melbourne, Australia Journals Andrejevic, M. Commercial surveillance in the digital era, Living Ethics: issue 87 (autumn 2012) Heersmink, R., van den Hoven, J., Jan van Eck, N., van den Berg, J. Bibliometric mapping of computer and information ethics (2011) Springerlink.com Legislation Privacy Act (1988) Commonwealth of Australia Privacy and Personal Information Protection Act (1998) NSW Web Articles â€Å"A quarter of bosses head to Facebook to vet CV’s† http://www.news.com.au/technology/a-quarter-of-bosses-head-to-facebook-to-vet-cvs/story-e6frfro0-1226208260693 THE VECCI BLOG, â€Å"Bosses heading online to screen job candidates†, The Victorian Employer’s Chamber of Commerce and Industry (VECCI) 2011 http://blog.vecci.org.au/2011/11/30/bosses-heading-online-to-screen-job-candidates/ Fair Work Australia, 2010 www.fairwork.gov.au/BestPracticeGuides/08-Workplace-privacy.doc Symons, P., Telstra Corporation Australia 2011 http://www.telstra.com.au/abouttelstra/download/document/telstra-cyber-cv-fact-sheet.pdf Newspaper Articles Reynolds, E., The Daily Mirror (UK) 2012 http://www.dailymail.co.uk/news/article-2115927/How-Facebook-cost-job-One-applicants-rejected-bosses-check-profiles-social-media-sites.html Wilkins, G., â€Å"Bosses intruding on workers’ doctor visits† Sydney Morning Herald, September 26, 2012 http://www.smh.com.au/opinion/political-news/bosses-intruding-on-workers-doctor-visits-20120925-26jh6.html?skin=text-only

Tuesday, October 22, 2019

Together Yet Separate essays

Together Yet Separate essays You cant play with He-man, hes not for girls! This phrase still echoes in my mind as I reminisce about my childhood playtime. As I reached for a He-man action figure from the toy box, I was handed a Barbie doll or a My Little Pony figurine. At that time, I was too young to realize the great chasm that gender had created for such a simple task as playing with toys. However, looking back, it becomes clear that gender, itself, plays a key role in the everyday lives of boys and girls. In Barrie Thornes book, Gender Play, this role is depicted in various ways through participant observation, or ethnography. By researching the ways that children play an active role in doing gender, analyzing the neutralization of this socialized role, and displaying the effects that education, primarily those with a classroom setting, has on gender, Thorne provides ample support of the notion that gender is a social construction. From my experiences with the He-man doll, one can deduce a certain boundary line for activities between girls and boys. Barrie Thorne provides explanations of these boundaries by analyzing the ways that children play an active role in creating them. By having shared interests, or behavioral compatibility, girls and boys contribute to the act of gender. Although there is not overwhelming support, boys find it more rewarding to interact and play with boys, and girls to interact and play with girls...girls more often gravitate to housekeeping corners and doll-play, and boys to the area with large blocks and toy cars...(Thorne 57). This example explains the division between boys and girls as one of shared interests. Because girls enjoy the same activities as other girls, and boys enjoy the same activities as other boys, a boundary for gender is marked. In choosing to play with a He-man doll, I crossed this boundary. However, in defining why chi...

Monday, October 21, 2019

Failures of the Media during the Falklands War

Failures of the Media during the Falklands War The Falklands War of 1982 was alleged to be the worst reported warfare after the Crimean War, as the war reporting went back to the pre mass communication era. No reports or news came from the front line due to the strict censure of news by the British Government of that time (The Falklands Conflict Technologies).Advertising We will write a custom essay sample on Failures of the Media during the Falklands War specifically for you for only $16.05 $11/page Learn More While the British forces defeated the Argentineans, the Government blocked every news and report leaving the media to grope in the dark. Reports were either delayed or censored and most of them were held back, which forced the Press Association to place a preface to its bulletins with rider indicating that the news was totally censored. That was why Dr. Johnson, wrote: It is wonderful with what coolness and indifference the greater part of mankind see war commenced. Those that hear of it at a dist ance, or read of it in books, but have never presented its evils to their minds; consider it as little more than a splendid game (Barnes, 2002). The Falklands war was the brain child of Margaret Thatcher which gulped 2 million pounds of the tax payers. Ironically, it was for the British military to learn the lesson that the best way to get stories lay in the way how they restricted the movement of the journalists. The Americans were thrilled to see the developments in Falklands War, and so, they speeded up reorganizing news management by curtailing the movement of the journalists. To make news, the journalists should move, and when they could not move how then they could make the news, remarked Greg Philo (Barnes, 2002), who was a professor in media studies at Glasgow University. Even the BBC was stamped unpatriotic. However, toward the end of the war, the government was cornered by the people questioning the way they handled the country’s information policy. The Falkland war stories they put were totally false and misleading to hoodwink the Argentineans. But the BBC considered itself unbiased and adhered to professionalism stating it their credibility would be at stake and proceeded with the news though under pressure and heavy censoring (Tales from the Tabloid). Only a few papers like Independent and the Guardian having credibility and honesty to the core, broke away the screening of war episodes sternly and went forward with the news coverage, though they were hampered because of the inaccessibility to the information on the real fighting (Shaw Carr-Hill, 1991).Advertising Looking for essay on history? Let's see if we can help you! Get your first paper with 15% OFF Learn More Throwing light into the civil rights violations of British army, the book ‘War in the Falklands’ published by Harper Row, 1982 states that in the human rights organizations’ view, around 18000 Argentineans have disappeared including school children and that another 100 journalists and 200 scientists were also not to be found (Friedman, 2007). Major Peter Vaughan Barnett defended the military strategy and censorship during the Falklands War by stating that it was only an allocation of forces within a war field to achieve certain policy goals (Barnett, 2000). The censorship was so strict that the BBC reporter Brian Hanrahan was forced to adopt the legendary reporting that penetrated the censure itself. Referring to the British jet planes that continued raids on Falklands war front, he reported, â€Å"I counted them all out and I counted them all back.â€Å" He was not allowed by the government to broadcast the news item regarding the number of planes participated in the air raid. His reporting proved the standard of reporting even under restrictions and pressure. Recalling his experiences during the Falklands war, Hanrahan stated that they were at peril at the hands of Argentineans and that he was uncertain of the impact when they were back home with the news. During that time only a limited number of people were engaged in reporting (Inside Story). The novelist Julian Barnes of Guardian gives a detailed account of how the Ministry of Defence tried to swirl away the British Media. The Falklands war created an image free period of 74 days during which no pictures were allowed to be sent through. Photographers were not permitted to take photographs and were not given accreditation. There was only radio vision and no pictures were shown and during the field attack there were no images at all and whatever they could catch were monitored (Barnes, 2002). Reference List Barnes, J, The worst reported war since the Crimean, The Guardian, 2002. Available from guardian.co.uk/media/2002/feb/25/broadcasting.falklandsAdvertising We will write a custom essay sample on Failures of the Media during the Falklands War specifically for you for only $16.05 $11/page Learn More Barnett , PV, British Strategy in the Falklands War, 2000. Available from mindef.gov.sg/safti/pointer/back/journals/2000/Vol26_1/4.htm Friedman, H A (2007) Psyop of the Falklands Islands War, 2007. Available from psywarrior.com/Falklands.html Inside Story: What covering the Falklands meant for leading veterans of the media corps, 2 April 2007. Available from independent.co.uk/news/media/inside-story-what-covering-the-falklands-meant-for-leading-veterans-of-the-media-corps-442872.html Shaw, M Carr-Hill, R, Mass Media and Attitudes to the Gulf war in Britain. EJC/REC Vol. 2, No. 1, University of Hull, 1991. Available from cios.org/EJCPUBLIC/002/1/00212.HTML Tales from the Tabloid, Socialist Review, Issue 259, Jan. 2002. Available from http://pubs.socialistreviewindex.org.uk/sr259/morgan.htm The Falklands Conflict Technologies, Media and War. Available from iwm.org.uk/upload/package/29/mediawar/technolfalk.htm)

