Sunday, November 24, 2019

buy custom Media and Violence in Racialized Families essay

buy custom Media and Violence in Racialized Families essay Introduction Modern racism in Canada is a designation of inferiority assigned to various racial groups and using the attribution to promulgate and justify imbalanced treatment of these racial groups. Racism in Canada takes three major forms: concept of biological inferiority, cultural deficiency and underdevelopment in technology (Fontaine, 2008). There are however three types of racism in Canada: individual racism (direct), subconscious racism (indirect) and lastly systemic racism (institutional). White Canadians direct individual racism towards people of color such as the Aboriginal people, immigrants and the Quebec community because of their race, culture and socio-economic status. Subconscious or indirect racism towards the minority in Canada occurs because of stereotypical assumptions that Canadian mainstream media fuels, fear of the unknown and ignorance. Institutions such as businesses, government agencies and healthcare facilities practice systemic racism by limiting opportunities and rig hts to minority groups because of race. These institutions are responsible for health care, housing, maintaining public policy, education, commercial and social activities among other frameworks of the Canadian society. Media contributes to violence among racialized groups in Canada because of the stereotypical assumptions it portrays. The mainstream media uses the names disadvantaged or underprivileged to mean people of color. Media pictures these racialized families as failures in academic institutions, lazy in work environment and prone to crime that goes hand in hand with substance abuse. Racialized families face constant discrimination in form of direct violence or rejection from opportunities in the society because the media constantly portrays them as less civilized, less bright and less human. These portrayals justify the types of oppressions the racists, media and other institutions directs to them. The exclusion from all frameworks of the society leads to socio-economic marginalization, loss of voice and powerlessness (Galabuzi, 2010). Literature Review Violence in racialized families in Canada results from poverty, lack of employment and inequality. At the family or domestic level, the use of violence is against children, women and the disabled. At the international or national level, asylum seekers, poor people, African Canadian and Minority ethnic, refugees, Indigenous and migrants face different forms of violence from institutions and states. These institutions use violence against racialized communities to maintain national security, order and peace. Jiwani refers to a murder case in British Columbia in Canada, of Reena Virk a 14-year-old girl from South Asian ethnic background (2006). She further explains how 14-16 year-olds seven girls and a boy beat Reena Virk because of her race. The media covered up the reasons for the murder citing that the crime was a love triangle and that the victim was spreading rumours (Jiwan, 2006). Research shows that violence and crime in racialized communities occur when there is loss of hope and despair in relation to poverty and racism. Violence, gun and gang-related crime occur in Ontario because of the high population of legal and illegal immigrants, Aboriginal people and African Canadian youths. These minority groups resort to violence because they lack proper resources and opportunities. In a company that has racialized workers, employers give them low paying and insecure jobs that take longer hours. Their education is not important because individuals and institutions already consider them illiterate and inexperienced. People working for low incomes and overtime tend to try easy jobs such as selling drugs on the streets. Poverty also pushes racialized people to violence. The war on drugs slogan usually targets racialized communities because they are the low-level drug peddlers. Police focus on such groups rather than the powerful drug lords who supply the drugs (Galabu zi, 2010). Re-enforcement and Reproduction of Violence by Mainstream Media The mainstream media in Canada plays a vital role in communication concepts of racism against people of colour. They help in defining the terms of racism and further localize them within the imagination of the public. In reproduction of Canadas social knowledge, the media acts as crucial vehicles in underpinning hegemonic interests and clarifications (Jiwani, 2006). This means that the mainstream mass media invoke thought and behavior in Canadians when they frame race and acts of racism as derived from the social life of minority groups. The media defines racism as violent or nonviolent acts that arise from immigration, ignorance and uneducated individuals who reside on the rural areas of Canada. Race implies the differences in culture and biological appearance as shown in films and pictures. Jiwani argues that Canadian mainstream media communicate race or racism by commission or omission (2006). In cases where violence is against racialized groups, the mainstream media reports that these are normal cases and this in turn spurs new cases of violence against people of colour in Canadian institutions (schools, homes or workstations) because of the footage on the crime. Canadian mainstream media tries to cover up violence against racialized groups by reporting on prostitution, Aboriginality and girl-an-boy crime instead of hate crimes. Jiwani and Young refer to a missing persons case in Vancouvers Downtown Eastside where the body of a murder victim previously reported as missing resurfaced (2006). This case fueled a heated debate among Aboriginal people and the cover-up by the media focusing on prostitution of the Aboriginal. Such a case will re-enforce violence against Aboriginal women because the offenders will use the media portrayal of prostitutes to carry out violence. Jiwani notes that the media portrays the Aboriginal people as childlike, women as prostitutes and men as criminals who need the white Canadians and the state to push them to development (2009). This means that women and men from racialized groups experience violence in the presence of police officers and other Canadians but because of their stereotypical status as portrayed by th e media, an intervention to stop the violence is rare. When such cases occur, the police and other Canadians believe that these racialized groups deserve the violence. Fontaine reports of a case in Winnipeg Sun, a Canadian newspaper that ran an advertisement for stopping crime using a suggestive photograph portraying police officers frisking two teenage boys from the Aboriginal community (2009). This advertisement ran for several months in the newspaper. The effect of the advertisement and photograph reinforced the stereotype status of the Aboriginal youth as delinquents in mind of Canadian readers. Another example of how mainstream media reproduces violence among racialized groups is the case of Reena Virk, the South Asian girl whose body surfaced after eight days in a river (Jiwani, 2006). She further explains that the media covered up the issue of racism until two years later during the trial of one of Reena Virks murderer when the court and media stressed that the victim faced the violence because of her weight and inability to penetrate the culture of her peers (Jiwani, 2006). This means that her physical appearance and lack of normative stand ards caused the violence. Canadian normative standards implies a thin body, white, athletic (able-bodied) and heterosexual. Racialized groups lack these normative standards and in essence, victims of racialized crime are responsible for their own fates. Violence against Racialized Women in Canada Violence against women and girls within racialized families is rampant in Canada because of the stereotype views portrayed by the media, loss of voice and fear of deportation if they are illegal immigrants. Women in Downtown Eastside of Vancouver are from the Aboriginal community faced with adverse poverty and insecurity resulting to prostitution (Jiwani Young, 2006). These women encounter persistent sexual violence from men of the same community or their spouses but they do not receive any security or protection because the police believe they deserve such crimes because they are sex workers. Cases of homicides among racialized families are common but such stories do not make it to the front-page of newspapers because violence against women of colour is a normal domestic violence within racialized groups. Among immigrants, violence against women and girls is high because they do not have a voice and financial ability to seek protection. Calling the police in Canada during a violent crime committed against a racialized immigrant woman could result to two cases: deportation or lack of response from the police. Women resign to domestic violence from their spouses and people from the same family because they cannot escape relationships that are abusive with their sponsors or benefactors because they will lose their homes, children and right to acquire basic needs. Indigenous men, immigrants and men of colour harass their women who refuse to seek help or protection because many women who do not have the resources to provide basic needs for themselves and their children would receive poor healthcare and social housing. Men abuse racialized women who cannot report cases of domestic violence hence they escape punishment. Family structure as portrayed by Canadian media. Mainstream media in Canada sets up the family structure to male domination by the types of movies that portray men as the backbone of Canada while women are homemakers (Galabuzi, 2010). Advertisements show Canadian families with the male as the head of every aspect of the society: work, entertainment and politics while women and girls take up inferior roles. This image creates a male dominated family structure across Canada in the minds or readers and viewers. Most reporters, news anchors and producers in any media network are men. This gives men the upper hand to act as the head of families in major decision-making. Women in advertisements market personal hygiene products such as bathroom or kitchen products. This portrays the role of women in the society is in the home. The media portray men as intellectual and independent in dramas, advertisements and in the media production industry. In movies, men have superior and heroic roles while women play homemakers, secretaries and prosti tutes (Tastsoglou, 2009). Mainstream media production on sexism and racism. The mainstream media in Canada advocates for movies, advertisements and news presentation by white Canadian men. Native Canadians or other ethnic communities in Canada do not get public representation in the media because of the assumed stereotypes. Movie productioons do not include people of colour or interracial relationships that white Canadians disregard. Aboriginal families only make headline news in cases of crimes or mismanagement of funds (Douglas, 2008). Advertisements focus on white Canadian families and not Native Canadians because the media wants to portray a functional male dominated family structure as compared to a native dysfunctional family. Media portrays racialized families as illiterate, violent, poor and ignorant. Most movies in Canada lack equal representation from all races in the country. People of colour will cut the ratings of a drama, movie, advertisement or viewers in case of reporters from racialized communities (Douglas, 2008). Sexism in the media occurs when women and men play specific roles to portray real personality attributes displayed in real families. Women in the media reflect childcare, homemaker and employees in low-level jobs such as secretaries and servers. Advertisements prescribe roles of women as home and family oriented. There are women who advertise superficial beauty in the sense that, they are tall, thin, without blemish, perfect teeth and long legs but underneath all the beauty, she has no brains. Some advertisements portray women as sex objects void of any feelings or personality. Such advertisements show women lying on a bed half-naked or likened to animals that dehumanize them as acting primarily on sexual instincts. Methodology. The method used to collect data is through questionnaire in the campus and thorough research using scholarly journals. Questionnaires are easy to create, they are cheap and fast mode of collecting data. It also protects the identity of people of colour who contributed to the research. Data analysis. In data collection, twenty students from different ethnic backgrounds contributed to the research. The 20 students are sample population to represent the wider community of racialized families in Canada. This data included all the questions that encompass all issues of racism from direct to indirect racism. The problems met while collecting the data was late submission of the questionnaires. Due to confidentiality, refraining from personally collecting the questionnaires from the sample population was the best option. Some students lost or misplaced the questionnaires and they received new copies that meant extra spending on the tight budget. Results. Twenty students admitted to witnessing racism directed to them or their friends in the campus. The students who encountered racism from individuals either in school or in the community were 15 in number. Two of the students confessed to systemic racism directed to them. All students believe that the mainstream media reproduces violence against racialized families. Law enforcement officers stopped 10 students of the sample population for random search. Eighteen students report cases of institutional racism in healthcare facilities and restaurants. Twenty students believe that the mainstream media is sexist and racist. The reasons that the students gave as personal opinions of the causes of violence against racialized families include race, culture, economic status and ethnic background. Discussion. All students in the research report cases of racism directed towards them at one point in their school life. This means that racism in the school compound and in the wider community is rampant. There are individuals who utter racial slurs and students have witnessed violence due to race. When students apply for residential accommodation outside the school, property owners discriminate the students who are immigrants and Indigenous people. The student report cases of discrimination when they are registering for courses, renting apartments and in restaurants. The mainstream media reproduces violence against racialized families due to the images portrayed about people of colour. The police have a tendency of stopping students from racialized families and doing random search while discriminating their rights to privacy. Media is racist and sexist because of the different stereotypical status depicted on people of colour and women in the society. Conclusion Media and violence against racialized families is a common in Canada due to Somali refugees, African asylum seekers, Indigenous people and minority groups. White Canadians direct racism and violence towards these groups based on race, poverty, crime, lack of education and stereotypical assumptions portrayed by the media. Violence is a common occurrence within racialized families because the victims who are women and children lack the financial power and voice to raise their concerns. These women do not receive protection from the police because the media has portrayed them as prostitutes who deserve the sexual violence and domestic abuse. The media use suggestive images of racialized teenagers to portray crime and illiteracy. These images strike negative thoughts on the minds of viewers and readers hence reinforcing violence against the people of colour. The media also portray sexism and racism in term of advertisement and movie roles given to women. These roles depict women as homem akers, cleaners and sexual objects while men take up powerful roles that portray role models in the society, decision makers and professionals. Buy custom Media and Violence in Racialized Families essay

