Wednesday, May 6, 2020

Social Media and the Law - 1571 Words

The First Amendment, granting Americans the right to freedom of press, freedom of speech, freedom of religion, freedom of assembly and freedom to petition the government, has been one of the most heavily debated since its ratification in 1791. For years, court cases pertaining to the amendment have abounded, particularly in relation to the freedom of speech. From cases defining obscenity to those allowing for expression, the meaning of the freedom of speech has changed greatly through the years. Similarly, so has the freedom of press. As technology evolves – from the first printing press to Google Glass – so too does the media. New media calls for new laws and precedents, and social media has been no exception. The rapid pace and†¦show more content†¦A federal court ruled that online services were simply distributors and therefore not liable for any information posted on their servers (Cubby, Inc. v. CompuServe, Inc.). This set precedent for online libel for ye ars to come. A 1995 case, Stratton Oakmont, Inc. v. Prodigy, had a different outcome for internet service providers. Prodigy hosted a â€Å"Money Talk† bulletin board open for user comment, and on that board, a user alleged that Stratton Oakmont, Inc. and its president had committed criminal and fraudulent acts. The company and its president then sued Prodigy for defamation, contending that Prodigy was a â€Å"publisher† and therefore liable. The plaintiff argued that this case was different than Cubby v. CompuServe because Prodigy said on its bulletin board that it exercised editorial control, and the court found this to be true, ruling in favor of Stratton Oakmont, Inc. (Stratton Oakmont, Inc. v. Prodigy). The nation, and Congress, took note of the decision. A year later in 1996, Congress passed the Communications Decency Act (also referred to as the Telecommunications Act). The act changed internet and the First Amendment, and section 230 specifically addressed how interactive computer services were legally regarded. Instead of falling into a category with newspapers or magazines, which are liable forShow MoreRelatedSocial Media And The Law Enforcement3632 Words   |  15 Pagesgrounds between the law enforcement and the public, can help to control the situation without any party feel being cheated. Introduction Before the invention of Facebook, twitter, and many others, social media data collection was used by companies to get customers’ impression about their products. However, nowadays with modern technology the game has changed. Following the discoveries of these various social media networks, users areRead MoreThe Effects Of Social Media On Law Enforcement1255 Words   |  6 PagesDaniel Cabrera ISS1120 Social Environment Professor Pauline Nogueira October 30, 2015 The Effects of Social Media on Law Enforcement Since the up-climb of social media began in 2003, law enforcement has greatly adapted to the social media network in order to better communicate with the public and to improve their protocol. Much of police work is unappreciated and unknown of. Therefore, some departments have taken it upon themselves to educate the public via social networks, such as Twitter and FacebookRead MoreThe Impact Of Internet And Social Media On Copyright Laws1061 Words   |  5 Pagesimpact of the internet and social media on copyright laws? What is the impact of the internet and social media on copyright laws? Haley Leshko CGS-1000 March 10, 2017 Mr. Newfield WHAT IS THE IMPACT OF THE INTERNET AND SOCIAL MEDIA ON COPYRIGHT LAWS? Introduction Copyright laws were established to protect the original work of individuals since 1709. At present only two acts are in effect today, the copyright Act of 1909 and 1976. (United States Copyright Laws) These works protect theRead MoreTechnology And Laws That Protects Information On Social Media939 Words   |  4 Pagestechnology and laws that protects information on social media. In continuation, in order to have access into a home there are guidelines and regulations that officers must abide by. â€Å"The U.S. Supreme Court has recognized only a limited number of ways for law enforcement officers to justify lawful entry† (Rutledge, 2014, pg.1). People have a right to privacy and protection in their home, vehicle or any other personal property against illegal search and seizures. It is imperative that law enforcementRead MoreThe Laws and Regulations Impacting Commercial Transactions on Social Media2141 Words   |  9 Pagesï » ¿Social Media †¦By 2011, approximately 83% of Fortune 500 companies were using some form of social media to connect with consumers. Furthermore, surveys suggest that consumers are increasingly relying on social media to learn about unfamiliar brands†¦ (Naylor, et. Al, 2012). Introduction. As of March, 2013, Facebook has a reported 1.13 billion users each month, and each day up to 665 million people log on to Facebook (AP, 2012). And according to attorney Brian Socolow, with Loeb Loeb, seventy-twoRead MoreEssay about Social Media is a Source for Criiminals and Law Enforcement1748 Words   |  7 PagesSocial media has become a popular tool for both criminals and law enforcement. There are a lot of different perspectives about how social media is instrumental to crime and solving crimes. On one hand, law enforcement can use social media websites such as Facebook and Twitter to find evidence about specific crimes. On the other hand, digital villains can use social media to break the law. This could include crimes as small as illegally downloading music, anywhere upwards to broadcasting the sellingRead MoreComprehensive Legislation Of Social Media Privacy1559 Words   |  7 Pages Comprehensive Legislation to Protect Social Media Privacy Reading and Writing Workshop II, Section 007 Qiu Jin (Rachel) August 11, 2014 Comprehensive Legislation to Protect Social Media Privacy Abstract The article makes a research on both the present situation of social media users’ privacy, and the work of the FTC and other federal departments to protect social media privacy. However, without a comprehensive legislation in the federal level, the fragmentation of such trial cannotRead MoreSocial Media And Its Impact On Society1350 Words   |  6 PagesExecutive Summary Social media has changed the way organizations collect and distribute information to the public. Likewise, the personal social medias of employees have the power to negatively impact the reputation of the organization to which they are employed. Due to the rising number of employee social media scandals, many organizations have implemented social media policies. In addition, organizations have begun monitoring social media to not only ensure that employees are maintaining professionalRead MoreSocial Media s Impact On Society s Life Of Organizational Workforce1329 Words   |  6 PagesSocial media become part of today’s life of organizational workforce. There is an increasing interest from organizations to use social media information to manage their employees. But the use of social media for employment decisions may raise many legal problems and concerns. Numerous discussions have focused on whether employers’ interests in the use of social media might invade employees ’ privacy and speech rights (Segal, 2014; Lam, 2016; Abril, Levin, Riego, 2012; O’Connor Schmidt, 2015).Read MoreSocial Media Has Changed Communication1100 Words   |  4 Pages â€Å"Social media has changed how people communicate and interact, how marketers sell products, how government reaches out to citizens, even how companies operate (Kirkpatrick, n.d.).† As the prevalence of social media continues to rise, consumers are recognizing ways in which social media can direct them to better sources of purchasing. Social media sites like Twitter, LinkedIn, and Facebook have allowed businesses to market their products and scout for employees. As a result, businesses are now

