Wednesday, July 31, 2019

Characteristics of a White Collar Criminal Essay

Anyone that has taken a class or even worked a â€Å"hint† of a white collar crimes understands that Edwin H. Sutherland is responsible for coining the term. In his book, White Collar Crime, Sutherland defines white collar crime as â€Å"[a]pproximately as a crime committed by a person of respectability and high social status in the course of his occupation.† (Benson & Simpson, 2009 ) While that definition may have held true in when he made the public definition in 1939, there are many examples in modern times that would argue against Dr. Sutherland’s characterization of the white collar criminal. In her paper to the U.S. Justice Department, Cynthia Barnett explains that even though the definition of white collar crime is , â€Å"hotly contested†, there appears to be three major categories white collar crime fits into. Those crimes are categorized by either the type of offender, the type of offense and those based upon organizational structure rather than offender or offense (Barnett, 2000). Barnett’s statement alone should tell us that the characteristics of a white collar criminal may be far too long of a list to generate. According to Barnett, the Federal Bureau of Investigation (FBI) has decided to define white collar crime as â€Å"[t]hose illegal acts which are characterized by deceit, concealment, or violation of trust and which are not dependent upon the application or threat of physical force or violence. Individuals and organizations commit these acts to obtain money, property, or services; to avoid the payment or loss of money or services; or to secure personal or business advantage† (Barnett, 2000). With a slight understanding of what white collar crime is, it is important  to highlight the characteristics of the typical white collar offender in order to establish profile when conducting an investigation. Reverting to what we have learned in previous psychology classes, we know that there are dozens of traits in an individual’s personality. It is virtually impossible to narrow down exactly which one(s) produce fraudulent behavior. Obviously, there are red flags that stick out for every behavior trait. It is important for business executives to be able to recognize or have trained personnel who can recognize these traits and develop appropriate risk management plans. According to Bauwens and Egan, there are five personality traits that are common between most individuals. Rather than define them all, it is most important to note that people who possess all five traits are what many would consider as â€Å"normal†. Those who exhibit more conscientiousness and agreeableness have the most direct influence on whether executives will or will not participate in fraudulent activity (Bauwens & Egan). According to our text, there are other characteristics that the â€Å"common† white collar offender may exhibit. White collar offenders tend to be, on average, sum 10 years older than non-violent offenders who commit common crimes (Benson & Simpson, 2009). While there are probably many theories why this may be, one could conclude that business executives may spend many years working their way up the corporate ladder and into a position opportunity. Another characteristic Benson and Simpson note is that many white collar offenders are college graduates. Again, many theories are possible; it can be assumed that a higher level of education must be achieved in order to move into a position of opportunity. Finally, it is important to consider the rate of employment between white collar offenders and offenders of non-violent, common crimes. In order to commit many of the offenses that are considered white collar, the offender must be employed by or have an extremely close relationship of trust with the victim organization. Therefore, steady employment is a necessity in order for the white collar offender to be successful. For many of the non-violent common offenders, their crimes are their employment. It can be  said that when a common criminal wakes up each day and begins committing their crimes, they are actually going to work. References Barnett, C. U.S. Department of Justice, Criminal Justice Information Services (CJIS) Division. (2000). The measurement of white-collar crime using uniform crime reporting (ucr) data. Retrieved December 8, 2013, from website: http://www.fbi.gov/about-us/cjis/ucr/nibrs/nibrs_wcc.pdf Bauwens, A., & Egan, V. (n.d.). Are white-collar criminals a homogeneous or hetrogeneous group?. Home Team Journal, 91-101. Retrieved December 8, 2013, from http://www.academia.edu/832919/Personality_and_white-collar_criminals Benson, M., & Simpson, S. (2009). White-collar crime. (pp. 5-32). New York: Routledge Taylor & Francis Group.

Tuesday, July 30, 2019

Effects of Terrorism in Africa Essay

Terrorism can be defined as the deliberate use of violence by persons or groups to attain certain goals through threatening a large audience, further than that of the immediate victim (cited in Crenshaw, 1994). Though the intentions of terrorists may contrast, their activities follow a regular pattern with terrorist cases occurring in a number of forms: suicide attacks, airplane hijackings, assassinations, kidnapping, bombings, and threats. Intentions of terrorist attacks are to put plenty of pressures to a government so that it can give political privileges (Davis, 2010, p.  43). Throughout history, terrorism occurrences have been rampant throughout the world. In Africa, terrorism attacks have rendered immense consequences. These consequences can assume a variety of forms ranging from casualties, a heightened worry level, destroyed buildings, and countless economic costs. Usually, African countries prone to terrorist attacks are; democratic in character or are in a wholly inefficient dictatorship (Crenshaw, 1994, p. 96). Terrorists time and again target to attack economic interests that are of figurative importance to the target system. This can cut state income flows and dispirit foreign investment, both of which deteriorate the government’s economic support base. Mostly, terrorists target tourism industries and hospitality sectors. These renders African states a huge blow economically though losses that trickle down to other industries e. g. the insurance industries incurs losses through immense insurance claims (Whittaker, 2003). Acts of terrorism have also potentially impacted negatively on freedom and human rights of Africans. These freedom and human rights are; rights to freedom of expression, security of individual, religion, opinion, demonstration, assembly and belief. Therefore, terrorism poses a threat to the political and social values that are in many ways associated with the full enjoyment of fundamental freedoms and human rights (Davis, 2010). In conclusion, all terrorism occurrences involve violence or the threat of violence. Violence can be committed by persons or groups. Terrorism not only weakens confidence in African governments, but it also generates panic amongst citizens of a state. References Crenshaw, M. (1994). Terrorism in Africa. New York: G. K. Hall. Davis, J. (2010). Terrorism in Africa: The evolving front in the War on Terror. Lanham, MEd: Lexington Books Whittaker, D. J. (2003). The terrorism reader. London: Rutledge

Scope Statement

This being said we ill find the best locally produced ingredients and buy in bulk in such a way that the ingredients will still be reasonably priced. The sausages and meats will be made in house by our own chefs. We will have our own homemade fresh mozzarella. We will start off as a small bakery that brings authentic Danish baked goods right to the doorstep of Kent, Washington. The SÃ'‘render Bakery will provide items like delicate pastries, cakes for every occasion, homemade bread, and smà ¶rgà ¥sbord sandwiches at a fraction of the cost of other bakeries.We also will create specialty cakes made to look like other teems not traditionally associated with cake like purse cakes shoe cakes etc. We want to develop a relationship with both our suppliers and our customers this way allowing us to sell high quality goods at a reasonable price. We will market our product in the surrounding community and we will have a website so that orders that need time can be placed on line and can be picked up in store.We will host different events like sandwich eating contest that will bring in a customer base. We will host an internet give away that influence customers into the bakery buy offering the first 50 people to place an order a ere gift. Project Deliverables Warm and welcoming environment Great food Dinning area will be built and designed with recycled products Healthy food choices Cakes, P Purchase of equipment Packaging will be environmentally friendly and food safe.Fast and affordable delivery Competitive prices Breakfast and lunch sandwiches Business reoccurring order discounts Project Objectives What are the cost, schedule, and quality objectives of this project? Project Sass motions What are the assumptions on which the project is based? Project Constraints What are the major limiting factors that affect the project? Exclusions What are the boundaries of the project? What is to be included and what is to be excluded from the project?

Monday, July 29, 2019

Comparison between C++ and Java Research Paper Example | Topics and Well Written Essays - 1000 words

Comparison between C++ and Java - Research Paper Example Later it was adapted as the basis for â€Å"HotJava† thin client that depends on a virtual machine that is very portable and secure. Java is provided with a wide-ranging library that supports total abstraction for the fundamental platform. Java is a statically typed OOP like C++ and both languages display a similar syntax though their syntaxes are not compatible with each other. Moreover, Java was designed from scratch and was aimed at portability. (Deitel & Deitel, 2009) Comparison of Features Java and C++ differ significantly when it comes to certain features and implementation in each language. These are discussed below with examples to clarify the differences. Java does not possess multiple inheritances, instead it relies on interfaces. Interfaces in Java are comparable and largely similar to classes in C++ that have nothing except for virtual functions. Java allows inheritance from one base class only even if the other base classes are composed of little else than abstrac t methods (which are pure virtual functions). However Java allows the implementation of multiple interfaces which is similar to C++ and is nearly similar. (Horstmann & Cornell, 2008) An interface in Java for a Stack would be: public interface Stack { public void Push(Object o); public Object Pop(); }; The structure for C++ is similar and is shown below: class Stack { public: virtual void Push(Object&) = 0; virtual Object& Pop() = 0; }; It must be borne in mind that an interface in Java is not a class and any functions declared in a Java interface are not implementable in the same interface. A Java interface is not allowed any member variables either. This helps Java to eliminate the multiple virtual inheritance problems seen in C++ as it is not possible to inherit identical member variables from more paths than one. Virtual inheritance creates difficulties for the programmers of all kinds. Java solves this by eliminating multiple inheritances of classes by permitting multiple interf ace implementations. This has simplified Java appreciably in comparison to C++. However there is a drawback too. Java does not allow inheriting implementation from multiple classes in cases where there are no identical member variables too. Most coding situations require that variables have multiple inheritances from base classes that possess data and functions. While C++ can help implement these through careful variable naming, Java disallows it altogether. Another aspect of major difference is garbage collection. Garbage collection is a way to manage memory by freeing memory blocks that are not being referred to anymore. For example if the Java code presented below is considered: Clock a = new Clock(); // a is a new clock // ... a is used for a while a = null; // a is set to null and the system will remove it afterwards The code above creates a new Clock object by using the keyword new. The variable a is used to refer to this new object. a has a similar structure to reference vari ables used in C++ but Java allows the reassignment of references unlike C++. The variable a is used for some time after which it is reset to null. The Java runtime system keeps a in watch and when it detects that there are no more references to a, it brands a as garbage and clears it up. This aids in returning memory to the heap. In comparison C++ does not offer such an extensive garbage collection system. Although third party freeware and

Sunday, July 28, 2019

Public Relations - interview with a facility manager of the nursing Essay

Public Relations - interview with a facility manager of the nursing home - Essay Example So I presented myself in Mr. Russell's chamber in the nursing home. He appeared to be an amicable man of perfection and he answered all my questions with patience. According to Mr. Russell, Mother Mary Nursing Home was very small as its former infrastructure is concerned. There were just 20 beds and 2 chambers for doctors. Today the whole scenario presents above 200 beds and 15 private chambers for the doctors. Like any other nursing home or hospital there are both outdoor and indoor facilities. People can come for personal check ups by the physicians who attend the outdoor section. On the other hand, there are also facilities for the patients who are directly admitted in the nursing home. As a Facility Manager, it is Mr. Russell's duty to look after whether the patients are getting all the facilities for which the authority has promised to them. He mentions some of the facilities that are unique in this nursing home and he further adds that these unique features have helped the nursing home to ensure its popularity. First of all there is an insurance facility every patient, which is very rare in the nursing homes. The patient can apply for the insurance with a certain amount of money that has to be deposited in the nursing home bank. This also helps the patients to get facilities in case they are admitted in future. Insurances are also helpful if someone from their families is admitted there. Mother Mary Nursing Home keeps all the tracks of the past records of the patients who are admitted here. These computerized records are very helpful to the doctors in case someone is admitted again in the future. Physicians can get all the details about the medical history of the patient and this helps in the process of diagnosis. There is free breakfast in every morning for the patients and tea and coffee for the visitors. The nursing home authority makes it a point so that no issue regarding the hygiene of the patient can be raised. The foods are healthy and applicable for all the patients no matter what disease they are suffering from. There are also special arrangements for the patients whose conditions are more critical than the others. All the patients are kept in separate rooms and there is no dormitory in the nursing home where privacy of the patients may get disturbed. Attendants are very regular in their job. All the rooms are cleaned up from time to time. Hygiene is in the culture of the nursing home and this is why patients are highly satisfied with the kind of services they are provided with in this organization. Politeness and cooperative nature of the attendants is focused so that the patients never feel lonely in this building. This homelike situation is the main thing which has brought success to Mother Mary Nursing Home. When asked about the financial expenditure of the nursing home Mr. Russell clearly said that they always try that services from this organization should be within the reach of the middle class people who arrive here for treatment. Of course some of the bills may seem to be expensive to them but when someone looks back to the kind of atmosphere and extra facilities which he/she had

