Thursday, October 31, 2019

Public Finance in the Health Care System Essay Example | Topics and Well Written Essays - 2500 words

Public Finance in the Health Care System - Essay Example As of July 2013, the census Bureau of the US gives an estimation that the total population of this state of Vermont stood at 626, 630 people (Abrahamsen, 2012). This represented an increase of 0.14%, when compared to the census of 2010. The state of Vermont has an increase in the aging population, and on this basis, there is an increase in the provision of aging health care services within the economy of the state (Abrahamsen, 2012). The Allen Fletcher Health is considered as the biggest private health provider in the state of Vermont, with an employee base of around 7,100 people. As of the year 2010, the entire bill that patients in the hospital paid amounted to 3.76 billion dollars. Currently, 92,000 people have enrolled for the Medicare program. It is important to denote that as of 2011, Medicare was able to spend 740 million dollars on the health care of the state (Deary and sBrown, 2001). The financial capacity of the state is very stable, and it has been able to achieve a balanced budget, since the year 1991 (Deary and sBrown, 2001). The state has an enterprise fund, for purposes of sponsoring activities that would reduce social and economic problems like unemployment, drug abuse, etc. For purposes of understanding the economic strength of Vermont, the state has an individual’s per capita income of 38,306 dollars. On the other hand, the general size of the public sector is 24.3%, when compared to that of the private sector which amounts to 36.6% (Abrahamsen, 2012). Based on these grounds, the private sector is wider than the public sector. The tax system of this state is also favorable, and one of the unleast fair tax structure in the United States. This is because the tax structure gives income tax credit to low waged workers. This is for purposes of ensuring that there is an equitable distribution of resources. One of the health care reforms initiated

Tuesday, October 29, 2019

Business marketing Case Study Example | Topics and Well Written Essays - 500 words

Business marketing - Case Study Example Quality is AAA Office World’s surest way of establishing a good market standing (Kourdi, 2003). The fact that the company’s strategy involves both regional and local suppliers shows that it has vast presence. It is prudent that AAA prioritizes new-product development. Continuous product development helps diversify the company’s offerings. However, product development requires many resources and can easily overshadow promotion of existing products. Product promotion should also be allocated more resources because it will not only help inform many customers of the company’s products but also instigate hype for its new products. Hype would be assured for AAA because its existing and new products deliver on the things that consumers are promised. Promotion will make customers to look out, always, for AAA’s next product (Ireland et. al., 2012). Stasia Acosta should consider taking up Business Center’s offer. One of the reasons that underpin the feasibility of this move is the fact that AAA has excess capacity and could handle Business Center’s orders and still have enough to supply its other stationers and suppliers. Such a production capacity would have the advantage of expanding AAA’s distribution network because it would capitalize on both Business Centers many vast presence and that other supplies. It is fortunate that Business Center is seeking the line of file folders that brings Stasia 20 percent gross margin only. The performance of this line of file folders needs a move that will help raise its gross margin to be at par with those of other lines of file folders. Doing away with this line of file folders is the other option that Stasia can consider to deal with its minimal performance but this option would be tantamount to the â€Å"commodity end of the business† that Ramon works so hard to avoid (AAA Office World