How Do Men and Woman Communicate Differently Free Essays

How do men and woman communicate differently in relationships? Monique Giresi Professor Martin Analytical Reading 81148 I. A. How To Stay Married Anne Kingston Magazine Article B. We will write a custom essay sample on How Do Men and Woman Communicate Differently? or any similar topic only for you Order Now He Said, She Said Deborah Tannen Magazine Article II. A. The magazine article titled, â€Å"How to Stay Married,† begins with a story about a 68-year old woman named Cynthia. The article has a narrative style of writing in the beginning, however as one reads on, the style converts to expository. Anne Kingston, the author, begins to teach the reader by using examples of others and personal experiences to support her point. B. The magazine article titled, â€Å"He Said, She Said,† is an expository piece of writing. Deborah Tannen, the author, is a professor of linguistics at Georgetown University, and the author or several books; proving that Tannen is very knowledgeable on this subject. Throughout the article there are many examples (such as pre-school children conversing) in which Tannen uses to as proof, to show that man are more interested in hierarchy, and woman are more interested in equality. III. A. How To Stay Married * Stability 1. â€Å"†¦better health, a rich shared history, the comfort of having omeone who has your back, and personal and economic stability amid global uncertainty. † (p2) 2. Stability- To have a solid and strong balance or partnership. 3. Having my boyfriend by my side as a person to talk to when I was upset, gave me a great sense of the stability. * Amid 4. â€Å"†¦better health, a rich shared history, the comfort of having someone who has your back , and personal and economic stability amid global uncertainty. † (p2) 5. Amid- During a course of something. 6. I know that I’ll always have my family for support amid the stressful school year. * Rampant 7. †¦sexual secrecy in marriage is rampant, from a woman buoyed by the memory†¦Ã¢â‚¬  (p4) 8. Rampant- Uncontrollable rage. 9. When sitting in class during a discussion, it is rampant that I respond my opinion. * Infidelity 10. â€Å"Not that Krasnow is advocating infidelity, though flirting is fine†¦Ã¢â‚¬  (p4) 11. Infidelity- Adultery; cheating on your spouse. 12. In my house, we don’t believe in divorce, nor do we believe in infidelity. Therefore, we get married at an older age so we are sure the man/woman is worth the marriage. * Extramarital 13. â€Å"Unlike husbands, wives are driven to extramarital affairs†¦ (p4) 14. Extramarital-Having sexual intercourse with someone other than your spouse. 15. It is wrong in many religions for on e to include themselves in extramarital affairs. ————————————————- B. He Said, She Said * Innumerable 16. â€Å"†¦sheds a light on innumerable adult conversations – and frustrations. † (p3) 17. Innumerable- Incapable  of  being  counted;  countless. 18. Some art has innumerable opinions on its meaning. * Fathom 19. â€Å"†¦he did exactly what she requested and cannot fathom why she would keep talking about a problem†¦Ã¢â‚¬  (p3) 20. Fathom- To understand; discover the meaning of 21. Many people cannot fathom the reasoning of some criminal’s actions. * Commiserate 22. â€Å"in other words, â€Å"topping† each other can be another way to commiserate† (p4) 23. Commiserate- To feel or express sorrow or sympathy for. 24. Everyday my mother calls my aunt and asks how she is feeling. She doesn’t do this because she should, she does it to commiserate my aunt. * Interplay 25. â€Å"How does this way of talking reflect the interplay of connection and hierarchy? † (p5) 26. Interplay- Circumstances, events, or personal relations. 7. How does practicing a sport from a young age reflect the interplay of performance later in life? * Inextricably 28. â€Å"The two are not mutually exclusive but inextricably intertwined. † (p7) 29. Inextricably- Extremely involved. 30. I am inextricably concerned with my schoolwork. IV. A. The magazine article titled, â€Å"How to Stay Married,† i s written in a cause –effect pattern of organization. Authors who use the cause-and-effect approach don’t just tell what happened; they try to explain why it happened too. In this article, author Anne Kingston uses various examples of cause-and-effect. One sample from Kingston’s article is, â€Å"it’s precisely the disconnect between that expectation that husband and wife be everything to one another and the reality of marriage that causes women to keep secrets†¦Ã¢â‚¬  (p3) Here Kingston begins her statement with the effect and concludes it with the cause of women keeping secrets. B. The magazine article titled, â€Å"He Said, She Said,† is written in a comparison-contrast pattern of organization. Authors who use the comparison-contrast approach both; compare and contrast two things throughout the argument. In this article, author, Deborah Tannen uses several examples of comparison-contrast. One illustration from Tannen’s article is, â€Å"her point of view, asking directions means making a fleeting connection to a stranger and getting where you are going without losing anything. From his perspective, he would be putting himself in a one-down position to a stranger†¦Ã¢â‚¬  (p4). Here Tannen shows how opposite men and women think sometimes. V. C. How To Stay Married * Facts 1. â€Å"And what their stories reveal is that marital longevity requires wives to establish strong, separate identities from their husbands through creative coping mechanisms, some of them covert. (p2) Fact because there is proof within the book â€Å"The Secret Lives of Wives: Women Share What Its Really Like To Stay Married. † That book shares stories from different women, all proving this statement to be true. 2. â€Å"Both the marriage rate and divorce rate are dropping. † (p3) Fact because the evidence to this is created from true statistics. D. He Said, She Said * Fa cts 3. â€Å"†¦men’s talk tends to focus on hierarchy†¦whereas women’s tends to focus on connection†¦Ã¢â‚¬  (p2) Fact because earlier the author explains that she has collected and analyzed thousands of men and women interacting for over three decades. Her gathered information has led her to this conclusion. 