Saturday, October 12, 2019

Essays --

You maybe, as many people are curious of where online shopping came from? When did it start? Did someone invent it? And how was it created? In 2011, Michael Aldrich published a claim that he had invented online shopping in the United Kingdom in 1979, using a standard dial up telephone line. He connected a modified domestic television to a real-time transaction processing computer to create the Aldrich system. During 1980s he launched the Redifon's Office Revolution that allowed the consumers, distributors, suppliers and companies to be connected on-do business transactions. From 1980 onwards, the system is only used for business to business system and transaction only but during the widespread availability of the internet and computer systems during the 1990s the business to consumer online shopping started to become financially viable. (Michael Aldrich Archive. 2011) Online or e-shopping is a part of e-commerce and a process that allows the consumers to buy products, information and services through the internet. Since the generation today has high technology, it is one of the factors that encourage the people to do online shopping, rather than doing the traditional way of going to the market and store. (Gans. 2011) Shopping online is fast growing to be part of our everyday lives. Increasingly people are using the convenience of online shopping due to people having computers in the home along with high speed connection. Online shopping and visiting an online shop enables the customer to search, find, order and pay for the products, information and services that they need. To be able to do online shopping, one must visit an online shop, like a website or an account in the social networking sites that sells products. The payment o... ...s that online shopping undergoes is revealed. The diagram shows simplicity and can be easily done, that’s why people tends to be an online shopper now a days. Online shopping offers a lot of benefits for the customers. The researcher used different methods of collecting information that was used in this research paper. The researcher gathered information in the internet and in the library. They visited different reliable and credible websites and looked for recent articles and data that were used for the betterment of this research paper. The researchers did a survey to gather some numerical data about the customers who are engaged into online shopping. They did random sampling and gave out approximately 50 survey papers to different people aged from 14-30. These methods where used in order to make this research paper about online shopping credible and factual.

Friday, October 11, 2019

Compare and contrast teachers and administrator Essay

During my interviews I realized that being a teacher or an administrator has its ups and downs to it. The teacher answered her questions as someone who deals and interacts with children every day. The administrator answered his questions as someone who deals with more what’s best for the children with little interaction with them. Knowing what I found out about the two professions I would lean more towards as being a teacher because an administrator has too many responbilieties. There are many things that the teacher and the administrator have in common. First off they both are in education and want to help children grow into adults as the graduate. They both try to help educate the children without offending any religion or beliefs that the children may have. The teacher and the administrator both went to college to get a bachelor and master’s degree in education. They both have the similar reasoning for being in education field. Finally both of them share the love of being around children to help them be the best they can. Teachers and administrator have many things that are different from each other as well. They both have different degrees in education. An administrator has a master’s in business and a teacher has bachelors in science childhood education. The administrator went to college longer than the teacher. The teacher is there to have one on one time with the students if they need to stay for help. The administrator does not really have one on one time with the students they are to help keep students in school and any other problems that might occur. When I interviewed the administrator he was calm and very well spoken and knew a lot about running a school. He did not have any teachers in his family. He got his influence from his college English professor named Body†¦ The greatest benefit he has as an administrator is having the joy of knowing that he is helping educate and keeping children safe. The administrator does live in the same community has the children do? Yes, he believes that living around them will help to understand where the children come from and what kind of students they want to become. When I asked the administrator if he would recommend the education profession to others he said it is not for everyone. But the ones who do have what it takes to be teacher or work with children will have compassion towards them and understand what they want. So I asked myself is becoming a teacher still what I want and â€Å"yes† it is. To teach early childhood education is what I am called to do. I also learned during this interviewing process is that this job takes a lot patience, courage, and strength to help reach and teach students. I want to get to know each child as individual and what kind of goals they want for themselves. I want to help them reach it. I get closer to reaching my goal even though it has not been an easy road. I have had tons of support to do this. I would say being in administrator or a teacher is a great career a lot of responsibilities go with each one but at the end of the day it is worth it all.

