Sunday, August 23, 2020
Friday, August 21, 2020
MANAGERIAL REPORT Essays - Regression Analysis, Multicollinearity
Administrative REPORT Presentation The motivation behind this investigation was to build up a relapse model to foresee mortality. Information was gathered, by specialists at General Motors, on 60 U.S. Standard Metropolitan Statistical Areas (SMSA's), in an investigation of whether air contamination adds to mortality. This information was acquired and arbitrarily arranged into two even gatherings of 30 urban communities. A relapse model to anticipate mortality was work from the main arrangement of information and approved from the second arrangement of information. BODY The accompanying information was seen as the key drivers in the model: ? Mean July temperature in the city (degrees F) ? Mean relative stickiness of the city ? Middle instruction ? Percent of cubicle laborers ? Middle salary ? Endure dioxide contamination potential The goal in this examination was to discover the line on a diagram, utilizing the factors referenced above, for which the squared deviations between the watched and anticipated estimations of mortality are littler than for some other straight line model, accepting the contrasts between the watched and anticipated estimations of mortality are zero. When discovered, this ?Least Squared Line? can be utilized to appraise mortality given any estimation of above information or anticipate mortality for any estimation of above information. Every one of the key information components was checked for a ringer molded evenness about the mean, the direct (straight line) nature of the information when diagramed and equivalent squares of deviations of estimations about the mean (fluctuation). Subsequent to deciding if to avoid information focuses, the accompanying model was resolved to be the best model: - 3276.108 + 862.9355x1 - 25.37582x2 + 0.599213x3 + 0.0239648x4 + 0.01894907x5 - 41.16529x6 + 0.3147058x7 + See rundown of autonomous factors on TAB #1. This model was approved against the second arrangement of information where it was resolved that, with 95% certainty, there is critical proof to reason that the model is valuable for anticipating mortality. Despite the fact that this model, when approved, is regarded appropriate for estimation and forecast, as substantiated by the 5% mistake proportion (TAB #2), there are noteworthy worries about the model. To start with, despite the fact that the percent of test inconstancy that can be clarified by the model, as supported by the R? esteem on TAB #3, is 53.1%, in the wake of changing this incentive for the quantity of parameters in the model, the percent of disclosed fluctuation is decreased to 38.2% (TAB #3). The rest of the inconstancy is because of irregular blunder. Second, it creates the impression that a portion of the autonomous factors are contributing excess data because of the relationship with other free factors, known as multicollinearity. Third, it was resolved that a remote perception (esteem lying in excess of three standard deviations from the mean) was impacting the assessed coefficients. Notwithstanding the watched issues above, it is obscure how the example information was acquired. It is accepted that the estimations of the free factors were uncontrolled demonstrating observational information. With observational information, a measurably noteworthy connection between a reaction y and an indicator variable x doesn't really infer a circumstances and logical results relationship. This is the reason having a structured analysis would deliver ideal outcomes. By having a planned examination, we could, for example, control the timeframe that the information relates to. Information identifying with a more drawn out timeframe would positively improve the consistency of the information. This would invalidate the impact of any outrageous or unordinary information for the present timeframe. Likewise, accepting that salaried specialists are contrarily corresponded with contamination, we don't have the foggiest idea how the urban communities were chosen. The ideal determination of urban areas would incorporate an equivalent number of clerical urban areas and non cubicle urban areas. ! Besides, accepting a relationship of high temperature and mortality, an ideal choice of urban communities would incorporate an equivalent number of northern urban communities and southern urban communities. Ends AND RECOMMENDATIONS The model has been tried and approved on a second arrangement of information. Despite the fact that there are a few restrictions to the model, it seems to give great outcomes inside 95% certainty. On the off chance that time had allowed, various varieties of autonomous factors could have been tried so as to expand the R? worth and lessening the multicolliniarity (referenced previously). Be that as it may, until additional time can be assigned to this task, the outcomes acquired from this model can be esteemed fitting. Measurable REPORT MODEL SELECTION So as to choose the best model, a few
Saturday, July 11, 2020
Students Love An Essay Structure - Introduce Some Novel Ideas!
Student's Love An Essay Structure - Introduce Some Novel Ideas!Students often struggle to come up with a Critical Analysis essay outline. As the content of the essay grows more complex, the essay becomes increasingly difficult to write. However, this can also make it a more interesting and challenging course of study. An outline allows students to easily review the content of the course and to follow along with your lessons.Many students will review a reading and analysis essay based upon the outline. Although you may not realize it, you can benefit your students by allowing them to work with the outline throughout the course. As they work on the various tasks outlined in the outline, you will notice them enjoying their time studying. They will begin to focus on the task at hand and learn the correct methods of completing that task. It is this natural progression which will allow you to have students who are motivated and happy to learn.You do not have to always limit yourself to an analysis essay. You can always create a class project, which also incorporates a text or story. This allows you to include the written elements in the essay without writing out the entire assignment.If you find that your students often read your text on current events, do not be afraid to introduce an element of entertainment. A comedy line or even a rap verse can be inserted into the text. When you find a way to incorporate a little bit of everything, you will be able to create a truly engaging class project.Although, you may not be able to allow your students to participate in every activity related to a specific topic, you can always give them an opportunity to take part in other activities. Using an essay outline as a template, give your students a list of activities to perform during class time. Use this as an opportunity to let them learn about other aspects of learning. Encourage your students to use their creativity and innovation.Give them a chance to review lesson content before moving on to the next material. Reviewing topics can allow them to gain more knowledge and understanding in their own individual fields. It is important to allow students to gain knowledge from a variety of sources so that they can maximize their learning capabilities.Lastly, before class time comes to a close, encourage your students to go over all of the content that they learned. Make sure that they understand the subject matter, but do not limit them too much. Allow them to take some personal time to complete each section.Use your Critical Analysis essay outline as a tool for your students to expand upon the ideas presented within the outline. Allow them to incorporate this into the world of college by allowing them to create an outline based upon their own individual needs.
Wednesday, May 20, 2020
Statistical Analysis for Property Crimes - 1120 Words
I need help to create a multiple regression anlysis for this problem. Please provide as much explanation as you can. Please see attached files. My research is based on this topic below. The data is attached in the spreadsheet. This is a multiple regression analysis. I have attached a PDF file that explains the case and the spreadsheet version with all the data recorded from the PDF file. Pleas emae sure you include all the graphs, plots and please use megastat software. Topic: We want to determine the primary factors that affect property crime rates in the United States. The statistical analysis of the data involves multiple-regression analysis. Questions to answer are: 1. What are the primary determinants of property†¦show more content†¦The variables with insignificant regression coefficients can be removed from the regression model. Thus the modified regression model is Crimes = b0+ b1Dropout + b2density+b3 Urban Thus the primary determinants of property crimes in the United States are the 1. High School dropout rate 2. Population / square milesShow MoreRelatedProperty Crime Report1462 Words  | 6 Pagespresents statistics on major factors that affects the property crime rates in the U.S. Abstract: The property crime rates of 45.7% occurs more in urban areas. About 16.8% of the crimes were committed by high school dropouts and only 0.4% of the crimes that occurs were related to the population density. The type of property crimes that happens includes larceny-theft, home burglary, home invasion, grand theft auto, forgery, and arson. These types of crimes may be caused by factors such as high school dropoutsRead MoreCrime Analysis Essay924 Words  | 4 PagesRachel Boba, â€Å"Crime analysis is a law enforcement function that involves systematic analysis for identifying and analyzing patterns and trends in crime and disorder†(en.wikipedia.org/wiki/Crime analysis).The information on these patterns can assist law enforcement agencies in the deployment of resources in a more effective manner; it can also help detectives to identify and catch suspects. Crime analysis also plays a role in improvising solutions to crime problems, and developing crime prevention strategiesRe ad MoreThe Role Of Statistics And Criminal Justice1378 Words  | 6 PagesCriminal Justice. Also, this paper will focus on ways in which data is obtained keeping in mind the appropriate statistics to use with the collected data, and how to interpret the findings. In addition, it will review the causes of crimes, the rate at which these crimes occur, predictive outcomes and preventative measure to deal with criminals. The Role of Statistics in Criminal Justice To begin with, statistics can be defined as the practice or science of collecting and analyzingRead MoreStatistics Assessment : Social Research Skills963 Words  | 4 PagesStatistics Assessment Social Research Skills 1 1. The following questions are about measurement a) List the different levels a variable may take and describe the properties of the levels. The levels of measurements that variables can take are: (1) scale or continuous; (2) ordinal; (3) nominal; (4) interval; (5) Dichotomous; (6) Ratio. 1) Scale or continuous: measurements with units that are on an independent scale example include height and age. 2) Ordinal: This is not measure on an independentRead MoreA Brief Note On The State Of Virginia Department Of The Labor Bureau Of Labor Statistics Website1066 Words  | 5 Pagesyears from 1995 to 2000. Information on reported crime rates was obtained from FBI website as well as from the Geospatial and Statistical Data Center of the state of Virginia. Measures of age distributions was retrieved from the county-level census files of State of Virginia. Descriptive Statistics Figure 1: Summary Statistics †¢NEWFIPS: Identifier for county/city †¢Population structure(POPULAT): Principal component analysis(PCA) was used to develop a population structureRead MoreCrime in the City of Topeka: Analysis of the Task Force and Crime Prevention718 Words  | 3 Pagesreport is designed for the City of Topeka, Kansas Task Force on Crime and Crime Prevention. Under the auspices of a joint effort between the following agencies, the report is designed to look at crime from a micro-cultural perspective in a Midwestern capital city: The Kansas Bureau of Investigation, the Topeka Police Department, the FBIs regional office, and the University of Kansas Department of Criminology. The purpose of the data analysis is to provide a basic understanding of overall trends for TopekaRead MoreDescribe The Research Experiences You Have Had Up To Now..1309 Words  | 6 Pagesareas: the possible associations between community service programs and crime rates, with the hopes of using the data to support the funding for these community programs . I conducted a quantitative analysis of secondary data to determine the associations between community service programs that were currently active in South Carolina counties and regions (Upstate, Midlands, PeeDee, and the Lowcountry) and the violent and property crime rates. Throughout the extent of this research I gathered data fromRead MoreCommunity Service And Criminal Justice1313 Words  | 6 Pagesareas: the possible associations between community service programs and crime rates, with the hopes of using the data to support the funding for these community programs. I conducted a quantitative analysis of secondary data to determine the associations between community service programs that were currently active in South Carolina counties and regions (Upstate, Midlands, PeeDee, and the Lowcountry) and the violent and property crime rates. Throughout the extent of this research I gathered data fromRead MoreScience Merit And Scientific Merit1696 Words  | 7 PagesAccording to Gonzales (2013, para. 2, p. 1), the data collection, recruitment, and analysis should align with the research questions, as well as the monitoring, safe storage, and how the data will be destroyed should also be specified. Three dimensions of scientific merit and how it relates to this learners research The research this learner decided to work on is in regards to missing data or data gap within the UCR (Uniform Crime Report) system. The UCR in many arenas within the public safety field is consideredRead MoreWhat Are Scientific Merit?1544 Words  | 7 PagesAccording to Gonzales (2013, para. 2, p. 1), the data collection, recruitment, and analysis should align with the research questions, as well as the monitoring, safe storage, and how the data will be destroyed should also be specified. Three dimensions of scientific merit and how it relates to this learners research The research this learner decided to work on is in regards to miss or data gap within the UCR (Uniform Crime Report) system. The UCR in many arenas within the public safety field is considered