4. â€Å"†¦I have a brother named Benjamin and a brother named Jonathan†¦I have a brother named Benjamin and a brother named Jonathan, too†¦why she would say such a thing. † (p3) Fact because the father is explaining a conversation that really happened. VI. E. How To Stay Married * Opinions 5. â€Å"Divorce fractured families. † (p3) Opinion because there are cases in which a divorce can help the family. Sometimes it may decrease arguments and stress. 6. †¦couples should give each other ‘space’ for marriage to thrive†¦Ã¢â‚¬  (p3) Opinion because some couples may feel that for a marriage to thrive the couple should be together as much as they could and share new experiences together as a whole, as one. F. He Said, She Said * Opinions 7. â€Å"†¦actual sibling relationships are defined not only by the connection of shared family, but also by the hierarchy of birth order. † Opinion because this is not true with every family. For example, I’m the youngest and my sibling and I feel equal among each other. We don’t see one another as higher, lower, better or worse. 8. Sisters often feel acutely competitive about who knows what about family member’s secrets-or who knows what first. † (p6) Opinion because this isn’t true for every sister relationship. For example, in my family we don’t have a preference with who knows what first, as long as eventually we all get to know the information. Every family is different and every sister relationship is not alike. VII. G. The magazine article â€Å"How to Stay Married† by Anne Kingston discusses women’s role in modern marriages. There are several examples taken from the book â€Å"The Secrets Lives of Wives: What It Really Takes to Stay Married. This article also shares some stories of women committing adultery and Kingston provides some advice on the t ype of person one should marry. H. The magazine article â€Å"He Said, She Said† by Deborah Tannen discusses the different conversation styles of men and women. There are various examples proving that men’s discussion focuses more on hierarchy, and woman’s dialogue emphasizes more on connection. Some samples throughout the article include; a man and woman lost-wondering if they want to ask a stranger for directions or not, preschoolers playing with classmates, and sibling relationships. VIII. How Do Men And Women Communicate Differently In A Relationship? To start, men and women communicate differently in, or out, of a relationship. This is proven by Deborah Tannen in the magazine article â€Å"He Said, She Said. † Tannen explains that â€Å"†¦men’s talk tends to focus on hierarchy – competition for relative power – whereas women’s tends to focus on connection – relative closeness or distance†¦Ã¢â‚¬  (p2) Tannen enforced her statement by filming preschoolers and proving the same conclusion. From this, we learn that these characteristics within us humans are not learned. Instead, they are with us from our childhood and throughout life. Sometimes these opposite perspectives create conflict within a relationship. For example, if a couple is lost and in need of directions; the male would prefer to figure it out on his own and the women would wish to get to the destination as soon as possible. The man will feel overpowered by a stranger who knows where to go, while the woman would feel it’s reasonable to ask someone, in order to save time. In addition, women expect too much from their relationship. Sometimes they rely on their husbands for happiness. However, in the magazine article, â€Å"How to Stay Married† Anne Kingston explains, â€Å"wives who don’t rely on their husbands for happiness end up having the happiest marriages. † (p2) When women don’t feel the passion from their husbands they begin to feel lonely, and this leads to the unfortunate, adultery. Kingston reveals, â€Å"it’s precisely the disconnect between the expectation that husband and wife be everything to one another and the reality of marriage that causes women to eep secrets†¦Ã¢â‚¬  (p3) For example, if women were to talk about a problem she is having, she is looking for comfort, but the man may interpret that she is looking for a solution. Tannen explains, â€Å"†¦a man may well misread her conversational gambit as a request for help solving the problem. The result is mutual frustration: she blames him for telling her what to do and failing to provide the exp ected comfort, whereas he thinks he did exactly what she requested and cannot fathom why she would keep talking about a problem if she does not want to do anything about it. (p3) The communication difference between the opposite genders is inevitable. As Kingston writes, â€Å"you should marry someone who is flexible, confident and trusts you: if you can’t count on your husband or wife in a crazy unstable world then you’re marrying the wrong person. †(p5) IX. Works Cited Kingston, Anne. â€Å"How To Stay Married. † Maclean’s 10 October 2011: 6. Academic Search Complete. Web. 31 October 2011. Tannen, Deborah. â€Å"He Said, She Said. † Scientific American Mind May/June 2010: 8. Academic Search Complete. Web. 31 October 2011. How to cite How Do Men and Woman Communicate Differently?, Essay examples

