Friday, August 28, 2020
Foreign Relations Essay Example | Topics and Well Written Essays - 1000 words
Outside Relations - Essay Example The September 2001 psychological oppressor assault in the United States spurred the definition of new procedures. Such systems moved the United States to assault Iraq, drawing support from its European partners. Louise Fawcett and Raymond Hinnebusch are two of the experts who have tried to characterize how the Iraq war re-imagined the worldwide political field and the positions held by specific states in the worldwide society. Obviously, the war caused a move in the comprehension of outside relations patterns. Be that as it may, these two examiners express contending points of view on the move on the worldwide outside relations. This paper will address the contending viewpoints. Hinnebusch considers the impacts of the Iraq war, expressing that the littler states were under a flooding danger as a result of the war. After the September 2001 assault, the United States elevated its reconnaissance and carefulness framework. Such uplifted frameworks gave a convenient uncover that Iraq had become a developing center point of atomic weapons that tested worldwide security. The United States made the transition to take up arms against Iraq, in an offer to destabilize it, and wipe out the danger it was presenting to the worldwide cultural government assistance. Obviously, political and security patterns are a portion of the basic issues that decide the bearing taken by social plans. True to form, the United States got support from Europe, explicitly from nearest partner in the locale, United Kingdom. As indicated by Hinnebusch, such help filled in as a limitation for the rise of some type of requirements to the advancement of the war in 2003. In his contention, he makes it clear that the United States was an authority that settled on all the basic choices deciding the bearing of the war (Hinnebusch 453). After the assault, Bush sets new techniques that would characterize the war on fear. The clear situation of America on a worldwide front constrains it to demonstrate prof oundly conclusive in delicate issues, for example, the rising fear. America concluded that it would draw in the Iraq on account of the danger it presented. Hinnebusch contends that the various states just needed to pick their stand contingent upon their relationship with the United States and the Middle East. The United Kingdom and japan abused the chance for their potential benefit, a factor that changed the patterns taken by remote relations between these nations and the United States. In any case, littler states had restricted decision since they confronted the best danger. The war influenced various divisions of the worldwide business front that thusly influenced social orders legitimately. The United States sought after close to home interests, particularly those custom fitted to advance its authority in the worldwide economy. As indicated by this pundit, a few nations opposed the sentiment communicated by their publics and affirmed their help for the US in light of the apparen t advantages (Hinnebusch 457). The creator depicts how the authority steadiness request characterizes the procedures utilized by America to keep winning unequivocally. He further depicts the worldwide realm that America makes, that would serve to impediment the third world states on account of the weight it applies on worldwide monetary and political situations. Then again, Fawcett investigates a similar issue, revealing new insight into the impacts of the Iraq war. As per him, may of the destinations of the war as never appeared notwithstanding the view of the United States (Fawcett 328). Going about as a worldwide authority, the United States
Saturday, August 22, 2020
Analyzing the expected profits of two firms Assignment
Examining the normal benefits of two firms - Assignment Example Through outline, when the two organizations choose in applying this methodology their balance will be In this situation, King Company and Babil Company both have a predominant alternative of promoting. Regardless of what Babil does, King Company will improve his advancement by publicizing and the other way around. In any case, something odd about the game it appears that the two organizations will profit more when they decide not to promote. Rather than one increasing 300 and the other losing 80 and the other way around, they could win 150 each. Subsequently, the objective decision of shared not promoting has a reckless flavor that is confusing. In game hypothesis idea the ideal result of the two firms is the place no firm has impetuses in going amiss from the set commercial techniques after the decision of the adversary is thought of. By and large, no firm can get a gradual advantage of changing activities, accepting the organizations stay comparable in the procedures. The Nash harmony will exists when no firm change their notice technique, notwithstanding understanding the rivals methodology. Consistently the two organizations decide not to promote and get result of 150. In the event that an individual uncovers the system of King to Babil and the other way around, no firm will veer off from not publicizing. Knowing the move of King, and don't change the conduct of the Babil, the result of the two organizations not publicizing speak to the Nash
Friday, August 21, 2020
Describe The Four Types Of Solid Structures Environmental Sciences Essay
Depict The Four Types Of Solid Structures Environmental Sciences Essay There are three types of substances exist: fluid, strong and gas in which strong is one of the significant condition of issue. The strong structure bonds the particles together by various substance physical fascination. Substance bonds are the consequence of collaborations of electrons by different powers of fascination. This fascination can hold particles together in a steady game plan. Particles may move or offer iotas to frame atoms and mixes. At the point when particles bond together by substance bonds, they will turn out to be increasingly steady. Various sorts of compound bonds decide solids properties, for example, dissolving point, conductivity and solvency (Lister and Renshaw, 2000). Electron moving structure ionic bonds while electron sharing and joining atoms structure covalent bonds. Linus Pauling thought of a scale, an incentive for every component called the electronegativity (E.N.) esteem. Every component has distinctive want needing, capacity to draw in electrons. The solid electron attractions were given high qualities and a few molecules have low capacity to draw in were given a low worth. These qualities are relative-correlation esteems and have no units. The estimation of contrast electronegativity between two molecules under 1.8 are characterized as covalent bonds while the estimation of distinction electronegativity between two iotas more than 2.0 are characterized as ionic bonds. This exposition will depict four sorts of strong structures: ionic and metallic which contains of unit cell, mammoth covalent which is held by system and basic sub-atomic which are little particles with powerless powers of fascination. Ionic Structure Most importantly, ionic holding usually exists in precious stone strong structures. Ionic holding electrons are moved from mental molecules to non-metal iotas which bring about every particle getting a full external shell of electrons to get steady. Generally, metals structure cation by losing valence electrons while non-metals structure anions by picking up valence electrons. Sodium chloride (NaCl) is a notable ionic compound. Sodium loses one electron from its external shell while the chlorine increases one electron to fill its external most shell. At the point when sodium (Na+) particles bond with chloride (Cl-) particles they structure normal table salt, sodium chloride (NaCl) (Lister and Renshaw, 2000). Also, Sodium chloride (NaCl) is comprised of mammoth cross section of particles. There are a lot of sodium particles and chloride particles pressed together which relies upon how enormous the precious stone is. Figure 1 (Adapted Steinberg, 2000) shows how does a touch of sodium chloride cross section organized. Figure 1: Ionic Bonding in Sodium Chloride (Adapted from Steinberg, 2000) Every sodium particle is at a middle encircled by 6 chloride anions. Every chloride particle is additionally in the middle, it is likewise encircled by 6 sodium cations. So sodium chloride is depicted 6 co-ordinated. The example along these lines will be rehashed on many occasions in sodium chloride gem and guarantee the most extreme security in sodium chloride. Since when every particle is moved by 6 inverse charged particles, there is more fascination between the particles which makes the structure progressively steady (Clark, 2010). Figure 2 (Adapted from Clark, 2010) shows unmistakably the unit cell of sodium chloride. Figure 2: Unit Cell of Sodium Chloride (Adapted from Clark, 2010) Usually, the molecules organize in a normal way, yet once in a while this isn't the situation. Every single metal molecule comprise of a great deal of gem grains which are locales of normality. At grains limits particles become inconformity. There are different properties in ionic mixes. Right off the bat, ionic mixes have a high softening point and breaking point. There are solid attractions between the positive and negative particles which take a great deal of vitality to conquer them. Furthermore, one of the primary properties of ionic mixes is they direct power when liquid, since when the compound is in the fluid express, the particles can convey the charge uninhibitedly. Ionic mixes are fragile which coming about because of an applied pressure. The particles will be moved adequately to reach between particles. Particles of the equivalent charged are carried one next to the other prompting aversion powers inside the gem. Numerous ionic mixes break up in the water. Water atoms have unbonded electrons, called solitary sets. They draw in positive particles and negative particles in the mixes structure dative bonds and polar water structures electrostatic attractions between the particles. Water atoms additionally produc e vitality by hydration to separate the cross section and lessen their fascination (Clark, 2010). Covalent bonds Molecules sharing electrons structure covalent bonds which the electronegativity distinction between two iotas are under 1.8. Monster Covalent Structure In mammoth covalent structures, all iotas are fortified together by covalent bonds which legitimately have an effect on explicit particles in a standard broadened organize. The electrostatics powers hold different structures together to act similarly every which way. Jewel is best case of goliath covalent structure (Lister and Renshaw, 2000). Precious stone has a tetrahedral shape in three-measurements, with four covalent bonds from every carbon particle. As per VSEPR hypothesis which can clarify the degrees of aversion between concoction bonds (Lane, 2009), to diminish the shock four sets of covalent bonds structure and covalent bonds repulse each other similarly. There are no intermolecular powers of fascination just, between the carbon particles. Figure 4 (Adapted from Chemcases, 2010) shows the structure of jewel Figure 4 shows the structure of precious stone (Adapted from Chemcases, 2010). Precious stone is notable as the hardness characteristic substance, and results from four in number covalent bonds giving jewel a solid inflexible broadened and constant structure, so jewel simply can be cut by other precious stone. Moreover, precious stone has an extremely high liquefying purpose of around 4000K, in light of the fact that to separate the four in number covalent securities requires a ton of vitality. Next, the electrons which are held firmly are not allowed to move, bringing about the precious stone having neither direct power nor heat. Finally, precious stone is insoluble in water in light of the fact that the covalent bonds are a lot more grounded than the fascination of water atoms (Clark, 2000). Basic Molecular Structure The basic sub-atomic substances