Monday, September 30, 2019

10 Ways to Reduce Your Environmental Footprint Essay

10 ways to reduce your environmental footprint and improve profitability. Posted by Sam Kopytowski [->0]at 7:08 AM[->1] on July 7, 2010 Many companies talk about reducing greenhouse gas (GHG) emissions, but too often there’s a large gap between words and action. Most companies seem to be holding off on taking any real steps to reduce their environmental footprint because they believe the investment cost is too high. See more: Examples of satire in adventures of huckfinn essay Leading companies, on the other hand, are way ahead of the curve. They know that being proactive on the environment provides risk mitigation benefits. Why? Because they see that government legislation may soon be brought in to regulate CO2 emissions. They understand that external shocks such as wars, terrorist attacks, natural disasters, and pandemic outbreaks can have enormous impacts on supply chains and energy supply. They recognize that oil prices can only move upward. They believe that good corporate citizenship attracts investors and employees. And they see environment sensitivity as a way to differentiate themselves. GHG emission reductions must be tackled the same way you achieve safety in the workplace. You need to implement a strategic plan and stick to it. Greening a company requires commitment and support from the leadership team. Businesses need champions to lead their environmental initiatives†¦ and logisticians may be the best people for the job. Not only are they involved in sourcing, but they make the critical transportation decisions that will contribute to the greening of the company. Here are just some of the considerations they have to weigh: 1) Sourcing well – preferably as close as possible to the customer. We consistently examine the trade-off between cost of goods and transportation. However minimizing long-term costs may require us to consider other factors. What about flexibility – the ability to react quickly to market changes? What about consumer preferences? Ultimately if off-shore sourcing is the best option, the most energy-efficient transportation will be necessary. That might mean ocean freight rather than air freight – and this will require a thorough understanding of lead time. 2) Making domestic transportation decisions with a clear understanding of the benefits of rail versus truck, and what intermodal shipping makes most sense for the company. And, once again, this means understanding lead time and communicating time constraints to the customer. 3) Finding environmental programs like Fleet Smart/Smartway which certify leading edge trucking companies. Leading shippers are now incorporating this requirement into the Request for Proposals. 4) Sourcing energy-efficient equipment and a transportation management system that will optimize fleet routing and scheduling. Driver training will also have a huge impact in reducing GHG emissions. According to Claude Robert of Robert Transport, there’s a 35% reduction in the fuel consumption by the best drivers, compared to the worst. 5) Eliminating idling trucks at the shipping dock. Monitoring of idling engines can be done while checking that the wheels are chocked. 6) Using electric forklifts to load vehicles rather than propane or diesel. 7) Taking advantage of collaborative transportation. As discussed in this column last year, cooperation with other companies, even competing ones, needs to gain greater acceptance as a means to cut costs. It benefits everyone. 8) Converting large trucks to natural gas. Yes, capital costs are higher but, in the long run, there are tremendous fuel savings to be enjoyed while reducing harmful emissions. 9) Reducing packaging wherever possible. You’ll increase the density of your shipments, put more product on the vehicle, and reduce freight rates. 10) Reducing paper flow. Embrace the electronic transfer of information. It reduces costs both in supplies and labour. These are just a few ways that logisticians can green the supply chain. Most important is to take a baseline of where you are today and track your progress. I’m sure you’ll find that environmentally friendly business practices definitely improve profitability. Remember, as PricewaterhouseCoopers points out in its Transportation & Logistics, 2030 study, â€Å"He who focuses on carbon footprinting is stepping on the right foot.† Source: http://wwwxcdlogistics.blogspot.com/2010/07/10-ways-to-reduce-your-environmental.html [->0] – http://www.blogger.com/profile/08905558298613954753 [->1] – http://wwwxcdlogistics.blogspot.com/2010/07/10-ways-to-reduce-your-environmental.html

Sunday, September 29, 2019

Combining Vinegar and Baking Soda- Lab Report

The second trial displayed similar results of a weak presence of carbon dioxide. The solution bubbled up, the cork stayed stationary in the top of the bottle, but the solid did not dissolve completely. A third trial was performed in which we decided to increase the amount of vinegar used. The indicator which triggered this decision was the resulting solid at the bottom of vessel. In the third trial we kept the baking soda our constant at % TTS. ND deed 2 ounces of vinegar. The results remained similar to trial two. The solution bubbled, the cork remained stationary In the top of the bottle, and there remained solid In the bottom of the vessel. A fourth trial was performed In which we again Increased the amount of vinegar added to dissolve the solid. In the fourth trial we kept the baking soda our constant at % TTS. And added 3 ounces of vinegar. The results Improved slightly as we saw that, although the cork remained stationary, the solution bubbled substantially higher In the bottle displaying a stronger presence of arbor dioxide.It was also noted that the solid that remained was much less than In past trials. A fifth trial was performed in which we again increased the amount of vinegar added to dissolve the solid. In the fifth trial we kept the baking soda our constant at TTS. And added 4 ounces of vinegar. The results dramatically changed. The solution bubbled almost immediately and so quickly that the solution overflowed that there was more than enough baking soda, there may have been too much vinegar added and that the technique of the pour may have been too slow or the exults may have been different.A sixth and final trial was done in which we kept the baking soda our constant at % TTS. And reduced the amount of vinegar poured to approximately 3 h ounces. The pour was done more quickly and the bubbling reaction took place almost immediately. The cork was placed in the bottle after the overflowing had started to occur so the reaction of the cork popping st ill was not quite achieved, however the last trial did show a large amount of carbon dioxide present. The data from each trial is recorded in the table below on the following page.In order to study he reaction we created trials which would allow the chemicals to combine within a vessel. The movement or lack of movement from the cork allowed us to measure the amount of carbon dioxide present in each experiment. My results showed the trial with the greatest reaction was the final trial because the solution bubbled almost more than the other trials. If the cork had been placed inside of the bottle quicker or if the pour had been slightly slower the cork would have popped with stronger force.The trial with the least reaction was trial one because the solution bubbled the least wowing a weak presence of carbon dioxide, the solid dissolved completely and the cork remained completely stationary showing there was very little pressure within the vessel. While observing the experiment, I noti ced that the more vinegar added and the quicker the pour the greater the reaction and the more the solution bubbled. In order to further investigate the experiment, next time I would try the experiment utilizing only one student performing the pour to keep consistency of the control of the pour and the pressure being applied to the cork.

Saturday, September 28, 2019

What are global imbalances Did they cause the 2008 crisis Essay

What are global imbalances Did they cause the 2008 crisis - Essay Example Some researchers note that the global imbalances did play a critical role in the 2008 crisis. On the other hand, other researchers note that the global imbalances had little to do with the 2008 crisis. In essence, the economic research paper seeks to demonstrate that global imbalances did not cause the 2008 crisis. It is noteworthy that there were global imbalances between the U.S economy (deficit nation or country) and the Southeast Asian and oil-exporting, as well as European nations (Superavit nations). In the course of understanding the connection between the global imbalances and the 2008 crisis, it is ideal to note the influence of the other economies on the economy of the U.S. In the first instance, it is critical to note that the current surpluses were available in the U.S. financial markets (Caballero et al., 2009). The outcome of the current surpluses was evident in the pushing down of the long-term interest rates, thus the potentiality and ability to promote, as well as engage a credit boom and the real estate bubble. Moreover, there was substantial or significant increase in the risks of the size of the economy involved in the global imbalances, as a sever correction could have had negative implications for the global economy. In the process of evaluating this relationship between global imbalances and the financial crisis, it is critical to assess the implications of two pre-crisis perspectives (Dooley, Folkerts†Landau, & Garber, 2009). First, it is ideal to concentrate on the assessment of the new paradigm. According to this perception, global imbalances provide a new type of global equilibrium which could undergo substantive maintenance over time without necessarily ending in crisis. One of the approaches towards maintenance of the global equilibrium was saving glut rather than the implementation of any policy intervention (Nier

Friday, September 27, 2019

Toward Delivery of effective mobile government Coursework

Toward Delivery of effective mobile government - Coursework Example In Oman people can apply for jobs via SMS and at the same time the government can update its citizens and provide other services through the SMS. However, the success implementation of this program depends not only on the government support but also to the citizen’s willingness to accept and adopt the mobile government services. For that case it is important to note and understand the factors contributing to mobile government rather than traditional service delivery methods. In previous researches, adoption of the mobile government has determinants such as usefulness, ease of use, perceived risk, trustworthiness, compatibility, external influence, relative advantage, image and facilitating conditions (Dillon & Morris, 1996, pp.2-15). On the other hand, citizens are also influenced by certain factors for easy acceptability of the program. These factors include citizen’s trust, culture and gender difference. ... GCC was formed in 1981 to develop, coordinate, integrate, and interconnect the member states in all aspects and at the same time strengthen ties among its people (Dillon & Morris, 1996, pp.2-15). Because of the availability of oil resources in the region, the GCC of that particular region was considered to be the richest worldwide by the GCC Statistical Department in the year 2005 that estimated Gross Domestic Product of US$ 324.36 billion. According to the 2004 census by the Ministry of National Economy, Oman had a population of 2.34 million people with a growth rate of 2 percent and a density of 7.6 persons per square kilometre. In 2003, the illiteracy level of the Omani population was 17.8 percent as compared to the 31.8 percent in 1993 meaning that the country has greatly invested in education in the past few years. This is important in the sense that for smooth implementation of the mobile government, it requires citizens with reasonable level of education and income. The statis tics show that 5.9 percent of the population does hold post-secondary education qualifications hence it is easier to evaluate the population that could easily adapt to the mobile government. The Oman government had a vision 2020 to develop its economy, promote external economic relationship, diversify industries and develop a robust economy that has professional leadership and skilled labour force (Horst & Kuttschreuter, 2007, pp.1838-1852). To achieve these visions, it became apparent that Information Technology was an essential tool and hence the government started investing in the mobile government. Generally the ICT sector is still at an early

Thursday, September 26, 2019

CRITIQUE OF QUANTITATIVE ARTICLE Essay Example | Topics and Well Written Essays - 1000 words