Sunday, October 27, 2019

Importance of Ethical Hacking

Importance of Ethical Hacking Chapter 1 Introduction Ethical hacking is an emerging tools used by most of the organizations for testing network security. The security risks and vulnerabilities in a network can be recognized with the help of ethical hacking. This research completely concentrates on ethical hacking, problems that may occur while hacking process is in progress and various ethical hacking tools available for organizations. Information is the important source for any organizations while executing business operations. Organizations and government agencies have to adopt ethical hacking tools in order secure important documents and sensitive information (Harold F. Tipton and Micki Krause, 2004). Ethical hacker professionals have to be hired in order to test the networks effectively. Ethical hackers perform security measure on behalf of the organization owners. In order to bring out the ethical hacking efforts perfectly a proper plan must be executed. Ethical hacking has the ability to suggest proper security tools that can avo id attacks on the networks. Hacking tools can be used for email systems, data bases and voice over internet protocol applications in order to make communications securely. Ethical hacking can also be known as penetration testing which can be used for networks, applications and operating systems (Jeff Forristal and Julie Traxler, 2001). Using hacking tools is a best method for identifying the attacks before it effect the entire organization. Ethical hackers are nothing but authorized users for the sensitive information or networks of an organization. Using hacking techniques for handling employees in organization and for solving critical judicial cases is not a crime. An ethical hacker use same tools and actions as performed by normal hacker. The main aspect in ethical hacking is that target permission is essential for performing hacking on the information. Ethical hacking can be used while performing security audits in the organization (Kevin Beaver, 2010). Thus, ethical hacking can help in testing the networks by finding out various vulnerabilities. In ethical hacking, a user will get permission to access the important data. Aims and Objectives Aim To investigate the importance of ethical hacking and its implementation in organizations Objectives Finding the importance of ethical hacking tools Understanding the ethical hacking process Implementing ethical hacking tools in an organization Purpose of Study The main of this research is to recognize ethical hacking tools that can be used in organizations and government agencies. Testing the networks is essential in order to maintain security for the organizational information. The difficulties in networks have to be recognized by the security professional so that they can be solved before effecting the organization operations (James S. Tiller, 2005). This research also focuses on carrying out the ethical hacking tools in a particular organization. The advantages of using ethical hacking in business firms can be evaluated by this study. Ethical hacking tools can be implemented in various fields of applications. Various security professionals can be efficient in ethical hacking tools by undergoing a training process. Another major intension of this research is to identify the importance of ethical hacking professionals in providing security to the networks. (Nina Godbole, 2008). Thus, this research entirely focuses on ethical hacking tools which can be implemented for testing the networks. Research Context This research on ethical hacking can be very useful to many organizations as it can provide clear idea about hacking tools. Security professionals and normal users have to be trained well in order to use hacking tools. The importance of ethical hacking while solving many judicial cases can be identified with the help of this research. Management of an organization can be benefited largely through implementing hacking tools. Hacking tools implementation process can be understood with the help of this research (Ronald L. Krutz and Russell Dean Vines, 2007). Network security or data security engineers in organization will come to know about new ethical hacking methods and techniques that are available in the present market by concentrating on this research. The concepts in this study provide knowledge related to security improvements. Business users can hack the data in order to use it for the purpose of evaluating a correct process. Management has to take precautionary measures while a llowing the professional to hack ethically because data may be misused (Rajat Khare, 2006). Scholars who concerned with information security can take the help of this study for attaining the knowledge on hacking systems. Many organizations are encouraging ethical hacking professionals in order to control their business operations effectively. Email systems, data bases and communication applications can avoid or identify attacks by adopting the hacking tools. Malicious attacks on the information or software can be prevented by implementing this research while using ethical hacking tools. The organizations that concerned with security in networks have to use ethical hacking tools (Greg Meyer and Steven Casco, 2002). Hence from the above discussion it can be understood that, business firms, investigating agencies, government systems and web users can make use of this research to achieve the important information in authorized manner. Chapter 2: Literature Review Ethical Hacking and its importance The word hacking is defined as an illegal use of the others computer system or the network resources. Hacker is the term which is formerly meant for the skillful programmer. This is mostly found in the countries like United States and many other countries. The word hacker refers to the names of the persons who enjoys the work in learning the details of the computer systems and stretch the capabilities from the system (Rajat Khare, 2006). The system of hacking describes the fast improvement in the new programs that make the codes for the providing a better security to the system with more efficiency. The word cracker also belongs to the same field it make use of the hacking skills for the unlawful purposes like email id, intruding into others system. Hacking is of different types such as back door hacking, viruses and worms, Trojan horses, Denial of Services, anarchists, crackers, kiddies and ethical hacking (Kevin Beaver, 2010). In the types of hacking system one of the most common h acking is ethical hacking. This is defined as the services that provides the securities for the customers networks, information assets and identifies the vulnerabilities to maintain the reputation of the corporate sectors before it exploit the company. This type of the hacking system provides the high securities to the customers methodologies and techniques to yield high qualities of infrastructures. The ethical hacking system includes some of the service like: Application Testing War Dialing Network Testing Wireless Security System Hardening Application Testing This is an uncover design or the logic flaws which result in the compromising with the unauthorized accessing of the systems, networks, applications or the information regarding the systems. This application testing is used for investigating and identifying the extent and the criticality of the problems exposure to the thick client (Java) and thin client (web browsers) applications. This application testing includes the services like client-side application testing and web application testings (Joel Scambray, Mike Shema and Caleb Sima, 2006). The client-side application testing is the process of developing the software that is used for the measuring the integrated security into the client software constituents. In this system this testing application is based on the gathering of the information by observer using the reverse engineering system. War Dialing This is one of the services that are provided by ethical hacking. War dialing is a method of dialing a modem number to identify open modem connection that supplies access in a remote way to a network for targeting a particular system (Kimberly Graves, 2007). This word is originated from the day the when the internet has come into the existence in most of the companies. This follows the method of scanning to find the strength of the network connection. The tools of War dialing work on the concept that organizations do not pay attention to dial-in ports like they do towards the firewalls. Network Testing The networking testing services of the ethical hacking provides the information on the exposures of the network, services, and solutions on the convergence, protocols and system devices including the virtual private network technologies. This testing process includes a number of constitutes in external and internal devices. It also analyzes the applications of the voice over Internet protocol within the environment of the organization (Greg Meyer and Steven Casco, 2002). The main goal of the network testing application is to make obvious demonstration of the political effects on its development. By making use of this application into the organization, it provides a complete enlightenment to the work for determining the result in the organization. Wireless Security Wireless security services measures the security in the available architecture to provide a guidelines to ensure the system integrity and accessibility of the resources. The working of wireless security is based on the three phases. In the first phase of the operation it identifies the activeness of the wireless networks (Cyrus Peikari and Seth Fogie, 2003). The team of the ethical hacking demonstrates the exposure to the attackers with the space in the wireless network. In the seconds phase of this system it implements a normal users to evaluate the measures of the security that secures the infrastructures of the organization to control the accessing of the devices. During the third phase the team will try to utilize the discovered threats to gain access on other networks. This provides the security in wireless local area network, virtual private network, intrusion detection system and wireless public key infrastructure. System Hardening The system hardening stresses on the network vicinity. Security is the prime factor that determines the level of integrity of the information and resources used in the computing. Effective deployment of the security controls unauthorized, accidental disruption if resources in information technology (Kevin Beaver and Peter T. Davis, 2005). The system hardening assessment is complemented in three phases. The ethical hacking team will analyze the network to identify the loop holes in security updates and other frequent security defects. Scanning of the remote access devices is done for finding out the vulnerabilities. The configuration vulnerabilities and missing security updates are determined in the initial phase. In the second step the host operating system is examined to determine the services available for remote users and their level of impact. All the TCP/IP services and also the Telnet, FTP, Send-mail, DNS and others are tested (James S. Tiller, 2005). The packet fragmenting and loose source routing are used in an attempt to bypass filtering routers and firewalls. The last phase is complicated as the team uses the information gathered from the first two steps to mine the weaknesses and threats that were identified to gain access to the host system. Before the start of the three steps the boundaries for actions and events are determined. Hence from the above context it can be stated that ethical hacking is a methodology that is used for gathering the information on the hacker. The ethical hacker is the expert who is hired by an organization to solve the problems related to hacking in their network and computer system. Need for Ethical Hacking The process of employing someone to hack ones company is ethical hacking. Ethical hacking is one of the tools that are used to judge the security programs of the organizations. It is also referred as penetrating testing, red teaming, intrusion testing, vulnerability and even security judgments. Each one these has different meanings in different countries. Hacking is also described as new development of the existing programs, software and code. It makes them better and more efficient (James S. Tiller, 2005). Ethical hacker can know the details of computer while hacking and become the security professional. It involves in foot-printing, scanning, tacking all the secured information. Ethical means a philosophy with morality. Hackers hack systems to detect dangerous, unauthorized access and misuse (Shon Harris, Allen Harper, Chris Eagle and Jonathan Ness, 2007). Threat and vulnerability are the two dangers the hacker has to face. The hacking report must be confidential as it should face the organizations security risks. If this goes wrong in any way the organization results in fatal, penalties and loss. For example: computer crime is done by misuse of their hacking skills. The need to hack is for catching the thief. Ethical hacking is the correct method to make your computers work properly (Kevin Beaver, 2010). Ethical hacker needs higher level skills compared to penetration testing. Penetration testing is same as ethical hacking but the hacker uses the penetrating tools and tests the security danger. Ethical hacking is known as White Hat in some of the literature. It tests both the security and protective issues whereas penetrating test mainly leads with the security issues (Asoke K. Talukder and Manish Chaitanya, 2008). Some of the websites and companies offer the training, but they cannot be created they are self-made. Various types of testing need different types of softwares and tools. Game freaks use hacking technology in order to win the game. Hackers will d iscover many ways to hack like trial and error method, operating systems, online and determining the threats. Ethical hacking is done by hackers on behalf of the owners, and in normal hacking they use their skills for personal use (Debra Littlejohn Shinder and Micheal Cross, 2008). Cyber terrorism includes common hacking techniques such like viruses, email bombs and natural disasters. Thus ethical hacking is done by hackers on owners request. Mainly this is seen in corporate companies and organizations. Ethical hacking techniques are used for game cheat codes, hacking accounts and other for good result. Majorly used for fight against cyber terrorism and to take preventive action on hackers Types of ethical hackings Ethical hackers use various methods for breaking the security system in the organizations in the period of cyber attack. Various types of ethical hacks are: Remote Network: This process in especially utilized to recognize the attacks that are causing among the internet. Usually the ethical hacker always tries to identify the default and proxy information in the networks some of then are firewalls, proxy etc. Remote dial up network: Remote dial up network hack identify and try to protest from the attack that is causing among the client modern pool. For finding the open system the organizations will make use of the method called war dialing for the representative dialing. Open system is one of the examples for this type of attacks. Local Network: local network hack is the process which is used to access the illegal information by making use of someone with physical access gaining through the local network. To start on this procedure the ethical hacker should ready to access the local network directly. Stolen Equipment: By making use of the stolen equipment hack it is easy to identify the information of the thefts such as the laptops etc. the information secured by the owner of the laptop can be identified (Kimberly graves, 2007). Information like username, password and the security settings that are in the equipment are encoded by stealing the laptop. Social engineering: A social engineering attack is the process which is used to check the reliability of the organization; this can be done by making use of the telecommunication or face to face communication by collecting the data which can be used in the attacks (Bryan Foss and Merlin Stone, 2002). This method is especially utilized to know the security information that is used in the organizations. Physical Entry: This Physical entry organization is used in the organizations to control the attacks that are obtained through the physical premises (Ronald l. Krutz and russel dean Vines, 2007). By using the physical entire the ethical hacker can increase and can produce virus and other Trojans directly onto the network. Application network: the logic flaws present in the applications may result to the illegal access of the network and even in the application and the information that is provided in the applications. Network testing: In this process it mainly observes the unsafe data that is present in the internal and the external network, not only in the particular network also in the devices and including the virtual private network technologies Wireless network testing: In this process the wireless network reduces the network liability to the attacker by using the radio access to the given wireless network space. Code review: This process will observe the source code which is in the part of the verification system and will recognize the strengths and the weakness of the modules that are in the software. War dialing: it simply identifies the default information that is observed in the modem which is very dangerous to the corporate organizations. Techniques and tools required for ethical hacking Ethical hacker needs to understand how to find the network range and subnet mask of the target system. IP addresses are used to locate, scan and connect the target systems. Ethical hacker also should find out the geographical location of target system. This can be done by tracing the messages that are sent to destination and the tools used are traceroute, Visual route and NeoTrace to identify the route the target (Kimberly Graves, 2007). Ethical hacking should use right tools or else task accomplishment of task effectively is difficult. Many security assessment tools will produce false positive and negative or may they even miss susceptibility to attacks. In case of tests in case of physical security assessments they miss weakness. In order for ethical hacking specific tools have to be used for the task chosen. The easier the ethical hacking will become if many tools are used. The right tool must be used at right place. The characteristics in tools for ethical hacking is it should ha ve sufficient document, detailed reports should be there on the discovered attacks regarding their fixing and explosion, Updates and support. The general tools used for ethical hacking in case to find passwords are cracking tools such as LC4, John the Ripper and pwdump (Bragg, Mark Phodes Ousley and Keith Strassberg, 2004). The general tools like port scanner like SuperScan cannot be used to crack passwords. The Web-assessment tools such as Whisker or WebInspect tools are used for analysis of Web applications in depth. Whereas network analyzer tools such as ethereal cannot give good results. While using the tools for any particular task it is better to get feedback from the simple Google searches such as SecurityFocus.com, SearchSecurity.com and Itsecurity.com will give nice feedback from the other security experts which makes ethical hacking easy and to select the right tool. Some of the commercial, freeware and open source security tools are Nmap (Network Mapper), Etherpeek, Super Scan, QualysGuard, WebInspect and LC4, LANguard Network Security Scanner, Network Stumbler and ToneLoc. The capabilities of many security and hacking tools are often misunderstood, such as SATAN (Security Administrator Tool for Analyzing Networks) and Nmap. The other popular tools used in ethical hacking are Internet scanner, Ethreal, Nessus, Nikto, Kismet and THC-Scan (Kevin Beaver, 2007). Cain and able is a ethical tool used for recovery of windows UNIX problems. This is only password recovery tool handles an enormous variety of tasks. It can recover the password by sniffing the network, cracking the encrypted passwords using Dictionary and Cryptanalysis, recording VoIP conversations, decoding scrambled passwords, revealing the password boxes, uncovering cached passwords and analyzing routing protocols. Ethereal is a fantastic open source tool used as network protocol for UNIX and Windows. It allows examining the data which is present in disk or file and can capture the data. This is also known as Wire shark. It has many powerful features which have very rich display filter language and ability to view the TCP session. Another cracking tool Aircrack is the fastest available cracking tool (John Hyuk Park, Hsiao-Hwa Chen and Mohammed Atiquzzaman, 2009). Thus proper tools and techniques has to be used for better hacking and it will be easier by using more and more tools required. Hacking operating system Linux is the operating system which is most useful software that supports and will be helpful to identify the passwords and uses in detecting interruption there are many software tools are utilized for the hacking and security tools are used for the Linux. The tools which are using in this are not harmful tools this is especially used to protect. John the ripper: John the ripper is nothing but password hacking software technique which is usually used to develop for the UNIX operating system. This the most significant process which is used for password testing as it joins all password crackers into single package and the auto detects password hash types which involves the customizable cracker (Ryan, David R. Mirza Ahmad, 2002). It can be run among the different encrypted password methods which involves various crypt password hash forms where usually found on the different UNIX operating systems that is based on the DES, MD5 etc, Kerberos AFS and windows like XP, 200etc.Generally passwords are placed in the LDAP and other tools. Various types of components are used to expand the capability and for involving the MD4 related password hashes. The other one is the NMAP; Nmap is the used to protect the network. It is especially used to identify the network related services on the computer network by generating the map of the network . Nmap is having the ability to identify the services on the computer network instead of this it never advertises its service detection protocol (James turnbull, 2005). However the Nmap can collect many details regarding the remote computers. This will involve the operating system, and uptimes etc are the software products that are used to execute the service, and are used to involve on the local area networks and also on the dealer of the remote network card. Nmap can be run on the linux. Linux is the most important operating system and the windows are the second most important operating system. The other operating system used is Nessus, this software is used to scan the virus. The main aim of this software is used to identify the virus on the tested system such as; the virus will permit the data on to the network (Mark Carey, Russ Rogers, Paul Criscuolo and mike Petruzzi, 2008). Default passwords are utilized on the network accounts. This software is also called as the external to ol which is used to launch the attack. By making use of the mangled packets rejection of the service among the TCP/IP can be done. Nessus the best software used to scan the virus. Many organizations through out the world are using this software. The check Rootkit is the normal program which helps the administrator to check their system for the known rootkits ( James Turnbull, 2005). This program is the shell script by using the LINUX tools similar to the strings and the grep commands to seek out to carry out the core programs for the signatures with the executed process status command to look for inconsistency. This program alternatively use own commands to run. This tool will permit check rootkit to get confident the commands upon which it depend a bit more. Applications and resources Ethical hacking is nothing but the one which performs the hacks as security tests for their systems. Ethical hacking can be used in many applications in case of web applications which are often beaten down. This generally includes Hypertext Transfer Protocol (HTTP) and Simple Mail Transfer Protocol (SMTP) applications are most frequently attacked because most of the firewalls and other security are things has complete access to these programs from the Internet. Malicious software includes viruses and Trojan horses which take down the system. Spam is a junk e-mail which causes violent and needless disturbance on system and storage space and carry the virus, so ethical hacking helps to reveal such attacks against in computer systems and provides the security of the system. The main application of this is to provide the security on wireless infrastructure which is the main purpose of present business organization (BT, 2008). Ethical hacking has become main stream in organizations which are wishing to test their intellectual and technical courage against the underworld. Ethical hacking plays important role in providing security. Resources are the computer related services that performs the tasks on behalf of user. In Ethical hacking the resources are the core services, objects code etc (James Tiller S, 2005). The ethical hacking has advantages of gaining access to an organizations network and information systems. This provides the security in the area of Information technology called as Infosec. This provides security to the high level attacks such as viruses and traffic trough a firewall. This has been providing the security for various applications which are even bypassing the firewalls, Intrusion-detection systems and antivirus software. This includes hacking specific applications including coverage of e-mails systems, instant messaging and VOIP (voice over IP). The resources i.e. devices, systems, and applications that are generally used while performing the ha cking process are Routers, Firewalls, Network infrastructure as a whole, wireless access points and bridges, web application and database servers, E-mail and file servers, workstations, laptops and tablet PCs, Mobile devices, client and server operating systems, client and server applications (Kevin Beaver, 2007). Ethical hacking tests both the safety and the security issues of the programs (Ashoke Talukder K and Manish Chaitanya, 2008). Hence from the above context it can be stated as the ethical hacking is important in the present scenario as providing security is very important now a day. This is very important in web applications as the hacking can be easily done in this case. Problems Ethical hacking is the backbone of network security. The basic problems with this is trustworthiness of the Ethical hacker because lets take an example if a person has been appointed to do Ethical hacking, to provide security for the bank financial issues if the person is not trust to believe this is not safe as the person only considered as thief. Sometimes the big organizations face any problem like there passwords has been hack, this case hiring professionals is very expensive and the organization need to spend a lot on this (Ethical Hacking, 2009). Ethical hacking is just the security to the problem it is not the ultimate solution to it. Ethical hacking report must be kept confidential because they highlight the organizations security risks and attacks. If this document has been falls into the wrong hand the result would be very disastrous for the organization, the main drawback here is the entire information of the organization will be in hands of wrong person and which leads to the loss of the company (Kimberly Graves, 2007). Ethical hacking generally involves breaking down the computer applications and by collecting specific information from the target the ethical hacker can successful to access the information and can reveal it. This results in that highly sensitive information about the targets security capabilities is collected and maintained far away from the owners control. If this information fall into wrong hands results in real attack on the company and another problem is if the information is leaked to the public or stockholders, the business will be in risk, which results in all types of disasters, including negative character by media, loss of customers and legal consequences (James Tiller S, 2005). Ethical hacking use tools while it performing the activity, if the methods and tools are used incorrectly they cause damage (Dr. Bruce Hartly V, 2003). Hence from the above context it can be stated as Ethical hacking provides security but behind th at it provides the disadvantages like the Ethical hacker should be trusted by the organization or business and in case sometimes highly professionals may cost the organization very much so that company has to provide from the unplanned budget and if it goes into the wrong persons hand the business will be in danger and loss of the organization will takes place. Chapter 3: Research Methodology of Hacking Data types: Data type is defined as the format of a data storage which is used to store different set of values. It tells about which type of data to be stored and where to be stored. Data is stored in computer memory. There are two types of data. They are primary data and secondary data. Both primary and secondary data illustrates the gathering of information and to satisfy the goals of business. Primary data is nothing but it is the data which is collected newly and for the first time. The primary data is original. It is the fresh data and is never gathered before. Secondary data is the data which is collected by others (Norman Blaikie, 2009). The data is collected from newspapers, magazines and journals. Secondary data is gathered before primary data since it is time consuming. Data is gathered newly in case of primary data so it takes much time. Secondary data consumes less time. Primary data is used in ethical hacking since the data gathered in this type of data is very efficient. Ethical h acking is used legally for the official purposes. Since primary data is unique and is not compared with any one, it is used in the process of ethical hacking (Rajat Khare, 2006) Hence from the above context it can be said that data types are useful in the ethical hacking. Case study: According to media and people the word hacking denotes misuse and collapse of computers. They describe it as unfair method of solving the problem. In the view of ethical hackers the word hacking refers to creative. One of the organization namely Amazon, it is not proposed to point out the lesser features but deals with tricks for working the company efficiently. Hackers and developers will create new characteristics for Amazon. They bring out the creative thinking and innovative ideas by their work in company (Paul Bausch, 2003). Mainly the ethical hacking is the good way to improve the existing methods and qualities. Many organizations follow these because one can know the administrative password of employees, can reach the behaviour of them and working performance. Employee performance and his project carryout can be studied through ethical hacking. These hackings look easy for them since they are engaged with the security firms to protect the Amazon fields. Not only in Amazon in e ach and every org

