Monday, September 30, 2019

Tccc Business Strategy

This report is centered on research of The Coca Cola Company (Global) in the carbonated beverage market. Various methods and models of analysis were used in examining the company’s market position and determining its strategic competitive advantage. The Pestel model and Porter’s five forces model was used to identify the company’s opportunities and threats. The barriers to entry in the carbonated beverage market are really high which means that the threat of other companies successfully entering into the industry is low and this has been a big advantage for the company. Brand loyalty is another. People today in general are becoming increasingly aware of a healthier lifestyle in light of new information regarding nutrition and this has been a major threat to the company and the market in general. The Company’s strategic competitive advantage stems from its three main core competences. The manufacture and distribution system of its beverages (products), branding through marketing campaigns and the innovative nature of the company in its market are all major strengths. One thing special about the company is that it uses its resources in a way unique to its competitors and consumers see value in their product. The Coca Cola Company understands the clout of their stakeholders and they have set their strategic objectives to meet their individual demands. This message has been firmly implanted in the company’s mission statement. Coca cola competes on the basis of value added for customers. People will pay the premium over lesser brands for the coca cola product and this may be why they have chosen (from Porters model) a differentiation strategy. This has paid off for them. Their manufacturing and distribution system has been an effective business level strategy. The Coca Cola Company and its bottlers can work together to determine local responsiveness and produce products that best suit the local tastes in that particular geographical area. Amongst other business level strategies these two would have to be the most effective. The companies structure and systems lend there hands to the successful implementation of their planning. Without which it might not have its position within the carbonated beverage market today. Strategic Analysis External Analysis We looked at the external environment of the carbonated beverage industry using the pestel model and Porter’s five forces model to find the key trends or influences on the industry. People today in general are becoming increasingly aware of a healthier lifestyle in light of new information regarding nutrition. People are trying to eat and drink a lot healthier and as a result there has been an increase in market demand for drinks such as orange juice, water, and other healthier alternatives. This was once a threat to the business of The Coca – Cola Company. Instead they eliminated this threat through product diversification. As you may have seen The Coca – Cola Company has a product from most drink categories. The barriers to entry in the carbonated beverage market are really high which means that the threat of other companies successfully entering into the industry is low. Virgin once tried to enter into the industry with Virgin Cola and was unsuccessful because Coke and Pepsi were already too strong. The Coca Cola Company has already well established brand awareness and distribution channels and the production costs are also substantial in the industry. Creating brand awareness and achieving market acceptance is a very costly procedure, extensive market research needs to be undertaken to understand local tastes and preferences. The Coca Cola Company has arrangements with certain Fountain Outlets (MacDonald’s and Subway) who are contractually obliged to distribute only their drink product. There are many other fountain outlets that have existing contracts with one of the soft drink companies and this makes it harder for new entrants. The large quantity of marketing and propaganda has lead to increased brand loyalty and is a major strength for the Coca Cola Company. It has also lead to the brand Coca Cola being perceived as the premium Cola drink. The dominance of Coca Cola can be seen by the failure of the drink Virgin Cola. Because of the limited size of the market, the growth in market share of one brand will result in the decrease of another. The Coca – Cola Company has used the large amount of resources at their disposal to wage competitive war on PepsiCo and other brands and results have shown that they have come out on top. One of the major strengths of The Coca – Cola Company is its sheer size in the industry because of which it can effectively utilize economies of scale. TCCC concentration is on marketing the brand, new product development, researching future venture opportunities and warding off competition. Their operations take place in a very dynamic environment and therefore innovation is vital to their success. Internal Analysis The company as the leading brand of carbonated beverages has a number of core competencies which it utilizes to give it its strategic competitive advantage (SCA) in the market. The manufacture and distribution of non alcoholic beverages The process of manufacture and distribution of Coca Cola products is unique to the industry. The Coca Cola Company has different bottling partners throughout the globe which manufacture and bottle the final product which the end consumer ultimately receives. The Coca Cola Company produces the concentrates and syrups of the products itself and then sells the rights to manufacture the products to its bottling partners. They do not control the policies and programs of these bottling partners, but they do have mutual self-interests and therefore work together to find common ground and take common action in many areas. Through this system they can effectively devise the appropriate strategy for responding to the needs of the local environment. Branding through marketing campaigns The Coca Cola Company has put a lot of emphasis over the years on creating and maintaining its brand name through large scale marketing campaigns. They have effectively used their resources to build a brand that is unique and known on a large scale throughout the world for its quality. This has led to a brand loyalty factor. Innovation: Product, packaging, equipment and marketing Coca Cola is always bringing out new carbonated beverages. Through the use of its resources and technology, it has led the innovation of new, improved, and different soft drinks around the world. A recent example of this from Coca Cola is â€Å"Jianchi† meaning strong inner energy in Chinese, the drink, made with fruit juices and plant extracts and available in three flavors is inspired by ancient Chinese wisdom to enhance the inner balance. The Coca Cola Company has invented a bottle which is made from a blend of petroleum-based materials and up to 30 percent plant-based materials named the ‘plant bottle’. It is a significant development in sustainable packaging innovation. The new bottle reduces carbon emissions by up to 25 percent, compared with petroleum-based PET, and is 100% recyclable. â€Å"The Coca-Cola Company is the first company to introduce a beverage bottle made with recycled plastic has been focused on ensuring the sustainability of its packaging for decades. It has put resources behind creating packaging that is recyclable and investing in recycling infrastructure to ensure that its packages are collected, recycled and re-used†. The Company has built the world’s largest recycling plant with the ambition of reducing costs and the amount of materials in their packaging through recycling. The packaging being lighter will also reduce the cost of fuel on delivery etc. To increase the market for recycled materials, The Coca Cola Company has also released a line of merchandise which is made from 100% recycled material. Overall the innovation of recycled packaging will reduce costs, prevent waste and maximize value over the life of the product and inadvertently adding value to the Coca Cola brand. Coca Cola won the Gold lion in the point of sale category at the 2009 Cannes lion’s international advertising festival with the â€Å"video vendor† being the latest innovation in vending machines. It is believed to create a uniquely immersive experience for consumers. Strategic Directions; Strategic Objectives Vision The vision of Coca Cola â€Å"specifies what the organization could achieve if it performed perfectly† (Viljoen and Dann, 2003:97) â€Å"To refresh the world, to inspire moments of optimism and happiness and to create value and make a difference† Mission The mission statement of The Coca Cola Company has all the elements a good mission statement should have. It specifies the company’s commitment to their shareholders. Their mission is to: Achieve sustainable quality growth, be a great place to work where people are inspired to be the best they can be, bring the world a portfolio of quality beverage brands that anticipate and satisfy peoples desires and needs, nurture a winning network of customers and suppliers, be a responsible citizen that makes a difference be helping build and support sustainable communities, maximise long term return to s hareholders while being mindful of our overall responsibilities and be a highly effective, lean and fast moving organisation. |Stakeholder |Salience |Stakeholder demands / needs |strategic objective(s) to address | | | |that must be satisfied |stakeholder demands / needs | |   |   |   | | | | | | |Shareholders |Definitive |High dividends & growth in share |Growth in profitability | | | |price |Increase in revenue | | | | |Financial stability | | | | |Efficiency | | | | |Research and development | |   |   |   |   | | | | | | |Customers |Dominant |Quality products at lowest price |Social Responsibility | | | |socially and environmentally aware |Product quality and service | | | | |Higher level of customer satisfaction | | | | |than rivals | | | | |Research and development | | | | |Focus on the needs of consumers, | | | | |customers, and franchise partners | | | | |Listen, observe and learn in the market | |   |   |   |   | | | | | | |Employees |Domina nt |All employee benefits satisfied |Employee welfare | | | |Clean and safe working environment |Financial stability | | |Friendly working environment |Be a great place to work where | | | |Job security |people are inspired to be the best | | | | |they can be | |   |   | |   | | | | | | |Community |Dominant |Minimal environmental impact |Social responsibility | | | |Support the community |Be a responsible citizen that makes a | | | | |difference by helping build and support | | | | |sustainable communities | | | | |Support charities and community | | | | |organizations | | | | |Research and Development – | | | | |Environmentally friendly products | | | | |Possess a world view | |   |   |   |   | | | | | | |Suppliers / Bottlers |Dominant |Network and communication |Nurture a winning network of customers | | | |Reliability |and suppliers, to together create mutual | | | |Support |and endearing value | | | | |Research and evelopment | |   |   |   |   | | | | | | |Government |Dormant |Abide by the laws and legislation |Abide by the law | | | |governing each county TCCC has |Be mindful of overall responsibilities | | | |its products | | |   |   |   |   | The strategic objectives of The Coca Cola Company are in alignment with the demands of each of its stakeholders. Its strategic objectives are firmly bound within its mission statement showing their commitment to upholding their responsibilities to meeting the demands of all possible stakeholders. Key Strategies – Current Using Ansoff’s product / market strategies model it can be determined that The Coca Cola Company is pursuing a product development / diversification strategy. This means that their aim is to keep distributing new products into the same existing market as well as look for opportunities in new markets. An example is the release of Jianchi a new product made from fruit juices and plant extracts. Miles and Snow’s adaptive strategies model reveals that the company is in the prospector / defender position in the market. The company is a prospector leading change in the industry through creating new products and identifying new opportunities in the market place. High innovation is key in the prospector business strategy. However it could be said that it is a defender as well in terms of the original coca cola product and its position in the Cola market. They are defending vigorously focusing on high quality and creating barriers to entry. Their position on strategy is characterized by stable growth, profits, efficiency and flexibility in a dynamic environment. Their business structure is flat / loose and authority is decentralized within the organization. The high level of innovation can be seen through the company’s marketing at a functional level with the recent release of the new four and a half minute Music Video released by The Coca Cola Company titled – â€Å"open Happiness† which has taken marketing in the carbonated beverage industry to a new level. Coca cola competes on the basis of value added for customers. People will pay the premium over lesser brands for the coca cola product and this may be why they have chosen (from Porters model) a differentiation strategy. In the past the company has focused cost leadership however this sometimes leads to lowered market entry barriers this has led them to a differentiation strategy and a focus on pervasive penetration, preference and price related value. Due to economies of scale Coca Cola has the opportunity to be a low cost provider and undercut Pepsi's prices but from what we can see it chooses the differentiation strategy and distributes its products at a premium. A possible reason why they may not have chosen a cost leadership strategy is that it can generally be seen as a weak competitive advantage. Competitors may undercut you and it is easily emulated as well as difficult to sustain over time. In order to differentiate from the conventional Coke product, The Coca Cola Company has produced / innovated other such products as cherry coke, vanilla coke and diet coke and it has undertaken competitive marketing against such companies as PepsiCo and Cadbury / Schweppes to advertise how their products are so different and better in quality. The Coca Cola Company has employed a strategy which closely resembles a multidomestic strategy. A multidomestic strategy is characterized as being â€Å"orientated towards local responsiveness†, establishing â€Å"semiautonomous national units in each country in which it operates to produce and customize products to local markets†. It does this in a unique way in collaboration with its bottling. Together The Coca Cola Company and all its bottlers form one system called The Coca Cola System. The benefit of this strategy is that The Coca Cola Company and its bottlers can work together to determine local responsiveness and produce products that best suit the local tastes in that particular geographical area. We have seen this strategy in action with the introduction of the Coca Cola equivalent of red bull being â€Å"Mother† the energy drink being release certain regions but not others. Strategic Implementation; General Perspective Evidence of unrealized strategy The Coca Cola Company was set for the acquisition of the Huiyuan Juice business in China around March earlier this year, which looked to agree with their product development / diversification and differentiation strategy. Unfortunately the Chinese Ministry of Commerce (MOC) decided to decline approval for the proposed purchase. Coke released a statement saying: â€Å"We will now focus all of our energies and expertise on growing our existing brands and continuing to innovate with new brands, including in the juice segment. † The innovation of one of their newest products – â€Å"Jianchi† came approximately around this time. Apart from minor setbacks such as the failure of the Chinese juice company merger and acquisition, the coca cola company has implemented its strategies of diversification and differentiation well and this can be seen in the popularity of their products and their prosperous position in the carbonated beverage market. Key Strategic Implementation Issues Using the Mckinsey 7’s’ model we found that the three major strategic implementation issues that confront The Coca Cola Company is structure, style and systems. Structure The Coca Cola Company has in the past gone through major restructuring of its organization. It has cut out various levels and moved to a more multi-domestic structure. A couple of years ago they restructured their operations in both North America and internationally. â€Å"Not to save pennies but to simplify decision making and expedite the speed in which we can execute†. To this day they continue to refine their business structure. In June 2009 they integrated three core functions for a new business structure: Global Business Services, Global Information Technology and Transformational productivity. This will allow the company to deliver services that are highly dependent on technology and standardized processes to its business units in a more effective and efficient way. Style Amongst the list of The Coca Cola Company’s seven â€Å"values† includes integrity and accountability. Muhtar Kent the current CEO of the company was caught betting against the company’s stock allegedly based on insider information then claimed not to know that his actions were illegal. This does not constitute good leadership and could however be classified as an implementation issue for the company. The style of leadership a CEO shows can have a massive effect on the shared values or culture of an organization. So far there are no further signs of further situations like the one described above by the CEO and the company is continuing to improve. The signs point towards Muhtar Kent redeeming his reputation in the company. Systems The Coca Cola Company has the largest beverage distribution service in the world. With close to 1. 6 billion servings a day consumed in over 200 countries, The Coca Cola Company has had to develop effective and efficient system to cope with the magnitude of the business. Systems are as important to The Coca Cola Company as they are to any business. The distribution system of their products is unlike any other in the industry. It ties in with their business structure closely resembling a multi-domestic organizational structure. The Coca-Cola Company frequently utilizes promotional merchandise to connect consumers with its brands. It is critical that all such merchandise make a positive impression upon consumers. It is important that they monitor quality control not just for their concentrates and syrups but also on their promotional merchandise. The organization of The Coca Cola Company comprises many systems which enable the company to run smoothly. It takes strong successful systems for a company to survive and they can also give a company its strategic competitive advantage. However they must also be monitored and evaluated. TCCC has a triple bottom line approach to reporting and they utilize the balanced scorecard to achieve this. Evaluation of Strategy – Current / Future Efficient evaluation has been implemented through a triple bottom line reporting approach. They understand due to their large public profile they have to maintain a focus not just on financial reporting but also on their social responsibilities and the environment. The balanced scorecard is used in their financial reports based on key performance indicators to measure their performance in implementing their strategic objectives. The message is therefore communicate to their stakeholders through their general purpose financial reports (GPFR). References Textbooks Hill et al. 2007, Strategic Management: An integrated approach 2ed, Wiley and Sons. Page: 4 – 19, 64 – 72 Internet News Article I’d like to sell the world a Coke http://www. nytimes. com/ref/business/20070527_COKE_GRAPHIC. tml Viewed: 10:52 Monday 31st August The Coca Cola Company Website: Innovation http://www. thecoca-colacompany. com/ourcompany/innovation. html Viewed: 4:59 Monday 31st August The Coca Cola Company Website: The System The Coca Cola logo (used above) is a registered trademark of The Coca Cola Company http://www. thecoca-colacompany. com/ourcompany/the_cocacola_system. html Viewed: 4:59 Monday 31st August Strategic management http://www. docstoc. com/docs/10713752/Strategic-Management Viewed: 4:00 Saturday 10 October 2009 Brand Spotlight: Coca-Cola http://www. brandingstrategyinsider. com/2007/04/brand_spotlight. html Viewed: 6:31 Sunday 11 October 2009 Organization Strategies: Strategies used in Coca Cola http://www. findfreecollegeessays. com/show_essay/47865. html Viewed: 6:40 Sunday 11 October 2009 Open Happiness: Music Video http://www. youtube. com/watch? v=Cxfkg3RaRjs&feature=related Viewed: 4:53 Saturday 10 October 2009 THE COCA-COLA COMPANY INTRODUCES INNOVATIVE BOTTLE MADE FROM RENEWABLE, RECYCLABLE, PLANT-BASED PLASTIC http://www. thecoca-colacompany. com/presscenter/nr_20090514_plantbottle. html Viewed: 10:16 Sunday 11 October 2009 ACQUISITION OF HUIYUAN JUICE GROUP IN CHINA NOT TO PROCEED http://www. thecoca-colacompany. com/presscenter/nr_20090318_huiyan_juice. html Viewed: 11:37 Sunday 11 October 2009