Thursday, November 21, 2019

E-Shopping System for Educational Needs Assignment

E-Shopping System for Educational Needs - Assignment Example Search for products: A Search box would be provided in every page of the application where the user can type in a text of their choice (matching the search criteria). In addition, two or more drop-down lists would be employed for selecting the categories and subcategories to refine the search more precisely and also to ease the task of customers for entering additional texts. Order a product: The e-Shopping application would have an exclusive order processing module. Users can order any number of products from the appropriate page. The system would offer a secure payment gateway for making payments using a variety of modes like internet banking, credit cards, and PayPal. Place an inquiry: In order to facilitate bulk bookings for Corporate/Academic Institutions, an option to place requests or inquire about the availability of the required quantity of products and also the expected invoice would be offered. Track the order: Track your order option would be opened to customers as soon as the payment is made and the order request is completed. Users can track the order based on the order id or combination of customer id and the order date. View Order History: View History option would be enabled for all registered customers in order to view the history of all their transactions. It would not only include all the completed orders but also includes details for canceled and pending orders if any. Apart from all these functionalities and features, session variables/cookies would also implement so that the application would remember the users visiting the site and would welcome them with their name (if registered) and their last visited date and time. The system is implemented with the overall assumption that there is a stable internet connection available throughout the period of transaction.  