are non-metal mixes which are comprised of molecules by solid covalently bond and moderately frail intermolecular powers. Water is taken as a run of the mill kind of the basic atomic structure (Lower, 2010). In water, every hydrogen iota is bound to the focal oxygen particle by a couple of sharing electrons. Oxygen has four free electrons in its external second level to shape two solitary sets to decrease the aversions between billows of negative charge, leaving two of the external electrons imparted to hydrogen to frame covalent bonds. This standard prompts a tetrahedral structure in which the edge between electron sets is 104.5â °. Furthermore, water particles structures hydrogen holding. Oxygen likes electrons more than hydrogen and electrons invest more energy close to the oxygen, bringing about oxygen is part negative charge while the hydrogen is certain charge. Electrons are appropriated prompting water structure a negative structure of hydrogen bonds. Dipole-dipole attractions happen between two water atoms, because of its polar nature (Lane, 2009). Figure 5 (Adapted from Google, 2010) shows the structure of water particle. Figure 5: Hydrogen Bonding Between Water Molecules (Adapted from Google, 2010) As the frail powers exist in straightforward sub-atomic substances, they are not extremely thick or solid nor strong bringing about it having a low dissolving point and breaking point. Straightforward atomic substances can without much of a stretch become gas or fluid. There are no particles existing in these substances, so they are insoluble in the water and can not lead power (Lower, 2010). Metallic Structure Metals are mammoth structures which hold the particles together by metallic holding moving the electrons. All components of metal can without much of a stretch lose electrons framing positive particles which are in an openly moving ocean and electrons. What number of electrons have been lost by each metal decide the quantity of electrons in the ocean (Lister and Renshaw, 2000). Most particles in metals pack as close as possible. In any case, sodium in Group one is increasingly open and less thick and structures a unit called the body-focused cubic (BCC) structure which is a typical pressing geometry for certain metals. This structure is definitely not a nearby stuffed course of action, only 68% of the space being filled (Lister and Renshaw, 2000). There is a molecule situated in the focal point of a 3D square which is encircled by eight different circles. Figure 3 (Adapted from Clark, 2007) shows the structure of sodium: a coordination of eight and a unit cell containing two iotas. Figure 3: The Structure of Sodium (Adapted from Clark, 2007) There are a few properties about metals. The greater part of metals will in general have a high liquefying point and breaking point because of the quality of the metallic holding. The quality of metallic holding isn't just not quite the same as metal to metal, yet in addition relies upon the quantity of electrons which every molecule can delocalise in the ocean of electrons and by the pressing. Change metals have a high liquefying point and breaking point since they structure a unit called hexagonal close pressing. Gathering one, for example, Sodium is a special case and has a low liquefying point and breaking point, since it just has one electron to add to the bond and it is 8 co-ordinated which can not frame sufficient bonds as different metals. Besides, metals are acceptable channels of power. The electrons in the ocean are allowed to move all through the structure even cross the grain limits. The metallic holding despite everything exists as long as iotas are contacting one anoth er. Likewise, these electrons are additionally liable for the high warm conductivities of metals. Electrons of the metals can get heat vitality which is moved to the remainder of metal by moving electrons (Clark, 2007). All in all, electrons are moved framing ionic holding in ionic
Tuesday, May 26, 2020
Getting Started With Your First Formative Document
Getting Started With Your First Formative DocumentStudents frequently ask whether it is necessary to include a thesis statement in their first formative educational documents, like an Informational Essay, Elementary Education essay, or College Scholarship Essay. The short answer is, it really depends. This may seem a paradox, but the answer is that your thesis statement doesn't have to be nearly as complex or convoluted as one that may accompany an Informational Essay or College Scholarship Essay.First, it is important to make the distinction between a thesis statement and a quotation. A thesis statement is meant to be your exact presentation of your argument.A thesis statement is generally designed to start the reader off and explain your argument in general terms and to get him or her engaged in the conversation. In some cases, this type of statement can act as a prelude to a more involved statement. If you want to include a thesis statement in your first formative educational docu ment, though, it should do so in a simple and direct manner.A thesis statement should not try to be more than this. It should be clearly stated in your first formative educational document and should not try to address any particular points that you would like to raise in future forms. As far as you are concerned, you are only dealing with one simple and direct issue. If you try to expand your scope of discussion in your first formative document, you will have to revisit your statement at the end of the semester or for a special occasion.A thesis statement should never attempt to be as descriptive or detailed as a quotation would be. By trying to be more general than necessary, you open the door to some rather messy and even rambling forms of argumentation that have nothing to do with your thesis topic. A statement is only as strong as its weakest and most superficial points.If your thesis statement is not long enough to be quoted, you may have to cut it down to a brief text that ca n serve the purpose of short summaries of your arguments. This could work for many problems, but if the student is not sure what his or her thesis statement should be, you will not want to cut it down too much, even if it is a brief statement.Regardless of how you prepare your thesis statement, it is important to note that the purpose of a thesis statement is to get the student engaged in the discussion that you have started. If you use too many words and too many points, the student may get bored, frustrated, or even angry with you. The most effective approach is to find a balance between wanting to explain and talking about the issue, so that the student doesn't lose interest.
Friday, May 15, 2020
About A Censorship - Free Essay Example
Sample details Pages: 5 Words: 1575 Downloads: 10 Date added: 2019/05/31 Category Society Essay Level High school Tags: Censorship Essay Did you like this example? With more than 336 million monthly active users worldwide as of the first quarter of 2018, Twitter is one of the biggest social networks worldwide (statista 1). With that many user accounts on twitter, it goes to show how powerful social media platforms have become. Many times, when content is posted online, the words, ideas, music, images, etc. Donââ¬â¢t waste time! Our writers will create an original "About A Censorship" essay for you Create order can be taken out of context and if enough attention is given to it, then it is censored. Content censorship occurs regularly and can range in form from pornogrophy to political views. There are many different types of censorship, such as: corporate, moral, political, and religious censorship, but have something in common is that they all get censored when something hateful has been said. That is called censorship of speech. In todayrs world, it is safe to say that majority of people get their news through one of the following social media platforms: Twitter, Facebook, Youtube and Instagram. With that being said, social media plays a big part into censorship because nothing spreads faster than something trending on social media, and if an unfavored content goes viral then it may be considered to be taken down/censored or they may get the account banned. Arguing for the protection of hate speech for example is difficult and sounds unpleasant. The internet and social media were des igned to be open platforms, where people can express ideas and acquire knowledge from others freely in a public forum. An open dialogue of speech an of ideas, however controversial, needs to happen, because conversations are our primary way of resolving conflicts and gaining new knowledge. When hearing the term hate speech, the most type of content that comes to mind is racism. So what is hate speech exactly? There is no clear agreeable definition of Hate speech as everyone hears things differently. According to Meriam-Webster, the legal definition of hate speech is: speech that is intended to insult, offend, or intimidate a person because of some trait (as race, religion, sexual orientation, national origin, or disability). One would think the definition is clear enough, but the definition is similar to the saying beauty is in the eye of the beholder, but instead it is more like hate speech is in the EAR of the beholder. Just as everyone observes what they see differently, they also perceive what they hear differently. In the U.S.A, there is the first amendment which is: the freedom of religion, speech, press, assembly and petition. The first amendment states, Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise th ereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances (Constitutioncenter.org 1). The First Amendment does not protect individuals against private companies/organizations, such as private employers, private colleges, or private social media platforms. The First Amendment shackles only the government. The Supreme Court are the ones who interpret all the amendments and have stated that: talking, writing, radio-broadcasting, and using the Internet, are forms of speech. Although, free speech also applies to figurative expression such as: displaying swastica signs, and burning flags and crosses. The first amendment protects hate speech as long as it does not directly imminent violence. Speech, whether it be said on TV or tweeted online, can not be punished because of its hateful content. Arguing for the protection of hate speech for example is difficult and sounds unpleasant. Those that do argue for in favor of such positions, do not argue for hate speech, but rather for the right to Freedom of Speech in all platforms. No one argues for the protection of Freedom of speech than Nadine Strossen, a Professor of Constitutional Law at New York Law School and was the first women national President of the American Civil Liberties Union from 1991 through 2008. In her book Hate: Why we should resist it with Free Speech, not censorship, she strongly argues that censorship is not the answer to hate speech. In her book she quotes the cure is worse than the disease; the ?disease being hate speech and the ?cure being censorship. (insert personal idea here). Throughout her book, she provides many examples of what has been labeled hate speech including modern day themes such as the Black Lives Matter movement. She discusses the BLM movement and describes how people affiliate d with the movement have been targeted as perpetrators of hate speech against law enforcement and have therefore been blamed for countless murders of police officers that were argued to occur as a direct result of BLM rhetoric. In total contrast to the BLM movement, neo-nazis and white nationalist groups have been equally accused of their own hate speech directed at, usually, non-white minority groups and for whatever reason, ?The Jews. Both opposing sides see things differently and point the finger at each other seemingly unaware of their own hypocrisy. Although Nadine does not touch the subject on hate speech censorship on social media, it is important to recall how individuals are not protected by the first amendment from private social media platforms. (insert twitter censor policy).With