Sunday, December 29, 2019

Journal on Three Learning Disabilities - 561 Words

ADHD ADHD stand for Attention Deficit Hyperactivity Disorder and it is actually a very common disorder that affects children and young adults. For some it may continue into their adulthood. It is estimated that around three to ten percent of children have ADHD. There are many questions by professionals as to kids can really outgrow ADHD, meaning that it may be more common amongst adults than originally thought to be. Children that have ADHD have more problems paying attention or concentrating than kids that do not have ADHD. This is especially a problem in the class room, where most children are expected to sit and pay attention for about 2 hours straight. They have difficulty following directions, and get frustrated or bored with what they’re doing. This proves to be another problem in the classroom, where students should follow directions on many things, and if a child has problems doing this, it only makes school harder for them. The impulsiveness is more evident in childre n with ADHD than children that don’t have it. Do you know anyone who has this? In my family, I do not have anyone that has ADHD. However, I do have friends that have ADHD. Most have outgrown it, and learnt to handle it, since they have had help. It is thinking back, I feel like there were more people in my life that may have had this, but I may have been too young to realize this. I do not think that I know any adults that have ADHD, as it is less common among adults . Autism Autism SpectrumShow MoreRelatedResearch Based Note Taking Interventions For Students With Disabilities1210 Words   |  5 PagesApproximately 11% of students with disabilities attend college. Lectures comprise a major portion of students’ learning time. One of the most crucial skills to attain before attending college is the ability to learn note-taking skills. Note-taking skills assists students in their understanding of the content and increases their ability to understand and recall the information (Steimle, Brdiczka, Mà ¼hlhà ¤user, 2009). During a lecture, students with learning disabilities have difficulty discerning importantRead MoreEssay about Students With ADD/ADHD and Class Placement1218 Words   |  5 PagesContemporary students with learning-disabilities such as ADD/ADHD are continuously perceived as incompetent to adapt in an ordinary classroom setting with other students without learning-disabilities. Consequently, many students with learning disabilities are placed in classrooms that are designated only for students with learning disabilities. It is because of this classroom placement problem that many learning-impaired students are doing worse academically and socially in a non-inclusive settingRead MoreLearning Disabilities and Dysgraphia1485 Words   |  6 PagesRunning head: LEARNING DISABILITIES AND DYSGRAPHIA Children with Dysgrapia and Other Learning Disabilities Your Name School Name or Institution Abstract There are many types of learning disabilities that are prevalent among children in the world today. This paper will not necessarily explore in detail the prevalence of the disorders, but explore the different types, causes, and treatment for the variety of learning disabilities among children today. This paper will focus particularly on oneRead MoreThe Effects Of Adhd On Children s Overall Development1318 Words   |  6 Pagesdomains. About half of all the children who have ADHD also have a learning disability. â€Å"Among the children who did not have a learning disability, children with ADHD had more learning problems than children without ADHD, indicating that children with ADHD had some difficulty with learning even though they did not meet the criteria for LD.† (Learning disabilities and ADHD: Overlapping spectrum disorders. Journal of Learning Disabilities) â€Å"Material and methods: Cognitive test data were analyzed for 10-Read MoreDeveloping Instructional Practices For Students With Specific Learning Disabilities Case Study1280 Words   |  6 Pages Developing Instructional Practices for Students with Specific Learning Disabilities Student’s Name Institution Affiliation Developing Instructional Practices for Students with Specific Learning Disabilities Part One How to Support Students with Specific Learning Disabilities The research-based instructional practices for supporting students with reading, mathematics, and language disabilities in the science and social studies content areas throughout elementary school includeRead MoreAssistive Technology Essay1440 Words   |  6 Pages1996). We may not know it and may not have an underlying disability but we are utilizing basic technology (e.g. phones, calculators) in ways that are similar to how individuals with disabilities utilize assistive technology (e.g. text-to-speech, screen readers) in their life endeavors (Stumbo, Martin, Hedrick, 2009). However, AT is different from technology utilized by individuals without disabilities in that, for the individual with a disability, the utilization of AT may make activities possible;Read MoreToken Economy: Teachers Use of Positive Reinforcement in Schools1153 Words   |  5 Pagesit has strong advantages with children with disabilities as well as home schooled children. I believe that a token economy is one of the most powerful behavioral interventions for improving school behavior. Token programs allow for the use of more powerful incentives than are typically in place in the classroom. In addition, token programs have the advantage of providing more immediate rewards than home-based programs. The first scholarly journal that I read was called Effects of ClassroomRead MoreInforming People About Reading Disability993 Words   |  4 PagesInforming People about Reading Disability Curtiss, S. L., et al. Bringing Instructional Strategies Home: Reaching Families Online . Teaching Exceptional Children January/February 2016: 160-167. Curtiss et al. (2016) express how the collaboration of teachers and parents is difficult because of the overlap between parent and teacher work schedules. The authors detail how instructors can provide online learning support for parents who support child with limited expressive communication. They highlightRead MoreThe Characters Dick, Jane, and Spot Essay1255 Words   |  6 Pagesdifficult concept to master, especially when learning the spelling of American Standard English. George Bernard Shaw said that the word fish might as well be spelled ghoti--using gh as in rough, o is in women and ti as in vacation(Glazer 99). Sometimes the spelling of certain words can seem illogical and may have no other similar spelling in the language. When a young child looks at these words, the student cannot use logic to spell certain words. Learning Disabled children have a hard time conqueringRead MoreEvaluation Of Competency Test For Students With Special Needs1592 Words   |  7 PagesState of Texas Assessment of Academic Readiness (STAAR) and Criterion-Referenced Competency Test (CRCT), are a major concern for students with disabilities and their teachers, because students are struggling with passing formal assessments and showing low abilities to comprehend the reading. In order to bridge this gap in literacy, teachers may use three effective literacy strategies for students with special needs. Question Answer Relationship (QAR) comprehension strategy, reading miscue test, and

Saturday, December 21, 2019

Kimberly-Clark Use Sustainable Standards to Operate

Kimberly-Clark Use Sustainable Standards to Operate Sheila Cole Southern New Hampshire University Professor Gaylynn Brenoel March 13, 2016 Introduction Economic growth is defined as the increased capacity of an economy to produce goods and services, compared from one period of time to another. An example of growth is associated with technology like the internet and the way it has brought the U.S. industry as a whole; moreover, improve the quality of life. Kimberly-Clark as a business has not stopped growing as a business so their sustainability continues to grow as the company grows too. They have remain in business by being responsible to the consumer and the government, practice ethical economical practices and protect†¦show more content†¦In turn, customers show their commitment to the company by purchasing their products. In essence, Kimberly- Clark is building the bridge for generations to come. Economy Kimberly-Clark focuses on the populations that are buying and utilizing their products on a daily basis which is a winning scenario for all parties involved. The consumer gets the best product for themselves and the environment; moreover, spends money to buy more. The company is able to employ more personnel to produce the products while maintaining the government rules and regulation. Meanwhile this is contrast to encompassing everyone whether they are buying the company’s product or not. Association in the world Kimberly-Clark has businesses in Latin America, Europe, Middle East, Africa, and Asia that gives back into the community by becoming involved with several non-profit groups like the boys amp; girls club, UNICEF, diapers for moms. KC does business with companies like Wal-Mart who also invest into the communities and organizations that contributes to society. Answer the Government We use sustainable environmental practices to grow responsibly in a world of finite resources. Kimberly-Clark sets their company rules and regulations are below the government expectations therefore remaining in compliance of the government. Example, Sustainability 2015 Goal: We strive to manage our wasteShow MoreRelatedPG industry analysis2177 Words   |  9 Pagesgoods industry. When define the consumer goods, which often described as Consumer Packaged Goods Industry (CONSUMER GOODSG) or Fast-Moving Consumer Goods (FMCG), which refer to the products or services for personal or household use in which are sold quickly and at relatively low cost. The main players are both on retailer side such as Walmart, Carrefour and Target and on the global companies side such as Unilever and Procter Gamble. Consumer Goods Industry Growth ForecastingRead MoreAnalysis Of The Book From Good For Great : Why Some Companies Make The Leap And Others Don t 1441 Words   |  6 Pagesbeing just good to justifiably great. The term â€Å"great† is operationally defined by a number of criteria, including, financial performance exceeding the market average by several deviations over a sustained period of time. Collins and his research team use these criteria to thoroughly review the business literature, identify companies that met their determined criteria for being â€Å"great.† Then, these â€Å"great† companies were compared to their competitors and the features that separated the companies wereRead MoreBecton Dickinson and Company: Multidivisional Marketing Programs6857 Words   |  28 Pagesand we discovered some common threads in their experiences. Most important, theyve all taken a pragmatic, disciplined approach to CRM, launching highly focused projects that arc relati vely narrow in their scope and modest in their goals. Rather than use CRM to transform entire businesses, theyve directed their investments toward solving clearly defined problems within their customer relationship cycle - the series of activities that runs from the initial segmenting and targeting of customers all theRead MoreProcter and Gamble Strategic Analysis3371 Words   |  14 Pagesbreakthroughs originate in the Procter Gamble’s laboratories. Procter Gamble operates in more than 80 countries worldwide, which makes for one of the largest global companies around. Procter Gamble manufacturers their own products, and they do so in different places all throughout the world. These places include the US, Canada, Latin America, China, Asia and Africa. Procter Gamble’s strategy is mostly focused on innovation. They use this strategy to approach consumers more easily, and to obtain the mostRead MoreProcter and Gamble Market Analysis Essay7261 Words   |  30 PagesCOMPETITIVE COMPARISON 15 research and development 16 Patent and trademarks 16 summary of key findings 17 references 18 Executive summary The Procter Gamble Company (PG) began its operation in downtown Cincinnati, Ohio in 1837. The company operates in a very competitive industry where the low priced local competitors and store brands are competing in most of the categories of PG. As a result the company faces intense competition in most of its product categories. PG trades under the symbolRead MoreFmcg Products Classification5487 Words   |  22 Pagescovers over 2 million retail outlets across India directly and its products are available in over 6.4 million outlets in the country. As per Nielsen market research data, two out of three Indians use HUL products. Hindustan Unilever Limited is an India-based fast moving consumer goods company. The Company operates in seven business segments. Soaps and detergents include soaps, detergent bars, detergent powders and scourers. Personal products include products in the categories of oral care, skin care (excludingRead MorePfizer Review Essay3245 Words   |  13 PagesSTAKEHOLDERS It is an honor for me to lead Pfizer at this important time for both our company and the industry. I’ve spent my entire career at Pfizer and during this time I have seen the industry change and evolve in terms of customers’ needs, regulatory standards and where growth occurs. Among these changes, one of the most important has been the increasing pressure from payers, governments and society to deliver greater value. That’s why I believe there is a fundamental question facing the industry and PfizerRead MorePG Strategic Plan8305 Words   |  34 Pagesfor the company based on in-depth market and company research. Analyses are based on standard business strategy analysis tools, which are: Strengths, Weaknesses, Opportunities Threats (SWOT) analysis, External and Internal Factors Evaluation (EFE/IFE) Matrices, and standard financial analyses including competitive comparison with Procter Gamble’s industry. Strategic alternatives were evaluated with the use of the Internal-External (IE) Matrix and the Grand Strategy Matrix which fed into theRead MoreStrategic Innovation8306 Words   |  34 Pages.............. 14 2.7. Disciplined Implementation – Managing the Path From Inspiration To Business Impact15 2.7.1. Key considerations for implementing Strategic Innovation initiatives ............................ 15 3. 3.1. 3.2. 3.3. SUSTAINABLE INNOVATION – BUILDING A FOUNDATION FOR ONGOING COMPETITIVE ADVANTAGE ......................................... 17 The Path to Strategic Innovation ......................................................................................... 18 InnovationRead MoreEmployee Engagement and CSR: TRANSACTIONAL, RELATIONAL, AND DEVELOPMENTAL APPROACHES12982 Words   |  52 Pagesserving our communities.† In late 2010, Unilever unveiled its Sustainable Living Plan whereby it intends to improve the health of 1 billion people, buy 100% of its agricultural raw materials from sustainable sources, and reduce the environmental impact of everything it sells by one-half, while doubling its revenues. To achieve these aims, the company will have to reach out to its consumers and activate them. For instance, to reduce energy use associated with its soaps by half, consumers would have