Wednesday, May 6, 2020
Essay Cold Fusion - 979 Words
Cold Fusion: The Continuing Mystery In March of 1989, a discovery was made that rocked the scientific world. Stanley Pons and Martin Fleischman had announced that they were able to create and sustain a cold fusion process. After intense media attention, and corresponding interest in future test, the subject seemed to have faded away. Future tests proved inconclusive, and when the quick promise of easy energy didn’t materialize, most quickly forgot the subject. Little is said about the continuing research in the scientific community to further our understanding of the free energy enigma. Is it science fiction, on the border of legitamete science, or is it a practical field worthy of serious attention? nbsp;nbsp;nbsp;nbsp;nbsp;Cold†¦show more content†¦Cold fusion is only produced three out of ten times under the best conditions, but this is enough to justify continued research. The first transitors were only successful one out of a hundred times until the mechanisms were completely understood. The science of the reaction taking place in cold fusion is still not clear. When pieces of the puzzle begin to fit together better, the success rate will increase, and yields will go up. nbsp;nbsp;nbsp;nbsp;nbsp;The actual set up of a cold fusion cell is an electrolyte such as hydrogen or deuterium in which a electrode made of specially treated and prepared steel is immersed. The lattice structure of the metal is filled with the hydrogen, where the fusion occurs. The problem is most metals fracture when subjected to these conditions. High loading is the state in which the metal survives, and begins to produce energy. There are numerous different methods and materials that are used to accomplish this goal. The original was a Heavy water solution with an electrolyte, in which a current is passed between a palladium alloy electrode. Several other new methods are in use today but the most promising is the Ceramic Proton Conductor. In this case, a low current is passed through a strontium-cerium-oxide in deuterium atmosphere. The reaction gives off significant excess energy. nbsp;nbsp;nbsp;nbsp;nbsp;Cold fusion differs significantlyShow MoreRelated Cold Fusion Research Paper3560 Words  | 15 PagesCold Fusion Research Paper As the world becomes more aware of the growing need for a more abundant energy supply, one energy source has been swept under the carpet and virtually ignored. This source is cold fusion. Cold fusion is: â€Å"A reaction that occurs under certain conditions in supersaturated metal hydrides (metals with lots of hydrogen or heavy hydrogen dissolved in them). It produces excess heat, helium, and a very low level of neutrons. In some experiments the host metal has been transmutedRead More Nuclear Fusion a Feasible Source of Power Essay example2061 Words  | 9 PagesIs Nuclear Fusion a Feasible Source of Power? Abstract: Nuclear fusion may be an effective solution to the energy problem in today?s world. Fusion is environmentally friendly and has the potential to generate massive amounts of power. It is evident that the Sun?s power is fueled by nuclear fusion. Recent advancements such as ITER and NIF may bring us closer to being able to use fusion. We find that nuclear fusion is a long-term solution to a continuing problem. Introduction: Since theRead MoreClimate Change And Destruction Of Natural Resources991 Words  | 4 Pagesrun. Therefore, nuclear fusion is the way to go. Fusion can be powered by sea water for millions of years, emits no radioactive gas or greenhouse gas, and is safe (as opposed to fission). JET, a research institute in Europe, has already done it, generating 16 megawatts of power, enough to power 8,000 homes, in a matter of seconds. These reactors are unaffected by climate, geography, etc., so they are viable to use anywhere in terms of space. The only issues are that fusion is too expensive, and becauseRead MoreOil And Its Impact On The Economy1350 Words  | 6 Pageswas nuclear fusion, a process that would transform mankind forever. Nuclear fusion is the same process used by the sun, and all the other stars in the universe. Hydrogen is heated to unimaginably high temperatures and fuse, forming helium and releasing enormous amounts of energy. Fusion produced no radiation and no pollution, making it the energy source scientists dreamed of. Since as early as the 1950’s, there has been research into nuclear fusion. Unfortunately, motivated by the cold war, much ofRead MoreA Report Analyzing The Viability Of The Nuclear Fusion1730 Words  | 7 PagesCouncil Today I am writing you a report analysing the viability of the use of Nuclear Fusion as a energy source in your community. I will analyse the feasibility of this kind of nuclear power in your community by firstly explaining what nuclear fusion is and how it works. I will then use calculations to estimate how this new energy produced could compare to the amount of energy used by the city currently. Nuclear Fusion occurs when two small nuclei fuse to form a larger nucleus (this is not to be confusedRead MoreHow A Nuclear Bomb Works1487 Words  | 6 PagesHow a nuclear bomb works It refers to the use of nuclear bombs explosive reaction releases tremendous energy on the target causing destruction destructive weapons. Explosive nuclear reaction is the use of self-sustaining nuclear fission or fusion reaction proceeds rapidly, the instantaneous release of energy produced by nuclear reactions huge explosion and the formation of devastating destruction destructive effect. Extremely destructive bomb, now as a powerful national strength and performance heritageRead MoreIntroduction Of Plasm What Is Plasma?1208 Words  | 5 Pagesgas consisting of approximately equal numbers of positively charged ions and negatively charged electrons. Figure: Plasma globe (courtesy: Martin Koppe) Classification of plasma: Figure: Classification of Plasma What is Cold Plasma? Cold plasmas are those with Te Tgas. It is obtained in low pressure discharges or in short pulse discharges as Dielectric Barrier Discharges or ns discharges. What is Hot Plasma? Hot plasmas, or better thermal plasmas, are those with Te~TgasRead MoreThe Torus Shaped Vessel2415 Words  | 10 Pagesx shows how the cooling system works with a pipe with cooling fluid flowing through it is fitted through blocks of armour material which make up the targets. Looking to the future as projects grow in size towards DEMO, which will be a functioning fusion power plant, the demands on materials especially PFC’s are going to increase. For ITER the plasma facing components for the divertor are to be made of carbon fibre-reinforced carbon composite’s (CFC) and some sections tungsten armour materials butRead MoreStyle Over Substance in Truman Capotes In Cold Blood Essay506 Words  | 3 PagesStyle Over Substancenbsp;in Capotes In Cold Bloodnbsp;nbsp;nbsp;nbsp; nbsp; In Murder, He Wrote, William Swanson believes the stylistic techniques employed in Truman Capotes novel In Cold Blood are more memorable than the story itself. For Swanson, Capote not only captures the readers attention with a story about a horrific crime, but his use of diverse voices, sounds, and silences make it an event people will never forget. nbsp; Almost two decades after his initial exposureRead MoreThe War Of The Cold War1508 Words  | 7 Pagesstruggle. But the question is, what led to the Cold War? Was it the Soviets, who revoked their agreements to allow the people of Eastern Europe to determine their own fates by imposing totalitarian rule on territories? Or was it the Americans, who ignored the Soviets security concerns, terrified the world with the atomic bomb, and pushed relentlessly to expand their own international influence and market supremacy? The tensions that led to the cold war became evident in 1943. The Big Three allied
Clean Air Partnership Essay Research Paper For free essay sample
Clean Air Partnership Essay, Research Paper For immediate release: July 6, 1999 Regional Clean Air Partnership The Clean Air Partnership will be hosting a? VIP Reception? on Thursday, July 8th at the Science Center from 5:30 p.m. to 7:30 p.m. The response is being held in an attempt to increase the degree of consciousness of CEO? s and senior directors of country concerns and establishments sing the continued demand to turn to ozone air quality in the greater metropolitan part. To day of the month, about 400 local employers are officially take parting in either the Clean Air Partnership? s Clean Air Coordinator ( CAC ) or Ridefinder? s Employee Transportation Coordinator ( ETC ) Programs. These attempts involve the instruction and encouragement of employees to take voluntary steps to better regional air quality, mostly based in the usage of car/van pools and mass theodolite. Many of these steps are recommended in response to American Lung Association? s ozone prognosiss that are disseminated to the CAC? s and ETC? s every bit good as through local intelligence media, roadside message boards and the Science Center flyover to the general populace. We will write a custom essay sample on Clean Air Partnership Essay Research Paper For or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page In an attempt to spread out Clean Air Partnership engagement beyond response to bad ozone prognosiss, Dick Fleming, President and CEO of the Regional Commerce and Growth Association, and Honorary Co-Chair of the Clean Air Partnership, made particular invitation to several country concern and civic leade R to go to the VIP Reception on Thursday. ? The ground for this assemblage is simple, ? Fleming stated. ? We want to go on our ongoing attempts to better the air quality in the part. While we have made great paces conveying the figure of bad air yearss down in the last decennary? down 80 % from the mid-80? s? there is still more to carry through. Not merely do we desire to guarantee conformity with all local, province and federal clean air Torahs, but we besides want to make all we can to guarantee the highest quality of life possible for those who live and work throughout the part. ? Through a new? Community Development? commission within the Clean Air Partnership, our concern and civic leaders will be encouraged to commit the impression throughout the part that attending to air quality is indispensable in order to keep a healthful, every bit good as economically sustainable, lifestyle in the greater part. Examples of such? institutional? parts have already been demonstrated by both and Illinois Departments of Transportation in planned postponement of lawnmowing and painting operations on? red? air yearss, and MSD? s delay of a family risky waste aggregation twenty-four hours until after the ozone season. ? Engagement does non hold to be dearly-won or onerous. It merely takes planning, and some institutional committedness, ? Fleming added. That is the point of Thursday? s response. The Clean Air Partnership is? ? ? ( I? thousand certain Julie has canned material for this ) .