Thursday, October 10, 2019

Mix Racial and Cultural Groups Are Growing in the United States Essay

Mixed Racial and Cultural Groups is increased by a marginal number in the United States. The growth of these multiracial groups started to surface through migration of different ethnics and raised most of their families in the United States even through marriage. These are some of the issues that have been raised by individual people of having an entity separation of mixed race and cultural or to considered them as Americans without a hyphen. Thinking about this issue myself, and thinking of my two children who married to a different ethnic rather than Samoans. These questions come to mind about this issue: How, Why, and what the three words that needs a big explanation about this matter. According to multiracial Americans, Americans whose identity as two or more races identifies with just one group culturally and socially. From statistics that I got from online, stated that about 2. 9% of the population in the year 2010 are self-identified as multiracial. The identity or the classification of the people’s identification is generally according to the culture they were raised in. Social segregation in many areas of the country is forming interracial unions or cultural group. The diversity of social conditions through migrations brought new groups of people to the United States. Through these migrations, mixed races started to rise when interracial marriage were born and started to increase in the United States. The movement of multiracial identity by more than one ethnicity has taken place and strong. Statistics from the year 2010 census in the United States shows that the largest multiracial groups were white and black which is 1. 8 million. The other 1. 7 millions are white and some other race, white and Asian is 1. 6, white and American Indian and Alaskan Native is 1. 4 million. I have learned that the largest growing group in multiracial is white and black which is about 134%. That is more than 1 million people. MIX RACIAL AND CULTURAL GROUP According to Susan Saulny of the New York Times, title Race Remixed, said that â€Å"sea of change is how we think about race, ethnicity and its place in society†. I believe that a challenge to trend towards multiracial from a sociological perspective is a leap that we should take. The understanding of racial and ethnic categories of their boundaries can be a problem to other multiracial groups. I think that ancestry is the biggest influence in identities through a number of generations through migrations. I also believe that each multi mix or racial group should be treated the same regardless of their identity. If they are legally citizens of the United States, they have the right to be treated equally. I believe that they have contributed to the wellbeing and welfare of the United States through their services in employment within the government, military or private companies. Regardless of the race and ethnicity, they should be treated and considered Americans. President Obama is good example of what I mean about treating them the same no matter what color of their skin or where they are from. I know that some of these mix race entities are trying to separate themselves with-in the United States but when they travel to other countries of the world, they considered be call Americans. As a citizen of New Zealand, I am proud to call myself to be an American and I respect the land that my children were born. What can the United States or these multiracial groups gain from wanting to be separated from their identity. Through my search online, I came across Mrs. Karissa Sulliva’s draft and she said that ancestry influences identities. She said that socialization is the crucible of racial and ethnic identity formation. Farley in 2002, construct racial and ethnic classifications which was adopted by the government for each race or reconsidered themselves to either refuse to identify their own race and ethnic category. MIX RACIAL AND CULTURAL GROUP. I believe that mix racial and cultural groups are increasing daily by the number throughout the United States. However, research shows that children with an original multiracial identity grow up to be happier than those of single-race identity. Some of the statistics shows that another addition to the growth of mix race is through adoption of children from countries outside of the United States. According to Fact’s for Families 2010, parents are coping with these pressures in having open communications with the families about their culture and race. Encouragement and support in every multicultural group for families to be familiar with their language, traditions and customs within their families. They have to support and try to establish a good relationship by creating a network for their children, parents, family member, relatives and the community. In conclusion, the separation and classifications between mix racial and multicultural groups is not an easy task or thing to do. Two of my children are married to different ethnic. My oldest daughter is married to an African American and my son is married to a girl who is beautiful and white but has about four or five mix blood in her. I believe in democracy and the United States is nowhere in having a separation of any mix race and cultural group who are living in the United States. God Bless America, God bless the people of the United States. References: Perez, Anthony Daniel, Hirschman, Charles. The Changing Racial and Ethnic. http://www. ncbi. nlm. nih. gov/pmc/articles/PMC2882688/ The American Academy of Child and Adolescent Psychiatry (March-2011). Facts for Families, no. 71 Multiracial Children. http://www. aacap. org/galleries/FactsForFamilies/71_multiracial_children. pdf Dr. Nicole Martinez and Mrs. Karissa Sullivan. May 6, 2013 .docx.