Friday, December 13, 2019

Understanding The ADD and ADHD Free Essays

string(81) " a television or radio that is turned on in another room may become distraction\." Attention Deficit Disorder Kam Bisel Attention Deficit Disorder (ADD) is a problem that affects 5% to 10% of all children. ADD affect more children than any other childhood problems except asthma. It is estimated to be the largest single cause for first referrals to child guidance clinics throughout the country, making up as many as 40% of those cases. We will write a custom essay sample on Understanding The ADD and ADHD or any similar topic only for you Order Now Many ADD cases are not diagnosed because the problem most often does not show in the doctors office. Current estimates suggest that approximately 50 to 65% of the children with ADD will have symptoms of the disorder as adolescents and adults. Although ADD has just recently been discovered and there is still relatively little known about it. In 1902, George Frederick Still believed the dilemma of the problem child was linked to a biological defect inherited from an injury at birth and not the result of the environment. Through 1930-40’s stimulant drugs were first used to successfully treat many behavior problems due in part by Still’s hypothesis. In 1960, Stella Chess researched in the field by writing about the â€Å"hyperactive child syndrome. She took Still’s hypothesis further stating that the resulting behavior problems stem from a biological cause, although it is linked to a genetic inheritance rather then a birth defect from an injury. Finally, in 1980, the syndrome was named Attention Deficit Disorder, due in large part to Virginia Douglas’s work to find accurate ways to diagnose it (Hallowell 2). This is currently how it stands in the axis two of the DSM-IV today, with the addition of a new category Attention Deficit Hyperactivity Disorder and there sub types. Most scientist now believe that an abnormality in brain chemistry could be to blame for the symptoms of Attention Deficit Disorder. The frontal lobes of the brain are believed to be responsible for the regulation of behavior and attention. They receive information from the lower brain, which regulates arousal and screens incoming messages from within and outside of the body. The limbic system which is a group of related nervous system structures located in the midbrain and linked to emotions and feelings then sends the messages to the frontal lobes. Finally, the frontal lobes are suspected to be the site of working memory, the place where information about the immediate environment is considered for memory storage, planning, and future-directed behavior. Scientist believe the activity in the frontal lobes is depressed in people with ADD. Studies also show, a decrease in the ability of the Attention Deficit Disorder brain to use glucose, the body’s main source of energy, leading to slower and less efficient activity. Neurotransmitter provide the connection between one nerve cell and another. It is also now suspected that people with Attention Deficit Disorder have a chemical imbalance of a class of neurotransmitter called catecholamine. Dopamine, helps to form a pathway between the motor center of the midbrain and the frontal lobes, as well as a pathway between the limbic system and the frontal lobes. Without enough dopamine and related catecholamine, such as serotonin and norepinephrine, the frontal lobes are under stimulated and thus unable to perform their complex functions efficiently. Attention Deficit Disorder is primarily considered a genetic disorder. Which is why it is labeled a axis two in the DSM-IV. Studies show that 20-30% of all hyperactive children have at least one parent with ADD. However, not all cases of ADD are genetically linked. Some studies show that a small percentage of ADD cases were influenced by smoking, drinking alcohol, and using drugs during pregnancy. Exposure to toxins, such as lead, may also alter the brain chemistry and function. Both of these issues are cause for concern for the at-risk population. ADD generally affects males more often than females, in a 3:1 ratio. Because this disorder effects the brain detection of this condition is difficult. The accepted test, although today there has been an increase in research into ADD and subsequently now other tests. The test requires a nine month observation of the person, as well as EEGs, MRIs, or a PET scan. During the nine months, the person has to show a certain number of the classic traits associated with the disorder. The EEG are used to record the amount of electrical activity that is happening in the brain. An MRI is an x-ray that shows the brain’s anatomy however it is not a routine assessment. More recently, the way to diagnose ADD is the use of a PET scan, which measure the amount activity in the brain. There are two general categories for those diagnosed with Attention Deficit Disorder. One is ADHD (Attention Deficit Hyperactivity Disorder), this is the more prevalent of the two. A person with ADHD will show certain characteristics. Characteristics like, fidgeting, squirming, difficulty remaining seated, easily distracted, difficulty awaiting turn, interrupting, difficulty following directions, sustaining attention, shifting from one uncompleted task to another, not listening, following multiple directions, and frequently engaging in dangerous actions. The general diagnosis of ADD, as opposed to ADHD, has some, but not all of the above characteristics. There are people who have been diagnosed with ADD whose characteristics are not hyperactive but the complete opposite, they are underactive. This goes against the general notion that only kids who are hyperactive have ADD. These children often daydream and are never mentally present anywhere. They constantly drift off into their own world during classes or conversations. This type is more prevalent in females with ADD then in males. The underlining issues with these children are the inability to focus, they are too easily distracted. This form of ADD is the hardest to diagnose since it seems that these people simply need to â€Å"apply themselves more† or â€Å"get their act together. † Attention Deficit Disorder not only effects those afflicted in the classroom but at home as well. The rest of the families daily routine may become a distraction to those afflicted with ADD. Sometimes a television or radio that is turned on in another room may become distraction. You read "Understanding The ADD and ADHD" in category "Essay examples" What the ADD person needs is a sound screen. A sound screen is some form of constant noise that plays in the background, commonly a television or a radio. At first it may seem like a distraction, but in reality, if the TV or music forms a kind of â€Å"white noise† with an even level of intensity, which actually covers up discrepant noises that can be a distraction. â€Å"The hum of a ceiling fan or motor can do wonders to soothe and focus you† (Weiss. 7). Getting a family household to function smoothly is challenging for any family, with or without the presence of ADD. Adults and children suffering from Attention Deficit Disorder have trouble establishing and maintaining physical order, coordinating schedules and activities, and accepting and meeting responsibilities. Parents with children suffering with ADD have to learn how to deal with the obstacles that they will have while raising their child. Since ADD is genetically passed through to children the tendency is to have more then just the child with ADD but the parents too. Not only does the child have a problem with rules and schedules but so does the parent. Adults dealing with ADD often have chronic employment problems, impulsive spending, and erratic bookkeeping and bill paying. Raising healthy, well-adjusted children requires patience, sound judgment, good humor, and, discipline which is difficult for a parent with ADD to do. The presence of ADD often hinders the development of intimate relationships for a variety of reasons. Although many adults with ADD enjoy successful, satisfying marriages, the disorder almost always adds a certain amount of extra tension and pressure to the union. The non-ADD spouse bears an additional burden of responsibility for keeping the household running smoothly and meeting the needs of the children, the spouse with ADD, and, if he or she has time, his or her own priorities. Raising a child who has ADD can be an exhausting and, at times, frustrating experience. Parents play a key role in managing the disability. They usually need specialized training in behavior management and benefit greatly from parent support groups. Parents often find that approaches to raising that work well with children who do not have ADD, do not work as well with children who have ADD. Parents often feel helpless, frustrated and exhausted. Especially if the child’s condition is unknown at the time. It could seem to the parent that the child is just bad. Too often, family members become angry and withdraw from each other. If untreated, the situation only worsens. Parent training can be one of the most important and effective interventions for a child with ADD. Effective training will teach parents how to apply strategies to manage their child’s behavior and improve their relationship with their child. Without consistent structure and clearly defined expectations and limits, children with ADD can become quite confused about the behaviors that are expected of them. Making and keeping friends is a difficult task for children with ADD. A variety of behavioral excesses and deficits common to these children get in the way of friendships. They may talk too much, dominate activities, intrude in others’ games, or quit a game before its done. They may be unable to pay attention to what another child is saying, not respond when someone else tries to initiate and activity, or exhibit inappropriate behavior. There is no cure for Attention Deficit Disorder. â€Å"Along with increasing awareness of the problem, a better understanding of its causes and treatment has developed† ( Wender 3). There is medication for ADD which will only alleviate the symptoms. The medication will not permanently restore the chemical imbalance. Approximately 70% of adults with ADD find that their symptoms significantly improve after they take medication prescribed by their doctors. The patient is able to concentrate on difficult and time-consuming tasks, stop impulsive behavior , and time the restless twitches that have been experienced in the past. Some ADD patient’s psychological and behavioral problems are not solved by medication alone, and are required more therapy or training. Adult patients have the burden of the past that often hinders their progress. The patient then needs help with the relief of disappointment, frustration, and nagging sense of self-doubt that often weighs upon the ADD patient. Some ADD patients suffer from low-grade depression or anxiety, others with a dependence on alcohol or drugs, and most with low self-esteem and feelings of helplessness. There are two types of drugs that work to balance the neurotransmitter and have been found to be most effective in treating ADD, stimulants and antidepressants. Stimulants work by increasing the amount of dopamine either produced in the brain or used by the frontal lobes of the brain. Antidepressants also stimulate brain activity in the frontal lobes, but they affect the production and use of other chemicals, usually norepinephrine and serotonin. All the drugs used to treat ADD have the same goal, to provide the brain with the raw materials it needs to concentrate over a sustained period of time, control impulses, and regulate motor activity. The drug or combination of drugs that work best for the patient depends on the individuals brain chemistry and constellation of symptoms. The process of finding the right drug can be tricky for each individual. The psychologists are not able to accurately predict how any one individual will respond to various doses or types of Attention Deficit Disorder medication. However, the drug of choice for Attention Deficit Disorder is Ritilan. Ritilan (Methylphenidate) is a mild CNS stimulant. In medicine, Ritilan’s primary use is treatment of Attention DeficitHyperactive Disorder (ADHD). The reason why this drug works so well is not completely understood, but Ritilan presumably activates the arousal system of the brain stem and the cortex to produce its stimulant effect. According to the Drug Enforcement Agency (DEA), prescriptions for Ritilan have increased more than 600% in the past five years. Ritilan (Methylphenidate) is manufactured by CIBA-Geigy Corporation. It is supplied in 5 mg. , 10 mg. , and 20 mg. ablets, and in a sustained release form, Ritilan SR, in 20 mg. tablets. It is readily water soluble and is intended for oral use. It is a Schedule II Controlled Substance under both the Federal and Vermont Controlled Substance Acts (Bailey 5). As stated before, ADHD is a condition most likely based in an inefficiency and inadequacy of Dopamine and Norepinephrine hormone availability, typically occurring when a person with ADHD tries to concentrate. Ritilan improves the efficiency of the hormones Dopamine and Norepinephrine, increasing the resources for memory, focus, concentration and attention (Clark 6). Ritilan exhibits pharmacological activity similar to that of amphetamines. Ritilan’s exact mechanism of action in the CNS is not fully understood, but the primary sites of activity appear to be in the cerebral cortex and the subcortical structures including the thalamus. Ritilan blocks the re-uptake mechanism present in dopaminergic neurons. As a result, sympathomimetic activity in the central nervous system and in the peripheral nervous system increases. Ritilan-induced CNS stimulation produces a decreased sense of fatigue, an increase in motor activity and mental alertness, mild euphoria, and brighter spirits. In the PNS, the actions of Ritilan are minimal at therapeutic doses (Clark 2 ). Ritilan is the quickest of all oral ADHD stimulant medications in onset of action: it starts to achieve benefit in 20 – 30 minutes after administration, and is most effective during the upward ‘slope’ and peak serum levels. Ritilan’s effect is brief: Most people experience 2-3 hours of benefit, but after 3 hours, benefits drop off rapidly. Some individuals, especially children, may obtain 4 or even 5 hours of positive effect (Clark 1). Attention Deficit Disorder is very prevalent throughout this country and the world. There is no cure. Those afflicted with the disorder must learn to compensate for it and live regardless of it’s affects. There are drugs and therapy available for those with this disorder to help them maintain there life. It is very frustrating to live with ADD or ADHD and even harder to live with it and not know it. Since ADD’s detection is difficult, often the symptoms are likened to some other cause in an effort to explain the behaviors. This has lead to many misdiagnoses. However, new studies on ADD and ADHD are in the works and with the Human Genome Project’s completion in 2003 there is hope more light will be shed on this disorder. How to cite Understanding The ADD and ADHD, Essay examples

