Monday, December 30, 2019
Political Relations Between Humans And Their Government
Political theorists emphasize the relationship between humans and their government when examining possible forms of society, for this is the most crucial element of political structure. In nearly every theorized society, humans empower their government, which in turn benefit them. How humans empower their government and the benefits received is where philosophers often differ. For example, Aristotle believes the purpose of politics is to better the lives of the citizens. Their lives are bettered partially through the individual participation of the citizens as through citizens sharing in the administration of justice and the holding of public office. Political involvement is a privilege of citizens, who are free from the necessary tasks of lives like manual laborers. Politics is dependent on good citizenry, which is achieved by upholding a constitution that the collective has approved. Conversely, Hobbes focuses on the protection of his citizens as a purpose of government. As powerfu l as some men may be, power united is the greatest power according to Hobbes. The belief in unified power is much of the driving force behind Hobbesââ¬â¢ Leviathan and as his purpose for politics. Despite the differences between the two philosophers proposed purpose of politics, both purposes come from the philosophersââ¬â¢ view of the components of society. As the most basic unit of society, human natures drive the purpose of politics in both Hobbesââ¬â¢ and Lockeââ¬â¢s forms of government. In order toShow MoreRelatedCivil Society in South Africa Essay1562 Words à |à 7 PagesThis literature review will focus on civil society and its relation to the state in South Africa. The first section will briefly summarize the emergence of civil society in South Africa. The next section will discuss transformations that occurred in civil society during South Africaââ¬â¢s transitional period from the Apartheid regime toward democracy in 1994. The third section will discuss some of the successes of civil society during and after the transitional period followed by the fourth sectionRead MoreThe Need For More Justice By John Locke1608 Words à |à 7 PagesJohn Lockeââ¬â¢s Second Treatise of Government investigates the structure in which power operates and certain notions that come together to bind individuals and establish the social contract tradition. However, the way in which individuals decide on a form of government and its goals, is heavily reliant on specific conceptions of the human person. Annette Baier, a known ââ¬Å"care ethicsâ⬠political philosopher, fundamentally aligns herself with notions of care ethics and consent in her piece ââ¬Å" The Need forRead MoreClassical Scientific Management Theory And Human Relations Theory1358 Words à |à 6 PagesIntroduction This paper will be expressing a few of the different theoretical perspectives. This paper will be discussing the Scientific Management, Cultural Perspective, Political-Economic Theory, and Human Relations Theory. It will also be discussing each of the key concepts that are associated within each theoretical perspective. I will state some of the strengths and some of the weaknesses of each theory that was mentioned above. Lastly, my opinion for each of these theories would be providedRead MoreThe Counter Terrorism Law1179 Words à |à 5 Pagesto a public or private property for political purposes. According to Maria Keet, (Senior Lecturer with the Department of Computer Science, University of Cape Town) Terrorism is resulted due to plenty of causes that made such a phenomenon be a public concern. Separatism is probably the main reason of arising of terrorism. The conflict between people is due to nationalism and racism issues. This conflict arises with the existence of inequality, ra cism and political opportunities. Other reason of arisingRead MoreInternational Relations ( Ir )983 Words à |à 4 PagesInternational relations (IR) is one of the fascinating fields of political science that different ancient and modern philosophers have written about. When reading for David Hume or Renà © Descartes, I have found many ideas that could be applicable to global politics and the relations between states. Even though these ideas might not be aligned with Hume or Descartesââ¬â¢s individual political philosophies, they are worth applying to the current global political system. The first idea is Descartesââ¬â¢s doubtingRead MoreThe Conflict Between Islam And Secular State And Islam1298 Words à |à 6 PagesFor Kazakhstan where the majority of the population is Muslims, harmonious relations between the secular nature of the state and the religion of Islam are an important precondition for the conservation of the national consent, political and moral integrity and, thus, prevent conflicts in religious basis. Therefore, finding a successful formula for relations between Islam and secular authorities, and after twenty years of independence, has a serious intellectual, theoretical and practical challengeRead MoreThe Five International Relations Theories, Realism, Liberalism, And Feminism1241 Words à |à 5 PagesThree of the five international relations theories, Realism, Liberalism, and Feminism have very interesting and different positions pertaining to global politics and issues. These theories, although quite different, effect the past present and future of global politics. Realists tend to believe the worst in humanity, that they are inherently selfish, and expect the