Thursday, November 28, 2019

Internet Technology, Marketing and Security

Introduction Internet technology has an expanded network base all over the world. This has enabled multinational corporations to market their goods and services without the need to move from one place to another. Internet marketing has improved customer relationship with businesses as it brings goods closer to the consumer.Advertising We will write a custom research paper sample on Internet Technology, Marketing and Security specifically for you for only $16.05 $11/page Learn More In fact, advancement in technology has stimulated growth of global economy as people spend less in the supply chain. It is also important to note that apart from gains in marketing, internet technology has enabled sale of goods from websites to consumers. Different payment methods have been made available for use by buyers in order to make online purchases. However, security concerns have risen with severe repercussions to both consumers and corporations. Hackers have managed t o steal personal information from these websites as well as divert funds into their accounts. Moreover, customer information has been utilized in criminal activities, which include intimidation and fraud, among others. Website security has been of great concern with several corporations reporting breaches. This includes companies like Sony, Apple and B2B platforms, among others. This paper will explore internet technology, marketing and security concerns raised by Sony. It will also explore its internet marketing strategies, competitive advantage and security breaches as well as recommend possible solutions (Sony Corporation, 2011, p. 1). Internet technology, marketing and Security Internet technology has created a new age of commerce. Customers can now shop from their comfort. Moreover, they can research on viable products for usage through the internet.Advertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OF F Learn More Internet technology has the capability of bringing together sellers and buyers from different parts of the world through a single platform of communication. In addition, it makes it possible for buyers to pay for their goods and receive them at their convenience. This has brought a new dimension to e-commerce. Marketing has been made easier for sellers and corporations with development in internet technology. Sellers also have been spared the cost of travelling abroad for marketing purposes. Besides, customer’s questions can easily be attended to through live chats. However, despite these improvements, online marketing has had countless issues that threaten to demean its gains. Some of these include fake sellers, unreliable websites and security concerns. Of great concern to both buyers and sellers are website breaches. This is mainly because hackers gain access to sensitive information about customers and these are tantamount to defamation, fraud, imper sonation, among others. Mcompanies like Sony have invested huge amounts of resources in security measures to protect their customers to no avail. Clearly, more needs to be done in order to stop this vice (Peckham, 2011, p. 1). The Corporation Sony is a multinational corporation that deals with electronic products such as desktops, laptops, televisions, play stations and movies, among others. The company has a B2B platform for selling of their products. This involves securing customer information and payment details as they pay directly or through money brokers for their goods. The company has served the world market with quality products for decades and this has built its reputation as an excellent business conglomerate.Advertising We will write a custom research paper sample on Internet Technology, Marketing and Security specifically for you for only $16.05 $11/page Learn More Customers have therefore saved private information in its many platforms wit h confidence of protection. However, if occurrences in the recent past are anything to go by, then Sony needs to work towards improving their security measures (Kark, 2008, p. 1). Corporation’s website The company has several websites, some of which are aimed at networking and marketing to improve their image. Among the websites includes sony.net, sony.com and other subsidiaries that depend on a customer’s location. Their website is highly visualized with information ranging from products, corporate, investors, news, support, customization, purchase information and innovation, among others. The website also gives information on initiatives made by Sony to protect the environment, improve customer relations and fortify security of customer information. Sony also has a B2B platform in which customers can explore and buy its products online using their credit cards, through PayPal or via money brokers. In addition, it provides a network for gaming between customers throug hout the world (Freed, 2011, p. 1). Product information The corporation’s website is well articulated with pages on product information. Sony manufactures a variety of products, which are included in its product information page. These include game, audio, key device, video and other technological devices utilized by consumers as well as markets. The company also has a computer entertainment corporation, which manufactures and distributes entertainment devices such as PlayStation consoles, portables and computers systems. This has revolutionized entertainment in the world 3D games. Product information page includes electronics such as camcorders, cameras, televisions, computers and tablets, audio phones, among others. It also includes a detailed visualized description of the products for easy understanding by customers (Sony Corporation, 2011, p. 1).Advertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Contact information The corporation has a detailed contact information page in its website with a variety of contacts depending on customers’ requirements. Furthermore, it entails details of worldwide branch contacts with email, physical and telephone contacts. It also has a form that customers can submit with inquires which are responded to as soon as practicable. The company’s contact information page is therefore furnished with information required for processing. Customization of products for customers The corporation has customized products for easier use by customers. This is aimed at providing an online support for information required by customers. Customization of products is also important in simplifying complex details of products to customers. The website has capability to provide prices of products as required by customers. For instance, different customers require varied specifications in a given product such as a laptop. For this reason, the website prov ides customization capability within the platform, which provides customers with required specifications with their prices. This is important in easing t workload of staff and requirements by each customer (PlayStation Network, 2011, p. 1). Customer information at purchase During purchase in the corporation’s website, customers are taken to a secure page where they provide their personal information and credit card detail for payment purposes. Moreover, the company works to shield them form hackers who linger around to collect customer information. Customers provide their private details like real names, age, sex, credit card information, and sometimes email, mobile and physical address, among others. This information is sensitive and requires utmost privacy because they can be used to defraud customers. The company has invested in security software aimed at protecting customer information, although this is sometimes breached as was witnessed recently (Sony Corporation, 2011, p. 1). Corporation’s Internet marketing strategies The company has put in place several internet-marketing strategies aimed at improving their presence in the world. Sony has put in place several internet-marketing strategies. These include web promotion, search optimization techniques, email marketing, through affiliate resellers, through articles, videos, audios, listing in new stories and interaction with customers. Moreover, the company has built a consumer friendly website which improves its presence among customers. In essence, the three main internet-marketing strategies employed by Sony include use of affiliate resellers like eBay, web promotions and advertisements through other media such as television, radio and sponsorships. Resellers such as eBay market Sony products. This increases the number of traffic in Sony websites, as potential buyers look for credible manufactures with quality products. Over the years, Sony has had a great presence in consumer and reselle r markets, this improves their image and internet traffic. Another strategy has been through website promotions, which are observable in most websites like fifa.com, among others. Thelps in increasing their traffic and hence sales. Another strategy used by Sony is thorough media like in television. Whenever Sony markets their product in media, they ensure that their website is well displayed on it. This enables viewers to access its website and make orders as appropriate (PlayStation Network, 2011, p. 1). Competitive advantage provided by the website Sony website has enabled it to attract more customers as they grow in confidence over its services. The website’s ability to customize consumer needs makes it more attractive than others make and hence improves the company’s competitive advantage. Another element of the website that improves competitive advantage is the quality of products and services offered. Moreover, the website offers other services such as online gam ing, which attracts more customers to it. This, together with those mentioned above improves the company’s competitive advantage. Corporation’s privacy/security policy and response to breach Security concerns have been rife in internet marketing. This has forced the company into making strategic plans for new security measures. Customer’s details are very sensitive as they can be used to compromise their privacy. Moreover, their emails can be collected for spam messages. Most hackers also try to use credit card information collected from hacked websites to transfer funds into their accounts. In this regard, Sony has upgraded their security measures with the aim of minimizing attacks on its online games. Sony emphasizes in its privacy policy that it respects right to privacy of all its online visitors. In this regard, it has put in place measures aimed at securing customer information. This is done through SCEA and ESRB privacy licenses, which ensure online prote ction for customer information. SCEA is a credible licensee, which ensures maximum privacy to those participating in online entertainment games. The latter, ESRB, is a third party privacy online, which ensures that consumer’s online privacy is protected from external breach. Sony announced a breach of security in its websites with stolen information fro its SOE accounts as well as those of out dated databases. Moreover, its customers had also received information of hacking in May. These activities led them into upgrading their systems against future attacks. It conducted investigation in consultation with other security firms and made rigorous enhancement to its overall security. This was done to improve customer protection and data security (Peckham, 2011, p. 1). Conclusion Sony tried to upgrade its security measures in order to protect customer information. This was positive and a step towards the right direction. This was not conclusive since more attacks have been witnes sed. In fact, the year 2011 has witnessed multiple attacks on its website. Thereof rein order to improve their website and customer information security, Sony needs to perform an overhaul in their security measures to ensure that such activities are never witnessed (Kark, 2008, p. 1). Recommendations and Rationale In order to avoid future attacks, Sony should refrain from going after its hackers as this increases the number of potential attacks. In the process, this may make it a target for more attacks. Some hacking groups see new security measures as challenges to their knowledge. Another thing that Sony should do is to come out and tell customers what was compromised during the attacks, this will improve its customer relation and trust for future dealings. It should also make an overhaul of its security measures and establish weaknesses for further improvements. Moreover, it should enlighten customers on how to use their websites safely without compromising information (Freed, 20 11, p. 1). Reference List Freed, A. M. (2011). Sony Stock Hammered in Wake of Security Breaches. Infosecisland.  Web. Kark, K. (2008). Security breach management: Planning and preparation. Searchsecurity.  Web. Peckham, M. (2011). Sony’s PlayStation Network Disaster: What Happens Next? Web. PlayStation Network, (2011). Privacy Policy. Playstation.com. Web. Sony Corporation, (2011). Sony online entertainment announces theft of data from its systems: Breach Believed to Stem From Initial Criminal Hack of SOE. Sony.  Web. Sony Corporation, (2011). Sony online entertainment restores game services. Sony.  Web. This research paper on Internet Technology, Marketing and Security was written and submitted by user Reese Nolan to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Monday, November 25, 2019