that being said, it is still important to protect the principle. P4: (Talk about legal court cases that won and lost hate speech and their importance) The Skokie case is a well known classic free speech case that took place on March 20, 1977. Frank Collin, the leader of the National Socialist (Nazi) Party of America, informed Skokies police chief that they intended to march on the villages sidewalk on May 1. Skokie is the name of the village in Illinois. At that time its population consisted about 70,000 citizens, 40,000 of whom were Jewish. When news spread throughout the media, that the Nazis wanted to have a march in Skokie, there was an outrage. The villagers wanted to prohibit the march. This turned in the National Socialist Party of America v. Village of Skokie. The village of skokie presented 3 reasons to the Illinois Supreme court; First, the display of the swastika promoted hatred against persons of Jewish faith or ancestry and that speech that promotes racial or religious hatred is unprotected by the First Amendment, second, the v illage argued that the purpose of the marches was to inflict emotional harm on the Jewish residents of Skokie and third, the village argued that if the Nazis were permitted to march there would be uncontrollable violence (Stone, Geoffrey R. 2). It is important to remember that we fight for the principle, which is freedom of speech. In contrast to the ?fight bad speech with more speech attitude of Nadine Strossen, many individuals such as, Barry Jason Mauer, an associate professor in the University of Central Florida Department of English, claim that hate speech is a form of anti-speech and therefore beyond the confines of dialogue. Others have said that they have felt physically threatened by hate speech and emotionally disturbed. Majority of the world has an account with Twitter, which one of the biggest social media platforms worldwide. Every second, on average, around 6,000 tweets are tweeted on Twitter (visualize them here), which corresponds to over 350,000 tweets sent per minute, 500 million tweets per day and around 200 billion tweets per year (internetlivestats.com). With so many tweets being written each each, it is no wonder why so many individuals have also experienced psychic trauma, and have felt silenced, because of hate speech content that has been posted online or heard through TV. In B arry Jason Mauer article, Censorship Is Not All Bad, published in the Huffington-Post, Mauer starts out his article with, Free-speech idealists argue that the solution to bad speech (misinformation, lies, abusive language, etc.) is not censorship but more speech. But bad speech can, and often does, drown out the good. Mayer states that fighting free speech with more speech is not the answer as their are misused forms of speech, to which, is true. These are all serious concerns, to which many individuals have suffered with first hand and have been exposed to hate speech that is and will not be punishable. Although we acknowledge those harms, loosening up the constraints on government to allow it to punish speech because of those less tangible, more speculative, more indirect harms â⬠that censorial power will do more harm that good, precisely because the pendulum can swing. P6: (Include personal research) I wonder if other people feel the same about censorship. I ducted my own personal research to get a sense of how people feel about censorship right now. I created a poll on my Instagram account asking, should hate speech be censored? I had also asked a friend, who has a set of different followers, to post the same question to eliminate a bias result. In total, there were 82 people who voted; 34% voted yes (28) and 65% voted no (54). Although, I did receive a few comments following with their vote. All of the comments revolves around the same content, I am for censorship, but . I felt those who messaged me felt some kind of guilt for voting no on censoring hate speech and had to justify why they voted no. P7: (conclusion)Hate speech does not translate into actual high crimes against those who the hate speech is directed to. If censoring hate speech is taken away, then someoners right to freedom of speech is taken away. The(bring it back to your thesis and discuss why this is important to uphold)
Wednesday, May 6, 2020
The City Of God By John Milbank - 869 Words
After Augustine completed his literary piece known as the City of God, serious debate ensued regarding the correct interpretation of the concepts addressed in his writing. Augustine highlighted two realms, that of the earthly state known as the secular realm and the heavenly state known as the City of God. For instance, Etienne Gilson believed that Augustine was expressing the greatness of the earthly state while simultaneously explaining that the state bettered Christianity. Other philosophers such as Robert Markus interpreted Augustineââ¬â¢s writing as being supportive of the secular realm and claimed it to be independent from religion. Opposing both of these philosophers were James Schall and John Milbank. Their belief explained the political state to be sinful and evil. Analysis of all three positions ultimately revealed the ideas of Schall and Milbank to hold a deeper understanding of the truth than those of Markus and Gilson. In the City of God, Augustine repeatedly explaine d how the earthly state and the City of God were opposites which contradicted Etienne Gilsonââ¬â¢s thoughts. He began by comparing and contrasting who the people of the earthly and heavenly states worshipped. People of the earthly state worshipped the Roman Empireââ¬â¢s gods while people of the heavenly state revered the one, true God. Here Augustine proclaimed, ââ¬Å"For, so far as concerns themselves, their piety and probity, which are gifts of God, suffice to give them true felicity, enabling them to live wellShow MoreRelatedThe Church: An Analysis of The Rerum Novarum Publication1898 Words à |à 8 Pagesthe encyclical one hundred years later, to analyse the development of policy in1891 and 1991 in terms of the churchââ¬â¢s teaching, within the context of the wider social and political movements of the late twentieth century. I will determine that whilst John Paul II used the centenary in 1991 to publish Centesimus Annus and see it as a ââ¬Ëre-wordingââ¬â¢ of the original, it ultimately failed to take forward the radical change envisaged in Rerum Novarum, with limited exceptions. Firstly we need to analyse theRead More Art, Literature And Society From 1955-1970 Essay examples5829 Words à |à 24 Pagesbeing that all suffering can be repressed. Although the only way to repress lifeââ¬â¢s suffering, aside from maintaining constant and intense meditation, was to return to the blissful void of death (Hipkiss, p.65). In the quot;113th Chorusquot; of Mexico City Blues is a perfect explanation of this blissful void. Since only two lines address life(quot;Got up and dressed up, and went out amp; got laidquot;), it is clear that Kerouacââ¬â¢s emphasis is on the hereafter. It is only after everything has endedRead MoreCorrectional Administration Reviewer18383 Words à |à 74 Pagesshall not be imposed, nor be cruel and unusual punishment inflicted. ï ½ ORIGIN AND HISTORY OF PENALTIES OR PUNISHMENTS Natural Law. This originated from God (natural law) to enforce the law that laid down in His infinite wisdom and power. He also prescribed the penalty or punishment. Banishment/ distierro. The first penalty or punishment prescribed by God to Adam and Eve when they disobey His order which made them as the first criminals. Retribution/ Personal vengeance/ Revenge. The most common ancientRead MoreThe Rise of China and Future of the West17670 Words à |à 71 PagesLiberal System Survive? By G. John Ikenberry January/February 2008 Summary:à Chinas rise will inevitably bring the United States unipolar moment to an end. But that does not necessarily mean a violent power struggle or the overthrow of the Western system. The U.S.-led international order can remain dominant even while integrating a more powerful China -- but only if Washington sets about strengthening that liberal order now. G. JOHN IKENBERRY is Albert G. Milbank Professor of Politics and International
Tuesday, May 5, 2020
A Case Study on Cheat Sheet to Pregnancy Hormones
Question: Describe about the A Cheat Sheet to Pregnancy Hormones? Answer: Source of Hormone Hormone Functions Level during Pregnancy Placenta HCG or Human Chorionic Gonadotropin For maintenance of the corpus leteums progesterone secretion for promotion of endometrium and prevention of menstruation until placenta becomes mature enough to sustain indigenous progesterone. The level of HCG start increasing eight days post evolution and tend to peak around 60 to 80 days after conception Corpus Leutem till 10 weeks and then placenta Progesterone It enables relaxation of uterus muscles, enhance acceptance to foetus During the first 3 months, there is exponential increase in levels after which it plateaus Corpus Leutem initially and then placenta Estrogen It plays a critical role in the development of foetus by stimulating the production of hormones in the adrenal gland of the foetus and thereby enable its normal development During the first 3 months, there is exponential increase in levels after which it plateaus Hypothalamus Oxytocin Plays a crucial role in the simulation of contractions of uterus at the time of delivery along with simulation of milk production Exponential increase till week 10 after which it witnesses a decline Hypothalamus Prolactin It plays a crucial role in preparing the breast for lactation and subsequent milk releasing The level tends to increase during the pregnancy and reach a level nearly 10-20 times of normal levels Placenta Relaxin Plays a crucial role in delivering by allowing relaxation of uterine muscles and ligaments of pelvic bones The level tends to increase during the pregnancy and reaches a level nearly 10 times of normal levels The male reproductive hormones are summarised in the table below (Starr McMillan, 2014). Source of Hormone Hormone Functions Hypothalamus GnRH Stimulating the FSH and LH secretion Pituitary Gland FSH It leads to sperm maturation Pituitary Gland LH Stimulates the secretion of testosterone and production of androgen by testes Testes (Laydig Cells) Testosterone Responsible for stimulating sex drive Pituitary Gland Inhibin Feedback to slowdown the release of FSH and LH The female reproductive hormones are summarised in the table below (Starr McMillan, 2014). Source of Hormone Hormone Functions Hypothalamus Gonadotropin-releasing hormone (GnRH) Stimulating the FSH and LH secretion Pituatary Gland Follicle-stimulating hormone (FSH It triggers the development of ovarian follicle and is responsible for controlling ovum production Pituatary Gland Leutenizing hormone(LH) Stimulates the ovaries to produce oestrogen and progesterone along with promotion of corpus leteum development Ovaries Oestrogen Responsible for maturation and release of ovum in every menstrual cycle Ovary (Corpus Leteum) Progesterone Preparation of the uterus lining for reception and development of fertilised ovum Reference Hochwald, L. nd, A Cheat Sheet to Pregnancy Hormones, Parents Website, Available online from https://www.parents.com/pregnancy/my-life/emotions/understanding-pregnancy-hormones/ (Accessed on November 28, 2015)Starr, C McMillan, B 2014, Human Biology, 10th edn, Cengage Learning, Belmonte
Wednesday, April 15, 2020
The Effects of Autotune on the Music Industry Essay Example
