Tuesday, August 25, 2020

Biceps Tendon Rupture With Post-operative Complications

Biceps Tendon Rupture With Post-employable Complications Locomotor PBL Experiment Writeup Presentation In this PBL, we watch an instance of biceps ligament burst with post-employable difficulty of heterotopic solidification. We will initially experience the life structures of the upper appendage followed by a conversation of the cracked biceps ligament, heterotopic solidification lastly method of activity of indomethacin. Learning Objectives 1. Osteology of the upper appendage with accentuation on the elbow and wrist 2. The neurovascular gracefully to the upper appendage 3. Developments conceivable at joints of upper appendage and the scope of developments conceivable with respect to the elbow and wrist and the muscles that achieve these activities. 4. Break of distal biceps ligament 5. Heterotopic solidification 6. Method of activity of Indomethacin 1. Osteology of the upper appendage with accentuation on the elbow and wrist Arm The humerus is the biggest and longest bone of the arm district interfacing the shoulder to the lower arm. Proximally, the leader of the humerus expresses with the glenoid cavity of the scapula framing the glenohumeral joint. Distally the humerus verbalizes with the two bones of the lower arm, the ulna and span. The humerus is appeared in more detail in figure 1 beneath. Figure 1 Humerus (1) For Anil’s case we will concentrate a few noticeable highlights on the distal district of the humerus which structures some portion of the elbow. There are two projections on either side of the distal finish of the humerus which are the average and horizontal epicondyle. The average epicondyle ensures the ulnar nerve which passes just posteriorly and furthermore fills in as the connection site for the lower arm shallow flexor muscles. The parallel epicondyle alternately is the connection site for the lower arm extensor muscles. Anteriorly in the middle of these two epicondyles are two articular surfaces: the round surfaced sidelong capitulum which expresses with the sweep and the spool formed average trochlea which explains with the ulna. Additionally anteriorly, the spiral fossa legitimately over the capitulum suits the leader of the range during flexion of the elbow while the coronoid fossa straightforwardly over the trochlea obliges the coronoid procedure of the ulna during flexion of the elbow. Both the outspread and coronoid fossa limit flexion of the elbow. Posteriorly, the olecranon fossa obliges the olecranon procedure of the ulna during augmentation of the elbow. The olecranon fossa forestalls hyperextension of the elbow. Lower arm The lower arm is comprised of two bones: ulna and span. Proximally both of these bones articulate with the humerus though distally just the span straightforwardly expresses with the carpals of the wrist therefore interfacing the arm to the wrist. The ulna and span are appeared in figure 2 beneath. Figure 2 Radius and Ulna (1) The ulna The ulna is the settling bone of the lower arm and is average and longer of the two bones. There is a projection anteriorly at the proximal end called the coronoid procedure which fits into the coronoid fossa during elbow expansion. Posteriorly on the proximal finish of the ulna is the olecranon procedure (which shapes the noticeable quality of the elbow) which fits into the olecranon fossa during elbow expansion. The articular surface between the olecranon and the coronoid explains with the trochlear of the humerus and gives the developments of elbow expansion and flexion. The span The span is the parallel and shorter of the two bones. The leader of the range is a level catch molded procedure that verbalizes with the capitulum of the humerus. The neck of the sweep is a tightening only distal to the head which Anil has cracked. Because of the way that no neurovascular issues were discovered, it is protected to infer that the profound part of the outspread nerve was not harmed for this situation. The spiral tuberosity is distal to the neck on the front site which is the connection point for the ligament of biceps. Wrist The ulna doesn't legitimately express with the carpal bones of the wrist distally. There is an articular circle between the littler distal leader of the ulna and the carpal bones. The span straightforwardly expresses with the scaphoid and lunate carpal bones on its bigger distal end. This is appeared in figure 3 underneath. Figure 3 Wrist joint (1) 2 The neurovascular gracefully of the upper appendage Blood vessel gracefully The upper appendage is provided by the subclavian supply route which branches off from the brachiocephalic trunk on the privilege and aortic curve on the left. The subclavian supply route stretches out from its root to the parallel outskirt of the main rib. It at that point changes its name to the axillary vein which stretches out to the parallel outskirt of teres major after which it turns into the brachial conduit. The brachial supply route stretches out to the cubital fossa of the elbow where it bifurcates into the outspread and ulnar corridor which run down the parallel and average side of the lower arm individually. These two conduits anastomose in the palm of the hand shaping the shallow (mostly provided by ulnar vein) and profound (essentially provided by spiral supply route) palmar curves. The fingers are provided by the advanced supply routes spreading from the palmar curves. The blood vessel gracefully is outlined in figure 4 beneath. Figure 4 Arterial flexibly of upper appendage (2) Venous flexibly There are two fundamental sorts of veins in the upper appendage. Right off the bat, shallow veins which can be seen subcutaneously. There are three primary shallow veins which are the cephalic (horizontally), basilic (medially) and middle cubital (association among cephalic and basilica at the cubital fossa) veins. The shallow veins are appeared in figure 5 underneath. Figure 5 Venous gracefully to upper appendage (3) Also, there are profound veins which as a rule goes with the corridors two by two and have a similar name as the supply routes. Puncturing veins interface the shallow and profound veins to permit blood to consistently discover a route back to the heart. All the veins in the end depletes into the axillary vein, at that point to the subclavian vein, at that point brachiocephalic vein lastly into the heart through predominant vena cava. Apprehensive flexibly The brachial plexus fills in as the nerve flexibly for the upper appendage emerging from spinal nerve roots from C5, 6, 7, 8 and T1. There are 5 terminal parts of the brachial plexus in the arm. Table 1 beneath shows the five terminal nerves with their comparing roots, engine flexibly, tangible gracefully and clinical test. Table 1 Nerves, relating roots, engine flexibly, tactile gracefully and clinical test (4) 3 Movements conceivable at joints of upper appendage and the scope of developments conceivable with respect to the elbow and wrist and the muscles that achieve these activities. The elbow comprises of three joints: the humeroulnar joint from the trochlear indent of the ulnar to trochlear of humerus, the humeroradial joint from the leader of the span to the capitulum of humerus and the prevalent radioulnar joint from the leader of the sweep to the outspread score of the ulna. The humeroulnar and humeroradial joints take into consideration flexion and expansion of the elbow while the prevalent radioulnar joint takes into account pronation and supination. This happens when the leader of the span which is encased in annular tendon traverses the fixed ulna bone. The muscles that move the elbow are appeared in table 2 beneath: Table 2 Main muscles of elbow (5) Developments and extents for the elbow and wrist are appeared in table 3 beneath: Table 3 Movements and extents for elbow and wrist (6) 4 Rupture of distal biceps ligament Side effects Side effects remember expanding for the front of the elbow, serious torment at the elbow and a lump in the upper arm in light of the abbreviated biceps brachii muscle. Since Anil shows no biceps ligament reflex upon evaluation, this is probably going to be a finished burst of the ligament. Cause For this situation, Anil is analyzed to have cracked his distal biceps ligament which appends to the outspread tuberosity. Distal biceps ligament break will in general be brought about by a solitary awful mishap including flexion of the elbow at a correct edge against obstruction. For Anil, the snapping of the rope made his elbow fix unexpectedly. His biceps contracted extra difficult to keep this from occurring however the outrageous pressure in his biceps and ligament prompted the burst of the distal biceps ligament. Treatment Since Anil is still generally youthful at 38 years of age and still needs full utilization of his upper appendage, the careful treatment alternative is generally liked. Now and again the ligament is appended by sewing through openings made in the bone. Anyway the medical procedure for Anil was finished by connecting the ligament deep down utilizing a little metal plate and screws into the range to make sure about the plate as a rule called the endobutton method (7, 8) which has a generally excellent guess of recapturing full versatility in the elbow. Complexities Complexities after the medical procedure incorporate nerve harm and heterotopic solidification. Following two months Anil came back with solidness, trouble in turning his hand over and wrist torment which the specialist analyzed as heterotopic solidification after palpation of a firm mass along the biceps ligament. Direct intercession was not taken as the biceps ligament required chance to completely recuperate. 5 Heterotopic hardening Heterotopic solidification is the development of bone in strange places, for example, delicate tissue. Heterotopic hardening is an outstanding intricacy of distal biceps ligament fix. The current proposed pathogenesis of how heterotopic solidification emerges is the change of pluripotential mesenchymal cells which are selected to the crack recuperating site into osteoblasts that outcomes in ectopic bone arrangement. (9) Bone, ligaments and tendons which are on the whole connective tissue all offer the equivalent mesenchymal foundational microorganism source (appeared in figure 6) and in this way mesenchymal undifferentiated organisms enrolled to advance ligament fix can separate into osteoblasts. Osteoblasts can likewise be pulled out of the bone when the ligament cracks and along these lines can prompt bone testimony. Henceforth extraordinary consideration has been given to cleaning and inundating the su