Fascisms in Germany and Italy essays

Fascisms in Germany and Italy essays Germany and Italy rose up under new leaders with a new type of governing policy. However, the same policies that caused growth lead to eventual collapse of these nations. Fascism grew because of extreme nationalism, fear, and governmental control. It failed due to absolute power by one man, its own aggressive nature, and lack of organization. Hitlers rise to power can be credited for many reasons. Firstly, the Nazis gave the German middle class a reason why they were having problems, and came up with a solution. As Hitler explained it by using pseudo science, the Jews were the problem and there was only one solution. Along with this he instituted mass propaganda against the Jews and for the Aryan race. This went a long way to create the kind of nationalism that Hitler was looking for. Soon most of Germany felt like a strong and united people, willing to do anything for their state and their leader. Those who were not, lived in constant fear of the Nazis. The SS and the SA policed the streets and used excessive violence whenever they felt it necessary. People were either happy to be with Hitler or afraid to oppose him. Hitler had control. With this control Hitler made policies that were actually very beneficial to the middle class. By eliminating large corporations, creating a strong military and increasing industry to e quip the military Germany began to grow. There were a lot of problems in Italy. Mussolini used fascism in a very similar manner to Hitler. The way he saw it, Italy was divided into two sections: the north and the south. The northern part of Italy was industrialized while southern almost completely agricultural. Thus, Mussolini wanted to unify the people to create one strong nation. He went about this by using his own charisma and propaganda. He spoke of the history of Rome and the strength of Italians. ...