Friday, October 25, 2019

Manchester Airport operates in an increasingly competitive environment

Manchester Airport operates in an increasingly competitive environment and must differentiate itself not only. Finance All organisations must take great care in setting their financial targets. If they are set too low then they will be readily achieved and full potential will not be reached. At present the economic regulation of airports is targeted solely at reducing the charges to airlines. Non-aviation income is not regulated and the Airport, therefore, seeks to encourage the development of such revenue streams to sustain the profitability of the Company. To maintain its reputation as a quality service provider, therefore, Manchester Airport has to ensure that it increases capacity and markets itself to become more attractive as the â€Å"airport of choice†. External factors Which Affect financial Performance Numerous factors influence the financial activities and the financial performance of organisations Five major external factors which affect Manchester Airport are: 1 Constant change 2 Competitive environment 3 Single till 4 Government regulations 5 Economic environment Change Along with all other business the Airport operates in an environment which is constantly changing. For example: 1 The freight market is volatile and can fluctuate annually. Reasons for this include: 1. competitor activity 2. noise considerations – freight only aircraft tend to be noisier and older 3. technological development 2 World events can have an effect dramatic on both freight and passenger travel. For example: 1. Since 11 September 2001 the number o people flying across the North Atlantic has fallen dramatically and this has had an effect in business travel and some airlines. 2. the war in Iraq has also had an effect on travel 3. The SARS virus has had an effect on the number of passengers travelling to the very east of the world. 1 Charter flights are also in a volatile market and are affected by events such as: 1. the general economic conditions 2. foreign currency exchange rates 3. consumer confidence I tour operators 4. competitor activities 5. trades towards off-season holidays 6. weather conditions 1 the Airport must comply with regulations and legislation which is subject to change, for example: 1. The establishment of a single market within the Euro... ...atement, which indicates the broad methodology used and is titled Basis of Opinion. Statement of According Policies Principles of accounting policies are declared in this statement. Details are provided of particular accounting methods used such as description. Trading Account The trading account forms the first part of the Profit and loss Account. It is used to calculate the amount of gross profit or loss. Paying Wages and Salaries The payment of wages and salaries for Manchester Airport plc staff is handled by the Payroll Section which is part of one of the other group companies, Manchester Airport Aviation Service (MAAS), and is located on the Airport site. They hold information about all employees. This includes: 1 Name 2 Address 3 National Insurance Number 4 Starting Salary 5 Salary Scale From this information they are able to calculate the amount to be paid and deductions such as National Insurance payments, pension, tax and union subscription. The majority of staff are salaried, that is their payments are based on an annual figure, but are paid on a monthly basis. Some staff, mainly annual workers , are still paid on an hourly rate.