The Effects of Autotune on the Music Industry Essay Throughout the years, musicians and artists have used many different techniques in order to make themselves sound different and to sell records. Quite recently, many musicians and artists have been using a pitch correcting program called Autotune. One rapper/hip-hop artist, T-Pain, is mainly responsible for transforming the use of Autotune. Autotune was first invented in 1997 by Dr. Harold ââ¬Å"Andyâ⬠Hildebrand. Dr. Hildebrand founded Antares Audio Technologies in 1990 after working as a research scientist for Exxon from 1976 until 1989, when he realized that the same technology he used to detect oil reserves in the sea floor could also be used to correct a singerââ¬â¢s unruly notes. After leaving Exxon, Hildebrand created a program called Infinity, which allowed musicians and producers to created endless loops of multiple instruments in samples. Due to the success Infinity had attained, the Dr. had decided to move on to his next task at hand. In 1997, Auto-Tune was released. Auto-Tune was a program designed to fix and correct pitch problems in not only singers, but other musicians who played instruments as well. The release of the program gained instant notoriety, as Auto-Tune became an instant phenomenon and grew to become the largest-selling plug-in of all time (www. antarestech. com). Auto-Tune is based on ââ¬Å"phase vocoding technologyâ⬠, which is an analysis-synthesis algorithm. The software detects the pitch of the voice of the singer or the instrument of the artist, analyzes the pitch along with the overtones and content, and then autocorrects the notes to the desired/correct pitch (www. ow-to-guide. net). In the years following the development and release of Auto-Tune, there wasnââ¬â¢t much commercial use of the product. The first big hit to feature the use of Auto-Tune was Cherââ¬â¢s ââ¬Å"Believeâ⬠in 1998 (Blame Cher). Since then, many prominent artists have featured the use of Auto-Tune, such as Kanye West, Lady GaGa, Ke$ha , and of course, T-Pain. About ten years before the release of Auto-Tune, a young boy by the name of Faheem Rasheed Najm was born in Tallahassee, Florida. This young boy would later grow up to become better known as his stage name, T-Pain. We will write a custom essay sample on The Effects of Autotune on the Music Industry specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on The Effects of Autotune on the Music Industry specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on The Effects of Autotune on the Music Industry specifically for you FOR ONLY $16.38 $13.9/page Hire Writer In the winter of 2005, T-Pain released his debut album ââ¬Å"Rappa Ternt Sangaâ⬠and it debuted at #40 on the Billboard 200, dropping some, and then eventually climbing up to #33 over the next few weeks. Since then, T-Pain has released a total of 3 full length albums and has produced many hits for himself, as well as producing many hits for other rappers and artists. He has been nominated for many awards, and has won 13 (www. t-pain. net). In September of 2009, Smule introduced and released the ââ¬Å"I am T-Painâ⬠application in the app store for download on all iPhones. The application allows its user to simply talk into the microphone and record messages, notes, or even record songs over pre-recorded beats and then Auto-Tune your voice and send your messages to friends (www. iamtpain. smule. com). After Cherââ¬â¢s ââ¬Å"Believeâ⬠in 1998, Auto-Tune went out of fashion and no artists were using it. In 2003, back when T-Pain was a little-known artist, he was recording a song in the studio when he put Auto-Tune on his voice. In an article from Time. com, T-Pain said that ââ¬Å"It just worked for my voiceâ⬠¦ And there wasnââ¬â¢t anyone else doing it. Years have passed since T-Painââ¬â¢s first experiments with Auto-Tune, and much has changed since then. Since T-Painââ¬â¢s ââ¬Å"Rappa Ternt Sangaâ⬠debuted in 2005, he has had 12 singles in the top 10, dozens on award nominations, and serves as the inspiration behind much of the music of many artists we listen to and love today. While Kanye West was recording his hit album â⠬Ë808s and Heartbreakââ¬â¢ Kanye flew T-Pain to Hawaii to find out ways that Auto-Tune could be tweaked and manipulated to find new ways of singing. P Diddy offered T-Pain a percentage of the profits off of his next album if T-Pain would give him lessons on how to use Auto-Tune. T-Pain also says of Auto-Tune that ââ¬Å"â⬠¦You can use it to change the mood of a recordâ⬠. This is most prominent in Kanye Westââ¬â¢s ââ¬Å"808s and Heartbreakâ⬠, in which he uses the same Auto-Tune effect that T-Pain uses on his hit single ââ¬Å"Chopped N Skrewedâ⬠to produce a ghost-like and cold aura that branded the album as one of the yearââ¬â¢s best (www. time. com). Although T-Pain started Auto-Tuning his voice because nobody else was doing it and he wanted to sound different, nowadays it seems that just about everybody sounds the same. ââ¬Å"It used to make me sound differentâ⬠¦ Now I sound like everybody else againâ⬠said T-Pain (The New Tune). In response to the sudden explosion of artists that are using Auto-Tune, T-Pain said that people need to start paying him respect ââ¬â and paying him literally ââ¬â for their use of Auto-Tune. T-Pain said that other artists are ruining the use of Auto-Tune and that itââ¬â¢s basically over for them unless they start to pay up (www. mtv. com). While many people may criticize and ridicule the use of Auto-Tune and talk about how it is ââ¬Å"ruiningâ⬠the music industry by leading people to believe that recording artists are pitch-perfect, there is one thing that nobody can deny; it sells records. And there is nothing that musicians and artists want to do more than sell records. Auto-Tune was originally intended to help oil companies find out where oil reserves are save companies lots of money by not having to dig up the group looking for oil when they could find out just where the oil was. Over the course of time, that program evolved into one of the most prominent and recurring effects in the music industry. Although Auto-Tune has its benefits in the music industry, it also has its drawbacks as well. The British television show The X factor had a very controversial week in August when the producers of the show decided to Auto-Tune the voice of one of their contestants. Many people found this outrageous due to the fact that it was a singing competition and the voices of the people they would be paying to vote for were being altered (Blame Cher). This example directly relates to T-Pain because without T-Painââ¬â¢s use of Auto-Tune, the effect would never have been so popular and would never have been featured on a hit television show. The use of Auto-Tune represents many phonographic effects. The development of Auto-Tune is a direct result of recordability. Without the ability to record music, Auto-Tune would have never been developed and music today would not be what it is. Also, Auto-Tune is a clearly a result of the phonographic effect of manipulability due to its ability to obviously manipulate the way that music sounds T-Pain drastically changed the use of Auto-Tune in pop-culture by paving the way for other artists and taking a pitch-correcting program and turning it into a trademark for himself to be remember by for years to come. Works Cited Antares History. à Antares Audio Technologies. Web. 26 Oct. 2010. . Gleeson, Sinead. LexisNexisà ® Academic Library Solutions. à Business Solutions Software for Legal, Education and Government | LexisNexis. 25 Aug. 2010. Web. 26 Oct. 2010. . How Does Autotune Work. à How Does Autotune Work. Web. 26 Oct. 2010. . I Am T-Pain. Web. 26 Oct. 2010. . Reid, Shaheem. T-Pain Says Its Time For Everybody Else To Stop Using Auto-Tune Music, Celebrity, Artist News | MTV. à New Music Videos, Reality TV Shows, Celebrity News, Top Stories | MTV. 9 Nov. 2008. Web. 26 Oct. 2010. . Reid, Shaheem. T-Pain Says Its Time. à New Music Videos, Reality TV Shows, Celebrity News, Top Stories | MTV. 19 Nov. 2008. Web. 26 Oct. 2010. . Soeder, John. LexisNexisà ® Academic Library Solutions. à Business Solutions Software for Legal, Education and Government | LexisNexis. 30 Dec. 2008. Web. 26 Oct. 2010. . T-Pain Biography. à T-Pain Home | The Official T-Pain Site. Web. 26 Oct. 2010. . Tyrangiel, Josh. Auto-Tune: Why Pop Music Sounds Perfect TIME. à TIME. com. 5 Feb. 2009. Web. 26 Oct. 2010. .
Thursday, March 12, 2020
The impacts of glass cockpits on pilot performance The WritePass Journal
The impacts of glass cockpits on pilot performance 1 Introduction The impacts of glass cockpits on pilot performance 1 Introduction3.Semi-structured Interviews4à Research Sample4.1 Rationale for selection criteria4.2 Administration of the Research4.3 à Research Settingà 5. Research Analysis6. Concluding PointsRelated 1 Introduction This study aims to assess the impacts of glass cockpits on pilot performance as perceived by respondents drawn from pilots currently flying these aircraft. The objective of this study include the identification of: i) pilots perceptions regarding the effect of glass cockpits on their performance; ii) the safety aspects derived from these perceptions; iii) the effect of pilot performance on aircraft safety; iv) the human factors affected by glass cockpits; v) the migration by airlines and manufacturers to glass cockpits; and vi) the human performance perspective of the advantages and disadvantages of the use of glass cockpits. Chapters one and two introduced existing literature and previous research undertaken in relation to the impact of glass cockpits on pilot performance with a particular focus on the aforementioned objectives. This methodology chapter explains each stage of the research, data collection and analysis undertaken in conducting the research. 2à Qualitative Research When undertaking research, there are two main research possibilities ââ¬â quantitative and qualitative. Louis (1981) describes them as both excellent ways of tackling research effectively. He distinguishes between the two by naming quantitative as ââ¬Å"inquiry from the outsideâ⬠and qualitative as ââ¬Å"inquiry from the insideâ⬠. By this, Louis is referring to the researchers involvement and immersion within the data collection ââ¬â the ââ¬Å"insideâ⬠approach involves the researcher more, often leaving a potential hazard of bias. Whereas the ââ¬Å"outsideâ⬠approach enables the researcher to isolate the phenomenon of bias because of the lack of feedback associated with quantitative research. Qualitative research is often used as ââ¬Å"a form of systematic empirical inquiry into meaningâ⬠(Shank, 2002, p. 5) ââ¬â it is useful for those wishing to complete research in a methodical, ordered and planned way. Authors (Bryman et al 1988; Punch, 1998; Maykut and Morehouse, 1994) all describe qualitative research as a valued method of collecting a bettered, in-depth range of data. However, with the advantage of enriched data comes the disadvantage of researcher bias. As qualitative research was chosen, the researcher had to identify and accept that certain areas of the data collection would be open to bias, either value or objective (Hussey and Hussey, 1997). Referring to Johnson (1994), ââ¬Å"the selection of the research method is a crucial element in the planning of an investigationâ⬠(p.174). Johnson also suggests that using a variety of research methods is beneficial to gaining an adequate understanding of the objective results ââ¬â as suggested in my research proposal. However, it became evident that my access to the great number of ââ¬Å"glass-cockpit-flying pilotsâ⬠needed to complete questionnaires successfully was limited. It was therefore decided that the best course of action was to select a qualitative approach, and to interview the pilots that met the selection criteria highlighted in the ââ¬Å"Research Approachâ⬠section of this methodology. 3.Semi-structured Interviews Kumar (2011) defines an interview as ââ¬Å"any person-to-person interaction, either face to face or otherwise, between two or more individuals with a specific purpose in mindâ⬠.à Reasons for employing an interview to collect data a numerous. Depending on the topic discussed, it is possible to obtain in-depth information by probing; an interviewer can often add to data collected not only by verbal means, but also by non-verbal reactions displayed by the interviewee; and, because the interviewer can alter the order / wordings of the questions, it is less likely that the interviewee can misunderstand the question. The author chose to utilise a semi-structured type interview as a hybrid of the two extremes ââ¬â unstructured and structured ââ¬â as this would give the best of both worlds. Although a structured interview would i) establish a good base for the interviewee to explain exactly what the author felt was needed,à ii) provide uniform information, in the form of the comparability of the data collected and iii) enable the interviewer to collect the data without having the necessary interview skills for an unstructured interview, this method was discarded as it was nearly impossible for the interviewer to probe new ideas formulated by the answers of the interviewee. For many of these reasons, also, the unstructured interview was, too, rejected. Referring to point iii), this existed as the main reason to not chose the unstructured type interview as this was the authors first attempt at an academic interview.