Thursday, November 21, 2019

HRM Outsourcing Paper Term Example | Topics and Well Written Essays - 1250 words

HRM Outsourcing - Term Paper Example The question on what should be outsourced has always been a widely debated issue. This paper will explore the issues around human resource outsourcing, particularly those concerned with firm’s performance, strategic direction, ethics and corporate social responsibility. It will also evaluate these issues with regard to how they can be addressed and balanced to achieve the best performance, productivity, and efficiency. An Evaluation of HR Outsourcing One of the ultimate gains of outsourcing is the division of work and skill/expertise specialization, which results in a better outcome and performance. Business process outsourcing (BPO) including HR outsourcing is not only aimed at financial value; relevance of a strong relationship management is that it leads to value addition such as innovation and customer satisfaction (Enlow & Ertel, 2006). The importance of a healthy relationship management cannot be overlooked. According to McKinsey & Company, as quoted by Enlow and Ertel ( 2006), 50% of outsourced services fail to create the expected value. Firms find value when specialists, who can be more effective in providing services that were previously handled internally, are engaged because both the firm and the supplier can focus on what they do best to improve performance. HR outsourcing is beneficial to any firm and whatever the size of the organization, outsourcing must follow phases for it to succeed. According to Anonymous (2007, July), the use of outsourcing as a strategy proved beneficial in a large funeral and cemetery company, Service Corp. International. The company boasted of the workforce of 2,400 employees in 2,500 locations. The funeral company decided to outsource human resources services; through an advisory firm, various sources of outsourcing were used while focusing on the various phases of the outsourcing process. Because of the many administrative tasks of the company, HR outsourcing led to a reduction in costs. Outsourcing and shared ser vices provide avenues for reducing cost while enhancing efficiency in organizations. Cost cutting associated with outsourcing occurs when staff is assigned with other tasks through involvement of experts or by saving money (Anonymous, 2007, April). While outsourced members focus on their areas of expertise, organization’s staff members focus on core responsibilities. Information Technology investments may not yield results for a long time. Thus, outsourced IT services help to avoid colossal capital investment costs. Equally, the use of shared services appears to be advantageous to organizations by reducing the need for maintaining a massive workforce leading to a reduction in costs through sharing of talents and resources and enhancing productivity (Anonymous, 2007, April). Ethical issues that have been associated with HR outsourcing have included loss of employment in the host country where firms are outsourcing human resource. The practice of getting expertise and staff fro m other places in order to save costs has been perceived negatively from a social point of view by the local communities from which the outsourcing firm hails, particularly when outsourcing involves expertise or skills that are also available locally. Cultural differences are another concern of outsourcing, which has been mentioned especially among multicultural environments where different skill sets are in existence (Adobor, 2012, p.245). For example, there exist immense

Wednesday, November 20, 2019

Electrical Health & Safety Essay Example | Topics and Well Written Essays - 3500 words

Electrical Health & Safety - Essay Example There are a number of hazards faced during the usage of electricity. The following ones are important. Human body is an electrical conductor and electricity can flow through human body. If any of the materials or equipment using electricity is improperly handled, then it could cause a shock to the person operating it. This in turn, could lead to burn injuries; sometimes even death. Electricity, instead of flowing through human beings if it flows through material, then it could cause burning of the material if it has a higher resistance and is not rated to carry the current that is flowing through it now. In this case, there could be fire accidents in the place that could cause damage and loss of property. Electricity could cause fire accidents. Therefore, we can classify the loss caused by electricity into two; one, damage to personnel and two, loss to property. In either case, it is one of the following hazards that cause such happenings. 1. Ungrounded Equipment: Electricity always flows through the path of least resistance. For that matter, anything that flows always takes the path of least resistance. ... Instead if the equipment is ungrounded, then it becomes dangerous to the operators if there is a short circuit in the system. 2. Overloading : One of the major causes for short circuits is the overloading of the outlets at home or in the office. This could also happen when there is an instrument or an equipment that is running with out anybody attending to it and should there be an overload due to some internal problem in the machine, then the overload could make the equipment burn. This could cause loss to the property. Therefore, it is very important that overloading of the equipment does not occur. 3. Unsafe Equipment: There are equipments that are not made to any specific standards and are not clearly tested as well. When these equipments are used, it is possible that these equipments could cause overloading or could also cause short circuit that could lead to break of service as well could turn out to be hazardous to people using the equipment. This could also be cables and cords that are running in the office which are not to the standards and when there is a higher current is drawn might cause a break down of the cable resulting in failures. 4. Unguarded or Open Live Parts: Open live parts might be present in the office or in the factory that is considered as the most dangerous electrical situation. Similarly, plugs getting pulled out to stop supply to equipment are also not a good practice since this could cause sparking at the time of pulling out and the plug contacts are not made for this kind of breaking sparks. Working on live equipment is another major flaw of similar nature. This can happen when say, a motor which is running is to be repaired and the