Sunday, September 29, 2019

Reflection on White Privilege

Reflective Analysis #2 Peddy McIntosh highlighted various unearned white privileges in her autobiographical article â€Å"White Privilege, Color and Crime: A Personal Account. † She illustrated the white privilege as an invisible package of unearned assets that one white person could count on cashing in each day. White people have these privileges given to them by the society in which they live in. The same society taught them to be ignorant and unawareness of these privileges. This system of unearned privileges established by white individuals made people of color feel oppressed. In this system being white is a norm and dominant power. Caucasians, who benefit most from the white privilege system in the United States, are more likely to be blinded to the existence of privilege system and take these privileges for granted it. In this reflection analysis, I will elaborate on most common white privileges mentioned by Peddy McIntosh through my personal experiences. As Peddy McIntosh distinguishes white race has unearned advantages over the color race that white people don’t even realize. Caucasians have a special provision, passports, and visas that color people among the world don’t have. For example, individuals from third world don’t get tourist visas to travel around the world and discover new places as the white do. From my personal experience, individuals in India who wants to travel around or settle in a different country don’t have these privileges. Nevertheless, they are unable to achieve their ambition. These individuals don’t have these provisions and privileges because the entire system is established based on white individuals. They’ve granted greater advantage among the same skin color individuals while limiting and lesser advantage towards the color people. Peddy McIntosh made an identical point that United States’ claim to be a democracy in which value is only rewarded to white people. She mentioned white individuals are unaware of these privileges and they are in process of benefitting from the advantages of racism. Another privilege McIntosh classifies is being surrounded by white individuals company. It is easier for a white person to fit in any community because majority of the communities are dominated by their race. For example, if a white person moves in a new house, they are pretty sure greater parts of their neighbors are same race as them. When I moved in the United States many years back, I felt left out and it was difficult for me to fit in because I was a minority. I was mocked by mostly white students about the way I dressed and teased about being different from them. White students don’t encounter these problems when they transfer from one school to another because they figured majority of the students they’ll be surrounded by will be same skin color as them. Another difficulty I had was shopping at a supermarket was finding my cultural food. It won’t be difficult for a white person to fit in a community and find similar food to their culture. A person doesn’t realize these privileges until they image themselves in color individuals’ shoes. In conclusion, Peggy McIntosh pointed in her article, white privileges don’t come from an individual person or flaw of a person. White privileges arise from the flaw of the system placed in a society. Therefore, if we want to change the society and equalize the privilege amongst whites and colors, then change must happen within the system. It is the system that influences individuals to act upon in the society. A great way, we can demise these privileges among white individuals, is through educating the whites and making them aware of these unearned benefits and privileges.