Performance Of Small And Medium Enterprises †Free Samples

Question: Discuss about the Factors That Affect The Performance Of Small And Medium Enterprises(Smes). Answer: Introduction Small and medium enterprises contribute in the development of any nation. They are sources of revenues to the government, source of employment and a means of poverty eradication in a country. However, these small and medium enterprises are faced with lots of problems and they sometimes end up failing(Langenberg, 2005). Factors that has contributed to the failure of the SMEs are both internal factors and external factors within the business environment. The challenges that they face limit them from surviving and growth. The study aims at arriving at a summary of the main factors that contributes to the failure of these business enterprises and coming up with measures necessary to curb this problem. The approach in determination of this factors is a quantitative approach that is based of statistical facts from data collected. Objectives of the study. The main objective of this study is to determine the factors that affect the performance of small and medium business enterprises. These factors under analysis are both internal and external factors. The specific objectives include application of regression analysis in determination of these factors and coming up with various measures to help in survival and growth of small and medium business enterprises. Scope of the study The proposed research project aims at determination of internal and external factors that have resulted in poor performance of the SMEs. The data to be used is both qualitative and quantitative which will be collected by use of well-structured questionnaire. The study is limited to only small and medium enterprises. Literature review An enterprise is a word that has been used in a range of contexts. In business, the word has been used to mean a way of creating wealth through risk taking activities(Indarti, 2004). An enterprise can also be said to be a system that consists of an effector, detector and selector. The detector detects any information in the business environment which is then sorted out and selected. The work of the effector is to make use of the selected information about the business environment. Firm performance is used to refer how the business behaves in the business environment. Performance can be negative or positive depending of various factors that affect the business. These factors may be because of internal or external influence(Lancaster, 2001). Small and medium enterprises (SMEs) have a definition that varies from one party to another and each of these definition is subject to any form of critics. SMEs can be classified according to type of goods produced or services offered, level of production, size of stock or even according to the profit realized per trading period. All these definitions might be taken to mean one and the same thing. Factors affecting the performance of the SMEs. Various factors have been suggested each one of them has an extent to which it has contributed to the success or failure of an enterprise. Empirical studies that involved factors that negatively affect the performance of an SME, showed that the factors can be divided into two groups(Hitt, 2000). It was based on whether they focus on a variable of a limited source or on profiles of the failed SMEs. Both case studies and surveys have been used in past empirical studies on factors contributing to the poor performance of the SMEs. Some compilations of previous studies result such as Storey (1994) focused on the stages of SMEs starting from birth, the growth and finally the death of small firms. Recent studies based on surveys and case studies have come up with the factors that affect the failure or success of a given small firm in an economy. Maria Langenberge and Narul Indarti (2005) came up with the key components that are important in the analysis of the business success. The components included the characteristics of the small firms, the character traits of the entrepreneur and the elements in the development of SMEs. Effects of different practices of management on small firms was investigated by Gadenne (1998). He studied 369 small enterprises in the manufacturing, service and retail industry. Pearson and Baker (1993) studied financial performance and plannings in the cleaning industry. The relationship between market performance and orientation was explored by Pelham (2000). The main factors that are said to contribute to poor performance of SMEs can be explained as below; Inadequate access to credit. This is a factor that has affected almost all the SMEs and many that have failed regard this as a main cause. The SMEs need to have a source of credit facilities to enable them make purchases and have adequate capital to run their business. Lack these credit facility leads to business failure Lack of managerial experience Any business activities need managerial knowledge. This is because a business is a matter of taking risks. The owner of the business or the manager need to understand risks management and he or she is also expected to have other basic managerial skills. Lack of managerial skills leads to huge losses an eventually the business dies. Government regulations All business activities are regulated by government. These regulations may be in favor or against the business enterprises. Regulations requiring businesses to pay taxes at a higher rate are unfavorable as they deprive the business savings. such regulations imposed by government leads to poor performance of the business and may eventually lead to collapse. Lack of access to business information services Any business activity requires the owners to be well informed on the current trends in the