Friday, August 21, 2020

MANAGERIAL REPORT Essays - Regression Analysis, Multicollinearity

Administrative REPORT Presentation The motivation behind this investigation was to build up a relapse model to foresee mortality. Information was gathered, by specialists at General Motors, on 60 U.S. Standard Metropolitan Statistical Areas (SMSA's), in an investigation of whether air contamination adds to mortality. This information was acquired and arbitrarily arranged into two even gatherings of 30 urban communities. A relapse model to anticipate mortality was work from the main arrangement of information and approved from the second arrangement of information. BODY The accompanying information was seen as the key drivers in the model: ? Mean July temperature in the city (degrees F) ? Mean relative stickiness of the city ? Middle instruction ? Percent of cubicle laborers ? Middle salary ? Endure dioxide contamination potential The goal in this examination was to discover the line on a diagram, utilizing the factors referenced above, for which the squared deviations between the watched and anticipated estimations of mortality are littler than for some other straight line model, accepting the contrasts between the watched and anticipated estimations of mortality are zero. When discovered, this ?Least Squared Line? can be utilized to appraise mortality given any estimation of above information or anticipate mortality for any estimation of above information. Every one of the key information components was checked for a ringer molded evenness about the mean, the direct (straight line) nature of the information when diagramed and equivalent squares of deviations of estimations about the mean (fluctuation). Subsequent to deciding if to avoid information focuses, the accompanying model was resolved to be the best model: - 3276.108 + 862.9355x1 - 25.37582x2 + 0.599213x3 + 0.0239648x4 + 0.01894907x5 - 41.16529x6 + 0.3147058x7 + See rundown of autonomous factors on TAB #1. This model was approved against the second arrangement of information where it was resolved that, with 95% certainty, there is critical proof to reason that the model is valuable for anticipating mortality. Despite the fact that this model, when approved, is regarded appropriate for estimation and forecast, as substantiated by the 5% mistake proportion (TAB #2), there are noteworthy worries about the model. To start with, despite the fact that the percent of test inconstancy that can be clarified by the model, as supported by the R? esteem on TAB #3, is 53.1%, in the wake of changing this incentive for the quantity of parameters in the model, the percent of disclosed fluctuation is decreased to 38.2% (TAB #3). The rest of the inconstancy is because of irregular blunder. Second, it creates the impression that a portion of the autonomous factors are contributing excess data because of the relationship with other free factors, known as multicollinearity. Third, it was resolved that a remote perception (esteem lying in excess of three standard deviations from the mean) was impacting the assessed coefficients. Notwithstanding the watched issues above, it is obscure how the example information was acquired. It is accepted that the estimations of the free factors were uncontrolled demonstrating observational information. With observational information, a measurably noteworthy connection between a reaction y and an indicator variable x doesn't really infer a circumstances and logical results relationship. This is the reason having a structured analysis would deliver ideal outcomes. By having a planned examination, we could, for example, control the timeframe that the information relates to. Information identifying with a more drawn out timeframe would positively improve the consistency of the information. This would invalidate the impact of any outrageous or unordinary information for the present timeframe. Likewise, accepting that salaried specialists are contrarily corresponded with contamination, we don't have the foggiest idea how the urban communities were chosen. The ideal determination of urban areas would incorporate an equivalent number of clerical urban areas and non cubicle urban areas. ! Besides, accepting a relationship of high temperature and mortality, an ideal choice of urban communities would incorporate an equivalent number of northern urban communities and southern urban communities. Ends AND RECOMMENDATIONS The model has been tried and approved on a second arrangement of information. Despite the fact that there are a few restrictions to the model, it seems to give great outcomes inside 95% certainty. On the off chance that time had allowed, various varieties of autonomous factors could have been tried so as to expand the R? worth and lessening the multicolliniarity (referenced previously). Be that as it may, until additional time can be assigned to this task, the outcomes acquired from this model can be esteemed fitting. Measurable REPORT MODEL SELECTION So as to choose the best model, a few

Saturday, July 11, 2020

Students Love An Essay Structure - Introduce Some Novel Ideas!

Student's Love An Essay Structure - Introduce Some Novel Ideas!Students often struggle to come up with a Critical Analysis essay outline. As the content of the essay grows more complex, the essay becomes increasingly difficult to write. However, this can also make it a more interesting and challenging course of study. An outline allows students to easily review the content of the course and to follow along with your lessons.Many students will review a reading and analysis essay based upon the outline. Although you may not realize it, you can benefit your students by allowing them to work with the outline throughout the course. As they work on the various tasks outlined in the outline, you will notice them enjoying their time studying. They will begin to focus on the task at hand and learn the correct methods of completing that task. It is this natural progression which will allow you to have students who are motivated and happy to learn.You do not have to always limit yourself to an analysis essay. You can always create a class project, which also incorporates a text or story. This allows you to include the written elements in the essay without writing out the entire assignment.If you find that your students often read your text on current events, do not be afraid to introduce an element of entertainment. A comedy line or even a rap verse can be inserted into the text. When you find a way to incorporate a little bit of everything, you will be able to create a truly engaging class project.Although, you may not be able to allow your students to participate in every activity related to a specific topic, you can always give them an opportunity to take part in other activities. Using an essay outline as a template, give your students a list of activities to perform during class time. Use this as an opportunity to let them learn about other aspects of learning. Encourage your students to use their creativity and innovation.Give them a chance to review lesson content before moving on to the next material. Reviewing topics can allow them to gain more knowledge and understanding in their own individual fields. It is important to allow students to gain knowledge from a variety of sources so that they can maximize their learning capabilities.Lastly, before class time comes to a close, encourage your students to go over all of the content that they learned. Make sure that they understand the subject matter, but do not limit them too much. Allow them to take some personal time to complete each section.Use your Critical Analysis essay outline as a tool for your students to expand upon the ideas presented within the outline. Allow them to incorporate this into the world of college by allowing them to create an outline based upon their own individual needs.

Wednesday, May 20, 2020

Statistical Analysis for Property Crimes - 1120 Words

I need help to create a multiple regression anlysis for this problem. Please provide as much explanation as you can. Please see attached files. My research is based on this topic below. The data is attached in the spreadsheet. This is a multiple regression analysis. I have attached a PDF file that explains the case and the spreadsheet version with all the data recorded from the PDF file. Pleas emae sure you include all the graphs, plots and please use megastat software. Topic: We want to determine the primary factors that affect property crime rates in the United States. The statistical analysis of the data involves multiple-regression analysis. Questions to answer are: 1. What are the primary determinants of property†¦show more content†¦The variables with insignificant regression coefficients can be removed from the regression model. Thus the modified regression model is Crimes = b0+ b1Dropout + b2density+b3 Urban Thus the primary determinants of property crimes in the United States are the 1. High School dropout rate 2. Population / square milesShow MoreRelatedProperty Crime Report1462 Words   |  6 Pagespresents statistics on major factors that affects the property crime rates in the U.S. Abstract: The property crime rates of 45.7% occurs more in urban areas. About 16.8% of the crimes were committed by high school dropouts and only 0.4% of the crimes that occurs were related to the population density. The type of property crimes that happens includes larceny-theft, home burglary, home invasion, grand theft auto, forgery, and arson. These types of crimes may be caused by factors such as high school dropoutsRead MoreCrime Analysis Essay924 Words   |  4 PagesRachel Boba, â€Å"Crime analysis is a law enforcement function that involves systematic analysis for identifying and analyzing patterns and trends in crime and disorder† (en.wikipedia.org/wiki/Crime analysis).The information on these patterns can assist law enforcement agencies in the deployment of resources in a more effective manner; it can also help detectives to identify and catch suspects. Crime analysis also plays a role in improvising solutions to crime problems, and developing crime prevention strategiesRe ad MoreThe Role Of Statistics And Criminal Justice1378 Words   |  6 PagesCriminal Justice. Also, this paper will focus on ways in which data is obtained keeping in mind the appropriate statistics to use with the collected data, and how to interpret the findings. In addition, it will review the causes of crimes, the rate at which these crimes occur, predictive outcomes and preventative measure to deal with criminals. The Role of Statistics in Criminal Justice To begin with, statistics can be defined as the practice or science of collecting and analyzingRead MoreStatistics Assessment : Social Research Skills963 Words   |  4 PagesStatistics Assessment Social Research Skills 1 1. The following questions are about measurement a) List the different levels a variable may take and describe the properties of the levels. The levels of measurements that variables can take are: (1) scale or continuous; (2) ordinal; (3) nominal; (4) interval; (5) Dichotomous; (6) Ratio. 1) Scale or continuous: measurements with units that are on an independent scale example include height and age. 2) Ordinal: This is not measure on an independentRead MoreA Brief Note On The State Of Virginia Department Of The Labor Bureau Of Labor Statistics Website1066 Words   |  5 Pagesyears from 1995 to 2000. Information on reported crime rates was obtained from FBI website as well as from the Geospatial and Statistical Data Center of the state of Virginia. Measures of age distributions was retrieved from the county-level census files of State of Virginia. Descriptive Statistics Figure 1: Summary Statistics †¢NEWFIPS: Identifier for county/city †¢Population structure(POPULAT): Principal component analysis(PCA) was used to develop a population structureRead MoreCrime in the City of Topeka: Analysis of the Task Force and Crime Prevention718 Words   |  3 Pagesreport is designed for the City of Topeka, Kansas Task Force on Crime and Crime Prevention. Under the auspices of a joint effort between the following agencies, the report is designed to look at crime from a micro-cultural perspective in a Midwestern capital city: The Kansas Bureau of Investigation, the Topeka Police Department, the FBIs regional office, and the University of Kansas Department of Criminology. The purpose of the data analysis is to provide a basic understanding of overall trends for TopekaRead MoreDescribe The Research Experiences You Have Had Up To Now..1309 Words   |  6 Pagesareas: the possible associations between community service programs and crime rates, with the hopes of using the data to support the funding for these community programs . I conducted a quantitative analysis of secondary data to determine the associations between community service programs that were currently active in South Carolina counties and regions (Upstate, Midlands, PeeDee, and the Lowcountry) and the violent and property crime rates. Throughout the extent of this research I gathered data fromRead MoreCommunity Service And Criminal Justice1313 Words   |  6 Pagesareas: the possible associations between community service programs and crime rates, with the hopes of using the data to support the funding for these community programs. I conducted a quantitative analysis of secondary data to determine the associations between community service programs that were currently active in South Carolina counties and regions (Upstate, Midlands, PeeDee, and the Lowcountry) and the violent and property crime rates. Throughout the extent of this research I gathered data fromRead MoreScience Merit And Scientific Merit1696 Words   |  7 PagesAccording to Gonzales (2013, para. 2, p. 1), the data collection, recruitment, and analysis should align with the research questions, as well as the monitoring, safe storage, and how the data will be destroyed should also be specified. Three dimensions of scientific merit and how it relates to this learners research The research this learner decided to work on is in regards to missing data or data gap within the UCR (Uniform Crime Report) system. The UCR in many arenas within the public safety field is consideredRead MoreWhat Are Scientific Merit?1544 Words   |  7 PagesAccording to Gonzales (2013, para. 2, p. 1), the data collection, recruitment, and analysis should align with the research questions, as well as the monitoring, safe storage, and how the data will be destroyed should also be specified. Three dimensions of scientific merit and how it relates to this learners research The research this learner decided to work on is in regards to miss or data gap within the UCR (Uniform Crime Report) system. The UCR in many arenas within the public safety field is considered