worst. They are always prepared for war, and will go on the offensive if it means gaining more power and respect. Liberals do not thinkRead MoreClassical Scientific Management Theory And Human Relations Theory1356 Words à |à 6 PagesThis paper will be expressing a few of th e different theoretical perspectives. This paper will be discussing the Scientific Management, Cultural Perspective, Political-Economic Theory, and Human Relations Theory. It will also be discussing each of the key concepts that are associated within each theoretical perspective. I will state some of the strengths and some of the weaknesses of each theory that was mentioned above. Lastly, my opinion for each of these theories would be provided to give youRead MoreStrengths and Weaknesses of Neorealism, Neoliberalism and Constructivism1390 Words à |à 6 Pagesbeen a ââ¬Ëhotbedââ¬â¢ of activity. Activity in the sense, we humans have been showing activeness both mentally and physically, which have transformed our globe from an archaic one to an advanced one. That advancement is evident in every sphere of our life, as well as in the ââ¬Ësphereââ¬â¢, we live in. In addition, that advancement or development is seen in one of the important activities of the ââ¬Ësphereâ⬠â¢, the activity of politics. With the advancement, humans spread out to new territories. In course of time thatRead More International Organizations1664 Words à |à 7 Pagesprocess. All of their membersââ¬â¢ resolves, structures, and administrative protocols are clearly outlined in the treaty or charter. An example of an IGO is the North Atlantic Treaty Organization (NATO). First, all IGOs comes from an established government which can be further categorized by rules of membership which qualifies NATO because it is an alliance of about 30 members from North America and Europe. Secondly, IGOs can have limited participation in membership or restricted membership which
Sunday, December 22, 2019
Relationship Portrayal Of Television Displaying...
Relationship Portrayals on Television: Displaying Maintenance Behaviors Love is considered the ultimate achievement and dream of society, in ways that it represents the essence of what makes humanity. Popular culture such as television shows, movies, music, and art cannot express this need in human nature enough. Representations of romantic relationships across mediums such as television is almost inevitable to come across because it is deeply embedded within our humanistic nature to need and want an intimate relationship. According to Hetsroniââ¬â¢s (2012) journal article about televisionââ¬â¢s influence on various love styles, 94% of American teenagers retrieve their information and preconceptions about dating, romance, and love from watching television, while only 17% got advice from their fathers and 33% from their mothers (p. 39). Hetsroni argues that only a few of these studies have attempted to measure the actual effects on viewerââ¬â¢s romantic relationships. One reasons how distorted conceptions of relationships are conceived from tele vision might have something to do with relationship maintenance behaviors, which are crucial in interpersonal relationships, most importantly in romantic ones. Psychological studies have been conducted to prove the influence of televisions as a use of behavioral guides about relationship matters, even producing two possible theories that have relevance to television influence; the cultivation theory (Gerbner, 1966) and social cognitive theoryShow MoreRelatedFace It: the Impact of Gender on Social Media Images9362 Words à |à 38 Pagesmackey-kallis@villanova.edu ISSN 0146-3373 print/1746-4102 online # 2012 Eastern Communication Association DOI: 10.1080/01463373.2012.725005 Communication Quarterly 589 The centrality of gender embodiment has animated recent debates in media studies about the relationship among gender representations in media, gendered bodies in virtual space, and gender as performance. With the emergence of social media websites, such as Twitter, Facebook, and MySpace, users have an online platform that allows them to communicateRead MoreSocial Power of the News Media12127 Words à |à 49 Pagesbroader framework of the social, cultural, political, or economic power structures of society. In order to focus this discussion better, I limit it to the news media, and in particular to the press, thus ignoring the undoubtedly pivotal role of television and other media genres in mass communication.2 10 Political Communication in Action The theoretical framework for this inquiry is articulated within the multidisciplinary field of discourse analysis, a domain of study in the humanities and socialRead MoreMarketing Management 14th Edition Test Bank Kotler Test Bank173911 Words à |à 696 Pagesa marketer uses warehouses, transportation companies, banks, and insurance companies to facilitate transactions with potential buyers, the marketer is using a ________. A) service channel B) distribution channel C) communication channel D) relationship channel E) standardized channel Answer: A Page Ref: 11 Objective: 3 Difficulty: Moderate 35) The ________ is the channel stretching from raw materials to components to final products that are carried to final buyers. A) communicationRead MoreBrand Building Blocks96400 Words à |à 386 Pagesdid not exist. Brand managers now face a very different environment, one in which it is difficult to achieve the consistency that is needed to build and maintain strong brands. The bewildering array of media options today includes interactive