Sunday, October 20, 2019

Characteristics of Shakespeares History Plays

Characteristics of Shakespeare's History Plays Many of Shakespeare’s plays are historical, but only certain plays are categorized as such. Plays like Macbeth and Hamlet are historical in setting but are more correctly classified as Shakespeare tragedies. The same is true for the Roman plays (Julius Caesar, Antony and Cleopatra and Coriolanus), which are all based on historical sources. So which plays are classified as Shakespeare histories and what are their common features? Sources of Shakespeare's History Plays Most of the Bards  English history plays, as well as Macbeth and King Lear are based on Holinsheds Chronicles. Shakespeare was known for borrowing heavily from earlier writers, and Holinsheds works, published in 1577 and 1587, were a key reference for Shakespeare and other authors of his day, including Christopher Marlowe. Interestingly, Holinsheds works were not particularly historically accurate either but instead are considered mostly fictional works of entertainment. If produced in the modern day, both Shakespeare and Holinsheds writings would probably be described as based on historical events but have a disclaimer that they were edited for dramatic purposes. Common Features of the Shakespeare Histories The Shakespeare histories share a number of things in common. First, most are set against medieval English history. The Shakespeare histories dramatize the Hundred Years War with France, giving us the Henry Tetralogy, Richard II, Richard III and King John- many of which feature the same characters at different ages. In all his histories, indeed in all his plays, Shakespeare provides social commentary via his characters and plots. The history plays say more about Shakespeare’s time than the medieval society in which they are set. For example, Shakespeare cast King Henry V as an everyman hero to exploit the growing sense of patriotism in England. His depiction of this character is not necessarily historically accurate. For instance, theres not much evidence that Henry V had the rebellious youth that Shakespeare depicts. Were Shakespeare's Histories Accurate? Another characteristic of Shakespeares histories is, for the most part,  theyre not historically accurate. In writing the history plays, Shakespeare was not attempting to render an accurate picture of the past. Rather, he was writing for the entertainment of his theater audience and therefore molded historical events to suit their prejudices or preferences. Shakespeare'sPlays and Social Commentary More subtly than his comedies and tragedies, Shakespeares histories provide contemporary social commentary. His plays offer a view of society that cuts right across the class system. These plays present us with all kinds of characters, from lowly beggars to members of the monarchy. In fact, it is not uncommon for characters from both ends of the social strata to play scenes together. Most memorable is Henry V and Falstaff who turn up in a number of the history plays. All in all, Shakespeare wrote 10 histories. These plays are distinct in subject matter only- not in style. The histories provide an equal measure of tragedy and comedy. The 10 plays classified as histories are as follows: Henry IV, Part IHenry IV, Part IIHenry VHenry VI, Part IHenry VI, Part IIHenry VI, Part IIIHenry VIIIKing JohnRichard IIRichard III

Saturday, October 19, 2019

Aerodynamics Assignment Example | Topics and Well Written Essays - 1250 words

Aerodynamics - Assignment Example depicts that if the attack angle is large enough the wing oscillates until a critical angle is exceeded beyond,which the lee-side wing will experience vortex lift off caused by asymmetric flow conditions (Lewis, pp.145-213). Large undamping causes a rapid build-up of wing-rock amplitude until a damping action is caused by the vortex breakdown on the windward wing, which lowers the net damping until it reaches zeroIt limits the cycle oscillations observed and predicted by lattice vortex methods. Bearing friction is overcome without the undamping generated from vortex lift off due to the increased wing area that increases the vortex-induced rolling moment. Predictions of unsteady induced drag are important in flexible aircraft dynamics and flapping applications in which the aerodynamics forces plays a crucial role. The suction force due to the leading edge balances the steady case components of pressure force in a free-stream direction. Moreover, within an unsteady case thrust or drag might develop depending on the details provided in the case. Vortex-lattice method requires inclusion of singularities and resolves the average aerodynamic surface for the unsteady force component given in Bernoullis equation The VLM attempts to predict the behavior of various components of the plane to the data obtained in a wind tunnel. This method produces data that is in agreement with the data for the neutral point location, lift and moment curve slopes at Mach 0.2. When studying the effects of canard using VLM it when the canard is above the wing then the neutral point is independent of the canard height. Moreover, when the canard is below the wing then neutral point varies with the canard height. The effects of the number of panels range from 120 to 240 panels and ought to be provided in order to obtain converged results.VLM has the best results when many span-wise stations are employed in conjunction with a relatively low number of chord-wise panels. The use of VLM in

Friday, October 18, 2019

Marketing assignment Essay Example | Topics and Well Written Essays - 3000 words - 1

Marketing assignment - Essay Example which is concerned with partitioning or dividing the market into one or more segments which can be targeted by the organization for selling and marketing their products / services by developing marketing mixes which are specific to such market segments. Dividing a market into various parts / segments helps in configuration of a company’s value chain and gives a competitive edge to the organization as compared to its competitors1. Segmentation helps organizations in developing a market mix which caters to the specific needs and concerns of the customers belonging to a particular market segment and helps in offering higher value to their target customers. In economic terms, the process of segmentation can be viewed as creation of monopolistic or oligopolistic market conditions whereby organizations seek to realize the highest price that their target customers in the particular market segment are willing to pay. Targeting refers to targeting a product to a specified market segment which comprises of customers who are most likely to consume the company’s products. Targeting helps the organizations in achieving best return on their investments, reach their core customers, gain a wider market share and achieve strategic positioning in the industry. The targeting strategies available to the marketers include2: This involves selling a single product to the entire (mass) market and is based on the assumption that the needs and demands of the consumers to whom the product is marketed are more or less identical. For instance, products such as Colas, Burger King, K – mart etc market and sell a unique product to a mass market. It involves selling different products to different market segments in a way which is appealing to every set of customer according to their respective market segments i.e., the marketers try to match the product with the needs of the customers in each of the identified market segment. For example, airline companies offering different services to

Software Development Research Paper Example | Topics and Well Written Essays - 250 words

Software Development - Research Paper Example There have been heated debates on the best strategy of developing software. Take a strategic position on this debate. Create an argument for which method (in-house, onshore, or offshore software development) is the best in terms of cost, security, reliability, and intellectual property protection. Support your response. In-house software development is the best choice in terms of cost, security, reliability and intellectual property protection for a company. By developing the software in-house, you are ensuring that you are using your own people, people who are already familiar with the company, how it works, what needs changing, and more importantly, how the software needs to work in order for the employees to do their job. This also ensures that there are no security leaks, that the company itself is able to see every step of the way what is being done, which allows for directional changes to be made quicker than if another company has to create something and then submit it for review, and it ensures that no other companies are able to take your ideas and use them as their own, ensuring the intellectual property rights of the company itself. Studies have shown that outsourcing brings with it â€Å"cultural barriers, expertise transfer difficulties and communication and coordination overhead. â⠂¬ ¦ (It) is riskier and more challenging that collocated development† (Bird, Devanbu, Gall & Murphy, 2009). Question 2: IT governance is concerned with organizational investments in IT and to ensure that the IT strategy delivers full value. The avoidance or prevention of IT strategic failures is the biggest part of IT governance. Describe two issues that drive IT governance. IT governance is driven by the quality of the internal structure of the system, and the cost of the system itself. â€Å"The malfunction of a key IT system sometimes leads to heavy financial losses,† (Bart & Turel, 2010), and as such, IT governance must strive to ensure that those key