Wednesday, May 6, 2020

Essay Cold Fusion - 979 Words

Cold Fusion: The Continuing Mystery In March of 1989, a discovery was made that rocked the scientific world. Stanley Pons and Martin Fleischman had announced that they were able to create and sustain a cold fusion process. After intense media attention, and corresponding interest in future test, the subject seemed to have faded away. Future tests proved inconclusive, and when the quick promise of easy energy didn’t materialize, most quickly forgot the subject. Little is said about the continuing research in the scientific community to further our understanding of the free energy enigma. Is it science fiction, on the border of legitamete science, or is it a practical field worthy of serious attention? nbsp;nbsp;nbsp;nbsp;nbsp;Cold†¦show more content†¦Cold fusion is only produced three out of ten times under the best conditions, but this is enough to justify continued research. The first transitors were only successful one out of a hundred times until the mechanisms were completely understood. The science of the reaction taking place in cold fusion is still not clear. When pieces of the puzzle begin to fit together better, the success rate will increase, and yields will go up. nbsp;nbsp;nbsp;nbsp;nbsp;The actual set up of a cold fusion cell is an electrolyte such as hydrogen or deuterium in which a electrode made of specially treated and prepared steel is immersed. The lattice structure of the metal is filled with the hydrogen, where the fusion occurs. The problem is most metals fracture when subjected to these conditions. High loading is the state in which the metal survives, and begins to produce energy. There are numerous different methods and materials that are used to accomplish this goal. The original was a Heavy water solution with an electrolyte, in which a current is passed between a palladium alloy electrode. Several other new methods are in use today but the most promising is the Ceramic Proton Conductor. In this case, a low current is passed through a strontium-cerium-oxide in deuterium atmosphere. The reaction gives off significant excess energy. nbsp;nbsp;nbsp;nbsp;nbsp;Cold fusion differs significantlyShow MoreRelated Cold Fusion Research Paper3560 Words   |  15 PagesCold Fusion Research Paper As the world becomes more aware of the growing need for a more abundant energy supply, one energy source has been swept under the carpet and virtually ignored. This source is cold fusion. Cold fusion is: â€Å"A reaction that occurs under certain conditions in supersaturated metal hydrides (metals with lots of hydrogen or heavy hydrogen dissolved in them). It produces excess heat, helium, and a very low level of neutrons. In some experiments the host metal has been transmutedRead More Nuclear Fusion a Feasible Source of Power Essay example2061 Words   |  9 PagesIs Nuclear Fusion a Feasible Source of Power? Abstract: Nuclear fusion may be an effective solution to the energy problem in today?s world. Fusion is environmentally friendly and has the potential to generate massive amounts of power. It is evident that the Sun?s power is fueled by nuclear fusion. Recent advancements such as ITER and NIF may bring us closer to being able to use fusion. We find that nuclear fusion is a long-term solution to a continuing problem. Introduction: Since theRead MoreClimate Change And Destruction Of Natural Resources991 Words   |  4 Pagesrun. Therefore, nuclear fusion is the way to go. Fusion can be powered by sea water for millions of years, emits no radioactive gas or greenhouse gas, and is safe (as opposed to fission). JET, a research institute in Europe, has already done it, generating 16 megawatts of power, enough to power 8,000 homes, in a matter of seconds. These reactors are unaffected by climate, geography, etc., so they are viable to use anywhere in terms of space. The only issues are that fusion is too expensive, and becauseRead MoreOil And Its Impact On The Economy1350 Words   |  6 Pageswas nuclear fusion, a process that would transform mankind forever. Nuclear fusion is the same process used by the sun, and all the other stars in the universe. Hydrogen is heated to unimaginably high temperatures and fuse, forming helium and releasing enormous amounts of energy. Fusion produced no radiation and no pollution, making it the energy source scientists dreamed of. Since as early as the 1950’s, there has been research into nuclear fusion. Unfortunately, motivated by the cold war, much ofRead MoreA Report Analyzing The Viability Of The Nuclear Fusion1730 Words   |  7 PagesCouncil Today I am writing you a report analysing the viability of the use of Nuclear Fusion as a energy source in your community. I will analyse the feasibility of this kind of nuclear power in your community by firstly explaining what nuclear fusion is and how it works. I will then use calculations to estimate how this new energy produced could compare to the amount of energy used by the city currently. Nuclear Fusion occurs when two small nuclei fuse to form a larger nucleus (this is not to be confusedRead MoreHow A Nuclear Bomb Works1487 Words   |  6 PagesHow a nuclear bomb works It refers to the use of nuclear bombs explosive reaction releases tremendous energy on the target causing destruction destructive weapons. Explosive nuclear reaction is the use of self-sustaining nuclear fission or fusion reaction proceeds rapidly, the instantaneous release of energy produced by nuclear reactions huge explosion and the formation of devastating destruction destructive effect. Extremely destructive bomb, now as a powerful national strength and performance heritageRead MoreIntroduction Of Plasm What Is Plasma?1208 Words   |  5 Pagesgas consisting of approximately equal numbers of positively charged ions and negatively charged electrons. Figure: Plasma globe (courtesy: Martin Koppe) Classification of plasma: Figure: Classification of Plasma What is Cold Plasma? Cold plasmas are those with Te Tgas. It is obtained in low pressure discharges or in short pulse discharges as Dielectric Barrier Discharges or ns discharges. What is Hot Plasma? Hot plasmas, or better thermal plasmas, are those with Te~TgasRead MoreThe Torus Shaped Vessel2415 Words   |  10 Pagesx shows how the cooling system works with a pipe with cooling fluid flowing through it is fitted through blocks of armour material which make up the targets. Looking to the future as projects grow in size towards DEMO, which will be a functioning fusion power plant, the demands on materials especially PFC’s are going to increase. For ITER the plasma facing components for the divertor are to be made of carbon fibre-reinforced carbon composite’s (CFC) and some sections tungsten armour materials butRead MoreStyle Over Substance in Truman Capotes In Cold Blood Essay506 Words   |  3 PagesStyle Over Substancenbsp;in Capotes In Cold Bloodnbsp;nbsp;nbsp;nbsp; nbsp; In Murder, He Wrote, William Swanson believes the stylistic techniques employed in Truman Capotes novel In Cold Blood are more memorable than the story itself. For Swanson, Capote not only captures the readers attention with a story about a horrific crime, but his use of diverse voices, sounds, and silences make it an event people will never forget. nbsp; Almost two decades after his initial exposureRead MoreThe War Of The Cold War1508 Words   |  7 Pagesstruggle. But the question is, what led to the Cold War? Was it the Soviets, who revoked their agreements to allow the people of Eastern Europe to determine their own fates by imposing totalitarian rule on territories? Or was it the Americans, who ignored the Soviets security concerns, terrified the world with the atomic bomb, and pushed relentlessly to expand their own international influence and market supremacy? The tensions that led to the cold war became evident in 1943. The Big Three allied

Clean Air Partnership Essay Research Paper For free essay sample

Clean Air Partnership Essay, Research Paper For immediate release: July 6, 1999 Regional Clean Air Partnership The Clean Air Partnership will be hosting a? VIP Reception? on Thursday, July 8th at the Science Center from 5:30 p.m. to 7:30 p.m. The response is being held in an attempt to increase the degree of consciousness of CEO? s and senior directors of country concerns and establishments sing the continued demand to turn to ozone air quality in the greater metropolitan part. To day of the month, about 400 local employers are officially take parting in either the Clean Air Partnership? s Clean Air Coordinator ( CAC ) or Ridefinder? s Employee Transportation Coordinator ( ETC ) Programs. These attempts involve the instruction and encouragement of employees to take voluntary steps to better regional air quality, mostly based in the usage of car/van pools and mass theodolite. Many of these steps are recommended in response to American Lung Association? s ozone prognosiss that are disseminated to the CAC? s and ETC? s every bit good as through local intelligence media, roadside message boards and the Science Center flyover to the general populace. We will write a custom essay sample on Clean Air Partnership Essay Research Paper For or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page In an attempt to spread out Clean Air Partnership engagement beyond response to bad ozone prognosiss, Dick Fleming, President and CEO of the Regional Commerce and Growth Association, and Honorary Co-Chair of the Clean Air Partnership, made particular invitation to several country concern and civic leade R to go to the VIP Reception on Thursday. ? The ground for this assemblage is simple, ? Fleming stated. ? We want to go on our ongoing attempts to better the air quality in the part. While we have made great paces conveying the figure of bad air yearss down in the last decennary? down 80 % from the mid-80? s? there is still more to carry through. Not merely do we desire to guarantee conformity with all local, province and federal clean air Torahs, but we besides want to make all we can to guarantee the highest quality of life possible for those who live and work throughout the part. ? Through a new? Community Development? commission within the Clean Air Partnership, our concern and civic leaders will be encouraged to commit the impression throughout the part that attending to air quality is indispensable in order to keep a healthful, every bit good as economically sustainable, lifestyle in the greater part. Examples of such? institutional? parts have already been demonstrated by both and Illinois Departments of Transportation in planned postponement of lawnmowing and painting operations on? red? air yearss, and MSD? s delay of a family risky waste aggregation twenty-four hours until after the ozone season. ? Engagement does non hold to be dearly-won or onerous. It merely takes planning, and some institutional committedness, ? Fleming added. That is the point of Thursday? s response. The Clean Air Partnership is? ? ? ( I? thousand certain Julie has canned material for this ) .

