Tuesday, May 19, 2020

The Degradation of Women in Hip-Hop Music Videos and...

Hip-hop began in the 1970s in the south Bronx of New York and served a cathartic purpose for the black community. People could explore issues such as the eradication of racism and equality, but since Hip-hop was created, the cathartic use has been abused through the increased use of misogynistic lyrics and music videos. Artists like Ludacris, 50 Cent and Eminem portray women nothing more than â€Å"ho’s†, â€Å"bitches† and â€Å"freaks†. Nothing more than sex objects; and yet, their biggest fan base is adolescents, this is dreadful as neuroscientists have discovered that the teenage brain still undergoes the same radical development as seen in childhood . Teenagers are easily influenced through their formative years ; as they are consuming music videos†¦show more content†¦As Nicki calls herself Nicki Lewinsky it also tells her fans that she also performs this. Nicki Minaj has done numerous things to make herself a celebrity; she had undergone co smetic surgeries several times to look (what she believes) is sexy. She is an eccentric character, but what would persuade a woman to enhance her body so much? In an Interview with Vibe Magazine, Nicki stated, â€Å"When I grew up I saw females doing certain things, and I thought I had to do that exactly. The female rappers of my day spoke about sex a lot†¦ and I thought that to have the success they got; I would have to represent the same thing. When in fact I didn’t have to represent the same thing†, this is the perfect example of the hypodermic needle theory at work. As Nicki Minaj grew up, her inspirations were Foxy Brown and Lil Kim. Nicki Minaj was also a passive watcher, as she watched all her favourite artists perform and talk about women in a degrading way. The affects of this on Nicki was she also became thinking like a woman who had no respect. Kimberly â€Å"Lil Kim† Jones is an American singer-songwriter and rapper who was associated with rapper Notorious B.I.G. The self-proclaimed Queen Bee (short for bitch) has made tracks such as Suck my d***, Shut up b**** and How many licks which is an innuendo of sexual scenarios of Lil Kim having sex with men from different

Sunday, May 17, 2020

Why Did Some Women Get the Vote in 1918 - 2224 Words

This essay shall attempt to explain why some women got the vote in 1918 by discussing male and female spheres, the emergence of the suffrage societies and the similarities and differences between them. It shall proceed to discuss anti-suffrage, the role of politics, discuss how the war affected the women’s movement and finally the 1918 Representation of the People Act. It shall conclude was a summary of the points discussed. To understand the reasons behind some women getting the vote in 1918, one must look back at the history of the women’s movement to fully understand the reason female suffrage was sought and gained. In Victorian Britain there was a longstanding and persistent belief that men and women occupied separate spheres. The†¦show more content†¦Consequently the militant campaign escalated in 1912 with attacks on government and commercial buildings and commonly took the form of window smashing. Other militant tactics involved setting fire to letters boxes, defacing buildings, burning golf greens with acid and firebombing the newly built country house of then Prime Minister Lloyd George. Suffragettes arrested for criminal damage refused to pay fines and were then put in prison. As a protest against being denied the rights of political prisoners, they went on hunger strike. The government authorised force-feeding, which met with resistance not only from the prisoners themselves but also from the movement at large. By 1913 the Liberal government introduced the Prisoners Temporary Discharge Act, which was also known as the ‘Cat and Mouse’ Act, which meant that once the prisoner’s health had deteriorated past a certain point, they could be temporarily released to regain their health and then rearrested again. The catch was that they were soon rearrested if they did not return to the prison voluntarily so that the cycle of hunger-strike and force-feeding could be continued. Despite the new technique failing to change government policy, it contributed to suffragette propaganda. The purpose of suffrage propaganda was to build up an irresistible pressure of public opinion and at the same time convert MPS toShow MoreRelatedHigher History Women1700 Words   |  7 PagesSociety towards women was the major reason why some women received the vote in 1918. How accurate is this view? During the 1900s, many women were beginning to stand up for themselves and no longer wanted to be inferior to men. Prior to 1918, women were disrespected and under - valued in society. There was a change in attitudes towards women as the image of the New Women began to arise. They were becoming involved in various different jobs, having the ability to be better educated and get involved inRead MoreEssay about Why Women Gained the Vote in 19181224 Words   |  5 PagesWhy Women Gained the Vote in 1918 In 1918, women had finally gained the right to vote, after 68 long and hard years of campaigning and rebelling they finally got the vote they wanted. The women had tried everything like campaigning, getting them selves arrested, using the media and many more things were done. However, there were a couple of things that they did which really helped them get the right to vote and they were the fact that they helped the men in World WarRead MoreThe Major Reasons for Women Receiving the Right to Vote 1099 Words   |  4 PagesThe major reasons for women receiving in 1918 the vote in my opinion were divided into sections, political view, male view, war effort and changes in law and legislation. Whilst some historians argue that the women’s work during WWI in factories and other work programmes radically changed male ideas about their role in society other traditional historians suggest that the government passing the legislation to give women the vote in 1918 was almost a reward for their efforts I believe that this explanationRead MoreWhy Women Should Be Remembered For World War I1384 Words   |  6 Pages ‘Why should women of World War 1 be remembered?’ Good evening ladies and gentlemen, today I will be talking about why women should be remembered for their role in World War 1 and not just the troops who fought during the war. So why women should be remembered for World War 1? I believe women should be remembered for World War 1 because for women around 1917 were paid a really low wage of around 3-6 shillings a week for really long hours. The women took on the hard work that the men did beforeRead MoreWar on the home front1000 Words   |  4 Pageseconomically. The Wartime Elections Act proposed by Robert Borden weakened Canada politically as a country. This act that was passed in 1917 took the vote away from citizens who had emigrated from enemy countries. In addition, the act only gave army nurses and close relatives of soldiers the right to vote. In 1918, women living in Canada were given the right to vote, but they could still not be elected to Parliament. During the later part of the war, conscription was introduced which was not a good sign forRead MoreWomens Contribution to the War Effort and Their Gain in Voting Rights491 Words   |  2 PagesRights Women over 30 gained the vote in 1918. There were a number of reasons for this but mainly because