CRITIQUE OF QUANTITATIVE ARTICLE - Essay Example The Research Purpose/Objectives This paper seeks to investigate the role of clinical preceptors in enhancing socialization and professional training to nursing students. Besides, the paper seeks to develop critical skills among nursing students. In summary, this research explores the role, responsibilities, and importance of preceptors in clinical education and training. The role of preceptors and other clinical expert in respect with the baccalaureate nursing programmes should not be over-looked as they facilitate the transition process in nursing (Rogan, 2009). Finally, this research aims at establishing the level of qualifications and nature of preparations accorded to preceptors in this challenging but life changing society. The level of preparation that the receptors receive is fundamental in determining their effectiveness and professional standards. The Research Questions This research seeks answer the following research questions: i. Are the preceptors’ level of educat ion and training sufficient enough to enhance their interpersonal and professional skill? ii. Are the preceptor nurse effective in facilitating the transition process of the student nurse to professional standards are required of them? iii. Is the socialization process during the transition effective and skilful? iv. Other than facilitating the transition process, what other responsibilities are preptor nurses charged with? Informed Consent and Ethical Considerations The study made various efforts to fulfill the informed consent and ethical considerations requirement for any valid research. First, the researcher obtained an approval from the relevant institutional review board, which commissioned the undertaking of the study (Rogan, 2009). This gave an authority and authenticity to the study being undertaken, allowing the researcher to access the desired information more easily. The second informed consent consideration made, was to obtain an approval from the hospitals from which t he participants were recruited, making it official that the study had been approved by those institutions. The researcher included a letter that stated the purpose of the study, which made the participants respond to the research with great ease, since they were fully aware of the objectives for which the study was being undertaken (Rogan, 2009). Finally, to preserve the confidentiality of the participants, the completed instruments of study bore no identifiers, which is consistent with the ethical consideration for research information privacy. Description of the Research Design The study applied a case study research design, where the study concentrated on answering the research questions, based on the data obtained from two midsized hospitals (Rogan, 2009). The first hospital was an academic medical center, where it would be easy to find nursing students integrated into the institutions, as they work hand-in-hand with the employed receptor nurses. The second hospital was a privat e facility, which was most appropriate in presenting the real picture of the perception of the nurses towards BSN student preceptor-ship, as opposed to the academic center, where there is a high likelihood of constant and consistent nurse to BSN student relationship. Considering that the nature of the study was relatively new, prompting further studies into the s only concentrate on a few areas and a small sample population, just to create an insight into the nature of the percep

Wednesday, September 25, 2019

Octavian's two biggest achievements Article Example | Topics and Well Written Essays - 750 words

Octavian's two biggest achievements - Article Example Octavian’s achievements of building a strong military and achieving Pax Romana are inextricably linked to each other. His strong military allowed him to achieve the much coveted yet elusive Pax Romana or unprecedented Roman Peace that ensued prosperity, beautification, improvement and Renaissance in the Roman Civilization. Octavian was able to achieve the establishment of a strong military due to the reform program he instituted after being installed as an Emperor of Rome after Julius Caesar was assassinated. Octavian made himself a dictator and founded the principate which is system of monarchy which he headed for life with a strong military under his direct command (BBC). These political conditions allowed him to bring about his greatest achievements as Emperor of the Roman Empire. The military was under the direct of Octavian and it followed that it was strengthened to reinforce the political will of Octavian as a dictator of Rome. A strong military ensured him that his ide a of principate which made him a ruler for life will not be threatened and provided stability in the Empire to allow peace to prosper. Among the military reforms that Octavian instituted was the creation of a standing army abroad. His armies abroad took a proactive vigorous military campaign not only to expand the reach of the Roman Empire but also to ward off the possibilities of attacks and/or invasion from barbarians (BBC). In effect, he was able to check the external threat against the Empire even beyond its frontiers that Octavian’s army was able to neutralize them even before becoming a threat. Thus, the removal of the barbarian threat abroad by the expeditionary campaign of his military paved the way for peace or Pax Romana, which is patently Octavian or Augustus Ceasar because of the legacy it created that we still enjoy today in the field of arts, culture and literature whereby it flourished due to the stability, good administration and unprecedented peace that preva iled during Octavian’s rule. Pax Romana or Roman peace did not only meant the relative absence of conflict in the Roman Empire but also meant an efficient administration that allowed the city to flourish. The absence of anxiety of an impending conflict enabled the Empire to focus its energy on reconstruction and improvement both among the governed and the government of Octavian. In the administration aspect, Pax Romana brought and effective civil service system which was created for the able Romans to have a career in governance and thus, public administration became effective. Taxation was also made reasonable contrary to Octavian’s predecessor who taxed excessively. This reinforced the atmosphere of peace since there was no dissent among the population that could be wrought up by harsh taxation. Thus, there was also no internal threat because the citizens were generally content with the taxation and civil administration of Octavian. Peace was further reinforced by th e establishment of a permanent police force and fire brigade to ensure the peace and order and to effectively respond to any fire disaster in the city. As a result, Rome became safer, more beautiful, cleaner with happier citizens. Pax Romana or Roman Peace also paved the way for stability and provided the necessary atmosphere for culture, arts and beatification to flourish. The legendary poets such as Virgil, Horace and Propertius, flourished and became the poets of the day.

Tuesday, September 24, 2019

IT Governance in the School of Professional and Continuing Education Dissertation

IT Governance in the School of Professional and Continuing Education Of ABC University - Dissertation Example The world of business is becoming more and more digital, computer-based, and interconnected by a network and accessible to the national and global communities. It is imperative for an organization like the ABC University to see the value of Information Technology (IT) as a strategic resource so that all investments related to IT will have maximum returns in terms of increasing the value of the school in the minds of society. Nicholas Carr (2003, p.1), Harvard Business Review Editor, believes that as a result of ready availability of IT resources, the key purpose of IT has ceased to be for purposes of discovering opportunities and gaining competitive advantages. Instead, he says it should â€Å"focus on reducing risk† (p.1). This means having good governance of security for the data and minimizing costs of maintaining and utilizing IT for strategy development. Rajiv Kohli and Sarv Devaraj (2004, p. 53) recommended 4 phases that will give value to IT, and called it the AIAC Fram ework. This stood for the processes of Alignment, Involvement, Analysis, and Communication. Details of the each process are shown in the appended AIAC Framework Model. See Figure 1. In the course of research, analysis, and planning, the ABC University IT Governance will be reviewed in terms of the processes in this framework. Although there are many other frameworks that are available, the AIAC will be utilized primarily because it aims to quantify the value of IT governance. However, there will be modifications to include those recommended by other frameworks and are not found in the ALAC framework. Information technology serves the role of a strategic partner instead of only a technology provider. The IT Governance Institute (ITGI, 2003) believes that effective IT Governance helps to ensure that IT supports business goals and optimizes business

Monday, September 23, 2019

Model of Family Therapy Essay Example | Topics and Well Written Essays - 1250 words

Model of Family Therapy - Essay Example I have always observed that people of a family interact with one another on an emotional level. The emotions may not apparently be quite obvious or visible, but they lay the basis of everyday decisions that have an impact upon the overall emotional and psychological balance of the family. It is usually quite helpful to study the social perceptions of the respective roles of different members of a family because most of the times, people tend to stick to these social norms. â€Å"Social constructionism †¦ can offer new possibilities for assessment and intervention with families.† (Worden, 2002, p. 13). Among numerous models of family therapy, I feel that the structural model of family therapy is based on similar principles and adopts a similar approach towards the resolution of the problem. That is why I think the Structural family therapy model fits best my style or personality. A therapist (Marriage and Family Therapist Career) employing SFT must first assess the familyà ¢â‚¬â„¢s interactions, figuring out the family’s hierarchy, alliances within the family, such as a mother and son against a father, or siblings against another sibling or siblings. (AllPsychologyCareers.com, 2011). The structural model of family therapy emphasizes upon a change in the structure of family and requires the therapist to play a very active role in bringing about the change. This model can be applied to a whole range of emotional imbalances. This model perceives family which may show an evolutionary transformation. The family is essentially a living open system in which the individuals depend upon one another to satisfy their individualistic needs. â€Å"Families are organizationally complex emotional systems that may comprise at least three – and increasingly today, as a result of longer life expectancies – four generations† (Goldenberg and Goldenberg, 2008, p. 4). Such families can be characterized by such traits as conflict avoidance, inter generational associations, lack of growth and triangulation. In the structural model of family therapy, the therapist sees the problem behavior as a component of the family’s stagnation. Thus, the therapist assesses the perceptual and transactional structure which is supportive of the symptom instead of serving as a causal factor. Accordingly, change occurs in terms of the family structure’s modification. This involves changes in the distance between various family members, positional changes. In addition to that, the hierarchical relations are redefined and a different set of rules for the family is explored. What I like the most about the structural model of family therapy is the fact that it illustrates the significance of the emotional inter-relatedness of the family members more than their blood relations with one another. A father may be blood-related to his child, but he may not be experiencing the necessary emotional relationship with the child. Likewise, the c hild may not be as close a relative of an uncle or aunt but may be more comfortable in sharing his problems with him/her. All the therapist is required is to see how to manipulate the structure of the family. In this model of family therapy, the therapist plays with distances in a way that all family members share optimal distance with one another. It is more like a game in which success is achieved by adequate positioning of

Sunday, September 22, 2019

Case 13-4 and 13-5 Essay Example | Topics and Well Written Essays - 1000 words

Case 13-4 and 13-5 - Essay Example One such criterion is â€Å"the lease transfers ownership of the property to the lessee by the end of the lease term† with the phrase â€Å"lease term† defined by paragraph 5(f) of SFAS No. 13 as a â€Å"fixed noncancelable term of the lease†. Since the lease is not cancelable and will transfer ownership of the machine after the lease term to Lani, this lease qualifies as a capital lease. For capital leases, Lani, who is the lessee, is required to book both an asset and a liability in her books. According to Paragraph 10 of SFAS No. 13, the amount recorded should be the higher of the fair value of the leased property and the â€Å"present value at the beginning of the lease term of minimum lease payments during the year†. The minimum lease payments (and therefore the present value) should exclude the costs to execute the lease contract. The expenses that Lani may incur during the first year of the lease are the â€Å"executory costs† that Lani may reimburse to her lessor. These costs may include insurance costs, maintenance costs and transfer taxes that will be initially paid by the lessors but will later be reimbursed by the lessee. Such costs are clearly laid down in the lease contract and should be properly excluded from the minimum lease payments used to calculate the present value. According to Paragraph 13 of SFAS No. 13, the capitalized asset should not be offset against the liability recognized for the capital lease. The asset capitalized should be shown separately in the balance sheet of the lessee or in the notes to financial statements, net of the related accumulated amortization. Likewise, the related liability should also be shown separately in the liability section of the balance sheet or in the notes to financial statements. From the point of view of Doherty Company, which is the lessee in this case, the criterion or criteria that should be met prior to classifying the lease as a capital lease may be

