Wednesday, July 31, 2019
Civil Disobedience to Black Power Essay
Up until the 1960ââ¬â¢s the civil rights movement was practiced through peaceful protests established from the idea that equal recognition amongst all peoples was only acquired through non-violent acts. In the late 60ââ¬â¢s these techniques transformed into fast and more efficient methods with different value sets. The changes within the Civil Rights movement occurred because African Americans were sick of the painfully slow progress accomplished through the civil rights movement, didnââ¬â¢t agree with the idea that being mistreated, disrespected, and stomped over (figuratively and literally) was the only resolution to overcome racism and segregation, and decided that violence and bloodshed (stemming from the theory that asking for deserved rights was to slow a process, when they could just take them) was aggressive enough to catch the eyes of many and gain Black Dominance or at least equal rights. Even with the Civil Rights Act in place, African Americanââ¬â¢s were tired of being neglected and disregarded. Peaceful protesting was only doing so much, the alternative of Black Power had begun to flourish in the late 60ââ¬â¢s because it demanded respect through violent, attention-grabbing approaches that were created to actually change segregation and equality. The 1950ââ¬â¢s and early 60ââ¬â¢s were eras driven by the consumer culture, the US was extremely wealthy, the automobile industry was booming, suburban lifestyle had grown, television became extremely popular, and the general view of America was good (to say the least). The only ââ¬Ëbadââ¬â¢ aspect of the US was inequality and the unrecognized rights (Blacks deserved). The US originally opted for saving justice and peace amongst Black communities in civil and non-violent ways, but there was limited execution. In 1954, for example, the Supreme Court unanimously ruled segregation in public schools unconstitutional in Brown v. Board of Education. This landmark case began a series of significant Civil Rights movements with regards to desegregation and equal rights. The early 60ââ¬â¢s brought upon new perspectives and the idea of peaceful resolution was one of them. Due to the fact that American culture was thriving in material goods and prosperity African Americans figured the best way to go about change was to do it in calm, civil, non-brutal manners. Organizations like the National Association for the Advancement of Colored People (NAACP), Congress of Racial Equality (CORE) and the Southern Christian Leadership Conference (SCLC) began to emerge. Doc A, B, and C convey the goals pertaining to African Americans (in the early 0ââ¬â¢s) and their hope for equal rights, legal citizenship, voting rights, and equal economic/labor opportunities. Doc A showcases the Student Nonviolent Coordinating Committeeââ¬â¢s perspective that love transforms hate and nonviolence is the best way to bring about integration. The early 60ââ¬â¢s held so much potential and optimism. African Americanââ¬â¢s were seeking equal privileges so contently because they experienced Americansââ¬â¢ positive response to Americaââ¬â¢s success and didnââ¬â¢t want to harm the culture or destroy the peace. One attempt for Civil Rights included a peaceful protest in Birmingham, Alabama. The response of the police was outrageous. As seen in Doc B, the photograph (from 1963) shows racist and corrupt police attacking African Americans after a peaceful protest (to allow Blacks into church). Rather than defend himself, the black man depicted in the photo is responding with no resentment or anger. Many African Americans were beaten and sent to jail; including Martin Luther King, Jr. Doc C (1963) is a letter written by MLK from the Birmingham Jail promoting peace and arguing that ââ¬Å"injustice anywhere is a threat to justice everywhere. â⬠MLK desired peace rather than violence because of his educational background and upbringing-his father was the minister of the Ebenezer Baptist Church and he passed on his understanding, tolerance, and religious views (inspired by peace) to his son. MLK could be peaceful, even after going to jail for no reason. After the Birmingham incident, John F. Kennedy announced his promise to end racial discrimination on radio and television. The speech served as motivation to civil right leaders, a wake-up call to Congress, and the inspiration for the Civil Rights Act of 1964 and Voting Rights Act of 1965 (unfortunately JFK never lived to see these passed). Although these rights were legally authorized, African Americans were not fully protected. Just because they were laws in place, didnââ¬â¢t mean they were implemented with major concern or emphasis. Race riots, racial profiling, and illegal discrimination were still occurring. African Americans realized that in order to truly get what they wanted, they needed prompt uncivil protests. Stokely Carmichael, a violent-protest-supporter, coined the phrase ââ¬Å"black powerâ⬠and stated ââ¬Å"I am not going to beg the white man for anything I deserve; Iââ¬â¢m going to take it. â⬠We see the change in strategy for Black Nationalism. Carmichaelââ¬â¢s speech, entitled, ââ¬Å"what we wantâ⬠from 1966 (Doc E) implies the only way to get money, property, respect, and in general civil rights for African Americanââ¬â¢s is to demand it, whether it was by strike, boycott, riot, or any other possible means of violent rebellion. The reasons why there was such a focus on gaining equality through violence was because peaceful protests were not developing equality quick enough, African Americanââ¬â¢s needed each other in order to attain enough votes for one collective ballot, and violent acts needed the most attention because they needed to be stopped the fastest. Take, for example the scenario of when a child throws a fit, the parent will do whatever it takes to stop the childââ¬â¢s interrupting objection and annoying whines, the same initiative for Black Power. Some philosophers even argue that Black Power was an act of revenge, Blacks felt obligated to torture Whites and act in violent ways to get even with them for their previous treatment of African slaves. At this point African Americans had to fight for things Whites got easily, like jobs, money, respect, social status, religion, privacy and the general right to be able to go to common-day-places (like the grocery store or local restaurant) and not have to worry about discrimination. The Black Panther Party for Self-Defense (Doc F in 1967) preached that black people must resort to violence because they have not made any gains through peace. Malcolm X, a Black Power activist and violent-protesting-leader supported this idea and said, ââ¬Å"Stand on your own feet and solve our problems ourselves instead of depending on white people to solve them for us. â⬠This quote shows the foundation for Black Power-fast, unexpected, memorable recognition. Malcolm X ridiculed Martin Luther Kingââ¬â¢s attempt at Birmingham saying it showed the uselessness of nonviolent-protest. The increasing amount of African Americans promoting violence concerned American citizens. Whites believed that if the government didnââ¬â¢t take action, mass riots and destruction would erupt everywhere, and they were somewhat on track. By 1968, (according to Doc G) 62% of African Americans were registered to vote, thatââ¬â¢s 33% more than in 1960. This evidence suggests that the violent acts did make an impact and shape the Civil Rights movement into what we view it as today.
Tuesday, July 30, 2019
Language development in children
All the other ways of knowing are controlled by language. The appropriate use of language is central to virtually all aspects of learning and social development. Successful and appropriate language communication is also closely linked to the individualââ¬â¢s place in society, while the inability to communicate clearly hampers and may virtually eliminate a personââ¬â¢s ability to cope with even the simplest educational and social situations. The manner in which children learn to understand and successfully communicate through language is among the most important questions studied by psychologists. The appropriate use of language is central to virtually all aspects of learning and social development. Successful and appropriate language communication is also closely linked to the individualââ¬â¢s place in society, while the inability to communicate clearly hampers and may virtually eliminate a personââ¬â¢s ability to cope with even the simplest educational and social situations. Traditionally, psychological accounts of language developmentà à have been developed by theorists who have included language learning in their discussions of a general acquisition process (e.g. Miller and Dollard, 1941; Skinner, 1957). Skinner for example, believes that language is learned in large measure by waiting for children to emit approximations of the forms of speech which are ultimately desired and then by gradual shapingà à (by parents or other socializing agents) until the correct sounds and sentence forms can be reproduced in appropriate situations with a high degree of fidelity.à à à à à à à à à à In contrast, some psycholinguists (e.g. Chomsky, 1959; Fodor, 1966) haveà à cogently argued that operant learning theory cannot adequately account for complex verbal behavior. Chomsky (1959) offers the following pregnant critique of a ââ¬Å"conditioningâ⬠viewpoint: â⬠¦it seems quite beyond questions that children acquire a good deal of their verbal and non-verbal behavior by casual observation and imitation of adults and other children. It is simply not true that children can learn language only through ââ¬Å"meticulous careâ⬠on the part of adults who shape their verbal repertoire through careful differential reinforcement, though it may be that such care is often the custom in academic families. It is a common observation that a young child of immigrant parents may learn a second language in the streets, from other children, with amazing rapidity, and that his speechà à may be completely fluent and correct to the last allophoneâ⬠¦ A child may pick up a large part of his vocabulary and ââ¬Å"feelâ⬠for sentence structure from television, from reading, from listening to adults, etc. Even a very young child who has not yet acquired a minimal repertoire from which to form new utterances may imitate a word quite well on an early try, with no attempt on the part of his parents to teach it to him (p. 42). Numerous experiments have now disclosed that principles for generating novel responses can be acquired through the observation of others (for example, Bandura & McDonald, 1963; Bandura & Mischel, 1965). If principles of language usage, rather than mere words can be shown to be acquired through observational learning, then this would provide at least a partial account of the process of language acquisition. The classic experiment in this area was conducted by Bandura and Harris (1966). They were interested whether second-grade children could make up sentences that included prepositional phrases and the passive voice. The children were tested first during a base rate period and then again after some form of intervening training. The results demonstrated that the children showed a greater increment in the production of the relevant construction in their sentences (than did the control group) if they were exposed to a combination of (1) an adult modelââ¬â¢s production of sentence3s with and without the relevant construction (2) reward to both the model and the observer for sentences containing the relevant construction and (3) attention-focusing instructions. This study clearly suggested that childrenââ¬â¢s language productions might be modified through modeling in conjunction with other procedures. It is likely, however, that the children in Bandura and Harris experiment had been exposed to prepositional phrases and the passive voice many times in their lives prior to entering the experimental situation. Therefore, the question still remained as to whether children could actually acquire new or novel language rules as a function of observation. Indeed, language is important and in fact, traditionally, psychological accounts of language development have been developed by theorists who have included language learning in their discussions of a general acquisition process (Miller & Dollard, 1941; Skinner, 1957). Skinner, for example, believes that language is learned, in large measure by waiting for children to emit approximations of the forms of speech which are ultimately desired and then by gradual shaping (by parents or other socializing agents) until the correct sounds and sentence forms can be reproduced in appropriate situations with a high degree of fidelity. This is a fair representation of the interrelationship