Thursday, October 17, 2019

Software Quality Management Essay Example | Topics and Well Written Essays - 2250 words

Software Quality Management - Essay Example The requirement elicitation process for this set of work products was done through several methods like, interviewing end users, conducting workshops on identifying requirements, brainstorming, use cases, role plays and developing a demo of the final product. Additional work products were found for each main product of the basic set and were detailed on how they contribute to the achievement of the outcome. The report is structured with the detailed description of how the requirement analysis for each work product attributes to the successful implementation of each attribute of the outcome. This is followed with the findings of additional work products and their relationship with the basic set. Finally the report is concluded with the analysis of additional characteristics, if any, for each of the work products in the basic set. The first of the basic set of work products that was analyzed was the Spreadsheet software. One of the examples of spreadsheet software was Gnumeric. This deliverable was chosen since it was able to meet the expectations of the end users. The software was able to perform the required functionalities at par with other existing software of same kind. The requirement elicitation of the Gnumeric software was done through brainstorming technique and conducting a research on the requirements of the user needs. The analysis on the post-requirement elicitation process shows that the attributes of the outcome were met successfully. The process of how it met is explained below. (n.d. ,2009) Initially the planning was done among the management levels. The planning was ultimately divided into business, program and project. Once the planning was done, the requirement analysis was documented. The clients were interviewed and brainstormed to identify all possible requirements that they want the software to do. These include the conversion of any kind of data files to CSV or ledger based accounting table format. These requirements were base lined and were documented. They had a version control manager associated with the development team. This had the control of updating the software as and when any changes are done. The software had a help feature which would send the reports of any errors or runtime exceptions to the change management group. This ensured that customer faced bugs are fixed. The online help care associated with the software development team ensured that the customer's needs and future updates are done at the earliest time. (Demiriirs, E. et. al. 1998) The additional work products that help in achieving the entire functionality of the Gnumeric are histogram tool and Image filling work product. These work products helped to achieve the baselined requirements of creating charts from source data. Their special characteristics are that they are easily updatable and platform independent.Requirement Elicitation of Calculator software. The basic criteria for the selection of FreeCalc software in Calculator category, was that it was able to exceed the functionalities and expectations of other work products in the same category. This product detailed on the requirements category, met with the

Managing for the Future Essay Example | Topics and Well Written Essays - 3750 words

Managing for the Future - Essay Example It is also the co-owner of Sainsbury’s Bank along with Lloyd’s Banking Group (J Sainsbury Plc, 2012). Besides that, it has also owns property joint ventures with The British Land Company PLC and Land Securities Group PLC. What started off as a small retail store on London’s Drury Lane around the year 1969, Sainsbury’s has developed a huge history behind him over the years. Sainsbury holds more than 15% of the market share of the UK retail markets. Sainsbury hold the second position in the UK online retail market and is only behind Tesco. Sainsbury’s follows a simple passion of offering great food at fair prices to its consumers and this has been treated as one of the reasons for their success. By the year 2020, they have a target of sourcing all necessary raw materials and commodities in a sustainable manner (J Sainsbury Plc, 2010). Forecasts and Strategic Plan: Sainsbury is focused to provide healthy, safe, fresh and tasty food at fair prices. The chain continues to operate on five areas, which makes the chain differentiate itself from the retailers. The chain’s current focus plan is on: Growing space and creating property value Providing great food to the consumers Compelling general merchandising and clothing Developing new business channels Providing complimentary channels and services. Strengths Sainsbury’s has won numerous awards in the industry for its superior product quality over the past few years. Some of the awards comprises of fresh produce retailer of the year, honest food award and even wine retailer of the year. So it has clearly maintained industry standards and gained recognition in the industry The chain has made considerable amount of effort in order to modernize the brand by integrating technology at the point of sales (POS). Has tie ups with Nectar, a loyalty programme with an active user base of over 11 million. The chain has got high points on a regular basis in the industry’s most respected basket survey (J Sainsbury Plc, 2012). Weakness Their strategy is very puzzling at times. At times, they are targeting to appeal to mass markets which may result in tempting to go on an acquisition spree and then landing up with failed takeovers. Yet to recover the leading position of being the most preferred retailer in the UK region from the rival leading retailers. Opportunities Sainsbury’s ranking as an UK based online grocery provider is strengthened with higher sales on a year on year basis. With the increase in internet usage among the consumers, this segment can provide more sales to the retail chain. The addition of floor space in all new and existing stores for introducing the chain’s new health, beauty and household line of products will benefit the chain in the upcoming days and may provide greater share of revenue (J Sainsbury Plc, 2012). Threats Sainsbury’s is less committed to reinvest the capital generated in the business. This can spel l danger for the chain as Tesco who is a stronger competitor in this segment is more focused on committing a large amount of capital for maintaining their long term growth oriented strategy. Have high reservations in establishing the brand of Sainsbury’s overseas and in foreign locations, which provides them with a disadvantage of being

Wednesday, October 16, 2019

Software Quality Management Essay Example | Topics and Well Written Essays - 2250 words

Software Quality Management - Essay Example The requirement elicitation process for this set of work products was done through several methods like, interviewing end users, conducting workshops on identifying requirements, brainstorming, use cases, role plays and developing a demo of the final product. Additional work products were found for each main product of the basic set and were detailed on how they contribute to the achievement of the outcome. The report is structured with the detailed description of how the requirement analysis for each work product attributes to the successful implementation of each attribute of the outcome. This is followed with the findings of additional work products and their relationship with the basic set. Finally the report is concluded with the analysis of additional characteristics, if any, for each of the work products in the basic set. The first of the basic set of work products that was analyzed was the Spreadsheet software. One of the examples of spreadsheet software was Gnumeric. This deliverable was chosen since it was able to meet the expectations of the end users. The software was able to perform the required functionalities at par with other existing software of same kind. The requirement elicitation of the Gnumeric software was done through brainstorming technique and conducting a research on the requirements of the user needs. The analysis on the post-requirement elicitation process shows that the attributes of the outcome were met successfully. The process of how it met is explained below. (n.d. ,2009) Initially the planning was done among the management levels. The planning was ultimately divided into business, program and project. Once the planning was done, the requirement analysis was documented. The clients were interviewed and brainstormed to identify all possible requirements that they want the software to do. These include the conversion of any kind of data files to CSV or ledger based accounting table format. These requirements were base lined and were documented. They had a version control manager associated with the development team. This had the control of updating the software as and when any changes are done. The software had a help feature which would send the reports of any errors or runtime exceptions to the change management group. This ensured that customer faced bugs are fixed. The online help care associated with the software development team ensured that the customer's needs and future updates are done at the earliest time. (Demiriirs, E. et. al. 1998) The additional work products that help in achieving the entire functionality of the Gnumeric are histogram tool and Image filling work product. These work products helped to achieve the baselined requirements of creating charts from source data. Their special characteristics are that they are easily updatable and platform independent.Requirement Elicitation of Calculator software. The basic criteria for the selection of FreeCalc software in Calculator category, was that it was able to exceed the functionalities and expectations of other work products in the same category. This product detailed on the requirements category, met with the