Thursday, December 5, 2019

Corporate And Management National Business â€Myassignmenthelp.Com

Question: Discuss About The Corporate And Management National Business? Answer: Introduction: The recent trends in the modern world include the adoption of the information security trends to be applied in the business operations of organizations or companies. However, the presence of various risks and vulnerabilities in the information technologies are to be addressed for enhancing the safety of their applications. The following report discusses about the case study regarding the Aztek Company whose business corresponds to the financial service sectors. The assessment for the information technology risk management is included in the report. Furthermore, the challenges faced in the acceptance for such technologies are also covered in the report. Moreover, the IT risk principles and the IT security framework is also depicted it the analysis made on the report. Lastly, the report concludes by recommending the possible measure to be applied in their solutions. Discussion: Financial services are termed as a major part of the financial systems of the area concerned. They are mainly used to provide financial helps by using various credit instruments, services and products. The major applications of the financial services include cheque, debt clearance services, bills or credit instruments. The financial products extend from mutual funds investments to credit or debit cards. The major significance of the financial services includes the strengthening of countrys economy. This is mainly signified by the presence of more growth and prosperity on all the sectors of the companys economy. In addition, the economic growth of a country is reflected by the increase in the standards of living among the population of that country. Australian financial services: For the last two decades, the emergence of the financial services is evident by checking the global economy. The constant rate of the increasing financial economy has made the companies or business organizations to apply the solutions needed for referencing them and to apply them in their operations as well. The economy of Australia has seen an increase of 3.5% due to the financial strengthening of their services (Rampini Viswanathan, 2016). The administrations for the Australian financial services have made various implementations on the use of certain strategies for the effective business solutions and market economy. However, the presence of various risks in the financial economy is leveraging the opportunities to reference the weak points in the services. This is the main cause for the Aztek Company to face multiple issues pertaining to the information security. Moreover, the presence of illegal uses of financial services is also another cause for concerns by the company. The ce nter of the company is located in Australia which allows them to enjoy the benefits of the growing economy. This is helping them to increase their customer acquisition rate in the market. However, the additional services like implementation of online banking systems are another cause for concerns as the presence of cyber attacks and malwares are always evident. This is also the reason for losing of data from their data centers. This gives a pre-requisite to the Aztek Company to implement their security enhancements protocols for addressing such risks and threats. Risks and controls: There are various risks in the financial sectors that are due to the presence of both external and internal risks to the sector. Technology in the modern world is the main concept utilized for innovation. This can also be used to get unethical access to the system leading to breaches and grave impacts. The cyber threats occurring as data loss, user account compromising, file destroying or degrading are the main attacks included in the cyber security aspects. However, these are not the only risks faced by the financial institutions. The misalignment between businesses and information technology strategies and management decisions are also faced by these financial sectors as well (McNeil, Frey Embrechts, 2015). The main reason for such actions is the gap in technologies which causes hindrance to the normal operations. This effectively reduces the speed of serving the clients of the concerned financial organizations. Moreover, the increases of competition on the market like technologic al startups are making the existing businesses opt for more technologically driven approach to adopt the swiftness in their operations. Risk assessment: The risk assessment of information technology has made the possible integration of risk management techniques that helps in addressing the risks requirements and their mitigation. The ERM scheme is another method that has been applied by financial sectors that has helped them to enhance their process of decision making (Glendon, Clarke McKenna, 2016). The main objective of the information technology risk management is the removal of loopholes in the system that helps in the mitigation of the various threats and vulnerabilities that are referenced in the above section. Monetary Acts: The administrative authorities responsible for the monetary transactions in the market are not very efficient when it comes to the market risks. This is the main requirements for the presence of a regulatory committee in the market to analyze the market and the products included in it. In addition, the financial products which are also included in the market should also be subjected to regulatory committees and administrations. The traditional and the old methods of such administration lack the technological advancements needed for the regulatory preservations. This is being difficult for the clients to assess the validity of the products and the evaluation of them is very difficult (Chance Brooks, 2015). The Wallis report is used to serve as the connection among the risk allotment qualifications and the arrangements of the Trade Practices Act 1974 (DeAngelo Stulz, 2015). Cloud computing: Cloud technology is the incorporation of virtual architecture in the system that helps in the efficient betterment of the services. The resources are quickly accessed and modified however required. This allows the users of the cloud to access the computational abilities of the infrastructure and get the required capabilities whenever needed. This helps to increase the agility and deployment of these services. The pricing of the solutions is another feature that helps the businesses to apply for these services (Hopkin, 2017). The businesses are charged according to their usages which help them to keep track of their reports. The services provided by the cloud solutions include the presence of adequate resources, bandwidth and sustainable performance. The sole requirement of accessing the systems is the presence of an internet access. This allows remote availability of the cloud resources. In addition, disaster recovery is also possible by applying for backup. The operations of the sys tem pertaining to a particular date can be saved in the cloud for later use. In case of disasters in the system, the backed-up system can be downloaded from the cloud and will be implemented very fast. The resources are quickly accessed and modified however required. This allows the users of the cloud to access the computational abilities of the infrastructure and get the required capabilities whenever needed. This helps to increase the agility and deployment of these services. Stakeholders: The stakeholders in Australian financial sectors are said to expect higher returns. This in turn is followed by investing in risky businesses to get their desired profits. The Financial Sector Advisory Council has revealed that superannuation in the financial aspects has led to different outcomes on the premiums of the populations (Cohen, Krishnamoorthy Wright, 2017). The most typical stakeholders included in any financial sectors are the government, customers and the shareholders. This is the reason for the difference in the analytical ability of the market and the associated dangers of it. This presents the need to diversify the budget of the project. Impacts on the project: The project to be made in the Aztek Company is the introduction of cloud computing architecture to reference the solutions in the information technology aspects. Cloud technology is the incorporation of virtual architecture in the system that helps in the efficient betterment of the services. The resources are quickly accessed and modified however required. The main use of the cloud computing is for the maintenance of a virtual database to tend to the need of the customers and the employees. This allows the users of the cloud to access the computational abilities of the infrastructure and get the required capabilities whenever needed. This helps to increase the agility and deployment of these services. The services provided by the cloud solutions include the presence of adequate resources, bandwidth and sustainable performance. The sole requirement of accessing the systems is the presence of an internet access. This allows remote availability of the cloud resources. However, the presence of internet access for the access to the system has made the intrusions of several breaches to the system including malwares and viruses. The cyber threats occurring as data loss, user account compromising, file destroying or degrading are the main attacks included in the cyber security aspects. This is the main cause for data loss from the data centers. This is the main reason for the company to lose their brand value as well as business in the market. Australian frameworks: The administrative authorities of the financial sectors in Australia are responsible for referencing to the needs of the customers. This is the sole commitments made by the Australian Securities and Investments Commission (ASIC). The aim for this regulatory authorities is to make honesty and assurance in the products present in the financial market so as to reach their intended customer satisfaction level (Olson Wu, 2017). Third party cloud solutions: The cloud solutions are the incorporation of virtual architecture in the system that helps in the efficient betterment of the services. The resources are quickly accessed and modified however required. The main use of the cloud computing is for the maintenance of a virtual database to tend to the need of the customers and the employees. This allows the users of the cloud to access the computational abilities of the infrastructure and get the required capabilities whenever needed. This helps to increase the agility and deployment of these services. However, attacks are always made by insiders who have been given access to the system and the organizations need to know them. The transparency is not present with them as the resources and their access are granted by the vendors. This is the main reason for the financial sectors to opt for in-house applications of the cloud solutions. This will enable them to get the solutions of in-house security. In addition, the third-party vendors usually have the right to access the data. This reduces the transparency of the organizations to get their access whenever required. This also cannot be helped in case the client wants to expand their architecture. In addition, in case a vendor goes out of business, the cloud solutions will also be lost which will impact heavily on the operations of the organizations. This will heavily impact the financial sectors as their business as well as their brand image in the market will be gravely impacted. Risks assessment: Technology in the modern world is the main concept utilized for innovation. This can also be used to get unethical access to the system leading to breaches and grave impacts. The cyber threats occurring as data loss, user account compromising, file destroying or degrading are the main attacks included in the cyber security aspects. The data loss from the data centers of the financial sectors are also another cause for risks in the systems. However, these are not the only risks faced by the financial institutions. The misalignment between businesses and information technology strategies and management decisions are also faced by these financial sectors as well (McNeil, Frey Embrechts, 2015). However, the presence of internet access for the access to the system has made the intrusions of several breaches to the system including malwares and viruses. The cyber threats occurring as data loss, user account compromising, file destroying or degrading are the main attacks included in the cy ber security aspects. This is the main cause for data loss from the data centers. This is the main reason for the company to lose their brand value as well as business in the market. The risk assessment of information technology has made the possible integration of risk management techniques that helps in addressing the risks requirements and their mitigation. The main objective of the information technology risk management is the removal of loopholes in the system that helps in the mitigation of the various threats and vulnerabilities. The risk management of the information technology is included in a wide scope of enterprise solutions (Hopkin, 2017). The development and maintenance of management systems for referring to the information security aspects shows the adoption of a systematic approach to mitigate the security risks present in the financial services (Haywood et al., 2017). According to the framework of the information security, these risks assessments can be used to reduce or stop the impacts caused by the vulnerabilities or threats and also to apply the solutions to increase the business level which was not present to address them. The framework for the information security aspects need to reference the inside attacks as well as the outside attacks that can affect the businesses of these financial solutions. The various internal threats to the financial solutions are the operational problems in the IT aspects, failure to comply with the enterprise solutions and mergers between various financial organizations or companies. The outside threats include the economic changes in the market, rise of competitions and innovations in the applications of the technology. Both of these types of threats can be used to influence the actions of the information security aspects. The risk and vulnerabilities due to these threats are to be referenced and evaluated for ensuring successful business continuity (Bruhn et al., 2017). The adoption of certain methods for the identification of the risks, estimation of the impacts made by the risks and the evaluation of them is necessary to mitigate them. The information security in the business aspects