market. A business that has no means of acquiring the trending information may be left out in case of opportunities such promotions and arrival of new products. It is therefore important to stay well informed on current issues and trends in the market. Poor infrastructure Many of the small enterprises are in remote areas where infrastructure is so poor. Transport and communication becomes a problem. Entrepreneurs need good road network to supply their goods. Accessing target customers becomes a problem and in return it leads to business failure. Liedholm and mead (1998) stated that the main factors that have contributed to poor performance of the SMEs is not about their small size but isolation. This prevents them from access to finance, markets and information. Most of the enterprises are established and operated by one person and this has led to low chances of survival of the business on the long run. The list of the factors affecting the performance could be endless but this study aims at concentrating on only the above factors for analysis. Research gap As noted in the above literature review, most of the research done emphasized of identification of the factors contributing to the poor performance of the SMEs. No work has been done to quantify the extent to which the above factors has contributed to poor performance. All the above factors are causes of poor performance but each has a magnitude to which it has contributed in the failure of the business. This research proposal is meant to give a quantitative approach on the factors that has led to poor performance of the SMEs and give the extent to which the factor has contributed. Research hypothesis The research hypothesis is as formulate below; Null hypothesis(H0); Factors that affect the small and medium enterprises have the same magnitude. Alternative Hypothesis (H1): Factors that affect the small and medium enterprises are not of the same magnitude. The hypothesis will be tested at 5% level of significance. Research questions This study intends to answer the following questions; Primary question What are the main factors contributing to poor performance of the small and medium enterprises? Secondary questions To what extent does these factors contribute to the overall performance of these small and medium enterprises? How can linear regression be applied to the assessment of factors that affect the performance of these small and medium enterprises? Which is the best data analysis tool to use when it comes to qualitative data? Research design and methodology This part discusses the design of the research and methodology to be used in the study. The target population, sample design, data collection method, instruments used as well as data analysis tools are also to be explained. Research design In his work, Kothari (2004), a good research design consists of a conceptual framework in which research would be conducted with the main aim of collecting relevant data or evidence at low cost. John W. Creswell (2009) defined research design as an ordered plans and procedures meant to use data collected and the analysis tools to come up with a decision. This study intends to use a cross sectional method of design since it is the best method that suits our problem that is aimed at finding the prevalence of a problem. According to this study, we intend to come up with the factors affecting the performance of small and medium the enterprises where data will be collected once. The design method is cheap and it therefore fits our study. Reliablity and validity The study aims at collecting data from small and medium enterprises owners in both urban and rural areas. The owners, managers and employees are considered as the main target through which the data will be collected. The targeted correspondents will be interviewed by means of asking them to answer both closed and open answers only. This method will provide a reliable data that is first hand and can be said to be valid for this study. Variable specification Performance of the enterprises will be measured by monthly income in US dollars. This becomes the dependent variable under study. The independent variables are the factors under study sated earlier. Some of these factors are qualitative while others are quantitative. The qualitative variables are to be measured on a scale that shows the degree to which the factor has contributed in performance Sampling technique This study aims at use of a sample of the population to make a good inference about the entire population of the small and medium enterprises. To determine the sample size, we need to determine the following to apply them in our formula; Size of the population This refers to the summation of all available small and medium enterprises that are there in the region under study. The data is to be obtained from national sources that are concerned with registration and licensing of businesses. Level of confidence This refers to the extent to which one believes that the actual mean is within the confidence interval. The most common is 95% which will be used in this study. Confidence interval This is also called There is no determined sample that will be perfect. We therefore need to determine how much error we can allow. The confidence interval, also called error margin helps to determine the range in which the sample mean is expected to fall in relation to the entire population. This study has decided to use a margin error of 5%. Standard deviation Responses are expected to vary and we must have an allowance for this. The study has the intention of using a standard deviation of 0.5 which is the standard value to use since it will ensure that our sample is large enough(R., 2001). Sample size Having the above parameters, we will use the following mathematical