Saturday, September 21, 2019

Rough Draft Essay Example for Free

Rough Draft Essay Imagine if someone is pretending to be you, using your credit card to indulge themselves in items that they would never be able to afford. Credit card fraud is far too common today, losing a wallet can mean losing your identity. A credit card can be a positive or negative thing, depending whose hands it’s in. Credit card fraud is a problem, that I believe, I have found the solution to. Fraud is any negative type of deception or trickery. Credit card fraud is the problem of our generation because we are constantly hit with new technology and it distracts us from the things we are responsible for. The leading victims of credit card fraud are those at the ages between 21 through 36†, (credit. com). There are many types of credit card frauds including, â€Å"counterfeit cards, lost or stolen cards, identity-theft fraud, or simply giving your information to a company who isn’t legit, but is only after your money†, (Statistics Brains). In the end credit card fraud effects all of us, because it ruins the economy with all the money that is â€Å"borrowed† but not reimbursed. It can mentally, emotionally, and physically affect the card holder who has to deal with all the financial troubles that can potentially ruin a life if it isn’t dealt with properly. According to Nan Little, author of the article â€Å"The Negative Effects of Stress†, states that â€Å"stress is the leading cause of anxiety, depression, heart disorders, weight, and difficulty sleeping†. â€Å"Credit card fraud costs hundreds of millions of dollars every year†, (Bob Nefer). That is money that could be used for school programs, or positive outreaches to our own communities, which are in need. Consequences can become depressing as the holder sometimes has to pay out of pocket. If payments are neglected a collection company will take money from his or her paycheck. My solution to credit card fraud would be a GPS tracker inserted into all credit cards. The tracker would allow its holder to always know where their card is. First, I would talk to executive owners of most credit card companies, and tell them about my great idea. Second, I would then have investors invest in my idea and craftily build the micro GPS tracker as thin as a single sheet of paper. Finally after incorporating it into participating cards, I guarantee you they will easily sell. My solution will work because it would prevent the loss of credit cards. If the card is found before any fraud can occur then the problem would be easily fixed. Some may argue that it would take an immense amount of money to create the new traceable cards. Although production of the new cards would require a lot of money, they would ultimately prevent the loss of much more money, and pay for themselves. Additionally all investors would be reimbursed completely. Credit card fraud being so dangerous and causing so much stress, can be resolved by a simple and innovative item, which does in fact save a few headaches. Having technology so advanced in today’s world has made impossible things completely possible. I believe this is just the start of something great for our future, just imagine greater things than this concept. Let us not deprive yourselves from the life we are living now, but indulge ourselves in greater things, because we all deserve it.

Friday, September 20, 2019

Differences Between Intergovernmentalism And Constructivism Regarding The Eu Politics Essay

Differences Between Intergovernmentalism And Constructivism Regarding The Eu Politics Essay When considering these two theories in defining approaches to describe the European Union, we face the debate of agents versus structures. A constructivist approach means that it considering individual actors inside the structures in which they operate to have a significant impact on shaping their identity and behavior. Moreover, constructivism conceives of structures not only as material, but also social. Furthermore, these structures are not only constraints on behavior. Actors environment has a constitutive effect on actors identities on the basis of which they conceive their interests (Sedelmeier, 2005). Clearly, constructivism then takes into account the social factor, the one ignored by rational theory of maximum utility. For the EU, this means that it is not only an economic environment, one based on a materialistic approach. In fact, it is a cultural and social environment which shapes actors identities and interests (Sedelmeier, 2005). For constructivists the claim is that t hey study the integration of the European Union as a process (Cini, 2007). For constructivists then the focus becomes the formation, origins and evolution of identities, behavior related to languages and its role in political discourse, the role of social institutions etc. When we talk about constructivists we should see how the behavior regarding evolution of economic units, political institutions etc. emerges not because of material differences emerging in the economy but because of the process of emerging European identities (Cini, 2007) and the role social factors such as language , ideas and societal norms in these emerging identities. The liberal intergovernmentalist (LI) approach is based on political bargaining of states between governments, as in the case of treaties and reforms. In this approach, the power does not rest in social behavior or agents; in fact it is the political elite which has the power to improve interstate relations. The interaction then is between two forces; the member states and the EU Councils. In other words, This generally involves a two-stage process of negotiation. First, governments must resolve the policy problems that confront them; taking decisions to that effect; and only after that do they try to reach agreement on institutional mechanisms which would allow them to implement those decisions (Cini, 2007). As mentioned before, the political elite, meaning the governments of the member states are the main actors and the EU remains a forum for bargaining (Akiba, Fukuda, 2003). This theory holds that only the member state governments have the autonomy and can design the institutional system of the EU (Akiba, Fukuda, 2003). The limitations that this approach faces, especially when compared to constructivism is the fact that both theories slightly undermine the pace and the extent of the integration process and the autonomy that the EU has gained over the years in the sense that it has been increasingly ratifying treaties which have given more power to the Union. References: Cini, M. (2007). European Union Politics. Oxford University Press. Fukuda, K., Akiba, H. (2003). European Governance After Nice. Routledge. Sedelmeier, U. (2005). Constructing the Path to Eastern Enlargement. Manchester University Press. How do Multi-Level Governance understandings of the EU describe, and explain the advent of, the present EU political system? When discussing the integration of the EU as an institution, the arguments between intergovernmentalists and constructivist, as well as supranationalist, federalist and confederalist approaches are somewhat diminished by the theory surrounding multi level governance of the EU; indeed, it has given way to the fact that the EU operates more as a single European Regime or European polity (Akiba, Fukuda, 2003). Multi level governance considers the role of the State in decision making as important, but not entire. In fact, decision making competencies are shared by actors at different levels rather than monopolized by national governments (Hooghe, Marks, 2001). This of course means that the decision making rests with the supranational institutions- the European Parliament, European Commission and the European Court. These institutions have independent influence in policy making (Hooghe, Marks, 2001). The two other important factors which are taken into account by multi level governance ar e the collective decision making process; i.e. policies enforced across the EU without wholehearted from all the national states and the sharing of control and autonomy relating to domestic politics between national governments and supranational institutions. This obviously refers to the fact that politics at the international and domestic level are greatly interconnected, a theory on which the multi level governance model is based. One of the examples of multi level governance and the perceived limited autonomy of the nation state in the EU is displayed by the majority voting system in the EU Council of Ministers. This voting can be on issues relating to internal trade, the environment, research policy (Hooghe, Marks, 2001). So in relation to the definitions discussed above, how would a multi level governance system explain the EU of today, and secondly, why would such a system be supported considering that it is taking power away from national actors and placing it with bodies at a supranational level? The answer is to consider the other actors present in nation states who might on one hand affect policy making, actors such as pressure groups and interest groups. The Council of Ministers is only represented by governments, not other actors. This might be looked on as an advantage by national governments in policy enforcement. Secondly, the EU itself has huge arenas of policy making and regulation under its umbrella, a most important one being trade. The trade benefits that member states receive are a result of greater integration of the European market. The concept of multi level governance is parallel to that of integration but analyzed differently because it focuses more on the various territorial lev els policy making has stretched over and how authority has shifted. There has been a drift of authority from the national to the European level which forces us to think of it as a political system across multiple levels including national and subnational arenas of action as well as the institutional environment of Brussels (Cini, 2007). Parallel to integration, we can see that the governance itself rests with multiple bodies of policy making and legislation, in the form of the evolution of the EU from a mere economic body to that of an organization consisting of its own Parliament, a Court (ECJ) and a Council of Ministers, all far reaching institutions that a single treaty establishing a European Coal and Steel Community. The idea behind this argument rests in the framework with which Europeanization scholars define the process of integration and the institutional changes taking place in the EU. The focus has shifted from thesis defining the framework to closely analyze the causal relationship surrounding the procedural changes, for instance, that of EUs domestic impact. It might be termed as a second generation of European studies (Gualini, 2004). The stress however, has recently shifted from policy at the international level to the way in which integration has affected national governments (Archer, 2008). The rationale behind this shift is the question that how European integration has affected domestic administrative practices and structures (Archer, 2008). This is more of a top-down approach toward Europeanization (Borzel, Risse, 2003). It is necessary to see the way Europeanization has affected domestic policies and institutions because it helps in understanding the integration process better bec ause according to one theory, policies enacted by the European Union must create some misfit in the administrative policies on a domestic level and this I one reason why change or adaotaion takes place on the domestic level (Borzel, Risse, 2003). This opinion is supported by rational choice institutionalism, simple that the process of change is initiated by greater distribution of power among the domestic administrative powers because interest groups might find opportunities in EU policies which could provide them with ways to pursue their own interests, if only they recognize such opportunities. Secondly, it also suggests that Europeanization leads to domestic change through a differential empowerment of actors resulting from a redistribution of resources at the domestic level (Borzel, Risse, 2003). The distribution of power is one reason why theorists have shifted from analyzing Europeanization in theory only, but in fact, have concentrated in recent times to see what extent chang e at the domestic level has been brought around by the process of Europeanization. The second way in which domestic change has been analyzed is through the lens of the constructivist perspective or logic of appropriateness. In this case, European policies and norms affect domestic processes by exerting adaptational pressures (Borzel, Risse, 2003) through change agents and other informal actors in the political processes. This is also supported by the collective learning process and connects more with the opinion of how new identities are formed through collective learning and social change. Essentially it is important to note that Europeanization as a policy offers new standards of policy to be implemented on the domestic level through political processes of implementation which in turn affects polity which affects domestic-level institutions, e.g. judiciary, public institutions, economic institutes etc. As one analyst puts it, The issue is no longer whether Europe matters but how it matters, to what degree, in what direction, at what pace, and at what point of tim e (Borzel, Risse, 2003). This is the reason through which the European Union, less as a policy and more as an institute of political change at the domestic level, is studied to understand the causal mechanisms of change. References: Archer, C. (2008). The European Union. Taylor Francis. Borzel, T., Risse, T. (2003). The Politics of Europeanization. Oxford University Press. Gualini, E. (2004). Multi-level Governance Political Change. Ashgate Publishing. Why has the EU relied so much on economic integration to deepen the integration process as a whole? In 1951 the Treaty of Paris established the European Coal and Steel Community, one of the first formal steps taken toward European integration. Robert Schuman, the French Foreign Minister at that time was of the opinion that a united Europe was essential for peace in the region. The reason why EU has relied so much on economic integration depends mostly on the objectives of integration. After a war torn Europe, the idea was to rebuild Europe and also to defend against a future war which would serve as a destabilizing and destructing force for all of Europe. Economic integration was, and is, a rationale to serve a higher purpose, which is both economic and political (Molle, 2006). The economic integration would mean that the states would rather serve as a collective economic entity than an individual one. The benefits of this are increasing chances of peace and security in the reason because economies are interdependent. Greater dependence on each other economically means that chances of armed conflict between them would be minimal (Molle, 2006). The framework for the European Union can be said to have laid down when the Marshall Plan was introduced with the objective of the reconstruction of Western Europe. The introduction of the though of a unified European Steel production body thus was seen by both Schuman and Monnet as a realistic way in which conflict could be avoided. In Schumans word, the solidarity in the production thus established will make it plain that any war between France and Germany becomes not merely unthinkable but materially impossible (Jovanovic, 2005). In other words, the objective of peace is much more easily obtained when economies are linked together. Another important factor which proved once again the success of economic integration, relatively to integration progress in other areas, was the abolishment of all internal tariffs. This took place approximately a year and half before the Treaty of Rome was ratifies (Jovanovic, 2005). The result was economic benefits which ranged over a variety of industries, exports and imports and was the main attractive feature which cause Britain to apply for membership to the EC. Economy, it was seen, was a core feature which resulted in expansion of the EU and caused potential member states to right their situations, to improve their economic performance to be eligible to be apart of the EU. The arguments which have been used by pro-integration forces have therefore been focusing on the benefits obtained from economic integration, namely, increase in welfare by an increase in GDP per capita. A common economic ground formed on the basis of integration gives way to common policy ideals or support of policies which would strengthen, not weaken, the economic integration and vice versa. The Treat of Lisbon came into effect as a result of the global financial crisis and what it meant for the economy of the EU as a whole. The purpose was to control the situation financially inside the EU markets to promote financial stability and to offer security against unstable financial markets in whatever way possible. Since the monetary and financial markets of the EU are connected through means of a common currency, i.e. the Euro, financial crisis has the power to economically destabilize the entire region and there should be safeguards to minimize this threat. As a result, a European Financial Stability Facility (EFSF) and a European Stability Mechanism (ESM) has been set up to provide financial aid packages to countries severely affected by the financial crisis. For changes introduced in the European political sphere, the Lisbon Treaty takes into account the difference between delegated and executive acts, a distinction which was not considered by previous Treaties (Ponzano, 2008). Overall, this change means that the European Parliament has been granted a much stronger role than before whereby the Commission takes responsibility for delegated acts under the direct control of the European Parliament and the Council, giving each of the possibility of opposing the measure or revoking the delegation (Griller, Ziller, 2008). The second important political change the Treaty brings about is the double majority voting in the Qualified Majority Voting System in the European Council. The European Council also gains the status of a full European Union institution. The result of course, shows that the Lisbon Treaty granted more powers to the European Parliament, followed by the European Council. The Treaty of Lisbon has its roots in the failed ratification of the Constitutional Treaty. Establishing a Constitution for Europe has been a long-term shadow over European integration, a step that not many of the member states have been willing to take. Some questions put forth by Piris show considerable insight into the Lisbon Treaty and the circumstances surrounding it. For instance, is the Lisbon a mere repackaging of the Constitution of Europe (Piris, 2010)? Indeed the Lisbon Treaty has granted powers to the Parliament, the Court of Justice and the Commission to ensure greater balance of power in the EU. Secondly, the European Parliament, along with the national Parliaments of member states have been given the possibility of intervening directly in the EU legislative process (Piris, 2010). It definitely provides national Parliaments enough power to affect legislative process in the EU. A major difference however, between the Lisbon Treaty and the Constitutional treaty is the aba ndonment of transforming the EU into a federal body. That objective, according to Piris, has been fully deserted to be replaced by Euro-sceptic elements which to some extent limit the power of the EU.