refers to the various risks and vulnerabilities corresponding to the development, use, impact and selection of the parameters inside the financial sectors. The various IT related problems that can possibly cause an impact on the business operations are included in the risks in security. Their impacts can range from losing business for some time to widespread losing of customers. This can have great impacts on both the customers as well as the financial services. The cyber attack compromises the accounts of the customers making great difficulties for them (Hsiao, 2017). This in turn causes the customers to lose their faith from the financial organization concerned. Thus, the presence of risks management framework is to be integrated. The ERM scheme is another method that has been applied by financial sectors that has helped them to enhance their process of decision making (Glendon, Clarke McKenna, 2016). The main objective of the infor mation technology risk management is the removal of loopholes in the system that helps in the mitigation of the various threats and vulnerabilities. Due to the application of the risks management framework, the business operations and the business continuity is maintained which helps to keep the brand image in the market. The risk management process is the main aim for the information security framework. The information security in the business aspects refers to the various risks and vulnerabilities corresponding to the development, use, impact and selection of the parameters inside the financial sectors. Their impacts can even range to destroy the flow of the business (Lechner Gatzert, 2017). These can be done by the adoption of certain methods for the identification of the risks, estimation of the impacts made by the risks and the evaluation of them is necessary to mitigate them. These include the adoption of regulatory frameworks for identifying the risks in the systems. This process is followed by the estimation of the risks impacts. The analysis used for the estimation is the quantitative and qualitative analysis of the risks. The last method of mitigating these risks is the application of the universal standards to reference them. Principles of information technologies in risks management: The various risks mitigation procedures are included in the information security framework. These helps in addressing the various risks in security and privacy related issues present in the financial sectors. The ERM scheme is another method that has been applied by financial sectors that has helped them to enhance their process of decision making (Lin et al., 2017). The basic methods included in this principle are discussed in this section. The first method is the requirement for connecting to the business objective. This includes the connection among the objective of the financial sectors. The next method is the successful alignment of the information technological aspects with the business objectives. The next method is the estimation of the cost requirements for addressing the mitigation requirements for the identified risks. The next method is the communication among the various authorities to address such risks. The last method is the application of analysis used for the estimation is the quantitative and qualitative analysis of the risks. These standards help in keeping up a legitimate connection with the business operations in the organization. The utilization of the IT risk framework controls the significance of removing risks from the organization. IT risks is managed as a business risk, instead of an alternate sort of risk. In addition, the approach for risk management is comprehensive and helpful. Informational technology supports the achievement of business goals, and IT risks are conveyed as the impact they can have on the achievement of business objectives or system (Yilmaz and Flouris, 2017). Each processing of the methods included in the IT aspect contains a dependence on how the business system depends upon IT-related resources, for instance, people, applications, and establishment. IT-related business chance is seen from the two focuses: protection against risks or threats and enabling of technological advancements. This assures those included with operational risks and the financial organizations are taki ng a shot at mitigating the risks in IT. The risks appetite is termed as the amount of risks present during the development and the analysis of a process to reach its course outcome. To consider the risk appetite levels of a process, two main considerations to be taken into considerations (de Freitas Alves et al., 2017). The first consideration is the ability to take difficulties by the risks. These difficulties are he transactional risks and harm. The next consideration is the measure taken to fight the difficulties in these aspects. Although, there is no presence of standards to identify the presence of risks, the risk appetite can be measured by utilizing the risk maps. Risk resilience is defined at the management level and is reflected in plans set by the authorities at bringing down vital levels of the businesses. These procedures are to address the inside as well as the outside threats to the organization concerned. . The various internal threats to the financial solutions are the operational problems in the IT aspects, failure to comply with the enterprise solutions and mergers between various financial organizations or companies. The outside threats include the economic changes in the market, rise of competitions and innovations in the applications of the technology. Both of these types of threats can be used to influence the actions of the information security aspects (Levett et al., 2017). The risk and vulnerabilities due to these threats are to be referenced and evaluated for ensuring successful business continuity. However, there is presence of requirements of the traditional processes where risks management can be done by analyzing the leg itimate and industrial necessities where the presence of risks is less. The analysis used for the estimation is the quantitative and qualitative analysis of the risks. Qualitative risk analysis: The method used in the qualitative risk analysis is the use of pre-made rating scale to analyze the risks pertaining to the system. The score of the various risks and threats will be rated on the basis of these scales. According to this, they will be applied the proper assessment methods needed for their mitigation. The probability of the risk depends on the values ranging from 0 to 1. Similarly the risk assessment is based on a scale of one to five. For the scale of one, the minimal risks mitigation is applied while for the scale of five, the most extensive mitigation is applied. Quantitative risk analysis: The quantitative analysis refers to the use of various mathematical and statistical methods to develop an end requirement for managing the various business operations. The main methods used in this analysis are the use of certain prospects to get results by accounting to the changes and trends in the insights made. This is used in a large scale as the effectiveness is much high. In addition, the cost needed for conducting this analysis is also very small. Thus, it can be considered that the qualitative risk analysis considers the risks whereas the quantitative risk analysis analyzes the project (McNeil, Frey Embrechts, 2015). Qualitative risk analysis is used to perform analytical estimation whereas the quantitative risk analysis estimates the parameters on the basis of probability. Recommendations: The organization has possessed the capacity to deal with the dangers in the organization. This has helped in keeping up the security of information and data in the organization. The utilization of firewalls and anti-viruses helps in recognizing infections in the system or server of the organization. These anti-viruses recognize and address malware and Trojans in the system. The utilization of the Big Data additionally helps in giving an appropriate database in the organization. It additionally gives security to information put away in the Cloud benefits in the organization. The Cloud administrations help in moving up the information over the web. The loss of the information can be limited by backing up the information. The resources are quickly accessed and modified however required. This allows the users of the cloud to access the computational abilities of the infrastructure and get the required capabilities whenever needed. This helps to increase the agility and deployment of thes e services. The risk management helps in prioritizing the various tasks needed for referencing the threats from the cyber attacks. Conclusion: Thus, it can be concluded from the analysis that the use of the information technology assessment has led to the successful storage of the data pertaining to the financial sectors. The various challenges in the information sectors are also referenced in the report which applies to the financial services as well. The financial challenges faced by the Aztek Company can be mitigated by applying the various risks estimated processes. The qualitative risk analysis considers the risks whereas the quantitative risk analysis analyzes the project. Qualitative risk analysis is used to perform analytical estimation whereas the quantitative risk analysis estimates the parameters on the basis of probability. In addition, the cloud related solutions are also to be applied for storing the data in virtual data centers for successful business operations. The services provided by the cloud solutions include the presence of adequate resources, bandwidth and sustainable performance. The sole requirement of accessing the systems is the presence of an internet access. This allows remote availability of the cloud resources. In addition, disaster recovery is also possible by applying for backup. The operations of the system pertaining to a particular date can be saved in the cloud for later use. In case of disasters in the system, the backed-up system can be downloaded from the cloud and will be implemented very fast. In addition, the various frameworks used present in the Australian legislature are also to be used for referencing the business requirements. In addition, the recommendations of firewalls and antivirus programs are also to be included for the successful business continuity References: Agca, R., Heslinga, S. C., Rollefstad, S., Heslinga, M., McInnes, I. B., Peters, M. J. L., ... Primdahl, J. (2017). EULAR recommendations for cardiovascular disease risk management in patients with rheumatoid arthritis and other forms of inflammatory joint disorders: 2015/2016 update. Annals of the rheumatic diseases, 76(1), 17-28. Behzadi, G., OSullivan, M. J., Olsen, T. L., Zhang, A. (2017). Agribusiness supply chain risk management: A review of quantitative decision models. Omega. Brindley, C. (Ed.). (2017).Supply chain risk. Taylor Francis. Bruhn, A., Whiting, B., Browne, B., Higgins, T., Tan, C. I. (2017). Introducing Enterprise Risk Management Into the University Classroom: A Case Study.Risk Management and Insurance Review,20(1), 99-131. Chance, D. M., Brooks, R. (2015).Introduction to derivatives and risk management. Cengage Learning. Cohen, J., Krishnamoorthy, G., Wright, A. (2017). Enterprise risk management and the financial reporting process: The experiences of audit committee members, CFOs, and external auditors.Contemporary Accounting Research,34(2), 1178-1209. de Freitas Alves, G., Neto, W. L., Coli, M. C., de Souza Bermejo, P. H., SantAna, T. D., Salgado, E. G. (2017, September). Perception of Enterprise Risk Management in Brazilian Higher Education Institutions. InEuropean, Mediterranean, and Middle Eastern Conference on Information Systems(pp. 506-512). Springer, Cham. DeAngelo, H., Stulz, R. M. (2015). Liquid-claim production, risk management, and bank capital structure: Why high leverage is optimal for banks.Journal of Financial Economics,116(2), 219-236. Gilman, A., Miller, L. (2017). Enterprise Risk Management and Talent Management as Vehicles for a Sustainable Museum.Systems Thinking in Museums: Theory and Practice, 71. Glendon, A. I., Clarke, S., McKenna, E. (2016).Human safety and risk management. Crc Press. Haywood, L. K., Forsyth, G. G., de Lange, W. J., Trotter, D. H. (2017). Contextualising risk within enterprise risk management through the application of systems thinking.Environment Systems and Decisions,37(2), 230-240. Hopkin, P. (2017).Fundamentals of risk management: understanding, evaluating and implementing effective risk management. Kogan Page Publishers. Hsiao, C. M. (2017). Enterprise Risk Management with Foreign Exchange Exposures: Evidence from Taiwan Tourism Industry.Asian Economic and Financial Review,7(9), 882-906. Lam, J. (2014).Enterprise risk management: from incentives to controls. John Wiley Sons. Lechner, P., Gatzert, N. (2017). Determinants and value of enterprise risk management: empirical evidence from Germany.The European Journal of Finance, 1-27. Levett, J. M., Fasone, J. M., Smith, A. L., Labovitz, S. S., Labovitz, J., Mellott, S., Dotan, D. B. (2017). Enterprise Risk Management in Healthcare. InSurgical Patient Care(pp. 67-86). Springer International Publishing. Lin, Y., MacMinn, R. D., Tian, R., Yu, J. (2017). Pension risk management in the enterprise risk management framework.Journal of Risk and Insurance,84(S1), 345-365. McNeil, A. J., Frey, R., Embrechts, P. (2015).Quantitative risk management: Concepts, techniques and tools. Princeton university press. Meyer, T., Reniers, G. (2016).Engineering risk management. Walter de Gruyter GmbH Co KG. Olson, D. L., Wu, D. D. (2015).Enterprise risk management(Vol. 3). World Scientific Publishing Co Inc. Olson, D. L., Wu, D. D. (2017). Data Mining Models and Enterprise Risk Management. InEnterprise Risk Management Models(pp. 119-132). Springer Berlin Heidelberg. Rampini, A. A., Viswanathan, S. (2016).Household risk management(No. w22293). National Bureau of Economic Research. Rsnen, A., Jurgilevich, A., Haanp, S., Heikkinen, M., Groundstroem, F., Juhola, S. (2017). Climate Risk Management. (pp. 21-33). Sohrabi, S., Riabov, A., Udrea, O. (2017). Planning-based Scenario Generation for Enterprise Risk Management. InProceedings of the Scheduling and Planning Applications woRKshop (SPARK). Sweeting, P. (2017). Financial enterprise risk management. Cambridge University Press. Yen, S. H. (2017). The Study on Internal Control to Enterprise Risk Management-An Empirical Study on S Company. Yilmaz, A. K., Flouris, T. (2017). Case Studies for Enterprise Risk Management from Leading Holdings: TAV Airports Holding and BRISA Bridgestone Sabanci Tyre Manufacturing and Trading Inc. InCorporate Risk Management for International Business(pp. 153-163). Springer Singapore

