Wednesday, May 6, 2020

Swot Analysis of PG - 1235 Words

SWOT ANALYSIS OF P and G P and G is one of the largest consumer goods company in the world. It markets 300+ brands in more than 180 countries. P and G is engaged in diverse products like beauty, health, fabric, snacks and many more. P and G’s leading market position with its strong brand portfolio provides it with a significant competitive advantage. But there are lot of external factors like economic slowdown, environmental factors, etc which pose a threat to P and G’s progress. Internal factors also have a large impact on the company’s growth. Thus it makes necessary for SWOT analysis in order to develop further strategies for P and G. Strengths Research and development : P and G has strong R and D capabilities. P G is ranked†¦show more content†¦For example: P and G have placed recalls on Swiffer vacuum cleaner. If they have continual recalls, it could tarnish the brand image leading to lower customer loyalty. Dependency on mature markets and specific stores: P and G’s prime focus has been on mature markets like USA and western Europe with 26% and 22% of company’s sales respectively. Even though the sales in emerging markets has been 35% of sales, P and G is not putting much effort in growing in these emerging markets. P and G has been dependent on Walmart stores for majority of its sales, but this also can have a negative impact during financial crisis of Walmart. Lack of diversified customer portfolio: P and G’s 35% of sales is contributed by top 10 customers. Thus, the company’s revenues are concentrated among a few top customers. Thus, if these top customers face any financial difficulties, the chance of affecting company’s revenue is large. Opportunities: Emerging markets: The emerging markets of Latin America, India, Middle East, Korea, etc present significant opportunities for P and G due to increase in household income and emerging middle class. These factors will drive emerging markets and will make them more attractive in the future for consumer products manufacturing companies like P and G. Technology development: With the introduction of internet, the online social networks and internet marketing has created opportunity in terms of faster development and reducingShow MoreRelatedPG Swot Analysis10435 Words   |  42 Pages having a brand with a leading market share is a key competitive advantage. A strong brand fosters consumer loyalty, which in turn creates the opportunity for additional market share growth and above-average pricing flexibility. One good example is PG’s Tide laundry detergent. Despite a selling price above that of many other brands and the entry of Wal-Mart stores Inc.’s private-label product, Tide continues to strengthen its No. 1 position in US laundry detergent sales. Market Share Advantage:Read MoreSwot Analysis Of P G895 Words   |  4 Pagesdevelop rate later on. In China and Russia, PG is utilizing its portfolio of heading brands to draw in, form and grow a system of distributors. Presently its distributor system in China reaches at around 800 million individuals. In Russia, it now has an entry to 80% of the population. Therefore, with its extending distribution system, PG could tackle opportunities in these two nations to upgrade its market share and also balance out its top line development. PG is pursuing a clearly drafted developmentRead MoreSwot Analysis Of P G s Gillette Brand1044 Words   |  5 Pagescustomer s needs and wants. Geographic Segments PG s Gillette brand is organised in five geographic regions: North America, Western Europe, Central Eastern Europe/Middle East/Africa(CEEMEA),Latin America and Asia, which is comprised of Japan, Greater China and ASEAN/Australia/India/Korea Through their innovative products Gillette always attract customers. They design product specially for particular region. Demographic Segments Gillette is a PG s world s leading male grooming brand, includingRead MoreThe Ceo Of Procter And Gamble812 Words   |  4 Pages1) Identify the CEO and characterize his leadership style. The CEO of Procter and Gamble is Alan G. Lafley. Mr. Lafley had recently retired from the company in 2009 after being CEO for 10 years. After only three years, PG’s new CEO Robert McDonald resigned because of declining sales and the complaints of investors. Thus, bringing back Alan Lafley to try and bring the company back to stability. His type of leadership style is one with high expectations of everyone within the company. He is a leaderRead MoreBlackmores1291 Words   |  6 PagesAustralian School of Business ACCT5910 Business Analysis and Valuation Lesson Plan †¢ †¢ †¢ †¢ †¢ †¢ Dot Com case study Why do we need to undertake strategy analysis? Industry I d t analysis l i Competitive strategy analysis Corporate strategy analysis SWOT analysis Australian School of Business B i Class 2: Strategy Analysis gy y Dot Com – NASDQ index from 1 Jan 1996-30 Dec 2002 School of Business B i Australian A. Why Strategy Analysis †¢ †¢ Strategy drives the actions of an organisationRead MoreA Market Analysis Focused On Procter Gamble1520 Words   |  7 PagesA Market Analysis Focusing on Procter Gamble Dorothy Dilger Herzing University November 23, 2014 A SWOT analysis is an effective tool for acquiring insight toward a company’s internal strengths and weakness, and external opportunities and threats. PG’s greatest strengths are their aggressiveness toward understanding consumer needs, strong research and development, and a diversification strategy. The company’s weaknesses are substantial competition in the consumer goods industry, andRead MoreFashion Industry Imc Campaign Lisa Brown1114 Words   |  5 PagesINTEGRATED MARKETING COMMUNICATIONS CAMPAIGN PROPOSAL    Integrated Marketing Communications Campaign Overview for Lisa Brown    1   |   P a g e                Overview As   a   small   boutique   designer   label,   Lisa   Brown   has   limited   resources   to   implement   a   detailed    marketing   plan.   However,   in   such   a   competitive   environment,   it   is   increasingly   importantRead MoreTaking a Look at Procter Analysis1005 Words   |  4 PagesIntroduction Procter and Gamble (P G) is one of the renowned and well-known firms in the world and specifically America and it was originated in 1837.This firm was founded by William Procter and James Gamble. In the beginning, they used to manufacture only soap and candles but as the time passed their growth in business was the remarkable effort. Procter and Gamble has become one of the biggest consumer goods company in the world. Their products are sold in over 180 countries, which include severalRead MoreStrategy Formulation, Situation Analysis and Business Analysis1590 Words   |  7 PagesFormulation: Situation Analysis and Business Strategy Institut fà ¼r Strategisches Management Institut fà ¼r Strategisches Management Situational Analysis Strategy Formulation - developing a corporation’s mission, objectives, strategies and policies Situation Analysis - the process of finding a strategic fit between external opportunities and internal strengths while working around external and internal weaknesses Wheelen / Hunger, 2010, p 224 SWOT Analysis SWOT- Strengths-WeaknessesOpportunities-ThreatsRead MoreCar Industry: Swot Analysis1670 Words   |  7 Pagesn d e p e n d s o n t h e i n t e r p l a y o f m a n y f o r c e s o r s t i m u l i . P r o d u c t o f f e r i n g t h r o u g h s o m e p r o m o t i o n a l m e t h o d s i s t h e i n i t i a l s t i m u l i . T h e m a r k e t i n g a n d e n v i r o n m e n t a l s t i m u l i e m e r g e f r o m c u l t u r a l , s o c i a l , p e r s o n a l a n d p s y c h o l o g i c a l f a c t o r s . T h e c u s t o m e r s j u d g e t h e d e a l s i n s e v e r a l w a y s . T h e r e p u t a