Saturday, July 27, 2019

The Great Gatsby Essay Example | Topics and Well Written Essays - 1000 words - 2

The Great Gatsby - Essay Example Therefore, the story symbolizes the 1920s America with more focus on the collapse of the American dream in an era of extraordinary prosperity and material excess. Fitzgerald depicts the 1920s as a period of decayed social as well as moral values supported by the empty pursuit of pleasure, overarching cynicism in addition to greed. For instance, â€Å"Tom was evidently perturbed†¦Saturday night. He came to Gatsby party†, â€Å"†¦it stands out in my memory from Gatsby’s other parties that summer (Fitzgerald 67). The parties actually resulted in the corruption of the American dream. This is because the uncontrolled desire for pleasure and money exceeded more righteous goals. Jordan in the story admits loving big parties, â€Å"Anyhow he gives large parties†, â€Å"And I like large parties† (Fitzgerald 45). Gatsby never bothered sacrificing his life and reputation in order to secure wealth thereby being in a position to marry Daisy. The ladies while moving close to Gastby’s house assert that he is a bootlegger, â€Å"He’s a bootlegger† (Fitzgerald 53). Moreover, Buchanan’s passion for wealth, pleasure, and money drove her into marrying Tom. For instance, in the book, the author asserts, â€Å"she wanted her life shaped now, immediately – and the decision must be made by force – of love, of money †¦with arrival of Tom† (Fitzgerald 96). After the end of the World War I in 1918, the generation of the youthful Americans who had participated in the war became intensely disenchanted and hopeless. The atrocious carnage they had experienced had eroded the Victorian social morality of the early twentieth century since America appeared stuffy and full of empty hypocrisy. The shaky rise of the stock market in the aftermath of the World War resulted in a sudden and sustained rise in the national wealth coupled with newfound materialism. This is because individuals began to use and consume at exceptional levels. For instance,

Friday, July 26, 2019

Biometrics in the Private Sector(472) Research Paper

Biometrics in the Private Sector(472) - Research Paper Example This system offers plenty of benefits if incorporated in hospital administration. Firstly, it helps ease the workload in busy check-in areas where patients are made to provide a lot of information. The beauty of this system is that a simple hand scanning provides the hospital authorities with all the previous medical history of the patient. The BayCare Hospital Group uses the Patient Security Identity System in its all hospitals to identify the patients. In the opinion of Greene (2008), this is much more accurate than using numbers and names to search for patient records. For example, names may have different spellings but this unique system avoids such chances of misidentification. In addition, in some cases of emergency where the patient is unconscious and unable to provide the health care providers enough information about their identity and medical history, this hand reading can offer the history of past medications and health conditions. Thirdly, this is a useful strategy in cut ting down the chances of fraud Greene, 2008). To illustrate, there are cases in which patients use the name and insurance of other people illegally. However, this system prevents them from escaping identification. However, one has to admit the fact that there are serious issues associated with the collection, storage, and use of biometric information. For example, according to Abernathy & Tien (2003), the information collected may be subjected to function creep, which means the data collected is used for purposes other than the ones consented at the time of collection. For example, it is possible to use the medical history of a person to deny future medical insurance coverage, identifying the possible future susceptibility to certain fatal illnesses. Secondly, there are Radio Frequency Identification chips which enable someone to read this information anonymously, even from a distance of 20 meters (Abernathy & Tien, 2003). The risk of

Thursday, July 25, 2019

Small Business Management Evaluation Essay Example | Topics and Well Written Essays - 1500 words

Small Business Management Evaluation - Essay Example Small business management entails precise analysis of how an entrepreneur provides the goods and services of his business in the market. It involves identifying the strengths and weaknesses of the business to be able to handle them in the production stage and ensure competitive advantage. An efficient management of a small enterprise requires an efficient marketing plan strategy that indicates the approach of the venture operation. The owner should establish the structures of the business that can effectively define the qualified professionals for the job. Operation of the small enterprise entails control of marketing strategies, sales, and advertising of the enterprise (Zimmerer & Scarborough, 2005, p. 12). Experts agree that marketing and sales represent the cornerstones of the starting business. Therefore, management of marketing sales is increasingly crucial for development and stability of the venture. In addition, the operation of a small enterprise requires various operation s kills, for instance, strong communication skills. Strong verbal and listening abilities are increasingly crucial in small enterprise. A sales manager must utilize proper words in an appropriate manner to pass the message accurately and clearly so as not to offend the clients. He must ensure effective customer care service to maintain customers for the productivity of the business. An employee motivation skill is crucial – the manager must device workers motivation strategies to ensure that workers operate towards attaining crucial successes. Time management skills enable the manager to operate under strict time schedules and ensure fixed deadlines are met in time (Pickle & Abrahamson, 2006). Conflict management skills – entrepreneurs should be wise and diplomatic to be able to mediate local disputes that occur regularly in the business. Mitigating the challenges as they appear enables the manager to prevent future challenges that may slow down or interrupt business ope rations. Negotiation skills, on the other hand, allow entrepreneurs to negotiate with clients and workers. Managing a small business needs a market target analysis because each enterprise has a target percentage of clients. Customer identification and target market identification is increasingly imperative to ensure a critical product campaign. In other words, promotion cost and the market campaign will be interrupted and expensive without customer and market identification, (Longenecker, Moore, & Petty, 2003, p. 23). Market identification eases the role of promotional plans creation. Quick financial investment is critical – economists agree that small business operators should keep a well-managed planned budget for marketplace campaign and adhere to that budget. Quick financial investment ensures various market mechanisms such as Television adverts and Banner adverts for the success of the venture.

Wednesday, July 24, 2019

Annotated bibliography/ Intelligence and Emotional development and Bibliography

/ Intelligence and Emotional development and self-esteem - Annotated Bibliography Example This paper focuses only on emotional development and self esteem and is written as an annotated bibliography in order to learn more about self esteem and emotional development. This article defines and explains self esteem in simple words. It says that â€Å"Self esteem is your opinion of yourself†. It explains that self esteem depends on question like: Is your job worthwhile? Do others respect what you do? Do you?;Do you believe you are successful?; How do you see yourself (your self image)?; How do you feel about your strengths and weaknesses?; Are you comparing yourself to others and ignoring the unique value that you have?; What do you think of your social status?; How do you relate to others?; Can you make your own decisions?. The above article divides self esteem into two; low self esteem and high self esteem and explains both of it in simple terms. Alexandria, NSW 2015. http://books.google.co.in/books?id=0TOuX5WW2cgC&printsec=frontcover&dq=self+esteem&source=bl&ots=3zAnBhbi6s&sig=Wi4vBbND5B2qfzqF631h2Gq-JXw&hl=en&ei=FcOETOHoKZC9ccGSsdAL&sa=X&oi=book_result&ct=result&resnum=3&ved=0CCUQ6AEwAjgK#v=onepage&q&f=false This book, which is available on Google defines self esteem as how we think and feel about ourselves. It refers to our looks, abilities and relationships. Apart from providing definition, this book explains the methods of measuring self esteem, high and low self esteems, body image, methods to boost self esteem, positive thinking, etc. It also explains some of the psychological disorders like depression and eating disorder caused by low self esteem. This book also explains how do we get self esteem and the different entities which can affect the development of a person’s self esteem. This article says that by the time a child becomes three years old, he or she will become an emotionally complex person who has experienced a wide range of emotions. Parents and

Leading in Teaching, Learning and Mentoring Practice Essay

Leading in Teaching, Learning and Mentoring Practice - Essay Example Moving onwards to the role of a teacher as a leader in the educational settings, it can be further elucidated by considering the major roles of a teacher leader as explained by Harrison and Killain (2007). Through their work, they have emphasized the role a teacher can play in the lives of their pupils both by working along with his colleagues and also himself directly. Some of them include role of a teacher as a; Participative leadership- through which the teacher leader himself becomes a part of the change being brought about and is in a better position to collaborate with his fellows in achieving a set target A teacher leader is different from a school leader. He enjoys authority and power of a more expanded nature. Through formal and informal efforts, a teacher leader can collaborate with his colleague and even the head of the institution for the betterment of the educational setup. While in the work environment, a number of incidences are encountered which further strengthen the statement that a teacher plays the role of a leader. Two of such cases are elaborated in the subsequent paragraphs. I had the opportunity to work in Meadow High School and teach autistic children with special needs. During my stay there as a teacher, I came across the ways in which these children were being dealt with. While some of them were commendable, I found certain aspects of interaction and teaching lacking there. The school plans and teaches to a mainly primary model which prepares the student for an entry level qualification, although there are opportunities for the students to gain GCSE’s and A levels if the students are able to do so. In recent years the needs of students have become more complex as was witnessed by me during my interaction students which all had Autism of a moderate to complex level. ‘Autism is one of the most common developmental disabilities in the world, affecting approximately 1

Tuesday, July 23, 2019

Chapter 11 Essay Example | Topics and Well Written Essays - 250 words

Chapter 11 - Essay Example Vocational aptitude tests, curriculum-based vocational assessment, person-centered planning have been used as important metaphors in order to have a close understanding with the subject at hand as far as this chapter is concerned. Also the career awareness process has been fundamentally discussed as it is a continuous one which begins at birth and goes on till death of an individual. The vocational objectives touch upon the quintessential aspects related with what vocational instruction is trying to achieve and in what proportions. The functional curriculum includes the instructional strategies which are employed in order to teach the required skills both in a classroom as well as under a natural environment. Other relevant skills that have been detailed within the length of this chapter include the academic skills, the social skills, the personal care skills, the motor skills, and the job search skills. Then again, the general principles that underline the vocational instruction hav e also been manifested for a proper understanding of the vocational instruction realms in

Monday, July 22, 2019

Coffee and Tea Essay Example for Free

Coffee and Tea Essay Coffee and tea have existed in the world for a long time. Hundreds of years ago, people who lived in South America started to produce coffee, but the earliest drink likes coffee was made by ancient Arabian. They thought it was a kind of medicine used for stomach. After the 15th century, coffee was spread to other countries such as Egypt and Ottoman Empire by Muslims who were back from Hajj, while in ancient China, Chinese people started to make tea about 3000 years ago. Because of nice environment and weather, the first part of tea plants was discovered in southwest China. After, drink tea became an important culture of Chinese people, and tea began to spread into countries near China. Coffee and tea are similar, but different in some specific area. First, coffee and tea are similar but different in population. People from all around the world like them. For example, British people used to drink a cup of tea with some snacks when they have a rest in the afternoon. Western people enjoy drinking black tea, and some of them mix it with milk to make milky tea. Likewise, most people like drinking coffee, for it often tastes good. In China, more and more people began to drink coffee, and some of whom want to taste better coffee like blue mountain coffee. However, although these two drinks are both popular around the world, coffee is still drunk most by western people, while the most quantity of tea is used in East Asia. People lived in China, Japan, and Korea regarded tea as the main drink. Second, coffee and tea are similar but different in function. Both coffee and tea can refresh people because there is a kind of chemical matter, which is caffeine in both of them. This chemical matter can be used for nerves to make a person feel awake and lively. Also, some experts said that black coffee and green tea can help a person lose weight. But, in contrast, tea has some more functions due to another kind of chemical matter which can’t be found in coffee. This chemical matter that named tea polyphenol whose ability is to relieve the effect that is made by poison. Finally, coffee and tea have similarity and difference in origination. Both of them are made from plants. Thousands of years ago, people lived in Africa planted coffee trees in succeed, and now, Brazil has the most coffee trees in the world. In south of China, there are a lot of terraced fields that grow tea trees. On the other hand, people use leaves from tea to make tea, while they use fruits from coffee plants to make coffee. To sum up, coffee and tea are similar in their population, function, and origination, while they are different of their use in different place, their different chemical matter, and their different material. I suggest that people should drink both coffee and tea so that they can be healthier.

