Monday, September 30, 2019

Pennsylvania Adoption Law

Adoption has been prevalent since time immemorial. In fact, history tells that the practice of adoption dates back as far as the 18th century BC. This was practiced by the ancient civilizations such Romans, Greeks, Egyptians, and Babylonians. It is even referred to in the Bible and other religious texts (Meiser, 1997).Adoption is the process whereby a child is removed from his/her biological parents and placed with non-biological parent(s). This establishes a parent and child relationship, in contemplation of law, between persons not so related by nature (Adoption, 1994). Thus, adoption creates a legal parent-child relationship between individuals without the benefit of biological relation.Reasons for the Emergence of the adoption In the early decades of the twentieth century, adoption was rather unusual. In fact, adoption was not recognized by the common law, and exists later in the United States solely by virtue of the special statutes. Thus, adoption was not a common way to form a family.Due to humanitarianism, upward mobility, and infertility, however, adoption started to be institutionalized. These factors mirrored reality especially in 1920s and 1930s, when inquiries made by adults about children unattached to their families greatly increased in the United States.Through adoption, children are transferred from adults who do not want or is not capable of becoming parents to adults who want the offspring and is capable of giving love, time, and an acceptable standard of living. Hence, adoption is considered as a salvation to married couples deprived of bearing their own children because of infertility since this process allow them to form families of their own.Likewise, adoption allowed illegitimate children to be protected from social stigma as they are legitimized once adopted by their adopting parents. Thus, adoption gives a fresh start to everyone involved—the mother can erase her past by placing her baby for adoption, the child can join a normal family rather than being raised by a single parent, and the adoptive parents can experience the joy of having a child (Martin, 2006).Adoption Phenomenon: Some statistics In 1950s and 1960s, as measured both by number and by the enthusiastic support of a broad white middle class, adoption flourished. Ten years thereafter, or in the 1960s and 1970s, adoption brought a remarkable transformation to society as adoption posted a record high of almost ninety thousand adoptions made by non-relatives.In recent years, however, this number increased by almost forty (40) percent as survey reveals that Americans annually adopt approximately one hundred twenty-five thousand (125,000) children, strangers and relatives alike (Adoption statistics, 2006).This has affected 2.4% of the United States population or about five (5) million Americans (id). The Census also reveals that among those children adopted, sixty-four (64) percent are whites, sixteen (16) percent are African American seven (7) perce nt are Asians (2000).In Pennsylvania alone, 4,047 children were served by the Pennsylvania Adoption Exchange (PAE) (PAE 2004). Forty-eight (48) percent of these children are African Americans, thirty six (36) percent are Caucasians and five (5) are Hispanics (id).Despite this wide acceptance of adoption in the American society or the inhabitants of Pennsylvania for that matter, a number of children are still â€Å"waiting† to be adopted. For instance, in Pennsylvania, out of the twenty two thousand six hundred ninety (22,690) children who were placed in foster care, twenty two (22) percent are still â€Å"waiting† to be adopted (Adoption institute, 1999).Considering this unprecedented increase in adoptions in the country, the United States senate is pushing for a bigger funding for the child support enforcement and family support programs to be paid to various states. Thus from a mere $2,121,643, 000 appropriated in 2006, the proposed budget for the administration of c hildren and families is increased to $2,759,997,000 for this incoming year of 2007 (US Department f Health and Services, 2006). This is equal to a $7,300,00 increase of funding.Adoption Laws in the United StatesBefore the first adoption statutes went into effect in 1850’s, children were removed from his/her biological parents and were transferred to non-biological parent(s) without the legal recognition of the adoption. As this informal type of adoption increased the State legislature devised a way to formalize the adoption process.Thus, in May 24, 1851 the first adoption statute in the United States went into effect – the Massachusetts Adoption of Children Act. Pursuant to the Massachusetts statute, adoption was required to be judicially approved, likewise the consent of the child’s parent or guardian were needed to be secured, and also a finding that the prospective adoptive family was of with sufficient ability to raise the child.History of Pennsylvania Adopt ion LawFollowing the example of Massachusetts, the Pennsylvania enacted its own adoption statutes – the Pennsylvania Consolidated Statutes. In earlier times, Pennsylvania provided that adoption could be decreed by the common pleas of courts of the countries.An amendment to this adoption legislation was thereafter made in 1872 wherein the process of adoption referred to as the â€Å"common law form of adopting a child be deed† was legalized. Under this system, it is possible that an adoption refused by the judge will be consummated by a deed. (Deardorff, 1925).The State legislatures saw the defect in this kind of Pennsylvania system. For under this system, no social investigation of the child and his natural family or of the adopting family was provided. Further, a judge can consummate an adoption without seeing any of the parties and worse, even without sufficient information other than that contained in the petition for adoption.With this kind of system, cases of perj ury as to the identity of the natural parents of a child and as to whether or not these natural parents are still alive were exposed.Due to the globalization of the adoption, legislatures have made vigorous reforms as regards adoption statutes. In 1917, for instance, Minnesota passed the first State law that required children and adults to be investigated and adoption records to be shielded from public view (Adoption history in brief, 2006).Decades later, more than twenty states had translated similar standards into law. By mid-century, policies of minimum standard such as certification of child-placers, investigation of the child and adult parties to adoption, and supervision of new families after placement and before finalization were incorporated in the revision of adoption statutes in all the states in the country.The policies of confidentiality and sealed records were likewise instituted by most states. Confidentially of records, however, at this time meant that the records of information are off limits to the inquisitive members of the public but kept it available to the children and adults directly involved in adoption, who were called the â€Å"parties in interest.†Similarly, in 1925, under the Pennsylvania adoption law, the adoption was accessible to anyone curious enough to search it out. Other court records were sealed only at the discretion of a judge, in which case they could then be inspected by court order. In 1947 however, Pennsylvania followed suit in sealing its records.Although the records were sealed, adoptees who would reach the age of twenty-one (21) could still obtain their original birth certificates from the Office of Vital Statistics. Then in 1953, court records including the adoption decree were sealed to all, with the exception of being able to be opened upon showing of an undefined â€Å"good cause.†(Holub, 2006) In 1984, after a six (6) year push by state Rep. Stephen Friend, R-Delaware Country â€Å"to close the lo ophole†, as it was termed, the state legislature passed a bill denominated as Act 185 finally closing the records of adoption. Act 185 amended Title 23 (Domestic Relations) of the Pennsylvania Consolidated Statutes and provides that all adoption records, and other papers shall be withheld from inspection except upon a court order.The Pennsylvania adoption law, thus prohibits adoptees from obtaining their original birth certificates or any other document that would identify birth parents. That includes baptism certificates and adoption records. After the grace period in February 1985, adoption records were finally closed.This law was pushed by Rep. Stephen Friend since he claimed that young, unmarried pregnant women would choose to have abortions rather than relinquish their children to adoption if it were possible for their adult children to discover their identity. He also asserted that the state should â€Å"keep its promise† of â€Å"privacy† to birthparents. (id)Cynthia Bertrand Holub, a member of the Pennsylvania Advisory Committee to the Joint State Government Commission on Adoption Law, says the desire to â€Å"preserve the middle-classness of these women, so they could relinquish their [illegitimate] child and go home as if nothing had happened,† was one of several forces that led states to seal adoptees' birth records (2006).Thus, confidentiality now means that when courts issue adoption decrees, they shall produce new birth certificates, thus, listing adopters’ names in the new birth certificate, and sealing away the originals, which contained the names of birth parents, or at least birth mothers.Criticisms of the Pennsylvania Adoption Law.  The Pennsylvania Adoption law was criticized mainly with respect to the sealing of the adoption records. Critiques refutes Rep. Stephen Friend’s claim that â€Å"unmarried pregnant women would choose to have abortions rather than relinquish their children to adoption if it were possible for their adult children to discover their identity.†They assert that Pennsylvania’s abortion rate should have declined and the adoption rate should have risen accordingly. Between 1985 and 1990, however, the abortion rate in Pennsylvania is inconsequential, and Pennsylvania still has one of the lowest adoption rates in the country.They further assert that neither was there ever a single suit by a birthparent for invasion of privacy. Other critique says that the confidentiality made it possible for some of these parents to avoid telling their children that they were adopted at all.As far as a number of birthparents are concerned, they believe that they still have the right to copies of everything relating to the loss of their babies. Dorner, in her book Adoption Search citing the Catholic manual states that â€Å"[b]irth parents also seek information about their children and their adoptive families through the years. Being able to obtain file informat ion pertaining to the time of the pregnancy, is reality basing and healing†¦Ã¢â‚¬  (Buterbaugh, 2001).On the other hand, supporters of the Pennsylvania Adoption Law, such as the relatives of many unmarried birth mothers also favored the confidentiality measure. After the World War II, when more out-of-wedlock births occurred in middle-class families, mortified parents contends that their daughters should have a second chance to lead normal, married lives. ConclusionAdoption statutes by different states primarily emerged as an answer to the growing unrecorded adoptions in the country. More so, these enactments are hoped to protect the interests of the parties involved — i.e. adopting parents, biological parents and the child himself.Adoption statutes, however, are of varying degrees in terms of privacy across states. Recently, Pennsylvania adopted a very strict standard on privacy matters.This means that nobody can actually view the original birth certificate of the adop ted child as a new one was created. This new law, however, sowed criticism from different sectors as they believed that biological parents still have the right to information as to what has become of their child.Also, they argued that the child, himself, is entitled to information as to whether he is indeed of the same flesh and blood as that of his known parents. They also sans the statute for allowing adopting parents to forever conceal the truth regarding the child’s birth.

