Thursday, October 31, 2019

EXECUTIVE SUMMARY TEMPLATE Article Example | Topics and Well Written Essays - 500 words

EXECUTIVE SUMMARY TEMPLATE - Article Example The results of the research identified that combined sentimental dedication autonomously arbitrates the negative associations between empowerment-promoting and inspiration practices and the overall intentional return. In addition, this article determines the different philosophy of four rivulets of study concerning collective commitment, HR activities and performances and the overall yield. According to the results of the study, it is evident that human resource practices that promote employees’ skills, knowledge and aptitude are positively related to voluntary yield but are not interceded by joint sentimental dedication. Needless to say, this paper offers insights to principals and managers whose objective is to manage overall employee yield. It also offers principals and mangers the confrontations of structuring a group of endowed workers through the employment of creative employment and cultivating of workers’ readiness and aptitude to move across organizational limits. This research offers support for the notion that investments in talents are portable. Considerably, the findings of the research offer a template for decreasing the heightened yield related to enhanced hiring and training ventures. Debatably, techniques that heighten the sentimental dedication of the crucial personnel may counteract the increased turnover from the employment of skill-promoting practices. In organizations, the principals and managers should supplement the skill-promoting activities with motivation-promoting activities to diminish turnover and confine the performance advantages of a better labor force. This article examines the responsibility of principals and managers in implementing a strategic role and decentralization of human resources tasks to the line among the workforce in organizations. This study involves 46 line managers drawn from three organizations in United Kingdom within a period of 2 years. In reference to the results