Tuesday, October 15, 2019

Economic Crisis in Argentina Essay Example | Topics and Well Written Essays - 1500 words

Economic Crisis in Argentina - Essay Example The government’s policies largely focused on addressing the human rights issues and ensuring independence of judiciary thereby strengthening the democratic process. These policies were very effective in increasing Alfonsin’s popularity. However, when the independent judiciary started to hinder the new government’s objectives, government abandoned the policy of judicial independence by promulgating laws such as ‘Full Stop Law’ and ‘Due Obedience Law’ (Tedesco, 2002, p. 472). These policies greatly decreased the popularity of government and provoked military rebellion, guerilla attacks and labour conflicts thereby weakening the government (Tedesco, 2002, p. 473). Hence, the increased confrontation between the labour class and government resulted in a failure of economic policy. Carlos Menem succeeded Alfonsin as president of the Latin American Republic. Menem tried to bring about a consensus between the labour class and the ruling elite an d was somewhat successful. However, he used the power earned from the political consensus to establish a hegemonic rule over the country. He restructured ‘the supreme court of justice’ and inducted his supporters and close aides as judges at the highest level. Similarly, the accountability courts or ‘the Tribunal de Cuentas’ was reformed with government friendly judges. These policies encouraged large-scale corruption by government officials. This resulted in a large scale economic unrest (Tedesco, 2002, p. 476). Different economic factors paved way to the grave economic crisis of Argentina. Alfonsin inherited a country with severe economic issues to be resolved. The government introduced a series of economic reforms including...This essay is one of the best examples of thorough retrospective analysis of the origin, transmission and cessation of the economic crisis in Argentina, with focus on the economic policies, that led to the overcoming of the crisis. The shift from dictatorship to ‘real’ democracy did not yield the anticipated results. Carlos Menen, the Argentinean President from 1989 to 1999, introduced reforms that proved catastrophic for the economy. His policy of privatizing the government owned corporations and encouraging foreign investment in banking and other sectors back-fired. Huge amount of funds were transferred overnight out of the country decreasing substantially the country’s foreign reserves. The government froze all the foreign currency accounts. But this move angered the country’s wealthy middle class. They deemed it as a violation of basic human rights and a pro-elitist policy Different economic factors paved way to the economic crisis of Argentina. The government introduced a series of economic reforms including introducing a new currency. The government has to take huge loans to support this move but could not pay the interest. This decreased the confidence in new currency. The economic bail-out packages offered by international monetary organizations contributed a little towards containing the situation. It was the people’s spirit and its recognition on the part of government that finally led Argentina out of the crisis. The country needs a political culture which strengthens democratic institutions.

Monday, October 14, 2019

Human Resource Law Essay Example for Free

Human Resource Law Essay This paper will show that this scenario provides a case for gender discrimination. Gender discrimination is illegal under Title VII (Bennett-Alexander Hartman, 2007). In addition, this paper will show what legal and ethical issues arise in this case. Furthermore, this paper will show what Bob should do in this case. By using the female employee versus the male employee to serve the customer the company would be in violation of Title VII for gender discrimination. Title VII laws regarding gender cover the full scope of the employment relationship which describes that gender may not be the basis of any decision related to employment unless gender is used as a bona fide occupational qualification (BFOQ). Customer preference is not a legitimate and protected reason to treat otherwise qualified employees differently based on gender. Additionally, allowing the female employee to assist the customer over the male employee would be in violation of the store’s rotation policy. The policy states that each working day, two employees work in the store; one working the front and one working the back. Rotation occurs on a daily basis in order to disperse commissions fairly. Since this is company policy, there is no flexibility to change that policy and to rotation schedule clearly states that it is the male employee’s turn to earn commission. Discrimination based on gender is illegal and not in keeping with good business practices of efficiency, maximizing resources, and avoiding unnecessary liability. Title VII Issues Discrimination comes in all shapes and sizes, and managers have to be careful not to cross the line and do the wrong thing. Companies do not want lawsuits for discrimination or anything else. The store’s best customer, Imelda,  probably did not intend to offend anyone nor did she probably know that she was discriminating against anyone. Many times discrimination is not intended. Customers generally believe they are always right and get what they want. However, in this instance the customer is very wrong. Requesting a female employee over a male employee is a form of discrimination, gender discrimination. Gender discrimination is illegal under Title VII (Bennett-Alexander Hartman, 2007). If Bob asks Tom to step aside and allow Mary to assist Imelda with her purchases, he will be â€Å"in violation of Title VII and can be held liable to the employee for gender discrimination. Customer preference is not a legitimate and protected reason to treat otherwise-qualified employees differently based on gender† (Bennett-Alexander Hartman, 2007, p. 283). Legally and ethically, Manager Bob cannot swap employees Tom and Mary simply because Imelda wants it. Choice This is not an easy situation. On one hand, the customer is promising to buy five pairs of shoes if she gets a female employee to help her. This would be a huge purchase for the store, great for the profit margin as well as a large commission for the employee. On the other hand, not providing a female employee may denote a missed sale, Imelda may leave the store. Swapping employees would cheat Tom out of his commission. This would be unethical. Tom deserves his commission; he should not be asked or told to give this up. The Shoe Store has very clear company policies. Company policy does not allow two employees to split the commission (UOPX, 2013, para. 5). As stated previously, having Tom give up his commission would not be fair. Company policy rotates employees to keep commissions as fair and equal as possible (UOPX, 2013, para. 5). Manager Bob will need to explain to Imelda as nicely and calmly as possible that he is very sorry, but cannot provide her with a female employee. Bob should promise Imelda that Tom is a very nice man and that she will be in very capable hands; ensure her that Tom knows shoes and will treat her and her feet right. Bob should smile and guarantee her that she will be happy with the service she receives. Bob should apologize for the problem, explain that he contacted his regional manager to see if he could make an exception to company policy this time and was told no, and explain that the company risks a discrimination lawsuit. Finally, tell Imelda that he understands if she chooses to shop elsewhere today and  apologize again. Bob should not get into an argument with the customer; it is out of the stores control. In any business, a written policy can avoid or prevent lawsuits. The shoe store chain has clearly established that the rotation of two employees daily or weekly will occur in the store to create fairness in commission sales. In addition, if only two employees are present one works in the back of the store and the other works in front, this clearly creates fairness of commissions earned (pay), good business ethics practice. Working in sales requires a lot of personal judgment from a company representative. By its nature, the job relies heavily on social relationships and on persuasion. Sales people also usually work on commission; if they do not make the sale, they lose cash. In the wrong hands, these elements can lead to unethical behavior, causing undue pressure on customers or vendors. Ethical behavior and doing the correct or right thing is at the forefront for salespeople today. Subsequently ethical performance is an individual process and training development related issues are important. Salespeople require guidelines on ethical, equality and discrimination issues. The guidelines should be formulated and clearly communicated to help employees to effectively deal with situations of equal pay, fairness, and or discrimination whenever the need arises. Job performance, employee satisfaction and customer satisfaction will prevail with knowledge and understanding of employment laws (Bennett-Alexander Hartman, 2007). What has guided the ethical issues is the set of standards the company has worked out from human reason by which the human actions to switch Mary for Tom is ultimately creating wrong business ethics. Trading assign duties between sales and costs will not mix. The maximum concern for sales cannot go hand-in- with maximum concern for employees. Furthermore, the shoe store business has added structure to the business by creating this policy. If the manager deviates from the established policy, Bob will create unfair treatment or discrimination based on gender, which could result in a lawsuit. After Imelda voiced her request that she wanted a female employee Bob was to enforce the company’s policies to avoid a potential lawsuit. Bob did what was necessary to inform Imelda the companys polices and have Tom assist her with trying on shoes. Bob knows the company will lose money  because of the sales lost from this one client; however, the ethical issue arises to do what is fair and correct according the shoe store policy. If Bob makes the switch and has Mary assist Imelda instead of Tom, Bob has violated the discrimination law-Title VII (gender) as well has violating the equal pay law (Bennett-Alexander Hartman, 2007). The decision is allow Tom to assist Imelda and loose the extra sales. In future, the suggestion to Imelda would be to arrive at the store when a female worker is working the floor or to come in the s tore to see who is working the sales floor without putting the manager in the position to make compromises. Conclusion Discrimination issues can get many companies into trouble. Knowing the law is important for any manager. When questions arise that cannot be answered easily, ask for help. Title VII does not allow discrimination because of gender, meaning a man cannot be treated differently from a female and vice versa. In this case, all must be treated equally. Company policy will not allow Tom and Mary to split the commission and asking Tom to give up his commission would be illegal. Imelda will need to make her own decision whether to shop at the Shoe Store and allow Tom to assist her or leave for another store or until another day. The company must do what is right, what is legal. The store must treats its employees properly and do what is legal and ethical. Whereas Imelda may not be happy, the company cannot do anything that may bring a lawsuit against them. References Bennett-Alexander, D. D., Hartman, P. L. (2007). Employment law for business (5th ed.). New York, NY: McGraw-Hill. University of Phoenix (UOPX). (2013). Week Three. Retrieved from University of Phoenix,