Wednesday, November 20, 2019

Rising Cost of Prescription Drugs Case 4 Essay Example | Topics and Well Written Essays - 750 words

Rising Cost of Prescription Drugs Case 4 - Essay Example One of the main problems for the rising costs in prescription drugs is the pharmaceutical companies. According to pharmaceutical companies, the reason why the costs of prescription drugs are rising is due to the research cost in testing new medicines that will potentially cure various ailments in patients. The drug companies use the revenue from the current prescription drug sales to pay for the research costs of testing new drugs. The new drugs that are tested are eventually marketed to the general public, but because these drugs are new and do not have a generic brand, they are much higher. The drug companies argue that this cycle of pricing drugs at much higher costs is a necessity, since revenue has to be generated to pay for future research. In addition, pharmaceutical companies have to patent new drugs to protect them from any unauthorized sales of new drugs. Patenting requires additional money to retain a lawyer to file the proper documents for patenting the new drugs. As a so lution, the federal government provides a prescription drug coverage plan for Medicare beneficiaries. Currently, the drug companies are not finding better solutions to reduce the rise in prescription medications. These drug companies rely on the revenue from the previous prescription drug sales to pay for the research, testing, and implementation of new drugs. The pharmaceutical companies are blaming the rise in prescription drugs on the increased utilization and demand for various prescription drugs, types of prescriptions that doctors are prescribing to patients, price increases, research and development, and advertising and marketing expenses. In addition, patent protection has caused prescription drugs to increase. The patent laws protect the manufacturers by providing them with an exclusive right to sell the drug products for up to twenty years. After the patent protection expires, the previous patented drugs can be manufactured and

Monday, November 18, 2019

Group Analysis Essay Example | Topics and Well Written Essays - 1000 words

Group Analysis - Essay Example The work environment also teems with groups, either of friends or groups put together to facilitate the achievement of a specific organizational goal. The next stage in life is to form families of their own which are also groups with the cycle beginning all over again. Almost all activities carried out by people are done in groups, making them a core element of study with relation to understanding human behaviour. According to Forsyth, groups have long been the subject of interest to both researchers and scholars (2006). Extensive studies have been carried out with regard to how groups are conceived and how they are later dissolved; this includes how they are transformed and how they are used to either realize set aims, or how they can be used to execute offenses (Forsyth 2006). This paper discusses group dynamics and communication within a group of first year undergraduate nursing students’, participating in a peer-led team learning group. I participated in a peer-led team le arning group in my first year as a nursing student; therefore, this assignment is an overview of my observations of the group. The use of peer learning is a practice that has been adopted in many universities worldwide, as a means to improve students understanding of concepts through supportive discussions that take place in small groups, and where the discourse encourages as many questions as there might be, from students (Peer-Led Team Learning 2013). It is a fact that most students feel free around their fellow students, rather than around their lecturers and professors. This makes them more inclined to discuss concepts and questions with other students, than with a lecturer or professor. Peer-led team learning holds the strengths of being a method that enhances student engagement and motivation in learning, as well as overall performance (Centre for the Study of Higher Education 2002). This is due to the fact that in the process, students learn to communicate effectively as they work in teams, while peer leaders gain self-confidence, learn a number of group management skills, and how to teach. In this context, students were requested to band themselves into groups of four. Two peer leaders (i.e. group leader and assistant group leader) for each group were then selected from third and fourth year students, who had displayed exemplary performance in class. As a way of equipping them with the necessary skills, the peer leaders were taken through brief training mainly focussed on how to handle groups. When this was set, each group was given a structured problem to solve. According to the guidelines, each group was required to meet twice every week, and members were given the privilege to choose the best time for their discussions. Description of Peer Leaders and Group Members Characteristics and Behaviours 1. Tom (Group leader) He is a fourth year nursing student. He is firm, confident, and resourceful. His resilience and optimism helps him conquer complex pro blems. He also has a very open minded approach to things. He is however quite poor in time management since he often comes late for the discussions, and is usually late to meet deadlines. His lack of respect for time and set deadlines is at times considered as lack of respect towards the assistant group leader and group members. 2. Olivia (Assistant group leader) She is a third year nursing stud

