Wednesday, August 26, 2020

HCS 440 Question 1 Assignment Example | Topics and Well Written Essays - 250 words

HCS 440 Question 1 - Assignment Example Time compares cash that is, thus, of exchange and its associations. Culture influences the quality in social insurance, which is a central measure. The effect of exchange and decision uncovers itself here as these two factors get wellbeing a ‘equilibrium state. Quality trade is significantly positioned on the limit of gathering premise instead of individual premise consequently conveyance of legitimate support of delay ones life regarding great medical procedure, very much prepared specialists, and drug. The factor of exploration, innovation, and advancement has incredibly influenced the overhead expense of human services. With research going on different maladies and medications, it is normal that the taxpayer’s cash will have a colossal impact in this action. About $2trilion is gone through consistently on social insurance framework in the exploration of new medications and treatment techniques. Without this extraordinary substantial contribution by the legislature, the in any case cost caused in not putting resources into human services framework would be of a more noteworthy

Saturday, August 22, 2020

Confidential Information in Form Records-Free Samples for Students

Questions: 1.What was the Problem? 2.How and Why It Occurred? 3.What are the Possible Solutions? 4.What was the Problem? 5.Who were influenced and How? 6.How was the assault done? 7.What could have been done to forestall the Attack? Answers: Presentation Today at each work environment PCs are utilized to perform different business exercises, for example, putting away classified data in structure records, sharing data from one spot to other and to speak with customers and clients at remote areas. The utilization of PC frameworks and web gives different advantages to its clients yet on another side, different security issues or security penetrates are likewise experienced by its clients. Presently in this report we will talk about a news on PC security penetrate and an instance of hack on web. Conversation This fragment of report has a place with conversation about a PC security break that has occurred in 2015. There are a few cases accessible on web on this subject yet we have chosen one of them and that is Computer Security Breach in VTech Chinese Company. VTech is a Chinese Company which fabricate and creates electronic learning toys. 1.VTech Company confronted an information penetrate and because of this private data of 4.8 million guardians and 200,000 kids was spilled. The 4.8 million was an estimation and this number differs to 6.7 million. As indicated by articulation of VTech Company it was a monstrous break on the grounds that in this PC penetrate individual subtleties of such a significant number of youngsters was spilled and further this detail was utilized by programmers for concealing their personalities. As per a data source, it is discovered that programmers released this data to Motherhood magazine. However, in this entire occurrence Mastercard data was spared to penetrate and it was asserted by VTech. The heaps of data that was penetrated by programmers included name of guardians, messages, passwords, mystery question/answers of guardians, traces of passwords, login and enrollment data of guardians. Other than this, Parent locations of VTech, their record subtleties, kid names and pictures of kids a nd kid enlistment URL and record subtleties were likewise spilled. The companys clients were from various nations, for example, UK, Spain, France and Germany. It was in the end a monstrous instance of PC security break that was hard to control rapidly (WiseGEEK, 2017). 2.According to examination of VTech Company, it was discovered that this PC security penetrate was happened due to SQL infusion on companys database and this action helped programmers to spill subtleties of guardians and youngsters from database. It is likewise accepted by security specialists that obsolete stages are utilized for defenseless hacking of database, for example, ASP.NET 2.0, WCF, SOAP and FLASH. Programmers actualized this security penetrate to gather individual data of youngsters and their folks, with the goal that this data can be additionally utilized by them for concealing their personalities and furthermore they needed to offer this data to Motherhood magazine. The most defenseless aftereffect of this assault was that secret data of a large number of clients of VTech Company lost which can't be recouped effectively (HackRead, 2017). 3.The agent of VTech Companys security break case had the option to distinguish gadgets that are utilized by kids and furthermore sites that were utilized habitually. Other than this, some conceivable answer for this PC security break are recorded as beneath: It was assault of SQL Injection on ASP.NET stage, so to get this kind of assault utilize a record with confined consents in database and attempt to abstain from unveiling data of database blunder (Healthcare IT News, 2017). To get counteraction from above sort of assault, it is important to ensure database by utilizing propelled security highlights. In the event that database will be made sure about, at that point it is hard for programmers to get to it (ucsc.edu, 2017). The utilization of cryptography is a most ideal approach to ensure information into database and over system. To accomplish this, encryption procedure is required to utilize. By this procedure entire data will be encoded into confused structure and afterward will be put away into database. It is hard for programmers to comprehend information in this structure. The database examining is should by utilizing antivirus or by database scanners, for example, NeXpose, Oscanner, Kaspersky and McAfee and so forth. By utilizing these instruments, it will be simpler to discover bugs from database whenever found any and fitting arrangement can be discovered (Greene, 2017). If there should be an occurrence of enormous measure of information, it will be smarter to take reinforcement of information intermittently from database and expel