Saturday, August 22, 2020

Southwest Airlines Case Study Essay Sample free essay sample

A large number of individuals fly regular. Southwest air hoses give low-toll travel among 58 metropoliss in the United States. Despite the fact that the air hose industry endured enormously in the wake of September 11. Southwest had the option to proceed to keep solid. Southwest air hose keeps on keeping consistent gross incomes as a great part of the business was influenced by adjustments parents in law/guidelines and rivalry come ining the market. In the undermentioned examination there is a concise introduction to Southwest Airlines and their plan thus what. in the event that anything. they have to make or non make to remain at the top and competitory noticeable all around hose industry. The Problem The significant activity of the organization is whether they can continue turning and at a similar clasp keep up offering similar administrations to their customers. To continue turning. Southwest Airlines needs to break down the outer condition so as to ensure their prosperity. The Analysiss Six components of outer condition The OptionsThe arrangements that will be introduced for Southwest air hoses need to pounce upon two boss issues: 1. We will compose a custom paper test on Southwest Airlines Case Study Essay Sample or on the other hand any comparative subject explicitly for you Don't WasteYour Time Recruit WRITER Just 13.90/page In what capacity will they have the option to keep up their â€Å"Southwest air hoses LUV† 2. The most effective method to keep up their extension and non sway the picture of the air hose. Southwest Airlines has a rundown of boundless alternatives. many will obstruct their picture from the inside out ( representatives to costumiers ) while providing a lot of administrations that will keep up their customers upbeat for a piece. others will do the one time homelike air hose appear to be a cold and enormous noble and doing their picture of LUV to fall. so as to stay away from this and help the organization keep up the two closures these are the arrangements that will be introduced for their predicament. 1. â€Å"Freemium† : What’s free: Web bundle and administrations. some substance. Allowed to whom: clients of the essential adaptation. † ( Chris Anderson. Why $ 0. 00 Is the Future of Business. 02. 25. 08 ) Discovering things and musings that will hold no existent expense to the organization for the administration while having the option to endure down a â€Å"extra† for the exchange great of the customers will expand the overall gains of the organization. 2. Cut expenses: Disembark from the landing area and permit the costumiers stroll to the passage. The organization needs to accept and be originative in the manners they can keep up a reasonable rate for their flights while doing creations to their planes. paying their representatives and keeping up costumiers content with their administrations. 3. Counterbalance losingss with higher menus: Charge exaggerated for an incredibly requested twenty-four hours or for purchasing the ticket a similar twenty-four hours. 4. In flight outsiders promotion: Offer an unending of commercial within the airplane to different organizations. The Recommendations In the wake of contemplating both the examination and the choices that were introduced. it has been concluded that the most ideal way the organization could take is bind together both the first and fourth proposals. The Freemium thought and Advertising within the airplane are things that can be finished in little total of clasp and concocting net gain out of the two things. This will ensure that the LUV that Southwest Airlines appears towards their workers and customers continues being the main priority within the undertaking while non holding to bargain their developing by introducing better approaches to do net out of things that won’t do them put more cash that they could quit fring. These two suggestions will pounce upon and choosing the central issues of the activity: first a way to keep up their â€Å"LUV† streaming and the second one a way to ensure that the developing that has taken topographic point will non drop the organization however on the other hand help them be greater and better. DecisionsThe proposals were the 1s picked in light of the fact that they are the 1s that have the less evaluation of disappointment. what's more, if disappointment somehow managed to be met the effect in the organization would be about or truly close to nothing. Southwest is an extraordinary case review of how to procure representative deal in. to a developing creating concern. The way in to the achievement of the southwest hypothetical record has been in addition to utilize and low factor costs. hitched with solid organization progress to alining esteems. frameworks. developments and plan. By making this Southwest has had the option to delay competitory bit of leeway by releasing the intensity in their work power. Notices Dess. G. . Lumpkin. T. . Eisner. A. . McNamara. G. ( 2011 ) . Vital Management: Text and Cases/Edition 6. Distributer: McGraw-Hill Companies. Inc. Theot. T. ( 2010 ) . Southwest Airlines. Recovered from: hypertext move convention:/es. scribd. com/doc/35327373/Southwest-Airlines-Case-Study Bhutada. S. Ranadive. S. ( n. d. ) . Southwest Airlines. Simply Plane Smart. Recovered from: hypertext move convention:/www. slideshare. net/sarangbhutada/southwest-carriers contextual investigation

Saturday, August 8, 2020

An Explanation

An Explanation Several years ago (I believe it was 3 but it may have been 2) there was an MIT student who didnt have quite enough credits to graduate. This happens (especially because HASS requirements are so weird), so they opted to stay another year in order to finish up and graduate. One day, towards the end of this students senior year, a small skirmish took place on the dorms e-mail list between this senior and an undergraduate in the dorm. Things got heated, words were exchanged, and then this happened: Undergraduate This whole argument is silly. Well, thanks for bringing it up then. By the way, congratulations on graduating. Senior Wow, way to make an insulting, totally useless reply to the entire dorm. Undergraduate uhh, he is graduating, right? and graduating people, i presume, wont be staying in the dorm over the summer. so, if my two assumptions are true, i admire [name]s heroism for taking time out of his busy final study schedule to make sure that the portion of summer residents who watch movies are happy. oh, if youre not graduating (whether youre not a senior or otherwise), sorry, thats all i meant by the comment. Senior No, Im not graduating. Yes, Im in the dorm for the summer. Yes, Im in the dorm next year. Anything else? Interested in my personal life? Undergraduate What color underwear do you have on right now? [For the record, it was blue, with penguins.] From then on, every e-mail sent to the Burton-Conner dorm e-mail list (bctalk [at] mit [dot] edu) MUST be signed with the senders underwear color. It has become a tradition. By signing with your underwear color you are saying My e-mail is worth reading. I am willing to tell you my underwear color if youll read my e-mail, thats how worth reading it is. Soooooooo . . . . for all of you prefrosh that came to CPW and hung out around Burton-Conner, you may have seen some snazzy light blue shirts floating around. Maybe they looked a little something like this? These shirts, our unofficial dorm shirts, have the line What color is YOUR underwear? on the back. This is not because we are creepy sexual deviants hitting on you. This is just because we want to know your underwear color. -Snively gray (Thanks to the commenter who provided the exact transcript) Post Tagged #Burton-Conner House

Saturday, May 23, 2020

Viking Invasions The Battle of Maldon

In the summer of 991, during the reign of Aethelred the Unready, Viking forces descended on the southeastern coast of England. Led by either King Svein Forkbeard of Denmark or the Norwegian Olaf Tryggvason, the Viking fleet consisted of 93 longboats and first struck at Folkestone before moving north to Sandwich. Landing, the Vikings sought to extort treasure and plunder from the local population. If refused, they burned and laid waste to the area. Ravaging the coast of Kent, they departed and sailed north to strike at Ipswich in Suffolk. Background Battle of Maldon - Conflict Date:Â  The Battle of Maldon was fought on August 10, 991, during the Viking invasions of Britain. Commanders Saxon Ealdorman Brihtnoth Vikings Olaf Tryggvason or Svein Forkbeard The Saxons Respond Having looted Ipswich, the Vikings began moving south along the coast into Essex. Entering the River Blackwater (then known as the Pante), they turned their attention to raiding the town of Maldon. Alerted to the raiders approach, Ealdorman Brihtnoth, the kings leader in the region, began organizing the areas defenses. Calling out the fyrd (militia), Brihtnoth joined with his retainers and moved to block the Viking advance. It is believed the Vikings landed on Northey Island just to the east of Maldon. The island was connected to the mainland at low tide by a land bridge. Seeking Battle Arriving across from Northey Island at high tide, Brihtnoth entered into a shouted conversation with the Vikings in which he refused their demands for treasure. As the tide fell, his men moved to block the land bridge. Advancing, the Vikings tested the Saxon lines but were unable to break through. Deadlocked, the Viking leaders asked to be able to cross so that battle could be joined in full. Though he possessed a smaller force, Brihtnoth granted this request understanding that he needed a victory to protect the region from further raiding and that the Vikings would depart and strike elsewhere if he refused. A Desperate Defense Backing away from the causeway to the island, the Saxon army formed for battle and deployed behind a shield wall. As the Vikings advanced behind their own shield wall, the two sides exchanged arrows and spears. Coming into contact, the battle became hand-to-hand as the Vikings and Saxons attacked each other with swords and spears. After a protracted period of fighting, the Vikings began to focus their assault on Brihtnoth. This attack proved successful and the Saxon leader was struck down. With his death, the Saxon resolve began to waver and much of the fyrd began to flee into the nearby woods. Though the bulk of the army had melted away, Brihtnoths retainers continued the fight. Standing fast, they were slowly overwhelmed by the superior Viking numbers. Cut down, they succeeded in inflicting heavy losses on the enemy. Though having won a victory, Viking losses were such that they returned to their ships rather than press their advantage with an assault on Maldon. Aftermath Though the Battle of Maldon is better documented, through the poem The Battle of Maldon and the Anglo-Saxon Chronicle, than many of the engagements of this period, exact numbers for those engaged or lost are not known. The sources do indicate that both sides took substantial losses and that the Vikings found it difficult to man their ships after the battle. With Englands defenses weak, Aethelred was advised by Archbishop Sigeric of Canterbury pay tribute the Vikings rather than continue an armed struggle. Agreeing, he made an offering of 10,000 pounds of silver which became the first in a series of Danegeld payments. Sources UK Battlefield Resources Centre: Battle of MaldonWuffings: Battle of MaldonBattle of Maldon

Tuesday, May 12, 2020

Promoting Mental Health Essay - 3042 Words

Promoting Mental Health. The aim of this assignment will be to demonstrate my interventions designed to promote mental health and well being using current national and local policies and campaigns in relation to the patient’s identified needs as well as evidence based therapeutic interventions. Finally I will evaluate my package reflecting on its success or failure. In order to gain a better understanding of mental health promotion, it is important to gain a definition of promoting mental health. Rosie Winterton (2006) quotes ‘Mental health promotion is key to changing attitudes about mental health across society. The National framework for mental health (DOH 1999) implemented national standards and service models for promoting mental†¦show more content†¦The assessment interview was conducted in an isolated room to avoid distractions that may threaten confidentiality and interfere with the effective listening, privacy and dignity of the client, (NMC 2008). I explained to Elizabeth that any information gathered from her would be shared with other health care professionals involved in her care without breaching her confidentiality in compliance to the (NMC 2008) and the (Caldicott Report 1997) unless it was required by the law. Elizabeth’s response was very responsible saying she understood and was willing to co-operate. I c ontinued to engage with Elizabeth using my interpersonal skills; listening, attentiveness, assertiveness, humour, self disclosure and my body language, (Riley 2008). Without these skills I would not have been able to attain the information required to understand her difficulties and formulating sessions. During our initial session, Elizabeth was very open with me about her cannabis use and personal life. Elizabeth explained how cannabis had changed her and destroyed her marriage. Elizabeth expressed her desire of detoxification, to stay clean and to gain employment. Elizabeth explained how her cannabis use had started off in her young teens where smoking cannabis was seen as ‘being cool’. Elizabeth also explained that it had started to affect her mentally in her late 20’s. I assured Elizabeth that her detoxification would be a tough process for her but as a Nurse I will support her. According toShow MoreRelatedEssay on Nurses Promoting Mental Health1102 Words   |  5 PagesPromoting Mental Health Introduction The World Health Organization defines health as â€Å"a state of complete physical, mental and social well-being and not merely the absence of disease or infirmity† and that the â€Å"enjoyment of the highest attainable standard of health is one of the fundamental rights of every human being without distinction of race, religion, political belief, economic or social condition.† (World Health Organization. 2006) As nurses, health and health promotion are fundamentalRead MoreLiterature Review On Promoting Mental Health And Reducing Risk Behavior Essay2047 Words   |  9 Pagesthe continued focus of education systems is to improve a child’s academic skills, there has been a growing body of research which draws attention to the social and emotional well-being of students as well. Payton et al’s (2000) article on promoting mental health and reducing risk behavior in children and adolescents provides that SEL programs use classroom-based curriculum and instruction that center around improving emotional cognition of children and developing pro-social skills (e.g., empathy,Read MoreRecommending Intervention Activities That Promote Resilience And Wellness984 Words   |  4 Pagesfor elders and cultivate a sense of group ownership. These factors can have an impact on an individual’s concept of self. For Black/African American students on college campuses, it is important to identify these particular aspects for proper mental health counseling treatment. Therefore, activities that promote resilience and wellness should include activities where students have opportunities to engage in groups, but are also able to maintain a sense of confidentiality. According to Goodman andRead MoreLearning Mental Health During Undergraduate Education1657 Words   |  7 PagesLearning mental health during undergraduate education can be challenging as it is a broad and complex sector of health care. Like complicated physical illnesses, there are also various problems, frameworks, and theories associated with a person’s mental aspect which can be hard to learn and explain if without further studies or exposures (Simon, 2014). Therefore, utilising other types of learning such as the continuing professional development (CPD) online or face-to-face activities are importantRead MoreHealth and S ocial Care L3 Unit 618 Essays867 Words   |  4 PagesUnit 618 Understand mental well-being and mental health promotion. Outcome 1 1. As individuals are all different, they can respond to the same situation differently. In the same way, individuals can view and cope with their mental well-being and mental health differently. Someone with a negative view of their own situation may feel that they are to blame or not accept the consequences of their actions, they may find it difficult to deal with their own mental health and well-being. A positive individualRead MoreBackground Information . Cheltenham High School (Chs) Serves1546 Words   |  7 Pagessystems, there’s not much information regarding mental health that’s available to teachers and students. This underlying need that has been brewing at Cheltenham High School since the start of the academic school year. Each week at practicum, there are stories of a crisis that had already occurred in relation to mental health. Upon consultation with teachers, staff and school nurse, the theme that consistently popped up was the lack of mental health knowledge or awareness and training to appropriatelyRead MoreChild And Adolescent Behavioral Health Final Examination1188 Words   |  5 PagesMHS 6069: Child and Adolescent Behavioral Health Final Examination 1. Children’s mental illness affects approximately one fifth of youth worldwide, and although it is the children who experience symptoms directly, implications associated with mental illness can impact entire families (Richardson, Cobham, McDermott Murray, 2013). As such, healthcare systems are being redesigned to include a focus on family-centeredness. In the case of children’s mental health specifically, family-centered coordinatedRead MoreMental Health Of The United States848 Words   |  4 Pagesdiagnosed with a mental illness and it is predicted that 50% of the adult population will develop a mental illness within their lifetime; 8-9% of the adult population in Florida is diagnosed with depression (Centers for Disease Control and Prevention, 2011). Promotion, awareness, and the availability of mental health services are public health areas in my community that needs attention. The needs of my community are not entirely met, and there are inconsistencies when addr essing mental health illness throughRead MoreMental Disorders Among Geriatrics Are One Of The Most Costly Public Health Dilemmas1055 Words   |  5 PagesABSTRACT Mental disorders among geriatrics are one of the most costly public health dilemmas. Depression, suicidal behavior, and Alzheimer’s are just a few common mental illnesses the elderly suffers from. According to the Center for Disease Control and Prevention the number of older adults with mental illnesses is predicted to incline drastically. The growth of the population, has caused a burden on numerous healthcare facilities in America and many elderly individuals are less likely to seekRead MoreWorld Health Organization1440 Words   |  6 PagesWorld Health Organization The World Health Organization is a global organization that works on health conditions throughout the world. The WHO works with countries all over the world to help fix health policies to improve health conditions and the quality of life. The World Health Organization is currently working on fixing and improving mental health policies throughout the world. The World Health Organization works on addressing health related issues throughout the world; an important issue they