Thursday, April 23, 2020

Kys Review Essay Example

Kys Review Paper Essay on Kys The book is amazing. Not that you can not break away from reading, no. The book makes you wonder. It would seem that the plot and it does not have, and that same Kys unknown forest creature, which nobody has ever seen, and the protagonist Benedict constantly lost in the surrounding life descriptions. But all this is not just like that, all the time In fact, I did not like Benedict and the consequences of any kind is not received, and taught literacy, and job of work is not dusty, and the master of all trades, but not in him umishka. Umok it is so small, but in the dust stale, thats a pity becomes straight and Barbara, and Nikita Kuzmich and his mother because they are all trying to do the best, Maral inculcate. But no, he was not train all used his brow knit, duckies Tapping, yes of Olenka dream By the way, Olga Benedict is very suitable -. Bright face, spit up the floor, the consequences of not. Well it turned out after a courtship that clawed and Benny himself with a tail has appeared. And what do you think? So Benny moved out of the old hut-wreck in the new tower. And there he is now such concerns as before: all slaves do. And he sits there and reads books. It would seem that little minds must grow, expand, but not as has absorbed some of hundreds of books and magazines, and even more covered with dust. But thats the idea appeared obsession: Wherever else take the dose books And here came out of it I advise you to read We will write a custom essay sample on Kys Review specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Kys Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Kys Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer The end is ambiguous on the one hand shaken Benedict. and on the other the surviving former, which in effect throughout the book, or reminiscing about the times before the Blast, or tried to somehow restore the former order. And they did not even try soon so, kind of do: So you are not dead, or what? A .. or died .. - But to understand how to know .. ! Kys Review Essay Example Kys Review Paper Essay on Kys Entertaining work. Select the main line in the genre can not be novel. The post-nuclear explosion fantastic pot boiled mutants new and old. Still clinging to the pitiful remnants of the culture of the previous civilization. A new live currently in a post-apocalyptic world, and live perfectly ognetsami indulge, lure mice, rusty smoke, before the Greatest Murza Fyodor Kuzmich reverence. Certainly degraded, but understand: the preconditions for this dystopia is;) Juicy dremuchederevenskostaroobryadchesky language adds this parody russkoskazochnogo world identity, strengthens the goodies of the images. Funny satirical moments diluted each chapter. Multi-genre is uncertain. In general, shall be construed as your heart desires. Would you like science fiction? here you are you. Postapokalipsis? hold in two hands. Dystopia? votushki. Would you like a parody-satire? and here it is, etc. Multifaceted varied. We will write a custom essay sample on Kys Review specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Kys Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Kys Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer You can also discard all this cleverness, along with our life today, then Kys can be called a hymn of love for the Book, the Word, to the ABC (ABC is, not alphabetically). If you listen, you can hear how quietly booklet call us: kyyys-Kys-Kys, lets Read-Think. Do you hear them? However, we must understand that for the sake of reading Reading thoughtless and ruthless action By the way, childrens cruelty post-explosion of life (take the same game or udushalochku poskakalochki) and its untidiness that if for some reason It leaves no feeling chernushny. On the contrary, after the book is still a sense of something light and clean, although scary at heart and suddenly World Kysi eerie but cozy Of course, there are some logical inconsistencies in this book.. But they do not want to talk. Kys unusual and surprising in its fabulous woodcut, in his grotesque reflection of our real life as in a distorting mirror. It forgives everything. It is possible to train the brain, trying again and again to guess where a particular fragment or an allusion to a poem, a work rounded:. Hell, I liked it ! Kys Review Essay Example Kys Review Paper Essay on Kys Book frankly so-so (the pause during which you can throw a tomato)  «Kys. this is NOT a dystopia. Dystopia a work that represents a different point of view on society, designed to be the ideal. So in this regard, the question: To what this ideal society of the Company Kysi ? What are the features of the criticized utopia? . There is not a utopia, because Kys is not a dystopia, a parody Metamorphoses happening with the meaning of such concepts as book, of course, carry away, but nothing revolutionary (even more so -. Nothing new) are not available. At the same Eco role of literature in society (and in the life of an individual person) is described in more believable and less dramatic. A novelty is determined by the specific context in which these metamorphoses played. And now the most important thing. IMHO the popularity of this product is due to a large extent by the fact that few of the read play a computer game  «Fallout2 ». After this game, the atmosphere and the peculiar slang post-apocalyptic world no longer seem to be something new and original (say at once: on the degree of atmospheric Kys clearly losing of Fallout y). Once I figured it out (and I quickly realized) the lions share of the attractiveness of Kysi vanished from all cracks and climbed secondary. You begin to notice the logical inconsistencies and some tension in the social organization Kysi. Question: How is it possible such a society remain without a satisfactory answer. It can, of course, and it does not matter, but still We will write a custom essay sample on Kys Review specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Kys Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Kys Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer In short: Kys does not create a single image in my mind, it is stratified into several more or less successful parodies descriptions. A parody of the intelligentsia, a parody of the cattle, a parody of the secret society, a parody of a revolution, a parody of the officials only itself Kys (the spirit of a post-apocalyptic world) attempts to link them together Unsuccessfully . Kys Review Essay Example Kys Review Paper Essay on Kys Kyyyyyyys hissing, howling, unknown forest monster Kys killer of the soul. Topochut quietly on the floor with your mouse lured the night the local currency. In the forest silently sleeping black hares, frozen on the branches. Over Fedor Kuzmichsk stretched usual winter night quiet, peaceful, snowy. About this current residents of this great city and do not have to dream. So, Muscovites? The novel enchants from the first page, thats right with the first mention of unknown Clelia and flying black birds, which is suitable for food, if they are properly soak, but boil in seven waters, but a week or two on the sun to set, but evaporate in the oven. Of course, not male and female woodcocks only! Kys swallow you in its unique rhythm, enveloped in a web of fantasy, hook hooks details and will not let go until the last page. no way to stop! Just poprivyknesh to an event, like a fat turns the plot of the path, known only to her alone and the reader, tongue hanging out, rushes for an avalanche of lines and pages on-on-on -. To the incredible end Akunins writes that I want to eat every sentence, growling and smacking lied! )) The book lacks amenities content (such heroic strong personalities the saviors of the world, or vsepoglaschayuschey love going around all the obstacles), and the world described by the writer is far from being able to be called in any way appetizing. Moreover the world after the explosions, outlined in great detail, meticulous and talented Tolstoy, scary, dirty, smelly, utterly neestetichen We will write a custom essay sample on Kys Review specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Kys Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Kys Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Let this novel is not the most delicious from the fact that you have ever read. or even read, but definitely it will be one of the most exotic dishes in your literary biography. And like all exotic Kys an amateur .

Tuesday, March 17, 2020

Causes of Car Accidents Essays

Causes of Car Accidents Essays Causes of Car Accidents Essay Causes of Car Accidents Essay (NHTSA, auto-accident-resource. com). Among the car accidents, the teenage group is the only age group who is number of deaths is increasing instead of decreasing. Also, all the people are exposed to risk and actually every one of them has got car accident at least once that could have been easily prevented. There are many reasons car accidents happen such as drunken drivers, using cellular phones while driving, and teenage drivers. First reason is drinking and driving which is the leading cause of car accidents. Over 1. 1 million drivers were arrested in 2010 for driving under the influence of alcohol or narcotics, (Federal Bureau of Investigation, â€Å"Crime in the United States: 2010†, madd. org). Also,† drunk driving costs the United States $132 billion a year , (NHTS FARS data, 2012, madd. org). Driving while intoxicated is dangerous, because drinking increases your inhibitions and self-confidence but lower s your driving performance. In other words, alcohol impairs the decision-making ability of the brain. For example, when people get drunk, they do not even think they are drunk. They may feel like they can do anything. But they cannot. Many accidents occur because of drinking. These accidents involve mostly one car, but other people can be killed by drunk drivers. People have to be educated about drinking and driving, so they do not kill themselves or innocent people on the road. Second reason, using cell phones while driving causes car accidents. According to the Harvard Center for Risk Analysis, 2,600 people died in 2004 and 330,000 more were injured while using cell phones just before an accident. doityourself. com). When a cell phone is used while driving, it distracts the attention of the driver, leading to car accidents. While using a cell phone many people tend to miss traffic signals, because they are not really concentrating on driving. The process of dialing or answering the phone can make them lose control of the vehicle as well. Even though the driver is looking at the road, he or she can easily get distracted by the conversation. This can result in fatal accidents. Third reason of accidents on the road is teenage drivers. â€Å"2,739 teenagers died in car accidents in the United States during 2008 , (drivesteady. com). Some teenagers cause fatal accidents, because of immaturity and lack of experience. Teenagers are very impulsive. Although not intending to hurt anyone, they sometimes drive very aggressively. It is not difficult to find teenagers driving with one hand on the steering wheel, seat pushed back, and with loud music playing. In traffic they go wild, trying to seek attention. They underestimate the risk of what they are doing. All these acts result in serious consequences on the road. Many accidents of young drivers result from their own mistakes. In conclusion, many people do not realize that being intoxicated while driving, using cellular phones and teenage drivers may bring serious injuries to everybody. Some people may enjoy drinking without care until they get into car accident, which can even result in the deaths of many innocent people. The car accidents caused by these problems are really serious but preventable. If everybody tries to eliminate these problems by following the rules of the road, driving can be less dangerous, and we will not waste time on car accidents. REFERENCES: 1- ( auto-accident-resource. com/statistics. html). 2- ( madd. org/statistics/). 3- ( madd. org/drunk-driving/about/drunk-driving-statistics. html). 4- ( doityourself. com/stry/driving-safety-tips-statistics-on-deaths-by

Sunday, March 1, 2020

The Chemical Composition of White Gold

The Chemical Composition of White Gold White gold is a popular alternative to yellow gold, silver, or platinum. Some people prefer the silver color of white gold to the yellow color of normal gold, yet may find silver to be too soft or too easily tarnished or the cost of platinum to be prohibitive. While white gold contains varying amounts of gold, which is always yellow, it also contains one or more white metals to lighten its color and add strength and durability. The most common white metals that form the white gold alloy are nickel, palladium, platinum, and manganese. Sometimes copper, zinc or silver are added. However, copper and silver form undesirable colored oxides in the air or on the skin, so other metals are preferable. The purity of white gold is expressed in karats, the same as with yellow gold. The gold content is typically stamped into the metal (e.g., 10K, 18K). The Color of White Gold The properties of white gold, including its color, depend on its composition. Although most people think white gold is a shiny white metal, that color is actually from the rhodium metal plating that is applied to all white gold jewelry. Without the rhodium coating, white gold might be gray, dull brown, or even pale pink. Another coating that may be applied is a platinum alloy. Typically platinum is alloyed with iridium, ruthenium, or cobalt to increase its hardness. Platinum is naturally white. However, its more expensive than gold, so it may be electroplated onto a white gold ring to improve its appearance without dramatically increasing the price. White gold that contains a high percentage of nickel tends to be closest to a true white color. It has a faint ivory tone but is much whiter than pure gold.  Nickel white gold often does not require plating with rhodium for color, although the coating may be applied to reduce the incidence of skin reactions. Palladium white gold is another strong alloy that may be used without a coating. Palladium white gold has a faint gray tinge. Other gold alloys result in additional colors of gold, including red or rose, blue, and green. Allergies to White Gold White gold jewelry typically is made from a gold-palladium-silver alloy or gold-nickel-copper-zinc alloy. However, about one in eight people experience a reaction to the nickel-containing alloy, usually in the form of a skin rash. Most European jewelry manufacturers and some American jewelry manufacturers avoid nickel white gold since alloys made without nickel are less allergenic. The nickel alloy is most often encountered in older white gold jewelry and in some rings and pins, where the nickel produces a white gold that is strong enough to stand up to the wear and tear these pieces of jewelry experience. Maintaining the Plating on White Gold White gold jewelry that has a platinum or rhodium plating typically cant be resized because doing so would damage the coating. The plating on jewelry will scratch and wear over time. A jeweler can re-plate the item by removing any stones, buffing the metal, plating it, and returning the stones to their settings. Rhodium plating typically needs to be replaced every couple of years. It only takes a couple of hours to perform the process, at a cost of around $50 to $150.