Saturday, September 28, 2019

Personal Environmental History Essay Example | Topics and Well Written Essays - 500 words

Personal Environmental History - Essay Example As I moved into my early teenage years, despite becoming further educated about the nature of pollution and environmental degradation, I became complacent in my relation to the earth such that it became even more estranged to my existence. During this period my friends and I would regularly litter and act with little disregard for nature. These actions were perhaps youthful arrogance personified. It was a general understanding of life and nature that it was plentiful and without end. As I matured I began to have and look back on the experiences I had with nature. As a child growing up my family and I would often go on camping trips where we would venture in the woods, set up a campsite, and enjoy the natural surroundings. I remember venturing down to the lake with my brother and attaching crickets to our fishing line and bringing in fish. As I grew older I remember visiting the Appalachian Trail and spending an entire weekend hiking a significant segment, and camping in the woods. I appreciated the meditative aspects that nature provided. The means of nature as a retreat from the development of the industrialized world and all its social problems, and nature’s ability to provide this respite. I read books such as Thoreau’s Walden and began to appreciate nature not as a stranger, but as a close friend.

Friday, September 27, 2019

The Ethernet Technology Report Essay Example | Topics and Well Written Essays - 1000 words

The Ethernet Technology Report - Essay Example For transporting digital bits of data through the carrier waves, Ethernet has some encoding techniques. These encoding techniques aid in synchronizing the data sending and data receiving stations and providing a signal with strength sufficient enough to deliver a required amount of data rate. So, the difference in encoding techniques relate to the difference in the data transfer speed provided by the Ethernet cable. For instance, the three encoding techniques Manchester, 4B/5B and 8B/10B are used for the providing Ethernet LAN of speeds 10Mbps, 100 Mbps and 1Gbps respectively (TechFest.com, 1999). Manchester encoding delivers a signal of frequency 10MHz which is sufficient to provide a data rate of 10Mbps for the 10Base5 and 10Base2 coaxial cables. The installation is easy and new systems can be added easily. However, owing to the bus topology (in 10Base5) and the fact that the cabling is half duplex (i.e. same cable used for sending and receiving), chances of collisions would be mor e and the throughput of the system would be less. In case of daisy chains (10Base2), routing difficulties would be present. Secondly, the higher data rates cannot be achieved due to coaxial cables. In case of using 10BaseT twisted pair cables, 20Mbps can be achieved owing to full duplex mode. New hosts can be added easily in the supported star topology network. However, repeaters are required after every 100m unlike 10Base5 and 10Base2. When using 10BaseFL, repeaters are not needed till 1000m. The 4B/5B encoding delivers a 62.5MHz frequency signal on the 100Base-Tx Cat 5 twisted pair cabling. A signal of maximally 100MHz is enough to be transmitted over a medium of 100Mbps. In full duplex mode, any new host can be added without affecting the collision rates. 4B/5B encoding is also used in 100Base-Fx cables.

Thursday, September 26, 2019

Write topic Essay Example | Topics and Well Written Essays - 250 words - 1

Write topic - Essay Example How does the child compare to what the textbook identifies as age-typical. (you can also use other appropriate sources for developmental milestones if you reference them) Opening of doors and pulling at items. Toddlers at this age can be able to use their legs and hands but not in a refined way but they have the gross motor skills. The child’s actions compares to those explained in the book. 4. Give examples of fine motor skills that you observed. What does the textbook say for infants and toddlers of this age? How does the child compare to what the textbook identifies as age-typical. (you can also use other appropriate sources for developmental milestones if you reference them) The toddler is able to hold cups and can even pick pieces on the surface. The fine motor skills are not fully developed but there is evidence of their existence as can be observed in the toddler’s use of fingers. 5. Provide three examples of sensory perception the child uses while involved in activity during your observation. What does the textbook say about those sense modalities and their development in infants and toddlers? How do they compare to what the textbook identifies as age-typical? (for example: A baby turns his head toward his mother when she calls his name, a baby makes a face when she tastes something sour, a toddler watches the family dog walk across the room.) The baby observes the actions on the television, during feeding, the baby spits food that they do not like and he also listens when a familiar song is sang to him. These perceptions are in line with the book as the toddler is grossly able to distinguish taste, sound and visual

Wednesday, September 25, 2019

Phosgene Essay Example | Topics and Well Written Essays - 1000 words

Phosgene - Essay Example At temperatures above 250oC, phosgene decomposes to mixtures of carbon monoxide (CO), chlorine gas (Cl2), carbon dioxide (CO2), and carbon tetrachloride (CCl4). Owing to its low boiling point of 7.56oC, it is very volatile and non persistent. "It may remain for long periods of time in trenches and other low lying areas" (Federation of American Scientists, 2007). Phosgene smells of newly mown hay, at room temperature. It is soluble in fatty oils and organic solvents. Its odor threshold is 0.12-5.7 ppm. And its Permissible Exposure Limit Threshold Limit value (by volume in air) is 0.1 ppm (American Chemistry Council, 2002). Physical properties of Phosgene are given below: Phosgene hydrolyses slowly in water and releases hydrochloric acid and carbon dioxide. Phosgene reacts easily with caustic solution and even more so with ammonia and ammonia water. Phosgene produces hazardous chemical reactions with certain substances. Powdered aluminum burns in the presence of the vapor of phosgene. Phosgene also reacts with alcohols. For example, with 2,4-Hexadiyne-1,6-diol, phosgene produces a shock sensitive compound 2,4-hexadiyne-1,6-bischloroformate. It also produces hazardous products on reaction with secondary amines. When phosgene is mixed with potassium and subjected to shock, it explodes (American Chemistry Council, 2002). Phosgene is a highly dangerous pulmonary toxicant. ... erg/mol cm Solubility Parameter Dipole Moment Van der Waals Volume Van der Waals Area 5.64E+04 1.16919 34.9 5.20E+09 (erg/cm3)A1/2 Debye (D) cm3/mol cm2/mol Refractive Index Flash Point Upper Flammability Limit Lower Flammability 1.35609 Unknown Unknown Unknown C vol% in air vol% in air Upper Flammability Temperature Lower Flammability Temperature Auto-Ignition Temperature Unknown Unknown Unknown C C C Density Vapor Density Vapor Pressure 1.38 (20oC) 3.4 365 (-10oC) 555 (0oC) 1173 (20oC) g/cm3 mmhg LC50 5 ppm/1h Phosgene hydrolyses slowly in water and releases hydrochloric acid and carbon dioxide. Phosgene reacts easily with caustic solution and even more so with ammonia and ammonia water. Phosgene produces hazardous chemical reactions with certain substances. Powdered aluminum burns in the presence of the vapor of phosgene. Phosgene also reacts with alcohols. For example, with 2,4-Hexadiyne-1,6-diol, phosgene produces a shock sensitive compound 2,4-hexadiyne-1,6-bischloroformate. It also produces hazardous products on reaction with secondary amines. When phosgene is mixed with potassium and subjected to shock, it explodes (American Chemistry Council, 2002). Mechanism of Injury Phosgene is a highly dangerous pulmonary toxicant. Its exposure may not produce any symptoms for a long time, and by the time symptoms are detected it usually results in fatalities. Its exposure produces massive pulmonary edema. The routes of exposure to phosgene are inhalation, and skin/eye contact. Inhalation: This is the major route of phosgene exposure. Since it is hard to detect the odor, there may be prolonged asymptomatic exposures. Phosgene also causes asphyxiation in poorly ventilated places, since it is heavier than air at temperatures above 8oC (American Chemistry

Tuesday, September 24, 2019

Corrections Corporation of America Company Essay

Corrections Corporation of America Company - Essay Example Ethical Factors The ethical factors surrounding the current changes in the justice and correction departments in the US regard the moral consequences and the general good of the nation. The early release of incarcerated individuals may have an impact on the recidivism and security of the country at large. Rehabilitation and correctional efficiency of criminals reduces even with an increase of cost in public prison facilities. The effect of the current state policies affects all individuals, from individual citizens to the individuals incarcerated. Company’s Current Strategy The CCA is planning to expand its market to Europe and other countries. In Europe, the market for private prison services in increasing, a change attributed to the changing justice policies in those nations. In the US, the company has remained behind its competitors in expansion, preferring to wait for clarity on the current situation and its expected-persistent duration (Tella and Winig, 2010). The current adoption of cost control policies by states will result in leniency in law and justice, which will further result in increase in crime nationwide. Additionally, CCA suffers economically if its correction facilities do not maintain an acceptable level of incarcerated criminals. ANALYSIS EXTERNAL ANALYSIS The history of private prison industry dates back to 1984, with CCA taking over the management of a prison facility in Tennessee. The company has since grown to become the leader in the industry, commanding nearly 50% of the prison beds under private correctional services (Tella and Winig, 2010). Industry Structure & Trends The private prison services industry offer correctional services to the nation, the main customers being federal and state... The paper tells that the history of private prison industry dates back to 1984, with CCA taking over the management of a prison facility in Tennessee. The company has since grown to become the leader in the industry, commanding nearly 50% of the prison beds under private correctional services. The private prison services industry offer correctional services to the nation, the main customers being federal and state governments in the US. These companies work on a contractual basis, typically three to five years, but most of the contracts incorporate clauses that allow the government to terminate their agreement. The growth of the industry depends on a number of uncontrollable factors, which include sentencing patterns in different jurisdictions, crime rates, and acceptability of prison services privatization. Specialists in the industry argue that business is headed downwards for new comers as more states try to reduce prison overcrowding and expenses. According to the article, almost half of the new inmates were sent to private prison facilities in 2009. The article cites one analyst suggesting that established firms in the industry who have focused on their competencies will continue to grow despite the budget crisis. The policies regulating private prison use varies from state to state, with some states banning the private prison altogether, like New York, Louisiana, and Illinois. Outside the US, privatization of prison services has not been embraced fully. Nonetheless, countries, especially in the European region, are adopting the system, with Australia having a record 17%.