Is media very powerful in its influence Free Essays

The media is everywhere. In your homes, in schools, in the workplace. It is very powerful in its influence. We will write a custom essay sample on Is media very powerful in its influence? or any similar topic only for you Order Now It can change peoples’ lives and affect the way they think. The media is very versatile. It can be used for several purposes, from explaining things to persuading you to give money to charity or vote for a certain political party. In this essay I will compare two different media texts. They are both persuasive leaflets: the first trying to get you to chose to rent a McCarthy Stone retirement apartment, the second is advertising hiking holidays in Ireland. The former of these leaflets came through my letterbox, and is aimed at retired pensioners. The latter, I got from a travel agency. It is aimed at 18-30 year old trekkers. I don’t think one would find these leaflets anywhere else because they are very specific in both their aim and their target audience. A company called McCarthy Stone, who rent out retirement apartments to the retired and elderly, made the first leaflet. Its purpose is a persuasive advert. It has a green, black and white colour scheme, with plain modern font and important information in bold. It is laid out on an A5 sheet that isn’t folded or perforated. It has a picture, a map, and where there is a piece of important information, it is boxed out in red or green. It contains a quote from a customer, in which the lady (Mrs. Griffiths) talks about how cheap it is to heat the apartments: â€Å"It’s very reassuring to know you can keep your home comfortable all the time without the worry of facing a sudden big bill.† There are also contact details, such as an address and a telephone number, and there is a website address on the header at the top. There is a logo underneath the header with the words â€Å"McCarthy Stone† written in a semicircle above a silhouette of two people who look slightly aged. Directly underneath this, there is a slogan that reads: â€Å"The natural choice for a happy retirement.† This could be quite effective because the target audience would be people generally over sixty-five, and stereotypically, older people like to be cosy, maybe more so than younger people. About two fifths of the way down the page, there is a very large sized banner that simply says â€Å"Warm and Cosy†. This would appeal to the target audience for the same reasons as the slogan. The picture at the bottom of this page is very clever in its composition: regardless of where your eye falls, it will instantly be lead around the entire photograph. On top of that, all the furniture in the picture is arranged to make the room look bigger than it is. To enhance this effect, the furniture in the centre of the room is very thin legged and spindly with darker colour, and the furniture around the outside is quite bulky, but brightly coloured. All the colours used in the photograph are quite soft, natural colours suck as browns, yellows and reds. The walls are painted a very neutral beige colour, which allows the viewer to picture how the room would look if they lived there far easier. This photograph could almost be used to sell any kind of accommodation or furniture, yet works particularly well here because it portrays a very tranquil setting. The language is interesting in that it uses both formal and informal language, depending on what the company is trying to say. This could be very effective, but in this case it is poorly edited and sends out a very confused message. It uses quite a lot of persuasive vocabulary, and involves the audience very well, but still insufficiently. It concentrates a lot on a story about an old woman who has one of these homes. In honesty, no reader wants to read about the success this company achieved for another person – at least not to this extent. There are a couple of examples of superlative language, such as â€Å"highest† and â€Å"latest†. One of my favourite pieces of language in this leaflet is an oxymoron that reads: â€Å"It all adds up to costing you less† This short sentence is very clever, because it is just ludicrous enough to get the reader to stop and think about what they are reading. I think this would be quite successful in its aim, largely because its target audience is so limited, and it is easier to appeal to a fifteen-year age range that, for example, a forty-five year age range. The informal language would appeal, stereotypically, to the ‘lower-class’ type person, and the formal would appeal, again stereotypically, to the ‘upper-class’ range. The second leaflet is advertising trekking holidays in Ireland, under the company name ‘Shamrocker’, carrying the slogan: â€Å"World famous adventures for backpackers.† Its purpose is to advertise. The layout is quite different from the first leaflet; it is much less structured (i.e. it doesn’t look at first glance as if it has been aligned to a grid) whereas the first leaflet looks very square. However the colour scheme is similar, including lots of green and dark blue (like the black on the first leaflet). It is presented on double-sided A4 thick paper, which like the first leaflet is unfolded and imperforated. There are many images, including CGIs, maps and photographs. The font of the writing varies quite severely – there are seventeen different styles of writing in total. There are segments of writing enclosed in boxes to highlight information that the company wants you to see first. There are, like the first leaflet but more detailed, contact details, including email, telephone number, website and company address. There are about three photographs on this leaflet, but they are all quite small. However, they are clear enough, and all have a similar theme – a group of people looking happy, either in front of a rock or an Irish road sign. On the front, the top quarter of the page is taken up by the words â€Å"The Shamrocker Ireland: Live the legend†. Underneath this, there is a photograph of a man in front of what appears to be a large grave headstone. The back is mostly blocks of writing, laid out in blocks under headings such as â€Å"Our Mission†, and then descriptions of different holidays the company offers. The lower eighth is the small print. The language used is very informal, persuasive and superlative, but it is in my opinion slightly boring. It involves the audience well, but there isn’t much to say for this leaflet when it comes to language. This leaflet would be very successful towards its target audience (which is stated in the small print, and is â€Å"17 – 35 year olds†) but wouldn’t get much interest for younger or older people because as they are trekking holidays, people over this age group may be physically unable to participate, and people under this age range may not be interested in walking for six days, just for the sake of walking, with no ‘prize’ or incentive. The informal style would appeal to the target audience. In this essay, I have compared two different leaflets, both advertising. They both would, in theory, be very effective at achieving their goals. I believe that the companies chose the leaflet as their selected form of media because it can reach many people; they are cheap to produce in mass and are effective at getting their message across. How to cite Is media very powerful in its influence?, Papers