Thursday, February 13, 2020

Law, Social and Ethical Responsibilities in Business Essay

Law, Social and Ethical Responsibilities in Business - Essay Example As we continued walking, we met a friend of ours. We asked him if he saw our POI and he informed us that he was in church. We went to the church which was some distance away from school. As we went our way and crossed the busy street, an idea came up in the mind of Y. She suggested that a message be sent to the Supreme Student Council (SSC) informing them that we were hit by a car while crossing the street. The idea hatched and we hoped we could enjoy the joke. After that, I dropped the phone in my pocket, making-believe that something has happened to the three of us. The mobile phone in my pocket kept ringing and ringing but I didn't notice it because we were so engaged in laughing while walking, imagining how the Supreme Student council would be rattled. Then I noticed the phone ringing, but before I could answer, I composed myself that I may act as though I were really scared. In my conversation with the caller, I noticed that his voice was nervous and I continued acting, like crying at the same time talking in a confused manner, telling him where we were. I laughed a little in between my sobs but he didn't notice. So, perfect! We did it! They ran barefoot to our place: the senators, our PIO, our Internal Affairs Officer. Shockingly, Prof. F, who was tabulating the game results, was disturbed by the news that he heard and hurriedly moved to keep away his things. In the process, he hurriedly closed his laptop computer which eventually fell hard on the cement floor. Meanwhile, we got ready for we were sure they would be looking for us. While on our way, our Vice President got his phone and began calling Dr. Jane, our Faculty Adviser. She was very busy printing the certificates for winners that time, but alarmed by the news, she began calling someone near the supposed accident site to contact an ambulance, but to no avail. There was misinformation between the SSC Officers. I already told one of the officers that my two companions were in an ambulance but he failed to tell the VP. One fellow senator continued running, but while he was on his way, he noticed why there were none among the people looking alarmed and no ambulance was in sight as I had told him. When he came to where we were, he was very angry and he felt betrayed as he saw us walking and laughing without the wounds I had reported. He threatened to kick us out of the Council, where he initiated a Council Resolution afterwards for our expulsion from the Council. After the other officers came to know that we were only joking, they got very angry and our VP told us that we had to explain to our Adviser, Dr. Jane, and the tabulator why we did what we did. Although earlier, the whole thing was nothing to Dr. Jane but child play, she began to see the whole thing in a different light when Prof. F, the tabulator, began to pester her for payment of the fallen laptop at $740 on account of the mischief of the students. The new laptop was on memorandum receipt (MR) issued to him by the State University and he wouldn't be able to be cleared of obligations by the end of the semester when he asks for clearance. The question is who is responsible for paying for

Saturday, February 1, 2020

Hewlett-Packard Research Paper Example | Topics and Well Written Essays - 500 words

Hewlett-Packard - Research Paper Example The company intends to follow an evolutionary trend for growth under the guidance of Apotheker, primarily focusing on the digital entertainment technology, portability and the expected increase in mobile computing. The new CEO has stressed upon the increasing awareness within the company about sustainability of operations and compliance of its products with the current stress on keeping the earth green and pollution free. The company intends and has already taken steps to develop product lines in coherence with these objectives. Apotheker intends to stabilize and retain the reputation of HP as the world’s largest technology company after the recent setbacks when the Directors’ had to sack the previous CEO Mark Hurd on disciplinary grounds and a downward slump in HP’s performance in the First Quarter of the year 2011 (Worthen & Sherr, 2011). Apotheker intends to promote ‘cloud computing’ from its own resources as well as in collaboration with other ma jor players’ in the field.

Friday, January 24, 2020

Japan vs. China Essay -- Economy Geography Papers Asia

Japan vs. China The region known as East Asia has long been in area of conflict, where often times one power, or group of powers has dominated the people, politics, and economy in a very authoritarian fashion. At first it was the Chinese Imperial system which dominated East Asia, as the strongest and most wealthy Asian power during the pre-colonial period. Japan was in a state of isolation, and the other countries of the region were dependent on China for many things. However, with the coming of the colonial powers from Europe and North America, China’s regional power was all but destroyed (4). During that time period, Japan began a process of rapid industrialization and modernization in order to counteract western colonialism and prevent the Western powers from taking over Japan like they did with China (5). Since then, Japan has been a competitor with China for regional dominance and hegemony. From a historical perspective, both China and Japan have occupied the place of regional hegemon, albeit at different times. China was the regional power in the pre-colonial era, often times exercising its influence over its smaller neighbors. This dominance was in large part because of the sheer size of China, in addition to the power of ancient China under the Emperors. The Great Wall of China was a testament to the ancient strength of China during the pre-colonial period (4). However, once the colonial period began, the power of China was destroyed by the Western powers. During this time period and immediately afterwards, China was a weak nation, often times on the brink of civil war and societal collapse (2). The result of this weakness was the rise of warlord-ism and the destruction of unified China. The GMD (Nationalists)... ...tors all give Japan the advantage; however China is not far behind Japan in the contest. With the largest population in the world and the world’s largest standing army, China is still a force to be reckoned with, albeit not as important as Japan seems to be. Although the future is very uncertain (given China’s unstable political system and what effects the economic growth will have upon it) it can be said that for the coming few years, Japan will continue to be on top of China. How long that lasts is impossible to determine, but given the current set of circumstances, China will surpass Japan in the future as regional hegemon. Works Cited 1. Lecture Notes/ in class discussion 2. Mao’s China and After By Maurice Meisner 3. Japan from Tokugawa to the Present by Andrew Gordon 4. in class video on pre-colonial China. 5. in class video on Japan’s modernization Japan vs. China Essay -- Economy Geography Papers Asia Japan vs. China The region known as East Asia has long been in area of conflict, where often times one power, or group of powers has dominated the people, politics, and economy in a very authoritarian fashion. At first it was the Chinese Imperial system which dominated East Asia, as the strongest and most wealthy Asian power during the pre-colonial period. Japan was in a state of isolation, and the other countries of the region were dependent on China for many things. However, with the coming of the colonial powers from Europe and North America, China’s regional power was all but destroyed (4). During that time period, Japan began a process of rapid industrialization and modernization in order to counteract western colonialism and prevent the Western powers from taking over Japan like they did with China (5). Since then, Japan has been a competitor with China for regional dominance and hegemony. From a historical perspective, both China and Japan have occupied the place of regional hegemon, albeit at different times. China was the regional power in the pre-colonial era, often times exercising its influence over its smaller neighbors. This dominance was in large part because of the sheer size of China, in addition to the power of ancient China under the Emperors. The Great Wall of China was a testament to the ancient strength of China during the pre-colonial period (4). However, once the colonial period began, the power of China was destroyed by the Western powers. During this time period and immediately afterwards, China was a weak nation, often times on the brink of civil war and societal collapse (2). The result of this weakness was the rise of warlord-ism and the destruction of unified China. The GMD (Nationalists)... ...tors all give Japan the advantage; however China is not far behind Japan in the contest. With the largest population in the world and the world’s largest standing army, China is still a force to be reckoned with, albeit not as important as Japan seems to be. Although the future is very uncertain (given China’s unstable political system and what effects the economic growth will have upon it) it can be said that for the coming few years, Japan will continue to be on top of China. How long that lasts is impossible to determine, but given the current set of circumstances, China will surpass Japan in the future as regional hegemon. Works Cited 1. Lecture Notes/ in class discussion 2. Mao’s China and After By Maurice Meisner 3. Japan from Tokugawa to the Present by Andrew Gordon 4. in class video on pre-colonial China. 5. in class video on Japan’s modernization