that information from online database. Reinforcement information can be put away safely on another database that is far from programmers. Along these lines, gigantic measure of information can be spared in type of modules (com, 2017). By actualizing these potential arrangements, it is conceivable that organization like VTech can spare its database from security breaks. It is matter of execution of organization and its obligation towards individual data of its clients and customers. On the off chance that organization won't be cautious about this, at that point it will severely impact its notoriety. In the wake of examining about a well known news about PC security penetrate, presently here we will stress on a famous instance of hacking. In rundown of most mainstream hacking cases, the instance of eBay is recorded. eBay is a notable internet business organization. It is ordinarily utilized by individuals for internet shopping. This organization confronted issue of hacking. eBay was endured with greatest hack in 2014 (Forbes.com, 2017). 4.It is uncovered by eBay that programmers had attempted to take individual records of 233 million clients. In these individual records, programmers took usernames, passwords, telephone numbers and physical locations. Programmers effectively hacked eBays private data, for example, login qualifications that are required to access touchy information. After this hacking occurrence, the fundamental concerning thing for Ebay was that, taken individual data of its clients could leave them to powerless fraud. In this hacking of individual data records, money related data isn't taken by programmers (Msdn.microsoft.com, 2017). 5.The clients of eBay whose individual data was put away into database of organization were profoundly influenced with this hacking assault (Hacked: Hacking Finance, 2017). The loss of individual data isn't too little to even think about bearing. The clients of eBay were influenced such that programmers could abuse their own data and can spilled it to different organizations. For each organization that is giving internet shopping administrations to individuals, it is fundamental to make sure about information of its clients into their databases. In the event that organization can't accomplish this effectively, at that point it will place sway over its presentation in advertise (Databreachtoday.in, 2017). 6.This hacking assault is done by programmers by taking login certifications of eBay from its database and afterward by utilizing these accreditations delicate data from database was taken. eBay didn't clear yet that who was behind this assault. As indicated by SEA it was hacktivist activity yet it was not completed to hack monetary records of individuals (Wired.com, 2017). 7.After seeing awful effects of hacking occurrence, eBay urged its clients to change its passwords and furthermore consoled them that their budgetary data was not taken. eBay likewise improved its stockpiling framework for putting away significant data and information was put away in scrambled structure into database and it is perhaps the most ideal approaches to shield clients data from hacking and phishing assaults. Other than this, some other counteraction strategies that could have been finished by eBay to forestall hacking assaults are recorded as beneath (SearchSecurity, 2017): Utilization of Database Scanning Tools Occasional Backup of Database Utilization of Antivirus (Dark Reading, 2017) Utilization of Database Scanning Tools An organization that has number of clients and their data is put away into companys database, it is significant for organization to continue following of database occasionally by utilizing database checking instruments, for example, Oscanner, Kaspersky and McAfee. These instruments will assist with filtering entire database once and in the event that any blunder or bug will discovered, at that point that can be fixed right away. If there should arise an occurrence of eBay, in the event that it could have been utilized this instrument, at that point from a little action of programmers with database could alarm security experts. So it will be smarter to utilize this alternative (MakeUseOf, 2017). Intermittent Backup of Database Another alternative that could have been utilized by eBay is appropriate reinforcement of database at normal premise. While utilizing on the web databases, usually programmers attempt to get to database in unapproved ways and spilled information it to other people. For this situation, in the event that reinforcement of information will be accessible, at that point substantial loss of information can be controlled. An occasional reinforcement ought to be taken into another frameworks database, so that on the off chance that primary database gets harm, at that point elective database can be utilized. Utilization of Antivirus Antivirus can likewise be utilized for security reason. Against infection is utilized for examining the infection from framework and database and afterward in the wake of recognizing infection, the fixing of that is additionally conceivable with the assistance of this. eBay Company could have been introduced against infection into framework and could fix little bugs that were utilized by programmers as frail focuses. These are some potential arrangements that can be utilized by eBay Company to deal with its issues of database security and protection. It is additionally duty of security experts of organization to be cautious about security issues and should discover proper answers for that. Different security patches are likewise accessible to determine issues of databases security. End After this entire conversation we can say that in the event that issues of PC security penetrates are expanding step by step, at that point on opposite side, different arrangements are likewise accessible. In any case, it is normally observed that the greater part of the security issues happens because of ill-advised utilization of security apparatuses and by overlooking little blunders and bugs of frameworks that can be shaped greater in future. If there should be an occurrence of both VTech and eBay, normal issue