Friday, November 15, 2019

A Definition Of Online Ordering Systems Information Technology Essay

A Definition Of Online Ordering Systems Information Technology Essay Online food ordering services are websites of local restaurants and food cooperatives set up for customers to select from the interactive menus provided so as the ordering process can take place. In order for ordering to take place, any sorts of internet capable devices which support complex web pages are used. People normally use computers to access into the food websites and place an order. Similar to ordering consumer goods online, online food ordering services also allow consumer to register and uphold an account at the Dominos Pizza website in order to make frequent ordering convenient. A consumer will look for favourite restaurant, browse from available items, and select delivery or pick-up. Payments could be made via credit card or cash. Partial of the payment will be given to the online food company. The pioneer restaurants to adopt online food ordering services are corporate franchises such as Dominos Pizza and Pizza Hut. Procedure Firstly, the customer needs to go the Dominos official website, www.dominos.com.my. The registration as a Dominos member is necessary if the customer order pizza via online for the first time. First step of the register process is entering the street name to locate the customer delivery address accurately for the delivery. After registered, click on the Order Now button. A log in box will pop up on the screen asking for the customer username and the password. After login the customer is able to start to order on desired food or drinks. Once finished ordering, click on submit. An e-mail for verification will be sent to the customer. Once verified, the delivery will send to the customers location within 30 minutes. After purchasing the pizza, customer can keep track of their pizza by GPS Tracker offered by Dominos Pizza. Payment is made subsequent to the customer when the Dominos employee delivers the pizza to the customer. Function: Ordering food online is becoming a norm for restaurants which offer takeout and delivery orders. Online food ordering is designed as it is cost effective yet an efficient system to satisfy the restaurants needs. The system is also designed for its ultimate flexibility and performance. The customers will be able to access into the company existing website and browse at their menu and select and place their orders on what they desire. Once the customer has confirmed their order, the system will either email or fax the customers order to the restaurant. The online ordering system also enables customers to order days in advance and the system will accomplish the order at the specified time. The online ordering system has been constructed to handle large amounts of orders simultaneously to prevent the system overload. This system is also flexible in a way, whereby customers are able to place online orders quickly, with just a click comparing to the tradition where orders were taken through the phone. More time and cost will be saved ordering online as phone bill is charged according to the time the phone is on the line. The system was used intended to meet the requirements of all of the clients. Internet database Online ordering is easy and convenient yet they have more to improve on their online ordering system. It is good that online ordering system has linked the customers information with the database of the system which facilitates the ordering of customers. In addition, customers information could be tracked easily from their database rapidly if they are regular customers. Advantages With the escort in of the 21st century, several of individuals have found out that it is basically easier to purchase goods online. This depends on the consumers preferences. Some people feel unsecure buying items online because they cannot have physical touch or sight with the items they wish to buy. In this case, some people prefer to have the pizza straight from the oven when it is served. Online ordering provides additional customer service such as delivery to the destination that they have requested for. Customers can view the entire menu and all special offers via official website though online. The system records customers orders when purchasing has taken place. Extra services are provided to customers for example like estimated delivery carryout times and track their pizzas position using the GPS Tracker accessible on the website. When ordering via online, even throughout a busy period such as lunch or dinner time, customers would not have a problem in contacting Dominos Pizza and placing their orders. The customers just need to order via online and the system will automatically generate and put it on queue. Online ordering records and stores past records of orders made and allows the customers to view them anytime during their online ordering session. These records will store at the database. The biggest advantage to order pizza online is that the customer can save a lot of time and effort. Customers can decide to complete their orders within seconds or take their time the customer wishes. There are no time limits for them to complete their orders, thus, customers can take their time to order. Instead of planning out time in daily schedule to go out and make a purchase, the consumer can instead go to the website when they have a free time at work or at home late at night, and look up the product that the customers are considering to purchase. The customers can view the full menu and can order any combination of food while the prices are displayed and calculated as they go. It is much easier for a customer who is wished to make large and complex orders online because the customer can order in patiently, consider the options, and calculate different pricing schemes. Consequently, a customer can take a look at products late at night. Even though the Dominos Pizza stores have closed for the night, customers can place orders for the next day while the website still running and available to make pre-order. This means that even after a long day at work and going back home to meal with family, the customer still have time left to go online and look for the product they want to purchase. The Internet is there is open 24 hours 7 days, and is always willing to let the customer to come make pre-order. By going online, the customer do not have to worry about the hassles, such as when they decide that it is time to check out, they do not have to waste the extra time queuing in line. By ordering online, the customer can also take advantage of deals that are only offered to online customers, and often find products that wouldnt be available at a walk in store and special offers are given to online customers. Customers who order pizza online are proven to order more because they dont feel hasty while ordering, as the customer often does over the phone when using phone order. In addition, online ordering increases the amount of customers who visit the Dominos Pizza official website. It also gains customer satisfaction and loyalty throughout the company. Due to its convenience of online purchasing service, customer purchase frequency also may increase. The company eliminated or reduced labour costs associated with manual order taking due to technology computerize replaced labour usage. For the Domino Pizza Company, the online ordering system accepts both online and traditional coupons to attract more customers. Mackay (2008) claimed that Customers who order on the web tends to order more because they have a menu in front of them. With internet, there will be fewer errors on the orders or miscommunication among customers and the employee who taking orders. Compare to phone call ordering, online ordering pizza make fewer mistakes. When during the phone call order, the customer may order wrong item without realizing it. The pronunciation of certain words might lead to order the wrong product. Besides, it provides timely service. The system examines all food orders prior to the completion and corrects human errors. Also, with this system, the registration of online guests is utilized to create valuable marketing campaigns. Online Ordering provides the wonderful solution for office lunch orders. The customers can orders without the hassle of using phone call to order the pizza. The customer can take their time and get the pizza in time. The Dominos Pizza website guarantees that the message, promotions and add-on offers are well delivered to the customers. In financial factor, online ordering system increase the efficiency and cost effectiveness of the ordering operations. For the advertisement, it can create easily or upload promotions to the Dominos Pizza website. For instance, this system can increase the customers guest check automatically by customer email by suggesting upcoming sells for additional products. Online ordering increases in sales of goods in the Domino Pizza Company. Disadvantages The trend of shopping online, especially ordering pizza online has gradually been significant in the last decade and online sellers are expected to have improvements on the volume of sales after website features and services altered. There is no doubt that the customers can find great deals online and so many different products which may not be even available in regular stores. By the way, there are certain