Wednesday, May 6, 2020

Animation Research Paper Free Essays

One company that caught my attention is Buck Animation Studios. They are a small commercial house specializing in design-driven creative, Buck’s directors and artists use animation, visual effects and live action to collaborate with clients, from concept to delivery, producing work that is visceral, innovative, and diverse.From offices in New York and Los Angeles, Buck works with a broad range of clients in the advertising, broadcast, retail, film and entertainment industries It was started in 1973 by a small group of women in Toronto who wanted to produce books for Canadian children, within a few years the mandate had broadened and Kids Can Press was producing books for children around the world. We will write a custom essay sample on Animation Research Paper or any similar topic only for you Order Now More than three decades later and with a long list of award-winning titles, Kids Can’s reputation for quality books has made it a favorite among parents, teachers, librarians — and kids — worldwide.It’s acclaimed list includes many beloved characters such as Franklin the Turtle, the single most successful publishing franchise in the history of Canadian publishing, which has sold over 60 million books in over 30 languages around the world. Kids Can Press has published in partnership with more Canadian public institutions than any other children’s publisher, reflecting the recognized quality of the publishing program. Partners include the Royal Ontario Museum, the Ontario Science Centre, the Federation of Ontario Naturalists, the National Museum, the Museum of Nature, World Wildlife, and the National Hockey League.Kids Can Press books have received critical acclaim through media attention, nominations and awards in the children’s publishing industry, including: Governor General’s Award–winner Wallace Edwards’ Alphabeasts Melanie Watt’s multiple award-winning Scaredy Squirrel series If the World Were a Village by David J. Smith, winner of the Independent Publisher Book Award Ryan and Jimmy and the Well in Africa That Brought Them Together by Herb Shoveller, which was featured on Oprah’s Web site Today Kids Can Press continues to be an industry leader with groundbreaking p icture books, outstanding non-fiction and award-winning fiction.Any children book publishing firm is considered the direct competitor for this company. Even though there are offices in New York any inquiry to employment will be directed to their Canadian operations. As of right now there are no available positions within the company but I am more than welcome to send my resume for review. I feel that with my experience and education I can contribute talented work to this publishing company. Considering this company is an industry leader in publishing children’s books it would be a great opportunity to be a part of.BIBLIOGRAPHY www. Careerbuilder. com/illustrationjobs. html, Nov. 2, 2010 www. kidscanpress. com, Nov. 2, 2010 Shawn F. Reid Professor Voicu SLS3355 Professional Development Nov. 2, 2010 Company Research Another company that I have researched worth working for is â€Å" Reader’s Digest Children’s Publishing†. â€Å"Since 1991, Reader’s Digest Children’s Publishing has been introducing young children to reading through innovative, creative and interactive books. It’s a list that bursts with fun, entertainment and inspiration. We introduce world-class brands and help to create lifelong readers. From Disney Princesses, Disney Pixar Cars and Toy Story to Thomas the Tank Engine, Barbie, Dora, Elmo and all the Sesame Street gang, we bring characters to life through interactive movie theater storybooks, viewers, music players and surprising lift-the-flaps that make kids want to read their books over and over again. With hundreds of titles to choose from, there is a Reader’s Digest book for every child. Reader’s Digest is a leader in the fields of publishing, multi-brand media and marketing and their team is what truly sets them apart. They are constantly on the lookout for talented individuals with a passion for excellence who could contribute to our success, and their own.The company makes it a point to select the best-suited candidates for each open position. The ideal applicant is dynamic, passionate, ambitious and knowledgeable in his or her field of expertise. They use an acronym when they look for people who exhibit FACE ttributes (Fast, Accountable, Candid and Engaged). As of right now there are no available positions within the company but I am more than welcome to send my resume for review. I feel that with my experience and education I can contribute talented work to this publishing company. Considering this company is an industry leader in publishing children’s books it would be a great opportunity to be a part of. BIBLIOGRAPHY www. readersdigest. com, Readers Digest Children’s Publishing, Nov 2, 2010 How to cite Animation Research Paper, Essays