Tuesday, October 29, 2019

Practicum Report Essay Example for Free

Practicum Report Essay A. Introduction I. Introduction of University of Technical education Ho Chi Minn City 1. Brief History The University of Technical Education Ho Chi Minn City (UTE) evolved from the Board of Technical Education, first founded on 5 October 1962, renamed Nguyen Truong To Center for Technical Education in Thu Duc on 21 September 1972, and upgraded to Thu Duc College of Education in 1974. On 27 October 1976, the SRV Prime Minister issued a decision to establish Thu Duc University of Technical Education on the basis of Thu Duc College of Education. This was amalgamated with Thu Duc Industrial School in 1984 and further merged with Technical Teacher Training School No 5 in 1991 to become the present University of Technical Education Ho Chi Minh City. At 1 Vo Van Ngan Street, Thu Duc District, only 10 km north-east of the center of Ho Chi Minh City, UTE enjoys the combined advantages of a spacious, comfortable, and peaceful suburban study environment and excellent bus service, with easy access to the city center, the airport, and the surrounding areas. 2. Duties. Responsibilities. The University of Technical Education Ho Chi Minn City assumes the following functions: To train and upgrade technical teachers for technical universities and colleges, professional and vocational schools, and comprehensive middle schools To train technological engineers and technical manpower adaptable to the labor market To promote scientific research and production development in the field of professional education and technological science To expand cooperation relationships with international scientific organizations and technical teacher training institutions. 3. Missions Specialized in training technical teachers at university and post-university levels for the whole country, UTE ought to provide competent trainers directly responsible for training and upgrading qualified manpower for the process of modernization and industrialization of the country and building up a knowledge-based economy. Being the leading technical education training institution in the whole country and having access to new methodologies and innovative teaching aids, UTE ought to train and upgrade technical teachers, sound in theory, skilled in practice, and competent in pedagogy, and to provide skilled manpower, adaptable to production realities and able to meet the ever-increasing needs of society. As a center for research and experimentation in vocational education, UTE ought to be a reliable counseling agency for the government in planning relevant policies and to dependably support other training institutions in improving their teaching methods and equipment. 4. Quality Policy Constantly improve the quality of teaching and learning to offer students the best conditions to develop their creative potentials, broaden their knowledge, and perfect their skills to meet the needs of society. Quality Policy (based on the ISO 9001:2000 standards) 5. Training Programs. An experienced and dynamic state-run university, UTE offers quality technology-oriented training programs in a supportive and student-caring environment UTE, with its 13 Faculties, offers students a large choice of programs and specialties delivered at various levels of training and in different modes of study. The current enrollment amounts to over 25,000 students at 5 different levels Masters degree, Bachelors degree, Associate degree, Technician diploma, and Technical worker certificate -, studying in 2 different training systems Regular and In-service. With the approval of the MoET, UTE has been offering Masters programs since 1592. Based on its traditional fortes in science, engineering and technology, UTE is now offering 7 Masters programs: 1. Machine building technology 2. Mechanics of machinery 3. Operation and maintenance of automobiles and tractors 4. Electrical equipment, network and power stations 5. Technical education science 6. Electronic engineering 7 International vocational education. (In association with Otto von Guericke University Magdeburg, FRG) Together with the development of the countrys economy on the way of industrialization and modernization, UTE has expanded its scope of training Together with the development of the countrys economy on the way of industrialization and modernization, UTE has expanded its scope of training to meet the demands of the new socio-economic reality and is now offering 34 Bachelors programs: 1. Electrical and electronic engineering 2. Electronic technology Telecommunications. 3. Computer technology 4. Industrial electricity 5. Electrical automation 6. Mechanical engineering 7. Industrial technology 8. Mechatronics 9. Automation technology 10. Automotive engineering 11. Thermotechnics Refriferation 12. Info mechanics 13. Machine design 14. Home and Industrial civil engineering 15. Home economics 16. Garment technology 17. Food technology 18. Fashion design 19. Printing technology 20. Information technology 22. Accounting 23. Industrial management 24. English for engineering 25. Technical education in Electrical and electronic engineering 26. Technical education in Industrial electricity 27. Technical education in Mechanical engineering 28. Technical education in Industrial technology 29. Technical education in Mechatronics 30. Technical education In Automotive engineering 31. Technical education in Thermotechnics Refrigeration 32. Technical education In Computer technology 33. Technical education in Home and industrial civil engineering 34. Technical education In Electronic technology Telecommunications Associate. programs: 1. Electrical and electronic engineering 2 Industrial electricity 3. Mechanical engineering 4. Automotive engineering 5. Garment technology For the dual purpose of developing human resources for the society and providing a teaching practice environment for our graduates, we arc also actively involved in delivering Technician diploma and Technical worker certificate programs. Technician diploma programs are offered in: 1. Industrial and household electricity 2 Electronic technology 3. Thermotechnics-Refrigeration 4. Garment technology 5. Automotive engineering 6. Operation and maintenance of mechanical equipment 7. Accounting Informatics Technical worker certificate programs are offered in: 1. Industrial and household electricity 2. Electronics 3. Metalworking (Turning, Milling Planning) 4. Automotive repair 5. Refrigeration 6. Industrial Mewing This multi-level, multi-mode and multi-disciplinary training structure allows us to take the initiative in all work from research to applications. It also facilitates the organization of transfer programs, helping students fulfill their lifelong learning dreams in the most economical and effective way. Students can choose either to study on the main campus or in the provinces to suit their conditions. Constantly improve the quality of teaching and learning with this guiding training principle, over the past half century of development, UTE has been training qualified manpower, sound in theory, skilled in practice, and  equipped with a good sense of morality, able to stand on various fronts in lecture halls, on construction sites, in factories, etc to serve the process of industrialization and modernization of the country. Many of our graduates over 400 Master degrees holders, 30,000 engineers, and 2,000 technicians and high-qualified workers -, brought up and trained at UTE, are now holding key positions in various training institutions, business and industry. 6. Facilities In addition to our main 17-ha campus at 1 Vo Van Ngan Street, Thu Duc District, we have another 4. 5-ha campus at 484 Le Van Viet Street, District 9, HCMC. We are planning to establish a new 80-ha campus in Dalat, LamDong Province. UTE provides students with adequate facilities in a creativeness-inducing learning environment, giving each and every individual the opportunities for study and practice. The University library has spacious reading rooms with sufficient publications and periodicals for study and research needs 26,092 titles of books with 299,247 copies, 253 titles of newspapers and magazines, averaging 115 titles of books per one program of study. Library management and services have been computerized and modernized to meet the ever-increasing needs of the readers. Recently, the University has heavily invested in modern practice and experiment equipment. We now have 72 practice workshops (12,708m2) and 20 laboratories (lr908m2), enough for our present training needs. We have installed 1,363 computers; 944 of these are for teaching, learning and research; the remaining 419 ore for management and administration. Our computer systems are regularly upgraded. Our local network operates reliably at 512 Kbps; the ADSL lines enable high-speed networking and Internet access. We have 150 claasrooms with a total area of 9,698m2, each varying in size from 64m2 to 175m2 to suit specific training needs (averaging 6,66m2 per student). New buildings to be constructed include a Central Building with 30,000m2 of floor area, a High Technology Center with over 5,000m2 of floor area, and a Multi-purpose Classroom Building with over 4,000m2 of floor area. For 7 consecutive years 2002 2009, UTEs dormitory has been granted  the title City-level Cultural Unit. For sporting activities, we have a football field (12,600m2), 7 volleyball courts (756m2); a tennis court (240m2); and a sporting event hall (720m2). Staff UTFs faculty and staff currently total 698. Nearly 60% percent of the more than 538 faculty members have postgraduate qualifications. Over 100 lecturers are working towards a Ph. D. or a Masters in the country or abroad. Faculty members actively take part in scientific research and strive to apply innovative teaching methods to activate students. In addition to creating favorable conditions for individual self-improvement, UTE regularly organizes upgrading courses in foreign languages, computing and professional skills for all staff (averaging more than 10 courses per year). 7. Cooperation UTE maintains effective multiform cooperation relationships with domestic as well as international organizations. We have provided on-campus training to thousands of core technical teachers for technical and vocational schools in the provinces across the country. In addition to local training institutions, business and industry, we have also established bilateral ties with various international organizations, the governments of many countries, NGOs and international universities and colleges. Some of our cooperation projects have been highly appreciated-the Viettnam-Germany Center for training vocational teachers and qualified workers funded by the State of Baden- Warttemberg (FRO), the Masters Program delivered in association with Otto von Guericke University Magdeburg and supported by InWent (PRO), the Bachelors Program in Clothing Design Manufacture delivered in association with Heriot-Watt. University (UK), the Bachelors Program in Electrical and Electronic Engineering delivered in association with Sunderland University (UK), the joint-training programs with Siemens, MTZ (FRG), Omron (Japan), Rockwell Automation, Foxconn, General Electric (US), and others. Among our other partners are about 20 other foreign universities, institutes, and international organizations in many countries around the world, including Dresden University (FRG), Trier University (FRG), LENSET de Cachan  (France), Universite de Metz (France). Guangxi Normal University (China), Tianjin University of Technology and Education (China), Sydney University of Technology (Australia), Universite de Liege (Belgium), Universite de Sherbrooke (Canada), DSE DAAD GTZ (FRG), Yeungnam University (South Korea), Chungwoon University (South Korea), Sejong University (South Korea), Hanbat National University (South Korea), Quilin University (China), Kunming University (China), Yuan Ze University (Taiwan), Southern Taiwan University of Technology, National Taiwan Normal University, and others. II. Introduction of faculty of foreign languages The Faculty of Foreign Languages (FFL) is in charge of delivering a Bachelors program in Technical English and teaching General English and ESP to students of all the other faculties in the university. Faculty members total 23, including 1 Ph. D. , 1 Ph. D. candidate, 12 Masters, and 6 premaster students. The teaching staff consists partly of highly experienced lecturers with many years of leaching at UTE and other large national universities and partly of young teachers full of enthusiasm, energy and creativity. FFL encourages and creates favorable conditions for all staff members to upgrade their qualifications either in the country or abroad. Within the common trend of regional and internal integration, English has assumed an ever more important role in a multilingual and multicultural working environment. The Technical English program delivered by FFL aims to provide the labor market with white collar workers, knowledgeable about ESP, and able to work in industrial parks, export-processing zones, companies, factories and plants, as well as for foreign offloces, international and non-governmental organizations, where English is required. FFL actively engages in compiling and adapting ESP textbooks to suit the students requirements, as well as the Universitys and employers expectations. FFL has been seeking assistance from domestic counterparts as well as support in information and teaching materials from universities in English-speaking countries, gradually expanding cooperation relationships and railing the teaching and learning quality, FFL is getting ready to offer new programs in Japanese, Korean and Chinese to meet the ever-Increasing needs in these languages. III. The aim, the learning outcomes and the pro-requisites of TEFL teaching practicum course 1. The aim Applying the understanding aspects of foreign language learners, methods, and approaches in language teaching and learning, observation, execution of lesson in a specific context, to classroom management. Special emphasis is given to the planning and execution of technically-related lessons. It also provides students a further opportunity to reflect upon their work as professionals. 