between perception, emotion, reason and language, for numerous experiments have now disclosed that principles for generating novel responses can be acquired through the observation of others (Bandura & McDonald, 1963) If principles of language usage, rather than mere words, can be shown to be acquired through observational learning, then this would provide at least a partial account of the process of language acquisition. In the area of linguistic diversity, researches reveal that in spite of enormous impact that language has on childrenââ¬â¢s schooling, lack of English skills alone cannot explain the poor academic achievement of students. It is tempting to fall back on this explanation and thus count on simple solutions to solve the problem. Cuban students, for example, have the highest educational level of all Latinos, yet they are the most likely to speak Spanish at home. (Valdivieso & Davis, 1988). However, the fact that students speak Spanish is treated by many teachers as a problem. There is also evidence that teachers interact more negatively with students who do not speak English than with those who do. (U.S. General Accounting Office, Bilingual Education: A New Look at the Research Evidence, Washington, D.C.: U.S. Government Printing Office, March 1987). Thus, this is where the emotion and perception side come in the picture. Because if this is the case, then the language dominance of students is not the real issue; rather, the way in which teachers and schools view their language may be even more crucial to student achievement in acquiring knowledge. How language and language use are perceived by the schools and whether modifications in the curriculum and imparting of knowledge are made as a result are important factors to keep in mind. The fact that English speakers rarely have the opportunity to enter bilingual education programs reinforces status of these programs. This is where the methodology of knowledge is more important than the knowledge itself. According to Jean Piaget, what differentiates humans from animals is humanââ¬â¢s ability to do ââ¬Å"symbolic abstract reasoningâ⬠[Piagetââ¬â¢s Theory] and this forms the basis for the constructivist theory in learning and instruction [Ibid.]. During his experiments, he observed that children think differently from adult and answer questions differently, but it does not mean that children are dumb [Ibid.]. Piagetââ¬â¢s theory had two major aspects: the process and stages of cognitive development [Ibid.]. The process of learning and acquiring intelligence of children is influenced by ââ¬Ëschemas,ââ¬â¢ which is actually the childââ¬â¢s representation to the world. The processes used by children to attain equilibrium between their schemas and the real environment are ââ¬Å"accommodationâ⬠and ââ¬Å"assimilationâ⬠[Ibid.]. It is assimilation when a child tries to fit cubes into square holes during playtime. It is accommodation when a child tries to push harder a heavier play cart with classmate- passengers than a cart with no one riding. As a child grows, schemas become more complex [Ibid.]. The stages in cognitive development of a child are divided into three: sensorimotor [infancy], pre-operational stage (toddler and early childhood), and concrete operational stage (elementary and early adolescence). During infancy, a child only recognizes an object when he or she sees it [Giants]. During toddler hood and early child hood, a child knows the direction of the right and left of an object, but the child cannot correctly think relative to that object [Ibid.]. At the concrete operational stage, a child becomes more logical in their understanding of the world. It is important that teachers of pre-school and primary schools learn to challenge abilities of children [Piagetââ¬â¢s Theory]. ââ¬Å"Discovery learning and supporting the developing interest of the child are two primary instructional techniquesâ⬠[Ibid.] to help children understand the world more. ââ¬Å"Children construct knowledge, learning can lead development, development cannot be separated from its social context, and language plays a central role in cognitive developmentâ⬠are the main themes of Vygotskyââ¬â¢s developmental theory [Giants]. Children construct knowledge in a way that Piaget had described it [Bodrova 2005]. A childââ¬â¢s learning can be measured in a level of independent performance and level of assisted performance [Ibid]. The area between these measures will result to the Zone of Proximal Development (ZPD) which increases as learning occurs [Ibid]. Both content and processes of thought is determined by the culture [Ibid.]. Higher functions in man such as focused attention, deliberate memory and symbolic thought are passed down thru teaching [Ibid.]. ââ¬Å"Learning always involves external experience being transformed into internal processes through the means of languageâ⬠[Ibid.]. Vygotskyââ¬â¢s principle taught that teachers should know the specific learning needs of a child and determine what most appropriate intervention could be done. The ZPD would eventually be filled-up if the learning needs were met thru proper teaching practice. One good practice was to devise an assessment questionnaire that would equally gauge independent performance and assisted performance, and from there, the ZPD can be quantitatively determined. By identifying the gap qualitatively, the learning needs of a child would be revealed.à à Moreover, teachers should also know how to develop a childââ¬â¢s attention to focus, improve childââ¬â¢s memory, to teach children think symbolically, and use a language game that children understand. Meanwhile, oneââ¬â¢s cultural and social upbringing affects the way a person views this. There are no assumptions or deducing involved here. One can verify the information by just looking again at the dizzying array of program alternatives in bilingual education, each claiming to be more successful than the others. In general, most research has found that bilingual programs of all kinds are effective not only in teaching students content area knowledge in their native language but also in teaching them English. This has been proven time and again to be the case in research analyses and specific program reviews (Hakuta, 1990). According to Hakuta, the most significant effect of bilingual education may not be that it promotes bilingualism in general, which he claims it does not, but rather that it ââ¬Å"gives some measure of official public status to the political struggle of language minorities, primarily Hispanics.â⬠He suggests that raising the status of these childrenââ¬â¢s native languages contributes to their opportunities for friendships with English-speaking children. Similarly, Erik Erikson as psychoanalyst taught that any person, child or adult faces specific life crisis that they have to resolve in order to perform their tasks (Atkinson 1993). During early childhood or preschool, a child develops an ability to initiate activities (Ibid. 118); teachers have to learn how to encourage or discourage them in order that the child would not feel inadequate. During middle child hood or elementary, children learns various skills such as reading and writing, but they have to interact socially with others in order to feel successful or competent, otherwise they would feel inferior. During this time, a teacher should constantly but reasonably praise a child for a job well done. The LOGO programming used with young children was believed to be supported by Eriksonââ¬â¢s theory on the psychosocial stages (Gillespie and Beisser, 2001, p. 230). LOGO is a computer programming language developed by Dr. Seymour Papert in 1980s that is loaded with MicroWorlds software. With the MicroWorlds, a child creates his own animated graphics thru self-directed activity and independently explores cause and effect. Giving children ample time to spend with LOGO programming,à building and constructing encourages children to work without making them feel guilty which makes smooth the transition of a child in his guilty-prone periodà (Ibid. p. 234). The same activities enable a child also to acquire mastery of the game in order to feel competent. REFERENCES Atkinson, R.L., Richard C. Atkinson, Edward E. Smith and Daryl J. Bem (1993). Introduction to Psychology 11th ed.. United States: Harcourt Brace College Publishers. Bandura, A. & McDonald F.J. (1963). The influence of social reinforcement and the behavior of models in shaping childrenââ¬â¢s moral judgments. Journal of Abnormal and Social Psychology.à 67, 274-281. Bodrova, Elena (2005). Vygotskyââ¬â¢s Developmental Theory: An Introduction. In Davidson Films Homepage. Retrieved Oct. 29, 2006, from http://www.davidsonfilms.com/develope.htm Chomsky, N. Review of B.F. Skinnerââ¬â¢s Verbal Behavior (1959).Language, 35, 26-58. Gillespie, C., Beisser, W. (2001). Developmentally Appropriate LOGO Computer Programming with Young Children. Retrieved Oct. 29, 2006, http://www.aace.org/dl/files/ITCE/ITCE2001-229.pdf Hakuta, K. (1990). Bilingualism and Bilingual Education: A Research Perspective, no. 1 Washington, DC: National Clearinghouse for Bilingual Education, Spring. Miller, N.E. & Dollard, J. Social learning and imitation. New Haven: Yale University Press, 1941. Piagetââ¬â¢s Theory of Cognitive Development. In Educational Psychology Interactive Homepage. Retrieved October 29, 2006, from http://chiron.valdosta.edu/whuitt/col/cogsys/piaget.html. Skinner, B. F. Verbal behavior. New York: Appleton-Century-Crofts, 1957. U.S. General Accounting Office (1987).à Bilingual Education: A New Look at the Research Evidence, Washington, D.C.: U.S. Government Printing Office. Valdivieso, R. and Davis, C. (1988). U.S. Hispanics: Challenging Issues for the 1990s Washington D.D.: Population Trends and Public Policy. à à à à à à à à à Language development in children All the other ways of knowing are controlled by language. The appropriate use of language is central to virtually all aspects of learning and social development. Successful and appropriate language communication is also closely linked to the individualââ¬â¢s place in society, while the inability to communicate clearly hampers and may virtually eliminate a personââ¬â¢s ability to cope with even the simplest educational and social situations. The manner in which children learn to understand and successfully communicate through language is among the most important questions studied by psychologists. The appropriate use of language is central to virtually all aspects of learning and social development. Successful and appropriate language communication is also closely linked to the individualââ¬â¢s place in society, while the inability to communicate clearly hampers and may virtually eliminate a personââ¬â¢s ability to cope with even the simplest educational and social situations. Traditionally, psychological accounts of language developmentà à have been developed by theorists who have included language learning in their discussions of a general acquisition process (e.g. Miller and Dollard, 1941; Skinner, 1957). Skinner for example, believes that language is learned in large measure by waiting for children to emit approximations of the forms of speech which are ultimately desired and then by gradual shapingà à (by parents or other socializing agents) until the correct sounds and sentence forms can be reproduced in appropriate situations with a high degree of fidelity.