disadvantages of online ordering. Normally when we shop from a regular store, we can go directly to a salesperson face-to-face to enquire and clarify our doubts regarding the food we ordering. It is possible that customers would have a wrong idea of what the products and services is about as the customers and the employee cannot deal face-to-face for a clear explanation. Another disadvantage is that a lot of companies which sells online state that customer have to pay for the shipping and delivery charges depending on the weight of the product the customer orders. Only a few companies with websites offer free shipping services while some companies provides free shipping services only if the customer has a total purchase of prices exceeding a certain amount. The shipment fee charged often is one of the reasons that customers would not like to order goods online and does not guarantee that the goods delivered will be in good shape. However, a company must consider on the target market they would like to focus on promoting their products and services to. The elderly are most unlikely to order goods online due to their knowledge of operating a computer. Therefore, if the target market includes the elderly, a traditional service has to be provided to them. Online connectivity issues are the greatest disadvantage for online ordering. The customers add items in online shopping cart, enter information and press submit. The confirmation screen might time out when the internet has an unstable connection. The online customers would not know whether the order has been made or not while reloading the page may cause several billing or several orders. Moreover, customers may also make human errors, such as ordering the incorrect item. This can occur when the customer attempts to place an order. The customer may have accidentally clicked on the wrong item while placing their orders through the website. Even if the consumer clicks on the correct product and provides an accurate product number there may still be mistake made in the ordering process if there are options associated with the item. This problem can be rather disturbing because the consumer will get agitated when the incorrect item is received and therefore, loses customers loyalty towards the company. Another disadvantage is that purchasing online would mean that personal information has to be given to the company when purchasing is taken place. Some companies take advantage of this feature. By purchasing on the Internet, the customer would have to take the risk of having their information taken by online companies and misused. Though this is a very rare occurrence, it is more likely to happen online, than in person. To avoid personal information from being exposed, customers would usually look for a trustable company to purchase goods from. More often, what people dislike about online purchasing is that delivery services are only restricted to certain areas. As a result, people living in rural areas are at a disadvantage whereby they will need to go to the destination whereby the company is able to deliver. Impact of the Technology Dominos Pizza is the first pizza delivery company that launch online ordering system and one of the most recognizable pizza brands in Malaysia. Online ordering has been great in this era of time, where communication taking place thru the internet. The company stated the pizza that order via online in Malaysia take up about 8 to 10 percent of the overall sales. On average, Dominos sells over one million pizza daily across the global. The technology helps the Dominos Pizza gain great revenue over other competitors like Pizza Hut which offer online delivery service as well, McDonald and Nandos which order by phone call. Technology has hastily taken over many jobs whereas technology also creates new jobs towards the organizations. Due to the implementation of the online ordering system for the Dominos Pizza, the company might require some web developer to maintain the website and the database. The organisations leadership and managers need to be change and they recognise the need to adapt and change in response to their vision, aim, shareholder expectations and consumer tastes for example the Dominos Pizza need to set new regulation and IT code of conduct to manage the Dominos Pizza website. Internet Application Similarities Dominos Pizza makes use of E-commerce, meaning transactions over the internet, ordering food online can be an example, pizza- a customers favorite, and additional menu items includes chicken finger`s, fresh salads and sandwiches. At the end we all enjoy all the benefits that the internet serves to the Dominos Pizza. The Domino`s Pizza uses a high-speed connection to access the internet, and with use of the internet they have a domain name, www.dominosoline.com. By the use of the internet is the ultimate tool in marketing, means they can reach an even wider population. Domino`s have they own website that they operate on is secure and hence digital certified thus providing the user to browse safely. They have built secure internet architecture to safeguard the data that they collect online, example can be advertisement boards. The Dominoes Pizza uses internet browsers to surf the web and consists of other useful features which are used to make ordering a pizza as easy as possible, apart from that you can do everything on their site from browsing the menu and ordering a special pizza`s and furthermore tracking the customer pizza in real time from order to delivery. Differences In terms of difference we see that E-mails sent to customers by the Domino cannot be replied back therefore it help in eliminating the risk of acquiring any Spam without the need to make use of freeware or encryptions. This System does not incorporate chat services, newsgroup or message boards to any user. The System does not incorporate any file transfers over the internet, be it downloading or uploading. Recommendations According to the similarities and the differences, we see that the advantages and the disadvantages of using ordering online; several recommendations are advised to be considered by Domino`s Pizza for them to enhance their services and operation and performance. Ordering food online should be more dynamic and helpful to the customers by enabling them to send instant messages to the customers notifying them on cancelled orders via emails, phones or fax informing them about the dynamic change, and providing them with other feasible alternatives. The interface of the ordering food online should be implemented to support more functionality like incorporating tighter security measures. This will allow the user to have more interaction with the system and test the system of its fullest potential. Ethical Legal Issues Computer Ethics Computer ethics is the moral guidelines that govern use of computers and information systems. For example, unauthorized use of computers and network, software theft, information accuracy, intellectual property rights which is the rights to which creators are entitled for their work, codes of conduct and Information privacy According to James H. (2000), computer ethics is the study of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of technology. Information privacy is one element of the computers ethnics. Dominos Pizza Malaysia acknowledges and respects the privacy of individuals. This policy covers the personal information that Dominos Pizza and its franchisees hold and locate the way in which Dominos Pizza and its franchisees will use, manage and protect the customer personal information when the customer visit any of Dominos Pizza websites, or place an order with one of the stores. In additional, Dominos Pizza is concerned about the information accuracy of customers. Dominos Pizza will take reasonable steps to ensure that the personal information collected is accurate, complete and up-to-date. The customer can access and request correction of any personal information concerning the customer at any time. The customer may also request that the personal information be deleted at any time. Dominos will take reasonable steps to protect personal information from misuse, loss and unauthorised access, modification or disclosure. Cookie A variety of ways to safeguard personal information is installing a cookie manager to filter cookies. A cookie is a small data file sent from a web server that is stored on the computers hard drive. Cookies allow the customer to recognize their computer while the user is on the website and customize the customer online experience and make it more convenient and browse the website browse faster for the customer. This file enables to track visitor to the website and records certain data concerning that visit, such as the web pages that the customer viewed in order to access to the website. The use of cookies by Dominos Pizza enables the server to record the customer preferred language for navigating the website and improve the functionality of the website. Cookies are also useful in allowing more efficient log-in for users, tracking transaction histories and preserving information between sessions. Most web browser applications for example Microsoft Internet Explorer have features that can notify the user when the computer receive a cookie or prevent cookies from being sent. If the users disable cookies, however, the user may not be able to use certain personalized functions