Wednesday, August 12, 2020

How Women Can Relieve Their Stress

How Women Can Relieve Their Stress Stress Management Effects on Health Print How Women Can Relieve Their Stress By Elizabeth Scott, MS twitter Elizabeth Scott, MS, is a wellness coach specializing in stress management and quality of life, and the author of 8 Keys to Stress Management. Learn about our editorial policy Elizabeth Scott, MS Updated on August 18, 2019 How Stress Impacts Your Health Overview Signs of Burnout Stress and Weight Gain Benefits of Exercise Stress Reduction Tips Self-Care Practices Mindful Living Zero Creatives / Cultura / Getty Images It seems to be common knowledge that women are generally busier and more stressed than men. Its widely believed that they juggle more roles and are constantly rushing. Many women themselves feel that they shoulder the lions share of responsibilities outside of paid work, even when they are working just as many hours as their male counterparts. Perhaps because of this, women are seen as generally more stressed than men. But how true is this perception? Researchers from The University of Arizonas School of Family and Consumer Resources decided to find out. They took a sample of 166 married couples and had each participant maintain a daily diary over the course of 42 days, where they recorded their daily stressors. The results indeed showed that women reported a greater amount of high distress days and fewer distress-free days than men. Interestingly, the differences in levels of stressful days were due to women experiencing more onsets of distress episodes (having stress response triggered), rather than being more likely to continue in a distressed state from one day to the next. In other words, women didnt hold onto their stress more; they just experienced more episodes of being stressed. This brings up some important issues regarding women and stress, that women need to be aware of: Understand Gender Differences in Stress If youre feeling more stressed than your male counterparts, dont take it as a sign that youre not handling stress as well; it might be because youre experiencing more stress. Give yourself a pat on the back for handling what you already are, and move confidently to step two. Eliminate What You Can It seems that people are always asking women (especially mothers!) to help with group projects like organizing office birthday parties or running the PTA. While many of these activities are fulfilling, they can add up to a significant amount of stress just by filling your schedule to the brim. While it can be very difficult to say no sometimes (especially if you tend to be a people pleaser), its vital to your health and happiness that you keep in mind that saying yes to too many requests means saying no to things you need: time alone, hobbies, and other soul-nourishing activities. To maintain a reasonable level of daily stress, women need to get used to the idea of setting priorities and saying no. Alter Your Perspective Much of your experience with stress can be eliminated with a change in the way we look at things. This may sound too good to be true, but it isnt! Altering the way you conceptualize the events you find stressful (viewing them as a challenge instead of a threat, or an opportunity instead of a crisis, for example) can actually make them feel less threatening and stressful. When you dont perceive a situation as a threat, your bodys stress response is deactivated more quickly (or doesnt get triggered in the first place), and youre more able to avoid the effects of chronic stress. Have Some Quick Stress Relievers You cant eliminate all stress in life, and probably wouldnt want to if you could. There are many types of stress that are enjoyable, like the excitement of a first date or the suspense of waiting to hear if youve gotten a new job. Because it may not be possible to stop reacting to stress (even with the most positive outlook), its important to have some fast stress relievers in order to reverse your stress response quickly and prevent yourself from entering a state of chronic stress. Maintain Regular Stress-Relieving Habits You can also prevent yourself from getting into an overwhelmed state (where youre more reactive to stress) by maintaining some regular stress relief activities as part of your schedule. Studies show that those who meditate regularly are less reactive to stressors that occur in their lives. Exercise is also an important option to remember; it can keep you physically and emotionally healthy. Journaling also has many benefits for its users. Adding one of these options to your morning or nightly routine could bring be especially useful.