Monday, November 18, 2019

Prostitution Coursework Example | Topics and Well Written Essays - 500 words

Prostitution - Coursework Example This was during the Korean war, when a tremendously high rate of sexually transmitted diseases began to affect the active soldier duty roster. Back home, prostitution is considered illegal in all U.S. states except Nevada. The reason being that Nevada has a historical connection to prostitution dating all the way back to the 18th century. According to Karah Lucas Nevada limits prostitution to legally registered brothels and towns with populations of less than 400,000 thus leaving Clark and Washoe counties out of the program (Legal Prostitution Has A Special Presence in Nevada, p. 1). The legalized prostitution program of Nevada has had a positive effect on the trade which our government should actually take notice of. Since the trade is overseen by the state, there are actually rules and regulations that insure the protection of the women in the trade, the men who partake of the benefits of the trade, and the state to whom the brothels pay business taxes to. According to Paul Armetano (The Case For Legalized Prostitution, p.1) , sexually transmitted diseases are actually controlled from spreading because of the weekly mandated testing for the prostitutes. For some strange reason, the brothels also take pride in having healthy women on their staff because it shows the quality of their â€Å"business†. Even though there are actual benefits to be had from the legalization of prostitution, such as the control of sexually transmitted diseases, protection of the sex worker, standardization of the work practice, and more importantly, additional income for the city or state, there are still those conservatives who fail to see these reasons. They choose to remain in their out-dated and out-moded world where prostitution is something that destroys lives due to the degradation and objectification of women. For those in the military service,