Sunday, July 21, 2019

Passive Reconnaissance Website Analysis

Passive Reconnaissance Website Analysis Assignment: Reconnaissance Paper Student Name: Soumil Deshpande Executive Summary In this assignment, passive reconnaissance was performed on The Weather Channels website i.e. www.weather.com and important results have been obtained regarding the organizations online behavior. In this passive reconnaissance attack we have discovered all the domain name and the corresponding IP addresses of the hosts, domain names, servers, reverse DNS, the webhost name and the location of the server. Furthermore, we have also discovered and analyzed many files such as .doc, .pdf, .xls from online public sources which in return gave us valuable information about the organization such as the username of few employees who have created those files, the software that was used to create those files, date of creation, date of edit, what server it was uploaded to, the operating system in use etc. It also provided us with the folder paths where the files were preset on the host servers. This information is very valuable to an attacker who is performing a reconnaissance attack as it gives o ut a lot of critical information about the internet footprint of the organization and this data was easily available to the attacker via all public sources using passive reconnaissance. To avoid this, we must make sure that we keep a track of all the public information which is readily available on the internet such as DNS lookups, WHOIS information and all the public files hosted and make sure that no valuable information can be extracted by an attacker which in turn could prove harmful for the organization if an attack was conducted on the organization in the future. Introduction to the organization The Weather Channel is an American cable and satellite television channel by NBC Universal. It is also a desktop, mobile app and satellite radio channel. Headquarters of the company is located in Atlanta, Georgia. This organization mainly provides weather related news and analysis which include 24-hour weather forecast and radar imagery. This company was chosen by me for this assignment because this company has a global presence and a very well wide spread and retrievable online footprint. It has servers all around the world which would give me many different points of opportunities for reconnaissance. And as their main function is far away from security I would assume that not a very high level of resources is spent on information security of all the online assists, domains, hosts and websites. Tools and Methods used to obtain data for passive reconnaissance Following are the tools used for conducting passive reconnaissance with the explanation of their working: FOCA (Fingerprint Organizations with Collected Archives) (FOCA n.d.) FOCA is an easy to use GUI tool made for windows whose main purpose is to extract metadata from the given website. FOCA automates the process of finding and downloading all the public documents of various format from the website, analyzing them and presenting the analyzed information in a human readable format on the FOCA windows GUI. The documents which are downloaded from the organizations website are searched by various methods including search engines like Google, Bing, Exalead etc. We can also add local files which we have acquired from other processes in the FOCA GUI for analysis and metadata extraction. An impressive feature of FOCA is that we can analyze the URL and the file without even downloading it. FOCA is capable of downloading and analyzing various types of documents ranging from Microsoft Office files to uncommon adobe files or other custom formats. After all the metadata is extracted from the files, FOCA matches similar information like documents created by the same group, Usernames of the owners of the documents and can even create a network map based on the metadata that was analyzed from all the public sources available on the internet. FOCA also includes a server discovery mode which automatically searches for the organization servers using recursively interconnected routines. Techniques such as Web Search, DNS Search, IP resolution, PTR Scanning, Bing IP, Common Names, DNS Prediction and Robtex are used in the process of server discovery in FOCA. Other features of FOCA include Network Analysis, DNS Spoofing, Search for common files, Proxies search, Technology identification, Fingerprinting, Leaks, Backups search, Error forcing and open directory searches. Google Search (Search engines reconnaissance The magic weapons n.d.) Search tools are very powerful weapons for an attacker for conducting passive reconnaissance on an organization. Using Google search as a reconnaissance tools is 100% legal and this process does not involve accessing unauthorized data or files. Reconnaissance using google is done by using special search queries which are constructed by search modifiers and search operators. Search modifiers are symbols such as + (Requires to match the term exactly), (Show all results excluding that match this term), * (Wildcard entry) and (Searching for a specific text, word or a phrase). Search operator includes keywords in the search queries such as: Allintext à ¯Ã†â€™Ã‚   Restricts search to contain all the query terms which you have specified. Allintitle à ¯Ã†â€™Ã‚   Restricts search to contain all the titles which have the specified text Allinurl à ¯Ã†â€™Ã‚   Restricts search to contain all the url specified. Filetype à ¯Ã†â€™Ã‚   Returns the search results which have a file which is specified by the user. For e.g. [document filetype:doc] will return all the documents with the file extension of .doc. Site à ¯Ã†â€™Ã‚   Google will restrict the search to the particular site or domain. Using the above search modifiers and operators we can construct a special query. For e.g. we can construct a query to get all the doc files from www.example.com as site:www.example.com filetype:doc. From google search alone we can obtain important information like Staff lists and positions, Contact information, Technical skill, helpdesk FAQs, Security policies etc. DNSDumpster.com DNSDumpster is an online service that enables us to scan a particular website to return valuable information like all the DNS records of the website, all the hosts, domains, IPs, location and reverse DNS addresses. It also gives a graphical representation of the network map of the organization by the previously described data. We can even export all this information from the website to an excel spreadsheet to further analyze the data. WHOIS and TRACEROUTE WHOIS is a query and response protocol used to retrieve internet resources like domain names, IP address, owner information, webhost contact information etc. Traceroute is a windows command which records the route through the web space or the internet from your computer to the destination address. PassiveRecon Mozilla Add-on (PassiveRecon n.d.) This very powerful Mozilla add-on combines various passive reconnaissance tools such as IP tracing, WHOIS, google search queries etc. into one single add-on which can use to perform a passive reconnaissance attack with a click of a button. Recon-ng (recon-ng n.d.) Recon-ng is a powerful tool made by the programmer LaNMaSteR53 which is a full-featured web based reconnaissance framework which is written in python. There is an inbuild module known as reconnaissance which is used for conducting all the passive reconnaissance on the website or web server. It gathers data such as IP information, domain names, hosts, location, related domains and other valuable information about the organization. It is a Linux tools and works with most of the new Linux distributions such as kali or Ubuntu. SamSpade (SamSpade n.d.) SamSpade is a windows tools which is famously used for passive reconnaissance. This tools is used to query important functions such as Zone transfer, SMTP relay check, Scan Addresses, Crawl Website, Browse Web, Fast and slow traceroutes, decode URL, parse email headers etc. NetCraft (netcraft n.d.) NetCraft is a United Kingdom based company which tracks almost all websites. Using this tool, we can obtain all the domains, site report with information like registrar information, location, DNS admin email address, hosting company, netblock owner etc. It also enables us to look at the hosting history with the name and version of the webserver and display what web technologies have been used on the website. Information found after reconnaissance DNS Hosts By using various reconnaissance tools ass mentioned above, we have gathered over 100 DNS hostnames for the website weather.com with additional information like IP addresses, reverse DNS, Netblock owner, country and webserver. The entire table of the gathered information is listed at the bottom of this document in a segregated tabular format for easy understanding. A network map has also been created from the above gathered DNS information and has been listed at the end of this document as well. We have also obtained the technologies used on the client side of the weather.com website. These technologies include jQuery, Google Hosted libraries, AJAX, Angular JS and Modernizr. Extracted Files and Metadata Using FOCA as well as google search queries, files were downloaded and analyzed from the weather.com server and host to reveal information about the organization like System Users, System paths, Software used and Clients connected to the server. Following are the list of user information which has been extracted from the metadata of the files gathered. Kerry McCord Maynard Linda iMarc Fatima Jantasri David Tufts Linda Maynard Neal Stein Following are the list of software used to create, modify these files or used in the organization in general. This data was extracted from over 159 documents which were gathered using FOCA and google search tools. Following are the Clients, Servers and Domains of weather.com gathered from server searching and analyzing file metadata. How the gathered information