à à à à à à à à à à In contrast, some psycholinguists (e.g. Chomsky, 1959; Fodor, 1966) haveà à cogently argued that operant learning theory cannot adequately account for complex verbal behavior. Chomsky (1959) offers the following pregnant critique of a ââ¬Å"conditioningâ⬠viewpoint: â⬠¦it seems quite beyond questions that children acquire a good deal of their verbal and non-verbal behavior by casual observation and imitation of adults and other children. It is simply not true that children can learn language only through ââ¬Å"meticulous careâ⬠on the part of adults who shape their verbal repertoire through careful differential reinforcement, though it may be that such care is often the custom in academic families. It is a common observation that a young child of immigrant parents may learn a second language in the streets, from other children, with amazing rapidity, and that his speechà à may be completely fluent and correct to the last allophoneâ⬠¦ A child may pick up a large part of his vocabulary and ââ¬Å"feelâ⬠for sentence structure from television, from reading, from listening to adults, etc. Even a very young child who has not yet acquired a minimal repertoire from which to form new utterances may imitate a word quite well on an early try, with no attempt on the part of his parents to teach it to him (p. 42). Numerous experiments have now disclosed that principles for generating novel responses can be acquired through the observation of others (for example, Bandura & McDonald, 1963; Bandura & Mischel, 1965). If principles of language usage, rather than mere words can be shown to be acquired through observational learning, then this would provide at least a partial account of the process of language acquisition. The classic experiment in this area was conducted by Bandura and Harris (1966). They were interested whether second-grade children could make up sentences that included prepositional phrases and the passive voice. The children were tested first during a base rate period and then again after some form of intervening training. The results demonstrated that the children showed a greater increment in the production of the relevant construction in their sentences (than did the control group) if they were exposed to a combination of (1) an adult modelââ¬â¢s production of sentence3s with and without the relevant construction (2) reward to both the model and the observer for sentences containing the relevant construction and (3) attention-focusing instructions. This study clearly suggested that childrenââ¬â¢s language productions might be modified through modeling in conjunction with other procedures. It is likely, however, that the children in Bandura and Harris experiment had been exposed to prepositional phrases and the passive voice many times in their lives prior to entering the experimental situation. Therefore, the question still remained as to whether children could actually acquire new or novel language rules as a function of observation. Indeed, language is important and in fact, traditionally, psychological accounts of language development have been developed by theorists who have included language learning in their discussions of a general acquisition process (Miller & Dollard, 1941; Skinner, 1957). Skinner, for example, believes that language is learned, in large measure by waiting for children to emit approximations of the forms of speech which are ultimately desired and then by gradual shaping (by parents or other socializing agents) until the correct sounds and sentence forms can be reproduced in appropriate situations with a high degree of fidelity. This is a fair representation of the interrelationship between perception, emotion, reason and language, for numerous experiments have now disclosed that principles for generating novel responses can be acquired through the observation of others (Bandura & McDonald, 1963) If principles of language usage, rather than mere words, can be shown to be acquired through observational learning, then this would provide at least a partial account of the process of language acquisition. In the area of linguistic diversity, researches reveal that in spite of enormous impact that language has on childrenââ¬â¢s schooling, lack of English skills alone cannot explain the poor academic achievement of students. It is tempting to fall back on this explanation and thus count on simple solutions to solve the problem. Cuban students, for example, have the highest educational level of all Latinos, yet they are the most likely to speak Spanish at home. (Valdivieso & Davis, 1988). However, the fact that students speak Spanish is treated by many teachers as a problem. There is also evidence that teachers interact more negatively with students who do not speak English than with those who do. (U.S. General Accounting Office, Bilingual Education: A New Look at the Research Evidence, Washington, D.C.: U.S. Government Printing Office, March 1987). Thus, this is where the emotion and perception side come in the picture. Because if this is the case, then the language dominance of students is not the real issue; rather, the way in which teachers and schools view their language may be even more crucial to student achievement in acquiring knowledge. How language and language use are perceived by the schools and whether modifications in the curriculum and imparting of knowledge are made as a result are important factors to keep in mind. The fact that English speakers rarely have the opportunity to enter bilingual education programs reinforces status of these programs. This is where the methodology of knowledge is more important than the knowledge itself. According to Jean Piaget, what differentiates humans from animals is humanââ¬â¢s ability to do ââ¬Å"symbolic abstract reasoningâ⬠[Piagetââ¬â¢s Theory] and this forms the basis for the constructivist theory in learning and instruction [Ibid.]. During his experiments, he observed that children think differently from adult and answer questions differently, but it does not mean that children are dumb [Ibid.]. Piagetââ¬â¢s theory had two major aspects: the process and stages of cognitive development [Ibid.]. The process of learning and acquiring intelligence of children is influenced by ââ¬Ëschemas,ââ¬â¢ which is actually the childââ¬â¢s representation to the world. The processes used by children to attain equilibrium between their schemas and the real environment are ââ¬Å"accommodationâ⬠and ââ¬Å"assimilationâ⬠[Ibid.]. It is assimilation when a child tries to fit cubes into square holes during playtime. It is accommodation when a child tries to push harder a heavier play cart with classmate- passengers than a cart with no one riding. As a child grows, schemas become more complex [Ibid.]. The stages in cognitive development of a child are divided into three: sensorimotor [infancy], pre-operational stage (toddler and early childhood), and concrete operational stage (elementary and early adolescence). During infancy, a child only recognizes an object when he or she sees it [Giants]. During toddler hood and early child hood, a child knows the direction of the right and left of an object, but the child cannot correctly think relative to that object [Ibid.]. At the concrete operational stage, a child becomes more logical in their understanding of the world. It is important that teachers of pre-school and primary schools learn to challenge abilities of children [Piagetââ¬â¢s Theory]. ââ¬Å"Discovery learning and supporting the developing interest of the child are two primary instructional techniquesâ⬠[Ibid.] to help children understand the world more. ââ¬Å"Children construct knowledge, learning can lead development, development cannot be separated from its social context, and language plays a central role in cognitive developmentâ⬠are the main themes of Vygotskyââ¬â¢s developmental theory [Giants]. Children construct knowledge in a way that Piaget had described it [Bodrova 2005]. A childââ¬â¢s learning can be measured in a level of independent performance and level of assisted performance [Ibid]. The area between these measures will result to the Zone of Proximal Development (ZPD) which increases as learning occurs [Ibid]. Both content and processes of thought is determined by the culture [Ibid.]. Higher functions in man such as focused attention, deliberate memory and symbolic thought are passed down thru teaching [Ibid.]. ââ¬Å"Learning always involves external experience being transformed into internal processes through the means of languageâ⬠[Ibid.]. Vygotskyââ¬â¢s principle taught that teachers should know the specific learning needs of a child and determine what most appropriate intervention could be done. The ZPD would eventually be filled-up if the learning needs were met thru proper teaching practice. One good practice was to devise an assessment questionnaire that would equally gauge independent performance and assisted performance, and from there, the ZPD can be quantitatively determined. By identifying the gap qualitatively, the learning needs of a child would be revealed.à à Moreover, teachers should also know how to develop a childââ¬â¢s attention to focus, improve childââ¬â¢s memory, to teach children think symbolically, and use a language game that children understand. Meanwhile, oneââ¬â¢s cultural and social upbringing affects the way a person views this. There are no assumptions or deducing involved here. One can verify the information by just looking again at the dizzying array of program alternatives in bilingual education, each claiming to be more successful than the others. In general, most research has found that bilingual programs of all kinds are effective not only in teaching students content area knowledge in their native language but also in teaching them English. This has been proven time and again to be the case in research analyses and specific program reviews (Hakuta, 1990). According to Hakuta, the most significant effect of bilingual education may not be that it promotes bilingualism in general, which he claims it does not, but rather that it ââ¬Å"gives some measure of official public status to the political struggle of language minorities, primarily Hispanics.â⬠He suggests that raising the status of these childrenââ¬â¢s native languages contributes to their opportunities for friendships with English-speaking children. Similarly, Erik Erikson as psychoanalyst taught that any person, child or adult faces specific life crisis that they have to resolve in order to perform their tasks (Atkinson 1993). During early childhood or preschool, a child develops an ability to initiate activities (Ibid. 118); teachers have to learn how to encourage or discourage them in order that the child would not feel inadequate. During middle child hood or elementary, children learns various skills such as reading and writing, but they have to interact socially with others in order to feel successful or competent, otherwise they would feel inferior. During this time, a teacher should constantly but reasonably praise a child for a job well done. The LOGO programming used with young children was believed to be supported by Eriksonââ¬â¢s theory on the psychosocial stages (Gillespie and Beisser, 2001, p. 230). LOGO is a computer programming language developed by Dr. Seymour Papert in 1980s that is loaded with MicroWorlds software. With the MicroWorlds, a child creates his own animated graphics thru self-directed activity and independently explores cause and effect. Giving children ample time to spend with LOGO programming,à building and constructing encourages children to work without making them feel guilty which makes smooth the transition of a child in his guilty-prone periodà (Ibid. p. 234). The same activities enable a child also to acquire mastery of the game in order to feel competent. REFERENCES Atkinson, R.L., Richard C. Atkinson, Edward E. Smith and Daryl J. Bem (1993). Introduction to Psychology 11th ed.. United States: Harcourt Brace College Publishers. Bandura, A. & McDonald F.J. (1963). The influence of social reinforcement and the behavior of models in shaping childrenââ¬â¢s moral judgments. Journal of Abnormal and Social Psychology.à 67, 274-281. Bodrova, Elena (2005). Vygotskyââ¬â¢s Developmental Theory: An Introduction. In Davidson Films Homepage. Retrieved Oct. 29, 2006, from http://www.davidsonfilms.com/develope.htm Chomsky, N. Review of B.F. Skinnerââ¬â¢s Verbal Behavior (1959).Language, 35, 26-58. Gillespie, C., Beisser, W. (2001). Developmentally Appropriate LOGO Computer Programming with Young Children. Retrieved Oct. 29, 2006, http://www.aace.org/dl/files/ITCE/ITCE2001-229.pdf Hakuta, K. (1990). Bilingualism and Bilingual Education: A Research Perspective, no. 1 Washington, DC: National Clearinghouse for Bilingual Education, Spring. Miller, N.E. & Dollard, J. Social learning and imitation. New Haven: Yale University Press, 1941. Piagetââ¬â¢s Theory of Cognitive Development. In Educational Psychology Interactive Homepage. Retrieved October 29, 2006, from http://chiron.valdosta.edu/whuitt/col/cogsys/piaget.html. Skinner, B. F. Verbal behavior. New York: Appleton-Century-Crofts, 1957. U.S. General Accounting Office (1987).à Bilingual Education: A New Look at the Research Evidence, Washington, D.C.: U.S. Government Printing Office. Valdivieso, R. and Davis, C. (1988). U.S. Hispanics: Challenging Issues for the 1990s Washington D.D.: Population Trends and Public Policy. à à à à à à à à Ã
Renaissance Women, Hallmarks, Art