television, advertising on the Internet, direct marketing, and event sponsorship, and more are being invented daily. Coordinating messages across these media without weakening the brand is a real challenge, especially when promotional vehicles are includedRead More_x000C_Introduction to Statistics and Data Analysis355457 Words à |à 1422 PagesVideo Games and Pain Management 65 Graphing Calculator Explorations 69 3 Graphical Methods for Describing Data 75 3.1 Displaying Categorical Data: Comparative Bar Charts and Pie Charts 76 3.2 Displaying Numerical Data: Stem-and-Leaf Displays 87 vii viii ââ" Contents 3.3 Displaying Numerical Data: Frequency Distributions and Histograms 97 3.4 Displaying Bivariate Numerical Data 117 3.5 Interpreting and Communicating the Results of Statistical Analyses 127 Activity 3.1 LocatingRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words à |à 656 Pagesbecause people residing there had learned of opportunities overseas from relatives who lived in zones of emigration. This process formed new and seemingly isolated loci of overseas emigration from which the behavior then diffused, thus speeding the geographical diffusion of the behavior. Through this process, ââ¬Å"emigration feverâ⬠spread from northwestern Europe and a few loci in northern Iberia and Italy to the rest of the continent and the Levant in less than half a century.44 In Asia, by contrast
Saturday, December 14, 2019
Statistics in Business Free Essays
Statistics is a way of gathering, analyzing, interpreting and presenting data so that it becomes more meaningful. It helps convert raw data into useful information. Statistics is therefore a collection of information. We will write a custom essay sample on Statistics in Business or any similar topic only for you Order Now Statistics can be presented in graphical form to make it more appealing and easily understandable by the users. Statistics can be descriptive or inferential. Descriptive statistics have to do with methods in a data set that utilizes numerical and graphical to look for patterns to summarize the information revealed in a data set, and to present the information in a convenient form. The four elements of descriptive statistical problems are the population or sample of interest, one or more variables (characteristics of the populations or sample units) that are to be investigated, Tables, graphs, numerical summary tools, and the identification of patterns in the data. Also there are Inferential statistics that utilizes sample data to make estimates, decisions, predictions, or other generalizations about a larger set of data. There are 5 elements of inferential statistical problems: The population of interest, one or more variables (characteristics of the population units) that are to be investigated, the sample of population units, the inference about the population based on information contained in the sample, and a measure of reliability for the inference. When it comes to the role of statistics in business decision making it is applied in many ways in terms of consumer preferences or even financial trends. For example, managers across any type of business unit formulate problems, they decide on a question relating to the problem and then form a statistical formulation of the question is used to determine answers to all of the above. An example of a business question may be how many calls are answered on average in a call center and how can we increase the numbers of calls answered per hour. Another example may be how we can increase the number of accounts. How to cite Statistics in Business, Papers
Friday, December 6, 2019
M-Commerce And Its Applications In Business Successes â⬠Free Samples
Question: Discuss about the M-Commerce And Its Applications In Business Successes. Answer: Introduction and context Currently, the growing application of Mobile commerce (referred to as sales of goods and services through mobile devices) is bringing success in many old as well as startup businesses. In other words, M-commerce Information System is referred to as a combination of E-commerce application and Wireless Web. This technology is both positively and negatively impacting the businesses. The widespread usage of Mobile phones has provided a dramatic transaction to Mobile apps thus this particular topic has been chosen for evaluation. Due to the proliferation of mobile devices usability currently most of the large to medium business activities are focusing on information system management regarding M-commerce application along with the E-commerce. In order to deliver better service to the consumers most of the business organizations are concentrating on developing their mobile app. Usage of M-commerce is beneficial from the business perspectives but at the same time business can also be negatively impacted by M-commerce Information System. This particular essay reflects the issues associated with M-commerce Information System (IS) that interrupts the business success. In the current technology era, this is one of the significant concerns of business. Thus, immediately after the identification of different issues to M-Commerce (IS), proper strategies are needed to be implemented. Information system management issue Security is referred to as an enabling factor in M-commerce. While turning on any handset, GSM gives a comparatively secured connection through the help of Personal Identification Number (PIN). The adoption of the M-commerce application moderates individualism, collectivism regardless of gender