Thursday, April 23, 2020
Kys Review Essay Example
Kys Review Paper Essay on Kys The book is amazing. Not that you can not break away from reading, no. The book makes you wonder. It would seem that the plot and it does not have, and that same Kys unknown forest creature, which nobody has ever seen, and the protagonist Benedict constantly lost in the surrounding life descriptions. But all this is not just like that, all the time In fact, I did not like Benedict and the consequences of any kind is not received, and taught literacy, and job of work is not dusty, and the master of all trades, but not in him umishka. Umok it is so small, but in the dust stale, thats a pity becomes straight and Barbara, and Nikita Kuzmich and his mother because they are all trying to do the best, Maral inculcate. But no, he was not train all used his brow knit, duckies Tapping, yes of Olenka dream By the way, Olga Benedict is very suitable -. Bright face, spit up the floor, the consequences of not. Well it turned out after a courtship that clawed and Benny himself with a tail has appeared. And what do you think? So Benny moved out of the old hut-wreck in the new tower. And there he is now such concerns as before: all slaves do. And he sits there and reads books. It would seem that little minds must grow, expand, but not as has absorbed some of hundreds of books and magazines, and even more covered with dust. But thats the idea appeared obsession: Wherever else take the dose books And here came out of it I advise you to read We will write a custom essay sample on Kys Review specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Kys Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Kys Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer The end is ambiguous on the one hand shaken Benedict. and on the other the surviving former, which in effect throughout the book, or reminiscing about the times before the Blast, or tried to somehow restore the former order. And they did not even try soon so, kind of do: So you are not dead, or what? A .. or died .. - But to understand how to know .. ! Kys Review Essay Example Kys Review Paper Essay on Kys Entertaining work. Select the main line in the genre can not be novel. The post-nuclear explosion fantastic pot boiled mutants new and old. Still clinging to the pitiful remnants of the culture of the previous civilization. A new live currently in a post-apocalyptic world, and live perfectly ognetsami indulge, lure mice, rusty smoke, before the Greatest Murza Fyodor Kuzmich reverence. Certainly degraded, but understand: the preconditions for this dystopia is;) Juicy dremuchederevenskostaroobryadchesky language adds this parody russkoskazochnogo world identity, strengthens the goodies of the images. Funny satirical moments diluted each chapter. Multi-genre is uncertain. In general, shall be construed as your heart desires. Would you like science fiction? here you are you. Postapokalipsis? hold in two hands. Dystopia? votushki. Would you like a parody-satire? and here it is, etc. Multifaceted varied. We will write a custom essay sample on Kys Review specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Kys Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Kys Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer You can also discard all this cleverness, along with our life today, then Kys can be called a hymn of love for the Book, the Word, to the ABC (ABC is, not alphabetically). If you listen, you can hear how quietly booklet call us: kyyys-Kys-Kys, lets Read-Think. Do you hear them? However, we must understand that for the sake of reading Reading thoughtless and ruthless action By the way, childrens cruelty post-explosion of life (take the same game or udushalochku poskakalochki) and its untidiness that if for some reason It leaves no feeling chernushny. On the contrary, after the book is still a sense of something light and clean, although scary at heart and suddenly World Kysi eerie but cozy Of course, there are some logical inconsistencies in this book.. But they do not want to talk. Kys unusual and surprising in its fabulous woodcut, in his grotesque reflection of our real life as in a distorting mirror. It forgives everything. It is possible to train the brain, trying again and again to guess where a particular fragment or an allusion to a poem, a work rounded:. Hell, I liked it ! Kys Review Essay Example Kys Review Paper Essay on Kys Book frankly so-so (the pause during which you can throw a tomato)  «Kys. this is NOT a dystopia. Dystopia a work that represents a different point of view on society, designed to be the ideal. So in this regard, the question: To what this ideal society of the Company Kysi ? What are the features of the criticized utopia? . There is not a utopia, because Kys is not a dystopia, a parody Metamorphoses happening with the meaning of such concepts as book, of course, carry away, but nothing revolutionary (even more so -. Nothing new) are not available. At the same Eco role of literature in society (and in the life of an individual person) is described in more believable and less dramatic. A novelty is determined by the specific context in which these metamorphoses played. And now the most important thing. IMHO the popularity of this product is due to a large extent by the fact that few of the read play a computer game  «Fallout2 ». After this game, the atmosphere and the peculiar slang post-apocalyptic world no longer seem to be something new and original (say at once: on the degree of atmospheric Kys clearly losing of Fallout y). Once I figured it out (and I quickly realized) the lions share of the attractiveness of Kysi vanished from all cracks and climbed secondary. You begin to notice the logical inconsistencies and some tension in the social organization Kysi. Question: How is it possible such a society remain without a satisfactory answer. It can, of course, and it does not matter, but still We will write a custom essay sample on Kys Review specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Kys Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Kys Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer In short: Kys does not create a single image in my mind, it is stratified into several more or less successful parodies descriptions. A parody of the intelligentsia, a parody of the cattle, a parody of the secret society, a parody of a revolution, a parody of the officials only itself Kys (the spirit of a post-apocalyptic world) attempts to link them together Unsuccessfully . Kys Review Essay Example Kys Review Paper Essay on Kys Kyyyyyyys hissing, howling, unknown forest monster Kys killer of the soul. Topochut quietly on the floor with your mouse lured the night the local currency. In the forest silently sleeping black hares, frozen on the branches. Over Fedor Kuzmichsk stretched usual winter night quiet, peaceful, snowy. About this current residents of this great city and do not have to dream. So, Muscovites? The novel enchants from the first page, thats right with the first mention of unknown Clelia and flying black birds, which is suitable for food, if they are properly soak, but boil in seven waters, but a week or two on the sun to set, but evaporate in the oven. Of course, not male and female woodcocks only! Kys swallow you in its unique rhythm, enveloped in a web of fantasy, hook hooks details and will not let go until the last page. no way to stop! Just poprivyknesh to an event, like a fat turns the plot of the path, known only to her alone and the reader, tongue hanging out, rushes for an avalanche of lines and pages on-on-on -. To the incredible end Akunins writes that I want to eat every sentence, growling and smacking lied! )) The book lacks amenities content (such heroic strong personalities the saviors of the world, or vsepoglaschayuschey love going around all the obstacles), and the world described by the writer is far from being able to be called in any way appetizing. Moreover the world after the explosions, outlined in great detail, meticulous and talented Tolstoy, scary, dirty, smelly, utterly neestetichen We will write a custom essay sample on Kys Review specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Kys Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Kys Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Let this novel is not the most delicious from the fact that you have ever read. or even read, but definitely it will be one of the most exotic dishes in your literary biography. And like all exotic Kys an amateur .
Tuesday, March 17, 2020
Causes of Car Accidents Essays
Causes of Car Accidents Essays Causes of Car Accidents Essay Causes of Car Accidents Essay (NHTSA, auto-accident-resource. com). Among the car accidents, the teenage group is the only age group who is number of deaths is increasing instead of decreasing. Also, all the people are exposed to risk and actually every one of them has got car accident at least once that could have been easily prevented. There are many reasons car accidents happen such as drunken drivers, using cellular phones while driving, and teenage drivers. First reason is drinking and driving which is the leading cause of car accidents. Over 1. 1 million drivers were arrested in 2010 for driving under the influence of alcohol or narcotics, (Federal Bureau of Investigation, â€Å"Crime in the United States: 2010†, madd. org). Also,†drunk driving costs the United States $132 billion a year , (NHTS FARS data, 2012, madd. org). Driving while intoxicated is dangerous, because drinking increases your inhibitions and self-confidence but lower s your driving performance. In other words, alcohol impairs the decision-making ability of the brain. For example, when people get drunk, they do not even think they are drunk. They may feel like they can do anything. But they cannot. Many accidents occur because of drinking. These accidents involve mostly one car, but other people can be killed by drunk drivers. People have to be educated about drinking and driving, so they do not kill themselves or innocent people on the road. Second reason, using cell phones while driving causes car accidents. According to the Harvard Center for Risk Analysis, 2,600 people died in 2004 and 330,000 more were injured while using cell phones just before an accident. doityourself. com). When a cell phone is used while driving, it distracts the attention of the driver, leading to car accidents. While using a cell phone many people tend to miss traffic signals, because they are not really concentrating on driving. The process of dialing or answering the phone can make them lose control of the vehicle as well. Even though the driver is looking at the road, he or she can easily get distracted by the conversation. This can result in fatal accidents. Third reason of accidents on the road is teenage drivers. â€Å"2,739 teenagers died in car accidents in the United States during 2008 , (drivesteady. com). Some teenagers cause fatal accidents, because of immaturity and lack of experience. Teenagers are very impulsive. Although not intending to hurt anyone, they sometimes drive very aggressively. It is not difficult to find teenagers driving with one hand on the steering wheel, seat pushed back, and with loud music playing. In traffic they go wild, trying to seek attention. They underestimate the risk of what they are doing. All these acts result in serious consequences on the road. Many accidents of young drivers result from their own mistakes. In conclusion, many people do not realize that being intoxicated while driving, using cellular phones and teenage drivers may bring serious injuries to everybody. Some people may enjoy drinking without care until they get into car accident, which can even result in the deaths of many innocent people. The car accidents caused by these problems are really serious but preventable. If everybody tries to eliminate these problems by following the rules of the road, driving can be less dangerous, and we will not waste time on car accidents. REFERENCES: 1- ( auto-accident-resource. com/statistics. html). 2- ( madd. org/statistics/). 3- ( madd. org/drunk-driving/about/drunk-driving-statistics. html). 4- ( doityourself. com/stry/driving-safety-tips-statistics-on-deaths-by
Sunday, March 1, 2020
The Chemical Composition of White Gold
The Chemical Composition of White Gold White gold is a popular alternative to yellow gold, silver, or platinum. Some people prefer the silver color of white gold to the yellow color of normal gold, yet may find silver to be too soft or too easily tarnished or the cost of platinum to be prohibitive. While white gold contains varying amounts of gold, which is always yellow, it also contains one or more white metals to lighten its color and add strength and durability. The most common white metals that form the white gold alloy are nickel, palladium, platinum, and manganese. Sometimes copper, zinc or silver are added. However, copper and silver form undesirable colored oxides in the air or on the skin, so other metals are preferable. The purity of white gold is expressed in karats, the same as with yellow gold. The gold content is typically stamped into the metal (e.g., 10K, 18K). The Color of White Gold The properties of white gold, including its color, depend on its composition. Although most people think white gold is a shiny white metal, that color is actually from the rhodium metal plating that is applied to all white gold jewelry. Without the rhodium coating, white gold might be gray, dull brown, or even pale pink. Another coating that may be applied is a platinum alloy. Typically platinum is alloyed with iridium, ruthenium, or cobalt to increase its hardness. Platinum is naturally white. However, its more expensive than gold, so it may be electroplated onto a white gold ring to improve its appearance without dramatically increasing the price. White gold that contains a high percentage of nickel tends to be closest to a true white color. It has a faint ivory tone but is much whiter than pure gold. Nickel white gold often does not require plating with rhodium for color, although the coating may be applied to reduce the incidence of skin reactions. Palladium white gold is another strong alloy that may be used without a coating. Palladium white gold has a faint gray tinge. Other gold alloys result in additional colors of gold, including red or rose, blue, and green. Allergies to White Gold White gold jewelry typically is made from a gold-palladium-silver alloy or gold-nickel-copper-zinc alloy. However, about one in eight people experience a reaction to the nickel-containing alloy, usually in the form of a skin rash. Most European jewelry manufacturers and some American jewelry manufacturers avoid nickel white gold since alloys made without nickel are less allergenic. The nickel alloy is most often encountered in older white gold jewelry and in some rings and pins, where the nickel produces a white gold that is strong enough to stand up to the wear and tear these pieces of jewelry experience. Maintaining the Plating on White Gold White gold jewelry that has a platinum or rhodium plating typically cant be resized because doing so would damage the coating. The plating on jewelry will scratch and wear over time. A jeweler can re-plate the item by removing any stones, buffing the metal, plating it, and returning the stones to their settings. Rhodium plating typically needs to be replaced every couple of years. It only takes a couple of hours to perform the process, at a cost of around $50 to $150.