Friday, November 15, 2019

Advantages of Online Banking

Advantages of Online Banking Introduction In the recent years online banking has shot up where by making 21.5 million customers satisfied in using it easy, fast and most of all free services set up by banks in 2009 stated by the UK payments administration. All high tech banks offer the online banking system and most bank do not have branches only existing online. It is quite for a person to change to online banking, first the persons has to open an account with a bank or if they already have an account then just sign up for online banking with our current existing account. For security reasons the bank will provide we with a password which will enable us to activate our online banking system. These after they could log in any time they want. It is easy to open an online bank account and well worth the small amount of effort required. Even when some people are not that familiar with online applications, it is worth persisting through the process. The advantages of using online banking transactions include convenience, easier financial management, and time and cost savings. Even the environment benefits because vast quantities of paperwork doesnt need to be generated. Online banking transactions can simplify our life by reducing the stress of managing our bills and savings. They are easy to use and from the banks point of view, secure. We can have our pay deposited directly into our account and disburse it online. The old way of lining up in bank queues and keeping a track of paperwork is no longer necessary. All banks make it easier to manage our checking account by allowing our set up e-mail alerts so our can be notified when checks clear or when our balance slips below a certain level. There is also a detailed listing of our cancelled checks. Banks describe online banking as a powerful value added tool to attract and retain new customers while helping to eliminate costly paper handling, in an increasingly competitive banking environment. Nowdays, most large banks, many regional banks and even smaller banks and credit unions offer some form of online banking, variously known as PC banking, home banking, electronic banking or Internet banking. Advantages On Online Banking Online banking in this generation is becoming more and more common. Customers can do plenty of transaction just through Internet. Online banking also allows customers to keep track of record on our accounts. Customers can check on it in everywhere and anytime they want. Online banking makes their life easier and faster. Below are a few advantages of using online banking: 1. Pay Your Bills Online For the past 5 years back, bank allowing their customers to pay their bills online. By paying their bills online, customers are starting to eliminate the method by post. It is faster and users are allowed to know did their payment made or not. Customers will just have to register once and they are allowed to use it in everywhere. The banks may charge them a small amount of interest but it will be faster and immediately payment will be made. This will make their life much easier. 2. View Your Transactions Online banking does allow customers to view or check their history payment just in seconds. By now, they do not need to make phone calls to the bank and wait for the bank officer to check for our account. This also will be safer compare to make phone calls or send letters to check their payment. If any lost during the sending process by post, their password or ID will seen by strangers. 3. Transfer Money Between Accounts Online banking allows them to transfer money from one account to another account more quickly. Nowadays, many people are doing business and it may involve million millions of dollars. It will be safer if they can make transfer just from online banking. Online banking also can automated to the service centre that they are using example, phone bills, house loan, monthly purchasing newspaper and many others. 4. Download Banking Transactions If they are using ATM cards often this is a must to download their banking transactions to make sure the balances in their account are correct. This will make sure they are always on track with their account balances. They also do not have to worry about finding a place to keep all our receipts. 5. Protect Yourself Online Using online banking there are a few things that they have to take it serious. It is important that they have to protect their own informations. If they are downloading their account transaction from internet, they must remember to clear up the cookies. Passwords and user ID will seen by other people if they are not aware of this. It is very important to make sure they clear everything before they leave the website. Disadvantages Of Online Banking There are also disadvantages to online banking services. The biggest problem is that most people lack of trust, many people have doubts about the transaction, how can people believe a machine, many things can go wrong during the process. How many times have you performed transactions online and wondered whether you did the right thing? Of course, we can overcome the problem by printing the transaction receipt. This receipt will conform whether the transaction has gone through successfully. Online banking can be difficult to learn for a beginner and a site could take time to start up. Some sites ask for photo identification, which can be very inconvenient. Many people have poor eyesight. Most online banking sites provide tutorials for online banking. Some sites provide live online customer support to provide solutions for all the problems. The cases of online banking frauds are considerably low so we dont have to worry about the safety of our money. For some people, online banking is very convenient and useful, there is also people who afraid to handle the banking system. All these have been taken care of now, most banks have now started offering online banking services and a manual transaction could be done also. Maybank Online Banking Malayan Banking Berhad or Maybank is the biggest commercial bank in Malaysia. It holds many financial holders in Malaysia as well as internationally, including Indonesia and Singapore. It was founded by Tan Sri Khoo Teck Puat in 1960. Maybank has grown to the competitive advantage over the years and has more thank 300 branches in Malaysia alone. Few ages ago, the client of Maybank had to at all times go to the Maybank centre and wait for long queues to do their transaction. Nowadays, Maybank is reaching to the top and has become the first commercial bank in Malaysia to run its own on-line banking system. Maybank2u.com was created in early 2001. Not too long after that, many banking institution now has followed Maybanks step to on-line transaction. Maybank2u.com offers outstanding services to its clients, such as internet banking, on-line Islamic banking, as well as services for credit and charge cards holders, and many more. Of the entire services offer by Maybank2u busiest service is the on-line banking transaction. These consist of making payments and transferring funds by the internet. Maybank2u.com runs their own policy under the Maybank Berhad terms and regulations to make sure the security of their service is reliable to the clients. Although the security policy is not publicly stated, as it is confidential, the same security policy is being used in each and every Maybank branches in the world. This is to ensure the safety of the clients information and their satisfaction. It is clear that Maybank2u uses the Transaction Processing System (TPS) for their general information system. A Transaction Processing System (TPS) is a type of information system that helps to collect, modifies stores and retrieves collection of data transaction of an individual entity as well as an enterprise. E-business, e-commerce or other commercial businesses depend on the data reliability of their transaction processing system. This is to make sure that their client get what was asked for and payment are made on time. With Maybank2u, any kind of transaction can be made there and then. It is very time efficient especially for busy people. Transaction processing system involves the financial department. This is because most transaction occur within Maybank2u revolves around cash, credit, charges and account balances. Financial department are responsible on knowing what goes in and out of the bank and clients account. Transaction Processing System The transaction processing system offers features that could relieve enterprise transaction system to process data transactions faster in order to manage the whole enterprise data. There are particular characteristics to operate transaction processing system. A TPS is a very fast way to processing transaction virtually and is very reliable as it is designed with safeguards to manage disaster attack, so customers will not worry of data loss during a sudden disaster. It can easily be retrieved using the customers id and password at the particular service centre. Not only it is reliable, TPS is also standardized by the Transaction Processing Performance Council, meaning that the system will always process every transaction made by the user with the same way every time there is a transaction. This is to ensure the security of the system. Restricted access is implemented to TPS, so that it can only be used by the employees authorized by the system to avoid system errors. There are two types of transaction, which are batch time processing and real time processing. Batch time processing differs from real time processing because batch time processing only processes transactions once a month automatically and stores the resources later for future transaction. This is usually needed when processing credit card transaction. Meanwhile, real time processing is the kind that will update every transaction made immediately. This is important because when a withdrawal of money is being made, bank and customers account need to be updated immediately so that both parties can keep track of their funds. Therefore, both types of transaction are being applied by Maybank2u to serve the public in giving what they need. Another TPS characteristic is its durability which means that when the transaction is successful, no further changes can be made. However, in any case of failure of the system, a log will be created to store all the transaction that has been completed. Th ese common characteristic of a Transaction Processing System will make sure that the system is run systematically and standardized. Security System Nevertheless, security is a major priority to every big enterprises, especially successful commercial banking. There is a lot of security issues involved especially with dealing with on-line transaction such as purchasing items or paying for services on-line. One of the main security threats of internet banking is identity fraud. Identity fraud is not a new threat, as it has been mentioned most of the time. But, there are still people who refuse to follow rules made out to avoid this type of threat. Some retailers and stores are lacking the awareness of identity fraud. Most cases of identity fraud are having their pin code or password duplicated. Purchases by credit and charges card are made by other people but not by the genuine owner or the account. This kind of behaviour can happen anywhere at any time, especially when shopping on-line, purchasing airline and movie tickets. Maybank2u is ready for this kind of situation. For example, before processing a payment, it is shown above to the users on how to find the billing account number, so that the client will not accidentally input the wrong account number. To avoid identity thief or any other kind of identity mischief, Maybank2u requires a Transaction Authorisation Code (TAC) to undergo the payment process .Therefore, in each and every transaction made by the user, a TAC will be sent to the clients cell phone number, and once received it should be input within 2 hours into the TAC box before completing the process. The Transaction Authorisation Code will automatically expire every 2 hours to avoid any security breach to the account. When the transaction is processed is successful, it will be automatically saved into the Maybank2u.com transaction history for future user reference. Its payment receipt can also be printed for keeps. Maybank has introduced this system to be used in all Maybank centres worldwide. Maybank2u.com requires only easy set up in creating a maybank2u.com account. User can log in using their existing Maybank account. However, user needs to create an on-line password and user name to access their existing bank account. By logging into the system, meaning that the user of the account is aware of the terms and condition applied by Maybank2u.com, and is aware that the site is secure as shown on the top right of the website. Once logged in, user can access everything regarding of their account information, such as account balance, transaction history, Maybank debit transactions and banking statements. The most interesting thing about Maybank2u is that the client can access their account from home, office or anywhere with an internet connection, without worrying about the hustle of waiting especially on busy hours. Best part is, the site offers billing payment services to all main general services. Almost 300 major payees are now available including Syarikat Bekalan Air Selangor (SYABAS), Tenaga Nasional Berhad (TNB), Telekom Malaysia Berhad, MAXIS and ASTRO. It is wise to say Maybank has chosen a great transaction processing system in order to fulfill all its clients need just by one click a way. Instructions On How To Use Maybank2u Step 1. For Maybank customers, simply just create a Maybank2u username and password at the nearest ATM machine. For Non Maybank customers, the first step is to open up a Maybank bank account at the nearest Maybank service centre before creating the Maybank2u username and password. Step 2. Go to www.maybank2u.com Step 3 At the top right hand side of the website, theres an access to the login page. Click the login icon and it will direct the user to the login page. Log in as a first time user using the username and password created from Maybank ATM machine. Step 4. Once logged in, customers can access the entire account. The customer can now process their transactions by following the instructions. However, for customers that log in using public or shared computers, dare to be reminded to log out properly to avoid another mischief of identity fraud. Maybank2u also add a logout summary to guide users of Maybank2u on how to safely logout from the site Conclusion Looking at the research done we can come to a conclusion that online banking has make everyones lives easy and convenient and mostly saving a lot of their time when it comes to banking. There are a few false in online banking but there are more advantages of using online banking. In todays world technology has improved vastly and many banks have taken the upper hand on it and made banking not only banking paying bills, doing transactions, checking account balances and even online shopping easy for their customers convenience.