Saturday, May 23, 2020

Cloud Computing And Ethical Issues Essay - 2134 Words

Assignment 2 Task 1 Cloud Computing and Ethical Issues Cloud computing is the service in the internet which can be accessible with web browser. The most of the business nowadays shifted toward the cloud computing which will decreased the overload data store problem and increased the security. Cloud computing cut the cost of the business and will increase the efficiencies. In the recent years there is the significant transitions in the business by the use of the cloud computing from desktop based to the software as a service (SaaS). There are many benefits from using the cloud computing in the business but there is always serval question arise regarding the legal practitioners and security when we compared it with the traditional way. The use of the cloud computing always have a question about the ethics issues related with client data confidential. The FEO formal ethics opinion on cloud endorses the way to use cloud computing technology which include the reasonable care must be taken effectively to minimize the risk related with the client information confidentiality. The cloud computing technology has been used by the many service provider such as Gmail, Hotmail, and Dropbox and so on for numbers of years. These technologies were using this for the centralized service efficiently over the web. Cloud computing in the Business There are many identifiable benefits of cloud computing in the business. In the cloudShow MoreRelatedEthical Issues Of Cloud Computing Essay1183 Words   |  5 PagesEthical Issues of Cloud Computing Cloud computing, where computer data and also software program tend to be stashed along servers possessed as well as preserved by an alternative party, when a new and also overseas idea, is starting to become increasingly commonplace. Therefore, legal professionals are trying to find for taking advantage of the numerous features about employing cloud computing companies of their legislation techniques, as well as cost benefits, mobility, in addition to speed.Read MoreCloud Computing And Ethics And Code Of Professional Conduct1253 Words   |  6 PagesCloud computing can be viewed as one of the most rapidly growing and evolving paradigm.Webmail,online storage and online documents are most famous examples in which customers can access their data via web browsers on the internet. The original idea of the cloud computing was delivered by J.C.R Licklider in sixties (Mohamed 2009). Cloud computing has developed since then and started to server the publics after internet offered a signif icant bandwidth in the nineties (Mohamed 2009). Cloud computingRead MoreThe Banking Industry And Cloud Computing Essay1701 Words   |  7 PagesBanking Industry and Cloud Computing Banks are facing increased pressure to streamline their current processes and trim operating costs, while also responding to more demanding, digitally connected customers (Adams, 2012). Many banks are even looking at new technologies and IT delivery models such as cloud computing to help address these issues. Banks have many reasons to like the cloud, such as cost efficiency, standardization and consistency (Dragon, 2013). Banks are embracing the cloud more and moreRead MoreThe Cloud Of Cloud Computing Essay1715 Words   |  7 Pagesfrom the universe of IT Infrastructure into distributed computing which is also known as cloud computing. Cloud computing is presently quick turning into the most noteworthy field in the IT world because of its progressive model of computing as a utility. It permits the decision makers to turn their consideration on the business as opposed to their IT Infrastructure. There is no organization that has not considered moving to cloud computing in light of i ts versatility, responsiveness, and deftnessRead MoreThe Ethical Implications of Cloud Computing on Society1724 Words   |  7 PagesYoung Individual Research Paper: The Ethical Implications of Cloud Computing on Society MGMT 505 Corporate Social Responsibility and Public Policy Spring 2013 Niki A. den Nieuwenboer Cloud Computing is a popular term for â€Å"enabling on-demand network access to a shared pool of computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction† (Brian, 2012). The concept of Cloud Computing was first developed in the 1960’s byRead MoreThe Need For Computing Systems1481 Words   |  6 PagesThe need for computing systems has been increasing in the last decades. This can be proved by the increase on the use of cloud computing. According to the National Institute of Standards and Technology (NIST), cloud computing is an online system that allows to share different types of sources with slight resources (NIST 2012). In addition, cloud computing is changing the tradition definition of computation and information as products to services (Laykin 2013, p.142; Demir 2012, p.30). This changeRead MoreCloud Computing : An Issue Word And Examination Style Essay1175 Words   |  5 PagesCloud Computing: Cloud computing can be illustrated as an issue word and examination style. It is seen as one of the quickest developing portions in the processing business that will assume control and influence numerous or most parts of registering. Simply after this build-up it is not difficult to see that cloud computing can prompt various moral issues. The clearest one is security which can emerge as an issue when clients store individual information in mists and lose control of who has whichRead MoreThe Risks Healthcare Providers Experience And The Impact Cloud Computing1418 Words   |  6 PagesThe study by Glasberg et al (2014) analyzes the risks healthcare providers experience and the impact cloud computing has in using the new technologies. Focusing on overall risk management, the study takes a holistic approach, where the research focuses both on human and organizational aspects. Using interviews as a form of data collection, the authors categorize risks and assesses impact from 2 perspe ctives; supply (S) and information systems (IS) as shown in the table 1 below. Table 1 Risk RiskRead MoreSecurity Issues : Data Breaches And Data Loss1140 Words   |  5 PagesSecurity Issues Data breaches and data loss is a severe issue when it comes to cloud computing. Since some or all of the infrastructure is located off site at the cloud services infrastructure, we do not control the overall security of the system. If an attacker gains access to the cloud computing system, even if it is through a different customers account there is a chance that they could gain access to our data that is stored on the cloud services system. These data breaches can expose our customersRead MoreProject Implementation Of Mobile Computing Environment For High Performance1731 Words   |  7 PagesScheduling Methods in Cluster Computing Environment for High Performance Weekly Progress Reports Plan (In class, Discussion Board or Project Blog entries) Week 1-3 Rationale Parallel computing perform concurrently execution tasks on distributed nodes. Large application split up into tasks and run on number on nodes for high performance computing. Cluster environment composed with heterogeneous devices and software components capable of cost effective and high performance computing on parallel application

Tuesday, May 12, 2020

What Have You Learned About The Act Of Reading And...

1. What have you learned about the act of reading and interpreting a text/story/ How have you grown as a reader and critical thinker? Provide examples from both the text and the class. In previous literature courses at Westfield State University, I never fully engaged with a text before. We would be assigned a reading and would briefly discuss it in class. That text would later be seen on a midterm or final. This class has challenged me to grow as a reader and a critical thinker. By coming into class and breaking down each text, I took more from the story. I was getting the deeper meaning of each text. By breaking down each reading as a class, you hear the story being told out loud. By reading the story out loud, you hear each story†¦show more content†¦When our class looked Hieronymus Boschses painting of â€Å"The Garden of Earthly Delights,† they shared their perspective of what they believed was happening. Their perspectives made me look at the painting in a number of different ways. They have also educated me on topics that I was unaware of. For example, we had a few classmates who have read previous stories that involved the characters of Ant igone. They were able to break down the previous stories which helped our class understand the background of Antigone. They offered context to help break down the characters and their role, the setting/ time period, and how the connection of other characters play into the storyline. 2. Drawing from multiple characters/ people/ verses in the texts we read, explain how one’s self- development or lack thereof effected the people around them. Provide examples from both the text and the class . At the beginning of the course, we read the epic of Gilgamesh, an ancient Mesoptamian story. During the course of the story there is an obvious character development within Gilgamesh. Gilgamesh is the king of Uruk, who at first, was as a very arrogant individual with a large ego. â€Å"This city is his possession, he struts through it, arrogant, his head raised high, trampling its citizens like a wild bull... The people suffer from his tyranny, the people cry out (Gilgamesh, 73).† The people or Uruk look to the gods for assistance. Gilgamesh would take a bride’s virginity