Thursday, October 24, 2019

Angels Demons Chapter 51-54

51 BBC reporter Gunther Glick stared at the cell phone in his hand for ten seconds before he finally hung up. Chinita Macri studied him from the back of the van. â€Å"What happened? Who was that?† Glick turned, feeling like a child who had just received a Christmas gift he feared was not really for him. â€Å"I just got a tip. Something's going on inside the Vatican.† â€Å"It's called conclave,† Chinita said. â€Å"Helluva tip.† â€Å"No, something else.† Something big. He wondered if the story the caller had just told him could possibly be true. Glick felt ashamed when he realized he was praying it was. â€Å"What if I told you four cardinals have been kidnapped and are going to be murdered at different churches tonight.† â€Å"I'd say you're being hazed by someone at the office with a sick sense of humor.† â€Å"What if I told you we were going to be given the exact location of the first murder?† â€Å"I'd want to know who the hell you just talked to.† â€Å"He didn't say.† â€Å"Perhaps because he's full of shit?† Glick had come to expect Macri's cynicism, but what she was forgetting was that liars and lunatics had been Glick's business for almost a decade at the British Tattler. This caller had been neither. This man had been coldly sane. Logical. I will call you just before eight, the man had said, and tell you where the first killing will occur. The images you record will make you famous. When Glick had demanded why the caller was giving him this information, the answer had been as icy as the man's Mideastern accent. The media is the right arm of anarchy. â€Å"He told me something else too,† Glick said. â€Å"What? That Elvis Presley was just elected Pope?† â€Å"Dial into the BBC database, will you?† Glick's adrenaline was pumping now. â€Å"I want to see what other stories we've run on these guys.† â€Å"What guys?† â€Å"Indulge me.† Macri sighed and pulled up the connection to the BBC database. â€Å"This'll take a minute.† Glick's mind was swimming. â€Å"The caller was very intent to know if I had a cameraman.† â€Å"Videographer.† â€Å"And if we could transmit live.† â€Å"One point five three seven megahertz. What is this about?† The database beeped. â€Å"Okay, we're in. Who is it you're looking for?† Glick gave her the keyword. Macri turned and stared. â€Å"I sure as hell hope you're kidding.† 52 The internal organization of Archival Vault 10 was not as intuitive as Langdon had hoped, and the Diagramma manuscript did not appear to be located with other similar Galilean publications. Without access to the computerized Biblion and a reference locator, Langdon and Vittoria were stuck. â€Å"You're sure Diagramma is in here?† Vittoria asked. â€Å"Positive. It's a confirmed listing in both the Uficcio della Propaganda delle Fede – â€Å" â€Å"Fine. As long as you're sure.† She headed left, while he went right. Langdon began his manual search. He needed every bit of self-restraint not to stop and read every treasure he passed. The collection was staggering. The Assayer†¦ The Starry Messenger†¦ The Sunspot Letters†¦ Letter to the Grand Duchess Christina†¦ Apologia pro Galileo†¦ On and on. It was Vittoria who finally struck gold near the back of the vault. Her throaty voice called out, â€Å"Diagramma della Verita!† Langdon dashed through the crimson haze to join her. â€Å"Where?† Vittoria pointed, and Langdon immediately realized why they had not found it earlier. The manuscript was in a folio bin, not on the shelves. Folio bins were a common means of storing unbound pages. The label on the front of the container left no doubt about the contents. Diagramma Della Verita Galileo Galilei, 1639 Langdon dropped to his knees, his heart pounding. â€Å"Diagramma.† He gave her a grin. â€Å"Nice work. Help me pull out this bin.† Vittoria knelt beside him, and they heaved. The metal tray on which the bin was sitting rolled toward them on castors, revealing the top of the container. â€Å"No lock?† Vittoria said, sounding surprised at the simple latch. â€Å"Never. Documents sometimes need to be evacuated quickly. Floods and fires.† â€Å"So open it.† Langdon didn't need any encouragement. With his academic life's dream right in front of him and the thinning air in the chamber, he was in no mood to dawdle. He unsnapped the latch and lifted the lid. Inside, flat on the floor of the bin, lay a black, duck-cloth pouch. The cloth's breathability was critical to the preservation of its contents. Reaching in with both hands and keeping the pouch horizontal, Langdon lifted it out of the bin. â€Å"I expected a treasure chest,† Vittoria said. â€Å"Looks more like a pillowcase.† â€Å"Follow me,† he said. Holding the bag before him like a sacred offering, Langdon walked to the center of the vault where he found the customary glass-topped archival exam table. Although the central location was intended to minimize in-vault travel of documents, researchers appreciated the privacy the surrounding stacks afforded. Career-making discoveries were uncovered in the top vaults of the world, and most academics did not like rivals peering through the glass as they worked. Langdon lay the pouch on the table and unbuttoned the opening. Vittoria stood by. Rummaging through a tray of archivist tools, Langdon found the felt-pad pincers archivists called finger cymbals – oversized tweezers with flattened disks on each arm. As his excitement mounted, Langdon feared at any moment he might awake back in Cambridge with a pile of test papers to grade. Inhaling deeply, he opened the bag. Fingers trembling in their cotton gloves, he reached in with his tongs. â€Å"Relax,† Vittoria said. â€Å"It's paper, not plutonium.† Langdon slid the tongs around the stack of documents inside and was careful to apply even pressure. Then, rather than pulling out the documents, he held them in place while he slid off the bag – an archivist's procedure for minimizing torque on the artifact. Not until the bag was removed and Langdon had turned on the exam darklight beneath the table did he begin breathing again. Vittoria looked like a specter now, lit from below by the lamp beneath the glass. â€Å"Small sheets,† she said, her voice reverent. Langdon nodded. The stack of folios before them looked like loose pages from a small paperback novel. Langdon could see that the top sheet was an ornate pen and ink cover sheet with the title, the date, and Galileo's name in his own hand. In that instant, Langdon forgot the cramped quarters, forgot his exhaustion, forgot the horrifying situation that had brought him here. He simply stared in wonder. Close encounters with history always left Langdon numbed with reverence†¦ like seeing the brushstrokes on the Mona Lisa. The muted, yellow papyrus left no doubt in Langdon's mind as to its age and authenticity, but excluding the inevitable fading, the document was in superb condition. Slight bleaching of the pigment. Minor sundering and cohesion of the papyrus. But all in all†¦ in damn fine condition. He studied the ornate hand etching of the cover, his vision blurring in the lack of humidity. Vittoria was silent. â€Å"Hand me a spatula, please.† Langdon motioned beside Vittoria to a tray filled with stainless-steel archival tools. She handed it to him. Langdon took the tool in his hand. It was a good one. He ran his fingers across the face to remove any static charge and then, ever so carefully, slid the blade beneath the cover. Then, lifting the spatula, he turned over the cover sheet. The first page was written in longhand, the tiny, stylized calligraphy almost impossible to read. Langdon immediately noticed that there were no diagrams or numbers on the page. It was an essay. â€Å"Heliocentricity,† Vittoria said, translating the heading on folio one. She scanned the text. â€Å"Looks like Galileo renouncing the geocentric model once and for all. Ancient Italian, though, so no promises on the translation.† â€Å"Forget it,† Langdon said. â€Å"We're looking for math. The pure language.† He used the spatula tool to flip the next page. Another essay. No math or diagrams. Langdon's hands began to sweat inside his gloves. â€Å"Movement of the Planets,† Vittoria said, translating the title. Langdon frowned. On any other day, he would have been fascinated to read it; incredibly NASA's current model of planetary orbits, observed through high-powered telescopes, was supposedly almost identical to Galileo's original predictions. â€Å"No math,† Vittoria said. â€Å"He's talking about retrograde motions and elliptical orbits or something.† Elliptical orbits. Langdon recalled that much of Galileo's legal trouble had begun when he described planetary motion as elliptical. The Vatican exalted the perfection of the circle and insisted heavenly motion must be only circular. Galileo's Illuminati, however, saw perfection in the ellipse as well, revering the mathematical duality of its twin foci. The Illuminati's ellipse was prominent even today in modern Masonic tracing boards and footing inlays. â€Å"Next,† Vittoria said. Langdon flipped. â€Å"Lunar phases and tidal motion,† she said. â€Å"No numbers. No diagrams.† Langdon flipped again. Nothing. He kept flipping through a dozen or so pages. Nothing. Nothing. Nothing. â€Å"I thought this guy was a mathematician,† Vittoria said. â€Å"This is all text.† Langdon felt the air in his lungs beginning to thin. His hopes were thinning too. The pile was waning. â€Å"Nothing here,† Vittoria said. â€Å"No math. A few dates, a few standard figures, but nothing that looks like it could be a clue.† Langdon flipped over the last folio and sighed. It, too, was an essay. â€Å"Short book,† Vittoria said, frowning. Langdon nodded. â€Å"Merda, as we say in Rome.† Shit is right, Langdon thought. His reflection in the glass seemed mocking, like the image staring back at him this morning from his bay window. An aging ghost. â€Å"There's got to be something,† he said, the hoarse desperation in his voice surprising him. â€Å"The segno is here somewhere. I know it!† â€Å"Maybe you were wrong about DIII?† Langdon turned and stared at her. â€Å"Okay,† she agreed, â€Å"DIII makes perfect sense. But maybe the clue isn't mathematical?† â€Å"Lingua pura. What else would it be?† â€Å"Art?† â€Å"Except there are no diagrams or pictures in the book.† â€Å"All I know is that lingua pura refers to something other than Italian. Math just seems logical.† â€Å"I agree.† Langdon refused to accept defeat so quickly. â€Å"The numbers must be written longhand. The math must be in words rather than equations.† â€Å"It'll take some time to read all the pages.† â€Å"Time's something we don't have. We'll have to split the work.† Langdon flipped the stack back over to the beginning. â€Å"I know enough Italian to spot numbers.† Using his spatula, he cut the stack like a deck of cards and lay the first half-dozen pages in front of Vittoria. â€Å"It's in here somewhere. I'm sure.† Vittoria reached down and flipped her first page by hand. â€Å"Spatula!† Langdon said, grabbing her an extra tool from the tray. â€Å"Use the spatula.† â€Å"I'm wearing gloves,† she grumbled. â€Å"How much damage could I cause?† â€Å"Just use it.† Vittoria picked up the spatula. â€Å"You feeling what I'm feeling?† â€Å"Tense?† â€Å"No. Short of breath.† Langdon was definitely starting to feel it too. The air was thinning faster than he had imagined. He knew they had to hurry. Archival conundrums were nothing new for him, but usually he had more than a few minutes to work them out. Without another word, Langdon bowed his head and began translating the first page in his stack. Show yourself, damn it! Show yourself! 53 Somewhere beneath Rome the dark figure prowled down a stone ramp into the underground tunnel. The ancient passageway was lit only by torches, making the air hot and thick. Up ahead the frightened voices of grown men called out in vain, echoing in the cramped spaces. As he rounded the corner he saw them, exactly as he had left them – four old men, terrified, sealed behind rusted iron bars in a stone cubicle. â€Å"Qui etes-vous?† one of the men demanded in French. â€Å"What do you want with us?† â€Å"Hilfe!† another said in German. â€Å"Let us go!† â€Å"Are you aware who we are?† one asked in English, his accent Spanish. â€Å"Silence,† the raspy voice commanded. There was a finality about the word. The fourth prisoner, an Italian, quiet and thoughtful, looked into the inky void of his captor's eyes and swore he saw hell itself. God help us, he thought. The killer checked his watch and then returned his gaze to the prisoners. â€Å"Now then,† he said. â€Å"Who will be first?† 54 Inside Archive Vault 10 Robert Langdon recited Italian numbers as he scanned the calligraphy before him. Mille†¦ centi†¦ uno, duo, tre†¦ cincuanta. I need a numerical reference! Anything, damnit! When he reached the end of his current folio, he lifted the spatula to flip the page. As he aligned the blade with the next page, he fumbled, having difficulty holding the tool steady. Minutes later, he looked down and realized he had abandoned his spatula and was turning pages by hand. Oops, he thought, feeling vaguely criminal. The lack of oxygen was affecting his inhibitions. Looks like I'll burn in archivist's hell. â€Å"About damn time,† Vittoria choked when she saw Langdon turning pages by hand. She dropped her spatula and followed suit. â€Å"Any luck?† Vittoria shook her head. â€Å"Nothing that looks purely mathematical. I'm skimming†¦ but none of this reads like a clue.† Langdon continued translating his folios with increasing difficulty. His Italian skills were rocky at best, and the tiny penmanship and archaic language was making it slow going. Vittoria reached the end of her stack before Langdon and looked disheartened as she flipped the pages back over. She hunkered down for another more intense inspection. When Langdon finished his final page, he cursed under his breath and looked over at Vittoria. She was scowling, squinting at something on one of her folios. â€Å"What is it?† he asked. Vittoria did not look up. â€Å"Did you have any footnotes on your pages?† â€Å"Not that I noticed. Why?† â€Å"This page has a footnote. It's obscured in a crease.† Langdon tried to see what she was looking at, but all he could make out was the page number in the upper right-hand corner of the sheet. Folio 5. It took a moment for the coincidence to register, and even when it did the connection seemed vague. Folio Five. Five, Pythagoras, pentagrams, Illuminati. Langdon wondered if the Illuminati would have chosen page five on which to hide their clue. Through the reddish fog surrounding them, Langdon sensed a tiny ray of hope. â€Å"Is the footnote mathematical?† Vittoria shook her head. â€Å"Text. One line. Very small printing. Almost illegible.† His hopes faded. â€Å"It's supposed to be math. Lingua pura.† â€Å"Yeah, I know.† She hesitated. â€Å"I think you'll want to hear this, though.† Langdon sensed excitement in her voice. â€Å"Go ahead.† Squinting at the folio, Vittoria read the line. â€Å"The path of light is laid, the sacred test.† The words were nothing like what Langdon had imagined. â€Å"I'm sorry?† Vittoria repeated the line. â€Å"The path of light is laid, the sacred test.† â€Å"Path of light?† Langdon felt his posture straightening. â€Å"That's what it says. Path of light.† As the words sank in, Langdon felt his delirium pierced by an instant of clarity. The path of light is laid, the sacred test. He had no idea how it helped them, but the line was as direct a reference to the Path of Illumination as he could imagine. Path of light. Sacred test. His head felt like an engine revving on bad fuel. â€Å"Are you sure of the translation?† Vittoria hesitated. â€Å"Actually†¦Ã¢â‚¬  She glanced over at him with a strange look. â€Å"It's not technically a translation. The line is written in English.† For an instant, Langdon thought the acoustics in the chamber had affected his hearing. â€Å"English?† Vittoria pushed the document over to him, and Langdon read the minuscule printing at the bottom of the page. â€Å"The path of light is laid, the sacred test. English? What is English doing in an Italian book?† Vittoria shrugged. She too was looking tipsy. â€Å"Maybe English is what they meant by the lingua pura? It's considered the international language of science. It's all we speak at CERN.† â€Å"But this was in the 1600s,† Langdon argued. â€Å"Nobody spoke English in Italy, not even – † He stopped short, realizing what he was about to say. â€Å"Not even†¦ the clergy.† Langdon's academic mind hummed in high gear. â€Å"In the 1600s,† he said, talking faster now, â€Å"English was one language the Vatican had not yet embraced. They dealt in Italian, Latin, German, even Spanish and French, but English was totally foreign inside the Vatican. They considered English a polluted, free-thinkers language for profane men like Chaucer and Shakespeare.† Langdon flashed suddenly on the Illuminati brands of Earth, Air, Fire, Water. The legend that the brands were in English now made a bizarre kind of sense. â€Å"So you're saying maybe Galileo considered English la lingua pura because it was the one language the Vatican did not control?† â€Å"Yes. Or maybe by putting the clue in English, Galileo was subtly restricting the readership away from the Vatican.† â€Å"But it's not even a clue,† Vittoria argued. â€Å"The path of light is laid, the sacred test? What the hell does that mean?† She's right, Langdon thought. The line didn't help in any way. But as he spoke the phrase again in his mind, a strange fact hit him. Now that's odd, he thought. What are the chances of that? â€Å"We need to get out of here,† Vittoria said, sounding hoarse. Langdon wasn't listening. The path of light is laid, the sacred test. â€Å"It's a damn line of iambic pentameter,† he said suddenly, counting the syllables again. â€Å"Five couplets of alternating stressed and unstressed syllables.† Vittoria looked lost. â€Å"Iambic who?† For an instant Langdon was back at Phillips Exeter Academy sitting in a Saturday morning English class. Hell on earth. The school baseball star, Peter Greer, was having trouble remembering the number of couplets necessary for a line of Shakespearean iambic pentameter. Their professor, an animated schoolmaster named Bissell, leapt onto the table and bellowed, â€Å"Penta-meter, Greer! Think of home plate! A penta-gon! Five sides! Penta! Penta! Penta! Jeeeesh!† Five couplets, Langdon thought. Each couplet, by definition, having two syllables. He could not believe in his entire career he had never made the connection. Iambic pentameter was a symmetrical meter based on the sacred Illuminati numbers of 5 and 2! You're reaching! Langdon told himself, trying to push it from his mind. A meaningless coincidence! But the thought stuck. Five†¦ for Pythagoras and the pentagram. Two†¦ for the duality of all things. A moment later, another realization sent a numbing sensation down his legs. Iambic pentameter, on account of its simplicity, was often called â€Å"pure verse† or â€Å"pure meter.† La lingua pura? Could this have been the pure language the Illuminati had been referring to? The path of light is laid, the sacred test†¦ â€Å"Uh oh,† Vittoria said. Langdon wheeled to see her rotating the folio upside down. He felt a knot in his gut. Not again. â€Å"There's no way that line is an ambigram!† â€Å"No, it's not an ambigram†¦ but it's†¦Ã¢â‚¬  She kept turning the document, 90 degrees at every turn. â€Å"It's what?† Vittoria looked up. â€Å"It's not the only line.† â€Å"There's another?† â€Å"There's a different line on every margin. Top, bottom, left, and right. I think it's a poem.† â€Å"Four lines?† Langdon bristled with excitement. Galileo was a poet? â€Å"Let me see!† Vittoria did not relinquish the page. She kept turning the page in quarter turns. â€Å"I didn't see the lines before because they're on the edges.† She cocked her head over the last line. â€Å"Huh. You know what? Galileo didn't even write this.† â€Å"What!† â€Å"The poem is signed John Milton.† â€Å"John Milton?† The influential English poet who wrote Paradise Lost was a contemporary of Galileo's and a savant who conspiracy buffs put at the top of their list of Illuminati suspects. Milton's alleged affiliation with Galileo's Illuminati was one legend Langdon suspected was true. Not only had Milton made a well-documented 1638 pilgrimage to Rome to â€Å"commune with enlightened men,† but he had held meetings with Galileo during the scientist's house arrest, meetings portrayed in many Renaissance paintings, including Annibale Gatti's famous Galileo and Milton, which hung even now in the IMSS Museum in Florence. â€Å"Milton knew Galileo, didn't he?† Vittoria said, finally pushing the folio over to Langdon. â€Å"Maybe he wrote the poem as a favor?† Langdon clenched his teeth as he took the sheathed document. Leaving it flat on the table, he read the line at the top. Then he rotated the page 90 degrees, reading the line in the right margin. Another twist, and he read the bottom. Another twist, the left. A final twist completed the circle. There were four lines in all. The first line Vittoria had found was actually the third line of the poem. Utterly agape, he read the four lines again, clockwise in sequence: top, right, bottom, left. When he was done, he exhaled. There was no doubt in his mind. â€Å"You found it, Ms. Vetra.† She smiled tightly. â€Å"Good, now can we get the hell out of here?† â€Å"I have to copy these lines down. I need to find a pencil and paper.† Vittoria shook her head. â€Å"Forget it, professor. No time to play scribe. Mickey's ticking.† She took the page from him and headed for the door. Langdon stood up. â€Å"You can't take that outside! It's a – â€Å" But Vittoria was already gone.