2. The learning outcomes. Upon successful completion of teaching practlcum, students should be able to: Gain insight into EFL students motlvatlon, frustration, and strategles in learning English as a foreign language. Recognize how theories of language learning and teaching underlie classroom practice, implicitly and explicitly, based on knowledge gained through 8-week observation and leashing practice. Begin to develop a personal view of what constitutes effective EFL teaching. Gain confidence in ability to devise and carry out EFL classroom learning activities by engaging in observation, teaching and tutoring in a diversely educational setting. 3. The pre-requisites Successful completion of Listening, Reading, Speaking and Writing 4, Phonetics and Phonology, Morphology and Syntax, Semantics, British Literature, British Civilization, TEFL Methodology, and Media in ELT. B. Content I. Teaching practicum planning Date (Feb 6th Mar 31st)Content Week 1 (Feb 6th -Feb 11th)1. Confirm the practicing place; receive specific plan, purpose and requirements, rules and regulations of teaching practicum course. 2. Divide teaching practice groups, meet instructors and members in groups, assign tasks for each person. Week 2 (Feb 13 -Feb 18)1. Receive teaching schedule. 2. Make plan for teaching practicum in 7 weeks 3. Get acquainted with students. 4. Observe instructors class on Tuesday, Feb. 14th , 2012 (Period 1-4, Room A2. 202) and Thursday Feb. 16th. 2012 (Period 1- 4, Room E1. 505) 5. Make the first lesson plan (Unit 7) Week 3 (Feb, 20 -Feb. 25)? Feb. 20th. 2012 1. Observe others classes of Thu Hue, Cam Lien, Yen Nhi, Ngoc (February morning 20lh 2012) 2. Observe Mr. Luans class (February afternoon 20th 2012) Period 1-4 ? Feb. 21st. 2012 3. Observe the first teaching of Ha Word Power (Air travel file + Word group) Period 1 Room A2. 202. 4. Observe the first teaching of Tuy? n Focus on Function (Making arrangements) Period 2 – Room A2. 202. 5. Give the first lesson plan for instructor and receive the feedback. 6. Correct the first lesson plan.  ¦ Feb. 23rd, 2012 7. Observe the second teaching of Ha Word Power (Air travel file + Word group) Period 1 Room E1 . 505. 8. Observe the second teaching of Tuyen Focus on Function (Making arrangements) Period 2 – Room E1. 505. 9. Receive the feedback from instructor and correct the first lesson plan again Week 4 (Feb. 27 -Mar. 03)Feb. 28th. 2012 1. Observe Huongs class, Changing lives on 27th February 2012, Period 1 2. Observe Vys class, Changing lives on 27th February 2012, Period 2 3. Observe Bao class, Changing lives on 27th February, Period 3 4. Observe To Lins class. Changing lives on 27th February 2010, Period 7 5. Observe To Liens class, Changing lives on 27th February 2010, Period 8  ¦ Feb. 28th. 2012 6. Observe the first teaching of Duy- Grammar point -Past and present perfect simple, period 1, Room A2. 202. 7. Observe the first teaching of Tr? ng- Word Power (Trends file + The language of graphs) -Period 2- A2. 202. 8. , Get the feedback from instructor and groups members to correct some mistakes in the second lesson plan for a better teaching period on March 1st, 2012. 9. Give the second lesson plan for instructor and receive the feedback.  ¦ March 1st. 2012 10. Observe the second teaching of Duy- Grammar point Past and present perfect simple, period 1, Room El. 505. 11. Observe the second teaching of Tr? ng Word Power (Trends file + The language of graphs) Period 2 -Room El . 505. 12. Get the feedback from instructor and groups members. 13. Prepare the third lesson plan (Unit 10) Week 5 (Mar. 5 -Mar. 10) ¦ March 5th. 2012 1. Observe Hieus class, unit Crossing cultures. Period 7 2. Observe To Linhs class, unit Crossing cultures, Period 8 3. Observe Cuongs class, unit Crossing cultures, Period 9  ¦ March 6th. 2012 4. Observe the first teaching of Kim Language Focus (Modal Verbs) Period 1 Room A2. 202. 5. Observe my instructors class, period 2-3, Room A2. 202.  ¦ March 8th. 2012 6. Observe the second teaching of Kim – Language Focus (Modal Verbs) Period 1 Room E1. 505. 7. Observe the third leaching of Trong Focus on Function (Invitation)- Period 2 Room E1. 505. 8. Research mora information to make lesson plan for third teaching. Week 6 (Mar. 12-Mar. 17) ¦ March 12th. 2011 1. Observe the third teaching of Duy- Word Power -Business headlines file -f Word family, period 2, Room A4. 103. 2. Observe the third teaching of Tuyen Language Focus, (Present perfect simple and continuous) -Period 1 Room A4. 103. 3. Observe the third teaching practice of Ha Focus on Functions (Offers and requests) Period 3 Room A4 103 4. Give the feedback for groups members to correct some mistakes in the last lesson plan for a better teaching period on March 15th . 2012 5. Give the third lesson plait for instructor and get feedback from her to correct it. ?March 13th 2012 6. Observe the fourth teaching of Duy-Word Power -Business headlines file Word family, period 2, Room A2. 202 7. Observe the fourth teaching practice of Tuyen Language Focus (Present perfect simple and continuous) Period 1- Room A2. 202. 8. Observe the fourth teaching practiceof Ha Focus on functions (Offers and requests) Period 3- Room A2. 202 9. Give the feedback lor groups members. Week 7 (Mar. 19 Mar. 24)? March 9th, 2012 1 Observe the third teaching practice of Kim Language Focus (Prepositions) Period 2 Room A4. 101. 2 Observe the fourth teaching practice of Tr? ng -Focus on Function (Invitation) Period 3 Room A4. 103. 3. Get the feedback from instructor and members in Week 8 (Mar. 26-Mar. 31)group, correct the third lesson plan and prepare for the fourth one.  ¦ March 20th. 2012 4. Observe the fourth teaching practice of Kim -Language Focus (Prepositions) Period 2 Room A2. 202. 5. Create a game and small party to say goodbye to students. II. Teaching schedule NO. DATEPLACECONTENTNOTE. 1Tuesday, February 28th, 2012Room A2. 202Unit 7: Changing Lives Part: Focus on function Opinions and suggestions; agreeing and disagreeingGeneral English 3, 51 students, pre-intermediate level. 2Thursday, February 1st, 2012Room E1 . 505Unit 7: Changing Lives Part: Focus on function Opinions and suggestions; agreeing and disagreeingGeneral English 3, 31 students, pre-intermediate level. 3Monday, March 20th, 2012Room A4. 103Unit 10: Will our planet survive? Part: Language focus Future with will; the first conditional; if and whenGeneral English 3, 51 students, pre-intermediate level. 4Tuesday, March 13th. 2012Room A2. 202Unit 10: Will our planet survive? Part: Language focus Future with will; the first conditional; if and whenGeneral English 3, 45 students, pre-intermediate level. III. Teaching materials 1. Lesson plan 2. Textbook 3. Student teaching evaluation form 4. Student teaching observation form C. Conclusion I. Reflection paper Through 8-week observation and teaching practice, I recognised that the teaching practicum give me useful first-hand experience and practical knowledge of teaching and learning English as a Foreign Language. Actually, this course helped me to apply the theory, methods and approaching, ets in real class. Moreover, it is important to know my own strengths and weaknesses. It also provided me a further opportunity to reflect upon my works as professionals. All these things are valuable experience for me to strive for the career in the future. First of all, I made a clear and specific plan for the course. So, I spent 47 periods in observation. Thanks to this, I had a chance to get familier with my students, such as ability, level, gender, interest, number of students, asmostphere and facilities in class. When I observered I noted down who are active and passive, equipments need to bo used. Then, I considered lesson plans with which activities I could apply in the class, which methods are suitable, what strategies were used to support my teaching and students learning. Secondly, I apprehened a lot of things from the intructors and other student teachers, I understood that there are three significant things which teachers should focus when teaching: interaction between teacher and student, professional responsibilties and knowledge and time mangement I found that although the knowledge is good, teaching method is not good. Ultimately, the job is not successful. Thirdly, when I observed I learnt a lot of useful things from the failure and success of my friends. The common mistake is the instructions were ineffective, which made students confused. However, I learnt a nice way from my peer to give intructions such as giving short sentences, using familiar words as well as emphasizing the important words. After the teacher gives intructions for an activity, he or she could make sure sudents have been about what to do in the activities by asking them some questions. Until he or she has check students understanding about it or her instructions, starts the activity. Furthermore, many student teachers did not give any samples or examples when they asked students to make conversation about some topics, so it was hard for students to know how they should do. In time management, most of apprentices lacked of it. Specifically, we could not divide reasonable time. Obviously, teacher talked more than students talked. Thus, my instructor suggested, let students practice more. I really appreciated her advice, it helped me improve a lot after that. The worse thing was we often went into overtime. It was the reason made us lose our self-control. Besides, few student teachers were not confident about their own ability and knowledge. I realized that it could have equally disastrous consequences. Hence, I reminded me look for more information or documents relating to the lesson. The speciality is know thoroughly the grammar points which we teach because if we are not clear what we say, how can we make others understand deeply? The benifits of utilizing multimedia in teaching are countless. Student teachers carefully considered to take full advantage of them. And so did I. Yet, we completely seemed to be bad at blackboard presentation. According to a lecturer, she suggested that the blackboard should be divided into two or three parts at the start of the lesson. For example: Additional example or explanationLesson Unit: Title (different color) (page no. ) I. Language focus grammar structure -use/ meaningAdditional example OrOr Students exercise or feed backexplantion This is a layout with 3 parts. If the board is small, we can divide as follow. Lesson Unit: Title (different color) (page no. ) I. Language focus grammar structure -use/meaning -etcAdditional example or explanation. Even something seems trifling like the way erase the board, gesture, manners and behaviour, etc. I was also instructed by my consultant. Thanks to her consideration, I made my own pedagogic style. Consequently, my instructor praise me tor this. Over two months, I look back what I got and what I did not. I evaluated my strength and weakness. My strong point is confidence. Thus, I could manage class well, designed task effective, engage all students in learning. The weak point was my pronunciation. Though I tried to correct it later classes, I still pronounced wrong. So, I made a plan for practice pronounce more to be better. Additionally, I learnt how to solve the problems that can occur in the classes, predict them problems and anticipate the solutions. That was very important for an effective teaching class. In short, base on knowledge gained through 2-month observation and teaching practice, the help of instructors and peers, I gained confidence in ability to devise and cary out EFL classroom learning activities. I applied the theory in school in real environment. In fact, the invaluable lessons and experience underlie for career in the future, I had a straight judge myself.