The Hallmarks of the Renaissance a. Individualism b. Secularism c. Antiquity d. Skepticism 2. Renaissance Art Renaissance Women ââ¬â Men married younger women ââ¬â Resulted in many widows ââ¬â Women could inherit property ââ¬â In charge of nurturing children O Some say that's why the arts.. ââ¬â Upper class women enjoyed high degree of freedom ââ¬â Still expected to obey husbands- still unequal Isabella detest (First Lady of the Renaissance) ââ¬â Window ââ¬â Leader of Mantra ââ¬â Patron of the arts ââ¬â Founds school of girls O Liberal arts O Learn poetry and literatureO Dancing ââ¬â O Music O To entertain Catherine De Medici ââ¬â Italian married into ââ¬â Three sons became king of France ââ¬â Controls the law ââ¬â Architecture O Wing to the Louvre Laura Cerate ââ¬â University of Pravda O Moral education ââ¬â Wrote letters about life Christine De Paisa ââ¬â ââ¬Å"The City of Ladiesâ⬠O Should carve out own place in society O If they don't give place in society, should leave and create our own The Hallmarks of the Renaissance Antiquity: a renewed interest in ancient Greek and roman civilizations. Italians copied the ancient Roman lifestyle The study of the Greek and Roman classics led to humanism Humanism: the attempt to understand human nature through a study of pagan antiquity and Christian thought. ââ¬â humanists believed that there were no limits to what human beings could accomplish- HUMANS CAN DO ANYTHING! Individualism: Medieval people usually saw themselves as members of a group. (Asia- group; West- themselves) ââ¬â Renaissance people believed in individual will and genius. Secularism: One becomes concerned with materialism rather than religion. ââ¬â People became more concerned about money and the accumulation of wealth.Interested in pleasure and the enjoyment of life on Earth Renaissance Art Anatomy ââ¬â humanism ââ¬â Humanism was represented by a renewed interest in man ââ¬â Expressed in art through a renewed interest in anatomy ââ¬â Dad Vinci ââ¬â dissected corpses illegally! ââ¬â Michelangelo sculpture of David demonstrates the detailed attention paid to anatomy O Classical Greek style Perspective ââ¬â vanishing point ââ¬â Disappearing lines ââ¬â Horizontal lines Antiquity ââ¬â Greek and Roman Allegory of Spring The School of Athens O Plato and Aristotle O World up and down ââ¬â Reading ââ¬â Discussions Love of Nature
Monday, July 29, 2019
Ogallala Aquifer Assignment Example | Topics and Well Written Essays - 500 words
Ogallala Aquifer - Assignment Example or the irrigation of one fifth of all the croplands in the United States which infers that it adds up to 30% of the water used for the source of groundwater irrigation in America and fueling the crops for their growth. There are many sort of croplands that take a big advantage of the water from the Aquifer which include wheat, corn, cotton and soybean crops. This production of grains and other agricultural products have made it possible for America to emerge as an agricultural state also and fulfill the state needs of grain quantities such as that in Nebraska and Kansas. (Guru, Horne and Kerr Centre 1). This establishes the importance of the Ogallala Aquifer and the water reserve in the irrigation process and its agricultural value in the state economy. Recently, there has been seen a dramatic decline in the water level of the aquifer and this is causing an alarm, because the domestic needs of the American citizens are met with the water drawn out from the underground aquifers and this includes almost all of the rural and half of the United States population in general. There is low water conservation and the decline has also added much to the water pollution which includes mixtures of agricultural chemicals with volume of water that leach into the ground and render the water harmful to drink. The pesticides are responsible to adding more into the source of water pollution. (Guru, Horne and Kerr Centre 2). The impact of the water decline in the Aquifer can mean crop damage, water shortage and many other agriculture related problems since, Ogallala is the largest Aquifer in the American state. Agriculture wise South Dakota and the Texas state side are the most productive agricultural lands that are widely included in the productive agricultural contribution in the world as well (Brambila). The decline in the water level also means that not only the irrigation and agricultural development of the country gets threatened but also the country will see the greatest
Sunday, July 28, 2019
Healthcare Factors that Differentiate the Status of Health in a Essay
Healthcare Factors that Differentiate the Status of Health in a Population - Essay Example Social factors include the resources that improve the living standard of a human being. However, it can be concluded that availability of health sources are dependent on the social factors that enable a person to avail all the resources necessary for having a healthy lifestyle. Such resources include proper healthy food, medicines, prompt healthcare facilities and other necessary basic amenities of life. In case of Texas, majority of people are left unprivileged due to inadequate health resources and low health insurance coverage due to poor socio-economic structure of most people in Texas. As a result, it has been observed that every year 2500 Texans die due to inadequate health facilities, lack of proper food and unavailability of medicines (Code Red Texas, 2012). To ensure good health status in the state of Texas, it is highly important for the state and social welfare organizations to ensure economic stability and awareness regarding health in the area. The state government shoul d take imperative steps to determine all the social factors that are contributing in poor health outcomes. As a result, the government should formulate a plan to enhance and improve the life standard of the people in Texas. This can only be achieved by funding and investing in economic activities, offering better employment opportunities to the people and instilling sense of social responsibility in the minds of people. References US Department of Health and Human Services (2012) Healthy People 2020 retrieved from http://www.healthypeople.gov/2020/about/QoLWBabout.aspx Lomas, J. (1998). Social capital and health: implications for public health and epidemiology. Social Science & Medicine, 47(9), 1181-1188. Code Red Texas (2012) Code Red; the critical condition of health in Texas 2012. Retrieved from http://www.coderedtexas.org/files/Code-Red-2012.pdf #Health Literacy Health literacy provides an important platform for handling health related issues for people with low income and low l iteracy rate (Marmot et al, 2006). Health decisions according to Marmot, (2007) are established basing on appropriate standards as required in accordance with existing health policies. Healthcare decisions are therefore valid and valuably relevant especially when considering proper use of newer technologies (US Department of Health and Human Services, 2012). The core substance defined according to societal needs is based on unique health actions. I have analyzed HRSA to study the health communication and the use of technology in health and how it benefits different people. The website (HRSA) provides coherent and in-depth information on each and every disease and other health related issues. It targets the audience within the US and also provides assistance to people living outside of the US through emails and online support. For people unfamiliar with English, it provides all the details in Spanish as a second language. Visuals have been applied and have offered a better level of a ttaining the required information. The use of pictures provides better understanding even to the non healthcare readers to acquire the first hand knowledge and the concept. It could have been more understandable for them if the pictures contain further information regarding a specific disease. The readability ratio on the
Saturday, July 27, 2019
PAPER ASSIGNMENT Part2 Research Example | Topics and Well Written Essays - 750 words
ASSIGNMENT Part2 - Research Paper Example This paper gives a detailed analysis of the building with focus on the materials used in its construction, form, size, number of rooms, historical background. The buildingââ¬â¢s location, political, social, economic significance is also covered. The construction of the current building known as the Buckingham Palace started in 1703 after William Winde developed its design (Mellett 196). Since then, it has undergone several remodeling and renovation phases that have led to its current form. Despite its old age, the building looks attractive and glamorous courtesy of the high profile type of materials used in its construction. In particular, the building was built using quality materials that include stones, limestone, natural artifacts, bright colored scagllola, concentrated cement, ballast, strong metal and creamy scheme. The materials have enabled it to remain stable to date. Its designers were keen to developing a building that would stay new and strong for long a fact that was indisputable. The building is located in the city of Westminster, and it acts as the official residence of the UKs monarchy. It also serves as the Monarchââ¬â¢s principal workplace where he discharges his official functions (Mellett 196). Many leaders have been using the building due to its quality, design, and strategic location. Preference of the building by the subsequent leaders is attributable to its spacious nature, quality, superior design, and serene location. Similarly, it has several rooms that are fully furnished with pertinent incentives that support good life. Buckingham Palace is a well-structured building that measures 24 meters in height and sits on over 77,000m square meters of floor space. It has a large garden that accommodates many vehicles and various activities. The palace has over 775 rooms that are well fitted with quality fixtures and fittings that are ever attractive (Mellett 197). The rooms include 19
Friday, July 26, 2019
Marketing projectthe puzzle phone Essay Example | Topics and Well Written Essays - 1250 words
Marketing projectthe puzzle phone - Essay Example Although there are many other companies operating in the mobile phone industry but in terms of market share iPhone and Samsung are the leading brands. However for surviving in such a competitive market our company is offering some specific features that will help us create product differentiation. Puzz phone is a phone with distinctive, advanced and innovative features at affordable price. Our pricing strategies are very much different from our competitors as we are offering customized products at affordable price. Puzz is also trying to come up with new innovative technological features in order to compete with brands like Samsung. Puzz phone offers more variable features to its customers and that is what will help us to attract new customers. Our company also takes lesser time to assemble customersââ¬â¢ product. There are various factors that are considered to be the strength of Puzz Phone, however the important ones are its price and high customization. We offer variability in price so customers are allowed to choose according to their preferences. The price advantage provided by Rubik incorporation helps attracting a lot of customers. High customization helps customers selecting the features of their own choice. The demand of every customer is different from the other. Puzz phone helps people to express their own different character and personality through their phones. There are some features of the phone that do affect the brand image. These features are the low productivity and efficiency of the phone. The high customization being offered by the company does affect the productivity of the brand. The company however is trying to overcome the drawbacks in order to cater with the complaints of the customers and establish long term loyalty of the customer. Rubik incorporation is also trying to adopt useful marketing strategies for fulfill their mission and vision. The mobile phone industry is considered to be the
Thursday, July 25, 2019
Bullying and Zero Tolerance Policies Essay Example | Topics and Well Written Essays - 2000 words