Rise of Social Electronic Commerce †Free Samples to Students

Question: Discuss about the Rise of Social Electronic Commerce. Answer: Introduction Social electronic commerce is new subset of electronic commerce and it is involved with social media and online media. This study focuses on mainly on the impact of the recent emergence of social electronic commerce and its impact on business profitability. In the first part of the study, the main objective of the research project will be described. In the following section, scholarly articles and papers will be reviewed in the literature review section. Literature gap will be highlighted in order to explore research questions. This study will also provide research methodology and highlight the process of data collection for research project. The objective of the project is to explore the emergence of social electronic commerce and its problems and opportunities on business. Objectives of the research project can be segregated: To explore the concept of emergence of social electronic commerce To highlight the problems and opportunities in social electronic commerce To recognise the impact of social electronic commerce on business profitability To recommend some possible strategies that a business can take in implementing social electronic commerce Project Scope The project covers the concept of social electronic commerce and its recent emergence in business premises. The scope of the study is broad as it discusses various ideas related to social electronic commerce. In recent time, businesses are taking the advantage of online market and social electronic commerce adds more marketing opportunity to reach maximum customers. Social electronic commerce can be described as expanding strategy of e-commerce. This concept was coined in the year 2005 by Yahoo in order to measure product interest of the customers. Social electronic commerce has its own set of characteristics and shopping through using online platforms always inspires others to recommend and purchase. As stated by Bharadwaj et al. (2013), social electronic commerce are of two types, first one is e-commerce site itself as this platform is managed by the owner of the company and other is social media sites and people can make comment about products by taking names. Some of the famous social electronic commerce platforms are Pinterest, Shoppe, Facebook and Soldsie. As opined by Baethge et al. (2016), it is one of the biggest challenges for the e-commerce sector to impact on the influence of purchasing experiences. People can buy the products through online platforms and they can face the technological glitch or they can face issue from e-wallet. Moreover, when the products get delivered, customers may find that the products do not match the expectation of them. These types of experiences make the customers dissatisfied and they provide negative comments on social media pages or in community pages. As pointed out by Spencer et al. (2014), if the e-commerce has social interaction pages, users may provide negative customer experience as they might face cumbersome and lengthy process of purchasing the products. In addition, customers read reviews of the products before making purchase and social interaction about those particular products can influence their minds. 40% of the customers leave the products and change their mind because of reviews gave on-e-commerce page in Australia (Alalwan et al. 2017). Customers switch the brand if the products have negative comments on review section and customers are no longer loyal to the brands. As highlighted by Castells (2015), organisations have been facing issues in making a perfect PR team who can adjust the brand reputation on social media pages as a single comment of the customer can go viral and harm the reputation of the brand. Benefits of social electronic commerce Customers in a global context are shifting mainly to the online platform in order to buy their products. E-commerce disrupted traditional business model and people like to make a purchase from e-commerce. However, from the perspectives of e-commerce organisations, social interaction on e-commerce makes the business more transparent. Customers can make their decisions perfectly and they can interact with other customers before and after purchasing. Customers service teams do not now need to provide answers, other users can provide the clarification of any customers before that (Celine 2012). E-commerce companies are now getting better exposure and brand awareness because of social interaction on social media pages. E-commerce businesses want to generate profitability from social electronic commerce through implementing this strategy. As suggested by Collins et al. (2014), e-commerce companies give extra discount or points in making review or comments of any products under the name of verified customers'. Moreover, the e-commerce companies make a connection to the customers through doing surveys and polls. Business organisations are taking the help of social media analytics that provides respond the customers accordingly. Social media analytics bring development in understanding the behaviour of users on social media platforms. Todays generation is smart and technology friendly. Before making any purchase, they check users ratings and comments about the products. Before making decision of purchase from an e-commerce, they also search the users experience about this. As opined by Sashi (2014), social electronic commerce helps to get advice from trusted individuals and if the customers are not satisfied with the e-commerce site or products, people may not make the purchase from this e-commerce. According to Edosomwan et al. (2016), social electronic commerce provides customers to compare the products and research about the products; this advantage can lead to purchasing of the products also. In previous time, scholars identified the emergence of social media and e-commerce; they provided the benefits and issue both of these. Amalgamating the idea of social interaction on e-commerce is new. Social electronic commerce have several opportunities as well as problems. The businesses which work on social media platform have opportunities of enhancing their sales volume, expanding the markets and of innovating their products and services as per the requirements of the customers. How does social electronic commerce can influence the customers decision making? What