Wednesday, May 6, 2020

‘Investigating Wakefield’ †GCSE Geography Coursework Free Essays

string(81) " Zone 2 Zone two of the model consists of public buildings/services and offices\." The overall topic of this investigation is land use within settlements. Urban land areas in towns and cities have got very complicated land use patterns and the industrial city of Wakefield is no exception. It has grown and developed over hundreds of years and now has a thriving population of around sixty thousand. We will write a custom essay sample on ‘Investigating Wakefield’ – GCSE Geography Coursework or any similar topic only for you Order Now Wakefield is a city situated in the North-East of England. It has good access to the M1 and A1 which is why it is such a popular destination for many factories and businesses. Wakefield is nine miles from the major city of Leeds which is also in Wakefield’s county of West Yorkshire. The hypothesis which was investigated was ‘Are there obvious land use zones along a transect from the edge of Wakefield to the Central Business District (CBD)?’ and to do this a transect of land which was 1.5km long was investigated. The transect started at Newton Bar and finished at the end of Wood Street, therefore coming in to the city centre in a southerly direction. Method A transect of land use from the city centre to the Northern outskirts of Wakefield was recorded. The transect was 1.5km long, stretched from Newton Bar roundabout to the end of Wood Street and the land use immediately next to the road was recorded by hand in a notebook. The age of the buildings was estimated and if any dates were visible they were recorded too. In Wood Street, some of the buildings had more than one use and both these uses were observed and recorded. After the data had all been collected, a land-use transect was drawn. Eight different colours were used to represent the different land use categories and this helped to decipher patterns in the land use. The land use categories which were used were residential, public buildings and services, healthcare, offices, entertainment, retail, education and religion because then the buildings were easier to categorise and then record. A simplified model was also produced to show the main land use zones more clearly. Description of the Area Studied The area of Wakefield which was used to carry out the hypothesis on was a transect of 1.5km and stretched from Newton Bar Roundabout to the end of Wood Street in the CBD. Newton Bar is about one mile from the CBD and the transect studied enters the city in a southerly direction. The area at the beginning of the transect has terraced housing and is slightly run down but industrial because it has a council construction site and a development department in close proximity, and a new housing estate is now being built. The quality of buildings improves as one goes further along the transect towards the CBD, the houses on St. John’s North, Wentworth Street and Wentworth Terrace are particularly smart and elegant. As one walks down Bond Street and Wood Street, one sees buildings such as the County Hall, Crown Court, Police Station, Wakefield Museum and Town Hall which are superb examples of magnificent architecture. When one reaches Cross Street, the more commercial part of Wakefield begins with lots of small shops and businesses such as cafes, hairdressers and estate agents. There are also bars and other forms of entertainment such as internet cafes as well as ‘quality’ stationers, book shops and music shops. This area of Wakefield is quite clean and well maintained although some of the buildings were probably built in the 1960s and are therefore less attractive. The pictures below show some of the different land use in places along the transect. Results The results were recorded by hand in a notebook as the transect’s land use was observed and then a land use transect from Newton Bar to Wood Street was drawn as I have described in my method above. A simplified model was also drawn later to show the main land use zones more clearly. This model shows that there are five main zones along the transect, each being different in size and length. The zones are, coming out in order from the CBD, retail, public buildings/services and offices, education and healthcare, residential and public buildings/services. These zones reflect the types of land use there are in Wakefield. Discussion – Interpretation and Analysis of Results Zone 1 Zone one on my simplified model of land use is retail. This zone is in the middle of the CBD, starts at Cross Street and ends at the end of Wood Street. The land use there is mostly for shops and small public services or businesses. There are cafes, hairdressers, estate agents and lots of other small shops. These types of businesses are in the CBD because it is a typical type of zone to find in the middle of the city and because of accessibility. The businesses within this zone need to be in the CBD because their customers need to be able to get to them easily and if they are in the CBD there are lots of easy ways for them to do this – for example public transport and nearby car parking. It is good for these land uses to be in the CBD because it is the most accessible place to be situated for customers and they receive a lot of deals with passers-by who happen to go into their shop/business/public service or else inform other people about it. However, as the land prices are usually high in the CBD, only successful businesses are able to afford it. In Wood Street most of the buildings are old terraced houses which could also be a reason as to why these businesses are situated there, because lots of the buildings in Wood Street had flats or offices on the second story of their building and so would want buildings with more than one story. This type of zone would also be found in other cities, as it is a typical zone of a CBD. Zone 2 Zone two of the model consists of public buildings/services and offices. This zone begins at Bell Street and ends at Chancery Lane and included in this zone there are buildings such as the County Hall, the Crown court, the Town Hall, Wakefield Museum and the Police Station and offices. These buildings are where they are because they couldn’t be in the CBD as they would not have