Wednesday, October 23, 2019

Age discrimination Essay

Discrimination against older worker occurs so often that Congress made an act to protect older workers from discrimination; this helps prevent increased unemployment for those older than 40 years of age. In 1967, congress made the Age Discrimination in Employment Act for the purpose of promoting the employment of older workers based on their ability instead of their age. This act applies to employment by public and private employers and by the unions and employment agencies, as well as foreign companies that have more than 20 workers located here in the United States. In 1967 the act covered employees between the ages of 40 and 65, the upper limit was extended 70 in 1978 and then the limit was removed completely later on. Now there is no longer an upper age limit, a 79 year old may be just as qualified as a 30 year old and should have the opportunity to prove her or his qualifications and obtain employment base on them. Another issue with this act is mandatory retirement; for the most part this has become a thing of the past. It should also be mentioned that people are living longer lives today and this act will become more and more critical for the working employees in this country. Title VII and the Age Discrimination act are similar in several ways, and both are enforced by the EEOC. But these two acts are different in two important ways; The Age Discrimination In Employment Act is more lenient than Title VII regarding the latitude afforded employer’s reasons for adverse employment decisions (). The Age Discrimination In Employment act allows an employer to argue that a prima facie of age discrimination by identifying any factors other than age that has helped make the decision. The other difference is the Age Discrimination in Employment act only protects employees that are over 40 years of age from discrimination. So, a person under 40 cannot file a claim under this act based on the claim that he or she was too young. But there are some states that have laws that could be described as reverse discrimination in situations like this. In an Age discrimination case there are several different questions and points that must be answered. The following will help describe some of this key issues in a case like this.  · The employee feels that he or she has been discriminated against because of  the employee’s age. The employee may file an action against the employer under the ADEA and prove age discrimination. The employee must establish the following four elements to prove to the court that she or he has a claim for age discrimination.  · The employee must prove that he or she was demoted or fired because they were 40 years or older. They simply must prove that they are older than 40 years of age, therefore making themselves a member of a protected class.  · Adverse employment action taken against the employee, this is proof that the employer made an employment decision that adversely affected the employee in question. This could include a decision not to hire the applicant or even fire the employee.  · Another thing the employee must prove is that he or she is qualified for the position. The position requirements must be proven and not just devised for the purpose of terminating or refusing to hire older workers. The employee must show that he or she can perform their duties at a high level or they may face not being able to continue with their claim.  · Disclaimer Treatment, this requires an employer to explain there actions if they terminate of refuses to hire an older qualified employee, while at the same time hiring a younger person. This requirement has presented difficulty for the courts.  · Employers say in the matter, this is where the employer must prove that they did not hire or terminated an older employee because of other reasons. The burden of proof now shifts to the employer to present a legitimate and nondiscriminatory reason for their actions against the employee. They must prove that there are good reasons for their actions.  · The EEOC identifies what an employer must prove in an age discrimination case brought under the Age Discrimination in Employment act as; the age limit is reasonably necessary to the essence of the employer’s business. All or most all of the individuals over that age are unable to perform the job’s  requirement adequately or some of the people over that age posses a disqualifying trait that cannot be ascertained except by reference to the age of the employee. This element of proof allows an employer to exclude an older worker from a position that may be unsafe to some older workers. This information can be obtained by OSAH databases that have included worker age as being part of the reasoning for their actions.  · Disparate treatment and disparate impact. One court case that has helped define this act is the case of Steen v. Sun Oil Company. Paul Steen was discharged by Sun Oil Company after working for them for 19 years. Steen claimed that that he was fired because of his age, but Sun Oil rebuts by standing that Steen’s discharge was necessary action in the company’s overall reorganization process. Steen had statistics that proved that an average age of employees retained was 35 and the average of the employees that were let go was 48. Steen also had a letter from the company that stated a plan of the reorganization would be † a better age distribution of executive personnel†. This court case is similar to many that have used the Age and Discrimination in Employment act as grounds for suit in court cases. One recommendation that I would have for management to follow is not to have interest in the age of employees. If they can perform the job at a high level then they are good enough to remain a part of the company. I have seen in many cases in the job I have now of where many of the most valuable employees are often those over the age of 50. They are often the employees with the most experience and act as a teacher to the younger employees.

Tuesday, October 22, 2019

Counseling an Addict

Counseling an Addict Introduction Treatment of substance abuse is a complex process that involves research and proper knowledge of the subject or victim of drug abuse. Reflectively, the process is intrinsic of background research, establishing current dynamics, and designing the right treatment.Advertising We will write a custom essay sample on Counseling an Addict specifically for you for only $16.05 $11/page Learn More Thus, this reflective treatise attempts to explicitly explore on the importance of examining family history in prescribing treatment for substance addiction. Besides, the paper explores the effects of addiction on development of children. In addition, the treatise offers a comparison between the behavior of ‘a child of an addict’ and ‘an adult child of an addict’ in order to establish appropriate approaches for offering counseling for each of these cases. Importance of Family History/Dynamics in Treatment of an Addiction Human beings fu nction on thoughts, behavior, and feelings which are part of the building blocks of a family. Every substance addict belongs to a family. In order to offer a comprehensive family therapy treatment of a substance addict, it is important to establish the state and history of the family, so validate the possible effects of disorders such as social stigma, parent neglect, and general misunderstandings which push a member to resort to substance abuse. For instance, domineering mothers or despondent guardian are likely to create an environment of anxiety and low self esteem among their children and eventually dispose them to substance abuse. Besides, a long history of overindulgence in alcoholism, crime, and aggressiveness in parents is likely to motivate low tolerance to distracters and frustrations among children.Advertising Looking for essay on psychology? Let's see if we can help you! Get your first paper with 15% OFF Learn More As a result, the children may be come poor in stress management, communication, and easily influenced by peers into substance abuse (American Academy of Experts in Traumatic Stress 2010). When this is unchecked, addiction may take control of the life of such an individual. Family dynamics are critical in understanding the origin and persistence of an addiction to substance such as alcohol and other drugs. Thus, understanding these dynamics may facilitate prescription of the right treatment for an addiction within the most appropriate method. For instance, in a family that is a victim of alcohol addiction, issues such as lack of support from either of the partners and personality variances are mostly blamed for the addiction (Craig 2004). In most instances, a father addicted to alcohol blames the nagging or abusive nature of the wife as the sole instigator of his addiction. On the other hand, the wife would portion blame to irresponsibility, insensitivity, lack of support, and indecisiveness. As opined by Savage and White (2001), â€Å"neurotic, sexually repressed, dependent, man-hating, domineering, mothering, guilty and masochistic, and/or hostile and nagging† (2001) partner would likely influence an addiction as a coping strategy. Thus, by offering treatment that incorporate counseling of such a family will facilitate quick recovery. Before administering a treatment, the counselor will have a clear picture of the situation rather than making assumptions that may not hold (American Academy of Experts in Traumatic Stress 2010). Understanding these psychopathologies of a family may facilitate establishment of the reasons for certain behavior of an addict in order to design a well research treatment that not only help the addict but also offer coping strategies for the affected family (Craig 2004).Advertising We will write a custom essay sample on Counseling an Addict specifically for you for only $16.05 $11/page Learn More How an Addiction Interrupts Developmen t of Children Child development depends on several factors. These factors include love, caring, provision of basic needs, and security. Reflectively, an addiction of a parent or guardian is likely to put children at a glaring risk of total behavioral, emotional, mental, and social development of child physical and psychological aspects of growth (American Academy of Experts in Traumatic Stress 2010). More often, these children are exposed to physical violence and they witness abuse of a spouse which expose then to trauma. Thus, â€Å"despite the fact that friends can be a buffer for the problems at home, some COAs/COSAs have a limited social life. They may avoid bringing home friends, or going out in public with their parents. They may even shy away from making friends, because they lack basic social skills or out of a profound fear that someone will find out the truth† (American Academy of Experts in Traumatic Stress, 2010, par. 6). Children exposed to an addicted parent, gu ardian, or relative are likely to become victims of sexual abuse and may be obliged to coping strategies such as fear, lack of confidence, and trauma that have negative effects on their growth. Moreover, most of these children are vulnerable to depression, eating disorders, and even unending anxiety that is associated with â€Å"advanced opposition defiant disorder (ODD) and attention deficit hyperactivity disorder (ADHD)† (American Academy of Experts in Traumatic Stress 2010, par. 9) which is associated with poor physical and psychological development of children. Comparison Between â€Å"A Child of an Addict† and â€Å"An Adult Child of an Addict† There are similarities and differences in response to an addiction for a child of an addict and an adult child of an addict as indicated below.Advertising Looking for essay on psychology? Let's see if we can help you! Get your first paper with 15% OFF Learn More Child of an addict Adult child of an Addict Poor physical health Poor physical and psychological health Always anxious, indifferent and weak Traumatized, fearful and irresponsive among peers Depression and eating disorders that may lead to allergies and other dietary complications Violent and often have series of unbecoming behaviors such as rudeness, un-accommodative, and dismissive Prone to attention deficit hyperactivity disorder (ADHD) in classroom and other social places (ICF International 2009) Prone to advanced opposition defiant disorder (ODD) characterized by rebellion without justifiable reasons Very secretive and constant low mood due to fear of rejection in self expression Have a lot of hatred and seclusion in intellectual discourse due to fear of having a divergent opinion from peers (ICF International 2009) Approaches of Working with these Children Child of an addict Adult child of an Addict Offering incentives such as rewards and constant motivati on to the child in all activities to restore confidence in the child (ICF International 2009) Offering guidance on technical activities and initiating discussions with the aim of sharing with other children on challenges that face them in their families Offering activities and lessons that aim to restore confidence in the child, and offering protection in addition to listening to his or her demands and problems Registering the child to anger, stress, anxiety management classes or any other necessary that aim at internalizing coping strategies Offering constant parental care that the child may be lacking Offering psychological support through initiating interesting topics that relaxes the mind of such a child (ICF International 2009) The Poor Child Case Study This family is faced with the issue of alcoholism. Josh and the mother have to live with depression due to alcoholism. Despite being successful, the father is a non-supportive alcoholic person. The risk factors Josh face include threat of psychological torture, broken communication and possible neglect by the father. If Josh’s mother approaches me for a therapy, I will subject her to proactive counseling. If I am approached to help Josh, I will endeavor to offer him learning and coping skills that are geared towards improving self esteem. In order to change the dynamics of this family, I will apply collective counseling since alcoholism strains is affecting the whole family. References American Academy of Experts in Traumatic Stress. (2010). Effects of Parental Substance Abuse on Children and Families. Web. Craig, R. (2004). Counseling the Alcohol and Drug Dependent Client: A Practical Approach. New York: Prentice Hall. ICF International. (2009). Protecting Children in Families Affected by Substance Use Disorders. Web. White, W., Savage, B. (2001). All in the Family: Addiction, Recovery, and Advocacy. Web.

Monday, October 21, 2019

Robespierre essays

Robespierre essays Maximillien Francois Marie Isadore de Robespierre was born on May 6, 1758, in Arras, France.He was known by his contemporaries as The Incorruptible, and also as one of the best leaders of the French Revolution. His family was said to be of Irish descent, emigrating from Ireland. His grandfather established himself as an attorney in Arras and his father followed the same profession. His father married Jacqueline Marguerite Carraut in 1757. Robespierre was eldest of four children. In 1767, Jacqueline Marguerite died, and her husband left Arras, and wandered about Europe until his death in Munich, in 1769. The four children were raised by their maternal grandparents and aunts. He was educated in Paris at the College of Louis-le-Grand and the College of Law. Robespierre became one of the most influential figures of the French Revolution and the most important interpreter of the Reign of Terror. Maximillien Robespierre became a fanatical devotee of the social theories of the French philosopher, Jean Jacques Rousseau. Robespierre was elected as deputy of the Estates- General that convened in May 1789, the eve of the French Revolution. He served on the French National Constituent Assembly, where his skills in public speaking soon commanded attention. In 1790, he was elected president of the Jacobin Club where he became increasingly popular as an enemy of the monarchy and as an advocate of democratic reform. These members did more than just listen to what Maximillien had to say, they idolized him. This fanatical leader had found his followers. The French monarchy fell in August 1792, and Robespierre was elected first deputy for Paris to the National Convention. At this convention, Robespierre urged for the execution of King Louis XVI. In July 1792, Robespierre was elected as a member of the chief executive body and soon gained control of the government. At this point, France was in turmoil. Robespierre aimed toward restorin ...

Sunday, October 20, 2019

Buying behavior, TV advertisements, ethical and unethical.