Sunday, September 29, 2019

Respecting Elders

Respecting my elders, and everyone else, just comes natural to me, because when I was just a little girl, I was taught that I must always respect my elders, if I didn't, I'd get a slap on my face by my parents. As I grew up, I came to realize the true meaning of the phrase, â€Å"respect your elders,† and I agree fully with my mother's teachings. I not only respected my elders, but I respected everyone around me. When I had my children, I taught them the same way my parents taught me, on how to respect their elders, and why.I never had any problems teaching my children how to respect, not only their elders, but how to respect everyone. We need to keep up with the tradition of respect, because so many people are so ignorant with each other, I'd just turn away because I know if I stay and listen, I'll say something to these little devils for being so mean to anyone and everyone. My son, now has a son that is 11 years old, and if he is caught making fun of anyone, then he has his father to answer[pic] to, and is made to apologize to the person that he has made fun of, whether it be another child or a grownup.Respect is something that has slipped through the cracks of time, and I think it is time to bring it back into our youth. These young people today are so rude to everyone, not just their elders around them, that I'd like to smack them myself, and I don't even know them from Adam. It just makes me so mad to see how some of the elderly are treated today, and I don't know what to do about it, but is sure makes me sick. For our young children to respect anyone they have to be taught right from the start, when they are growing up.It's not something that can be taught after they are grown up, because they have never learned the meaning of the word respect. It so sad, that in today's society, you see some of the things that are going on with everybody, not only our elderly, but anyone around them. There is no respect in this world today and that's just so sad. I treat everyone with respect, even though I know they don't respect me most of the time, but that's OK, I feel better when I respect others, even if they don't. Created on: May 02, 2008 Our elders have gone through a lot in their lifetime.I think it is important to respect our elders because they have experienced life and gone through a lot more than we have. I think history has shown that we are a successful, rich country. I don't think we would have the freedom and the respect from other countries if it weren't for our elders and their sacrifice to get us where we are today. I respect my grandfather because he was captured and taken to a concentration camp during World War II. My grandfather escaped from a camp, ran into the woods and went into hiding for a year.My grandfather is one of the lucky Jews that survived because he had the will to live. Why shouldn't he be respected? I respect my parents because they are the ones that brought me in this world and have taken care of me until I was able to take care of myself. I personally have a lot of respect for my parents because they did a lot for me over the years. I wouldn't have the education without them. They got me where I am today and I am sure it wasn't easy[pic] for them. I believe they deserve thanks for everything they have done for me and thus deserve my respect.The idea of the importance of respecting our elders raised many questions in my mind. Do most even know what respect is? Wikipedia defines respect as taking into consideration the views and desires of others and incorporating it into your decisions and being truthful to people. Why shouldn't we respect anyone? I think everyone should be respected unless given a reason not to be. When you meet someone for the first time are you disrespectful? No. Why should you be? I think everyone deserves a chance and once you get to know the person you can decide based on your own values whether or not you should respect them.I have a lot of younger cous ins that respect me because I am older and know more about life than they do. I don't think elders should be singled out and immediately respected because they are older. Why shouldn't respect go both ways? I think my friends respect me because I respect them. I think it is important to understand what respect is and understand what your elders have gone through to get where we are today. I think everyone deserves the same amount of respect unless given a reason to be disrespected. Quotes: â€Å"In Western Civilization, our elders are books. â€Å"The Elders were closer to the Maker of All Things and should be deferred to whenever they made their will known. † 2 paragraphs The elderly have lived long lives. They are so important in our lives because of this. The longer that one has lived, the more of a life they have to share with others. The elderly have much to contribute to this world. Most already have contributed while others will soon be contributing their best as time goes by. Even the elderly are still learning. It has been said that you learn something new every day, and that is just why even the elderly are still learning.They have much wisdom to share with the world, even if they have just learned it themselves. Learning It really does not matter what your age is. Everyone every day is learning. We learn from both the young and from the old. The young are so precious, and they often inspire us even in the simplest ways. They really have not experienced much yet in the way of living, but they sure can bring up things that we have never even thought of before. They can teach us all sorts of behaviors and help us to change our attitudes in our lives.The elderly, however, are so important in our daily lives, because we can learn much from their actual experiences. They have lived long lives, and have experienced many things worth sharing with us that can help us to improve our daily lives. We can even learn things through the elderly that will h elp us to get along with others much easier, get over things more quickly, respect others, and even enjoy looking at things in a more positive manner. Trials The elderly are so important in our lives, because they have gone through many trials.The longer that anyone has lived, the more trials that they have gone through in their lives. It is hard to accept trials in our lives, but they do exist. The elderly are more than willing to share their past experiences with us. They are actually happy to do this. The elderly have learned where they may have gone wrong in life along with things that they are very proud of the choices that they have made. Spending time with the elderly is one of the best and most exciting things that you can do these days. They can help us with many aspects in our own lives.The elderly can even help us to avoid many trials in our lives through their many words of wisdom. Sharing Elderly people in our lives are so important, because they enjoy sharing with us. Elderly people sincerely enjoy sharing all sorts of things in their lives. As people age, sharing becomes more and more important to them. As you age, you realize that you have gone through numerous experiences of all kinds that are worthy of helping others to get through their experiences. As the elderly share more and more, they enjoy it more and more.It is always a great feeling to know that your simple words can be helping others. The elderly also have many items along with valuable treasures that they enjoy sharing. As they grow older, they no longer have the need for many things in their lives. They love having the opportunity of passing these precious things in their lives onto others and sharing their joy along with their stories. Loving The elderly people in our lives are so important to us, because they are very loving people. Elderly people are very loving, caring, and thankful people.As we age, we all learn to enjoy the better things in life. Better things, as in more im portant things and things that really matter. Elderly people normally grow more loving and caring as they age. They grow more thankful of even the simplest things. Elderly grow to appreciate life much more than anything. Elderly people are so precious and enjoyable. Many of the elderly are also quite funny. Look at the elderly people in your life, and listen to them. This will surely bring you a new healthy and positive look on life.

Saturday, September 28, 2019

Proposal Essay Example | Topics and Well Written Essays - 2000 words - 1

Proposal - Essay Example The proposed comprises of preliminary literature review as well that will be beneficial in creating fundamental framework before carrying out the research. Lastly, the research proposal includes methodology section that specifies selection of secondary, as well as primary research methodology that will be very effective in efficient acquisition of data. INTRODUCTION The focus on forming valuable associations with clients is not a fresh approach within the field of business. The growing competition in addition to lessening customer loyalty have created the need for applying innovative tools to facilitate businesses to do well in the competition and win customers’ loyalty by offering more modified products. Fast development within ‘information systems applications’ that allow business-client communication along with the boom of ‘internet technology’ have given companies with additional potential to manage increasing understanding obtained by clients alo ng with the varying nature of their requirements for particular products (Finnegan & Willcocks, p. 94, 2007). Whereas, the mainstream of companies attempt to apply CRM systems, they come across the upsetting reality of the large percentage of collapse within their CRM implementations. As a reply to the need of dealing with the issue of the high failure ratio of CRM ventures, various researchers have created a range of frameworks for CRM implementation. In this regard, the proposed research is an attempt to analyze different factors related to the process of CRM implementation. Research Objectives Before carrying out research, it is very imperative that the researcher ensures clarified understanding of aims and objectives, as it is an observation that vague objectives often result in unproductive outcomes, and thus, the research proposal will now include aims and objectives of the proposed research: Identify and examine various internal and external factors that play a determining ro le in ensuring success of CRM implementation Inspect the level of impact of identified factors in banking institutions in Saudi Arabia Investigate the impact of identified CRM implementation factors in the case study of a two banking organizations in Saudi Arabia Recommend strategies that may ensure successful implementation of CRM in banking institutions and organizations globally, and particularly, in the corporate society of Saudi Arabia Research Statement In this regard, the researcher will focus on the following research statement to fulfill the aims and objectives of the research: â€Å"To identify and investigate the implementation of CRM in Saudi Arabia, and evaluate different factors that ensures successful ERM implementation† LITERATURE REVIEW There is a common recognition among researchers about the classification of CRM constituents. CRM involves three key constituents, which are information technology, individuals, and business traditions. The involvement of ever y part differs in accordance with the level of CRM implementation. Technology means computing potential that let a business to gather, arrange, save, and utilize records regarding its customer. Technology is the facilitator for CRM systems to successfully attain their goals of collecting, categorizing, and saving important information on

Friday, September 27, 2019

Soc Of Develop Countries Essay Example | Topics and Well Written Essays - 500 words

Soc Of Develop Countries - Essay Example This highlights that the Hondurans have not realized a new engagement strategy as per the Obama’s undertaking. The Obama administration has called for the promotion of democracy and has clearly indicated that Coup is not an appropriate approach of resolving conflicts; however, the administration has not responded accordingly. The article observes that the US administration has adopted a silent position because of the fear of the growing authority in the Latin nations. This indicates the administration’s views are not justifiable. The secret of the people’s power in a situation of a revolution emanates with their ability to uniting for a common interest. A revolution may start with few individuals; however, if these individuals have ideologies that can attract other peoples to their side, they can easily establish a huge group with a strong command (Griffiths, 2011). This is affirmed by the fact that a leader may silence one or two protesters, but can hardly suppress millions of protesters who are determined to witness a change. Apparently, no personal skills or leadership tactics can survive such forces. Accordingly, focus is an imperative aspect that is attributable to the secret of the people’s authority during revolution. Indeed, people who has strong quest of changing a certain situation are likely to attain the same (Handelman, 2011). Political instabilities and poor governance that fails to uphold the concept of democracy are crucial factors, which may lead to suctioning of military interventions in the Third World politics (Handelman, 2011). An autonomy state reserves the authority of controlling its territory. However, in situations where a state fails to exercise appropriate control, global military intervention becomes essential. This is primarily promoted by a situation that present existence of persistent unsettled religious, racial or historical concerns of great magnitude. Importantly, military intervention may be necessary in a