of womens contribution to the war effort. I will be looking at these different reasons and writing about how everything came together for the vote for women. I will start by looking at what the women did in the war. Women were pleased by the outbreak of the war because this meant they could prove themselves and even get suffrage at the end of it all. Women thoughtRead MoreEssay about The Campaign for Women’s Suffrage1614 Words   |  7 Pagesrights of women began to improve. Though women were still thought of as second-class citizens, during the 1870’s the women’s suffrage became a mass movement. Prior to 1870, there were laws that meant that women were unable to keep any of their earnings once they married. That also meant that all her possessions belonged to her husband as well. In 1870, the Married Women’s Property Act meant that women were allowed to keep  £200 of their earnings. Women such as CarolineRead MoreTechniques of Suffragists and Suffragettes941 Words   |  4 Pagessuffragettes were different. Women started campaigning to win the vote in the 1850s. Small local groups had meetings nationwide to present their arguement for allowing women to vote. In 1877 - 78 there were 1,300 meetings - this represents how serious the women were.The campaigners were mainly middle class, as, upper class ladies most propably found campaigning and argueing unlady like and inappropriate. However this does not mean they they too did not want the right to vote. The campaigners wereRead MoreCampaigns for Women Suffrage and their Effectiveness Essay783 Words   |  4 PagesCampaigns for Women Suffrage and their Effectiveness Throughout the nineteenth century, the suffragists and the suffragettes worked hard campaigning for women suffrage. Finally, in 1918, the vote was given to women, but only women over thirty. But suffrage campaigns, although important, were not the only reason that the franchise was granted. Some other reasons include, a fear of the return of suffragette activity, the government following an international trend, theRead MoreEssay about The Changing Role and Status of Women in Britain Since 19001679 Words   |  7 PagesThe Changing Role and Status of Women in Britain Since 1900 1. Before 1900, women had generally stayed in the home. From the Middle Ages to 17th Century, they had been involved in cottage industries like making gloves. Early in the industrialisation period, women were sent down coalmines, because they cost less, but later on when rules and regulations were set over hours and safety, women were pushed back into the home because men could work harder for longer hours

Wednesday, May 6, 2020

Howe 2 Ski Case Study - 1087 Words

Howe 2 Ski Case Study 1. Given the background information about Howe 2 Ski Stores, discuss the feasibility of implementing lump sum bonus, pay for knowledge, profit sharing, and gainsharing plans. What plan or plans would you recommend that Howe look at most closely and why? Lump sum bonuses are a form of performance pay bonus. Defined as â€Å"bonuses †¦ earned at the end of a specified time period, such as monthly, quarterly, or annually, when a salesperson achieves a specific level of sales or sales quota† (Quast), they are utilized frequently in the sales industry. The dilemma, in this case, is that quality and productivity is not based only on sales. The molders are contributing to the issues that impact How 2 Ski. The lump sum bonuses†¦show more content†¦The Scanlon, Rucker and Improshare gain sharing plans are those most often utilized in organizations. In order to appropriately recommend an incentive plan, one must first identify the main issues with operation at Howe 2 ski. Howe 2 Ski has experience increased competition resulting in a decreased market share. Smaller market share increases the negative impact a lack of productivity and customer dissatisfaction has on Howe 2 Ski’s profits. The decreased production of both the molders and Sales-Persons result in increased inventory and higher cost of production. Furthermore, Howe has attempted to establish an incentive pay program that has served to be ineffective and has fostered low morale within the organization. Given these factors, gainsharing would be the most beneficial for How 2 Ski. 2. Assuming that Howe decides that a gainsharing plan is feasible, what could be done to increase the likelihood of success? Timothy L Ross, Ph.D. offers comprehensive research providing an astute account of the effective implementation of gainsharing plans. A well-planned gainsharing plan is essential when implementing the bonus program. First, a plan should include elements of employee involvement. It is important that management gain employeeShow MoreRelatedTest Paper1754 Words   |  8 PagesSystem Case study of Howe 2 Ski Sores Submitted By Mr. Sardar Ali MBA Section-D Submitted to Lecturer: Mr. Baber Jamil Institute of Management Sciences Phase 7 Hayatabad Pehsawar, Pakistan Evaluating Non-Traditional Incentive Systems Case Study: Howe 2 Ski Stores Introduction: In this case study, the main focus of our interest is to evaluate the non traditional incentive system. But before going into the detail of Non-traditional incentive system, let us summarize the case studyRead MoreEssay on The Special Olympics2686 Words   |  11 Pagesto survive in society than the public school system alone.    In order to design an effective program for any group of children, an analysis must be made of that group. Frank Hayden is a research associate at the University of Toronto who studies motor development in handicapped children. He stated that people assume the handicapped are weak, slow, and overweight, but that those characteristics are a result of not being encouraged or assisted in physical activity (Nemeth). Dr. Elkan SnyderRead MoreMarketing21272 Words   |  86 Pagescustomers need, and later to evaluate how well the firm is meeting those needs. A market consists of people with their needs, the ability to buy, and the desire and ability to sell. Markets are classified as consumer and industrial markets. 2. A MARKETING MIX A business firm controls four important elements of marketing which are called a marketing mix. A firm’s marketing mix is the combination of the product, the price of the product, the means for its distribution, and the promotionRead MoreExploring Corporate Strategy - Case164366 Words   |  658 Pages 22/10/2007 11:54 Page 597 CASE STUDIES ECS8C_C01.qxd 22/10/2007 11:54 Page 598 ECS8C_C01.qxd 22/10/2007 11:54 Page 599 Guide to using the case studies The main text of this book includes 87 short illustrations and 15 case examples which have been chosen to enlarge speciï ¬ c issues in the text and/or provide practical examples of how business and public sector organisations are managing strategic issues. The case studies which follow allow the reader to extendRead MoreManagement Course: Mba−10 General Management215330 Words   |  862 PagesFourth Edition I. Management 17 17 2. The Evolution of Management Thought Hughes−Ginnett−Curphy †¢ Leadership, Fifth Edition I. Leadership is a Process, Not a Position 51 51 70 1. Leadership is Everyone’s Business 2. Interaction between the Leader, the Followers the Situation Cohen †¢ Effective Behavior in Organizations, Seventh Edition 11. Leadership: Exerting Influence and Power 94 94 Text Palmer−Dunford−Akin †¢ Managing Organizational Change 2. Images of Managing Change 121 121Read MoreLogical Reasoning189930 Words   |  760 Pagesattribute the work in the manner specified by the author, namely by citing his name, the book title, and the relevant page numbers (but not in any way that suggests that the book Logical Reasoning or its author endorse you or your use of the work). (2) Noncommercial You may not use this work for commercial purposes (for example, by inserting passages into a book that is sold to students). (3) No Derivative Works You may not alter, transform, or build upon this work. An earlier version of the book