Sunday, October 27, 2019

Theoretical And Conceptual Framework Of Airlines

Theoretical And Conceptual Framework Of Airlines In the past of few decades ago, airline industry is being control very tightly with lots of regulations. For example, United State (US) air transportation industry is being control tightly by the Civil Aeronautics Board (CAB) on price, route and schedule of flight. After that in 1978, domestic air transportation market of US is having a free competition among airlines which allowed by the Airline Deregulation Acts of 1978. Through this act, every airline is allowed to set their own price, how frequent they are flying and the destination they want to fly to (Thomas, O.G., 2004). After the deregulation of American airline market, European air transport also experienced deregulation in the middle of 1980. The result of regulation is an increase competition of airlines and to open new entry to new airlines. The airline structure has changed due to deregulations. The airline industry becomes more competitive with numbers of competition. Changes of pricing strategy, marketing strategy and airlines networks such as hubs and spokes had made. There are lots of changes from deregulation such as service patterns, pricing, computerized of the management systems and industry structure. Deregulation and air transport liberalization make a turning point of airlines structure and marketing strategies. Travelers are rational and not willing to pay for a level of service which is not necessary (Pourat, H., 1994). Technological development had improved the management system of airline where they are now having seats inventory system and reservation system had been improved. During that time, lots of existing regulated airlines meet failure and left the airline industry. There are numbers of new entry airlines joined the airline industry as well. (Kaplan, D.P., 1995 cited in Thomas, O.G., 2004) report that, 19 jet operator formerly regulated by the Civil Aeronautics Board (CAB), only 7 survived until 1995. The most famous survivor, Southwest Airlines (created in 1971) remains a prosperous carrier today. Deregulation of airline market also brings in another form of new business model which is the low cost business model into the airlines industry as well. This will be further discussing in the next section. 1.2 Problem Statement The new idea of low cost business model was first brought up by Southwest Airlines in the 1970. It took 15 years for the US airline industry and 20 years for the EU airline industry to take up the challenges of the emergence of low cost airline business model. After the deregulation, in 1978, there are huge numbers of new entry of low cost airlines into the airline industry. Initially these new entry airlines was doing quite success but due to by having only low fare would not be able to sustain their business. They are lack of financial support to compete in the competitive airline industry during that time. There are new entries of airlines and airlines which faced failure and left the industry (Natthida Taweelertkunthon, 2006). There is another new generation of low cost business model emerged in the airline industry in 1990. They startup their business with a strong financial support and with a better and younger aircraft used. This new generation of low cost airline has rewritten the business model to compete in the US competitive airline business environment and also with the commercial airlines market. They had also shifted from their business strategy from product differentiation into low cost. They become more cost advantages through efficiency where their operational efficient help to bring down the cost. The emergence of low cost airline manage to steal customer from the commercial airlines especially price sensitive customer and served with wide range of services. Even those high end customers are not longer willing to pay such a high fare on air transport where this bring benefit toward the low cost airlines. Air transport is not a luxurious thing anymore. At this point of time, traditional airlines faced challenges from low cost airlines where they find difficulty on sustaining their business. In Asia, low cost airline business model is still a new idea and just started in year 2000. Nevertheless, this new business model do faced problem of restrictive of two countries involved. Problem had been solved through the agreement among Southeast Asia (SEA) countries. Air Asia the successful pioneer established in the year 2001 and took the sky in November 2002. The success of Air Asia with low cost business model is the reason of the growth of low cost airlines rapidly in Southeast Asia. There are numbers of new entries of low cost airlines such as Tiger Airways, Nok Air and etc. The fact that Southeast Asia has a massive population is crucial, more than 50 million people with a rising middle class and a growing propensity for travel. The geographical location of surrounding islands without viable and competitive alternatives modes of transportation in Southeast Asia will enhances LCCs an enormous competitive advantage over surface and ground modes. (Natthida Taweelertkunthon, 2006) Low cost business model of low cost airlines is different in between of SEA and US and EU. The application of low cost principle is different. For example, in US and EU, they could have a lower fare on landing at secondary airports. But in SEA, they couldnt be able to avoid air traffic congestion at the core airport easily. Therefore, SEA low cost airlines cannot be able to save and lower fare on landing fees and etc. Besides that, the competition faced by SEA low cost airlines is much competitive as compare to US and EU low cost airlines. This is because of there are lots of competitor in SEA country with low cost airlines. Therefore, the marketing strategy that being implement by the low cost airlines to stay and being competitive is important. This research proposal is focusing on the marketing strategy that implement by low cost airlines to gain competitive advantages in the competitive environment. 1.3 Research Question From the problem statement above, it brings to several research questions where the researcher need to collect information for the purpose of this proposal. What are the marketing strategies implementing by Air Asia? How does marketing strategies influence the sales of Air Asia? What are the objectives, benefits and cost of the marketing strategies implementing? Are there any differences in between of traditional and low cost airlines marketing strategies? How Air Asias marketing strategies make Air Asia to be competitive among other low cost airlines? 1.4 Research Objective Research objectives have been listed down at below to guide the researcher in getting and answering the research questions which had stated above. Identify the marketing strategies that being use by Air Asia. Analyze on the marketing strategies that had being used. Analyze the sales trend of Air Asia. Compare the sales trend and marketing strategies that had implemented. Evaluate the objectives, benefits and cost of the marketing strategies implemented. Compare the marketing strategies of traditional and low cost airline. Evaluate the competitive advantages of Air Asia. 1.5 Theoretical and Conceptual Framework 1.5.1 Conceptual Framework 1.5.2 Theoretical Framework The process of this research proposal is shown in the diagram above. First of all, the problem statement would be discussing that the emergence of low cost airlines in the airline industry. 1.6 Scope and Limitation 1.6.1 Scope In the business world, there are plenty of strategies that are implementing by different company to stay competitive in the business environment. The strategies implemented by company are such as marketing strategy, financial strategy, research and development (RD), management information system (MIS) and etc. in this research proposal, the strategy that is being focus on is marketing strategy of an airline. It is to research on the ways of an airline manage their marketing strategy well to gain competitive advantage. Airlines industry is a huge industry which consist of full service airlines and no frills airlines. This research proposal has limited the research topic into a small scope which is focusing on analyzing the marketing strategy of no frills airlines. Besides that, there are numbers of no frills airlines in the world as well. Therefore, the researcher has further scope the topic down to low cost no frills airline of Malaysia which is Air Asia. 1.6.2 Limitation In every research proposal, there would have some limitations which limit the researcher to collect better information or result for the presentation of proposal. There is limitation which face by the researcher when doing research for this research proposal. AirAsia.com (2010), Air Asia is the only low cost airline available based in Malaysia (which not consist of low cost airline (FireFly) with subsidiaries of Malaysia Airline System Berhad). There do not have choice to researcher where Air Asia is the only available choice to be included as the scope of the topic. Besides that, there are limited journals available about the marketing strategy of a low cost airline. Therefore, it is a limitation for the researcher to collect journals for review the literature. In addition, the marketing strategy of low cost airlines differs from airline to airline. It is difficult to finalize the main marketing strategy that is implementing by low cost airlines. 1.7 Significance of the Study This research proposal is important to YBhg. Dato Tony Fernandes, the CEO of Air Asia and the marketing manager of Air Asia. This is because the research proposal has a summary of the effectiveness of the marketing strategies that being implementing by Air Asia where it makes them to be competitive advantage and a head above other low cost airlines. They would have the opportunity to have an outlook on a different angel of view in order to further improve on their current marketing strategy by advancing the current strategic planning model. Besides that, another targeted reader of this research proposal is the marketing managers of other airlines (such as low cost or full service airlines). This is because they could have the idea of how Air Asia is having such an excellent marketing strategy which brings it to where it is right now as the Worlds Best Low Cost Airline. They could use the strategic that Air Asia is implementing as the role model to market their airlines to be more competitive as well. In addition, this research proposal is useful to students who are majoring in marketing strategic management. This is because it would be a good and appropriate case study to read and learn from on the ways of a company could be able to manage their strategic planning model so well and gain competitive advantages over other competitors. Student would have the opportunity to have an in-depth understanding on the ways of a low cost airline planning the marketing strategy model to suit the business model which to keep cost low and being successful. 1.8 Definition of Term ASK = Available seat kilometer ASK is to measure the carrying capacity of airlines passenger. The formula is seat available x distance flown = carrying capacity per plane Chapter 2: Literature Review According to Natthida Taweelertkunthon (2006), there are two types of low cost carrier which are low cost no frills carrier and low cost low frills carrier. Low cost no frills carrier is those low cost airlines which do not provide any other extra services like on board meals. Tiger Airways and Air Asia are the example of low cost no frills carrier. On another hand, low cost low frills carrier refers to low cost airline which provide some extra service like on-board drinks or snacks. The fare of air ticket is slightly higher than low cost no frills carrier. The example of low cost low frills carrier are Nok Air, One-Two-Go and Jetstar Asia. 2.1 Key Features of Low Cost Airline Business Model Figure 2.1: LCCs Business Model Source: (Jiang, H., 2007) The figure above shows the low cost airline business model which is build up three main key features which are simple product, low operating cost and positioning. 2.1.1 Simple Product / No Frills A low cost airline would keep service and product simple to maintain cost advantages to offer product which is value for money to the customers. A simple product which also means no frills or no extra service such as meals on board provided on board to cut down cost. Besides that, meal on board could also be provided with a mean of good quality with extra charges. The seats are narrow to have a large capacity on plane and maximize seat density. This is to have a large volume of sales to cover the cost on the single journey to the destination. There is an only one class seat on aboard available with no seats arrangement allows (Jiang, H., 2007). 2.1.2 Low Operating Cost In addition, a low operating cost is one of the low cost airlines features. Low cost airlines will only land on secondary airports where the landing fee is much lower as compare to core airports. Secondary airports also have the advantage of less traffic congestion where the flight and stop by and take off again in a shorter time. They would have a shorter turnaround time to avoid paying higher tax charges on parking. Besides that, low cost airline practice direct sales of air ticket or through online reservation and buying. A cost cutting strategy would be implementing by low cost airlines to keep their cost low and to have cost advantages (Dietlin, P., 2004). 2.1.3 Positioning Lastly, low cost airline will market themselves mainly to non-business passengers. For examples, leisure passengers and price sensitive passengers are non-business passengers. In recent years, low cost airline starts to target business travelers as well. This is to grow their market to a more large perspective. A good and effective marketing strategy of low cost airline plays an important role to position their product to the public and to gain competitive advantage as well. Low cost airline will have a short haul which fly from point to point with high frequency. Moreover, low cost airline would likely to become the number one or two on most routes operated (Jiang, H., 2007). 2.2 Challenges of Low Cost Airlines In the competitive environment of airline industry, there are several challenges which will be faced by low cost airlines. Explanations on the challengers that face by low cost airlines are explained as below. 2.2.1 Overcapacity First of all, the airline industry of low cost airline is growing rapidly where there is more new entry of low cost airlines. According to Jiang, H. (2007), the author said that there are over thirty low cost airlines launched in the year of 2002. A sudden increase of a large amount of new entry brings threat to the existing low cost airline. The market is overcrowded and overcapacity where all of the low cost airlines need to compete among airlines to generate revenue for their own. 2.2.2 Pressure on Yield or Average Fares With a large amount of new entry it creates a competitive competition environment among airlines. According to Dietlin, P. (2004), worldwide airline yield will decrease by 1.1% per year until 2010 and intra-Asia yield will decrease much faster than that. New pricing strategy had been introduced by traditional airline to compete with low cost airline. For example, for some routes, traditional airline introduce a low aggressive fare especially those routes that being fly by low cost airlines. Besides that, there is a price competition among airlines. The new entry airlines are having lower fares to compete with existing low cost airlines. This pulls down the average fares per customer where it does not benefit any side on a long run. 2.2.3 Difficulty on Keeping Cost Advantages According to Dietlin, P. (2004), Asian airlines are having a significant lower input costs as compare to American airlines and European airlines. This problem of lower input cost is mainly due to labor cost. Dietlin, P. (unpublished, 2004) stated that Airlines in Singapore unit labor costs are USD 0.77 per ASK and airlines in American is having US 2.92 per ASK which is 279% more. Asian airlines are trying to solve the problem by hiring labor from low-income countries where they could have low wages for their labor to increase unit costs. 2.2.4 Product Differentiation With numbers of low cost airlines in the market push every single low cost airline to differentiate their product to gain as much market share as possible. This simple mean more cost will incur. Airlines are coming up with more aggressive and low fares which it would pull down the average revenue of airlines. Low fare of air ticket is no longer enough to be differentiating from other competitor. They are trying to brand themselves to differentiate from others to gain competitive advantages. 2.3 Marketing Strategy that Implemented by Low Cost Airlines There are several marketing strategies that being implement by low cost airlines to market or position their product to their customer. There are some marketing strategies that being practicing by low cost airline are stated as below. 2.3.1 Frequent Flyer Program Frequent flyer program is one of the marketing strategies of Southwest Airline but it is not adopting by most of the low cost airlines. This program gives out frequent flyer point when customers purchase air ticket each time. By using the accumulate points, it could be redeem for free ticket or upgrade class seat which depend on the company policy (Lederman, M., 2003). As a marketing tool FFPs have proved highly successful (Bennett, M.M., 1996). 2.3.2 Point-to-Point Gutstafsson, L. (2005) says that point-to-point could be included as a cost leadership strategy as well as a marketing strategy as well. Point-to-point refers to the air traffic movement system where the flights fly directly to the final destination without going through the hub. This would be able to help airline to save up cost. At the same time, it could be able to attract customer where they do not need to waste time on transiting at the hub. Customer could be able to have a flight directly to the final destination that they wish to be just with a low fare air ticket. 2.3.3 Branding / Image It is difficult for airlines to differentiate their product from other competitor as the basic product of airlines are the same. Therefore, branding and build up good image or reputation is another option to market their product to the public. Branding is do marketing on a product externally to the public. There is another way round of branding being practicing. As an example, Air Asia do brand their product internally to their staff first before to brand it externally to the public (Marketing-interactive.com, 2008). This is to let the staff of Air Asia knows well on the function and attractive of the product where they could sell it more better externally to the public. 2.3.4 Pricing (Low Fares) Low cost airlines are marketing their products with low fare to compete with traditional full service airlines. Low fare is the main attractiveness of low cost airline as compare to full service airline. Low cost airlines keep on introduce low fare ticket to customer and having promotion sales on air ticket. Fare of air ticket is getting cheap as time goes. Fare of air ticket is the main strategy that plays around by low cost airlines. Chapter 3: Research Design and Methodology 3.1 General Nature of Research The general nature of the research proposal is qualitative methodology. Saunders, M. et. al (1998) defines qualitative research as an array of interpretive techniques which seek to describe, decode, translate and otherwise come to terms with the meaning, not the frequency of certain more or less naturally occurring phenomena in the social world. A deeper insight of the ways of Air Asia managing their marketing strategy would be able to gain from doing qualitative research. A research which is base on the meaning which express through words is qualitative research (Saunders, M. et. al, 1998). 3.2 Research Philosophy Interpretive or phenomenology is the research philosophy that selected by researcher on this research proposal. This philosophy is suitable for research which is on qualitative methodology. Interpretive would help to gain new insight about the reality and deeper understanding on the question of how and why. Researcher is more flexible to adapt with changes during the research process. It is more appropriate to study on a small sample for interpretive philosophy. There are threats by using this philosophy. First of all, it will be time consuming when collecting qualitative data. In addition, analyzing of qualitative data would be difficult especially for inexperience researcher to analyze and generate new theory. 3.2 Research Method and Research Design 3.2.1 Research Method The research method that is being use by the researcher in this research proposal is interview research method. According to Saunders, M. et. al (1998), there are several types of interview such as structured interview, semi-structured interview and unstructured interview. The choice of interview selected is semi-structured interview which would have a list of topics to be cover during the section of interview. Semi-structured interview would be able to cover in depth and exploratory study. It would benefit to gain new insight on the particular topic as well (Saunders, M. et. al, 1998). 3.2.2 Research Design 3.2.2.1 General Research Design General research design is known as research strategy. The three main research strategies are experiment, case study and survey. The research strategy that would be use in the research proposal is case study strategy. Case study would have a detail and intensive knowledge on the single case study that is being studied. Case study is very useful in conducting exploratory of the theory and challenging with come up with a new theory. Besides that, case study would provide a very rich understanding on the case that is being studied (Saunders, M. et. al, 1998). 3.2.2.2 Research Approach Besides that, the research approach that being used is inductive approaches. Inductive approach is building theory which is more for case study research strategy. This approach would get the research to involve in the case study as well. The general idea of the problem would be understand well when inductive approach is being use. This approaches would more likely to use up interview data. It would be able to formulate theory by using the result of data analysis but at the same time it would also end up with the same theory as the existing theory (Saunders, M. et. al, 1998). 3.3 Sources of Data 3.3.1 Primary Research There are several primary researches available such as observation, interview and questionnaire. The primary research which is being use in this research proposal is through interview. A semi-structured and in-depth interview would be conduct in order to have an exploratory study on Air Asias marketing strategy to gain new insight. An open-ended interview questionnaire would be design and use to interview the potential interviewee to collect qualitative data. A face-to-face interview would be held where it allow researcher to have more control and strengthen open-ended question (Mona, C., et. al, 2001). 3.3.2 Secondary Research In this research proposal, the secondary research used is through online database to collect useful journals which are relating to the topic. The main online database is being use is [emailprotected] which is an online database of the Massachusetts Institute of Technology. The information that found through this online database is highly reliable where there is lots of PhD or masters unpublished thesis available on the database. Besides online database as secondary research, websites are being used as well. Official website of Air Asia is being used as the secondary research tool to get information regarding on Air Asia. Newsletters of Air Asias would frequently update the researcher on current news about Air Asia. Besides that, Air Asias blog is one of the secondary research tools where it provides new updates of Air Asia from time to time when latest news of Air Asia could be known from there as well. 3.5 Data Analysis Procedures There is several methods data analysis on qualitative research. The method of data analysis selected for this research proposal is the grounded theory data analysis. This data analysis method uses the inductive research where it collects data from the source of interview. Through interview, data would be able to collect and at the point of time, the data is being grouped accordingly into respective main concept (Gutstafsson, L., 2005). After the grouping of data into different concepts is done, the data could further categories into different supporting theory structure. By doing so, it enable researcher to have a better outlook of the data displayed in the structure. Therefore, researcher could interpret and analyze the data easily. A new theory would be able to generate by using the result of data analysis (Gutstafsson, L., 2005).