Monday, September 23, 2019

Analysis of Ha Jin's Waiting Essay Example | Topics and Well Written Essays - 1000 words

Analysis of Ha Jin's Waiting - Essay Example His novels were meant to highlight the political and social upheavals in the society, which he did by establishing metaphors and characters that demonstrated each and every facet of the society. His works has gone on to achieve high accolades and critical acclaim, as he has not only woven compelling storylines but he is also known to write about tabooed subjects such as the Korean War and the damage that was inflicted on to his country because of communism. Despite the fact that Ha Jin has long left his homeland for a more stable life in the United, he incorporates a major element of Chinese culture in his work; from characters to the phrases that he uses in his stories, he injects a bit of his homeland in all his stories. The aforementioned elements will be evaluated by assessing them in the light of his novel â€Å"Waiting†. Ha Jin is also known to translate many Chinese proverbs into English; for instance, there is one instance in the book where he translated a famous prove rb in the following words: â€Å"With money you can hire the devil to grind grain and cook dinner for you† (1999, p. 172). ... cept, Ha Jin’s novel ‘Waiting’ tells the story of a man, named Lin Kong, who works as a doctor in a government Medical facility in a fictional city in China called Muji City. He defers to his parents wish of marrying an ordinary peasant woman named Shuyu but the main conflict in high life arises when he is o tried hard to extricate himself out of a loveless marriage to marry his colleague; for years he waits. When he finally get to marry the woman he thought he love, he is struck with the realization that he doesn’t love her either and as a result springs back in to the same state that he had been in years. The novel Waiting encompasses intensely dark themes which are further emboldened by the fact that his protagonist is unable to feel actually feel strong emotions like love or passion. This aspect reflects the suppression of the Chinese people in order to help them achieve their communist ideals. Ha Jin further emphasizes the establishment of patriarchy u nder the communist regime that further widened the divide between males and females in the society. Marriage was seen more as a necessity than a union of love that further stunted the society’s emotional growth. His novel waiting sheds great light on to the dynamics of the relationship that drastically changed as a result of the political ideology that it ingrained a sense of ambivalence amongst the people regarding love and passion. In ‘Waiting’, the protagonist’s affections are quickly transferred to a young and intelligent nurse at his medical facility from a wife, who he married only to fulfill his parent’s wishes. He is mostly away from his wife to serve in a government medical facility and often becomes the prime subject of censure for platonic relationship with his nurse; which is not only

Sunday, September 22, 2019

Zara Inc Success Research Paper Example | Topics and Well Written Essays - 2250 words

Zara Inc Success - Research Paper Example As the paper highlights the Fashion Retail world has evolved ahead of others with companies fighting for share in the market and the consumers demanding the next exotic collection every few months. The internationalization has enhanced the commercial aspect of these Fashion Titans who struggle to roll out new designs and trends every season with the hope of getting noticed in a crowd of thousands. The new global economic environment has provided Zara with an opportunity to improve its current brand perception and become the premium brand for European consumers. This can be achieved by creating a high end line for Zara. This would not only increase the potential target market for Zara but also allow Zara to charge premium prices. This study declares that in 1963-74 Amancio Ortega Gaona, chairman and founder of Inditex2, begins his business activities in the textile manufacturing sector. The business grows steadily throughout the decade to include several manufacturing centers distributing products to various European countries. The first ZARA shop opened its doors in 1975 in A Coruà ±a (Spain), the city that saw the Groups early beginnings and which is now home to its central offices. Its stores can now be found in the most important shopping districts of more than 400 cities in Europe, the Americas, Asia and Africa which is indeed a remarkable achievement. Interesting as it may seem, its first store featured low-priced lookalike products of popular, higher-end clothing fashions. This was of course an instant success as it enabled the people to have copies of the more luxurious clothes at a reasonable price and so Mr. Ortega opened more stores all over Spain. â€Å"ZARA was a fashion imitator.  ZARAâ€⠄¢s strategy of low volume per style and changing products quickly in its stores helps it to down on the discounts as well. Of its 12,000 distinct items annually, only about 18% of its clothing does not work with customers and has to be discounted.  

Saturday, September 21, 2019

Fresh Foods versus Canned Foods Essay Example for Free

Fresh Foods versus Canned Foods Essay Eating is an activity that we as humans do at least two times a day. We live in a world where the variety of food is immense, and we are responsible for what we eat. We decide what we are about to eat and how it will affect our bodies. However, each food differs from one to another. For example are the fresh food and the canned food. Fresh foods and canned foods are two kinds of different types of food that have their own benefits and disadvantages. The most notable difference between these two kinds of foods is their flavor. Fresh food have great flavor because they keep their natural conditions. Canned foods however, lack a lot of its flavor characteristic because there are some other chemical products added to the natural foods. Comparing both types of foods we can notice another difference. Â  That is the health factor that affects our bodies. While the fresh food keep their original freshness and flavor, canned foods lose some of the original fresh food nutrients when stored, and also it has chemical ingredient when consumed too much will become toxin in our bodies. Another difference between these two types of food is the cost. Canned foods are much more expensive than the fresh foods. In contrast to the cost, canned foods are easier to find, they also require less work to prepare than fresh food. As we can see there are three main differences between the fresh foods and the canned foods. However, the main reason we chose our foods lies on our personal choice, based on time each person has, the money and the importance we give to our nutrition and health. Therefore it is important that you consider your possibilities and choose the best type of food for your convenience and life style.