Thursday, January 16, 2020

8 Key Element for a Business Model

E-commerce: business. technology. society. E-commerce E commerce Business. Technology. Society gy y Kenneth  C. Laudon Copyright  © 2011 Pearson Education, Ltd. Chapter 5 Business  Models  for  E? commerce Copyright  © 2007Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 1-2 E-commerce Business Models Business  model d l Set  of  planned  activities  designed  to  result  in  a   Set of planned activities designed to result in a profit  in  a  marketplace Business  plan Describes  a  firm s  business  model Describes a firm’s business modelE commerce  business  model E? commerce business model Uses/leverages  unique  qualities  of  Internet  and   Web W b Slide 2-3 8 Key Elements of Business Model 1. 2. 3. 4. 5. 6. 7. 8. Value  proposition Revenue  model Market  opportunity Market opportunity Competitive  environment Competitive  advantage Market  strategy Market strategy Organizational  De velopment Management  team Slide 2-4 1. Value Proposition Why  should  the  customer  buy  from  you? h h ld h b f ? Successful  e? ommerce  value   S f l l propositions: Personalization/customization Reduction  of  product  search,  price  discovery  costs Facilitation  of  transactions  by  managing  product   delivery Slide 2-5 2. Revenue Model How  will  the  firm  earn  revenue,  generate   p profits,  and  produce  a  superior  return  on   p p invested  capital? Major  types: Advertising  revenue  model g Subscription  revenue  model Transaction  fee  revenue  model Transaction fee revenue model Sales  revenue  model Affiliate  revenue  model Slide 2-6 3. Market Opportunity What  marketspace  do  you  intend  to   h k d d serve  and  what  is  its  size?Marketspace:  Area  of  actual  or  potential  commercial  value   in  which  companyà ‚  intends  to  operate in which company intends to operate Realistic  market  opportunity:  Defined  by  revenue   potential  in  each  market  niche  in  which  company  hopes  to   potential in each market niche in which company hopes to compete Market  opportunity  typically  divided  into   M k t t it t i ll di id d i t smaller  niches Slide 2-7 4. Competitive Environment Who  else  occupies  your  intended   h l d d marketspace? p Other  companies  selling  similar  products  in  the  same   marketspace Includes  both  direct  and  indirect  competitors Influenced  by: Influenced by:Number  and  size  of  active  competitors Each  competitor s  market  share Each competitor’s market share Competitors’  profitability Competitors pricing Competitors’  pricing Slide 2-8 5. Competitive Advantage Achieved  when  firm: h d h f Produces  superior  pro duct  Ã‚  or Produces superior product or Can  bring  product  to  market  at  lower  price   than  competitors th tit Important  concepts: p p Asymmetries First? mover  advantage Fi t d t Unfair  competitive  advantage Leverage Slide 2-9 6. Market Strategy How  do  you  plan  to  promote  your   products  or  services  to  attract  your   products or services to attract your target  audience?Details  how  a  company  intends  to  enter  market and  attract  customers Best  business  concepts  will  fail  if  not  properly   marketed  to  potential  customers k d i l Slide 2-10 7. Organizational Development What  types  of  organizational  structures   within  the  firm  are  necessary  to  carry  out   within the firm are necessary to carry out the  business  plan? Describes  how  firm  will  organize  work Typically  divided  into  functiona l  departments As  company  grows,  hiring  moves  from  generalists  to   As company grows hiring moves from generalists to specialists Slide 2-11 8.Management Team What  kinds  of  experiences  and   background  are  important  for  the   background are important for the company’s  leaders  to  have? Employees  are  responsible  for  making  the  business  model   work Strong  management  team  gives  instant  credibility  to   outside  investors Strong  management  team  may  not  be  able  to  salvage  a   weak  business  model,  but  should  be  able  to  change  the   model  and  redefine  the  business  as  it  becomes  necessary Slide 2-12 Insight on Business Online Grocers: Finding and Executing the Right Model g g Class Discussion Slide 2-13 Categorizing E-commerce Business ModelsNo  one  correct  way We  categorize  businessà ‚  models  according  to: We categorize business models according to: E? commerce  sector  (B2C,  B2B,  C2C) Type  of  e? commerce  technology;  i. e. m? commerce Type of e commerce technology; i e m commerce Similar  business  models  appear  in  more  than   one  sector Some  companies  use  multiple  business   Some companies use multiple business models;  e. g. eBay Slide 2-14 B2C Business Models: Portal Search  plus  an  integrated  package  of  content   and  services Revenue  models:   d l Advertising,  referral  fees,  transaction  fees,  subscriptions g p Variations:Horizontal  /  General Vertical  /  Specialized  (Vortal) Vertical / Specialized (Vortal) Pure  Search Slide 2-15 Insight on Technology Can Bing Bong Google? Class Discussion Slide 2-16 B2C Models: E-tailer Online  version  of  traditional  retailer Revenue  model:  Sales Variations: Virtual  merchant Virtual merchant Bricks? and? clicks Catalog  merchant C t l h t Manufacturer? direct Low  barriers  to  entry Slide 2-17 B2C Models: Content Provider Digital  content  on  the  Web News,  music,  video Revenue  models:   Revenue models: Subscription;  pay  per  download  (micropayment);   advertising;  affiliate  referral  fees Variations:Content  owners Syndication S di i Web  aggregators Slide 2-18 B2C Models: Transaction Broker Process  online  transactions  for  consumers Primary  value  proposition—saving  time  and  money Revenue  model:   R d l Transaction  fees Industries  using  this  model: Financial  services Travel  services Job  placement  services Slide 2-19 B2C Models: Market Creator Create  digital  environment  where  buyers   and  sellers  can  meet  and  transact Examples:   Priceline eBay y Revenue  model:  Transaction  fees Revenue model: Transaction fee s Slide 2-20 B2C Models: Service Provider Online  services e. g. Google:  Google  Maps,  Gmail,  etc. Value  proposition   Value propositionValuable,  convenient,  time? saving,  low? cost  alternatives  to   traditional  service  providers t diti l i id Revenue  models: Revenue models: Sales  of  services,  subscription  fees,  advertising,  sales  of   marketing  data marketing data Slide 2-21 B2C Models: Community Provider Provide  online  environment  (social   network)  where  people  with  similar   interests  can  transact,  share  content,  and   , , communicate   E. g. Facebook,  MySpace,  LinkedIn,  Twitter Revenue  models: R d l Typically  hybrid,  combining  advertising, subscriptions,  sales,  transaction  fees,  affiliate  fees Slide 2-22 B2B Business Models Net  marketplaces E? istributor E procurement E? procurement Exchange Industry  consortium Industry cons ortium Private  industrial  network Private industrial network Single  firm Industry? wide Industry wide Slide 2-23 B2B Models: E-distributor Version  of  retail  and  wholesale  store,   , MRO  goods  and  indirect  goods Owned  by  one  company  seeking  to  serve   many  customers Revenue  model:  Sales  of  goods Example:  Grainger. com Slide 2-24 B2B Models: E-procurement Creates  digital  markets  where   participants  transact  for  indirect  goods B2B  service  providers,  application  service  providers  (ASPs) B2B service providers application service providers (ASPs)Revenue  model: Service  fees,  supply? chain  management,  fulfillment   services Example:  Ariba Slide 2-25 B2B Models: Exchanges Independently  owned  vertical  digital   p y g marketplace  for  direct  inputs Revenue  model:  Transaction,  commission  fees Revenue model Transaction commission fees C eate po e u co pet t o bet ee Create  powerful  competition  between   suppliers Tend  to  force  suppliers  into  powerful  price   T d f li i f l i competition;  number  of  exchanges  has   dropped  dramatically d dd ll Slide 2-26 B2B Models: Industry Consortia Industry? wned  vertical  digital  marketplace   open  to  select  suppliers More  successful  than  exchanges More successful than exchanges Sponsored  by  powerful  industry  players Strengthen  traditional  purchasing  behavior Revenue  model:  Transaction,  commission  fees R d l T ti i i f Example:  Exostar Example: Exostar Slide 2-27 Private Industrial Networks Designed  to  coordinate  flow  of  communication   among  firms  engaged  in  business  together fi di b i h Electronic  data  interchange  (EDI) Single  firm  networks Most  common  form   M t f Example:  Wal? Mart’s  network   for  suppliersIndustry? wide  networks Often  evolve  out  of  industry  associations   Often evolve out of industry associations Example:  Agentrics Slide 2-28 Other E-commerce Business Models Consumer? to? consumer  (C2C) eBay,  Craigslist Peer? to? peer  (P2P) Peer to peer (P2P) The  Pirate  Bay,  Cloudmark M? commerce: Technology  platform  continues  to  evolve Technology platform continues to evolve iPhone,  smartphones  energizing  interest  in  m? commerce   pp apps Slide 2-29 Insight on Society Where R U? Not Here! Class Discussion Slide 2-30 E-commerce Enablers: Gold Rush ModelE? commerce  infrastructure  companies   p have  profited  the  most: Hardware,  software,  networking,  security E? commerce  software  systems,  payment  systems Media  solutions,  performance  enhancement CRM  software CRM software Databases Hosting  services,  etc. Slide 2-31 How Internet & Web Change Busi ness E? commerce  changes  industry  structure   g y by  changing: Basis  of  competition  among  rivals Barriers  to  entry y Threat  of  new  substitute  products Strength  of  suppliers Bargaining  power  of  buyers Bargaining power of buyers Slide 2-32 Industry Value ChainsSet  of  activities  performed  by  suppliers,   manufacturers,  transporters,  distributors,  and   f di ib d retailers  that  transform  raw  inputs  into  final   products  and  services   Internet  reduces  cost  of  information  and   Internet reduces cost of information and other  transactional  costs Leads  to  greater  operational  efficiencies,   lowering  cost,  prices,  adding  value  for   lowering cost prices adding value for customers Slide 2-33 E-commerce & Industry Value Chains Figure  5. 4 Slide 2-34 Firm Value Chains Activities  that  a  firm  engages  in  to   create inal  products  from  raw  inputs Each  step  adds  value Effect  of  Internet: Eff fI Increases  operational  efficiency p y Enables  product  differentiation Enables  precise  coordination  of  steps  in  chain E bl i di ti f t i h i Slide 2-35 E-commerce & Firm Value Chains Figure  5. 5 Slide 2-36 Firm Value Webs Networked  business  ecosystem   Uses  Internet  technology  to  coordinate  the   value  chains  of  business  partners l h i fb i Coordinates  a  firm’s  suppliers  with  its  own   C di t fi ’ li ith it production  needs  using  an  Internet? based   supply  chain  management  systemSlide 2-37 Internet-Enabled Value Web bl d l b Figure  5. 6 Slide 2-38 Business Strategy Plan  for  achieving  superior  long? term   returns  on  the  capital  invested  in  a   business  firm   business firm Four  Generic  Strategies 1. Di fferentiation   2. Cost 3. Scope 4. 4 Focus Slide 2-39 Chapter 6 E-commerce Marketing Copyright  © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 6-40 Netflix N fli Strengthens and Defends Its Brand Class Discussion Slide 6-41 Consumers Online: Internet Audience & Consumer Behavior Around  70%  (82  million)  U. S. ouseholds  have   Around 70% (82 million) U S households have Internet  access  in  2010 Growth  rate  has  slowed Intensity  and  scope  of  use  both  increasing d f b h Some  demographic  groups  have  much  higher   Some demographic groups have much higher percentages  of  online  usage  than  others   Gender,  age,  ethnicity,  community  type,  income,  education Slide 6-42 Consumers Online: Internet Audience & Consumer Behavior Broadband  audience  vs. dial? up  audience Purchasing  behavior  affected  by   neighborhood Lifestyle  and  sociological  impa cts Use  of  Internet  by  children,  teens Use  of  Internet  as  substitute  for  other  social  activitiesMedia  choices Traditional  media  competes  with  Internet  for  attention Traditional media competes with Internet for attention Slide 6-43 Consumer Behavior Models Study  of  consumer  behavior Social  science   Attempts  to  explain  what  consumers  purchase   Attempts to explain what consumers purchase and  where,  when,  how  much  and  why  they  buy Consumer  behavior  models Predict  wide  range  of  consumer  decisions Predict wide range of consumer decisions Based  on  background  demographic  factors  and   other  intervening,  more  immediate  variables   h i i i di i bl Slide 6-44 General Model of Consumer Behavior Figure  6. Slide 6-45 Background Demographic Factors Culture:  Broadest  impact Subculture  (ethnicity,  age,  lifestyle,  geography) S b lt ( th i it lif t l h ) Social Reference  groups Direct  Ã‚  reference  groups g p Indirect  reference  groups Opinion  leaders  (viral  influencers) Lifestyle  groups   f l Psychological Psychological  profiles Slide 6-46 Online Purchasing Decision Psychographic  research Combines  demographic  and  psychological  data Combines demographic and psychological data Divides  market  into  groups  based  on  social  class,  lifestyle,   and/or  personality  characteristics and/or personality characteristicsFive  stages  in  the  consumer  decision  process: 1. 