Kierkegaard s An Age Of Dispassionate Reflection - 954 Words

Soren Kierkegaard, in his essay, the Present Age, writes about two ages—the passionate age and the present age: an age of dispassionate reflection. Kierkegaard believes the present age to be centered on reflection (deliberation, representation, anticipation), which substitutes for decisive action. The present age, according to Kierkegaard is â€Å"characterized by an ‘unhappy objectivity,’ in which the individual has become ‘leveled down’ and loses himself as part of a crowd. â€Å" One aspect of this unhappy objectivity is that our age is an age of reflection rather than of passion. Kierkegaard suggests, the most dangerous, if also the most respectable of all diseases is to admire in public what is considered unimportant in private - since†¦show more content†¦This is dangerous because in the act of doing so, we lose our true selves in the process. Kierkegaard strongly believes in the idea of individuality. If individuals (as individuals) take it upon themselves to experience first-hand meaningful action and informed opinion (which is risky) they will gain something precious. Yet, many would rather stay in the safety (and effortlessness) of the public and live meaninglessly. Kierkegaard uses the example of the skater to demonstrate his assertion of â€Å"the most dangerous of all diseases†. The skater, on a frozen lake with dangerously thin ice, sees a jewel in the distance. In the passionate age, he argues, the public would cheer and support the skater as he made efforts to reach the jewel. They would worry for him and show concern at any sign of danger. However, in an age absent of passion, the crowds would agree on the fact that it was unreasonable and not worthwhile to engage in such a dangerous activity. In addition, they would praise themselves for being clever and practical for figuring this out. The qualities of being daring and enthusiastic for something an individual may be passionate about is malformed into a feat of skill, in which people are encouraged to surrender to â€Å"the most dangerous of all diseases†: â€Å"to admire in public what is

Technical Paper on E-Commerce free essay sample

TECHNICAL PAPER ON ELECTRONIC COMMERCE ABSTRACT There is no official definition as to what electronic commerce is. Different experts have different definitions. Communication people say that it is the transmission of information, of products/services of payments through telephone lines, network or any other medium. From a businessman standpoint, e-commerce is the use of technology to automate business transactions and work flows. Someone from the service industry might say that e-commerce is a transaction and work flows. Someone from the service industry might say that e-commerce is a helpful innovation that allows business to cut costs, enabling it to provide better quality products with a quicker delivery time. For our purpose and probably the general and literal definition for e-commerce is that it is the actually the buying and selling of goods or services electronically online. Products are displayed on an online store and potential customers can read information about the product, see them on the website and have the option to purchase them online. We will write a custom essay sample on Technical Paper on E-Commerce or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page There are sites selling everything from pets to automobiles. Virtually any product or service can be sold online. All the principles involved in good business practices apply here. Electronic commerce presents a fantastic opportunity for businesses to increase their sales. Online storefronts operate by using a shopping cart. A shopping cart allows visitors select multiple products and collects payment information. Choosing a shopping cart is a critical step in the design of your site. Shopping carts should be matched to the needs of your website. The internet is a new and existing realm that offers businesses the ability to reach millions of customers at very low costs. It also offers businesses the ability to conduct sales through their website 24 hours a day, 365 days a year. Establishing an E-commerce website requires an experienced e-commerce designer. There is a multitude of issues, which must be addressed that require very specific knowledge in programming, security and in the unique nature of internet transactions. Failure to address many issues surrounding the creation of an e-commerce site can result in lost business, damaged credibility of financial losses. When you fill out a form on a website that information travels from your computer to the website’s server computer. A special program which resides then processes that information on the server computer. Generally this information this information is emailed to the owner of the website. Secure ordering occurs when a website or an order form is accessed through a secure server. A secure server is a server computer which has special encryption software installed. Any information you submit is encrypted or coded when transmitted. It is more complicated than that, but further explanation would require extra jargon. At this point the customer has placed their order; however the transaction is still not complete until the merchant receives the information. Many sites ordering systems are secure to this point. However, security problems can arise after the information arrives on the server computer. Many websites claim to have secure ordering while in fact they do not. The information is only secured during the initial transmission from the visitor’s computer to the server computer. After the information arrives at the server computer, man websites simply email the information to whoever processes the orders. Email is not a secure method of transmitting information. With the proper knowledge anyone can access the information as it is transmitted. There are several ways to handle securing the information after it arrives on the server. One of the options is to keep the information on the server. Generally writing the information to an inaccessible or secured section of the server computer does this. The merchant can then retrieve the information. A security risk does arise with this method if the operators of the hosting service act unscrupulously and access the server using their administrative access. INTRODUCTION E-commerce is an exceptionally cost effective way of generating extra revenue. E-commerce removes all geographical boundaries and time differences. With increased demand for retail services, on-line ordering will enable your organization to sell its products and resources over the internet customers can order directly from a secure server, with Visa payments now being accepted in both Newzealand and American currencies. Implementation of a successful e-commerce site first involves establishing some strategies. E-commerce: Enables automated and 24 hour ordering that reduces the cost and