Thursday, September 26, 2019

Pervious Studies about abnormal behavior ( sociology ) Assignment

Pervious Studies about abnormal behavior ( sociology ) - Assignment Example They are negatively distinguished from heterosexual homeless youth (Cochran, Stewart, Ginzler, & Cauce, 2002). The authors of the two research studies I chose, for this summary, have pointed out reasons why the topic of lesbian and gay youth’s reflection and challenges are areas of great importance. The author of the study on television programming says that there are very few lesbian and gay characters, especially positive role models, in television programming. Yet television is an important resource for lesbian and gay people to have vicarious experience and shape identity, beliefs and values, especially in the case where their own literal experience is limited. (Fisher, Hill, Grube, & Gruber, 2007) A consequence is that the lesbian/gay community is kept invisible, when there are insufficient models, and is undeservedly portrayed in stereotypically negative ways when the models are negative, reinforcing judgmental heterosexual stereotypes (Fisher, Hill, Grube, & Gruber, 2007). Another reason why the study is important is that there is very little research done on this specific topi c (Fisher, Hill, Grube, & Gruber, 2007), and so this study will be able to contribute to the field. The author of the other study, on homeless lesbian, bisexual, gay and transgendered youth, feels the topic is important because gay and lesbian adolescents, in general, are at increased risk for physical and mental problems (Cochran, Stewart, Ginzler, & Cauce, 2002). Studies indicate that between 11% and 35% of homeless youth are lesbian or gay. This led the authors of this study to suspect that being homeless and a member of a sexual minority would likely increase their risk (Cochran, Stewart, Ginzler, & Cauce, 2002). The challenges of surviving on the streets, on top of the challenging histories that lesbian and gay youth may already have, are enormous. This makes it a critical study. The first research article is, â€Å"Gay, Lesbian, and Bisexual Content on

Wednesday, September 25, 2019

Early warning scores Essay Example | Topics and Well Written Essays - 2000 words

Early warning scores - Essay Example Life of the patients would be at risk if the clinical staff fails to respond to the deterioration of cerebral or respiratory function and increased level of medical intervention, it may lead patients to cardio-respiratory arrest. Abnormal biochemical or physiological variables might lead to avoidable death if appropriate action in response of the above is not taken. Inappropriate care prior to admittance to a critical care unit can direct to more casualties. Due to the limitations of resources, numerous patients that can be treated and monitored in the high dependency units (HDUs) and intensive care units (ICUs) is limited. Therefore it is crucial to select the patients who might benefit from the critical care. The pre-ICU resuscitations might be reduced to an extent if the identification of medical in-patients is carried out at an early stage by the means of uncomplicated procedures bottomed on the physiological parameters (Bowler & Mann 2008, pp.1). For bedside evaluation, Early Wa rning System is a useful tool which is based on five of the physiological parameters: rate of pulse, rate of respiration, systolic blood, AVPU score and temperature. Modified Early Warning System is capable of finding deviation from normal blood pressure of patients and its urine output. To spot surgical patients who would gain benefit from intensive care has been demonstrated recently. No other scoring system which exists has been validated in patients who are admitted on an unselected medical take. The basic goals for this research were ensure the following. 1. To examine the capability of a EWS that is modified (MEWS) 2. To examine the patients that are at risk 3. To inspect the viability of MEWS as a selection device to activate premature evaluation and admittance to an ICU or HDU Effectiveness and Impact All the data of the emergency admissions that were admitted to Medical Admissions Unit was collected. This was done in the month of March and the patients who were admitted to Coronary Care, Medical HDU or ICU and the ones who were admitted again during the study were not observed. While performing routine duties the nursing staff gathered i data, after attaining formal training. Demographic facts, rate of pulse, rate of respiration, systolic blood, temperature and AVPU score (A for ‘alert’, V for responding to vocal stimuli’, P for ‘responding to pain’, U for ‘unconscious’) were evidenced on admittance. Pulse rate and blood pressure were calculated by machine (DINAMAP, Critikon) and also checked physically where suitable. The measurement of temperature was done orally (Temp?Plus II, IVAC). The rate of pulse was counted over sixty seconds. At the time of the measurement of blood pressure, the AVPU scores were scored according to most excellent response. Physiological parameters were collected by the nursing staff twice daily (once am and once pm) on a sheet of data collection for a up to five days. The two inv estigators (MK, CS) were responsible to check the completeness of data every day. The data which were collected was utilized to calculate a Modified Early Warning Score (MEWS), from prior experience it was decided to describe a MEWS of 5 or more as a ‘critical score’. During the admission the score that reached the highest was tagged as ‘Score Max’. HDU admission along with ICU admission was the primary end points. Moreover, the other points included the attendance of the cardiac arrest team at a cardio respiratory emergency and

Tuesday, September 24, 2019

Civil Rights Movement Around 1960s Essay Example | Topics and Well Written Essays - 500 words

Civil Rights Movement Around 1960s - Essay Example What appears to be beneficial to one segment of society is sentimental to another. It was depicted in the U.S. Supreme Court decision of Brown v. Board of Education of Topeka, Kansas (1954) ending racial segregation in public schools. The doctrine of ‘separate but equal’ was no longer adopted sweeping aside 88 years of sound judicial precedent. No doubt there was resistant expressed by politicians and one expressed his case by using his power of office to uphold the internal affairs of the Georgian state.Moreover, there were other resistance groups such as the Ku Klux Klan in Mississippi which tried to maneuver the cause of white college students volunteering in what was known the Mississippi Freedom Summer. These students traveled to Mississippi to stand the cause of blacks in casting their votes and teaching them their history. It turned out that despite the intensity faced and resistant encountered the cause contributed to the success of the Voting Rights Act of 1965. Other philosophers that have stood the test of time were Mahatma Gandhi who proved non-violence against war as the key to gaining peace and freedom for Indians. His conviction enabled different sects in India to march through cities. Likewise Martin Lurther King did not use violence in his fight for the black people in America. In August 28 of 1963 he led the largest civil rights demonstration in history with nearly 250,000 people in attendance delivering his famous speech of I have a Dream.

Monday, September 23, 2019

Discussion questions and participation questions...will load the rest Essay

Discussion questions and participation questions...will load the rest of participation questions - Essay Example The only risk that existed is associated with the value of the investment. Corporation can also issue commercial paper in the form of bonds to raise capital as well. Bonds are sold in lots of $1000 face value bonds that pay a predetermined coupon or interest rate. All corporations that are publicly traded in the United States is obligated to comply with the Sarbanes Oxley Act of 2002. Sarbanes Oxley (SOX) was created in order to protect investors and create greater accountability in order to raise investor confidence in the reliability of the financial markets. A provision that affected the way accounting firm perform business with companies is the prohibition of accounting doing both the audits and other types of business contracts with the same firm. Now the accounting audits are performed by independent auditors. A company can become delisted it fails to comply with the Sarbanes Oxley violation. For example a company that is caught cooking up the numbers could face severe penalties from the Security and Exchange Commission (SEC). Trademarks can add a lot of value to the corporation if they are properly marketed. The legal protection the trademark provides ensures that other firm cannot imitate their trademark names and other types of intellectual property. If another company or individual violates the trademark of a company the firm that is hurt can sue the person or corporation responsible for the trademark violation. Two companies that have been able to penetrate global marketplaces due to its trademark property are McDonald’s and Starbucks Cafà ©. It takes on the average 16 years and $800 million dollars to develop a new drug. Due to the high cost of developing prescription drugs is the reason why so many drugs are so expensive. Patents provide social justice to business for their investment. A patent creates a temporary monopoly for the holder of the patent. Companies can charge whatever price they please during the protected period due to the fact

Sunday, September 22, 2019

Independent research project Essay Example | Topics and Well Written Essays - 2750 words

Independent research project - Essay Example There are 41 languages represented in the school and the attainment of pupils on entry is very low compared with national levels, with many pupils speaking little or no English. In addition, the percentage of pupils who have learning difficulties is similar to the figures found nationally. The school offers a wide range of before- and after-school activities for pupils, their parents and the local community. The purpose of this study is to identify an area of development on attendance and punctuality of the school as they have problems with it. According to Ofsteds report dated 2004, the Dormers Wells Infants School, it contains school complaints where actions were not required. Following school representation, Ofsted decided to publish informations relating to complaints on September 1, 2006 where actions were required by Ofsted and the school. Even if there were several complaints, they did not require any action. This responsibility to give true and up to date information was changed in January 2009. The main concern of primary school teachers is the issue of pupils taking holiday during school time. The staff were confused as to when holiday time should be authorised and when it should not be authorised. In both authorities, different practices were followed. The ones interviewed believe that Circular 3/99 be rewritten, simplified and be more user friendly for better local clarification. In primary schools, everyday attendance is checked then at the end of school term, a certificate of full attendance is awarded. Teachers are also involved in visiting homes of pupils who got absent on the first day. Some teachers are confused about authorising unauthorised absence issue. All the staff did not believe that attendance should be a part of the work load agenda but they should be involved in registration process as part of their duty of care and pastoral support of pupils and parents. However, both heads and teachers worry that too little information was being shared by school and their local social services and health departments and other local services agencies (ex: Connexions, YOT providers), that has implication for Every Child Matters (Dfes, 2003). METHODOLOGY The method I used to gather data from parents regarding attendance and punctuality is give questionnaires to parents because I found this method more convenient. The significance of this method is that the researcher and respondent should not in any way have any personal involvement. They have to maintain a social distance. (Research Method p 2) Advantages of using questionnaires are: 1. Questionnaires are more objective because responses are gathered in a standardised way. 2. Informations are relatively quick to collect using a questionnaire but in some instances they can take a long time designing and analysing. 3. Information can be gathered from a large portion of a group. Returns from questionnaires are usually low and this is not often realised. But return rates can be improved if the questionnaire is delivered and responded to on time. Disadvantages of questionnaires: 1. Like the many evaluation methods, questionnaires are given after the event, so participants may forget some important issues. 2. Questionnaires a