are the problems and opportunities of social electronic commerce? What could be some possible recommendations to business in implementing social electronic commerce? Research Design and Methodology In this project, the researcher will collect primary data. The researcher will gather qualitative data through conducting interviews. According to Mackey and Gass (2015), qualitative data is information about observation and quality that cannot be measured. The researcher will interviews 3 Australia based e-commerce managers through Skype. Moreover, the researcher will make 5 open-ended questions in order to ask e-commerce managers based on social electronic commerces challenges and opportunities. The sample size of qualitative research will be 3. The researcher will select non-probability sampling technique. According to Taylor et al. (2015), in non-probability sampling technique, samples are gathered in a method that does not provide all the persons in the population equal chances of being selected. In qualitative research, the researcher will conduct interviews and the researcher will take only credible information from the interviews. The researcher will take interviews to the trustworthy managers. In addition, transferability is the ability to which the results can apply to other settings also. The researcher will corroborate the research findings on the secondary sources also and the researcher will definitely recheck the data. In order to collect the quantitative data, the researcher will conduct a survey. According to Orkin (2014), quantitative data deal with numerical data that can be measured through quantitative and statistical analysis. The researcher will select 55 customers of e-commerce through social media pages who will be interested to answer survey questionnaire. The researcher will make 10 close-ended multiple type questions about social e-commerce and its impact on business profitability and preferences of the customers. The researcher will upload this set of questions on community page on social media network and ask the users to answers the questions. This survey data will be analysed with the help of quantitative data analysis and will be presented through tables and excel bar graph and pie-charts The researcher will select the sample of 55 Australian customers of e-commerce organisations. Sample size will be 55. The researcher will select simple random sampling technique. According to Smith (2015), a simple random sampling technique is a subset of the statistical population through which each individual of the population has equal opportunity of getting selected. The researcher will not be biased in analysing the quantitative data. In quantitative data, repeatability is the fact to become reliable as obtaining results can be repeated and it does not need reliability. The researcher will use focus group before making choice of sampling and in case the information would contradict with previous observation, the researcher will recheck the data and ensure conformability. Research Limitations The Researcher may face the issue of time constraint as being student it is difficult to continue a research. The budgetary limitation will be another issue for the researcher. Moreover, the researcher may face limitation in handling a large amount of data as a researcher will do both qualitative and quantitative research. The researcher would select the sample size of 55 in conducting a survey and only 3 for interview; this is quite a small sample. If the researcher would have got extra time, he would have chosen the large sample to get an unbiased judgement. Time Schedule Activities Week 2 Week 4 Week 6 Week 8 Week 10 Week 12 Selection of topic and research question ? Review the literature ? Identify the research methodology ? Collection of primary data ? Analysis of data ? Drawing conclusions and recommendations ? Table: Gantt chart (Source: Created by researcher) Conclusion The researcher anticipates that respondents of the survey and interviews will put their views about social interaction on e-commerce. Social electronic commerce can also create high-level competition for the businesses and the other problem can be inactive users on the internet. At last, the strategic actions are discussed which can be taken while adopting e-commerce on social platforms. The companies should create an appropriate strategy before entering into social e-commerce and should build excellent social analytics so that the company can run on the basis of needs and requirements of the customers. Reference List Alalwan, A A, Rana, N P, Dwivedi, Y K and Algharabat, R, 2017. Social Media in Marketing: A Review and Analysis of the Existing Literature.Telematics and Informatics. 1(2), pp.43-45 Baethge, C, Klier, J and Klier, M 2016, Social commercestate-of-the-art and future research directions,Electronic Markets,26(3), pp.269-290. Bharadwaj, A., El Sawy, O.A., Pavlou, P.A. and Venkatraman, N.V., 2013. Digital business strategy: toward a next generation of insights. International Journal of marketing. 9(1), pp.23-25 Castells, M., 2015.Networks of outrage and hope: Social movements in the Internet age. John Wiley Sons. Celine, A.R.C.A., 2012. Social Media Marketing benefits for businesses.Master of International Marketing. Clemence, A., Doise, W. and Lorenzi-Cioldi, F., 2014.The quantitative analysis of social representations. Abingdon: Routledge. Collin, P, Rahilly, K, Richardson, I and Third, A 2014, The benefits of social networking services. Edosomwan, S., Prakasan, S.K., Kouame, D., Watson, J. and Seymour, T., 2016. The history of social media and its impact on business.Journal of Applied Management and entrepreneurship,16(3), p.79. Mackey, A. and Gass, S.M., 2015.Second language research: Methodology and design. Abingdon: Routledge. Orkin, K., 2014. Data Collection Methods. InEncyclopedia of Quality of Life and Well-Being Research(pp. 1430-1432). Berlin: Springer Netherlands. Sashi, C.M., 2014. Customer engagement, buyer-seller relationships, and social media.Management decision,50(2), pp.253-272. Smith, J.A. ed., 2015.Qualitative psychology: A practical guide to research methods. London: Sage. Spencer, S., Harding, J., Sheahan, J. 2014.Social eCommerce: Increasing Sales and Extending Brand Reach. " O'Reilly Media, Inc.". Taylor, S.J., Bogdan, R. and DeVault, M., 2015.Introduction to qualitative research methods: A guidebook and resource. New Jersey: John Wiley Sons.