Friday, September 20, 2019

Analysis of Windows Operating System and Microsoft

Analysis of Windows Operating System and Microsoft What is Windows? Windows is a personal computer operating system from Microsoft that, together with some commonly used business applications such as Microsoft PowerPoint, Word and Excel, has become a de facto standard for individual users in most corporations as well as in most homes. It provides a graphical user interface (GUI), virtual memory management, multitasking, and support for many peripheral devices. According to OneStat.com, as of August, 2006, Windows as a whole dominates the personal computer world, running on about 97% of the operating system market share, with XP accounting for about 87% of that. In comparison Mac OS has about 2% and Linux (with all distributions) about .36% The reason why this is so is mainly because Windows is much more user friendly and everything comes pre-packaged so user just have to run the application and follow instructions for it to install. There are many versions of Windows Operating System available namely: Windows 286 Windows 386 Windows 3.0 and 3.11 Windows 95 Windows 98 Windows NT Windows 2000 Windows CE for use in small mobile computers Windows Me Windows XP Windows Vista Windows 7 Among all those versions, Windows XP is the most popular one and it is used by 61.9 percent of Internet users, according to data from Net Applications, followed by Windows 7 which has 14.46 percent of users and Vista -14.34 percent. A Brief Story On Windows Windows mainly concentrated on providing an operating system which was user-friendly, stable and less prone to crashes when they were implementing earlier versions. Now, even though XP is generally referred to being stable and efficient compared to other copies of Windows, it is still critised for being overly susceptible to security risks. Therefore the successor of XP- Vista, released in January of 2007 was designed in such a way so as it provides more security. The transition time between Vista and XP is the longest one between versions of windows. Vulnerabilities Of Windows What is vulnerability? â€Å"It is a weakness that makes a threat possible. â€Å" These vulnerabilities are used by attackers who exploits them to convey multiple attack, including enticing the users to open harmful and malicious media or to visit website which has a lot of viruses. These can have a lot of consequences. In the worst case, a hacker or attacker can get full access to the computer. Fortunately, windows provide a lot of solution to these vulnerabilities. The user just has to install the appropriate Microsoft patches or they are sometimes installed automatically with the help of Windows Update. Window Update Vulnerabilities can be compared to holes. They are like holes in the system. Windows periodically releases security patches mostly as Window Updates to fix those defects. There exists different level of security known as the â€Å"security level system† in Windows which describes the different levels of security holes: A critical security hole is â€Å"a vulnerability whose exploitation could allow the propagation of an Internet worm without user action.† An important hole is â€Å" A vulnerability whoses exploitation could result in compromise of the confidentiality, integrity, or availability of users data, or of the integrity or availability of processing recources.† A moderate security rating signifies that â€Å"Exploitability could result is mitigated to a significant degree by factors such as default configuration, auditing or difficulty of exploitation. And a low hole is â€Å"A vulnerability whose exploitation is extremely difficult or whose impact is minimal.† Source: Windows XP all-in-one desk reference for dummies Below is a list of Vulnerabilities in Windows MS10-033: Two Media Decompression Code Execution Vulnerabilities Description: It involves vulnerabilities in Media Decompression. â€Å"Windows ships with various components that help it process and play media files, such as videos. According to Microsoft, these media handling components suffer from two unspecified code execution vulnerabilities, involving the way they handle compressed data within specially crafted media. â€Å" Potential effect on system: An attacker can exploit these vulnerabilities by encouraging user to open specially crafted media file, download and install harmful software, by luring them to a website containing such media or by receiving specially crafted streaming content from a web site or any application that delivers Web content. In doing so, an attacker can exploit these vulnerabilities to gain the same user rights as the local user. If this happens, then the attacker will gain the complete control of that PC. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Microsoft rating: Critical. Solution: MS10-033. Since media files are most often the common targets of exploitation by attackers due to the increased potential for circulation via social group and the fact that it has been publicly been disclosed, it is estimated that the possibility that malware authors will look to exploit these types of vulnerabilities are high and hence, update must be installed. Targeted Software: Windows 2000 Service Pack 4 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 Itanium based Systems No Pack Service Pack 2 Windows XP Service Pack 2 and 3 Professional x64 Edition Service Pack 2 Windows Server 2008 No Service Pack Service Pack 2 Windows Server 2008 x64 Edition No Service Pack Service Pack 2 Windows Server 2008 for Itanium Based Systems No Pack Service Pack 2 Windows Vista Service Pack 1 2 Windows Vista x64 Edition Service Pack 1 2 MS10-034: Cumulative ActiveX Kill Bit Update Description:â€Å"ActiveX controls are small programs or animations that are downloaded or embedded in web pages which will typically enhance functionality and user experience. Many web design and development tools have built ActiveX support into their products, allowing developers to both create and make use of ActiveX controls in their programs. There are more than 1,000 existing ActiveX controls available for use today.† Source: http://msisac.cisecurity.org/advisories/2010/2010-043.cfm Potential effect on system: There are several Microsoft and third party ActiveX controls which particularly suffer from various security vulnerabilities, found by Microsoft and other external researchers. This vulnerability allows remote code execution if a user views malicious website that has an ActiveX control with Internet Explorer. An attacker could exploit any ActiveX controls to execute code on the users computer, with that users privileges. If user has administrative privileges, the attacker will gain full access to the users pc. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Microsoft rating: Critical. Solution: MS10-008 This updates protects the pc by activating the Kill bit for every vulnerable ActiveX controls, they are this disabled in Windows. Microsoft Internet Explorer provides security feature which will prevent an ActiveX control from being downloaded without the users permission. Targeted Software: Windows 2000 Service Pack 4 Windows XP Service Pack 2 Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Windows Vista Windows Server 2008 Windows 7 or 32-bit Systems Windows 7 for x64-based Systems Windows Server 2008 R2 for x64-based Systems** Windows Server 2008 R2 for Itanium-based Systems MS10-032: Three Privilege Elevation Vulnerabilities in the Kernel-mode Driver (Win32k.sys) Description:†The kernel is the core component of any computer operating system. In Windows, access to the kernel is provided via the Windows kernel-mode device driver (Win32k.sys). Win32k.sys suffers from three elevation of privilege (EoP) vulnerabilities†.† The flaws are caused due to the way windows kernel-mode driver, improperly allocate memory when copying data from user mode frees objects that are no longer in use manage kernel-mode driver objects validate input passed from user mode. â€Å" Potential effect on system: â€Å"By running a specially crafted program on one of your Windows computers, an attacker can leverage any of these flaws to gain complete control of that system, regardless of his original user privileges. However, the attacker needs to have local access to one of your computers in order to run a malicious program. So these vulnerabilities primarily pose an internal risk.† Microsoft rating: Important. Solution: MS10-032 MS10-041: .NET Framework Data Tampering Vulnerability Description: â€Å"The .NET Framework is software framework used by developers to create new Windows and web applications. Among other things, the .NET framework includes capabilities to handle cryptographically signed XML content, to ensure unauthorized attackers cant alter XML messages being sent to your application. Unfortunately, the .NET framework doesnt implement XML signature checking properly. As a result, attackers could potentially send maliciously altered XML messages to applications youve created with the .NET framework† Potential Effect on system: The impact of this vulnerability differs greatly depending on the application youve designed, and what type of data you passed in your XML. If user havent been exposed to any web applications that rely on signed XML, then the flaw doesnt affect him at all. Microsoft rating: Important. Targeted Software: Microsoft .NET Framework 1.1 Service Pack 1 Microsoft .NET Framework 1.0 Service Pack 3 Microsoft .NET Framework 2.0 Service Pack 1 2 Microsoft .NET Framework 3.5 Microsoft .NET Framework 3.5 Service Pack 1 Microsoft .NET Framework 3.5.1 MS10-037: OpenType Compact Font Format (CFF) Driver Privilege Elevation Vulnerability Description: This vulnerability mainly occur when a driver that helps to display the OpenType CFF font, does not validate certain data passed from user space to kernel space. Moreover the driver can grant complete control of the affected system to any user who is logged in and is executing code. Potential effect on system: â€Å"By running a specially crafted program on one of your Windows computers, an attacker can exploit this flaw to gain complete control of that system, regardless of the attackers original user privileges. However, the attacker needs to have local access to one of your computers in order to run his malicious program. So this vulnerability primarily poses an internal risk.† Microsoft rating: Critical. Solution: MS10-037 Targeted Software: Microsoft Windows 2000 Service Pack 4 Windows XP Service Pack 2 3 Windows XP Professional x64 Edition Service Pck 2 Windows Server 2003 Service Pack 2 x64 Edition Service Pack 2 Windows Server 2003 for Itanium-based Systems Service Pack 2 Windows Vista Service Pack 1 2 Windows Vista x64 Edition Service Pack 1 and 2 Windows Server 2008 for 32-bit Systems No Service Pack and Service Pack 2 Windows Server 2008 for x64-based Systems No Service Pack and Service Pack 2 Windows Server 2008 for Itanium-based Systems No Service Pack and Service Pack 2 R2 for x64-based Systems Windows 7 for 32-bit Systems x64-based Systems These are a few examples of vulnerabilities that Windows Operating Systems mainly face. This list keeps on increasing with time, and fortunately Microsoft provides update so as to overcome these problems. Source: http://www.newagedev.net/2010/06/five-vulnerabilities-in-windows-and-its-components-two-critical/ http://www.sophos.com/ Threats Attacks There are many types of threats and attacks that Windows has to face. Also the fact that Windows operating system are most common among computer users, they are thus the more targeted by attackers. Threat V/S Attack What is a threat? â€Å"A potential occurrence malicious or otherwise that may harm an asset† What is an attack? â€Å"An action taken to harm an asset† From the two definitions above, we can say that a threat is more the possibility of doing harm to the Windows system, while attack is mainly the action taken to violate security settings. Types of Threats Attacks Below is a list of threats and attacks that are most common which can affect your Window Operating Systems. Types Of Threats Description Countermeasures Spoofing It mainly deals entering a system by stealing the identity of an authorised user. Example: Using the password and username of a person to enter his account and make changes without his permission. Do not keep password at the reach of other person. (for example in a plain text) Use spyware such as Spybot SD â€Å"Protect authentication cookies with Secure Sockets Layer (SSL).† â€Å"Do not pass credentials in plaintext over the wire.† Use strong and long password which is not easy to guess. Repudiation It involves the denial of participation in a communication which has occurred or denying that information has been received. Make use of digital signatures. Create secure audit trails. Tampering with data It mainly involves changing data manually to generate unexpected result. Example: Changing data on a web site. â€Å"Use data hashing and signing. Use digital signatures. Use strong authorization. Use tamper-resistant protocols across communication links. Secure communication links with protocols that provide message integrity.† Denial of service Prevent legitimate user from accessing a network or compuer by saturating it with requests. â€Å"Use resource and bandwidth throttling techniques. Validate and filter input.† Use software available on the net such as Radwares APSolute OS Information Disclosure It mainly involves making confidential information accessible to public or a group of unauthorised person. Encrypt file where information is stored. Keep back-up in secure places and use strong authorisations. Use passwords to be able to gain access to these information Use secure network when sending information. Malware (malicious Programs) It consists of any program that is installed either with or without permission of user, and whose aim is to cause harm to users pc by either gaining partial or full access to the system. Its impact can vary from slight as changing a folders name to full control of your machine without the ability for the user to easily find out. Types of Malicious Programs: computer viruses worms Trojan horses spyware Harmful adware scareware, crimeware, Most rootkits, and other malicious and unwanted software or program. Computer Viruses They are programs designed to cause harm to our computer system or the applications on the software. They are often attached to files which appear to be harmless to the operating system, but as soon as it is installed, the computer will operate different. There are viruses which even manage to close your computer without your permission. Types of Computer Viruses: * Boot sector computer viruses These types of viruses mainly affect the boot sector of the computer which is mainly in the bootable disk or in particular location in user computer hard drive. The boot sector viruses mainly affected the windows 2000 and examples of such viruses are: Disk Killer and Michelangelo. * Email viruses Emails viruses are transmitted through email as it name suggest. Normally they can be found as attachment and as soon as they are opened the computer gets the virus. Some may even replicate by themselves by forwarding themselves to all the e-mail addresses in the users address book. This type of virus is spread very quickly. Even though most of the mail system provides users with scan, a precaution one can take is opening mail from known-people only. * Companion viruses Companion viruses mainly affect a computers MS-DOS system. They create dangerous program that appears to be like the other normal files that are found on the computer. When a wrong command is enter into the prompt of the computer, it may end up executing the virus instead of the program that initially wanted to run. Fortunately, Windows like XP prevent such viruses from installing into computer as they do not require to use the MS-Dos command prompt. Worms Worms have the characteristic of self-replicating itself and they are thus spread very quickly. They exploit vulnerability on operating system and provide a gateway for other malware such as Trojan horse. An example of a worm which caused a lot of harm to mainly Window Operating system is: the ILOVEYOU virus. According to an article on WordPressTidBits For the Rest Of Us(WPTidBits), the ILOVEYOU worm (a.k.a. VBS/Loveletter and Love Bug worm), is a computer worm written in VBScript and it is considered by many as the most damaging worm ever. It started in the Philippines on May 4, 2000, and spread across the world in one day (traveling from Hong-Kong to Europe to the United States), infecting 10 percent of all computers connected to the Internet and causing about $5.5 billion in damage. Most of the â€Å"damage† was the labor of getting rid of the virus. The worm arrived in e-mail boxes with the simple subject of â€Å"ILOVEYOU† and an attachment â€Å"LOVE-LETTER-FOR-YOU.TXT.vbs†. The Pentagon, CIA, and the British Parliament had to shut down their e-mail systems to get rid of the worm, as did most large corporations. The worm overwrote important files, as well as music, multimedia and more, with a copy of itself. It also sent the worm to everyone on a users contact list. This particular worm only affected computers running the Microsoft Windows operating system. While any computer accessing e-mail could receive an â€Å"ILOVEYOU† e-mail, only Microsoft Windows systems would be infected. The worm propagates by sending out copies of itself to all entries in the Microsoft Outlook address book. It also has an additional component, in which it will download and execute an infected program called variously â€Å"WIN-BUGSFIX.EXE† or â€Å"Microsoftv25.exe†. This is a password-stealing program which will e-mail cached passwords. Trojan horse It is a malware which is difficult to detect, since it masquerades itself into files which appear to be normal. It can be on the computer without doing anything, and finally one day it can be the reason why your operating system has crashed. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. Spyware Spyware normally a tool used by companies to record web surfing habits Spyware is also known as the Advertising Supported software. They normally do not do any harm to the operating system as such, but they transmit personal identifiable information from a computer to some place in the internet without the permission of the user. Harmful adware â€Å"Adwareis the common name used to describe software that is given to the user with advertisements embedded in the application† They usually run advertisement or downloads posters without the permission of the user which often cause problem. Scareware Scareware are usually software used for marketing but which has unethical marketing tactics. For example, software which scans the computer and informs user that his computer is infected, and the later will have to download the following antivirus to be able to remove them. Hence, as its name says â€Å"scare† ware is a software designed to scare people by providing them with inexact information so as to promote a particular software/applications. Crimeware Crimeware consists of an application or a program which helps people to perform illegal activities. For example, software to hack windows live messenger password. They normally steal personal information about user of an account. Rootkit â€Å"It enables an attacker to have root access to the computer, which means it runs at the lowest level of the machine. A rootkit typically intercepts common API calls. For example, it can intercept requests to a file manager such as Explorer and cause it to keep certain files hidden from display, even reporting false file counts and sizes to the user. Rootkits came from the UNIX world and started out as a set of altered utilities such as the Is command, which is used to list file names in the directory (folder).† Source: http://www.pcmag.com/encyclopedia_term/0,2542,t=root+kiti=55733,00.asp Rootkits are normally inserted by the intruder so that he can again have access to it a later stage. Rather than just being a piece of code, it is a system of many linked programs designed to take control of a machine at the administrator level, and remain hidden to the systems users or legitimate administrators. The purpose of rootkits include collecting information about computers (including other computers on a network) and their users (such as passwords and financial information), causing such computers to malfunction and creating or relaying spam. Prevention against Malware Antivirus Antivirus should be installed to prevent malware from gaining access to the computer. Anti-spyware It helps user to identify and remove spyware from Operating system. Moreover it defends users computer from them Anti-adware It scans the computer and removes adware. Moreover it can also detect other miscellaneous codes which the antivirus has not detected. Firewall It is a set of device or devices that can be used to monitor both incoming malware from network or on users pc when he enters an external disk. Window Update Allow windows to update automatically, since it provides users computer with required patches to fight against new type of malware. Making Windows more secure 1. Virtualisation This method mainly involves using another computer in your computer. What is meant by that is software like Adware, allow you to install windows and use it. Thus you can connect to any device or any site and if the pc crash, there will still be your main Operating system running. 2. User Account Control It is a method which is mainly applicable for users of Vista and Windows 7 only. It an effective measure that Microsoft has made to ensure that user does not perform any action which can turn out to be harmful for the system. Also, user is being asked for permission whenever a program is installed. If a virus tries to run without the knowledge of the user or his permission, UAC will pop up with the usual continue or cancel message giving him one last chance to stop that particular infection. UAC can be adjusted in the Control Panel under User Accounts. 3. Browser Internet Explorer is not a safe browser. (Not including IE9) and they are the most targeted browser. Firefox, Chrome and Safari have support for extensions, and the options available for each browser Internet Explorer can be used however any version below 7 does not meet the required security level. When using it make sure that the â€Å"InPrivate and SmartScreen filters are active†. Also, make sure that the activeX and file being downloaded are safe. 4. Safe Internet Practices Internet contains many viruses and one will never know when they might hit. Below is a guideline for a few good practices to follow when using the internet: If its questionable in real life, its probably the same online. Downloading illegal torrents, visiting sites, and looking for bomb-making information is an easy way to ask for a virus infection. Know what is being clicking on. Avoid pop up messages, congratulations message etc.. Maintain computer by updating anti-virus. If not maintained, the system becomes slow and vulnerable. Monitor all activity on computer. If the computer is being used by other user, ensure that they too is using the computer correctly. Reach out and ask questions. Its ok not to know if a certain website is safe or if an email is a scam. Ask more knowledgeable people or research the subject to find out if it is or not. OpenDNS OpenDNS -redirects requests through a third party server which is managed and updated to optimize speed and security. Using the OpenDNS server can keep user from visiting known malicious sites or keep malicious scripts from running. This is especially useful for multi-user environments because user can create an account and manage in more detail what sites the computers are allowed to visit (parental controls).