Bullying and Zero Tolerance Policies - Essay Example From this table we can see that parents are not particularly satisfied with the solutions they have experienced and they would like to try out the zero tolerance policy. Also, we can see that there have been many instances where their children have been targeted to bullying activities and have been the victims. Parents are more willing to try out zero tolerance, and believe that it would work more effectively and efficiently. We can see that a higher percentage of parents think that their children are the victims instead of them being the bullies. Thus, from this we can easily say that parents have a biased opinion towards their own children. Parents think that of zero tolerance policy was to be introduced their child would engage less in such behavior but it is not fro sure that this is what would happen. The bullies could retaliate to this policy which would result in higher bullying activities. One major limitation is that the sample size is not large enough to make generalizations. Students hold very differing views than parents. The children admit that they have engaged in bullying behavior more often than they have been a victim. The children agree that a zero tolerance policy would work and they would engage in bullying behavior less if it were to be followed. ... The bullies could retaliate to this policy which would result in higher bullying activities. One major limitation is that the sample size is not large enough to make generalizations. The Student's Perspective The students were asked the same questions as the adults. Questions Percentage say 'YES' Percentage say 'NO' Have you ever been the victim of bullying Have you engaged in bullying behavior Were the bullying incidents in which you were involved resolved to your satisfaction Do you feel that a zero tolerance policy towards bullying would help to prevent future episodes of bullying Would you be less likely to engage in bullying behaviors if there was a zero tolerance policy Would the potential negative consequences of a zero tolerance policy which does not take into consideration any special circumstances outweigh the potential benefits of such a policy 35 19 51 38 57 53 65 81 13 62 43 47 DiscussionStudents hold very differing views than parents. The children admit that they have engaged in bullying behavior more often than they have been a victim. The children agree that a zero tolerance policy would work and they would engage in bullying behavior less if it were to be followed. This may be because the zero tolerance policy is something that they fear because if the child is caught bullying he is scared that he would be expelled from school and his/her parents might find out. Limitations As we have seen zero tolerance being introduced for other problems such as school shooting and drugs, children who are determined will continue to carry out wrong behavior. In this way this policy may not work as students may not take it
Wednesday, July 24, 2019
Euthanasia should not be treated as a crime Research Paper
Euthanasia should not be treated as a crime - Research Paper Example This holds more relevant when human rights i.e. basic rights of the people which are utmost important to lead a dignified life in the society are not enjoyed by them. The exposure to critical diseases like cancer and AIDS will make any person psychologically very weak and he may develop an element of pessimism towards his life. Some of the diseases like vitiligo and other skin diseases may lead to skin discoloration and they may be subjected to social boycott and hence leads to stigma and schizophrenia. In these circumstances, the mental strength of the patients may be affected significantly leading to a thought of ending life. In addition, the access to sound financial resources plays critical role in deciding the mental strength of any person. It makes people to go for better health care and education and social prestige in the society and hence their view towards life will be highly optimistic. On contrary, the people who are financially weak or bankrupt, they face lot of challeng es in the form of ill health status, social prestige and poor education and hence they may become disinterested to continue their life. Hence, in the event of poor financial status, exposure to critical and life taking diseases and lack of access to basic human rights, the people may feel that they are not going to enjoy a quality life in the society and they become highly pessimistic towards leading their life. Let us critically analyze the above mentioned factors one by one. 1. Human Rights Human rights also represent the right to quality of life and right to die along with right to dignity (Griffin, 2008). At any circumstances human rights must be protected or honored in the society. When a person is denied for the access to good health in nursing homes, and good working environment for the workers and lack of reasonable freedom to prisoners, it is understood that the right to dignity is at stake and hence the person may feel highly depressed with out any optimism to lead life (P itcher, 2010). Similarly, when a person is not enjoying good quality nutrition due to lack of access to food along with poor quality family life, his right to quality life is at danger. Their right to die might be considered as a human right due to exceptionally poor quality life and mental trauma and pessimism. It also comes under personal freedom, a basic human right to take decision about their lives. It is easier to argue that no body should be allowed to take their lives on their own under some legal clauses in some nations. However, it is equally important to note that the mental torture enjoyed by them due to lack of access to basic amenities is quite phenomenal. Unless we become successful in reversing the scenario in the form of provision of basic access to education, health and food to all people, we canââ¬â¢t change their idea of taking their lives. 2. Diseases In addition to issue of human rights, diseases play vital role in shaping the personââ¬â¢s thoughts about his life. Many patients with serious illnesses have transient thoughts about ending their lives (Carter, 2010 ; Smith, 2006) in the form of euthanasia or mercy killing. Hence, the moral grounds of euthanasia or mercy killing needs to be examined thoroughly before coming to a conclusion whether euthanasia should be treated as a crime or not (Hermsen and Have, 2002). It was reported that about 26% of physicians were
Samsung Electronics of Korea Essay Example | Topics and Well Written Essays - 500 words
Samsung Electronics of Korea - Essay Example The long-term vision of the chairman and their ability to exploit the potential of the changing preferences of the customers became the main mantra of Samsungââ¬â¢s success in the highly competitive field of electronic gadgets. Currently, Samsungââ¬â¢s products and services are known for their quality innovative product lines which are also cost-effective. It has developed its core competencies to a formidable extent and offers stiff competition to electronic majors like Sony, Nokia, Phillips etc. by continuously coming up with ever new features in all its products à The basis of Samsungââ¬â¢s current business model is its speed based innovative products. The company focused on its strategy of developing research and engineering skills so that it could improve and improvise innovatively on the electrical and digital products of Sony, Phillips, Matsushita, and Nokia. Samsungââ¬â¢s ability to launch its own products with added features with a great speed was a huge success with the target population. Samsung had geared its teams of professionals to keep a strict watch on the peopleââ¬â¢s pulse and was, therefore, able to anticipate their demands and used to come up with new products and features that were envied by its rivals. à Another factor that had contributed to its success was that it had realized early the fickle nature of peoplesââ¬â¢ preferences which rapidly evolved with the changing times.
Tuesday, July 23, 2019
What changes in Americans values and lifestyles signaled the rise of Essay
What changes in Americans values and lifestyles signaled the rise of consumer culture - Essay Example In politics, consumerism has been applied to symbolize something quite diverse known as consumerist movement, consumer activism or consumer protection. This strives to inform and protect consumers by demanding practices like product guarantees, honest advertising and packaging, and better safety standards. Therefore, in politics consumerism is a set of rules that are aimed at regulating the methods, services, and products. In addition, they regulate the standards of advertisers, sellers, and manufacturers in the benefits of the buyer. In the economic domain, consumerism denotes to financial policies putting weight on consumption. In a theoretical sense, it is the deliberation that the free selection of consumers must strongly direct the selection by producers of what is manufactured, and thus direct the financial organization of a society. In this case, consumer culture articulates the idea not of one voice, one man, but of one voice, one dollar that might not reflect the contribution of an individual to society1. Since the completion of the twentieth century, the economics, politics, and culture of the Americanââ¬â¢s has been remodeled by the rapid increase of consumer culture. In what has been purported to be the progress of the vicarious leisure class, and its difference from the overall body of the employed class, orientation has been made to an additional division of labor between the dissimilar servant classes2. A single part of the servant class, mainly those individuals whose job is vicarious leisure, emanate to carry out a new, lesser range of responsibilities- the vicarious consumption of goods. The most common form where the consumption happens is viewed in the wearing of uniforms and the livelihood of capacious servant quarters3. A scarcer, less effective, less obstructive, and widely prevalent form of vicarious consumption is the clothing, food consumption, furniture and dwelling by the woman and the rest of the national establishment. Noticeable
Monday, July 22, 2019
Shared Talking Styles Essay Example for Free
Shared Talking Styles Essay Talking styles plays an important part of the communication in our everyday lives. These styles can both hinder and help communication. It is especially true in close relationships with others. This essay will discuss the article ââ¬Å"Shared Talking Styles Herald New and Lasting Romanceâ⬠as well as discussing the accuracy of a language style matching program and whether or not the language style matching is a comprehensive way to predict quality in an interpersonal relationship. Therefore, according to the article ââ¬Å"sharing Talking Styles Herald New and Lasting Romance,â⬠ââ¬Å"a subtle, surprisingly ordinary type of playful and teasing lies at the heart of romance. Love flames get fanned when a man and women similarly employ words such as, I, it, but, and under in everyday conversationâ⬠(Bower, 2010). These words seem so little however, mean so much when used romantically. Nevertheless, the article also discusses different aspects on how those that truly hate each other can show a high amount of language style. That means those who are fighting tend to talk in similar ways. If two people like and understand each other, they will use similar wording regardless of the different nouns and verbs that they may use to communicate with each other. One way of testing this kind of communication, is a website, which will provide results of language style matching. I took a few emails that my significant other and I shared between each other while he was in Mexico working. From those emails, we only matched at 48 percent. Given the information, I feel that the results were inaccurate. I do believe that this program may present accurate results when there is enough information in the emails or text messages that are input into the program. The emails did not present much information as with our conversation we had on the telephone. I believe that this program can show a lot of good information when there is enough text for the program to do an appropriate result. This kind of can improve the aspect of how people see their relationships. I also believe that the language style matching can be a comprehensive way for the quality of interpersonal relationships to be predicted. This is not something that is needed for relationships to work; however, it is a tool that can help a couple to see at what percentage they are similar in how they speak. This can be a good tool for those that have trouble understanding each other as it will tell them what their language match percentage is. I do not suggest that you should base your relationship on the score; however, this can open each otherââ¬â¢s eyes and how they can focus on a better way of and work on their communication style. Interpersonal relationships require a level of understanding. This is especially true in a romantic relationship. Talking styles can also be effected by self-esteem. ââ¬Å"It is desirable to have high self-esteem. However, some individuals have such a high opinion of their self-worth that they believe they are better, more deserving, or more special than others do. An inflated self-image or extremely high self-esteem can negatively affect your friendships, work relationships, and romantic relationshipsâ⬠(Sole, 2011, Sec 3. ). Nevertheless, it does not matter the talking style, the self-esteem can have an adverse effect on the understanding or what you want those around you to understand. This essay discussed factors of talking styles. It described the article ââ¬Å"Shared Talking Styles Herald New and Lasting Romanceâ⬠as well as discussing accuracy in a language style-matching program. Talking styles are very important aspect in the communication that we use in our lives. Talking styles change the way that our communication is understood.