Thursday, April 30, 2020

Mill’s Liberty Principle Essay Example Essay Example

Mill’s Liberty Principle Essay Example Paper Mill’s Liberty Principle Essay Introduction John Stuart Mill was born in London to a philosopher father, James Mill, who educated him along with philosopher Jeremy Bentham. Mill was therefore largely influenced by Bentham’s utilitarian thinking, and such influence became apparent in Mill’s own works later on. (Mautner).Mill’s liberty principle was laid out in his essay that was published in 1859, entitled On Liberty. This essay brought about great controversy, and raised varying feelings of approval and disapproval from society. (Mautner). On Liberty, which was destined to be a classic piece on libertarian philosophy, became controversial because of its â€Å"rational justification of the freedom of the individual in opposition to the claims of the state to impose unlimited control.† (Serendipity).The essay focused on civil or social liberty, which means the â€Å"nature and limits of the power which can be legitimately exercised by society over the individual.† Mill espoused the principle of liberty of action of men with full mental faculties, limited only by the principle of self-protection. (Mill, 1859).Mill’s principle of liberty was a product of the feeling he and his wife shared, as expressed in their letters to one another. Both had observed that there has been a significant decrease in the number of bold and adventurous individuals in society. This observation, coupled with Mill’s reading of Alexis de Tocqueville’s Democracy in America, bred disquiet in him. He and his wife thus feared that middle-class conformism and mass democracy had come to take away individual liberty. They feared that mass democracy would lead to the creation of the tyranny of the majority, which would seriously undermine individual freedom. (Mautner).Mill’s anxiety is more concerned with liberty in the private realm. He was worried that the development of liberalism at his time was not sufficient to protect private, individual liberty. In more concrete terms, M ill perceived two threats to individual liberty. The first one is the threat of overpowering governmental authority, mainly exercised through codified laws and appointed or elected public officials. Second is the â€Å"excessive power of public opinion and its unwritten laws,† which Mill referred to as the tyranny of the majority. (Johnston, 1999).As to the first threat or governmental authority, Mill maintained that there must be sufficient room left for individual determination of man’s actions, rather than state determination. This must be so, despite the alleged reliance of the government on the democratic participation of the people. (Kemerling).On the other hand, Mill appeared to be more fearful of the effects of the second threat to individual liberty, which is the tyranny of the majority. (Serendipity). While state control can only occur through the acts of public officials, society can impose its own mandates, through means more powerful and more extensive in reach than the state’s political functionaries. Society can form itself into a tyranny whereby only certain ideas, opinions and feelings are sanctioned, effectively restraining the ideas, opinions and feelings of a few dissenters. This in effect is a restriction on individual liberty, which is much more formidable than political oppression. The minority would be compelled to fashion themselves in such a way as to conform to the dictates of society. (Mill, 1859).Reacting on these two perceived threats to individual liberty, Mill’s On Liberty put forward a brave statement. It is of the position that there is almost no instance when governmental encroachment on individual freedoms would be justified or warranted. The civil liberties of citizens must, at all times, be protected against the threat of abuses of authority. (Kemerling).Mill posits that there is one simple principle that must govern man in all his dealings in society. Society and the state have many mechanisms for imposing compulsion and control over man, which may consist of physical force or moral coercion. According to Mill, the former may appear in the form of legal penalties, while the latter may appear in the form of public opinion. Despite these, man must have liberty or independence in matters that only concern himself. As Mill succinctly put: â€Å"Over himself, over his own body and mind, the individual is sovereign.† (Mill, 1859).Mill’s emphasis on liberty entails that man deserves not to be hampered by society. Where nobody would be harmed by a man’s actions, his actions are exclusively his business. The same goes true for man’s thoughts. They must always be afforded protection against unjustified encroachment. (Mill, 1859).Man’s actions and thoughts must arise without restrictions, controls or limits, as a result of his character as an individual human being. Different people have different preferences and choices regarding the various detai ls of his life, and people owe it to each other to respect each person’s right to follow their own paths. According to Mill, despite the prevailing opinions and ideologies, each person has the right to choose his own unique path in life, even if it means having to go against the grain of society. Thus, the two great threats to