Knowledge Management Life Cycle

Executive summaryThe concept of Knowledge Management comes from the very definition to capture information and content for deriving a value out of it after performing some meaningful operations.  The life cycle would contemplate the process of knowledge procurement to final derivation of meaningful information for processing and further integration.  The identification of several categories which would act as placeholders for the information must be in right hands equipped with right tools so that appropriate function is performed with it.Knowledge Management Life cycleThe step 1 in this process is the identification of the fact that knowledge is king to any organisation and its evaluation, processing and its implementation must be identified in the proper context so as to capitalize on the resources for its optimum usage.Figure 1 : KM CycleThe first task is the formation of Knowledge Management (KM) teams so that the information falls into the right hands for successful processi ng. The KM teams are responsible for procurement of the information, after a thorough analysis of the business scenario. It is also decided whether the system is feasible to handle the KM process from its thought generation stage to post evaluation stage. The economic, technical and behavioral feasibility is obtained at the first level. After evaluating costs, schedule the process takes a momentum for further proceeding. The key stakeholders of the system are the crucial components and are the burning fuel for successful proceeding with the project.The second stage is the ‘What’ and ‘How’ of the system, meaning what needs to be done? And how will one do it? The capture of knowledge must be identified and analyzed thoroughly so that everything works out successfully in the initiation phase.  The third phase is the process of development. Unless the process is identified accurately, the motive of the KM system remains quite incomplete in nature. What to be processed and the objective for doing it? – the meaning must be quite clear at this level. The processing logic is devised by the expert or a set of experts. The business objectives behind the KM process must be evaluated quite well.The fourth phase would mark the designing of the blueprint which would hold information about the scope of the KM system, its interoperability and scalability issues, required system components and the system design and implementation techniques (Awad, 2001). After the roll of the blueprint the system has got a definition of the exact requirements it desires to cater. The system development is started at this level using a RAD model.  After the design is complete the system architecture is set up and all the inputs and outputs are well highlighted through the use of user interface, authentication issues, collaborative agents, application layer, internet layer, and the physical layout of the system (Fan, 2003). After the development phase, the KM system is verified and validated for any errors and defects.After all the stages are over, the final implementation takes the role of implementation where the present legacy system. It requires conversion of the existing system into the new or transferring the essential components into the new KM system. The final stage is user training and feedback mechanism which adds a new dimension to the system and it creates a self learning environment for further incorporating the deficiencies of the dynamic business scenario (McElroy, 1999).A very challenging environment would be to integrate all the systems in the organizations so that information derived from them can be successfully captured for deriving knowledge which would enter a cycle for further derivation of innovative thoughts for the long term success of the business.ConclusionThe KM process is quite essential for managing the information in any organization and deriving greater innovative business thoughts from the information flow in the business and its correct representation and identification of resources for growth and prosperity in enveloping challenges.References/BibliographyFan Yushan (2003). Knowledge Network and Knowledge Management. See: www.simflow.net/Publications/Papers /Year2003/ljq_ICAM03_0312.pdf   

Wednesday, October 9, 2019

Computer-Based Crimes Essay Example | Topics and Well Written Essays - 1750 words

Computer-Based Crimes - Essay Example The misuse of the computer may involve the falsification of computer signatures through unauthorized codes; the creation of false bank accounts; theft of personal information and misuse of the stolen information; the virus infection created on computers that can hamper the proper software operations and damage records. In the theft of personal information, victims may not even be aware of the crime perpetration until a very considerable damage on their assets, credit card, and societal status have already been inflicted. Criminals may use programs that would remove any evidence of the committed crime. Today, the biggest crime created through computer use is the electronic financial account transfer. Intellectual challenge is the most significant reason for creating computer crimes. Computer hackers commit such crimes for financial reasons and for personal motives, such as anger or revenge (Computer-Based Crime, 2011). Identity Theft To date, identity theft has the fastest growing cri me rate in America. Identity theft is the pilfering and illegal use of private information from an unsuspecting individual to access personal financial accounts. The targeted personal data include a victim’s address, birth date, telephone number, social security number (SSN), bank account number, credit card number, or other valuable identification records to be used for the thief’s economic gain. Criminals use this information in opening new credit and depository accounts, applying for home or car loans, leasing homes, apartments or vehicles (Brody, Mulig & Kimball, 2007) applying for benefits, or filing fake tax returns (Palmer, 2006). In worst cases, perpetrators use the obtained private information to take over the victim’s identity, create enormous debts, or use in a criminal activity under the victim’s name. In businesses, criminals pilfer their financial accounts, confidential access codes of their computer systems, or restricted records of workers . In phishing scams, thieves of company identities carefully pick businesses that may seem appealing to their prospective victims. Banks and prestigious businesses, and the most visited sites, such as the eBay and PayPal are the favorite targets of identity thieves (Brody, Mulig & Kimball, 2007). The electronic exposure of private information in a majority of business deals attracts the interest of identity thieves. Thieves gain access to private information given out by credit card holders when purchasing goods online; using cards in restaurants and gasoline stations; or when withdrawing cash in ATM outlets. In 2005, there were reported incidences of around 10 million identity theft cases, equivalent to 4.6 percent of the U.S. annual population (How Many Identity Theft Victims Are There? What is the Impact on Victims?, 2006). Reports taken from the Chief Securities Officer (CSO) Perspectives Conference confirmed 53 million identity theft cases to date and a further 19,000 cases eac h day. On the average, a victim loses $40,000 to $92,000 per incident (Friedenberg, 2006). The American consumer group loses roughly $5billion per year, while U.S. businesses and banking institutions lose around $47.6 billion per year (How Many Identity Theft Victims Are There? What is the Impact on Victims?, 2006). Since hacking started in the middle of the 1990s, attacks have dramatically increased. Computer hacking attacks are now more supported and financed by big-time syndicates. Moreover,