Wednesday, November 13, 2019

The Big Day :: Personal Narrative Writing

The Big Day â€Å"Heekin quit fucking staring at the clouds you might be playing this weekend,† screamed Coach Bernardi. All week I waited, sweating every night just wondering if Saturday would be the day I would start my first college football game. Every night I thought what I would do if I was to start, was I ready for this? I would be a little chihuahua amongst a pack of wolves on the field. But all week I had trained to the point that all the sweat in my shirt could have been rung out to make a full cup of water. My Saturday morning started just as every other football players did 10:00a.m wake up, then a short walk over to the dome for walkthroughs. Then to The Place for my usual breakfast the hungry man special: three eggs, two pieces of bacon, two patties of sausage, a portion of hash browns that was the size of my hand stretched out, and my choice of three pancakes or French toast. After that huge meal I couldn’t resist just going back to the dorms and finding a great resting place in my bed. For some reason every person in the damn dorms insisted in walking into my room and waking me up so I was not the most cheerful person when the alarm clock went off three hours later. â€Å"Trevor get you ass out of bed your late for team meal, said Bobby. No I can’t be I set my alarm for 2p.m. Yea but you have hit the snooze button five times so that means its about 2:20 right now and meal started five minutes ago.† That was a great way to get this all started walking late into team meal I could just imagine what the coaches were going to say to me when I got there. As I walk in to the dining hall I find Coach Bernardi sitting in a chair. â€Å"Damn Heekin where the hell have you been I thought you were going to be a no show! Were you afraid that you might have to play today?

Monday, November 11, 2019

MBA Answers

Explain the different activity levels of Management? A: The management of an Industry can be sub-divided Into the following different level: 1. Top Management: It consists of the board of directors and the principal offers such as the chief executive managing director and the others concerned with the general operation as distinct from some functional specialization. They are the ultimate level of authority in the operation of the enterprise. They set the objectives fine the goals, establish the policies, see the policies are put into effect and Judge the results.Livingston has described the top management's actual operation by listing it as follows: a: Decision- Making I) Origination versus confirmation or veto ii) Planning 1. Setting of goals What, How, Much, at what price, when and where. 2. Mechanism a) Process b) Structural organization and co-ordination c) Appointment of key personnel â€Å"I) Ponca 1) Definition General versus specific 2) Integration v) Implementation 1) Rele ase of authority ) Financial 1) Selection of types of funds to be secured 2) Dilutions of profit.B) Judicial I) Comparison of accomplishment with goal ii) Evaluation 1. Of accomplishment with the cost 2. Of alternative possibilities iii) Counsel In place of decision or command There are certain behavioral characteristics of top level executives given below: I. Drive pure physical energy is an absolute necessity n. A strong desire to become the top man â€Å"l. A willingness to work for long hours projecting an Image of success v. Management's effectiveness

Friday, November 8, 2019

Psychology In Lord Of The Flies Essays - English-language Films

Psychology In Lord Of The Flies Essays - English-language Films Psychology in Lord of the Flies In Lord of the Flies, by William Golding, a group of schoolboys become stranded on an island. The novel describes how most of the boys change from civilized to immoral behavior. There are no adults on this island to enforce rules and laws. As the boys loose touch with the standards of old they start to enjoy the island more and more. Eventually they are completely free of the civilized ways they were taught. When Simon came with news about the beast the others were dancing around a fire chanting, "Kill the beast! Cut his throat! Spill his blood!" They turned on him, beating him to death. They had, in fact, become the beast themselves. Like animals they had lost the feelings of compassion and remorse. The book is a psychological study of the influence of the group on the behavior of individuals. Upon arriving on the island the boys search for the necessities to stay alive. As in the psychologist Abraham Maslow's theory of human needs each step must be satisfied before you go to the next stage. The island provided plenty of food and water, satisfying their basic needs of stage one. The stranded schoolboys tried to find security by finding a way to make fire. Gradually they began to develop some rules and leaders. At an assembly only the person holding the conch could speak. As their physical needs had been fulfilled they began to form groups. According to the theory this is stage three when people want to be a part of a group and to be loved. At that point they chose to be a part of Jack's hunters or Ralph's boys. In the final stage a person learns to undertand himself and respect the rights of others. Jack was the leader of the choir and kept them obedient to his command. In Carl Jung's theories Jack is in touch with his shadow, which are the animal instincts of man. Jack put the boys in touch with their evil side. He manipulated the boys of his group with fear of the beast so that he could gain power. He convinced them that he was the one that could protect them from the beast. Jack was even willing to kill to keep his power. Piggy was the scapegoat on the island. At most times he was excluded by most of the boys. He seemed like the odd man out who wanted order and rules on the island. Piggy was an important figure because of his glasses. His glasses were needed to make fire. Fire was very useful on the island. Although important he was put down by the boys because he didn't fit in. The boys were rebellious to him because he acted like a parent. He told them what they should do but didn't have the authority to make them follow through on their jobs. Ralph was the responsible leader. He wanted to bring rules and order to the island. He lived by self respect and the respect for others; stage four of Maslow's theory. Ralph was logical in his decision making but the boys rebelled against him because of his orderly job related ideas on running the island. He wanted to keep the fire going and stay concerned about getting rescued. He set up systems for the work that needed to be done. By the end the boys had become war-like beasts trying to hunt down Ralph. Their society was in a state of war. They followed Jack's orders without any question. Is it possible that William Golding used this story to explain the psychology of what happened in Nazi Germany? The author was an officer in the Royal Navy in World War II. What happens on the island is similar to what happened in Nazi Germany. One person develops a dictatorship and exercises unlimited power. Ordinary people in Germany followed Hitler and lost their willingness to act responsibly as individuals. They were manipulated by fear and symbols just as Jack used the pig's head as his symbol. In this way the moral code of a whole society broke down. It shows that there is little separation between man and beast.