Thursday, September 19, 2019

The Architecture of the Library of Congress Essay -- Architectural Str

The Architecture of the Library of Congress Constructed between 1888 and 1897, the Library of Congress is located in Washington, D.C. at the intersection of 1st St. and Independance Avenue. It's beautiful, large-scale building is comprised mainly of marble, granite, iron, and bronze. The Library's architectural style is reminiscent of that of ancient Greece. It's typical Greek characteristics include columns of the Ionic order, relief sculpture, and statues of Greek god figures, such as Poseidon, god of the sea. These attributes are significantly comparable to those of the altar of Pergamon located in present day Turkey. Housing thousands of books, music, and art collections, the Library of Congress contains numerous reading rooms used by the public people. It is not restricted to use by special officials, but welcomes everybody as it was constructed specifically to serve as the American national library. The present Library of Congress had a difficult time getting started in its early stages. Originally located in the United States Capitol building between 1806 and 1814(U.S. Government, 1), a fire caused the Library to be relocated to a temporary hotel location. Soon it was replaced into the north wing of the Capitol, and then into the center of the west front (U.S. Government, 2). Unfortunately, another disastrous fire burned the Library and yet again it had to be repaired. The Librarian of Congress at this time in 1865, Ainsworth Rand Spofford, realized the Library was expanding to the point where it would soon need it's own separate building from the Capitol. He drew up an architectural plan in 1872 and presented it to Congress who authorized it. The new structure, named the Jefferson Building, was elaborately deco... ...nce is that the Library of Congress celebrates mental values while the altar of Pergamon celebrates physical values. The architecture of the Library of Congress expresses a modern presence of the past. It's similarities to the altar of Pergamon lie in physical appearances and in deeper meanings. Both reflect the beauty of Greek architecture and the values of the people who designed them. Bibliography Schwartz, Nancy B. District of Columbia Catalog. Charlottesville: University Press of Virginia, 1974. Stokstad, Marilyn. Art History. New York: Harry N. Abrams, Inc., 1995. United States Government. "Jefferson's Legacy: A Brief History of the Library of Congress." http://lcweb.loc.gov/loc/legacy/bldgs.html. (1996): 1-12. Allen, William C. The Dome of the United States Capitol: An Architectural History. Washington: U.S. Government Printing Office, 1992.

Wednesday, September 18, 2019

Possession in The Exorcist Essay -- The Exorcist

Being Possessed The idea of possession can frighten many people. What horror movie producers and directors that go into this field are counting on is that they can use it to frighten their viewers. The Exorcist and The Exorcist Beginning both are centered on the act of exorcism. Both demoniacs in the films are women though their fates are polar opposites. The exorcisms are also shown in different lights. This is done through special effects as well as lighting and music. The first film in the series stays with a cut and dry method of keeping mainly to the exorcism itself; however, its prequel focuses more on fancy special effects and stimulating music. The newest addition to The Exorcist series also adds in the usual Hollywood love story present in most films in our time. Prequels tend to also serve the purpose of story building, regardless of how new it is. In this case it has the duty of creating and explaining the character of Merrin. The success of both The Exorcist and The Exorcist Beg inning was not only due to the story line, but also the mystery of it as well as its acceptance in society and the church. The exorcism itself, such as the effects and the overall focus on it were portrayed differently within The Exorcist and The Exorcist Beginning in accordance with the view from society in general and their expectations on how a movie should be done. The rite of exorcism dates back many centuries. It is a practice not only practiced in Christianity but in Pagan religions as well. The main difference between the two is that Pagan exorcists rely on their own power to expel the demons rather then the Christians drawing their power directly from God to do the job (Baker, 137). This power was given to the Christia... ...new technology back then. Movies have now been mandated by the movie making industry to take on new twists, however. The Exorcist Beginning, being the prequel to the first of the series, had to pull something new to get the viewers it needed for success. Therefore, Harlin put in the notorious love story to add a special little twist to our emotion. This in conjunction with the development of Merrin, puts the actual exorcism out of the spot light. Thus, showing how movies have been changed over time with the change in wants from society. As their wants for a good movie change, so must the actual film to acquire success. The Exorcist and The Exorcist Beginning both followed the expectations of society for their respective filming eras to become very successful movies, having their success fueled by the mixed views and conceptions of both the church and society.

Tuesday, September 17, 2019

Death Of A Planet Essay -- essays research papers fc

Death of a Planet Air pollution is a very big problem in the United States. A large part of air pollution comes from cars. The Environmental Protection Agency says, "The most polluting activity an average person does everyday is drive their car"(1 factsheet OMS-5). Most people probably aren't aware that they are polluting the environment. Maybe if everyone knew how serious this pollution problem is, they would find ways to reduce the pollution. Most pollution that is released by cars comes from the exhaust, mainly in the form of hydrocarbons(1 factsheet, OMS-5). Hydrocarbons are organic compounds ,a combination of two or more elements, that contain only carbon and hydrogen (2 factsheet, OMS-5). Hydrocarbons are released when fuel in the engine burns partially. When hydrocarbons come in contact with sunlight they form ground level ozone. Ground level ozone is a major ingredient in the formation of smog. Ground level ozone is responsible for irritating eyes, damaging lungs, and it complicating respiratory problems. Hydrocarbons aren't the only pollutants released through car exhaust. Two more pollutants released through car exhaust are carbon monoxide and nitrogen oxide. The first reduces the flow of oxygen to the bloodstream, and could harm people with heart disease. Nitrogen oxide is formed when a car engine gets hot. It contains chemicals that aid in the formation of ground level ozone as well as acid rain (2 factsheet, OMS-5). Acid rain destroys the outsides of buildings, statues, etc. Acid rain can also contaminate drinking water, damage vegetation, and destroy sealife. These two pollutants are two of the most dangerous pollutants released through car exhaust. If these two pollutants were cut down just a little bit our planet would be a safer place to live. Carbon dioxide is another gas released through exhaust emissions. It isn't dangerous directly to humans, but it is considered to be a "green house gas." A "greenhouse gas" is a gas that is associated with global warming. Global warming is the gradual increase of temperature due to human activity. Certain gases, such as carbon dioxide, methane, and ozone allow radiation from the sun to break through the atmosphere and go to the earth's surface. Global w... ... recognized sooner than regular testing, done year by year. If the remote sensing devices are used people don't have to worry about their car being tested. They just have to get their car repaired when the device says it's polluting the environment. Air pollution caused by cars is a serious problem that can be reduced by average everyday people. If the citizens of earth don't act fast, and reduce the amount of pollution caused world wide, earth will be a horrible place to live. If something isn't done soon there might not be a place to live at all. Works Cited Brown, Lester R. The World Watch Reader: On Environmental Issues. NewYurk:Norton, 1991. 97-105. The Environmental Protection Agency. Automobiles and Ozone: Factsheet OMS-4. http://www.epa.gov/OMS WWW/04-ozone.htm. 1993. 4. The Environmental Protection Agency. Automobile Emission: An overiew: Factsheet OMS-5. http://www.epa.gov/OMS www/05-autos.htm. 1994. 1-5. The Environmental Protection Agency. Remote Sensing: A Supplemental Tool for Vehicle Emission Control: Factsheet OMS-15. http://www.epa.gov/OMS www/ 15- -remot.htm. 1993. 1-2.