the chances of errors. Improves customer service Allows customers to track orders themselves Provides up-to- date price list and product catalogues Greatly reduces the time between ordering and dispatch Reduces supply chain costs. Some of the terminologies used:- Shopping Carts- programs that arrow visitors to select products as they move through a website. When they are finished shopping it gives them a total purchase amount. An ordering process also is also generally present Membership Sites- sites which offer members specific information for the cost of membership Secure Transactions- using â€Å"Encryption or coding† to encode sensitive information to prevent unauthorized viewing Real Time Credit Card Processing- Where the customer finds out immediately if their credit cards was accepted or denied. Standard or ‘Batch’ Credit Card Processing- Where the merchant transmits the customers ordering information and card number to their credit card processor. What e-commerce represents is a way to reach out to customers. E-commerce will allow you to undertake cost-effective business with large number of customers, and with lower value orders. E-commerce can be divided into: E-tailing or â€Å"virtual storefronts† on websites with online catalogs, sometimes gathered into a â€Å"virtual mail†. The gathering and use of demographic data through web contacts Electronic Data Interchange(EDI) , the business –to-business exchange of data E-mail and fax and their use as media for reaching prospects and established customers( for example with newsletters) Business-to- business buying and selling The security of business transactions CONCEPTS OF E-COMMERCE E-tailing or The Virtual storefront and the Virtual mail As a place for direct retailing shopping, with its 24-hour availability, a global reach, the ability to interact and provide custom information and ordering and multimedia prospects, the web is rapidly becoming a multibillion-dollar source of revenue for the world’s businesses. A number of businesses already report considerable success. As early as the middle of 1997, Dell Computers reported orders of a million dollars a day. But early 1999, projected e-commerce revenues for business were in the billions of ollars and the stocks of companies deemed most adept at e-commerce were skyrocketing. Apart from computer and network products, books(Amazon. com), gardening products(garden. com), music on compact disks(CDNow), and office supplies (Supplies Online) were a few of the better-known e-commerce sites. By early 1999, even businesses that have always counted on fa ce-to-face customer interaction were planning e-commerce websites and many businesses were planning how to coordinate in-store and web store retail approaches. Meanwhile, new businesses based entirely on web sales were being invented daily. Market Research In early 1999, it was widely recognized that because of the interactive nature of the internet, companies could gather data about prospects and customers in unprecedented amounts-through site registration, questionnaires and as part of taking orders. The issue of whether data was being collected with the knowledge and permission of market subjects had been raised. (Microsoft referred to its policy of data collection as profiling and a proposed standard has been developed that allows internet users to decide who can have what personal information) Electronic Data Interchange (EDI) EDI is the exchange of business data using an understood data format. It predates today’s Internet. EDI involves data exchange among parties that know each other will and make arrangements for one-to-one (or point-to-point) connection, usually dial-up. E-Mail, Fax, and Internet Telephony E-commerce is also conducted through the more limited electronic forms of communication called e-mail, facsimile or fax and the emerging use of telephone calls over the internet. Most of this is business-to-business, with some companies attempting to use e-mail and fax for unsolicited ads (usually viewed as online junk mail or spam) to consumers and other business prospects. An increasing number of business websites offer e-mail newsletters for subscribers. A new trend is opt-in email which web users voluntarily sign up to receive email, usually sponsored or containing ads, about product categories or other subjects they are interested in. Business –to-business buying and selling Thousands of companies that sell products to other companies have discovered that the web providers not only a 24- hour-a-day showcase for their products but a quick way to reach the right people in a company for more information. The Security of Business Transactions Security includes authenticating business transactions, controlling access to resources such as Web pages for registered or selected users, encrypting communications and in general ensuring the privacy and effectiveness of transactions. Among the most widely used security technologies are SSL and RSA. Secure Electronic Transactions (SET) is an emerging industry standard. *E –* Business â€Å"E –business† ( â€Å" electronic business ,† derived from such terms as â€Å"e-mail† and â€Å"e-commerce†) is the conduct of business on the internet, not only buying and selling but also servicing customers and collaborating with business partners. One of the firsts to use the term was IBM, when in October 1997, it launched a thematic campaign built around the term. Today, major corporations are rethinking their businesses in terms of the Internet and its new culture and capabilities. Companies are using the Web to buy parts and supplies from other companies, to collaborate on sales promotion and to do joint research. Exploiting the convenience availability and worldwide reach of the internet, many companies, such as Amazon. com, the booksellers, have already discovered how to use the internet successfully. Increasingly, much direct selling (or e-tailing) is taking place on the Internet of computer related equipment and software. One of the firsts to report sales in the millions of dollars directly from the web was Dell computer. Travel bookings directly or indirectly as a result of web research are becoming significance. Customer-orderable golf clubs and similar specialties are considered good prospects for the immediate future. With the security built into today’s browsers and with the digital certificates now available for individuals and companies from VeriSign, a certificate issuer, much of the early concern about the security of business transaction on the web has abated and e-business by whatever name is accelerating. IBM also considers the development of intranets and extranets to be part of business. Trade and commerce between individuals is as old as the existence of mankind. There have been innumerable channels that have facilitated this exchange. The latest to join this is e-commerce. The debatable topic now is what extent this new venture will make roads into business operations. In 1997-98 experts predicted the e-commerce trade to be worth $ 200-250 billions and expected figures today are $ 3 trillion of its volume. E-commerce method of doing business differs from traditional commerce because it combines information and technology, telecommunications technology and business process to make it practical to do business in ways that could not be done otherwise. Types of e-commerce E-commerce is divided into three major segments i. e. Inter – organizational Intra – organizational Retail inter-organizational, between different business entities It reduces suppliers and facilitates business partnerships by reducing purchase orders, processing costs and inventory cycle timings. It could be operated on Internet or extranet which just lets us select a few participants. Supply chain management or payment management is examples of inter-organizational application. Intra organizational e-commerce occurs within a business entity. The objective is to link the constituents together and increase the flow of information within the organization. Examples of it include human resource or department websites that disseminate information and services through an intranet. Retail e-commerce, as the name suggests, is directed at the consumer. It can be used for any business for consumer interaction. Technological dimensions of e-commerce While many technologies can fit within the definitions of e-commerce, the most important are electronic data interchange(EDI), bar codes, electronic mails, internet, World Wide Web, product data exchange and electronic forms. Electronic Data Interchange is the computer to computer transfer of structured information in a standard electronic format. Information stored in one computer is translated by software programs into standard EDI format for transmission to one or more trading partners. The trading partner’s computer, in turn, translates the information using software to a form, which they can understand. Bar codes are used for automatic product identification by a computer. They are rectangular type of lines of varying widths and spaces. The most common example of bar codes is consumer products like packaged food, books etc. These codes allow the product to be scanned at the checkout corners. As the product is identified, the price of the product is entered in cash register, while internal systems are automatically updated. Electronic Mails are message composed by individuals and sent to other recipients via Internet. Internet is decentralized network of millions of computers and computer networks. World Wide Web is a collection of documents written and encoded with hypertext marker language. With the aid of a relatively small piece of software, the user can ask for these documents and display them on the users local computer. Product Data Interchange is exchange of data usually in the graphic form that is needed to describe a project. Electronic Forms is a technology that combines the familiarity of paper forms with the power of storing information in digital form. To the user and the electronic form is simply a digital analogue of such a paper form, but appears on a computer screen and is filled out via mouse and keyboard. FUNCTIONS OF E-COMMERCE There are four functions of e-commerce:- Communication Process management Service management Transactional capabilities The communication function is aimed at the delivery of information and /or document to facilitate business transactions. Email is an excellent example of this. The process management function covers the automation and improvement of business process. The best example of this would be networking two computers together so that they can be shared and transfer of data is possible instead of one person taking data from one computer to another. Service management function is the application of technology to improve the quality of services. A good example of this is the Federal Express Website. It permits customers to track shipments and schedule pick-ups 24 hours a day without having to talk to a service representative. Customer services are greatly enhanced due to this site. The last function, transaction capabilities provide the ability to buy and sell on the internet. Amazon. com and REI offer good example. PRE-REQUISITES OF E-COMMERCE There are a very few pre-requisites to conduct e-commerce business. These are: Either your own or provided by a cart A shopping cart programmed to list your products or services and means to collect purchase information. A method to get funds into your bank account. If you want to automate the process, a compatible credit card merchant account and transaction processor (e. g. Authorise. net) to collect the credit card information and obtain authorization and post the funds into your account are required. SIGNIFICANCE OF E-COMMERCE Participants in the electronic market place are not only limited to digital product companies such as publishing, software and information industries. The digital age and digital revolution affect all of us by virtue of their process innovations. The web TV and digital television is going to affect the TV news and entertainment programs. Changes in telecommunications will affect the way we receive information, product announcements or orders etc. as phones, Fax USERS OF E-COMMERCE Anyone with something to sell can use e-commerce. If you access a website where you can store information about the items or products your company offers, you can use e-commerce. There are three kinds of business concerns, which are mainly using e-commerce. The first are new enterprises, which have no existing infrastructure. The other is the technology company which would have an interest in electronic routes to promote their services. The third category is of media companies, which would benefit from fast distribution of information together with low set up costs. Credit cards, cheques or any other mode of payment arrangement can be set up to be used via the internet. You do not have a transaction processor to process the transaction in real time, although real time credit card processing offers the most immediate methods to have funds deposited into your account. These are the e-commerce solution that allow information collection and retrieval from a secure server and then let you enter that information manually at your local terminal. EMPLOYMENT POTENTIAL OF E-COMMERCE According to computer system of a value added network (VAN) of the US government, there are many full and part time positions available in e-commerce with flexible hours. The current requirements but are not limited to: Systems programming(Unix,Win95,Win NT) EDI programmers Communication Engineers (Routers,ISDN,SLIP, PPP,RAS) Communication programmers (C,C++, VB) Technical writers Technical Support Sales and Marketing focus Field Engineering Support. PROS AND CONS OF E-COMMERCE ADVANTAGES Although in its infancy, e commerce is the most popular way for a business to expand their customer base and increase productivity. In recent years the online shopping industry has leaped forward and every business can be found without a website. With an Earth Link Total Commerce Package, you can sell product throughout the world by your web-based store. Here are some of the pros and cons of e-commerce:- The biggest advantage of e-commerce is that distance doesn’t matter in carrying out the trades. You can reach out to the world anytime you want. This helps the companies to have a cheap and effective way of communications with suppliers on one side with customers on the other. Contact with suppliers is possible through internet or via an EDI system. Secondly, unlike a brick and mortar store an online store is open 24 hours a day,7 days a week and 365 days a year. Thirdly, compared with a retail outlet or a new office the cost of setting up of an e-commerce office is very low. Fourthly, there is flexibility in a website to add and remove a product or product than