formula to determine how large our sample will be. Our confidence level corresponds to a Z score. For 95%, the Z- score will be 2.576 This value is obtained from statistical tables. The next thing is to plug the values of the parameters above in the following formulae; Sample size = Having determined the sample size required, we therefore proceed to the method that will be used in data collection for our survey. Data collection and analysis method Data collection This study intends to use oral interview to the small and medium enterprises mangers, owners and employees. A well-structured questionnaire that consists of both closed and open-ended questions will be used to gather information. Using questionnaires, the correspondents will be interviewed and the responses given will be filled in the questionnaires by the researcher. Questionnaire design The questionnaire consists of 8 questions which will be helpful in collecting the required information. The sample questionnaire is as shown in the appendix. Quantitative and qualitative research Data analysis method After data has been collected, the analysis is to be done using statistical program for social sciences (SPSS). The program is to be used since analyses both quantitative and qualitative data sets. The analysis is meant to come up with a regression model on the factors that have affected the performance of small and medium enterprises. Each factor will have a coefficient that shows the extent to which it has contributed to the monthly income of the enterprise. The regression model will be of the form; Y= 0 + 1 X0 + 2 X2+ 3X3 + 4X 4+ 5X5 Where; Y is the dependent variable representing the monthly performance of the enterprise. Bi represents the coefficients associated with various factors under study. Research limitations This study intends to focus on only five main factors that are affecting the overall performance of the small and medium enterprises. However, many factors have contributed to poor performance of these small and other medium enterprises. This call for further research on other factors that have contributed to poor performance. Also, the use of questionnaire is not enough to have accurate information concerning the small and medium enterprises. More accurate surveys need to be conducted to have data that is good enough to make recommendations and conclusions. Time schedule This study intends to take place for the period starting 1st November 2017 to 30th November 2018. The one year will be enough to collect the required data and analyse for the purpose of giving a timely report. Conclusion Small and medium enterprises are as important as other forms of businesses and they need to be protected from poor performance. To do this, the factors proposed in this study will be helpful in determination of the extent to which they affect the business performance. Data collection and analysis are to be done with the highest level of accuracy to produce reliable results. This proposal calls for further research to find more factors that have affected the performance all types of business activities. References Bridge, S. O. K. . C. S. (., 2003. Understanding Enterprise, Entrepreneurship and Small Business. New York: s.n J Storey,(2000). Understanding the Small Business Sector. London: Thomson Learning. ISBN 1-86152-381-5. Hitt, M. I., 2000. The intersection of entrepreneurship and strategic management research, inHand book of entreprenuership. s.l.:Oxford Indarti, K. S. ., 2004. Entrepreneurial Intention among Indonesian and Norwegian Students. Journal of enterprising culture, 12 . Lancaster, R., L. D . L, 2001. Moving towards a control technique to help small firms. s.l.:s.n. Langenberg, I. . M., 2005. Factors Affecting Business Success among SMEs. R., P. G., 2001. Growth and performance of manufacturing SMEs: The influence of financial management in performance. International small business journal, pp. 11-30 Wiklund Shepherd. (2004). Entrepreneurial Orientation and Small Business Performance: A Configurational Approach. Journal of Business Venturing, Vol. 20, Swierczek, F. W., T.,Ha, T. (2003). Entrepreneurial orientation, uncertainty avoidance and firm performance: International Journal of Entrepreneurship and Innovation, 4(1), p.25-48. Pelham, A. (2000). Market orientation and other potential influences on performance in small and medium-sized manufacturing firms. Journal of Small Business Management, p.40-69. McMahon, R. G. P. (2001). Growth and performance of the manufacturing SMEs: The influence of financial management characteristics. International Small Business Journal, 19, p.15-27. Meier, R., M Pilgrim, (1994). Policy-Induced Constraints on Small Enterprise Development in Asian Developing Countries. Small Enterprise Development, 5(2), p.66-78. Norlaphoompipat, T. (2008). Definitions of SMEs. Institute for Small and Medium Enterprise Development. The International Journal of Entrepreneurship and Innovation, 4(4), p.251-263. Mazzarol, T., Choo, S. (2003). A study of the factors influencing the operating location decisions of small firms. Property Management, 21(2), p.190-208. T., Volery, T., Doss, N., Thein, V. (1999). Factors influencing small business start-ups. International Journal of Entrepreneurial Behavior and Research, 5(2), p.48-63. Mulhern, A. (1996). Small businesses and the economic crisis International Journal of Entrepreneurial Behavior Research, 2(2), p.69-79. Mead.,C., Liedholm, C. (1998). The dynamics of micro and small enterprises in developing countries.World Development, 26(1), p.61-74. Michael Porter. (1985). Competitive Strategy, Techniques for Analyzing Industries and Competitors, Free Press,New York. William G,Susan M James M, (2005). Fundamentals of Business: Starting a Small Business. McGraw-Hill: New York