Monday, September 16, 2019

Kudler Security Report

Kudler Fine Foods IT Security Report and Presentation Security Considerations CMGT/400 Kudler Fine Foods IT Security Report and Presentation Security Considerations According to Whitman and Mattord  (2010),  The ISO 27000 series is one of the most widely referenced security models.Referencing ISO/IEC 27002 (17799:2005), the major process steps include: risk assessment and treatment, security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development, and maintenance, information security incident management, business continuity management, and compliance (Chapter 10, Security Management Models). 1.Risk assessment and treatment 2. Security policy: Focuses mainly on information security policy 3. Organization of information security: For both the internal organization and external parties 4. Asset management: Incl udes responsibility for assets and information classification 5. Human resources security: Ranges from controls prior to employment and during employment to termination or change of employment 6. Physical and environmental security: Includes secure areas and equipment security 7.Communications and operations management: Incorporates operational procedures and responsibilities, third-party service delivery management, systems palnning and acceptance, protection against malicious and mobile code, backup, network security management, media handling, exchange of information, electronic commerce services and monitoring 8. Access control: Focuses on business requirement for access control, user access management, user responsibilities, network access control, operating system access control, application and information access control, and mobile computing and teleworking 9.Information systems acquisition, development, and maintenance: Includes security requirements of information systems, correct processing in applications, cryptographic controls, security of system files, security in development and support processes, and technical vulnerability management 10. Information security incident management: Addresses reporting information security events and weaknesses and management of information security incidents and improvements 11.Business continuity management: Information security aspects of business continuity management 12. Compliance: Includes compliance with legal requirements, compliance with security policies and standards, and technical compliance and information systems audit considerations The â€Å"SANS: SCORE† (2012) website provides a free audit checklist for organizations to verify if they comply with the ISO 27002. The following table represents the SANS audit checklist as it relates to Kudler Fine Food’s frequent buyer program. Security policy: Focuses mainly on information security policy | |Section |Audit Question |Security Consider ations |Security concern if |Mitigation | | | | |removed | | |Information security policy|Whether there exists an Information |A security policy is |Without a security policy |Define what needs to be | |document |security policy, which is approved by the |necessary to guide all |in place the restriction |protected in order to | | |management, published and communicated as |access or to block |of information would be |develop a security policy. | | |appropriate to all employees. |access to information. |lost.Uncontrolled access|The importance of the | | | | |will result in the loss of|information should | | |Whether the policy states management | |company information. |determine the severity of | | |commitment and sets out the organizational| | |the security. | | |approach to managing information security. | | | | |Review of Informational |Whether theInformation Security Policy is|The security policy |Without the review of |Each policy should be | |Security Policy |reviewed at planne d intervals, or if |should be reviewed as |security policies they |reviewed periodically to | | |significant changes occur to ensure its |business practices, |will most likely become |ensure its effectiveness. | | |continuing suitability, adequacy and |hardware, software, and |out dated and lose | | | |effectiveness. |the way in which |usefulness. Each policy owner will be | | | |information is shared | |responsible for the review | | |Whether the Information Security policy |change. |Without giving each |of the policy. | | |has an owner, who has approved management | |section of the policy an | | | |responsibility for development, review and|Each part of the policy |owner the policy will have|Each change will be brought| | |evaluation of the security policy. should have an owner who|no one responsible for its|before management before | | | |is responsible for |maintenance. |being brought into action. | | |Whether any defined Information Security |keeping it up to date. | | | | |Pol icy review procedures exist and do they| |A policy to review new | | | |include requirements for the management |A review procedure |policies or changes made | | | |review. should be in place, each|to current policies should| | | | |change made should be |be in place to discourage | | | |Whether the results of the management |reviewed by management. |unauthorized changes. | | | |review are | | | | | |taken into account. | | | | | |Whether management approval is obtained | | | | | |for the revised policy. | | | |Organization of Information Security | |Section |Audit Question |Security |Security concern if |Mitigation | | | |Considerations |removed | | |Management commitment to|Whether management demonstrates active support for |An active role |Without the active support|A definition of the role | |information security |security measures within the organization.This can be|by management |of management the security|management should play in | | |done via clear direction, demonstrated commitment, |is needed to |policy will lose its |the commitment to the | | |explicit assignment and acknowledgement of information|ensure the |effectiveness. |security policy should be | | |security responsibilities. |effectiveness | |stated in the security | | | |of the security| |policy. | | | |policy. | | |Information security |Whether information security activities are |Security |Information security |Ensure that the owner of | |coordination |coordinated by representatives from diverse parts of |activities need|activities need to be |each policy is responsible | | |the organization, with pertinent roles and |to be |organized by employees |for all activities | | |responsibilities. |coordinated by |with higher roles and |associated with the | | | |representatives|responsibilities. The |policies. | | |that carry |security policies protect | | | | |pertinent roles|the information and all | | | | |and |activities associated with| | | | |responsibilitie|the security policy should| | | | |s. |be made by responsible | | | | | |parties. | |Allocation of |Whether responsibilities for the protection of |The business |Without a clear set of |A clear set of instructions| |information security |individual assets, and for carrying out specific |will suffer a |rules governing the |will be provided to ensure | |responsibilities |security processes, were clearly identified and |great many |protection of individual |that each individual asset | | |defined. |losses due to |assets and security |and each security process | | | |unclear |processes the business |is clearly defined. | | |detentions of |will surely suffer a loss. | | | | |procedures. | | | |Authorization process |Whether management authorization process is defined |Authorization |Without the use of an |Any and all information | |for information |and implemented for any new information processing |processes need |authorization system a new|processing facilities need | |processing facilities |facility within the org anization. to be clearly |information processing |to be given ownership to a | | | |stated in the |facility would be left |member of management. This| | | |security |vulnerable for attack. |member needs to ensure the | | | |policy. Any | |security policy is | | | |new information| |followed.Using the proper| | | |processing | |authorization system is | | | |facility needs | |critical to securing the | | | |to have an | |information contained | | | |authorization | |within. | | | |process | | | | | |implemented. | | |Confidentiality |Whether the organization’s need for Confidentiality or|The NDA should |Without the use of an NDA |The NDA needs to be | |agreements |Non-Disclosure Agreement (NDA) for protection of |be clearly |the legal ramifications |reviewed periodically to | | |information is clearly defined and regularly reviewed. |defined. This |are greatly lessened. A |ensure that any changes in | | | |will help to |business needs to protect |the business are reflected | | |Does this address the requirement to protect the |ensure the |its data to the fullest |in it. | | |confidential information using legal enforceable terms|information is |extent of the law. | | | |not | | | | | |compromised. | | | |Contact with authorities|Whether there exists a procedure that describes when, |This is |The time it takes to act |A plan must be in place for| | |and by whom: relevant authorities such as Law |important to |in an emergency is crucial|different types of | | |enforcement, fire department etc. should be |the physical |to keeping employees and |emergencies involving any | | |contacted, and how the incident should be reported. |security of the|the business safe. A plan|outside authorities. This | | | |business and |must be in place to avoid |can help to prevent | | | |the employee |potential losses due to |injuries and harm done to | | | |within. |unforeseen events. |employees and the business. |Contact with special |Whether appropriate contacts with special interest |Contacts with |Allowing a third party |A policy needs to define | |interest groups |groups or other specialist security forums, and |third party |group access to any |the steps needed to apply | | |professional associations are maintained |groups need to |information can be a risk |for special interest groups| | | |be approved my |to the business. All |and how the relationship is| | | |management. third party associations |maintained. | | | | |should be approved in | | | | | |advance by management. | | |Independent review of |Whether the organization’s approach to managing |Security |The loss of strength to |To ensure the highest level| |information security |information security, and its implementation, is |management |the security of |of security a review should| |reviewed independently at planned intervals, or when |should be |information can occur |be implemented periodically| | |major changes to security implementation occur. |reviewed at |through time (small |and whenever a major change| | | |planned |changes) or when a major |takes place. | | | |intervals and |change has taken place. | | | | |when major | | | | | |changes occur. | | |Identification of risks |Whether risks to the organization’s information and |Allowing third |Allowing third parties |Strict rules and an access | |related to external |information processing facility, from a process |parties access |access to the business |policy must be implemented | |parties |involving external party access, is identified and |to the network |network and the contents |to allow a third party | | |appropriate control measures implemented before |poses serious |of the business systems |access to any information | | |granting access. |risks to the |poses a serious threat to |in the business. | | | |integrity of |the integrity of the | | | | |the |system. | | | |information. | | | |Addressing security when|Whether all identified security requirements are |Allowing |Allowing customers access |Access to information by | |dealing with customers |fulfilled before granting customer access to the |customers with |to information in the |customers should be stated | | |organization’s information or assets. |the access to |business system poses a |in the security policy. | | | |certain |threat. Customers should only be | | | |information can| |allowed access to minimal | | | |help to | |information, a separate | | | |increase | |website or informational | | | |customer base | |address. | | | |and customer | | | | | |awareness. | | |Addressing Security in |Whether the agreement with third parties, involving |All third party|Agreeing with a third |Any third party contract | |third party agreements |accessing, processing, communicating or managing the |agreements |party contract can hold |should be reviewed by the | | |organization’s information or information processing |should be |some legal ramifications. |legal department to ensure | | |facility, or introd ucing products or services to |reviewed before| |the contract agrees with | | |information processing facility, complies with all |implementation. | |all of the businesses | | |appropriate security requirements | | |security requirements. |Asset Management | | | |Section |Audit Question |Security Considerations |Security concern if |Mitigation | | | | |removed | | |Inventory of Assets |Whether all assets are identified and an |The businesses assets |Without a clear definition|Each new asset will be | | |inventory or register is maintained with |need to be registered to|of assets the business |registered and assigned an | | |all the important assets. |ensure their safety. |could suffer a loss or |owner. | | | |theft of assets. | | |Ownership of Assets |Whether each asset identified has an |The security policy must|The business could suffer |Each new asset should have | | |owner, a defined and agreed-upon security |include clearly defined |a loss without giving the |an owner and restr ictions | | |classification, and access restrictions |parameters for |asset an owner and |to its access. | | |that are periodically reviewed. |registering assets. defining access | | | | | |restrictions. | | |Acceptable use of Assets |Whether regulations for acceptable use of |Legal issues and profits|Without regulations on the|Defineing all acceptable | | |information and assets associated with an |losses could occur from |use of assets the company |uses of business assets is | | |information processing facility were |the misuse of assets. |could suffer losses and |crucial. | | |identified, documented and implemented | |legal issues. | |Classification guidelines |Whether the information is classified in |Classification of |By classifying information|All information should be | | |terms of its value, legal requirements, |information is crucial |is can be easier to |classified in terms of its | | |sensitivity and criticality to the |to the business. This |determine who has access |va lue, legal requirements, | | |organization. |will determine who has |to it. |and sensitivity to ensure | | | |access to the | |it is only accessible to | | | |information. |authorized users. | |Information Labeling and |Whether an appropriate set of procedures |A set of organizational |Unorganized information |All information should be | |handling |are defined for information labeling and |parameters should be |can result in the loss of |organized within a set of | | |handling, in accordance with the |devised to create a |the information. |parameters defined in the | | |classification scheme adopted by the |classification scheme. | |classification scheme. | | |organization. | | | |Human Resources Security | |Section |Audit Question |Security Considerations |Security concern if |Mitigation | | | | |removed | | |Roles and responsibilities |Whether employee security roles and |All personnel authorized|Unauthorized access of |All confidential | | |responsibilities, contractors and third |to access confidential |this information could |information should be | | |party users were defined and documented in|information needs to be |result in identity theft. |handled by authorized | | |accordance with the organization’s |identified by management| |personnel only. | |information security policy. |team. | | | | | | | | | | |Were the roles and responsibilities | | | | | |defined and clearly communicated to job | | | | | |candidates during the pre-employment | | | | |process | | | | |Screening |Whether background verification checks for|All