2. 3. 4. 5. Awareness  of  need Search  for  more  information Evaluation  of  alternatives Actual  purchase  decision Actual purchase decision Post? purchase  contact  with  firm Slide 6-47 Consumer D i i C Decision Process & P Supporting Communications Figure  6. 3 Slide 6-48 Model of Online Consumer Behavior Decision   process  similar  for  online  and  offline   behavior General  online  behavior  model Consumer  skills Product  characteristics Attitudes  toward  online  purchasing Perceptions  about  control  over  Web  environment p Web  site  featuresClickstream  behavior:  Transaction  log  for   Clickstream behavior: Transaction log for consumer  from  search  engine  to  purchase Slide 6-49 Model of Online Consumer Behavior Figure  6. 4 Slide 6-50 Model of Online Consumer Behavior Clickstream  factors  include: Number  of  days  since  last  visit Number of days since last visit Speed  of  clickstream  behavior Number  of  products  viewed  during  last  visit b f d i dd i l ii Number  of  pages  viewed Supplying  personal  information Number  of  days  since  last  purchase Number  of  past  purchasesClickstream  marketing Clickstream marketing Slide 6-51 Shoppers: B rowsers & Buyers Shoppers:  87%  of  Internet  users 72%  buyers 72% buyers 16%  browsers  (purchase  offline) One? third  offline  retail  purchases  influenced  by   O thi d ffli t il h i fl db online  activities Online  traffic  also  influenced  by  offline  brands  and   shopping pp g E? commerce  and  traditional  commerce  are  coupled: part  of  a  continuum  of  consuming  behavior part of a continuum of consuming behavior Slide 6-52 Online Shoppers & Buyers Figure  6. 5 Slide 6-53What Consumers Shop & Buy Online Big  ticket  items  ($500  plus) Travel,  computer  hardware,  consumer  electronics Expanding   Consumers  more  confident  in  purchasing  costlier  items Small  ticket  items  ($100  or  less) ($ ) Apparel,  books,  office  supplies,  software,  etc. Sold  by  first  movers  on  Web Sold by first movers on Web Physically  small  i tems High  margin  items   Broad  selection  of  products  available Slide 6-54 What Consumers Buy Online Figure  6. 6 Slide 6-55 Intentional Acts: How Shoppers Find Vendors Online pp Search  engines  (59%) S h i (59%) Coupon  Web  sites  (29%) Coupon Web sites (29%) Comparison  shopping  sites  (27%) E? ail  newsletters  (25%) Online  shoppers  are  highly  intentional,   looking  for  specific  products,  companies,   services Slide 6-56 Table  6. 6 Slide 6-57 Trust, Utility, Opportunism in Online Markets Two  most  important  factors  shaping  decision   Two most important factors shaping decision to  purchase  online: Utility:   U ili Better  prices,  convenience,  speed Trust: Asymmetry  of  information  can  lead  to  opportunistic   behavior  by  sellers Sellers  can  develop  trust  by  building  strong  reputations   for  honesty,  fairness,  delivery   Slide 6-58 Basic Marketing Concepts MarketingStrategies  and  actions  to  establish  relationship   Strategies and actions to establish relationship with  consumer  and  encourage  purchases  of   p products  and  services Addresses  competitive  situation  of  industries  and   firms Seeks  to  create  unique,  highly  differentiated   products  or  services  that  are  produced  or  supplied   by  one  trusted  firm Unmatchable  feature  set Avoidance  of  becoming  commodity Slide 6-59 Feature Sets Three  levels  of  product  or  service 1. Core  product e. g. cell  phone g p 2. Actual  product Characteristics  that  deliver  core  benefits Ch t i ti th t d li b fit e. g. wide  screen  that  connects  to  Internet 3. Augmented  productAdditional  benefits Basis  for  building  the  product’s  brand e. g. product  warranty Slide 6-60 Featu re Set Figure  6. 7 Slide 6-61 Products, Brands & Branding Process Brand: Expectations  consumers  have  when  consuming,  or   thinking  about  consuming,  a  specific  product Most  important  expectations:  Quality,  reliability,   Most important expectations: Quality reliability consistency,  trust,  affection,  loyalty,  reputation Branding:  Process  of  brand  creation Branding: Process of brand creation Closed  loop  marketing Brand  strategy Brand  equity Brand eq it Slide 6-62 Marketing A ti iti M k ti Activities: From Products to Brands Figure  6. 8Slide 6-63 STP: Segmenting, Targeting, Positioning Major  ways  used  to  segment,  target  customers 1. 2. 3. 4. 5. 6. Behavioral B h i l Demographic Psychographic h hi Technical Contextual Search Within  segment,  product  is  positioned and  branded  as   a  unique,  high? value  product,  especially  suited  to   q g p p y ne eds  of  segment  customers Slide 6-64 Are Brands Rational? For  consumers,  a  qualified  yes: Brands  introduce  market  efficiency  by  reducing  search  and   decision? making  costs For  business  firms,  a  definite  yes: A  major  source  of  revenue Lower  customer  acquisition  cost Increased  customer  retention Successful  brand  constitutes  a  long? asting  (though  not   necessarily  permanent)  unfair  competitive  advantage Slide 6-65 Can Brands Survive Internet? Brands & Price Dispersion p Early  postulation:   Law  of  One  Price ;  end  of  brands Early postulation: â€Å"Law of One Price†; end of brands Instead: Consumers  still  pay  premium  prices  for  differentiated   products E? commerce  firms  rely  heavily  on  brands  to  attract   customers  and  charge  premium  prices Substantial  price  dispersion Large  differences  in  price  sensitivity  for  same  product Large differences in price sensitivity for same product â€Å"Library  effect† Slide 6-66Revolution in Internet Marketing Technology Three  broad  impacts: Scope  of  marketing  communications  broadened   Richness  of  marketing  communications  increased g Information  intensity  of  marketplace  expanded Internet  marketing  technologies: Internet marketing technologies: Web  transaction  logs Cookies  and  Web  bugs Cookies and Web bugs Databases,  data  warehouses,  data  mining Advertising  networks Customer  relationship  management  systems Slide 6-67 Web Transaction LogsBuilt  into  Web  server  software Record  user  activity  at  Web  site y Webtrends:  Leading  log  analysis  tool Provides  much  marketing  data,  especially  Ã‚   Provides much marketing data especially combined  with: Registratio n  forms R i i f Shopping  cart  database Answers  questions  such  as: What  are  major  patterns  of  interest  and  purchase? After  home  page,  where  do  users  go  first? Second? Slide 6-68 Cookies & Web Bugs Cookies: Small  text  file  Web  sites  place  on  visitor’s  PC  every  time   they  visit,  as  specific  pages  are  accessed Provide  Web  marketers  with  very  quick  means  of   identifying  customer  and  understanding  prior  behavior Flash  cookiesWeb  bugs: Tiny  (1  pixel)  graphics  embedded  in  e mail  and  Web  sites Tiny (1 pixel) graphics embedded in e? mail and Web sites Used  to  automatically  transmit  information  about  user  and   page being viewed to monitoring server page  being  viewed  to  monitoring  server Slide 6-69 Insight on Society g y Every Move You Make, Every Click You Make, Weâ₠¬â„¢ll Be Tracking You , g Class Discussion Slide 6-70 Databases Database:  Ã‚  Stores  records  and  attributes Database  management  system  (DBMS):   Software  used  to  create,  maintain,  and  access  databasesSQL  (Structured  Query  Language): Industry? standard  database  query  and  manipulation  language  used  in   y q y p g g a  relational  database Relational  database: Represents  data  as  two? dimensional  tables  with  records  organized  in   rows  and  attributes  in  columns;  data  within  different  tables  can  be   flexibly  related  as  long  as  the  tables  share  a  common  data  element flexibly related as long as the tables share a common data element Slide 6-71 Relational Database View of E-commerce Customers Figure  6. 12 Slide 6-72 Data Warehouses & Data Mining Data  warehouse:Collects  firm s  transactional  and  custom er  data  in  single   Collects firm’s transactional and customer data in single location  for  offline  analysis  by  marketers  and  site   managers Data  mining: Analytical  techniques  to  find  patterns  in  data,  model   Analytical techniques to find patterns in data model behavior  of  customers,  develop  customer  profiles Query? driven  data  mining Query driven data mining Model? driven  data  mining Rule? based  data  mining l b dd Collaborative  filtering Slide 6-73 Data Mining & Personalization Figure  6. 13 Slide 6-74 Insight on TechnologyThe Long T il Big Hits and Big Misses Th L Tail: Bi Hi d Bi Mi Class Discussion Slide 6-75 Customer Relationship Management ( (CRM) Systems ) y Record  all  contact  that  customer  has  with  firm Generates  customer  profile  available  to  everyone  in firm  with  need  to  Ã¢â‚¬Å"know  the  customer† fi ith d t â€Å"k th t † Customer profiles can contain: ustomer  profiles  can  contain: Map  of  the  customer’s  relationship  with  the  firm Product  and  usage  summary  data Demographic  and  psychographic  data Profitability  measures Contact  history   Contact history Marketing  and  sales  information Slide 6-76Customer Relationship Management System Figure  6. 14 Slide 6-77 Market Entry Strategies Figure  6. 15 Slide 6-78 Establishing Customer Relationship Advertising  Networks Banner  advertisements Ad  server  selects  appropriate  banner  ad  based  on   Ad server selects appropriate banner ad based on cookies,  Web  bugs,  backend  user  profile   databases Permission  marketing Permission marketing Affiliate  marketing g Slide 6-79 How Advertising Network Works e. g. , DoubleClick Figure  6. 16 Slide 6-80 Establishing Customer Relationship (cont’d) Viral  marketingGett ing  customers  to  pass  along  company’s  marketing   message  to  friends,  family,  and  colleagues Blog  marketing Using  blogs  to  market  goods  through  commentary  and   U i bl k d h h d advertising Social  network  marketing,  social  shopping   Mobile  marketing Mobile marketing Slide 6-81 Insight on Business Social Network Marketing: Let’s Buy Together Class Discussion Slide 6-82 Establishing Customer Relationship (cont’d) Wisdom  of  crowds  (Surowiecki,  2004) ( , ) Large  aggregates  produce  better  estimates  and  judgments Examples:   E l Prediction  markets Folksonomies Social  tagging Social taggingBrand  leveraging Slide 6-83 Customer Retention: Strengthening Customer Relationship p Mass  marketing Mass marketing Direct  marketing Micromarketing   Micromarketing Personalized,  one? to? one  marketing  Ã‚   Segmenting  market  on  precise  a nd  timely  understanding  of   Segmenting market on precise and timely understanding of individual’s  needs Targeting  specific  marketing  messages  to  these  individuals Positioning  product  vis? a? vis  competitors  to  be  truly  unique Personalization Can  increase  consumers  sense  of  control,  freedom Can  also  result  in  unwanted  offers  or  reduced  anonymity Slide 6-84Mass Market-Personalization Continuum Figure  6. 