can be used by the attacker. The above-mentioned information although publicly available is very useful for an attacker to orchestrate an attack on the website. With all the information, such as DNS hostname, IP address, Reverse DNS, Hosting server etc. the attacker can further use active reconnaissance techniques on them to gather even more valuable information like the traffic on a particular server, capacity of a particular server, insecure protocols on the domain, SQL injection into form fields, DDoS attack on a particular sever etc. By recognizing a weak link in the network architecture of the organization, an attacker can find a way to enter into locations which was hidden from the public. By doing this the attacker can gain access to much more valuable information and further construct a stronger attack. With all the DNS address, available, the attacker can run an active penetration test on these webserver and IP addresses to find out different vulnerabilities which can be exploited in the future. Serves with a large amount of network loads can be DDoSed to crash the organization website. User information was also gathered in this passive reconnaissance process which can be used to gain more knowledge about the people working in the organization and can be used for various social engineering attacks. These particular users can be targeted by email which could in turn compromise the systems they are in charge of. We now also know the software used in the organization and their version number. We can find out the vulnerabilities on that particular software and use that with social engineering to exploit a target system on the organization. By using all the information gathered by this passive reconnaissance process, the attacker is exposed to a lot of avenues on which he can further dive deep into using active reconnaissance or penetration testing methods. Suggested Controls We have to keep in mind that it is essential for a business to release public documents online. Thus, we have to make sure that these public documents do not give out any valuable information in the form of metadata or even the actual content of the document. These documents should be analyzed internally by the information security team before uploading them to the public website. We can even use a tool to locally extract and remove all the metadata from the file before we upload them to the website. We must also take active actions to harden the perimeter of our network. We must understand the devices that run on our network and update them with up to date security patches and releases. We should only release vague and general information to the public regarding domain names and registrar information. We should also disable and remove all those devices, web servers, users, accounts, domains which are not in use. We should also conduct penetration testing on our web servers and web sites periodically to further harden our network. We should also use NAT for as much of the network as possible. This helps to block OS fingerprinting and port scanning issues which are the main part of the active reconnaissance techniques. We should add a stateful firewall on the network perimeter to prevent any intrusion. We should also have a IDPS system to monitor the traffic on each web server and log the actions or report the actions. Tables and Diagrams DNS hostnames, IP addresses, Reverse DNS of weather.com Hostname IP Address Reverse DNS dmz.weather.com 65.212.71.220 dmz.weather.com 65.212.71.221 weather.com 23.218.138.47 a23-218-138-47.deploy.static.akamaitechnologies.com adcap0x00.twc.weather.com 65.212.71.199 adcap0x00.twc.weather.com adcap0x01.twc.weather.com 65.212.71.198 adcap0x01.twc.weather.com adserver-es1.weather.com 96.8.82.170 adserver.es1.dc.weather.com adserver-es2.weather.com 96.8.83.170 adserver.es2.dc.weather.com adserver-tc1.weather.com 96.8.84.170 adserver.twc1.dc.weather.com adserver-tc2.weather.com 96.8.85.170 adserver.twc2.dc.weather.com ash-dc2-named-1.weather.com 96.8.90.1 ash-dc2-named-1.weather.com attpos.weather.com 96.8.82.142 attpos.weather.com attpos.weather.com 96.8.84.142 attpos.weather.com auth.twc1.dc.weather.com 96.8.84.137 auth.twc1.dc.weather.com b.twc1.dc.weather.com 96.8.84.144 b.twc1.dc.weather.com b.twc2.dc.weather.com 96.8.85.144 b.twc2.dc.weather.com backupmediadmz.twc.weather.com 65.212.71.95 backupmediadmz.twc.weather.com betaorigin.weather.com 96.8.84.147 betaorigin.weather.com betatest2.weather.com 96.8.85.103 betatest2.weather.com blogs.twc.weather.com 65.212.71.97 blogs.twc.weather.com builddata.weather.com 96.8.82.54 builddata.weather.com buildds.weather.com 96.8.82.49 builddds.weather.com buildmap.weather.com 96.8.82.56 buildmap.weather.com buildmob.weather.com 96.8.82.50 buildmob.weather.com buildmob2.weather.com 96.8.82.51 buildmob2.weather.com buildorigin.weather.com 96.8.82.53 buildorigin.weather.com buildurs.weather.com 96.8.82.52 buildurs.weather.com buildweb.weather.com 96.8.82.46 buildweb.weather.com buildweb2.weather.com 96.8.82.47 buildweb2.weather.com buildwxii.weather.com 96.8.82.48 buildwxii.weather.com cacheds.twc1.dc.weather.com 96.8.84.141 cacheds.twc1.dc.weather.com cacheds.twc2.dc.weather.com 96.8.85.141 cacheds.twc2.dc.weather.com clustsrv1.twc.weather.com 65.212.71.115 clustsrv1.twc.weather.com clustsrv2.twc.weather.com 65.212.71.116 clustsrv2.twc.weather.com clustsrv3.twc.weather.com 65.212.71.117 clustsrv3.twc.weather.com clustsrv4.twc.weather.com 65.212.71.121 clustsrv4.twc.weather.com clustsrv5.twc.weather.com 65.212.71.122 clustsrv5.twc.weather.com connect.twc.weather.com 65.212.71.136 connect.twc.weather.com dmzdc02.dmz.weather.com 65.212.71.223 dmzdc02.twc.weather.com dmzdc02.twc.weather.com 65.212.71.223 dmzdc02.twc.weather.com dmz.weather.com 65.212.71.223 dmzdc02.twc.weather.com dmzdc03.dmz.weather.com 65.212.71.222 dmzdc03.twc.weather.com dmzdc03.twc.weather.com 65.212.71.222 dmzdc03.twc.weather.com dmz.weather.com 65.212.71.222 dmzdc03.twc.weather.com dmzswitch10.twc.weather.com 65.212.71.10 dmzswitch10.twc.weather.com dmzswitch11.twc.weather.com 65.212.71.11 dmzswitch11.twc.weather.com dmzswitch12.twc.weather.com 65.212.71.12 dmzswitch12.twc.weather.com dmzswitch13.twc.weather.com 65.212.71.13 dmzswitch13.twc.weather.com dmzswitch14.twc.weather.com 65.212.71.14 dmzswitch14.twc.weather.com dns1.weather.com 96.8.82.15 dns2.weather.com dns2.weather.com 96.8.82.15 dns2.weather.com dns3.weather.com 96.8.84.15 dns3.weather.com dsp-db.twc.weather.com 65.212.71.119 dsp-db.twc.weather.com dsq-db.twc.weather.com 65.212.71.99 dsq-db.twc.weather.com dualg.twc.weather.com 65.202.103.100 dualg.twc.weather.com articles.weather.com 52.200.156.65 ec2-52-200-156-65.compute-1.amazonaws.com chef.dev.web.weather.com 54.208.182.48 ec2-54-208-182-48.compute-1.amazonaws.com apistatus.weather.com 54.236.78.100 ec2-54-236-78-100.compute-1.amazonaws.com checkout.developer.weather.com 54.69.68.23 ec2-54-69-68-23.us-west-2.compute.amazonaws.com f5.twc.weather.com 65.212.71.140 f5.twc.weather.com f5lab.dmz.weather.com 65.212.71.66 f5lab.dmz.weather.com f5vpn-lab.dmz.weather.com 65.212.71.65 f5vpn-lab.dmz.weather.com faspex0b00.twc.weather.com 65.212.71.48 faspex0b00.twc.weather.com faspex0b01.twc.weather.com 65.212.71.49 faspex0b01.twc.weather.com ftp.twc.weather.com 65.212.71.113 ftp.twc.weather.com ftp1.twc.weather.com 65.212.71.108 ftp1.twc.weather.com ftp2.twc.weather.com 65.212.71.109 ftp2.twc.weather.com giporigin.twc1.dc.weather.com 96.8.84.166 giporigin.twc1.dc.weather.com giporigin.twc2.dc.weather.com 96.8.85.166 giporigin.twc2.dc.weather.com gwdmz.twc.weather.com 65.212.71.1 gwdmz.twc.weather.com hide135.twc.weather.com 96.8.88.135 hide135.twc.weather.com hide136.twc.weather.com 65.202.103.136 hide136.twc.weather.com hide139.twc.weather.com 65.202.103.139 hide139.twc.weather.com hide166.twc.weather.com 65.202.103.166 hide166.twc.weather.com hide167.twc.weather.com 65.202.103.167 hide167.twc.weather.com hide19.twc.weather.com 65.202.103.19 hide19.twc.weather.com hide20.twc.weather.com 65.202.103.20 hide20.twc.weather.com hide206.twc.weather.com 65.202.103.206 hide206.twc.weather.com hide207.twc.weather.com 65.202.103.207 hide207.twc.weather.com hide208.twc.weather.com 65.202.103.208 hide208.twc.weather.com hide209.twc.weather.com 65.202.103.209 hide209.twc.weather.com hide21.twc.weather.com 96.8.88.21 hide21.twc.weather.com hide22.twc.weather.com 96.8.88.22 hide22.twc.weather.com hide23.twc.weather.com 96.8.88.23 hide23.twc.weather.com hide24.twc.weather.com 96.8.88.24 hide24.twc.weather.com hide25.twc.weather.com 96.8.88.25 hide25.twc.weather.com hide250.twc.weather.com 96.8.88.250 hide250.twc.weather.com hide26.twc.weather.com 96.8.88.26 hide26.twc.weather.com hide27.twc.weather.com 96.8.88.27 hide27.twc.weather.com hide28.twc.weather.com 96.8.88.28 hide28.twc.weather.com hide29.twc.weather.com 65.202.103.29 hide29.twc.weather.com hide30.twc.weather.com 65.202.103.30 hide30.twc.weather.com hide31.twc.weather.com 65.202.103.31 hide31.twc.weather.com hide35.twc.weather.com 65.202.103.35 hide35.twc.weather.com iasq-app.twc.weather.com 65.212.71.98 iasq-app.twc.weather.com ibp-db.twc.weather.com 65.212.71.118 ibp-db.twc.weather.com imwxsecure.twc1.dc.weather.com 96.8.84.159 imwxsecure.twc1.dc.weather.com imwxsecure.twc2.dc.weather.com 96.8.85.159 imwxsecure.twc2.dc.weather.com careers.twc.weather.com 65.212.71.129 przrecruit01.dmz.weather.com bes.twc.weather.com 65.212.71.224 przsccmdp01.dmz.weather.com grid.weather.com 54.231.49.82 s3-website-us-east-1.amazonaws.com Network Map for weather.com n.d. FOCA. https://www.elevenpaths.com/labstools/foca/index.html. n.d. netcraft. https://www.netcraft.com/. n.d. PassiveRecon. https://addons.mozilla.org/en-US/firefox/addon/passiverecon/. n.d. recon-ng. https://bitbucket.org/LaNMaSteR53/recon-ng. n.d. SamSpade. https://www.sans.org/reading-room/whitepapers/tools/sam-spade-934. n.d. Search engines reconnaissance The magic weapons. http://securityaffairs.co/wordpress/19570/hacking/search-engines-reconnaissance-magic-weapons.html.