Saturday, September 21, 2019

Effects of Computer Society Essay Example for Free

Effects of Computer Society Essay Traditionally, courses that deal with computers and society issues focus primarily on enumerating the various ways in which computers impact society. This is done by listing categories of topics such as privacy, computers in medicine, military uses of computers, etc. Classic cases of computer abuse or errant systems are typically described in detail, as a way of simply making students more aware of how computers affect society. These examples are meant to serve as warnings to future professionals, in the hopes that they will practice their profession with greater care. What is missing from these discussions, however, is  why  computers have the impact they do on society. What are the characteristics that are the root of this impact? Are there fundamental differences between this technology and others that have transformed our world in the past? The intent of developing a list of these characteristics is that it could lead to a better understanding of the nature of the social impact of computers. In this way, it might be possible to examine a new computer project at the time of its  design  (not, as is the usual case, a long time after the project has been implemented and disseminated) to determine its potential impacts as a social change agent. The characteristics given below are not necessarily unique to computer technology. However, in many instances computers have created situations that were previously impossible to accomplish (such as space flight), were essentially inconceivable until the technology was applied, or at least were very difficult to achieve without the aid of computer technology. Furthermore, even though other technologies may have had impacts similar to computers in many ways, computer technology has greatly amplified their effects to the point of entirely overshadowing any previous technologys impact. Finally, the term  computer technology  is meant to be inclusive of any device that is essentially controlled by a basic computer (CPU, program, etc. ). This would include, therefore, modern telephones, VCRs, microwave ovens, CAT scanners, supermarket scanners, and the like. The following are in no particular order. Also, some devices or examples are likely to fit into more than one of the categories below: (1) Ubiquity It is perhaps stating the obvious that computers appear to be everywhere today. Even when we dont encounter them directly in their various forms of modern convenience devices, such as digital watches, microwave ovens, VCRs, and the like, we generate transactions that are processed via computers without actively doing anything: the utility companies are recording our usage, the phone company records incoming calls, our answering machine might be recording a message while we are doing something else, someone is performing a credit check on us, etc. (2) Magnification Computers tend toward magnification in several different ways. First, the explosion of the availability of information is due in large part to the computers ability to generate, collect, and store an ever increasing amount of raw data. Since the ability to create and collect data is growing exponentially, so too is the generation of information that can be synthesized from this data. Second, the types of negative impacts a single error can have has grown enormously with computer technology. Finally, the number of people directly affected by a system error has also grown enormously, to where a single software system literally can affect millions directly. 3) Accessibility Access to information continues to increase at hard to believe speeds. Many information resources are available only in digital form, via, for instance, the Internet. As more information is converted to digital form (e. g. voice and video), the ability to duplicate and distribute such information increases enormously. Indeed, there are some forms of publishing that can exist only within the context of a computer system. The concept of hypertext and hypermedia (including audio and video), the ability to create non-linear accessibility to information, was conceived out of the ability to randomly access information via computers. Its increasing success easily shows how important information in a digital form has become already. (Oz, 1994). (5) Lack of Accountability It has become a popular complaint that it is getting more and more difficult to locate a human being who is willing to accept responsibility for an error made by a computerized system. While it is tempting to blame such problems on incompetent employees, in truth the problem may be a poor user interface, lack of training, or an error in the software, none of which can be solved by those providing the front-line service. Another difficulty is finding someone who will, indeed, fix an error in an account. It is often the case that service representatives are reluctant to accept the responsibility for making a necessary change. In addition, it can often be difficult to even find a human being to deal with a problem. Getting lost in a voice-mail system has become a modern urban legend. (Nissenbaum, 1994). (6) Temporality Computers have several effects on time and the timeliness of information. It seems that computer technology is to blame in large part for the speed p of modern society everything has to get done faster, be there sooner, be available immediately. Another form of temporality in computer systems is that information can be retained over long periods of time, even when they appear to have been destroyed (consider the classic case of Col. Oliver North). There is little reason that information should be entirely lost any more, even due to accident. And it is reasonable to suspect that every s crap of information generated today will be available virtually forever. Another temporal shift for which computers have been responsible is that people who work together do not necessarily have to do so at the same time. Finally, services and information are more frequently available on a 24-hour basis. This allows people to request a service or seek information when it fits their schedule, rather than when it fits the service providers schedule. (7) Spatiality Computers have done more to shorten distances than any previous technology, even the supersonic jet. It is possible to send large amounts of data, messages, video, etc. virtually anywhere in the world via networks such as Internet. Long distance learning, using information databases or video feeds of courses via satellite, is a reality for a growing portion of our modern society. We can now even be on the move when we talk with someone on the phone, or receive a fax. (8) Surveillability Is there any doubt that computers have made surveillance easier than at any time in history? In addition to the usual surveillance equipment such as cameras and microphones, transactional data is increasingly being collected for virtually all types of transactions, even cash purchases and the acquisition of services. There has even been discussion by the government of using a universal health card, which is seen by many as the first step toward finalizing the move (begun with the co-opting of the social security number) in the US toward a national identification card. (9) Shifting of Relationships/Changes in Intercommunication Protocols One of the more difficult characteristics to track is how computer technology has changed communication between people and groups of people. In particular, the use of email has been shown to eliminate a lot of the usual visual and verbal cues we often use in communicating with one another (whch can be viewed as both an advantage and as a disadvantage). In addition to removing such cues, computer-mediated communications mask attributes such as race, gender, age, or physical disability, in addition, perhaps, to the persons social or management status within an organization. (Grudin, 1994; Perrole, 1987). (10) Illusion of Precision It is not difficult to make many (perhaps even most) people who are not in the computer field believe that any numeric result generated by a computer is correct. Those not well versed in the hardware of computers have little understanding of the fact that numbers must be converted back and forth between decimal and binary forms, or that there is a limitation on the accuracy of numbers due to memory constraints. As a result, they willingly accept values generated by a computer as infinitely accurate. (Liffick, 1985). Conclusion The characteristics described above are factors in the social impact of computer technology. For most there is at least anecdotal evidence of their existence (with seemingly countless examples). For some, there is also experimental evidence. It has finally become widely accepted that technology is not value neutral, as originally thought. By examining this list and using it as a set of landmarks for evaluating new systems, it may be possible to better anticipate the social impact of new systems, prior to their dissemination.

Friday, September 20, 2019

Effect of Migration on the Economy

Effect of Migration on the Economy Volume of migration varies with the difficulty of surmounting difficulties. Greater the obstacles, lesser the volume of migration. This statement is applicable in the local context as well. As Rodrigues form part of the Mauritius, no major obstacles have been found out. The main obstacle which was the cost of moving and living was solved by taking a loan and borrowing from friends and relatives. Hence the volume of migration was quite high due to no major obstacles and the ability of Rodriguans to surmount the remaining minor obstacles. Volume of migration varies with fluctuations in the economy. This is not really the case in Mauritius. The decision of migration is not much influenced by the economic condition in Mauritius. Most of them won’t consider the economic problems in Mauritius before migrating. According to them Mauritius has more employment opportunities then Rodrigues even times of economic depression. Both rate and volume of migration tend to increase with time. Lee’s findings are applicable in the local context as indeed the volume has increased with time. The process of migration from Rodrigues to Mauritius is quite smooth and does not involve long procedures. It is free of major obstacles and short trip of five hours. However, we are not sure if migration of Rodriguans to Mauritius will increase in the future. Major developments will be occurring in Rodrigues as stated recently by the Minister of Finance and also by the new government. Nevertheless, it depends how far promises will be delivered. If the aim of making Rodrigues a developed island is achieved, then migration will more probably decrease with time as during the survey, most of them said that they do want to return to Rodrigues one day if ever there will be employment opportunities available there. People who have migrated once tend to migrate again. This has neutral relevance in the local context as the answers gained were mixed. 49% of Rodriguans clearly refused to migrate migrate as they are used to Mauritius, also they are in the same Republic. The remaining persons were willing to migrate again. Streams of migration Migration tends to take place largely with in well-defined streams, that is from rural regions to towns and then towards major cities, implying migration occurs in stages instead of one long move. This is partly true. Some Rodriguans lived in small and under developed places when they first migrated to Mauritius, examples are Roche Bois, Baie du Tombeau but are now residing in more developed regions where there are more facilities like Reduit, Beau Bassin/Rose Hill, and Long Mountain. Also, when asked, the majority of them said that if ever they get the chance to migrate to another country, they would do so. However, the above statement is partly wrong as many Rodriguans are still living in the same place where they were living when they first migrated. This doesn’t always happen as most of them don’t have the means to look for houses in developed regions. Lee’s hypothesis depends whether they have the means to move towards other regions or cities. A counter-stream develops for every major migration stream. Efficiency of streams tends to be high if the major factors behind the development of the stream are push factors at the place of origin. Efficiency of streams and counter streams tend to be low if the origin and destination areas share similar characteristics. Rodrigues and Mauritius have huge differences in terms of economic conditions and facilities. Hence, efficiency of streams and counter streams tend to be high. Greater intervening obstacles mean more efficient migration streams. Migrants overcome several intervening obstacles under compelling circumstances. Hence, such migration is taken seriously. Rodriguans who had financial issues and borrowed money from their surroundings can’t return to Rodrigues without being successful as they would be embarrassed in front of their families and friends. Efficiency of migration streams varies with economic conditions. The decision of migration is not much influenced by the economic condition in Mauritius. Most of them won’t consider the economic problems in Mauritius before migrating. According to them Mauritius has more employment opportunities then Rodrigues even times of economic depression. Characteristics of migration Migration is selective; high quality migrants tend to be selected positively. This statement is not applicable in the local context as most migrants are of low calibre and there is no selective selection as such. Most of them are employed in the secondary sector where there is no need of being a high quality migrant while others who work in the tertiary sector may be required to follow some courses or training in Mauritius itself. Any Rodriguan who is willing to work and have the financial means to travel to Mauritius, followed by solved accommodation issues can come to Mauritius. Migrants responding mainly to pull factors at destination tend to be positively selective. Their reason of moving is not because of compelling situations at the rural area but due to better opportunities at the urban destination. Migrants who respond mainly to the push factors at the rural area tend to be negatively selected as they are mainly uneducated and unskilled people, having failed economically and socially. Migrants from Rodrigues with even low literacy level are positively selected, they work in the secondary sector and some work in the primary sector of Mauritius while others may be required to follow some training to work in the tertiary sector. Rodriguans who migrate to Mauritius are not necessarily those who have failed economically and socially as they may simply want to migrate to improve their earnings. When all migrants are considered together, selection for migration tends to be bimodal, some are responding to push factors while some are responding to pull factors. It must be noted that a high proportion of migrants respond mainly to the push factors, especially people with low literacy levels. Increasing intervening obstacles lead to increased positive selection as the weak and incapable migrants are wiped out. Migration is age specific as propensity to migrate is higher during certain stages of the life cycle, especially for young people of working age. This is highly accurate in the local context as it has been notes that people aged between 25-59 years old are more likely to migrate; these are people of working age. The characteristics of migrants are in between the characteristics of the origin population and of the destination population. As Rodrigues form part of Mauritius, we can note that Rodriguans are quite similar to Mauritians in terms of their way of talking, living, culture and norms. Conclusion It can be noted that migration is a function of the interplay of several push and pull factors, implying that there should be a cause for leaving Rodrigues as well as an attraction for Mauritius. When these two conditions are fulfilled, only then movement of Rodriguans will be possible. It can be said that the research findings substantiate considerably the main characteristics of the Lee Push Pull Migration theory discussed in Chapter Two Literature Review. Hence, it can be concluded that the above evaluation offer a satisfactory explanation for the migration behaviour of Rodriguans to Mauritius.