17 Slide 6-85 Other Customer Retention Marketing Technics Customization Customer  co? production Transactive  content:   Combine  traditional  content  with  dynamic  information   tailored  to  each  user’s  profile Customer  service FAQs Q Real? time  customer  service  chat  systems Automated  response  systems Automated response systems Slide 6-86 Net Pricing Strategies Pricing Integral  part  of  marketing  strategy I t l t f k ti t t Traditionally  based  on:   Fixed  cost   Variable  costs   Demand  curve Price  discrimination Price discriminationSelling  products  to  different  people  and  groups   based  on  willingness  to  pay Slide 6-87 Net Pricing Strategies (cont’d) Free  and  freemium Can  be  used  to  build  market  awareness Versioning Creating  multiple  versions  of  product  and  selling   essentially  same  product  to  different  market  segments   at  different  prices at different prices Bundling Offers  consumers  two  or  more  goods  for  one  price Off t d f i Dynamic  pricing: Auctions Yield  management Slide 6-88 Channel Management Strategies Channels: Different  methods  by  which  goods  can  be  distributed  and   soldChannel  conflict: When  new  venue  for  selling  products  or  services  threatens   gp or  destroy s  existing  sales  venues E. g. online  airline/travel  services  and  Ã‚  traditional  offline   travel  agencies Some  manufacturers  are  using  partnership   gp p model  to  avoid  channel  conflict   Slide 6-89 Chapter 7: E-commerce Marketing Communications Chapter 7 E-commerce Advertising Copyright  © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 7-90 Video Ads: Shoot, Click, Buy Class Discussion Slide 7-91 Marketing Communications Two  main  purposes:Sales  Ã¢â‚¬â€œ promotional  sales  communications   Branding  Ã¢â‚¬â€œ b di B di branding  communications i i Online  marketing  communications Online marketing communications Takes  many  forms Online  ads,  e? mail,  public  relations,  Web   sites Slide 7-92 Online Advertising li d i i $25  billion,  15%  of  all  advertising Advantages: Internet  is  where  audience  is  moving g Ad  targeting Greater  opp ortunities  for  interactivity Greater opportunities for interactivity Disadvantages: Cost  versus  benefit How  to  adequately  measure  results Supply  of  good  venues  to  display  ads Slide 7-93 Online Advertising from 2002-2014 Figure  7. Slide 7-94 Forms of Online Advertisements Display  ads Rich  media Video  ads Search  engine  advertising Social  network,  blog,  and  game  advertising Social network blog and game advertising Sponsorships Referrals  (affiliate  relationship  marketing) E? mail  marketing g Online  catalogs Slide 7-95 Display Ads Banner  ads Rectangular  box  linking  to  advertiser’s  Web  site IAB  guidelines e. g. Full  banner  is  468  x  60  pixels,  13K e g Full banner is 468 x 60 pixels 13K Pop? up  ads Appear  without  user  calling  for  them Provoke  negative  consumer  sentiment g Twice  as  effective  as  normal  banner  ads Pop? nder  ads:  Open  beneath  browser  window Pop under ads: Open beneath browser window Slide 7-96 Rich Media Ads Use  Flash,  DHTML,  Java,  JavaScript About  7%  of  all  online  advertising  expenditures Tend  to  be  more  about  branding d b b b di Boost  brand  awareness  by  10% Boost brand awareness by 10% IAB  standards  limit  length Interstitials Superstitials Slide 7-97 Video Ads Fastest  growing  form  of  online  advertisement IAB  standards Linear  video  ad Non? linear  video  ad In? banner  video  ad In? text  video  ad Ad placement Advertising  networks Advertising  exchanges Banner  swappingSlide 7-98 Search Engine Advertising h i d i i Almost  50%  of  online  ad  spending  in  2010 Types: Paid  inclusion  or  rank Paid inclusion or rank Inclusion  in  search  results Sponsored  link  areas p Keyword  advertising e. g. Google  AdWords e g Google AdWords Network  keyword  advertising  (context   advertising) d ii ) e. g. Google  AdSense Slide 7-99 Search Engine Advertising (cont’d) Nearly  ideal  targeted  marketing Nearly ideal targeted marketing Issues:   Disclosure  of  paid  inclusion  and  placement   practices Click  fraud   Ad  nonsense   Slide 7-100 Mobile Advertising Half  of  U. S.Internet  users  access  Internet   Half of U. S. Internet users access Internet with  mobile  devices Currently  small  market,  but  fastest   growing  platform  (35%) growing platform (35%) Google  and  Apple  in  race  to  develop   Google and Apple in race to develop mobile  advertising  platform AdMob,  iAd Slide 7-101 Sponsorships & Referrals Sponsorships Paid  effort  to  tie  advertiser s  name  to   Paid effort to tie advertiser’s name to particular  information,  event,  venue  in  a  way   that  reinforces  brand  in  positive  yet  not  overtly   that reinforces brand in positive yet not overtly commercial  manner ReferralsAffiliate  relationship  marketing p g Permits  firm  to  put  logo  or  banner  ad  on   another  firm’s  Web  site  from  which  users  of   th fi ’ W b it f hi h f that  site  can  click  through  to  affiliate’s  site Slide 7-102 E-mail Marketing & Spam Explosion Direct  e? mail  marketing   Low  cost,  primary  cost  is  purchasing  addresses Spam:  Unsolicited  commercial  e? mail Spam: Unsolicited commercial e mail Approx. 90%  of  all  e? mail Efforts  to  control  spam: Technology  (filtering  software)   Government  regulation  (CAN? SPAM  and  state  laws) Voluntary  self? regulation  by  industries  (DMA  ) y g y Volunteer  efforts Slide 7-103Percentage of E-mail That Is Spam Figure 7. 6 Slide 7-104 Online Catalogs Equivalent  of  paper? based  catalogs Graphics? intense;  use  increasing  with  increase   in  broadband  use in broadband use Two  types: 1. 2. 2 Full? page  spreads,  e. g. Landsend. com Grid  displays,  e. g. Amazon Grid displays e g Amazon In  general,  online  and  offline  catalogs   complement  each  other Slide 7-105 Social Marketing â€Å"Many? to? many†Ã‚  model Uses  digitally  enabled  networks  to  spread  ads Blog  advertising   Blog advertising Online  ads  related  to  content  of  blogs Social  network  advertising:   Social network advertising:Ads  on  MySpace,  Facebook,  YouTube,  etc. Game  advertising:   G d ti i Downloadable  Ã¢â‚¬Å"advergames† Placing  brand? name  products  within  games Slide 7-106 Insight on Society g y Marketing to Children of the Web in the Age of Social Networks g Class Discussion Slide 7-107 Behavioral Targeting Interest? based  advertising Data  aggregators  develop  profiles Data aggregators develop profiles Search  engine  queries Online  browsing  history O li b i hi Offline  data  (income,  education,  etc. ) d Information  sold  to  3rd party  advertisers,  who  deliver   ads  based  on  profile Ad  exchanges Privacy  concerns acy co ce s Consumer  resistance Slide 7-108Mixing Off-line & Online Marketing Communications g Most  successful  marketing  campaigns   M t f l k ti i incorporate  both  online  and  offline  tactics Offline  marketing Drive  traffic  to  Web  sites Drive traffic to Web sites Increase  awareness  and  build  brand  equity Consumer  behavior  increasingly  multi? channel 60%  consumers  research  online  before  buying  offline % y g Slide 7-109 Insight on Business g Are the Very Rich Different From You and Me? Class Discussion Sl ide 7-110 Online Marketing Metrics: Lexicon Measuring  audience  size  or  market  share Impressions I i Click? through  rate  (CTR) View? hrough  rate  (VTR) Vi th h t (VTR) Hits Page  views P i Stickiness  (duration) Unique  visitors Loyalty Reach Recency Slide 7-111 Online Marketing Metrics (cont’d) Conversion  of  visitor   Conversion of visitor to  customer Acquisition  rate q Conversion  rate Browse? to? buy? ratio View? to? cart  ratio Vi t t ti Cart  conversion  rate Checkout  conversion  rate   Checkout conversion rate Abandonment  rate Retention  rate Attrition  rate E mail  metrics E? mail metrics Open  rate Delivery  rate Delivery rate Click? through  rate   (e mail) (e? mail) Bounce? back  rate Slide 7-112 Online Consumer Purchasing ModelFigure  7. 8 Slide 7-113 How Well Does Online Adv. Work? Ultimately  measured  by  ROI  on  ad  campaign Highest  click? through  rates:  Searc h  engine  ads,   Permission  e mail  campaigns Permission e? mail campaigns Rich  media,  video  interaction  rates  high Online  channels  compare  favorably  with  traditional Most  powerful  marketing  campaigns  use  multiple   Most powerful marketing campaigns use multiple channels,  including  online,  catalog,  TV,  radio,   newspapers,  stores newspapers, stores Slide 7-114 Comparative Returns on Investment Figure  7. 9 Slide 7-115 Costs of Online Advertising Pricing  modelsBarter Cost  per  thousand  (CPM) Cost  per  click  (CPC)   Cost  per  action  (CPA)   Cost per action (CPA) Online  revenues  only Sales  can  be  directly  correlated Sales can be directly correlated Both  Ã‚  online/offline  revenues Offline  purchases  cannot  always  be  directly  related  to  online   Offli h t l b di tl l t dt li campaign In  general,  online  marketing  more   expensive  on  CPM   In general online marketing more expensive on CPM basis,  but  more  effective Slide 7-116 Web Site Activity Analysis b i i i l i Figure  7. 10 Slide 7-117 Insight on Technology It’s 10 P. M. Do You Know Who Is On Your Web Site? Class Discussion Slide 7-118Web Site †¦ as Marketing Communications Tool g Web  site  as  extended  online  advertisement W b i d d li d i Domain  name:  An  important  role   Domain name: An important role Search  engine  optimization:   Search engine optimization: Search  engines  registration Keywords  in  Web  site  description K d i W b it d i ti Metatag  and  page  title  keywords Links  to  other  sites k h Slide 7-119 Web Site Functionality b i i li Main  factors  in  effectiveness  of  interface Utility Ease  of  use Top  factors  in  credibility  of  Web  sites: Top factors in credibility of Web sites: Design  look Info rmation  design/structure g / Information  focusOrganization  is  important  for  first time  users,  but   Organization is important for first? time users but declines  in  importance Information content becomes major factor attracting Information  content  becomes  major  factor  attracting   further  visits Slide 7-120 Factors in Credibility of Web Sites Figure  7. 11 Slide 7-121 Table  7. 9 Slide 7-122 Chapter 8: Ethical, Social, and Political Issues in E-commerce E commerce Chapter 8 Ethics, Law, E-commerce Copyright  © 2010 Pearson Education, Ltd. 2011 Pearson Education, Inc. Slide 8-123 Ethical, Social, Political Issues in E-commerceInternet,  like  other  technologies,  can: Internet like other technologies can: Enable  new  crimes Affect  environment Threaten  social  values Costs  and  benefits  must  be  carefully   considered,  especially  when  there  are  no   id d i ll h h g g clear? c ut  legal  or  cultural  guidelines Slide 8-124 Model for Organizing Issues Issues  raised  by  Internet  and  e? commerce  can  be  viewed  at  individual,   social,  and  political  levels social and political levels Four  major  categories  of  issues: Four major categories of issues: Information  rights Property  rights Property rights Governance Public  safety  and  welfare Slide 8-125Moral Dimensions of Internet Society M l Di i f I S i Figure  8. 1 Slide 8-126 Basic Ethical Concepts i hi l Ethics Study  of  principles  used  to  determine  right  and  wrong  courses  of   action Responsibility p y Accountability Liability Laws  permitting  individuals  to  recover  damages Due  process Laws  are  known,  understood Laws are known understood Ability  to  appeal  to  higher  authorities  to  ensure  laws  applied  correctly Slide 8-127 Analyzing Ethical Dilemmas l i hi l il Process  for  analyzing  ethical  dilemmas: 1. 2. 3. 3 4. 