Analysis Of Tourism In Mozambique Tourism Essay

Analysis Of Tourism In Mozambique Tourism Essay The energy crisis and global recession, in 1973/4 highlighted the structural deficiencies in the third world economies. The need of foreign exchange and employment, along with the concerns of inequalities, leakages and constant levels of poverty (Sharpley Telfer, 2002). Even so, in the past two decades the Sub-Saharan Africa tourism has experienced a remarkable growth, a difference from 1.5% in 1970 to 4.5% in 2003 and is expected that the Africas share will increase to 5% of total international arrivals by 2020. Although, Mozambique tourism sector could not benefit from this recovery, because the two wars had occurred in between, a period that other nations including the neighbouring have managed to develop their own tourism industry. This essay is to explain the key factors that may contribute to the success or failure of tourism planning. Conscientious about planning different terminology and thoughts, a range of illustrations and description that applies to Mozambiques tourism p lan (history, political, economy, social and development), and its aims will help a better understanding around the topic. Planning The absence of planning may cause unregulations, leading to a range of negative socio-economic and environmental impacts. So, in order to create and respond to the tourism concerns it is important to include a rational plan (Mason, 2003). Different approaches of planning have been presented: Boosterism; Economic; Physical/Spatial; Sustainable; Community and so on. Kadt, (1979), noted that the consequences of tourism planning are a result of the nations overall political economy, because it is what will determine the equality in the distribution of tourism benefits. Nonetheless, planning is a process for anticipation and implementation of changes that would maximize positive developments (William, 1998, cited by Mason, 2003). However, Mason, (2003) argued that planning is a very complex term and can be applied in many contexts, for example: in relation to individuals, groups, organisations and governments, but at same time to different geographic areas (urban, rural), or as well at lo cal, regional and national levels. In accordance, Cullingsworth, (1997:5, cited by Hall, 2008) stated that planning is also, a sort of decision and policy making because they are connected and interrelated, planning is the process where goals are set and policies are made to implement them. However, it deals with interdependent and systematic decisions, rather than individual decisions. Many activities in the process cannot be isolated (bargaining, negotiation, politics, values) and the process of planning is only one part of the overall plan. Therefore, planning is more complex than Drors (1973) perspective of set of decisions for actions in future (Hall, 2008). Besides, various such as Mason, (2003); McCabe et al., (2000:235) argued that the important is the process element of the plan, as it provides direction by enabling individuals to indentify the path that is to be taken and the outcomes or end results. On the other hand, Gunn, (1998) argued that by focussing on the physical design, there is a risk of failure in recognising the key principles of the planning process; the fundamentals that originated its creations, but he also added that by focussing on the process of planning rather than considering the product itself may possibly lead to planning being considered vague and theoretical. Destination case study: Historical Tourism has been important to Mozambican economy since the Portuguese colonial period and was developed around three themes: sun and sea, wildlife and urban (dynamic environment). During the colonial period the Mozambique tourist arrivals were mainly from southern Africa and Portugal and were close to 400,000. However, since the colonial war conflict in 1973, tourism infrastructure and several animal species were destroyed, therefore the number of tourist and the tourism activity declined (Visser, 2004). After the peace-accord in 1992 initiatives to recovery the tourism industry has been applied (Sun, Sand and Sea, complemented by Eco-tourism; Culture; Water sports, Adventure and Urban Tourism). Political Frelimo has been in power since the countrys independence from Portugal in 1975 and has the majority of the parliamentary seats 191 out of 250. In 1990 a new constitution that provided for multipartysm was implement (www.news.bbc.co.uk, 2010). The country shift from one-party autocracy to multi-party democracy. Implemented institutional reforms for the re-schedulling of debt and loans; it open up to the markets by adopting adjustment measures of liberalisation which included public/private cooperation (Kulipossa, 2006). There was a shift from centralised government approach based in a dictator state where single decisions were made and all the infrastructure belonged to the state (horizontal policy coordination across Ministries), to a decentralised approach (vertical policy coordination between different levels of govern) where the power of management was shared with regional and local levels since they were better positioned to deal with local needs and more able to implement polic ies and integrating the communities as part of the process . The government decided to open the nation market to private sector as they were better financially to build and reconstruct the infrastructures that were in need and because of their ability to bring foreign exchange to the country. Even the govern of Mozambique being responsible for Tourism Policy and Implementation Strategy, is still fragile in experience and financial resources. To reduce the existing gap of linking policies with the actions, the nations government are dependent of foreign help, needing to defer the responsibility of tourism recovery, national or local economic development to the Non Governmental Organisations (NGOs) and Associations, (Rylance in Spenceley, 2008). Economy According to Rylance in Spenceley, (2008:29), the nation economy varies from inefficiency, poor infrastructure and high levels of corruption, which discourage foreign investment. Nevertheless, between 1993-2004 there was a growth of 7.2 GDP, an annual average of 8 per cent over the last decade. Additionally, there was a decrease on annual inflation from more than 54 per cent in 1995 to 13.5 per cent in 2003 and 9.1 per cent in 2004. Despite the achievements Mozambique remains one of the poorest countries in the world. The per capita income in 2004 was equal to $320 (UNDO, 2004 cited by Rylance in Spencely, 2008:29). Furthermore, the country remains very dependent of international help through donations and is largely dependent of the agriculture sector which employs 83 per cent of the population and is responsible of 80 per cent of the exporters and for 26 percent of national GDP (SNV Mozambique, 2007:3 cited by Rylance in Spencely, 2008). The influence and power of negotiation is we akened by the nations vulnerability and dependency upon a greater number of foreign companies. On the other hand, Mozambique governments have been accused of problems of corruption on the legislation and collection of revenues. Critics assert that Mozambique is pursuing mega projects that do not generate social benefit (www.news.bbc.co.uk, 2010). Nonetheless, during 2006 the tourism sector generated revenues around US$ 144 million, it is expected that the industry will became one of the major foreign exchange earner as it is increasing in its foreign investment (Jossai, 2010). Social: It has been recognised that as an economic sector, tourism has both positive and negative impacts over the society. However, with an adequate anticipation and implementation of strategic plan tourism can be developed with reduced impact in the natural areas: the several benefits of the industry upon the society can be maximised, and the disadvantages can be minimised or even eliminated. With this understanding Mozambican policies and planning developers have adopted sustainable actions aspiring a balance in the tourism development, humans, animals and ecological communities. The focus was to reduce poverty by adopting tourism sector as a tool for development, either by local supply of services and goods to tourism enterprises or by enterprises employing the poor; plus providing the means for improvement of health, education and sanitary conditions. Though, it may be assumed that the government have failed to provide the right tools for local involvement as it was incapable to support people with training and knowledge to reduce the barriers of getting locals involved in the tourism economies, did not have option than lead it to the NGOs and associations that have started to do so (Rylance in Spenceley, 2008). This is due to the government lack of capacity and low involvement in implementing and manage policies. Moreover, the shortage of available finance for small enterprises and the time needed to start a business, discourages the majority of locals from contributing to the sector. For example: to open a business in Mozambique it takes on average 153 days (World Bank, 2004 cited by Spenceley, 2008). McEwan, (2004, p7) argues that local tourism enterprises are prevented from getting involved in the business and remain very dependent of foreign investment and international aid. In fact foreign investment involves 70 per cent of the Mozambique tourism projects and local borrowing from banks, has high costs 15 per cent interest in real terms (Rylance in Spenceley, 2008). Development As a reflection of predominance of business travellers, visiting friends/relatives and regional weekend trip of leisure segment, the average stay in Mozambique is around 2.3 days, comparatively low to Kenya 8.4 days average length. There are 2.030 tourist establishments in Mozambique which directly employed over 35.000 people. The southern borders are the visitors main entrance but investors are starting to show some interest in the northern areas (Pemba, Quiribas archipelago and Nacala). In 2001 the number of international tourist arrivals was just about parallel to the visiting numbers during the colonial period. The accommodation sector has a total of 12.000 beds, near 5,000 cope with the luxury standard or 3 star above on the international market. In compare, the city of Cape Town has something like 30,000 beds and Mauritius 19,600 beds. The national air lines are expensive and limited: operating three Boeing B737 which serves domestic connections from Maputo to the other main ci ties of the country (Beira, Nampula, Quelimane, Pemba, Lichinga, Chimoio and Tete) and regional routes to Johannesburg and Dares Salaam (Williams, 2006). The accommodations and tourism facilities (hotels, tourism resorts) are very expensive favourable for the wealthier customers. Furthermore, the human capital (residents, poor people) are mostly employed in low levels jobs such as cleaners and bar staff which reduces their chance of economic benefits as their wages and level is equally low (SNV Mozambique, 2006 cited by Rylance in Spenceley, 2008). The major investors of Mozambiques tourism industry have recognised the uniqueness of the country, that is the fact of being the only in the neighbours that do not have Anglo-Saxon colonial past since was colonized by Portugal, and from the fact of having a mix of cultural environment and rich heritage of Arabic, Swahali, Portuguese and African influences (Williams, 2006). Conversely, as the majority of tourist are English speakers, this advantages is also a barrier since tourist and locals have communication gaps. In addition, the nation has a limited offer of tourism products, constrained to the safaris games products. The investors and tour operates still reluctant in diversify and reach the unexploited areas by developing new tourism products and attract new markets. As a withdrawal affect the country competitiveness with exception of Malawi, is very low in comparison to the bordering neighbours (South Africa, Zimbabwe, Tanzania, Suazilandia, Zambia). Although, there are indications of economic improvement since the civil war: increase in the national GDP, reduction of inflation and levels of percentage of poverty however, the wealth distribution of income still irregular by favouring elite groups and elements of government. In addition the country continues dependent on food import and, also vulnerable to the global prices (EIU, 2010). One aspect of the tourism industry is the negative impact that it causes to the destinations. It, has been suggested by many, such as: Kadt, (1979); William, (1998); Mason, (2003); Hall, (2008); Spenceley, (2008), that the destination plan should encompass the tourism alternative approaches. Moreover, even the existence of different plan approaches or reasons of plan, it is assumed that they are imperative for the insurance of pathways to be taken as a mean to anticipate and correct possible events. In this basis, by adopting the national strategic plan for tourism, Mozambique allowed itself for any readjustments if necessary. The focus of the Strategic Plan for the Development of Tourism in Mozambique 2004-2013, (2004), was the business modern management approaches, tourism towards to product service quality and conservation, rehabilitation of wildlife in specific areas, co-operation with the neighbouring countries to consolidate and expand conservations areas, promote professional hunting industry and support communities to actively and effectively participate in tourism process, with the aim of four million arrivals per annum by 2025. The government priority was to reduce poverty and prevalence of HIV infection which even high is still lower than the regional average. This was intended to be done by building country prestige, broadcast possible investments, job opportunities, income generation, developing health and education (Ministry of Tourism, 2004). Seeing that, foreign currency plus capital investment into the tourist destination, permits a faster urban, social, economic regeneration and that worldwide tourism is the industry that employs most people and had shown some ability in adapting quickly to crises that have affected the world economy. Tourism was identified by Mozambique Government as a mean to promote local economic development (Gunn Var, 2002). To minimise the negative effects of the industry on environment and culture, while as well maximi ses the economic and community benefits, the tourism policy is guided by the Tourism Law. (2004) which regulates licensing, provides the basis for sustainable growth and criminalises child sexual tourism; Action Plan for Absolute Poverty Reduction (PARPA), (2006) which sets social policies and programs to promote economic growth through tourism; National Tourism Code of Conduct, (2007), elaborated between the Ministry of Tourism and the Mozambique Confederation of Business Association (CTA) (www.sustainabletourismnetwork.co.za, 2010). The objective was to generate new employments for the enhancement of people quality of life; increase the numbers of international visitors and investors by improving the balance of trade; fairly distribute the tourist benefits, and expand the industry in zones that present greatest potential, by providing a more equitable development of the nation, putting the emphasis on the relation between tourism and its environs; in addition for the tourism growt h and for the creation of benefits to its people, the country was seeking for greater national unity through tourism; in order to protect regional architecture, monuments, conserve resources, balance planning of areas, and incentive the development of handcrafts and folklore, the tourism strategic plan recommends protection of cultural and natural resources (Ministry of Tourism, 2004). Conclusion: An analysis of tourism in Mozambique, indicate that existing tourism mix are the beaches and unspoilt interior that offers greatest potential for the development of wildlife market. Conversely, the poor infrastructures contributes for low tourism products and, inhibits investment. Bearing in mind the nation natural resources as the tourism potential (2700 km of tropical coastline with diversity, rare ecological systems and rich historic cultural heritage), shall be said that the coastline is unplanned and uncontrolled becoming then, the biggest threat for the tourism sector. Moreover, the actions taken by the private business that are mainly interested in the immediate circumstances and profits, exclude factors of the market such as the preservation of public goods (parks, historic sites, beaches, infrastructures), externalities (simultaneous production and consumption of tourism, which restrict access to the coastal land, fishing and historic places) and external costs (not reflecte d like as the opportunity costs), causing the inability of the market system Market failures. Which prevent the nations achievement of the economic efficiency and reflect the social costs. The key factors for Mozambique tourism planning are political, economic and social. Its success or failure depends upon all organism together being able to share and achieve goals that would be difficult to achieve by themselves. Rylance in Spenceley, (2008) argues that there are differences between the policy and practices of tourism-led LED in Mozambique. Although, admits that there is a lack of statistical data for a firm conclusion. Nonetheless, the fact of government investment in megaprojects that do not generate social benefits may indicate a deviation from the key principle of the strategic plan: the business modern management approaches and the perspective of development first instead of tourism first (Burns, 1999). In conclusion, it may be said that tourism in Mozambique is in its early stages. It is very incipient, high levels of corruption, limited in air transport and road accesses, lack of experience and has expensive tourism services and facilities. Still, it can be sa id that it is hard to predict the directions it will take, and if the target arrivals by 2025 are realistic or not; so far there is potential, willingness and the initial steps were taken.