Friday, October 25, 2019

HIV and AIDS :: STD, HIV, AIDS

In 1981, the first cases of severe immune system deterioration were recognized developed unusual infections. The new disease was later named "AIDS". At that time, no one knew what was causing the disease. Since then, science has shown that the Human Immunodeficiency Virus (HIV) is the cause of AIDS. As HIV infection progresses, it weakens a person's ability to fight off diseases. By attacking the immune system, the virus leaves people more susceptible to other diseases. When a person with HIV contracts one of several additional diseases, or when a person's immune system shows serious deterioration, that person is classified as having AIDS. As of June 1994 over 550,000 Americans had AIDS. I have updated numbers. Globally, 37.8 million adults and children were living with HIV/AIDS at the end of 2003. More than 95% were living in low- and middle-income countries. In 2003, 4.8 million people were newly infected with HIV, and there were 2.9 million adult and child deaths due to HIV/AIDS. Almost 50% of newly infected adults were women. Since the beginning of the epidemic, there have been more than 20 million AIDS deaths. HIV is transmitted during sex, through significant and direct contact with infected blood (including menstrual blood), from mother to baby, Breast milk, Semen and possibly pre-seminal fluid ("pre-cum"), Vaginal secretions. In order for HIV to be transmitted HIV must be present. HIV must get inside the body. The sexual behaviors that can transmit HIV. Vaginal sex (penis in the vagina), Anal sex (penis in the anus) involving either men or women and Oral sex (mouth on the penis or vagina). Other ways that HIV can be transmitted Sharing needles when shooting drugs Home tattooing and body piercing Accidental needle sticks Blood transfusions Childbirth Breast-feeding. It is important to know, Most people with HIV infection do not look sick. It is important to remember that HIV is NOT transmitted through Saliva, tears, sweat, feces, or urine Hugging Kissing Massage Shaking hands Insect bites Living in the same house with someone who has HIV Sharing showers or toilets with someone with HIV Some behavior is more risky than others. It is important to recognize that risk factors are not the direct cause of disease. HIV affects people at every point on the risk spectrum and many people who are most "at risk" for HIV infection never become infected. Understanding HIV risk factors can help you better evaluate your own risk.