Friday, May 1, 2020

Employees first, customers second free essay sample

1. What was the leadership style Vyneet came with at the beginning of his mandate? Can you give 3 examples of actions he took and which reflect this leadership style and explain? Vineet was without any doubt a transformational leader at the beginning of his mandate. In fact, just before taking the new role, he mentioned that he would destroy HCLT as it was before. He was very focused on his vision of a brand new transformation process and remarked the importance towards innovation that has the analysis of â€Å"what† and the â€Å"how† in a transformation journey. For a transformational leader, the â€Å"what† of the strategy is very important, but is much more important the â€Å"how†. He acknowledged that the first point of this transformation would be to analyze in deep what is going on in the guts of the company, asking directly to their employees. To do so, he followed the â€Å"Mirror, Mirror† strategy, which is a communication exercise that allows the members of the company to look themselves at the mirror and describe what they truly see. Once detected all the needs, he gave an extreme importance to have followers of his vision, and that could only be done by creating an atmosphere of trust towards all the global managers and transmit his vision in the called â€Å"Blueprint meeting†, that he expected that those would transmit their commitment and trust to the levels below. Vineet, as a transformational leader, was fully aware of the importance of identifying the A point (with the Mirror, Mirror strategy), and be able to identify and transmit as clear as possible the B point, where they were all heading to, to avoid uncertainty and reduce the resistance to change. 2. Why does he decide to turn management upside down? How does he do it? Vineet thought that the hierarchies and matrixes that HCLT was holding were obsolete, because they were created many years before and they were not able to create enough added value for the customers, because were the managers the only ones who could be the value creators. His purpose was to change the responsibilities for the value creation, letting the managers focus in their management functions, but allowing and giving flexibility to those who were in reality in contact with the customers on their daily basis, the only ones capable to add extra value to their service; the employees. In the case of IT industry, the value creation lays in hardware design and manufacturing, where the bottom employees are. His idea was to make those managers accountable not only for their teams, but also to all the other members in the value zone that the boss could be influencing in a way or another. To do so, he developed the concept of â€Å"reverse accountability†, that had the purpose to get certain elements of the hierarchy to be more accountable to the value creators, and to apply it, they created the Smart Service Desk, that had the purpose to resolve internal issues between the employees and the functions, giving the employees a directly power of influence. In addition, the employees realized that this allowed them to measure their performance and change the perception about themselves. Another strategy he followed was opening up the 360? degree feedback and survey, which helped people to improve their performance and build trust and transparency towards the organization. 3. What communication techniques does Vyneet use in order to inspire his employees to follow him and to gain their support of his mission? To inspire employees to follow him, Vineet had to create an environment of trust, where they could believe what he was saying and they were willing to follow him wherever he was going. Open communication and honest conversation unveiled the truth and created the need for a change. To do so, HCLT shared the company financial information with all the employees of the company, to create also transparency. Having and communicating a clear vision of the future (Point B) was also key to inspire and motivate people to be committed towards a better future. 4. How does he take decisions? Once created the new environment based on principles like trust and transparency, Vineet took decisions based on being close to the people. Using the Mirror, Mirror strategy he was able to identify the needs of the employees of HCLT, to create an openness to change, build a strategy towards the areas of improvement and communicate them in the Blueprint meeting. The decisions are, in fact, taken by the own employees, but the facilitator role that he took allowed him to agglomerate them, to analyze them together and be able to design the strategy, that with the appropriate atmosphere, would be able to engage the managers, that at the same time could engage the bottom line of the company, and achieve their full commitment. 5. What were the results that derived from turning organizational structure upside-down at the level of the Employees, Organization, Customers, Investors? During the first four years of the HCLT transformation, there were major changes: Employees: They achieved a 70% increase in employee satisfaction, employee attrition felled almost 50% Customers: 70% of their closed deals were won against their direct competitors, growing fivefold. Organization: Their revenues tripled in four years and operating income tripled. 6. What does Vyneet understand by the Value zone? What are the ingredients, in Vyneet? s opinion, to creating value for the organization, the customers and the employees? In HCLT Company the biggest problem identified by Vyneet in the organizational structure was that it did not support the people in what he called the value zone. Value zone is defined as the place where value is truly created for customers. He concluded that inside the culture of the company, communication should be established in all levels . And that this value zone must not stay just inside the pyramid in the company but it should be externalize and fill up between employees and customers. The first change of creating this value zone is to turn the organization upside down making management and managers, including those enable functions, accountable to those who create value not just the other way around. Another ingredient for creating value in the company is by finding something that will differentiate themselves from competitors by creating a real and distinct value. Vyneet also identified that many companies added value by improving their RD centers. In this case he realizes that HCLT has no longer value zone in the technology itself. He believes that something more had to be changed. The transformer employees also called the Gen Y Vyneet identified them as the ones that created the value zone within the company organization but his objective was to put the value zone n the center of the organization. 7. Can you name 2 of the riskiest decisions he took and explain how they could have back-fired? Why do you think they didn? t backfire? One of the riskiest decisions Vyneet did was gather the team of 100 best and brightest of the company for a 3 day conference. In this reunion he will establish the changes that will do and enforce the team to agree with it. The risk he took from this conference was: First not everyone agrees because afraid of changes. Also they don’t support each part of the plan for every new proposal they find new reasons why the plan couldn’t work. And damage their reputation as CEO. Inside his goals the execution of software that enforces transparency of the company was also a risky idea where some employees may use it in the wrong way and damage the environment inside the company. We think it didn’t backfire because Vyneet make it clear that this tool was for enforcing the company communication and making employees realize of the positive effects of it. 8. Vyneet answering the employees? questions directly takes up to 7 hours a week. Don? t you think a CEO? s time is too precious for that? When a company implements a huge change it is necessary to take as much quality time to communicate properly the strategy and giving example and support to the employees. Based on Vyneer perspective, managers must own the following characteristics: Credibility, reliability, intimacy and self orientation. When big changes in an organization occur is important for the employees to feel that they have the support of the CEO. Is not a question if it takes 7 hours a week or more, what is necessary is to follow the characteristics mention before for gaining the trust of every employee. 9. Why does Vyneet place so much importance on trust within an organization? What are his main arguments? How does Vyneet create a culture of trust? To transform a company people must align themselves a work together towards one goal, but this will not happen without a culture of trust. From mirror- mirror exercise until the end of his changes Vyneet explains that trust must be created and follow between manager, employees and customers. Employees start to see the problems of the company as their problems too. They realize that if management is willing to share important information even if it is good or bad and encourage open conversations about the facts it intentions can be trusted. Immediately the CEO will start to see some positive actions in all levels. To get the employees to participated more is important to crate a culture of trust and to do that transparency is needed. He follows 5 steps. First ensure everyone knows the company mission. Second, commitment with the organization. Third, transparency between employees. Fourth, customer to be transparent with the company. And last, share external and internal information. 10. How are generation Y employees different from other employees in Vyneet? s view? Gen Y employees are the ones who create the must value for the customers. They believe in collaboration, and they love to learn. They share everything of their life and ideas in different media networks. And at the same time they expend many hours interacting with society. This Gen Y are the ones how meet the customers and deliver the product service at the same time work together fixing problems and deserve support from the organization. They create the value zone in the organization. 11. What were some of the effects of transparency in the organization? Transparency from Vyneet point of view is an important tool that increase trust inside the company. Some of the approaches that the company did were opening financial information to everyone. In a way this increases the transparency and motivates some of the teams that were doing well. However some employees were demotivated by the information they saw causing embarrassment and complications. At the same time it was a risk because competitors could have access to this kind of information affecting the loss of clients. 12. How does he create accountability in the organization? Vyneet recognize that the company needed reverse accountability. This is define to get elements of the hierarchy to be more accountable to the value zone. He looks to 3 categories of positions: First, the enable function. Second, managerial change of command all the way to the CEO. And third, the influencers who are not part of the hierarchy. 13. Why does he consider passion to be important? Do you agree? He considered passion to be a very important element for employees. HE organized passions into 3 categorize: self, social and secular. He did a survey to discover the core values that are important to people, personally and professionally. The survey turn to be a huge success people started thinking on how passion they were with their actual jobs and learns about others passions and these lead managers to know more about their employees’ passions. Yes we agree that passion is essential in every person lives. It must be take in consideration before every decision making in a way for doing the things that you like and get positive results. 14. When he starts talking about ownership, he is making the step towards a new leadership style. How does he generate ownership? The idea is to transfer responsibility to the employees; this will create a certain feeling for accomplish their goals without been pressure by managers. This will demonstrated at the same transparency and in the future it will end up giving positive results. This will create a sensation in the way that employees perform. They will see ownership of the company as part of them and everything that they do and decisions they take will be for their own benefit and at the same time for the business. 15. What is the leadership style that he embraced towards the end of the book? Why did he consider it necessary to go even further? What are the actions that reflect the shift? Transferring responsibility for change, this was the style and strategy that he mentions at the end of the book. This new way of managing the company transferring to employees’ power is based on 3 reasons: First, for not letting concentrate the power just in the CEO. Second, remove hierarchy of the company through the speed of change. Third, transfer the knowledge with everyone in the organization. In this way the CEO office will not be consider the spiders head but become like a starfish. At the same time he decides to implement and increase the relationship between customer and employee. He starts up with a value portal where employees’ could generate and register new value and creating new ideas, and at the same time share it with customers that will evaluate and rate the ideas based on different criterias. 16. Fortune magazine considers the ? Employees first, customers second? concept as the most modern management idea. Do you think this concept will be implemented on a wider scale in other companies in the future? Why yes, why not? Can you name any other companies you know of who are working towards implementing this concept? How? Regarding the positive results of HCLT creating trust and growth through transparency by making managers and employees own equal responsibilities for change and value creation in order to interact with customers. This new concept idea can be for sure implemented in other companies where the managers like to take risky decision creating new opportunities for differentiating themselves from competitors. We found some companies that used this concept for creating value inside the company. One of the companies is named Mad LTD. Basically this company implements a program design and focus on nurturing young leaders by showcasing and helping to implement their idea improved society.

Sunday, March 22, 2020

71 Body Parts in Spanishand How to Talk About Them

71 Body Parts in Spanishand How to Talk About Them SAT / ACT Prep Online Guides and Tips Are you studying Spanish and want to know the Spanish names of different parts of the body? In this guide we’ve created three charts of human body parts in Spanish and English. The charts cover external body parts, like hair and toes, internal organs, and the skeleton. Together, these charts contain more than 70 parts of the body, so you’re sure to find the Spanish vocab words you’re looking for. We also include a chart of common phrases you can use to talk about body parts in Spanish so that you can put your new vocab skills to use. 71 Body Parts in English and Spanish Below are three charts of common parts of the body in Spanish and English. The first chart is external body parts, the second is internal organs, and the third is vocabulary for the skeleton. Each of the charts is organized in alphabetical order in English. Body Parts Vocab Words English Spanish Ankle el tobillo Arm el brazo Back la espalda Beard la barba Breast el seno Buttocks las nalgas Calf la pantorrilla Cheek la mejilla, el cachete Chest el pecho Chin la barbilla, el mentà ³n Ear el oà ­do, la oreja Elbow el codo Eye el ojo Eyebrows las cejas Eyelashes las pestaà ±as Face la cara Finger el dedo Foot el pie Forehead la frente Hair el pelo Hand la mano Head la cabeza Heel el talà ³n Hip la cadera Human body el cuerpo humano Knee la rodilla Leg la pierna Lips los labios Mustache el bigote, el mostacho Mouth la boca Navel/belly button el ombligo Neck el cuello Nose la nariz Shoulder el hombro Skin la piel Stomach (abdomen) el vientre Thigh el muslo Throat la garganta Thumb el pulgar Toe el dedo del pie Tongue la lengua Tooth/Teeth el diente, la muela/los dientes Waist la cintura Wrist la muà ±eca Internal Organs Vocab Words English Spanish Brain el cerebro, el seso Lung/Lungs el pulmà ³n/los pulmones Heart el corazà ³n Internal organs los à ³rganos internos Kidney/Kidneys el rià ±Ãƒ ³n/los rià ±ones Large intestine el intestino grueso Liver el hà ­gado Muscle el mà ºsculo Small intestine el intestino delgado Stomach el està ³mago Tonsils las amà ­gdalas Skeleton Vocab Words English Spanish Bone el hueso Clavicle la clavà ­cula Femur el fà ©mur Fibula la fà ­bula Humerus el hà ºmero Jawbone la mandà ­bula Patella la rà ³tula Radius el radio Ribs las costillas Scapula el omà ³plato Skeleton el esqueleto Skull el crneo Spinal column la columna vertebral, la espina dorsal Sternum el esternà ³n Tibia la tibia Vertebra la và ©rtebra 2 Important Rules to Remember When Talking About Body Parts in Spanish There are two major differences in speaking about body parts in Spanish compared to speaking about body parts in English. The first is that, in Spanish, you must include a definite article with each body part term.Each singular body part will be preceded by the definite article el or la. The plural versions are los and las, respectively.In English, you could say, â€Å"The wrist and elbow are swollen,† with just one definite article before â€Å"wrist.† For parts of the body in Spanish, however, you’d need to say â€Å"La muà ±eca y el codo estn hinchados† which directly translates to â€Å"The wrist and the elbow are swollen.† Each body part needs its own definite article. The second difference between discussing body parts in Spanish vs English is that, in English, it’s common to use possessive adjectives when referring to a specific person’s body part (ex. my hair, your hands, her feet†¦). In Spanish, you almost always use definite articles like â€Å"the† or â€Å"a† when discussing body parts in Spanish, no matter whose body part it is. In Spanish, possessive adjectives are only used with body parts when it’d otherwise be unclear whose body part is being referenced. For example, â€Å"I like your hair† is â€Å"Me gusta tu pelo† in Spanish. In this case, you need the possessive adjective to know whose hair you like. As another example, in English you could say â€Å"I broke my leg and ankle,† but in Spanish you’d say â€Å"Me rompà ­ la pierna y el tobillo.† which directly translates to â€Å"I broke the leg and the ankle.† (Note again that each body part has its own definite article.)Similarly, in English you’d say â€Å"I brush my hair,† but in Spanish you’d say â€Å"Me cepillo el pelo.† (I brush the hair.) Common Phrases to Discuss Parts of the Body in Spanish Knowing all the body parts in Spanish is useful, but to really get the most out of these vocab words, you should know at least a few phrases to use them with. Below are some of the most common Spanish phrases used to discuss parts of the body. English Spanish Brush your teeth. Cepà ­llate los dientes. I broke my [body part]. (Ex. I broke my arm.) Me rompà ­ [body part]. (Ex. Me rompà ­ el brazo.) I cut my finger. Me corto el dedo. I have a pain/ache of [body part]. (Ex. I have a headache.)** Tengo dolor de [body part]. (Ex.Tengo dolor de cabeza.) I have black/blond/brown/red/gray hair. Tengo el pelo negro/rubio/castaà ±o/rojo/gris. I sprained my ankle. Me torcà ­ el tobillo. I stubbed my toe. Golpeà © el dedo del pie. My [singular body part] hurts. (Ex. My arm hurts.)** Me duele [singular body part]. (Ex. Me duele el brazo.) My [plural body part] hurt. (Ex. My feet hurt.)** Me duelen [plural body part]. (Ex. Me duelen los pies.) Open your eyes!  ¡Abre los ojos! Wash your hands. Lvate las manos. **The "me duele(n)" and "tengo dolor" phrases can both be used to describe pain in a body part, but the former is more common. For example, both "me duele la cabeza" and "tengo dolor de cabeza" mean "I have a headache," but most Spanish speakers will say "me duele la cabeza." Summary: List of Body Parts in Spanish You can use these charts to study the parts of the body in Spanish, make them into flashcards, and expand your Spanish vocabulary. When speaking or writing human body parts in Spanish, it’s important to remember two rules. First, each body part must have its own article preceding it, which you don’t need in English. Second, when discussing a particular person’s body part in English, we typically use personal adjectives such as my, your, or his/her. When discussing body parts in Spanish, you typically use definite articles such as "a" or "the." The learning doesn’t end with just a list of body parts in Spanish though; to be a high-level Spanish speaker, you need to use these body part terms in longer phrases and sentences. What's Next? Want help with some common Spanish phrases? Find out the nuances of how to ask where the bathroom is in Spanish with this article. Need to brush up on your Spanish conjugations? Start with our article covering ser conjugations for every tense. Not sure if Spanish is the right language for you to study? Learn which is the best foreign language to study in high school. Thinking about taking the Spanish SAT Subject Test? We've got a complete guide on everything you need to know about the Spanish Subject Test. Interested in learning Japanese, too? Learn how to say "good morning" in Japanese, plus nine other key greetings.