of the consumers (Faqih and Jaradat 2015). Not only this but also GSM gives an accurate authentication approach protocol between the network and Mobile device through the SSL encryption of both data and voice. Mobile commerce is referred to as a particular type of daunting task that pays active role in consumers decision making (Nilashi et al. 2015). Different effects may occur during the application of M-commerce Information System in the business organizations. The significant issues that the business organizations widely face after adopting M-commerce Information System in their businesses are as follows: Security issues of Mobile Commerce Issues in location management Ethics and privacy issues Wireless infrastructure and usability issues Regulatory challenges and legal issues Consumer trust level issues Problems with interoperability and compatibility However, among all these above mentioned issues the most highlighted issue is a security threat with the M-commerce IS application in business. It has been found that wireless communication is referred to as a much vulnerable. In case of personal innovativeness adequate amount of attention is required to be paid by the M- Commerce service providers (Lu 2014). It helps to improve business environment because the security has become one of the foremost concerns with high end mobile devices within the business environment. The trust of the consumers transforms through a set of dynamic process (Lin et al. 2014). During the usage of Mobile commerce Information System in the business environment, many issues are found to exist with this application while conducting the different transaction such as: Data can be lost from the server and mobile terminal Data can be misplaced or theft due to the limitation in size and stored content Lack of proper data authentication technique, data can be hijacked y the unauthorized users Different aspects are there to be considered for the Information System Security including physical security, risk assessment, secured access, malware attack and secured wireless data transmission. However, there is certain build in security approaches exist such as keypad locking, password etc., that are used by the majority of the wireless IS users. The value of M-commerce or mobile business considers the impact on sales and marketing, organizational internal operation and other measureable procurements (Picoto, Blanger and Palma-dos-Reis 2014). On the other hand, information transformation over the wireless medium is much vulnerable to making attacks. An information system can be identified as intercepted and if it is not accurately encrypted with the flawed protocol then; all confidential data will be exploited as a known data rater then confidential. However, in order to convince user, this security approach does not stand as enough. In order to gain access to a particular security system, application of smart card is found to be as the most preferred one. The usability of social media marketing and its adoption like an advanced communication tool in increasing globally and also eventually offering valuable opportunities to the business organizations. The way of interaction and work is changing accordingly with the help of Mobile Business or M-commerce (Gurtner, Reinhardt and Soyez 2014). In order to ensure the confidentiality of M-commerce Information system, an accurate encryption approach should be used with the proper secret private key. The encryption key helps to scramble the confidential information during its transmission over a channel from the sender to the recipient. However, the individual key must keep secret to keep the confidentiality and security of the system (Lu et al. 2015). In addition to this, the secret code must not be shared with the outsiders over the sender and the recipient parties. If the secret code is divided among the third parties, then the data will be easily accessed by the external attackers. The rese arch of Information System will help to keep the researchers updated on the IS management issues and challenges that most of the IT industries and management are widely facing (Kavanagh, and Johnson 2017). From the full range of M-commerce IS application it has been found that security is the most significant threat that most of IS using business organizations are widely facing. Over the radio frequency platform which is prone to different passive attacks such as snooping, spoofing etc. This is quite difficult to estimate the extent of M-commerce IS usage and its utility during the usage of the internet over the mobile devices. Thus, it can be said that compromised security function can affect not only the network but also can lead an entire business towards major commercial loss. Discussion and arguments There are many online shopping centers such as Flipkart, Amazon, Myntra, Jabong etc. which use an M-Commerce app for selling their products. It also gives online payment opportunity to the buyers from anywhere and anytime. Though due to lack of security and management the buyers of Flipkart (on the Big Billion day, 2016) faced severe problems. The event Big Billion Day was promoted by Flipkart in 2016 that has an exclusive deal with all their products offering many discounts on home appliances, electronic goods and fashion accessories also. The consumers highlighted substantial operational and technical errors in the pricing scams to lack of product variety. Once the site was also crashed, and due to glitches, the order placements were affected. In addition