of the website. Encryption When Dominos Pizza receives or sends data via its website, it uses recognized industry standard encryption technology. Encryption is the translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, the authorized person must access to a secret key or password that enables the user to decrypt it. Unencrypted data is called plain text whereas encrypted data is referred to as cipher text. Dominos Pizza is using Voltage Securitys Secure-mail encryption package to protect internal and external company e-mails. According to Anderson (2007), the manager of network security of Dominos Pizza, he claimed that the move is part of a corporate-wide data loss prevention initiative to avoid accidental loss of private or proprietary information. He realised that e-mails being sent to partners and suppliers, such as insurance providers, may contain information like social security numbers that must be encrypted before sending. The decisions about encryption will be made based on pre-set policy, not by individuals on a one-off basis Secure-mail will automatically flag e-mails with sensitive data and encrypt them automatically prior to sending. Recipients will be able to read protected messages without having to download and install client software. This image show how the encryption works Image Source: http://www.outsourcing.st/uploads/images/public-key-encryption-example.gif Privacy Laws Privacy laws have been set by Dominos Pizza for example like how Dominos Pizza collects customer information and how they use customer information. As Dominos Pizza continuously improve and expand their services, the policy might change from time to time. Whenever necessary, check the website regularly to stay informed of any updates. The policy is effective as from December 2009. Dominos Pizza reserves the right to modify or supplement the policy at any time. If a material change to the terms of this policy is made, Dominos will post a notice on its homepage and a link to the new policy. Dominos Pizza does not provide personally identifiable information to unaffiliated third parties for their use in marketing directly to the customer. Dominos Pizza may use unaffiliated companies to help it maintain and operate its website or for other reasons related to the operation of its business, and those companies may receive the customer personally identifiable information for that purpose. Personal information that the customer submit to Dominos may be disclosed to a third party such as the suppliers who are employed to provide some of the services such as mailing houses. For example, if the customer place an order via our internet order system, the customer details will be passed on to VeriSign, who receive the customer credit card details for internet order payment. VeriSign is a secure internet payment gateway that secures the customer credit card number during transmission. Dominos will not collect, use or disclose sensitive information such as information about racial or ethnic origins or political or religious beliefs except with the customer specific consent or in the circumstances permitted in the Malaysian privacy laws or any other related laws in Malaysia. Recommendation The customer can protect their privacy by fill in necessary information on registration forms, rebate and warranty. The customer can limit the amount of information provide to the websites, fill in only required information. The customer is encouraged to set up a free e-mail account and use this e-mail address for merchant forms such as ordering a pizza. In addition, sign up for e-mail filtering through the Internet service provider or use an anti-spam program, such as Brightmail. Do not reply to spam if necessary. Security Before I start to write about similarities and differences between the security issues and dominos pizza ordering online, we should know the first goal to security issues keep users safe and dominos pizza online need this service to save customers information from loss or damage. Similarities All of the security that Dominos Pizza executes and makes use of it is to win the customers reliance. Dominos company try always to gain the customer and security companies by providing appropriate for the users. All of them looking for renewal ideas, offers and Inventions like new recipes for pizza and such us security program scans the files and codes and automatically pass to the company site on the Internet and to compare these codes and the company will renew the information. All of them need the computer. Viruses, worms and Trojan horses hurt the security and hurt dominos pizza online also because dominos company using internet and company want save Privacy such us security the amendment or change within the Software Protection. All of them has specifically plan. All of them use internet explain, dominos use internet to make ordering easy for all people who using internet and also order what over the people want from dominos. Security fabricate because the people how use internet need to save the information also dominos company need the security to save data from steal or loss. Challenge and Competition. Security companies compete with each other in the services companies provided for the user to gain users satisfaction and also dominos company using advertisement in TV, newspapers and web sites compete with dominos many companies and restaurants such as pizza hut stubborn challenger for dominos. Differences: Security issues Dominos pizza online Security is software. The main benefit of the program is a firewall that works to protect the device during work on the Internet and this wall protects you from hackers Dominos pizza is restaurant best services through company web page Security is very important and indispensable to save the information away from the players and hackers. Dominos pizza is not important, because there are many restaurants that provide the same services also, therefore one cannot loss anything from not eating from pizza rest restaurant. Protection service and Information systems and prevent any person from entering except by permission of the user to our system Service request and this service is available to request through the website Problems in security: All off Virus Anti-Virus, Kaspersky, Nod32, Norton and AVG did not reach full perfection each of them has many flaws and errors such us program size and some of them has the property to delete without permission from user or some of this make system slow. Conclusion Stepping into the world of modernization, majority of the services are being computerized and programmed in a specific system to simplify and reduce labour work. It is a wise decision for Dominos to adopt online food ordering system due to its convenience and user friendly. Dominos website which provides online ordering also have saved profile of signed up customers, including full name, contact number and also complete address for delivery. It prevents mistakes of jotting down the details if customers order through phone call. Besides, Dominos have also kept a record of previous orders so that customers can refer to previous selection of their favourite pizzas. This online ordering service will undoubtedly attract more customers because Dominos allow customers to place an order via internet today and request for delivery on another day. The delivery time is also available at any time according to customers needs from 11.30am till 11.30pm. Another great service provided in online ordering service is Dominos have specifically engineered the Great Pizza Service Tracker that provides customers an up-to-date status from the moment customers place orders to the moment the pizza leaves the store. The status starts from order placed, preparing, baking, boxing, packing, ready for delivery, and lastly the pizza is ready for delivering. In conclusion, Dominos has successfully keeps their customer loyal is partly due to the wide usage of online food ordering service. This service has not only minimize mistakes while placing an order, it has also provides maximum satisfaction for customers during the selection of food. Recommendation According to our research about Domino`s Pizza, several recommendation are advised to be considered by the company to improve their services and operation performance: Planning Domino`s company needs an effective advertising structure or plan, in this case it will improve customer relations. The domino`s company needs to increase the speed and efficiency of pizza making, therefore means that they can cope with larger amount of customers and having long customer relations. Performance management Domino`s company should check how the employees are doing for example how they analyze the performance of the company. Employees are required to interface directly with the customers to improve better understanding; another thing is that the employees need to make certain decision in the company rather than waiting to be told what to do and how to do. For Domino`s to be successful, the employees need to work hard so that they can reach the objective the company. I will recommend the employees should be made happy for example, good working condition and to be treated fairly. Vision Domino`s company needs to improve on their sales which at the end will inevitably lead to more profit and fame also. The Domino also has to break in and expand and do well in the Malaysia market.