5. Identify  and  clearly  describe  the  facts Define  the  conflict  or  dilemma  and  identify  the   y higher? rder  values  involved Identify  the  stakeholders Identify the stakeholders Identify  the  options  that  you  can  reasonably   take t k Identify  the  potential  consequences  of  your   options Slide 8-128 Candidate Ethical Principles Golden  Rule Universalism Slippery  Slope Collective  Utilitarian  Principle Risk  Aversion Ri k A i No  Free  Lunch The  New  York  Times  Test The  Social  Contract  Rule Slide 8-129 Privacy & Information Rights Privacy: Moral  right  of  individuals  to  be  left  alone,  free   from  surveillance  or  interference  from  other   individuals  or  organizations Information  privacy p y Subset  of  privacy Includes:The  claim  th at  certain  information  should  not  be   collected  at  all The  claim  of  individuals  to  control  the  use  of  whatever   h l i f i di id l l h f h information  is  collected  about  them Slide 8-130 Privacy & Information Rights (cont. ) Major  ethical  issue  related  to  e? commerce   and  privacy:   d i Under  what  conditions  should  we  invade  the   privacy  of  others? Major  social  issue:   j Development  of  Ã¢â‚¬Å"expectations  of  privacy†Ã‚  and   privacy  norms privacy norms Major  political  issue: Development  of  statutes  that  govern  relations   D l t f t t t th t l ti between  recordkeepers  and  individuals Slide 8-131 Information Collected at E-commerce SitesData  collected  includes Personally  identifiable  information  (PII) Anonymous  information Anonymous information Types  of  data  collected yp Name,  a ddress,  phone,  e? mail,  social  security Bank  and  credit  accounts,  gender,  age,  occupation,   B k d di d i education Preference  data,  transaction  data,  clickstream  data,   browser  type Slide 8-132 Social Networks & Privacy Social  networks Encourage  sharing  personal  details Pose  unique  challenge  to  maintaining   privacy Facebook s  Beacon  program Facebook’s Beacon program Facebook s  Terms  of  Service  change Facebook’s Terms of Service change Slide 8-133 Profiling & Behavioral Targeting ProfilingCreation  of  digital  images  that  characterize  online  individual  and   group  behavior Anonymous  profiles A fil Personal  profiles Personal profiles Advertising  networks Track  consumer  and  browsing  behavior  on  Web T k db i b h i W b Dynamically  adjust  what  user  sees  on  screen Build  and  refresh  profiles  of  consumers Google’s AdWords program Slide 8-134 Profiling & Behavioral Targeting (cont’d) Deep  packet  inspection Business  perspective: Web  profiling  serves  consumers  and  businesses Increases  effectiveness  of  advertising,  subsidizing  free   content Enables  sensing  of  demand  for  new  products  and  services Critics  perspective:Undermines  expectation  of  anonymity  and  privacy Consumers  show  significant  opposition  to  unregulated   collection  of  personal  information Enables  weblining Slide 8-135 Internet & Government Invasions of Privacy Various  laws  strengthen  ability  of  law  enforcement   agencies  to  monitor  Internet  users  without   i i I ih knowledge  and  sometimes  without  judicial  oversight CALEA,  PATRIOT  Act,  Cyber  Security  Enhancement  Act,   Homeland  Security  Act Government  agencies  are  largest  users  of  private   sector  commercial  data  brokers sector commercial data brokers Retention  by  ISPs  of  user  data  a  concern Slide 8-136Legal Protections In  U. S. ,  privacy  rights  explicitly  granted  or   derived  from Constitution   Constitution First  Amendment  Ã‚  Ã¢â‚¬â€œ freedom  of  speech  and  association Fourth  Amendment  Ã‚  Ã¢â‚¬â€œ unreasonable  search  and  seizure F th A d t bl h d i Fourteenth  Amendment  Ã‚  Ã¢â‚¬â€œ due  process Specific  statutes  and  regulations  (federal  and   Specific statutes and regulations (federal and state) Common  law Slide 8-137 Informed Consent U. S. firms  can  gather  and  redistribute   transaction  information  without  individual’s   i i f i ih i di id l’ informed  consent Illegal  in  Europe Informed  consent: Opt? in   Opt out Opt? out Many  U. S. ? commerce  firm s  merely  publish  information   p practices  as  part  of  privacy  policy  without  providing  for   p p yp y p g any  form  of  informed  consent Slide 8-138 FTC’s Fair Information Practices Principles Federal  Trade  Commission: Federal Trade Commission: Conducts  research  and  recommends  legislation  to  Congress Fair  Information  Practice  Principles  (1998): Fair Information Practice Principles (1998): Notice/Awareness  (Core) Choice/Consent  (Core) Choice/Consent (Core) Access/Participation Security Enforcement Guidelines,  not  laws Guidelines not laws Slide 8-139 FTC’s Fair Information Practice PrinciplesNotice/Awareness i / Sites  must  disclose  information  practices  before  collecting  data. Includes Sit t di l i f ti ti b f ll ti d t I l d identification  of  collector,  uses  of  data,  other  recipients  of  data,  nature  of   collection  (ac tive/inactive),  voluntary  or  required,  consequences  of  refusal,  and   steps  taken  to  protect  confidentiality,  integrity,  and  quality  of  the  data Choice/Consent There  must  be  a  choice  regime  in  place  allowing  consumers  to  choose  how   their  information  will  be  used  for  secondary  purposes  other  than  supporting   the  transaction,  including  internal  use  and  transfer  to  third  parties.Opt? in/Opt? out  must  be  available. Consumers  should  be  able  to  review  and  contest  the  accuracy  and   completeness  of  data  collected  about  them  in  a  timely,  inexpensive  process. Access/Participation ccess/ a c pa o Security y Enforcement Data  collectors  must  take  reasonable  steps  to  assure  that  consumer   information  is  accurate  and  secure  from   unauthorized  use. There  must  be  in  place  a  mechanism  to  enforce  FIP principles. This  can  involve  self? regulation,  legislation  giving  consumers  legal   remedies  for  violations,  or  federal  statutes  and  regulation. di f i l ti f d l t t t d l ti Slide 8-140FTC Recommendations: Online Profiling Principle p Notice Recommendation Complete  transparency  to  user  by  providing  disclosure  and  choice  options   on  the  host  Web  site. â€Å"Robust†Ã‚  notice  for  PII  (time/place  of  collection;   before  collection  begins). Clear  and  conspicuous  notice  for  non PII. before  collection  begins). Clear  and  conspicuous  notice  for  non? PII. Opt? in  for  PII,  opt? out  for  non? PII. No  conversion  of  non? PII  to  PII  without   consent. Opt? out  from  any  or  all  network  advertisers  from  a  single  page   consent Opt out from any or all network advertisers from a single page provided  by  the  host  Web  site.Reasonable  provisions  to  allow  inspection  and  correction. Reasonable  efforts  to  secure  information  from  loss,  misuse,  or  improper   access. Done  by  independent  third  parties,  such  as  seal  programs  and  accounting   Done by independent third parties such as seal programs and accounting firms. medical  topics,  sexual  behavior  or  sexual  orientation,  or  use  Social  Security   medical topics sexual behavior or sexual orientation or use Social Security numbers  for  profiling. Slide 8-141 Choice Access Security EnforcementRestricted  Collection Advertising  networks  will  not  collect  information  about  sensitive  financial  or European Data Protection Directive Privacy  protection  much  stronger  inà ‚  Europe  than  U. S. European  approach:   Comprehensive  and  regulatory  in  nature p g y European  Commission’s  Directive  on  Data  Protection   (1998):   (1998): Standardizes  and  broadens  privacy  protection  in  European  Union   countries Department  of  Commerce  safe  harbor  program: For  U. S. firms  that  wish  to  comply  with  Directive Slide 8-142 Private Industry Self-RegulationSafe  harbor  programs: Private  policy  mechanism  to  meet  objectives  of   Pi t li h i t t bj ti f government  regulations  without  government  involvement e. g. Privacy  seal  programs e g Privacy seal programs Industry  associations  include: Online  Privacy  Alliance  (OPA) Network  Advertising  Initiative  (NAI) CLEAR  Ad  Notice  Technical  Specifications Privacy  advocacy  groups Emerging  privacy  protection  business Slide 8-143 Insight on Business Chief Privacy Officers hi f i ffi Class Discussion Slide 8-144 Technological Solutions Spyware,  pop? p  blockers Cookie  managers k Anonymous  remailers,  surfing Anonymous remailers surfing Platform  for  Privacy  Preferences  (P3P):   Comprehensive  technological  privacy  protection  standard Works  through  user s  Web  browser Works through user’s Web browser Communicates  a  Web  site’s  privacy  policy Compares  site  policy  to  user’s  preferences  or  to  other  standards   such  as  FTC’s  FIP  guidelines  or  EU’s  Data  Protection  Directive Slide 8-145 How P3P Works k Figure  8. 2(A) Slide 8-146 Insight on Technology The Privacy T Th P i Tug of War: fW Advertisers Vs. Consumers Class Discussion Slide 8-147 Intellectual Property Rights Intellectual  property:Encompasses  all  tangible  and  intangible  products  of  human   mind Major  ethical  issue: j How  should  we  treat  property  that  belongs  to  others? Major  social  issue: Major social issue: Is  there  continued  value  in  protecting  intellectual  property  in  the   Internet  age? Major  political  issue: How  can  Internet  and  e? commerce  be  regulated  or  governed  to   g g protect  intellectual  property? Slide 8-148 Intellectual Property Protection Three  main  types  of  protection: Copyright Patent Trademark  law Trademark law Goal  of  intellectual  property  law: Balance  two  competing  interests  Ã¢â‚¬â€ public  and   B l t ti i t t bli d privateMaintaining  this  balance  of  interests  is  always   M i t i i thi b l fi t t i l challenged  by  the  invention  of  new   technologies Slide 8-149 Copyright Protects  original  forms  of  expression  (but  not   ideas)  from   being  copied  by  others  for  a  Ã‚   ideas) from being copied by others for a period  of  time Look  and  feel  copyright  infringement  lawsuits Fair  use  doctrine Fair use doctrine Digital  Millennium  Copyright  Act,  1998 First  major  effort  to  adjust  copyright  laws  to  Internet  age Implements  WIPO  treaty  that  makes  it  illegal  to  make,   distribute,  or  use  devices  that  circumvent  technology? ased  protections  of  copyrighted  materials Slide 8-150 Patents Grant  owner  20? year  monopoly  on  ideas  behind  an   invention Machines Man? made  products p Compositions  of  matter Processing  methods Invention  must  be  new,  non? obvious,  novel Encourages  inventors g Promotes  dissemination  of  new  techniques  through   licensing Stifles  competition  by  raising  barriers  to  entry Slide 8-151 E-co mmerce Patents 1998  State  Street  Bank  &  Trust  v. Signature  Financial   Group Business  method  patents Led  to  explosion  in  application  for  e? commerce  Ã¢â‚¬Å"business   L dt l i i li ti f â€Å"b i methods†Ã‚  patentsMost  European  patent  laws  do  not  recognize   M tE t tl d t i business  methods  unless  based  on  technology Examples Amazon’s  One? click  purchasing DoubleClick’s  dynamic  delivery  of  online  advertising Slide 8-152 Trademarks d k Identify,  distinguish  goods  and  indicate  their   source Purpose p Ensure  Ã‚  consumer  gets  what  is  paid  for/expected  to  receive Protect  owner  against  piracy  and  misappropriation Infringement Market  confusion Bad  faith Dilution Behavior  that  weakens  connection  between  trademark   and  product Slide 8-153 Trademarks & Internet CybersquattingAnticy bersquatting  Consumer  Protection  Act  (ACPA) Cyberpiracy Typosquatting Metatagging M i Keywording y g Deep  linking Framing Slide 8-154 Governance Primary  questions Who  will  control  Internet  and  e? commerce? What  elements  will  be  controlled  and  how? What elements will be controlled and how? Stages  of  governance  and  e? commerce g g Government  Control  Period  (1970–1994) Privatization  (1995–1998) Privatization (1995 1998) Self? Regulation  (1995–present) Government  Regulation  (1998–present) Slide 8-155 Who Governs E-commerce & Internet? Mixed  mode  environmentSelf? regulation,  through  variety  of  Internet  policy   and  technical  bodies,  co exists  with  limited   and technical bodies co? exists with limited government  regulation ICANN  :  Domain  Name  System Internet  could  be  easily  controlled,   I t t ld b il t ll d m onitored,  and  regulated  from  a  central   location Slide 8-156 Taxation E? commerce  taxation  illustrates  complexity  of   governance  and  jurisdiction  issues governance and jurisdiction issues U. S. sales  taxed  by  states  and  local  government MOTO  retailing E? commerce  benefits  from  tax  Ã¢â‚¬Å"subsidy† yOctober  2007:  Congress  extends  tax  moratorium  for   an  additional  seven  years an additional seven years Unlikely  that  comprehensive,  integrated  rational   approach  to  taxation  issue  will  be  determined  for   approach to taxation issue will be determined for some  time  to  come Slide 8-157 Net Neutrality Currently,  all  Internet  traffic  treated  equally  Ã¢â‚¬â€œ all  activities  charged  the  same  rate,  no   ll i i i h d h preferential  assignment  of  bandwidth Backbone  providers  would  like  to  charge   differentiated  prices  and  ration  bandwidth 2010,  U. S. ppeals  court  ruled  that  FCC  had  no   authority  to  regulate  Internet  providers Slide 8-158 Public Safety & Welfare Protection  of  children  and  strong   g sentiments  against  pornography Passing  legislation  that  will  survive  court   P i l i l ti th t ill i t challenges  has  proved  difficult Efforts  to  control  gambling  and  restrict   sales  of  drugs  and  cigarettes sales of drugs and cigarettes Currently  mostly  regulated  by  state  law Unlawful  Internet  Gambling  Enforcement  Act Slide 8-159 Insight on Society Internet Drug Bazaar Class Discussion Slide 8-160