Saturday, July 20, 2019

Literary Analysis of Emily Dickinsons Poetry Essay -- Emily Dickinson

Literary Analysis of Emily Dickinson's Poetry   Ã‚  Ã‚  Ã‚  Ã‚  Emily Dickinson is one of the most famous authors in American History, and a good amount of that can be attributed to her uniqueness in writing. In Emily Dickinson's poem 'Because I could not stop for Death,' she characterizes her overarching theme of Death differently than it is usually described through the poetic devices of irony, imagery, symbolism, and word choice.   Ã‚  Ã‚  Ã‚  Ã‚  Emily Dickinson likes to use many different forms of poetic devices and Emily's use of irony in poems is one of the reasons they stand out in American poetry. In her poem 'Because I could not stop for Death,' she refers to 'Death' in a good way. Dickinson states in the poem that 'He kindly stopped for me --' (1103, 2). Death is not commonly known as being 'kind', which leads us to believe that Dickinson used this line to hint that death was a good thing. In the entire poem, she does not refer to death in a negative way. This shows more irony since death is often feared by many, either regarding themselves or other. This us of irony makes the poem more interesting to the reader.   Ã‚  Ã‚  Ã‚  Ã‚  Imagery is a big component to most works of poetry. Authors strive to achieve a certain image for the reader to paint in their mind. Dickinson tries to paint a picture of ?death? in her own words. Thomas A. Johnson, an interpretive author of Dickinson's work, says that ?In 1863 Death came into full statue as a person. ?Because I could not stop for Death? is a superlative achievement wherein Death becomes one of the greatest characters of literature? (Johnson). Dickinson's picture to the audience is created by making ?Death? an actual character in the poem. By her constantly calling death either ?his? or ?he,? she denotes a specific person and gender. Dickinson also compares ?Death? to having the same human qualities as the other character in the poem. She has ?Death? physically arriving and taking the other character in the carriage with him. In the poem, Dickinson shows the reader her interpretation of what this person is going through as they are dying and being taken away by ?Death?. Dickinson gives images such as ?The Dews drew quivering and chill --? and ?A Swelling of the Ground --? (14, 18). In both of these lines, Dickinson has the reader conjure up subtle images of death. The ?quivering an chill? brings to the reader's mind of death being ... ...g to ?Eternity? (24). Dickinson also ties the sun into symbolism, but her use of ?sun? make sit an excellent word choice (12). The sun which symbolized the ending day, also can be meant to pass over ?all who are in the grave? (Johnson). With Emily Dickinson's anomalous word choice and her emphasis on certain words, she creates an ultimately more interesting poem.   Ã‚  Ã‚  Ã‚  Ã‚  In ?Because I could not stop for Death,? Emily Dickinson uses many poetic devices to make her poem stand out among other poems centered around death. Dickinson's use of irony, imagery, symbolism, and word choice adds to the overall effect of her view of ?death? itself. The way she structured this poem helps her stand out as one of the greatest poets of all-time. Works Cited: Dickinson, Emily. ?Because I could not stop for Death.? Literature: An Introduction to Fiction, Poetry, and Drama. Ed. Kennedy, X.J., Dana Gioia. New York, NY: Pearson Longman, 2005, 1103. Johnson, Thomas H. Emily Dickinson: An Interpretive Biography. New York: Atheneum,1980. 222-224. Melani, Lilia. ?Emily Dickinson ? Death.? Online Posting. 25 Jan. 2003. Dept. of English: Brooklyn College.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  

Friday, July 19, 2019

Melatonin And The Pineal Gland :: essays research papers fc

Melatonin And The Pineal Gland Set deep in our brains is a tiny gland called the pineal gland. This tiny gland is in charge of the endocrine system, the glandular system that controls most of our bodily functions. The pineal runs our Å’body clocks', and it produces melatonin; the hormone that may prove to be the biggest medical discovery since penicilin, and the key to controlling the aging process. The pineal gland controls such functions as our sleeping cycle and the change of body temperature that we undergo with the changing seasons. It tells animals when to migrate north and south, and when to grow or shed heavy coats. By slowing down and speeding up their metabolisms, it tells them when to fatten up for hibernation, and when to wake up from hibernation in the spring. Melatonin is the hormone that controls not only when we feel sleepy, but the rate at which we age, when we go through puberty, and how well our immune systems fend off diseases. Being set in the middle of our brains, the pineal gland has no direct access to sunlight. Our eyes send it a message of how much sunlight they see, and when it's dark. The sunlight prohibits the gland from producing melatonin, so at night, when there's no sun, the sleep-inducing hormone is released into our bodies. Because of the pineal gland and melatonin, humans have known to sleep at night and wake during the day since long before the age of alarm clocks. Humans don't produce melatotin right from birth; it is transfered in utero to babies through the placenta. For their first few days of life, babies still have to receive it from breast milk. Our levels of melatonin peak during childhood, then decrease at the beginning of puberty, so that other hormones can take control of our bodies. As we get older, the amount of melatonin we produce continues to decrease until at age 60, we produce about half as much as we did at age 20. With the rapid decrease from about age 50 on, the effects of old age quickly become more visible and physically evident. With what scientists have recently discovered, we may very soon be able to harness melatonin to slow down aging, fend off disease, and keep us feeling generally healthy and energetic; not to mention the things melatonin can do for us right now like curing insomnia and regulating sleeping patterns, eliminating the effects of jet-lag, and relieving every day stress. Melatonin is known as the "regulator of regulators", because it sends out Melatonin And The Pineal Gland :: essays research papers fc Melatonin And The Pineal Gland Set deep in our brains is a tiny gland called the pineal gland. This tiny gland is in charge of the endocrine system, the glandular system that controls most of our bodily functions. The pineal runs our Å’body clocks', and it produces melatonin; the hormone that may prove to be the biggest medical discovery since penicilin, and the key to controlling the aging process. The pineal gland controls such functions as our sleeping cycle and the change of body temperature that we undergo with the changing seasons. It tells animals when to migrate north and south, and when to grow or shed heavy coats. By slowing down and speeding up their metabolisms, it tells them when to fatten up for hibernation, and when to wake up from hibernation in the spring. Melatonin is the hormone that controls not only when we feel sleepy, but the rate at which we age, when we go through puberty, and how well our immune systems fend off diseases. Being set in the middle of our brains, the pineal gland has no direct access to sunlight. Our eyes send it a message of how much sunlight they see, and when it's dark. The sunlight prohibits the gland from producing melatonin, so at night, when there's no sun, the sleep-inducing hormone is released into our bodies. Because of the pineal gland and melatonin, humans have known to sleep at night and wake during the day since long before the age of alarm clocks. Humans don't produce melatotin right from birth; it is transfered in utero to babies through the placenta. For their first few days of life, babies still have to receive it from breast milk. Our levels of melatonin peak during childhood, then decrease at the beginning of puberty, so that other hormones can take control of our bodies. As we get older, the amount of melatonin we produce continues to decrease until at age 60, we produce about half as much as we did at age 20. With the rapid decrease from about age 50 on, the effects of old age quickly become more visible and physically evident. With what scientists have recently discovered, we may very soon be able to harness melatonin to slow down aging, fend off disease, and keep us feeling generally healthy and energetic; not to mention the things melatonin can do for us right now like curing insomnia and regulating sleeping patterns, eliminating the effects of jet-lag, and relieving every day stress. Melatonin is known as the "regulator of regulators", because it sends out