Thursday, October 24, 2019

Cyber Security Policies in the Private and Public Sector

Cyber Security Policies in the Private and Public Sector Cyber Security Vulnerabilities and Associated Threats of Cloud-Computing 16-03-2013   Cloud computing is a technology through which the information services are provided on demand basis. It is like service oriented architecture. End-users access the services through the cloud as per the requirement. The cloud term basically refers internet, so services are provided through Internet. Cloud computing reduces the total cost of accessing the application.The applications are developed by the third party and the users pay per service to the third party for accessing the service. But there are lots of security risks associated with the cloud-computing. These relates to the data privacy, other vulnerabilities and associated threats. These vulnerabilities and the associated threats will be discussed in this paper. Effective Policies and procedures will also be defined in this paper which will help in managing the estimated risk of the threats. Cyber Security Vulnerabilities and Associated Threats of Cloud-Computing Cloud-ComputingThe information technology is growing these days and the managers are trying to reduce the total cost of development of the services using various means due to a number of business reasons. Cloud-computing is a technique which helps the management in reducing the total cost of development. The required resources are configured in a cloud and the users access these services through the cloud. In case of in-house development, the complete process is done inside the company premises and using the resources of the organization. So the organization has to pay for the complete resource to the vendor even if full service is not required.The license to use the product is also very costly. The organization has to pay for the complete product even if a part of the service is required. In the case of cloud computing, the users need not to pay for the entire service or product, he will pay only for the part of the service. For example, a service is created for user-id creation and as most of the organization needs this policy, so this policy is created and configured in the shared pool of resources. Now the different organizations can access the service as per their use. This helps in overall reduction of the total cost of accessing the service.These resources are configured in a shared pool of resources. These shared resources include the servers, storage, networks, services, etc. Cloud computing has many forms and these forms are mainly as described here: â€Å"Software as a Service†, â€Å"Platform as a Service†, and â€Å"Infrastructure as a service†. This technology has many advantages but it has some disadvantages too. As discussed above, that the services are provided by a third party vendor, so the responsibility to provide support and maintenance is also taken care by the third party service provider.When a company access the service using cloud- computing, the crucial business data resides in remote servers provided by the third party so there are lot of risk related to data privacy and confidentiality. The research related to analyzing the vulnerabilities and associated threats is going on and suitable actions are being taken to control the risk level. Cyber Security Vulnerabilities, Threats and Actions Vulnerabilities refer to the loop holes in the system or the flaws in the system. When an organization has decided to move on the cloud, then it should also consider the associated vulnerabilities and the threats.Some of the major vulnerabilities are discussed below: Session Hijacking It means that the cloud or the required service is hacked by the hackers using a valid session key. This key is used to gain the unauthorized access on the critical resources of the organization. Once hacked, the hackers can have the complete access on the systems, and they can perform any malicious activity they want to do, to hit the company resources. If proper and effective security measures are not followed in the infrastructure then it may cause a heavy business loss in terms of financial terms as well as the reputation of the organization.Probability of Occurrence The probability of occurrence of these types of attack is generally high. The reason being is that the attackers keep on continuously scan the system to find out the vulnerabilities in it. Once they gain the access, they just execute their jobs. Effective Policies & Procedures To mitigate this kind of risk, firewalls should be implemented in the system at the right places. Firewalls prevent unauthorized access of data. Rules and policies should be configured to protect the session keys. To increase the awareness among employees, a proper training should be given to them.For example, session monitoring should be done to keep a check on the malicious activities. Virtual Machine Access In this technology, the servers uses same resources like operating syste m, business applications, etc which are used by the virtual machines & other servers. If the attacker is successful in to gaining the unauthorized access to any of these system resources, then the whole system can be compromised easily. If other virtual machines are also located in the same configuration zone then there is a high risk of compromising other virtual machines too.This may directly hit the operating system and the host server and hence all the services hosted by the server. Probability of Occurrence The probability of occurrence of these types of attack is also high. As the flaws in the software or hardware becomes the root cause of these types of attacks. The bugs or flaws in the software are identified at a later stage and regular updates or patches needs to be applied on the software. Effective Policies & Procedures The software should be regularly updated and patches should be applied on it.Hardware flaws should be filled up using various tools. An effective network configuration is very important to mitigate this type of attacks. Service Availability This is a major weakness in cloud computing technology. No company can afford the unavailability of the required service. The company has to suffer from a huge business loss in case of downtime. The services offered by the cloud are not much reliable, any outage in the system may cause the services to stop working and hence the services will not be accessible. And this would be again responsible for a major loss to the company.Service Level Agreements (SLA) must be well defined and signed by both the involved parties and the above mentioned issues should be discussed and taken care using the SLAs. Backup plans should be carefully designed and implemented so that the risk level can be controlled. In case of any outage, let’s say electricity outage, can be taken care by switching to electricity generators or other back-up devices. Probability of Occurrence The probability of occurrence of th ese types of attack is generally low. This types of issues rarely occur in any organization.Service providers mostly keep the backup resources so that the system working remains continuous. And in case of some issues, switches to the ready back-up resources can be easily done. Effective Policies & Procedures To mitigate this kind of risk, firewalls should be implemented in the system at the right places. Firewalls prevent unauthorized access of data. Rules and policies should be configured to protect the session keys. To increase the awareness among employees, a Cryptography Flaws This flaw refers to the weakness in the cryptography techniques implemented in the cloud based system.Hackers can easily decode the encoding mechanism used in the system if there are some security gaps, for example if the key used in the encryption mechanism is not secure and strong enough then the attacker can easily gain the access to the key and hence they can easily decode the encrypted message to the original text form. Probability of Occurrence The probability of occurrence of these types of attack is generally medium. The reason being is that most of the times, attackers could not find out the key used to encrypt the data or it is difficult to decode the encoded data.Effective Policies & Procedures To mitigate this kind of risk, strong cryptography techniques should be used. Ethical hacking can be done intentionally just to test the security level of the complete system. This test will help in analyzing the security gaps in the system and then these loop holes can be filled with effective security procedures. Data Privacy When the data resides in third party servers, then this risk of data privacy always persists. As the crucial data is handled and managed by the third party, so there are high chances of risks to data privacy and confidentiality.Basically an agreement is signed-off between the parties for accessing the services. It should also include the issues related to mai ntaining privacy of data. Suppose the contract gets completed, now what would happen to the data which is stored in the third part servers? Probability of Occurrence The probability of occurrence of these types of attack is generally high. The reason being is that the data is always accessible to the service provider. Service providers take care of the support and maintenance of the data too. This risk is generally high.Research is going on so that this issue can be sort out. Effective Policies & Procedures These kinds of issues should be openly discussed with the service provider before signing any agreement. Vendor’s Technique As the technology is growing, there are lots of vendors coming up in this industry. Sometimes these vendors are immature and they follow the platform specific techniques which cause trouble in migrating to the new service or integrating with other services. The developed technology will be of no use if it cannot be updated or integrated with other ser vices as per the requirement.Probability of Occurrence The probability of occurrence of these types of attack is generally medium, as it varies with the knowledge and experience of the service provider. Effective Policies & Procedures Proper research should be done before finalizing the right vendor. The initial requirements should be crystal clear so that both the parties should understand what actually needs to be done. There should not be any communication gap between both the parties so that in case of some issues, the right action can be taken immediately to fill the gaps.Dependency on Internet As discussed above, the services are accessed through a cloud of shared resources. This cloud refers to internet. So in other word we can say that the services are accessed through the internet which means that the services are highly dependent on internet. Suppose internet goes down then the client will not be able to access the required services. Probability of Occurrence The probabili ty of occurrence of these types of attack is generally low. The reason is that backup plans are ready for the service in case of some emergency.As the service provider also realizes the importance of internet so enough resources are used so that the system does not suffer from any kind of outages. Effective Policies & Procedures To mitigate this kind of risk, backup plans should be ready and available all the time so that if at any time, the system disrupts, the backup plans can be used so that the functioning of the system does not affect in any way. There are other important security threats too which are associated with cyber-security. These are discussed below: Denial of Service (DOS) Attack Denial of Service attacks are also known as DOS attacks.Due to these attacks, the legitimate requests of the end users are not completed due to heavy loading of the host server caused by the fake calls. Attackers may hit the routers or over flood the host server using the fake calls and this prevents the legitimate calls to execute. This may cause the complete disruption in the system. Appropriate rules and filters should be configured in the firewall to mitigate the risk associated with these attacks. Customer Satisfaction Customer satisfaction increases with the implementation of the above mentioned policies and procedures.The implementation basically helps in the availability of the service in a secure environment. And customers would be happy to gain access to the required service whenever they need and as per their requirement and that too in a secure environment. Hence we can say that the implementation of the above mentioned policies and procedures helps in increasing the customer’s satisfaction level. Conclusion In this research paper, various security vulnerabilities and the associated threats related to cloud computing are discussed.Cloud computing really helps in reducing the overall cost of accessing a service. But the security risk associated with t his technology cannot be ignored. Proper security measures should be implemented in the system. Secure protocols should be designed and configured so that a balance can be achieved between the cost and the security level. References 1. Blaisdell, R. (2011, February 24). How Much Can You Save On Your Cloud Computing Implementation? Retrieved from Ezinearticles. com: http://ezinearticles. com/? How-Much-Can-You-Save-On-Your-Cloud-Computing-Implementation? amp;id=5989672 2. European Network and Information Security Agency. (2009). Cloud Computing – Benefits, risks and recommendations for information assurance. Heraklion: European Network and Information Security Agency. 3. Mell, P. , & Grance, T. (2011, September). The NIST Definition of Cloud Computing. Retrieved from US Department of Commerce National Institute of Standards and Technology, Special Publication 800-145: http://csrc. nist. gov/publications/nistpubs/800-145/SP800-145. pdf 4. Meiko Jensen ,Jorg Sehwenk et al. , â⠂¬Å"On Technical Security, Issues in cloud

Tuesday, October 22, 2019

People for Ethical Treatment of Animals (PETA) Essay

People for Ethical Treatment of Animals recognizes the chair, salutes the delegates and it’s deeply honored to participate in this council with such a world pressing topic. People for Ethical Treatment of Animals deeply concerned by the millions of animals being locked up in laboratories across the world with unimaginable pain and suffering due to all the chemicals that are being tested on them by so called scientists for a later human use. Seeks the halt of all types of experimentation on living creatures whom are being used as nothing more than laboratory materials for reaserch wich most of the times provide misleading or incorrect results. We believe that every creature with a will to live has a right to live free from pain and suffering. PETA founder Ingrid Newkirk has said, â€Å"When it comes to pain, love, joy, loneliness, and fear, a rat is a pig is a dog is a boy. Each one values his or her life and fights the knife.† People for Ethical Treatment of Animals are completely, totally and irrefutably against animal testing for any kind of product or drugs.Further deploring for every nation to use alternative research methods and not animal testing. Ergo People for Ethical Treatment of Animals urgently requests that: * Having devoted attention to all the suffering animals go through by getting tested on, governments should start investing money in in vitro experimentation and research. Instead of spending it on animal testing. These methods should vigorously be promoted to all companies around the world. * Encourages people to get informed of what is going on with all the animal testing by having the 1,300 aprox. companies in our â€Å"Do not test† list make campaigns to invite other companies to join this list, and consumers to only use their cruelty free preoducts. Along with the publicity we (PETA) do. * Calls upon the countries to start banning products tested on animals and only allow cruelty free products, requesting more companies to start using non-animal methods in their research and production. People for Ethical Treatment of Animals trusts that a strong message will be issued from this committee and that action will be taken in order to strongly condemn product testing in animals.

A world lit by fire essays

A world lit by fire essays The book A World Lit Only by Fire by William Manchester is actually a very good book when you look at it more into depth. This book basically talks about the failure of medieval Europe and that in the year 1500, after a thousand years of neglect, the roads built by the Romans were still the best on the continent. Several quotes similar to this show his liking for Rome and the civilization once built by them. The speaks about the many people of the time, the innovators and explorers who revolutionized the entire way the world was looked at, using hundreds of other characters the reconstruct the image of that time. Throughout the book he talks about several different times and problems of the medieval and post-Renaissance period. The three main issues that he addresses are the decline of civilization, the church being corrupt and the deeds committed by the sailors even though they knew what they were doing could be a waste of time or even leave to their death, explaining all they had to endure. The first chapter, entitled The Medieval Mind is basically bout the hardships the people had to face when life turned to manors and becoming a serf. People were constantly fighting, the war count was endless and the death count was even higher. Due to the sufficiency of agriculture and not much else, literacy also declined and disease increased and epidemics struck. The drainage was bad, which contributed disease and the death count. The farmers, or serfs, were constantly at work and had low quality tools to work with which made their life even harder, already trying to live off of scraps with a family to feed. Manchester however seemed to associate a lot of problems with the downfall of the Roman Empire. The Shattering is a chapter about the corruption of the church at that time, but although this chapter is mainly about it, the corruption is cited throughout his book. He states that the church officia...