à Thus a semi-structured, or hybrid data collection model was developed: an element of flexibility was permitted to enable interviewees to include relevant information pertinent to the topic in discussion (Patton, 1990; Bernard, 1988). In this respect, the researcher would include an interview guide ââ¬â as found in a structured interview. However, this was, as said, a guide: the interviewer and the interviewee were able to establish and discuss any points that came up in conversation, some of which were new to the interviewer or perhaps the interviewee. A predominately qualitative research approach was used throughout this study. In this respect, interviews were used as the data collection tool through which the current pilot perceptions of glass cockpits were identified. This method was selected because: It allowed flexibility to follow unexpected ideas during research and explore processes effectively; à It gave sensitivity to contextual factors; Also, the ability to study symbolic dimensions and social meaning; à increased opportunities: o to develop empirically supported new ideas and theories; o for in-depth and longitudinal explorations of leadership phenomena; and o for more relevance and interest for practitioners. -Bryman et al, 1988 Although it is arguable that a questionnaire would have suited this type of study, there were certain concerns with finding the multiple pilots needed to complete the surveys ââ¬â particularly given theà highà security status post September 11th. 4à Research Sample Consideration into finding the most applicable people for inclusion in this study was needed to ensure that the author chooses the candidates with the required information to achieve the objectives set for the study (Kumar, 2011). This strategy is useful to assess the pilot perceptions of glass-cockpits as, although much researcher has been conducted into glass cockpits, very little has been done into the perceptions of pilots regarding them. The population of this study consisted of 5 interviewees. Purposive sampling was used to identify the particular pilots needed for interview, the selection criteria included: Have flown a glass cockpit within the previous 6 months Have flown an analogue cockpits previously Willing to participate in the interview 4.1 Rationale for selection criteria Firstly, by defining ââ¬Å"previous 6 monthsâ⬠as recent, then we are able to understand that the interviewee must have recent experience in order to acknowledge the disadvantages and advantages of glass cockpits as experienced by them ââ¬â the longer it has been since the stimuli, the less effects the subject will retain in memory. The rationale for selecting the second criterion was simple: although this study is an exploritive study into glass cockpits, the interviewees must have experience with the older fashioned analogue type cockpits in order to have a valuable opinion regarding their own perceptions. The final criteria suggests that every pilots participation is critical to this study ââ¬â since the research involved potentially lengthy interviews, every interviewee would need to be willing to take the time to discuss the topic at hand (Chaffee, 1995). Advantages of performing interviews with an acquaintance are well documented by authors. Roger (1988) implies that social norms constrain strangers from interacting in a natural way and Coates (1996) adds thatà the presence of recording equipment, and peoples perceptions to it, is less obvious when dealing with a friend or group of friends ââ¬â ultimately, by interviewing pilots whomà were personally known the the researcher, it is possible to allow the interviewee to become more relaxed and less inclined to shy away from sensitive questions. After designing an interview, but before putting it into practice, there was a chance to try out my interview on a potential subject. This pilot study was a opportunity to develop the interview so that, in future interviews, any problems would be ironed out and questions could be arranged in an order that would suit a naturally flowing conversation. Hundley (2001) suggests that performing multiple pilot studies is advantageous to the researcher, however, due to time constraints only one pilot interview could be undertaken before it was necessary to move onto the actual interviews. That pilot study changed the order of questions within the interview, as well as a few question wordings to make it more logical and easier for the interviewees to understand. 4.2 Administration of the Research When beginning the interview stage of the project, a way of recording the conversations was necessary à this came in the form of a Dictaphone. This made the process of analysing results much simpler than having to take notes and understand them later. Of course, the participants were given full authority on whether or not they wanted the interview recorded ââ¬â obviously it was competentlyà explained to them that the interview was completely confidential via an interview confidentiality letter (appendix B). Where possible, the interviewees were given the questions via email (appendix C). The author decided to do this in the hopes that the interviewees would provide more concise and clearer answers. Arranging meetings with pilots was, at first thought, something of a given. However, the pilots whom the author thought were once suitable for interview declared that they had no prior, or very limited, experience with glass cockpits. It was up to me to find suitable alternatives. Luckily, the pilots who had no experience were able to refer me to their friends and colleagues who did have experience with glass cockpits ââ¬âà the author was able to arrange contact with them via email and telephone. Bennett (1994) discusses the options to improve the chances of the potential interviewees responding to my emails and calls. He states that, by explaining the following points, the interviewee will be more inclined to respond accordingly: Imparting the conviction that the investigation is a worthwhile piece of work and the investigator a competent person to carry it out; Explaining why the investigation seeks the co-operation of the persons or institutions being approached; Indicating the use to be made of the eventual research material. à à à à à à à Bennett (1994, p.174) 4.3 à Research Setting Interviews were planned to take place face to face, at a place convenient to both the interviewer and the interviewee. A suitable quiet environment was to be used, in most cases this was arranged in advance ââ¬â but some were very short notice so the choice of location was somewhat improvised. This is for the interviews that had taken place in person, but as discussed earlier email interviews had been arranged. Due to the nature ofà email, there was no way of enforcing the setting ââ¬â so it was left up to the interviewee to chose a suitable place to respond. I was the interviewer in all bar the two email interviews, it was therefore my duty to maintain the correct track throughout as well as to ensure the interviewees were giving suitable responses to questions. Two of my potential interviewees had requested, due to time-zone differences, that they complete the interview via email ââ¬â I was more than obliged to do so, so the interviews were sent to them along with appendix B (interview confidentiality letter). Unfortunately, there was no possible way of administrating the email respondents ââ¬â other than reading through their answers and responding to them with any queries. Each face to face interview lasted between 10 and 20 minutes and were conducted between February and March 2011. The email interviews were between 1000 and 1500 word long and were sent out during the beginning days of March for a expectant reply by the end of March. Other than the emails, no names were used during the interviews ââ¬â this left the researcher an option to code the names for the data analysis: Email interview 1, Interview 1 etc It was essential for the researcher to transcribe the interviews as soon as practicably possible as too not forget any non-verbal communications made, as discussed earlier. It is also for this reason that the researcher did not complete any more than one interview per day, or per transcribe. i.e. the researcher would only move onto another interview when the previous one was transcribed completely.à à To avoid recall error as defined by Kumar (2011): ââ¬Å"error that can be introduced in a response because of a respondents inability to recall correctly its various aspects when replyingâ⬠when possible, and if time permitted, interviewees were given the opportunity to examine the interview transcripts for conformation and approval. à 5. Research Analysis Kumars(2011) four step research analysis was adopted to efficiently summarise and analyse the data collected. The steps were identification of the main themes; assignment of codes for the main themes; responses to the main themes and; integration of themes and responses into the text. The first step involved carefully reading through the interviews collected by each interviewee, understanding the meaning that they communicate (the use of language to express themselves) and categorising the discovered broad themes. The second step uses coding to identify the amount of times, or how frequently, a certain phrase or wording has occurred and pursuing the more specific themes from these. Step 3 analyses the interview scripts collected and assigns certain responses and phrases under the themes chosen in step 2. Finally, the fourth step uses the responses that fall within different themes collected in step 3 and integrates them into the text of the dissertation. Blaxter et al (2006) suggested that most research could be affected by opinions, beliefsà and motivations of those involved ââ¬â it was essential for the undergoing researcher to remember this throughout this study because it had the possibility to bias results by means of altering the questions asked to accommodate preconceptions known by the researcher. 6. Concluding Points To summarise, this chapter has covered the beneficial aspects and disadvantages of qualitative research, semi-structured interviews and data analysis; how purposive sampling was engaged as a way of implementing assurance that interviewees could offer their perceptions of glass cockpits; andà the various limitations imposed onto the researcher, interviewees and ultimately, the study itself.
Tuesday, February 25, 2020
Trends In HR Technology Essay Example | Topics and Well Written Essays - 2500 words
Trends In HR Technology - Essay Example The benefits to the organization from efficiencies realized when employees change their own HRIS data and ââ¬Å"serve themselves,â⬠to more informed, effective decision making by managers support a transformation of HRââ¬â¢s role within the organization. The role will change from an essentially administrative function to a strategic business partnering function where HR personnel contribute to bottom-line results. HR self-service eliminates the non value- adding administrative tasks that can be handled automatically by the system. HR self-service are somewhat different for employees than for their managers. In all cases, however, the time, cost, and quality improvements enabled by a self-service HR adds value to the organization. Not only are HR department and HRIS administrative expenses sharply reduced, but employees and managers using a well designed self-service system spend ââ¬Å"less time doing moreâ⬠for themselves, their colleagues and the business.