Thursday, April 30, 2020

Time Value of Money Exam Questions Essay Example

Time Value of Money: Exam Questions Essay Time Value of Money Project Show all your work! Name _________________ 1. If Mrs. Beach wanted to invest a lump sum of money today to have $100,000 when she retired at 65 (she is 40 years old today) how much of a deposit would she have to make if the interest rate on the C. D. was 5%? a. What would Mrs. Beach have to deposit if she were to use high quality corporate bonds an earned an average rate of return of 7%. b. What would Mrs. Beach have to deposit if she were to use common stock and earned an average rate of return of 11%. c. What type of a problem is this? __________ 2. If you had a payment that was due you in 5 years for $50,000 and you could earn a 5% rate of return, how much would you accept as payment today for this payment in the future? a. If your rate of return is 8%, how much would you accept as payment today? b. If your rate of return is 10%, how much would you accept as payment today? c. What type of a problem is this? ___________ 3. You want to save enough money to retire as a millionaire. If you could earn 10% with common stocks, how much would you have to set aside per year to have $1,000,000 when you are 65? . If you were going to make a deposit monthly, how much would you have to set aside per month to have $1,000,000 when you are 65? b. If you were able to earn 11%, how much would you have to set aside per month to have $1,000,000 when you are 65? c. What type of a problem is this? ___________ 4. If you were going to buy your office from Mrs. Beach for $500,000 with a 10% down payment, 15 years financing with a 6% interest rate, how much would your payments be each month? a. What would be the principal and interest payment on the first payment? b. What would be the principal and interest payment on the twelfth payment? c. What type of a problem is this? ___________ 5. Same problem as above, but assume that the loan was for 20 years? What is the new payment? a. What would be the principal and interest payment on the first payment? b. What would be the principal and interest payment on the twelfth payment? c. What type of a problem is this? ___________ 6. You want to purchase a truck for $25,000 and you have $3,450 to put down. How much will your payments be if you financed the truck for 60 months at 6%? a. How much would the payment be if rate of interest is 5% and you only financed the truck for 48 months? b. Assuming that you would only finance the truck for 4 years, how much would you need to put down to get your payment to $450. 00? c. What type of a problem is this? ___________ 7. You have $350. 00 per month to spend on a car payment. If your credit union charged 7. 5% interest on a used car, how much car can you purchase if you will only finance for 4 years? __________ 8. If you want to purchase a home. You have $15,000 to put down. All you can afford is $1,500. 0 per month and you do not want to finance for more than 15 years @ 6% interest, (your taxes will be $85. 00 per month and insurance $200. 00 a month), what is the amount you can pay for your home? (Show all your work) 9. You want to purchase a business with the following cash flows. How much would you pay for this business today assuming you needed a 14% return to make this deal? a. Year 2011 $150,000 b. Year 2012 $175,0 00 c. Year 2013 $225,000 d. Year 2014 $275,000 10. How much would you pay for this business today assuming you needed a 18% return to make this deal? What type of a problem is this? _______________tm We will write a custom essay sample on Time Value of Money: Exam Questions specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Time Value of Money: Exam Questions specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Time Value of Money: Exam Questions specifically for you FOR ONLY $16.38 $13.9/page Hire Writer

Saturday, March 21, 2020

Valence Electron Definition in Chemistry

Valence Electron Definition in Chemistry A valence electron is an electron that is the most likely to be involved in a chemical reaction. They are typically the electrons with the highest value of the principal quantum number, n. Another way to think of valence electrons is that they are the outermost electrons in an atom, so they are the most susceptible to participation in chemical bond formation or ionization. The simplest way to identify the valence electrons is to look for the highest number in the electron configuration of an atom (the principal quantum number). Its worth noting the IUPAC definition of valence is for the single highest valence value that is displayed by an atom of an element. However, in practical use, main group elements of the periodic table may display any valence from 1 to 7 (since 8 is a complete octet). Most elements have preferred values of valence electrons. The alkali metals, for example, almost always display a valence of 1. The alkaline earths tend to display a valence of 2. The halogens usually have a valence of 1, yet may sometimes display a valence of 7. The transition metals may display a range of valence values because the highest energy electron subshell is only partially filled. Those atoms become more stable by emptying the shell, half-filling it, or completely filling it. Examples Magnesiums ground state electron configuration is 1s22s2p63s2, the valence electrons would be the 3s electrons because 3 is the highest principal quantum number.Bromines ground state electron configuration is 1s22s2p63s2p6d104s2p5, the valence electrons would be the 4s and 4p electrons.