Thursday, July 18, 2019

Plagiarism †Impact of Internet Essay

The advent of technology and internet in the last decade has opened up several avenues for unlimited information access. This along with the increasing academic pressures has led students to resort to plagiarism at an alarming rate (Elliot, 2004). The problem of plagiarism in the academic context can no longer be ignored as it is hampering the creativity and intellectual capacities of students. Overall, there has been a growing concern and an increase in awareness to find ways to counteract plagiarism. Thesis Problem Statement It has been said that internet hinders the creativity of students and encourages intellectual laziness. This paper intends to explore the negative effects of internet on the creative thinking abilities of the students and find some ways to counteract it. Internet and Plagiarism While the concept of plagiarism is not new, it is certainly more widespread now than before. Plagiarism basically means copying someone else’s work and claiming it as own without giving due credit to the original author (Jones, 2007). With the advent of technological era, information is easily accessible and the temptation to pass off someone else’s work as one’s own is high. There is no limit to the amount or type of information that is available on internet covering every subject imaginable. While this kind of information accessibility is advantageous in several ways and facilitates learning in some scenarios, it also leads to several problems with plagiarism especially in the academic context. Due to the availability and ease of access of the information without any restrictions, the effort to plagiarise is much less compared to earlier days when students had to go through a laborious process to get access to the relevant resources in order to copy. In this co ntext, the impact of internet on cheating can be considered extremely high and is known as digital or cyber plagiarism. Impact of internet According to the NEC Research Institute, there are more than 1.4 billion pages on the Internet with 25 new pages being added every second (Dyrli, 2000). Due to this huge database of information, it is very easy to find papers and information related to the academic subjects This has led to a rapid increase in the percentage of cheating both intentional and unintended by students. According to a study conducted by the Centre for Academic Integrity of Duke University, plagiarism due to internet has increased fourfold in the last 6 years (Vencat, 2006). Several other studies have substantiated this claim of rising incidents of plagiarism and the blurring of moral lines among students. Reasons and Effects of Plagiarism Before delving deep into the effects of plagiarism and ways to prevent it, it is important to understand the reasons for it. While the availability of information is certainly a forerunner, there are several other reasons which lead to it as well, the main one being the academic pressure to which students are subjected and the emphasis on good grades in today’s competitive world (Elliot, 2004). However, since the focus of this paper is digital plagiarism, the main reasons why internet encourages plagiarism are stated below: 1. Access to unlimited information through websites and search engines. 2. The ease with which content can be copy-pasted as compared to the earlier traditional methods of copying the material by hand. 3. Difficulty in detecting plagiarism due to the sheer amount of information against which a particular essay or paper needs to be compared. 4. Lack of standards and criteria making it difficult to pin down a work as exact plagiarism. Due to all the reasons mentioned above and many others, the incidents of cheating are steadily on the rise since the last decade. While a lone instance of plagiarism is negligible, massive increases such as these indicate a self-destructive trend among the student community and are becoming a cause of worry (Lathrop & Foss, 2000). Cheating students not only hamper their own intellectual growth, they also make it that much more difficult for honest students to get their due. Students may gain admission to courses which they do not deserve by using the grades obtained through wrongful means and this creates a permanent impact on the future of the society. This impact becomes especially dangerous if a cheating student decides to get into fields such as medicine, law etc. Also, if a particular student who plagiarises regularly receives good grades, it might compel others to do the same and hence the problem will continue to spread. Considering all these factors, it has become imperative for the academic community to take a strong stand against plagiarism. Avoiding Plagiarism The anti-plagiarism industry has been gaining more and more prominence in the last few years and educational institutions have started enforcing very strict guidelines to ensure that students do not cheat. Most of the institutions mete out severe punishments to offenders. Having said that, the subject of academic integrity is a debatable topic and since all the information available on internet is considered public, it is difficult to define intellectual property in a precise manner. Creating awareness is the first step towards preventing plagiarism and most institutions are taking steps to ensure awareness among students. There are also several resources available on the internet which give information about what constitutes plagiarism and what does not. Teachers are resorting to the use of plagiarism detection softwares to catch offenders. As mentioned before, there are several reasons which ultimately culminate in plagiarism. Apart from the ones mentioned in the previous section, there are also several internal factors which lead students to cheat. Procrastination, poor planning and time management, peer pressure, lack of subject knowledge etc are some of the contributing factors (Elliot, 2004). Sometimes, students are genuinely not aware of the intricacies of citing works and thereby make mistakes which constitute accidental or unintentional plagiarism. However, the fact that the plagiarism was unintentional does not make it acceptable and is still considered wrong. To avoid plagiarism, it is important to tackle the root of the issue. While the institute and teachers can play an important role in creating awareness and challenging assignments which encourage creative thinking, at the end of the day, the moral responsibility lies with the students and it is up to them to understand the consequences of cheating and make an effort consciously to avoid it (Martin, 1984). There are several ways in which students can contribute towards reducing such cases. It is important to create self-awareness by studying all the plagiarism related policies and literature provided by the university and also to understand the consequences of not following the rules as most of the universities subscribe to anti-plagiarism softwares lately. Along with policies, it is also important for students to understand the ethics behind the policies. There are several writing formats and referencing styles followed by universities which provide guidelines on giving credit to the original source and students should familiarize themselves with the ones accepted by their own institutes (Kirszner & Mandell, 2004). It is a good idea to ask for help whenever there is any confusion about citing. Also, it is of utmost importance for students to develop good time management skills and plan their coursework in a proper manner as lack of time is one of the main factors for cheating. A good internal schedule with enough time allocated for understanding the subject matter can go a long way in preventing the temptation to cheat. By gaining a good understanding of the subject matter, it is possible to analyse what has been written on the subject by others and extract the relevant data from it rather than blind copying. Last but not the least, it is extremely important to cite all the information which has been borrowed from other sources (Neville, 2007). Developing Creative Thinking During his days as the editor of the Forbes magazine, Malcolm Forbes once said that â€Å"Education’s purpose is to replace an empty mind with an open one†. This quote aptly describes the actual intent behind the design of academic subjects and the related coursework. It has been said that the ability to think and react logically is critical for a person’s personal as well as professional success. While the internet or any other literary resource might provide the information and the facts relevant to a coursework, they do not serve the actual purpose of a course. Most of the times, the aim of a coursework, be it an essay or a dissertation is to test the subject knowledge and critical thinking abilities of the student. Mere copy pasting does not in any way, reflect the thinking abilities of a student. The internet can be a powerful source of data and information as long as the student learns to process the data and understand the information independently.   Th e information available can be used more productively if the students relate it to the task at hand and build upon it. There are several ways to develop critical thinking abilities though it is not possible to simply learn them. Every assignment can be broken down into logical chunks which encourage thinking and analysing on the students’ part. Students can also participate in class room discussions to the maximum possible extent to understand various viewpoints and relate them to one’s own views. Participating in discussions and taking notes at appropriate places ensures that the original authors are always credited for their work. This also encourages asking questions and raising doubts as and when they arise thereby helping the students understand the subject better. Understanding the subject ensures that students do not blindly accept the facts presented by someone else without questioning the logic behind it or without asking for evidence (Martin, 1984).