applicants |If not performed, persons |All employees should be | | |all candidates for employment, |considered for |with a history of theft |free of any criminal | | |contractors, and third party users were |employment have to |could be hired. |history that may cause | | |carried out in accordance to the relevant |undergo a criminal | |concern to the company. | | |regulations. |background check prior | | | | | |to a job offer bei ng | | | | |Does the check include character |made. | | | |reference, confirmation of claimed | | | | | |academic and professional qualifications | | | | | |and independent identity checks | | | | |Terms and conditions of |Whether employee, contractors and third |Management must define |Unauthorized access of |To prevent confidential | |employment |party users are asked to sign |what information is |this information could be |information to be disclosed| | |confidentiality or non-disclosure |confidential in |used for personal use. |to unauthorized persons. | | |agreement as a part of their initial terms|accordance to existing | | | | |and conditions of the employment contract. |laws and company policy. | | | | | | | | | | |Whether this agreement overs the | | | | | |information security responsibility of the| | | | | |organization and the employee, third party| | | | | |users and contractors. | | | | |Management responsibilities|Whether the management requires employees,|Management must define |Unauthorized access could |To prevent confidential | | |contractors and third party users to apply|which users have to have|be used for personal gain. |information to be disclosed| | |security in accordance with the |this access. | |to unauthorized persons. | |established policies and procedures of the| | | | | |organization. | | | | |Information security |Whether all employees in the organization,|Management and Loss |Private information could |To educate all personal | |awareness, education and |and where relevant, contractors and third |Prevention must develop |be disclosed to |about privacy policy. | |training |party users, receive appropriate security |a training program and |unauthorized persons for | | | |awareness training and regular updates in |establish how often it |personal use. | | |organizational policies and procedures as |needs to be | | | | |it pertains to their job function. |administered. | | | |Disciplinary process |Whether there is a formal discipl inary |Management must |Private information could |To advise employees what | | |process for the employees who have |establish corrective |be disclosed to |recourse their actions will| | |committed a security breach. |action measures if there|unauthorized persons for |have. | | | |is a security breach. |personal use. | |Termination |Whether responsibilities for performing |Management must advise |If an employee was not |To define the procedures of| |responsibilities |employment termination, or change of |what actions will |properly terminated could |terminating employment. | | |employment, are clearly defined and |terminate employment and|result in a lawsuit. | | | |assigned |what procedures are | | | | | |involved in the | | | | | |termination process. | | |Return of assets |Whether there is a process in place that |Management must define |If not returned, certain |To ensure that all | | |ensures all employees, contractors and |what materials employees|company items could be |appro priate company | | |third party users surrender all of the |must return upon |used for personal use. |materials are returned. | | |organization’s assets in their possession |employment. | | | | |upon termination of their employment, | | | | | |contract or agreement. | | | |Removal of access rights |Whether access rights of all employees, |Management will define a|If not defined, it is |To prevent unauthorized | | |contractors and third party users, to |timeframe in which a |possible that a terminated|personnel from accessing | | |information and information processing |terminate employee |employee could still |company information. | | |facilities, will be removed upon |access is removed |access company | | | |termination of their employment, contract | |information. | | | |or agreement, or will be adjusted upon | | | | | |change. | | | |Physical and Environmental Security | |Section |Audit Question |Security Considerations |Security concern if |Mitigation | | | | |removed | | |Physical security perimeter|Whether a physical border security | | | | | |facility has been implemented to protect | | | | | |the information processing service. | | | | | | | | | | | |Some examples of such security facilities | | | | | |are card control entry gates, walls, | | | | | |manned reception, etc. | | | |Physical entry controls |Whether entry controls are in place to |Physical access to |potential for security |server room should be | | |allow only authorized personnel into |system |breach through |locked with access | | |various areas within the organization. | |unauthorized access to |restricted to authorized | | | | |physical equipment. |personnel.Sophistication | | | | | |of restraint would be | | | | | |dependent upon importance | | | | | |of information and budget. | |Securing offices, rooms, |Whether the rooms, which have the | | | | |and facilities |information processing service, are locked| | | | | |or have lockable cabinets or safes. | | | |Protecting against external|Whether the physical protection against |corruption and/or loss |loss of critical data. |Data and system redundancy,| |and environmental threats |damage from fire, flood, earthquake, |of information due to | |off-site storage and/or | | |explosion, civil unrest and other forms of|environmental conditions| |multiple servers at | | |natural or man-made disaster should be | | |different locations. | | |designed and applied. | | | | | | | | | | |Whether there is any potential threat from| | | | | |neighboring premises. | | | | |Working in secure areas |Whether physical protection and guidelines| | | | | |for working in secure areas is designed | | | | | |and implemented. | | | | |Public access delivery and Whether the delivery, loading, and other | | | | |loading areas |areas where unauthorized persons may enter| | | | | |the premises are controlled, and | | | | | |information processing facilities are | | | | | |isolated, to avoid unauthorized access | | | | |Equipment sittin g |Whether the equipment is protected to | | | | |protection |reduce the risks from environmental | | | | | |threats and hazards, and opportunities for| | | | | |unauthorized access | | | | |Supporting utilities |Whether the equipment is protected from | | | | | |power failures and other disruptions | | | | | |caused by failures in supporting | | | | | |utilities. | | | | | | | | | | |Whether permanence of power supplies, such| | | | | |as a multiple feed, an Uninterruptible | | | | | |Power Supply (ups), a backup generator, | | | | | |etc. are being utilized. | | | | |Cabling security |Whether the power and telecommunications | | | | | |cable, carrying data or supporting | | | | | |information services, is protected from | | | | | |interception or damage. | | | | | | | | | | |Whether there are any additional security | | | | | |controls in place for sensitive or | | | | | |critical information. | | | | |Equipment Maintenance |Whether the equipment is correctly | | | | | |maintained to ensure its continued | | | | | |availability and integrity. | | | | | | | | | | |Whether the equipment is maintained, as | | | | | |per the supplier’s recommended service | | | | | |intervals and specifications. | | | | | | | | | | | |Whether the maintenance is carried out | | | | | |only by authorized personnel. | | | | | | | | | | |Whether logs are maintained with all | | | | | |suspected or actual faults and all | | | | | |preventive and corrective measures. | | | | | | | | | | | |Whether appropriate controls are | | | | | |implemented while sending equipment off | | | | | |premises. | | | | | | | | | | |Are the equipment covered by insurance and| | | | | |the insurance requirements satisfied | | | | |Securing of equipment |Whether risks were assessed with regards |off-site data storage |off-site data may be |proper security measures in| |off-premises |to any equipment usage outside an |centers provide a level |compromised or otherwise |place to ensure integrity | | |o rganization’s premises, and mitigation |of redundancy to |corrupted due to |of data. | | |controls implemented. maintain integrity in |insufficient security | | | | |the event of a local |measures | | | |Whether the usage of an information |breach | | | | |processing facility outside the | | | | | |organization has been authorized by the | | | | | |management. | | | |Secure disposal or re-use |Whether all equipment, containing storage | | | | |of equipment |media, is checked to ensure that any | | | | | |sensitive information or licensed software| | | | | |is physically destroyed, or securely | | | | | |over-written, prior to disposal or reuse. | | | | |Removal of property |Whether any controls are in place so that | | | | | |equipment, information and software is not| | | | | |taken off-site without prior | | | | | |authorization. | | | |Communications and Operations Management | |Section |Audit Question |Security Considerations |Security concern if |Mitigation | | | | |rem oved | | |Documented Operation |Whether the operating procedure is |Management should set |Without direction, |To establish how the | |Procedures |documented, maintained and available to |guideline about how each|employees would not know |company is to operate on a | | |all users who need it. |function should operate |what to do throughout the |daily basis. | | | |in the company. |day. | | |Whether such procedures are treated as | | | | | |formal documents, and therefore any | | | | | |changes made need management | | | | | |authorization. | | | | |Change Management |Whether all changes to information | | | | | |processing facilities and systems are | | | | | |controlled. | | | |Segregation of duties |Whether duties and areas of responsibility|Management is |No one would be |To establish accountability| | |are separated, in order to reduce |responsible for |responsible for ensuring |for task performed in each | | |opportunities for unauthorized |assigning area of |tasks are complete d. |area. | | |modification or misuse of information, or |responsibility. | | | | |services. | | | |Separation of development, |Whether the development and testing |Management needs to |Incorrect information |To prevent incorrect | |test, and operational |facilities are isolated from operational |establish a separate |could cause a delay in |information is not given to| |facilities |facilities. For example, development and |network. |production or development. |incorrect personnel. | | |production software should be run on | | | | | |different computers.Where necessary, | | | | | |development and production networks should| | | | | |be kept separate from each other. | | | | |Service delivery |Whether measures are taken to ensure that |Define what measures are|Goods and services will |To ensure that service | | |the security controls, service definitions|needed and establish who|not be done in a timely |level is established and | | |and delivery levels, included in the third|to monit or. |manner. |maintained. | |party service delivery agreement, are | | | | | |implemented, operated and maintained by a | | | | | |third party | | | | |Monitoring and review of |Whether the services, reports and records |Define what measures are|Goods and services will |To ensure that service | |third party services |provided by third party are regularly |needed and establish who|not be done in a timely |level is established and | | |monitored and reviewed. |to monitor. |manner. |maintained. | | | | | | | |Whether audits are conducted on the above | | | | | |third party services, reports and records,| | | | | |on regular interval. | | | | |Managing changes to third |Whether changes to provision of services, |Define what measures are|Goods and services will |To ensure that service | |party services |including maintaining and improving |needed and establish who|not be done in a timely |level is established and | | |existing information security policies, |to monitor. |manner. |maintai ned. | | |procedures and controls, are managed. | | | | | | | | | | |Does this take into account criticality of| | | | | |business systems, processes involved and | | | | | |re-assessment of risks | | | | |Capacity management |Whether the capacity demands are monitored|Management must decide |Systems will not be able |To establish who will | | |and projections of future capacity |if a third party will be|to process information |monitor computer systems. | | |requirements are made, to ensure that |needed to assist with |needed in a timely manner. | | | |adequate processing power and storage are |their IT needs. | | | | |available. | | | | | | | | | | |Example: Monitoring hard disk space, RAM | | | | | |and CPU on critical servers. | | | | |System acceptance |Whether system acceptance criteria are |Management must decide |Systems will not be able |To establish who will | | |established for new information systems, |if a third party will be|to process information |monitor computer syst ems. | | |upgrades and new versions. |needed to assist with |needed in a timely manner. | | | | |their IT needs. | | | |Whether suitable tests were carried out | | | | | |prior to acceptance | | | | |Controls against malicious |Whether detection, prevention and recovery|IT personnel must ensure|Unauthorized access could |Establish measures to | |code |controls, to protect against malicious |proper measures are in |lead to system shut down. |protect from virus and | | |code and appropriate user awareness |place. | |malware. | | |procedures, were developed and | | | | | |implemented. | | | | |Controls against mobile |Whether only authorized mobile code is | | | | |code |used. | | | | | | | | | | |Whether the configuration ensures that | | | | | |authorized mobile code operates according | | | | | |to security policy. | | | | | | | | | | | |Whether execution of unauthorized mobile | | | | | |code is prevented. | | | | | | | | | | |(Mobile code is software code that | | | | | |transfers from one computer to another | | | | | |computer and then executes automatically. | | | | | |It performs a specific function with | | | | | |little or no user intervention. Mobile | | | | | |code is associated with a number of | | | | | |middleware services. | | | | |Information backup |Whether back-ups of information and |IT personnel will ensure|If not properly manage |To establish back up and | | |software is taken and tested regularly in |that system is properly |could result in loss of |recover of data procedures. | | |accordance with the agreed backup policy. |working. |data. | | | | | | | | | |Whether all essential information and | | | | | |software can be recovered following a | | | | | |disaster or media failure. | | | |Network Controls |Whether the network is adequately managed |IT personnel must ensure|Unauthorized access could |Establish measures to | | |and controlled, to protect from threats, |proper measures are in |lead to system shut down. |protect from virus and | | |and to maintain security for the systems |place. | |malware. | | |and applications using the network, | | | | | |including the information in transit. | | | | | | | | | | |Whether controls were implemented to | | | | | |ensure the security of the information in | | | | | |networks, and the protection of the | | | | | |connected services from threats, such as | | | | | |unauthorized access. | | | |Security of network |Whether security features, service levels |IT/Third party will |The company may not be |To establish what security | |services |and management requirements, of all |advise management the |aware of what is needed to|features of needed to | | |network services, are identified and |necessary requirements |secure the network and the|maintain the network. | | |included in any network services |needed for the network. |system is broken into | | | |agreement. | |compromising information. | | | | | | | | |Whether the ability of the network service|