Sunday, November 24, 2019

buy custom Media and Violence in Racialized Families essay

buy custom Media and Violence in Racialized Families essay Introduction Modern racism in Canada is a designation of inferiority assigned to various racial groups and using the attribution to promulgate and justify imbalanced treatment of these racial groups. Racism in Canada takes three major forms: concept of biological inferiority, cultural deficiency and underdevelopment in technology (Fontaine, 2008). There are however three types of racism in Canada: individual racism (direct), subconscious racism (indirect) and lastly systemic racism (institutional). White Canadians direct individual racism towards people of color such as the Aboriginal people, immigrants and the Quebec community because of their race, culture and socio-economic status. Subconscious or indirect racism towards the minority in Canada occurs because of stereotypical assumptions that Canadian mainstream media fuels, fear of the unknown and ignorance. Institutions such as businesses, government agencies and healthcare facilities practice systemic racism by limiting opportunities and rig hts to minority groups because of race. These institutions are responsible for health care, housing, maintaining public policy, education, commercial and social activities among other frameworks of the Canadian society. Media contributes to violence among racialized groups in Canada because of the stereotypical assumptions it portrays. The mainstream media uses the names disadvantaged or underprivileged to mean people of color. Media pictures these racialized families as failures in academic institutions, lazy in work environment and prone to crime that goes hand in hand with substance abuse. Racialized families face constant discrimination in form of direct violence or rejection from opportunities in the society because the media constantly portrays them as less civilized, less bright and less human. These portrayals justify the types of oppressions the racists, media and other institutions directs to them. The exclusion from all frameworks of the society leads to socio-economic marginalization, loss of voice and powerlessness (Galabuzi, 2010). Literature Review Violence in racialized families in Canada results from poverty, lack of employment and inequality. At the family or domestic level, the use of violence is against children, women and the disabled. At the international or national level, asylum seekers, poor people, African Canadian and Minority ethnic, refugees, Indigenous and migrants face different forms of violence from institutions and states. These institutions use violence against racialized communities to maintain national security, order and peace. Jiwani refers to a murder case in British Columbia in Canada, of Reena Virk a 14-year-old girl from South Asian ethnic background (2006). She further explains how 14-16 year-olds seven girls and a boy beat Reena Virk because of her race. The media covered up the reasons for the murder citing that the crime was a love triangle and that the victim was spreading rumours (Jiwan, 2006). Research shows that violence and crime in racialized communities occur when there is loss of hope and despair in relation to poverty and racism. Violence, gun and gang-related crime occur in Ontario because of the high population of legal and illegal immigrants, Aboriginal people and African Canadian youths. These minority groups resort to violence because they lack proper resources and opportunities. In a company that has racialized workers, employers give them low paying and insecure jobs that take longer hours. Their education is not important because individuals and institutions already consider them illiterate and inexperienced. People working for low incomes and overtime tend to try easy jobs such as selling drugs on the streets. Poverty also pushes racialized people to violence. The war on drugs slogan usually targets racialized communities because they are the low-level drug peddlers. Police focus on such groups rather than the powerful drug lords who supply the drugs (Galabu zi, 2010). Re-enforcement and Reproduction of Violence by Mainstream Media The mainstream media in Canada plays a vital role in communication concepts of racism against people of colour. They help in defining the terms of racism and further localize them within the imagination of the public. In reproduction of Canadas social knowledge, the media acts as crucial vehicles in underpinning hegemonic interests and clarifications (Jiwani, 2006). This means that the mainstream mass media invoke thought and behavior in Canadians when they frame race and acts of racism as derived from the social life of minority groups. The media defines racism as violent or nonviolent acts that arise from immigration, ignorance and uneducated individuals who reside on the rural areas of Canada. Race implies the differences in culture and biological appearance as shown in films and pictures. Jiwani argues that Canadian mainstream media communicate race or racism by commission or omission (2006). In cases where violence is against racialized groups, the mainstream media reports that these are normal cases and this in turn spurs new cases of violence against people of colour in Canadian institutions (schools, homes or workstations) because of the footage on the crime. Canadian mainstream media tries to cover up violence against racialized groups by reporting on prostitution, Aboriginality and girl-an-boy crime instead of hate crimes. Jiwani and Young refer to a missing persons case in Vancouvers Downtown Eastside where the body of a murder victim previously reported as missing resurfaced (2006). This case fueled a heated debate among Aboriginal people and the cover-up by the media focusing on prostitution of the Aboriginal. Such a case will re-enforce violence against Aboriginal women because the offenders will use the media portrayal of prostitutes to carry out violence. Jiwani notes that the media portrays the Aboriginal people as childlike, women as prostitutes and men as criminals who need the white Canadians and the state to push them to development (2009). This means that women and men from racialized groups experience violence in the presence of police officers and other Canadians but because of their stereotypical status as portrayed by th e media, an intervention to stop the violence is rare. When such cases occur, the police and other Canadians believe that these racialized groups deserve the violence. Fontaine reports of a case in Winnipeg Sun, a Canadian newspaper that ran an advertisement for stopping crime using a suggestive photograph portraying police officers frisking two teenage boys from the Aboriginal community (2009). This advertisement ran for several months in the newspaper. The effect of the advertisement and photograph reinforced the stereotype status of the Aboriginal youth as delinquents in mind of Canadian readers. Another example of how mainstream media reproduces violence among racialized groups is the case of Reena Virk, the South Asian girl whose body surfaced after eight days in a river (Jiwani, 2006). She further explains that the media covered up the issue of racism until two years later during the trial of one of Reena Virks murderer when the court and media stressed that the victim faced the violence because of her weight and inability to penetrate the culture of her peers (Jiwani, 2006). This means that her physical appearance and lack of normative stand ards caused the violence. Canadian normative standards implies a thin body, white, athletic (able-bodied) and heterosexual. Racialized groups lack these normative standards and in essence, victims of racialized crime are responsible for their own fates. Violence against Racialized Women in Canada Violence against women and girls within racialized families is rampant in Canada because of the stereotype views portrayed by the media, loss of voice and fear of deportation if they are illegal immigrants. Women in Downtown Eastside of Vancouver are from the Aboriginal community faced with adverse poverty and insecurity resulting to prostitution (Jiwani Young, 2006). These women encounter persistent sexual violence from men of the same community or their spouses but they do not receive any security or protection because the police believe they deserve such crimes because they are sex workers. Cases of homicides among racialized families are common but such stories do not make it to the front-page of newspapers because violence against women of colour is a normal domestic violence within racialized groups. Among immigrants, violence against women and girls is high because they do not have a voice and financial ability to seek protection. Calling the police in Canada during a violent crime committed against a racialized immigrant woman could result to two cases: deportation or lack of response from the police. Women resign to domestic violence from their spouses and people from the same family because they cannot escape relationships that are abusive with their sponsors or benefactors because they will lose their homes, children and right to acquire basic needs. Indigenous men, immigrants and men of colour harass their women who refuse to seek help or protection because many women who do not have the resources to provide basic needs for themselves and their children would receive poor healthcare and social housing. Men abuse racialized women who cannot report cases of domestic violence hence they escape punishment. Family structure as portrayed by Canadian media. Mainstream media in Canada sets up the family structure to male domination by the types of movies that portray men as the backbone of Canada while women are homemakers (Galabuzi, 2010). Advertisements show Canadian families with the male as the head of every aspect of the society: work, entertainment and politics while women and girls take up inferior roles. This image creates a male dominated family structure across Canada in the minds or readers and viewers. Most reporters, news anchors and producers in any media network are men. This gives men the upper hand to act as the head of families in major decision-making. Women in advertisements market personal hygiene products such as bathroom or kitchen products. This portrays the role of women in the society is in the home. The media portray men as intellectual and independent in dramas, advertisements and in the media production industry. In movies, men have superior and heroic roles while women play homemakers, secretaries and prosti tutes (Tastsoglou, 2009). Mainstream media production on sexism and racism. The mainstream media in Canada advocates for movies, advertisements and news presentation by white Canadian men. Native Canadians or other ethnic communities in Canada do not get public representation in the media because of the assumed stereotypes. Movie productioons do not include people of colour or interracial relationships that white Canadians disregard. Aboriginal families only make headline news in cases of crimes or mismanagement of funds (Douglas, 2008). Advertisements focus on white Canadian families and not Native Canadians because the media wants to portray a functional male dominated family structure as compared to a native dysfunctional family. Media portrays racialized families as illiterate, violent, poor and ignorant. Most movies in Canada lack equal representation from all races in the country. People of colour will cut the ratings of a drama, movie, advertisement or viewers in case of reporters from racialized communities (Douglas, 2008). Sexism in the media occurs when women and men play specific roles to portray real personality attributes displayed in real families. Women in the media reflect childcare, homemaker and employees in low-level jobs such as secretaries and servers. Advertisements prescribe roles of women as home and family oriented. There are women who advertise superficial beauty in the sense that, they are tall, thin, without blemish, perfect teeth and long legs but underneath all the beauty, she has no brains. Some advertisements portray women as sex objects void of any feelings or personality. Such advertisements show women lying on a bed half-naked or likened to animals that dehumanize them as acting primarily on sexual instincts. Methodology. The method used to collect data is through questionnaire in the campus and thorough research using scholarly journals. Questionnaires are easy to create, they are cheap and fast mode of collecting data. It also protects the identity of people of colour who contributed to the research. Data analysis. In data collection, twenty students from different ethnic backgrounds contributed to the research. The 20 students are sample population to represent the wider community of racialized families in Canada. This data included all the questions that encompass all issues of racism from direct to indirect racism. The problems met while collecting the data was late submission of the questionnaires. Due to confidentiality, refraining from personally collecting the questionnaires from the sample population was the best option. Some students lost or misplaced the questionnaires and they received new copies that meant extra spending on the tight budget. Results. Twenty students admitted to witnessing racism directed to them or their friends in the campus. The students who encountered racism from individuals either in school or in the community were 15 in number. Two of the students confessed to systemic racism directed to them. All students believe that the mainstream media reproduces violence against racialized families. Law enforcement officers stopped 10 students of the sample population for random search. Eighteen students report cases of institutional racism in healthcare facilities and restaurants. Twenty students believe that the mainstream media is sexist and racist. The reasons that the students gave as personal opinions of the causes of violence against racialized families include race, culture, economic status and ethnic background. Discussion. All students in the research report cases of racism directed towards them at one point in their school life. This means that racism in the school compound and in the wider community is rampant. There are individuals who utter racial slurs and students have witnessed violence due to race. When students apply for residential accommodation outside the school, property owners discriminate the students who are immigrants and Indigenous people. The student report cases of discrimination when they are registering for courses, renting apartments and in restaurants. The mainstream media reproduces violence against racialized families due to the images portrayed about people of colour. The police have a tendency of stopping students from racialized families and doing random search while discriminating their rights to privacy. Media is racist and sexist because of the different stereotypical status depicted on people of colour and women in the society. Conclusion Media and violence against racialized families is a common in Canada due to Somali refugees, African asylum seekers, Indigenous people and minority groups. White Canadians direct racism and violence towards these groups based on race, poverty, crime, lack of education and stereotypical assumptions portrayed by the media. Violence is a common occurrence within racialized families because the victims who are women and children lack the financial power and voice to raise their concerns. These women do not receive protection from the police because the media has portrayed them as prostitutes who deserve the sexual violence and domestic abuse. The media use suggestive images of racialized teenagers to portray crime and illiteracy. These images strike negative thoughts on the minds of viewers and readers hence reinforcing violence against the people of colour. The media also portray sexism and racism in term of advertisement and movie roles given to women. These roles depict women as homem akers, cleaners and sexual objects while men take up powerful roles that portray role models in the society, decision makers and professionals. Buy custom Media and Violence in Racialized Families essay

Thursday, November 21, 2019

E-Shopping System for Educational Needs Assignment

E-Shopping System for Educational Needs - Assignment Example Search for products: A Search box would be provided in every page of the application where the user can type in a text of their choice (matching the search criteria). In addition, two or more drop-down lists would be employed for selecting the categories and subcategories to refine the search more precisely and also to ease the task of customers for entering additional texts. Order a product: The e-Shopping application would have an exclusive order processing module. Users can order any number of products from the appropriate page. The system would offer a secure payment gateway for making payments using a variety of modes like internet banking, credit cards, and PayPal. Place an inquiry: In order to facilitate bulk bookings for Corporate/Academic Institutions, an option to place requests or inquire about the availability of the required quantity of products and also the expected invoice would be offered. Track the order: Track your order option would be opened to customers as soon as the payment is made and the order request is completed. Users can track the order based on the order id or combination of customer id and the order date. View Order History: View History option would be enabled for all registered customers in order to view the history of all their transactions. It would not only include all the completed orders but also includes details for canceled and pending orders if any. Apart from all these functionalities and features, session variables/cookies would also implement so that the application would remember the users visiting the site and would welcome them with their name (if registered) and their last visited date and time. The system is implemented with the overall assumption that there is a stable internet connection available throughout the period of transaction.  

Wednesday, November 20, 2019

Rising Cost of Prescription Drugs Case 4 Essay Example | Topics and Well Written Essays - 750 words

Rising Cost of Prescription Drugs Case 4 - Essay Example One of the main problems for the rising costs in prescription drugs is the pharmaceutical companies. According to pharmaceutical companies, the reason why the costs of prescription drugs are rising is due to the research cost in testing new medicines that will potentially cure various ailments in patients. The drug companies use the revenue from the current prescription drug sales to pay for the research costs of testing new drugs. The new drugs that are tested are eventually marketed to the general public, but because these drugs are new and do not have a generic brand, they are much higher. The drug companies argue that this cycle of pricing drugs at much higher costs is a necessity, since revenue has to be generated to pay for future research. In addition, pharmaceutical companies have to patent new drugs to protect them from any unauthorized sales of new drugs. Patenting requires additional money to retain a lawyer to file the proper documents for patenting the new drugs. As a so lution, the federal government provides a prescription drug coverage plan for Medicare beneficiaries. Currently, the drug companies are not finding better solutions to reduce the rise in prescription medications. These drug companies rely on the revenue from the previous prescription drug sales to pay for the research, testing, and implementation of new drugs. The pharmaceutical companies are blaming the rise in prescription drugs on the increased utilization and demand for various prescription drugs, types of prescriptions that doctors are prescribing to patients, price increases, research and development, and advertising and marketing expenses. In addition, patent protection has caused prescription drugs to increase. The patent laws protect the manufacturers by providing them with an exclusive right to sell the drug products for up to twenty years. After the patent protection expires, the previous patented drugs can be manufactured and