â€Å"Advertising perception has a significant impact on consumers’ intention to reject the products and the brand† (Chan et al, 2007). The marketers around the world use different kinds of promotion techniques as a tool of conveying the message about their products or services to the target consumers. Marketers tend to believe that all consumers around the world have similar needs as well as desires and that the global market is growing increasingly homogeneous (Chan et al, 2007). Therefore they try to capture the market through advertising without considering what customers expect from the firms. Due to the rapid growth in the media, all most all firms use TV as their media of promotion to grasp the target market. The Sri Lankan structure of advertising industry is also affected by globalization. At present, there are number of private and government advertising companies inSri Lanka. The advertising companies are also affected by the local FMCG companies. Due to the arising completion, companies should involve in vast promotions in order to capture the market before their competitors. It is believed that there is a relationship between TV promotions and buying behavior of consumers. In order to identify what the customer expects from marketers, it’s vital to carry out a research on how ethical and unethical TV advertisements affect on consumer buying behavior in FMCG industry inSri Lanka? 1.2 PROBLEM STATEMENT How ethical and unethical TV advertisements affect on consumer buying behavior in FMCG industry in Sri Lanka 1.3 PROBLEM JUSTIFICATION The companies that are operating in the FMCG industry inSri Lankashould focus on increasing their sales through identifying their customer expectations. Today almost all the organization around the world, use TV advertisements as a way of conveying the message about their product to the target market. Therefore it is important for marketers to identify the consumer perception about ethical and unethical TV advertisements and its impact on the company sales. Most of the companies do not analyze their customer expectations before they telecast their advertisements on TV. This has created a contradictory situation in the society which may result in negative perceptions about the product which is promoted through the advertisement. R.C. Earnest (2007), who conducted a research on ethnically targeted advertising, has found that â€Å"there were negative attitudinal, emotional, and behavioral reactions by those who are not targeted, which may result in a drop of sales.† With the arising competition, it’s important for organizations to find out the ways and means of satisfying customers in order to make the existing customer retain with the company and attract new customers through vast promotions. The level of understanding of what local customer expect from the marketers when they are doing their promotions through television is, questionable. It is important for organizations to understand and examine the impact of TV advertisements on consumer buying behavior in order to be successful in the future. 1.4 OBJECTIVES To identify how consumers react to unethical and ethical TV advertisements done by FMCG industry inSri Lanka. To find out the impact on buying behavior of the consumers depending on the ethicality and unethicality of the TV advertisements. To find out the relationship between different types of advertisements and buying behavior To find out what type of advertisements attracts more customers towards the product. To recommend alterations to enhance the quality of suitable TV advertisements inSri Lanka. 1.5 SIGNIFICANCE OF THE STUDY Companies The buying behavior of the consumers would be analyzed with regard to the TV advertisements done by companies who are operating in the FMCG industry inSri Lanka. This study will enable the companies to understand their consumers and plan their future promotions in a way in which it will increase customers’ satisfaction. The study also emphasis on possible consequences that may arise in the long run if the company target only one ethnic or religious group in their advertisements. It will also enable the companies to get an idea about the effectiveness of using Indian and other foreign TV advertisements in Sri Lankan context. As this study enables to indentify customer’s perception of the ethical and unethical advertisements, the companies would be able to fulfill customer expectations by providing what customers perceive as ethical. It will create positive attitudes towards the product and the company, ensuring their sales would not drop as a result of an unethical advertisement. Consumers As the study focuses on customer perception regarding ethical and unethical advertisements, the customers will be able to watch TV advertisements without feeling uneasy and embarrassed and they wouldn’t become offended regarding controversial advertisements Further as the production of unethical advertisements diminishes due to the awareness created among the advertising firms through the study and the consumer would be able to grasp the exact message which the company wishes to deliver to the customers when the advertisement is devoid of unethical content. The study will provide an opportunity for the customers to express their views on ethical and unethical TV advertisements. Advertising firms As the study provides details regarding the factors that should be considered when producing TV advertisements for Sri Lankan audience, the advertisement firms will be benefited in terms of understanding the target audience and to be more responsible about the content of the advertisements. The study will specify on what is ethical and what is unethical in terms of customer perspective, which should be the main concern of the advertising firms. Through the provided recommendations the firms can improve the quality of their advertisements, meeting customer expectations which will enable them to serve the society better. 1.6 SCOPE AND THE LIMITATIONS OF THE STDY. Limitation associated with this study begins with the nature of sample, which are the working women in selected areas whose minimum educational level would be the completion of GCE (A/L) and the advertisements done by companies who are operating in the FMCG sector inSri Lankawithin the time period of 2007-2008. The above mentioned sample is selected based on following assumptions: As the society acceptance is more towards the working females, the data gathered through them would be more reliable. Minimum educational level is specified considering the fact that they are knowledgeable enough to distinguish what is ethical and unethical. Further the selected area would beColombomunicipal council and the time period is specified due to time limitation and ease of data gathering. The study is carried out considering only a group of customers which might cause biasness in the findings. Selection of TV as media of advertising and FMCG industry are limiting the study to one particular sector. CHAPTER 2 2.1LITERATURE â€Å"Ethics of advertising intends to ensure that advertisers and consumers co-exist without being harmed by the messages of advertisements.† Ethical advertising provides information regarding the product without harming any parties involved as well as people who watch.â€Å"Unethical advertising, by contrast, deceives consumers by concealing significant facts about a product or service.† Unethical do not satisfy the interests and expectations of the consumers (AcaDemon, 2008) 2.2 LITERATURE REVIEW Numbers of researches around the world have carried out research to find out if there exists a relationship between TV advertisements and the buying behavior. Implications for the Western World It is interesting to observe that TV advertisements have an impact on the Buying behaviors of the New Zealandcustomers. A group of researchers who carried out a research â€Å"to examine what influences perceptions of infomercial advertising effectiveness among a sample of actual infomercial buyers† (Martin et al, 2002), have found that the consumers included in the sample which was 2,670 customers who had bought one of six different products advertised within two weeks, has admitted that the infomercial advertisements (Appendix 1) had been effective in getting them to buy the product (Martin et al, 2002). Unlike most researchers, this group has identified a relationship between a demographic factor which is age and the buying behavior of the consumers. According to the findings of Martine et al, (2002) age impacted how consumers view infomercials, as did the product type purchased. Hypotheses Ho1 and Ha1 were developed according to the findings of this study. Barrio-Garcia Luque- Martinez (2003) who conducted a research inSpainhad focused on a different aspect of advertising. In contrast to the above mentioned group, this group has selected the comparative advertising in order to find out the relationship between TV advertisements and buying behavior of the consumers. The study was carried out on the objective of â€Å"to provide marketing professionals with a theoretical outline that will allow them to understand the persuasive mechanism that underlies comparative advertising effectiveness, helping them in their marketing decision-making processes† (Barrio-Garcia Luque- Martinez, 2003). Comparing to the above group, this group had identified a negative relationship between advertisements and buying behavior of the consumers. The findings of the study states that, â€Å"increase in comparative advertising intensity negatively affect towards the brands advertised and also purchase intensions† (Barrio-Garcia Luque- Martinez , 2003). In order to gather data, they have used relatively a small sample which consisted of 720 consumers selected from four geographical areas ofSpain. The finding of this study was utilized in order to develop Hypotheses Ho2 and Ha2. Petrovici Marinov (2007), two British researchers have also concentrated on how TV advertisements affect on buying behavior of the consumers. They have used a different approach to attempt the research objective which is â€Å"to explore the relationship between determinants and primary antecedents of advertising and attitudes to advertising in the context of European Union accession countries† (Petrovici Marinov, 2007). Even though the sample selected was small (797 respondents) comparing to New Zealand researches (sample of 2,670 respondents), this group has selected their sample from two different countries (Romania and Bulgaria) which helps to broaden their study further and their findings are more reliable as they have conducted face-to-face interviews with the respondents. It is proved that brand recognition and acquisition can be achieved through realistic, truthful and fair advertising (Petrovici Marinov, 2007). Hypotheses Ho3, Ha3 and Ho4, Ha4 were developed in rel ation to the findings of this study. Romani (2006) who conducted the research inItalyhas used different types of variables compared to other western researches to test the relationship between TV advertisements and buying behavior. The variables used in this study were, willingness to buy the advertised product, trustworthiness towards the source of information and completeness or clarity of price information contained in the advertisement. The researcher has used qualitative and experimental studies in order to identify the misleading price communication strategies and consumer response to those advertisements. The respondents sample were very small (480) compared to above mentioned studies which is a drawback of the study. The conclusions drawn from the study show that there is a negative relationship between price misleading advertisements and the customer’s willingness to buy and there is a positive relationship between trustworthiness towards the source of information. The objective of the study was to †Å"investigate consumers’ reactions to advertisements containing misleading information on price† (Romani, 2006). Development of hypotheses Ho5, Ha5 and Ho6, Ha6 were based on the findings of this study. Implications for Asian countries According to R.C. Earnest (2007), â€Å"Unintended audiences often view advertisements targeted at other groups and make decisions regarding the advertisement, brand and company behind the advertising which affect future consumer behavior†. The objective of the study was â€Å"to extend current knowledge on advertising effects on those not targeted by noting unintended consequences on attitudinal, emotional and behavioral reactions† R.C. Earnest (2007). A similar type of sample which Petrovici Marinov (2007), used in their study was utilized in order to gather data. Instead of selecting the sample from two countries, R.C. Earnest (2007) has selected the sample from two distinct ethnic groups (Malay and Chinese) inKuala Lumpur,Malaysia. A fair number of respondents (200 Chinese and 199 Malays) were selected from each group and data were gathered by means of a questionnaire which was based on fiction advertisements targeted at dominant and non- dominant ethnic groups inM alaysia. Hypotheses Ho7 and Ha7 were developed on the basis of findings of this study. Chan McNeal (2003) have concentrated on an atypical aspect of how TV advertisements influence on buying behavior of the consumers. They have emphasized on parent- child communications about consumption and advertising which distinguish their study from the others. Comparatively a large sample (1,665) of parents with children aged 6 to 14 were selected from 3 cities inChinaand a questionnaire is being distributed in order to gather data. Out of all the findings of their study most relevant finding to the current study is that, pluralistic and consensual parents take their children’s opinions about advertisements in to consideration when consuming certain products. Implications for neighbor country A study conducted by Fam Grosh (2007) has derived an interesting finding from the data they gathered using 1,000 urban young adults. Even the sample selected was relatively low compared to theMartin et al’s, (2002) study, the sample was drawn from five Asian countries includingIndia. The method that they have used to gather data was telephone interviews which distinguish this study from the above mentioned studies. The respondents were questioned on their thoughts about the TV advertisements that they liked, product that was being advertised and purchase intensions. The objective of the study was â€Å"to examine likeable executional techniques in advertising across five Asian countries and their impact on purchase intension† (Fam Grosh, 2007). The researchers found that unlike in the all other four countries India is the only country where the respondents’ react for the likeable executional tools and likeable attributes such as soft sell and relevant to me, ha s positively affected the respondents’ decision to buy more of a product/ brand after they exposure to the advertisement (Fam Grosh, 2007). Further most interesting finding of the study is that unlike in other countries Indian customers have responded negatively to advertisements in which children misbehave. Hypotheses Ho8 and 8were constructed with relevant to the findings of this study. Above discussed literature illustrates that advertisements have a significant impact on consumer buying behavior. CHAPTER 3 3.1 CONCEPTUAL FRAMEWORK The following variables are derived from the literature provided in chapter 2. Independent Variables Dependent Variables 3.2 HYPOTHESES Ho1: There is no relationship between infomercial advertisements and buying behavior. Ha1: There is a relationship between infomercial advertisements and buying behavior. Ho2: There is no relationship between Comparative Advertisements and buying behavior. Ha2: There is a relationship between Comparative Advertisements and buying behavior. Ho3: There is no relationship between Realistic Advertisements and buying behavior. Ha3: There is a relationship between Realistic Advertisements and buying behavior. Ho4: There is a negative relationship between Truthfulness of the information provided and thebuying behavior. Ha4: There is a positive relationship between Truthfulness of the information provided and thebuying behavior. H05: There is no relationship between Trustworthiness of the source and buying behavior. Ha5: There is a relationship between Trustworthiness of the source and buying behavior. Ho6: There is no relationship between Price misleading advertisements and buying behavior. Ha6: There is a relationship between Price misleading advertisements and buying behavior Ho7: There is a negative relationship between ethnically targeted advertisements and buying behavior. Ha7: There is a positive relationship between ethnically targeted advertisements and buying behavior. Ho8: There is a negative relationship between Children misbehaved advertisements and buying behavior. Ha8: There is a positive relationship between Children misbehaved advertisements and buying behavior. 