Thursday, September 19, 2019

The Civil Rights Movement: We Can All Live in Peace :: Black struggle for civil rights in America

What is the key to understanding? Is it knowing what our predecessors were thinking? Or is simply just trying to put ourselves in their place. Whatever the case may be, understanding our history is vital in the progression of civilization. In an era when color was everything, understanding our history is what makes life in America today-so beautiful.  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  During the time of the Civil Rights Movement, the blacks wanted to be free, but the whites wanted to suppress them. The whites were willing to go to any lengths to campaign their ideas of white supremacy. From research it can be learned, that from that movement, to some - it was more than a movement, it was a war for freedom. â€Å" I lived in a time when the white man was our ruler, but he could not suppress me any longer. I refused to get up for that white man, he and I were not seen as equals from societies eyes, but god gave us both red blood in our veins.† (Rosa Parks: Autobiography pg. 23) Rosa Parks was just one of the many powerful spirits that lit the way for many to freedom. Dr. Martin Luther King Jr. was probably the most influential during this time period. He touched people of all kinds. Blacks, whites, and people of all races were inspired by the way King could move his audiences. Even John F. Kennedy was seen walking down the street with King listening to a personal sermon. Although Kennedy was only president for a little over one-thousand days before he was assassinated, perhaps the most important of his achievements was his support for civil rights and his effort to move the United States away from racial segregation and toward freedom and equal rights for all Americans. Kennedy and King had the same â€Å"dream†.   Ã‚  Ã‚  Ã‚  Ã‚   In an era when color was everything, understanding our history is what makes life in America today-so beautiful. The communication between races was done through many different attempts by both parties. Protests, secret coding, public seminars, speeches, and using the goodness of one’s heart, were just some of the many ways races attempted to communicate. The nation has grown and learned from the men and women that fought for equal rights, and it shows. Interracial couples are getting married each and every day. Blacks and Whites may sit together on the bus in the front or the back.

Wednesday, September 18, 2019

We Must Save the Great White Shark from Extinction Essay -- Explorator

We Must Save the Great White Shark from Extinction The Great White Shark, immortalized by the Hollywood film Jaws, is at the midst of an international controversy. The shark, despite its notoriety, is in danger of extinction. A conflict over the fate of these sharks has existed for decades, but with recent attacks the debate has come to the forefront. The environmental conflict over the Great White Shark has yet to reach a conclusion, as many factors exist that hinder resolution possibilities. The purpose of this paper is to provide background information on the debate in an attempt to understand why consensus has so far been unattainable. This paper provides basic information including subsequent legislation, stakeholders, factors to consider, and proposed solutions. By understanding the context of this conflict, possible methods that could assist in resolving the debate may be determined and recommended. History Great White Sharks can be found virtually anywhere in the world but they tend to prefer temperate waters off the coasts of Africa, Australia, New Zealand, Japan, the California and the eastern U.S., and Mexico. In its natural environment, this shark has only one enemy, the Orca whale. However, the shark's most threatening predator is humans. Great White Sharks have a monstrous reputation with society due to the sensationalized media that accompanies them. Sharks are killed for numerous reasons through commercial fishing, sport fishing, or for body parts such as fins. An estimated seventy million sharks are killed annually due to trade and many more sharks are also killed accidentally in fishermen's nets (Shark Conservation Through Legislation, 2001, http). Trade for fins, teeth, and jaws also result in thousand... ...01). [Online]. <http://www.geocities.com/RainForest/Vines/1603/SHARKS.HTML> [2001, Oct. 29]. Shark Finning Prohibited in US Waters. (2001). Project AWARE. [Online]. <http://www.padi.com/aware/get_involved/protsharks/news/04030 1_billclinton/> [2001, Oct. 29]. Stevens, John and Bruce, Barry. White Sharks. (1999). CSIRO Marine Research. [Online]. <http://www.marine.csiro.au/LeafletsFolder/whshark.html> [2001, Oct. 29]. The Great White Shark. (2001). [Online]. <http://www.peacegearworld.com/great_white_shark/> [2001, Oct. 29]. Valette, Kristin. Sharks: The Hunters Hunted. (2001). Project AWARE. [Online]. <http://www.padi.com/aware/get_involved/protsharks.asp> [2001, Oct. 29]. Year of Shark 'Hype", Says Expert. (2001). CNN. [Online]. <http://www.cnn.com/2001/US/09/03/shark.perspective/index.htm l> [2001, Nov. 11].

Tuesday, September 17, 2019

Candide :: essays research papers

Candide is a humorous, far-fetched tale by Voltaire satirizing the optimism accepted by the philosophers of the Age of Enlightenment. Candide looks for true happiness, and his ultimate acceptance of life’s disappointments. He grew up in the Castle of Westphalia and was taught by the greatest philosopher of the province and the whole world, Dr. Pangloss. Dr. Pangloss taught Candide that everything that happens is for the best. Candide is exiled from the castle because of his love for the Baron’s daughter, Cunegonde. He then sets out to different places in the hope of finding her and achieving total happiness. Candide knew thought he knew that everything happened for the best because the greatest philosopher taught him that, but everyone around him did not accept that theory. Voltaire refused to believe that what happens is always for the best. Voltaire shows the primary concerns during the period of Enlightenment, but also criticizes certain aspects of the movement. He attacks the idea that good prevails over evil because he believes that human beings perpetrate evil. He laughs at Candide for believing all the corruption that is occurring and religious intolerance. Eldorado a town worshipped by one god, and "all were priests" was not explainable to Candide. The townspeople did not pray because they had all they wanted, but they did sing hymns of thanks. Candide learned that neither law courts nor prisons were needed for these happy, law-abiding people. He was surprised that a society lived by worshipping one god, and everyone abided by the laws. The Eldorado people related to God just by being thankful for everything that they had. A King or leader did not dictate that they must follow a certain religion, or pray to God, but yet they still believed in God. For example, the states of the Holy Roman Empire were always being told by Kings, and leaders which religion they must practice, and tried to ban different religions that they didn’t believe in. Candide was amazed by how generous people were to invite them into there house to eat, and took care of Cacambo, and him. To Voltaire this was an ideal world, but it seemed as if it w as to perfect and he knew that it could never exist. After Candide and Pangloss reunited, and traveled to Lisbon a earthquake occurred.