been able to afford the land prices but they still needed to be near it so that they are accessible for visitors and workers. They are also on the major road to Leeds so they have good transport links. Another reason for these buildings being there could be so that the council could keep all its buildings together and so that everyone would be able to find the council buildings easily, without having to travel all over Wakefield to find the one they wanted. The buildings which are in this zone are all old, the County Hall was built in 1898 and many of the buildings have pillars outside the building which implies that they were built quite a long time ago. However, if the people who work in these places have to pay for the upkeep of the buildings, then this could be why they are not situated in the middle of the CBD – they do not have enough money to purchase land in the city centre. This type of zone could be found elsewhere in Wakefield because only one transect was investigated, which means there would be other transects possible to investigate on the other side of the CBD which implies that there could be other places in Wakefield with similar land use patterns. Zone 3 Zone three from the model is education and healthcare and in this zone there is Wakefield College, Wakefield Girls’ High School, Clayton Hospital and an 1871 dentist. This zone also includes Wakefield Art Galley and the Christian Science Building. This zone stretches form Bell Street to North Road and is in the place it is because it, again, needs to be accessible, this time for students and workers, and because the land uses in it will not have been able to afford the high land prices of the CBD. Even if this zone could have been situated in the CBD, it would not have been because hospitals and schools need space to expand their premises and if they were in the CBD there would be no space to do this. Also, hospitals and schools need to have lots of space for car parking for workers and/or students and there would be no space for this in the CBD. The hospital and school also need good transport links in order for its workers/students to get there each morning which is another reason for why they are in this zone, it is on a major road which leads to the large city of Leeds. This zone could be found in other major cities such as Leeds, but not elsewhere in Wakefield. Zone 4 Zone four begins at the Leeds Road and stretches till North Road. In zone four the land use is mainly residential, but there are also places of religion and education such as St. John’s Church, built in 1791, and St. John’s Primary School, built in 1964. The housing in zone four is very varied, because there are areas of terraced houses from the 1920s-30s such as Snow Hill View, the 1960s-70s as in the houses between Andrew Street and St. John’s Avenue and Georgian terraced housing in St. John’s Square which is a protected heritage site. These buildings are where they are because they could not be in the CBD as it is far too expensive but they still needed to be easily accessible from the city centre. St. John’s Square will have been built for wealthy people to live near the Church as the Church would have been the centre of the community in those times. St. John’s C of E School, which was originally on Kilby Street (named after the Reverend Thomas Kilby), was rebuilt nearby as it is a Church school. The houses from the 1960s-70s were built on waste land which would have been cheap at the time but still had good transport links with the city centre, Church and local schools. This zone could not be found elsewhere in Wakefield but a similar area might be found in other cities. Zone 5 Zone five is between the Leeds Road and Newton Bar and it consists of mainly public buildings/services, although there are some terraced houses and quite a lot of open space. Included in this zone are ‘The Green’, a council construction site, the Development Department, and the Vine Tree public house. These buildings are where they are because they could definitely not have been in the CBD, as they require a lot of land and room for expansion which would not be available in the city centre. However, even if there was suitable land available for these land uses in the CBD, it would have been too expensive for the businesses to afford and so they would have been forced to build further away from the centre anyway. As many of the workers in these buildings would come to work by car, these buildings also require space for car parks and good transport links, both of which they have. This zone would probably not be found anywhere else in Wakefield but it is very likely that other cities have parallel zones. Conclusion I found that, in Wakefield, there are five main land use zones and that as one goes further away from the city, the amount of housing increases. There is also more open space further away from the CBD which is not surprising as most businesses want to be in the city centre so their customers can have easy access and so that they get trade with people who happen to pass by. I also found that there seemed to be a greater concentration of shops and offices in the CBD but that there were also quite a lot of public buildings/services as well. There were no residential areas in the CBD which suggests that people prefer to live outside the city centre and go in each morning for work. I think that Wakefield’s land use zones are quite similar to the Sector Model of land use so this suggests that Wakefield is a typical city. Evaluation I did this investigation to find out if there are obvious land zones along a transect from the edge of Wakefield to the CBD and I found that there were. Overall I think that the investigation went well but that it could have been better if I had not had to go out to study the transect on two different days. If I was to do this investigation again, I would investigate the transect once, in one session, and then I would go out at another time to record the landuse again. This would make my results more accurate because if I did the investigation twice, I would be able to match up the landuse on each set of my results and make sure I had not missed anything out the first time. How to cite ‘Investigating Wakefield’ – GCSE Geography Coursework, Papers