Saturday, February 8, 2020
City Sustainability Essay Example | Topics and Well Written Essays - 2250 words
City Sustainability - Essay Example This research will begin with the statement that environmental conservation is the key to a successful life. Effective environmental management leads to a sustainable future. The biophysical environment experiences degradation due to population pressure and change in technology. Conserving the environment is the responsibility of every individual in the society. Environmental conservation encompasses education, legislation, and ethics. In most cases, these factors play an important role in influencing personal-level environment, national-level environmental decisions, and behaviors. Environmental conservation emphasizes on waste management strategies, recycling of used materials, and avoiding pollution. Sustainability has been a controversial and challenging issue to the government and the society. Despite the measures taken to conserve the environment, cases of environmental pollution and degradation still exist in the society. Rapid population growth has posed a major challenge in the conservation of the environment. Urban centers have been the main sites of rapid population growth thus facing problems in conserving the places. Cities as industrial areas depict most cases of pollution whether air pollution, water pollution, or even land pollution. Strategies have been each passing day innovated and invented to reduce cases of environmental pollution. The city authorities have been given a hard task of managing the ever-growing city areas.... Overcrowding in cities leads to water shortages, air pollution, land pollution, and mismanagement of the available natural resources. This leads to epidemic diseases that turn out to be the governmentââ¬â¢s responsibility. As the major places for income sources, it becomes hard for the government to control immigration of people to the city centers. Different people have different perceptions of life and thus different views on environmental conservation. Some people view environmental conservation as burden given unto them rather than an added advantage on their health and safety (Hyyppa, 2010:139). Environmental conservation has led to a decline in the countryââ¬â¢s economy as the government tries to reduces cases of environmental pollution and enhance sustainability. FACTORS THAT DETERMINE THE METHODS USED BY CITIES TO ADOPT SUSTAINABILITY Invention and innovation Through innovation and invention, the city council is able to improvise new machines that used in sustaining the city. Moreover, the technology used in a particular city determines the level of sustainability of the city. For efficient sustainability, the city ought to invent high technological machines that are environmental friendly rather than those that cause hazardous effects to the city. Responsibility Responsibility is a main factor of consideration when planning for environmental sustainability. In order to enhance a cityââ¬â¢s sustainability, the residents should take it as responsibility. The sustainability of any city requires devotion and concern. Lack of consciousness in maintaining the cityââ¬â¢s sustainability both for the present and future generation, it becomes hard and impossible to implement the measures required to make the city sustainable. Sustainability of
Thursday, January 30, 2020
Ecommerce in Bangladesh Essay Example for Free
Ecommerce in Bangladesh Essay 1. Introduction When Electronic commerce, commonly known as ecommerce, is the buying and selling of products or services over electronic systems such as the Internet and other computer networks. Electronic commerce draws on such technologies as electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the at least at one point in the transactions life-cycle, although it may encompass a wider range of technologies such as email, mobile devices and telephones as well. Electronic commerce is generally considered to be the sales aspect of ebusiness [1]. It also consists of the exchange of data to facilitate the financing and payment aspects of business transactions. E-commerce can be divided into: i. E-tailing or virtual storefronts on Web sites with online catalogs, sometimes gathered into a virtual mall ii. The gathering and use of demographic data through Web contacts iii. Electronic Data Interchange (EDI), the business-tobusiness exchange of data iv. E-mail and fax and their use as media for reaching prospects and established customers (for example, with newsletters) v. Business-to-business buying and selling vi. The security of business transactions The main areas of e-commerce are following: i. Business to Business (B2B) ii. Business to Consumer (B2C) iii. Business to Government (B2G) iv. Government to Business (G2B) 2. Objectives Our objectives are following: i. To define e-commerce and describe how it differs from ebusiness. ii. To identify and describe the unique features of ecommerce technology and discuss their business significance. iii. To describe the major types of e-commerce. iv. To discuss the origins and growth of e-commerce. v. To explain the evolution of e-commerce from its early years to today. vi. To identify the factors that will define the future of ecommerce. vii. To describe the major themes underlying the study of ecommerce. viii. To identify the major academic disciplines contributing to e-commerce and understand design of an e-commerce engine ix. To identify the opportunity and problem of e-commerce implementation in Bangladesh. x. To identify the future of e-commerce. Volume 2 Issue 2, February 2013 www.ijsr.net 150 International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 3. E-Commerce in Bangladesh In Bangladesh there is a limited application and use of B2C e-commerce .This field is not yet much developed in Bangladesh. There are many reasons behind it one simple reason this country is not so developed and most of its citizens are poor and uneducated. It is quit natural that there are few customers who is willing and can shop in internet. It will take years to be developed this sector in bd. The telecommunication infrastructure any country affect the Internet services directly, cause it is largely depended on it. In this chapter Define Need for e-commerce in Bangladesh, different sector in Bangladesh, overview of implementation stage of e-commerce in Bangladesh. And there is some problem such as: low internet speed, no payment gateway and internet range, and recommendation. 3.1 Need for E-commerce in Bangladesh With the increasing diffusion of ICTs, more specifically t he Internet, the global business community is rapidly moving towards Business-to-Business (B2B) e-commerce. The buyers/ importers gain a clear advantage when the Internet gives them access to the global market, by which they can compare prices across regions, find out whether prices vary by order fragmentation, get awareness about substitute/ alternative products. Consequently, the sellers/ exporters make sure that they are well portrayed in the cyber world through websites and portals. Like buyers, sellers also benefit from increased and more efficient access to the global market through the Internet. Bangladesh is pursuing an economic policy of export-led growth. With the rising forces of globalization, it is becoming increasingly important that the private sector, particularly the export sectors are well prepared to meet the requirements and expectations of the importers and also stand out in the competition against exporters in other countries. In such a scenario, two issues are becoming particularly important for Bangladeshi export sectors ââ¬âone, whether businesses are automating their internal processes with these of ICTs to become increasingly efficient and competitive in a global context, and two, whether businesses have effective presence and participation in the cyber world. International organizations such as UNCTAD (United Nations Center for Trade and Development) and WTO (World Trade Organization) [2] have, over the last several years, put much emphasis on the importance of e-commerce for developing countries. UNCTAD has special programs to facilitate developing countries to transition into e-commerce. The WTO has also develo ped rules and guidelines for global e-commerce transactions. 3.2 E-commerce in Different Sector in Bangladesh Despite being a under developed country, selected segments of the Bangladeshi business community has embraced technology with reasonable success. Personal computers and the Internet are also emerging as day-to-day business tools. These positive indicators are favoring the prospects of e-commerce in Bangladesh. i. RMG Sector ii. Banking on the Web (Online Banking) iii. Online Shopping iv. Web Hosting, Domain v. Online cards, gifts vi. Pay Bill 3.3 The Existing Situation and Potential of E-commerce in Bangladesh Internet services are presently available in Bangladesh. Its usage for e-commerce by the Bangladeshi producers to export as well as to access inputs will be dependent on their willingness and ability to use this medium as well as that of the buyers of final products and the sellers of intermediate goods and services. Figure 1 depicts the three dimensions of e-commerce. Business to-Consumers (B2C) e-commerce is practically non-existent within Bangladesh, while a very limited level of Business-to-Business (B2B) and Businessto-Government (B2G) transactions exists [3]. The potential for use of e-commerce by Bangladeshi consumers and businesses with foreign firms is much brighter, and can play an important role in boosting the countryââ¬â¢s exports. A significant volume of B2G is also possible, as the government remains the biggest spender. Figure 1. The Three Dimensions of E-commerce 3.4 E-commerce growth in Bangladesh E-commerce growth in Bangladesh shown in figure 3.2 in the year of 2000 e-commerce business is 11440 million taka. In the years of 2001 business of e-commerce is 15840 million taka and increase year by year 2002 business is 18980 million taka 2002 to 2004 businesses is not very fast but in the year of 2005 business of e-commerce is 22480 and end the year of 2006 business of e-commerce growth is 252000 million taka. Figure 2. E-commerce growth in Bangladesh 4. Methodologies The methodologies of our survey are given below: 4.1 Identification of scope of study 151 Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 To accomplish the project objectives, a systematic process is followed. The project process begins with the identification of the project topic where studies was carried out to obtain enough information on the topic. 4.2 Group discussions to collect suggestions on the survey of e-commerce system Discuss with group member about the topic and collect their suggestions on this topic. Also discuss impacts of ecommerce in our society and business and barriers ecommerce in different sectors in Bangladesh and the future of e-commerce system. 4.3 E-commerce site visits as clients Some e-commerce websites visits were made as clients. We visited websites like www.ebay.com, browsed many products, added product to shopping cart, created user account and observed the check out process. We also examined their user interface, front end design and various category of product. We searched products by different types, t he product names and the company name. 4.4 Internet search to collect data on e-commerce growth world wide We searched the internet to collect data on e-commerce business growth based on time, data on e-commerce revenue based on geographic locations. We also collected data about e-commerce business growth and present situation of ecommerce in Bangladesh. 4.5 Architecture and code review of e-commerce site We reviewed the main technologies involved in ecommerce site, which include php sessions, catalog technology, server technology (hardware and software). We also reviewed credit card transaction and shopping cart checkout process. 4.6 Interviews to find what people think about ecommerce We interviewed people from various sections of the society to find out what they think about e-commerce and what changes they needed. We also discussed with them what the advantages and disadvantages of e-commerce systems are. 4.7 Introducing intentional change to understand ecommerce engine We downloaded e-commerce site code and changed the catalog of product, banner, product detail, product image, and increase and decrease number of product show in the main page also changed the theme of e-commerce site. We entered new products and removed selling product and updated the products. 5.1 Architecture This is the design of front-end design shown in Figure 3. There is a one home page, wish list, acco unt, shopping cart, and product list and checkout option. Figure 3. E-commerce site front end design 5.2 Database Structure 5.2.1 E-R Diagram A sample entityââ¬ârelationship diagram using Chens notation is shown in Figure 4. 