Monday, November 18, 2019

Group Analysis Essay Example | Topics and Well Written Essays - 1000 words

Group Analysis - Essay Example The work environment also teems with groups, either of friends or groups put together to facilitate the achievement of a specific organizational goal. The next stage in life is to form families of their own which are also groups with the cycle beginning all over again. Almost all activities carried out by people are done in groups, making them a core element of study with relation to understanding human behaviour. According to Forsyth, groups have long been the subject of interest to both researchers and scholars (2006). Extensive studies have been carried out with regard to how groups are conceived and how they are later dissolved; this includes how they are transformed and how they are used to either realize set aims, or how they can be used to execute offenses (Forsyth 2006). This paper discusses group dynamics and communication within a group of first year undergraduate nursing students’, participating in a peer-led team learning group. I participated in a peer-led team le arning group in my first year as a nursing student; therefore, this assignment is an overview of my observations of the group. The use of peer learning is a practice that has been adopted in many universities worldwide, as a means to improve students understanding of concepts through supportive discussions that take place in small groups, and where the discourse encourages as many questions as there might be, from students (Peer-Led Team Learning 2013). It is a fact that most students feel free around their fellow students, rather than around their lecturers and professors. This makes them more inclined to discuss concepts and questions with other students, than with a lecturer or professor. Peer-led team learning holds the strengths of being a method that enhances student engagement and motivation in learning, as well as overall performance (Centre for the Study of Higher Education 2002). This is due to the fact that in the process, students learn to communicate effectively as they work in teams, while peer leaders gain self-confidence, learn a number of group management skills, and how to teach. In this context, students were requested to band themselves into groups of four. Two peer leaders (i.e. group leader and assistant group leader) for each group were then selected from third and fourth year students, who had displayed exemplary performance in class. As a way of equipping them with the necessary skills, the peer leaders were taken through brief training mainly focussed on how to handle groups. When this was set, each group was given a structured problem to solve. According to the guidelines, each group was required to meet twice every week, and members were given the privilege to choose the best time for their discussions. Description of Peer Leaders and Group Members Characteristics and Behaviours 1. Tom (Group leader) He is a fourth year nursing student. He is firm, confident, and resourceful. His resilience and optimism helps him conquer complex pro blems. He also has a very open minded approach to things. He is however quite poor in time management since he often comes late for the discussions, and is usually late to meet deadlines. His lack of respect for time and set deadlines is at times considered as lack of respect towards the assistant group leader and group members. 2. Olivia (Assistant group leader) She is a third year nursing stud