Thursday, September 19, 2019

Financial Crises And Global Capital Flows :: essays research papers

<a href="http://www.geocities.com/vaksam/">Sam Vaknin's Psychology, Philosophy, Economics and Foreign Affairs Web Sites The recent upheavals in the world financial markets were quelled by the immediate intervention of both international financial institutions such as the IMF and of domestic ones in the developed countries, such as the Federal Reserve in the USA. The danger seems to have passed, though recent tremors in South Korea, Brazil and Taiwan do not augur well. We may face yet another crisis of the same or a larger magnitude momentarily. What are the lessons that we can derive from the last crisis to avoid the next? The first lesson, it would seem, is that short term and long term capital flows are two disparate phenomena with very little in common. The former is speculative and technical in nature and has very little to do with fundamental realities. The latter is investment oriented and committed to the increasing of the welfare and wealth of its new domicile. It is, therefore, wrong to talk about â€Å"global capital flows†. There are investments (including even long term portfolio investments and venture capital) – and there is speculative, â€Å"hot† money. While â€Å"hot money† is very useful as a lubricant on the wheels of liquid capital markets in rich countries – it can be destructive in less liquid, immature economies or in economies in transition. The two phenomena should be accorded a different treatment. While long term capital flows should be completely liberalized, encouraged and welcomed – the short term, â€Å"hot money† type should be controlled and even discouraged. The introduction of fiscally-oriented capital controls (as Chile has implemented) is one possibility. The less attractive Malaysian model springs to mind. It is less attractive because it penalizes both the short term and the long term financial players. But it is clear that an important and integral part of the new International Financial Architecture MUST be the control of speculative money in pursuit of ever higher yields. There is nothing inherently wrong with high yields – but the capital markets provide yields connected to economic depression and to price collapses through the mechanism of short selling and through the usage of certain derivatives. This aspect of things must be neutered or at least countered. The second lesson is the important role that central banks and other financial authorities play in the precipitation of financial crises – or in their prolongation. Financial bubbles and asset price inflation are the result of euphoric and irrational exuberance – said the Chairman of the Federal Reserve Bank of the United States, the legendary Mr.

Wednesday, September 18, 2019

Libertarianism Essays -- essays research papers

For centuries philosophers have debated over the presence of free will. As a result of these often-heated arguments, many factions have evolved, the two most prominent being the schools of Libertarianism and of Determinism. Within these two schools of thought lies another debate, that of compatibilism, or whether or not the two believes can co-exist. In his essay, Has the Self â€Å"Free Will†?, C.A. Campbell, a staunch non-compatiblist and libertarian, attempts to explain the Libertarian argument.   Ã‚  Ã‚  Ã‚  Ã‚  To achieve this, Campbell first sets out the two pre-suppositions necessary to the Libertarian argument. Firstly, he defines which kind of freedom he is discussing when he speaks of free will. Campbell characterizes â€Å"the freedom at issue† as one that predominantly concerns a person’s inner acts and decisions (377). A person’s observable acts are important only as they show an inner â€Å"life of choice†(377). Therefore the moral freedom assumed is that freedom which concerns inner acts. The second, and more complicated, of Campbell’s requirements is to define what constitutes a â€Å"free act.† There are two parts to this definition. The first necessitates â€Å"that the act must be one of which the person judged can be regarded as the sole author† (378). This point raises the question of how one can determine authorship. For certainly â€Å"the raw material of impulses and capacities that constitute [one’s] hereditary endowment† cannot be determined by the individual and surely have an impact on his inner acts (378). Further, the individual cannot control â€Å"the material and social environment in which he is destined to live† and these factors must influence his inner acts as well (378). Campbell allows that, while these aspects do have an impact on one’s inner acts, people in general â€Å"make allowances† for them, and still feel morally responsible for one’s self (378). In other words, one recogni zes the effects of hereditary and environment on his inner acts, but acknowledges that his self can and should still be held morally responsible, as it can overcome these factors. Thus, Campbell claims, sole authorship of an act is possible. The second part of this definition of a â€Å"free act† requires that one could have acted otherwise because one could have chosen otherwise (380). With this final presupposition, Campbell states that an act is a free act if and only if... ...† in that it is a â€Å"creative act of moral decision† and is only significant from the inner standpoint (387/389)). With these criticisms dispelled, Campbell can finally claim Libertarianism as the leading philosophical viewpoint. With Campbell’s argument entirely laid out, the final question remains: is it sound? Based on the premises of his arguments as I see them, I believe I am safe in saying that yes, his argument is sound. Campbell has explained his premises clearly enough to persuade me into his manner of thinking. The only threat to his argument that I see lies in the his rebuttal of the meaninglessness criticism. I feel that he did not respond to this critique head on. Campbell claims that only the person making the moral choice can be aware of the reasons he made that choice. He, also, claimed that even a Determinist placed in a position of moral choice, has to be aware of his freedom of decision, but, if that is true, how do the advocates of meaninglessness fail to see the reason behind the choices they have made? This is the only point I am aware of that can jeopardize the soundness of Campbell’s argument. If he can explain this, he will have made a libertarian out of me.