Sunday, July 21, 2019
Internet Threats and Security for Protection
Internet Threats and Security for Protection Introduction Technology is still under development in Saudi Arabia and has not reached the advance level as its reached in UK and USA. Therefore Internet Security is still a main as well as a major issues to most businesses and organisations in Saudi Arabia. Media hype surrounding the topic of Internet security can scare the general public, as the novice users. The continual talk of the latest virus alerts, which have corrupted thousands and stories of teenagers hacking into networks and stealing numerous informations such as personal details, credit card details other details which relates to different institution, is enough to put anyone off the idea using their personal details over the Net. All this media hype needs to be addressed to see if it is just that, or is there a ground for all this sensationalism. The chances to actually undergo extensive research and establish leads and ideas that I have not come across before about Internet Security, it is a major challenge for me and I feel that by conducting this research it will broaden my knowledge about Internet Security and also make people understand the aspects of Internet Security which they havent come across before. Abstract This dissertation looks at the question: ââ¬ËIs The Internet Secure?. Where secure is defined as ââ¬Ësecure enough to trade or pass information via the Internet. With the constant media hype of Internet Security, it felt that this title to be one of interest and appealed. Therefore, research include, determining what types of organisations are present on the net, and categorising them into several groups. Studying past literature to determine all possible threats on the Internet and then to discuss possible solutions to these threats. As society is in the information revolution, in which the Internet is the main channel for distribution, this area of research is related to each and every one of us. Internet trading is a common practice amongst the new age. However, this is a subject that needs to be addressed to see whether all this ââ¬ËMedia Hype is just that, or is their just grounds for concern. With the number of users on the Internet growing daily, and businesses becoming completely dependant on technology, serious issues of vulnerability need to be looked at. To ensure that no gaps appear in the security aspects of Internet, which will in turn trap the new users. Conclusions where made by in viewed and researched based companies. This research aims to provide the reader with a deeper understanding of Internet Security. The Internet is a medium that will be a part of future generations, and it is paramount that it is managed correctly and to ensure it does not have devastating consequences for those involved in its operation. The research carried out draws the conclusion, that the Internet is not a secure for trading, and that a regulatory body is required or a more structured policing. Therefore more actions from organisations are needed as well as from the government. Future research can concentrate on data recovery methods, application methods and interviewing in more depth and on a longer scale. Acknowledgement Chapter Outline Chapter1: The introductory of this chapter starts with the definition of I.T security. It follows on with what the aims and objectives are and the methodology followed during the fact finding exercise. The chapter outlines the scope and the limitations of the project. Chapter 2: This chapter describes how the internet was formed and how it has developed. Finally it highlights the key developments of the internet throughout its early life cycle, and the growth of its user base. Chapter 3: Defines the types of businesses that trade on the net categorising them into several divisions, which are further explained in the appendix. This chapter also talks about on-line banking and how to purchase over the Internet. Chapter 4: Starts by discussing the potential threats of viruses, how they work and how they spread. It also discusses what different authors believe to be the main threats of the Internet. It also talks about all the potential threats and briefly defines each one. Chapter 5: Discusses the potential answers to the security issues, broadly discussing all of the security applications available. The chapter introduces computer security as well as the different application. Chapter 6: The fact finding stage highlights the responses gained from the organisations, which were interviewed. The findings were incorporated into graphs to illustrate the answer. Chapter 7: To conclude this study, the author discusses what the project aims were, how the findings were achieved and why came to this conclusion. A SWOT analysis was also carried out to assist the conclusion. Appendix: Any information that did not fit in the thesis, which the author felt important, is included in the appendices. There are also other documents and information, which has been referenced in the dissertation in the appendices. I.T security as defined in this dissertation is the practices, procedures, applications and services which ensure a security breach or loss of use of a computer system does not occur. Security provides protection for IT system resources from human action. The security products, services and procedures used will aim to protect any hardware or data in the system. 1 Introduction Media hype surrounding the topic of Internet security can scare the general public, as the novice users. The continual talk of the latest virus alerts, which have corrupted thousands and stories of teenagers hacking into networks and stealing numerous informations such as personal details, credit card details other details which relates to different institution, is enough to put anyone off the idea using their personal details over the Net. All this media hype needs to be addressed to see if it is just that, or is there a ground for all this sensationalism. 1.1Human Action Human-inspired security breaches are defined as accidental or deliberate, passive or active attacks, which result in the loss or damage of I.T system hardware, software or data. This can come in many guises, as the following shows: Viruses where a program is placed on a system with the intention of corrupting its processing. The theft of data. Hacking deliberately gaining unauthorised access to a computer system. The invasion of privacy, through the unauthorised disclosure of data and breaches of data protection legislation. Sabotage interfering with the processing of a system, such as the placing of a ââ¬Ëclone machine. 1.2The Key areas of I.T Security I.T security involves a number of key areas. The most important of these are introduced under the following headings. 1.2.1 E-Commerce E-Commerce (Electronic Commerce) enables measures to secure web merchants sites from external hacking and intrusion, with the aim to develop secure online transactions. E-Commerce requires the means to engage in electronic transactions without the fear that credit card details and bank details could get into the wrong hands. These involve, for example, the use of secure payment servers and secure software servers. 1.2.2 Network Security The aim of network security is to create a secure environment in which the users can send classified information and business applications solely to those people that they wish to receive them, preventing others from accessing the data. This is an issue of increasing concern, given the growing importance of networks to companies. This aspect of security tends to resolve around using network management and security software tools, and developing network security policies. 1.2.3 Virus Protection To prevent computer viruses from infecting I.T systems, companies use anti-virus software and alert systems. The requirements for information security as well as the type of products and services used to have undergone a major transformation since 1995. The need for security has widened, where traditionally it was confined mainly to governments, protecting classified data, financial institutions and protecting messages with monetary value, today most medium-sized to large organisations require information security. The growth of computer networks, group working and mobile working, and the subsequent need to communicate with contacts outside the organisation, has made I.T systems more open to external forces and more vulnerable to internal action. Today, security is demanded to handle communications through the internet, intranet, extranet and Virtual Private Networks (VPNs). All of these technologies use common, standardised networking protocols and such networks are exposed to greater security threats than before. In a modern computer network, employees share information with each other, and companies share information with their suppliers, partners and customers. This calls for a more sophisticated security system, which is more comprehensive and flexible than the products and services used in the past, and which can be deployed to a large number of users in a consistent, manageable and secure fashion. 1.3 Aims and Objectives Introduce and provide an overview of the development of the Internet. How it was started and how it works. Identify the diverse nature of businesses that trade on the Internet, their roles and their functions. Identify and disseminate the literature available on threats inherent in the use of the Internet including viruses and secure transmission of data. Identify and discuss the appropriate solutions for any potential threats for internet security. Evaluate and conclude the arguments, to discuss potential ways of enforcing a suitable security policy for web-based companies. 1.4 Methodology Information for this study was gathered from journals, books, Internet sources and certain company documentation pertaining to Internet security. The best form of methodology for this type of research would be to use Quantitative and Qualitative analysis as well as the use of secondary sources, as mentioned. Quantitative research was used to gain rich information, basically finding out the ââ¬Ëexperts opinions from the relevant areas of expertise, for the research. The qualitative research consisted of a questionnaire with open ended and some closed questions. The main aim of this questionnaire was to elaborate on the authors literature review, basically agreeing or disagreeing with the literature presented on this study. For the quantitative aspect of the research a short structured questionnaire was designed, this consisted of closed questions, which would give a statistical look to the fact-findings chapter. This questionnaire was distributed in Preston and Jeddah (Kingdom of Saudi Arabia). Closed question questionnaires were used to obtain the awareness of the issues presented, to gain views, beliefs and attitude to these. The questionnaires were designed to ensure easy reading, therefore overcoming any confusion on the respondents behalf. Questions were explained to ensure comple te reliability in their responses 1.5Limitations and scope of Dissertation As Internet Security is a very large topic, this author has limited his research to the following: Types of businesses on the web, categorising them in several areas. Discussing threats that past authors identified. Discussing possible solutions to these threats that past authors identified. Carrying out a first hand fact-finding excersing to either agree with the literature or disagree. Setting out the key differences. Summarising the thesis and presenting the findings. 2What is the Internet and how it started The revolution in computer networking has made it possible for personal computers able to communicate with each other. This chapter is about the Internet and basically a history of its beginning. It provides a comprehensive view of literature regarding factors that promote e-commerce and aid the new era of online banking. The scale of the Internet is awesome and therefore more and more people are connecting to the net. Statistics continues to grow on a daily basis at an alarming rate. People from all walks of life, not just the scientist, teachers and computer experts use the Internet. 2.1Origins of the Internet The Internet has its roots in a network set up by the United States Department of defence in the early 1970s (Ellsworth 1994). This network (ARPANET) was a collection of four computers. By 1996 the Internet was a collection of over 50,000 networks. The methods they slowly developed included a ââ¬ËProtocol (which is a computer language) allowing dissimilar computer systems to communicate, and a method that routed data through multiple communication paths using groups of data with their own destination addresses built in packets. Prior to this technology, even with machines that were compatible, the used had physically carry magnetic tapes and insert them into another machine in order to transfer data from one computer to another. With the new technology, a computer simply has to put its data into envelope called an Internet Protocol (IP) packet, and ââ¬Ëaddress the packet correctly to send a message on the network. The philosophy was that every computer on the network could talk to any other computer. 2.2NSF Developments In the late 1980s the National Science Foundation (NSF), started expanding its own NSFNET using the technology developed by ARPANET.â⬠(Krol 192). Five supercomputer centres at major universities were created, and connections were used for e-mail, and for transferring data and information between sites. This created a communications problem, they needed a way to connect their centres together and to allow the clients of these access. ââ¬Å"In response, the NSF built its own network based on ARPANET Internet Protocol (IP) technology. ââ¬Å"(Eraase 1994) it connected these centres with telephone lines. Since the telephone lines were paid for the mile, it was obvious that each university could not be connected to a supercomputing centre, due to financial constraints. They instead created regional chains of networks, with each university being connected to its neighbours, at the top of this chain there was a connection to the super computer. Eventually any computer was able to communicate with any other computer by forwarding the conversation through its neighbours. 2.3Internet Created The NSF agreed to commercial exploitation and on-line service sprang up. ââ¬Å"CompuServe, the first of these, started in 1970 and fifteen years later claimed 3.2 million users in 20 countries. It was part owned by commercial relationships with the German group Bertelsmann and the French group Hachetteâ⬠(Winston 1998). Prodigy belonged to IBM and Sears claimed 1.4 million users. His ââ¬ËWorld Wide Web was open for business in 1992. Meanwhile a commercial Internet Exchange had been established in 1991. Large multinational corporations have been on the Internet for years, although their access has been limited to research and engineering departments. In 1992, many of the restrictions on commercial use began to change. In fact, there are already more commercial sites on the Internet than educational and research sites combined, according to statistic, commercial addresses now comprise of 51% of the network domains. The Internet is made up of over 25,000 networks that can transfer data via many routes. However, it is near enough impossible to pin down any exact numbers concerning its size due to the fact its growth is unparalleled by any other industry. Ghosh 1998 states that the Internet has been adopted faster than any other technological development. 