Sunday, October 20, 2019

Sun and Little Maiden Essay

Sun and Little Maiden Essay Sun and Little Maiden Essay There was once a woman who wished very much to have a little child, but she could not obtain her wish. At last she went to a fairy, and said, "I should so very much like to have a little child; can you tell me where I can find one?" "Oh, that can be easily managed," said the fairy. "Here is a barleycorn of a different kind to those which grow in the farmer's fields, and which the chickens eat; put it into a flower-pot, and see what will happen." "Thank you," said the woman, and she gave the fairy twelve shillings, which was the price of the barleycorn. Then she went home and planted it, and immediately there grew up a large handsome flower, something like a tulip in appearance, but with its leaves tightly closed as if it were still a bud. "It is a beautiful flower," said the woman, and she kissed the red and golden-colored leaves, and while she did so the flower opened, and she could see that it was a real tulip. Within the flower, upon the green velvet stamens, sat a very delicate and graceful little maiden. She was scarcely half as long as a thumb, and they gave her the name of "Thumbelina," or Tiny, because she was so small. A walnut-shell, elegantly polished, served her for a cradle; her bed was formed of blue violet-leaves, with a rose-leaf for a counterpane. Here she slept at night, but during the day she amused herself on a table, where the woman had placed a plateful of water. Round this plate were wreaths of flowers with their stems in the water, and upon it floated a large tulip-leaf, which served Tiny for a boat. Here the little maiden sat and rowed herself from side to side, with two oars made of white horse-hair. It really was a very pretty sight. Tiny could, also, sing so softly and sweetly that not hing like her singing had ever before been heard. One night, while she lay in her pretty bed, a large, ugly, wet toad crept through a broken pane of glass in the window, and leaped right upon the table where Tiny lay sleeping under her rose-leaf quilt. "What a pretty little wife this would make for my son," said the toad, and she took up the walnut-shell in which little Tiny lay asleep, and jumped through the window with it into the garden. 2 In the swampy margin of a broad stream in the garden lived the toad, with her son. He was uglier even than his mother, and when he saw the pretty little maiden in her elegant bed, he could only cry, "Croak, croak, croak." "Don't speak so loud, or she will wake," said the toad, "and then she might run away, for she is as light as swan's down. We will place her on one of the water-lily leaves out in the stream; it will be like an island to her, she is so light and small, and then she cannot escape; and, while she is away, we will make haste and prepare the state-room under the marsh, in which you are to live when you are married." Far out in the stream grew a number of water-lilies, with broad green leaves, which seemed to float on the top of the water. The largest of these leaves appeared farther off than the rest, and the old toad swam out to it with the walnut-shell, in which little Tiny lay still asleep. The tiny little creature woke very early in the morning, and began to cry bitterly when she found where she was, for she could see nothing but water on every side of the large green leaf, and no way of reaching the land. Meanwhile the old toad was very busy under the marsh, decking her room with rushes and wild yellow flowers, to make it look pretty for her new daughter-in-law. Then she swam out with her ugly son to the leaf on which she had placed poor little Tiny. She wanted to fetch the pretty bed, that she might put it in the bridal chamber to be ready for her. The old toad bowed low to her in the water, and said, "Here is my son, he will be your husband, and you will live happily in the marsh by the stream." "Croak, croak, croak," was all her son could say for himself; so the toad took

Saturday, October 19, 2019

Mdcm B Case Study Example | Topics and Well Written Essays - 1500 words

Mdcm B - Case Study Example The main aims of the 12 projects were to rejuvenate the entire system of MDCM IT in next three years. The projects aimed to bring changes into the infrastructure, front- office systems as well as in the back office system. The various projects were as follows: In order to reduce the myriad different standards and the IT methodologies in and across the company, this project was designed. As this initiative demanded training for the contractors, the consultants and the internal IT professionals in the new methodology, it can be said that the time required for this project would be around 3 months. In this project the initiative was taken to consolidate the datacenter to three locations and to shift the company to network to VPN that would be managed by the telecommunication providers. The savings from this project would range to $1.1 millions. The time taken by this project would approximately be six months. At this stage an effort was made to standardize the server hardware and platforms. It was realized that by doing so there would be reduction of the maintenance and the support cost. This would normally require maximum of 3 months. At this project an attempt was made to make the functions of HR administration automated and available for the â€Å"self-service† to the employees on the intranet website. It would require around 3 months. At this project, the IT department decided to improve the collaboration systems like E-mail, Discussion boards, Knowledge management applications though they were highly disparate systems and were underutilized. However, the main challenge for the IT department was to consolidate the system as it would require commitment from the IT and would require huge amount of internal systems. It would require three to four months for this system to come into existence. A customer portal was decided to be made on the internet in order to reduce the administrative expenses that are associated

Friday, October 18, 2019

Clinical Psychology Essay Example | Topics and Well Written Essays - 1000 words

Clinical Psychology - Essay Example As the psychiatrist, it is necessary to initiate the talk in going back to the past negative experience of the patient. In doing so, the psychiatrist should first win the patient’s trust. Establishing ‘trust’ by being empathetic with the patient is necessary for the patient to open up his thoughts to the psychiatrist. Being empathic with the patient has to flow smoothly. It is important for the psychologist not to over do empathy since it could only lead the patient to maintain a distance with the psychiatrist. The psychiatric should carefully determine the culture of the patient. In general, culture is directly related to how the patient behaves and reacts on certain circumstances.1 For instance, as part of American culture, it is against the U.S. law for parents to physically hit any of their children. Therefore, there is a higher rate that individuals in the United States will grow up with a higher rate of speaking out their own emotional concerns. On the other hand, parents who are living in the Asian countries have a stronger hold on their children since these countries have a lesser chance of having a law stating that parents cannot physically hit their children. In fact, some parents in Asia are ‘spanking’ their children as part of disciplining them. Eventually, psychiatrist should be able to apply the psychic determinism theory since it is a fact that there will always be a reason behind how a person projects or see himself as an individual. The same theory can be applied concerning Mr. B’s negative feelings and outlook in life. In order for the psychiatrist to be successful in treating the patient, it is advisable to apply the cognitive behavioral therapy (CBT). By allowing the patient to participate and open up the communication line with the psychiatrist, the patient is unconsciously releasing the underlying factors that

International finance Essay Example | Topics and Well Written Essays - 4000 words

International finance - Essay Example Key estimating is focused around a recorded relationship and different financial variables and later focused on swapping scale, utilising relapse dissection, a settled measurable technique. many course readings portray the utilisation of the business sector based estimates inside the connection of efficient markets approach in which either present spot or future rates are the best indicators of tomorrows conversion standard (for an incredible examination see Eun and Resnick, pp. 149-150). This paper proposes undertaking obliging understudies to gauge the future estimation of an outside coin utilizing a central forecasting model. By the by, a standout amongst the most-disputable issues in the global money making concerns writing concerns the part and helpfulness of conventional financial essentials in clarifying conversion scale conduct. Meese and Rogoff (1983) inferred that monetary models could not beat a proficient markets theory. Goodman (1979) addressed the estimation of financial turned outside swapping scale-determining administrations. Levich (1982) assessed the exhibitions of 13 gagging administrations utilising the forward swapping scale as a benchmark. In a later study, Eun and Safherwal (2002) assessed the estimating exhibitions of 10 real business banks utilizing the spot conversion standard as a benchmark. In both studies, anticipating administrations overall neglected to beat business sector based rates. Albeit some of these administrations might not ha ve been giving estimates built singularly with respect to financial basics, this is a striking conclusion. Business area based standards are adequately accessible and cost less while anticipating administrations charge an expense. Major models, on the other hand, do have their supporters particularly as the gauge skyline stretches. It is contended that these estimates may be valuable under specific conditions and for particular corporate purposes. Gordon

The Impact of Divorce on Children Research Paper - 1

The Impact of Divorce on Children - Research Paper Example One of the most painful and devastating effects of divorce is the loss of parents for these underage children (Abrams, 2003). This happens when there is loss of contact with one or, in extreme cases, both parents. The loss comes with the loss of assistance and emotional help. Parents give a hugely influential psychological help to their children. This includes their duty as role models. It is estimated that non residential mothers do visit their children more frequently that the fathers (Brentano, 2007). Non residential fathers tend to visit their children at most five times in a month. Study shows that 21 per cent of children do not see their father two to three years after divorce. When this contact time is lessened, it means that children shall have to look for some other person to fill in the gap (Abrams, 2003). Most children who end up in criminal gangs come from none functional families (Hetherington & Stanley-Hagan, 1999). Most of them are said to have lost contact with their fathers and, therefore, try to fill in that gap through negative peer pressure (Clarke-Stewart & Vandell, 2000). The quality of the time spent by the parents and a teenage child or adolescent is what actually matters. This is because there are fathers who are always at home but always fight with their children. These are the parents who do not take intentional steps to create bond with their children (Hetherington & Stanley-Hagan, 1999). Emotional disconnection between children and their parents leads to mental instability (Hetherington & Stanley-Hagan, 1999). ... Fathers who help their children in their homework and show care and affection raise children who are better socially (Hetherington & Stanley-Hagan, 1999). Without this connection, children are left in the dark without knowing who to look to for guidance and direction. When parents divorce, children are likely to suffer economically. This means that they are likely to suffer financially more than children whose family is intact (Hetherington & Stanley-Hagan, 1999). There are instances when parents divorce and consequently opt to live in different countries. In this case, children have to choose which parent they want to live with. There are instances when after the division of property, the father of the children who used to be the bread winner files for bankruptcy. In most cases, he urges that he is not capable of supporting the children (Abrams, 2003). In other cases, divorced families change locations, children are forced to change their social set up and the quality of life they a re used to. In most of these cases, it happens quite abruptly. The process of divorce itself can be terribly expensive to the parents and children alike (Wolfinger, 2005). The well being of children cannot be quantified entirely through money. The economics of raising children involves harmony and peace within the family institution. This is because resources are best shared in an atmosphere of peace and tranquility (Abrams, 2003). Divorce involves loss of some supportive relationships and connections. Sometimes, change in the child’s healthcare programs affects the quality of the child’s upbringing. This radical economic change has a devastating effect upon the lives of the children involved. This financial strain becomes a doorway to many other economic challenges for the young