Tuesday, September 17, 2019

Renaissance :: European Europe History

Renaissance The Renaissance has been described as consisting of "a rebirth of the human spirit, a realization of the human potential for development." This quote, as well as the word, "Renaissance" imply a massive change in society and tradition. Contributing to this change was 17th century poet, John Donne. His style, combined with intellectual thoughts and ideas, set the foundation for what would become known as metaphysical poetry. Donne's style of writing was not only a significant factor in the Renaissance, but also the transition into "The Age of Reason". In Sonnet 10, from Holy Sonnets, he is able to contribute to the Renaissance ideal described in the preceding quote. "A rebirth of the human spirit...," describes a change in emotion that stems from a religious belief. Before the Renaissance, life and death were thought to be predetermined. Towards the end of the Renaissance, poets began to question parts of this belief, and as a result, the value of life came into question. In Sonnet 10, John Donne questions how powerful death is. He first challenges "Death" as he says "Death, be not proud, though some have called/thee/Mighty and dreadful, for thou art not so;" in lines one and two. Yet, in lines seven and eight, Donne declares the power of "Death" by saying "And soonest our best men with thee do go, /Rest of their bones, and soul's delivery." These two quotes contradict each other, however, the question is clear: What is the power of death? Donne answers this question in the last line: "And death shall be no more; Death, thou shalt die." However, the reader at that time had his/her own answer to find. Donne had introduced a new thought. He spoke of "death" as a noun, yet spoke to "Death" as a being, without relating it to God. To dissociate God and Death, and then treat Death as an entity was indeed a new idea. "A rebirth of the human spirit" may have been the realization of the value of life, as a result of the questioning of the set belief. "...A realization of the human potential for development," is an accurate description of the Renaissance. People were beginning to accept change in social institutions as well as in many traditional beliefs. Poets, such as John Donne, were questioning ideas that seemed to be set in stone. They were also changing the structure and style of poetry.

Monday, September 16, 2019

Poverty Level in Papua New Guinea: Critical Analysis

About more than half (85%) of the total population of Papua New Guinea live in poverty. The article about the level of poverty in Papua New Guinea by a researcher -Dr Bourke was thrilling especially when only 15% of our population have access to quality living. Meaning good education,heath,infrastructures services and a healthy diet. Dr Bourke's data's were extracted from the various studies conducted between 1963 -1990 which is quite outdated . The report stressed mainly on the implications and level of poverty in the rural areas than urban areas. According to the research, Papua New Guineans were categorized into three classes: 1)Poorest 2)Less Poor 3)Least Poor The poorest were 18. 4% ,less poor -42. 3% and the least poor was 39. 2% of the total population of P. N. G.. The latter, as stated in the article were from the rural villages. In my opinion i think those people are having some kind of access to basic developments may be because they were assisted by the government in terms of health ,education ,improved diet through subsidizing subsistence farming of home grown foods and other infrastructures. However on a bigger scale we are still categorized as one of the poverty stricken nation in the pacific. According to Dr Bourke,'The implications of poverty in PNG were as result of low cash income,inaccessibility to health facilities,and limited access to secondary or tertiary education and the limited access to market. I strongly support this because it is a reality for the most remotest parts of Papua New Guinea including rural areas where the location is a barrier for them to have access to the basic services such as employment, health, education and trade. One of the classic example is where i come from,(chimbu province) a district called Karamuvi is living in extreme poverty even though they have the land to produce food crops they don't have the markets to sell their surplus for money. They can not go to school or get proper health treatment because they don't have money as well as isolated from the main health centres. Currently there is only one form of transport linking to this place, is through airplanes. Therefore i define poverty as a situation in which people are not having access to the basic services. In addition ,Wikipedia,the free encyclopedia on line, defines Poverty as: the condition of not having the means to afford basic human needs such as clean water,health care,nutrition,clothing and shelter. Dr Bourke said; that â€Å"PNG has an overall life expectancy rate of 54 years while the worse provinces of Sandaun and Gulf provinces have an average of 46 years life expectancy rate†. Generally speaking i think he is absolutely right because since 1963 when the research was first carried out to (21st )this century there wasn't any great improvements in the life expectancy rates of the Papua New Guineans. The current life expectancy rate is still below (54-57 years )60 years:world development indicators-2009. However they are certain people living over the age of 70 years and above simply because of improved health services, healthy diet,and Physical fitness. For example they were two particular colonial leaders in my district who lived up to the age of 101. They were interviewed and asked how they lived their lives and this is what they said,†Mitupla save kaikai fresh kaikai long garden na abuse bilong wara na bus tasol na save waswas olgeta de na wok na malolo gut na taim mitupla i sik mitupla save tokim ol pikinini blo mitupla kisim mitupla go long bikpla haus sik. † Another obvious example is Sir Micheal Somare and Grand Chief Palius Matane ,they are over the age of 70 years. The research further indicated that PNG has the highest infant mortality rate of 73/1000 births and has the highest maternal death rates of 930 every pregnancy,which means that every mother who is pregnant has about 1% chances of surviving due to birth complication. In comparison with the current situation ,i disagree with the above statement because statistics of economic indicators have shown that our population is growing rapidly which implies that more babies are born every year . According to the report , â€Å"a lot of people from the poor areas migrate into towns and cities hoping for better services and conditions of life while very few students complete secondary and tertiary education†. This is very true especially for rural-urban migrants who are moving consistently into urban centres in search of what they call †easy life†. For instance most people from the rural parts of highlands provinces and some rural parts of Morobe are settling in the vicinity of the city trying to earn their living. They left their homes and are in Lae city because they want to enjoy a decent life meaning basic education(primary),heath services and a good diet. The research further indicated that PNG has one of the highest illiteracy rates among rural villages except for Mortlock island with the highest educated citizens while Pomio has the least and poorly educated population. In my opinion i think it is right to say that the highest illiteracy is among rural villages because most of the population are living in the rural areas where they don't go to school. One reason of them not going to school are inaccessibility and unavailability of schools and school fees which resulted in them being illiterate. Dr Bourke has mentioned that the high poverty rate among the rural villages can be addressed through the following : Better quality of primary education,Improved access to secondary education;High cash income especially from agriculture and livestock; Better food security; Repair infrastructure and better communication. I strongly believe that the above remedies will help address the issue of poverty in rural villages because other developing nations like East Asia and Sub -Sharan Africa have taken a similar approach and have at least achieved some changes. For instance as cited in the BA 367 lecture Notes,† these two regions have been the homes to three quarters of the worlds poor,despite this East Asia has experienced the most rapid poverty reduction due to sustained economic growth. The latter will be achieved by us if the government and elite citizens of PNG unite and look into the rural areas of PNG and try to develop it by using the available resources efficient reference to Dr Bourke's mention about reducing poverty in rural areas i seriously think that the PNG government really need to take serious initiatives in addressing this issue because Majority of the population are affected and PNG is heading for the worse . Though we say PNG is rich we are still ranked as the lower income earning countries at the global scale as well as one of the poor countries in the Pacific. We are in fact rich in natural resources like gas,minerals ,timber ,coffee,cocoa and oil palm but we don't have the appropriate technology to process and manufacture them into useful finish products. Therefore i suggest that the government should implement long-term development goals and other positive options such as improve education,health,subsidizing agriculture and livestock,improve infrastructure services by maximizing the available resources that we have. In conclusion ,the report has stressed a lot on rural areas because this is where most of PNGs population are and they are the main victims of poverty. The main causes of poverty were:inaccessibility to improve health,education and unavailability of markets. To reduce poverty rate i seriously would recommend both the government and the citizens of PNG to think and act positively by using the free natural resources with other given resources such as human resource and capital to be integrated and share the benefits equally among the various parts of the country including the remotest location. REFRENCE LIST BA 367 Hand outs,2010 . Mr Morrower,Development Economics Lecturer. University of Technology ,Papua New Guinea. Http://www. google. com ,Economic development Indicators,1997 retrieved on 7th April,2010 Free , Encyclopedia on line,19th march 2010 TOPIC: CRITIQUE ON THE LEVEL OF POVERTY IN RURAL AREAS IN PNG. About more than half (85%) of the total population of Papua New Guinea live in poverty. The article about the level of poverty in Papua New Guinea by a researcher -Dr Bourke was thrilling especially when only 15% of our population have access to quality living. Meaning good education,heath,infrastructures services and a healthy diet. Dr Bourke's data's were extracted from the various studies conducted between 1963 -1990 which is quite outdated . The report stressed mainly on the implications and level of poverty in the rural areas than urban areas. According to the research, Papua New Guineans were categorized into three classes: 1)Poorest 2)Less Poor 3)Least Poor The poorest were 18. 4% ,less poor -42. 3% and the least poor was 39. 2% of the total population of P. N. G.. The latter, as stated in the article were from the rural villages. In my opinion i think those people are having some kind of access to basic developments may be because they were assisted by the government in terms of health ,education ,improved diet through subsidizing subsistence farming of home grown foods and other infrastructures. However on a bigger scale we are still categorized as one of the poverty stricken nation in the pacific. According to Dr Bourke,'The implications of poverty in PNG were as result of low cash income,inaccessibility to health facilities,and limited access to secondary or tertiary education and the limited access to market. I strongly support this because it is a reality for the most remotest parts of Papua New Guinea including rural areas where the location is a barrier for them to have access to the basic services such as employment, health, education and trade. One of the classic example is where i come from,(chimbu province) a district called Karamuvi is living in extreme poverty even though they have the land to produce food crops they don't have the markets to sell their surplus for money. They can not go to school or get proper health treatment because they don't have money as well as isolated from the main health centres. Currently there is only one form of transport linking to this place, is through airplanes. Therefore i define poverty as a situation in which people are not having access to the basic services. In addition ,Wikipedia,the free encyclopedia on line, defines Poverty as: the condition of not having the means to afford basic human needs such as clean water,health care,nutrition,clothing and shelter. Dr Bourke said; that â€Å"PNG has an overall life expectancy rate of 54 years while the worse provinces of Sandaun and Gulf provinces have an average of 46 years life expectancy rate†. Generally speaking i think he is absolutely right because since 1963 when the research was first carried out to (21st )this century there wasn't any great improvements in the life expectancy rates of the Papua New Guineans. The current life expectancy rate is still below (54-57 years )60 years:world development indicators-2009. However they are certain people living over the age of 70 years and above simply because of improved health services, healthy diet,and Physical fitness. For example they were two particular colonial leaders in my district who lived up to the age of 101. They were interviewed and asked how they lived their lives and this is what they said,†Mitupla save kaikai fresh kaikai long garden na abuse bilong wara na bus tasol na save waswas olgeta de na wok na malolo gut na taim mitupla i sik mitupla save tokim ol pikinini blo mitupla kisim mitupla go long bikpla haus sik. Another obvious example is Sir Micheal Somare and Grand Chief Palius Matane ,they are over the age of 70 years. The research further indicated that PNG has the highest infant mortality rate of 73/1000 births and has the highest maternal death rates of 930 every pregnancy,which means that every mother who is pregnant has about 1% chances of surviving due to birth complication. In comparison with the current situation ,i disagree with the above statement because statistics of economic indicators have shown that our population is growing rapidly which implies that more babies are born every year . According to the report , â€Å"a lot of people from the poor areas migrate into towns and cities hoping for better services and conditions of life while very few students complete secondary and tertiary education†. This is very true especially for rural-urban migrants who are moving consistently into urban centres in search of what they call †easy life†. For instance most people from the rural parts of highlands provinces and some rural parts of Morobe are settling in the vicinity of the city trying to earn their living. They left their homes and are in Lae city because they want to enjoy a decent life meaning basic education(primary),heath services and a good diet. The research further indicated that PNG has one of the highest illiteracy rates among rural villages except for Mortlock island with the highest educated citizens while Pomio has the least and poorly educated population. In my opinion i think it is right to say that the highest illiteracy is among rural villages because most of the population are living in the rural areas where they don't go to school. One reason of them not going to school are inaccessibility and unavailability of schools and school fees which resulted in them being illiterate. Dr Bourke has mentioned that the high poverty rate among the rural villages can be addressed through the following : Better quality of primary education,Improved access to secondary education;High cash income especially from agriculture and livestock; Better food security; Repair infrastructure and better communication. I strongly believe that the above remedies will help address the issue of poverty in rural villages because other developing nations like East Asia and Sub -Sharan Africa have taken a similar approach and have at least achieved some changes. For instance as cited in the BA 367 lecture Notes,† these two regions have been the homes to three quarters of the worlds poor,despite this East Asia has experienced the most rapid poverty reduction due to sustained economic growth. The latter will be achieved by us if the government and elite citizens of PNG unite and look into the rural areas of PNG and try to develop it by using the available resources efficient reference to Dr Bourke's mention about reducing poverty in rural areas i seriously think that the PNG government really need to take serious initiatives in addressing this issue because Majority of the population are affected and PNG is heading for the worse . Though we say PNG is rich we are still ranked as the lower income earning countries at the global scale as well as one of the poor countries in the Pacific. We are in fact rich in natural resources like gas,minerals ,timber ,coffee,cocoa and oil palm but we don't have the appropriate technology to process and manufacture them into useful finish products. Therefore i suggest that the government should implement long-term development goals and other positive options such as improve education,health,subsidizing agriculture and livestock,improve infrastructure services by maximizing the available resources that we have. In conclusion ,the report has stressed a lot on rural areas because this is where most of PNGs population are and they are the main victims of poverty. The main causes of poverty were:inaccessibility to improve health,education and unavailability of markets. To reduce poverty rate i seriously would recommend both the government and the citizens of PNG to think and act positively by using the free natural resources with other given resources such as human resource and capital to be integrated and share the benefits equally among the various parts of the country including the remotest location. Compiled By: MUNTAI KAWAGE For : MR MOROOWER ID #: 07200480 Course Code: BCBE/3 DUE DATE: 24/03/10