in catalogue. Another advantage of being online is that it potentially gives exposure to previously untapped market segments. Another benefit is error reduction because orders don’t have to be re-keyed into order entry systems increased efficiencies through the automation of business process. Other benefits include wider choice and no wastage of time. People who want to buy products usually have to go out and search a shop. Now the only thing they have to do is turn their computer and select one of the thousands of online stores. Customers can find product from all over the world, so the amount of offers is far greater. DISADVANTAGES OF E-COMMERCE Among the disadvantages of selling online include inability to touch and feel the merchandise. As one analyst puts it, â€Å"kick the tyres†. This is a psychological barrier but as consumers become more familiar with shopping online this barrier will go. Further, a big rush with the growing importance of e-commerce and computer communication technology is that people don’t have social contacts any more. Further, because online stores do not exist for very long, many companies do not know how to set up a store. This results in a large group of annoyed customers, who want to but something but it is not clear how they should and there is no one who they should ask, like in a normal shop. In addition, computer systems will never be 100% safe. There shall be hackers who intercept money transactions and cause problems for consumers and companies. Above all in a developing nation Internet user usually is a young highly educated man. If you start a business then perhaps you might not reach women and elderly. At this time, e-commerce is not good if you want to sell product to a target other than highly educated man. This won’t be a problem in future as more and more people will use computer and the internet. PROSPECTS OF E-COMMERCE Though difficult to predict precisely but it is more likely that it stays here. On the up side all of us believe that e-commerce will increase exponentially in the coming years. An estimated 148 million shoppers were expected to spend an estimated $ 15 million in the cyber market space. According to IDC market estimates cyber sales are set to increase by 20% by the year 2000. The US department report in April 1998 titled â€Å"The Emergent Digital Economy† predicted that e-commerce will account $300 million annually by 2002. Area expected to grow includes financial services, entertainment, travel and groceries. The jackpot returns from e-commerce depend a lot on how the business processes are being leveraged by electronic transformation. On the downside experts say that longer a company waits the more difficult it will be to establish their presence. On the whole in the next few years, experts say that the world and the world of marketing in particular will be entirely transformed by the yet to be realized potential of e-commerce. Lessons derived from the evolution of e-commerce The following is a checklist of a few lessons learnt from the coming of e-commerce: No one that properly embraced ATMs, ant time money credit or debit cards even went back. Customers want expanded hours-24 hours per day are the limit. If it is convenient, people will gravitate to it after experimenting with it. Customers want expanded locations – the closer to home the better – the home is the limit. Customers change the way businessmen does business, technology is merely the facilitator. There is an inevitable trend in its emergence and e-commerce is here to stay. CONCLUSION E-commerce is growing explosively on the internet. Before the end of this decade, millions of companies and individuals will be buying, selling, bidding, brokering, advertising and collaborating on a daily basis, as the Internet merges with other branches of information highway. The resulting economies of scale will drastically lower cost of implementing and maintaining a procurement infrastructure. All said and done those who clearly see the opportunity, understand the medium creatively and completely put it to work for them, will definitely succeed in the digital economy of tomorrow. The e-commerce market may be infant in terms of years of existence, but the time has come for it to mature and develop a rational commerce strategy. Additionally using these methods will allow you to track your orders to the end user to investigate a fraudulent transaction. Real –time processing and delivery- Try to avoid real time processing and product delivery if at all possible. When your product is delivered immediately you lose the ability to check the order for possible fraud. That means a higher likelihood of stolen cards. Matching Addresses- If you receive an order that has different addresses for shipping and billing you should red flag this order. Many times there is nothing wrong with this type of order, but this is also a common way for someone using a stolen card to obtain merchandise. Call the Issuing Bank- This is an excellent way to determine if a card is stolen. When you provide the number to the bank they tell you immediately if the card is valid, stolen, or whatever. Since you don’t have the card in your possession you can call the credit card company- Visa, MasterCard etc. and get the name of the issuing bank. Don’t accept orders from free email addresses- Addresses such as usa. net, yahoo. com, or other free email addresses are perfect ways for an individual to hide their identity. Anyone can sign up for the services and they can give false information when signing up. The majority of fraudulent transactions come from free email address services. Make sure you tell your clients that any information submitted would not be used for any other purposes, nor will it be distributed. Envy- reports – These reports are taken by your form submission program and generally display IP addresses, and other visitor information. This information is very important in tracking orders, which have proven to be fraudulent. Using the IP address you can track the individual to their ISP and from there you can get the persons real address. Generally ISPs will release this information only if you can provide solid evidence that the individual committed fraud. You may also be required to get a court order. Telephone numbers – The best advice one can give is to get phone numbers from all customers and contact each customer regarding their order. One may also recommend telling customers on the order form, that you will be contacting them regarding their order prior to order fulfillment. This will stop many thieves from even placing the order. BIBLIOGRAPHY Employment News- January 2000 Website : http://www. dell. com Website :http://ecommerce. internet. com/ Website : http://www. consumer. net Website: http://www. ecrc. ctc. com/ Why This Fuse About E-Commerce- By Sanjay Kumar Misra E-Commerce (An Overview Of E-Commerce For Students And General Readers) By Bhushan Dewan E-commerce – By Dr. Milind M. Oka

PTSD and DID for Post-Traumatic Stress- myassignmenthelp.com