Sunday, May 3, 2020

Building consumer demand by using marketing - Myassignmenthelp.Com

Question: Discuss about the Building consumer demand by using marketing. Answer: Introduction Marketing communication can be increased by using social media sites. This assignment will describe about the chosen article The use of social media: an exploratory study of usage among digital natives. The objectives of the study will be mentioned in this assignment. Electronic word of mouth and web 2.0 has appeared as an event of significant interest to marketers. The article will be critically analysed in this assignment to get better understanding about the chosen article. Individual reflection shows the work advance knowledge of subject which can be utilized in real life by marketing practioners. Objectives The main object of the article is to analyze the importance of social media in the academic life of students. The research report has described about the knowledge of students regarding social media platforms and in depth notion of customer generated contents. Next section explains the digital natives in terms of age and behavioural characteristics. Another objective of the article is to understand about web 2.0 and word of mouth communication. Theory The explicit theory framework is used in this research to describe the master phenomena. The description about the web 2.0 and electronic word of mouth is made under this theory. It has been analyzed that the term of web 2.0 defines the platforms that are connective and offer users with the ability to incorporate various media within their content creation. Analytical technique, instructional instruments, social media platforms, consumer generated message viewership and customer generated message creation are used in this article to analyze the article (Steyn, Wallstrm and Pitt, 2010). Concepts The central concept of this article is word of mouth in marketing communication. This concept is clearly defined in this article. It has been said in this article that word of mouth is mature exercise as are people communicating with one another. They have become the major part for the marketing mix for companies (Li Bernoff, 2008). The discussion has been made about the web 2.0 world of marketing in which word of mouth happens on all communicative digital media sites. It has been estimated that more than 85% firm in united states are applying the word of mouth strategy. The word of mouth strategy comes out in the business when the orientation provider has no risk in the business (Li, 2010). Argument Central argument The main argument has been made on digital natives and it has been argued in this article that a higher educating marketing firm defined that technology has become so advanced and as recognizable as a knife to this college age market segment. On the other side it has been argued that customers gradually more use digital media not for researching the products and services but for engaging with organizations they buy along with other customers who may have effective insights (Williams, Crittenden, Keo and McCarty, 2012). Specific hypothesis The specific hypothesis of this assignment is that Generation C who born after 1990 is truly digital natives. The key attributes of Generation C is that they how to live in an adequate manner and they are much involved in the computers and latest technology. Strength The main strength of this assignment is used methodology. The sample has been collected from millennial aged undergraduate college students of United States of America (Packaged Facts, 2010). The minimum age is considered as 19 years old and the eldest age is 21 years old. It is the strength because the selected age is perfect to analyze the tentative study of usage among digital natives. It would encourage them to encourage the campus events or they can use consumer produced content as a need of their jobs. Weakness The weakness has been found in this article is that there are so many students in selected sample who utilized their social media ecosystem for the reason of promoting their goods and services for those companies for which they are working. The risk has analyzed that the credible power in this the network of word of mouth will be eliminated for the extended time if the orientation provider lose the chance of the growth in the business. Hypothesis The hypothesis of this article is defined below: Electronic word of mouth is vital concept in marketing communication. People employ digital media not for researching the products and services but to connected with companies they buy. The network of idle talk will be eliminated for the long time if the reference giver loses the chance of the growth in the business. Method Qualitative research has been chosen for this article in regarding content analysis which permits the examination of the experience of social without unambiguous prospects. Sample, analytical technique and instructional instrument are used in the article for researching on digital natives. In the context of sample, data has been collected from a convince sample of the undergraduate students who were studied in the marketing class. 74 students were selected for sample in which the youngest student was 19 years old and the eldest student was 21 years old. Content analysis is being used in the analytical technique in mass communication research which was considered as appropriate analytical technique for surveying the descriptions of process within the phenomenon of culture of social media. Instructional instrument is a written assignment which was given to all enrolled students. The main concept of this written assignment is to get the response of students about the usage of social media for marketing. It was the big approach to motivate students for using the social media by sharing their experiences. Evidence Evidence is provided in this article to define the social media platforms and providers. The table has given which shows the social media platforms used by students. There are various digital social media platforms available which is helpful for marketing. It has been found that 50% students are engaged with blogging and 96% of the students are active on Facebook and twitter. 70% of the students were connected with text messages because text messaging was in the content prompt. Another table has been reflected in this assignment which was categorized in segments and number of students. Segments have divided into spectator, creator, joiner, collector and critic. 