Sharp

Anna S BA 3103 Critical Analysis Paper Sharp Sharp’s third quarter results showed very disappointing performance. The company reported a ? 249. 1 billion ($3. 12 billion) loss. Moreover, it is forecasting a ? 450 billion, or $5. 6 billion, loss for the fiscal year through 2013. Apparently, the company is burning through more cash than it is generating and having difficulty in securing short-term financing. Also, the company is considering selling some holding in other companies and office building in Tokyo.Furthermore, it’s thinking to sell television assembly plants in Mexico and China, which would reduce its payroll by 3,000 jobs, added to the 5,000 positions assigned for layoff earlier this year. The company has decided to cut the current Sharp’s payroll by 14%. In addition, Sharp's shares are down 75% this year. This paper will conduct a situation analysis of internal and external environment of Sharp’s weak performance. It will also summarize the prim ary causes of company’s weak performance. Internal Analysis Financial ProblemsCurrently the company faces two problems: it is under pressure to reduce interest-bearing debt, which increased to ? 1. 25 trillion since June 2011 and, also, needs to repay ? 200 billion of convertible bonds that mature in September 2013 (Daisuke Wakabayashi). At the end of June 2012, the company’s cash, accounts receivable, inventory and other assets couldn't cover its short-term liabilities. The company is struggling to raise cash. Sharp's net loss for the first half included ? 84. 4 billion in restructuring costs, including a ? 30. billion impairment of assets in its solar batteries unit, a ? 53. 4 billion write-down on inventory, and a ? 61. 0 billion write-down on deferred tax assets. Also, at the end of September, the Sharp's shareholder equity ratio fell to below 10 percent, which is half the rate generally considered a healthy minimum. Sharp remains highly dependent on short-term bor rowings. Weak internal cash flow has forced the company to pay off unsecured promissory note mostly with bank borrowings (Reuters). In addition, the company is currently considering alliance with other companies. You can read also Thin Film Solar CellExternal Analysis Product Demand The Sharp’s main products, LCD TV and flat panels, were accounted for 60% of total revenue in 2012, however, the demand substantially weakened, especially in comparison to Korean rivals. For the first time in the company history, shipments of LCD TVs fell year-over-year, declining just over 3% to 43 million units. The decline had  a  considerable  impact on the market, with total TV shipments falling almost 8% year-over-year in the first quarter of 2012, the drastic decline since the second quarter of 2009.When the market slowed down, Sharp has been left with excess capacity at its domestic plants. Sales of LCD TVs nearly halved in the October-December quarter. The manufacturer of electronics products and their components also reported quarterly sales of solar cells fell by a third from a year ago, slowing demand and increased competition from Chinese makers (James Topham). Global Economy Sharp has st ruggled with a slow economy, losing the power it once got from transition to global digital broadcasting and from subsidies for purchases of energy-efficient goods.Demand for LCD televisions in developed economies has been saturated; however, growth in developing markets is slowing. Also, the strong yen has made Sharp’s products more expensive overseas. Therefore, it is difficult for the company to compete in the global market. Product prices were also affected by Japan's relatively high labor cost, electricity, imported fuels and raw materials. In addition, euro debt crisis became another reason for the slow growth in the world economy (James Topham). Competition Sharp faces increased competition from very large electronic companies such as Apple, Samsung and LG.Samsung  Electronics  Co. , Ltd and LG Electronics, Inc. have generated better profits and strengthened market positions in the TV and panel businesses during 2012, supported by an improved product mix. Samsungâ €™s flat panel TV revenue share remains the largest in the industry, almost 26% (Dan Graziano). Samsung is also the top brand in the key segments of LCD TV, 40†+, LED-backlit LCD, and 3D TV. Also, the company benefits from favorable exchange rates and aggressive investments. Samsung’s current capitalization is $163 billion and Apple’s $634 billion.As opposed Sony, Panasonic and Sharp combined are now  worth only $54 billion at current market values  (Michael Fitzpatrick). Summary Based on internal and external analysis of Sharp’s recent activities, the primary causes of company’s poor performance are: 1) the company is struggling to raise internal cash flow and, therefore, cannot cover its short-term liabilities; 2) the demand for LCD and flat panel TVs has substantially weakened due to global economy slow down; 3) Sharp is facing a fierce competition from Samsung, LG and Apple, which currently holding the largest market shares in electronic manufacturing industry.Bibliography 1) WAKABAYASHI, DAISUKE. Sharp Says Its Future Is at Risk. 1 Nov. 2012. 7 Dec. 2012 ;http://online. wsj. com/article/sb10001424052970204712904578091761289023722. html;. 2) Reuters. TEXT-S;P summary: Sharp Corp.. 30 Nov, 2012. 8 Dec, 2012 ;http://www. reuters. com/article/2012/11/30/iduswlb148420121130;. 3) Topham, James. Sharp Corporation Blames Falling LCD TV Prices, Increase In Yen For Forecast $3. 8 Billion Loss. Feb. 2012. 8 Dec. 2012 ;http://www. huffingtonpost. com/2012/02/01/sharp-corporation-lcd-prices_n_1246028. html;. 4) Graziano, Dan. GLOBAL LCD TV SHIPMENTS FALL FOR THE FIRST TIME EVER. 21 Jan. 2012. 8 Dec. 2012 ;http://bgr. com/2012/06/21/global-tv-sales-lcd-shipments-down/;. 5) Fitzpatrick, Michael. Fear and loathing in Japan. 18 Sep. 2012. 8 Dec. 2012 ;http://tech. fortune. cnn. com/2012/09/18/fear-and-loathing-in-japan/;.