Sunday, October 13, 2019

The Impact Of Digital Media On Ebay Information Technology Essay

The Impact Of Digital Media On Ebay Information Technology Essay eBay is known all over the world as the leading online Marketplace which came in to life in 1995,eBay Inc, was founded by Pierre M. Omidyarand its headquartered in San Jose, California, TM (2002). eBay created a special platform for the sales of goods and services by a passionate village of individuals and business. On days there are millions of items across thousand of categories for sale on eBay just like Half.com, eBays site dedicated to fixed price trading. eBay allows trade on a Local, National and International basis, with customize site in marketing all over the world. eBay, together with its sub-visions, bring online marketplaces for the sale of goods and services, online payment services, and online communication offerings to a diverse community of individual and business in the USA and Internationally. The company operates in three Intentions: eBay Marketplace, Payments, and Communications. The eBay Marketplaces: This platform provides infrastructure to enable online commerce in a variety of formats, including the traditional auction platform; and its other online platforms, such as Rent.com, Shopping.com, Kijiji, mobile.de, and Marktplaats.nl. Its services include trust and safety programs, reply forum, safe chanel program, eBay standard purchase protection program, customer support, tools and services. The Payments segment: Feeds a product for small businesses, online sellers, and individuals that enables them to send and receive payments online. Its services include joining the network, crosscheck of its PayPals account holders, withdrawing funds. The Communications segment: provide voice over Internet protocol calls between Skype subscribers, also provides connectivity to traditional fixed-line and handheld telephones. The company also provide online apartment rental services and comparison shopping resource service, as well as provides an Internet payment platform that allows merchants to process, and manage online payments. 2. MISSION STATEMENT OBJECTIVE eBay pioneers communities built on commerce, sustained by trust, and inspired by opportunity. eBay brings together millions of people every day on a local, national and international basis through variety of websites that focus on commerce, payments and communication. This has also help the company in various ways between their numerous customers worldwide. They have engaged in the method stated below. A Place to Buy. You can get almost anything item you need or want at very low deal better than you can find at any traditional brick and mortar, even online stores. But caution should be taken because of rotten or fake items deals on eBay. A Place to Sell. No matter the size of our product or services, eBay has various categories channels to sell items. eBays global reach can even move unusual items that are not in demand in our own neighborhood in to cash. A Place to Shop. Large variety of items can be found for sale on eBay, many members have discovered that eBay is one of the best place in the world to window or comparison shop. These items include photos, detailed descriptions, and owner experiences. Because you see lots of the same items side by side in various conditions and know what each one sold or selling for, eBay gives you insight into the real market value of most types of goods around the globe. A Website: With no physical building eBay store, Founded in San Jose but now carry out daily activities from various cities, eBays service exist basically online apart from the delivery of bought and sold items every other network of the business are handled through eBay website. Socially Responsible: eBay with its B2C way of handling business has lower the barriers to buying and selling, these bring a massive global awareness to it business. It also fosters new economic opportunities to developing areas and brings cultural understanding between different populations. This has made eBay one of the worlds most interesting and exciting trans-national ambassadors. 3. THE IMPACT OF DIGITAL MEDIA ON EBAY eBay is a cutting edge in commence by selling almost everything be it of what nature with its presence in every corners of the globe with no physical store, with limited staffs but satisfy it numerous customer worldwide. But how is this possible? Social Media Marketing: Recent addition to organizations plans. Integrated marketing communications is a practice organization follow to connect with their target markets. Integrated marketing communications coordinates promotional elements, advertising, personnel selling, public relations, publicity, direct marketing and sale promotion. Increasingly viral marketing campaigns are also grouped into integrated marketing communications for eBay. The growth of social media has impacted the way organizations communicate, the internet provide set of idea which enable persons to develop social and business platform, share knowhow and collaborate on project online. Cell Phones: Usage has also become a benefit for eBay media marketing. Today many cell phones have social networking capabilities, individuals are notified of any happenings on social networking  sites through their cell phones in real-time. This constant connection to social networking sites means products and companies can constantly remind and update followers about their capabilities, uses, importance, etc. Since cell phones are connected to social networking sites, advertisements are always in sight. Computers: The use of computer has come to stay in our daily life be it at home, offices, school, this is one of the basic tools used by eMarketers worldwide, eBay uses the help of computer since they dont physical store to carry out their daily business and this is done by logging into their website by typing in the URL address with an access from ISP provider. Once logged in, you see various categorizes of product, prices, description of items and options of payment of items bought. Buying of items online and shipping to every part of the globe is an everyday activity at just by the use of a computer, Newsweek (2004) Internet Marketing: eBay use the internet known as digital marketing, web marketing, and online marketing is the marketing product and services over the internet. Internet marketing is considered to be broad in scope because it not only refers to marketing on the Internet, but also includes marketing done via e-mail and wireless  media. Digital customer data and electronic customer relationship management systems are also often grouped together under internet marketing. This market joins the vast idea and technical background of the Internet, including design, development, advertising, and sales.  Internet marketing also refers to the placement of media along many different stages of the customer engagement cycle through search engine marketing on specific websites. 3.1 THE USE OF THE INTERNET BY eBay The internet as change the landscape of the world in every way things are done in every way things are done globally. Never before have people been able to interact in such a cost effective and comfortable way. The business world as seen a better new of doing its daily activity, business now are done in very short span of time even without the presence of both party at the same place or time. Now it is possible for you to establish your own company with a very small financial investment or in some cases even without any start-up capital. eBay use the internet in carrying of its daily business to meet target market and satisfy its customer at a very low cost and maximizing profit. Information: People worldwide are using the internet on a regular basis, with email and search engines as the most popular services. Information is power. People are able to influence, direct, convince, educate and manipulate others through one single tool: The distribution of information. Email and discussion forums allow people to share their thoughts, ideas and experiences with other people from all corners of the world. Within a relatively short period of time the Internet and its communication channels will be part of our daily lives as are running water and electricity. Cost Effectiveness: The internet is by far the most effective communication tool. If you want to send a