Wednesday, November 6, 2019

The Halayeb Triangle

The Halayeb Triangle The Halayeb Triangle (map), also sometimes called the Hala’ib Triangle is an area of disputed land located on the border between Egypt and Sudan. The land covers an area of 7,945 square miles (20,580 square kilometers) and is named for the town of Hala’ib which is located there. The presence of the Halayeb Triangle is caused by the different locations of the Egypt-Sudan border. There is a political boundary that was set in 1899 that runs along the 22nd parallel and an administrative boundary that was set by the British in 1902. The Halayeb Triangle is located in the difference between the two and since the mid-1990s Egypt has had de facto control of the area. History of the Halayeb Triangle The first border between Egypt and Sudan  was set in 1899 when the United Kingdom  had control over the area. At that time the Anglo-Egyptian Agreement for Sudan set a political boundary between the two at 22nd parallel or along the line of 22ÌŠ N latitude. Later, in 1902 the British drew a new administrative boundary between Egypt and Sudan which gave control of the Ababda territory that was south of the 22nd parallel to Egypt. The new administrative boundary gave Sudan control of land that was north of the 22nd parallel. At that time, Sudan controlled about 18,000 square miles (46,620 sq km) of land and the villages of Hala’ib and Abu Ramad. In 1956, Sudan became independent and the disagreement over the control of the Halayeb Triangle between Sudan and Egypt began. Egypt  considered the border between the two as the 1899 political boundary, while Sudan claimed that the border was the 1902 administrative boundary. This led to both Egypt and Sudan claiming sovereignty over the region. In addition, a small area south of the 22nd parallel called Bir Tawil that was formerly administered by Egypt was claimed by neither Egypt nor Sudan at this time. As a result of this border disagreement, there have been several periods of hostility in the Halayeb Triangle since the 1950s. For example in 1958, Sudan planned to hold elections in the region and Egypt sent troops into the area. Despite these hostilities, however, both countries exercised joint control of the Halayeb Triangle until 1992 when Egypt objected to Sudan allowing exploration of the region’s coastal areas by a Canadian oil company. This led to further hostilities and an unsuccessful assassination attempt on Egypt’s then-president Hosni Mubarak. As a result, Egypt strengthened control of the Halayeb Triangle and forced all Sudanese officials out. By 1998 Egypt and Sudan  agreed to begin working on a compromise as to which country would control the Halayeb Triangle. In January 2000, Sudan withdrew all forces from the Halayeb Triangle and ceded control of the region to Egypt. Since Sudan’s withdrawal from the Halayeb Triangle in 2000, there are often still conflicts between Egypt and Sudan over control of the region. In addition, the Eastern Front, a coalition of Sudanese rebels, states that it claims the Halayeb Triangle as Sudanese because the people there are more ethnically related to Sudan. In 2010 the Sudanese President Omer Hassan Al-Bashir said, â€Å"Halayeb is Sudanese and will stay Sudanese† (Sudan Tribune, 2010). In April 2013 there were rumors that Egypt’s President Mohamed Morsi and Sudan’s President Al-Bashir had met to discuss a compromise of control over the Halayeb Triangle and the possibility of giving control of the region back to Sudan (Sanchez, 2013). Egypt denied those rumors however and claimed that the meeting was simply to strengthen cooperation between the two nations. Thus, the Halayeb Triangle still remains in Egypt’s control while Sudan claims territorial rights over the region. Geography, Climate, and Ecology of the Halayeb Triangle The Halayeb Triangle is located on the southern border of Egypt and the northern border of Sudan. It covers an area of 7,945 square miles (20,580 square kilometers) and has coastlines on the Red Sea. The area is called the Halayeb Triangle because Hala’ib is a large city within the region and the area is shaped roughly like a triangle. The southern border, about 180 miles (290 km) follows the 22nd parallel. In addition to the main, disputed portion of the Halayeb Triangle there is a small area of land called Bir Tawil that is located south of the 22nd parallel at the triangle’s westernmost tip. Bir Tawil has an area of 795 square miles (2,060 sq km) and is not claimed by Egypt or Sudan. The climate of the Halayeb Triangle is similar to that of northern Sudan. It is normally very hot and receives little precipitation outside of a rainy season. Near the Red Sea, the climate is milder and there is more precipitation. The Halayeb Triangle has a varied topography. The highest peak in the region is Mount Shendib at 6,270 feet (1,911 m). In addition, the Gebel Elba mountain area is a nature reserve that is home to Elba Mountain. This peak has an elevation of 4,708 feet (1,435 m) and is unique because its summit is considered a mist oasis because of intense dew, mist and high levels of precipitation (Wikipedia.org). This mist oasis creates a unique ecosystem in the region and also makes it a biodiversity hotspot with over 458 plant species. Settlements and People of the Halayeb Triangle The two major towns within the Halayeb Triangle are Hala’ib and Abu Ramad. Both of these towns are located on the Red Sea coast and Abu Ramad is the last stop for buses bound for Cairo and other Egyptian cities. Osief is the closest Sudanese town to the Halayeb Triangle (Wikipedia.org).Because of its lack of development, most of the people living within the Halayeb Triangle are nomads and the region has little economic activity. The Halayeb Triangle is however said to be rich in manganese. This is an element that is significant in the production of iron and steel but it is also used as an additive for gasoline and is used in alkaline batteries (Abu-Fadil, 2010). Egypt has currently been working to export ferromanganese bars to produce steel (Abu-Fadil, 2010). Due to the ongoing conflict between Egypt and Sudan over control of the Halayeb Triangle it is clear that this is an important world region and it will be interesting to observe whether it will remain in Egyptian control.