Thursday, March 5, 2020

7

7 Introduction 7-Eleven is one of the largest companies in the world that operate a chain of convenient stores. Since 1974, the company has been operating under the name 7-Eleven Japan Company Limited (Szymankiewicz, 2007). While viewing the company from a franchising end, 7-Eleven is has the largest licensed franchise in the world with approximately 39,000 outlets worldwide (Szymankiewicz, 2007). Initially, McDonalds Corporation was rated as the largest franchise in the world.Advertising We will write a custom term paper sample on 7-Eleven in China specifically for you for only $16.05 $11/page Learn More However, from the statistics that were taken in the year 2007, 7-Eleven emerged as the largest franchise in the world surpassing McDonalds by over 1000 stores. The company is now operating in 16 countries in the world. Its main markets are found in the US, Japan, Canada and South East Asia. However, the company has been on an expansion spree in the last sever al years. One of the main markets that the company has been target in China. Despite its late entry into the Chinese market, 7-Eleven has grown to be one of the leading retail outlets in the country. It has successfully taken over the traditional Chinese catering industry and offers stiff competition to brands that had been well established in the industry. Development of 7-Eleven 7-Eleven was founded by Joe C. Thompson in Dallas, Texas in 1927 (Doyle and Broadbridge, 2009). Joe was an employee of Southland Ice Company. He began selling bread, milk and eggs. Thompson discovered that it was easier for him to sell convenient items to consumer after realising that the ice he had could be used to preserve these items. This greatly reduced the number of times individuals had to travel to grocery stores in order to purchase these items. As a result of the early success that Thompson enjoyed, he bought Southland Ice Company. He called the new business Southern Corporation. Southern Corpora tion became successful in its early years and expanded into other regions within the Dallas area. During this time, Southern Corporation stores were opened between 7am and 11pm. In 1946, the name of the company was changed to 7-Eleven with regards to reflect its operating hours. By 1952, 7-Eleven had opened its 100th store. In 1962, it commenced a 24-hour operation trial in Austin, Texas that was successful. However, during the early 1980s, the company started to experience recurring financial crisis. However, Ito Yokado managed to save the company from bankruptcy. Eventually, the company was sold in 1987 and by 1991, the company was managed by the Japanese who had a majority share. In 1992, the company was operated under Seven and I Holding Company founded by Ito Yokado who had been one of the largest franchisee of 7-Eleven and commenced a massive expansion activity all over the globe.Advertising Looking for term paper on business economics? Let's see if we can help you! G et your first paper with 15% OFF Learn More The main target market for 7-Eleven is convenient customers who require fast, high quality, efficient and reliable goods and services. These services should be provided in clean and friendly environments. The locations of 7-Eleven stores are selected in order to be easily accessible to consumers. Furthermore, some of these stores have up to 2,500 different products. In addition, the location, design and operations of these stores are designed in such a way that aims at satisfying the needs of the local people; the target market (Sakata, 2006). 7-eleven stores are well known in the countries in which they operate in for Big Gulp, Big Bite and Slurpee. These are the main food and drinks that are found in almost all of their stores worldwide. In addition to this, 7-Eleven openings also have fresh brewed coffee, sandwiches, burgers and hotdogs and other fast foods. This has made the brand to be a convenient food store since it offers a variety of breakfast, lunch and dinner meals. In addition, these openings also offer other services that may meet the needs and requirements of the local market. This includes automated money machines, lottery tickets, phone cards and so on. From its origin in Dallas, Texas 7-Eleven operates and franchises over 7,000 openings in the United States, 6,000 in Canada and over 32,000 outside America. This has made it to be the leading franchise in the world (Doyle and Broadbridge, 2009). Intercompany Collaboration In the retail service that 7-Eleven is involved in, supply chain has always been an essential factor that has contributed to the success that the company is currently enjoying. Supply chain is the process through which different corporations come work together in the process of converting raw materials from the producer to finished products to the retailer (Sakata, 2006). In this process, each company that is part of the supply chain plays a critical role in converting the good into a finished product. Due to the presence of a joint venture, the operating costs and manufacturing costs that are accrued in the process of converting the product are always shared among the members of the supply chain. This has an overall effect of increasing the profitability rates of supply chain members by reducing their operating costs.Advertising We will write a custom term paper sample on 7-Eleven in China specifically for you for only $16.05 $11/page Learn More In its operations all over the world, 7-Eleven has always embraced the concept of supply chain. As a result, the company has always been involved entered into a number of intercompany collaborations in order to achieve its short term and long-term goals and objectives. For instance, 7-Eleven openings in Japan and China have collaborated with local bread suppliers (Arntzen et al, 2005). Most of the bread and baked products that are found in these openings are not baked in house b ut are supplied by external sources. The franchise has collaborated with local bakeries to supply them with bread and other baked products as per the specifications of the customers. This has been done in order to ensure that the openings are able to satisfy the needs and demands of the market. In Japan, the over 10,000 openings that are present have a computerised integrated system that regulated the production, planning and inventory control of the region (Arntzen et al, 2005). This ensures that bread and other baked products are produced with regards to the exact market demand that is accurate and not with regards to trends or speculation. This has greatly reduced the costs that these stores would have otherwise encountered with regards to the production and supply of the products. The presence of a computerised system to control the quantity of goods available in 7-Eleven openings has played a critical role in ensuring that these stores are able to meet the market demand. In add ition, the use of information technology in its operations has also led to the avoidance of extreme situations in which the supply is too much or too little. This has resulted to the avoidance of the bullwhip effect that normally arises as a result of inefficiencies in the lower part of the supply chain. If such an effect is not checked early enough, it may result to adverse effects as one moves up the chain hence bringing about inefficiencies that may result to lack of cooperation among the members of the supply chain. 7-Eleven has always sought creative and innovative methods to satisfying the needs and requirements of its target market. It is due to this fact that the company has always collaborated with other organizations in order to get reliable chain sources and delivery services for its products (Fernie, 2004). This in turn increases the availability of products in their stores to meet the demand and reduces the risks and inconveniences of poor supply of finished products. T herefore, the management of 7-Eleven has always strived to ensure that at all levels of the supply chain, from the producer to the consumer, goods are available at exact quantities. This has always ensured that the goods are always available at the right places within the time periods that they are required at the right quantities.Advertising Looking for term paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The Japanese franchise is one of the most profitable 7-Eleven franchises in the world. It is ranked the third most successful food franchise in the world. The main factor that has led to this success is the concept of intercompany integration and inter-store integration. The introduction of combined distribution centres and a central inventory system that check and regulated the quantity of stocks in all the stores have made it easier for products to circulate within the market. This has led to timely delivery services and availability of products to consumers. In addition, from the system, the products that have a low turnover rate can be identified. In most cases, such products are always eliminated from the stores to create more room for those products whose turnover rates are much higher. This has ensured that all the stores have fresh products at a given time, an essential requirement for consumer retention. While expanding its activities in China, 7-Eleven has been using this strategy and it has proved to be quite fruitful. Strategic Global Alliances The level of trade has grown remarkably over the last few decades as a result of the advancements that are being experienced in the field of information, communications and technology (ICT) (Jovanovic, 2011). These advancements have also increased the number of tradable services in the field of IT and ICT that have made the offshoring and outsourcing of services to be much easier. The ease in the tradability of these services coupled with the increased independence of the location has contributed to the offshoring of services by many companies in the west (Kapila, 2009). These advancements have encouraged the development of globalization. 7-Eleven for instance has its origin in USA. However, it has markets in 16 countries worldwide. This is as a result of globalization. Globalization has also influenced the manner in which companies market their products and interact with their customers. They have embraced the use of technology in order to survive the stiff competition in the market. Some of them, for example, have incorporated the use of social networks and brand communities as a communication strategy of reaching and engaging customers. This because social networks and brand communities are the easiest and most efficient ways through which consumers can be reached as a result of technological changes that the world is currently facing. Most organizations and business companies therefore have stopped stop using outdated methods of reaching out to consumers. As a result of globalization, the tastes and preferences of consumers have expanded. In addition, the level of competition among businesses has increased. This has come about as a result of the availability of substitutes and alternatives. Most of the barriers that initially prevented firms from entering into new markets have been eliminated. Thus, for companies have come up with strategic plans in order to be profitable and susta inable in the short run and in the long run. One of the strategies that these companies have adopted and implemented in their operations is through the formation of alliances. Alliances can be formed through partnerships, mergers or acquisitions. In the course of its operations, 7-Eleven has entered into a number of strategic alliances with renowned companies in the globe. While celebrating its 30th anniversary since its entry in Taiwan in the year 2008, 7-Eleven partnered up with Microsoft while on a campaign to strengthen its brand name and reach out to a new target market; the individuals who fall under the bracket of the young consumer group (Doyle and Broadbridge, 2009). The company was also using other media options in this campaign. The main reason why it chose Microsoft to launch this campaign was as a result of the popularity of the Microsoft brand in Taiwan among the individuals of the young age. Thus, by forming a strategic alliance, the young market will identify the 7-E leven brand name with Microsoft. In the electronic age that we are living in, the managers at 7-Eleven identified that it was necessary to market their brand by using IT hence chose Microsoft as their online partner. The main aim of this campaign was: Improving the 7-Eleven brand name Directing traffic towards their website Increasing store revenue Attracting young consumers This campaign was successful as it created a salient image of 7-Eleven on its target market. Their website got over 68 million hits and the sales during the campaign increased. In the year 2006, Shell Singapore and 7-Eleven Singapore entered into a strategic alliance. In this agreement, 7-Eleven was to provide convenient retail services in all the filling stations that Shell owns all across Singapore (Kunitomo, 2007). Consumers will visit these stations will not only enjoy the high quality fuel in courtesy of Shell but they will also enjoy a wide array of goods and services available at the 7-Eleven stores. Th is was a win-win alliance for Shell Singapore, 7-Eleven Singapore and the consumers who visit these stores. From the alliance, the revenue earned by Shell and 7-Eleven increased. In addition, consumers reported higher satisfaction levels from the performance surveys that were conducted by shell (Kunitomo, 2007). Thus, in its early days in the Chinese market, 7-Eleven should form strategic alliances with companies that have a strong brand name and try to achieve a win-win outcome from the collaboration. 7-Eleven in China Since the early 1990s, China has been experiencing a tremendous growth in its economy. In the early 2000s, China was ranked as the country that has the highest economic growth rate in the world. In 2003, the country reported a GDP of 9% (Martins, 2003). As a result, China presents a vibrant emerging market that is the target of many businesses including 7-Eleven. In China, franchising has become one of the business ventures that have a high potential of growth. This is because it incorporates individuals who do not have a lot of capital into already established brands. Initially, the poor frameworks that surrounded franchising in China made it to be a risky venture hence discouraged a lot of foreign investors. However, with the amendment of the law, the securities of the franchiser and the franchisee have been guaranteed (Newman and Atkinson, 2010). 7-Eleven entered the Chinese market in 2004 (Newman and Atkinson, 2010). Despite their late entry, the company has become successful as a result of its efficient marketing and operating strategies. 7-Eleven stores are characterised by offering high quality services and innovation of new ones (such as the salad island). These services have enabled the company to attract a lot of customers and after a few years in the market, 7-Eleven has become the number one competitor of Hwa Food Corporation, Chinas leading food retailer. However, on their entry into the Chinese market, 7-Eleven has mainly concentr ated on the catering industry over the other ventures that it conducts. This is due to the fact that the management view China as a risky market hence they do not want to risk it all at once. In increasing their brand recognition, 7-Eleven has implemented some of the strategies that had proved to be successful while entering into other markets. For instance, the company has implemented the value chain strategy that was used in Japan in the procurement of goods and services. In addition, the company has integrated IT in its operation to assist in operations and inventory control (Newman and Atkinson, 2010). In China, 7-Eleven has formed alliances with FedEx, UPS and some industries in the shipping and ports industry. These factors have made the brand name of the company to be strong within the region. Through its capability of adjusting to market constrains, 7-Eleven has been able to develop a range of kitchen products that meet the needs and requirements of the Chinese market. For i nstance, the introduction of the soymilk and a variety of milk tea production has increased the number of clients that these stores receive especially during breakfast hours. In addition, the quality of service at these restaurants have guaranteed maximum satisfaction of consumers. In the last quarter of 2011 for instance, it was averaged that each store receives approximately 900 clients per day (Newman and Atkinson, 2010). This has resulted to the high profit margins that the company is currently enjoying in China. Conclusion and Recommendations 7-Eleven has grown to be the leading franchise company in the world. Through its effective and efficient operations, the company operates in 16 countries in the world. In its recent quest of expansion, the company ventured into the Chinese market. Despite the fact that this market posses high risks, the rate of growth that 7-Eleven has exhibited is desirable. However, for the company to be sustainable in the short run and in the long run, it should form alliances and partnerships with brands that are already established in the Chinese market. In addition, 7-Eleven should identify the cultural differences of this market and formulate strategies that will enhance the culture of the local people. The company should also introduce products that meet the taste and preferences of the market and finally adjust their selling price to meet the financial requirements of a higher proportion of the population. References Arntzen, B.C., Brown, G.G., Harrison, T.P., and Trafton, L.L. (2005). Global Supply Chain Management at Digital Equipment Corporation. Interfaces, 21 (5), pp.69-93 Doyle, S. and Broadbridge, M. (2009). Strategic Supplier Segmentation: The Next Best Practice in Supply Chain Management. California Management Review, 40 (2), pp.57-60. Fernie, J. (2004). International Comparisons of Supply Chain Management in Grocery Retailing. Service Industries Journal, 15 (4), pp.134-47 Jovanovic, M. (2011). International Handboo k on the Economics of Integration:  Competition, Spatial Location of Economic Activity and Financial Issues.  Sacramento: Edward Elgar Publishing Kapila, U. (2009). Indian Economy since Independence. New Delhi: Academic Foundation Kunitomo, R. (2007). 7-Eleven is Revolutionizing Grocery Distribution in Japan. Long Range Planning, 30 (6), pp.877-89. Martins, D. (2003). Efficient Consumer Response: Enhancing Consumer Value in the Grocery Industry, Food Marketing Institute, Washington, DC. Newman, G and Atkinson, E. (2010). Seven-Eleven Japan Company Ltd. Journal of Consumer Behavior, 2 (1), pp. 19-22 Sakata, S (2006). An Analysis of the Japanese Convenience Store Industry: A Case Study of 7-Eleven Japan Corporation. University of Sterling: Unpublished MSc Thesis Szymankiewicz, R. (2007). How can Service Business Survive and Prosper? Sloan Management Review, 27 (2), pp. 21-32.