Friday, November 15, 2019

A Definition Of Online Ordering Systems Information Technology Essay

A Definition Of Online Ordering Systems Information Technology Essay Online food ordering services are websites of local restaurants and food cooperatives set up for customers to select from the interactive menus provided so as the ordering process can take place. In order for ordering to take place, any sorts of internet capable devices which support complex web pages are used. People normally use computers to access into the food websites and place an order. Similar to ordering consumer goods online, online food ordering services also allow consumer to register and uphold an account at the Dominos Pizza website in order to make frequent ordering convenient. A consumer will look for favourite restaurant, browse from available items, and select delivery or pick-up. Payments could be made via credit card or cash. Partial of the payment will be given to the online food company. The pioneer restaurants to adopt online food ordering services are corporate franchises such as Dominos Pizza and Pizza Hut. Procedure Firstly, the customer needs to go the Dominos official website, www.dominos.com.my. The registration as a Dominos member is necessary if the customer order pizza via online for the first time. First step of the register process is entering the street name to locate the customer delivery address accurately for the delivery. After registered, click on the Order Now button. A log in box will pop up on the screen asking for the customer username and the password. After login the customer is able to start to order on desired food or drinks. Once finished ordering, click on submit. An e-mail for verification will be sent to the customer. Once verified, the delivery will send to the customers location within 30 minutes. After purchasing the pizza, customer can keep track of their pizza by GPS Tracker offered by Dominos Pizza. Payment is made subsequent to the customer when the Dominos employee delivers the pizza to the customer. Function: Ordering food online is becoming a norm for restaurants which offer takeout and delivery orders. Online food ordering is designed as it is cost effective yet an efficient system to satisfy the restaurants needs. The system is also designed for its ultimate flexibility and performance. The customers will be able to access into the company existing website and browse at their menu and select and place their orders on what they desire. Once the customer has confirmed their order, the system will either email or fax the customers order to the restaurant. The online ordering system also enables customers to order days in advance and the system will accomplish the order at the specified time. The online ordering system has been constructed to handle large amounts of orders simultaneously to prevent the system overload. This system is also flexible in a way, whereby customers are able to place online orders quickly, with just a click comparing to the tradition where orders were taken through the phone. More time and cost will be saved ordering online as phone bill is charged according to the time the phone is on the line. The system was used intended to meet the requirements of all of the clients. Internet database Online ordering is easy and convenient yet they have more to improve on their online ordering system. It is good that online ordering system has linked the customers information with the database of the system which facilitates the ordering of customers. In addition, customers information could be tracked easily from their database rapidly if they are regular customers. Advantages With the escort in of the 21st century, several of individuals have found out that it is basically easier to purchase goods online. This depends on the consumers preferences. Some people feel unsecure buying items online because they cannot have physical touch or sight with the items they wish to buy. In this case, some people prefer to have the pizza straight from the oven when it is served. Online ordering provides additional customer service such as delivery to the destination that they have requested for. Customers can view the entire menu and all special offers via official website though online. The system records customers orders when purchasing has taken place. Extra services are provided to customers for example like estimated delivery carryout times and track their pizzas position using the GPS Tracker accessible on the website. When ordering via online, even throughout a busy period such as lunch or dinner time, customers would not have a problem in contacting Dominos Pizza and placing their orders. The customers just need to order via online and the system will automatically generate and put it on queue. Online ordering records and stores past records of orders made and allows the customers to view them anytime during their online ordering session. These records will store at the database. The biggest advantage to order pizza online is that the customer can save a lot of time and effort. Customers can decide to complete their orders within seconds or take their time the customer wishes. There are no time limits for them to complete their orders, thus, customers can take their time to order. Instead of planning out time in daily schedule to go out and make a purchase, the consumer can instead go to the website when they have a free time at work or at home late at night, and look up the product that the customers are considering to purchase. The customers can view the full menu and can order any combination of food while the prices are displayed and calculated as they go. It is much easier for a customer who is wished to make large and complex orders online because the customer can order in patiently, consider the options, and calculate different pricing schemes. Consequently, a customer can take a look at products late at night. Even though the Dominos Pizza stores have closed for the night, customers can place orders for the next day while the website still running and available to make pre-order. This means that even after a long day at work and going back home to meal with family, the customer still have time left to go online and look for the product they want to purchase. The Internet is there is open 24 hours 7 days, and is always willing to let the customer to come make pre-order. By going online, the customer do not have to worry about the hassles, such as when they decide that it is time to check out, they do not have to waste the extra time queuing in line. By ordering online, the customer can also take advantage of deals that are only offered to online customers, and often find products that wouldnt be available at a walk in store and special offers are given to online customers. Customers who order pizza online are proven to order more because they dont feel hasty while ordering, as the customer often does over the phone when using phone order. In addition, online ordering increases the amount of customers who visit the Dominos Pizza official website. It also gains customer satisfaction and loyalty throughout the company. Due to its convenience of online purchasing service, customer purchase frequency also may increase. The company eliminated or reduced labour costs associated with manual order taking due to technology computerize replaced labour usage. For the Domino Pizza Company, the online ordering system accepts both online and traditional coupons to attract more customers. Mackay (2008) claimed that Customers who order on the web tends to order more because they have a menu in front of them. With internet, there will be fewer errors on the orders or miscommunication among customers and the employee who taking orders. Compare to phone call ordering, online ordering pizza make fewer mistakes. When during the phone call order, the customer may order wrong item without realizing it. The pronunciation of certain words might lead to order the wrong product. Besides, it provides timely service. The system examines all food orders prior to the completion and corrects human errors. Also, with this system, the registration of online guests is utilized to create valuable marketing campaigns. Online Ordering provides the wonderful solution for office lunch orders. The customers can orders without the hassle of using phone call to order the pizza. The customer can take their time and get the pizza in time. The Dominos Pizza website guarantees that the message, promotions and add-on offers are well delivered to the customers. In financial factor, online ordering system increase the efficiency and cost effectiveness of the ordering operations. For the advertisement, it can create easily or upload promotions to the Dominos Pizza website. For instance, this system can increase the customers guest check automatically by customer email by suggesting upcoming sells for additional products. Online ordering increases in sales of goods in the Domino Pizza Company. Disadvantages The trend of shopping online, especially ordering pizza online has gradually been significant in the last decade and online sellers are expected to have improvements on the volume of sales after website features and services altered. There is no doubt that the customers can find great deals online and so many different products which may not be even available in regular stores. By the way, there are certain disadvantages of online ordering. Normally when we shop from a regular store, we can go directly to a salesperson face-to-face to enquire and clarify our doubts regarding the food we ordering. It is possible that customers would have a wrong idea of what the products and services is about as the customers and the employee cannot deal face-to-face for a clear explanation. Another disadvantage is that a lot of companies which sells online state that customer have to pay for the shipping and delivery charges depending on the weight of the product the customer orders. Only a few companies with websites offer free shipping services while some companies provides free shipping services only if the customer has a total purchase of prices exceeding a certain amount. The shipment fee charged often is one of the reasons that customers would not like to order goods online and does not guarantee that the goods delivered will be in good shape. However, a company must consider on the target market they would like to focus on promoting their products and services to. The elderly are most unlikely to order goods online due to their knowledge of operating a computer. Therefore, if the target market includes the elderly, a traditional service has to be provided to them. Online connectivity issues are the greatest disadvantage for online ordering. The customers add items in online shopping cart, enter information and press submit. The confirmation screen might time out when the internet has an unstable connection. The online customers would not know whether the order has been made or not while reloading the page may cause several billing or several orders. Moreover, customers may also make human errors, such as ordering the incorrect item. This can occur when the customer attempts to place an order. The customer may have accidentally clicked on the wrong item while placing their orders through the website. Even if the consumer clicks on the correct product and provides an accurate product number there may still be mistake made in the ordering process if there are options associated with the item. This problem can be rather disturbing because the consumer will get agitated when the incorrect item is received and therefore, loses customers loyalty towards the company. Another disadvantage is that purchasing online would mean that personal information has to be given to the company when purchasing is taken place. Some companies take advantage of this feature. By purchasing on the Internet, the customer would have to take the risk of having their information taken by online companies and misused. Though this is a very rare occurrence, it is more likely to happen online, than in person. To avoid personal information from being exposed, customers would usually look for a trustable company to purchase goods from. More often, what people dislike about online purchasing is that delivery services are only restricted to certain areas. As a result, people living in rural areas are at a disadvantage whereby they will need to go to the destination whereby the company is able to deliver. Impact of the Technology Dominos Pizza is the first pizza delivery company that launch online ordering system and one of the most recognizable pizza brands in Malaysia. Online ordering has been great in this era of time, where communication taking place thru the internet. The company stated the pizza that order via online in Malaysia take up about 8 to 10 percent of the overall sales. On average, Dominos sells over one million pizza daily across the global. The technology helps the Dominos Pizza gain great revenue over other competitors like Pizza Hut which offer online delivery service as well, McDonald and Nandos which order by phone call. Technology has hastily taken over many jobs whereas technology also creates new jobs towards the organizations. Due to the implementation of the online ordering system for the Dominos Pizza, the company might require some web developer to maintain the website and the database. The organisations leadership and managers need to be change and they recognise the need to adapt and change in response to their vision, aim, shareholder expectations and consumer tastes for example the Dominos Pizza need to set new regulation and IT code of conduct to manage the Dominos Pizza website. Internet Application Similarities Dominos Pizza makes use of E-commerce, meaning transactions over the internet, ordering food online can be an example, pizza- a customers favorite, and additional menu items includes chicken finger`s, fresh salads and sandwiches. At the end we all enjoy all the benefits that the internet serves to the Dominos Pizza. The Domino`s Pizza uses a high-speed connection