Monday, November 4, 2019

The Rule of St. Benedict and Beowulf books Essay

The Rule of St. Benedict and Beowulf books - Essay Example The Rule of St. Benedict was written at a time when the world was ravaged by great political and economic upheaval brought about by warfare. It was during this time that there was immense chaos and hardship and there was no integrated community whatsoever. Even the monks and hermits spent their lives in tiny cells, huts or caves with self imposed hard rigor. Most of them lived on bread-crusts, indulged in self-flagellation for decades together. Saint Benedict understood that such living was not healthy for community living and therefore revolutionized the existing rules to make life much better. The most important thing he did was to allocate specific time for different activities. He divided the Pg. 2 day by setting aside time for work, prayer, study, relaxation and sleep respectively. This arrangement was rather innovative and well accepted all around since it made life much easier to lead even while creating a good community atmosphere by bringing about order in their daily lives. An ideal ruler always wants the best for his subjects and considering the masterpiece he offered his subjects, there is no doubt that St. Benedict could be called an ideal ruler because he had the good of his people at heart. As a good ruler he was responsible for bringing about peace and harmony through community life by releasing his people from the bondage of hardship and chaos. Even though Benedict was a monk himself, he was not a rigid taskmaster who penalized his subjects. In fact, in his book he states that these rules were ‘nothing harsh, nothing burdensome.’ (St. Benedict ( 1998) On the other hand, he was a concerned leader who wanted to bring about order and peace in his environment. Benedict’s rule is an integral and invaluable guide to us in this contemporary society because it forms the basis of order and structure in our daily lives. Benedict’s vision of order was aimed at bringing people much closer to God. According to Benedict, all indivi duals are equal before God and therefore equality within a community lays the foundation for spirituality and drawing people closer to the Divine. Benedict’s rules have great significance and Pg. 3 relevance in today’s society as it continues to help us maintain order and discipline in our lives. Beowulf is in sharp contrast to ‘The Rule of St. Benedict’ because it is a narrative that comprises of both fact and fiction. It is a mixture of images of people and creatures who are less human and comprises of both comedy and tragedy. Written in the early part of the tenth century A.D. Beowulf is one of the oldest epics in British literature that has managed to survive. Presently a house timber British library in London, Beowulf describes the interesting adventures of a well known Scandinavian warrior belonging to the 6th century. While ‘The Rule of St. Benedict’ is based on factual evidence of real people within a real environment, ‘Beowulfâ €™ is based on fact as well as fiction to express the thoughts and ideas of its author. Throughout the narrative, the author speaks of the descendants of each warrior, the conquests they fought and the manner in which they lost their lives, but constantly keeps close proximity with the Divine and expressing that God is ever present and is a solace and guide to mankind. One such warrior was Shield who though was an orphan, put an end to many enemies and took care of his people like a good king. This idea of a good king is

Friday, November 1, 2019

Factors influencing Language and Literacy - (4) Language Change Essay

Factors influencing Language and Literacy - (4) Language Change - Essay Example With the shift to understanding the importance of culture in teaching English as a second language, teachers are faced with new challenges when teaching adults. Language is complex, far more than just making language and grammar choices. For instance, try translating the phrase â€Å"Linguists have been interested in several aspects of language variations† into Spanish, and then translating the Spanish back to English: Los lingà ¼istas han estado interesados en varios aspectos de la variacià ³n de la lengua. The translation reads: â€Å"The linguists have been interested in various aspects of the variation of the tongue.† That might be quite true because the tongue has a great deal to do with forming words, but it isn’t the phrase that was originally translated. Translation is one of many specific factors that influence language change. What else must be taken into consideration in an analysis of change? An effort will be made to investigate factors such as cultural variation, social networking, ethnicity, communication in a family-unit and technological advances, as they relate to teaching and learning a different la nguage. Looking back at the history of the English language over the past hundred years, pronounciation, spelling and meaning have changed very little, but the number of words has greatly increased because of the industrial revolution and the advent of a technological society. Also, military history, with wars throughout the 1900s, made military language very much a part of the century (Wilton, 2005). In Great Britain, the variances of language, i.e. accent, dialect, variety and register, are especially evident in different sections of England. American English has its own regional dialects, as well as different spelling, pronounciation and meaning for many English words. In Australia, both accent and dialect, as well as several words unique to the continent, make the English language distinctive there. For people from Asian