3.3 METHODOLOGY Population, sampling and statistical approach will be discussed under this topic. 3.4 POPULATION AND SAMPLE. Selected population for in order to gather data is working women inColombodistrict with a minimum education level of G.C.E (A/L). Below diagram elaborates the selection of sample. The sampling method adapted is a proportionate probability area sampling technique. Where the selected sample of individuals was chosen based on their geographical location (Colombo District) and were further chosen based on if they were employed and had completed the G.C.E (A/L). Since the sample is larger than 35, hence, this can be categorized as a parametric test. Note: – 16.7% is the whole Female, employed and above G.C.E (A/L) rate 19,886,000 is the whole Sri Lankan population 2,421,000 is the wholeColombodistrict population 647,100 is the whole population ofColombomunicipal council 210,546 is the whole population of Dehiwala municipal council 117,563 is the whole population of Moratuwa municipal council 116366 is the whole population of Sri Jayewardenepura municipal council 3.5 STATISTICAL APPROCH According to the table provided in the Appendix 1, multiple regression analysis should be used to analyze data. Further Martine et al. (2002) also have used the multiple regression method to analyze data in their study. In order to gather data five point Likert scale would be adapted as previous researches, Chan McNeal (2003) and Martin et al (2002) have also used the same scale to gather data. CHAPTER 4 4.1 CONCLUSION The proposed study analyzes the impact of ethical and unethical TV advertisements on buying behavior of the consumers in FMCG industry inSri Lanka. Further the study analyses the relationship of how different types of TV advertisements affect on the buying behavior of the consumers using a sample of 104 working women inColombodistrict who have completed A/L examination. Literature review of the current study provides sufficient evidence of past researches which have discussed the similar relationships between the variables selected. Further the study enables the marketers to understand the customer well and as a result they will be able to fulfill consumer expectations through their advertisements. References Chan et al. 2007, ‘Consumers response to offensive advertising: a cross cultural study’, International Marketing Review, vol.24, no.5, pp.606-628. R.C. Earnest 2007, ‘Ethnically targeted advertising views of those not targeted’, Asia Pacific Journal of Marketing, vol.19, no.3, pp.265-285. Martin et al. 2002, ‘Infomercials and advertising effectiveness: an empirical study’, Journal of consumer marketing, vol.19, no.6, pp.468-480. Barrio-Garcia Luque- Martinez 2003, ‘Modeling consumer response to differing levels of comparative advertising’, European Journal of Marketing, vol.37, no.1/2, pp.256-274. Petrovici Marinov 2007, ‘Determinants and antecedents of general attitudes towards advertising’, European Journal of Marketing, vol.41, no.3/4, pp.307-326. Romani 2006, ‘Price misleading advertising: effects on trustworthiness toward the source of information and willingness to buy’, Journal of product and brand management, vol.15, no.2, pp.130-138. Chan McNeal 2003, ‘Parent-child communications about consumption and advertising in China’, Journal of consumer marketing, vol.20, no.4, pp.317-334. Fam Grosh 2007, ‘Cultural values and effective executional techniques in advertising’, International Marketing Review, vol.24, no.5, pp.519-638. City population 2008, Sri Lanka , [Online], Available: http://www.citypopulation.de/SriLanka.html [Accessed 3rd December 2008] Department of Census statistics 2006, Bulletin of Labor Force Statistics, [Online], Available: http://www.statistics.gov.lk/samplesurvey/labourforce/mainpage.pdf [Accessed 3rd December 2008] AcaDemon 2008, ‘Papers on Ethical Advertising and similar term paper topics’, [Online], Available: http://www.academon.com/lib/paper/31480.html [Accessed 10th December 2008] Appendix (Statistical Approach) INDEPENDENT VARIABLE DATA TYPEDEPENDENT VARIABLE DATA TYPE:Buying behaviorSELECTED STATISTICAL METHOD INDEPENDENT VARIABLE 1:Infomercial advertisementsIntervalInterval Multiple Regression INDEPENDENT VARIABLE2:Comparative advertisementsInterval IntervalMultiple Regression INDEPENDENT VARIABLE3:Realistic advertisements IntervalIntervalMultiple Regression INDEPENDENT VARIABLE4:Truthfulness of the information providedIntervalIntervalMultiple Regression INDEPENDENT VARIABLE 5:Trustworthiness of the source IntervalIntervalMultiple Regression INDEPENDENT VARIABLE 6:Price misleading advertisements. IntervalIntervalMultiple Regression INDEPENDENT VARIABLE 7: Ethnically targeted advertisements IntervalIntervalMultiple Regression INDEPENDENT VARIABLE 8: Children’s misbehave advertisements IntervalIntervalMultiple Regression Appendix 2 (Operationalisation) Types of variables Measurement Questions/ Description Type of Data Independent Variables Infomercial advertisementsLikert ScaleI feel that infomercial advertisements make me buy the product compared to other advertisements.Interval Comparative advertisementsLikert ScaleComparative advertisements annoy meInterval Realistic AdvertisementsLikert ScaleI feel that realistic advertisements convince me more to buy the advertised product.Interval Truthfulness of the information provided in the advertisementsLikert ScaleI tend to purchase the product if the advertised information is trustworthy.Interval Trustworthiness of the sourceLikert ScaleI believe that TV advertisements are more reliable than other sources.Interval Price misleading advertisementsLikert ScalePrice misleading advertisements makes me reconsider when buying the relevant product.Interval Ethnically target advertisementsLikert ScaleAdvertisements targeting an ethnic group discourage me to purchase the product.Interval Children misbehave in advertisementsLikert ScaleI reject buying products that are advertised using children’s misbehaviour.Interval Dependant Variable Buying BehaviourLikert ScaleTelevision advertisements encourage me to buy the relevant products.Interval Buying behavior, TV advertisements, ethical and unethical. â€Å"Advertising perception has a significant impact on consumers’ intention to reject the products and the brand† (Chan et al, 2007). The marketers around the world use different kinds of promotion techniques as a tool of conveying the message about their products or services to the target consumers. Marketers tend to believe that all consumers around the world have similar needs as well as desires and that the global market is growing increasingly homogeneous (Chan et al, 2007). Therefore they try to capture the market through advertising without considering what customers expect from the firms. Due to the rapid growth in the media, all most all firms use TV as their media of promotion to grasp the target market. The Sri Lankan structure of advertising industry is also affected by globalization. At present, there are number of private and government advertising companies inSri Lanka. The advertising companies are also affected by the local FMCG companies. Due to the arising completion, companies should involve in vast promotions in order to capture the market before their competitors. It is believed that there is a relationship between TV promotions and buying behavior of consumers. In order to identify what the customer expects from marketers, it’s vital to carry out a research on how ethical and unethical TV advertisements affect on consumer buying behavior in FMCG industry inSri Lanka? 1.2 PROBLEM STATEMENT How ethical and unethical TV advertisements affect on consumer buying behavior in FMCG industry in Sri Lanka 1.3 PROBLEM JUSTIFICATION The companies that are operating in the FMCG industry inSri Lankashould focus on increasing their sales through identifying their customer expectations. Today almost all the organization around the world, use TV advertisements as a way of conveying the message about their product to the target market. Therefore it is important for marketers to identify the consumer perception about ethical and unethical TV advertisements and its impact on the company sales. Most of the companies do not analyze their customer expectations before they telecast their advertisements on TV. This has created a contradictory situation in the society which may result in negative perceptions about the product which is promoted through the advertisement. R.C. Earnest (2007), who conducted a research on ethnically targeted advertising, has found that â€Å"there were negative attitudinal, emotional, and behavioral reactions by those who are not targeted, which may result in a drop of sales.† With the arising competition, it’s important for organizations to find out the ways and means of satisfying customers in order to make the existing customer retain with the company and attract new customers through vast promotions. The level of understanding of what local customer expect from the marketers when they are doing their promotions through television is, questionable. It is important for organizations to understand and examine the impact of TV advertisements on consumer buying behavior in order to be successful in the future. 1.4 OBJECTIVES To identify how consumers react to unethical and ethical TV advertisements done by FMCG industry inSri Lanka. To find out the impact on buying behavior of the consumers depending on the ethicality and unethicality of the TV advertisements. To find out the relationship between different types of advertisements and buying behavior To find out what type of advertisements attracts more customers towards the product. To recommend alterations to enhance the quality of suitable TV advertisements inSri Lanka. 1.5 SIGNIFICANCE OF THE STUDY Companies The buying behavior of the consumers would be analyzed with regard to the TV advertisements done by companies who are operating in the FMCG industry inSri Lanka. This study will enable the companies to understand their consumers and plan their future promotions in a way in which it will increase customers’ satisfaction. The study also emphasis on possible consequences that may arise in the long run if the company target only one ethnic or religious group in their advertisements. It will also enable the companies to get an idea about the effectiveness of using Indian and other foreign TV advertisements in Sri Lankan context. As this study enables to indentify customer’s perception of the ethical and unethical advertisements, the companies would be able to fulfill customer expectations by providing what customers perceive as ethical. It will create positive attitudes towards the product and the company, ensuring their sales would not drop as a result of an unethical advertisement. Consumers As the study focuses on customer perception regarding ethical and unethical advertisements, the customers will be able to watch TV advertisements without feeling uneasy and embarrassed and they wouldn’t become offended regarding controversial advertisements Further as the production of unethical advertisements diminishes due to the awareness created among the advertising firms through the study and the consumer would be able to grasp the exact message which the company wishes to deliver to the customers when the advertisement is devoid of unethical content. The study will provide an opportunity for the customers to express their views on ethical and unethical TV advertisements. Advertising firms As the study provides details regarding the factors that should be considered when producing TV advertisements for Sri Lankan audience, the advertisement firms will be benefited in terms of understanding the target audience and to be more responsible about the content of the advertisements. The study will specify on what is ethical and what is unethical in terms of customer perspective, which should be the main concern of the advertising firms. Through the provided recommendations the firms can improve the quality of their advertisements, meeting customer expectations which will enable them to serve the society better. 1.6 SCOPE AND THE LIMITATIONS OF THE STDY. Limitation associated with this study begins with the nature of sample, which are the working women in selected areas whose minimum educational level would be the completion of GCE (A/L) and the advertisements done by companies who are operating in the FMCG sector inSri Lankawithin the time period of 2007-2008. The above mentioned sample is selected based on following assumptions: As the society acceptance is more towards the working females, the data gathered through them would be more reliable. Minimum educational level is specified considering the fact that they are knowledgeable enough to distinguish what is ethical and unethical. Further the selected area would beColombomunicipal council and the time period is specified due to time limitation and ease of data gathering. The study is carried out considering only a group of customers which might cause biasness in the findings. Selection of TV as media of advertising and FMCG industry are limiting the study to one particular sector. CHAPTER 2 2.1LITERATURE â€Å"Ethics of advertising intends to ensure that advertisers and consumers co-exist without being harmed by the messages of advertisements.† Ethical advertising provides information regarding the product without harming any parties involved as well as people who watch.â€Å"Unethical advertising, by contrast, deceives consumers by concealing significant facts about a product or service.