Question: Discuss about thePTSD and DID for Post-Traumatic Stress. Answer: Introduction Post-Traumatic Stress Disorder (PTSD) is an anxiety disorder that is experienced by a person after he or she is subjected to a serious accident or has been involved or witnessed death (Skortz, 2015). The chances of acquiring this disorder sometime in their lives based on the U.S. population are approximately 7-8% (Jaimie L. Gradus, DSc, MPH, February 23, 2016). Apart from PTSD Dissociative identity disorder (DID) also occur as a result of traumatic experiences witnessed by an individual. The most visible characteristic of this disorder is the fact that an individual develops multiple personalities which take control of their original self. Although the disease is not common, it has been previously reported at around 1% (James , Chen and Jacky 2000-2015). The objective of this written paper is to provide detailed analysis of Dissociative identity disorder and Post Traumatic Stress in a broader way based on movie Secret Window. The following was discussed based on this movie: synopsis and the main characters, signs, and symptoms of the disorder, its prevalence, how it was treated, psychosocial and ethical issue, discrimination that occurred and finally recommendations are identified which could bring about positive results in the life of a patient Keywords:, psychosocial issues ,Dissociative identity disorder, Post-Traumatic Stress Disorder ,prevalence, discrimination and Treatment. Body Synopsis of the movie and analysis of the main character: The movie opens with a person dressed in a hat and wearing glasses. The person who is called Mort is driving his car near a hotel conversing to himself and looks thoughtful. Mort stops near the Hotel, moves in hurriedly picks a key and rushes to a room where he gets shocked upon opening the door and finding a man in bed inside the room. The woman in bed with another man is his wife Amy, and the man she is in bed with is her boyfriend, Tod. The second scene shows Mort being woken up from his sofa, his usual place of sleeping by a knock on the door by a strange man named Shooter who accuses Mort of stealing his written story the secret window. The strange man asks Mort to produce magazines to confirm that the story indeed belongs to him in three days failure to which he will sue Morts wife. Shooter then threatens Mort and even kills his dog and Burns the house belonging to Mort and his wife, Amy. After the incidence, Mort requests for help from his friend Ken. Unfortunately, Shooter ki lls his friends after a few days leaving mort a miserable man. His Misery is compounded by the fact that his wife is pressuring him to sign their divorce papers so that she can be with her boyfriend, Tod. Mort appears quite upset. In a flashback we are shown Amy smiling through a small window and telling Mort that that was the Secret window of the secret garden. We learn that it was through that window that she used to see the current boyfriend, Tod. The story of the secret window was written by mort about his wife. Morts time is mostly spent on the sofa sleeping. Mort thinks of Soorter as a friend of Amys loved one and tries to find out. He also makes an effort to get hold of the magazine in which his story was published, but unfortunately, the magazine pages that contained the story are missing. Mort later receives a call from Amy requesting him to sign the divorce papers. The call is followed by Amys decision to appear at Morts house to have him sign the papers. Mort remembers about the cap he bought while they were living a good life with his wife. He starts speaking to himself and seeing himself everywhere and later realizes that he was the shooter. A conflict ensues when his wife Amy appears an in the incidence Amy gets injured although she manages to escape. Tod also gets hit with a shovel on the face which makes him fall. What follows is killing of both Tod and Amy and hiding of their bodies by Mort. In the end, the police know everything that happened, but they cannot arrest and label any charges on Mort because they have not yet found the bodies of the deceased. Associated signs and symptoms: Severe trauma can be experienced by some people in their lives. Such trauma leads to numerous changes both physical and psychological and regarding their behavior, thoughts, and habits. Post-traumatic stress disorder resulting from traumatic experiences can make some people develop psychiatric diseases. If this condition remains untreated for long durations, it can have an impact on the mental health of the victims and lead to the development of a mental disorder. Multiple Personality disorder or dissociative disorder develops as a result of this. The post-traumatic disorder occurs as a result of failed adaptation and is revealed in increased stress levels among the patients. Such is the case when mort opens the door only to find his wife standing there with another man. This incidence makes him helpless. This compounded the suffering that he had had for almost half a year as a result of the traumatic experience he had had. Morts personality can be compared to that of an individual who has post-traumatic stress disorder which can have symptoms lasting for at least three months or even years. Research has shown that people who have PTSD show different signs and symptoms which include intensive memory in which an incidence takes over the mind of an individual and keeps repeating itself. This also occurs in the form of repeated nightmares, hallucinations, flashbacks and illusions. However, these do not only occur when an individual is sleeping but even when they are awake such as the case of Mort when he flashbacks about his wife and which makes him lose touch with the reality and have a conviction that traumatic events are over the time(Post-Traumatic Stress Disorder, 2016). Another major attribute of people suffering from the dissociative disorder is the inability to recall important personal information, which cannot be viewed as the mere act of forgetting due to its pervasiveness. Memory variations and split personality are also common as witnessed in the Movie. The Character has another personality in the name of Shooter which takes over his thoughts and behavior. Among the symptoms associated with dissociative identity disorder are instantaneous mood swings depression, suicidal tendencies and aggressiveness which occur as a result of conflict between their two personalities. Other symptoms associated with this disorder include sleep disorders, alcohol and drug abuse, eating disorders ,anxiety disorder, visual hallucination, phobia auditory , anxiety disorder as a result of anxiety and distress (Dissociative Identity Disorder, 2016) Although there is no cure for dissociative identity disorder, its symptoms can be treated by the use of different types of treatments such as pharmacologic treatment which can be used alone or jointly with psychotherapy Prevalence of the diseases: A study carried out in the year 2014 by among 176 patients by University Psychiatric Outpatient Unit in Turkey on the prevalence of dissociative identity disorder established that the most common age for DID was among teenagers between the ages of 11 and 17 years out of which around 96.8% were as a result of a history of neglect and child abuse. The study also found out that the prevalence of the disease was more on Girls than on boys (Sar, et al.,2014). Diagnostic and Statistical Manual of Mental Disorders in a study carried out in Shangai China, North America, Canada, and Winnipeg found out that there were more cases of DID in North America as compared to China (Ross, C. A. (2011). Treatment: According to the World Health Organization, health is a state of complete physical, social and mental wellbeing as contrasted with the mere absence of disease in an individual. Mental wellbeing is, therefore, an