Monday, September 16, 2019

Employee Satisfaction and Customer Satisfaction Essay

This thesis will be based on my current and previous practical experience combined with the theoretical basis that I have acquired through the modules on Academy business school. I have 8 years of management experience in retail, but in the last 3 years being employed as a personal assistant for my son who was born with a physical disability. 1 October 2012 I have been employed part-time as a sales assistant in the newly opened shoe Tops, located in Aalborg Mall. My point of view in this project will be from the perspective of the owner / management since my prerequisites for this are realistic and that in the future I have ambitions again to get a job at this level. Presentation of TOPS in Aalborg Shopping Eurosko a purchasing cooperative consisting of independent skohandlere working together on purchasing and marketing. These skohandlerer operated under the name TOPS. This cooperation is intended to give members a better overall economy to meet the increasing competition in the retail industry. The shops sells private labels and various brands of Danish suppliers. TOPS products are designed for the average consumer, and the target audience is the whole family. Product labels within private labels are as follows: Ralf Boston, Taxi, Adi, Mary B and Between. The new Tops store in Aalborg shopping center is located in the new extension which has the name Nygade (pink street). This street connects the input A (main entrance at the grocery store) and input B (input opposite Steak Jensen / Nibevej). Shoe store TOPS is funded by Thorkild Hansen, who every day is trade able boss in Aars. It is his daughter Camilla Hansen, store manager / owner of the new store. They both have a history from the hardware store industry. In the shop there is employed a sales manager, a full-time sales assistant and one part-time sales assistant. You are aware that you have to have some hourly paid sales assistants to cover crooked hours. However, one would first look for the urgent need before hiring more. The store is located in North Jutland most attractive retail area in the city south of Aalborg. The competition here is tremendous, from German Deichmann to skokà ¦derne Skoringen and PAW SHOES. Grocery store is also a major competitor, while the overall industry slippage, as retailers fierce competition is to blame in. The hard struggle with the center of Aalborg has been going on ever since opening in 1997, and it’s just a matter of time before one can proclaim City South and Aalborg Shopping Center as the victor. City Southern and Aalborg Shopping Center is marketplace for all over Gauteng. The clients who come to Aalborg Mall comes with the purpose to spend money. Unlike customers in the city center, where there are many â€Å"shoppers†. Problem Argumentation In a store like TOPS in Aalborg shopping center, there are many challenges for Camilla Hansen. Problem of the project will be based on one of the issues that are most central to the management, namely the motivation of the staff. Why is it such an important issue? One of the things that can explain the motivation question is the aforementioned competition as TOPS face. Is the sales staff not motivated to provide the best service when they meet customers, customers’ needs are met in one of the competing shoe stores. There are also other elements such as indirect challenge my question about motivation. These I will elaborate on below. The increasing competition in the retail and policies have been elements in the environment that have helped to pave the way for the long opening hours. This development is currently further escalated with the abolition of the Shops Act 1 October 2012. Another challenge is the union HP, which puts pressure on employers to their employees come to work under some decent conditions, with regard to working hours. At the same time include the cost structure in the retail industry, where labor costs and rent are the greatest. Since the wage cost is the only one who in a short time can be changed, it is here, it is very focused. Rationalisation and maximum benefits of the employees are daily challenge in retail. It obviously has not done better after the financial crisis in 2008. The demand for goods has fallen / stagnated and the demand there is, is not the same as before. At the same time discount concepts in many cases prospered due to the crisis. In the wake of these above mentioned elements have TOPS a need for the core of employees who are employed must be highly effective. Performance would with store personnel must be high, even in the long run. Therefore, it is important to achieve a sustained high staff motivation in TOPS. I therefore think it appropriate to make visible how the job should be structured so as to achieve a high intrinsic motivation of the employees. However, one must create a culture that supports the motivation. Succeeded this, then the employees will eventually provide the same high level. Problem Formulation It is a challenge for management that structures the right job design for the team in the shop, so to create a sustained high level of motivation. This will form the basis for the desired high level of performance. I therefore do the following: Explain the job characteristics model, in relation to the employees of Tops in Aalborg Mall. Provide an analysis of the elements to create a high MPS. Find out what basic assumptions that support a high MPS. Make suggestions for how to achieve sustained high MPS. The method Science Theoretical approach The knowledge / theory which I create in the project is based on social constructionism. My new preconception will therefore be formed by the auto poetry system for which the employee is in TOPS. The way in which the theory is formed on the deductive because my curiosity is based on a theoretical model and problem formulation. The method is the hermeneutical spiral, as my practical / theoretical presuppositions will be further developed through a qualitative method (depth interviews). This illustrates thanks to my depth interviews. First I ask my questions, then I ask detailed questions to their answers. This forms a new pre-understanding, which in turn contributes to a deeper level of understanding. This truth can be characterized as being causal explanatory. This provides functional explanations are operationalized through the quantitative method (questionnaire). Thus, I see the questionnaire as a hypothetical method. The hermeneutic process are processed through circular thinking. This theoretical system finally my deeper level of understanding will be provided by exploring patterns of attitudes of the individuals in TOPS. My interest is to see how employees and management mutually influence each other. This I find out each actor’s share in relation to the questions that my problem formulation contains. Selection of theory: Motivation Theory Motivation Theory is a very broad theoretical area. The models describe the area very differently from simple to concrete and detailed. Overall divided motivation theory for the following two areas: Process Theories Content Theories Process theories are based on the differences that applies to the employee’s behavior. The theory describes elements to be addressed in order to get employees to acquire a certain behavior. Content theory concentrates on the needs of the employee and that the behavior is the same from person to person. Need fulfillment creates the motivation that causes the employee to perform a particular behavior (Major intrinsic motivation = better sales performance). I have decided that my topic motivation must be based on job characteristics model, which is made by Hackman and Oldham. I do so because it is necessary to take into account the differences in employee behavior. Otherwise, I would not in practice distinguish between kinds of different factors that motivate employees to TOPS. So they just had the same external and internal work environment, to be equally motivated in their work. The theory will form the basis for the solution of the projects’ problem. At the same time it will be my starting point, to account for the motivation of employees through job design. Job characteristics model is to provide a common understanding of my explanation of how to design the job so that employees acquire the particular behavior (Major intrinsic motivation = better sales performance). Hackman and Oldham job characteristics model This thesis will be based on the version of the book â€Å"Motivation† is written by Helle Hein. This issue compared to the textbook is that there are some minor differences in how the moderators are defined. The model is based on some core job characteristics that form the basis for the ideal job design. Problem definition Question 1 deals with the exposition of the model in relation to the employees of TOPS. Presentation of the model will be done through in-depth interviews with employees. Based on depth interviews I will make a questionnaire to determine the factors that contribute to give a high motivation potential score (question 2). Model moderators will also be involved, as there are some providers elements that affect the fact that not all people react similarly to the job design. There are some barriers as a result of the fact that you do not get the best result, although job design is ideal. The moderators will also be explained through depth interviews (question 1). The model also contains the element of the critical psychological states, which will not be included in my project. This has no direct connection to my problem statement. I assume that when the optimal job design is achieved, as well as fulfillment of the moderators, so it will have a positive outcome (high motivation = good sales performance). Criticism of Hackman and Oldham In the book, motivation is a few points on which job characteristics model are criticized. I will only highlight the criticism points Helle Hein mentions in her book that influence in my project. The factors which constitute the core job characteristics are difficult to understand and distinguish between, for those who have to deal with any questions. This is one reason why I choose depth interview as my method of data collection. Respondent may help to understand the issues, which helps to strengthen the information collected. The theory does not affect factor of social relations. Therefore, I believe that the model has a major weakness in this area. The relationship to one’s colleagues is very important in a store like TOPS, where there are not many employees. It is important to feel like part of the community when you show up at work. Failure to do so, and you feel that is a bad mood, you will naturally seek new challenges. This will lead to an ideal job design does not work. Hertzberg theory takes high of social relations, and would have been better in this area. This theory, I squint a little in my statement (question 1). In my hypothesis, I touch on the concept of MPS. Helle Hein questioning whether one using a formula and theory can design the best possible job design to an employee. It is one of the concepts used in my project. Therefore, the same criticisms apply here. Hackman and Oldham theory is developed at the beginning of industrialization in the United States until the 1970s when the authors formulated the theory. As it developed it was the starting point for the theory not the retail industry, which means that in some cases, it will not always fit completely with the fact that I daily find myself in. Cultural Theory Theory scope of the concept of culture has many approaches. Here there are for example Hofstede. This theorist is based on civic culture. He believes that an organization’s culture is created on the basis of, for example, the country or region in which it is located in. The theory here is based on a number of opposing elements that help to characterize the culture. An example of this could be that the culture of TOPS will bear the mark of masculinity rather than the feminine. This is because you are very sales and performance oriented. Another theorists is Schein. This theory is built into a funnel model which is divided into 3 layers. The top are artifacts, which is a description of the physical conditions in which an outside person can see with the naked eye. The next layer is the values. This layer describes the employee proved doing to emphasize culture both internally and external. The last layer is called as basic assumptions, the conduct which they unconsciously without even thinking about it. The basic assumption being made by the leader. A third theory is the Deal and Kennedy’s cultural model. This theory is based on the market to which the organization finds itself in. The theory describes two dimensions, each with their opposing extremes. These being high risk / low risk or timely feedback / slow feedback. Here are TOPS in the dimension which is characterized by low risk and rapid feedback. In trade with each customer’s risk low if it failed. At the same time you get rapid feedback on sales because you can constantly follow it. Overall, it is appropriate to use the Deal and Kennedy to describe culture as the retail industry is very market specific. This will also be my approach. But to describe the culture internally, I will build on Schein funnel model, because this model is more up rational. At the same time, the shop is starting, and I therefore believe that it is the store manager, who through her actions and attitudes create culture. Furthermore, it is also the one who owns the shop and is the pioneer. In a pioneering company, it is usually the owner’s attitudes and opinions that characterize the corporate culture.