liberty, government encroachment and the tyranny of the majority, must not curtail the liberty of persons, especially in the realm of thought. This is so, because it is in the realm of thought that great personal genius can be manifested, usually signified by unconventionality and originality. (Mill, 1859).It can be argued by critics that Mill’s arguments seem to be based only on a positive assumption of the inclinations of man. As Mill advocates almost absolute freedom of man in his thoughts and actions, he probably worked on the belief that man’s natural tendency is towards his development only, and not towards his ruin. Then if this is so, empirical evidence could easily rebut such an assumption, because not a few men had engaged in harmful ways that have led to their detriment. However, Mill’s liberty principle does not go so far as making such a huge assumption on the nature of man.As a matter of fact, Mill had some suggestions of the possibility that man would make wrong decision in his exercise of individual liberty. Mill, however, was not concerned about such mistakes. Liberty to him was so encompassing that nobody has the right to interfere with matters which are properly within a man’s private interests. This is so, despite the fact that man’s choices might turn out to be detrimental to him in the long run. (Johnston, 1999).For Mill, concerns of society or the government on the physical or moral good of an individual still would not be sufficient to justify any encroachment on his liberty of thought and action. While concerns regarding another person’s interests are commendable, such cannot be used to justify unauthorized intrusion into that person’s life. One can convince another person the better path to take, or show the errors of his ways, but that would be the most that such person can do to help another. He cannot go so far as to compel another to adopt his philosophies in life. In the same way, other persons who might disagree with him would not have the right to tell him off. Thus, Mill wrote:His own good, either physical or moral, is not a sufficient warrant. He cannot rightfully be compelled to do or forbear because it will be better for him to do so, because it will make him happier, because, in the opinions of others, to do so would be wise, or even right. These are good reasons for remonstrating with him, or reasoning with him, or persuading him, or entreating him, but not for compelling him, or visiting him with any evil, in case he do otherwise. (Mill, 1859).;However, Mill provided a single exception to the abovementioned general rul e of individual liberty: self-protection. Mill stated: â€Å"the only purpose for which power can be rightfully exercised over any member of a civilized community, against his will, is to prevent harm to others.† (Mill, 1859).Mill thus introduced the harm principle, which is the standard that can be used to evaluate government interference as either justified or unjustified. Harm to others, and not to the person whose acts are subject of inquiry, is the operative fact that would sanction curtailment of liberty. Thus, where an individual’s actions start posing a threat to other persons, and these actions begin to extend their effects to the realm outside the individual’s sphere of responsiiblity, society and government would be justified in stepping in to provide restraints. It is clear, therefore, that Mill draws an unambiguous line between state and private interests: â€Å"individual citizens are responsible for themselves, their thoughts and feelings, and th eir own tastes and pursuits, while society is properly concerned only with social interests.† (Kemerling).The power of government and society to interfere with the liberty of thought and action of a person can only be rightfully exercised with the end in view of preventing harm to others. Thus, there would be a legitimate state and societal interest in deterring or penalizing actions that are â€Å"calculated to produce evil to some one else.† In conclusion, Mill’s liberty principle states that man is individually responsible for his own conduct and he is free to do whatever he wants, provided he does not harm others. Man is only accountable to the government and society for conduct that concerns others.Applying Mill’s liberty principle to the plight of homeless people in Chicago suburbs, it can be suggested that the state has no legitimate interest nor authority in interfering with these people’s activities, provided that they do not harm others wh o are living within the area. Thus, provided that these homeless people do not engage in crimes, drug dealing or violence, to the detriment of the rightful population of Chicago suburbs, there is no justifiable reason for encroaching upon these people’s liberty to live in that kind of situation.However, where there are legitimate concerns that threaten the peaceful state of living in Chicago suburbs as a direct result of the presence and the actions of homeless people, such as increased crime rate, pollution or health issues due to overpopulation, then the government would be justified in stepping in to deter these harmful actions. Detrimental actions are no longer covered by the protection advocated by Mill in favor of individual liberty. Mill’s Liberty Principle Essay Thank you for reading this Sample!