Sunday, September 15, 2019

Socioeconomic Status Ses Health And Social Care Essay

Socioeconomic position ( SES ) has been studied and proven to hold a direct consequence on general wellness and well-being but what consequence does SES hold on mental wellness? The effects of SES on mental wellness results were outlined in subdivisions of a survey called Socioeconomic Status and Health: The Challenge of the Gradient ( SESSH ) . The SESSH survey states â€Å" Persons higher in the societal hierarchy typically enjoy better wellness than do those below ( Alder et. al 1994 ) , this includes mental wellness and it ‘s all of its related diseases. Several other surveies such as the Childhood Socioeconomic Status Is Associated with Psychosocial Resources in African Americans: The Pittsburgh Healthy Heart Project ( Beatty et. al 2011 ) , conducted by the University of Pittsburg aid to confirm the findings from the SESSH survey done several old ages before. One of the major effects of lower SES position on mental wellness is the deficiency of entree to mental wellness attention. Whether urban or rural the hapless have more trouble in deriving entree to decently trained medical forces and installations to cover with the jobs sing the mental wellness ( Grembowski et. al 2002 ) . The paper, Rural Communities Suffer Poor Mental Health Care ( Association of Schools of Public Health 1974 ) highlights some of the issues unique to the rural hapless in America and the mental wellness issues that surround the community. The current research shows that SES plays a major function in the mental wellness of patients. Major emphasis factors from the effects of lower SES get down to take its toll on the mental wellness of persons populating in high poorness countries ( Leventhal et. al 2003 ) . In the survey Socioeconomic Status and Health: The Challenge of the Gradient it states the â€Å" Socioeconomic position is related to both major depression and depressive symptoms † ( Alder et. al 1994 ) and to an addition of ill will and anti-social activity and suicidal behaviours. ( Alder et. al 1994 ) . SES besides leads to an addition in psychological emphasis that can finally trip greater perceptual experiences of emphasis and negative emotion. These perceptual experiences are known to change neuroendocrine response and assorted other physiological alterations ( Alder et. al 1994 ) . The deficiency of entree to proper mental wellness attention is a major factor in the long term wellness results of tho se in lower SES groups ( Grembowski et. al 2002 ) . Further back uping the survey Socioeconomic Status and Health: The Challenge of the Gradient, the survey Childhood Socioeconomic Status Is Associated with Psychosocial Resources in African Americans, shows that SES is non merely a factor in finding mental wellness but besides has an consequence on the ability to entree the household and community support in early childhood might hold played a possible mitigating factor ( Beatty et. al 2011 ) . The survey shows, that in African American topics, the intercession of positive household and community involvement early in childhood could positively impact subsequently psychological wellness but that lower SES general prohibits the positive household and community support demand to antagonize the degrees of emphasis and hapless self-perception in lower SES persons ( Beatty et. al 2011 ) . The article, Traveling to Opportunity: an Experimental Study of Neighborhood Effects on Mental Health, farther address the thoughts that community and poo rness, cardinal facets of SES, have on mental wellness results ( Leventhal et. al 2003 ) . Families that moved from lower SES position vicinities to higher 1s had a lessening in the presence and badness of depression and other psychological issues ( Leventhal et. al 2003 ) . The articles, through the usage of studies and long term patient surveies, are able to demo the direct effects of lower SES on psychological wellness. The information shows that long term exposure to the emphasis of lower SES leads to several types of psychological upset including depression, feelings of lower dignity and assorted other clinical issues including terrible alcohol addiction and drug dependence ( Alder et. al 1994 ) . The surveies did an first-class occupation of showcasing the issues affect lower SES groups but could hold been more convincing in their methodological analysiss. The information from the research validates the fact of lower SES straight affect psychological wellness but fail to take into history several variables which would let for incredulity. Each of the articles fails to turn to whether the psychological issues are straight linked to lower SES from the deficiency of instruction of approximately positive life style picks and deficiency of instruction a bout entree to wellness attention, is the higher incidents of mental unwellness merely because the hapless have less instruction on healthy life styles and how to seek intervention. The consequences could be strengthened by utilizing greater cross subdivisions of the lower SES communities, over longer periods of clip and supplying basic instruction on how to entree intervention to see if mental wellness issues are genuinely related to SES or if there are other factors that contribute. With the exclusion of Traveling to Opportunity: an Experimental Study of Neighborhood Effects on Mental Health, none of the surveies attempted to see if the conditions were reversible by taking the topics form the lower SES environment. If remotion of the topic from the environment produces clear positive consequences in a big survey group you could more easy find that SES is a clear factor in the patients ‘ wellness.