letter via conventional or so-called slow mail, it will cost at least around $1 assuming you restrict yourself to two single sheets of paper. Sending the same amount of information via email will be up to 100 times cheaper with immediate delivery. In addition to this, email with its numbers of advantages over the slow mailing system of delivery of messages, sending and get a reply on the spot. Online Auction: In this massive marketplace, eBay rules the auction sites. According to the Nelison Rating, eBay is among the top ten most trafficked sites on the internet. eBay leads the online auction industry with a more than 60 percent share of the market, its closest competitors, Yahoo! Auctions, is only half its size followed by Amazon.com, all these are done with the help of the internet and makes eBay smile to the bank on daily basis. Low Cost Operation: Running business requires tons of capital no matter the size of the outfit, the business has to pay for rental shops, offices, motor vehicle, staffs, before it can think of making its profit which is the primary idea of the business, but doing online business you cut down your expenses to a very little amount of capital and that is the edge eBay is use to run its operations and has really help the business since it does not have physical presence anywhere, it does its business around the globe and sell lots of items to its customers worldwide. The internet helps eBay in an immeasurable way of cutting down cuts of operations and get to all part of the world without even being there in presence. 4. INTERNET AS A MARKETING PUBLIC RELATIONS TOOLS Public relations is defined as a management function which identifies, establishes and maintains mutually beneficial  relationships between an organization and the public upon which its success or failure depends. Whereas advertising is a  one-way communication from sender to the receiver, public relations considers multiple audiences and uses two way communication to monitor feedback and adjust both its messages and the organizations actions maximum benefit. The internet is used as a tool in Public Relations and has replaced the use of paper form of notifications and is carried out in method stated below. Tweeter: Social media is a great way to have a conversation with your market and manage connections with prospects, customer, bloggers. Even if you dont join Twitter you can monitor what people are saying company, trends, friends and products. This is quite useful from a marketing and PR standpoint. Tweeter has a search engine that let you post any information and can be linked to eBays platform. Facebook: Business firms states their URLs on cable Tv commercials, were friends and followers can join them on Facebook. This is sharp method way of internet PR, youre a startup entrepreneur, you could start a group to help entrepreneurs connect and exchange ideas. Search to make sure one doesnt exist already in your area. Your friends on your facebook will have first hand information of what is happening around you and your business and will also pass to from friends to friends if even they are not yours. eBay is linked to facebook which acts as an indirect form of PR, Instant message could also take form by chatting on both platform. Email: This is the fastest, stress less and cheapest form of PR and e-marketing with the use of the internet, when searching for information or to joint an organization like eBay, Amazon you go through a process of filling and providing certain information about yourself and your preference requirement, all these information is kept in their database and at the end you provide your e-mail. The organizations use their database information to communicate with you, through this medium you are updated with the latest information relating to previous request. As you change your preference change it is also updated in their database. eBay use this form of PR to promote their product to you and information is sent to you in respect of delivery of the item you paid for. Website Feedback: Various website use a page known as website feedback as a form PR tool to give a comments, complain or report on your experience you may have after buying a product or trial of certain items in other for them to know how their customer feel about product bought from them. 5. EBAY SWOT ANALYSIS STRENGHT: The Company use the advantage of Customer Relationship Management (CRM). Both parties (Buyers and Sellers) subscribe with the company and information needed by eBay on dealers. This is known as Business2Consumer (B2C) of their business. With the strong customer and dealer relationships are based on Consumer2Consumer (C2C) business platform, where good business relationships occurs, where buyers and sellers interchange feedback for each other for the next transaction to take place. WEAKNESSES: Organizations works painfully to limit fraud. eBay platform of business is very open to fraudulent activities. But the company act with the issue very quickly. These includes inferior goods being marketed to unknown and suspecting eBayers. Other forms of theft could include redirection of stolen goods. Make it known that fraud and theft are problems with outsiders not eBay. The weakness is that mischievous individuals can exploit the C2C business platform. Many companies, systems breakdowns could disturb the trading transaction of eBay on daily bases. eBay and Paypal have suffered shutdowns and total breakdown. As technology improves for the better weakness will be less an issue. OPPORTUNITIES: Acquisitions bring new business strategy openings. eBay has into agreement to buy off online telephone company Skype Technologies with a deal reported of about worth $2.6 billion. PC users use Skype to have conversation with each other for no charges and make cut-price calls to handheld cell-phones and fixed landlines once you have subscribe to the services. This will bring in more customers to the business and also make profit to continue to grow. THRATS: The world Internet brands, success attract competition. Overseas competitors competing in their home markets have the technical experience that could give them a stronger advantage over eBay. It came to the notice of eBay that it has met with other USA home Internet providers when trading in other international country. Yahoo! stand out in the Asian market. Doing the same market is a threat, just like weaknesses stated above, the name is attacked by mischievous individuals. When e-mail sent to unknown eBayers disguards to come from eBay. Logos, and design of the pages looks just the same. However they are designed so that you input private information that the thieves can use to accesses to passwords and identifications. Not all costs can controlled by eBay, example shipping charges and credit card charges. With fuel prices to rise, the customer suffers the increment of delivery and postal charges. This affect the total cost of auctioned items very expensive. When provider of credit card merchants like Visa or Master-card decide a charge for online business transaction the total cost of the same items would increase with a negative effects on the final customer of the product and will make eBay loose some of its future consumer and will affect the profit and share value of the company. 6. CONCLUSION EBay is well aware that in order for the company to maintain its competitive advantage and make it sustainable in the long run, the company must take advantage of the changes at the corporate, organizational and business levels. EBay embraces the five building blocks which are applied randomly throughout eBays history: improvisation, co-adaption, regeneration, experimentation and time pacing as evident by the strategies discussed. The company also embraces the 10 principles of competing on the edge about strategy, organization and leadership. With all hands on deck EBay can go further if the managing, marketing department embrace more with its IT department by merging with more social media platform not just their website because social website break more distance with communities of friends of my friends. Security department should work more bringing down the risk of internet fraud, this is one area of online business transaction that turn people away from buying online, because nobody wants to their money to end up on the place after paying for an item or product.