Supplier Relationships: a Strategic Initiative

provider kindreds A strategical hatch mien Jagdish N. Sheth Goizueta chore School Emory University A effort Sharma University of Miami Jagdish N. Sheth is Charles H. Kellstadt Professor of merchandise, Emory Business School, Emory University and Arun Sharma is harmonise Professor of market, University of Miami. This paper ext subverts research produce by the authors in Industrial Marketing solicitude (March 1997). Please address parallelism to Arun Sharma, Department of Marketing, University of Miami, P. O. Box 248147, Coral Gables FL 33124, recollect (305) 284 1770, FAX (305) 284 5326.provider Relationships A Strategic Initiative* Abstract In an increasing belligerent marketplace, wets argon seeking impertinent methods of enhancing militant advantage. Today, buy is befitting a strategical get going and a key doer in war-ridden positioning. This paper extracts that high-octane alliance with providers ac knowledge for provide firms with following-generati onal militant advantage. With consolidation of firms at bottom industries, continuos reaping growth and constant pressure on cost, provider descents go out get d take in much than(prenominal) detailed in the proximo.This paper discusses the emergence of provider dealingships, and how this shift toward provider relationships has and go forth channelize the role, work superstars and strategies of firms. Although purchasing has strategic importance within a firm, good relationships among clients and providers ar elusive. Firms, therefore, take on to emphasizing aspects that get out get up provider relationships. * This paper extends research published by the authors in Industrial Marketing Management (March 1997). Supplier Relationships A Strategic InitiativeIntroduction Firms be facing more and more competitory environments characterized by continuos pressure on cost, bear-sized spheric players, continuously evolving products, customer atomisation and emerge technologies. To escort success, firms realize that they can non be experts in all stockes and be concentrating on their fondness competencies. As an example, Westinghouse is selling its office and defense lines to concentrate on the beam business. To elicit their execution in non-core power aras, companies are reevaluating business relationships so as to form closer relationships with strategic providers 1, 2, 3.Firms curb realized that collaborative business relationships alter a firms ability to respond to the tender business environment by seizeing them to focalise on their core businesses and invalidate costs in business memberes. In an in front paper, we had suggested that the origination of next-generational free-enterprise(a) advantage ordain be collaborative relationships that firms wee with their providers 4. We suggested quartetsome reasons for this phenomena. First, marketers or sellers are driving this trade as firms commence started identifying and catering to the remove of specific customers.Thus, having a relationship with suppliers result enable firms to receive break out advantage and therefore be more efficient in procurement. Second, firms recognize that supplier relationships ordain allow them to be more effective. It is easier to weapon strategies such(prenominal) as fiber platforms, if firms collect relationships with their suppliers. Third, there are enabling technologies that allow firms to select their best customers and suppliers. Computer programs allow firms to calculate profitability summon 2 associated with all(prenominal) customer or supplier.Finally, contention and the growth of alliances are forcing firms to develop give supplier relationships to maintain a competitive edge. The purpose of this paper is to emphasize that supplier partnerships exit provide a strategic advantage to firms. This paper identifies the improvements of supplier partnerships and provides guidelines for future supplier partnering. Shift in organizational scheme The reason for the emerging fierceness on supplier relationships is the shift in organizational acquire strategies 4. Organizational purchasing strategies bring been dramatically changing for four reasons (please see systema skeletale 1).First, orbiculate battle had made firms realize the competitive advantages of creating and managing run chain relationships. Second, emergence of the Total calibre Management philosophy has encouraged annul marketing starting with external customers and pitiable backward into procurement processes. For example, Demand drive Manufacturing or flexible manufacturing and operations take a authority been instituted in order to serve the kind of demand with respect to form, place and era value to customers. The role of suppliers is comminuted in this regard.Third, industry restructuring through mergers, acquisitions and alliances on a global prat has reorganized the procurement f unction from a decentralized administrative function to a centralized strategic function. This is further intensified by outsourcing some(prenominal) nutriment functions such as selective knowledge bear upon, and human resources. Finally, uses of information technologies have re social organisationd the buying philosophy, processes and platforms by allowing firms to share market information and use market information to agendum design and manufacturing of products better. scalawag 3Fundamentally, the consequence of changing paradigms of organizational strategy is likely to termination in a dickens dimensional shift as shown in send off 2. Organizational purchasing strategy shifts from a transaction orient to a relative oriented philosophy, and from a decentralized interior(prenominal) sourcing to a centralized global sourcing process. Relationship with Suppliers As stated earlier, we suggest that exploitation relationship with suppliers exit be critical for the effect ive functioning of firms. This flair is reflected in Table 1 that shows that large firms have substantially reduced their tally of suppliers.This arc to a fault suggests that some suppliers would be soap to firms. The primary reasons are that corporations are fit leaner. The procurement function is becoming more centralized while the profit-and-loss (P) responsibility of firms is becoming less centralized. Business-unit heads are raising more questions to the highest degree the way things are bought. And as vertically integrated companies those that have tell apart inherent capabilities and are self-sufficient become relics and outsourcing of operations become a reality, more opportunities to partner with suppliers forget resurrect.Taking advantage of these opportunities is increasingly definitive for several reasons Declining market prices. aught give births prices to rise anymore. There is going to be a tighter squeeze on the margins of customer companies. They wou ld like to get that margin re applyed by working with suppliers. Rising competitive intensity. With the restructuring of the demesne economy, the formation of the World Trade Organization, and great economic integration within and between regions, global and regional consolidation is intelligibly taking place and resulting in greater rogue 4 competition. Advanced applied science enablers. Electronic commerce and networked computing are here. Dramatically reduced cycle clock are becoming an ordinary achievement. These train partnering with suppliers. Reverse marketing strategies. The traditional process flow from R and sourcing to manufacturing, sales and wait on is becoming a thing of the past. Today, market-foc utilize organizations are organizing into reverse marketing starting with the end users. Partnering with suppliers is critical to this strategy. Strategic positioning. In the past, companies partnered in general for operational efficiency (i. . , just-in-time procedures or zero-armory models). Today, vivid competition is coming from existing rivals, new entrants and the threat of substitutes. Partnering with suppliers is an increasingly important way of minimizing the competitions negative intrusion on an industry. Example of Companies Benefitting from Supplier Relationships The major(ip) research regarding the advantage of supplier relationships comes from a study of the japanese automotive broker industry 5. They set up that the average space of the relationship between suppliers and buyers was 22 years.In addition, the major customer bought about half the end product of the supplier firm. About 26% of the suppliers development effort was devote to a single customer. Competition was curb to 2-4 a nonher(prenominal) suppliers. Finally, the forest of delivered product was genuinely good. The information would suggest that supplier relationship conjured the design efforts of the buying alliance and reduced uncertainty and costs for the paginate 5 supplier company. Eastman Kodak, cross drive social club, Levi Strauss, DuPont , McKesson and Bose corporation demonstrate that some nest egg can be achieved by supplier relationships 2.These firms as substantially as examples of opposite firms using specific tactics to benefit from prosperous relationships are discussed next Eastman Kodak company Eastman Kodak Company has outsourced its information and information bear upon system to IBM. Kodak has achieved substantial cost savings through reducing personnel, assets and capital expenditures in an area that is not its area of core competence. This shift toward asking data processing and systems steering consultants to manage the information and data processing of a firm has speed as major firms such as Xerox and Ryder have outsourced their inner data processing systems.Ford Motor Company Ford formed a relationship with wizard of their own clutch suppliers. Ford examined the take process of their supplier and was able to reduce the cost of the clutch by 20% benefitting some(prenominal) Ford and the clutch supplier. Similarly, base on their past grow with Donnelly, Honda picked Donnelly as an exterior mirror supplier, although Donnelly had no experience in the area 3. Honda sent its engineers into Donnellys plant, and Honda and Donnelly engineers reorganized the plant and re engineered the product process.Sales are expected to be $60 million in 1997 and costs are expected to decline 2% every year benefitting twain Honda and Donnelly. JC Penny and Levi Strauss JC Penny and Levi Strauss are linked with an electronic Data Page 6 interchange (EDI) that allows Levi Strauss to obtain sales data. Levi Strauss obtains data on the exact size of jeans sold in singular stores. This data allows Levi Strauss to better plan the production process as well as better control inventory and delivery. This saving leads to a reduction in costs and prices benefitting both(prenominal) JC Penny and Levi Strauss.DuPont Dupont has reduced the costs of individually purchase transaction in the tending and repair supplies division from $120 to $16 by working with a small number of suppliers. DuPont selected one distri aloneor in each region for a supplier relationship. They then implemented a paperless order, reception and payment process. In addition to change magnitude costs of transaction, inventory at the attention and repair facilities were reduced by 50%. McKesson Drug Company McKesson a major drug distributor, developed a relationship with Johnson and Johnson, one of their major suppliers.Through a knock computer system development effort, both firms receive data on inventory, flower of sale, demand, and customer information. This has led to Johnson and Johnson providing better function to McKesson increasing the level of service that McKesson provides to its customers. due to the success of the relationship, Johnson and Johnson has turned over a milli on dollars worth of business to McKesson. Bose deal Bose corporation has attempted to eliminate both purchasers and salespeople by bringing suppliers into the manufacturing process.Suppliers have rile to Boses data, employees and processes. They work with Boses engineers on personate and future products. The Page 7 reduction in personnel reduces costs for both sides, and a direct nexus between the user and producer enhances quality and innovation. Establishing and Maintaining Supplier Relationships Wilson 6 suggests that the majority of alliances fail. We flavor that or so of the problems are associated with the selection and maintaining of supplier relationships. We wassail research finding from academic research, USGAO 2 and our own experiences.In order to establish relationships, we suggest that firms be very selective in their criteria. In addition to the normal criteria of competency and quality, we suggest the following additional factors be interpreted into considerati on institutionalise and Commitment to long Goals. Both suppliers and buyers pauperism to demonstrate place and commitment toward a semipermanent vision. Trust and commitment have been shown to be the major predictors of successful relationships. Mutual Benefit. The relationship should be of benefit to both the buyer and the seller.If the relationship has one-sided benefits, the relationship will not last. Top Management Support. Most successful relationships are associated with support from the top managers of a firm. As examples, the success of Walmart and Corning in forming relationships is because their CEOs have supported supplier relationships. Also, DuPont and Roadway declaim have formed an Executive instrument panel that meets at both companies to enhance their relationship 2. Compatible Organizational Culture. The culture of firms should be compatible. This Page 8 uggests that they share common values and share common proceeds systems. A major relationship initi ative between two tele talk firms did not work because they did not share a common work philosophy. One firm was very intense, whereas the other firm was rigid back. The relationship dissolved in six-spot months. Sharing of Information. Relationships require sharing of information. The benefits of relationships arise from reducing the uncertainty associated with transaction oriented exchanges. Information increases certainty and reduces fillless interaction.As an example, Bailey Controls, a manufacturer of control systems shares data with two of its main electronic distributors that has allowed Bailey to reduce inventory and costs 3. warm and Open Communications. Strong and open communications reduces mis collar and enhances the quality of relationships. Maintaining Successful Relationships The following aspects are regarded as important for the successful maintenance of relationships. unanalyzable and Flexible Contract. Simple and flexible contracts enhance relationships as they are used as guides rather than specifying all contingencies.For example, when Kodak outsourced their computer support operate to IBM, they used an eleven-page contract 2. In contrast, typically simple business contracts run to about 30 pages. Intensive Management Involvement. Cross functional teams from both the supplier and buyer organizations that meet periodically to enhance their relationships. For example, Ford uses salespeople to provide suppliers with consumer feedback 2. Page 9 Periodic Performance Monitoring. We have found that performance monitoring is critical for relationships. Suppliers also appreciate a formal performance evaluation method.As an example, Motorola evaluates and generates a score circuit board for all of its suppliers 3. The suppliers next order is based on the suppliers previous performance. Suppliers appreciate this knowledge and compete better. Internal Controls. It is intuitive but companies need to protect access and diffusion of confide ntial information with rigorous internal controls. Problem Solving Procedures. Companies need to establish problem solving procedures that reduce conflicts or prevent conflicts. One of the simplest forms is frequent communication at all levels of the customer and supplier organization.Organizational Changes Need to Establish Supplier Relationships As stated earlier, as we traverse from a transaction and domestic orientation to a relationship and global orientation, firms will need to emphasize the development of relationship with suppliers. This furiousness of a relationship orientation toward suppliers will lead to an expertise in many aspects of business buying. These areas are highlighted in Figure 3, raised in our earlier paper 4 and discussed next. 1. Supplier as a Customer. As discussed earlier, there will be a lug toward developing and maintaining relationship with customers.However, firms beneathstanding in this area is very limited. Firms will need to develop commitmen t, self-assertion and cooperation with their suppliers. Firms will need to invest in correlative goals, interdependence, structural bonds, adaptation, non Page 10 retrievable assets, shared technology and social bonds to ensure successful relationships 6. 2. Cross- in operation(p) Supplier Teams. Marketers have used interdisciplinary teams to contact and maintain relationships with their customers. As individual suppliers relationships become more important we expect a similar thrust toward cross-functional teams that are dedicated or center on their key suppliers.The importance of individual suppliers is expected to increase because of the emergence of sourcing on a global and relational root word with a few key suppliers. Firms will need to change goals, reward structure and group norms of the purchasing function. 3. Does Partnering Pay? Firms will need to monitor the return on investment in establishing relationships with suppliers. Therefore, firms will need to develop a pe rformance metric unit that analytically quantifies supplier relationship equity. We feel that supplier partnering with smaller share suppliers will not be economical.The cost-benefit analysis of supplier relationships should result in increased supplier selectivity. 4. Supply Experience Curves. Managing supplier relationships will not be an easy proletariat. The task of managing relationships on a global basis will be more coordination compound and not analogous to domestic supplier management as intimately business customers have realized. Therefore, in industries where supplement function is a key strategic advantage, companies need to focus on creating core competency in supply side management and develop sharper experience curves. Page 11 5. Hub and Spokes Organization. We expect organizations to reduce the number of uppliers in each product or service course. In addition, re engineering has forced firms to out source internal activities. We expect the results of these two trends to lead to a hub and spoke organization in which one or two suppliers in each product or service category are the spokes and the procurement organization becomes the hub on a global basis. 6. Bonding with Suppliers. Marketers, specifically those that practice relationship marketing have learned to bond with their customers. Bonding relates to the empathy that the marketing organizations feel toward their customer groups.With an increasing trend toward creating, managing, and enhancing ongoing relationships with suppliers on a global basis, organizations will have to invest in supplier bonding processes and philosophies. 7. world(prenominal) Sourcing. We expect global sourcing to be a source of strategic advantage. While several global enterprises, especially in the automotive, high technology and the aerospace industries are establishing processes and platforms, it is still at an infancy stage of practice in other industries. Firms will have to develop expertise in global sourcing strategies as well as global logistics. . Cross-Culture set. Firms will need to be more aware of cross-cultural values. These values may be in conflict with the firms present value system. As an example, firms in the US are accused of focusing on short-term profitability whereas firms in Japan are concerned about long-term positioning. Similarly, in some cultures, reciprocity is tell illegal and unethical Page 12 whereas in other cultures it is the preferred way of doing business. What is considered as an agency fee in one country is recognized as a bribe, subject to prosecution under the anticorruption laws.Similarly, doing business with family members and politically connected individuals are presumed to provide a sense of trust and commitment in some cultures whereas it is considered as nepotism and unethical behavior in others. 9. Cross-National Rules. Firms will also have to learn about cross national rules. Specifically, the two course regulations (one for domestic and the other for foreign enterprises) are common with respect to ownership, management control, and co-production practices in countries such as China.With the rise of nationalism in recent years, this has become a key issue for global enterprises such as McDonalds, Coca-Cola, everyday Electric, and Enron, especially as they expand their market scope and supply scope in large emerging nations such as India, China, and Indonesia. 10. Services procural. As organizations out source more and more internal services, and as suppliers engage in providing value-added services to their customers, firms need to better render and research services procurement. Additionally, as most advanced countries are services economies, services procurement will rise in prominence.Conclusions The paper examined the reasons for the emergence supplier relations as source of Page 13 competitive advantage. The paper discusses successful relationships, rules for developing relationships and concludes with organizational strategies that will enhance supplier relationships. Page 14 References 1. Napolitano, Lisa, Customer-Supplier Partnering A Strategy Whose Time has Come, Journal of Personal merchandising and Sales Management, 4 (Fall), 1-8 (1997). United States command Accounting Office, Partnerships Customer-Supplier Relationships can be alter through Partnering, Report Number 94-173, Washington, D.C. (1994). Magnet, Myron, The fresh Golden Rule of Business, Fortune, February 21, 60-64 (1994). Sheth, Jagdish N. , and Arun Sharma, Supplier Relationships acclivitous Issues and Challenges, Industrial Marketing Management, 26 (2), 91-100 (1997). Wasti, S Nazli, Jeffrey K. Liker, Risky business or competitive power? Supplier involvement in Japanese product design, Journal of harvest Innovation Management, 14 (September), 337-55 (1997). Wilson, David T. , An Integrated mock up of Buyer Seller Relationships, Journal of the academy of Marketing Science, 23, 4, 335-45, (1995). Emshwill er, John R. Suppliers Struggle to break Quality as Big Firms whisk their Vendor Roles, Wall Street Journal, stately 16, B1, (1991). 2. 3. 4. 5. 6. 7. Page 15 Table 1 Reduction in the Number of Suppliers Company Number of Suppliers Current Previous 5,000 10,000 9,000 10,000 1,800 22,000 520 7,500 share Change 90. 00% 70. 00% 66. 66% 45. 00% 44. 44% 36. 36% 26. 92% 20. 00% Xerox Motorola Digital Equipment General Motors Ford Motor Texas Instruments Rainbird Allied-Signal Aerospace 500 3,000 3,000 5,500 1,000 14,000 380 6,000 line of descent Emshwiller 7. Page 16 Figure 1 Changing Paradigm of Organizational purchase Strategy spheric Competitiveness Technology Enablers Changing Paradigms of Procurement TQM Philosophy Industry Restructuring Page 17 Figure 2 Shift in Organizational Purchasing Strategy Global Sourcing Changing Paradigms of Procurement Transaction lie Relationship Oriented Industry Restructuring municipal Sourcing Page 18 Figure 3 Emerging Areas of Expertise in Supp lier Relationships Service Procurement Supplier as a Customer Cross Functional Supplier Teams Cross-National Rules Partnering Cross Cultural Values Supply Experience Curve Global Sourcing Bonding with Suppliers Hub and Spoke Organization Page 19