Wednesday, November 13, 2019

Election of Lincoln and Civil War Essay examples -- history

Election of Lincoln and Civil War How did the election of Lincoln to president in 1860 lead to civil war in the United States of America? Essay: In 1860 Abraham Lincoln was elected as president of the United States of America, the repercussions of which led to civil war. However it was not only Lincoln’s election that led to civil war but also the slavery debate between the northern and southern states and the state of the economy in the United States. Together with the election of Lincoln these caused a split, both politically and ideologically, between the North and South states which manifested into what is now refereed to as the American Civil War. When Lincoln won the 1860 election it was not by a majority vote. As stated by the historian Neville he in fact won less than 40 percent of popular votes. However because the American election system is based on the college votes system (where each state is worth a certain number of points and if a candidate wins the majority of votes in that state he wins all the points for that state, regardless of how much he wins by. To win the entire election a candidate must win the most amount of points) he was able to win the election with a minority of votes. Lincoln won all the states in the north and in the west which, because of their high population, were worth the most points. This election caused the civil war because of what the southern states, the Confederate, perceived Lincoln to be. He was thought to be an abolitionist, meaning a person who wishes to abolish slavery completely. In fact Lincoln only wished to stop the spread of slavery, not to abolish it completely. He had no intention of changing the established social order in the south. Historian J. J. Cosgrove sees Lincoln’s election as the straw that broke the camel’s back. He claims in his book, co-written with J. K. Kreiss, Two Centuries that the civil war can be put down to five causes; slavery; political collapse that eliminated compromise; sectional economic rivalry; Southern nationalism; and the effect of fractional minorities such as abolitionists. This can be summed up as a rift between the north and south states. A rift between the north and the south had been present since the late eighteenth centaury. It began with the industrial revolution, which saw the northern states prosper. The north changed industries from fa... ...eadership of the democrats, believed in popular sovereignty ie the population of a state choosing for itself on the matter of slavery. The other member also aiming to rule the democrats was Breckinbridge, who believed in slavery being permitted in all states. The democrat party split into the northern and southern democrats. Because of the split Lincoln was able to win the election, upon which the southern states succeeded from the union. In conclusion the election of Lincoln as president in 1860 caused a civil war because it was falsely perceived by the south that Lincoln would threaten the state’s constitutional right to slavery. This false idea was due to a rift between the northern and southern states in both an economic and ideological manner. That is the north was based on industry and generally was opposed to slavery. But the South was an agricultural society which ran on slavery and, due to Nat Turner’s Insurrection and John Brown’s stand at Harper’s Ferry, was fearful of the north’s involvement in the governing of states as well as being opposed to this on the basis of state’s rights. The election of Lincoln caused the south to succeed from the union causing civil war.

Sunday, November 10, 2019

English Paper on Holes Essay

The film codes and conventions are greatly used in the movie Holes, directed by Andrew Davis, to construct characters and develop the atmosphere. The film is about a young boy, Stanley Yelnats, who is falsely accused of stealing a pair of shoes. As a punishment, he is sent to camp Greenlake, where he meats and discovers an ancient secret that leads him to great treasure. Throughout the movie technical, symbolic, audio and written codes are used to demonstrate the characters’ personalities as well as create a profound atmosphere in every scene. These filmic conventions help the audience to obtain a clearer understanding of the main characters and the movie itself. The innocent and friendly nature of Stanley is effectively demonstrated through the film codes and conventions. He is a protagonist in the movie and undergoes the most change to his personality and behavior throughout the film. In the very first scene, Stanley’s voice over is used saying â€Å"All my life, I seem to appear at the wrong time in the wrong place†. This audio code has a great effect on the viewer’s opinion of Stanley, indicating that he is clumsy or unlucky. A little further into the movie, techniques such as costume and setting are well used. Stanley’s over-sized old clothes and the messy, un-tidy house of the Yelnats’ family gives an impression of a less fortunate family. These filmic codes are vital in the construction of Stanley’s personality. The film codes and conventions successfully show Zero’s as a closed, shy and disrespected little boy. He too is one of the main characters in the movie and over time becomes great friends with Stanley. When Stanley is introduced to the other boys in camp, Mr. Fernandsci explains, â€Å"You know why everyone calls him Zero? Because he has nothing going on in his stupid, little head!†. The effect of this dialogue is immense. Zero is introduced as a dumb and helpless boy, yet we understand that he is plainly judged and bullied. When the councilor proclaims this, Zero turns his back on the boys and his facial expression shows anger and disappointment. These symbolic codes have a huge effect on the viewer’s opinion of zero, suggesting that he is an annoyed and perhaps unapproachable little boy. He just wants everyone to leave him alone. The audience understands zero’s calm yet unsociable personality through the excellent use of various film code techniques. The filmic conventions are used to create a dream-like atmosphere in the scene where kissing Kate Barlow commits suicide. After stealing and burying the treasure of Stanley’s great grandfather, she has been stranded in the desert for several days. When viewers first see her lying on the sand, the focus of the camera is blurred. This technical code has a great effect on the viewers understanding of the scene, showing that it is a flash back or memory. Further into the episode, a blurred image of Sam appears and Kate murmurs, â€Å"Its so hot Sam but I feel so cold†. These techniques give an impression that Kate’s vision is blurring and she is hallucinating because of exhaustion. This dialogue and several other shots work together to create the imaginary, almost unrealistic atmosphere. A happy and relieving atmosphere is created with the use of film codes in the scene where Stanley and Zero climb god’s thumb and reach water. After a close escape from Camp Greenlake, the two boys have been wondering along the desert for days. They have finally reached a rocky mountain in the shape of a thumb, onto which Stanley’s great grandfather had once climbed, and found water. Joyful and lively music plays when the boys finally come to the top of the mountain. The use of this technique demonstrates how Zero and Stanley have finally reached their goals and the atmosphere is clearly shown. Throughout this scene, cool colors such as blue, purple, grey and violet are used. This symbolizes the peacefulness of the situation and the viewer gives a sigh of relief, as the main characters are unharmed. These filmic codes are very important in the construction of a serene atmosphere in the particular scene. The atmosphere and the characters’ personalities in the movie are created by the excellent use of film codes and conventions. Voice overs, body language and costumes are used to construct the character of Stanley and Zero. Colors, music, different camera shots and dialogue are used during different scenes to portray the correct atmosphere. These various codes give us a better understanding of the film and the important messages.