Monday, April 13, 2020

A Difficult Essay Topic

A Difficult Essay TopicIf you are like many students, it can be very difficult to write a difficult essay topic. You need to look at the topics that you have researched and determine what the content is. Is it an essay that will advance your career or another topic?The most common problem with this is that students simply choose a topic that sounds interesting. In most cases, these topics have little bearing on their careers. The topic does not advance the discussion and often the topic turns into a footnote to a discussion about something else. Once you start in on the easy topics, you find that you have no further information about the topic.That is why it is important to know the content of the difficult essay topics. You want to make sure that you are covering the content that is important to the topic. Often times you will not get a chance to get the information that you need from the easy topics.So what are some difficult essay topics? There are lots of things that you can rese arch.One of the most difficult of all difficult essay topics is the statistics of American soldiers. What makes this difficult is that statistics are an important part of life in America. The problem is that statistics are hard to understand and those who are searching for statistics need to become familiar with other areas.There are also some other problems that you have to look at in order to find the content that you want. For example, if you are trying to find an easy topic, there are going to be many times when you have grammar and spelling issues. It is easy to have those issues because of the writing style you will be using.One of the hardest of all difficult essay topics is the topic that involves being away from home for a long period of time. This is another area where you can get very little help from others in finding the right topics.

Saturday, March 21, 2020

Information systems management in practice

Information systems management in practice DQ1 Security What information model would you choose for evaluating data security policies at the department level? Why? How would that information model be used?Advertising We will write a custom coursework sample on Information systems management in practice specifically for you for only $16.05 $11/page Learn More The information model incorporates all departmental data within the organization. Every department has its own data processing technologies, which it uses to conduct analysis. For instance, the finance department has financial data, the marketing department has data on the consumer trends and sales have data on the demand and supply of the product (McKeen, Smith 2009). The role of Data Resource Management model is to network data by providing a central point where data is controlled and regulated such that unauthorized persons cannot access it. The information model must meet the following criteria to be incorporated at the departmental level. T he first one is that the data resources management model must have back up strategies or security measures to ensure that data cannot be lost even when the machines are not in good condition. The Backup may involve having remote computer storage of data. The second criterion is that the Data resource management system must be firewalled to protect the computer systems from malicious software attacks and other encrypted messages. The data resource should be easy to use, which can be done by training the employees working in the data resource management on how to use the system (Alter, 2011). For the departments to succeed in Data Resource Management in an organization, the data resource system must be implemented in three levels. The first level is the strategic level, which involves aligning the data management system with the business strategic goals. This means that if the business plans to be global, the data resource manager must plan how to secure and process the data. The busi ness strategic plan is important when formulating and designing the information technology architecture and processes to be used in the organization. However, the Data Resource Management system may fail to satisfy the increased demand in future.Advertising Looking for coursework on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The second level of evaluating the security as well as the capability of the data resource management is the tactical level (Luftman, 2012). This level involves planning the enterprise resource software to use in data resource management. There is creation of networking infrastructure to connect various departments with in order to create a central data location. The third level of evaluation and implementing data resource system is the where the plans and the decisions made are implemented (McKeen Smith, 2009). DQ2 Value of Data How is the value of information or data assessed at the department level? Does that differ at other levels? The value of information or data in the departmental levels is assessed differently at the departmental level in comparison to the organizational level. The first reason of assessing this information differently is that it must be relevant to the functions of the department. Information that does not relate to the department directly is irrelevant. This differs from the evaluation of information at the organizational level. At the organizational level, all information concerning the organization is of value as it depicts various aspects of the organization. The management needs this information to make decisions. The decisions made by the management must have basis of selective information, that is, information from all departments such as finance, marketing sales, purchasing, and management information systems. The data is therefore valuable to the organization if it relates to the organization and valuable to the department if it relates to the department (Stanford, 2010). At the departmental level, the data assessment is in a number of ways. The first way of assessing the data is by ascertaining the origin of the information. For the information to be considered critical at the departmental level, it must have its origin from within the department. For instance, the information in the finance Data Resource System will have the information about the financial reports of the company generated by the finance department. This information will certainly be crucial to the finance department (Sprague, 2009). Apart from the information generated internally the other assessment criteria regards evaluating information related to the department but generated by other departments. For instance, the finance department may need the sales records from the sales department in order to calculate the profits as well as the cash flow of the organization. Such information is of value to the department although not generated b y the department.Advertising We will write a custom coursework sample on Information systems management in practice specifically for you for only $16.05 $11/page Learn More The other criteria that assign value to information are the information released by the management. For instance, the management may release memos or other instructional policies to the department. Such kind of information is crucial to the department although not generated by the department (Kroenke, 2012). DQ3 Doctoral DNA Theories, models or frameworks that support the topic and the role they play in your research, and how might you find them? Part one The following are the relevant theories that relate to the use of information. The first relevant theory is the coding theory, which involves encoding information to create a code. This theory is the based on the premise that to transmit information from one location to another one needs to create codes or secretive information typos th at prevents the information from being read or used by unauthorized persons. The codes differ depending on the coding methodology (Fazlollah, 2010). Part two There are two types of coding. The first one is the lossless data compression where the compressed data is not lost. The other is the loss data compression whereby the information is coded into bits, which is the universal data language and then transmitted to the networks. Once it gets to the destination, the recipient can encode the data and use it. The other theory is the channel capacity theorem that emphasizes on coding information as it goes through the transmission channel such that the noise within the channel will have little or no impact on the information transmitted over the channels (Fazlollah, 2010). These theories play a vital role as the research may focus on whether they apply in the data resource management. The research seeks to identify the theory or models that data resource managers use to encrypt informat ion through the networks when sharing data. One may also establish whether these methods have been effective in protecting the information from being accessed by unauthorized persons. The research identifies the challenges faced in implementing the data resource system based on the excellence of the company (Stanford, 2010). These two theories are imperative in assessing and implementing data management strategies because they determine the method to be used when encrypting or coding data. It is also necessary in formulating the necessary data in the organization to create a good system that will help the company receive and disseminate data between the departments. The methods used in encrypting and protecting data determine whether unauthorized persons may access it.Advertising Looking for coursework on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Review of Marine Corps Recruiting Information System department’s data