Saturday, October 12, 2019

Adolescent Girls at Risk Essay -- Essays Papers

Adolescent Girls at Risk What risks are really in existence for adolescent girls growing up on the Arizona-Mexico border? Well, more then anyone in their right mind might be able to imagine. Adolescent girls growing up on the border or in a multicultural area are generally from lower income homes, which in itself introduces an entire set of risk factors. The main focus, but certainly not the only ones at risk, being that of minority groups, such as Hispanic and American Indian girls. In general, they are at a risk for teen pregnancy, drug and alcohol abuse, gang affiliation, and academic and social challenges at school. Now this might not seem entirely foreign or surprising to some people. In fact, almost all high school students are at risk for everything listed, but the degree to which the girls are vulnerable to these risks in a multicultural environment can be alarming. There are many factors that can affect an adolescent girl’s degree of risk, and these factors are generally characterized as â€Å"stressors.† Stressors can consist of many things, from family problems, to social problems, to problems with academics. In migrant children, the stressors can be from the actual act of moving. They can also develop from difficulties in adjusting to a new area where they are now the minority and are being discriminated against for the first time (Canino & Spurlock, 18). This can cause a marked decline in self-esteem, which leads to even more difficulties including metal health problems. Many risk factors affecting minority youth are enhanced by the fact that they are typically from poor, highly stressed families (Canino & Spurlock, 18). Among all of these stressors, there are remedies, including social support... ... Children for Success in the 21st Century. Phoenix, AZ: Arizona Town Hall, 1994. Branch, Curtis W. Clinical Interventions with Gang Adolescents and Their Families. Boulder, CO: Westview Press, 1997. Canino and Spurlock. Culturally Diverse Children and Adolescents: Assessment, Diagnosis, and Treatment. New York, NY: Guilford Press, 1994. Finkelstein, Nadia Ehrlich. Children and Youth in Limbo: A Search for Connections. New York, NY: Praeger Publishers, 1991. Garza and Ockerman. Adolescent Mexican American Student Attitudes of Self-Concept, Locus of Control and Family Ideology in the Lower Rio Grande Valley of Texas. Palo Alto, CA: R&E Research Associates, Inc., 1979. Marchant and Smith. Adolescent Girls at Risk. New York, NY: Pergamon Press, 1977. Social Work with Adolescents. Ed. Jones and Pritchard. Boston, MA: Routledge and Kegan Paul, 1980.

Friday, October 11, 2019

Discuss the Role of Endogenous Pacemakers

Discuss the role of endogenous pacemakers in the control of circadian rhythms [AO1 8 marks, AO2 16 marks] An endogenous pacemaker is an internal biological clock that controls the way in which many of our biological rhythms behave. Many of these rhythms run on a 24 hour basis, such as the sleep/wake cycle, bodily temperatures and some of our hormones. The main endogenous pacemaker in mammals is the suprachiasmatic nucleus (SCN), which is located in the hypothalamus. It receives information about lights from the eye through the optic nerve.This happens even when our eyes are shut, due to them being so thin, meaning that if our endogenous clocks are slow (e. g. because the sun rises earlier than the day before) morning light automatically shifts the clock ahead, putting the rhythm back in sync with the day. At night, when there is no light, the SCN then sends a message to the pineal gland, causing it to increase the production of melatonin, which induces sleep by preventing the brains mechanism to promote wakefulness.An example of the way endogenous pacemakers control our circadian rhythms is a case study on Michael Siffre. Siffre willingly spent a long period of time under ground, to find out what happens to the sleep/wake cycle when the biological rhythm is allowed to run freely without external cues. His findings showed that the free running cycle settled down to a regular rhythm which is little over 24 hours. This study shows that the circadian rhythm persists without the cues of natural light, which demonstrates the existence of an endogenous clock.However the study also shows that external cues are also important to the sleep/wake cycle, because the clock was not perfectly accurate, meaning that without the cues of natural light, it would become out of sync with day and night. This study was supported by Aschoff and Wever (1985) who placed participants in an underground bunker without any external cues , and found that many participants displayed circadian rhythms of between 24 and 25 hours. However some of the circadian rhythms of those in the bunker were as long as 29 hours, showing that individual differences can effect the results meaning this study and the case study of MichaelSiffre cannot be generalised to the wider population. Miles et al’s (1977) study of a man that had been blind since birth showed that the man had a circadian cycle of 24. 9 hours. The blind man was exposed to different exogenous zeitgebers such as clocks and social cues, but they found that none of these factors reduced his biological clock to 24 hours, and he had to take stimulants in the morning and sedatives at certain times at night to reduce his biological rhythm in time with the rest of the world.This research supports the idea that the sleep/wake cycle isa circadian rhythm controlled by an endogenous pacemaker as it did not adjust when influenced with any natural exogenous zeitgebers, and was only effected when certain drugs were used to chang e it. However this study can be criticized as it is only a case study of one man, meaning it lacks population validity and cannot be generalised to the wider population. Morgan et al (1995) also provided evidence for the effect of endogenous pacemakers of the circadian rhythms by breeding ‘mutant’ hamsters that had circadian rhythms of 20 hours instead of 24.He then cut the SCN’s out of the mutant hamsters and transplanted them into normal hamsters. The normal hamsters the began to display the 20 hour circadian rhythm of the mutant hamster. This proves that endogenous pacemakers play a large role in circadian rhythms, as it showed that the sleep cycle in the hamsters depended on biological factors from with in the brain. However this research may raise some ethical issues as it can be seen to breach the terms of animal cruelty, as it may cause the hamsters to become psychologically unhealthy.Also the research can be criticized as it only shows the effect of the S CN on hamsters sleeping cycles and cannot be generalised to humans as hamsters have much smaller brains and are also nocturnal animals meaning that light does not effect their circadian rhythms, the same way it does ours. In conclusion, I think that endogenous pacemakers do play a very large role in helping to maintain our circadian rhythms, however this is also with the help of various exogenous zeitgebers which help keep the rhythms precise.

Thursday, October 10, 2019

Admission to the Masters of Accounting Program at the College

I have faced a number of knotty situations in life. On one occasion, I was working with the ADA or the American Diabetes Association. We worked as two groups and our principal task was to count and reconcile the checks, cash and credit card donations, which used to arrive in large quantities. One day an older man joined our team. Then our troubles started. Till that time we had worked without any mutual misgivings or bickering. With the advent of this person, our time schedules and procedures went haywire. I studied the situation and realized that all this was due to his reluctance to follow the established procedure.Every one, in both the groups, was compelled to go home late, due to this person’s obduracy. All felt that he should be suitably reprimanded, but no one was willing to undertake this unpleasant task. The question that was foremost on every one’s mind was ‘who would bell the cat?’ I jumped into the fray and gently but firmly convinced him that w hat he was doing was unacceptable. He was happy with this way of communication, because I had talked to him in private, so that his pride was not hurt. This had the desired effect and we were able to complete the work in time.In addition, I was also the secretary of the African Cultural Society. I was instrumental in planning and implementing the IREP Africa program at the College of William & Mary. This task entailed coordination between and interaction with a number of fellow students, faculty and departments. I emerged much stronger as a coordinator, facilitator and administrator after this novel experience. The professed objective of this program was to unite African student organizations in Virginia and to improve their relations with each other.   I actively participated in several campaigns to raise funds for the underprivileged in Africa and one of them was in respect of poverty stricken women of Uganda.A successful and efficient accountant is one who is reliable, thorough , ingenious, a seeker of solutions, well organized and performance oriented. Of these the most important is trustworthiness, because accountants, in addition to their usual work, have to offer reliable advice regarding the conduct of business in the present day economic and legal context. Moreover, if accounting standards are not adhered to, then the company stands the risk of having to close down. The Sarbanes Oxley Act was enacted in the year 2002, in order to deal with such eventualities.Another important trait of an accountant is attention to detail. I possess this in ample measure. This fact was disclosed in my tenure as the treasurer of the African Cultural Society, between the years 2006 to 2007; and as the Vice President of the Syndicate. In these tasks, I maintained authentic and comprehensive financial records. I reviewed the internal financial controls and ensured that the organization’s moneys were safe. This club has a number of advantages and I took up aggressiv e marketing to ensure that its membership increased.The lack of ethical and moral accounting practices in business organizations results in financial frauds. This was clearly established in the following cases.In the year 2001, Enron announced a net loss of $ 618 million for its third quarter and that it would reduce the shareholders’ equity by $ 1.2 billion. The SEC immediately stepped in and demanded financial information from Enron. The Enron team of Auditor’s lead by their leader Anderson systematically destroyed a large number of financial documents. Subsequently, the Enron officials and its auditors were charged and convicted of fraud.This company had engaged in malpractices relating to financial accounting, with the result that the company became bankrupt. To conceal its malafide practices, this company indulged in complicated accounting practices. This illustrates the fact that accounting has to be ethical, transparent and morally upright. The consequence of th e Enron case was that the law relating to accountancy was made more stringent. However, more than even legislation; personal attitude, morality and ethical behavior should have greater influence.WorldCom was another company, which also attempted to camouflage its fraudulent activities by resorting to fudging of figures and falsification of financial reports. The procedure adopted by its accountants was less sophisticated than that of the Enron team; nevertheless, it committed a much greater fraud than Enron. However, these cases were not isolated incidents and proved to be merely the tip of the iceberg. Several more such fraudulent corporations were investigated by the Federal and state regulators. The principal among these are Adelphia, HealthSouth and Tyco, to name a few.I have a flair for leadership and I often volunteer to lead in various academic projects. Recently, I took over the reins of project, involving the formulation of a business plan to be presented to the board of di rectors. This project emerged as a huge success, despite the difficulties encountered, due to having to lead a team of peers. The team comprised of persons with different temperaments and it required a lot of innovativeness and ingenuity to extract the best from them.I have tremendous patience, as can be attested to by the students of the second grade, whom I teach as a volunteer teacher in the Waller Mill Elementary school, in Williamsburg. The foregoing incidents from my life reveal that I possess a high level of integrity, reliability, planning and implementing capacity, motivational skills, inspiration, ability to work in a team and patience.What are you hoping to achieve during your studies in the MAcc Program?  I will complete my Bachelor’s degree in accounting by the month of May, 2008. Subsequently, I intend to pursue the Masters of Accounting Program at the College of William and Mary's School of Business. This course is truly outstanding and the faculty is the thi rd best in the nation. Classes are typically small and informal. The emphasis is on acquiring expertise. The faculty is easily accessible, if one wants to clarify doubts. In conjunction with my considerable management and leadership skills, this knowledge in accountancy will render me highly suitable for obtaining the Certified Public Accountant license. My principal objective is to become a CPA.