73% of the students answered to more than one of the five segments. For instance, an individual can have seen himself in the condition of critic as well as spectator. Literature The literature is the description about the chosen topic which describes the scope of the topic. The article has defined the digital natives and electronic word of mouth which includes the web 2.0. It defines the stages that are extremely interactive and offer the aptitude to put together dissimilar media in their content formation. On the other hand web 1.0 was defined by one way and unreceptive communication. It is characterized by a process in which people are continuously the provider and giver of information. The social media platforms enable the opportunities for attract that did not survive a decade ago. For instance, it has been analyzed that more than 700 billion minutes are used by so many users on Facebook (Trainor, 2012). There are approximately 30 million stories, images, videos and contents are being shared by people on Facebook (Facebook Statistics, 2010). You Tube is another social media where the number of uploaded videos are high and the views has increased by two b illion per day (YouTube, 2010). It has been found that millions of people building trillions of bonding by social media each day. In that scenario, the role of Web 2.0 has made the electronic description of unfounded information communications. The digital native is the person who born during the age of digital technology and so well known with internet and latest technology from an early age. The article has described the Generation C consumers who love content creation and mashing. Generation C consumers prefer to communicate in an adequate manner. The tendency of generation C students is to work more creative industries (Gil-Or, 2010). Consumer generated content is not encouraged commercially but it is a form of electronic word of mouth (Muiz and Schau, 2011). Essentially, the opinion of customer is about the product and services and after satisfying with the services and products, customers share their views, experience and beliefs with other people by using web. The outcome of this article is fit in to the wider literature. According to Hansen, et. al., (2011), there is numerous different social media platforms that provided to students as instance to quick their thinking in the term of text messaging, podcasts, and social networking and discussion groups (Zahay Fredricks, 2009). Moreover, to discriminating the platforms utilized by this group of college student customers, the description about the particular providers were asked to respondents. Audience The article is aimed at universities students of USA. The research shows that student should judge the true suggestions of liberty of speech (Crittenden and Klepper, 2010). Another audience of this article is Generation C who born after 1990. Credibility The credibility of author is trust worthiness because the authors David L. Williams, Victoria L. Crittenden, Teeda Keo and Paulette McCarty are professors of top USA universities. The use of social media: an exploratory study of usage among digital natives is credible as it has been published in Journal of Public Affairs (2012). This journal article is published online in Wiley Online Library which shows the credibility of the journal article. The credibility of this article can be judged by viewing the number of references which is authenticated. Style The used language of author is clear and concise which can be understood by readers. The predominate mode of this article is analytical as author used qualitative research to explore the research topic. Sample, analytical technique, instructional instruments, social media platforms and customer generated message formation are being used in this research to show the involvement of people in social media. Recommendations It can be recommended that further research should evaluate the statistics and search for disparity between and among a multiple characteristics of demographics. The texts can be improved by using the more analytical data because it has been found that the study of this article was unable to connect different countries of source in the shown data. The analytical source has been chosen for collecting data in which the written assignment and content analysis were considered. These approaches and sources did not enable the compilation of the data. It has been recommended that further research should report for the effects of national so it can see if there are differences in country majorly in the utilization of the specific platforms and providers. Individual reflection The implications of the article for marketing practioners would be effective because it has described the use of different social media platforms for encouraging the market growth. This article assisted me to expand my knowledge regarding web 2.0 and electronic word of mouth which has huge contribution in the growth of market. I can use these social media platforms in my business as marketing practioner. The limitations and future research have been described in this article which assists me that the comment of personal social media should not be posted from any internet sources until and unless it is private. It concurs with my own experience because people has become advanced and give preference to online marketing instead of going outside. By using these marketing communication techniques, marketing practioner can attract the customers towards the provided services and products. Conclusion It has been concluded that the entire objective of this investigative research is to evaluate the multiple of electronic word of mouth in the context of Generation C market segment and this segment is generally defined as digital natives. The critical analysis of the article has been done by evaluating the objectives, methods, evidence, credibility, style and audience. Individual reflection has shown the position of social media sites in the life of marketing practioners. References Crittenden, V. and Klepper, K., 2010, Social media and the b-school.BizEd, pp.72-73. Facebook Statistics, 2010, Facebook statistics, accessed on 26th February 2018, from: https://www.facebook.com/ press/info.php?statistics. Gil-Or, O., 2010, Building consumer demand by using viral marketing tactics within an online social network.Advances in Management,3(7), pp.7-14. Li, C. Bernoff, J. 2008, Groundswell: Winning in a World Transformed by Social Technologies. Harvard Business Press: Boston. Li, C., 2010, Groundswell. Winning in a world transformed by social technologies.Strategic Direction,26(8). Morrison, M. and McMillan, S., 2010, January. Oh, user, who art thou: an examination of behaviors and characteristics of consumers in the context of user generated content. InAmerican Academy of Advertising. Conference. Proceedings (Online)(p. 77). American Academy of Advertising. Muiz Jr, A.M. and Schau, H.J., 2011, How to inspire value-laden collaborative consumer-generated content.Business Horizons,54(3), pp.209-217. Muiz, Jr, A.M. and Schau, H.J., 2007, Vigilante marketing and consumer-created communications.Journal of Advertising,36(3), pp.35-50. Packaged Facts, 2010, Millennials in the U.S.: trends and opportunities surrounding Gen-Y adults. accessed on 26th February 2018, from: https:// www.marketresearch.com/product/display.asp? productid=2661911. Steyn, P., Wallstrm, . and Pitt, L., 2010, Consumer-generated content and source effects in financial services advertising: An experimental study.Journal of Financial Services Marketing,15(1), pp.49-61. Trainor, K.J., 2012, Relating social media technologies to performance: A capabilities-based perspective.Journal of Personal Selling Sales Management,32(3), pp.317-331. Williams, D.L., Crittenden, V.L., Keo, T. and McCarty, P., 2012, The use of social media: an exploratory study of usage among digital natives.Journal of Public Affairs,12(2), pp.127-136. YouTube.com. 2010, Youtube, accessed on 26th February 2018, from: https://www.youtube.com/t/press. Zahay, D. Fredricks, E. 2009, Podcasting to improve delivery of a project-based internet marketing course. Marketing Education Review 19(1): 5763.