2.4The use of the Internet Between 1993 and 1998, more than 100 million users of the Internet were estimated, and the number of sites of the WWW has grown from 130 to 4.3 million sites. As of June 1999, the Internet users population has been placed at around 170 million people. It has been forecasted that the number users will reach 350 million by 2005 worldwide. In simple terms, the Internet allows millions of people all over the world to communicate and to share. ââ¬Å"The Internet is the first global forum and the first global libraryâ⬠(Hahn and Stout 1994). Commercial businesses are the fastest growing segment of the Internet, you can gather information communicate and actually transact business on the Internet. Here are a few reasons why businesses are using the internet: E-mail is a low cost method for maintaining communication at all levels. Messages can be exchanged in minutes. E-mail is a domain for sharing information and is said to be one of the most important productivity packages around. The Internet allows businesses to be in touch with different branches and work teams at other locations. This creating a virtual community in which people are able to communicate on a daily basis. Using the Internet many organisations are able to bring a global edge to home grown businesses. For many companies, the use of the Internet creates a level playing field; smaller businesses can create an image on the network to compete with larger businesses. ââ¬Å"Many corporations use the Internet to keep a check on the rate of emerging and new technologies, and the market response to these technologiesâ⬠(Ellsworth 1994). The public information and discussion groups available on the Internet provide insight and feedback that is hard to get in any other manner. Here people from all levels of industry, exchange information on marketing research and technological developments. Having the most up-to-date information about your markets and your products allows you to keep or increase your competitive edge. In a business where the concept of getting closer to the customer prime, the internet is becoming increasingly important as well. Internet sales, where customers are sought and served on-line through Gophers and variety of virtual storefronts, are also becoming more popular. Customers can be and are sought before the sale and supported after sale. Companies are able to do actual product sales transactions on the Internet. In addition, in some cases it is possible to deliver the product via the Internet, as with software and information. Many companies have been using the Internet for the transmission of data. The major financial institutions in the world use the Internet extensively for exchanging information and files. Corporate users are now responsible for the transfer of the largest portion of data. 2.5The World Wide Web ââ¬Å"The WWW is the newest information resources to the Internetâ⬠(Krol 1992). It is based on technology called Hypertext Mark-up Language (HTML). Hypertext is a method of presenting information where selected words in the text can be expanded at any time to provide other information about the word. These words are actually links to other documents, which may be text, picture or sound format. The presentation of information on the web is much friendlier that traditional methods and the interface provides for a user -friendly environment. ââ¬Å"The combined with the ability to use any of the Internets tools within the web has been a catalyst for the rush to get on the Internetâ⬠(Ellsworth 1994). The WWW can be defined as a global, interactive, dynamic, cross platform, distributed, graphical, hypertext information system that runs over the Internet and is available globally (Lemay 2000 Online). In the early 1990s the advent of the World Wide Web on the Internet represented the tuning point for electronic ecommerce by providing an easy to use technology solution to the problem of information publishing and dissemination. The web made electronic commerce a cheaper way of conducting business and enable more diverse business activities. The WWW infrastructure is built around the following:- Web sites: A web site is a collection of web pages maintained by a college, university, government, agency, company or individual. Web age: A web page is document on the web. Web pages can include text, pictures, sound and videos. Web server: A web server is a computer connected to the Internet that makes web pages available to the world. The Wold Wide Web is a dynamic structure, and due to the popularity of this new phenomenon it is expanding rapidly. The reason for it being so popular is the fact that information can be made available to anyone anywhere in the world in a matter of minutes (Kalakota, Whinston. 1997 p.145). What types of businesses are trading on the web Business is changing. The way we do business is changing. The electronic commerce revolution is upon us, and perhaps represents the greatest single change to the way in which business operates. Companies of all sizes are now working together to establish their position and create opportunities in this world. The Internet phenomenon has result in a major shift in the way organisations do business, and how they intend to proceed in the future. Many organisations now realise that without an e-commerce strategy they will not survive. This realisation has affected, and will continue to affect business relationship of all sizes. E-Commerce E-Commerce (Electronic Commerce) is the buying and selling of goods and services on the Internet, especially the World Wide Web. In practice, this term and a newer term, e-business are often used interchangeably. For online retail selling, the term e tailing is sometimes used. E-Commerce can be divided into: E-tailing or ââ¬Å"Virtual Storefrontsâ⬠on web sites with online catalogues, sometimes gathered into a ââ¬Å"Virtual mallâ⬠. The gathering and use of demographic data through web contacts. Electronic Data Interchange (EDI), the business to -business exchange of data. E-mail and fax and their use as media for reaching prospects and establish customers (for example, with newsletters). Business-to-Business buying and selling. The security of business transactions. Electronic messaging technologies streamline business processes by reducing paperwork and increasing automation. (Kalakota, Whinston. 1997 p.54). E-Commerce today, is a very wide area of study due to its phenomenon growth and thus, can be described as an umbrella concept, which will continue to grow. Therefore incorporating a variety of disciplines and can be described as following path of a hierarchical structure. Recent technology has increased the capacity of e-commerce transactions, resulting in noticeable paradigms in a number of daily transactions. There are unforeseen benefits not only to businesses, but also consumers, the government and even on a global trade level. The technology that is responsible for taking e-commerce to a global stage is the Internet. There are also other factors that have affected the growth of e-commerce, for example, the availability of hardware at affordable costs, as well as the increased power and ease of use of operating systems and software. With the prices of computer hardware and network equipment falling, e-commerce is seen as one of the strategic investments in line with marketing goals of most business, to stay competitive, improve productivity and to deliver quality services. Commonly, e-commerce is associated with the buying a selling of information, products and services via computer networks. It is also known as the paperless exchange of electronic information, whether it is by electronic data interchange (EDI), electronic funds transfer or other similar technologies methods. Overview of E-Commerce E-Commerce, evolved as early as the days of Alexandra Bell, followed by the launch of terrestrial television and radio communications. However recent developments in technology have increased the efficiency in commerce and have placed e-commerce under the spotlight. During the mid 20th century, the channels through e-commerce took place were telephone networks, the television and the radio. In their infancy they impressed businesses and consumers, so did EDI in the early 1970s and now at present the Internet has bought back the same feelings. Below is an illustration of a generic framework for electronic commerce (Kalakota, Whinston.1997) The figure 1 below is an illustration of the e-commerce overview. Electronic Commerce B2A B2C C2A B2B The Internet Telephone Fax The Internet Telephone Fax Cable Satellite, and Digital TV Telephone Fax The Internet including EDI, marketing, purchasing and e-mail Collaborative Work Groups EDI via Internet Telecomm uniting Electronic Funds Transfer E-Mail Video Conferencing Telephone Fax Figure 1 Types of E-commerce E-commerce covers five main categories that are listed below: Business to Business (B2B) Business within Business (BWB) Business to Administration (B2A) Consumer to Administration (C2A) Business to Consumer (B2C) These are discussed in detail in Appendix 3 titled Types of Web Traders. The introduction of e-commerce has facilitated consumer to business transactions, customers learn about products through electronic purchasing. From a consumer perspective electronic commerce facilitates for the following: Social Interaction. Electronic Commerce enables consumers to communicate with each other through electronic mail, video conferencing and news groups. Personal Finance Agreement. Use electronic means to manage personal finance and management using the online banking tools Purchasing Products and Information. Allows consumer to find online information about exiting and new products and services. (Kalakota, Whinston. 1997 p.139) The explosion in Internet traffic has created other problems. Mostly worryingly, there are continuing fears that many companies offering financial services online are not providing a secure environment to clients and customers. Purchasing on the Web The Internet and the World Wide Web have dramatically changed the way consumers seek and use information online. Whether they are shopping for Information or shopping for goods and services on-line, todays consumers must learn how to manage the resources (Kelley, B Weibke, J. 2003). Most attention on e-commerce has focused on business-to-business transactions and analysts say the surging electronic business-to-business market is about to explode. On-line purchasing systems promise to streamline operations, save time and cut the costs of businesses drowning in order processing. Most buying over the Internet focuses on indirect materials, also known as non-production goods or maintenance, repair and operations. Typically, such applications let any employee order through managed access rights, non-production supplies and service from an on-line catalogue using on a web server. They simplify the process of buying day-to-day items such as office equipments, PCs and other electrical goods to run the company. According to a recent study carried out by Forrester Research (2000) has suggested that the on-line commerce will raise form à £657 billion in 2002 and reach the figure of à £6.8 trillion in 2004. The statistics suggested that more customers are shopping day by day and revenue is increasing for on-line shoppers. The view is supported by Swazey (1999) who believes that the on-line shoppers spend more time on-line shopping than normal high streets shoppers and the amount of money spent rises with the amount of time spent on-line. The view point of Swazey (1999) is similar to Ghosh (1998) as he states that the ââ¬Å"On-line shoppers tend to get carried away within the comfort of their own h omeâ⬠. However the above viewpoint have contrast in bearing to an article (Computer Fraud Security, Sept 2000, p.2) that seemed to suggest that although it may seems like everyone is on-line, but its not true. Internet Banking Internet Banking is no longer a novelty. Banks have long ceased being worried about trading via the web, and instead have embraced the newest delivery channel with enthusiasm. All clearing banks, including the connected building societies, now offer Internet based banking services and all will have an online current account in place. Some, including Barclays, Woolwich, Abbey National and HSBC have developed other channels of delivery including digital TV and mobile phone banking service. All e-banks promise busy current account users speed and convenience. There are no counter queues in cyberspace and e-banks are open 24 hours a day, seven days a week. On-line banking customers can check their balances, view recent transactions, transfers funds, set-up standing orders and direct debits and also option to pay bills on line. In the past, the banking industry was chiefly concerned with asset quality and capitalisation, if the bank was performing well along these dimensions than the banks would be profitable. Today performing well on asset quality and capitalisation is not enough. (Kalakota, Whinston.1997 p.30) The Internet is a medium that provides a new dimension and introduces much opportunity especially for banks; the main advantages are outlined as follows: Enable innovation Cost savings Increased customer base Enable mass customisation Marketing and communication Developments of non core business In a report issued by the BE Agency (2000), it states that the experts believe that the slump in high street banking due to deregulation can be revived by this new medium e-commerce, offering the potential of reviving or at least halting the decline, by raising customer service standards, increasing the choice of retail financial products, reducing the charges and giving customers a more convenient way to manage their money. It is agreed with Patterson (2000) that the banks will have to go online, his reasons being as to why banks have to adopt this new medium is ââ¬Å"in short answer to win over new customersâ⬠it is easier to leave it at that, but also the factors he has also said that it will also promote this new medium are lower cost of account servicing, cross selling opportunities, customer relations and because they have to. Customers can now deal with their accounts personally at any time from anywhere in the word for any reason. Customers can also have the same facility to compare and contrast the products and services of a multitude of banks and choose one that meets their requirements. Knowing how safe is it to use the website an
Vodafones Product Portfolio