A Narrative of the Captivity and Restoration of Mrs. Mary Rowlandson Essay

On June 20, 1675, Metacomet, also known as Philip by the early American colonist, led a series of attacks on colonial settlements that lasted for more than a year. These attacks became known as â€Å"King Philips War.† It was a desperate attempt by the Natives to retain their land as their culture and resources dwindled before them. Mary Rowlandson, a famous victim of these Indian attacks, recounts her eleven-week captivity in her published book, A Narrative of the Captivity and Restoration of Mrs. Mary Rowlandson. The book describes her experience as a captive of the Wampanoags in great detail, and combines high adventure, heroism, and exemplary piety, which made it a popular piece in the seventeenth century. Throughout the narrative Mary Rowlandson portrays her skills as a writer with the delineation of her character. In her captivity, Mary Rowland realizes that life is short and nothing is certain. The common theme of uncertainty teaches Rowlandson that she can take nothing for grated. In a single day the seeming stability of life disappears without warning as portrayed in the opening scene when the town of Lancaster is burned down and she is separated from her two elder children. Rowlandson transitions from a wife of a wealthy minister with three children to a captive prisoner with a single wounded daughter in one day. Another instance of uncertainty is between The Twelfth Remove, where she is approved by her master to be sold to her husband, but the next day in The Thirteenth Remove she writes, â€Å"instead of going toward the Bay, which was that I desired, I must go with them five or six miles down the river into the mighty thicket of brush; where we abode almost a fortnight (271).† In addition to the uncertainty nothing in her captivity was consistent either. One day the Indians treat her respectfully, while the next day they give her no food. This inconsistency can be seen between The Eighth Remove and The Ninth Remove. In The Eighth Remove, Rowlandson is asked to make various garments in return for a shilling and different types  foods; however, in The Ninth Remove, Rowland was asked to make a shirt, but receives nothing in return (267-268). The inconsistency stems from the uncertain future, which plants fear in Rowlandson’s character. The only light she can see in her dark captivity is the light of her God. As a Puritan, Rowlandson believes that God’s will shapes the events in her life, and that each event serves a purpose. The common Puritan belief that humans have no choice, but to accept God’s will and make sense of it is portrayed throughout her narrative. This belief in God produces values of fortitude and determination Rowlandson uses to survive the eleven-week captivity. This is can be seen in The Second Remove as she is about to collapse from fatigue and injury, â€Å"but the Lord renewed my strength still, and carried me along, that I might see more of his power (260).† Rowlandson often creates parallels between her own situation and biblical verses about the Israelites because the Puritans thought they were the descendants of the Israelites in the new world. This is portrayed in the closing scene when Rowlandson is reunited with her family and she quotes Moses speaking to the Israelites, †stand still and see the salvation of the Lord (288).† Moses said this to the Israelites at their arrival to the promise land after forty days of wandering in the desert. Rowlandson compares her captivity to the forty days in the desert, and her reunion with her family to the arrival at the promise land. In Rowlandson’s captivity, her perspective of the Native Indians evolves from savagery to aspects of civility. The more time she spent with the Natives the more relations she made with them that culminate into respect and appreciation for their culture. Initially Rowlandson considered the Natives â€Å"barbarous creatures† who â€Å"made the place a lively resemblance of hell† after the burning of Lancaster (259). As a result she speculates the Natives as violent savages. She was also disgusted with the various foods they ate such as ground nuts, tree bark, and horse liver; nevertheless, after three weeks of starvation she acquired a taste for the irregular foods. This is depicted in The Fifth Remove, â€Å"but the third week†¦ I could starve and die before I could eat such things, yet they were sweet and savory to my taste (265).† This expresses a minor change of heart Rowlandson  has for the Natives as she finds herself eating the same foods and enjoying them. In addition to the acquired taste of the Native foods, more similarities become apparent such as â€Å"praying Indians† who claim to have converted to Christianity and some instances where the Natives are wearing colonists’ clothing (279). The once distinct difference in civility and savagery becomes blurred in the similarities Rowland notices between the colonist and the Natives. Rowlandson explores the fearful hesitation most colonists feel in the face of the new world. The new world is the unknown environments outside the colonies, mainly toward the west. This includes the forest and wooded areas that are associated with the Natives. It is where the Natives live, where they take their captives, and a place of unknown to the colonist, which made it fearful. Rowlandson described it as a place of â€Å"deep dungeon† and â€Å"high and steep hill (266).† In Rowlandson’s captivity, she is pushed into the forest where her experience brings her further away from civilization. Her and other captives, such as Robert Pepper, gain practical knowledge about the natural world during their time spent with the Indians. Although this knowledge is key to her survival, it brings her anxiety and guilt because she feels as though she is being pushed from civilization. The delineated characterization of Mary Rowlandson in her published book, A Narrative of the Captivity and Restoration of Mrs. Mary Rowlandson, depicts the way Puritans approached life with religious concepts and beliefs, but the influence of the Native culture is what separates her work as the first captivity narrative. In her captivity she loses her original physiological security through eleven weeks of uncertainty and inconsistency. This forces her to think outside her Puritan ideology into the new world of different environments and experiences. Her new experiences allow her to grow and appreciate the differences of the new world, and in her reflection Rowlandson closes the gap between the Natives and Puritans by identifying the similarities between the two cultures.