to this, for some of the products, the review and rating options were also missed those days. This real-life case implies that dealing with huge consumers and products through E-commerce and M-commerce is not beneficial every time. There are significant differences between the handheld device and desktops considering several ways. Due to smaller screen size and minimum amount of input capabilities users face problems during its application in the business environment (Shaukat et al. 2016). For different wireless applications, due to lack of security systems in the implementation of wireless protocols, security is not at all measured as adequate. Handheld devices have another issue associated with it such as it shows a few text lines and does not have any traditional board. At the expense of battery life more substantial screen and also the color can be identifiably enhanced. The recent design efforts are also thus driving positively with the help of the classic trade-off. The vendors are trying to bring measurable changes in the field of both features, and design outlines of the M-Commerce IS application (Ferreira 2014). Another issue that is going to be faced by the users is the increasing demand for bandwidth for application of both the new as well as existing networks. Interference may be occurring because different standards like Bluetooth, IEEE802.11 are also willing to use the similar range of frequency for their application. Mobile Commerce provides extended business opportunities to the consumers (Shah, Ahmed and Soomro 2016). Laudon and Laudon (2016) stated that security is the most highlighted issues that, most of the information system users are currently facing in their business application. In case of M-commerce application, the users are allowed to book for their desired services and products from the Mobile apps. The process of payment gateway also differs in this case. If proper security assumptions are not undertaken then, a company may face serious security issues. With lack of security approaches, unauthenticated users can also access the business servers without taking permission even from the owners. In order to encrypt the confidential information, two different meth ods such as asymmetric and symmetric are widely used by the Information system business owners. Not only during the application of M-commerce Information system but also while adopting the Information System the companies may face significant issues as well that interrupts the business success instead put the negative impact on the business. Conclusion From the overall discussion, it can be concluded that most of the large business organizations are currently investing a lot of resources to build information system regarding an E-commerce mobile based application. However, some businesses are also there identified, who have terminated their operation in websites and are running their businesses only through the mobile apps Information system. Based on the type and background of business including their operational features an organization should adopt the necessary information system that has to be applied to it. The essence of the essay is wholly focused on the issues associated with the Information system (M-commerce) and its negative impact on the business organization. From the wide area technology-based survey it has been found that approximately 52% of total consumers are recently using the M-commerce Information system application in their business for commercial success. However, the consumers are simultaneously facing both safeties as well as security issues with the application of Information system (M-commerce and E-commerce) in their business. It can be said that not only after use but also during the adoption of the IS also companies are facing major barriers. In order to gain competitive advantages and measurable success from the business after identifying the IS issues proper mitigation approaches are also required to be highlighted. Critical reflection Different approaches such as near field communication, direct communication or E-commerce governance and Printed display barcode based symbols are there, available in the field of Information System (in term of M-commerce) application in the business organization. I have learned that based on the background of the business the most appropriate approach should be adopted by the project team members or business owners. Firstly, in order to obtain competitive advantages from the market, most of the large businesses are developing E-commerce based websites. However, to make it more efficient, E-commerce websites are improving by promoting it in M-commerce based Mobile app. It helps to govern the E-commerce based businesses. I have learned, M-commerce allows the consumers to access the desired portal from anywhere and anytime. Therefore, users are not required to wait in any queue for product and service booking. The second approach implies that M-commerce gives displayed bar code symbols to the consumers that can encode the emblem which directs the users to the websites. At the sites, the users are headed towards where the information is displayed. In some cases, resolution of the display may interrupt the users, but this approach can be eventually termed as a helpful one. On the other hand, it can be said that contemporary approaches are the most valuable approaches those are necessary to be adopted by the business organizations to avoid commercial, operational and business functional challenges. After