Wednesday, March 4, 2020

What is an Unreliable Narrator Definition and 6 Real Examples

What is an Unreliable Narrator Definition and 6 Real Examples What is an Unreliable Narrator: Definition and Examples In literature, an unreliable narrator is a character who tells a story with a lack of credibility. There are different types of unreliable narrators (more on that later), and the presence of one can be revealed to readers in varying ways - sometimes immediately, sometimes gradually, and sometimes later in the story when a plot twist leaves us wondering if we’ve maybe been a little too trusting.While the term â€Å"unreliable narrator† was first coined by literary critic Wayne C. Booth in his 1961 book, The Rhetoric of Fiction, it’s a literary device that writers have been putting to good use for much longer than the past 80 years. For example, "The Tell-Tale Heart" published by Edgar Allan Poe in 1843 utilizes this storytelling tool, as does Wuthering Heights, published in 1847.But wait, is any narrator really reliable?This discussion can lead us down a proverbial rabbit hole. In a sense, no, there aren’t any 100% completely reliable narrators. The  "Rashomon Effect† tells us that our subjective perceptions prohibit us from ever having a totally clear memory of past events. If each person subjectively remembers something that happened, how do we know who is right? "Indeed, many writers have used the Rashomon Effect to tell stories from multiple first-person perspectives - leaving readers to determine whose record is most believable." (Check out As I Lay Dying by William Faulkner for an example).For the purpose of this article, however, we will refer to narrators who are purposefully unreliable for a specific narrative function. How to write an unreliable narrator that has us on our toes and reading between the lines. Literary function of an unreliable narratorFiction that makes us question our own perceptions can be powerful. An unreliable narrator can create a lot of grey areas and blur the lines of reality, allowing us to come to our own conclusions.Fallible storytellers can also create tension by keeping readers on their toes - wondering if there’s more under the surface, and reading between the lines to decipher what that is. Unreliable  narrators can make for intriguing, complex characters: depending on the narrator’s motivation for clouding the truth, readers may also feel more compelled to keep reading to figure out why the narrator is hiding things.Finally, all unreliable narrators are first-person: they live in the world of the story and will have an inherent bias or perhaps even an agenda. While you may find an unreliable narrator who's written in the second-person or third-person point of view, this is generally rare.PRO-TIP: If you'd like to see the different point of views in action, check out this post that has 50+ point of view examples.Types of unreliable narratorsJust like trying to classify every type of character would be an endless pursuit, so is trying to list every type of unreliable narrator. That said, we've divided these questionable raconteurs into three general types to better understand how they work as a literary device.1) Deliberately Unreliable: Narrators who are aware of their deceptionThis type of narrator is intentionally lying to the reader because, well, they can. They have your attention, the point of view is theirs, and they’ll choose what to do with it, regardless of any â€Å"responsibility† they might have to the reader. (The film adaptation of Room, image: Universal Pictures)Forrest Gump by Winston Groom Forrest is another example of a narrator who’s not deliberately unreliable in order to pull the wool over the readers’ eyes or to â€Å"save face.† From the outset, we are aware that Forrest doesn’t comprehend things like the â€Å"average† person does, and we’re aware that we might not be able to take everything he says at face value. This is confirmed when Forrest begins detailing his life, which is peppered with stories about major events from history that he was apparently intimately involved in. We can’t be certain that he’s not telling the truth, but it would be quite the life if he is. Six examples of unreliable narrators and how to write your own fallible storyteller. An unreliable narrator breaks the conventional relationship of trust between a reader and a storyteller. However, the key is that you don’t want to shatter that trust entirely, because you’re likely to lose the reader. Ensure your unreliable narrator has a clear purpose for being unreliable, employ just enough mist around the narrator’s accounts to put question marks in our minds, give us the underlying sense that there’s more to the story, and you’ll be able to foster a connection between the reader and narrator that has the pages of your book flipping.Who are some of your favorite unreliable narrators from literature? Have you ever tried writing one yourself? Leave any thoughts or questions in the comments below!

Monday, February 17, 2020

Reports on Penetration Testing on Operating Systems and Database Research Paper

Reports on Penetration Testing on Operating Systems and Database Security to Ensure Reliabilty and Integrity - Research Paper Example In the context of penetration testing on operating systems, it can be affirmed that the aspect i.e. penetration testing is often viewed as an elementary area of information systems based on security engineering (McDermott, 2001). In precise, the facet of penetration testing is often regarded as ‘pen testing’ or ‘security testing’ method which tends to assess the safety of a computer network or system by testing it from the viewpoint of an attacker i.e. a hacker or a cracker. This significant aspect i.e. penetration testing cannot be duly considered as an alternative to other security measures related to information technology (IT). Rather, it is regarded as the approach which significantly assures the security of a network or system in terms of protecting it from being attacked by an intruder (Brown Computer Science, 2010). Techniques of Penetration Testing on Operating Systems The different techniques of penetration testing on operating systems can be appar ently observed as gathering valuable information, scanning internet protocol (IP) addresses, performing fingerprinting, recognizing vulnerable services, exploiting vulnerability activities and finally fixing major problems. The prime intention of the technique i.e. gathering valuable information is to determine the diverse range of Internet Protocol (IP) addresses possessed by an organization. ... tice concerning the recognition of vulnerable service targets is performed to gain greater access to the operating systems along with ensuring that the operating systems are not harmed internally or externally. The technique linked with exploiting vulnerability activities enables to exploit certain detected vulnerabilities such as buffer and heal overflow, code injection, cross-site scripting and SQL injection among others. The prime intention of the technique related to fixing major problems is to recognize the active ports that run on the operating systems. The identification of these active ports might support to protect the operating systems through developing along with upgrading client/server architecture, conducting thorough or non-destructive tests and constructing vulnerability mapping among others (Brown Computer Science, 2010). Thus, on the basis of the above discussion, it can be affirmed from a broader outlook that the aforesaid techniques would certainly facilitate to p rotect the operating networks or systems by a significant level. Significance of Penetration Testing on Operating Systems In this high-tech era, the importance of penetration testing especially within the periphery of operating systems has gained relevance by a considerable level. The procedure of conducting an effectual penetration test enables to confirm that new along with existing operating systems and networks are not susceptible to security risks that might permit unlawful access to exploit valuable resources. It can be observed over a few preceding years that the business corporations in this present era are adopting and executing modern technological tools such as advanced operating systems for the purpose of delivering quality and effective services to the consumers. The broader