Thursday, February 13, 2020
Law, Social and Ethical Responsibilities in Business Essay
Law, Social and Ethical Responsibilities in Business - Essay Example As we continued walking, we met a friend of ours. We asked him if he saw our POI and he informed us that he was in church. We went to the church which was some distance away from school. As we went our way and crossed the busy street, an idea came up in the mind of Y. She suggested that a message be sent to the Supreme Student Council (SSC) informing them that we were hit by a car while crossing the street. The idea hatched and we hoped we could enjoy the joke. After that, I dropped the phone in my pocket, making-believe that something has happened to the three of us. The mobile phone in my pocket kept ringing and ringing but I didn't notice it because we were so engaged in laughing while walking, imagining how the Supreme Student council would be rattled. Then I noticed the phone ringing, but before I could answer, I composed myself that I may act as though I were really scared. In my conversation with the caller, I noticed that his voice was nervous and I continued acting, like crying at the same time talking in a confused manner, telling him where we were. I laughed a little in between my sobs but he didn't notice. So, perfect! We did it! They ran barefoot to our place: the senators, our PIO, our Internal Affairs Officer. Shockingly, Prof. F, who was tabulating the game results, was disturbed by the news that he heard and hurriedly moved to keep away his things. In the process, he hurriedly closed his laptop computer which eventually fell hard on the cement floor. Meanwhile, we got ready for we were sure they would be looking for us. While on our way, our Vice President got his phone and began calling Dr. Jane, our Faculty Adviser. She was very busy printing the certificates for winners that time, but alarmed by the news, she began calling someone near the supposed accident site to contact an ambulance, but to no avail. There was misinformation between the SSC Officers. I already told one of the officers that my two companions were in an ambulance but he failed to tell the VP. One fellow senator continued running, but while he was on his way, he noticed why there were none among the people looking alarmed and no ambulance was in sight as I had told him. When he came to where we were, he was very angry and he felt betrayed as he saw us walking and laughing without the wounds I had reported. He threatened to kick us out of the Council, where he initiated a Council Resolution afterwards for our expulsion from the Council. After the other officers came to know that we were only joking, they got very angry and our VP told us that we had to explain to our Adviser, Dr. Jane, and the tabulator why we did what we did. Although earlier, the whole thing was nothing to Dr. Jane but child play, she began to see the whole thing in a different light when Prof. F, the tabulator, began to pester her for payment of the fallen laptop at $740 on account of the mischief of the students. The new laptop was on memorandum receipt (MR) issued to him by the State University and he wouldn't be able to be cleared of obligations by the end of the semester when he asks for clearance. The question is who is responsible for paying for
Saturday, February 1, 2020
Hewlett-Packard Research Paper Example | Topics and Well Written Essays - 500 words
Hewlett-Packard - Research Paper Example The company intends to follow an evolutionary trend for growth under the guidance of Apotheker, primarily focusing on the digital entertainment technology, portability and the expected increase in mobile computing. The new CEO has stressed upon the increasing awareness within the company about sustainability of operations and compliance of its products with the current stress on keeping the earth green and pollution free. The company intends and has already taken steps to develop product lines in coherence with these objectives. Apotheker intends to stabilize and retain the reputation of HP as the world’s largest technology company after the recent setbacks when the Directors’ had to sack the previous CEO Mark Hurd on disciplinary grounds and a downward slump in HP’s performance in the First Quarter of the year 2011 (Worthen & Sherr, 2011). Apotheker intends to promote ‘cloud computing’ from its own resources as well as in collaboration with other ma jor players’ in the field.
Friday, January 24, 2020
Japan vs. China Essay -- Economy Geography Papers Asia
Japan vs. China The region known as East Asia has long been in area of conflict, where often times one power, or group of powers has dominated the people, politics, and economy in a very authoritarian fashion. At first it was the Chinese Imperial system which dominated East Asia, as the strongest and most wealthy Asian power during the pre-colonial period. Japan was in a state of isolation, and the other countries of the region were dependent on China for many things. However, with the coming of the colonial powers from Europe and North America, China’s regional power was all but destroyed (4). During that time period, Japan began a process of rapid industrialization and modernization in order to counteract western colonialism and prevent the Western powers from taking over Japan like they did with China (5). Since then, Japan has been a competitor with China for regional dominance and hegemony. From a historical perspective, both China and Japan have occupied the place of regional hegemon, albeit at different times. China was the regional power in the pre-colonial era, often times exercising its influence over its smaller neighbors. This dominance was in large part because of the sheer size of China, in addition to the power of ancient China under the Emperors. The Great Wall of China was a testament to the ancient strength of China during the pre-colonial period (4). However, once the colonial period began, the power of China was destroyed by the Western powers. During this time period and immediately afterwards, China was a weak nation, often times on the brink of civil war and societal collapse (2). The result of this weakness was the rise of warlord-ism and the destruction of unified China. The GMD (Nationalists)... ...tors all give Japan the advantage; however China is not far behind Japan in the contest. With the largest population in the world and the world’s largest standing army, China is still a force to be reckoned with, albeit not as important as Japan seems to be. Although the future is very uncertain (given China’s unstable political system and what effects the economic growth will have upon it) it can be said that for the coming few years, Japan will continue to be on top of China. How long that lasts is impossible to determine, but given the current set of circumstances, China will surpass Japan in the future as regional hegemon. Works Cited 1. Lecture Notes/ in class discussion 2. Mao’s China and After By Maurice Meisner 3. Japan from Tokugawa to the Present by Andrew Gordon 4. in class video on pre-colonial China. 5. in class video on Japan’s modernization Japan vs. China Essay -- Economy Geography Papers Asia Japan vs. China The region known as East Asia has long been in area of conflict, where often times one power, or group of powers has dominated the people, politics, and economy in a very authoritarian fashion. At first it was the Chinese Imperial system which dominated East Asia, as the strongest and most wealthy Asian power during the pre-colonial period. Japan was in a state of isolation, and the other countries of the region were dependent on China for many things. However, with the coming of the colonial powers from Europe and North America, China’s regional power was all but destroyed (4). During that time period, Japan began a process of rapid industrialization and modernization in order to counteract western colonialism and prevent the Western powers from taking over Japan like they did with China (5). Since then, Japan has been a competitor with China for regional dominance and hegemony. From a historical perspective, both China and Japan have occupied the place of regional hegemon, albeit at different times. China was the regional power in the pre-colonial era, often times exercising its influence over its smaller neighbors. This dominance was in large part because of the sheer size of China, in addition to the power of ancient China under the Emperors. The Great Wall of China was a testament to the ancient strength of China during the pre-colonial period (4). However, once the colonial period began, the power of China was destroyed by the Western powers. During this time period and immediately afterwards, China was a weak nation, often times on the brink of civil war and societal collapse (2). The result of this weakness was the rise of warlord-ism and the destruction of unified China. The GMD (Nationalists)... ...tors all give Japan the advantage; however China is not far behind Japan in the contest. With the largest population in the world and the world’s largest standing army, China is still a force to be reckoned with, albeit not as important as Japan seems to be. Although the future is very uncertain (given China’s unstable political system and what effects the economic growth will have upon it) it can be said that for the coming few years, Japan will continue to be on top of China. How long that lasts is impossible to determine, but given the current set of circumstances, China will surpass Japan in the future as regional hegemon. Works Cited 1. Lecture Notes/ in class discussion 2. Mao’s China and After By Maurice Meisner 3. Japan from Tokugawa to the Present by Andrew Gordon 4. in class video on pre-colonial China. 5. in class video on Japan’s modernization
Thursday, January 16, 2020
8 Key Element for a Business Model