5. Technical Design of E-Commerce Site The technical design of e-commerce site include database structure, database schema, table structure, php session, shopping cart, e-r diagram, and credit card transaction. Figure 4. A sample entityââ¬ârelationship diagram using Chens notation In software engineering, an entityââ¬ârelationship model (ER model for short) is an abstract [4] and conceptual representation of data. Entityââ¬ârelationship modeling is a database modeling method, used to produce a type of conceptual schema or semantic data model of a system, often 152 Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 a relational database, and its requirements in a top-down fashion. Diagrams created by this process are called entityââ¬â relationship diagrams or ER diagrams. Using the three schema approach to software engineering, there are three levels of ER models that may be developed. The conceptual data model is the highest level ER model in that it contains the least granular detail but establishes the overall scope of what is to be included within the model set. The conceptual ER model normally defines master reference data entities that are commonly used by the organization. Developing an enterprise-wide conceptual ER model is useful to support documenting the data architecture for an organization. A conceptual ER model may be used as the foundation for one or more logical data models. The purpose of the conceptual ER model is then to establish structural metadata commonality for the master data entities between the set of logical ER models. The conceptual data model may be used to form commonality relationships between ER models as a basis for data m odel integration. A logical ER model does not require a conceptual ER model especially if the scope of the logical ER model is to develop a single disparate information system. The logical ER model contains more detail than the conceptual ER model. In addition to master data entities, operational and transactional data entities are now defined [5]. The details of each data entity are developed and the entity relationships between these data entities are established. The logical ER model is however developed independent of technology into which it will be implemented. One or more physical ER models may be developed from each logical ER model. The physical ER model is normally developed be instantiated as a database. Therefore, each physical ER model must contain enough detail to produce a database and each physical ER model is technology dependent since each database management system is somewhat different. The physical model is normally forward engineered to instantiate the structur al metadata into a database management system as relational database objects such as database tables, database indexes such as unique key indexes, and database constraints such as a foreign key constraint or a commonality constraint. The ER model is also normally used to design modifications to the relational database objects and to maintain the structural metadata of the database. The first stage of information system design uses these models during the requirements analysis to describe information needs or the type of information that is to be stored in a database. The data modeling technique can be used to describe any ontology (i.e. an overview and classifications of used terms and their relationships) for a certain area of interest. In the case of the design of an information system that is based on a database, the conceptual data model is, at a later stage (usually called logical design), mapped to a logical data model, such as the relational model; this in turn is mapped to a physical model during physical design. 5.2.2 The Building Blocks: Entities, Relationships, and Attributes The building blocks: entities, relationships, and attributes as shown in Figure 5, first here two related entities then an entity with an attribute next in this figure a relationship with and attribute and finally see primary key. Figure 5. The building blocks: entities, relationships, and attributes An entity may be defined as a thing which is recognized as being capable of an independent existence and which can be uniquely identified. An entity is an abstraction from the complexities of some domain. When we speak of an entity we normally speak of some aspect of the real world which can be distinguished from other aspects of the real world. An entity may be a physical object such as a house or a car, an event such as a house sale or a car service, or a concept such as a customer transaction or order. Although the term entity is the one most commonly used, following Chen we should really distinguish between an entity and an entity-type. An entity-type is a category. An entity, strictly speaking, is an instance of a given entity-type. There are usually many instances of an entity-type. Because the term entity-type is somewhat cumbersome, most people tend to use the term entity as a synonym for this term. Entiti es can be thought of as nouns. Examples: a computer, an employee, a song, a mathematical theorem. A relationship captures how entities are related to one another. Relationships can be thought of as verbs, linking two or more nouns. Examples: owns relationship between a company and a computer, supervises relationship between an employee and a department [6], performs relationship between an artist and a song, a proved relationship between a mathematician and a theorem. The models linguistic aspect described above is utilized in Volume 2 Issue 2, February 2013 www.ijsr.net 153 International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 the declarative database query language ERROL, which mimics natural language, constructs. ERROLs semantics and implementation are based on Reshaped relational algebra (RRA), a relational algebra which is adapted to the entityââ¬ârelationship model and captures its linguistic aspect. Entities and relationships can both have attributes. Examples: an employee entity might have a Social Security Number (SSN) attribute; the proved relationship may have a date attribute. Every entity (unless it is a weak entity) must have a minimal set of uniquely identifying attributes, which is called the entitys primary key. Entityââ¬ârelationship diagrams dont show single entities or single instances of relations. Rather, they show entity sets and relationship sets. Example: a particular song is an entity. The collection of all songs in a database is an entity set. The eaten relationship between a child and her l unch is a single relationship. The set of all such child-lunch relationships in a database is a relationship set. In other words, a relationship set corresponds to a relation in mathematics, while a relationship corresponds to a member of the relation. 5.2.3Relationships, Roles and Cardinalities In Chens original paper he gives an example of a relationship and its roles. He describes a relationship marriage and its two roles husband and wife. A person plays the role of husband in a marriage (relationship) and another person plays the role of wife in the (same) marriage. These words are nouns. That is no surprise; naming things requires a noun. However as is quite usual with new ideas, many eagerly appropriated the new terminology but then applied it to their own old ideas. Thus the lines, arrows and crows-feet of their diagrams owed more to the earlier Bachman diagrams than to Chens relationship diamonds. And they similarly misunderstood other important concepts. In particular, it b ecame fashionable (now almost to the point of exclusivity) to name relationships and roles as verbs or phrases. 5.2.4 Limitations ER models assume information content that can readily be represented in a relational database. They describe only a relational structure for this information. Hence, they are inadequate for systems in which the information cannot readily be represented in relational form, such as with semistructured data. Furthermore, for many systems, the possible changes to the information contained are nontrivial and important enough to warrant explicit specification. Some authors have extended ER modeling with constructs to represent change, an approach supported by the original author; an example is Anchor Modeling. An alternative is to model change separately, using a process modeling technique. Additional techniques can be used for other aspects of systems. For instance, ER models roughly Figure 6. E-R modeling 5.3 Table Structure In relational databases and flat file databases, a table is a set of data elements (values) that is organized using a model of vertical columns (which are identified by their name) and horizontal rows, the cell being the unit where a row and column intersect. A table has a specified number of columns, but can have any number of rows each row is identified by the values appearing in a particular column subset which has been identified as a unique key index. Table is another term for relations; although there is the difference in that a table is usually a multi-set (bag) of rows whereas a relation is a set and does not allow duplicates. Besides the actual data rows, tables generally have associated with them some meta-information, such as constraints on the table or on the values within particular columns. The data in a table does not have to be physically stored in the database. Views are also relational tables, but 154 correspond to just 1 of the 14 different modeling techniques offered by UML. Another limitation: ER modeling is aimed at specifying information from scratch. This suits the design of new, standalone information systems, but is of less help in integrating pre-existing information sources that already define their own data representations in detail. Even where it is suitable in principle, ER modeling is rarely used as a separate activity. One reason for this is todays abundance of tools to support diagramming and other design support directly on relational database management systems. These tools can readily extract database diagrams that are very close to ER diagrams from existing databases, and they provide alternative views on the information contained in such diagrams. In a survey, Brodie [7] and Liu could not find a single instance of entityââ¬ârelationship modeling inside a sample of ten Fortune 100 companies. Badia and Lemire blame this lack of use on the lack of guidance but also on the lack of benefits, such as lack of support for data integration. Also, the enhanced entityââ¬ârelationship model (EER modeling) introduces several concepts which are not present in ER modeling. ER modeling as shown in Figure 6. Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 their data are calculated at query time. Another example is nicknames, which represent a pointer to a table in another database. 5.4 Database Schema A database schema of a database system is its structure described in a formal language supported by the database management system (DBMS) and refers to the organization of data to create a blueprint of how a database will be constructed (divided into database tables). The formal definition of database schema is a set of formulas (sentences) called integrity constraints imposed on a database. These integrity constraints ensure compatibility between parts of the schema. All constraints are expressible in the same language. A database can be considered a structure in realization of the database language. The states of a created conceptual schema are transformed into an explicit mapping, the database schema. This describes how real world entities are modeled i n the database. A database schema specifies, based on the database administrators knowledge of possible applications, the facts that can enter the database, or those of interest to the possible end-users. The notion of a database schema plays the same role as the notion of theory in predicate calculus. A model of this ââ¬Å"theoryâ⬠closely corresponds to a database, which can be seen at any instant of time as a mathematical object. Thus a schema can contain formulas representing integrity constraints specifically for an application and the constraints specifically for a type of database, all expressed in the same database language. In a relational database [8], the schema defines the tables, fields, relationships, views, indexes, packages, procedures, functions, queues, triggers, types, sequences, materialized views, synonyms, database links, directories, Java, XML schemas, and other elements. Schemas are generally stored in a data dictionary. Although a schema is defined in text database language, the term is often used to refer to a graphical depiction of the database structure. In other words, schema is the structure of the database that defines the objects in the database. In an Oracle Database system, the term schema has a slightly different connotation. For the interpretation used in an Oracle Database, see schema object. 