Tuesday, October 8, 2019

Terrorism in America Assignment Example | Topics and Well Written Essays - 750 words

Terrorism in America - Assignment Example   In Article 14, Jonathan Masters elucidates how militant extremism has posed the menace to the innocent Americans. The left-wing, right-wing, single issue groups, and homegrown Islamic are the four bands in which the FBI has branded domestic terrorism into. There is one more group known as lone offenders that can come under all the categories of domestic terrorism. Lone offenders are basically individuals who are not allied with any terrorist organization. America has the greatest danger from lone offenders as it is very difficult to identify and locate such individuals for the intelligence agencies but to our advantage, the lack of association of lone offenders from big gangs of terrorists makes their actions less effective (Masters, 2011). The four broad categories of domestic terrorism have been fashioned, based on their motives to spread terror in the country. The left-wing groups consider themselves as ‘protectors’ of the people against any kind of inhuman effects of capitalism and colonialism in the country whereas the single-issue groups fight against the laws and regulations that have a negative impact on the environment and are against the law of nature. Their attacks are based on the various political issues like abortion, environmental degradation, animal abuse or genetic engineering. According to the FBI, terrorists belonging to this group have executed thousands of attacks and posed a serious threat to the lives of many people. Much of sabotage has been spread by this group, and the FBI has failed to track down the culprits due to rigid secrecy in the group. Right wing terrorists emerged recently in the late 1980s and 1990s. They have diverse drives for their bouts like racial sovereignty, hatr ed and mistrust of the federal government and fundamentalist Christianity (Masters, 2011).   Furthermore, in the article Jonathan Masters argues whether America should amend its laws regarding the austere

Monday, October 7, 2019

No title Essay Example | Topics and Well Written Essays - 2500 words

No title - Essay Example The paper discusses about the technological advancements visualized in the movie â€Å"Minority Report† and critically examines the impact of its certain scenes. Progression of visual aids has been astonishing and better visuals are experienced by the audience in the recent years. Moreover the technological myth which is deflected in the movie indicates that world will be a very different place in the coming years due to rapid technology advancement (Livingston & Plantinga, 2012, p.61). The paper illustrates that what are the impacts of power and surveillance use in the city; how institutional power and private rights must be balanced & where would this technology realm lead us to. The movie Minority Report precisely indicates some of the hazardous circumstances which mankind will be facing in the coming years. A hawk view into the future has been portrayed in the movie. The depiction in the movie portrays that world would be a very difficult place to live in the imminent years. The movie portrays a glimpse of the future and exemplifies that police department power are substantial and considerable. They have established a Pre-crime department which claims to catch criminals before the happening of a crime. The department has installed a gigantic technological setup which has certain formalities. The setup enables Pre-crime police department to have a blueprint about the upcoming crime endeavors, which enables them to catch the convicted at the crime scene and save person from death. There have been no deaths in the past six years since this setup has been installed; but still ambiguity prevails among the Department of Justice that there are some flaws in the system (Minority Report, 2002). The above given picture portrays that pre-crime department does it level best to create peace and harmony in the city hence it invades into the crime scene and stops the crime to occur. The information is gathered before