E-commerce: business. technology. society. E-commerce E commerce Business. Technology. Society gy y Kenneth C. Laudon Copyright  © 2011 Pearson Education, Ltd. Chapter 5 Business Models for E? commerce Copyright  © 2007Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 1-2 E-commerce Business Models Business model d l Set of planned activities designed to result in a Set of planned activities designed to result in a profit in a marketplace Business plan Describes a firm s business model Describes a firm’s business modelE commerce business model E? commerce business model Uses/leverages unique qualities of Internet and Web W b Slide 2-3 8 Key Elements of Business Model 1. 2. 3. 4. 5. 6. 7. 8. Value proposition Revenue model Market opportunity Market opportunity Competitive environment Competitive advantage Market strategy Market strategy Organizational De velopment Management team Slide 2-4 1. Value Proposition Why should the customer buy from you? h h ld h b f ? Successful e? ommerce value S f l l propositions: Personalization/customization Reduction of product search, price discovery costs Facilitation of transactions by managing product delivery Slide 2-5 2. Revenue Model How will the firm earn revenue, generate p profits, and produce a superior return on p p invested capital? Major types: Advertising revenue model g Subscription revenue model Transaction fee revenue model Transaction fee revenue model Sales revenue model Affiliate revenue model Slide 2-6 3. Market Opportunity What marketspace do you intend to h k d d serve and what is its size?Marketspace: Area of actual or potential commercial value in which companyà ‚ intends to operate in which company intends to operate Realistic market opportunity: Defined by revenue potential in each market niche in which company hopes to potential in each market niche in which company hopes to compete Market opportunity typically divided into M k t t it t i ll di id d i t smaller niches Slide 2-7 4. Competitive Environment Who else occupies your intended h l d d marketspace? p Other companies selling similar products in the same marketspace Includes both direct and indirect competitors Influenced by: Influenced by:Number and size of active competitors Each competitor s market share Each competitor’s market share Competitors’ profitability Competitors pricing Competitors’ pricing Slide 2-8 5. Competitive Advantage Achieved when firm: h d h f Produces superior pro duct  or Produces superior product or Can bring product to market at lower price than competitors th tit Important concepts: p p Asymmetries First? mover advantage Fi t d t Unfair competitive advantage Leverage Slide 2-9 6. Market Strategy How do you plan to promote your products or services to attract your products or services to attract your target audience?Details how a company intends to enter market and attract customers Best business concepts will fail if not properly marketed to potential customers k d i l Slide 2-10 7. Organizational Development What types of organizational structures within the firm are necessary to carry out within the firm are necessary to carry out the business plan? Describes how firm will organize work Typically divided into functiona l departments As company grows, hiring moves from generalists to As company grows hiring moves from generalists to specialists Slide 2-11 8.Management Team What kinds of experiences and background are important for the background are important for the company’s leaders to have? Employees are responsible for making the business model work Strong management team gives instant credibility to outside investors Strong management team may not be able to salvage a weak business model, but should be able to change the model and redefine the business as it becomes necessary Slide 2-12 Insight on Business Online Grocers: Finding and Executing the Right Model g g Class Discussion Slide 2-13 Categorizing E-commerce Business ModelsNo one correct way We categorize businessà ‚ models according to: We categorize business models according to: E? commerce sector (B2C, B2B, C2C) Type of e? commerce technology; i. e. m? commerce Type of e commerce technology; i e m commerce Similar business models appear in more than one sector Some companies use multiple business Some companies use multiple business models; e. g. eBay Slide 2-14 B2C Business Models: Portal Search plus an integrated package of content and services Revenue models: d l Advertising, referral fees, transaction fees, subscriptions g p Variations:Horizontal / General Vertical / Specialized (Vortal) Vertical / Specialized (Vortal) Pure Search Slide 2-15 Insight on Technology Can Bing Bong Google? Class Discussion Slide 2-16 B2C Models: E-tailer Online version of traditional retailer Revenue model: Sales Variations: Virtual merchant Virtual merchant Bricks? and? clicks Catalog merchant C t l h t Manufacturer? direct Low barriers to entry Slide 2-17 B2C Models: Content Provider Digital content on the Web News, music, video Revenue models: Revenue models: Subscription; pay per download (micropayment); advertising; affiliate referral fees Variations:Content owners Syndication S di i Web aggregators Slide 2-18 B2C Models: Transaction Broker Process online transactions for consumers Primary value propositionâ€â€saving time and money Revenue model: R d l Transaction fees Industries using this model: Financial services Travel services Job placement services Slide 2-19 B2C Models: Market Creator Create digital environment where buyers and sellers can meet and transact Examples: Priceline eBay y Revenue model: Transaction fees Revenue model: Transaction fee s Slide 2-20 B2C Models: Service Provider Online services e. g. Google: Google Maps, Gmail, etc. Value proposition Value propositionValuable, convenient, time? saving, low? cost alternatives to traditional service providers t diti l i id Revenue models: Revenue models: Sales of services, subscription fees, advertising, sales of marketing data marketing data Slide 2-21 B2C Models: Community Provider Provide online environment (social network) where people with similar interests can transact, share content, and , , communicate E. g. Facebook, MySpace, LinkedIn, Twitter Revenue models: R d l Typically hybrid, combining advertising, subscriptions, sales, transaction fees, affiliate fees Slide 2-22 B2B Business Models Net marketplaces E? istributor E procurement E? procurement Exchange Industry consortium Industry cons ortium Private industrial network Private industrial network Single firm Industry? wide Industry wide Slide 2-23 B2B Models: E-distributor Version of retail and wholesale store, , MRO goods and indirect goods Owned by one company seeking to serve many customers Revenue model: Sales of goods Example: Grainger. com Slide 2-24 B2B Models: E-procurement Creates digital markets where participants transact for indirect goods B2B service providers, application service providers (ASPs) B2B service providers application service providers (ASPs)Revenue model: Service fees, supply? chain management, fulfillment services Example: Ariba Slide 2-25 B2B Models: Exchanges Independently owned vertical digital p y g marketplace for direct inputs Revenue model: Transaction, commission fees Revenue model Transaction commission fees C eate po e u co pet t o bet ee Create powerful competition between suppliers Tend to force suppliers into powerful price T d f li i f l i competition; number of exchanges has dropped dramatically d dd ll Slide 2-26 B2B Models: Industry Consortia Industry? wned vertical digital marketplace open to select suppliers More successful than exchanges More successful than exchanges Sponsored by powerful industry players Strengthen traditional purchasing behavior Revenue model: Transaction, commission fees R d l T ti i i f Example: Exostar Example: Exostar Slide 2-27 Private Industrial Networks Designed to coordinate flow of communication among firms engaged in business together fi di b i h Electronic data interchange (EDI) Single firm networks Most common form M t f Example: Wal? Mart’s network  for suppliersIndustry? wide networks Often evolve out of industry associations Often evolve out of industry associations Example: Agentrics Slide 2-28 Other E-commerce Business Models Consumer? to? consumer (C2C) eBay, Craigslist Peer? to? peer (P2P) Peer to peer (P2P) The Pirate Bay, Cloudmark M? commerce: Technology platform continues to evolve Technology platform continues to evolve iPhone, smartphones energizing interest in m? commerce pp apps Slide 2-29 Insight on Society Where R U? Not Here! Class Discussion Slide 2-30 E-commerce Enablers: Gold Rush ModelE? commerce infrastructure companies p have profited the most: Hardware, software, networking, security E? commerce software systems, payment systems Media solutions, performance enhancement CRM software CRM software Databases Hosting services, etc. Slide 2-31 How Internet & Web Change Busi ness E? commerce changes industry structure g y by changing: Basis of competition among rivals Barriers to entry y Threat of new substitute products Strength of suppliers Bargaining power of buyers Bargaining power of buyers Slide 2-32 Industry Value ChainsSet of activities performed by suppliers, manufacturers, transporters, distributors, and f di ib d retailers that transform raw inputs into final products and services Internet reduces cost of information and Internet reduces cost of information and other transactional costs Leads to greater operational efficiencies, lowering cost, prices, adding value for lowering cost prices adding value for customers Slide 2-33 E-commerce & Industry Value Chains Figure 5. 4 Slide 2-34 Firm Value Chains Activities that a firm engages in to create inal products from raw inputs Each step adds value Effect of Internet: Eff fI Increases operational efficiency p y Enables product differentiation Enables precise coordination of steps in chain E bl i di ti f t i h i Slide 2-35 E-commerce & Firm Value Chains Figure 5. 5 Slide 2-36 Firm Value Webs Networked business ecosystem Uses Internet technology to coordinate the value chains of business partners l h i fb i Coordinates a firm’s suppliers with its own C di t fi ’ li ith it production needs using an Internet? based supply chain management systemSlide 2-37 Internet-Enabled Value Web bl d l b Figure 5. 6 Slide 2-38 Business Strategy Plan for achieving superior long? term returns on the capital invested in a business firm business firm Four Generic Strategies 1. Di fferentiation 2. Cost 3. Scope 4. 4 Focus Slide 2-39 Chapter 6 E-commerce Marketing Copyright  © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 6-40 Netflix N fli Strengthens and Defends Its Brand Class Discussion Slide 6-41 Consumers Online: Internet Audience & Consumer Behavior Around 70% (82 million) U. S. ouseholds have Around 70% (82 million) U S households have Internet access in 2010 Growth rate has slowed Intensity and scope of use both increasing d f b h Some demographic groups have much higher Some demographic groups have much higher percentages of online usage than others Gender, age, ethnicity, community type, income, education Slide 6-42 Consumers Online: Internet Audience & Consumer Behavior Broadband audience vs. dial? up audience Purchasing behavior affected by neighborhood Lifestyle and sociological impa cts Use of Internet by children, teens Use of Internet as substitute for other social activitiesMedia choices Traditional media competes with Internet for attention Traditional media competes with Internet for attention Slide 6-43 Consumer Behavior Models Study of consumer behavior Social science Attempts to explain what consumers purchase Attempts to explain what consumers purchase and where, when, how much and why they buy Consumer behavior models Predict wide range of consumer decisions Predict wide range of consumer decisions Based on background demographic factors and other intervening, more immediate variables h i i i di i bl Slide 6-44 General Model of Consumer Behavior Figure 6. Slide 6-45 Background Demographic Factors Culture: Broadest impact Subculture (ethnicity, age, lifestyle, geography) S b lt ( th i it lif t l h ) Social Reference groups Direct  reference groups g p Indirect reference groups Opinion leaders (viral influencers) Lifestyle groups f l Psychological Psychological profiles Slide 6-46 Online Purchasing Decision Psychographic research Combines demographic and psychological data Combines demographic and psychological data Divides market into groups based on social class, lifestyle, and/or personality characteristics and/or personality characteristicsFive stages in the consumer decision process: 1. 2. 3. 4. 5. Awareness of need Search for more information Evaluation of alternatives Actual purchase decision Actual purchase decision Post? purchase contact with firm Slide 6-47 Consumer D i i C Decision Process & P Supporting Communications Figure 6. 