5.5 Levels of Database Schema A conceptual schema or conceptual data model is a map of concepts and their relationships. This describes the semantics of an organization and represents a series of assertions about its nature. Specifically, it describes the things of significance to an organization (entity classes), about which it is inclined to collect information, and characteristics of (attributes) and associations between pairs of those things of significance (relationships). Figure 7. Conceptual schema or conceptual data model A logical schema is an alias that allows a unique name to be given to all the physical schemas containing the same data store structures. The aim of the logical schema is to ensure the portability of the procedures and models on the different physical schemas. In this way, all developments in Designer are carried out exclusively on logical schemas. A logical schema can have one or more physical implementations on separate physical schemas, but they must be based on data servers of the same technology. A logical schema is always directly linked to a technology. To be usable, a logical schema must be declared in a context. Declaring a logical schema in a context consists of indicating which physical schema corresponds to the alias logical schema for this context. For example: The logical schema LEDGER is the set of Sybase tables required for the functioning of the accounting application. These tables are stored in a physical schema for each installation of the accounting application. Work in Designer or Operator is always done on the logical schema LEDGER. Only the context allows the physical schema on which the operations are actually done to be determined. Thus, the user can switch from one physical environment to another in a single action. A logical schemaââ¬â¢s example is shown in figure 8. Table 1: Name of the logical schema Name of the logical schema LEDGER LEDGER LEDGER Context Boston Seattle Production Seattle Test Physical Schema Sybase Boston LDG Sybase SEATTLE PROD LDG Sybase SEATTLE TEST LDG Volume 2 Issue 2, February 2013 www.ijsr.net 155 International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 This article discusses the Oracle use of the term. For other uses of schema in a database context, such as a graphical representation of tables and other objects in a database, see database schema. In an Oracle database, associated with each database user is a schema. A schema comprises a collection of schema objects. Examples of schema objects include: tables, views, sequences, synonyms, indexes, clusters, database links, snapshots, procedures, functions and packages. Figure 8. Logical schemas Physical schema is a term used in data management to describe how data is to be represented and stored (files, indices, et al.) in secondary storage using a particular database management system (DBMS) (e.g., Oracle RDBMS, Sybase SQL Server, etc.). The logical schema was the way data were represented to conform to the constraints of a particular approach to database management. At that time the choices were hierarchical and network. Describing the logical schema, however, still did not describe how physically data would be stored on disk drives. That is the domain of the physical schema. Now logical schemas describe data in terms of relational tables and columns, object-oriented classes, and XML tags. A single set of tables, for example, can be implemented in numerous ways, up to and including an architecture where table rows are maintained on computers in different countries. Figure 10. Schema objects 5.6 Php Sessions A PHP session variable is used to store information about, or change settings for a user session. Session variables hold information about one single user, and are available to all pages in one application [9]. When you are working with an application, you open it, do some changes and then you close it. This is much like a Session. The computer knows who you are. It knows when you start the application and when you end. But on the internet there is one problem: the web server does not know who you are and what you do because the HTTP address doesnt maintain state. A PHP session solves this problem by allowing you to store user information on the server for later use (i.e. username, shopping items, etc). However, session information is temporary and will be deleted after the user has left the website. If you need a permanent storage you may want to store the data in a database. Sessions work by creating a unique id (UID) for each visitor and store variables based on this UID. The UID is either stored in a cookie or is propagated in the URL. In PHP, sessions can keep track of authenticated in users. They are an essential building block in todays websites with big communities and a lot of user activity. Without sessions, everyone would be an anonymous visitor. In system terms, PHP sessions are little files, stored on the servers disk. But on high traffic sites, the disk I/O involved, and not being able to share sessions between multiple web servers make this default system far from ideal. This is how to enhance PHP session managem ent in terms of performance and share ability. If you have multiple web servers all serving the same site, sessions should be shared among those servers, and not 156 Figure 9. Physical schema In Database lore, a schema object is a logical data storage structure. This possibly originates from the use of the term in the context of Oracle databases. The term schema can have other meanings when talking about non-Oracle databases. Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 reside on each servers individual disk. Because once a user gets load-balanced to a different server, the session cannot be found, effectively logging the user out. A common way around this is to use custom session handlers. 5.7 Shopping Card A shopping cart is a software application that typically runs on the computer where your Web site is located (the Web server), and allows your customers to do things such as searching for a product in your store catalog, adding a selected product to a basket, and placing an order for it. The shopping cart integrates with the rest of your Web site. In other words, there are typically links on your Web pages that customers can click on, and which allow them to perform some of the functions described above. For example, many e-commerce Web sites have a search link appearing on every Web page, as part of the navigation area Shopping carts are written in a variety of different programming languages. Some of them provide full access to the source code, thus allowing experienced programmers to make modifications to the system features, some others dont. Some shopping carts run on Windows Web servers, some on Unix, others on both. In most cases, you can place the shopping cart on your Web server simply by transferring its files there using any FTP [10] software, where FTP stands for File Transfer Protocol. For example, our shopping cart software called Product Card is a collection of files written in a programming language called Classic ASP, and that you host on a Windows server. Experienced programmers can customize the system as they wish as the source code is included. iii. Merchant runs credit card through the point of sale unit. The amount of the sale is either hand-entered or transmitted by the cash register. iv. Merchant transmits the credit card data and sales amount with a request for authorization of the sale to their acquiring bank. . v. The acquiring bank that processes the transaction, routes the authorization request to the card-issuing bank. The credit card number identifies type of card, issuing bank, and the cardholders account. vi. If the cardholder has enough credit in their account to cover the sale, the issuing bank authorizes the transaction and generates an authorization code. This code is sent back to the acquiring bank. vii. The acquiring bank processing the transaction, and then sends the approval or denial code to the merchants point of sale unit. Each point of sale device has a separate terminal ID for credit card processors to be able to route data back to that particular unit. viii. A sale draft, or slip, is printed out by the point of sale unit or cash register. The merchant asks the buyer to sign the sale draft, which obligates them to reimburse the cardissuing bank for the amount of the sale. ix. At a later time, probably that night when the store is closing up, the merchant reviews all the auth orizations stored in the point of sale unit against the signed sales drafts. When all the credit card authorizations have been verified to match the actual sales drafts, the merchant will capture, or transmit, the data on each authorized credit card transaction to the acquiring bank for deposit. This is in lieu of depositing the actual signed paper drafts with the bank. x. The acquiring bank performs what is called an interchange for each sales draft, with the appropriate card-issuing bank. The card-issuing bank transfers the amount of the sales draft, minus an interchange fee to the acquiring bank. xi. The acquiring bank then deposits the amount of the all the sales drafts submitted by the merchant, less a discount fee, into the merchants bank account. Credit card transaction is shown in Figure 12. Figure 11. Google Checkout shopping cart 5.8 Credit Card Transaction From the information presented in the preceding sections, we can start to piece together what is occurring during a credit card transaction. We know that merchants have a relationship with either an acquiring bank or independent sales organization, through which they have their credit card transactions processed. The section on industry terminology shows us some of the fees involved in this process. Merchants must pay the acquiring bank or ISO a discount fee based on the total amount of the sale. Likewise, the acquiring bank or ISO must pay the card issuer an interchange fee when they process the sales draft from the merchant. Steps involved in a normal credit card transaction: i. Merchant calculates the amount of purchase and asks buyer for payment ii. Buyer presents merchant with a credit card. Figure 12. Credit card transaction 6. Conclusion Electronic commerce or e-commerce is a term for any type of business, or commercial transaction that involves the transfer of information across the Internet. It is currently one of the most important aspects of the Internet to emerge. E157 Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 commerce has grown tremendously worldwide. In the future e-commerce may become totally mobile based. In Bangladesh E-commerce also become a very powerful business mechanism but Bangladesh will have to overcome the problems with poor network connectivity and electronic payment issues. The problems identified in this Project are: Security problem, Confusing checkout process, Customers canââ¬â¢t find products, Customers canââ¬â¢t touch and fell a product, No sales staff means any chance of up-selling, Language barrier. Regarding the identified problems the following solutions have been proposed: Merchant needs to ensure the platform employs strong encryption for payment processing and customer data retention. E-commerce platform should always have a visible running total of purchases prominently displayed during the customer experience. E-commerce platform must support the ability to present the customer with nested categories as well as a search box. An e-commerce platform should also support the ability to attach multiple pictures to a product catalog page, allowing the consumer to view the product from multiple angles. E-commerce platform needs to be able to associate products with related and complimentary products. The system should allow all tran slation to be done centrally. My M.Sc Engg. in CSE is running at Bangladesh University of Engineering and Technology (BUET), Dhaka-1000, Bangladesh. My research interest areas are the image processing, Computer Networks, Computer Networks and Data Security, Compiler, Theory of Computations, etc. My several papers Published in International Journals. Muhammad Golam Kibria, Assistant Professor and Head, Department of CSE, University of Information Technology Sciences, Dhaka, Bangladesh. I completed Masters in Mobile Computing and Communication from the University of Greenwich, London, UK. My research interests are Computer Network Security and image processing, Sensor, Robotics and Wireless Sensor Network. Mohammad Nuruzzaman Bhuiyan is working as a Lecturer at the Department of CSE IT, University of Information Technology Sciences (UITS), Baridhara, Dhaka-1212.Bangladesh. I have completed my B.Sc Engg. and M.Sc Engg. in CS from The University of Sheffield, Western Bank, Sheffield S10 2TN, UK. My research interest areas are Fundamental of Computer, Web technology, Computer Networks, Computer Networks and Data Security, Theory of Computations, etc. My several papers accepted in International Journals. References [1] http://en.wikipedia.org/wiki/Electronic_commerce [2] Tkacz, Ewaryst; Kapczynski, Adrian (2009), Springer, P. 255 [3] Online Today, The Electronic Mall. CIS/compuserve nostalgia. Http://www.gsbrown.org/compuserve/electronic-mall1984-04/. [4] http://www.marketwatch.com/story/amazon-buysdiaperscom-parent-in-545-mln-deal-2010-11-08/. [5] http://techcrunch.com/2011/03/28/ebay-to-acquire-gsicommerce-for-2-4-billion [6] Miller, Holmes E. And Engemann, Kurt J. (1996); A methodology for managing information-based risk; Information Resources Management Journal; 9:2; 17-24 [7] http://www.e-consultancy.com/news blog/363726/whydo-customers-abandon-the-Checkoutprocess.htmlcopyright 2008 Voloper Creations Inc. 7 [8] http://www.articlesbase.com/e-commercearticles/impacts-of-e-commerce-on-business1882952.html [9] http://www.startupsmart.com.au/mentor/michaelfox/2011-02-03 Authors Profile Md. Akbor Hossain received the B.Sc degrees in CSE University of Information Technology and Sciences (UITS), Baridhara, Dhaka-1212, Bangladesh. I am working as a Lab Demonstrator at the Department of CSE IT, University of Information Technology Sciences (UITS), Baridhara, Dhaka-1212, Bangladesh. *Md. Akkas Ali is working as a Lecturer at the Department of CSE IT, University of Information Technology Sciences (UITS), Baridhara, Dhaka1212, Bangladesh. I completed my B.Sc Engg. in CSE from Chittagong University of Engineering and Technology (CUET), Chittagong-4349, Bangladesh. Volume 2 Issue 2, February 2013 www.ijsr.net
Subscribe to:
Posts (Atom)