Vodafones Product Portfolio Introduction Customer are always right thatââ¬â¢s whatââ¬â¢s is known as the principle of business regardless of what the business it is might be a retail store a manufacturing unit or even a service company the basic rule is customers are always right. The question is that why? Why are the customers always right and not the suppliers? The answer is clean and neat, the customers are the ones who facilitate the companies with revenue on which the produce the products or pay the salary to their employee and even the only source to pay off different bills. however the customers different from needs and what and since the economic resources are scares the companies have to come across different tradeoff situation where they have to choose the best possible mix of products and services that they will provide to their customers. The product mix that is decided by the suppliers are compressed in a product portfolio. A product portfolio is a method to maximize the literal value of the producible goods and services in accordance with the strategic planning by the shareholders. However a product portfolio is customized on the basis of demands by the customers and their ability to pay, another thing to add up on product portfolio is to segmenting the customers and market on which they want to focus is very important as for once the market is segmented the companies can look for more strategic marketing and operational plans. Segmenting the market can be quite easy if the companies answer one of three basic questions of marketing FOR WHOM TO PRODUCE. By these different tools and methods a company can decide on a perfect product portfolio for their market. Vodafone an international telecommunication company has been trying to plant in their foots in Qatar since year 2009 and is yet not able to capture at least 50% of the market share and the reason is imperfect product portfolio. In the project I will explain the present product portfolio of Vodafone and also give different recommendations for the company to make it better Managing customers by FISH By managing customers like fish doesnââ¬â¢t literally mean that customers are fish instead it is a short for ââ¬Å"First In Still Hereâ⬠a customer that visits a company once doesnââ¬â¢t always have to go there the next time. However the aim of every company is to keep the customers active in the organization and to supply them for endless time. The fish states that a customer who comes in for the first time should be treated in such a way that he stay in forever (Wang huges, 2014). The customers are known as rational and they may shift to any other organization it sees more value for money hence these customers need to be satisfied by dividing them into different groups such as their age, sex, attitude or even their reliability or monthly income and buying structure. Fish is not about managing customers for short term but to provide customers a comfortable environment which they carve for so that they continue visiting it again and again. In addition to this cooperationââ¬â¢s lack the trust building with the customers and the organizations loose customers due to not coming up to customer expectations even though itââ¬â¢s not the organizations faults as for the customers are so diverse and ever changing it is quite difficult to shift their resources every now and then hence it is very difficult for the companies to decide on one single accurate product portfolio. However in the next segments I would identify different techniques to find out which departmen ts or products should be removed from the organizations portfolio in order to make it effective Strategic account management Strategic account management better known as SAM is a strategic approach which comes from account management. However it is used to ensure positive and appropriate relations with different customers of the organization and it provides a shoulder to step on and freshen up relations with important and major customers.in addition to this SAM believes in providing definite customers with their specific and tailored goods and services that provide the prestige SAM has been increasingly involved in different companies due to diverse relationships required in a business community in the fields of business-business and business-customer .however strategic account management has successfully pushed the companies from no relation to very good relations with their customers and supply chain. In addition to this another advantage is that due to Strategic account management has facilitated organizations to identify different opportunities and increase income massively. Next it is seen that due to increasing number of customers, companies and competition to win the market strategic account management has been a competitive tool for different organizations to excel in the todayââ¬â¢s world also as for strategic account management facilitates organizations in segmenting the market, teaming up with supply chain, winning the loyal customers and also to increase their profits. However the main role player in the game is the product portfolio and deciding on the products with keeping the customers in mind and the aim of satisfying them. Customer segmentation Customer segmentation is known as the door to success. Once a company is able to segment its market the company is assured to enjoy profits and high loyal customer average. Different scholars talk about customer segmentation as a goldmine available to the organizations the point arises how effectively the organization segments the market. If an organization does not faithfully decide on accurate customer segmentation it is likely to face loss as for the non-demanded products would be available to the market left unsold. Without customer segmentation a marketing mix is like a disabled person as for once the market is segmented the organizations decide on the product, price, place and promotion unless and until an organization knows there the buyers of their location, what their budget is or how much they are willing to pay, what they demand or like and what offers or promotions they are looking for it is useless to supply in general public, for no one would be willing to buy the products. Finally after customer segmentation a company is required to design a product portfolio and differentiate products, prices and designs on the basis of their customerââ¬â¢s affordability and income structure. It is also identified that organizations are better off when they segment the market and on the basis of income structure of the customers as for the organizations re able to identify different product portfolios for customers who are more profitable and low cost effective. Vodafoneââ¬â¢s customers Telecom industry is known as one of the ever living industry as for rather than just being immortal the customers of telecommunication industry keeps increasing in the market. The different telecom industries in the world are able to generate new markets through the advancement of technology and derived demand through the mobile phones. In the matter of Qatar only two telecommunication companiesââ¬â¢ reside major being the Qtel and Vodafone. Both the companies are quite competitive in order to win more and more market share of Qatar .however both the companies fight on the basis of different customer oriented approaches available to utilize. Until the introduction of Vodafone Qtel had complete control of the market but Vodafone being an international telecom industry they have actively captured enough of the market share. However it is not a huge percentage or accurate to the percentage that was expected through Vodafone and the blame is in correct product portfolio. Qatar being an Arab country requires different services unlike the western population. The chart one shows the different market share captured by the telecom industries in Qatar Chart 1- In the year 2009 it is seen that Vodafone was able to capture 16% of the market share very effectively and the reason can be due to being a fresh company in the industry the customers were likely to enter into contracts with the company in order to try something new. However after the years Vodafone is able to sustain itself but no much growth is shown in the market and finally in the year 2013 Vodafone is able to capture 25% of the market share. However the market share should be increased to a much more better ratio unlike the company from year 2009-2012 Products and services offered by Vodafone: Connectivity- Vodafone product known as gateway is a signal booster for wireless connections Headsets and headphones ââ¬â Bluetooth enabled headphones Memory cards- micro and mini memory card Chargers- portable mobile and tablet chargers. Prepaid Sim cards ââ¬â extras, smart packs, calls, sms, internet over mobile, data celluar. Postpaid Sim cards- Red, Classic 100. Youth packages- Falla, anghami+. Fixed telephone lines Vodafone has divided and segmented its customers on the basis of the number of customers they are able to pull of the market. However I have turned the statistic in chart format as it can be seen below in chart 2. Since Vodafone is able to capture only 25% of the 1.8 million population in the Qatar it has a number of customers using their mobile services which touch to approximately 300000 whereas on the other hand a number of customers use fixed fines still with about 100000 and broad band connections end up to 180000. Table 1- Customer portfolio Customer portfolio is made up to identify different groups of services provided by an organization in the matter of the revenue it generates for the company due to this an organization is able to judge and understand that not all segments are the same and on which of the products the company is earning very well and which of the segments they are facing losses The most important part of any organization is to send back satisfied customers and it is only possible with the way of generating an intelligent portfolio .however an intelligent or reliable portfolio is only possible through a very tested and decided upon market segment where the organization has divided its products on the basics on what the customers actually need and what they are willing to pay for and add value to strategic accountsââ¬â¢ services and products in line with the vision the organization has and the mission it wants to reach on. A number of scholars explain that every customer or segment for instance should be treated very differently and apart for other so that they feel the services they are opting to are specially designed for them and they come out feeling prestigious. Hence in the matter of Vodafone it is very important that they decide upon a different package for every customer that pops up in their office and make him feel special in the matter if attractiveness, price and design. Below the table shows a outlook client portfolio for vodafone that displays spans and segments of clients of that the marketing strategy ought to depend on as investing on every single segment according to reports development and the relationship/service requirement. The pursuing segments embody possible attractiveness reports and supplementary reports that the firm has to strategically assess beforehand requesting each investment in their product portfolios. BGG matrix Advantages and implications of BCG Matrix Focuses attention on cash flow and needs It is quantifiable and facile to use Easy to recall words and their meanings after denoting to company units Assume colossal marketplace allocate, economies of scale, and price association BCG has two constituents such as upcoming attractiveness of SBA (growth and profitability prospect) and stable extrapolated competitive locale (if our competitive locale looks precisely as nowadays next extrapolate). Star- (growth strategy)- the product that falls in the category of stars is said to be good nowadays and good in the upcoming so kiss it, affection it but you demand to do diagnosis all the period because if gaps increases next it moves to question mark so larger do diagnosis every single period and do not stay. However in short it can be said as mobile cellular packages specially prepaid service which mean pay before you call .however mobile data packages and prepaid call rates from Vodafone is acting as start for the company and it may further generate revenues for the company Question mark- (growth strategy)- the products that fall in the category of question marks are said to be poor nowadays and good in the upcoming so you seize milk from cow and locale it in question mark as a matter of fact broadband connections are acting as question marks for the Vodafone company . However we believe that in the near future it is likely to increase sales and come up generating profits for the company. Dog- (retrenchment strategy) the products that fall in the category of Dogs they are said to be poor nowadays and poor in the upcoming so locale the dog beyond the door that is cut back from SBA .however in the situation of Vodafone it is the land-line connection and due to the advancement and common sizing of mobile phones there are a very few chances for the community to accept landlines again. On the other hand it is a hectic situation for a person to shift from one service provider to another in the matter of landlines. Hence Vodafone is not able to capture of much of the market in Qatar Cow- (stability) ââ¬âthe goods that fall in the category of cash cows good nowadays and poor in the upcoming so cash cow that is seize the milk and be it a little whereas else. Retain milking the cow that is SBA acting good nowadays but not in the upcoming so make as far money as probable now. In the matter of Vodafone I can be easily understood that the product they are talking about is specially tailored youth services which mainly include Fallah service and is meant to be cheap and for a minor call rate. However the customers of Fallah program of Vodafone has not only captured the youth but also many women and men in the community Conclusions In conclusion to this project we can understand the importance of product portfolio, how it changes the impact it has in the community and how it is able to capture the market share with regards to Vodafone it is understood how the company should work on its product portfolio and what things Vodafone is lacking in its product portfolio. In addition to this an organization is supposed to understand on what products it should produce and segment the market on the basics of the targeted segment by which the organization is able capture more market share and return back satisfied customers in the matter of Vodafone the company has no yet able to segment the market accurately and they should look towards the customers they are targeting and what they require I can justify this by stating the matter of fact of Vodafone that they are unable to provide different services to women and they are forced to come to youth Fallah packages as for it suits their needs more accurately . However finall y the Vodafone is analyzed on the basic of BGG matrix in the way that the cash cows, stars , dogs and question marks are identified. Recommendations After assessing Vodafoneââ¬â¢s client portfolio and dotted the crucial question marks reports it feels that for Vodafone it is important to own the world-class sales forces and report association qualities as grasping business-to-business and business-to-customer connections, be confidentially accountable for clients wanted aftermath, comprehend their company and necessities, being adjacent and inside grasp, resolve customersââ¬â¢ setbacks, and be creative in responding to customersââ¬â¢ needs across an innovative RD workshop Vodafone has to gaze beyond the competitive gains that they own, they have to grasp an competent client connections and report association by looking into customersââ¬â¢ needs and clarify deep vision of their customerââ¬â¢s expectations, and recognize the needs and opportunities beforehand their clients do, they have to deed as a crucial power for their clients and add worth to their services, because clients yet demand their telecom operator to d eed and present in a method that differentiate them from their matches and uphold a competitive locale in the marketplace as corporates and of sequence meets confidential needs as individual customers. Though, Vodafone has to accept additionally a Crucial Client Association (SCM) outlook that can be attained across strategizing of sales procedures and constructions Vodafone outlook SCM necessities the following:
Subscribe to:
Comments (Atom)