3 Slide 6-48 Model of Online Consumer Behavior Decision process similar for online and offline behavior General online behavior model Consumer skills Product characteristics Attitudes toward online purchasing Perceptions about control over Web environment p Web site featuresClickstream behavior: Transaction log for Clickstream behavior: Transaction log for consumer from search engine to purchase Slide 6-49 Model of Online Consumer Behavior Figure 6. 4 Slide 6-50 Model of Online Consumer Behavior Clickstream factors include: Number of days since last visit Number of days since last visit Speed of clickstream behavior Number of products viewed during last visit b f d i dd i l ii Number of pages viewed Supplying personal information Number of days since last purchase Number of past purchasesClickstream marketing Clickstream marketing Slide 6-51 Shoppers: B rowsers & Buyers Shoppers: 87% of Internet users 72% buyers 72% buyers 16% browsers (purchase offline) One? third offline retail purchases influenced by O thi d ffli t il h i fl db online activities Online traffic also influenced by offline brands and shopping pp g E? commerce and traditional commerce are coupled: part of a continuum of consuming behavior part of a continuum of consuming behavior Slide 6-52 Online Shoppers & Buyers Figure 6. 5 Slide 6-53What Consumers Shop & Buy Online Big ticket items ($500 plus) Travel, computer hardware, consumer electronics Expanding Consumers more confident in purchasing costlier items Small ticket items ($100 or less) ($ ) Apparel, books, office supplies, software, etc. Sold by first movers on Web Sold by first movers on Web Physically small i tems High margin items Broad selection of products available Slide 6-54 What Consumers Buy Online Figure 6. 6 Slide 6-55 Intentional Acts: How Shoppers Find Vendors Online pp Search engines (59%) S h i (59%) Coupon Web sites (29%) Coupon Web sites (29%) Comparison shopping sites (27%) E? ail newsletters (25%) Online shoppers are highly intentional, looking for specific products, companies, services Slide 6-56 Table 6. 6 Slide 6-57 Trust, Utility, Opportunism in Online Markets Two most important factors shaping decision Two most important factors shaping decision to purchase online: Utility: U ili Better prices, convenience, speed Trust: Asymmetry of information can lead to opportunistic behavior by sellers Sellers can develop trust by building strong reputations for honesty, fairness, delivery Slide 6-58 Basic Marketing Concepts MarketingStrategies and actions to establish relationship Strategies and actions to establish relationship with consumer and encourage purchases of p products and services Addresses competitive situation of industries and firms Seeks to create unique, highly differentiated products or services that are produced or supplied by one trusted firm Unmatchable feature set Avoidance of becoming commodity Slide 6-59 Feature Sets Three levels of product or service 1. Core product e. g. cell phone g p 2. Actual product Characteristics that deliver core benefits Ch t i ti th t d li b fit e. g. wide screen that connects to Internet 3. Augmented productAdditional benefits Basis for building the product’s brand e. g. product warranty Slide 6-60 Featu re Set Figure 6. 7 Slide 6-61 Products, Brands & Branding Process Brand: Expectations consumers have when consuming, or thinking about consuming, a specific product Most important expectations: Quality, reliability, Most important expectations: Quality reliability consistency, trust, affection, loyalty, reputation Branding: Process of brand creation Branding: Process of brand creation Closed loop marketing Brand strategy Brand equity Brand eq it Slide 6-62 Marketing A ti iti M k ti Activities: From Products to Brands Figure 6. 8Slide 6-63 STP: Segmenting, Targeting, Positioning Major ways used to segment, target customers 1. 2. 3. 4. 5. 6. Behavioral B h i l Demographic Psychographic h hi Technical Contextual Search Within segment, product is positioned and branded as a unique, high? value product, especially suited to q g p p y ne eds of segment customers Slide 6-64 Are Brands Rational? For consumers, a qualified yes: Brands introduce market efficiency by reducing search and decision? making costs For business firms, a definite yes: A major source of revenue Lower customer acquisition cost Increased customer retention Successful brand constitutes a long? asting (though not necessarily permanent) unfair competitive advantage Slide 6-65 Can Brands Survive Internet? Brands & Price Dispersion p Early postulation: Law of One Price ; end of brands Early postulation: â€Å"Law of One Price†; end of brands Instead: Consumers still pay premium prices for differentiated products E? commerce firms rely heavily on brands to attract customers and charge premium prices Substantial price dispersion Large differences in price sensitivity for same product Large differences in price sensitivity for same product â€Å"Library effect†Slide 6-66Revolution in Internet Marketing Technology Three broad impacts: Scope of marketing communications broadened Richness of marketing communications increased g Information intensity of marketplace expanded Internet marketing technologies: Internet marketing technologies: Web transaction logs Cookies and Web bugs Cookies and Web bugs Databases, data warehouses, data mining Advertising networks Customer relationship management systems Slide 6-67 Web Transaction LogsBuilt into Web server software Record user activity at Web site y Webtrends: Leading log analysis tool Provides much marketing data, especially  Provides much marketing data especially combined with: Registratio n forms R i i f Shopping cart database Answers questions such as: What are major patterns of interest and purchase? After home page, where do users go first? Second? Slide 6-68 Cookies & Web Bugs Cookies: Small text file Web sites place on visitor’s PC every time they visit, as specific pages are accessed Provide Web marketers with very quick means of identifying customer and understanding prior behavior Flash cookiesWeb bugs: Tiny (1 pixel) graphics embedded in e mail and Web sites Tiny (1 pixel) graphics embedded in e? mail and Web sites Used to automatically transmit information about user and page being viewed to monitoring server page being viewed to monitoring server Slide 6-69 Insight on Society g y Every Move You Make, Every Click You Make, Weâ₠¬â„¢ll Be Tracking You , g Class Discussion Slide 6-70 Databases Database:  Stores records and attributes Database management system (DBMS): Software used to create, maintain, and access databasesSQL (Structured Query Language): Industry? standard database query and manipulation language used in y q y p g g a relational database Relational database: Represents data as two? dimensional tables with records organized in rows and attributes in columns; data within different tables can be flexibly related as long as the tables share a common data element flexibly related as long as the tables share a common data element Slide 6-71 Relational Database View of E-commerce Customers Figure 6. 12 Slide 6-72 Data Warehouses & Data Mining Data warehouse:Collects firm s transactional and custom er data in single Collects firm’s transactional and customer data in single location for offline analysis by marketers and site managers Data mining: Analytical techniques to find patterns in data, model Analytical techniques to find patterns in data model behavior of customers, develop customer profiles Query? driven data mining Query driven data mining Model? driven data mining Rule? based data mining l b dd Collaborative filtering Slide 6-73 Data Mining & Personalization Figure 6. 13 Slide 6-74 Insight on TechnologyThe Long T il Big Hits and Big Misses Th L Tail: Bi Hi d Bi Mi Class Discussion Slide 6-75 Customer Relationship Management ( (CRM) Systems ) y Record all contact that customer has with firm Generates customer profile available to everyone in firm with need to â€Å"know the customer†fi ith d t â€Å"k th t †Customer profiles can contain: ustomer profiles can contain: Map of the customer’s relationship with the firm Product and usage summary data Demographic and psychographic data Profitability measures Contact history Contact history Marketing and sales information Slide 6-76Customer Relationship Management System Figure 6. 14 Slide 6-77 Market Entry Strategies Figure 6. 15 Slide 6-78 Establishing Customer Relationship Advertising Networks Banner advertisements Ad server selects appropriate banner ad based on Ad server selects appropriate banner ad based on cookies, Web bugs, backend user profile databases Permission marketing Permission marketing Affiliate marketing g Slide 6-79 How Advertising Network Works e. g. , DoubleClick Figure 6. 16 Slide 6-80 Establishing Customer Relationship (cont’d) Viral marketingGett ing customers to pass along company’s marketing message to friends, family, and colleagues Blog marketing Using blogs to market goods through commentary and U i bl k d h h d advertising Social network marketing, social shopping Mobile marketing Mobile marketing Slide 6-81 Insight on Business Social Network Marketing: Let’s Buy Together Class Discussion Slide 6-82 Establishing Customer Relationship (cont’d) Wisdom of crowds (Surowiecki, 2004) ( , ) Large aggregates produce better estimates and judgments Examples: E l Prediction markets Folksonomies Social tagging Social taggingBrand leveraging Slide 6-83 Customer Retention: Strengthening Customer Relationship p Mass marketing Mass marketing Direct marketing Micromarketing Micromarketing Personalized, one? to? one marketing  Segmenting market on precise a nd timely understanding of Segmenting market on precise and timely understanding of individual’s needs Targeting specific marketing messages to these individuals Positioning product vis? a? vis competitors to be truly unique Personalization Can increase consumers sense of control, freedom Can also result in unwanted offers or reduced anonymity Slide 6-84Mass Market-Personalization Continuum Figure 6. 