Tuesday, February 18, 2020

Determination of Proteins Using Biuret and Lowry Assay Techniques Essay

Determination of Proteins Using Biuret and Lowry Assay Techniques - Essay Example Protein assay is critical in the analysis of agricultural, industrial and biotechnological products. As argued by Bama et al. (2010), it is also important for research especially in analysis of enzymes, lectins and antibodies. This paper covers two kinds of assays used in quantitating total proteins. These includes the biuret and lowry techniques. Biuret assay, which is the least sensitive assay is among the coulometric methods (Quereshi et al. 2010). It is mostly used due to its simplicity and less susceptibility to chemical interference. The assay is dependent on polypeptide chelation of cupric iron in strong alkali. According to Mizuta et al. (2005), most biuret assays are used in samples containing 1 to 10mg protein/ml, which is then diluted five-fold by other reagents to form deep purple color. On the other hand, the Lowry method is a colorimetric assay that is based on folin-ciocalteau reagent and cupric ions of phenolic groups (Muyonga, Cole & Duodu, 2004). It is a popular pro tein estimation procedure even though highly susceptible to discerning compounds that interfere and distort solubility of insoluble proteins. The assay starts with copper ion complex that has peptide bonds, which are stabilized by tartrate in alkaline environment popular known as biuret chromophore. Gornall, Bardawill and David (1949) pointed out that biuret reaction is reduced under alkaline conditions of folin-ciocalteu reagent. Copper ions are used to enhance the reduction process. However, the principle chromogenic groups consist of the peptide linkages that reduced blue molybdotungstates, which catalyses polar amino acids, tyrosine and tryptophan. Nonetheless, the sensitivity of this test is based on protein composition and products of chemicals reaction resulting to the heteropolymolybdenum blue solution after being in absorbance condition of approximately 750nm, a wavelength that is out of range of many interfering colors (Layne, 1957). In these two experiments, the basic law of light absorption, popularly knows as Beer-Lambert law is used to explain the linear relationship between protein (collagen) concentration and absorbance (Cliche, Amiot & Avezard, 2003). The yield of collagen is calculated using the following lines equation: Y=(VxC)/ W Where; Yis the yield of collagen in mg/g Vis the volume of collagen solution in ml C is the concentration of the derived solution in mg/ml Wis the lyophilized weight in g Materials used: 1. Protein sample of unknown concentration 2. Standard BSA 3. Distilled water 4. Lowry reagent 5. Test tubes 6. Label 7. Test tube rack 8. Pipettes 9. Pipette bulb 10. Vortex mixer 11. Spectrophotometer 12. Cuvettes 13. Gelatin : 100Â µg cm-3 14. Globulin: 100Â µg cm-3 15. albumin: 200Â µg cm-3 Methods Lowry Technique: Procedure: 1. Prepare samples with up to 100 ?g of protein 2. Label the 9 test tubes as (1 to 10) and place them in a test tube rack. 3. Add water as provided in the instructions. 4. Prepare diluted Folin-Ciocalte u reagent and the Assay Mix. 5. Add 0.5cm3 of the protein solution to tubes (2 to 10). 6. Add gelatin solution to tube 7 and 8 only. 7. Then add 2.5cm3 of solution D to each tube and mix well and leave the mixture at room temperature for approximately 10 minutes.

Monday, February 3, 2020

Semiotic analysis of how reality television affects our society Research Paper

Semiotic analysis of how reality television affects our society - Research Paper Example Like any other form of media exposure, the reality television also has certain effects on the society. However, the positive effects of these shows is limited to entertainment for viewers, benefits for the producers, higher returns for the sponsors and fame for the starring characters. Hence, this paper aims to analyze the impact of reality shows on the society and focuses more on the negative effects it has on people. Television exposure has a great impact on people’s perceptions and views. The impact of, reality television, is crucial as the reality shows portray the real life experiences of certain people. O’ Guinn and Shrum (1997) shed the light on this issue by asserting that people believe in what is being exposed on the television and perceive it to be true. Regardless of the over-representations and extreme exposure of changing attitudes, emotions and behaviours added to grab the attention of the viewers. This over-represented picture of reality, hence, is adopted by a large viewership. A number of studies have been conducted to affirm this claim that the whole society is affected by television exposure. An American individual spends approximately 4 hours in a day watching television (O’Guinn, Shrum & Wyer, 1998). The effects of reality Television are more severe and long lasting than other shows. The reason to this fact is the finding of research studies that people w ho watch TV are affected by the exposure in one way or the other. They often try to fit their own life and existing circumstances to the ones they watched on the TV. Reality shows, which repeatedly emphasize that the characters and the incidents are all real, affect people even more. There is, however, a camera effect on the behaviours of the characters starring in the reality television which is, most of the times, ignored by the viewer. To understand the possible effects of reality television on the society, let us consider an