essential component of an individuals life. Although there are different remedies offered through Psychotherapy for different patients depending on their health situations, both speech therapy, and medication may be required by some while others may require only one of them. Psychotherapy sessions require being carried out in a period of between 6 and 12 months. However, an improvement of an individuals conditions is so much dependent on family support. The changes required in a clients mental status can be identified through speech therapy.Antidepressants are some of the medications that can be used in PTDS to help manage symptoms such as worry, sadness, feeling numb inside and anger. (Post-Traumatic Stress Disorder, 2016). Alternatively, special techniques of psychiatric and psychotherapy medical management such as adjunctive therapy and hypnotherapy which involves the induction of deeply relaxed can be applied to manage dissociative identity disorder. Other techniques include pharmacological therapy and psychiatric therapy (Journal of Trauma Dissociation, 2011) In conclusion, there are major components emphasized under effective psychotherapy which includes the creation of awareness about the associated symptoms, instilling of skills to help in the identification of trigger symptoms as well as skills meant at managing the symptoms. Medication can also be applied to relieve the symptoms associated with the disease. Goals of treatment of dissociative identity disorder can help facilitate a change in behavior as well as relieving the symptoms and leading to an increased degree of coordination and communication. Psychosocial issues: Psychosocial issues in a mental disease can be easily developed through low social and family support as well as a reduced self-concept. The impact of this can be felt by friends and family, individuals and at the workplace. In the movie for this report, the main character suffers from post-traumatic stress upon the realization that his wife of 10 years has betrayed him. The impact of this is that he secludes himself, develops hallucinations, sleep disturbances, repeated nightmares, develops a feeling of laziness and lives in fear due to PTSD post-traumatic disorder and dissociative identity disorder. Studies have shown that PTSD can lead to the development of sour and stressful relationships between families and friends whose impact can be divorce, aggression, and violence. The post-traumatic stress experienced by the character [propels him to kill his dog and commit other crimes under shooter personality. The disorder had also cost him his job and reduced his ability to socialize w ith individuals around him. Ethical issues: In the final part of the movie, the police warn Mont of his coming to the city because people are afraid of him. The police already know about the crimes he committed, but due to lack of evidence, they cannot arrest him. This raises a moral question why the police cannot arrest him and whether they should only arrest an offender after gathering proof. As per the ethical principles of autonomy versus nonmalficine, doing no harm to the society is prioritized than the Mort autonomy. So the ethical concern here would be whether Morts autonomy is more important than doing no harm for the society. Discrimination: Discrimination is a common phenomenon among individuals associated with post-traumatic stress disorder. This occurs through stigmatization because of their mental illness and can have a profound effect on them through first label avoidance, i.e. failure to adhere to medication will make a patient develop the fear of being labeled as a person with a mental health condition which can make them shy of from social events. Secondly, it can affect them by denying them a chance to get life opportunities such as a job of their choice. Additionally, self-stigma can result to negative emotional reactions such as developing a low self-esteem and feeling ashamed. At the end of it all, this will subject to social withdrawal and isolation (Karen-leigh Edward, Ian Munro, Anthony Welch, 2014).Labeling and discrimination are witnessed in the movie in the form of the policeman who approaches Mont and informs him of their awareness regarding the crimes committed by Mont although they lack evidence and out of which they want Mont to stay away from the grocery in the city because he is scaring away potential customers. Recommendation: Recommendations are meant to offer a positive response or suitable solutions to an existing issue or problem. In this regard, an early detection of the mental disease analyzed can prevent further complications. Hospitalization becomes necessary in a situation where patients fail to seek medical treatment or fail to comply with their medication requirements which could lead an increase in the possibility of the patients harming themselves or others. Occupation therapy will help in promoting the independence in their daily routine activities and help in the improving the quality of life. In addition, positive stress coping mechanism can be applied to help relieve anxiety and stress. Patients can ventilate by being open to people close to them such as friends and family or professionals like a psychologist. Finally awareness on the signs and symptoms, causes and treatment modules can lead to rising of public awareness regarding the disease. Conclusion: In conclusion, according to the movie Post-Traumatic Stress Disorder emerges as the cause of dissociative identity Disorder (DID).However; there exist many different mental diseases which possess unique features. Post-traumatic stress disorder is a disease that occurs to an individual after a traumatic experience. The dissociative disorder does not only affect individuals during childhood but can also be manifested at later ages. The emergence of a new generation of medicine has improved treatment modalities. The movie raises an issue about patients with DID and PTSD which include discrimination, psychological issues and offers recommendations. References Brown, L. S. (2011). Guidelines for treating dissociative identity disorder in adults, third revision: a tour de force for the dissociation field. Dissociative Identity Disorder (Multiple Personality Disorder)'.WebMD.N.p.,2016.Web.6Apr.2016. Jaimie L. Gradus, DSc, MPH. ( February 23, 2016). Epidemiology of PTSD.U.S. Department of Veterans Affairs | 810 Vermont Avenue, NW Washington DC 20420, 10. James D;Chen,Jacky. (2000-2015, June 12). Dissociative Disorder Community. Retrieved from HealthyPlace :https://www.healthyplace.com/abuse/dissociative-identity-disorder/dissociative-identity-disorder-did-statistics-and-facts/ Journal Of Trauma Dissociation: The Official Journal Of The International Society For The Study Of Dissociation (ISSD), 15(4), 402-419. doi:10.1080/15299732.2013.864748 Karen-leigh Edward, Ian Munro, Anthony Welch. (2014). Mental Health Nursing. Melbourne: in Australia by Oxford University Press. Post-Traumatic Stress Disorder.(2016, 1 1). Retrieved 4 3, 2016, from https://www.nimh.nih.gov/: https://www.nimh.nih.gov/health/topics/post-traumatic-stress-disorder-ptsd/index.shtml#part_145375 Sar, V., Onder, C., Kilincaslan, A., Zoroglu, S. S., Alyanak, B. (2014). Dissociative identity disorder among adolescents: prevalence in a university psychiatric outpatient unit. Skortz, J. K. (2015). PSYCHOSOCIAL ISSUES .PSYCHOSOCIAL ISSUES WITH POSTTRAUMATIC STRESS DISORDER AND TREATMENT, 28.