17 Slide 6-85 Other Customer Retention Marketing Technics Customization Customer co? production Transactive content: Combine traditional content with dynamic information tailored to each user’s profile Customer service FAQs Q Real? time customer service chat systems Automated response systems Automated response systems Slide 6-86 Net Pricing Strategies Pricing Integral part of marketing strategy I t l t f k ti t t Traditionally based on: Fixed cost Variable costs Demand curve Price discrimination Price discriminationSelling products to different people and groups based on willingness to pay Slide 6-87 Net Pricing Strategies (cont’d) Free and freemium Can be used to build market awareness Versioning Creating multiple versions of product and selling essentially same product to different market segments at different prices at different prices Bundling Offers consumers two or more goods for one price Off t d f i Dynamic pricing: Auctions Yield management Slide 6-88 Channel Management Strategies Channels: Different methods by which goods can be distributed and soldChannel conflict: When new venue for selling products or services threatens gp or destroy s existing sales venues E. g. online airline/travel services and  traditional offline travel agencies Some manufacturers are using partnership gp p model to avoid channel conflict Slide 6-89 Chapter 7: E-commerce Marketing Communications Chapter 7 E-commerce Advertising Copyright  © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 7-90 Video Ads: Shoot, Click, Buy Class Discussion Slide 7-91 Marketing Communications Two main purposes:Sales – promotional sales communications Branding – b di B di branding communications i i Online marketing communications Online marketing communications Takes many forms Online ads, e? mail, public relations, Web sites Slide 7-92 Online Advertising li d i i $25 billion, 15% of all advertising Advantages: Internet is where audience is moving g Ad targeting Greater opp ortunities for interactivity Greater opportunities for interactivity Disadvantages: Cost versus benefit How to adequately measure results Supply of good venues to display ads Slide 7-93 Online Advertising from 2002-2014 Figure 7. Slide 7-94 Forms of Online Advertisements Display ads Rich media Video ads Search engine advertising Social network, blog, and game advertising Social network blog and game advertising Sponsorships Referrals (affiliate relationship marketing) E? mail marketing g Online catalogs Slide 7-95 Display Ads Banner ads Rectangular box linking to advertiser’s Web site IAB guidelines e. g. Full banner is 468 x 60 pixels, 13K e g Full banner is 468 x 60 pixels 13K Pop? up ads Appear without user calling for them Provoke negative consumer sentiment g Twice as effective as normal banner ads Pop? nder ads: Open beneath browser window Pop under ads: Open beneath browser window Slide 7-96 Rich Media Ads Use Flash, DHTML, Java, JavaScript About 7% of all online advertising expenditures Tend to be more about branding d b b b di Boost brand awareness by 10% Boost brand awareness by 10% IAB standards limit length Interstitials Superstitials Slide 7-97 Video Ads Fastest growing form of online advertisement IAB standards Linear video ad Non? linear video ad In? banner video ad In? text video ad Ad placement Advertising networks Advertising exchanges Banner swappingSlide 7-98 Search Engine Advertising h i d i i Almost 50% of online ad spending in 2010 Types: Paid inclusion or rank Paid inclusion or rank Inclusion in search results Sponsored link areas p Keyword advertising e. g. Google AdWords e g Google AdWords Network keyword advertising (context advertising) d ii ) e. g. Google AdSense Slide 7-99 Search Engine Advertising (cont’d) Nearly ideal targeted marketing Nearly ideal targeted marketing Issues: Disclosure of paid inclusion and placement practices Click fraud Ad nonsense Slide 7-100 Mobile Advertising Half of U. S.Internet users access Internet Half of U. S. Internet users access Internet with mobile devices Currently small market, but fastest growing platform (35%) growing platform (35%) Google and Apple in race to develop Google and Apple in race to develop mobile advertising platform AdMob, iAd Slide 7-101 Sponsorships & Referrals Sponsorships Paid effort to tie advertiser s name to Paid effort to tie advertiser’s name to particular information, event, venue in a way that reinforces brand in positive yet not overtly that reinforces brand in positive yet not overtly commercial manner ReferralsAffiliate relationship marketing p g Permits firm to put logo or banner ad on another firm’s Web site from which users of th fi ’ W b it f hi h f that site can click through to affiliate’s site Slide 7-102 E-mail Marketing & Spam Explosion Direct e? mail marketing Low cost, primary cost is purchasing addresses Spam: Unsolicited commercial e? mail Spam: Unsolicited commercial e mail Approx. 90% of all e? mail Efforts to control spam: Technology (filtering software) Government regulation (CAN? SPAM and state laws) Voluntary self? regulation by industries (DMA ) y g y Volunteer efforts Slide 7-103Percentage of E-mail That Is Spam Figure 7. 6 Slide 7-104 Online Catalogs Equivalent of paper? based catalogs Graphics? intense; use increasing with increase in broadband use in broadband use Two types: 1. 2. 2 Full? page spreads, e. g. Landsend. com Grid displays, e. g. Amazon Grid displays e g Amazon In general, online and offline catalogs complement each other Slide 7-105 Social Marketing â€Å"Many? to? many† model Uses digitally enabled networks to spread ads Blog advertising Blog advertising Online ads related to content of blogs Social network advertising: Social network advertising:Ads on MySpace, Facebook, YouTube, etc. Game advertising: G d ti i Downloadable â€Å"advergames†Placing brand? name products within games Slide 7-106 Insight on Society g y Marketing to Children of the Web in the Age of Social Networks g Class Discussion Slide 7-107 Behavioral Targeting Interest? based advertising Data aggregators develop profiles Data aggregators develop profiles Search engine queries Online browsing history O li b i hi Offline data (income, education, etc. ) d Information sold to 3rd party advertisers, who deliver ads based on profile Ad exchanges Privacy concerns acy co ce s Consumer resistance Slide 7-108Mixing Off-line & Online Marketing Communications g Most successful marketing campaigns M t f l k ti i incorporate both online and offline tactics Offline marketing Drive traffic to Web sites Drive traffic to Web sites Increase awareness and build brand equity Consumer behavior increasingly multi? channel 60% consumers research online before buying offline % y g Slide 7-109 Insight on Business g Are the Very Rich Different From You and Me? Class Discussion Sl ide 7-110 Online Marketing Metrics: Lexicon Measuring audience size or market share Impressions I i Click? through rate (CTR) View? hrough rate (VTR) Vi th h t (VTR) Hits Page views P i Stickiness (duration) Unique visitors Loyalty Reach Recency Slide 7-111 Online Marketing Metrics (cont’d) Conversion of visitor Conversion of visitor to customer Acquisition rate q Conversion rate Browse? to? buy? ratio View? to? cart ratio Vi t t ti Cart conversion rate Checkout conversion rate Checkout conversion rate Abandonment rate Retention rate Attrition rate E mail metrics E? mail metrics Open rate Delivery rate Delivery rate Click? through rate (e mail) (e? mail) Bounce? back rate Slide 7-112 Online Consumer Purchasing ModelFigure 7. 8 Slide 7-113 How Well Does Online Adv. Work? Ultimately measured by ROI on ad campaign Highest click? through rates: Searc h engine ads, Permission e mail campaigns Permission e? mail campaigns Rich media, video interaction rates high Online channels compare favorably with traditional Most powerful marketing campaigns use multiple Most powerful marketing campaigns use multiple channels, including online, catalog, TV, radio, newspapers, stores newspapers, stores Slide 7-114 Comparative Returns on Investment Figure 7. 9 Slide 7-115 Costs of Online Advertising Pricing modelsBarter Cost per thousand (CPM) Cost per click (CPC) Cost per action (CPA) Cost per action (CPA) Online revenues only Sales can be directly correlated Sales can be directly correlated Both  online/offline revenues Offline purchases cannot always be directly related to online Offli h t l b di tl l t dt li campaign In general, online marketing more  expensive on CPM In general online marketing more expensive on CPM basis, but more effective Slide 7-116 Web Site Activity Analysis b i i i l i Figure 7. 10 Slide 7-117 Insight on Technology It’s 10 P. M. Do You Know Who Is On Your Web Site? Class Discussion Slide 7-118Web Site †¦ as Marketing Communications Tool g Web site as extended online advertisement W b i d d li d i Domain name: An important role Domain name: An important role Search engine optimization: Search engine optimization: Search engines registration Keywords in Web site description K d i W b it d i ti Metatag and page title keywords Links to other sites k h Slide 7-119 Web Site Functionality b i i li Main factors in effectiveness of interface Utility Ease of use Top factors in credibility of Web sites: Top factors in credibility of Web sites: Design look Info rmation design/structure g / Information focusOrganization is important for first time users, but Organization is important for first? time users but declines in importance Information content becomes major factor attracting Information content becomes major factor attracting further visits Slide 7-120 Factors in Credibility of Web Sites Figure 7. 11 Slide 7-121 Table 7. 9 Slide 7-122 Chapter 8: Ethical, Social, and Political Issues in E-commerce E commerce Chapter 8 Ethics, Law, E-commerce Copyright  © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 8-123 Ethical, Social, Political Issues in E-commerceInternet, like other technologies, can: Internet like other technologies can: Enable new crimes Affect environment Threaten social values Costs and benefits must be carefully considered, especially when there are no id d i ll h h g g clear? c ut legal or cultural guidelines Slide 8-124 Model for Organizing Issues Issues raised by Internet and e? commerce can be viewed at individual, social, and political levels social and political levels Four major categories of issues: Four major categories of issues: Information rights Property rights Property rights Governance Public safety and welfare Slide 8-125Moral Dimensions of Internet Society M l Di i f I S i Figure 8. 1 Slide 8-126 Basic Ethical Concepts i hi l Ethics Study of principles used to determine right and wrong courses of action Responsibility p y Accountability Liability Laws permitting individuals to recover damages Due process Laws are known, understood Laws are known understood Ability to appeal to higher authorities to ensure laws applied correctly Slide 8-127 Analyzing Ethical Dilemmas l i hi l il Process for analyzing ethical dilemmas: 1. 2. 3. 3 4. 