Sunday, September 15, 2019

Starbucks/Itunes Partnership

Final Project Karen Cotts South University Abstract When it comes to IT Information Planning, it is very import to lay out the details of each area of this business. The IT Information Planning stage is when to decide on the IT Infrastructure which encompasses the technology and equipment required from the front end to the backend of the system. In this case, that will involve beginning with the customer as they enter a Starbucks store, browse the Apple iTunes music store, browse, and purchase and then download music back to the customers’ device. This will include the technology and equipment required from the customer, Starbucks and iTunes to make the transactions all complete. Along with the planning for the successful completion it is necessary to plan for when failures will occur. This includes planning for the points in the process where the failure(s) can occur and what resolution for each failure will be, along with who will be responsible for the resolution. It is important to understand what the long term effects of the failure could mean to the business. One very good way to document this information is with an Information Flow Diagram. This will depict the resources involved in the flow of information throughout the process. Mobile Technology is expanding daily. It seems to be one of the fastest growing kinds of technologies in the news today. With the advancements in Personal Area Networks (PAN) and Wireless Access Protocols (WPA) mobile devices of today can be developed that are more secure than ever. They can be more accessible than ever before and provide faster and more accurate data transfer. The uses for the mobile devices have begun to expand into more and more areas of daily life. The iPhone mobile phone developed by Apple, Inc. s one of the most popular and bestselling mobile phones on the market today. In order for the iPhone to be at the head of the industry several of the most important technological features are required. The protocol for connecting wirelessly to access points must be of the highest quality. The security of the connection between access points must be the best it possibly can be. And finally, the security from the device itself must be effective to safeguard any monetary transactions and data. Information Flow (Part I) ITunes has made it very easy to log on and create an account with them. Creating an account is free. All you need to do is log on to http://www. itunes. com . There is a button you can click on to log-in and another you can click on to register. Click on the button to register. You will need to enter your email address, First and Last Name, Billing Address and Credit Card Information. Your email address will be used if ITunes needs to contact you about your account for any reason. Your Name and Address, along with your Credit Card information will be used to bill for any items you purchase from the ITunes store. Using banking services for micropayments is very expensive. ITunes is able to avoid the high cost because of the volume of business they conduct. They are able to negotiate a transaction fee with the credit card issuers and banks that cost them very little. Figure 1. 1 is the Information Flow Diagram which will show the process for registering with iTunes and then ordering music for downloading. Customer accesses iTunes store online to purchase music. Customer clicks on Registration Button, and then enters Registration Information. iTunes verifies Credit Card information from Bank. Sends Customer confirmation. Bank verifies Credit Card information for iTunes. Customer searches for item(s) to purchase. Click buy, confirm. iTunes sends payment information to customers’ bank. Once confirmation is received the download process is initiated. Bank deducts payment amount from customer account and sends it to iTunes account. Music is downloaded to Customer. iTunes retrieves the correct music from the database. Database of music stored in . mp3 format ISP ISP ISP ISP ISP ISP ISP I = Internet Service Provider Figure 1. 1 Information Flow Diagram Customer accesses iTunes store online to purchase music. Customer clicks on Registration Button, and then enters Registration Information. Tunes verifies Credit Card information from Bank. Sends Customer confirmation. Bank verifies Credit Card information for iTunes. Customer searches for item(s) to purchase. Click buy, confirm. iTunes sends payment information to customers’ bank. Once confirmation is received the download process is initiated. Bank deducts payment amount from customer account and sends it to iTunes account. Music is downloaded to Customer. iTunes retrieves the correct music from the database. Database of music stored in . mp3 format ISP ISP ISP ISP ISP ISP ISP I = Internet Service Provider Figure 1. 1 Information Flow Diagram After purchasing music for download from ITunes, sometimes the download can be interrupted or will fail for various reasons. These download instructions are directly from the http://support. apple. com/kb/ht1725 website: Restart the download with the following steps. Resuming downloads from a computer 1. Open iTunes. 2. Choose Store > Check for Available Downloads. 3. Enter your account name and password. 4. Click the â€Å"Check Downloads† button. 5. Click the Resume or Resume All button, or the resume arrow to resume the download. You can manually resume the download on your device with the following steps. Resuming downloads from an iOS device 1. From the Home screen, tap the iTunes icon. 2. For iPhone/iPod touch, tap More > Downloads. For iPad, tap Downloads. 3. Enter your account name and password. 4. Click the â€Å"OK† button. 5. Click the Resume, Resume All, or button to start the download. Business Use Case (Part II) Beginning on October 2nd, 2007, Apple and Starbucks began their music partnership. This partnership involved Starbucks supplying the T-Mobile Hotspot Wi-Fi network to its customers as it already had been doing. This network allows customers at participating Starbucks to automatically connect to the iTunes Wi-Fi Music Store where they can browse, search and preview millions of songs available on iTunes. Customers wishing to participate would need to bring their iPod ® touch, iPhoneâ„ ¢, PC or Mac ® with them to Starbucks. The customers have the ability to just sit and listen freely to music. If they find a song or an album they are interested in purchasing they can easily buy and download the items directly to their device. Both the Apple Corporation and Starbucks benefit from this opportunity in more than one way. Because both corporations have excellent reputations, forming a partnership makes good business sense. Starbucks Coffee Company was founded in 1971 and is committed to ethically sourcing and roasting the highest quality Arabica coffee in the world. (Starbucks) The idea of offering the extra perks that iTunes offers in a social setting where people gather with friends is a wonderful concept. Starbucks customers that may not formerly have used iTunes might become customers because of the free access to the trial of iTunes previews and features. This would increase iTunes customer base and sales revenue. This would also increase the number of customers returning to Starbucks for the purpose of iTunes usage. ITunes users that had not previously frequented a Starbucks might start to, for the benefit of iTunes access. And they might bring their friends along. This in turn would increase Starbucks profits. In October, 2007, Starbucks and iTunes offered ‘Song of the Day’, allowing customers to download a handpicked song every day for a month. Six million songs were downloaded. Realizing the huge potential with an audience hungry to discover new music and entertainment content, Starbucks and iTunes worked together to create an ongoing version of the program. In April, 2008 Starbucks announced a new program with iTunes called ‘Pick of the Week’. The program offered coffeehouse customers a complimentary new music and music videos each week. Each Tuesday Starbucks 7,000 US based stores would stock a download card redeemable on the iTunes Store (www. itunes. com). The available music or video of the week was hand-picked by the Starbucks Entertainment team and iTunes. Starbucks) As of August, 2011 new offering from the partnership between Apple and Starbucks allows customers to now get paid apps free at the coffee chain. Physical cards are available with redeemable codes printed on them. This offering is a way for Apple to offer customers who normally only download free apps, a chance to try out some of the paid apps for free. If Apple can impress c ustomers enough with the quality of the paid apps, they have the opportunity of turning some of them into customers who buy apps in the future. (Etherington). The Business Use Case diagram in Figure 2. shows the interaction at Starbucks from the customers’ point of view. The Starbucks and customer interaction is a physical one. Then there is the customer interaction with iTunes. Starbucks Cafe Starbucks Cafe ITunes Music Store ITunes Music Store Search items Search items Enjoys Starbucks refreshments while browsing iTunes Enjoys Starbucks refreshments while browsing iTunes Browse items Browse items Starbucks/iTunes Customers Starbucks/iTunes Customers View recommended items View recommended items Customer authentication Customer authentication Add to shopping cart Add to shopping cart Download to customer Download to customer Payment Processing Payment Processing Add to wish list Add to wish list Figure 2. 1 Business Use Case Diagram- Apple and Starbucks IT Information Planning (Part III) The IT Information Planning stage is a very important one for a business in terms of how successful they will be. The planning that goes into the infrastructure of a company can have a long term effect on the bottom line. If the backbone of the IT structure isn’t built soundly, with adequate flexibility for growth and adaptability, it can affect the way the system can be built upon for years to come. Apple/iTunes Technology Infrastructure The Apple/iTunes music store is a widely popular music and video distribution service. In general, owners of iPods, iPads and computers can download music after purchasing the item from the iTunes store. The music is in an MP3 format. ITunes itself is a browser, but only for the Apple iTunes Music Store. Web browsers such as Microsoft Internet Explorer and Firefox are excluded from access. The only authorized way to transfer media files to the iPod is by use of the iTunes program. ITunes also serves as a media player for audio, video (MP3/MP4 variants) and Internet radio stations. Starbucks Infrastructure Starbucks coffee house is where the customer will come to enjoy refreshments and listen to music either with or without friends. With an iPod, iPhone or a PC, the customer will be able to connect wirelessly to the Apple iTunes store. Starbucks has been using the Wi-Fi network from T-Mobile to service all of its hotspots. This was prior to entering into the partnership with Apple/iTunes. That was not changed when the partnership began. This is an important piece of information which must be included in the Information Flow Diagram. Information Flow Diagram As can be seen from the Information Flow Diagram in Figure 3. 1 different pieces of information are required at various steps in the flow to make a transaction possible. In this simplified example, a customer enters a Starbucks store. Upon entering they connect to the T-Mobile Wi-Fi hotspot that Starbucks currently has a contract with to provide their wireless internet connection. Next the customers device will be populated with a list of the 10 most recently played songs in the cafe. This information is kept updated on a continuous loop by iTunes. Every time a new song is played the recently played playlist is updated. The customer can then request to preview a song from the list. This long is retrieved from the iTunes MP3. db and returned for preview. If the customer chooses to they can then select the song for download. At that point the song is downloaded to the customers’ device and their account is charged a fee for the transaction. There are several points in the process where a failure in the transaction could occur. It is important to plan ahead for the possible fail points to plan for prevention if possible, correction if necessary and damage control. The first point of failure is if there is a problem with the connection between the users device to the T-Mobile hotspot. Unless it is a problem within the users’ device, Starbucks would be the first line of customer assistance to try to troubleshoot the problem. If it is a broader issue and a problem has occurred with the access point it would be up to T-Mobile to correct the cause of the problem. Another possible failure point that would be of key importance is the download to the customers’ device. If the download is interrupted it can be restarted in several ways. If the problem is with one of the physical storage units iTunes would be responsible to have a backup plan to repair/replace the database or other piece of equipment. T-Mobile Wi-Fi Access point T-Mobile Wi-Fi Access point Starbucks Cafe Starbucks Cafe iTunes Music Distribution iTunes Music Distribution Connect to T-Mobile Wi-Fi hotspot Connect to T-Mobile Wi-Fi hotspot Automatically plays songs at Starbucks and updates the playlist of the last 10 songs played. Automatically plays songs at Starbucks and updates the playlist of the last 10 songs played. Retrieves and plays songs in Cafe from MP3. b Retrieves and plays songs in Cafe from MP3. db Request music to preview Request music to preview Retrieves list of last 10 songs played Retrieves list of last 10 songs played Song retrieved from MP3. db and downloaded to customer device Song retrieved from MP3. db and downloaded to customer device Selects song for purchase Selects song for purchase MP3. db MP3. db Figure 3. 