Sunday, September 15, 2019

Global Opportunities for Pounder Bicycle Company Essay

Business firms struggle to remain global in scope and these organizations are faced with several challenges in there contemporary business dealings and there is a requirement for such firms to struggle for there continued existence. Research indicates that business environment keeps on varying as these organizations endeavour to sustain their market share as well as provide quality products/services to there clientele. Business environment entails both internal and external features that may influence upon the expansion and general performance of the business. Contemporary firms are required to construct economic and political links that typically take the structure of transfer of goods, finances and populace across national boundaries. This phase of relationships has in the process witnessed combined sharing of information and philosophies that has led to enhancement in the swiftness of change, ambiguity, uncertainty, and impulsiveness in day to day business undertakings (Lee and Carter, 2005). This paper will therefore examine Australian business environment and particularly examine the current political, economic, social-cultural, technological and legal environmental factors that impacts business entry to Australia. It will further examines the concept of globalization with relevance to Pounder Bicycle Company’s competitors, overall market size, marketing strategies, market entry strategies, project costs and the benefits that the company will attain if it will succeed in Australia. Australia Environmental Analysis Political  Political factors may have a direct and indirect effect on the performance of the Pounder Bicycle Company. Some of the decisions made by the Australian government may impact negatively on the operations of Pounder Bicycle. For instance, the decision to minimize the production and marketing of high performance bicycles to countries believed to be a threat to Australian local industries. This will definitely have huge implications to the company particularly in the marketing of bicycles in Australia. Economic Every business organization including Pounder Bicycle Company is affected by economic factors. Fiscal policy rates, inflation, interest rate policy, cash exchange rates, monetary policy and consumer factors among other economic factors set forth in Australia may have an impact on the company’s undertakings in Australia. Research indicates that the Australian climate of the economy dictates how the consumer behaves in the economy. Australian economy is reported to be in a boom thus there is increased speculation that the company’s customers can obtain the bicycles comfortably i. e. comfortable with the prices of the array of bicycles. Opportunities for the company however exist since Australia government opts cycling of tourists meaning there is market for the bicycles because it supports the economic growth of Australia (Austroads, 1999). Social-Cultural Forces within the Australian community such as family, friends and media will have an impact on how Pounder’s Bicycles will perform in the market. Research reveals that in Australia, many customers have been misinformed to believe that bicycles from Australia only are of quality and of high quality thus those coming from outside Australia may be of low quality. Such social factors affect the customer’s attitude, opinions and interests on how they will approach the Pounder’s bicycles in Australian market. Technological The way Pounder Bicycle Company will operate its business will also depend on technology changes. The internet will boost the company’s chances to meet new markets in Australia and extend its global outreach. However, it can be noted that the company will not require high technological inventions since it will manufacture traditional bicycles and market the bicycles in Australia. Legal  The way the company will operate in terms of operating rules of law in Australia will matter a lot. The company will be engaged in legal business practice of marketing bicycles which is permitted by Australian law. Therefore Pounder Company will not be against the Australian law thus it will be an ideal opportunity for the company to market its bicycles in its new market i. e. Oceania Australia (Cycling Promotion Fund, 2006). Industry Analysis Australia is one of the most powerful nations in the world boasting of a well-built society, politics, customs and economy. It has contributed significantly to the entire economy of Europe and the entire world today over the past. Right from the beginning of European incorporation, it has been a main contributor to the expansion of the European Union and it is looked upon as one of the pillars of the continent and the European Union at large. Australia is vigorously concerned in almost every phase of the European Union and the most outstanding ones are; provision of political leadership, military relations, economies, diplomacy and policy making. Sale of bicycles in Australia is a popular market since many of the individuals living in Oceania use bicycles to travel to workplaces and learning institutions among other places. Research indicates that bicycles in Australia are popular means of transport since many people believe that the use of such bicycles are of great benefits particularly health benefits i. e. by riding bicycles to various places it is a way of exercise thus individuals have no need to go to gyms for further practise. The growth of bicycle industry can be traced back to 17th century in Australia which by then bicycles were the most popular and convenient way of transport in the country. Good economy, stable exchange rates, flexible import duties, better trade tariffs and more importantly, the single currency used by the two countries are factors that promotes international marketing. Europeanization has directly affected the governments of the member states; this means that the developments that Australia has gained so far in culturally and domestically are linked to the European Union’s progress (Hill, 2005). The comments by the Minister of Transport of Australia and Regional Services Mr. John Anderson that the enhancement of the total of secure cycling in Australia will improve the Australian well being automatically indicates that the bicycle industry in Australia is popular and therefore Pounder Bicycle Company has the opportunity to utilize such ready markets in Australia. The minister further believes that a raise in cycling will advance transportation access for lots of the local people in Australia, amplify levels of personal health and also trim down the greenhouse emanations, air contamination and traffic jams. Further more, cyclists and non-cyclists will gain from lesser health expenditure in the society, a smaller amount of traffic on Australian infrastructure and more importantly enjoy cleaner air (Cycling Promotion Fund, 2006). Therefore with such reasons and intentions by the Australian government it implies that cycling is more encouraged and thus Pounder Bicycle Company can venture in Australia since it will face no hostility or lack of market for the bicycles since the government of Australia encourages individuals to use bicycles in their day to day activities. Further, the size of bicycle market in Australia is reportedly to be approximately over a billion dollars at retail level per year; adults in this case are highest buyers or owners of the bicycles as compared to children. Also there are a variety of bicycles being sold by different companies who manufacture bicycles in Australia; many have emphasized on the comfort and speed of such bikes. Therefore with such industry trends in Australia Pounder Bicycle Company will have the opportunity of selling traditional bicycles to Australians since research indicates that such types of bicycles are on the decline (Cycling Promotion Fund, 2006). Market Pounder Bicycle Company should not concentrate on the Australian bicycle market but instead should identify particular market segments which will record high sales of traditional markets. Therefore the company will have not to compete in the entire market but rather identify its strongest segments that will ensure success of the company in Australia. Pounder Bicycle Company should utilize encirclement strategies for winning the competitors in Australian bicycle market. Such a strategy is also referred to as envelopment strategy and it is considered subtle, moderate and a bit non-offensive but dangerous way of offending the rival. Pounder Bicycle Company can utilize two ways using his approach. First, the company can introduce broad range of bicycles that are alike to the competitor’s bicycles and each of these bicycles will get a share of the same market the competitor is currently in. In the long term, the rival will be demoralized, undermined and depressed thus the competitor at large may opt to give up the market. Such technique will ensure that full scale confrontation is avoided between the company and the target competitors in Australia (Brassington and Pettitt, 2000). The second approach that the company may utilize is that approach of market niches rather than concentrating on bicycles themselves. In this approach, the market share is liberated from the target competitor via the expansion of market niches that surround it. With such strategies therefore the company can achieve substantial market share which will eventually leads to success of the company in the long-run (Brassington and Pettitt, 2000). Market Entry Since Pounder Bicycle Company has opted to go international i. e. enter Australian market several market entry strategies are available to the company to utilize. However, such entry strategies differ with cost, risk and the degree of control which can be put into effect over them with particular regards to security of markets i. e. whether it will be successful. Pounder Bicycle Company should utilize the indirect method of entry to Australian market: Under indirect exporting market entry strategy, an exporter can access foreign market free from risks of doing it directly. It will involve Pounder Bicycle Company using independent organizations within the Australia’s domestic markets. The company can do this through various ways; for example, a domestic based export merchants, who will take the title of the bicycles and sells them in Australia, domestic based export agents who sell and market the bicycles on behalf of the company and co-operative organizations who act on behalf of the company. Pounder Bicycle Company should utilize such strategy by either choosing to use one of the above methods of indirect exporting because of the following advantages; communication is very much easy because the exporting company is domestically based and the risks of investing are much lower than coming up with full market in the host country i. e. in Australia (Kotler, Armstrong, Saunders, and Wong, 1999). Project Costs and Financing The whole project of entering the Australian market will require Pounder Bicycle Company to have substantial amount of resources in order to ensure the success of the firm in its business endeavours. The cost of entering the market for instance may be high thus necessitating the company to look for alternative way of sourcing funds. Further the cost of materials to manufacture enough bicycles to be sold in Australia may be high. The company therefore can utilize its own resources i. e. its savings although it should not exhaust all the financial resources in such venture because business entails risk taking. Therefore, the company should opt for loans from financial institutions in order to combine such funds with the internal financial resources that it has. Clear financial forecasting as well as financial cash budgets should be prepared by the company’s management in order to spend the financial resources effectively and wisely. HR Issues and Organization Structure Pounder Bicycle Company will be faced by issue of workforce diversity which is the spread of human labor across the entire globe irrespective of their area of specialization and skills entailed. The existence of the globalization concept have been realized when diverse patterns in workforce are put into consideration. Pounder Bicycle Company will also employ people from the host country i. e. Australia thus the firm will have to adhere to rules and regulations set forth for businesses in Australia regarding employer-employee relationships (Hoyer, 2001). The most excellent means Pounder Bicycle Company can openly develop its financial performance in the industry is to employ, choose and train the right personnel. The most excellent strategic exercise to realize this goal is to carry out what is usually termed as job-fit practice. Such practice is practical to the company since the workforce to be recruited will not be required to undertake further extensive training but carry out their responsibilities right away applying their skills gained somewhere else. Organizational effectiveness can only be achieved if the management of the company is be able to incorporate good leadership, motivation, a well defined organizational structure, forming group dynamics and setting up good structures for communicating in the workplace. Pounder Bicycle Company should formulate a flexible organization structure in the sense that they should be ready to cope with change without affecting their productivity especially when it intends to go international (Cullen and Parboteeah, 2005). Strategic Benefits to Pounder Bicycle Company An analysis of business environment will help the company to know of all the strengths, weaknesses, opportunities and threats that the company will face in there quest to expand to Australian market. Therefore the company will be able to consider the following factors: The speed of entering the Oceania market, flexibility/free and exit barriers, the costs to be incurred when entering Oceania market, the risks inherent in the course of entering the market, period of payback/how quick the firm can start earning the returns or proceeds from such investments and the company’s long run goals among other factors will be clearly known in advance. With ascertainment of the above factors therefore, Pounder Bicycle Company will be able to identify its strategic benefits form any opportunities that exist in the Australian market. For instance, the company will benefit from large market share since there is high demand of bicycles in Australia thus the company will realize substantial revenues because of high sales. The company will also strategize well in Australia thus being able to compete effectively with its both local and international competitors (Lovelock, 2006). Conclusion Business environment keeps on changing because of globalization and the concept of international businesses. Businesses therefore are faced with a lot of threats as well as have a lot of opportunities brought about by such aspects of business world. To attain greater investments and better market opportunities in the international market, it is necessary that primary and secondary market research is done (Cullen and Parboteeah, 2005).