Friday, November 8, 2019

Playing Beatie Bow essays

Playing Beatie Bow essays Playing Beatie Bow, by Ruth Park is a gripping novel that highlights the distinct differences of values, morals and behaviour in people between two periods of time. Playing Beatie Bow is not only set in 1973, but also 1873, a century earlier. This is possible by the main character, Abigail, being transported back in time. Abigail finds herself in a completely different place, which is actually the Colony of New South Wales. The novel focuses on comparing life, love, and morals to show how they were like in the past and how they were in the future. Abigail finds herself linked to the past by a crocheted dress and is dragged into 1873. She is adopted by the Bow family and is seen as The Stranger. You are the stranger, there is nae possibility of mistake., p 105, demonstrates how positive Mrs. Tallisker is towards Abigail being the stranger. She explains to Abigail how one person will die in their family. Abigail saves Gibbie from dying in a fire and returns to her own time where she discovers that the one she loved, Judah, was the one to die. Abigail is a person whose personality and character matures over time. When Abigail (Lynette) is first introduced to us, we see her as an arrogant and selfish person; I dont really care for people much., p 18. She has a brown face with deep coffee-black eyes. She is described as flat as a board and quite narrow. Abigail was known in the family as a clever student, a reserved girl and a self-contained individual. Outside, she was dependent and not very much liked. She despised love; She felt wiser than this love-mad rabble in her class., p 4. When Abigail travels backwards in time, she finds that she is in a place foreign to her. After watching the foreign people live their lives with purpose, loving each other and loving life for what it is, she realises how selfish she has been. Her out of time experience has taught her many thi...

Wednesday, November 6, 2019

Hash libraries for C Programmers

Hash libraries for C Programmers This page lists a collection of libraries that will help you in programming in C. Libraries here are open source and used to help you store data, without having to roll your own linked list etc data structures. uthash Developed by Troy D. Hanson, any C structure can be stored in a hash table using uthash. Just include #include uthash.h then add a UT_hash_handle to the structure and choose one or more fields in your structure to act as the key. Then use HASH_ADD_INT, HASH_FIND_INT and macros to store, retrieve or delete items from the hash table. It uses int, string and binary keys. Judy Judy is a C library that implements a sparse dynamic array. Judy arrays are declared simply with a null pointer and consume  memory only when populated. They can grow to use all available memory if desired. Judys key benefits are scalability, high performance, and memory efficiency. It can be used for dynamically sized arrays, associative arrays or a simple-to-use interface that requires no rework for expansion or contraction and can replace many common data structures, such as arrays, sparse arrays, hash tables, B-trees, binary trees, linear lists, skiplists, other sort and search algorithms, and counting functions. SGLIB SGLIB is short for  Simple Generic Library and consists of a single header file sglib.h that provides generic implementation of most common algorithms for arrays, lists, sorted lists and red-black trees. The library is generic and it does not define its own data structures. Rather it acts on existing user-defined data structures via a generic interface. It also does not allocate or deallocate any memory and does not depend on any particular memory management. All algorithms are implemented in form of macros parametrized by the type of data structure and comparator function (or comparator macro). Several further generic parameters such as the name of next field for linked lists may be required for some algorithms and data structures.

Monday, November 4, 2019

What are the major barriers to effective global governance in the Essay

What are the major barriers to effective global governance in the international system Explain your answer by using at least two analytical approaches introduced in the block and at least one case study - Essay Example To this end, The International Campaign to Abolish Nuclear Weapons (ICAN) was initiated in 2007. This paper examines two approaches the global community has resorted to in the fight against nuclear weapons and the challenges faced thereof. Today, nine countries are in possession of over 16,000 nuclear weapons (Adamsk, 2014, p. 91-134). These are the United States, the United Kingdom and Russia among others. The United States and Russia alone have about 1,800 of their nuclear weapons on high alert. This means that that the weapons are ready for launching within few minutes of the declaration of war. Many of these weapons are several times more powerful than the atomic bombs America detonated on Japan in 1945. The most certain way of eliminating the dangers nuclear weapons pose to humanity is for the world’s nuclear powers to disarm(Eilstrup-Sangiovanni, n.d, p.51-80.). The leaders of some nuclear powers have uttered their support for the eradication of nuclear weapons. However, none of them has unveiled an elaborate plan for the elimination of their arsenals. Instead, they are in the process of modernizing them. Nuclear weapons possess massive power to destroy human life and the environment(Tannenwald, 2006, p. 677). When detonated, they release colossal amounts of energy in the forms of radiation, heat and blast. No amount of humanitarian assistance would be sufficient to handle the damage caused by a nuclear weapon. A regional war in which about a hundred nuclear weapons the size of the Hiroshima atomic bomb were used would result in the immediate death of tens of millions of people. Moreover, the war would alter the global climate so grossly that over a billion people would starve. Based on these facts, the international community swung into action to eliminate these lethal weapons. This paper examines two approaches that have been employed for this purpose and the challenges encountered in each. There are two broad approaches to

Friday, November 1, 2019

Cyber-Bullying and Cyber-Bating - Specific Issues of Generation Z Assignment

Cyber-Bullying and Cyber-Bating - Specific Issues of Generation Z - Assignment Example As a function of understanding all of these determinants, the following analysis will engage in something of a cause and effect analysis of bullying. It is the aim of this section that through such analysis the reader can gain a more informed and rational understanding of how cyber-bullying impacts upon the development and prospects of the individual who suffers from it. Likewise, the second portion of this analysis will focus on a new trend that has come to be known as â€Å"cyber-bating†; a technique that is used to prompt a teacher or authority figure past the threshold of anger and then record this demonstration of frustration as a means of degrading or humiliating them. All of this has come to be a core concern; especially with respect to Generation Z – commonly referred to as the cohort of individuals born after the Millennium. Firstly, the causes of cyber-bullying are various. Much of the existing scholarship points to the fact that existing social issues, dynamics, and the willingness to have a level of power over another individual oftentimes prompts a would be full to engage in the process from the very beginning. However, it is also understood that unhealthy family relationships or issues that are unaddressed/traumatic oftentimes contribute to encouraging bullying behaviour as a means of passing the pain and hardship on to another individual. Sadly, as a result of this flawed and inappropriate view of the world, bullies have a lasting impact with respect to the way in which individuals live their lives. For instance, pervasive bullying has been effectively linked to low levels of self-esteem or self-confidence. Further, this is something of a slippery slope due to the fact that individuals experience a particularly low level of self-confidence are oftentimes picked on even more and bullied by other individuals; due to their nonconformity.  Ã‚