1 Information Fl ow Diagram- iTunes and Starbucks Revenue Model (Part IV) Apple/iTunes Revenue ModelThe customer requirements for iTunes are to be able to listen to the last 10 songs played at the Starbucks they are visiting. If the customer finds a song they would like to buy, they want to be able to select purchase by clicking on a button and have the song downloaded to their mobile device. The customer’s account will be billed by the method stored on their account profile for the amount of the purchase. The cost to the customer is $. 99 for a single song. Apple receives $. 29 as profit from this. The competitive advantage for iTunes is that they offer the only music being played at Starbucks. ITunes is also the only music compatible for direct download for iPhone and iPod. The clientele are the customers at each particular Starbucks location. This means the music must be chosen by locality to maximize profits. Starbucks Revenue ModelFor Starbucks in this partnership, the customer requires the usage of the T-Mobile Wi-Fi access. This allows them to have access from the Starbucks location to the iTunes store. This is the wireless protocol access plan used to securely connect the customer’s mobile device to the iTunes store making the possibility of purchasing and downloading music or other content both easy and secure. In a deal with Apple, Starbucks receives eleven percent of the net profits each quarter on the songs downloaded. The competitive advantage for Starbucks is that they have the name and reputation of the Apple/iTunes store behind the music system they are partnered with. This can be a draw for more customers to their coffee shop for the music experience alone. This adds to the current client base increasing the clientele. Benefits All AroundThere are many benefits to be had by both companies in the partnership. Both companies can benefit indirectly. Starbucks has increased coffee and other refreshment sales due to the increase in customers. ITunes has been able to bring in new customers by offering free ‘songs of the week’. This has let customers who may never have started out buying get a taste and decide to buy music. The suppliers to the Starbucks stores also benefit indirectly, as Starbucks does more business they need to order more supplies and that continues on down the supply chain. Location Changes EverythingFor a Starbucks located in the Brewery district in Columbus, OH the choice of music played would be very different than what is played in New York City in Manhattan. Should Apple choose to just play the same song list at all of the Starbucks locations it partners with, there would be a large loss of potential revenue. Song choice by location makes a huge difference for the clientele as to whether they will be interested in purchasing a song or not. Other Potential PartnershipsThe type of partnership that has worked so well with Apple and Starbucks could work equally well with some other types of businesses. I think that any type of business that caters to a rather quiet environment where a soothing music background would add to the enjoyment could benefit from this kind of arrangement. In particular two of the businesses I had in mind are Laundromats and certain types of Restaurants. For the Laundromat business I see no reason that adding music to the mix wouldn’t make for a much more enjoyable experience. I think an extra benefit to iTunes would be that someone doing Laundry might want a little pick me up by way of purchasing a new favorite tune during the rather boring process of doing such a chore. For the Laundromat, one that offered free Wi-Fi and iTunes availability would seem far more attractive than just a mundane, boring Laundromat. It would be a much more pleasant way to spend a few hours. On the restaurant front, it would be nice for a small diner to offer the same type of service. I often see people who are eating alone. When they don’t have someone to converse with, it would make for a nice way to enjoy the meal. They could browse their favorite genre of music and then choose a song to download. This may take a little different song choice selection than the Starbucks selection does. I do think this possibility is something to consider. Revenue Model (Part V) Apple/iTunes Revenue ModelThe customer requirements for iTunes are to be able to listen to the last 10 songs played at the Starbucks they are visiting. If the customer finds a song they would like to buy, they want to be able to select purchase by clicking on a button and have the song downloaded to their mobile device. The customer’s account will be billed by the method stored on their account profile for the amount of the purchase. The cost to the customer is $. 99 for a single song. Apple receives $. 29 as profit from this. The competitive advantage for iTunes is that they offer the only music being played at Starbucks. ITunes is also the only music compatible for direct download for iPhone and iPod. The clientele are the customers at each particular Starbucks location. This means the music must be chosen by locality to maximize profits. Starbucks Revenue ModelFor Starbucks in this partnership, the customer requires the usage of the T-Mobile Wi-Fi access. This allows them to have access from the Starbucks location to the iTunes store. This is the wireless protocol access plan used to securely connect the customer’s mobile device to the iTunes store making the possibility of purchasing and downloading music or other content both easy and secure. In a deal with Apple, Starbucks receives eleven percent of the net profits each quarter on the songs downloaded. The competitive advantage for Starbucks is that they have the name and reputation of the Apple/iTunes store behind the music system they are partnered with. This can be a draw for more customers to their coffee shop for the music experience alone. This adds to the current client base increasing the clientele. Benefits All AroundThere are many benefits to be had by both companies in the partnership. Both companies can benefit indirectly. Starbucks has increased coffee and other refreshment sales due to the increase in customers. ITunes has been able to bring in new customers by offering free ‘songs of the week’. This has let customers who may never have started out buying get a taste and decide to buy music. The suppliers to the Starbucks stores also benefit indirectly, as Starbucks does more business they need to order more supplies and that continues on down the supply chain. Location Changes EverythingFor a Starbucks located in the Brewery district in Columbus, OH the choice of music played would be very different than what is played in New York City in Manhattan. Should Apple choose to just play the same song list at all of the Starbucks locations it partners with, there would be a large loss of potential revenue. Song choice by location makes a huge difference for the clientele as to whether they will be interested in purchasing a song or not. Other Potential PartnershipsThe type of partnership that has worked so well with Apple and Starbucks could work equally well with some other types of businesses. I think that any type of business that caters to a rather quiet environment where a soothing music background would add to the enjoyment could benefit from this kind of arrangement. In particular two of the businesses I had in mind are Laundromats and certain types of Restaurants. For the Laundromat business I see no reason that adding music to the mix wouldn’t make for a much more enjoyable experience. I think an extra benefit to iTunes would be that someone doing Laundry might want a little pick me up by way of purchasing a new favorite tune during the rather boring process of doing such a chore. For the Laundromat, one that offered free Wi-Fi and iTunes availability would seem far more attractive than just a mundane, boring Laundromat. It would be a much more pleasant way to spend a few hours. On the restaurant front, it would be nice for a small diner to offer the same type of service. I often see people who are eating alone. When they don’t have someone to converse with, it would make for a nice way to enjoy the meal. They could browse their favorite genre of music and then choose a song to download. This may take a little different song choice selection than the Starbucks selection does. I do think this possibility is something to consider. | Starbucks Customers Starbucks Customers Starbucks Cafe Starbucks Cafe Starbucks CafeT-Mobile Wi-Fi AccessiTunesArtists supply music to iTunes databases Artists supply music to iTunes databases | Figure 5. 1 Supply Chain Diagram- iTunes and Starbucks Executive Summary Starbucks is the ideal location for the partnership with Apple/iTunes for the music partnership. One of the reasons for this is that Starbucks locations already offered free Wi-Fi access which allowed iPhone users to be able to connect to apple. com and the iTunes Store. The wireless service provided at Starbucks is from T-Mobile. The Hotspots offered are 802. 1x authentication standards and WiFi Protected Access (WPA). This is better than the required basic WEP encryption (Landesman, 2011). The WPA protocol is used to make the connections from customer to access points to the iTunes store and back in reverse for a secure, fast transaction. The security is an important requirement for all parties concerned. This protects the customers monetarily and also their identification information. The security also protects iTunes corporate concerns allowing them to authenticate their customers and accurately process the payments for the transactions. The iPhone is one of the ideal mobile devices to download music at Starbucks locations for several reasons. Beyond the obvious reason that the iPhone was created by Apple and the iTunes Music store also belongs to Apple. As purchased, the iPhone can securely connect to guest Wi-Fi networks. The ease of connection is a great customer benefit. The WPA2 Enterprise with 128-bit AES encryption provides users the highest level of data protection. The iOS installed on the iPhone enables it to securely access corporate services and protect important data. IOS provides strong encryption for data in transmission, proven authentication methods for access to corporate services, and hardware encryption for all data at rest. IOS also provides secure protection through the use of passcode policies that can be delivered and enforced over the air (Apple, 2011). References Apple. (2007, September 5). Apple and Starbucks Announce Music Partnership. Retrieved from http://www. pple. com/pr/library/2007/09/05Apple-and-Starbucks-Announce-Music-Partnership. html Apple. (2011). Deploying iphone and ipad Security Overview. Apple, Inc. Retrieved from http://images. apple. com/iphone/business/docs/iOS_Security. pdf Apple. (2011). Deploying iphone and ipad Wi-Fi. Apple, Inc. Retrieved from http://www. apple. com/iphone/business/integration/http://im ages. apple. com/iphone/business/docs/iOS_WiFi. pdf Bishop, T. (2011, February 15). Starbucks: Mobile payments catching on — 1 million so far. Retrieved from http://www. techflash. com/seattle/2011/02/starbucks-a-million-mobile-payments. html Dominus, S. 2006). The Starbucks Aesthetic. The New York Times. Retrieved from http://www. mktgsensei. com/AMAE/Retailing/Starbucks%20and%20Culture. doc (2004, February 2). Enabling the Future of Wi-Fi ® Public Access. Wi-Fi Alliance. Retrieved from http://www. wi-fi. org/files/wp_2_Future%20of%20Wi-Fi%20Public%20Access_1-2-04. pdf Ee, L. (2001). Essential components of e-commerce education: Supply chain and logistics management. In A. Herrmann and M. M. Kulski (Eds), Expanding Horizons in Teaching and Learning. Proceedings of the 10th Annual Teaching Learning Forum, 7-9 February 2001. Perth: Curtin University of Technology. ttp://lsn. curtin. edu. au/tlf/tlf2001/ee. html Etherington, D. (2011). Now you can get an app with your grande chai  latte. Retrieved from http://gigaom. com/apple/now-you-can-get-an-app-with-your-grande-chai-latte/ Hirano, K. , Nakantani, Y. , McCarty, S. (2007). Applications of Mobile Research in Japan. WAOE. ORG. Retrieved from http://waoe. org/president/ubiquity. pdf (2010, April 13). How Much Do Music Artists Earn Online? Information is Beautiful. Retrieved from http://www. informationisbeautiful. net/2010/how-much-do-music-artists-earn-online/ Ian. (2011, July 27). Difference between mp4 and m4v. Retrieved from http://www. differencebetween. net/technology/difference-between-mp4-and-m4v/ iTunes: How to resume interrupted iTunes Store downloads. Retrieved from http://support. apple. com/kb/ht1725 Jordan, J. M. (2007, February). Beyond Servicization: The Rise of Digital Hybrids, Retrieved from http://www. smeal. psu. edu/cdt/pubs/white-papers/beyond-servicization-9. 07. pdf Landesman, M. (2011). Using your laptop at starbucks: Is it safe?. Retrieved from http://antivirus. about. com/od/wirelessthreat1/a/starbucks. htm Levere, J. L. (2004, July 27). Wi-Fi Service Expands Its Reach. The New York Times.