† Unethical do not satisfy the interests and expectations of the consumers (AcaDemon, 2008) 2.2 LITERATURE REVIEW Numbers of researches around the world have carried out research to find out if there exists a relationship between TV advertisements and the buying behavior. Implications for the Western World It is interesting to observe that TV advertisements have an impact on the Buying behaviors of the New Zealandcustomers. A group of researchers who carried out a research â€Å"to examine what influences perceptions of infomercial advertising effectiveness among a sample of actual infomercial buyers† (Martin et al, 2002), have found that the consumers included in the sample which was 2,670 customers who had bought one of six different products advertised within two weeks, has admitted that the infomercial advertisements (Appendix 1) had been effective in getting them to buy the product (Martin et al, 2002). Unlike most researchers, this group has identified a relationship between a demographic factor which is age and the buying behavior of the consumers. According to the findings of Martine et al, (2002) age impacted how consumers view infomercials, as did the product type purchased. Hypotheses Ho1 and Ha1 were developed according to the findings of this study. Barrio-Garcia Luque- Martinez (2003) who conducted a research inSpainhad focused on a different aspect of advertising. In contrast to the above mentioned group, this group has selected the comparative advertising in order to find out the relationship between TV advertisements and buying behavior of the consumers. The study was carried out on the objective of â€Å"to provide marketing professionals with a theoretical outline that will allow them to understand the persuasive mechanism that underlies comparative advertising effectiveness, helping them in their marketing decision-making processes† (Barrio-Garcia Luque- Martinez, 2003). Comparing to the above group, this group had identified a negative relationship between advertisements and buying behavior of the consumers. The findings of the study states that, â€Å"increase in comparative advertising intensity negatively affect towards the brands advertised and also purchase intensions† (Barrio-Garcia Luque- Martinez , 2003). In order to gather data, they have used relatively a small sample which consisted of 720 consumers selected from four geographical areas ofSpain. The finding of this study was utilized in order to develop Hypotheses Ho2 and Ha2. Petrovici Marinov (2007), two British researchers have also concentrated on how TV advertisements affect on buying behavior of the consumers. They have used a different approach to attempt the research objective which is â€Å"to explore the relationship between determinants and primary antecedents of advertising and attitudes to advertising in the context of European Union accession countries† (Petrovici Marinov, 2007). Even though the sample selected was small (797 respondents) comparing to New Zealand researches (sample of 2,670 respondents), this group has selected their sample from two different countries (Romania and Bulgaria) which helps to broaden their study further and their findings are more reliable as they have conducted face-to-face interviews with the respondents. It is proved that brand recognition and acquisition can be achieved through realistic, truthful and fair advertising (Petrovici Marinov, 2007). Hypotheses Ho3, Ha3 and Ho4, Ha4 were developed in rel ation to the findings of this study. Romani (2006) who conducted the research inItalyhas used different types of variables compared to other western researches to test the relationship between TV advertisements and buying behavior. The variables used in this study were, willingness to buy the advertised product, trustworthiness towards the source of information and completeness or clarity of price information contained in the advertisement. The researcher has used qualitative and experimental studies in order to identify the misleading price communication strategies and consumer response to those advertisements. The respondents sample were very small (480) compared to above mentioned studies which is a drawback of the study. The conclusions drawn from the study show that there is a negative relationship between price misleading advertisements and the customer’s willingness to buy and there is a positive relationship between trustworthiness towards the source of information. The objective of the study was to †Å"investigate consumers’ reactions to advertisements containing misleading information on price† (Romani, 2006). Development of hypotheses Ho5, Ha5 and Ho6, Ha6 were based on the findings of this study. Implications for Asian countries According to R.C. Earnest (2007), â€Å"Unintended audiences often view advertisements targeted at other groups and make decisions regarding the advertisement, brand and company behind the advertising which affect future consumer behavior†. The objective of the study was â€Å"to extend current knowledge on advertising effects on those not targeted by noting unintended consequences on attitudinal, emotional and behavioral reactions† R.C. Earnest (2007). A similar type of sample which Petrovici Marinov (2007), used in their study was utilized in order to gather data. Instead of selecting the sample from two countries, R.C. Earnest (2007) has selected the sample from two distinct ethnic groups (Malay and Chinese) inKuala Lumpur,Malaysia. A fair number of respondents (200 Chinese and 199 Malays) were selected from each group and data were gathered by means of a questionnaire which was based on fiction advertisements targeted at dominant and non- dominant ethnic groups inM alaysia. Hypotheses Ho7 and Ha7 were developed on the basis of findings of this study. Chan McNeal (2003) have concentrated on an atypical aspect of how TV advertisements influence on buying behavior of the consumers. They have emphasized on parent- child communications about consumption and advertising which distinguish their study from the others. Comparatively a large sample (1,665) of parents with children aged 6 to 14 were selected from 3 cities inChinaand a questionnaire is being distributed in order to gather data. Out of all the findings of their study most relevant finding to the current study is that, pluralistic and consensual parents take their children’s opinions about advertisements in to consideration when consuming certain products. Implications for neighbor country A study conducted by Fam Grosh (2007) has derived an interesting finding from the data they gathered using 1,000 urban young adults. Even the sample selected was relatively low compared to theMartin et al’s, (2002) study, the sample was drawn from five Asian countries includingIndia. The method that they have used to gather data was telephone interviews which distinguish this study from the above mentioned studies. The respondents were questioned on their thoughts about the TV advertisements that they liked, product that was being advertised and purchase intensions. The objective of the study was â€Å"to examine likeable executional techniques in advertising across five Asian countries and their impact on purchase intension† (Fam Grosh, 2007). The researchers found that unlike in the all other four countries India is the only country where the respondents’ react for the likeable executional tools and likeable attributes such as soft sell and relevant to me, ha s positively affected the respondents’ decision to buy more of a product/ brand after they exposure to the advertisement (Fam Grosh, 2007). Further most interesting finding of the study is that unlike in other countries Indian customers have responded negatively to advertisements in which children misbehave. Hypotheses Ho8 and 8were constructed with relevant to the findings of this study. Above discussed literature illustrates that advertisements have a significant impact on consumer buying behavior. CHAPTER 3 3.1 CONCEPTUAL FRAMEWORK The following variables are derived from the literature provided in chapter 2. Independent Variables Dependent Variables 3.2 HYPOTHESES Ho1: There is no relationship between infomercial advertisements and buying behavior. Ha1: There is a relationship between infomercial advertisements and buying behavior. Ho2: There is no relationship between Comparative Advertisements and buying behavior. Ha2: There is a relationship between Comparative Advertisements and buying behavior. Ho3: There is no relationship between Realistic Advertisements and buying behavior. Ha3: There is a relationship between Realistic Advertisements and buying behavior. Ho4: There is a negative relationship between Truthfulness of the information provided and thebuying behavior. Ha4: There is a positive relationship between Truthfulness of the information provided and thebuying behavior. H05: There is no relationship between Trustworthiness of the source and buying behavior. Ha5: There is a relationship between Trustworthiness of the source and buying behavior. Ho6: There is no relationship between Price misleading advertisements and buying behavior. Ha6: There is a relationship between Price misleading advertisements and buying behavior Ho7: There is a negative relationship between ethnically targeted advertisements and buying behavior. Ha7: There is a positive relationship between ethnically targeted advertisements and buying behavior. Ho8: There is a negative relationship between Children misbehaved advertisements and buying behavior. Ha8: There is a positive relationship between Children misbehaved advertisements and buying behavior. 3.3 METHODOLOGY Population, sampling and statistical approach will be discussed under this topic. 3.4 POPULATION AND SAMPLE. Selected population for in order to gather data is working women inColombodistrict with a minimum education level of G.C.E (A/L). Below diagram elaborates the selection of sample. The sampling method adapted is a proportionate probability area sampling technique. Where the selected sample of individuals was chosen based on their geographical location (Colombo District) and were further chosen based on if they were employed and had completed the G.C.E (A/L). Since the sample is larger than 35, hence, this can be categorized as a parametric test. Note: – 16.7% is the whole Female, employed and above G.C.E (A/L) rate 19,886,000 is the whole Sri Lankan population 2,421,000 is the wholeColombodistrict population 647,100 is the whole population ofColombomunicipal council 210,546 is the whole population of Dehiwala municipal council 117,563 is the whole population of Moratuwa municipal council 116366 is the whole population of Sri Jayewardenepura municipal council 3.5 STATISTICAL APPROCH According to the table provided in the Appendix 1, multiple regression analysis should be used to analyze data. Further Martine et al. (2002) also have used the multiple regression method to analyze data in their study. In order to gather data five point Likert scale would be adapted as previous researches, Chan McNeal (2003) and Martin et al (2002) have also used the same scale to gather data. CHAPTER 4 4.1 CONCLUSION The proposed study analyzes the impact of ethical and unethical TV advertisements on buying behavior of the consumers in FMCG industry inSri Lanka. Further the study analyses the relationship of how different types of TV advertisements affect on the buying behavior of the consumers using a sample of 104 working women inColombodistrict who have completed A/L examination. Literature review of the current study provides sufficient evidence of past researches which have discussed the similar relationships between the variables selected. Further the study enables the marketers to understand the customer well and as a result they will be able to fulfill consumer expectations through their advertisements. References Chan et al. 2007, ‘Consumers response to offensive advertising: a cross cultural study’, International Marketing Review, vol.24, no.5, pp.606-628. R.C. Earnest 2007, ‘Ethnically targeted advertising views of those not targeted’, Asia Pacific Journal of Marketing, vol.19, no.3, pp.265-285. Martin et al. 2002, ‘Infomercials and advertising effectiveness: an empirical study’, Journal of consumer marketing, vol.19, no.6, pp.468-480. Barrio-Garcia Luque- Martinez 2003, ‘Modeling consumer response to differing levels of comparative advertising’, European Journal of Marketing, vol.37, no.1/2, pp.256-274. Petrovici Marinov 2007, ‘Determinants and antecedents of general attitudes towards advertising’, European Journal of Marketing, vol.41, no.3/4, pp.307-326. Romani 2006, ‘Price misleading advertising: effects on trustworthiness toward the source of information and willingness to buy’, Journal of product and brand management, vol.15, no.2, pp.130-138. Chan McNeal 2003, ‘Parent-child communications about consumption and advertising in China’, Journal of consumer marketing, vol.20, no.4, pp.317-334. Fam Grosh 2007, ‘Cultural values and effective executional techniques in advertising’, International Marketing Review, vol.24, no.5, pp.519-638. City population 2008, Sri Lanka , [Online], Available: http://www.citypopulation.de/SriLanka.html [Accessed 3rd December 2008] Department of Census statistics 2006, Bulletin of Labor Force Statistics, [Online], Available: http://www.statistics.gov.lk/samplesurvey/labourforce/mainpage.pdf [Accessed 3rd December 2008] AcaDemon 2008, ‘Papers on Ethical Advertising and similar term paper topics’, [Online], Available: http://www.academon.com/lib/paper/31480.html [Accessed 10th December 2008] Appendix (Statistical Approach) INDEPENDENT VARIABLE DATA TYPEDEPENDENT VARIABLE DATA TYPE:Buying behaviorSELECTED STATISTICAL METHOD INDEPENDENT VARIABLE 1:Infomercial advertisementsIntervalInterval Multiple Regression INDEPENDENT VARIABLE2:Comparative advertisementsInterval IntervalMultiple Regression INDEPENDENT VARIABLE3:Realistic advertisements IntervalIntervalMultiple Regression INDEPENDENT VARIABLE4:Truthfulness of the information providedIntervalIntervalMultiple Regression INDEPENDENT VARIABLE 5:Trustworthiness of the source IntervalIntervalMultiple Regression INDEPENDENT VARIABLE 6:Price misleading advertisements. IntervalIntervalMultiple Regression INDEPENDENT VARIABLE 7: Ethnically targeted advertisements IntervalIntervalMultiple Regression INDEPENDENT VARIABLE 8: Children’s misbehave advertisements IntervalIntervalMultiple Regression Appendix 2 (Operationalisation) Types of variables Measurement Questions/ Description Type of Data Independent Variables Infomercial advertisementsLikert ScaleI feel that infomercial advertisements make me buy the product compared to other advertisements.Interval Comparative advertisementsLikert ScaleComparative advertisements annoy meInterval Realistic AdvertisementsLikert ScaleI feel that realistic advertisements convince me more to buy the advertised product.Interval Truthfulness of the information provided in the advertisementsLikert ScaleI tend to purchase the product if the advertised information is trustworthy.Interval Trustworthiness of the sourceLikert ScaleI believe that TV advertisements are more reliable than other sources.Interval Price misleading advertisementsLikert ScalePrice misleading advertisements makes me reconsider when buying the relevant product.Interval Ethnically target advertisementsLikert ScaleAdvertisements targeting an ethnic group discourage me to purchase the product.Interval Children misbehave in advertisementsLikert ScaleI reject buying products that are advertised using children’s misbehaviour.Interval Dependant Variable Buying BehaviourLikert ScaleTelevision advertisements encourage me to buy the relevant products.Interval