security policy and recommend improvements Introduction The following discussion is about Marine Corps Recruiting Information System department’s data security policy. It examines the risks and threats related to the policy in the organization. It also looks into the data recovery plan of the organization in cases of lost data. It provides information on how the risk analysis and data recovery plan affects the information technology department and what may need improvement in future to deal with threats and challenges The Marine Corps recruiting information system department deals with the recruitment of the Marine Corps into the Marine Corps services in the United States of America. The department is critical as it has information about the recruitment of the Marine Corps staff working throughout the country. The department processes online applications about development in the country (Clemons, 20 12). This means that the department is susceptible to malware in the company. The malware are computer viruses that destroy computer programs. The computers of this department are also susceptible to the spyware especially because they deal with issues of defense. The spyware software monitors the use of computers in the department of defense. They are dangerous as they can expose vital information regarding the security issues. The malware may acquire passwords details enabling hackers to access the system and distort facts and information about recruitment (Schiesser, 2010). The spyware may also expose vital information about the staff working in the marine department to the terrorists and people with malicious intentions. It may also expose the system such that the selection system recruits incompetent people to work in the Marine Corps. The other security issue or risk in this department is the cyber terrorists where the department may be a target of cyber terrorists who disrupt Marine Corps department activities to delay recruitment. In addition, they ensure that there is a military workforce problem thereby making the country susceptible to terrorist’s attacks (Beynon, 2009). Data recovery plan There are situations where the department must have data recovery procedure. The instances that lead to loss of data make the department susceptible. For example, the department location is susceptible to the thunderstorms, lightening and other natural calamities that may lead to physical destruction of the data storage location. If there are no mechanisms to recover the data lost, there will be an absolute loss of vital defense information. The second instance relates to cyber attacks or instances where malware, virus or spyware access the data thereby destroying the programs and other vital information managed by the department. This may led to loss of data if there is no other place where data is stored and protected (David, 2010). The other risk relates to the employees working in the department as they can also hack the information system thereby accessing unauthorized information. This means that department must have policies on how to protect the data internally from access by unauthorized persons who may access private information about the department and affect recruitment of new employees. This can be prevented by having passwords and biosensor security interfaces that sense the person operating the machine such that no unauthorized person access information (David, 2010). When dealing with data resource management in the department of Marine Corps recruiting information system department’s data security policy and recommend improvements, there are several ways of recovering data. The first one is that the department has remote computers that store the data and are not in the same physical location (Sprague, 2009). Any data transmitted to the data storage computers goes directly to the remote computers for storage. Th is ensures that in case of an attack in the location of the computers or electronic systems storing data the department can recover the data stored in the remote locations (Stanford, 2010). The other data recovery mechanism involves creation of back up discs to store small amounts of data in the computers affected by viruses and malware software. This data helps the department to create a good strategy of preserving the information so that it can be accessed in future. The computers also have firewall protection to prevent dissemination of vital information from the data centers to any other unauthorized location (OBrien, 2011). The effect of the risk analysis and recovery plan on the Marine Corps Recruiting information systems The risk analysis is imperative to this department as it ensures that unauthorized person cannot access the department’s vital information. The risk assessment also creates awareness of the risks that exist concerning data management. It exposes loopho les that may serve as an opening to the malware, spyware and other malicious information programs intended to harm the operations of the department (Sprague, 2009). To deal with this problem, the recovery plan involves ensuring that the computers have firewall applications to prevent entry of unintended programs and codes that are intended to harm the computers and data storage facilities. After ensuring that there is firewall protection, the computers must have antivirus programs to delete such programs once detected. The antivirus should be updated once it expires so that it does not become virus to the computers. To ensure that there is no loss of data because of natural calamities the Data Resource Management System use automatic remote updating technology that updates additional information to the remote computer every hour. This ensures that there cannot be absolute loss of data stored in the departments’ data management system. The other strategy is to have data stored in discs that are stored in secure places such that if there is a problem that affects one computer and not the whole system, the data in the computer can be recovered from the remote data saving discs for the computer (Cabral, 2010). Conclusion Data recovery is an imperative operation of the Data Resource Management. Every manager should ensure that the data in the company is safe and can be retrieved when need arise. The creation of the data recovery department in the company ensures that there is an appropriate way to of dealing with data losses. No data would be lost if the data resource manager constantly evaluates the risks and data recovery plans. The management should be informed that any data lost in the company affect the operations as well as the output. The employees should be informed about how to maintain safety of the data to avoid any loss. References Alter, S. (2011). The work system method: connecting people, processes, and it for business results. California: Wor ks System Press. Beynon, P. (2009). Business information systems. Basingstoke: Palgrave Press. Cabral, J. (2010). Is there need for data resource management? The Elon Journal of Undergraduate Research in Communication, 2, 5-13. Clemons, K. (2012). IS for sustainable competitive advantage. Information Management, 11, 131-136. David, C. (2010). Information theory, inference, and learning algorithms. Cambridge: Cambridge University Press. Fazlollah, R. (2010). An introduction to information theory. New York: McGraw-Hill. Kroenke, D. (2012). Experiencing management information system. New Jersey: Prentice Hall. Lindsay, J. (2010). Information Systems – Fundamentals and Issues. London: Kingston University Press. Luftman, J. N. (2012). Managing the information technology resource: Leadership in the information age (12th edition). Upper Saddle River, NJ: Pearson Prentice Hall. McKeen, J. D. Smith, H. (2009). IT strategy in action. Upper Saddle River, NJ: Pearson Prentice Hall. OB rien, J. (2011). Management information systems. New York: McGraw-Hill, Irwin. Schiesser, R. (2010). IT systems management (2nd ed.). Upper Saddle River, NJ: Prentice Hall. Sprague, R. (2009). Information systems management in practice (8th ed.). Upper Saddle River, NJ: Prentice Hall. Stanford, G. (2010). Information theory. New York: Prentice Hall.

Wednesday, March 4, 2020

People versus Persons

People versus Persons People versus Persons People versus Persons By Daniel Scocco Felix asks, â€Å"I was just wondering when it was appropriate to use people as opposed to persons.† There is some confusion regarding the two terms, especially because their meaning and usage suffered a mutation along the centuries. Both derive from Latin, but from different words. Person derives from persona, which refers to an individual. People, on the other hand, derives from populum, and it refers to a group of persons sharing a culture or social environment. Person is a singular form, and its plural is persons. Over the time, however, many writers started to adopt people as the plural form of person, and nowadays it is widely accepted. Notice that legal and very formal texts still use persons as the plural form. One distinction that was proposed was to use persons as long as there was a countable number of individuals (e.g., 67 persons left the school) and people when such a number was large and indefinite (e.g., the people left the stadium quickly). The rule did not catch on, though, and some writers still use people even when there is a definite or small number of individuals. Finally, people can also be used in the plural form (e.g., the peoples of Asia) when it refers to the different cultural groups that live in a certain region. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Misused Words category, check our popular posts, or choose a related post below:50 Synonyms for â€Å"Leader†Use a Dash for Number Ranges40 Words Beginning with "Para-"