5. Identify and clearly describe the facts Define the conflict or dilemma and identify the y higher? rder values involved Identify the stakeholders Identify the stakeholders Identify the options that you can reasonably take t k Identify the potential consequences of your options Slide 8-128 Candidate Ethical Principles Golden Rule Universalism Slippery Slope Collective Utilitarian Principle Risk Aversion Ri k A i No Free Lunch The New York Times Test The Social Contract Rule Slide 8-129 Privacy & Information Rights Privacy: Moral right of individuals to be left alone, free from surveillance or interference from other individuals or organizations Information privacy p y Subset of privacy Includes:The claim th at certain information should not be collected at all The claim of individuals to control the use of whatever h l i f i di id l l h f h information is collected about them Slide 8-130 Privacy & Information Rights (cont. ) Major ethical issue related to e? commerce and privacy: d i Under what conditions should we invade the privacy of others? Major social issue: j Development of â€Å"expectations of privacy† and privacy norms privacy norms Major political issue: Development of statutes that govern relations D l t f t t t th t l ti between recordkeepers and individuals Slide 8-131 Information Collected at E-commerce SitesData collected includes Personally identifiable information (PII) Anonymous information Anonymous information Types of data collected yp Name, a ddress, phone, e? mail, social security Bank and credit accounts, gender, age, occupation, B k d di d i education Preference data, transaction data, clickstream data, browser type Slide 8-132 Social Networks & Privacy Social networks Encourage sharing personal details Pose unique challenge to maintaining privacy Facebook s Beacon program Facebook’s Beacon program Facebook s Terms of Service change Facebook’s Terms of Service change Slide 8-133 Profiling & Behavioral Targeting ProfilingCreation of digital images that characterize online individual and group behavior Anonymous profiles A fil Personal profiles Personal profiles Advertising networks Track consumer and browsing behavior on Web T k db i b h i W b Dynamically adjust what user sees on screen Build and refresh profiles of consumers Google’s AdWords program Slide 8-134 Profiling & Behavioral Targeting (cont’d) Deep packet inspection Business perspective: Web profiling serves consumers and businesses Increases effectiveness of advertising, subsidizing free content Enables sensing of demand for new products and services Critics perspective:Undermines expectation of anonymity and privacy Consumers show significant opposition to unregulated collection of personal information Enables weblining Slide 8-135 Internet & Government Invasions of Privacy Various laws strengthen ability of law enforcement agencies to monitor Internet users without i i I ih knowledge and sometimes without judicial oversight CALEA, PATRIOT Act, Cyber Security Enhancement Act, Homeland Security Act Government agencies are largest users of private sector commercial data brokers sector commercial data brokers Retention by ISPs of user data a concern Slide 8-136Legal Protections In U. S. , privacy rights explicitly granted or derived from Constitution Constitution First Amendment  – freedom of speech and association Fourth Amendment  – unreasonable search and seizure F th A d t bl h d i Fourteenth Amendment  – due process Specific statutes and regulations (federal and Specific statutes and regulations (federal and state) Common law Slide 8-137 Informed Consent U. S. firms can gather and redistribute transaction information without individual’s i i f i ih i di id l’ informed consent Illegal in Europe Informed consent: Opt? in Opt out Opt? out Many U. S. ? commerce firm s merely publish information p practices as part of privacy policy without providing for p p yp y p g any form of informed consent Slide 8-138 FTC’s Fair Information Practices Principles Federal Trade Commission: Federal Trade Commission: Conducts research and recommends legislation to Congress Fair Information Practice Principles (1998): Fair Information Practice Principles (1998): Notice/Awareness (Core) Choice/Consent (Core) Choice/Consent (Core) Access/Participation Security Enforcement Guidelines, not laws Guidelines not laws Slide 8-139 FTC’s Fair Information Practice PrinciplesNotice/Awareness i / Sites must disclose information practices before collecting data. Includes Sit t di l i f ti ti b f ll ti d t I l d identification of collector, uses of data, other recipients of data, nature of collection (ac tive/inactive), voluntary or required, consequences of refusal, and steps taken to protect confidentiality, integrity, and quality of the data Choice/Consent There must be a choice regime in place allowing consumers to choose how their information will be used for secondary purposes other than supporting the transaction, including internal use and transfer to third parties.Opt? in/Opt? out must be available. Consumers should be able to review and contest the accuracy and completeness of data collected about them in a timely, inexpensive process. Access/Participation ccess/ a c pa o Security y Enforcement Data collectors must take reasonable steps to assure that consumer information is accurate and secure from unauthorized use. There must be in place a mechanism to enforce FIP principles. This can involve self? regulation, legislation giving consumers legal remedies for violations, or federal statutes and regulation. di f i l ti f d l t t t d l ti Slide 8-140FTC Recommendations: Online Profiling Principle p Notice Recommendation Complete transparency to user by providing disclosure and choice options on the host Web site. â€Å"Robust† notice for PII (time/place of collection; before collection begins). Clear and conspicuous notice for non PII. before collection begins). Clear and conspicuous notice for non? PII. Opt? in for PII, opt? out for non? PII. No conversion of non? PII to PII without consent. Opt? out from any or all network advertisers from a single page consent Opt out from any or all network advertisers from a single page provided by the host Web site.Reasonable provisions to allow inspection and correction. Reasonable efforts to secure information from loss, misuse, or improper access. Done by independent third parties, such as seal programs and accounting Done by independent third parties such as seal programs and accounting firms. medical topics, sexual behavior or sexual orientation, or use Social Security medical topics sexual behavior or sexual orientation or use Social Security numbers for profiling. Slide 8-141 Choice Access Security EnforcementRestricted Collection Advertising networks will not collect information about sensitive financial or European Data Protection Directive Privacy protection much stronger inà ‚ Europe than U. S. European approach: Comprehensive and regulatory in nature p g y European Commission’s Directive on Data Protection (1998): (1998): Standardizes and broadens privacy protection in European Union countries Department of Commerce safe harbor program: For U. S. firms that wish to comply with Directive Slide 8-142 Private Industry Self-RegulationSafe harbor programs: Private policy mechanism to meet objectives of Pi t li h i t t bj ti f government regulations without government involvement e. g. Privacy seal programs e g Privacy seal programs Industry associations include: Online Privacy Alliance (OPA) Network Advertising Initiative (NAI) CLEAR Ad Notice Technical Specifications Privacy advocacy groups Emerging privacy protection business Slide 8-143 Insight on Business Chief Privacy Officers hi f i ffi Class Discussion Slide 8-144 Technological Solutions Spyware, pop? p blockers Cookie managers k Anonymous remailers, surfing Anonymous remailers surfing Platform for Privacy Preferences (P3P): Comprehensive technological privacy protection standard Works through user s Web browser Works through user’s Web browser Communicates a Web site’s privacy policy Compares site policy to user’s preferences or to other standards such as FTC’s FIP guidelines or EU’s Data Protection Directive Slide 8-145 How P3P Works k Figure 8. 2(A) Slide 8-146 Insight on Technology The Privacy T Th P i Tug of War: fW Advertisers Vs. Consumers Class Discussion Slide 8-147 Intellectual Property Rights Intellectual property:Encompasses all tangible and intangible products of human  mind Major ethical issue: j How should we treat property that belongs to others? Major social issue: Major social issue: Is there continued value in protecting intellectual property in the Internet age? Major political issue: How can Internet and e? commerce be regulated or governed to g g protect intellectual property? Slide 8-148 Intellectual Property Protection Three main types of protection: Copyright Patent Trademark law Trademark law Goal of intellectual property law: Balance two competing interests  public and B l t ti i t t bli d privateMaintaining this balance of interests is always M i t i i thi b l fi t t i l challenged by the invention of new technologies Slide 8-149 Copyright Protects original forms of expression (but not ideas) from being copied by others for a  ideas) from being copied by others for a period of time Look and feel copyright infringement lawsuits Fair use doctrine Fair use doctrine Digital Millennium Copyright Act, 1998 First major effort to adjust copyright laws to Internet age Implements WIPO treaty that makes it illegal to make, distribute, or use devices that circumvent technology? ased protections of copyrighted materials Slide 8-150 Patents Grant owner 20? year monopoly on ideas behind an invention Machines Man? made products p Compositions of matter Processing methods Invention must be new, non? obvious, novel Encourages inventors g Promotes dissemination of new techniques through licensing Stifles competition by raising barriers to entry Slide 8-151 E-co mmerce Patents 1998 State Street Bank & Trust v. Signature Financial Group Business method patents Led to explosion in application for e? commerce â€Å"business L dt l i i li ti f â€Å"b i methods† patentsMost European patent laws do not recognize M tE t tl d t i business methods unless based on technology Examples Amazon’s One? click purchasing DoubleClick’s dynamic delivery of online advertising Slide 8-152 Trademarks d k Identify, distinguish goods and indicate their source Purpose p Ensure  consumer gets what is paid for/expected to receive Protect owner against piracy and misappropriation Infringement Market confusion Bad faith Dilution Behavior that weakens connection between trademark and product Slide 8-153 Trademarks & Internet CybersquattingAnticy bersquatting Consumer Protection Act (ACPA) Cyberpiracy Typosquatting Metatagging M i Keywording y g Deep linking Framing Slide 8-154 Governance Primary questions Who will control Internet and e? commerce? What elements will be controlled and how? What elements will be controlled and how? Stages of governance and e? commerce g g Government Control Period (1970–1994) Privatization (1995–1998) Privatization (1995 1998) Self? Regulation (1995–present) Government Regulation (1998–present) Slide 8-155 Who Governs E-commerce & Internet? Mixed mode environmentSelf? regulation, through variety of Internet policy and technical bodies, co exists with limited and technical bodies co? exists with limited government regulation ICANN : Domain Name System Internet could be easily controlled, I t t ld b il t ll d m onitored, and regulated from a central location Slide 8-156 Taxation E? commerce taxation illustrates complexity of governance and jurisdiction issues governance and jurisdiction issues U. S. sales taxed by states and local government MOTO retailing E? commerce benefits from tax â€Å"subsidy†yOctober 2007: Congress extends tax moratorium for an additional seven years an additional seven years Unlikely that comprehensive, integrated rational approach to taxation issue will be determined for approach to taxation issue will be determined for some time to come Slide 8-157 Net Neutrality Currently, all Internet traffic treated equally – all activities charged the same rate, no ll i i i h d h preferential assignment of bandwidth Backbone providers would like to charge differentiated prices and ration bandwidth 2010, U. S. ppeals court ruled that FCC had no authority to regulate Internet providers Slide 8-158 Public Safety & Welfare Protection of children and strong g sentiments against pornography Passing legislation that will survive court P i l i l ti th t ill i t challenges has proved difficult Efforts to control gambling and restrict sales of drugs and cigarettes sales of drugs and cigarettes Currently mostly regulated by state law Unlawful Internet Gambling Enforcement Act Slide 8-159 Insight on Society Internet Drug Bazaar Class Discussion Slide 8-160
Subscribe to:
Posts (Atom)