to access the internet, and with use of the internet they have a domain name, www.dominosoline.com. By the use of the internet is the ultimate tool in marketing, means they can reach an even wider population. Domino`s have they own website that they operate on is secure and hence digital certified thus providing the user to browse safely. They have built secure internet architecture to safeguard the data that they collect online, example can be advertisement boards. The Dominoes Pizza uses internet browsers to surf the web and consists of other useful features which are used to make ordering a pizza as easy as possible, apart from that you can do everything on their site from browsing the menu and ordering a special pizza`s and furthermore tracking the customer pizza in real time from order to delivery. Differences In terms of difference we see that E-mails sent to customers by the Domino cannot be replied back therefore it help in eliminating the risk of acquiring any Spam without the need to make use of freeware or encryptions. This System does not incorporate chat services, newsgroup or message boards to any user. The System does not incorporate any file transfers over the internet, be it downloading or uploading. Recommendations According to the similarities and the differences, we see that the advantages and the disadvantages of using ordering online; several recommendations are advised to be considered by Domino`s Pizza for them to enhance their services and operation and performance. Ordering food online should be more dynamic and helpful to the customers by enabling them to send instant messages to the customers notifying them on cancelled orders via emails, phones or fax informing them about the dynamic change, and providing them with other feasible alternatives. The interface of the ordering food online should be implemented to support more functionality like incorporating tighter security measures. This will allow the user to have more interaction with the system and test the system of its fullest potential. Ethical Legal Issues Computer Ethics Computer ethics is the moral guidelines that govern use of computers and information systems. For example, unauthorized use of computers and network, software theft, information accuracy, intellectual property rights which is the rights to which creators are entitled for their work, codes of conduct and Information privacy According to James H. (2000), computer ethics is the study of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of technology. Information privacy is one element of the computers ethnics. Dominos Pizza Malaysia acknowledges and respects the privacy of individuals. This policy covers the personal information that Dominos Pizza and its franchisees hold and locate the way in which Dominos Pizza and its franchisees will use, manage and protect the customer personal information when the customer visit any of Dominos Pizza websites, or place an order with one of the stores. In additional, Dominos Pizza is concerned about the information accuracy of customers. Dominos Pizza will take reasonable steps to ensure that the personal information collected is accurate, complete and up-to-date. The customer can access and request correction of any personal information concerning the customer at any time. The customer may also request that the personal information be deleted at any time. Dominos will take reasonable steps to protect personal information from misuse, loss and unauthorised access, modification or disclosure. Cookie A variety of ways to safeguard personal information is installing a cookie manager to filter cookies. A cookie is a small data file sent from a web server that is stored on the computers hard drive. Cookies allow the customer to recognize their computer while the user is on the website and customize the customer online experience and make it more convenient and browse the website browse faster for the customer. This file enables to track visitor to the website and records certain data concerning that visit, such as the web pages that the customer viewed in order to access to the website. The use of cookies by Dominos Pizza enables the server to record the customer preferred language for navigating the website and improve the functionality of the website. Cookies are also useful in allowing more efficient log-in for users, tracking transaction histories and preserving information between sessions. Most web browser applications for example Microsoft Internet Explorer have features that can notify the user when the computer receive a cookie or prevent cookies from being sent. If the users disable cookies, however, the user may not be able to use certain personalized functions of the website. Encryption When Dominos Pizza receives or sends data via its website, it uses recognized industry standard encryption technology. Encryption is the translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, the authorized person must access to a secret key or password that enables the user to decrypt it. Unencrypted data is called plain text whereas encrypted data is referred to as cipher text. Dominos Pizza is using Voltage Securitys Secure-mail encryption package to protect internal and external company e-mails. According to Anderson (2007), the manager of network security of Dominos Pizza, he claimed that the move is part of a corporate-wide data loss prevention initiative to avoid accidental loss of private or proprietary information. He realised that e-mails being sent to partners and suppliers, such as insurance providers, may contain information like social security numbers that must be encrypted before sending. The decisions about encryption will be made based on pre-set policy, not by individuals on a one-off basis Secure-mail will automatically flag e-mails with sensitive data and encrypt them automatically prior to sending. Recipients will be able to read protected messages without having to download and install client software. This image show how the encryption works Image Source: http://www.outsourcing.st/uploads/images/public-key-encryption-example.gif Privacy Laws Privacy laws have been set by Dominos Pizza for example like how Dominos Pizza collects customer information and how they use customer information. As Dominos Pizza continuously improve and expand their services, the policy might change from time to time. Whenever necessary, check the website regularly to stay informed of any updates. The policy is effective as from December 2009. Dominos Pizza reserves the right to modify or supplement the policy at any time. If a material change to the terms of this policy is made, Dominos will post a notice on its homepage and a link to the new policy. Dominos Pizza does not provide personally identifiable information to unaffiliated third parties for their use in marketing directly to the customer. Dominos Pizza may use unaffiliated companies to help it maintain and operate its website or for other reasons related to the operation of its business, and those companies may receive the customer personally identifiable information for that purpose. Personal information that the customer submit to Dominos may be disclosed to a third party such as the suppliers who are employed to provide some of the services such as mailing houses. For example, if the customer place an order via our internet order system, the customer details will be passed on to VeriSign, who receive the customer credit card details for internet order payment. VeriSign is a secure internet payment gateway that secures the customer credit card number during transmission. Dominos will not collect, use or disclose sensitive information such as information about racial or ethnic origins or political or religious beliefs except with the customer specific consent or in the circumstances permitted in the Malaysian privacy laws or any other related laws in Malaysia. Recommendation The customer can protect their privacy by fill in necessary information on registration forms, rebate and warranty. The customer can limit the amount of information provide to the websites, fill in only required information. The customer is encouraged to set up a free e-mail account and use this e-mail address for merchant forms such as ordering a pizza. In addition, sign up for e-mail filtering through the Internet service provider or use an anti-spam program, such as Brightmail. Do not reply to spam if necessary. Security Before I start to write about similarities and differences between the security issues and dominos pizza ordering online, we should know the first goal to security issues keep users safe and dominos pizza online need this service to save customers information from loss or damage. Similarities All of the security that Dominos Pizza executes and makes use of it is to win the customers reliance. Dominos company try always to gain the customer and security companies by providing appropriate for the users. All of them looking for renewal ideas, offers and Inventions like new recipes for pizza and such us security program scans the files and codes and automatically pass to the company site on the Internet and to compare these codes and the company will renew the information. All of them need the computer. Viruses, worms and Trojan horses hurt the security and hurt dominos pizza online also because dominos company using internet and company want save Privacy such us security the amendment or change within the Software Protection. All of them has specifically plan. All of them use internet explain, dominos use internet to make ordering easy for all people who using internet and also order what over the people want from dominos. Security fabricate because the people how use internet need to save the information also dominos company need the security to save data from steal or loss. Challenge and Competition. Security companies compete with each other in the services companies provided for the user to gain users satisfaction and also dominos company using advertisement in TV, newspapers and web sites compete with dominos many companies and restaurants such as pizza hut stubborn challenger for dominos. Differences: Security issues Dominos pizza online Security is software. The main benefit of the program is a firewall that works to protect the device during work on the Internet and this wall protects you from hackers Dominos pizza is restaurant best services through company web page Security is very important and indispensable to save the information away from the players and hackers. Dominos pizza is not important, because there are many restaurants that provide the same services also, therefore one cannot loss anything from not eating from pizza rest restaurant. Protection service and Information systems and prevent any person from entering except by permission of the user to our system Service request and this service is available to request through the website Problems in security: All off Virus Anti-Virus, Kaspersky, Nod32, Norton and AVG did not reach full perfection each of them has many flaws and errors such us program size and some of them has the property to delete without permission from user or some of this make system slow. Conclusion Stepping into the world of modernization, majority of the services are being computerized and programmed in a specific system to simplify and reduce labour work. It is a wise decision for Dominos to adopt online food ordering system due to its convenience and user friendly. Dominos website which provides online ordering also have saved profile of signed up customers, including full name, contact number and also complete address for delivery. It prevents mistakes of jotting down the details if customers order through phone call. Besides, Dominos have also kept a record of previous orders so that customers can refer to previous selection of their favourite pizzas. This online ordering service will undoubtedly attract more customers because Dominos allow customers to place an order via internet today and request for delivery on another day. The delivery time is also available at any time according to customers needs from 11.30am till 11.30pm. Another great service provided in online ordering service is Dominos have specifically engineered the Great Pizza Service Tracker that provides customers an up-to-date status from the moment customers place orders to the moment the pizza leaves the store. The status starts from order placed, preparing, baking, boxing, packing, ready for delivery, and lastly the pizza is ready for delivering. In conclusion, Dominos has successfully keeps their customer loyal is partly due to the wide usage of online food ordering service. This service has not only minimize mistakes while placing an order, it has also provides maximum satisfaction for customers during the selection of food. Recommendation According to our research about Domino`s Pizza, several recommendation are advised to be considered by the company to improve their services and operation performance: Planning Domino`s company needs an effective advertising structure or plan, in this case it will improve customer relations. The domino`s company needs to increase the speed and efficiency of pizza making, therefore means that they can cope with larger amount of customers and having long customer relations. Performance management Domino`s company should check how the employees are doing for example how they analyze the performance of the company. Employees are required to interface directly with the customers to improve better understanding; another thing is that the employees need to make certain decision in the company rather than waiting to be told what to do and how to do. For Domino`s to be successful, the employees need to work hard so that they can reach the objective the company. I will recommend the employees should be made happy for example, good working condition and to be treated fairly. Vision Domino`s company needs to improve on their sales which at the end will inevitably lead to more profit and fame also. The Domino also has to break in and expand and do well in the Malaysia market.