Sunday, January 26, 2020

Types of Cyber Crime and Strategies for Prevention

Types of Cyber Crime and Strategies for Prevention Crimes In cyber Age And Its Response By Indian Judiciary Table of abbrevaitions AIR All India Reporter AP Andhra Pradesh Art. Article Bom. Bombay ed. Edition Ltd. Limited. P. page number Pat. Patna SCC Supreme Court Cases SCR Supreme Court Reporter Sec. Section Crimes In cyber Age And Its Response By Indian Judiciary Introduction The advent of the third millennium has brought in an era of information society. The new era is the result of rapid changes brought about by the new technology and the cyber world. Obviously the information society offers vast scope and opportunities to human beings to identify information, to evaluate information, and to exchange information for the benefits of the citizens the world over. The in formation technology provides for a new environment, new work culture, new business links and trading networks. It allows information and knowledge based work to be located anywhere. It is virtually transforming and revolutionizing the world. The information technology is a double-edged sword, consistently presenting us with benefits and disadvantages. The increasing opportunities for productivities, efficiency and worldwide communications brought additional users in droves[1]. Today, the internet is a utility, analogous to the electric company and ‘.com has become a household expression. The reliability and availability of the internet are critical operational considerations. Activities that threaten these attributes like spamming, spoofing, etc, have grave impacts on its user community. Any illegal act, for which knowledge of computer technology is essential for its perpetration, investigation, or prosecution, is known as cyber crime. Among the various problems emerging out of the internet are the menace of hackers, cyber terrorism, spamming, Trojan horse attacks, denial of service attacks, pornography, cyber stalking etc. Through this paper the researcher will try to study the problem of cyber stalking, cyber defamation, various types of data theft and the laws relating to it. An effort will also be made to recommend some suggestions to fight these dangerous problems, with the response of Indian judiciary to it. Cyber staking Cyber stalking, has been defined as the use of electronic communication including, pagers, cell phones, emails and the internet, to bully, threaten, harass, and intimidate a victim. Moreover, it can also be defined as nothing less than emotional terrorism.[2] Cyber stalking can take many forms. However, Ellison (1999) suggests, cyber stalking can be classified by the type of electronic communication used to stalk the victim and the extent to which the communication is private or public. Ellison (1999) has classified cyber stalking as either ‘direct or ‘indirect. For example, ‘direct cyber stalking includes the use of pagers, cell phones and the email to send messages of hate, obscenities and threats, to intimidate a victim. Direct cyber stalking has been reported to be the most common form of cyber stalking with a close resemblance to offline stalking (Wallace, 2000). Why people do it? Generally, to be defined as stalking the behaviour must be unwanted and intrusive. Another important point is that the stalker must also have an intense preoccupation with the victim. The range of behaviour involved in stalking can be broadly grouped in three categories. Firstly, there is following, which includes frequenting workplaces and homes, maintaining surveillance, and engineering â€Å"coincidences.† Secondly, there is communicating—by phone, letters, cards, graffiti, gifts, and, Increasingly, electronic mail and the internet (â€Å"cyber stalking†).Often the stalker will order goods and services on the victims behalf. Finally comes aggression or violence, in which stalkers threaten their victims, harass their families, damage their property, make false accusations about them, and cause sexual or physical injury. Sexual attractions and motives are other very important reasons for cyberstalking. In USA, the federal law enforcement agencies have encountered numerous instances in which adult paedophiles have made contact with minors through online chat rooms, established a relationship with the child, and later made contact for the purpose of engaging in criminal sexual activities.[3] Nature of cyber staking The nature of cyber stalking is ascertains by the medium which is used for its execution. According to †¦ cyber stalking had been classified into four kinds[4] a) E-mail stalking b) Chat stalking c) Bulletin board systems d) Computer stalking. Email stalking Electronic mail is an electronic postal service that allows individuals to send and receives information in matter of seconds. This sophisticated use of telephone lines allows communication between two people who may or may not know each other but can ‘speak to each other using a computer. In general Email is an insecure method of transmitting information or messages. Everyone who receives an email from a person has access to that persons email id. With some online services as AOL, a persons screen name is also an email address. In addition, when a person posts an item on a newsgroup, that pesons email id may be available to anyone who reads that item. It is unsurprising, then, that email is a favoured medium for cyber stalkers. Technologically sophisticated email harassers send ‘mail bombs, filling a persons inbox with hundreds or even thousands of unwanted mails in the hope of making the account useless. Others send electronic viruses that can infect the victims files.[5] Chat stalking A chat room is a connection provided by online services and available on the internet that allows people to communicate in real time via computer text and modem. Cyber stalkers can use chat rooms to slander and endanger their victims. In such cases the Cyber stalking takes on a public rather than a private dimension. As live chat has become more popular amongst users of the internet with tools such as internet relay chat (IRC), it has also become more popular as a medium through which stalkers can identify and pursue their prey. When a person enters a chat room, his screen name joins the list of names of others in the group. Depending on the nature of the chat software, that person can address others in the room and vise versa as a part of the group discussing from a smaller group in a private chat room or send private, one to one instant messages to others anytime.[6] During ‘chat, participants type instant messages directly to the computer screens of other participants. When a person posts a message to a public news group this is available for anyone to view copy and store. In addition, a persons name, email address and information about the service provider are easily available for inspection as a part of the message itself. Thus, on the internet, public messages can be accessed by anyone anytime- even years after the message were originally written. In IRC, the harasser may chose to interrupt a persons chat electronically or otherwise target a chat system, making it impossible for someone to carry on a conversation with anyone else. The Cyberstalker can engage in live chat harassment or abuse of the victim( otherwise known as ‘flaming) or he/she may leave improper message o the message board or in chat rooms for or about the victim. Bulletin board systems A bulletin board system (BBS) is a local computer that can be called directly with a modem[7]. Usually they are privately operated and offer various services depending on the owner and the users. A bulletin board allows leaving messages in group forums to be read at a later time. Often a BBS is not connected to a network of other computers, but increasingly BBSs are offering internet access and co Cyber stalkers area using bulletin boards to harass their victims.[8] Online have been known to known to post insulting messages on electronic bulletin boards signed with email addresses of the person being harassed. The Cyber stalker can also post statements about the victims or start rumours which spread through the BBS. In addition a Cyber stalker can ‘dupe another internet users into harassing or threatening a victim by posting a controversial or enticing message on the board under the name , phone numbers or email address of the victim, resulting in subsequent responses being sent to the victim.[9] Computer stalking With computer stalking, cyber stalker exploits the internet and the windows operating system in order to assume control over the computer of the targeted victim. An individual ‘windows based computer connected to the internet can be identified, allowing the online stalker to exercise control over the computer of the victim. A cyber stalker can communicate directly with his or her target as soon as the target computer connects to the internet. The stalker can also assume control over the victims computer and the only defensive option for the victim is to disconnect and relinquish his or her current internet address.[10] An example of this kind of cyber stalking was the case of a woman who received a message stating ‘ Im going to get you. The cyber stalker then opened the womans CD-ROM drive in order to prove that he had control over her computer. cyberstalking trends and statistics offenders Previous studies that have investigated stalking offenders by and large, have focused on the offline stalking offender Regardless for the offenders group such as ‘simple, ‘love or ‘erotomanic statistics reports, male offenders to account for the majority of offline stalking offenders. Working to Halt Online Abuse (2000) statistics also support the gender ratio of offenders claiming, 68% of online harassers/cyber stalkers are male. Furthermore, common social and psychological factors have been found within offline stalking offender population. For example, social factors such as the diversity in socio-economic backgrounds and either underemployment or unemployment have been found significant factors in offline stalking offenders[11]. In a research done on young stalkers between 9 and 18 years of age little difference was found between young and adult offline stalking offenders. For example, the majority of offenders were male, had some form of previous relationship with the victim and experienced social isolation.[12] Victims Currently, there are limited studies on the victims of cyber stalking. Although, anyone has the potential to become a victim of offline stalking or cyber stalking, several factors can increase the statistical likelihood of becoming a victim. Studies[13] that have investigated offenders of offline stalking, have found some common factors within the selection of victims. For example, contrary to public belief, a large proportion of stalking victims are regular people rather than the rich and famous. Goode claimed[14], up to 80% of offline stalking victims are from average socio-economic backgrounds. In addition, the statistical likelihood of becoming a victim increases with gender. Working to Halt Online Abuse (2000) reports, 87% of online harassment/cyber stalking victims are female. However, victim gender statistics may not represent true victims, as females are more likely to report being a victim of online harassment/cyber stalking than males. Although studies have shown that the majority of victims are female of average socio-economic status, studies have also shown that offline stalking is primarily a crime against young people, with most victims between the age of 18 and 29.[15] Stalking as a crime against young people may account for the high prevalence of cyber stalking victims within universities. For example, the University of Cincinnati study showed, 25% of college women had been cyber stalked.[16]. Nevertheless, previous relationships have been shown to increase the likelihood of being stalked offline. For example, it was reported, 65% offline victims had a previous relationship with the stalker[17]. Although studies of offline stalking claim the majority of victims have had a previous relationship with the stalker Working to Halt Online Abuse Statistics[18] fails to support a previous relationship as a significant risk factor, for online harassment/cyber stalking. For example, 53% of victims had no prior relationship with the offender. Therefore, the risk factor of a prior relationship with the stalker may not be as an important factor in cyber stalking, as it is in offline stalking. Psychological effects of cyberstalking Currently, there are few studies on the psychological impact on victims. However, Westrup[19]studied the psychological effects of 232 female offline stalking victims. He found out that the majority of victims had symptoms of PTSD, depression, anxiety and experienced panic attacks. Additionally, it was found that 20% of victims increased alcohol consumption and 74% of victims suffered sleep disturbances[20]. Nevertheless, social and psychological effects of offline stalking cannot be separated as social effects can impact on psychological effects and psychological effects can impact on the social effects. Although the majority of studies have focused on the offline stalking victims, there is no evidence to suggest that cyber stalking is any less of an experience than offline stalking (Minister for Justice and Customs, 2000), As shown, there are many common themes between offline stalking and cyber stalking. For example, offenders are most likely to be male and offline stalking or cyber stalking is the response to a failed (offline/online) relationship. Additionally, young females account for the majority of victims. Furthermore, victims experience significant social and psychological effects from offline stalking or cyber stalking.[21] Legal responses to cyberstalking Cyber stalking is are a relatively new phenomenon and many countries are only now beginning to address the problem. India has also witnessed cases of cyber stalking, cyber harassment and cyber defamation. However, as there is no specific law or provision under the IT Act, a number of these cases are either not registered or are registered under the existing provisions of Indian Penal Code—which are ineffective and do not cover the said cyber crimes.