Thursday, October 17, 2019

Barriers to the Growth of Electronic Marketing Essay

Barriers to the Growth of Electronic Marketing - Essay Example It has been able to exterminate the monopoly in goods an series which has been considered important for the growth of the electronic business. Though it has recorded growth in the recent past, there have been many barriers to the growth of the industry. There have been many issues with the conduction of the business over the internet and other electronic tools especially problems to do with mutual trust and privacy of the deals. Lack of security through the internet and other barriers have been a great block to the growth of the industry. This paper explores the barriers which have prevented the growth of the electronic marketing. In the first section the paper will explore the growth of electronic marking looking at the factors that have enabled the industry to make such great strides. This will give us an insight on how there have been compounding factors that have acted as barriers for the growth of the industry. The second section will look at the actual barriers to the growth of the industry and discuss them in details giving solutions to what could be done in order to minimize the barrier to the growth of the industry. The last section will be a general conclusion which will summarize all the details on the paper. The future of marketing has been defined. ... has been able to transform researches on marketing, products and services, and other information to the main street of the world and in a manner that they can be accessed by anyone in any parts of the world and at any time. The internet has been able to revolutionize the market the at the same time we have a luxury of watching events in the world as they unfold which has helped customers to access growth of marketing in all dimensions. There have been many criticism about the internet on the social front citing isolation and connection issues coupled with the political impacts that it has had on many governments but few have talked about the revolution that it has created on the economies of the world except the attention that has been paid on the stock market new that we receive over the internet. (Brown and Duguid 2002, p. 71) Since the 1990s when the internet was developed there has been tremendous growth in e-marking and a general growth of ecommerce. Companies have become open to the scrutiny of the whole world which has made it prerogative for the companies to open their operation and practice more ethics. But it is not only in the practicing of ethics in the corporation but also in the way the process of making business deals with these corporations that has been the main advantage of the internet to the consumers and to the corporations. There has been rising use of the internet as we clock to this decade and it seems to have become the centre of life of many people not only in America but also in the whole word. Recent researches shows that there have been a remarkable drop of about 8 percent on the number of hours that Americans have been spending watching TV and at the same time there have been increased number of house about 8 percent that they have

Customer behaviour in charity retailing in UK Dissertation

Customer behaviour in charity retailing in UK - Dissertation Example Shopping in charity stores has seen a revived popularity with the emergence of the recession and the popularity of conservation style living. The reasons and drives that consumers feel to enter into thrift stores are varied and interesting as they reflect psychologies about the past as much as modern aesthetics. The emergence of the charity thrift store can be traced to the Salvation Army in London where the store was created in order to give some of those who were unemployed a job, the sale of the items supporting the wages for those collecting the goods. The desire for vintage style and the added bonus of conservation through repurposing has placed the charity store back into the lists of retail outlets being used by modern consumers. 1.2 Background With the emergence of the recession and the consequential focus on conservative spending, charity retailing has become a more significant resource from which to replenish needs and wants. Through items that have been donated by others for sales to benefit charities, revitalization can be found through new owners who can repurpose the items for their own uses. Changes in the retail environment are being reflected through the concept of repurposing. Green technologies and products that are designed for natural, organic, or socially responsible consumerism can be seen as examples of the type of retailing that is designed to provide a sustainable responsibility in consumer behaviour. ... The emergence of the charity thrift store can be traced to the Salvation Army in London where the store was created in order to give some of those who were unemployed a job, the sale of the items supporting the wages for those collecting the goods. The desire for vintage style and the added bonus of conservation through repurposing has placed the charity store back into the lists of retail outlets being used by modern consumers. 1.2 Background With the emergence of the recession and the consequential focus on conservative spending, charity retailing has become a more significant resource from which to replenish needs and wants. Through items that have been donated by others for sales to benefit charities, revitalization can be found through new owners who can repurpose the items for their own uses. Changes in the retail environment are being reflected through the concept of repurposing. Green technologies and products that are designed for natural, organic, or socially responsible co nsumerism can be seen as examples of the type of retailing that is designed to provide a sustainable responsibility in consumer behaviour (Krafft and Mantrala 2010). Consumer behaviours have changed in the last five years as the economy has dived into a recessive cycle. How money is spent is much more closely guarded, thus creating a more conscientious consumer. Items that can be repurposed and given a new function within the hands of a new consumer provides a sense of fulfilment as consumers find themselves trying to find ways to make ends meet. In addition, the charitable concept of buying in a store that is designed to benefit those in need is appealing to the consumer as the trends have been seen to support the evolution of more responsible living. The history of charity

Wednesday, October 16, 2019

The Impact of Divorce on Children Research Paper - 1

The Impact of Divorce on Children - Research Paper Example One of the most painful and devastating effects of divorce is the loss of parents for these underage children (Abrams, 2003). This happens when there is loss of contact with one or, in extreme cases, both parents. The loss comes with the loss of assistance and emotional help. Parents give a hugely influential psychological help to their children. This includes their duty as role models. It is estimated that non residential mothers do visit their children more frequently that the fathers (Brentano, 2007). Non residential fathers tend to visit their children at most five times in a month. Study shows that 21 per cent of children do not see their father two to three years after divorce. When this contact time is lessened, it means that children shall have to look for some other person to fill in the gap (Abrams, 2003). Most children who end up in criminal gangs come from none functional families (Hetherington & Stanley-Hagan, 1999). Most of them are said to have lost contact with their fathers and, therefore, try to fill in that gap through negative peer pressure (Clarke-Stewart & Vandell, 2000). The quality of the time spent by the parents and a teenage child or adolescent is what actually matters. This is because there are fathers who are always at home but always fight with their children. These are the parents who do not take intentional steps to create bond with their children (Hetherington & Stanley-Hagan, 1999). Emotional disconnection between children and their parents leads to mental instability (Hetherington & Stanley-Hagan, 1999). ... Fathers who help their children in their homework and show care and affection raise children who are better socially (Hetherington & Stanley-Hagan, 1999). Without this connection, children are left in the dark without knowing who to look to for guidance and direction. When parents divorce, children are likely to suffer economically. This means that they are likely to suffer financially more than children whose family is intact (Hetherington & Stanley-Hagan, 1999). There are instances when parents divorce and consequently opt to live in different countries. In this case, children have to choose which parent they want to live with. There are instances when after the division of property, the father of the children who used to be the bread winner files for bankruptcy. In most cases, he urges that he is not capable of supporting the children (Abrams, 2003). In other cases, divorced families change locations, children are forced to change their social set up and the quality of life they a re used to. In most of these cases, it happens quite abruptly. The process of divorce itself can be terribly expensive to the parents and children alike (Wolfinger, 2005). The well being of children cannot be quantified entirely through money. The economics of raising children involves harmony and peace within the family institution. This is because resources are best shared in an atmosphere of peace and tranquility (Abrams, 2003). Divorce involves loss of some supportive relationships and connections. Sometimes, change in the child’s healthcare programs affects the quality of the child’s upbringing. This radical economic change has a devastating effect upon the lives of the children involved. This financial strain becomes a doorway to many other economic challenges for the young

Tuesday, October 15, 2019

Customer behaviour in charity retailing in UK Dissertation

Customer behaviour in charity retailing in UK - Dissertation Example Shopping in charity stores has seen a revived popularity with the emergence of the recession and the popularity of conservation style living. The reasons and drives that consumers feel to enter into thrift stores are varied and interesting as they reflect psychologies about the past as much as modern aesthetics. The emergence of the charity thrift store can be traced to the Salvation Army in London where the store was created in order to give some of those who were unemployed a job, the sale of the items supporting the wages for those collecting the goods. The desire for vintage style and the added bonus of conservation through repurposing has placed the charity store back into the lists of retail outlets being used by modern consumers. 1.2 Background With the emergence of the recession and the consequential focus on conservative spending, charity retailing has become a more significant resource from which to replenish needs and wants. Through items that have been donated by others for sales to benefit charities, revitalization can be found through new owners who can repurpose the items for their own uses. Changes in the retail environment are being reflected through the concept of repurposing. Green technologies and products that are designed for natural, organic, or socially responsible consumerism can be seen as examples of the type of retailing that is designed to provide a sustainable responsibility in consumer behaviour. ... The emergence of the charity thrift store can be traced to the Salvation Army in London where the store was created in order to give some of those who were unemployed a job, the sale of the items supporting the wages for those collecting the goods. The desire for vintage style and the added bonus of conservation through repurposing has placed the charity store back into the lists of retail outlets being used by modern consumers. 1.2 Background With the emergence of the recession and the consequential focus on conservative spending, charity retailing has become a more significant resource from which to replenish needs and wants. Through items that have been donated by others for sales to benefit charities, revitalization can be found through new owners who can repurpose the items for their own uses. Changes in the retail environment are being reflected through the concept of repurposing. Green technologies and products that are designed for natural, organic, or socially responsible co nsumerism can be seen as examples of the type of retailing that is designed to provide a sustainable responsibility in consumer behaviour (Krafft and Mantrala 2010). Consumer behaviours have changed in the last five years as the economy has dived into a recessive cycle. How money is spent is much more closely guarded, thus creating a more conscientious consumer. Items that can be repurposed and given a new function within the hands of a new consumer provides a sense of fulfilment as consumers find themselves trying to find ways to make ends meet. In addition, the charitable concept of buying in a store that is designed to benefit those in need is appealing to the consumer as the trends have been seen to support the evolution of more responsible living. The history of charity