studying multiple perspectives on the information system, I have found that for Information system it shows that Information System is a multidisciplinary field. I think that no single theory can dominate others. The major disciplinarians of contemporary approaches for the study of an Information system are technical approach and behavioral approach. I have learned that the major discipline of these approaches consists of the following attributes such as contributed problems, issues and its respective solution as well. The entire operation which is known as managing information system has six different domains such as computer science, sociology, operation research, economics, management science, and psychology. The information system is a socio-technic al system, which is composed of mechanics, devices and also hard physical technologies. It requires substantial social, organizational, intellectual investments to ensure all the activities work appropriately. I think in order to study the details of the Information system management, its application abilities and issues of IS that are continuously interrupting the commercial success of any business proper contemporary approach is needed to be adapted accordingly. I think that both of these approaches are helpful, but at the same time, technical approach is somewhere a little beneficial to gain measurable business success. In order to study the application and operational activities of an information system, the professional approach provides mathematics based modules. Besides M-commerce and E-commerce application there are some additional technologies such as project management approaches, outsourcing, ICT governance, ERP, Business Intelligence (BI), Knowledge Management (KM) etc. are available the project managers for commercial success can apply those. I think M-commerce app should be integrated with these approaches to take effective organizational decisions. I have also learned that the discipline which contributes to the technical approaches include computer science, management science and operation management. I have realized that computer science is much concern about the computability and computation methods and data storage and access abilities whereas; the management science is focused on decision making models and other best management practices during the implementation and management if Information system in the business organizations. I think that the business owners who are using M-commerce application in their business should adopt the most suitable approach to gain competitive advantages and commercial success as well. Bibliography Chen, Y.F. and Lan, Y.C., 2014. An empirical study of the factors affecting mobile shopping in Taiwan.International Journal of Technology and Human Interaction (IJTHI),10(1), pp.19-30 Cui, M. and Pan, S.L., 2015. Developing focal capabilities for e-commerce adoption: A resource orchestration perspective.Information Management,52(2), pp.200-209. Dahnil, M.I., Marzuki, K.M., Langgat, J. and Fabeil, N.F., 2014. Factors influencing SMEs adoption of social media marketing.Procedia-social and behavioral sciences,148, pp.119-126. Faqih, K.M. and Jaradat, M.I.R.M., 2015. Assessing the moderating effect of gender differences and individualism-collectivism at individual-level on the adoption of mobile commerce technology: TAM3 perspective.Journal of Retailing and Consumer Services,22, pp.37-52. Ferreira, S.C., 2014. The M-Commerce In The Retail Industry: Exploring consumers and retailers perspectives of features in a mobile app for supermarkets. Gurtner, S., Reinhardt, R. and Soyez, K., 2014. Designing mobile business applications for different age groups.Technological Forecasting and Social Change,88, pp.177-188. Kavanagh, M.J. and Johnson, R.D. eds., 2017.Human resource information systems: Basics, applications, and future directions. Sage Publications. Laudon, K.C. and Laudon, J.P., 2016.Management information system. Pearson Education India. Lin, J., Wang, B., Wang, N. and Lu, Y., 2014. Understanding the evolution of consumer trust in mobile commerce: a longitudinal study.Information Technology and Management,15(1), pp.37-49. Lu, J., 2014. Are personal innovativeness and social influence critical to continue with mobile commerce?.Internet Research,24(2), pp.134-159. Nilashi, M., Ibrahim, O., Mirabi, V.R., Ebrahimi, L. and Zare, M., 2015. The role of Security, Design and Content factors on customer trust in mobile commerce.Journal of Retailing and Consumer Services,26, pp.57-69. Palacios-Marqus, D., Soto-Acosta, P. and Merig, J.M., 2015. Analyzing the effects of technological, organizational and competition factors on Web knowledge exchange in SMEs.Telematics and Informatics,32(1), pp.23-32. Picoto, W.N., Blanger, F. and Palma-dos-Reis, A., 2014. An organizational perspective on m-business: usage factors and value determination.European Journal of Information Systems,23(5), pp.571-592. Shah, M.H., Ahmed, J. and Soomro, Z.A., 2016. Investigating the Identity Theft Prevention Strategies in M-Commerce.International Association for Development of the Information Society. Shaukat, U., Ahmed, E., Anwar, Z. and Xia, F., 2016. Cloudlet deployment in local wireless networks: Motivation, architectures, applications, and open challenges.Journal of Network and Computer Applications,62, pp.18-40. Turban, E., Outland, J., King, D., Lee, J.K., Liang, T.P. and Turban, D.C., 2017.Electronic Commerce 2018: A Managerial and Social Networks Perspective. Springer.
Subscribe to:
Posts (Atom)