[22] Since its promulgation, the IT Act 2000 has undergone some changes. One big change is the recognition of electronic documents as evidence in a court of law. Market players believe this will go a long way in giving encouragement to electronic fund transfers and promoting electronic commerce in the country. However, all hope is not lost as the cyber crime cell is conducting training programmes for its forces. It also has plans to organize special courses for corporate to combat cyber crime and use the IT Act effectively. Cyber defamation Defamation can be understood as the intentional infringement of another persons right to his good name. It is the wrongful and intentional publication of words or behavior concerning another person, which has the effect of injuring that persons status, good name, or reputation in society. It is not defamatory to make a critical statement that does not have a tendency to cause damage, even if the statement turns out to be untrue[23]. In this case a claim for malicious falsehood[24] may be raised. Another key feature of the Internet is that users do not have to reveal their identity in order to send e-mail or post messages on bulletin boards. Users are able to communicate and make such postings anonymously or under assumed names. This feature, coupled with the ability to access the internet in privacy and seclusion of ones own home or office and the interactive, responsive nature of communications on the Internet, has resulted in users being far less inhibited about the contents of their messages resulting in cyber space becoming excessively prone to defamation. What is defamatory? As to what is defamatory; Permiter v. Coupland[25] and Youssoupoff v. Metro Goldwyn Mayer Pictures Ltd[26] lay down that it is a publication without justification or lawful excuse, which is calculated to (meaning â€Å"likely to†) injure the reputation of another by exposing him to â€Å"hatred, contempt, or ridicule†[27] and make the claimant â€Å"shunned and avoided†. Then in Sim v. Stretch[28] the definition was widened to include the test whether the words tend to lower the plaintiff in the estimation of the right-thinking members of society in general. A persons good name can only be damaged if maligning statements are made to someone other than that person; that is, the defamatory statement must be disclosed to a third person, thereby satisfying the requirement of publication. Thus the law of defamation places a heavy burden on the defendant. All that a plaintiff has to prove, in a defamation action, is the publication of defamatory matter. The onus then lies on the defendant to prove innocence. In essence, the law on defamation attempts to create a workable balance between two equally important human rights: The right to an unimpaired reputation and the right to freedom of expression. In a cyber society, both these interests are increasingly important. Protection of reputation is arguably even more important in a highly technological society, since one may not even encounter an individual or organization other than through the medium of the Internet. Jurisdiction It is a fact that the tried and true real world legal principles do not apply in the digital generation. Even seemingly ubiquitous, time honoured principles must be examined, including whether a court has the power to exercise jurisdiction over a defendant because of the defendants ties to or use of the Internet or Internet related technologies. This jurisdictional rethinking requires us to address the concept that involves the right of the sovereign to exert its power and control over people or entities that use the Internet One of the complexities of the Internet is the fact that Internet communications are very different than telephone communications. The telephone communication system is based on circuit-switching technology, where a dedicated line is allocated for transmission of the entire message between the parties to the communication. A dedicated line, on the other hand, does not accomplish Internet communications. A message sent from an Internet user in India may travel via one or more other countries before reaching a recipient who is also sitting at a computer in India. Therefore, the lack of a physically tangible location and the reality that any Internet communication may travel through multiple jurisdictions creates a variety of complex jurisdictional problems[29]. Position in india Cases of cyber defamation do not fit neatly in the accepted categories of crimes. They represent harm of greater magnitude than the traditional crimes and of a nature different from them. Unlike the traditional crimes, they are not in the shape of positive aggressions or invasions[30]. They may not result in direct or immediate injury; nevertheless, they create a danger, which the law must seek to minimize. Hence, if legislation applicable to such offences, as a matter of policy, departs from legislation applicable to ordinary crimes, in respect of the traditional requirements as to mens rea and the other substantive matters, as well as on points of procedure, the departure would be justified[31] An effort is still wanted to formulate an international law on the use of Internet to curb this imminent danger of cyber crimes and to achieve a crime free cyber space. Defamation laws should be sufficiently flexible to apply to all media. The difficulty is that the defamation laws world over were principally framed at a time when most defamatory publications were either spoken or the product of unsophisticated printing. We do need a stronger legal enforcement regime in India to combat the increasing cyber crimes or in other words, efficacy in dispensation of justice will be instrumental in curtailing such activities. The position in Indian law is not very clear and amendments should be brought to Section 67 of the Information Technology Act, 2000[32] and also to Section 499 of the Indian Penal Code[33], by expressly bring within their ambit offences such as defamation in cyber space, which is certainly a socio-economic offence. Internet Banking Fraud The concept of internet banking was introduced to facilitate the depositors to have access to their financial undertakings globally. But every good thing has its own demerits; the introduction of this system was coupled by a number of fraud incidents in which the money of depositors was embezzled by the net swindlers popularly known as hackers.[34] Digital Extortion For any company doing business on the Internet, its the sound of doom: a computer voice warning of an inbound attack. Call it a cyber-shakedown: A hacker threatens to shut down a companys Web page, unless the business pays up.[35] Digital Extortion can be defined as, â€Å"Illegally penetrating through the system of an enterprise and then compelling it to pay substantial amounts in lieu of their secret data or to save their system from being wiped out by the hackers.† In a recent incident, Security researchers at Websense were trying to learn why a clients files were scrambled when they found a note demanding $200 for the electronic key to the files. The money was to be sent to an online payment service. The data was recovered without paying the ransom, but experts are worried that more sophisticated attacks could be more serious.[36] Credit Card Frauds Credit Card popularly known as plastic money has came up as a panacea for the troubles of carrying huge amount of money in the pocket. The credit card embodies two essential aspects of the basic banking functions: the transmission of payments and the granting of credit. But again the usage of this technology has brought in new forms of crimes with the fraudsters employing entirely new technologies to manipulate this technology for their illegal economic gains because unlike paper money, it was not anonymous and the usage of credit card can be traced. The Indian Legal Response to Data Theft Related Cyber Crimes In the past few years, India has emerged as a leader in information technology. Also, there has been an explosion of the BPO industry in India, an industry which is based primarily on IT[37], an industry where there is a huge risk of data theft since the business primarily is based on huge amounts of sensitive data of the customers. The numbers of computer literates have also grown at a rapid pace. The prices of computers and other peripherals have slashed drastically. Dial-up and Broadband connections, both are found and are easily accessed at cheap rates. All this has resulted in making the middle-class in India computer literate as well. Hence, as a result of all these developments, the Indian Parliament enacted the Information Technology Act, 2000. The researchers will discuss some of the remedies provided for in brief and has also provided certain suggestions as to where the act can be amended. 1) Penalty for Tampering with Computer Files As discussed already, Industrial espionage may also include tampering with the computer files to slow down the system or corrupt databases. Section 65 of the Act defines this sort of offence and prescribes an imprisonment of 3 years or fine extending to two lakh rupees. 2) Penalty for Hacking This also relates to data theft and industrial espionage. Hacking is where a person hacks into a computer resource and in any way destroys, deletes or alters any information is to be punished with an imprisonment of up to three years or a fine extending up to two lakh rupees. For this the requirement of mens rea, i.e. metal element is required. 3) Penalty for Damage of Computer, Computer System, etc. This is the section which can be said to deal directly with data spying. Section 43 says that whosoever without the permission of the owner accesses any computer ,downloads, copies or extracts any data, computer data base or such information is liable to pay compensation not exceeding rupees one crore. It takes care of all the possibilities arising out of such situations. In this case the condition of mens rea is not required, i.e. this section imposes a strict liability on every unauthorized access. 4) Penalty for breach of Confidentiality and Privacy Now, this section seeks to bring to the book people who secure access to any electronic record etc. and without the consent of the person concerned disclose the information to a third party. Shortcomings of the Act: * No steps to combat Internet Piracy- There is absolutely no legislation to combat the menace of piracy which has India firmly in its iron grip .As discussed by the researchers above India is one of the countries where there is rampant violation of copyrights. Pirates sell copyrighted material openly, on the streets, yet nothing can be done about it. * Power of Police To Search Limited to Public Places-Police officers can search public places and arrest any person having committed a cyber crime but it is seldom that such crime takes place in the open. Hence, the police have been limited in its powers by the act. * Issue of Privacy and Surveillance-There is no legislation that protects the citizens from having their physical features being examined and the details stored without their consent. When biometric systems gain currency in India the old argument of Privacy v. Security will have to be waged as it has been waged in the US. As we have seen, there are various aspects of data theft, not only the conventional one, though that remains one of the most well-known ways of data-theft, i.e. data spying .In todays world there is no one way of defining data. Data can still be in the form of a spreadsheet and also you can call information about a person including his physical features, which if they fall into the wrong hands can cause identity theft and can be used in various other ways to commit crime. The companies should monitor their employees, before hiring their employees and after hiring them. Employees should be given incentives and good salaries so that they resist the temptation to give away information to rival companies. Since it is a capitalistic system, competition will always remain, and companies will sink to unfair competition. Hence, unfair practices will always exist, and to minimize those companies should take all precautions necessary. As far as the laws concerning internet piracies go, not only in India, but the entire world needs better and more stringent laws that protect the copyright of intellectual property and stop the rampant copyright violation that has engulfed the whole world. Copyright laws need to be strengthened or else creativity will suffer since the artistes or investors will have no incentive. The music, film and publishing industry have all suffered heavily, to the tune of billions. India, also, needs more legislation, and most importantly of all, it needs to find ways to implement the existing laws, for example giving the police powers to search private places in case of suspicion of cyber crime. The definition of hacking needs to be modified and narrowed, since in the existing legislation the definition includes too many unnecessary acts. A lot of work regarding the use of biometric technology has to be done. The problem which the US face now (as has been discussed above) is the problem which is going to arise now, in India. Though biometric technology is definitely the way to go in view of the increased risk of terrorist attacks all around the globe, but there are serious issues of, not only violation of privacy, but also that of data theft, not only by criminals, but by the state itself Challenges of information technology to existing legal regime The impact of Internet on the existing legal regime can be well appreciated by the fact that the US Congress had introduced more than 50 bills pertaining to Internet and e- commerce, in the first three months of 1999 alone.[38] The issues, which need to be addressed urgently, are security of transactions, privacy, property, protection of children against an easy access to inappropriate content, jurisdiction, and validity of contracts, Procedural rules of evidence and other host of issues. Constitutional issues The issues raised by the advent of the Internet relevant to the constitutional lawyers are freedom of speech and privacy. The questions regarding the freedom of speech, which need to be answered, are: 1. Is publication, of information on the Internet equivalent to the speech and expression made by an ascertained person in real space within the political boundaries? 2. If it amounts to speech and expression should it be then regulated? 3. If it is to be regulated, should it enjoy the freedom available to press and thus subject to restrictions of article 19(2) or be treated as broadcast media, which is subject to governmental regulations? 4. Should we consider Internet a different media unparallel with the traditionally known and have to come up with different legal regime? In the developed world, a record bank is created in which individuals record image is stored. This record image is based on the information collected from different sources pertaining to an individual who remains unaware of the method, process and sources of record image[39].This record image has far reaching implications for an individual who may apply for insurance, medical care, credit and employment benefits.[40] The government also maintains electronic files, which contain sensitive information. This information is shared among the government agencies, private organisations and between the government and private sector, which in fact is facilitated by the technology itself. There is a possibility that the data collected from different sources to prepare a profile is outdated, inaccurate or out rightly false. Translating information to make it computer readable further compounds the problem. This increases the possibility of inaccuracies. Thus the objection is not that the inform ation has been collected with the knowledge of the concerned person, but the objection lies in the fact that an inaccurate information has been collected which will be repeatedly used to evaluate character, reputation, employment chances and credit worthiness of an individual who was not given chance to go through the information before it is finally stored, nor does he know the source where from the information has been collected. The Supreme Court of India has found article 21 flexible enough to encompass right to privacy within its fold. In Peoples Union for Civil Liberties v. Union of India[41] the apex court held the right to privacy a fundamental right. The apex court reminded that this right has its genesis in international instruments more particularly in articles 17[42]and 12[43] of the international Covenant on Civil and Political Rights, 1948, respectively to which India is a signatory and has to respect these instruments as they in no way infringe the domestic laws.[44] There are no two opinions about the fact that the Internet is going to be on central stage in future where an individual cannot be even in a take it or leave it situation. Its pervasiveness, speed and efficiency will provide little scope t